id
stringlengths 9
10
| text
stringlengths 1
18.1M
| source
stringclasses 1
value | created
timestamp[s] | added
stringlengths 26
26
| metadata
dict |
---|---|---|---|---|---|
2107.12471 | # Thermodynamic speed limits for co-evolving systems
Farita Tasnim [email protected], web: farita.me Massachusetts Institute of
Technology, Cambridge, MA, USA David H. Wolpert [email protected], web:
davidwolpert.weebly.com Santa Fe Institute, Santa Fe, NM, USA Complexity
Science Hub, Vienna, Austria Arizona State University, Tempe, AZ, USA
###### Abstract
Previously derived “global” thermodynamic speed limit theorems state that
increasing the maximum speed with which a system can evolve between two given
probability distributions over its states requires the system to produce more
entropy in its evolution. However, these theorems ignore that many systems are
not monolithic, but instead comprise multiple subsystems that interact
according to an (often sparse) network. Indeed, most naturally-occurring and
human-engineered systems of increasing complexity can be decomposed into sets
of co-evolving subsystems, where there exist a priori constraints on the
dynamics of each subsystem, restricting which other subsystems can affect its
dynamics. Here we derive three new SLTs that account for the thermodynamic
effects of such constraints. Our first new speed limit strengthens the global
speed limit. While our other two SLTs do not have this guarantee, in some
situations they are even stronger than our first speed limit. Our results
establish that a stochastically evolving system will, on average, produce more
entropy in evolving between two distributions within a given time simply due
to its comprising multiple, co-evolving subsystems. We illustrate our results
with numerical calculations involving a model of two cells sensing and storing
information about their environment.
††preprint: APS/123-QED
Introduction
We can characterize a stochastic process by the minimum time it takes to
evolve from one particular, specified probability distribution over its states
into another specified distribution. To give just a few examples, such lower
bounds usefully describe: a cell that senses a change in its environment [1,
2] or synthesizes a protein [3]; a set of chemical species that changes their
concentrations via a chemical reaction network [4, 5]; a genome that evolves
to include particular mutations [6, 7]; a digital device that completes a
particular computation [8, 9]; a network of neurons that store, process and
transmit information [10, 11, 12] or (re)configures itself [13, 14]; and an
opinion network that evolves from a unimodal to a bimodal state [15, 16].
Continuous-time Markov chains (CTMC’s) can accurately serve as models of many
of these stochastic processes. With the new body of work sometimes called
(classical) “stochastic thermodynamics" [17, 18, 19, 20, 21, 22] developed in
the last two decades, we have drastically improved our ability to analyze the
thermodynamics of CTMCs. For example, thermodynamic uncertainy relations
(TURs) [23, 24] have shown that dissipated work constrains the fluctuations in
any current flowing in a system at a steady state arbitrarily far from
equilibrium. Additionally, fluctuation theorems (FTs) [18, 25, 26] have shown
that probability distributions over any functional of a stochastic trajectory
obey symmetries that constrain their even and odd moments.
In addition to these powerful new results, the last few years have brought
about a quickly growing set of lower bounds on the time it takes a system
evolving according to a CTMC to move from one given distribution over the
system’s states to another one [27, 28, 29, 30, 31, 32, 33]. These
“thermodynamic speed limit theorems" (SLTs) reveal a trade-off between the
time for the evolution to take place, and the amount of work dissipated (and,
thus, free energy consumed) during that evolution.
As a canonical example, the SLT derived in [33] lower bounds this time of
evolution with a quantity proportional to the total variation distance between
the initial and final distributions over system states; and inversely
proportional to the total entropy production (EP) and time-averaged dynamical
activity. When local detailed balance holds, the EP equals the work a system
must dissipate during a process, i.e., the degree to which the total entropy
of the universe increases, or the expended free energy that cannot be
recovered. Therefore, intuitively, this SLT declares that if we modify a CTMC
to make it change its distribution either by a greater amount or in less time,
then we must “pay for” that faster evolution by increasing (a lower bound on)
the total dissipated work.
However, like most of the other theorems in (classical) stochastic
thermodynamics [17, 19, 20, 34], the previously derived SLTs do not exploit
any information concerning the internal structure of a system. In particular,
these SLTs ignore all aspects of how the system might decompose into a set of
co-evolving subsystems. Although this attribute allows for their broad
applicability, these SLTs will, in general, provide increasingly weak bounds
for systems of increasing complexity. As a result, such “global SLTs”, along
with other previously derived thermodynamic relations (such as the TURs and
FTs) that formalize systems as monolithic entities, most appropriately apply
to nanoscale systems [18, 35, 36, 37, 38, 39, 40, 41], whose internal
structure is either unimportant (because the system is so small) or unknown.
Importantly, this shortcoming needlessly limits the strength of these results.
For many systems above the nanoscale, we know much about how their internal
subsystems influence each other. For example, many sets of co-evolving
subsystems form modular interaction networks [42, 43, 44, 45, 46, 47, 48, 49,
50, 51, 52]. This kind of internal structure can be formulated as a set of
constraints on the CTMC governing the overall dynamics of the whole system.
Here we derive tighter SLTs by analyzing how constraints on the allowed
dynamics in a system affect its stochastic thermodynamics. Specifically, we
explore a major class of dynamical constraints that arises in systems of
increasing complexity, as imposed by the property that they decompose into
sets of co-evolving subsystems, where the interactions between subsystems
restrict how the overall, combined system can evolve.
Figure 1: An example of a multipartite process. This MPP consists of four
subsystems and maps to the abstracted MPP given in Fig. 2. Subsystem 3 is $l$,
the concentration of the ligand in a cellular medium. Two "nearby" cells sense
this ligand concentration. The number of bound receptors, $n_{r_{1}}$, in Cell
1 comprise subsystem 2, and the number of bound receptors, $n_{r_{2}}$, in
Cell 2 comprise subsystem 4. Subsystem 1 represents a memory of
(phosphorylated) proteins, $n_{m}$, in Cell 1 that observes the state of its
receptors.
We begin by reviewing the relevant stochastic thermodynamics of co-evolving
subsystems, with emphasis on subsystem-indexed contributions to thermodynamic
quantities such as the entropy production. As commonly done in the literature,
we assume that subsystems are spatially separated, and therefore that the
overall system evolves as a multipartite process (MPP) [43, 44, 49, 48].
We next derive three major results, each a new SLT applicable to multipartite
processes. The first SLT demonstrates that accounting for the dynamical
constraints resulting from the internal structure of interactions in an MPP
strengthens the bound on the minimum time required for that system to evolve
between two distributions. In deriving our second SLT, we note that an
important concept in analyzing a set of co-evolving subsystems is that of a
"unit", which is a subset of subsystems whose joint dynamics is independent of
the state of all the other subsystems. While subsystems outside of a unit can
“observe” (depend on the state of) a subsystem in a unit, the reverse is not
true. This SLT shows that a system can never evolve faster than its slowest-
evolving unit. Our third SLT shows that a system can never evolve faster than
its slowest-evolving subsystem.
We prove that the first SLT is always at least as strong as the global SLT in
[33], regardless of the details of the system’s dependency constraints. The
other two SLTs do not always have this guarantee; however, in many cases, they
are stronger than our first SLT. We derive our new SLTs in full detail in
Appendices S1 and S2.
We then conduct numerical calculations to explore the strength of our new SLTs
for the example MPP of a cell sensing its environment, a model previously
studied in the literature [1, 53]. This example, depicted in Fig. 1, consists
of two sets of cellular receptors and a cellular memory that sense and record
the value of a changing ligand concentration.
We end the main text with a discussion of the significance of our results, a
summary of thermodynamic consistency and auxiliary results (including new
speed limits for Bayes’ Nets) derived in the sections S3 - S10 of the
Appendices, and suggestions for future work.
We summarize all notation used in the main text in Appendix S11.
Figure 2: An example of a multipartite process. The system consists of four
subsystems, indicated by outlined circles. The arrows represent dependencies
that restrict the associated subsystem’s rate matrices: the state of subsystem
1 at time $t+\delta t$ depends on the state of subsystems 1 and 2 at time $t$;
subsystem 2 depends on 2 and 3; subsystem 3 depends only on itself, and
subsystem 4 depends on 3 and 4. The set of all dependency constraints can be
represented as a directed acyclic graph (DAG), called a dependency graph
$(1\leftarrow 2\leftarrow 3\rightarrow 4)$. Five units exist in the system
aside from the global system itself: $\\{\omega,\alpha,\phi,\beta,\psi\\}$.
Each unit structure, indicated by circle-capped vertical lines, is a set of
units that is closed under intersections and that covers $\mathcal{N}$. There
are four possible unit structures,
$\mathcal{N}^*_{1}=\\{\omega,\alpha,\phi\\}$,
$\mathcal{N}^*_{2}=\\{\omega,\alpha,\phi,\beta\\}$,
$\mathcal{N}^*_{3}=\\{\omega,\psi,\beta\\}$, or
$\mathcal{N}^*_{4}=\\{\omega,\psi,\alpha,\beta,\phi\\}$.
Results
Stochastic thermodynamics of multipartite processes
A set of co-evolving systems can be modeled to evolve as a multipartite
process (MPP). Formally, an MPP describes any system with the property that no
two of its subsystems can change state at exactly the same time. We call this
the multipartite property. MPPs are extremely common [43, 44, 49, 48],
including biological sensors, information engines, and Ising spin systems that
can be modeled with the Gillespie algorithm or kinetic Monte Carlo simulations
[54]. Other examples include eukaryotic cells, which consist of multiple
interacting organelles and biomolecular species [1]. Subcellular processes
such as protein synthesis could also be modelled as MPPs, with subsystems as
ribosomal subunits, mRNA, and sets of tRNA-activated amino acids [3]. An MPP
can have any arbitrary collection of dependency constraints, i.e.,
restrictions on how the dynamics of each subsystem depends on the states of
the other subsystems. This includes non-reciprocal couplings between
subsystems [55], such as those that can be found in networks represented by
directed acyclic graphs (DAGs) [56]. This assumption of no “back-action” is
used throughout literature [57, 1].
The ubiquity of MPPs arises because, unless two subsystems occupy the exact
same location, they will not be coupled to the same degrees of freedom in the
external reservoirs. Therefore, it is physically impossible for them to change
state at the exact same moment due to a single fluctuation in their
interaction with a reservoir. Additionally, continuous time also allows for
successive state transitions to occur arbitrarily closely in time.
We consider an MPP $\mathcal{N}$ that comprises a set of $N$ subsystems with
finite state spaces $\\{X_{i}:i=1,\ldots,N\\}$. $x$ indicates a state vector
in $X=\bigtimes_{\;i\in\mathcal{N}}X_{i}$, the joint state space of the full
system. For any set of subsystems $A\subset\mathcal{N}$, we write
$-A:=\mathcal{N}\backslash A$, and $x_{A}$ indicates an element of
$X_{A}=\bigtimes_{\;i\in A}X_{i}$. For any two distributions $p$ and
$p^{\prime}$ over $X$, we write the total variation (L1) distance between them
as
$\displaystyle\mathcal{L}(p,p^{\prime})=\sum_{x}\left\lvert
p_{x}-p^{\prime}_{x}\right\rvert$ (1)
We indicate the Shannon entropy of a distribution over states $X_{A}$ as
$S^{X_{A}}$ or $S^A$. We set $k_{\text{B}}=1$.
The joint dynamics over $X$ is given by the master equation
$\displaystyle\frac{dp_{x}(t)}{dt}=\sum_{x^{\prime}}K^{x^{\prime}}_{x}(t)p_{x^{\prime}}(t)$
(2)
In an MPP, there also exists a set of $N$ (possibly time-varying) stochastic
rate matrices, $\\{K^{x^{\prime}}_{x}(i;t):i=1,\ldots,N\\}$ where
$K^{x^{\prime}}_{x}(i;t)=0\;\forall\,i,t,\\{x^{\prime},x\,|\,x^{\prime}_{-i}\neq
x_{-i}\\}$, and we can decompose
$\displaystyle
K^{x^{\prime}}_{x}(t)=\sum_{i\in\mathcal{N}}K^{x^{\prime}}_{x}(i;t)$ (3)
Similarly, for any $B\subseteq\mathcal{N}$,
$K^{x^{\prime}}_{x}(B;t)=\sum_{i\in B}K^{x^{\prime}}_{x}(i;t)$.
In an MPP, $K^{x^{\prime}}_{x}(t)=0$ if $x^{\prime}$ and $x$ differ in more
than one component. In other words, at any given moment in time, only one
subsystem can undergo a state transition. This means that the global rate
matrix is sparse for many MPPs.
Note that for all $x^{\prime}\neq x$,
$\displaystyle
K^{x^{\prime}}_{x}(i;t)=K^{x^{\prime}}_{x}(t)\delta(x^{\prime}_{-i},x_{-i})$
(4)
For each subsystem $i$, we write $r(i;t)$ for any set of subsystems at time
$t$ that include $i$ and for which we can write
$\displaystyle
K^{x^{\prime}}_{x}(i;t)=K^{x^{\prime}_{r(i;t)}}_{x_{r(i;t)}}(i;t)\,\delta(x^{\prime}_{-r(i;t)},x_{-r(i;t)})$
(5)
In general, for any given $i$ there could be multiple such sets $r(i;t)$. We
refer to a specification of any $r(i;t)$ as a dependency constraint.
We define a unit $\omega$ (at an implicit time $t$) as a set of subsystems $i$
such that $i\in\omega$ implies that $r(i;t)\subseteq\omega$. Consequently, any
intersection of two units is a unit, as is any union of two units. For any
unit $\omega$, we can decompose
$K^{x^{\prime}_{\omega}}_{x_{\omega}}(\omega;t)=\sum_{i\in\omega}K^{x^{\prime}_{\omega}}_{x_{\omega}}(i;t)$.
So, by Eq. 5,
$K^{x^{\prime}}_{x}(\omega;t)=\sum_{i\in\omega}K^{x^{\prime}}_{x}(i;t)=K^{x^{\prime}_{\omega}}_{x_{\omega}}(\omega;t)\delta(x^{\prime}_{-\omega},x_{-\omega})$.
We write $\mathcal{N}^{**}$ for the set of all units in $\mathcal{N}$, other
than the global system itself. For the example system shown in Fig. 2,
$\mathcal{N}^{**}=\\{\omega,\alpha,\phi,\beta,\psi\\}$. For later use, we also
define $\mathcal{N}^\dagger=\mathcal{N}^{**}\cup\mathcal{N}$.
As is standard in the recent literature on MPPs [48, 49, 47], we assume that
there are pre-fixed time intervals in which $\mathcal{N}^{**}$ doesn’t change,
and restrict attention to such an interval.
Crucially, the local marginal distribution $p_{x_{\omega}}(t)$ of any unit
$\omega$ at any time $t$ evolves as a self-contained CTMC with the local rate
matrix $K^{x^{\prime}_{\omega}}_{x_{\omega}}(\omega;t)$ (proved in Appendix A
of [49]):
$\displaystyle\frac{dp_{x_{\omega}}(t)}{dt}=\sum_{x^{\prime}_{\omega}}K^{x^{\prime}_{\omega}}_{x_{\omega}}(\omega;t)p_{x^{\prime}_{\omega}}(t)=\sum_{x^{\prime}_{\omega}}\sum_{i\in\omega}K^{x^{\prime}_{\omega}}_{x_{\omega}}(i;t)p_{x^{\prime}_{\omega}}(t)$
(6)
This means that any unit obeys all the usual stochastic thermodynamic theorems
for CTMCs, e.g. the second law, FTs, TURs, and SLTs. In general, this property
does not hold for any single subsystem or any set of subsystems (that is not a
unit) in an MPP, due to each subsystem’s dependency constraints [49]. Instead,
the marginal distribution of subsystem $i$ changes as
$\displaystyle\frac{d}{dt}p_{x_{i}}(t)=\sum_{x^{\prime}}K^{x^{\prime}}_{x}(i;t)p_{x^{\prime}}(t)$
(7) $\displaystyle=\sum_{x^{\prime}\neq
x}K^{x^{\prime}}_{x}(i;t)p_{x^{\prime}}(t)-K^{x}_{x^{\prime}}(i;t)p_{x}(t)$
(8) $\displaystyle=\sum_{x^{\prime}_{-i}}\sum_{x^{\prime}_{i}\neq
x_{i}}K^{x^{\prime}_{i},x^{\prime}_{-i}}_{x_{i},x^{\prime}_{-i}}(i;t)p_{x^{\prime}_{i},x^{\prime}_{-i}}(t)-K^{x_{i},x^{\prime}_{-i}}_{x^{\prime}_{i},x^{\prime}_{-i}}(i;t)p_{x_{i},x^{\prime}_{-i}}(t)$
(9)
For any MPP, we write the global time-averaged dynamical activity (often
interpreted as the frequency of state transitions) during the time interval
$[0,\tau]$ as
$\displaystyle\langle{\mathcal{A}}^{\mathcal{N}}\rangle_{\tau}=\frac{1}{\tau}\int_{0}^\tau\sum_{x^{\prime}\neq
x}dt\;K^{x^{\prime}}_{x}(t)p_{x^{\prime}}(t)$ (10)
We write the global EP rate as
$\displaystyle\langle\dot{\sigma}^{\mathcal{N}}(t)\rangle=\sum_{x^{\prime},x}K^{x^{\prime}}_{x}(t)p_{x^{\prime}}(t)\ln\left[\frac{K^{x^{\prime}}_{x}(t)p_{x^{\prime}}(t)}{K^{x}_{x^{\prime}}(t)p_{x}(t)}\right]$
(11)
Integrating the global EP rate over the interval $[0,\tau]$ provides the total
global EP $\langle\sigma^{\mathcal{N}}(\tau)\rangle$.
In our notation, the major result of [33] — “global SLT” — reads
$\tau\geq{\mathcal{T}}:=\frac{\left(\mathcal{L}(p_{x}(0),p_{x}(\tau))\right)^2}{2\langle\sigma^{\mathcal{N}}(\tau)\rangle\langle{\mathcal{A}}^{\mathcal{N}}\rangle_{\tau}}$.
Note that although the global SLT can be applied to an MPP, it does not
account for any of the MPP’s dependency constraints.
In order to derive SLTs that account for the multipartite nature of the system
dynamics, we decompose the global EP rate
$\langle\dot{\sigma}^{\mathcal{N}}(t)\rangle$ for an MPP at time $t$:
$\displaystyle\langle\dot{\sigma}^{\mathcal{N}}(t)\rangle=\sum_{i\in\mathcal{N}}\sum_{x^{\prime},x}K^{x^{\prime}}_{x}(i;t)p_{x^{\prime}}(t)\ln\left[\frac{K^{x^{\prime}}_{x}(i;t)p_{x^{\prime}}(t)}{K^{x}_{x^{\prime}}(i;t)p_{x}(t)}\right]$
(12)
$\displaystyle=\sum_{i\in\mathcal{N}}\sum_{x^{\prime}_{-i},x^{\prime}_{i},x_{i}}K^{x^{\prime}_{i},x^{\prime}_{-i}}_{x_{i},x^{\prime}_{-i}}(i;t)p_{x^{\prime}_{i},x^{\prime}_{-i}}(t)\ln\left[\frac{K^{x^{\prime}_{i},x^{\prime}_{-i}}_{x_{i},x^{\prime}_{-i}}(i;t)p_{x^{\prime}_{i},x^{\prime}_{-i}}(t)}{K^{x_{i},x^{\prime}_{-i}}_{x^{\prime}_{i},x^{\prime}_{-i}}(i;t)p_{x_{i},x^{\prime}_{-i}}(t)}\right]$
(13)
$\displaystyle:=\sum_{i\in\mathcal{N}}\langle\dot{\zeta}^{i}_{\mathcal{N}}(t)\rangle$
(14)
$\langle\dot{\zeta}^{i}_{\mathcal{N}}(t)\rangle$ is a subsystem-indexed
contribution to the global EP rate, i.e., it changes only due to the state
transitions in subsystem $i$ (compare it to the integrand in Eq. 11). We make
the associated time-integrated definition,
$\langle\zeta^{i}_{\mathcal{N}}(\tau)\rangle=\int_{0}^\tau
dt\langle\dot{\zeta}^{i}_{\mathcal{N}}(t)\rangle$; therefore,
$\langle\sigma^{\mathcal{N}}(t)\rangle=\sum_{i\in\mathcal{N}}\langle\zeta^{i}_{\mathcal{N}}(t)\rangle$
for all times $t$. Similarly, for any unit $\omega$, we can write
$\langle\dot{\sigma}^{\omega}(t)\rangle:=\sum_{i\in\omega}\langle\dot{\zeta}^{i}_{\omega}(t)\rangle$
and
$\langle\sigma^{\omega}(t)\rangle=\sum_{i\in\omega}\langle\zeta^{i}_{\omega}(t)\rangle$.
We define the vector whose components are the time-$t$ subsystem-indexed
contributions to the global EP as
$\langle\vec{\zeta}_{\mathcal{N}}(t)\rangle$, and to the $\omega$-local EP as
$\langle\vec{\zeta}_{\omega}(t)\rangle$.
Similarly, we define the dynamical activity due only to the state transitions
in subsystem $i$ as:
$\displaystyle{\mathcal{A}}^i(t):=\sum_{x^{\prime}_{-i}}\sum_{x_{i}}\sum_{x^{\prime}_{i}\neq
x_{i}}K^{x^{\prime}_{i},x^{\prime}_{-i}}_{x_{i},x^{\prime}_{-i}}(i;t)p_{x^{\prime}_{i},x^{\prime}_{-i}}(t)$
(15)
where ${\mathcal{A}}^{\mathcal{N}}(t):=\sum_{x^{\prime}\neq
x}K^{x^{\prime}}_{x}(t)p_{x^{\prime}}(t)=\sum_{i\in\mathcal{N}}{\mathcal{A}}^{i}(t)$.
The corresponding time-averaged dynamical activity is
$\langle{\mathcal{A}}^{i}\rangle_{\tau}=\frac{1}{\tau}\int_{0}^\tau{\mathcal{A}}^{i}(t)$.
Similarly, for any unit $\omega$,
${\mathcal{A}}^{\omega}(t)=\sum_{i\in\omega}{\mathcal{A}}^{i}(t)$ and
$\langle{\mathcal{A}}^{\omega}\rangle_{\tau}=\sum_{i\in\omega}\langle{\mathcal{A}}^{i}\rangle_{\tau}$.
Unlike its entropy production, a subsystem’s contribution to the dynamical
activity does not depend on whether that dynamical activity is a global or
local quantity (see Appendix S3 for proof). We write
$\langle\vec{{\mathcal{A}}}_{\mathcal{N}}\rangle_{t}$ for the vector with
components ${\mathcal{A}}^i(t)$, and write
$\langle\vec{{\mathcal{A}}}_{\omega}\rangle_{t}$ for the vector with
components ${\mathcal{A}}^{\omega}(t)$.
We formulate our analysis below as if each subsystem $i$ interacts wih a
single heat bath (of inverse temperature $\beta_{i}$); however, all of our
results extend naturally to the case of multiple reservoirs per subsystem, as
discussed in [48]. As a final comment, we emphasize that all thermodynamic
speed limits hold for any chosen run-time $\tau$. Indeed, since all EPs and
dynamical activities depend on $\tau$, the speed limit bounds are functions of
$\tau$.
Strengthened speed limits for multipartite processes
Our first main result, derived in Appendix S1, states
$\displaystyle\tau\geq{\mathcal{T}}_{\mathcal{N}}:=\frac{\left(\mathcal{L}(p_{x}(0),p_{x}(\tau))\right)^2}{2\left(\sum_{i\in\mathcal{N}}\sqrt{\langle\zeta^{i}_{\mathcal{N}}(\tau)\rangle\langle{\mathcal{A}}^{i}\rangle_{\tau}}\right)^2}$
(16)
Furthermore, the Cauchy-Schwartz inequality ensures that
$\left(\sum_{i\in\mathcal{N}}\sqrt{\langle\zeta^{i}_{\mathcal{N}}(\tau)\rangle\langle{\mathcal{A}}^{i}\rangle_{\tau}}\right)^2\leq\langle\sigma^{\mathcal{N}}(\tau)\rangle\langle{\mathcal{A}}^{\mathcal{N}}\rangle_{\tau}$.
Combining establishes that
${\mathcal{T}}_{\mathcal{N}}\geq\frac{\left(\mathcal{L}(p_{x}(0),p_{x}(\tau))\right)^2}{2\langle\sigma^{\mathcal{N}}(\tau)\rangle\langle{\mathcal{A}}^{\mathcal{N}}\rangle_{\tau}}={\mathcal{T}}$.
Therefore, accounting for a system’s internal structure strengthens the
thermodynamic speed limit.
Our second main result is a speed limit involving only the thermodynamic
contributions (and thus the dependency constraints) for the subsystems within
any single unit $\omega\subset\mathcal{N}$ (proof in Appendix S1):
$\displaystyle\tau\geq\max_{\omega\in\mathcal{N}^{**}}\left({\mathcal{T}}_{\omega}:=\frac{\left(\mathcal{L}(p_{x_{\omega}}(0),p_{x_{\omega}}(\tau))\right)^2}{2\left(\sum_{i\in\omega}\sqrt{\langle\zeta^{i}_{\omega}(\tau)\rangle\langle{\mathcal{A}}^{i}\rangle_{\tau}}\right)^2}\right)$
(17)
In this sense, the slowest of all the units is the limiting factor on how fast
the overall system can evolve. Below we will refer to the set of SLTs based on
all of the ${\mathcal{T}}_{\omega}$ as the unit-based SLTs.
Our third main result bounds an MPP’s speed of evolution using only the
thermodynamic contributions of any single subsystem (proof in Appendix S2):
$\displaystyle\tau\geq\max_{i\in\mathcal{N}}\left({\mathcal{T}}_{i}:=\frac{\left(\mathcal{L}(p_{x_{i}}(0),p_{x_{i}}(\tau))\right)^2}{\min_{\omega\in\mathcal{N}^\dagger\,|\,i\in\omega}2\langle\zeta^{i}_{\omega}(\tau)\rangle\langle{\mathcal{A}}^{i}\rangle_{\tau}}\right)$
(18)
In general, the unit satisfying the minimum in the denominator will be given
by the smallest unit containing $i$. Intuitively, this result shows that an
MPP can evolve only as fast as its slowest-evolving subsystem. The set of all
${\mathcal{T}}_{i}$ form the subsystem-local SLTs.
These second two results are not guaranteed to be tighter than the global SLT.
However, in many cases, at least one of each kind of SLT (i.e., Eq. 17 for
some unit $\omega$ or Eq. 18 some subsystem $i$) is stronger than even the
bound given in our first result, Eq. 16. In general, which of our three main
results will provide the tightest bound will vary depending on the details of
the CTMC, particularly on the dependency graph and the control protocol (time
sequence of rate matrices). We can easily write necessary and sufficient
conditions for any one of the three SLTs to be stronger than any one of the
others. For instance, a necessary and sufficient condition for Eq. 18 (for
subsystem $i$) to outperform Eq. 16 is if the CTMC satisfies
$\frac{\left(\sum_{j\in\mathcal{N}}\sqrt{\langle\zeta^{j}_{\mathcal{N}}(\tau)\rangle\langle{\mathcal{A}}^{j}\rangle_{\tau}}\right)^2}{\min_{\omega\in\mathcal{N}^\dagger\,|\,i\in\omega}\langle\zeta^{i}_{\omega}(\tau)\rangle\langle{\mathcal{A}}^{i}\rangle_{\tau}}(\mathcal{L}(p_{x_{i}}(0),p_{x_{i}}(\tau)))^2\geq(\mathcal{L}(p_{x}(0),p_{x}(\tau)))^2$.
Figure 3: Comparison of speed limit bounds for the example of cellular sensing
shown in Fig. 1. The dark grey line represents the actual time of system
evolution. All other lines represent the lower bounds on time provided by
different SLTs. Note that bounds represented by the orange and violet lines
are equivalent because the unit $\phi$ is composed of only subsystem 3.
Numerical calculations of speed limit bounds for a model of cellular sensing
We now illustrate our results for an MPP model of a cell sensing and storing
information about its environment [1, 53, 49]. This system is illustrated in
Fig. 1 and captured abstractly in Fig. 2. Two sets of cellular receptors,
belonging to different cells, each independently observe the concentration of
a ligand in the medium. Additionally, a set of proteins in one of the cells
acts as a subcellular memory of that cell’s fraction of bound receptors.
Subsystem 3 is the ligand concentration, whose state is
$l=\ln\frac{s}{s_{0}}$, where $s_{0}$ is a reference concentration. Subsystem
2 is the number of receptors bound by the ligand in the cell membrane of Cell
1. Its possible states are $n_{r_{1}}=0,1,2,\ldots,N_{r_{1}}$, where
$N_{r_{1}}$ is the total number of receptors. Subsystem 4 is the number of
bound receptors in Cell 2. Its possible states are
$n_{r_{2}}=0,1,2,\ldots,N_{r_{2}}$, where $N_{r_{2}}$ is the total number of
receptors. Subsystem 1 is the number of phosphorylated proteins in Cell 1,
serving as a memory of that cell’s fraction of bound receptors. Its possible
states are $n_{m}=0,1,2,\ldots,N_{m}$, where $N_{m}$ is the total number of
proteins. In our calculations, we use $N_{r_{1}}=3,N_{r_{2}}=3$, and
$N_{m}=4$.
We construct the time-homogeneous rate matrices governing the evolution of
this model system according to Section III of [1]. These rate matrices account
for quantities such as the free energy required for a ligand-receptor binding
event and for a phosphorylation reaction. We set the initial joint
distribution as
$p_{x}(0)=p_{x_{3}}(0)p_{x_{2}|x_{3}}(0)p_{x_{4}|x_{3}}(0)p_{x_{1}|x_{2}}(0)$,
where each of the conditional distributions are Gaussians with mean set by the
value of the state on which it is dependent, and where the initial
distribution of subsystem 3, $p_{x_{3}}(0)$, is $\sim\mathcal{N}(0,0.01)$. For
more details, refer to the code available at
https://github.com/FaritaTasnim/MPP_SLTs_cellular_sensing.
We evolve the joint distribution over time according to the global rate matrix
$K$ by solving the master equation to obtain $p_{x}(t)=p_{x}(0)e^{tK}$. We
calculate the distribution every 50 $\mu$s in the interval [0, 55] ms. From
the rate matrices and time-$t$ distributions, we calculate all relevant
thermodynamic quantities at each timestep.
Our numerical calculations are illustrated in Fig. 3, for both subsystem-local
SLTs (left panel) and for unit-based SLTs (right panel). These calculations
confirm that our first main result (${\mathcal{T}}_{\mathcal{N}}\equiv$ pink)
provides a tighter bound on the speed of system evolution than does the global
SLT from [33] (${\mathcal{T}}\equiv$ dark green).
Additionally, we find that in this particular example, each unit-based SLT
(${\mathcal{T}}_{\omega}\equiv$ lavender, ${\mathcal{T}}_{\alpha}\equiv$ sea
green, ${\mathcal{T}}_{\phi}\equiv$ violet, ${\mathcal{T}}_{\beta}\equiv$ dark
blue, ${\mathcal{T}}_{\psi}\equiv$ olive green), as well as each subsystem-
local SLT (${\mathcal{T}}_{1}\equiv$ yellow, ${\mathcal{T}}_{2}\equiv$ light
blue, ${\mathcal{T}}_{3}\equiv$ orange, ${\mathcal{T}}_{4}\equiv$ lime green),
is stronger than not only the global SLT, but also our first SLT. (As an
aside, the units that minimize the denominator in the bound
${\mathcal{T}}_{i}$ for each subsystem $i$ are as follows:
$\\{1:\omega,\;2:\beta,\;3:\phi,\;4:\alpha\\}$.) As noted before, each of
these units is the smallest unit containing $i$.
Interestingly, even though the rate matrix for system evolution doesn’t change
(i.e., it is time-homogeneous) we see that the strength of the subsystem-local
SLT for subsystem 3 (${\mathcal{T}}_{3}\equiv$ orange) surpasses that for
subsystem 2 (${\mathcal{T}}_{2}\equiv$ light blue) after 35 ms of system
evolution.
Discussion
In this paper we extended the conventional thermodynamic speed limit to derive
a set of strengthened speed limits for the case of co-evolving subsystems.
These results can be useful for analyzing naturally occurring systems of many
types where one would suppose there exist design pressures to make the
evolution of an MPP as fast as possible, e.g., in a biological setting, where
speed might directly translate into fitness value. These results could
additionally augment the evaluation of trade-offs between control protocols
for evolving a system along a desired path of distributions [58, 59, 60].
We present other interesting properties related to SLTs in MPPs, as well as
some auxiliary results in Appendices S4 - S10. In Appendix S4, we discuss how
our results extend the applicability of thermodynamic speed limits to systems
characterized by local, rather than global, interactions. In doing so, we
establish thermodynamic consistency of our results for systems whose dynamics
are defined by local, rather than global, Hamiltonians. In Appendix S5, we
show that each of the subsystem-indexed contributions to the global EP follows
an integral fluctuation theorem. In Appendix S6, we note that the global SLT
also applies to subsets of subsystems, or units, that evolve according to
their own CTMC; this leads to what we call “unit-local SLTs”. In Appendix S7,
we prove that the strongest of a generalized form of the SLT that involves a
linear combination of unit-local thermodynamic properties is given by the
unit-local SLT for the system’s slowest-evolving unit. In Appendix S8, we
consider the SLTs as bounds on the space of distributions that a system can
access within a given time. In particular, we show that the unit-local SLTs
together more tightly restrict (than the global SLT) this space of final joint
distributions for a pair of independently evolving spins. In Appendix S9, we
derive maximum and minimum speeds of evolution for Bayes’ Nets, which are a
type of MPP for which the state transitions occur according to a global clock.
In Appendix S10, we derive lower bounds on the difference between the EP rate
and the rate at which one unit “learns” about another using counterfactual
thermodynamic quantities.
Finally, we note that the results in this paper suggest several avenues for
future work. Our results investigate how the dynamical constraints imposed by
the interaction network of co-evolving subsystems that comprise an MPP demand
a decrease in the system’s maximum possible speed of evolution. However, we
note that the effect on speed due to other types of dynamical constraints
should be explored. In general, any constraints on a system’s CTMC will
contribute to its minimal EP, strengthening the Second Law of thermodynamics.
As a practical matter, for any CTMC that obeys a given set of constraints
while also implementing a given conditional distribution $P(x_{f}|x_{i})$ on
an initial distribution $P(x_{i})$, often the EP is the dominant contributor
to the total heat dissipation of the system. This contribution of the EP to
the thermodynamic cost of evolution often far exceeds the minimal cost
established by the generalized Landauer bound, which is simply given by the
change in the entropy of the system [61, 62].
Although dynamical constraints govern the thermodynamic costs of classical,
many-degree-of-freedom systems, the analysis of the thermodynamic implications
of constraints on a system’s allowed dynamics remains in its infancy. One
example of relevant research derives the stochastic thermodynamics under
protocol constraints [59]. There has also been some important work where the
“constraint” on a many-degree-of-freedom classical system is simply that it be
some very narrowly defined type of system, whose dynamics is specified by many
different kinds of parameters. For example, there has been analysis of the
stochastic thermodynamics of chemical reaction networks [63, 5, 4, 64], of
electronic circuits [65, 66, 67], of spin glasses where all spins are coupled
to one another [68], of biological copying mechanisms [69], and of systems in
which the state transitions of subsystems occur according to a synchronous
global clock [46, 45].
The analyses in this paper as well as those in [46, 48, 49, 70] consider time-
homogeneous dependency constraints. In many real-world scenarios, however, the
dependency constraints may change with time. Integrating this time-dependence
into our framework may further strengthen our speed limits for MPPs.
Additionally, we expect that incorporating finer-grained information about the
topology of the dependency graph would lead to stronger SLTs. However, in many
cases, one does not know the full details of the dependency graph, but instead
might know certain of its properties, e.g., average degree, degree
distribution, or features of community structure. It would therefore be
valuable to extend the stochastic thermodynamics of MPPs, including the SLTs,
to cases where one has such summary statistics of the dependency graph.
Acknowledgements
F.T. thanks David Hartich for helping translate the rate matrices in [1] to a
Markov jump process in a biophysically realistic manner. This work was
supported by the MIT Media Lab Consortium, Santa Fe Institute, US NSF Grant
CHE-1648973, and FQXi Grant FQXi-RFP-IPW-1912.
## References
* Hartich _et al._ [2016] D. Hartich, A. C. Barato, and U. Seifert, Sensory capacity: An information theoretical measure of the performance of a sensor, Physical Review E 93, 10.1103/physreve.93.022116 (2016).
* Ashida _et al._ [2021] K. Ashida, K. Aoki, and S. Ito, Experimental evaluation of thermodynamic speed limit in living cells via information geometry, bioRxiv , 2020 (2021).
* Dutta _et al._ [2020] A. Dutta, G. M. Schütz, and D. Chowdhury, Stochastic thermodynamics and modes of operation of a ribosome: A network theoretic perspective, Physical Review E 101, 032402 (2020).
* Rao and Esposito [2018a] R. Rao and M. Esposito, Conservation laws and work fluctuation relations in chemical reaction networks, The Journal of chemical physics 149, 245101 (2018a).
* Rao and Esposito [2016] R. Rao and M. Esposito, Nonequilibrium thermodynamics of chemical reaction networks: wisdom from stochastic thermodynamics, Physical Review X 6, 041064 (2016).
* Colegrave [2002] N. Colegrave, Sex releases the speed limit on evolution, Nature 420, 664 (2002).
* McDonald _et al._ [2016] M. J. McDonald, D. P. Rice, and M. M. Desai, Sex speeds adaptation by altering the dynamics of molecular evolution, Nature 531, 233 (2016).
* Lloyd [2000] S. Lloyd, Ultimate physical limits to computation, Nature 406, 1047 (2000).
* Markov [2014] I. L. Markov, Limits on fundamental limits to computation, Nature 512, 147 (2014).
* Laughlin _et al._ [1998] S. B. Laughlin, R. R. d. R. van Steveninck, and J. C. Anderson, The metabolic cost of neural information, Nature neuroscience 1, 36 (1998).
* Laughlin [2001] S. B. Laughlin, Energy as a constraint on the coding and processing of sensory information, Current opinion in neurobiology 11, 475 (2001).
* Laughlin and Sejnowski [2003] S. B. Laughlin and T. J. Sejnowski, Communication in neuronal networks, Science 301, 1870 (2003).
* Bassett _et al._ [2011] D. S. Bassett, N. F. Wymbs, M. A. Porter, P. J. Mucha, J. M. Carlson, and S. T. Grafton, Dynamic reconfiguration of human brain networks during learning, Proceedings of the National Academy of Sciences 108, 7641 (2011).
* Bullmore and Sporns [2012] E. Bullmore and O. Sporns, The economy of brain network organization, Nature Reviews Neuroscience 13, 336 (2012).
* Li and Dankowicz [2019] M. Li and H. Dankowicz, Impact of temporal network structures on the speed of consensus formation in opinion dynamics, Physica A: Statistical Mechanics and its Applications 523, 1355 (2019).
* Siegenfeld and Bar-Yam [2020] A. F. Siegenfeld and Y. Bar-Yam, Negative representation and instability in democratic elections, Nature Physics 16, 186 (2020).
* Esposito and Van den Broeck [2010a] M. Esposito and C. Van den Broeck, Three faces of the second law. i. master equation formulation, Physical Review E 82, 011143 (2010a).
* Seifert [2012] U. Seifert, Stochastic thermodynamics, fluctuation theorems and molecular machines, Reports on progress in physics 75, 126001 (2012).
* Van den Broeck _et al._ [2013] C. Van den Broeck _et al._ , Stochastic thermodynamics: A brief introduction, Physics of Complex Colloids 184, 155 (2013).
* Van den Broeck and Esposito [2015] C. Van den Broeck and M. Esposito, Ensemble and trajectory thermodynamics: A brief introduction, Physica A: Statistical Mechanics and its Applications 418, 6 (2015).
* Ciliberto [2017] S. Ciliberto, Experiments in stochastic thermodynamics: Short history and perspectives, Physical Review X 7, 021051 (2017).
* Wolpert [2019] D. H. Wolpert, The stochastic thermodynamics of computation, Journal of Physics A: Mathematical and Theoretical 52, 193001 (2019).
* Horowitz and Gingrich [2017] J. M. Horowitz and T. R. Gingrich, Proof of the finite-time thermodynamic uncertainty relation for steady-state currents, Physical Review E 96, 020103 (2017).
* Horowitz and Gingrich [2020] J. M. Horowitz and T. R. Gingrich, Thermodynamic uncertainty relations constrain non-equilibrium fluctuations, Nature Physics 16, 15 (2020).
* Esposito and Van den Broeck [2010b] M. Esposito and C. Van den Broeck, Three detailed fluctuation theorems, Physical review letters 104, 090601 (2010b).
* Rao and Esposito [2018b] R. Rao and M. Esposito, Detailed fluctuation theorems: A unifying perspective, Entropy 20, 635 (2018b).
* Ito [2018] S. Ito, Stochastic thermodynamic interpretation of information geometry, Physical review letters 121, 030605 (2018).
* Ito and Dechant [2020] S. Ito and A. Dechant, Stochastic time evolution, information geometry, and the cramér-rao bound, Physical Review X 10, 021056 (2020).
* Sekimoto and Sasa [1997] K. Sekimoto and S.-i. Sasa, Complementarity relation for irreversible process derived from stochastic energetics, Journal of the Physical Society of Japan 66, 3326 (1997).
* Aurell _et al._ [2012] E. Aurell, K. Gawedzki, C. Mejía-Monasterio, R. Mohayaee, and P. Muratore-Ginanneschi, Refined second law of thermodynamics for fast random processes, Journal of statistical physics 147, 487 (2012).
* Vo _et al._ [2020] V. T. Vo, T. V. Vu, and Y. Hasegawa, Unified approach to classical speed limit and thermodynamic uncertainty relation, Physical Review E 102, 10.1103/physreve.102.062132 (2020).
* Van Vu and Hasegawa [2021] T. Van Vu and Y. Hasegawa, Geometrical bounds of the irreversibility in markovian systems, Physical Review Letters 126, 010601 (2021).
* Shiraishi _et al._ [2018] N. Shiraishi, K. Funo, and K. Saito, Speed limit for classical stochastic processes, Physical Review Letters 121, 10.1103/physrevlett.121.070601 (2018).
* Pietzonka _et al._ [2017] P. Pietzonka, F. Ritort, and U. Seifert, Finite-time generalization of the thermodynamic uncertainty relation, Physical Review E 96, 012101 (2017).
* Collin _et al._ [2005] D. Collin, F. Ritort, C. Jarzynski, S. B. Smith, I. Tinoco, and C. Bustamante, Verification of the crooks fluctuation theorem and recovery of rna folding free energies, Nature 437, 231 (2005).
* Xiong _et al._ [2018] T. Xiong, L. Yan, F. Zhou, K. Rehan, D. Liang, L. Chen, W. Yang, Z. Ma, M. Feng, and V. Vedral, Experimental verification of a jarzynski-related information-theoretic equality by a single trapped ion, Physical review letters 120, 010601 (2018).
* Huber _et al._ [2008] G. Huber, F. Schmidt-Kaler, S. Deffner, and E. Lutz, Employing trapped cold ions to verify the quantum jarzynski equality, Physical review letters 101, 070403 (2008).
* Toyabe _et al._ [2010] S. Toyabe, T. Sagawa, M. Ueda, E. Muneyuki, and M. Sano, Experimental demonstration of information-to-energy conversion and validation of the generalized jarzynski equality, Nature physics 6, 988 (2010).
* Barato and Seifert [2015] A. C. Barato and U. Seifert, Thermodynamic uncertainty relation for biomolecular processes, Physical review letters 114, 158101 (2015).
* Friedman _et al._ [2020] H. M. Friedman, B. K. Agarwalla, O. Shein-Lumbroso, O. Tal, and D. Segal, Thermodynamic uncertainty relation in atomic-scale quantum conductors, Physical Review B 101, 195423 (2020).
* Pietzonka _et al._ [2016] P. Pietzonka, A. C. Barato, and U. Seifert, Universal bound on the efficiency of molecular motors, Journal of Statistical Mechanics: Theory and Experiment 2016, 124004 (2016).
* D’Souza [2009] R. M. D’Souza, Structure comes to random graphs, Nature Physics 5, 627 (2009).
* Horowitz and Esposito [2014] J. M. Horowitz and M. Esposito, Thermodynamics with continuous information flow, Physical Review X 4, 031015 (2014).
* Horowitz [2015] J. M. Horowitz, Multipartite information flow for multiple maxwell demons, Journal of Statistical Mechanics: Theory and Experiment 2015, P03006 (2015).
* Ito and Sagawa [2013] S. Ito and T. Sagawa, Information thermodynamics on causal networks, Physical Review Letters 111, 180603 (2013).
* Wolpert [2020a] D. H. Wolpert, Uncertainty relations and fluctuation theorems for bayes nets, Physical Review Letters 125, 10.1103/physrevlett.125.200602 (2020a).
* Wolpert [2020b] D. H. Wolpert, Strengthened landauer bound for composite systems, arXiV (2020b).
* Wolpert [2021] D. H. Wolpert, Fluctuation theorems for multiple systems with interdependent dynamics, New Journal of Physics (2021).
* Wolpert [2020c] D. H. Wolpert, Minimal entropy production rate of interacting systems, New Journal of Physics 22, 113013 (2020c).
* Pilosof _et al._ [2017] S. Pilosof, M. A. Porter, M. Pascual, and S. Kéfi, The multilayer nature of ecological networks, Nature Ecology & Evolution 1, 1 (2017).
* Delmas _et al._ [2019] E. Delmas, M. Besson, M.-H. Brice, L. A. Burkle, G. V. Dalla Riva, M.-J. Fortin, D. Gravel, P. R. Guimarães Jr, D. H. Hembry, E. A. Newman, _et al._ , Analysing ecological networks of species interactions, Biological Reviews 94, 16 (2019).
* Bassett and Bullmore [2006] D. S. Bassett and E. Bullmore, Small-world brain networks, The neuroscientist 12, 512 (2006).
* Brittain _et al._ [2017] R. A. Brittain, N. S. Jones, and T. E. Ouldridge, What we learn from the learning rate, Journal of Statistical Mechanics: Theory and Experiment 2017, 063502 (2017).
* Novinger _et al._ [2021] Q. Novinger, A. Suma, D. Sigg, G. Gonnella, and V. Carnevale, Particle-based ising model, Physical Review E 103, 012125 (2021).
* Loos and Klapp [2020] S. A. Loos and S. H. Klapp, Irreversibility, heat and information flows induced by non-reciprocal interactions, New Journal of Physics 22, 123051 (2020).
* Eissfeller and Opper [1994] H. Eissfeller and M. Opper, Mean-field monte carlo approach to the sherrington-kirkpatrick model with asymmetric couplings, Physical Review E 50, 709 (1994).
* Sagawa and Ueda [2009] T. Sagawa and M. Ueda, Minimal energy cost for thermodynamic information processing: measurement and information erasure, Physical review letters 102, 250602 (2009).
* Bravetti and Tapias [2017] A. Bravetti and D. Tapias, Thermodynamic cost for classical counterdiabatic driving, Physical Review E 96, 052107 (2017).
* Kolchinsky and Wolpert [2020] A. Kolchinsky and D. H. Wolpert, Entropy production and thermodynamics of information under protocol constraints, arXiv preprint arXiv:2008.10764 (2020).
* Iram _et al._ [2021] S. Iram, E. Dolson, J. Chiel, J. Pelesko, N. Krishnan, Ö. Güngör, B. Kuznets-Speck, S. Deffner, E. Ilker, J. G. Scott, _et al._ , Controlling the speed and trajectory of evolution with counterdiabatic driving, Nature Physics 17, 135 (2021).
* Diamantini and Trugenberger [2014] M. C. Diamantini and C. A. Trugenberger, Generalized landauer bound as a universal thermodynamic entropy in continuous phase transitions, Physical Review E 89, 052138 (2014).
* Kempes _et al._ [2017] C. P. Kempes, D. Wolpert, Z. Cohen, and J. Pérez-Mercader, The thermodynamic efficiency of computations made in cells across the range of life, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 375, 20160343 (2017).
* Wachtel _et al._ [2018] A. Wachtel, R. Rao, and M. Esposito, Thermodynamically consistent coarse graining of biocatalysts beyond michaelis–menten, New Journal of Physics 20, 042002 (2018).
* Yoshimura and Ito [2021] K. Yoshimura and S. Ito, Thermodynamic uncertainty relation and thermodynamic speed limit in deterministic chemical reaction networks, arXiv preprint arXiv:2104.14748 (2021).
* Gao and Limmer [2021] C. Y. Gao and D. T. Limmer, Principles of low dissipation computing from a stochastic circuit model, arXiv preprint arXiv:2102.13067 (2021).
* Wolpert and Kolchinsky [2020] D. H. Wolpert and A. Kolchinsky, Thermodynamics of computing with circuits, New Journal of Physics 22, 063047 (2020).
* Freitas _et al._ [2020] N. Freitas, J.-C. Delvenne, and M. Esposito, Stochastic thermodynamics of non-linear electronic circuits: A realistic framework for thermodynamics of computation, arXiv preprint arXiv:2008.10578 (2020).
* Herpich _et al._ [2020] T. Herpich, T. Cossetto, G. Falasco, and M. Esposito, Stochastic thermodynamics of all-to-all interacting many-body systems, New Journal of Physics 22, 063005 (2020).
* Poulton _et al._ [2019] J. M. Poulton, P. R. Ten Wolde, and T. E. Ouldridge, Nonequilibrium correlations in minimal dynamical models of polymer copying, Proceedings of the National Academy of Sciences 116, 1946 (2019).
* Kardeş and Wolpert [2021] G. Kardeş and D. H. Wolpert, Thermodynamic uncertainty relations for multipartite processes, arXiv preprint arXiv:2101.01610 (2021).
| arxiv-papers | 2021-07-26T20:55:41 | 2024-09-04T03:07:20.064096 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Farita Tasnim, David H. Wolpert",
"submitter": "Farita Tasnim",
"url": "https://arxiv.org/abs/2107.12471"
} |
2107.12473 | tiny
# Adversarial Attacks with Time-Scale Representations
Alberto Santamaria-Pang Jianwei Qiu Aritra Chowdhury James Kubricht
Peter Tu Iyer Naresh Nurali Virani
GE Research 1 Research Circle Niskayuna NY 12309
{santamar, jianwei.qiu, Aritra.Chowdhury, james.kubrich, tu, iyerna,
nurali.virani}@ge.com
###### Abstract
We propose a novel framework for real-time black-box universal attacks which
disrupts activations of early convolutional layers in deep learning models.
Our hypothesis is that perturbations produced in the wavelet space disrupt
early convolutional layers more effectively than perturbations performed in
the time domain. The main challenge in adversarial attacks is to preserve low
frequency image content while minimally changing the most meaningful high
frequency content. To address this, we formulate an optimization problem using
time-scale (wavelet) representations as a dual space in three steps. First, we
project original images into orthonormal sub-spaces for low and high scales
via wavelet coefficients. Second, we perturb wavelet coefficients for high
scale projection using a generator network. Third, we generate new adversarial
images by projecting back the original coefficients from the low scale and the
perturbed coefficients from the high scale sub-space. We provide a theoretical
framework that guarantees a dual mapping from time and time-scale domain
representations. We compare our results with state-of-the-art black-box
attacks from generative-based and gradient-based models. We also verify
efficacy against multiple defense methods such as JPEG compression, Guided
Denoiser and Comdefend. Our results show that wavelet-based perturbations
consistently outperform time-based attacks thus providing new insights into
vulnerabilities of deep learning models and could potentially lead to robust
architectures or new defense and attack mechanisms by leveraging time-scale
representations.
## 1 Introduction
While great progress has been made in adversarial attacks [3, 6, 16, 41], the
fundamental reason why convolutional neural networks (CNNs) are fragile to
small perturbations is still unclear [25, 33, 4, 44, 32]. State-of-the-art
models generate perturbations that seem like statistical noise that affect
both high and low image scales (similar to high and low frequency). We believe
that the inability to localize an attack becomes a key limitation of time-
domain attacks as they end up modifying unnecessary or unrelated information
in the image [20, 2]. Thus, instead of generating adversarial attacks in the
time domain (low and high frequencies), we propose to expose a new
vulnerability of deep learning models by generating fine structural-
perturbations in meaningful image content in the high scale Wavelet
decomposition. Studies have shown that early convolution layers capture low-
level edge and edge orientation information possibly similar to receptive
fields of human vision [19, 49]. We aim to induce a perturbation that will
alter the local vertical, horizontal, and diagonal edge content of images,
therefore, creating arbitrary activation spikes in early convolution layers.
We argue that decomposing and isolating localized coherent spatial
arrangements is an effective mechanism for disrupting CNN layer responses. Our
approach relies on the following steps: i) time-scale analysis is used to
provide a mechanism to decompose an image and localize high scale (frequency)
and structural image properties, ii) generative models are used to learn both
high-scale and structural patterns to perturb high scale coefficients, iii)
synthesis of image from perturbed coefficients aims disrupt early convolution
layers. Figure 1 presents a schematic of our proposed method.
Figure 1: Schematic of the proposed Time-Scale adversarial attack.
Since, state-of-the-art deep learning (DL) network designs rely on
convolutional layers that broadly target all high frequency content –
indiscriminate to structural perturbations – making them highly vulnerable to
these attacks [34, 1, 42, 48, 5]. The targeted decomposition of fine image
details accounts for a small fraction of the image energy content [24, 14, 8].
This helps with our objective to minimally perturb the image while inducing
misclassification in classifier that consist of convolution layers. The
significance of our approach is that the concept of scales (wavelet
decomposition levels) and orientations (filter banks) can be associated to one
another to investigate the fundamental principles of image/video analysis and
signal processing for a new type of black-box attack.
## 2 Literature Review
To the best of our knowledge, no work has been reported in attack-based
mechanisms from time-scale representations. All adversarial attack frameworks
reported to date [30, 21, 37, 27, 10, 7, 6, 40, 45, 18, 43], perturb an image
which is represented in the time domain using all of its frequency (Fourier)
content. A detail review can be found in Pitropakis et al. [28]. Black-box
attacks are challenging adversarial attacks as there is no access to training
data nor to the target model. These attacks can be categorized as either
gradient-based or transfer-based methods. Gradient-based methods iteratively
estimate the gradient by perturbing the input image while optimizing an
objective function. Here the major challenge is to account for robust
optimization in a high dimensional input space (see Chen et al. [6] for an
initial report). Ilyas et al. [16] subsequently proposed a natural evolution
attack with a limited number of queries. While their methods showed a
significant improvement in query efficiency and speed, it generated images
with high distortion. Performance was later improved by Cheng et al. [7] who
used a surrogate model as a prior, effectively reducing the number of gradient
averages or queries per iteration.
To alleviate computational cost, transfer-based attacks [29, 35, 36, 12] train
a generator network using white-box attacks from a surrogate or a chosen base
model. Sharif et al. [35] used adversarial generative networks to create
adversarial examples with defined objectives. The method was demonstrated in
applications for face and handwritten-digit recognition. Poursaeed et al. [29]
presented an approach that uses a generative model to design small
perturbations (high frequency) that are distributed in the overall image,
rather than following structural patterns. All of the above methods share the
following limitations: gradient-based methods are prohibitively
computationally expensive when estimating the gradient, while transfer-based
methods suffer from generalization. Our hypothesis is that accounting for
unnecessary and redundant image content in very high multidimensional space
leads to non-tractable optimization problems and poor generalization [9, 42,
46, 26, 39].
Our main contributions are the following: i) providing a novel, tractable,
fast, and black-box (surrogate-based or transfer-based) adversarial attack for
deep neural networks, ii) exploring a new direction to study vulnerability
(and hence robustness) of neural networks via time-scale perturbations that
affects early convolution layers, and iii) experimental study with state-of-
the-art classifiers and other generative or iterative attacks to illustrate
the efficacy and salient features of this attack. Our code is available online
at: https://github.com/waveletgap/wgap.
## 3 Methods
### 3.1 Background
##### Multiresolution Analysis:
We briefly review multiresolution analysis introduced by Mallat and Meyer from
[23]. Let $\varphi$ a function in $L^{2}(\mathbb{R})$ (Hilbert space of
square-integrable complex valued functions on $\mathbb{R}$), such that the
translation $\varphi(\cdot-k),k\in\mathbb{Z}$ defines an orthonormal system.
Then $\varphi$ generates the sequence of spaces $V_{j}:j\in\mathbb{N}$, if
$\varphi_{jk}(x)=2^{j/2}\varphi(2^{j}x-k)$. A multiresolution analysis (MRA)
for $L^{2}(\mathbb{R})$ is a sequence of spaces $\\{V_{j}\\}$ generated by the
orthonormal system $\varphi_{jk}$ in $L^{2}(\mathbb{R})$, if $V_{j}\subset
V_{j+1}$ and $\bigcup V_{j}$ is dense in $L^{2}(\mathbb{R})$. We say that
$\varphi$ is a father wavelet or scaling function if $\varphi$ generates a
MRA. Given $f\in L^{2}(\mathbb{R})$, it can be shown that
$f\in\bigcup_{j=0}^{\infty}V_{j}=V_{0}\oplus\bigoplus_{j=0}^{\infty}W_{j}$,
where $W_{j}$ is the orthogonal complement of $V_{j}$ in $V_{j+1}$. We refer
to $W_{j}$ as $j^{th}$ resolution level of the multiresolution analysis of
level $j$. A mother wavelet is a function $\psi\in W_{0}$ such that
$\psi_{0k}=\psi(\cdot-k)$. Then $\psi$ is an orthonormal basis in $W_{j}$ and
is orthogonal to the father wavelet. Then any $f\in L^{2}(\mathbb{R})$ can be
represented in terms of the father and mother wavelet via the following
series:
$f(x)=\sum_{k}\alpha_{k}\varphi_{0k}(x)+\sum_{j=0}^{\infty}\sum_{k}\beta_{jk}\psi_{jk}(x),$
(1)
where the wavelet coefficients are defined as: $\alpha_{k}=\int
f(x)\overline{\varphi_{0k}(x)}dx,~{}~{}\beta_{jk}=\int
f(x)\overline{\psi_{jk}(x)}dx$. The main advantage of the wavelet
representation in Eq. 1 over Fourier analysis is the ability to capture both
the spatial component and the frequency spectrum. The term
$\sum_{k}\alpha_{k}\varphi_{0k}(x)$ is the spatial component whereas the term
$\sum_{j=0}^{\infty}\sum_{k}\beta_{jk}\psi_{jk}(x)$ localizes the frequency
spectrum. The coefficients $\alpha_{k}$ inherently capture the main signal
content while $\beta_{jk}$ capture the local details. We refer to $\alpha_{k}$
and $\beta_{jk}$ as the approximation and detail coefficients, respectively.
##### 2D Discrete Wavelet Transform (DWT):
The 2D Discrete Wavelet Transform (DWT) is a direct generalization of the 1D
MRA into $L^{2}(\mathbb{Z}^{2})$. Let $\varphi$ be a scaling function and
$\psi$ its corresponding wavelet. We define three wavelets:
$\psi^{1}=\varphi\psi$, $\psi^{2}=\psi\varphi$, and $\psi^{3}=\varphi\varphi$,
where
$\psi_{j,(n_{1},n_{2})}^{k}(t_{1},t_{2})=2^{j/2}\psi^{k}((2^{j}n_{1}-t_{1})/2^{j},(2^{j}n_{2}-t_{2})/2^{j})$
with $k\in\\{1,2,3\\}$. Then the wavelet family
$\\{\psi_{j,n}^{1},\psi_{j,n}^{2},\psi_{j,n}^{3}\\}_{n\in Z^{2}}$ with
$n=(n_{1},n_{2})$ is an orthonormal basis for $W_{j}^{2}$ and
$\\{\psi_{j,n}^{1},\psi_{j,n}^{2},\psi_{j,n}^{3}\\}_{j,n\in Z^{2}}$ is an
orthonormal basis for $L^{2}(\mathbb{Z}^{2})$. The corresponding coefficients
are obtained from the inner products: $a_{j}[n]=\langle
f,\varphi_{j,n}^{2}\rangle,~{}d_{jk}[n]=\langle
f,\psi_{j,n}^{k}\rangle,\;\forall k\in\\{1,2,3\\}$. The approximation
coefficients $a_{j}$ are associated with low frequencies, whereas the detail
coefficients $d_{jk}$ are associated with high frequencies at horizontal,
vertical, and diagonal orientations. The scaling function $\varphi$ and the
mother wavelet $\psi$ can be represented as conjugate mirror filters banks
$h[n]$ and $g[n]$. We denote as $h_{d}[n]=h[-n]$ and $g_{d}[n]=[-g]$ the
mirror filters of $h[n]$ and $g[n]$, respectively. Figure 2 illustrates two-
dimensional DWT for the first decomposition level.
Figure 2: Schematic of the 2D wavelet transform for an RGB image $x$ showing
associated filter banks for analysis and synthesis. The input image is
projected into $P_{V_{0}^{2\times 3}}$ and $P_{W_{0}^{2\times 3}}$.
### 3.2 Wavelet-based Generative Adversarial Perturbation (WGAP) Modeling
We present a generic framework for black-box and transfer attacks by
perturbing the projection $P_{W_{j_{0}}}(x)$ (details) and preserving the
projection $P_{V_{j_{0}}}(x)$ (approximation) for an image $x$. The analysis
is shown for single channel images $L^{2}(\mathbb{Z}^{2})$, but is easily
generalized to three-channel color images. Since it has been observed that
early convolution layers capture low-level edge and edge orientation
information, we aim to induce a perturbation in $P_{W_{j_{0}}}(x)$ such that
it will alter the local vertical, horizontal, and diagonal edge content of
$x$, therefore, creating arbitrary activation spikes in early convolution
layers. This method systematically alters the edges, thereby influencing
shape-content information. This approach is different from denoising since
noise distribution is not explicitly modeled. Rather, object structure from
finer details is directly altered. We also deviate from intervention methods
in the high-frequency Fourier spectrum since Fourier transformations lose
spatial content coherence in contrast with time- and space-scale
representations used in this work.
#### 3.2.1 General Formulation
Suppose, we have a classifier $c(\cdot)$ with a loss function $\ell_{c}(X,y)$
where $X$ and $y$ is the input image and output class label, respectively.
Here $c(X)$ is the predicted label. We assume: i) an adversarial example can
be derived from an additive model as follows $X^{\prime}=X+D$, and ii) for a
fixed class label $y$, the loss $\ell_{c}$ is a continuous function. Then
adversarial attack generation can be posed as an optimization problem:
$\operatorname*{arg\,max}_{X^{\prime}:\lVert
X^{\prime}-X\rVert\leq\epsilon}\ell_{c}\big{(}X^{\prime},c(X)\big{)}.$ (2)
Please note that: i) if $c(\cdot)$ is the attacked model then it is a white-
box attack, ii) if it is a surrogate of the model to be attacked, then it is a
black-box attack, and iii) if it is a chosen base model and the model to be
attacked is unknown, then it is a transfer attack. Based on this formulation,
in this work, we are interested in transfer and black-box attacks with
perturbation in the wavelet domain. To convince that such an attack is sound,
we look at the following result.
Theorem 1: Let $(a_{j},d_{jk})$, $(a_{j},d^{\prime}_{jk})$ be wavelet
coefficients for $X$ and $X^{\prime}$, such that
$X=\text{DWT}^{-1}(a_{j},d_{jk})$ and
$X^{\prime}=\text{DWT}^{-1}(a_{j},d^{\prime}_{jk})$. For some scale $j_{0}$,
we can express problem in Equation 2 in terms of the wavelet coefficients as
follows:
$\operatorname*{arg\,max}_{\text{DWT}^{-1}(a_{j_{0}},d^{\prime}_{j_{0}k}):\lVert
d_{j_{0}k}-d^{\prime}_{j_{0}k}\rVert\leq\tilde{\epsilon}}\ell_{c}\big{(}X^{\prime},c(X)\big{)}.$
(3)
###### Proof.
We need to prove that if $\lVert X^{\prime}-X\rVert<\epsilon$, then there
exists $\tilde{\epsilon}$, such that $\lVert
d_{j_{0}k}-d^{\prime}_{j_{0}k}\rVert<\tilde{\epsilon}$ for any chosen scale
$j_{0}$. Given that $X$ and $X^{\prime}$ have the same approximation
coefficients, from Equation 1, $D=X^{\prime}-X$ is in $W_{j}^{2}$ but not in
$V_{0}$. Then using, linearity, orthonormality and the Pythagorean identity,
we can write $\lVert X-X^{\prime}\rVert$ as:
$\lVert\sum_{j=0}^{\infty}\sum_{k}d_{jk}\psi_{jk}(X)-\sum_{j=0}^{\infty}\sum_{k}d^{\prime}_{jk}\psi_{jk}(X^{\prime})\rVert=$
(4)
$\lVert\sum_{j=0}^{\infty}\sum_{k}(d_{jk}-d^{\prime}_{jk})\psi_{jk}(X-X^{\prime})\rVert<$
(5) $\sum_{j=0}^{\infty}\sum_{k}\lVert
d_{jk}-d^{\prime}_{jk}\rVert\psi_{jk}(X-X^{\prime})\leq$ (6) $\sup_{j,k}\lVert
d_{jk}-d^{\prime}_{jk}\rVert=\lVert
d_{j_{0}k}-d^{\prime}_{j_{0}k}\rVert=\tilde{\epsilon}$ (7)
Finally, the DWT is providing the dual mapping of the signal representation
from the estimated detailed coefficients $d^{\prime}$ within $W_{j}^{2}$
respect to the loss function $\ell_{c}$. ∎
The intuition behind the previous formulation is that the dual space can
create a new adversarial image by just perturbing the details coefficients
corresponding to a scale level (resolution) of the original image. The
significance of this theoretical result is that i) adversarial attacks could
be further targeted to an optimal resolution (scale and frequency) and ii)
makes no assumption on the attack type since results applies to black-box,
white-box and class-targeted attacks. Next, we will demonstrate a formulation
for black-box and generative models.
#### 3.2.2 Wavelet-based Generative Adversarial Perturbations
Poursaeed et al. [29] proposed a Generative Adversarial Perturbation (GAP)
method to minimize cross entropy loss, targeting the least likely class for an
input image and surrogate model $c$. Here, noise (from uniform distribution)
is passed to a generator network to create a perturbation. Then, the output of
the generator is normalized based on a maximum magnitude of perturbation and
added to the original image to generate $X^{\prime}$.
Time Domain Formulation: We formulate a novel universal loss function for
universal black-box attacks: we do not use noise models and only use a
surrogate model $c$. We propose a conditional loss function based on a budget
parameter. This parameter controls the magnitude of the image perturbation.
Comparing to normal cross entropy loss, the key difference is that we optimize
the attack rate (fooling ratio) while keeping the amount of perturbation
within certain budget $\epsilon$. If perturbations exceeds the budget
$\epsilon$, an additional penalty term will be added to the total loss. The
same concept can be applied to gradient-based methods and targeted attacks.
For a given budget $\epsilon$, the time domain representation of the loss
function is:
$\small{\ell_{c}=\begin{cases}\mathcal{H}\big{(}p(X^{\prime}),\mathbb{I}_{p_{ll(X)}}\big{)}+l*\mathcal{D}(X^{\prime},X),&\text{if
}\lVert X-X^{\prime}\rVert>\epsilon\\\
\mathcal{H}\big{(}p(X^{\prime}),\mathbb{I}_{p_{ll(X)}}\big{)}&\text{otherwise}\end{cases}}$
(8)
The first term $\mathcal{H}$ is the cross-entropy operator, where
$\mathbb{I}_{y}$ denotes the one-hot encoding for the class label $y$,
probability $p(X^{\prime})$ is output probability for perturbed sample, and
$p_{ll(X)}=\operatorname*{arg\,min}{p(X)}$ is the least likely class given the
original image $X$ based on model $c$. For the second term, $l$ is a parameter
to regulate the loss, $\mathcal{D}$ the structural dissimilarly:
$\mathcal{D}(X^{\prime},X)=1-{\frac{(2\mu_{X^{\prime}}\mu_{X}+c_{1})(2\sigma_{X^{\prime}X}+c_{2})}{(\mu_{X^{\prime}}^{2}+\mu_{X}^{2}+c_{1})(\sigma_{X^{\prime}}^{2}+\sigma_{X}^{2}+c_{2})}},$
(9)
where $\mu_{X}^{\prime}$, $\sigma_{X}^{\prime}$ represent the mean and
covariance for $X^{\prime}$ (similarly for $X$), $\sigma_{X^{\prime}X}$ is the
covariance of $X^{\prime}$ and $X$. The values for $c_{1}$, $c_{2}$ stabilize
the division with weak denominator.
Dual Formulation: We reformulate the previous time-domain attack. From Theorem
1, given a budget $\epsilon$, there is a scale $j_{0}$ so that
$X=\text{DWT}^{-1}(a_{j_{0}},d_{j_{0}k})$ and
$X^{\prime}=\text{DWT}^{-1}(a_{j_{0}},d^{\prime}_{j_{0}k})$. The, the terms
for Equation 8 from the following terms:
$\mathcal{H}\big{(}p(\text{DWT}^{-1}(a_{j_{0}},d^{\prime}_{j_{0}k}),\mathbb{I}_{p_{ll(\text{DWT}^{-1}(a_{j_{0}},d_{j_{0}k}))}}\big{)},$
(10)
and
$\mathcal{D}(\text{DWT}^{-1}(a_{j_{0}},d^{\prime}_{j_{0}k}),\text{DWT}^{-1}(a_{j_{0}},d_{j_{0}k})),$
(11)
where, $k\in\\{1,2,3\\}$. Similarly for the budget $\epsilon$ is estimated
from $\text{DWT}^{-1}$. We show how we can use the notion of scale to
constraint the magnitude of the perturbation (budget). In our implementation,
we fixed a scale $j_{0}$, and we apply DWT to obtain the approximation and
detail coefficients $a_{j_{0}}$ and $d_{j_{0}k}$. We only pass the detail
coefficients $d_{j_{0}k}$ to the generator and we reconstruct $X^{\prime}$
using inverse DWT from the original approximation coefficients $a_{j_{0}}$ and
the new perturbed coefficients $d^{\prime}_{j_{0}k}$. Note that we are
inherently normalizing the perturbed coefficients relative to the scale
$j_{0}$ and this is possible because that approximation coefficients contain
most of the energy. Figure 3 shows a schematic of the proposed method.
Figure 3: Overview of the proposed adversarial attack.
## 4 Results
We demonstrate model transferability of our Wavelet-based Generative
Adversarial Perturbation (WGAP) method and compare performance with the
generative model GAP [29] and a gradient-based method [7]. The ILSVRC12
(ImageNet-1000) dataset [31] was used for training, and 1000 randomly selected
ImageNet images [7] were used for evaluation. The Generative model for GAP
[29] and WGAP is a ResNet generator with 6 ResNet blocks, except the size of
the input and output channels are different. The surrogate model is
Inception-v3. To implement the discrete wavelet transform (DWT), we used the
Daubechies wavelet filter bank db2 [8] at scale levels: 1, 2, 3 and budgets
$\epsilon_{1}=0.05$, $\epsilon_{2}=0.1$, $\epsilon_{3}=0.25$. The selection of
the Daubechies wavelet is due to stable numerical approximation and compact
representation. For the WGAP models, nine input and output channels were used
due to three concatenated detail coefficients. For the first convolution layer
of the generative model, generative filter kernel size was set to 7 with a
kernel number of 64. For the second and third convolution layers, the kernel
size was 3 with a kernel number of 128. For each of the ResNet block, the
kernel size as set to 3 a kernel number of 256. Batch normalization and ReLu
activation function was used along with each convolution layer. The Adam
optimization function was used with learning rate 0.0002 and beta parameters
0.5 and 0.999. The GAP and WGAP models were trained for 100 epochs with 500
iterations each. For GAP, we used magnitude value of 10. The models were then
evaluated using a conventional NVIDIA V100-32G GPU and implemented in Pytorch.
Pretrained are from the TorchVision library and https://github.com/thu-
ml/Prior-Guided-RGF.
### 4.1 Attack and defense comparison with generative-based models
To evaluate black-box attack transferability (no access to training data, nor
the target model), we implemented adversarial attacks using Inception-v3 as a
surrogate model. Testing models include ResNet-50 [13], VGG-16 [38]. To
evaluate attack and defense, we use three state-of-the-art defense approaches:
JPEG compression [11], Guided Denoiser [22], Randomization [47].
Table 1 shows fooling ratio in normal and defense performance for GAP [29], a
modified GAP formulation with budget constraint (no wavelet integration) and
WGAP. Overall, our model WGAP achieved best performance for scale level 1 and
lowest for scale level 3. Interestingly, GAP showed best performance when
using the testing networks ResNet-50, VGG-16 than the surrogate network
Inception-v3. Best performance was obtained by WGAP, scale 1, across all
budgets. Second-best performance was obtained by WGAP-J2($\epsilon_{k=1,2,3}$)
, and similar performance was obtained with GAP and
WGAP-J3($\epsilon_{k=1,2,3}$) . It is worth noting that, for a fixed budget,
there is a decrease in fooling ratio performance from
WGAP-J1($\epsilon_{k=1,2,3}$) (level 1) to WGAP-J3($\epsilon_{k=1,2,3}$)
(level 3) and GAP($\epsilon_{k=1,2,3}$) (no wavelet). This suggests that
defense approaches may not be tuned to overcome attacks from targeted
frequency perturbations.
Attacks in Normal Models Attacks in Defense Models Method Inception-v3
ResNet-50 VGG-16 JPEG Compression Randomization Guided Denoiser GAP 69.4%
91.8% 90.3% 13.0% 14.1% 1.8 % GAP($\epsilon_{1}$) 84.4% 89.5% 90.8% 10.7%
12.3% 13.4% WGAP-J1($\epsilon_{1}$) 91.1% 97.5% 98.5% 79.2% 73.5% 57.8%
WGAP-J2($\epsilon_{1}$) 81.1% 96.5% 97.3% 69.1% 68.8% 33.9%
WGAP-J3($\epsilon_{1}$) 34.2% 84.4% 88.7% 30.7% 30.3% 13.6%
GAP($\epsilon_{2}$) 92.6% 94.5% 97.1% 15.1% 17.5% 18.3%
WGAP-J1($\epsilon_{2}$) 97.6% 98.9% 99.2% 96.2% 85.5% 86.9%
WGAP-J2($\epsilon_{2}$) 85.4% 97.1% 99.3% 77.9% 76.0% 61.1%
WGAP-J3($\epsilon_{2}$) 55.4% 89.1% 95.7% 51.1% 47.0% 22.8%
GAP($\epsilon_{3}$) 95.1% 98.6% 99.6% 23.3% 25.1% 29.8%
WGAP-J1($\epsilon_{3}$) 99.4% 99.8% 99.7% 99.7% 93.6% 89.7%
WGAP-J2($\epsilon_{3}$) 92.2% 98.0% 99.3% 87.8% 83.6% 68.9%
WGAP-J3($\epsilon_{3}$) 56.3% 92.4% 95.7% 53.0% 44.5% 30.7%
Table 1: Fooling ratio performance comparison for attacks in normal and
defense models. Inception-v3 is the surrogate model and the others are testing
models. GAP is the method [29] with magnitude value of 10, WGAP for scales
J1-J3 and budgets $\epsilon_{1}$=0.05, $\epsilon_{2}$=0.1,
$\epsilon_{3}$=0.25.
### 4.2 Attack and defense comparison for iterative (query-based) models
We further evaluate the transferability of the WGAP model by comparing
performance with the Prior-guided Random Gradient-Free (P-RGF) [7]. We use the
optimal parameter $\lambda^{*}$ and ResNet-152 as surrogate model [7]. The
fooling ratio values for attack in normal models Inception-v3, ResNet-50 and
VGG-16 are 91.1%, 99.6% and 97.7% respectively. Similarly, the number of
iterations for the same models are: 649, 352 and 370. Fooling ratio for
attacks in defense models JPEG Compression, Randomization and Guided Denoiser
are 81.1%, 82.3% and 89.5% respectively. Whereas for number of iterations we
obtained 2120, 1816 and 1784. As for the number of iterations, the optimized
P-RGFD achieved 99.1% in 649 iterations and the average time required to
generate an adversarial attack was 15.15 seconds. While, P-RGFD shows very
high performance in attacks for both normal and defense models, the
computationally complexity could be highly prohibitive to use in real time
scenarios. Experimentally, we estimated an average time to produce an
adversarial example, which was 209.21 seconds per image for P-RGFD. The most
similar performance in a defense network was in the Guided Denoiser2 with a
difference of 1.4%. Here, the P-RGF required 1816 iterations, approximately
four times greater than the average number of iterations in normal models. It
should be noted that the P-RGF requires access to the target model to
iteratively estimate the gradient. While this may be useful in attacks where a
model is available, there is a risk of generalizing and over fitting. Next, we
provide an analysis to compare universal full black-box attacks and defense.
| P-RGFD ($\lambda^{*}$) | GAP | WGAP-J1($\epsilon_{1}$) | WGAP-J2($\epsilon_{1}$) | WGAP-J1($\epsilon_{2}$) | WGAP-J2($\epsilon_{2}$)
---|---|---|---|---|---|---
Comdefend | 24.5% | 28.3% | 65.3% | 77.5% | 62.1% | 69.5%
L2 Norm (%) | 1.4 % | 3.3% | 4.2% | 4.8 % | 5.1% | 5.4 %
Table 2: Performance comparison when the defense Comdefend method for fooling
ratio and L2 Norm percentage.
### 4.3 Transfer attacks and defense comparison
We compare model transferability from all approaches for black-box
attack/defense and image error approximation in terms of the L2 norm. We test
the state-of-the-art defense method Comdefend [17] against the generated
images from the surrogate models: i) Inception-v3 for GAP and WGAP and ii)
ResNet-152 for P-RGF [7]. This will provide an independent test on how general
methods could be. Please note that for the iterative method, P-RGF we do not
make any new query, we just used the generated image. Results are presented in
Table 2. The first row shows the fooling ratio from all models (higher is
better), second row shows the estimated L2 norm (lower is better). We note
that P-RGF and GAP corresponds to the poorest performance when estimating
fooling ratio: 24.5% and 28.3% respectively. However, the L2 norm values 1.4%
and 3.3% for P-RGF and GAP are the lowest. For WGAP-based fooling ratio, the
values for WGAP-J1($\epsilon_{1}$) and WGAP-J2($\epsilon_{1}$) were 65.3% and
77.5% respectively, while for WGAP-J1($\epsilon_{2}$) and
WGAP-J2($\epsilon_{2}$) the fooling ratio values were 62.1% and 69.1%
respectively. We note that while there was a significance increase in
performance from budget $\epsilon_{1}$=0.05 to $\epsilon_{2}$=0.1, there was
not a significant increase in L2 norm. For WGAP, we noticed that the L2 norm
error was close to 5% even the budget was close to 10%. This may because the
network prioritizes perturbations with no major penalty to the budget.
However, there may be significant qualitative visual differences between
budgets. We note that the fooling ratio increases as wavelet coefficients go
from details to approximations. This indicates that details (high) frequency
perturbation patterns may be most meaningful when disrupting early
convolutional layers from the network.
Figure 4 and Figure 5 depict example adversarial and residual images for each
model (we omit other models due to space constraints). Column one in Figure 4,
shows original images with corresponding class label. Column two and three
corresponds to P-RGF [7], and GAP [29] respectively. Columns four and five
corresponds to our proposed method with WGAP-J1($\epsilon_{1}$) and
WGAP-J1($\epsilon_{2}$) with scale 1 and budget $\epsilon_{1}$=0.05,
$\epsilon_{2}$=0.1.
Figures 4(b,c) and Figures 4(g,h) show an example where the defense network
Comdefend, correctly classified the adversarial image. Figures 4(d,e)
incorrectly classified the original image, with class name Thimble and Bucket.
For Figure 4(l), while the defense network incorrectly classified the original
image as oxygen mask, the prediction is semantically similar to the original
category (gasmask). Figures 4(n,o) show the predictions from our method
corresponding to Strainer and Zebra. We notice that the most semantics
difference are in relation to the budget.
(a) Lipstick
(b) Lipstick
(c) Lipstick
(d) Thimble
(e) Bucket
(f) Pizza
(g) Pizza
(h) Pizza
(i) Screw
(j) Rock python
(k) Gasmask
(l) Oxygen mask
(m) Comic book
(n) Strainer
(o) Zebra
Figure 4: Adversarial examples from adversarial attack methods. First column
((a),(f),(k)) corresponds to the original image . Second column ((b),(g),(l))
corresponds to the adversarial example generated by the P-RGF method with
optimal parameter $\lambda^{*}$. Third column ((c),(h),(m)) corresponds to the
GAP method, a parameter value of 10 was set as proposed in the original
method. Fourth ((d),(i),(n)) and fifth ((e),(j),(o)) columns corresponds to
our proposed method WGAP-J1($\epsilon_{1}$) and WGAP-J1($\epsilon_{2}$) , with
budget $\epsilon_{1}=0.05$ and $\epsilon_{1}=0.1$ for L2 norm respectively.
Images in Figures 5(a,f,k) show the original images. Images in Figures
5(b,g,l) show the residual for the P-RGF method. We can observe minimum
perturbation across all images and without sign of a defined pattern across
any image. Figures 5(c,h,m) show the result of the perturbation when GAP
method was applied. A uniform pattern can be observed across the image. This
is due to the outcome of the universal attack. Figures 5(d,i,n) and Figures
5(e,j,o) show the perturbations from our method at scale 1 and budgets 0.05
and 0.1, respectively. In contrast with the other two methods, we can observe
that the perturbation pattern is heterogenous and non-uniformly distributed
across the image. The perturbations is minimum at the background, either
uniform (Figures 5(d,e) or Figures 5(i,j)) or heterogeneous (Figures 5(n,o)).
Also, we note that the perturbations are consistently higher at the edges (as
expected) and seems to increase for larger budget. Similarly, we observe some
‘texture-like’ patterns within the object of interest distributed across the
foreground and backgrounds which seems to adapt according to the complexity of
the image texture. This may indicate adaptive changes in the fine detail
structure within the image according to the budget. For example, in Figure
5(d) there are 6 ‘texture-like’ patterns, whereas in Figure 5(e) seems there
are approximately 28 ‘texture-like’ patterns distributed in the foreground.
Similar ‘texture-like’ patterns are found in the residuals relative to the
other images. While this effect, will require more investigation, our
experimental results may suggest that the frequency spectrum is affected
differently depending on the scale, budget and object of interest.
(a) Lipstick
(b) Lipstick
(c) Lipstick
(d) Thimble
(e) Bucket
(f) Pizza
(g) Pizza
(h) Pizza
(i) Screw
(j) Rock python
(k) Gasmask
(l) Oxygen mask
(m) Comic book
(n) Strainer
(o) Zebra
Figure 5: Residual images from adversarial attack methods. First column
((a),(f),(k)) corresponds to the original image . Second column ((b),(g),(l))
corresponds to the adversarial example generated by the P-RGF method with
optimal parameter $\lambda^{*}$. Third column ((c),(h),(m)) corresponds to the
GAP method. Fourth ((d),(i),(n)) and fifth ((e),(j),(o)) columns corresponds
to our proposed method WGAP-J1($\epsilon_{1}$) and WGAP-J1($\epsilon_{2}$) ,
with budget $\epsilon_{1}=0.05$ and $\epsilon_{1}=0.1$ for L2 norm
respectively.
## 5 Conclusions
We presented a new formulation for black-box attacks via time-scale (wavelets)
analysis. Our approach performs adversarial attacks where there is no access
to model nor dataset on which the target model has been trained. We make no
assumptions about the image type or the target model and we provide extensive
validation comparing our approach with two state-of-the-art adversarial
attacks methods and four state-of-the-art defense algorithms. Our results
suggest that is it is both feasible and effective to localize coherent spatial
arrangements as a mechanism to disrupt CNN layer responses.
Our effort provides the first mathematical framework in terms of image
analysis and signal processing for creating attacks to understand underlying
vulnerability of convolution layers in neural networks. Even though time
domain attacks are capable of effectively disrupting CNNs, it is difficult to
interpret and systematically study the nature of the perturbations themselves.
Moreover, by producing attacks from the perspective of wavelets, we seek to
inspire research in academic community to look at decades of research in
signal processing on wavelet transforms to study neural network properties and
explore new architectures. This will in turn help us build up a general theory
of how and why certain scales, orientations and frequency sub-bands affect
neural networks. This will potentially lead to an understanding of CNN’s
vulnerability, providing the broader community with mathematical conditions to
avoid unfavorable architectural choices.
To the best of our knowledge this is the first time that time-scale analysis
has been used for adversarial attacks. The systematic analysis of the wavelet-
based attacks will further provide a signal processing framework for
understanding fundamental reasons for the brittleness in state-of-the-art DL
models. The current research will be extended to provide the community with
mathematical conditions to improve DL architectures and avoid choices that
beget model fragility.
## References
* [1] Arjun Nitin Bhagoji, Warren He, Bo Li, and Dawn Song. Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms. In Vittorio Ferrari, Martial Hebert, Cristian Sminchisescu, and Yair Weiss, editors, Computer Vision – ECCV 2018, volume 11216, pages 158–174. Springer International Publishing, Cham, 2018. Series Title: Lecture Notes in Computer Science.
* [2] Ali Borji. Pros and cons of GAN evaluation measures. Computer Vision and Image Understanding, 179:41–65, Feb. 2019.
* [3] Thomas Brunner, Frederik Diehl, Michael Truong Le, and Alois Knoll. Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial Attacks. pages 4958–4966, 2019.
* [4] Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, and Alexey Kurakin. On Evaluating Adversarial Robustness. arXiv:1902.06705 [cs, stat], Feb. 2019. arXiv: 1902.06705.
* [5] Nicholas Carlini and David Wagner. Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods. In Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, AISec ’17, pages 3–14, Dallas, Texas, USA, Nov. 2017. Association for Computing Machinery.
* [6] Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, and Cho-Jui Hsieh. ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models. Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security - AISec ’17, pages 15–26, 2017. arXiv: 1708.03999.
* [7] Shuyu Cheng, Yinpeng Dong, Tianyu Pang, Hang Su, and Jun Zhu. Improving Black-box Adversarial Attacks with a Transfer-based Prior. arXiv:1906.06919 [cs, stat], Oct. 2019. arXiv: 1906.06919.
* [8] I. Daubechies. The wavelet transform, time-frequency localization and signal analysis. IEEE Transactions on Information Theory, 36(5):961–1005, Sept. 1990\. Conference Name: IEEE Transactions on Information Theory.
* [9] Kathrin Grosse, Praveen Manoharan, Nicolas Papernot, Michael Backes, and Patrick McDaniel. On the (Statistical) Detection of Adversarial Examples. arXiv:1702.06280 [cs, stat], Oct. 2017. arXiv: 1702.06280.
* [10] Chuan Guo, Jared S. Frank, and Kilian Q. Weinberger. Low Frequency Adversarial Perturbation. arXiv:1809.08758 [cs], July 2019. arXiv: 1809.08758.
* [11] Chuan Guo, Mayank Rana, Moustapha Cisse, and Laurens van der Maaten. Countering Adversarial Images using Input Transformations. arXiv:1711.00117 [cs], Jan. 2018. arXiv: 1711.00117.
* [12] Jamie Hayes and George Danezis. Learning Universal Adversarial Perturbations with Generative Models. arXiv:1708.05207 [cs, stat], Jan. 2018. arXiv: 1708.05207.
* [13] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep Residual Learning for Image Recognition. pages 770–778, 2016.
* [14] Christopher Heil and Gitta Kutyniok. The Homogeneous Approximation Property for wavelet frames. Journal of Approximation Theory, 147(1):28–46, July 2007.
* [15] Gao Huang, Zhuang Liu, Laurens van der Maaten, and Kilian Q. Weinberger. Densely Connected Convolutional Networks. arXiv:1608.06993 [cs], Jan. 2018. arXiv: 1608.06993.
* [16] Andrew Ilyas, Logan Engstrom, and Aleksander Madry. Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors. arXiv:1807.07978 [cs, stat], Mar. 2019. arXiv: 1807.07978.
* [17] Xiaojun Jia, Xingxing Wei, Xiaochun Cao, and Hassan Foroosh. ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples. pages 6084–6092, 2019.
* [18] Ameya Joshi, Amitangshu Mukherjee, Soumik Sarkar, and Chinmay Hegde. Semantic adversarial attacks: Parametric transformations that fool deep classifiers. In Proceedings - 2019 International Conference on Computer Vision, ICCV 2019, pages 4772–4782. Institute of Electrical and Electronics Engineers Inc., Oct. 2019.
* [19] Saeed Reza Kheradpisheh, Masoud Ghodrati, Mohammad Ganjtabesh, and Timothée Masquelier. Deep Networks Can Resemble Human Feed-forward Vision in Invariant Object Recognition. Scientific Reports, 6, Sept. 2016.
* [20] Xin Li and Fuxin Li. Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics. In 2017 IEEE International Conference on Computer Vision (ICCV), pages 5775–5783, Oct. 2017. ISSN: 2380-7504.
* [21] Yingwei Li, Song Bai, Cihang Xie, Zhenyu Liao, Xiaohui Shen, and Alan L. Yuille. Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses. arXiv:1904.00979 [cs], Apr. 2019. arXiv: 1904.00979.
* [22] Fangzhou Liao, Ming Liang, Yinpeng Dong, Tianyu Pang, Xiaolin Hu, and Jun Zhu. Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser. pages 1778–1787, 2018.
* [23] Stephane Mallat. A Wavelet Tour of Signal Processing : Stephane Mallat : 9780123743701\.
* [24] Stéphane Mallat. Understanding Deep Convolutional Networks. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 374(2065):20150203, Apr. 2016. arXiv: 1601.04920.
* [25] Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Omar Fawzi, and Pascal Frossard. Universal adversarial perturbations. arXiv:1610.08401 [cs, stat], Mar. 2017. arXiv: 1610.08401.
* [26] Konda Reddy Mopuri, Aditya Ganeshan, and R. Venkatesh Babu. Generalizable Data-Free Objective for Crafting Universal Adversarial Perturbations. IEEE Transactions on Pattern Analysis and Machine Intelligence, 41(10):2452–2465, Oct. 2019. Conference Name: IEEE Transactions on Pattern Analysis and Machine Intelligence.
* [27] Konda Reddy Mopuri, Utsav Garg, and R. Venkatesh Babu. Fast Feature Fool: A data independent approach to universal adversarial perturbations. arXiv:1707.05572 [cs], July 2017. arXiv: 1707.05572.
* [28] Nikolaos Pitropakis, Emmanouil Panaousis, Thanassis Giannetsos, Eleftherios Anastasiadis, and George Loukas. A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199, Nov. 2019.
* [29] Omid Poursaeed, Isay Katsman, Bicheng Gao, and Serge Belongie. Generative Adversarial Perturbations. arXiv:1712.02328 [cs, stat], July 2018. arXiv: 1712.02328.
* [30] Aaditya Prakash, Nick Moran, Solomon Garber, Antonella DiLillo, and James Storer. Deflecting Adversarial Attacks With Pixel Deflection. pages 8571–8580, 2018.
* [31] Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, Alexander C. Berg, and Li Fei-Fei. ImageNet Large Scale Visual Recognition Challenge. arXiv:1409.0575 [cs], Jan. 2015. arXiv: 1409.0575.
* [32] Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. arXiv:1806.01246 [cs], Dec. 2018. arXiv: 1806.01246.
* [33] Pouya Samangouei, Maya Kabkab, and Rama Chellappa. Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models. arXiv:1805.06605 [cs, stat], May 2018. arXiv: 1805.06605.
* [34] Sayantan Sarkar, Ankan Bansal, Upal Mahbub, and Rama Chellappa. UPSET and ANGRI : Breaking High Performance Image Classifiers. arXiv:1707.01159 [cs], July 2017. arXiv: 1707.01159.
* [35] Ali Shafahi, Mahyar Najibi, Mohammad Amin Ghiasi, Zheng Xu, John Dickerson, Christoph Studer, Larry S Davis, Gavin Taylor, and Tom Goldstein. Adversarial training for free! In H. Wallach, H. Larochelle, A. Beygelzimer, F. d\textquotesingle Alché-Buc, E. Fox, and R. Garnett, editors, Advances in Neural Information Processing Systems 32, pages 3358–3369. Curran Associates, Inc., 2019.
* [36] Ali Shafahi, Mahyar Najibi, Zheng Xu, John Dickerson, Larry S. Davis, and Tom Goldstein. Universal Adversarial Training. arXiv:1811.11304 [cs], Nov. 2019. arXiv: 1811.11304.
* [37] Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K. Reiter. A General Framework for Adversarial Examples with Objectives. ACM Transactions on Privacy and Security, 22(3):1–30, July 2019\.
* [38] Karen Simonyan and Andrew Zisserman. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv:1409.1556 [cs], Apr. 2015. arXiv: 1409.1556.
* [39] David Stutz, Matthias Hein, and Bernt Schiele. Disentangling Adversarial Robustness and Generalization. pages 6976–6987, 2019.
* [40] Jiawei Su, Danilo Vasconcellos Vargas, and Kouichi Sakurai. One Pixel Attack for Fooling Deep Neural Networks. IEEE Transactions on Evolutionary Computation, 23(5):828–841, Oct. 2019. Conference Name: IEEE Transactions on Evolutionary Computation.
* [41] Dimitris Tsipras, Shibani Santurkar, Logan Engstrom, Alexander Turner, and Aleksander Madry. Robustness May Be at Odds with Accuracy. arXiv:1805.12152 [cs, stat], Sept. 2019. arXiv: 1805.12152 version: 2.
* [42] Danilo Vasconcellos Vargas and Shashank Kotyan. Robustness Assessment for Adversarial Machine Learning: Problems, Solutions and a Survey of Current Neural Networks and Defenses. arXiv:1906.06026 [cs, stat], Nov. 2019. arXiv: 1906.06026.
* [43] B. S. Vivek, Konda Reddy Mopuri, and R. Venkatesh Babu. Gray-Box Adversarial Training. In Vittorio Ferrari, Martial Hebert, Cristian Sminchisescu, and Yair Weiss, editors, Computer Vision – ECCV 2018, volume 11219, pages 213–228. Springer International Publishing, Cham, 2018. Series Title: Lecture Notes in Computer Science.
* [44] Eric Wong and J Zico Kolter. Provable Defenses against Adversarial Examples via the Convex Outer Adversarial Polytope. page 10.
* [45] Chaowei Xiao, Ruizhi Deng, Bo Li, Taesung Lee, Benjamin Edwards, Jinfeng Yi, Dawn Song, Mingyan Liu, and Ian Molloy. AdvIT: Adversarial frames identifier based on temporal consistency in videos. In Proceedings - 2019 International Conference on Computer Vision, ICCV 2019, pages 3967–3976. Institute of Electrical and Electronics Engineers Inc., Oct. 2019.
* [46] Chaowei Xiao, Ruizhi Deng, Bo Li, Fisher Yu, Mingyan Liu, and Dawn Song. Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation. In Vittorio Ferrari, Martial Hebert, Cristian Sminchisescu, and Yair Weiss, editors, Computer Vision – ECCV 2018, volume 11214, pages 220–237. Springer International Publishing, Cham, 2018. Series Title: Lecture Notes in Computer Science.
* [47] Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, and Alan Yuille. Mitigating Adversarial Effects Through Randomization. arXiv:1711.01991 [cs], Feb. 2018. arXiv: 1711.01991.
* [48] Cihang Xie, Jianyu Wang, Zhishuai Zhang, Yuyin Zhou, Lingxi Xie, and Alan Yuille. Adversarial Examples for Semantic Segmentation and Object Detection. In 2017 IEEE International Conference on Computer Vision (ICCV), pages 1378–1387, Oct. 2017. ISSN: 2380-7504.
* [49] Matthew D. Zeiler and Rob Fergus. Visualizing and Understanding Convolutional Networks. In David Fleet, Tomas Pajdla, Bernt Schiele, and Tinne Tuytelaars, editors, Computer Vision – ECCV 2014, Lecture Notes in Computer Science, pages 818–833, Cham, 2014. Springer International Publishing.
| arxiv-papers | 2021-07-26T20:58:57 | 2024-09-04T03:07:20.077331 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Alberto Santamaria-Pang, Jianwei Qiu, Aritra Chowdhury, James\n Kubricht, Peter Tu, Iyer Naresh, Nurali Virani",
"submitter": "Aritra Chowdhury",
"url": "https://arxiv.org/abs/2107.12473"
} |
2107.12474 | ††thanks: This work was partially supported by the Prime Minister’s Research
Fellowship of the Government of India.
# A novel DC Microgrid stabilization method based on the logarithmic norm
Aditya Arpitha Prasad Computational & Data Sciences
Indian Institute of Science
Bengaluru 560012, India
[email protected]
###### Abstract
Microgrids could be the answer to integrating distributed energy resources
into our powergrid. It promises improved resilience, reliability, efficiency
and decarbonising of our electric grid. This paper models a low voltage direct
current microgrid using a DAE formulation on a complex network. We then offer
a novel method to compute a stability metric using the logarithmic norm which
can be used to isolate disturbed nodes.
###### Index Terms:
microgrids, logarithmic norm, stability
## I Introduction
There are well documented reasons motivating a shift towards a decentralized
grid incorporating more renewable energy sources - security [1], economic [2],
ecological [3], social [4]. A decentralized grid is more resistant to natural
disasters, cyber attacks and safeguard our ability to secure uninterrupted
quality power to critical infrastructures like hospitals, power plants,
network towers. Due to the ability of individual microgrids to island itself,
the grid will be resistant to cascading blackouts, improving resilience and
reliability.
On the ecological side, the energy supply sector is the largest contributor to
global greenhouse gas emissions and decarbonizing electricity generation is a
cost-effective way of rapidly achieving our carbon targets. As energy
generation comes closer to the point of consumption, we can bring down line
losses. Consumers will turn into prosumers with bidirectional power flow on
the grid. We can also adopt efficient practices of buffering energy for peak
demand instead of the costly inefficient ramp up that now occurs. For a
country like India, where many communities live in remote and inaccessible
locations microgrids can help bridging last mile connectivity [5].
India has set a target of 175 GW installed capacity by 2022 of which 100 GW is
solar [6]. These are ambitious goals and microgrids are a natural way to
incorporate these distributed energy resources (DER) in a decentralized way.
But there are challenges to overcome when integrating DERs into the main grid.
Due to cloud cover and wind speed variability the grid has to handle both
supply and demand side uncertainties [7]. As renewable penetration increases
we see a reduction in inertia. There is also a need for research into new
distributed control techniques to ensure robust control of the microgrid.
There are two main types of microgrids - AC and DC. Due to the prevalence of
DC loads, DC sources and reduced losses when compared to AC-DC power
electronics, DC microgrid is what we used in the model. DC microgrids are
characterized by components such as controlled and uncontrolled loads,
distributed generation (DG) units and storage devices operate together in a
coordinated manner with controlled power electronic devices under a DC power
system principle [8]. Even in case of sources like wind energy, the AC power
that is produced is variable and needs to be rectified to DC then inverted to
be used in AC grids. EPRI found that if we switched to small DC grids we could
reduce losses by 10-30% [9]
At present research on stability of microgrids in islanded mode and grid
connected mode are treated separately, here we are dealing with islanded mode
since the utility grid has sufficient inertia to handle any disturbances in
very short time scales [10]. Further there are two types of small signal
stability or transient stability. Most of this analysis is done on extremely
small number of DGs under consideration, here we will use the logarithmic norm
to consider the local stability at the equilibrium point.
Recent work usually deals with a linearized the system and exploits Lypunov
function to prove local stability [11]. Due to practical limitations in
communication links, instead of a centralized control scheme like master-slave
control, decentralized control schemes were explored. In most studies droop
control is what is used as feedback control. [12]
The traditional method to assess stability is eigenvalue analysis[13][14][15].
This is without accounting for the fact that numerical errors and limitations
in measurement can mean pseudospectrum of the matrix is often more relevant to
the study [16]. The logarithmic norm gives us an estimate for psudeospectra
[17] and stiffness [18].
## II Microgrid Model
In this section we present the models used for the power lines, distributed
sources, constant power load and complex network data structure used to
represent a DC microgrid.
### II-A Topology
We can describe the network as a weighted, undirected graph
($\mathcal{N},\mathcal{E}$), where we have $n=|\mathcal{N}|$ nodes and
$m=|\mathcal{E}|$ edges. The topology of this graph is defined by an incidence
matrix $L_{m\times n}$, whenever a new node i is connected to the DC microgrid
at bus/node j a new row is appended to this matrix where $L(m,i)=1$ and
$L(m,j)=-1$. This lets us use $L\in\mathbb{R}^{m\times n}$ to set up the KCL
and KVL constraints easily by accounting for current direction as shown below
in equations (1) and (2). Here let
$\vec{v}_{g}(t)=[v_{g1},v_{g2},v_{g3},\cdots,v_{gn}]$ be the bus voltages.
Similarly $\vec{v}_{p}(t)=[v_{p1},v_{p2},v_{p3},\cdots,v_{pm}]$ are the power
line voltages found as the difference between node voltages.
$\vec{v}_{p}(t)_{m\times 1}=L_{m\times n}\vec{v}_{g}(t)_{n\times 1}$ (1)
For the current law we can define
$\vec{i}_{g}(t)=[i_{g1},i_{g2},i_{g3},\cdots,i_{gn}]$ be the current leaving
each node. Similarly $\vec{i}_{p}(t)=[i_{p1},i_{p2},i_{p3},\cdots,i_{pm}]$ are
the power line currents found flowing
$\vec{i}_{g}(t)_{n\times 1}=L^{T}_{n\times m}\vec{i}_{p}(t)_{n\times 1}$ (2)
### II-B Power line model
Since this a DC microgrid with short line lengths, we can go for a nominal pi
model of a transmission line, where we have a lumped resistance and inductance
in series. This is a common model in the literature [19]. This gives us the
differential equation,
$\vec{v}_{p}(t)=I_{n\times n}\frac{d\vec{i}_{p}(t)}{dt}+R_{n\times
n}\vec{i}_{p}(t)$ (3)
Here the matrix $I$ is a diagonal matrix of the line inductances and $R$ is
the diagonal matrix of the line resistances.
Figure 1: Part of a DC micro grid with voltages and currents labelled
### II-C PV Solar Home
Solar photovoltaic (PV) systems can be set up in each home letting it either
pull power or supply power to the microgrid. The DC microgrid will be able to
grow via preferential attachment organically. When a node is acting as a net
producer we can assume a controlled current source and capacitance in parallel
to model the DC link capacitance as shown in Fig 1. This is because modern
power electronics can supply that constant current after a DC-DC step up from
an unregulated dc voltage. [20]
We can define the current entering each node’s capacitance as
$\vec{i}_{c}(t)=[i_{c1},i_{c2},i_{c3},\cdots,i_{cn}]$. $C$ is a diagonal
matrix with all the link capacitance values.
$\vec{i}_{g}(t)=\vec{f}(t)-\vec{i}_{c}(t)$ (4)
$\vec{i}_{c}(t)=C_{n\times n}\frac{d\vec{v}_{g}(t)}{dt}$ (5)
### II-D DAE formulation
From these equations we can formulate the inherent ODE of the DC microgrid,
from plugging equations (1) into (3),
$\frac{d\vec{i}_{p}(t)}{dt}=I^{-1}(L\vec{v}_{g}(t)-R\vec{i}_{p}(t))$ (6)
Now by plugging (4) and (2) in (5)
$\frac{d\vec{v}_{g}(t)}{dt}=C^{-1}(-L^{T}\vec{i}_{p}(t)+f(t))$ (7)
Now by defining the state vector as $x=[i_{p}(t),v_{g}(t)]$,
$\dot{x}=\begin{bmatrix}-I^{-1}R&&I^{-1}L\\\
-C^{-1}L^{T}&&O\end{bmatrix}x+\begin{bmatrix}0\\\ C^{-1}\end{bmatrix}f(t)$ (8)
## III Stability Analysis
### III-A Proportional Droop Control
For my analysis I will be using proportional droop control where the control
law is based on the local measured $v_{g}$ value as compared to a set
reference value - $V_{s}$. The matrix $K$ For these producer nodes the current
source will be controlled to be. We can model the consuming nodes as a
constant power load - $P_{s}$ since we can assume the power electronics
tightly regulates the output [21].
Here the model of $f$ will change depending on which nodes are producing
excess power and supplying to the grid and which are drawing current as a
load. I use a permutation matrix $P$ to order the $p$ power producing nodes in
the front and $n-p$ nodes will be in the end of the vector.
$f_{p}(t)=\hat{K}_{p\times p}(\hat{v}_{g}(t)-V_{s}(t))$ (9)
$f_{c}(t)=\frac{P_{s}}{V_{s}}$ (10)
Where the hat is used to represent the transformed variables via permutation.
$\hat{v}_{g}=P\vec{v}_{g}$ $\hat{i}_{g}=P\vec{i}_{g}$
$\hat{i}_{c}=P\vec{i}_{c}$ $\hat{L}=PL$ $\hat{R}=PR$ $\hat{I}=PI$ $\hat{C}=PC$
We can write the complete $f$ as,
$f(t)=\begin{bmatrix}K_{p\times p}&&0\\\
0&&0\end{bmatrix}\hat{v}_{g}-\begin{bmatrix}K_{p\times p}&&0\\\
0&&0\end{bmatrix}\begin{bmatrix}V_{s}\\\ -\frac{P_{s}}{V_{s}}\end{bmatrix}$
(11)
So the sake of conciseness we can define the constant matrix $K^{\prime}$ and
vector $c$ using equation (8),
$f(t)=K^{\prime}\hat{v}_{g}-K^{\prime}c$ (12)
So using equations (9) and (10) in (7),
$\frac{d\hat{v}_{g}(t)}{dt}=\hat{C}^{-1}\left(-\hat{L}^{T}i_{p}(t)+K^{\prime}\hat{v}_{g}-K^{\prime}c\right)$
(13)
Now by redefining the state vector as $z=[\vec{i}_{p}(t),\hat{v}_{g}(t)]$, we
can use this to formulate the closed loop system,
$\dot{z}=\begin{bmatrix}-\hat{I}^{-1}\hat{R}&&\hat{I}^{-1}L\\\
-\hat{C}^{-1}\hat{L}^{T}&&\hat{C}^{-1}K^{\prime}\end{bmatrix}z+\begin{bmatrix}0\\\
-C^{-1}K^{\prime}c\end{bmatrix}$ (14)
For sake of consciseness again we define $B$ and $k$ using equation (14)
$\dot{z}=Bz+k$ (15)
This requires computation of inverse of a matrix where the numerical stability
is not assured. But given a permutation matrix we can find the matrix $B$.
### III-B Logarithmic norm
We propose it can be useful to use the logarithmic norm introduced by
Dahlquist [22] to measure the stability of the microgrid for any given
permutation matrix $P$,
$\mu[B]=\lim_{h\to 0^{+}}\frac{||I+hB||-1}{h}$ (16)
Where the matrix norm used is the matrix norm induced by the vector 2 - norm.
$||B||=\sup_{x\neq 0}\frac{||Bx||_{2}}{||x||_{2}}$ (17)
One important reason to prefer the logarithmic norm is because it captures the
information regarding the pseudospectrum of $A$. Due to humidity, temperature,
numerical errors, measurement errors we cannot be certain regarding the local
stability of equilibrium of $B$ matrix in equation (15) from just the
eigenvalues. The = $\epsilon$-pseudospectral abscissa and logarithmic norm,
also called numerical abscissa are intimately connected. The logarithmic norm
is maximum real part of the numerical range.[17] This is of a serious concern
when it comes to nonnormal system matrices where even a small amount of noise
can destabilize when eigenvalues are negative. [23]
$\mu[B]=\sup_{\epsilon>0}[\alpha_{\epsilon}(B)-\epsilon]$ (18)
There are other useful properties like $\mu[B]$ is the maximal growth rate of
$\log||z||$ where $\dot{z}=Bz$.
$D_{t}^{+}\log||x||\leq\mu[B]$ (19)
Here $D_{t}^{+}$ is the upper right Dini derivative.
So from equation (15) we can write the exponential stability condition
$\mu[B]<0$ [24].
Here the computation of the logarithmic norm can be reduced to an eigenvalue
problem, [25]
$\mu[B]=\lambda_{max}\\{\frac{B+B^{*}}{2}\\}$ (20)
Simple eigenvalue computations alone cannot reveal the potential for transient
growth. The spectral abscissa gives us a lower bound for the solutions, while
the logarithmic norm gives us the upper bound. [26]
$e^{t\alpha}\leq||e^{tB}||\leq e^{t\mu[B]}$ (21)
Where $\alpha$ is the spectral abscissa,
$\alpha=\max_{1\leq i\leq n}\Re\\{\lambda_{i}(B)\\}$
### III-C Stabilization method
Step 1: Monitor the deviation from voltage set point and if positive threshold
$t$ is crossed, move the node to producer list and if negative threshold is
crossed, move node to consumer list.
Step 2: Computer logarithmic norm for current B and store in a temporary
variable.
Step 3: Recompute the matrix P with new producer and consumer list and
recalculate the system matrix B.
Step 4: Calculate logarithmic norm for B and compare to old value.
Step 5: If value is more negative, turn switches to implement the move.
With this method the consumers and producers of the microgrid can be decided
and stability can be iteratively improved.
## Conclusion
This paper has developed a complete model of a general scalable DC microgrid
model and discussed a method to control switching between nodes. To the best
of the author’s knowledge this is the first time logarithmic norm has been
applied to stability studies of DC microgrids. This paper proposed a novel
technique to increase the stability of the microgrid. DC microgrids offers a
lot of benefits and in future studies this model needs to be improved on to
incorporate other DERs like wind farms, energy storage devices, fuel cells.
## References
* [1] Adam Hirsch, Yael Parag and Josep Guerrero “Microgrids: A review of technologies, key drivers, and outstanding issues” In _Renewable and Sustainable Energy Reviews_ 90, 2018, pp. 402–411 DOI: 10.1016/j.rser.2018.03.040
* [2] Furkan Ahmad and Mohammad Saad Alam “Economic and ecological aspects for microgrids deployment in India” In _Sustainable Cities and Society_ 37, 2018, pp. 407–419 DOI: 10.1016/j.scs.2017.11.027
* [3] R.K. Pachauri and L.A. (eds.) “IPCC, 2014: Climate Change 2014: Synthesis Report” In _Contribution of Working Groups I, II and III to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change_ 1454, 2014, pp. 99
* [4] Ashok Jhunjhunwala and Prabhjot Kaur “Solar Energy, dc Distribution, and Microgrids: Ensuring Quality Power in Rural India” In _IEEE Electrification Magazine_ 6.4, 2018, pp. 32–39 DOI: 10.1109/MELE.2018.2871277
* [5] Anthony P. Heynen et al. “Off-grid opportunities and threats in the wake of India’s electrification push” In _Energy, Sustainability and Society_ 9.1, 2019, pp. 16 DOI: 10.1186/s13705-019-0198-z
* [6] D. Palchak et al. “GREENING THE GRID: Pathways to Integrate 175 Gigawatts of Renewable Energy into India’s Electric Grid, Vol. I—National Study EXECUTIVE SUMMARY”, 2017 URL: https://escholarship.org/uc/item/7hw5t7bb
* [7] David Steen et al. “Challenges of integrating solar and wind into the electricity grid” In _Systems Perspectives on Renewable Power 2014_ , 2014, pp. 94–107 URL: https://research.chalmers.se/en/publication/210515
* [8] Jackson John Justo, Francis Mwasilu, Ju Lee and Jin-Woo Jung “AC-microgrids versus DC-microgrids with distributed energy resources: A review” In _Renewable and Sustainable Energy Reviews_ 24, 2013, pp. 387–405 DOI: 10.1016/j.rser.2013.03.067
* [9] Brian T. Patterson “DC, Come Home: DC Microgrids and the Birth of the “Enernet”” In _IEEE Power and Energy Magazine_ 10.6, 2012, pp. 60–69 DOI: 10.1109/MPE.2012.2212610
* [10] Zhikang Shuai et al. “Microgrid stability: Classification and a review” In _Renewable and Sustainable Energy Reviews_ 58, 2016, pp. 167–179 DOI: 10.1016/j.rser.2015.12.201
* [11] Julia A. Belk, Wardah Inam, David J. Perreault and Konstantin Turitsyn “Stability and control of ad hoc dc microgrids” In _2016 IEEE 55th Conference on Decision and Control (CDC)_ , 2016, pp. 3271–3278 DOI: 10.1109/CDC.2016.7798761
* [12] Oben Dag and Behrooz Mirafzal “On stability of islanded low-inertia microgrids” In _2016 Clemson University Power Systems Conference (PSC)_ , 2016, pp. 1–7 DOI: 10.1109/PSC.2016.7462854
* [13] Ajit A. Renjit, Mahesh S. Illindala and Rama K. Yedavalli “Stability robustness analysis and its improvement for an industrial microgrid” In _2014 IEEE Industry Application Society Annual Meeting_ , 2014, pp. 1–8 DOI: 10.1109/IAS.2014.6978499
* [14] Mei Su et al. “Stability Analysis and Stabilization Methods of DC Microgrid With Multiple Parallel-Connected DC–DC Converters Loaded by CPLs” In _IEEE Transactions on Smart Grid_ 9.1, 2018, pp. 132–142 DOI: 10.1109/TSG.2016.2546551
* [15] Behnam Tamimi, Claudio Cañizares and Kankar Bhattacharya “System Stability Impact of Large-Scale and Distributed Solar Photovoltaic Generation: The Case of Ontario, Canada” In _IEEE Transactions on Sustainable Energy_ 4.3, 2013, pp. 680–688 DOI: 10.1109/TSTE.2012.2235151
* [16] Jianzhe Liu, Wei Zhang and Giorgio Rizzoni “Robust stability analysis of DC microgrids with constant power loads” arXiv: 1702.07580 In _arXiv:1702.07580 [math]_ , 2017 URL: http://arxiv.org/abs/1702.07580
* [17] Lloyd N. Trefethen and Mark Embree “Spectra and Pseudospectra: The Behavior of Nonnormal Matrices and Operators” Princeton University Press, 2005, pp. 170–172 DOI: 10.2307/j.ctvzxx9kj
* [18] Desmond J. Higham and Lloyd N. Trefethen “Stiffness of ODEs” In _BIT Numerical Mathematics_ 33.2, 1993, pp. 285–303 DOI: 10.1007/BF01989751
* [19] Sandeep Anand and B.. Fernandes “Reduced-Order Model and Stability Analysis of Low-Voltage DC Microgrid” In _IEEE Transactions on Industrial Electronics_ 60.11, 2013, pp. 5040–5049 DOI: 10.1109/TIE.2012.2227902
* [20] Shamsher Ansari, Aseem Chandel and Mohd Tariq “A Comprehensive Review on Power Converters Control and Control Strategies of AC/DC Microgrid” In _IEEE Access_ 9, 2021, pp. 17998–18015 DOI: 10.1109/ACCESS.2020.3020035
* [21] Fanghua Zhang and Yangguang Yan “Start-Up Process and Step Response of a DC–DC Converter Loaded by Constant Power Loads” In _IEEE Transactions on Industrial Electronics_ 58.1, 2011, pp. 298–304 DOI: 10.1109/TIE.2010.2045316
* [22] J.. Schmidt “G. Dahlquist, Stability and Error Bounds in the Numerical Integration of Ordinary Differential Equations. 85 S. Stockholm 1959. K. Tekniska Högskolans Handlingar” In _ZAMM - Journal of Applied Mathematics and Mechanics / Zeitschrift für Angewandte Mathematik und Mechanik_ 41.6, 1961, pp. 267–268 DOI: 10.1002/zamm.19610410611
* [23] D.. Higham and X. Mao “Nonnormality and stochastic differential equations” In _BIT Numerical Mathematics_ 46.3, 2006, pp. 525–532 DOI: 10.1007/s10543-006-0067-y
* [24] Gustaf Söderlind “The logarithmic norm. History and modern theory” In _BIT Numerical Mathematics_ 46.3, 2006, pp. 631–652 DOI: 10.1007/s10543-006-0069-9
* [25] Emre Mengi and Michael L. Overton “Algorithms for the computation of the pseudospectral radius and the numerical radius of a matrix” In _IMA Journal of Numerical Analysis_ 25.4, 2005, pp. 648–669 DOI: 10.1093/imanum/dri012
* [26] A.. Perov and I.. Kostrub “On the spectral abscissa and the logarithmic norm” In _Mathematical Notes_ 101.3–4, 2017, pp. 677–687 DOI: 10.1134/S0001434617030257
| arxiv-papers | 2021-07-26T20:59:43 | 2024-09-04T03:07:20.089760 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Aditya A Prasad",
"submitter": "Aditya Arpitha Prasad",
"url": "https://arxiv.org/abs/2107.12474"
} |
2107.12492 | # SpectGRASP: Robotic Grasping by Spectral Correlation
Maxime Adjigble†, Cristiana de Farias, Rustam Stolkin, Naresh Marturi All
authors are with the Extreme Robotics Laboratory, School of Metallurgy and
Materials, University of Birmingham, Edgbaston, B15 2TT, UK. †Corresponding
author email: [email protected] work was supported by the UK
National Centre for Nuclear Robotics, part-funded by EPSRC EP/R02572X/1 and in
part supported by CHIST-ERA under Project EP/S032428/1 PeGRoGAM.
###### Abstract
This paper presents a spectral correlation-based method (SpectGRASP) for
robotic grasping of arbitrarily shaped, unknown objects. Given a point cloud
of an object, SpectGRASP extracts contact points on the object’s surface
matching the hand configuration. It neither requires offline training nor
a-priori object models. We propose a novel Binary Extended Gaussian Image
(BEGI), which represents the point cloud surface normals of both object and
robot fingers as signals on a 2-sphere. Spherical harmonics are then used to
estimate the correlation between fingers and object BEGIs. The resulting
spectral correlation density function provides a similarity measure of gripper
and object surface normals. This is highly efficient in that it is
simultaneously evaluated at all possible finger rotations in
$\bm{\mathrm{SO(3)}}$. A set of contact points are then extracted for each
finger using rotations with high correlation values. We then use our previous
work, Local Contact Moment (LoCoMo) similarity metric, to sequentially rank
the generated grasps such that the one with maximum likelihood is executed. We
evaluate the performance of SpectGRASP by conducting experiments with a 7-axis
robot fitted with a parallel-jaw gripper, in a physics simulation environment.
Obtained results indicate that the method not only can grasp individual
objects, but also can successfully clear randomly organized groups of objects.
The SpectGRASP method also outperforms the closest state-of-the-art method in
terms of grasp generation time and grasp-efficiency.
## I Introduction
Reliable autonomous grasping of arbitrarily shaped, unknown objects, in
cluttered and unstructured environments, remains a challenging problem. Major
difficulties lie in establishing a useful correspondence, between a robot’s
gripper fingers and an object’s surface obtained from computer vision, to
achieve a robust and stable grasp. Although, robots have already been deployed
in flexible manufacturing to perform vision-guided pick and place tasks, these
predominantly assume that precise object models are known a-priori for each
product, for which stable grasp poses can be pre-computed. For robots to
reliably manipulate arbitrarily shaped objects, in unstructured environments,
robust and efficient methods for grasp synthesis are needed. In this context,
given a gripper configuration, we present a novel spectral domain method that
can generate grasps for unknown objects observed as point clouds.
Figure 1: Object grasping by proposed SpectGRASP method. (Top) Perceived
object point clouds with surface normals. (Middle) Corresponding Binary
Extended Gaussian Images. (Bottom) Executed best grasps.
A variety of methods have emerged in the literature for robotic grasping [1,
2, 3, 4]. Most of the state-of-the-art methods can be classified into
analytical approaches versus data-driven methods [4]. The conventional
analytical approaches predominantly generate grasp hypotheses by using
physics-based formulations. They largely rely on a-priori information like
accurate geometric models of objects, dynamic parameters such as object mass,
and assumed values for friction coefficients etc. These methods achieve
acceptable performance when grasping at prescribed contact points. However,
they have difficulty in generalising to many real-world scenarios,
particularly for unknown objects, of arbitrary shape, in unstructured scenes.
These problems have been addressed by more recent data-driven methods, which
sample grasp candidates by means of learning [5, 6, 7, 8, 9]. These methods
enabled robots to better cope with uncertainties in vision and perception, and
demonstrated some degree of generalisation to new objects. However, they
predominantly require large amounts of data and extensive offline training.
Moreover, their ability to handle novel objects, especially those with shapes
that differ greatly from training data objects, is limited. Also, grasping
objects from randomly organised cluttered scenes, remains a major problem to
solve. These limitations can be tackled by using geometry-based approaches,
like the one presented in this paper.
Although geometric methods may not be as fast as some learning-based methods,
they are: easy to generalise for multi-fingered hands; work well for grasping
novel objects with a-priori unknown geometries; and can handle heaps of
objects in cluttered and unstructured environments[10]. Recent methods, based
on shape similarities between hand fingers and object surfaces, have
demonstrated remarkable results for robotic grasping of unknown objects [11,
12, 10, 13, 14]. These methods synthesise grasp hypotheses by matching the
surface regions of gripper fingers with similar surface patches on the object,
to maximize the contact area during grasping. The sampled grasp candidates are
then ranked or sorted by virtue of custom grasp ranking metrics to find the
candidate with highest probability of success. Our previous work in this area
presented a Local Contact Moment (LoCoMo) similarity metric-based grasp
planner[10]. This method demonstrated high success rates in grasping
individual unknown objects and also in clearing random cluttered heaps of
objects. However, it requires high computational time (about ten seconds),
which also increases with the point cloud density. A comparable approach based
on shape adaptability has been presented in [13]. Very recently, an approach
based on gripper workspace spheres was presented in [12], for grasping unknown
objects represented as registered point clouds. This approach can be flexibly
generalised to a variety of grippers. Although the method is comparably fast,
it can only be applied to scenes containing single objects. A fast geometric
unknown object grasping algorithm based on force balanced optimisation was
presented in [15]. Like other methods, it also synthesises grasps based on
online processing of a single point cloud. In contrast to the aforementioned
approaches, there are other geometric methods that work by surface
reconstruction and object modelling [16, 17, 18, 19]. However, sampling grasp
candidates for large numbers of object points and gripper configurations can
be slow and computationally expensive.
To overcome these limitations, we propose SpectGRASP, a robust and
computationally efficient method for synthesizing grasp candidates for unknown
objects. At the core of our method, spherical harmonics are used to
efficiently compute spectral correlations between object and finger surface
normals. Previously, a method using spherical harmonics for grasping was
reported in [20]. It transfers a known grasp from one object to another by
smoothly deforming the surface of the first object into the second one. Unlike
our method, it requires a complete, dense point cloud, sampled from a closed
convex surface, i.e., without holes. In contrast, SpectGRASP makes no
assumptions about object shape, and is effective with sparse point clouds.
Furthermore, while [20] has only been demonstrated on single and mostly convex
objects, SpectGRASP generates grasps for a wide range of object shapes, and
robustly handles multiple objects in cluttered scenes.
SpectGRASP is designed as a two step process: correspondence matching and
contact ranking. The matching is performed by correlating gripper and object
surface normals. We propose Binary Extended Gaussian Images (BEGI) to
represent surface normals. A Fast Fourier Transform (FFT) for functions
defined on the rotation group is used to efficiently compute the correlation
density function [21]. In the same way that cross-correlation is used as a
similarity measure, between two signals over a set of positions in the
standard Euclidean space $\mathbb{R}^{n}$, the resulting spectral correlation
density function can be used as a similarity measure over
$\bm{\mathrm{SO}(3)}$. Thus, finding a pattern embedded in a signal (both
defined on the unit sphere) is reduced to finding pattern rotations with high
correlation values. Here, the finger BEGI is the pattern and the object BEGI
(seen in Fig. 1) is the signal. From this correlation, a set of contact points
are extracted on the object for each gripper finger. Finally, gripper poses
are sampled from the contact points and ranked according to their LoCoMo
score, which provides a grasp likelihood metric based on the correspondence
between surface patches of gripper fingers and object surfaces [10]. The main
contributions of this work are as follows:
* (i)
We propose BEGI as a novel way of representing point cloud surface normals.
This representation helps finding corresponding point-pairs between two point
clouds.
* (ii)
We propose the use of spectral correlation for efficiently sampling grasp
contact points on the surface of an object given a robot hand configuration.
* (iii)
We present a new, generic and efficient grasp generation pipeline, combining
spectral correlation with the LoCoMo grasp likelihood metric of our previous
work.
SpectGRASP works directly using online captured point clouds of objects. It
does not require any object CAD models, or learning with offline training
data. In simulation experiments, using a 7-axis robot with a two-finger hand,
we demonstrate how SpectGRASP generates effective grasps for a variety of
objects selected from the YCB object set [22]. We also demonstrate how
SpectGRASP can reliably clear randomly generated scenes of multiple objects
with successive grasps. In addition, we compare and discuss the performance of
SpectGRASP against the LoCoMo-based grasp planner [10], since this was the
previous state-of-the-art in learning-free and model-free grasping.
## II Methodology
In this section, we present our proposed SpectGRASP method. We first show how
point cloud surface normals are represented as BEGI. Later, we show how
spherical harmonics are used to compute correspondence between two BEGIs and
estimate the grasp contact points. Finally, we present how the grasp
candidates are generated and ranked.
### II-A Binary Extended Gaussian Image (BEGI)
The extended Gaussian image (EGI) [23] has been extensively used as a shape
descriptor for object surface normals [24, 25, 26]. It represents the
distribution of surface normals in polar coordinate system by mapping them
onto a unit sphere, also denoted as the 2-sphere or $\bm{S}^{2}$. Given a
vector $\bm{n}=(n_{x},n_{y},n_{z})$ in the Euclidean space $\mathbb{R}^{3}$,
the corresponding spherical coordinates $(r,\theta,\phi)$ are computed as:
$\begin{gathered}r=\sqrt{n_{x}^{2}+n_{y}^{2}+n_{z}^{2}}\quad\quad\theta=\arctan{\frac{\sqrt{n_{x}^{2}+n_{y}^{2}}}{n_{z}}}\\\
\mkern-38.0mu\phi=\arctan(\frac{n_{y}}{n_{x}})\end{gathered}$ (1)
Physically, these coordinates represent norm, longitude and latitude. When
$\bm{n}$ is unitary, i.e., $r=1$, the set $(\theta,\phi)$ is sufficient to
locate the vector on the unit sphere. To make use of spherical coordinates to
numerically compute distributions, a discrete sphere is required. We use the
following discretization along longitude and latitude to represent object
surface normals on $\bm{S}^{2}$: $\theta_{j}=\frac{\pi(2j+1)}{4B}$ and
$\phi_{k}=\frac{\pi k}{B}$ , $(j,k)\in\mathbb{N}$ with the constraint $0\leq
j,k<2B$. Here, $B$ is the bandwidth and acts like a low pass filter. Smaller
$B$ values lead to a coarser distributions and higher values provide more
accurate representations, as seen in Fig. 2. While conventional EGIs use
histograms to represent the distribution of surface normals on a unit sphere,
our method uses binary values for each cell parameterised by the indices
$(j,k)$. This corresponds to the existence of at least one surface normal in
the direction of $(\theta_{j},\phi_{k})$. Additionally, we store the list of
point coordinates of surface normals corresponding to the cell.
Fig. 2 illustrates object surface normals represented as BEGI for three
different bandwidths. Finer representations on the sphere are obtained with
higher bandwidth, i.e., $B=16$. Points belonging to adjacent cells when $B=8$
are merged into a single cell at a lower bandwidth, $B=4$.
Figure 2: BEGIs with different bandwidths for the above “Hammer” object point
cloud. The one with highest bandwidth, i.e., $B=16$, provides finer
distribution where as the lower bandwidth ones show coarse distributions.
Given a point cloud with surface normals
$\mathcal{PC}_{n}=\\{(\bm{p},\bm{n})\in\mathbb{R}^{3}\times\bm{S}^{2}\\}$ and
a bandwidth $B$, the BEGI can be constructed using (2).
$\begin{gathered}f(\theta_{j},\phi_{k})=v_{jk}\\\
\mathcal{P}_{jk}=\left\\{p_{i}\in\mathbb{R}^{3}\mid
n_{i}=(\theta_{j},\phi_{k})\right\\}\end{gathered}$ (2)
With $0\leq j,k<2B$, $v_{jk}\in[0,1]$. $v_{jk}=1$ if there exists a surface
normal $n_{i}=(\theta_{j},\phi_{k})$ in $\mathcal{PC}_{n}$ and $v_{jk}=0$,
otherwise. $f(\theta_{j},\phi_{k})$is the BEGI function and $\mathcal{P}_{jk}$
is the BEGI point set at $(j,k)$. Any point cloud with surface normals can be
reconstructed upto a degree of precision using its BEGI by specifying an
appropriate value for the bandwidth $B$.
### II-B Spherical Harmonics
Spherical harmonics are used to provide a decomposition of functions defined
on the unit sphere [27]. They are the spherical equivalent of the Fourier
transform in Euclidean space and form an orthonormal basis on the sphere. In
computer vision, they have been used for 3D model recognition and visual
servoing [28, 29]. Any square-integrable function
$f:\bm{S}^{2}\rightarrow\mathbb{C}$ ($f\in L^{2}(\bm{S}^{2})$) can be
represented by its spherical harmonic expansion as:
$f(\theta,\phi)=\sum_{l=0}^{l_{max}}\sum_{m=-l}^{l}\hat{f_{l}^{m}}Y_{l}^{m}(\theta,\phi)$
(3)
where, $l,m\in\mathbb{N}^{+}$ , $l_{max}>0$ is the maximum degree of
expansion, $Y_{l}^{m}$ is the spherical harmonics of degree $l$ and order $m$,
$\hat{f_{l}^{m}}$ is the corresponding harmonic coefficient. The spherical
harmonics $Y_{l}^{m}$ are computed as:
$Y_{l}^{m}(\theta,\phi)=(-1)^{m}\sqrt{\frac{(2l+1)(l-m)!}{4\pi(l+m)!}}P_{l}^{m}(cos\theta)e^{im\phi}$
(4)
In the literature, the factor $(-1)^{m}$ is sometimes integrated with the
definition of Legendre polynomials, $P_{l}^{m}$. The harmonic coefficients
$\hat{f_{l}^{m}}$ are computed by the inner product between $f$ and
$Y_{l}^{m}$ over $\bm{S}^{2}$:
$\displaystyle\hat{f_{l}^{m}}$
$\displaystyle=\int_{w\in\bm{S}^{2}}f(w)\overline{Y_{l}^{m}(w)}\,dw$ (5)
$\displaystyle=\int_{0}^{2\pi}d\phi\int_{0}^{\pi}d\theta\sin\theta
f(\theta,\phi)\overline{Y_{l}^{m}(\theta,\phi)}$
where, $\overline{Y_{l}^{m}}$ is the complex conjugate of $Y_{l}^{m}$. Using
(3), the harmonic decomposition of a BEGI function
$f:\bm{S}^{2}\rightarrow[0,1]\subset\mathbb{C}$ is computed. This means that
the harmonic functions can be used to evaluate the correlation of two BEGIs.
The harmonic coefficients described in (5) are computed numerically by using
the previously presented discretization of the sphere. By setting a value for
$B$, the angles $\theta$ and $\phi$ can be sampled using an equiangular
$2B\times 2B$ grid.
### II-C Spectral Correlation of Functions on $\bm{\mathrm{SO}(3)}$
Let $f$ and $g$ are two functions with bandwidth $B$ defined on $\bm{S}^{2}$,
and $g_{r}=g(\mathcal{R}(\alpha,\beta,\gamma))=g(\alpha,\beta,\gamma)$ is the
rotated version of $g$ by a rotation
$\mathcal{R}\in\bm{\mathrm{SO}(3)}$111$\mathcal{R}$ is taken as $zyz$ Euler
angles $\alpha,\beta,\gamma$; $\alpha,\gamma\in[0,2\pi[$ and
$\beta\in[0,\pi]$.. The correlation $\mathcal{C}(\mathcal{R})$ between $f$ and
$g_{r}$ is computed as
$\mathcal{C}(\mathcal{R})=\int_{w\in S^{2}}f(w)\overline{g_{r}(w)}\,dw$ (6)
(6) evaluates the degree of similarity between $f$ and $g_{r}$. By computing
the correlation for a set of rotations, a correlation density function is
obtained as shown in Fig. 3(d).
Figure 3: Illustation of BEGI correlation process. Initially, surface normals
of both gripper fingers and object are converted to BEGIs. These are then
correlated using spherical hormonics resulting in a correlation density map.
Here we show the values $\geq 0.5$. The cross-section along
$(\alpha,\beta,\gamma)=(\pi/4,\pi/2,\pi)$ shows an in depth view of the
correlation density map. Blue dots correspond to rotations with low
correlation values, while red dots are locations with high correlation.
In harmonic domain, rotations are expressed as Wigner D-Matrices,
$D_{mm^{\prime}}^{l}$ [30]. Consequently, the rotated pattern BEGI $g_{r}$ is
represented in the spectral domain as:
$\begin{gathered}g(\alpha,\beta,\gamma)=\sum_{l=0}^{l_{max}}\sum_{m=-l}^{l}\sum_{m^{\prime}=-l}^{l}D_{mm^{\prime}}^{l}(\alpha,\beta,\gamma)\hat{g_{l}^{m^{\prime}}}Y_{l}^{m}\\\
\mbox{with}\quad
D_{mm^{\prime}}^{l}(\alpha,\beta,\gamma)=e^{-im\alpha}d_{mm^{\prime}}^{l}(\beta)e^{-im^{\prime}\gamma}\end{gathered}$
(7)
where, $d_{mm^{\prime}}^{l}$ are the Wigner d-functions. Replacing $f$ and
$g_{r}$ in (6) by their harmonic expansions, using the orthogonality principle
of the harmonic coefficients, i.e., $\int_{w\in
S^{2}}Y_{l}^{m}(w)\overline{Y_{l^{\prime}}^{m^{\prime}}(w)}\,dw=1$ if
$m=m^{\prime}$ and $0$, otherwise, we get:
$\mathcal{C}(\mathcal{R})=\sum_{l=0}^{l_{max}}\sum_{m=-l}^{l}\sum_{m^{\prime}=-l}^{l}\hat{f_{l}^{m}}\overline{\hat{g_{l}^{m^{\prime}}}}\overline{D_{mm^{\prime}}^{l}(\mathcal{R})}$
(8)
(8) can be evaluated using FFTs defined on $\bm{\mathrm{SO}(3)}$. We refer the
readers to [21] for more details on spectral correlation.
### II-D Contact Sampling by Spectral Correlation
A grasp is defined by the location of each finger of the gripper on an object
and a pose defining the wrist location in space. For a gripper with $N_{f}$
fingers, the grasp configuration $\mathcal{G}$ can be defined as:
$\mathcal{G}=(p_{1}\cdots p_{N_{f}},n_{1}\cdots n_{N_{f}},M)$ (9)
where, $p_{i},n_{i}\in\mathbb{R}^{3}$ are respectively the object contact
point and surface normals for the finger $i$, $M\in\bm{\mathrm{SE}(3)}$ is the
wrist pose. Achieving static equilibrium when grasping requires that the force
applied by each finger on the object stays within the friction cone [31]. In
this sense, we attempt to select finger positions applying minimal tangential
forces on the object during grasping. This is accomplished by finding contact
points maximizing the dot product between finger and object surface normal
vectors. Correlating the BEGIs corresponding to object and gripper fingers
provide indication on the location of such points in $\bm{\mathrm{SO}(3)}$.
Rotations with high correlation values can then be sampled from the
correlation density function, while the BEGI point set map
$\mathcal{P}=\\{\mathcal{P}_{jk}\\}$ is used to extract, for each finger,
those contact points. The following contact sampling algorithm is then
devised:
* •
Given an object point cloud and a hand configuration parametrized by the
gripper’s joint configuration $\bm{q}$, we compute the BEGIs of point cloud
and gripper fingers using (2).
* •
The correlation between these two BEGIs is then computed using (8). This
process is depicted in Fig. 3.
* •
Rotations with correlation values greater than a threshold $t_{corr}$ are then
sampled. The BEGI function of the gripper is then rotated and for each finger,
object points located at the index $(j,k)$ of the finger are extracted.
* •
The set
$\mathcal{P}^{r}_{N_{f}}=\\{\mathcal{P}_{(0)},\mathcal{P}_{(1)}\cdots\mathcal{P}_{(N_{f})}\\}$
can then be constructed for each rotation where $\mathcal{P}_{(i)}$ is the set
of points extracted for the finger $i$.
* •
Contact point sets with surface normals $(p_{1}\cdots p_{N_{f}},\allowbreak
n_{1}\cdots n_{N_{f}})$ can then be extracted from $\mathcal{P}^{r}_{N_{f}}$.
* •
An additional filtering step is required in order to remove the contacts that
do not satisfy the force closure principle and that are out of range of the
gripper kinematics.
* •
Wrist poses $\\{M\\}$ leading to collision-free grasps can then be sampled
using the kinematics of the gripper.
### II-E Grasp Ranking
Grasp candidates obtained from the previous step need to be ranked such that
the one with maximum likelihood is selected and executed on the robot. For
this purpose, we use our previously developed LoCoMo metric [10], which
provides a similarity score between gripper fingers and object at the contact
points. Due to the generic nature of SpectGRASP, using alternative ranking
metrics will not limit its performance. The benefits of using the LoCoMo
metric are twofold; first, it has been proven to perform well in practice and
second, it provides a common basis to objectively evaluate the proposed method
against the one presented in [10]. LoCoMo grasp ranking $\mathcal{Q}$ is
computed as in (10).
Figure 4: Successful grasps for various objects from the YCB object set using
the proposed SpectGRASP method. Top row shows the computed top-ranked grasp
candidates and bottom row shows the same grasps executed on the simulated
robot. Detailed results can be found in the supplementary video.
$\displaystyle\mathcal{M}_{i}$
$\displaystyle=\frac{1}{N_{s}}\sum_{j=1}^{\kappa}\left((2\pi)^{\kappa}|\Sigma|\right)^{\frac{1}{2}}\mathcal{N}\left(\varepsilon_{j};\vec{0},\Sigma\right)$
(10) $\displaystyle\mathcal{Q}$
$\displaystyle=\rho\prod_{i=1}^{N_{f}}\mathcal{M}_{i}^{\omega_{i}}$
where, $\mathcal{M}_{i}$ is the contact moment (CoMo) of finger $i$ computed
at a contact point, $N_{s}$ is a normalizing term, $\kappa$ is the number of
point cloud patches sampled around the location of the finger,
$\mathcal{N}(\varepsilon_{j};\vec{0},\Sigma)$ is the multivariate Gaussian
density function centered at $\vec{0}$ with covariance $\Sigma$,
$\varepsilon_{j}$ is the difference of gripper and object zero-moment shift
vectors. Finally, $\omega_{i}$ and $\rho$ are weighting factors. As presented
in [32], $\rho$ can be dynamically updated to re-rank grasps based on factors
such as the distance between robot’s end effector and closest grasps. More
details on the derivation of (10) can be found in [10].
## III Experimental Validations
In this section, we present the experiments conducted in simulation to
validate the performance of the proposed SpectGRASP method in grasping
individual objects as well as clearing multi-object scenes. We also compare
the grasping performance of our method with state-of-the-art LoCoMo-based
grasp planner222LoCoMo grasp planner code is available at:
https://github.com/maximeadjigble/grasplocomo [10] and the obtained results
are discussed. Furthermore, we also discuss in detail the applicability of our
approach to real scenarios. All experiments are performed on a windows machine
with an i7 CPU.
### III-A Simulation Setup Description
All experiments are performed using the PyBullet physics simulator. It is a
Python wrapper for the Bullet physics engine, which has been proven to be an
efficient open-source simulation tool for robotic models [33]. Our robotic
setup consists of a 7 degrees of freedom (DoF) articulated robot arm fitted
with a parallel-jaw gripper. For experiments, we have selected 16 different
objects from the YCB object set [22] that are suitable with our gripper model.
In order to make our system as realistic as possible, we have created a
virtual RGB-D camera for point cloud acquisition and attached it to the
robot’s end-effector. We use a point cloud generated by registering multiple
clouds acquired by moving the robot to four different viewpoints around the
objects. This registration is merely cloud stitching as the point clouds are
acquired by a camera whose exact pose in the robot base frame is known [6].
Object CAD models downloaded from YCB website are used for simulations. In
order to reach the grasp poses, a full 6-DoF end-effector pose controller has
been implemented to generate the robot trajectory. Moreover, as previously
stated, kinematically infeasible configurations are discarded from the full
list of generated candidates. For all experiments, an empirically selected
threshold $t_{corr}=0.1$ is used to generate grasps.
We report both single and multiple objects grasping results following the
evaluation protocol described in [34]. Similar to the setup described in [34],
we have considered a circular task-space with a radius of $25~{}\mathrm{cm}$
within the robot workspace.
TABLE I: Single object grasping results for both proposed and LoCoMo-based
methods at test location-1.
Object | SpectGRASP | LoCoMo
---|---|---
| Total Grasps1 (Feasible) | Time [s] | Lift (%) | Rotation (%) | Shake (%) | Total Grasps (Feasible) | Time [s] | Lift (%) | Rotation (%) | Shake (%)
Cleanser | 1995 (265) | 2.55 | 100 | 100 | 100 | 7916 (379) | 9.93 | 100 | 100 | 100
Cup | 790 (116) | 0.42 | 100 | 100 | 100 | 3421 (90) | 1.66 | 100 | 100 | 100
F. Screwdriver | 2016 (125) | 0.86 | 100 | 100 | 100 | 13251 (1172) | 4.60 | 100 | 0 | NA2
Golf Ball | 3514 (119) | 0.98 | 100 | 100 | 100 | 30479 (1684) | 9.63 | 100 | 100 | 100
Hammer | 3173 (537) | 1.58 | 100 | 100 | 100 | 24179 (4213) | 10.49 | 100 | 0 | NA
Large Clamp | 47 (12) | 0.15 | 100 | 0 | NA | 1361 (173) | 1.93 | 100 | 0 | NA
Mug | 72 (4) | 0.31 | 100 | 0 | NA | 261 (9) | 4.19 | 100 | 33 | 0
P. Screwdriver | 1828 (5) | 0.64 | 100 | 100 | 100 | 14281 (276) | 4.7 | 100 | 0 | NA
Potted Meat | 300 (6) | 0.34 | 100 | 100 | 100 | 1046 (28) | 0.92 | 100 | 100 | 100
Power Drill | 2410 (300) | 1.48 | 100 | 0 | NA | 28503 (1626) | 17.62 | 100 | 100 | 0
Racquet Ball | 614 (65) | 0.53 | 100 | 0 | NA | 16064 (2821) | 10.26 | 100 | 100 | 100
Softball | 7406 (52) | 2.07 | 100 | 100 | 100 | 64510 (1576) | 20.25 | 0 | NA | NA
Strawberry | 5446 (16) | 1.57 | 100 | 100 | 100 | 36521 (639) | 12.16 | 100 | 100 | 0
Woodblock | 6001 (380) | 3.33 | 100 | 100 | 100 | 13269 (782) | 10.82 | 100 | 100 | 100
Mustard | 4638 (440) | 3.66 | 100 | 100 | 100 | 13438 (1647) | 21.56 | 100 | 100 | 100
* 1
Total number of grasps computed and in parenthesis are the total feasible
grasps after IK filtering.
* 2
NA – Test not performed as previous test failed.
TABLE II: Single object grasping results for both proposed and LoCoMo-based methods at test location-2. Object | SpectGRASP | LoCoMo
---|---|---
| Total (Feasible) | Time | Lift | Rotation | Shake | Total (Feasible) | Time | Lift | Rotation | Shake
Cleanser | 146 (33) | 0.32 | 100 | 100 | 100 | 8972 (1921) | 10.93 | 100 | 100 | 100
Cup | 617 (9) | 0.43 | 100 | 100 | 100 | 1525 (10) | 1.1 | 100 | 100 | 0
F. Screwdriver | 1869 (106) | 0.75 | 100 | 0 | NA | 13210 (694) | 4.65 | 100 | 0 | NA
Golf Ball | 5674 (321) | 1.46 | 100 | 100 | 100 | 38481 (1891) | 12.64 | 100 | 100 | 100
Hammer | 2678 (31) | 1.25 | 100 | 100 | 100 | 14505 (231) | 7.94 | 100 | 100 | 100
Large Clamp | 161 (5) | 0.24 | 100 | 0 | NA | 1897 (69) | 1.86 | 100 | 0 | NA
Mug | 90 (14) | 0.41 | 0 | NA | NA | 312 (38) | 4.3 | 100 | 100 | 100
P. Screwdriver | 1502 (228) | 0.58 | 100 | 100 | 100 | 11995 (1108) | 4.02 | 100 | 100 | 100
Potted Meat | 118 (8) | 0.33 | 100 | 100 | 100 | 1203 (94) | 1.06 | 0 | NA | NA
Power Drill | 2767 (577) | 1.57 | 100 | 100 | 100 | 28078 (1869) | 20.6 | 100 | 0 | NA
Racquet Ball | 505 (79) | 0.45 | 100 | 100 | 100 | 14425 (1084) | 8.64 | 0 | NA | NA
Softball | 8489 (327) | 2.45 | 100 | 100 | 100 | 68615 (4286) | 21.58 | 100 | 0 | NA
Strawberry | 5164 (419) | 1.54 | 100 | 100 | 100 | 34740 (1613) | 11.47 | 0 | NA | NA
Woodblock | 5152 (707) | 2.93 | 100 | 100 | 100 | 12262 (1155) | 11.87 | 100 | 100 | 100
Mustard | 3428 (928) | 3.35 | 100 | 100 | 100 | 13080 (1865) | 21.68 | 100 | 100 | 100
### III-B Grasping Individual Objects
For this experiment, two different test locations on the circular task-space
are selected. For location-1, the objects are placed at the origin of the
circular task-space, i.e., the point on the ground plane at which the centre
of the tool is projected onto, when the robot is at 90-90 configuration. Refer
[34] for more details. For location-2, we move the object $25~{}\mathrm{cm}$
in the negative-$y$ direction and apply a rotation of $-90^{\circ}$ around
$z$-axis. After candidate generation, filtering, and sequential ranking, the
top ranked grasp is executed on the robot. A force of $50\mathrm{N}$ is used
to grasp and hold the object. Thereafter, a series of three tests, as in [34],
are performed to check the grasp stability: (i) lift test, where the object is
lifted $20~{}\mathrm{cm}$ off the table at a speed of $10~{}\mathrm{cm/s}$;
(ii) rotation test, where the object is rotated $90^{\circ}$ and $-90^{\circ}$
around the $y$-axis at a speed of $45~{}\mathrm{deg/s}$; and finally (iii)
shake test, where the robot shakes the object in a sinusoidal pattern
($0.25\mathrm{m}$ amplitude, $10~{}\mathrm{m/s^{2}}$ acceleration) for 10
seconds. These tests are performed sequentially, i.e., if any of these fail
the grasp is considered a failure and the next test will not be performed. The
test is considered a fail if the object slips out of the fingers. For each
object, with both proposed and LoCoMo-based methods, at each test location, we
have repeated the test 3 times. In the paper, we report the average of those
three trials.
Fig. 4 shows some screenshots of the successful grasps generated and executed
for 7 different objects. Tables I and II summarise the results for test
locations 1 and 2, respectively. From the results, it can be seen that the
proposed method outperformed the LoCoMo-based grasp planner in terms of grasp
generation time. SpectGRASP takes on average $\bm{1.28~{}\mathrm{seconds}}$ to
generate grasps. This is $\bm{7\times}$ faster compared to the LoCoMo-based
grasp planner, which takes $9.5~{}\mathrm{seconds}$ on average. Although
SpectGRASP generates fewer grasp candidates compared to LoCoMo, it
demonstrated higher success rates than the later. For location 1, the average
success rates of SpectGRASP for lifting, rotation and shaking tests are
respectively, $\bm{100\%}$, $\bm{73\%}$ and $\bm{73\%}$, while for LoCoMo they
are $93\%$, $62\%$, $47\%$. And for location 2, the average success rates of
SpectGRASP for lifting, rotation and shaking tests are respectively
$\bm{93\%}$, $\bm{80\%}$ and $\bm{80\%}$, while for LoCoMo they are $80\%$,
$53\%$, $47\%$. These results suggest that the SpectGRASP is able to generate
good and stable grasps than the ones generated by LoCoMo-based method.
The difference in the number of grasps generated is due to the fact that
LoCoMo uses all possible point pairs of a given point cloud to sample contact
points. This results in a high number of grasp candidates; however, the
generation time is more. Nevertheless, in practical real-world applications,
only the top ranked grasps are considered; thus, making the SpectGRASP a more
suitable grasp planner. It is worth noting that for both methods, the success
rates from rotation and shake tests are lower than that of the lifting test.
This is mainly due to the inaccuracy of physics simulator to model
interactions between objects. We believe that these success rates will be
improved with a real robot system, e.g. see results for LoCoMo method in [10]
and [34].
Figure 5: Grasping objects in clutter with proposed method. Top row shows
generated top-ranked grasps and the bottom row shows the same grasps executed
on the robot. Objects are grasped one by one until either the scene is
cleared, or the method returns no feasible grasps. Detailed results can be
found in the supplementary video.
### III-C Grasping Objects in Clutter
The second set of experiments are performed to evaluate the performance of the
proposed method in clearing cluttered scenes containing multiple objects. For
this tests, 6 different objects are randomly positioned. We test the
performance by clearing 3 such randomly generated scenes. The task is to
successively grasp, lift, rotate and shake one object at a time until the
scene is successfully cleared. For each iteration, a new scene point cloud is
captured based on which the grasps are generated. Like before, the generated
grasps are filtered and ranked, and the top grasp is executed by the robot.
The experiment is repeated until all objects are successfully removed or if
the algorithm fails to find any feasible grasp. Also for this tests, we report
the results following the protocol in [34] for group of objects.
Fig. 5 shows successive images from this test where a cluttered scene being
cleared using the proposed method. Table III summarises the result for
clearing three different clutters. SpectGRASP is able to successfully clear
all 3 scenes. It can be seen that the pickup order varies due to the random
positioning of objects, but in all cases the first 4 objects are successfully
picked up in the first attempt. For the 6th object of scene 2, the “Mustard”
bottle was lifted successfully but fell back on the table during the rotation
test. Another attempt was required to successfully complete this trial.
Likewise, two attempts were needed to clear “screwdriver” in scene 3. Overall,
considering all trials, on average it took $18.02~{}\mathrm{seconds}$ to
generate grasps required to clear a scene of 6 objects. This corresponds to
$\approx 3~{}\mathrm{seconds}$ per object, which is slightly higher compared
to the case of single object grasping. This is because, cluttered scenes are
composed of multiple objects, which means more grasp candidates are generated
leading to high generation time.
TABLE III: Clutter clearance results with proposed method.
Scene | Object | Pickup order | Time (s) | Lift | Rotation | Shake
---|---|---|---|---|---|---
1 | Woodblock | 2 | 3.96 | ✔ | ✔ | ✔
| Golfball | 4 | 2.37 | ✔ | ✔ | ✔
| Dishwash | 1 | 7 | ✔ | ✔ | ✔
| Lemon | 3 | 2.67 | ✔ | ✔ | ✔
| Screwdriver | 5 | 0.75 | ✔ | ✔ | ✔
| Mustard | 6 | 0.14 | ✔ | ✔ | ✔
Total grasp generation time: | 16.89 seconds
2 | Woodblock | 1 | 5.18 | ✔ | ✔ | ✔
| Golfball | 3 | 2.11 | ✔ | ✔ | ✔
| Dishwash | 2 | 3.4 | ✔ | ✔ | ✔
| Lemon | 4 | 1.09 | ✔ | ✔ | ✔
| Screwdriver | 5 | 0.63 | ✔ | ✔ | ✔
| Mustard | 6 | 0.25 | ✔3 | ✔ | ✔
Total grasp generation time: | 12.66 seconds
3 | Woodblock | 2 | 5.59 | ✔ | ✔ | ✔
| Golfball | 6 | 1.66 | ✔ | ✔ | ✔
| Dishwash | 1 | 6.45 | ✔ | ✔ | ✔
| Lemon | 4 | 3.34 | ✔ | ✔ | ✔
| Screwdriver | 5 | 2.96 | ✔ | ✔ | ✔
| Mustard | 3 | 4.51 | ✔ | ✔ | ✔
Total grasp generation time: | 24.51 seconds
* 3
Purple tick mark: Success after second try.
### III-D Discussion
#### Complexity analysis
Experimental results demonstrate the efficiency of SpectGRASP method in
generating grasps for various objects with a variety of shapes. This is mainly
supported by rapid computation of the correlation density map that is used to
sample contact points. For a parallel jaw gripper, naively sampling contact
points on a point cloud with $N$ points results in a $\mathcal{O}(N^{2})$
complexity. As the number of points increases, the cost of sampling contacts
becomes high. Also, this complexity drastically increases when hands with more
fingers are used. However, for SpectGRASP, which uses the Fourier transform on
$\bm{\mathrm{SO}(3)}$, has a complexity of $\mathcal{O}(B^{4})$ with $B$ being
the bandwidth [21]. Suppose, $N_{r}$ rotations are sampled from the
correlation density map and a maximum number of $K$ points are extracted from
each BEGI cell, in extreme cases, sampling contacts leads to an
$\mathcal{O}(N_{r}K^{N_{f}})$ complexity, with $N_{f}$ being the number of
fingers. It is important to notice that the complexity of SpectGRASP is not
directly related to the number of points in the point cloud, meaning that the
efficiency of the method still remains same even for dense point clouds.
Additionally, $B$ value can be adjusted to modify the grasp generation time.
For instance, lower values of $B$ lead to higher number of points per cell but
result in a lower number of possible rotations. This is desirable for
applications requiring high number of grasp candidates. While, higher values
of B tend to produce a smaller number of points per cell with a high number of
rotations. This leads to fewer grasp candidates with precise matching.
Applications such as dynamic grasping could greatly benefit from this type of
fine matching. The contact sampling complexity can be further reduced by
clustering the points in each BEGI cell.
#### Applicability to real system
In this work, we have validated our approach by a substantial number of
virtual experiments with a simulated 7-DoF robot and a parallel-jaw gripper,
grasping a variety of objects. The selected robot and gripper configurations
match with the real KUKA iiwa robot arm and Schunk PG-70 gripper models, same
as the setup presented in [10]. The full pipeline presented in this paper can
be directly imported on to the real robot as it does not assume any kinematic
constraints, and the grasp configurations for which there is no IK solutions
are discarded. Our method relies only on the point clouds generated by the
simulated virtual camera, which is mounted on the robot’s wrist. This camera
has been constructed considering the camera parameters of a real depth camera.
This means that the virtually generated point clouds are similar to that of
the real-world depth sensor. As previously stated, our autonomous grasping
technique does not rely on any prior knowledge of the object, e.g., a CAD
model. Furthermore, our approach does not make use of any additional
information regarding given unknown object that would not be available in a
real-world scenario. The assumption is that the object will be placed in a
reachable location by the robot within its workspace, viewable from a camera
and the object size should be suitable for the gripper to be able to
manipulate. Besides, our approach is agnostic to the robot system used, given
that: (i) there is a scene or robot mounted vision system to acquire point
cloud; (ii) the robot’s end-effector is a multi-finger hand with minimum two
fingers; and (iii) hand kinematic model is known. Henceforth, we believe that
our method is applicable to real systems.
## IV Conclusion
In this paper, we have presented a computationally efficient and robust
method, SpectGRASP, for robotic grasping via spectral correlation and grasp
ranking. A Fast Fourier Transform of functions defined on the sphere is used
to efficiently sample contact points on the surface of the object, while the
LoCoMo metric is used for grasp ranking. The method uses only the point cloud
and surface normals of an object to generate grasps. No training data,
learning nor any 3D object model is needed. We also introduced a novel
representation of point clouds with surface normals (BEGI). This can be used
to efficiently find correspondance points between two point clouds.
Experimental results in simulation have shown the efficiency and robustness of
SpectGRASP for grasp generation using a parallel-jaw gripper. SpectGRASP
outperforms the previous state-of-the-art “model-free and learning-free
grasping” method, in terms of grasp generation time and success rate for the
tasks of grasping single objects and clearing cluttered scenes with successive
grasps.
Future work will focus on evaluating the method on a real robot setup, and
also on extending it to multi-finger hands. Due to the swiftness and
efficiency of the grasp generation pipeline, we intend to use it for tracking
and grasping moving objects by integrating it with the method presented in
[35].
## References
* [1] A. Bicchi and V. Kumar, “Robotic grasping and contact: a review,” in _IEEE Int. Conf. Robot. Autom_ , vol. 1, 2000, pp. 348–353 vol.1.
* [2] J. Bohg _et al._ , “Data-driven grasp synthesis—a survey,” _IEEE Trans. Robot._ , vol. 30, no. 2, pp. 289–309, 2013.
* [3] K. B. Shimoga, “Robot grasp synthesis algorithms: A survey,” _Int. J. Rob. Res._ , vol. 15, no. 3, pp. 230–266, 1996.
* [4] A. Sahbani, S. El-Khoury, and P. Bidaud, “An overview of 3d object grasp synthesis algorithms,” _Rob. Auton. Syst._ , vol. 60, no. 3, pp. 326–336, 2012.
* [5] A. ten Pas _et al._ , “Grasp pose detection in point clouds,” _Int. J. Rob. Res._ , vol. 36, no. 13-14, pp. 1455–1473, 2017.
* [6] N. Marturi _et al._ , “Dynamic grasp and trajectory planning for moving objects,” _Autonomous Robots_ , vol. 43, no. 5, pp. 1241–1256, 2019.
* [7] S. Levine _et al._ , “Learning hand-eye coordination for robotic grasping with deep learning and large-scale data collection,” _Int. J. Rob. Res._ , vol. 37, no. 4-5, pp. 421–436, 2018.
* [8] J. Mahler _et al._ , “Dex-net 2.0: Deep learning to plan robust grasps with synthetic point clouds and analytic grasp metrics,” _arXiv preprint arXiv:1703.09312_ , 2017.
* [9] M. Kopicki _et al._ , “One-shot learning and generation of dexterous grasps for novel objects,” _Int. J. Rob. Res._ , vol. 35, no. 8, pp. 959–976, 2016.
* [10] M. Adjigble _et al._ , “Model-free and learning-free grasping by local contact moment matching,” in _IEEE/RSJ Int. Conf. Intell. Rob. Sys._ , Oct 2018, pp. 2933–2940.
* [11] M. Kiatos, S. Malassiotis, and I. Sarantopoulos, “A geometric approach for grasping unknown objects with multifingered hands,” _IEEE Trans. Robot._ , 2020.
* [12] M. Sorour _et al._ , “Grasping unknown objects based on gripper workspace spheres,” in _IEEE/RSJ Int. Conf. Intell. Rob. Sys._ IEEE, 2019, pp. 1541–1547.
* [13] C. Eppner and O. Brock, “Grasping unknown objects by exploiting shape adaptability and environmental constraints,” in _IEEE/RSJ Int. Conf. Intell. Rob. Sys._ IEEE, 2013, pp. 4000–4006.
* [14] K. Charusta _et al._ , “Independent contact regions based on a patch contact model,” in _IEEE Int. Conf. Robot. Autom._ IEEE, 2012, pp. 4162–4169.
* [15] Q. Lei and M. Wisse, “Fast grasping of unknown objects using force balance optimization,” in _IEEE/RSJ Int. Conf. Intell. Rob. Sys._ IEEE, 2014, pp. 2454–2460.
* [16] C. de Farias _et al._ , “Simultaneous tactile exploration and grasp refinement for unknown objects,” _IEEE Robot. Autom. Lett._ , vol. 6, no. 2, pp. 3349–3356, 2021.
* [17] V. Lippiello _et al._ , “Visual grasp planning for unknown objects using a multifingered robotic hand,” _IEEE/ASME Trans. Mechatronics_ , vol. 18, no. 3, pp. 1050–1059, 2012.
* [18] A. H. Quispe _et al._ , “Exploiting symmetries and extrusions for grasping household objects,” in _IEEE Int. Conf. Robot. Autom._ IEEE, 2015, pp. 3702–3708.
* [19] G. Vezzani, U. Pattacini, and L. Natale, “A grasping approach based on superquadric models,” in _IEEE Int. Conf. Robot. Autom._ IEEE, 2017, pp. 1579–1586.
* [20] F. T. Pokorny, Y. Bekiroglu, and D. Kragic, “Grasp moduli spaces and spherical harmonics,” in _IEEE Int. Conf. Robot. Autom._ IEEE, 2014, pp. 389–396.
* [21] P. J. Kostelec and D. N. Rockmore, “Ffts on the rotation group,” _Journal of Fourier analysis and applications_ , vol. 14, no. 2, pp. 145–179, 2008.
* [22] B. Calli _et al._ , “The ycb object and model set: Towards common benchmarks for manipulation research,” in _Proc. Int. Conf. Adv. Robot. (ICAR)_. IEEE, 2015, pp. 510–517.
* [23] B. K. P. Horn, “Extended gaussian images,” _Proceedings of the IEEE_ , vol. 72, no. 12, pp. 1671–1686, 1984.
* [24] B. Lowekamp, P. Rheingans, and T. S. Yoo, “Exploring surface characteristics with interactive gaussian images (a case study),” in _IEEE Visualization Conference_. IEEE, 2002, pp. 553–556.
* [25] S. K. Nayar _et al._ , “Specular surface inspection using structured highlight and gaussian images.” _IEEE Trans. Robot. Autom._ , vol. 6, no. 2, pp. 208–218, 1990.
* [26] J. J. Little, “Extended gaussian images, mixed volumes, shape reconstruction,” in _First Annual Symposium on Computational geometry_ , 1985, pp. 15–23.
* [27] C. Müller, _Spherical harmonics_. Springer, 2006, vol. 17.
* [28] T. S. Cohen _et al._ , “Spherical cnns,” _arXiv preprint arXiv:1801.10130_ , 2018.
* [29] N. Marturi _et al._ , “Image-guided nanopositioning scheme for sem,” _IEEE Transactions on Automation Science and Engineering_ , vol. 15, no. 1, pp. 45–56, 2016.
* [30] E. Wigner, _Group theory: and its application to the quantum mechanics of atomic spectra_. Elsevier, 2012, vol. 5.
* [31] V.-D. Nguyen, “Constructing force-closure grasps,” _The International Journal of Robotics Research_ , vol. 7, no. 3, pp. 3–16, 1988.
* [32] M. Adjigble _et al._ , “An assisted telemanipulation approach: combining autonomous grasp planning with haptic cues,” in _IEEE/RSJ Int. Conf. Intell. Rob. Sys._ , 2019, pp. 3164–3171.
* [33] E. Coumans and Y. Bai, “Pybullet, a python module for physics simulation for games, robotics and machine learning,” 2016.
* [34] Y. Bekiroglu _et al._ , “Benchmarking protocol for grasp planning algorithms,” _IEEE Robot. Autom. Lett._ , vol. 5, no. 2, pp. 315–322, 2020\.
* [35] C. de Farias _et al._ , “Dual quaternion-based visual servoing for grasping moving objects,” _arXiv preprint arXiv:2107.08149_ , 2021. [Online]. Available: https://arxiv.org/abs/2107.08149
| arxiv-papers | 2021-07-26T21:48:46 | 2024-09-04T03:07:20.107479 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Maxime Adjigble, Cristiana de Farias, Rustam Stolkin, Naresh Marturi",
"submitter": "Naresh Marturi",
"url": "https://arxiv.org/abs/2107.12492"
} |
2107.12493 | # Strong Negative Electrothermal Feedback in Thermal Kinetic Inductance
Detectors
Shubh Agrawal [email protected] Department of Physics, California Institute
of Technology, Pasadena, CA, 91125, USA Bryan Steinbach [email protected]
Department of Physics, California Institute of Technology, Pasadena, CA,
91125, USA James J. Bock Department of Physics, California Institute of
Technology, Pasadena, CA, 91125, USA Jet Propulsion Lab, Pasadena, CA, 91109,
USA Clifford Frez Jet Propulsion Lab, Pasadena, CA, 91109, USA Lorenzo
Minutolo Department of Physics, California Institute of Technology, Pasadena,
CA, 91125, USA Hien Nguyen Jet Propulsion Lab, Pasadena, CA, 91109, USA
Roger O’Brient Jet Propulsion Lab, Pasadena, CA, 91109, USA Anthony Turner
Jet Propulsion Lab, Pasadena, CA, 91109, USA Albert Wandui Department of
Physics, California Institute of Technology, Pasadena, CA, 91125, USA
(August 27, 2024)
###### Abstract
We demonstrate strong negative electrothermal feedback accelerating and
linearizing the response of a thermal kinetic inductance detector (TKID).
TKIDs are a proposed highly multiplexable replacement to transition-edge
sensors and measure power through the temperature-dependent resonant frequency
of a superconducting microresonator bolometer. At high readout probe power and
probe frequency detuned from the TKID resonant frequency, we observe
electrothermal feedback loop gain up to $\mathcal{L}$ $\approx$ 16 through
measuring the reduction of settling time. We also show that the detector
response has no detectable non-linearity over a 38% range of incident power
and that the noise-equivalent power is below the design photon noise.
## I Introduction And Motivation
We present observations of strong negative electrothermal feedback in a
thermal kinetic inductance detector (TKID). TKIDs are cryogenic bolometers
that detect minute power fluctuations by measuring the temperature
fluctuations of a suspended absorber Ulbricht _et al._ (2015); Quaranta _et
al._ (2013); Arndt _et al._ (2017); Timofeev _et al._ (2014); Dabironezare
_et al._ (2018); Wernis (2013). The suspended absorber is connected to a
thermal bath with a weak thermal link so that the incident power and the
suspended absorber temperature are related approximately linearly. In a TKID,
the temperature rise is measured through the temperature dependence of the
kinetic inductance effect in a superconducting inductor on the suspended
absorber. The inductor is coupled to a capacitor to form a superconducting
microresonator, such that the incident power is measured by the change in the
resonant frequency. The resonant frequency is measured through the phase shift
of a readout probe signal, which normally is at a low enough power (much less
than the incident power which is being measured) such that the TKID dynamics
are not altered by the probe.
Negative electrothermal feedback occurs in bolometers when the power
dissipated in the temperature sensor has a negative temperature dependence.
Strong electrothermal feedback through Joule heating reduces non-linearities
and resolution limitations in voltage-biased transition-edge sensors Irwin
(1995). Feedback reduces Johnson noise in bolometers using resistive sensors
Mather (1982). In a detector with negative electrothermal feedback, dissipated
readout power decreases rapidly with increasing temperature, such that
temperature deviations from the operating point return to the mean more
rapidly. Total power flux is held nearly constant, as readout power
compensates for changes in incident power, which increases the linearity of
the bolometer. In the strong electrothermal feedback regime with transition-
edge bolometers, this effect reduces the time constant of the detector by an
order of magnitude Irwin and Hilton (2005). These benefits have led to
numerous applications for transition-edge sensors, where strong electrothermal
feedback produces fast, linear, and photon noise limited sensors for
millimeter-wave detection Anderson _et al._ (2020); Zhang _et al._ (2020);
Koopman _et al._ (2018) and X-ray calorimeters with eV energy resolution
Szypryt _et al._ (2019).
Lindeman Lindeman (2014) proposed a mechanism through which electrothermal
feedback would occur in a TKID when the frequency of the readout probe signal
was detuned from the resonant frequency. Detuning the probe frequency above
the TKID’s resonant frequency, an increase in temperature of the suspended
absorber decreases the resonant frequency due to an increase in kinetic
inductance, moving the resonant frequency further from the probe frequency.
This decreases the electrical power dissipated by the probe in the resonator,
which in turn decreases the temperature of the suspended absorber, resulting
in negative electrothermal feedback. The feedback can be strong in resonators
with high quality factors, as there is a large change in absorption of power
from the probe signal for a small change in resonant frequency. We demonstrate
that this feedback occurs in a TKID device of the design previously presented
and characterized at low readout power in Wandui et al Wandui _et al._ (2020)
and shown in Fig. 1.
Figure 1: SEM micrograph of the suspended absorber of a TKID of the design
used for this work. The gold resistor heater is seen on the left and the
meandered aluminum inductor is seen on the right. For more details on the
design of the TKID, see Wandui et al. Wandui _et al._ (2020)
### I.1 Modeling
We model the response of a TKID to probe signals of high power following the
schematic in Fig. 2. Probe power $P_{probe}$ enters port 1 of the transmission
line and is modulated by the resonant circuit, and some phase-shifted fraction
of it exits at port 2. Strong electrothermal feedback manifests as a non-
linear response to high probe powers reminiscent of the Duffing oscillator.
Similar behavior is observed in traditional hot quasiparticle kinetic
inductance detectors due to the non-linearity of kinetic inductance near the
superconducting critical current Swenson _et al._ (2013). To determine the
non-linear behavior of a TKID, we first solve for the stable non-linear
operating temperatures of the suspended absorber and then calculate the
strength of the electrothermal feedback from the relation between probe power
dissipation and absorber temperature.
Figure 2: Schematic and circuit diagram of the TKID. The suspended absorber,
as shown in Fig. 1, is enclosed in red. The blue arrows represent the power
fluxes into ($P_{opt}$ and $P_{abs}$) and out of ($P_{leg}$) the absorber and
the probe power along the transmission line ($P_{probe}$). Capacitors $C_{c}$
weakly couple the detector to the transmission line. The inductance L and
capacitance C form the TKID’s superconducting microresonator.
Incident power $P_{opt}$ plus the readout probe power dissipated in the
resonator $P_{abs}$ heat the suspended absorber. $P_{abs}$ is a fraction of
the probe power $P_{probe}$,
$P_{abs}=\frac{1}{2}\chi_{c}\chi_{g}P_{probe}.$ (1)
The dissipated probe power is limited by the coupling efficiency $\chi_{c}$ of
the resonator to the transmission line, and the detuning efficiency $\chi_{g}$
of the resonator to the probe frequency. We generalize $\chi_{c}$ to complex
coupling quality factors $Q_{c}$ with complex angle $\phi_{c}$ for asymmetric
resonances Khalil _et al._ (2012), where $x=(f-f_{r})/f_{r}$ is the
fractional frequency detuning and $Q_{i}$ and $Q_{r}$ are the internal and
total quality factors,
$\chi_{c}=\frac{4|Q_{c}|Q_{i}}{(|Q_{c}|+Q_{i}\cos(\phi_{c})^{2})},\quad\chi_{g}=\frac{1}{1+4Q_{r}^{2}x^{2}}.$
(2)
The fractional energy loss per cycle from the resonator $Q_{r}^{-1}$ is a
reciprocal sum of the absorption in the inductor $Q_{i}^{-1}$ and loss to the
transmission line $\Re\left[Q_{c}^{-1}\right]$,
$Q_{r}^{-1}=Q_{i}^{-1}+\Re\left[Q_{c}^{-1}\right].$ (3)
At low temperature, the resonant frequency is $f_{0}$. As the temperature
rises, the frequency shifts to $f_{r}$ due to the temperature dependence of
the kinetic inductance effect. We assume the superconductor follows Mattis-
Bardeen theory for a thin film in its frequency shift
$x_{MB}=(f_{r}-f_{0})/f_{0}$ and internal quality factor $Q_{i}$,
$x_{MB}=-\frac{\alpha_{k}S_{2}n_{qp}}{4N_{0}\Delta},$ (4)
$Q_{i}^{-1}=\frac{2N_{0}\Delta}{\alpha_{k}n_{qp}S_{1}},$ (5)
where $S_{1}$ and $S_{2}$ are the Mattis-Bardeen derived absorption and
frequency responses for a superconducting microresonator Zmuidzinas (2012).
$n_{qp}$ is the equilibrium quasiparticle density for a BCS superconductor at
suspended absorber temperature $T$ with gap $\Delta$ and density of states
$N_{0}$. For our aluminum films with critical temperature $T_{c}$, we use
$\Delta$ $\approx$ 1.75 $k_{B}T_{c}$ = 0.00015 eV/K $\times$ $T_{c}$ and
$N_{0}=1.72\times 10^{10}$ µm-3 eV-1. We use low temperature approximations to
the Mattis-Bardeen integrals for $n_{qp}$, $S_{2}$ and $S_{1}$,
$n_{qp}=2N_{0}\sqrt{2\pi
k_{B}T\Delta}\exp\Big{(}-\frac{\Delta}{k_{B}T}\Big{)},$ (6)
$S_{2}=1+\sqrt{\frac{2\Delta}{\pi
k_{B}T}}\exp\Big{(}-\frac{hf}{2k_{B}T}\Big{)}I_{0}\Big{[}\frac{hf}{2k_{B}T}\Big{]},$
(7) $S_{1}=\frac{2}{\pi}\sqrt{\frac{2\Delta}{\pi
k_{B}T}}\sinh\Big{(}\frac{hf}{2k_{B}T}\Big{)}K_{0}\Big{[}\frac{hf}{2k_{B}T}\Big{]}.$
(8)
The suspended absorber has a heat capacity $C(T)$ and is connected to a heat
sink at temperature $T_{bath}$ through a thermal conductance $G(T)$ =
$nK_{c}T^{n-1}$ = $\partial P_{leg}/\partial T$. The power transferred between
the suspended absorber and the heat sink is $P_{leg}$ =
$K_{c}(T^{n}-T_{\text{bath}}^{n})$.
The thermal energy in the suspended absorber changes at a rate equal to net
power entering and leaving the suspended absorber,
$C(T)\frac{dT}{dt}=-P_{leg}+P_{abs}+P_{opt}.$ (9)
The steady-state solutions for the temperature thus satisfy $P_{abs}(T)$ \+
$P_{opt}$ = $P_{leg}(T)$. In order to be a stable solution, we additionally
require $\partial(P_{abs}-P_{leg})/\partial T<0$, as otherwise a small
perturbation in temperature will grow exponentially away from equilibrium. We
show predicted stable temperature solutions for a range of probe powers in
Fig. 3.
Figure 3: Model predictions for suspended absorber temperature $T$ under slow
probe frequency sweeps. Different probe powers are shown in different colors.
Solid lines indicate the cold branch which is accessed through frequency up
sweeps; dashed segments show the hot branch which is accessed through
frequency down sweeps. Model parameters used are those for the device tested
in Section II.1.
Like the Duffing oscillator, at high probe powers, the response to probe
frequency sweeps splits into two stable branches. The stable branches are a
cold branch with weak positive electrothermal feedback and a hot branch with
strong negative electrothermal feedback. A third unstable branch exists at an
intermediate temperature and experiences strong positive electrothermal
feedback, so small perturbations grow rapidly away from equilibrium. We
neglect this unstable solution, which is inaccessible to our experimental
setup.
Qualitatively, we explain the extended hot branch and the lower bifurcation
frequency in Fig. 3 as follows. If the probe frequency starts above the
resonant frequency, we dissipate a small amount of power in the resonator that
pushes its frequency slightly down. As we lower the probe frequency and have
it approach the resonant frequency, the dissipated power grows, so the
resonant frequency is further pushed down. The frequency gap must continue to
close for the dissipated power to grow, so $\chi_{g}$ increases. Eventually,
the frequency gap shrinks to zero, and the dissipated power is maximized. At
this point, any further decrease in probe frequency decreases the dissipated
power, and the resonant frequency begins rising and bifurcates back to the
cold branch, leaving the probe frequency well below the resonant frequency.
We term these sweeps described above, where the probe frequency is stepped
down slowly in small decrements, as “down sweeps”. “Up sweeps” are where we
step the probe frequency up slowly in small increments, and these exhibit
positive electrothermal feedback. In up sweeps, the probe frequency starts
lower than the resonance frequency, and as power is dissipated in the
resonator and positive electrothermal feedback becomes significant, the
resonant frequency is pulled down and bifurcates to below the probe frequency.
Non-linear kinetic inductance Swenson _et al._ (2013) and quasiparticle
heating Thomas, Withington, and Goldie (2015); Guruswamy _et al._ (2017)
could produce similar non-linearities in our devices, without producing useful
electrothermal feedback that speeds up the time constant or linearizes the
response. In the case of non-linear kinetic inductance, as the current in the
inductor approaches the critical current, the inductance increases, and the
resonant frequency decreases, mimicking electrothermal feedback from the
perspective of the probe. We minimize the impact of non-linear kinetic
inductance in our setup by operating the TKID at higher temperatures, where it
has strong responsivity, and therefore relatively low quality factors
($\approx$ 10,000) and low current densities in the superconducting film.
Quasiparticle heating can also produce electrothermal feedback internal to the
quasiparticle population, but without any useful reduction in the time
constant. Quasiparticle heating is reduced due to our large volume inductor,
which maximizes the thermal conductance between the quasiparticles and the
phonons in the superconducting film. The quasiparticle to phonon thermal
conductance also benefits from high temperatures, where the quasiparticle
density is high and the quasiparticle lifetime is short.
### I.2 Loop Gain and Time Constant
We model the dynamics of small perturbations in temperature by linearizing Eq.
9. We Taylor expand $P_{leg}=P_{leg}^{0}+GT$ where $G=(\partial P_{leg})/T$,
$P_{abs}=P_{abs}^{0}-G_{ETF}T$, where $G_{ETF}=(\partial P_{abs})/{T}$, and
where $T$ now refers to a small perturbation in temperature from the
equilibrium. With these substitutions the linearized version of Eq. 9 becomes
$C\frac{dT}{dt}=-(G+G_{ETF})T+P_{opt}(t).$ (10)
Following the convention for transition-edge sensors Irwin and Hilton (2005),
we define loop gain as $\mathcal{L}=G_{ETF}/G$. Loop gain measures how
strongly electrothermal feedback forces the temperature of the bolometer back
to equilibrium, relative to the forcing due to the thermal link. Negative
electrothermal feedback corresponds to positive loop gain due to the minus
sign in the definition of $G_{ETF}$. Solving the $P_{opt}(t)$ step response of
Eq. 10 leads to the time constant for the bolometer
$\tau_{ETF}=\frac{1}{\mathcal{L}+1}\frac{C}{G}=\frac{1}{\mathcal{L}+1}\tau_{0},$
(11)
where $\tau_{0}=C/G$ is the intrinsic bolometer thermal time constant.
The effective electrothermal feedback $G_{ETF}$ is the derivative of $P_{abs}$
with temperature, which from Eq. 1 is
$G_{ETF}=P_{abs}^{\prime}(T)=\frac{1}{2}(\chi_{c}^{\prime}(T)\chi_{g}(T)+\chi_{c}(T)\chi_{g}^{\prime}(T))P_{probe}.$
(12)
To estimate loop gain in the strong negative electrothermal feedback regime,
the term $\chi_{c}^{\prime}(T)$ can be neglected, because it is temperature-
dependent only through the internal quality factor, while
$\chi_{g}^{\prime}(T)$ is temperature-dependent through resonator frequency
shifts. At the low probe frequencies of interest for TKIDs, the frequency
shift effects are more significant than quality factor shifts by typically
about an order of magnitude. We additionally assume that $Q_{r}^{\prime}(T)$
is zero in $\chi_{g}^{\prime}(T)$. Then, the temperature dependence of
$G_{ETF}$ is contained in
$\chi_{g}^{\prime}(T)=-8Q_{r}^{2}\chi_{g}(T)^{2}x(T)x^{\prime}(T).$ (13)
The fractional frequency offset between probe and resonator that maximizes
$\chi_{g}^{\prime}(T)$ is
$\hat{x}=\frac{1}{Q_{r}\sqrt{12}}.$ (14)
At this detuning (where the probe is between one-quarter and one-third of a
linewidth above the resonant frequency), the power absorbed is
$\hat{P}_{abs}=\frac{3}{8}\chi_{c}P_{probe}.$ (15)
The loop gain at optimal detuning $\hat{\mathcal{L}}$ can be expressed in
terms of $\beta=S_{2}/S_{1}$, $\kappa=\partial\log n_{qp}\Big{/}\partial\log
T$. We additionally define $\alpha=\sqrt{3}\beta\kappa/4$, in order to put the
expression of the loop gain of a TKID into the same form as the loop gain of a
transition-edge sensorIrwin and Hilton (2005):
$\hat{\mathcal{L}}=\frac{\alpha P_{abs}}{GT}.$ (16)
### I.3 Noise Model
The intrinsic noise of a TKID contains contributions from three sources:
thermal fluctuations in the suspended absorber due to the exchange of phonons
in the weak thermal link, quasiparticle number density fluctuations in the
superconductor due to thermal generation and recombination of quasiparticles,
and readout noise from the low noise amplifier Wandui _et al._ (2020). When
the TKID is operated in the strong electrothermal feedback regime, we expect a
significant change in the phonon noise and small changes in generation
recombination noise and readout noise. We expect our devices to be strongly
phonon noise limited. The phonon noise contribution to the noise-equivalent
power of the detector,
$NEP_{\text{phonon}}=\sqrt{4k_{B}T^{2}G\gamma},$ (17)
includes $\gamma\approx 0.5$, a factor that accounts for the lower temperature
of the thermal bathMather (1982). Phonon noise will generally increase due to
an increase in the total thermal power in the legs. A typical operating
condition for transition-edge sensors is setting dissipated readout power
equal to the incident power; for this setup, the phonon noise increases by a
factor of $\sqrt{2}$ if the detector thermal conductance $G$ is re-optimized
to fix the suspended absorber temperature.
Changes in the quasiparticle generation recombination noise should be limited
by the large volume of our inductor, as the quasiparticle population is in
thermal equilibrium with the phonons in the suspended absorber. The readout
noise should not vary much, because the decrease in coupling efficiency from
detuning is compensated for by the increase in readout power, such that the
absolute responsivity $P_{probe}$ $\times$ ${dS_{21}}/{dP_{opt}}$ is only
weakly dependent on probe power in the strong electrothermal feedback regime.
We also expect an additional source of frequency-dependent noise due to finite
thermal conductance within the suspended absorber and distributed heat
capacity. This effect is observed in transition-edge sensors at high loop
gains Lee _et al._ (1998), manifesting as a rise in noise beyond the
intrinsic thermal bandwidth of the suspended absorber. Our suspended absorber
is approximately 300 nm thick, much thinner than the 1000 nm thick absorbers
where we have observed this effect in transition-edge sensors Kernasovskiy
(2020). This reduces the thermal conductance within the absorber which is
limited by the cross-sectional area of the suspended absorber, due to the
phonon analog of the Stefan-Boltzmann law.
## II Results and Discussion
We studied a single TKID at high readout probe powers using the cryostat
described in Wandui et al Wandui _et al._ (2020) and the software-defined
radio system described in Minutolo et al Minutolo _et al._ (2019). To deposit
incident power $P_{opt}$ that is free of photon noise, we supplied DC to the
gold heater resistor visible in Fig. 1 on the suspended absorber. The nominal
incident power used in our experiments is $P_{opt}$ = 3.75 pW which brings the
aluminum inductor to a temperature $T\approx 0.33K$ where it has useful
responsivity.
### II.1 TKID Characterization
To characterize the TKID resonator at low readout probe power, we obtained
transmission $S_{21}$ measurements by biasing the detector at a fixed probe
power $P_{probe}$ = $0.1$ pW and sweeping the probe frequency $f$ over 2001
equally-spaced points between $312.5$ MHz and $319$ MHz. We repeated this for
10 different values of bath temperature $T_{bath}$ between 114 mK and 439 mK.
A least-squares fit of the $S_{21}$ curves to Eq. 18 gives us the resonant
frequency $f_{r}$ dependent on $T_{bath}$, which when fitted using Eqs. 4, 6,
and 7, estimates $|Q_{c}|$ $\approx$ 13500, $\phi_{c}$ $\approx$ 0.3, $T_{c}$
= 1.32 $\pm$ 0.01 K, and $\alpha_{k}$ = 0.50 $\pm$ 0.03.
With the resonator now calibrated as a thermometer, we characterize the weak
thermal link by sweeping the incident power $P_{opt}$ in 31 steps between 0
and 23.4 pW with $T_{bath}=$ 186 mK. Least-squares fits to the responses
determines the dependence of $f_{r}$ on $P_{opt}$. The approximation $P_{opt}$
$\approx$ $P_{leg}$ in Eqs. 9 and 1 gave us $f_{0}$ = 317.889 $\pm$ 0.005 MHz,
$K_{c}$ = 185 $\pm$ 3 pW / Kn, and $n$ = 3.23 $\pm$ 0.02. Our value of
$n\approx 3$ is consistent with similar bolometers with thin silicon nitride
support legs used in BICEP/Keck Wandui _et al._ (2020).
### II.2 Non-linear $S_{21}$ curves
We measured non-linear $S_{21}$ by biasing the detector at a range of fixed
probe powers $P_{probe}$ and performing both up and down sweeps, over 3000
equally-spaced probe frequencies $f$ between $316$ MHz and $318.4$ MHz. The
bath temperature was regulated to 186 mK, and we fixed the incident power at
$P_{opt}=$ 3.75 pW. The predicted $S_{21}$ is given by
$S_{21}(f)=1-\frac{Q_{r}}{Q_{c}}\frac{1}{1+j2Q_{r}x},$ (18)
where $Q_{r}$ and $x$ are determined by solving for the stable suspended
absorber temperature as described in Section I.1.
(a) Up Sweeps: Frequency stepped up in gradual increments.
(b) Down Sweeps: Frequency stepped down in gradual decrements.
Figure 4: Crosses show the measured $S_{21}$ magnitude plotted against
frequency; model predictions are given by lines. Insets show measured $S_{21}$
phase. Strong hysteresis is seen at probe powers of the order of a few pW,
when $P_{probe}$ is comparable to $P_{opt}$.
Fig. 4 shows the measured and predicted $S_{21}$ frequency sweeps when probe
power at the chip is $0.5$ pW, $5$ pW, and $8$ pW. Directional hysteresis is
absent at 0.5 pW but shows up strongly at 5 and 8 pW. For frequency down
sweeps at the higher probe powers, the resonance frequency is pushed down as
predicted by the negative electrothermal feedback model. At the highest probe
power setting with $P_{probe}$ = 8 pW, we observed that the lower bifurcation
frequency of the hysteresis branch deviates by a few MHz from the resonance
frequency obtained at low probe power.
### II.3 Speed of Response
Figure 5: Measured $S_{21}$ step responses to a small change in incident
power at low (blue) and high (orange) probe power, averaged over $\approx 10$
periods shown in dotted lines. Solid lines show the fit to the exponential
decay at this edge of the applied $P_{opt}$ square wave. For clarity, the data
are scaled and shifted along the $y$-axis, such that the response range for
both is $(0,1]$. At high probe power, the time for $S_{21}$ to reach a steady
state is reduced dramatically due to strong negative electrothermal feedback.
We measured bolometer time constants on the hot branch at probe powers ranging
from 0.05 pW to 8 pW. We applied probe signals at frequencies $f$ between
317.0 MHz and 318.0 MHz spaced by 50 kHz to the detector with bath temperature
regulated to $T_{bath}$ = 186 mK. The incident power pulses with a 34 pW
square impulse several time constants wide (0.05 s) to bias the detector into
the hot branch. After the pulse, the incident power oscillates in a 1.92 Hz
square wave between 3.65 and 3.85 pW. We recorded $S_{21}$ for 5 s intervals
at a sample rate of 20 kHz. Stacked $S_{21}$ traces at low and high negative
electrothermal feedback are shown in Fig. 5. Fitting the exponential decay of
detector response $S_{21}$ at the edge of the applied square wave estimates
the time constant $\tau$. This gives us the loop gain $\mathcal{L}$ by Eq. 11.
Figure 6: Measured loop gains plotted against probe frequency (in MHz) at
incident power $P_{opt}=$ 3.75 pW and a range of probe powers $P_{probe}$.
Measured data points are connected by dotted lines; solid lines give model
predictions between the two bifurcation frequencies. Higher values of
$\mathcal{L}$ are obtained at higher probe powers in good agreement with
predictions.
We show the observed loop gain as a function of probe frequency and power,
along with our model predictions, in Fig. 6. The highest value $\mathcal{L}$ =
15.7 $\pm$ 1.3 observed was at $P_{probe}$ = 8 pW and $f$ = 317.45 MHz. Our
model slightly underestimates the speed up of the bolometer time constant,
which will be investigated in future work.
### II.4 Linearity of Response
To measure linearity in the strong negative electrothermal feedback regime, we
biased the TKID with $P_{probe}$ = 5.12 pW, $f$ = 317.65 MHz while regulating
the bath temperature to $T_{bath}$ = 186 mK, where loop gain was previously
measured to be $\mathcal{L}$ $\approx$ 10 at $P_{opt}$ = 3.75 pW. We swept
incident power $P_{opt}$ over a wide range, from which we select a region from
3.5 pW to 4.9 pW (or 8% below and 30% above the nominal 3.75 pW) where the
response is highly linear. The top panel of Fig. 7 shows the detector response
to the incident power sweep in $S_{21}$ phase. We fitted this response to a
linear model, as shown in the two panels of Fig. 7. The residuals (lower
panel) are dominated by measurement noise and indicate linearity better than
0.1% in this operational range.
Figure 7: Above, the response of the detector in $S_{21}$ phase over a range
of incident power in red, along with a linear fit in blue. Below, the binned
residual difference between data and linear fit, giving a reduced $\chi^{2}$
$\approx$ 2.
### II.5 NEP Measurements
We measured the noise-equivalent power (NEP) of the TKID over a range of probe
frequencies and powers. As in the time constant measurements, we biased the
detector into the hot branch by pulsing the incident power after applying the
probe signal. The NEP amplitude spectrum, shown in Fig. 8 for $P_{probe}$ =
5.12 pW and $f$ = 317.65 MHz, rises at kHz frequencies, suggestive of internal
thermal resistance and multiple decoupled heat capacities discussed in Section
I.3.
Figure 8: Noise-equivalent Power (NEP) amplitude spectrum for $P_{probe}$ =
5.12 pW, $f$ = 317.65 MHz and $P_{opt}$ = 3.75 pW on the hot branch. The blue
curve shows thermal noise (in the direction in the complex plane that changing
incident power changes $S_{21}$), while the yellow curve gives readout noise
(in the orthogonal direction).
We suspect common-mode environmental noise, likely from thermal fluctuations
or RF-interference susceptibility that are detector-detector correlated, to be
responsible for the higher noise amplitude between 10 - 30 Hz and the 1/$f$
knee at $\approx$ 10 Hz Wandui _et al._ (2020). We did not implement a pair
differencing scheme that would remove common-mode noise to obtain the results
shown in Fig. 8. These methods have been previously proven effective on a
small array of detectors, achieving phonon-limited NEPs with a 1/$f$ knee at
$\approx$ 0.1 Hz for the same design Wandui _et al._ (2020).
Fig. 9 shows the NEP at all measured probe powers and frequencies. The NEP is
averaged over 10 - 30 Hz to minimize the impact of the excess low-frequency
noise and the rise in kHz high-frequency noise. There is a probe frequency at
all probe powers that achieves a NEP of 25 aW/rtHz. This is below the intended
photon noise of 38 aW/rtHz, but well above the expected phonon noise of 14
aW/rtHz. We believe that the NEP is limited by environmental noise, as we have
observed phonon-limited noise with much lower 1/$f$ knees in a TKID of the
same design in a different testbed Wandui _et al._ (2020).
Figure 9: NEP at several probe fixed signals $P_{probe}$ and $f$ on the
negative electrothermal feedback hot branch.
## III Conclusion
We have demonstrated negative electrothermal feedback in a TKID biased at
readout probe powers comparable to the design incident power through the
speed-up in bolometer response time. The maximum speed-up we observed was a
factor of $\tau_{0}/\tau$ = 16.7 $\pm$ 1.3 at $P_{probe}$ = 8 pW and $P_{opt}$
= 3.75 pW.
At a bias of $P_{probe}$ = 5.12 pW, we observed a highly linear response in
phase $\phi_{S_{21}}$ for $P_{opt}$ = 3.5 - 4.9 pW. We also provide noise-
equivalent power (NEP) measurements of the detector which demonstrate that the
noise performance remains comparable to nominal TKID values when they are
biased at low probe powers. Our NEP measurements do not reach the phonon noise
floor, so we cannot yet rule out whether high probe power operation introduces
additional noise at the 15 aW/rtHz level.
In this work, we operated only a single detector in the negative
electrothermal feedback regime. As the TKID is intended to be a multiplexable
detector, it remains to be seen what the practical implication of high probe
power operation is on multiplexing. We anticipate an increase in the dynamic
range requirement of the readout due to the decrease in responsivity relative
to the probe power. Additionally, moving resonators with probe power can
impact resonator collisions.
We see hints of the internal thermal structure to the detector in our NEP
measurements, manifesting as a characteristic rise at high frequency. We
intend to measure the incident power to $S_{21}$ transfer function in the
frequency domain to clarify the internal thermal structure of the TKID. The
results presented here indicate that operating the detector with high
electrothermal feedback does not degrade the noise in single devices; we leave
further noise performance tests using common-mode noise removal to future
work.
The increase in speed due to negative electrothermal feedback could allow
TKIDs to be practical in low incident power applications such as in narrow
bandwidth line intensity mapping spectrometers, where low thermal conductance
would lead to the TKID being otherwise too slow. The increase in speed could
also be useful in calorimeters, where energy resolution is inversely
proportional to the square root of the loop gain Irwin and Hilton (2005).
###### Acknowledgements.
Our work was carried out at the Jet Propulsion Laboratory, Caltech, under
contract from the National Aeronautics and Space Administration. We thank Mark
Lindeman and Jonas Zmuidzinas for insightful discussion. Shubh Agrawal’s work
was supported by the Dr. Gary Stupian SURF Fellowship.
## Data Availability
The data that support the findings of this study are available from the
corresponding author upon reasonable request.
## References
* Ulbricht _et al._ (2015) G. Ulbricht, B. A. Mazin, P. Szypryt, A. B. Walter, C. Bockstiegel, and B. Bumble, Applied Physics Letters 106, 251103 (2015), publisher: American Institute of Physics.
* Quaranta _et al._ (2013) O. Quaranta, T. Cecil, L. Gades, B. Mazin, and A. Miceli, Superconductor Science and Technology 26, 105021 (2013), arXiv: 1304.3387.
* Arndt _et al._ (2017) M. Arndt, S. Wuensch, C. Groetsch, M. Merker, G. Zieger, K. Peiselt, S. Anders, H.-G. Meyer, and M. Siegel, IEEE Transactions on Applied Superconductivity 27, 1 (2017).
* Timofeev _et al._ (2014) A. V. Timofeev, V. Vesterinen, P. Helistö, L. Grönberg, J. Hassel, and A. Luukanen, Superconductor Science Technology 27, 025002 (2014).
* Dabironezare _et al._ (2018) S. O. Dabironezare, J. Hassel, E. Gandini, L. Grönberg, H. Sipola, V. I. Vesterinen, and N. Llombart, IEEE Transactions on Terahertz Science and Technology 8 (2018), 10.1109/TTHZ.2018.2873973.
* Wernis (2013) R. A. Wernis, _Characterizing a Resonator Bolometer Array_ , Senior Thesis (Major), California Institute of Technology (2013).
* Irwin (1995) K. D. Irwin, Applied Physics Letters 66, 1998 (1995).
* Mather (1982) J. C. Mather, Applied Optics 21, 1125 (1982), publisher: Optical Society of America.
* Irwin and Hilton (2005) K. D. Irwin and G. C. Hilton, Cryogenic Particle Detection 99, 63 (2005), iSBN: 9783540201137.
* Anderson _et al._ (2020) A. J. Anderson, P. A. R. Ade, Z. Ahmed, J. S. Avva, P. S. Barry, R. B. Thakur, A. N. Bender, B. A. Benson, L. Bryant, K. Byrum, J. E. Carlstrom, F. W. Carter, T. W. Cecil, C. L. Chang, H.-M. Cho, J. F. Cliche, A. Cukierman, T. de Haan, E. V. Denison, J. Ding, M. A. Dobbs, D. Dutcher, W. Everett, K. R. Ferguson, A. Foster, J. Fu, J. Gallicchio, A. E. Gambrel, R. W. Gardner, A. Gilbert, J. C. Groh, S. T. Guns, R. Guyser, N. W. Halverson, A. H. Harke-Hosemann, N. L. Harrington, J. W. Henning, G. C. Hilton, W. L. Holzapfel, D. Howe, N. Huang, K. D. Irwin, O. B. Jeong, M. Jonas, A. Jones, T. S. Khaire, A. M. Kofman, M. Korman, D. L. Kubik, S. Kuhlmann, C.-L. Kuo, A. T. Lee, E. M. Leitch, A. E. Lowitz, S. S. Meyer, D. Michalik, J. Montgomery, A. Nadolski, T. Natoli, H. Nguyen, G. I. Noble, V. Novosad, S. Padin, Z. Pan, P. Paschos, J. Pearson, C. M. Posada, W. Quan, A. Rahlin, D. Riebel, J. E. Ruhl, J. T. Sayre, E. Shirokoff, G. Smecher, J. A. Sobrin, A. A. Stark, J. Stephen, K. T. Story, A. Suzuki, K. L. Thompson, C. Tucker, L. R. Vale, K. Vanderlinde, J. D. Vieira, G. Wang, N. Whitehorn, V. Yefremenko, K. W. Yoon, and M. R. Young, Journal of Low Temperature Physics 199, 320 (2020).
* Zhang _et al._ (2020) C. Zhang, P. a. R. Ade, Z. Ahmed, M. Amiri, D. Barkats, R. B. Thakur, C. A. Bischoff, J. J. Bock, H. Boenish, E. Bullock, V. Buza, J. Cheshire, J. Connors, J. Cornelison, M. Crumrine, A. Cukierman, M. Dierickx, L. Duband, S. Fatigoni, J. P. Filippini, G. Hall, M. Halpern, S. Harrison, S. Henderson, S. R. Hildebrandt, G. C. Hilton, H. Hui, K. D. Irwin, J. Kang, K. S. Karkare, E. Karpel, S. Kefeli, J. M. Kovac, C. L. Kuo, K. Lau, K. G. Megerian, L. Moncelsi, T. Namikawa, H. T. Nguyen, R. O’Brient, S. Palladino, N. Precup, T. Prouvé, C. Pryke, B. Racine, C. D. Reintsema, S. Richter, A. Schillaci, B. Schmitt, R. Schwarz, C. D. Sheehy, A. Soliman, T. S. Germaine, B. Steinbach, R. V. Sudiwala, K. L. Thompson, C. Tucker, A. D. Turner, C. Umiltà, A. G. Vieregg, A. Wandui, A. C. Weber, D. V. Wiebe, J. Willmert, W. L. K. Wu, E. Yang, K. W. Yoon, E. Young, and C. Yu, Journal of Low Temperature Physics 199, 968 (2020).
* Koopman _et al._ (2018) B. J. Koopman, N. F. Cothard, S. K. Choi, K. T. Crowley, S. M. Duff, S. W. Henderson, S. P. Ho, J. Hubmayr, P. A. Gallardo, F. Nati, M. D. Niemack, S. M. Simon, S. T. Staggs, J. R. Stevens, E. M. Vavagiakis, and E. J. Wollack, Journal of Low Temperature Physics 193, 1103 (2018).
* Szypryt _et al._ (2019) P. Szypryt, G. C. O’Neil, E. Takacs, J. N. Tan, S. W. Buechele, A. S. Naing, D. A. Bennett, W. B. Doriese, M. Durkin, J. W. Fowler, J. D. Gard, G. C. Hilton, K. M. Morgan, C. D. Reintsema, D. R. Schmidt, D. S. Swetz, J. N. Ullom, and Y. Ralchenko, Review of Scientific Instruments 90, 123107 (2019), publisher: American Institute of Physics.
* Lindeman (2014) M. A. Lindeman, Journal of Applied Physics 116, 024506 (2014).
* Wandui _et al._ (2020) A. Wandui, J. Bock, C. Frez, M. Hollister, L. Minutolo, H. Nguyen, B. Steinbach, A. Turner, J. Zmuidzinas, and R. O’Brient, Journal of Applied Physics 128, 044508 (2020), arXiv: 2001.08887.
* Swenson _et al._ (2013) L. J. Swenson, P. K. Day, B. H. Eom, H. G. Leduc, N. Llombart, C. M. McKenney, O. Noroozian, and J. Zmuidzinas, Journal of Applied Physics 113, 104501 (2013).
* Khalil _et al._ (2012) M. S. Khalil, M. J. A. Stoutimore, F. C. Wellstood, and K. D. Osborn, Journal of Applied Physics 111, 054510 (2012).
* Zmuidzinas (2012) J. Zmuidzinas, Annual Review of Condensed Matter Physics 3, 169 (2012).
* Thomas, Withington, and Goldie (2015) C. N. Thomas, S. Withington, and D. J. Goldie, Superconductor Science and Technology 28, 045012 (2015), publisher: IOP Publishing.
* Guruswamy _et al._ (2017) T. Guruswamy, C. N. Thomas, S. Withington, and D. J. Goldie, Superconductor Science and Technology 30, 064006 (2017), publisher: IOP Publishing.
* Lee _et al._ (1998) S.-F. Lee, J. M. Gildemeister, W. Holmes, A. T. Lee, and P. L. Richards, Applied Optics 37, 3391 (1998), publisher: Optical Society of America.
* Kernasovskiy (2020) S. Kernasovskiy, _Measuring the polarization of the cosmic microwave background with the Keck Array and BICEP2_ , Ph.D. thesis, Stanford University (2020).
* Minutolo _et al._ (2019) L. Minutolo, B. Steinbach, A. Wandui, and R. O’Brient, IEEE Transactions on Applied Superconductivity 29, 1 (2019).
| arxiv-papers | 2021-07-26T21:50:49 | 2024-09-04T03:07:20.120535 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Shubh Agrawal, Bryan Steinbach, James J. Bock, Clifford Frez, Lorenzo\n Minutolo, Hien Nguyen, Roger O'Brient, Anthony Turner, Albert Wandui",
"submitter": "Shubh Agrawal",
"url": "https://arxiv.org/abs/2107.12493"
} |
2107.12499 | # CalCROP21: A Georeferenced multi-spectral dataset of Satellite Imagery and
Crop Labels
Rahul Ghosh [email protected] University of MinnesotaMinneapolisMNUSA ,
Praveen Ravirathinam [email protected] University of MinnesotaMinneapolisMNUSA
, Xiaowei Jia [email protected] University of PittsburghPittsburghPAUSA ,
Ankush Khandelwal [email protected] University of MinnesotaMinneapolisMNUSA ,
David Mulla [email protected] University of MinnesotaSt. PaulMNUSA and Vipin
Kumar [email protected] University of MinnesotaMinneapolisMNUSA
(2021)
###### Abstract.
Mapping and monitoring crops is a key step towards sustainable intensification
of agriculture and addressing global food security. A dataset like ImageNet
that revolutionized computer vision applications can accelerate development of
novel crop mapping techniques. Currently, the United States Department of
Agriculture (USDA) annually releases the Cropland Data Layer (CDL) which
contains crop labels at 30m resolution for the entire United States of
America. While CDL is state of the art and is widely used for a number of
agricultural applications, it has a number of limitations (e.g., pixelated
errors, labels carried over from previous errors and absence of input imagery
along with class labels). In this work, we create a new semantic segmentation
benchmark dataset, which we call CalCROP21, for the diverse crops in the
Central Valley region of California at 10m spatial resolution using a Google
Earth Engine based robust image processing pipeline and a novel attention
based spatio-temporal semantic segmentation algorithm STATT. STATT uses re-
sampled (interpolated) CDL labels for training, but is able to generate a
better prediction than CDL by leveraging spatial and temporal patterns in
Sentinel2 multi-spectral image series to effectively capture phenologic
differences amongst crops and uses attention to reduce the impact of clouds
and other atmospheric disturbances. We also present a comprehensive evaluation
to show that STATT has significantly better results when compared to the
resampled CDL labels. We have released the dataset and the processing pipeline
code for generating the benchmark dataset.
††copyright: acmcopyright††journalyear: 2021††doi: 10.1145/1122445.1122456
## 1\. Introduction
With the rise in world’s population, food supplies must scale up to keep pace
with the growing demand. Hence it is critical to ensure that farm lands are
being used efficiently from an environmental perspective. In particular,
mapping and monitoring crops is a key step towards forecasting yield, guiding
sustainable management practices, measuring the loss of productive cropland
due to urbanization and evaluating progress in conservation efforts.
In the United States, the Department of Agriculture’s (USDA) Cropland Data
Layer (CDL) provides a publicly available land-cover classification map
annually at 30m resolution which includes major crop commodities for the
conterminous United States (CONUS) (Boryan et al., 2011). CDL product has
driven the advancement of research in areas ranging from agricultural
sustainability studies (Hartz et al., 2011; Fitzgerald and Zimmerman, 2013),
to environmental issues (Belden et al., 2012; Cibin et al., 2012), land
conversion assessments (Wright and Wimberly, 2013; Rashford et al., 2013),
crop rotations (Plourde et al., 2013; Boryan et al., 2012), farmer surveys
(Painter et al., 2013) and many more (CDL, 2021). While CDL is the state-of-
the-art spatially explicit identification product for crops, it has a number
of limitations (Reitsma et al., 2015; Pritsolas and Pearson, [n.d.]). First,
the CDL is created using a pixel based classification algorithm and hence
contains pixelated errors in crop labels. Second, each pixel is not updated
every year and labels for some pixels are borrowed from previous years which
sometimes leads to incorrect labels. Third, CDL is known to have low accuracy
in classifying many minor crops such as alfalfa, hay, tree crops, and many
vegetable crops (Lark et al., 2021). Finally, CDL labels are created using
Landsat images, which are at 30m resolution, leading to mixed pixels errors.
The Sentinel constellation provides images at a finer resolution (10m) and
more frequent temporal scale (5days vs 15 days) and thus offers the
possibility of creating crop labels at 10m resolution.
The success of deep learning in solving highly complex tasks in the field of
computer vision and natural language processing can be attributed to the
availability of large datasets such as ImageNet (Deng et al., 2009) and
computational resources. These large datasets are essential for the
generalization of such deep learning methods. Indeed advances in Earth
observation technologies have led to the collection of vast amount of accurate
and reliable remote sensing (RS) data that provide tremendous potential to
create similar large scale datasets for mapping crops over large regions. For
example, several large-scale remote sensing datasets have been created for
similar land cover mapping tasks (Yang and Newsam, 2010; Basu et al., 2015;
Penatti et al., 2015; Helber et al., 2017; Sumbul et al., 2019; Maggiori et
al., 2017; Demir et al., 2018; Schmitt et al., 2019). However, these datasets
cannot be directly used for crop mapping for several reasons. First, existing
large-scale RS datasets mostly provide a single view of the earth’s surface in
time. As highlighted in previous literature (Ghosh et al., 2021b), the
distribution and growth of crops commonly exhibit special spatio-temporal
patterns, e.g., the contiguous nature of crop fields and temporal/seasonal
patterns due to their unique crop phenology. Hence, these datasets are not
designed for effective crop mapping using spatial and temporal data patterns.
Moreover, these large scale datasets are either limited (Ghosh et al., 2021a)
in the number of categories (i.e limited number of classes that do not cover
many important crop types) (Demir et al., 2018) or lack in the spatial
resolution (e.g. single label assigned to entire image) (Sumbul et al., 2019).
To overcome the limitations of existing RS datasets and to facilitate deep
learning research in RS-based crop mapping, this paper presents a new semantic
segmentation benchmark dataset for crops, CalCROP21. Specifically, the input
images were created using a Google Earth Engine based robust image processing
pipeline on the multi-spectral temporal images collected by the Sentinel-2
constellation in the Central Valley of California in 2018. A novel spatio-
temporal semantic segmentation (Ghosh et al., 2021b) method was used to
generate better quality labels using resampled CDL as initial labels. This
efficacy of the methodology relies on several key assumptions. First, the
noisy coarse resolution CDL labels are still of good enough quality to be used
for training a classifier. Second, a classifier that makes use of space and
time is more effective in dealing with the training label noise than one that
ignores such information. Third, labels at the geographical farm boundaries
can be mixed and their labels at the coarse resolution are not trustworthy,
whereas labels at the interior of a region are likely to be more confident.
To summarize, our contributions in this paper are as follows:
* •
This dataset is a first large scale semantic segmentation dataset that
includes both input images as well as labels for a diverse array of crops at
10m resolution. Specifically, each pixel in the image is labeled as one of 21
crop or 7 other classes.
* •
We improve the quality of the resampled CDL labels for these classes using a
novel spatio-temporal deep learning method based on the phenotypic differences
among crops with Sentinel images at multiple time steps.
* •
We validate the quality of the labels via a detailed quantitative and
qualitative evaluation.
* •
We provide the processing pipeline code for further use by the community in
collecting images and generating results for a different year and using
different temporal frequency.
* •
With some small edits, this pipeline can be used to produce similar results
for any other part of the US or the world (assuming some initial labels are
available even at a coarse resolution).
## 2\. Related Works
Several such benchmark datasets are available for land use and land cover
(LULC) mapping. They can be divided into multiple categories based on their
downstream tasks, a) object recognition (Xia et al., 2018), b) image
classification (Yang and Newsam, 2010; Basu et al., 2015; Penatti et al.,
2015; Helber et al., 2017; Sumbul et al., 2019) and c) semantic segmentation
(Maggiori et al., 2017; Demir et al., 2018; Schmitt et al., 2019). These
datasets do not have sufficient granularity to enable scientific advances in
crop mapping using deep learning. First, they provide labels that cover a very
small number of categories. Second, due to the use of overhead aerial imagery
which only captures limited number of bands as compared to satellites which
can capture a vast array of bands and thus help in distinguishing between
crops. Unlike image classification task which only provides presence of a crop
in an image, image segmentation datasets are more relevant from the domain
perspective because knowledge of area under different crops provides insights
into food supply. While datasets are available for LULC, to the best of our
knowledge, no dataset on crop semantic segmentation that includes minor crops
is available. For example, in the context of cropland mapping, BigEarthNet
(Sumbul et al., 2019) is the one most relevant dataset which provides 590,326
image patches from 125 Sentinel-2 tiles and associate each image patch with a
subset of 43 Corine Land Cover classes over Europe. However, there are several
limitations in this dataset which make it less ideal for crop monitoring.
First, the topology of the classes included do not distinguish between
different crops but rather between broad vegetation types (forest,
agriculture, grassland, etc). Second, due to the association of labels to
entire image patch it captures the presence and not the area of a certain
category of land cover. Finally, a single temporal snapshot for an area does
not allow identification of different types of crops (Ghosh et al., 2021b).
## 3\. Data Sources
We use freely available multi-spectral satellite images and data products to
create our dataset. Specifically, we use Sentinel-2 as the input images and
the Cropland Data Layer as initial labels. Here we describe the data sources
involved in creating the dataset.
### 3.1. Input Satellite Imagery
In our dataset, we use the multi-spectral images captured by the two polar-
orbiting satellites as part of the Sentinel-2 mission operated by the European
Space Agency (ESA). Due to Its high revisit time of 5 days, phenological
characteristics of different crops can be observed compared to using single
snapshot (or few snapshots) for the whole season. The multi-spectral images
has 13 bands in the visible, near infrared, and short wave infrared part of
the spectrum, each having a spatial resolution of 10, 20 or 60m. The captured
images are available in the form of tiles, each of which have a unique ID and
covers an area of 10,000 sq km.
### 3.2. Crop Labels
The Cropland Data Layer (CDL) is an annual publicly available land cover
classification map for the entire US. CDL is generated by a Decision tree
based approach using moderate resolution satellite imagery and extensive
agricultural ground truth. With over 200 classes, CDL provides land cover maps
covering the entire conterminous United States (CONUS) at 30-meter spatial
resolution with a high accuracy up to 95% for classifying major crop types
(i.e., Corn, Soybean, and Wheat). The CDL data products are free to download
from Google Earth Engine (cdl, 2021). Although CDL is a very useful product
that has led to the development of many downstream applications, the product
is plagued with noise that arise due to the reasons discussed in Section 1. In
particular, it has high accuracy (up to 95%) for classifying major crops(e.g.,
Corn, Soybean, Wheat), but it is known to have poor accuracy for minor crops
(e.g., Alfalfa, Hay and Tree crops) (Lark et al., 2021).
Figure 1. Overlay of 11 tiles in Central Valley of California region we used
in our study. The colors represent different crops and the mapping (refer to
Figure 4) is kept consistent throughout this paper.
## 4\. Processing Pipeline
We use Google Earth Engine to build a robust image processing pipeline to
create biweekly Sentinel image composites. Using the obtained biweekly
composites and CDL labels, we develop a novel spatio-temporal deep learning
method to improve upon the original CDL labels. In the following, we describe
these steps in details.
### 4.1. Generation of bi-weekly Sentinel-2 multispectral composites
Many land covers, e.g., different types of crops, are indistinguishable at a
single time step. In particular, different crops have different seeding time
and harvesting time, which is also affected by weather conditions. Hence,
different crops show discriminative signatures at different points of time
(Ghosh et al., 2021b). Correctly identifying crops will require modelling its
entire agricultural cycle from sowing to harvesting. Hence, we consider all
the images available in a year for this dataset. However, these images often
have clouds and other atmospheric disturbances. Here, we generate bi-weekly
image composites using a robust Google Earth Engine based pipeline to reduce
the impact of these atmospheric disturbances. Specifically, we collect all
available images within a 2-week period and score every pixel of each tile
using a the quality band (QA60), which presents information as to whether a
pixel is cloud-free, dense cloud or cirrus cloud. The quality scores are then
thresholded to create cloud masks for each image. Based on the amount of
cloud-free pixels the collection of images are sorted and finally the best
images merged to create a cloud-free mosaic. Thus we obtain 24 mosaics in a
year per tile, each in the projection of the zone (for California crop belt, 8
tiles are in EPSG:32610 - WGS 84 / UTM zone 10N and 3 are in EPSG:32611 - WGS
84 / UTM zone 11N). All the bands are resampled to 10m spatial resolution and
then exported from Google Earth Engine. Since some Sentinel tile images may be
slightly larger than the area they are supposed to cover, we use GDAL to clip
the images and reproject them so that every pixel is of 10m$\times$10m
resolution.
This finally produces 24 georeferenced files each of which has a shape of
(10980,10980,10) for a tile, with 10 signifying the number of bands (10m and
20m) used. Since our objective is to map the entire crop belt in the Central
Valley of California, we found that 11 Sentinel-2 tiles covers this crop belt,
namely T10SEH, T10SEJ, T10SFG, T10SFH, T10SFJ, T10SGF, T10SGG, T10TEK, T11SKA,
T11SKV, and T11SLV, giving a total of 264 tif files. As a preprocessing step
we first clip the bottom and top 2%ile of each channel of the satellite images
and then apply max-min normalization. Following the preprocessing of the
images, we split each tile into 100 grids each of size 10km$\times$10km
(1098$\times$1098 pixels). We combine all the 24 composite images
corresponding to same grid together to form an array of shape
(24,1098,1098,10): 24 timestamps, (1098,1098) pixels and 10 channels. We have
1,100 grid arrays in total, each of which is named as
“TILEID_YEAR_ROW_COL_IMAGE.npy”, e.g., “T11SKA_2018_5_6_IMAGE.npy” corresponds
to the 5th row and 6th column (indexed from 0) of the tile T11SKA in 2018.
Figure 2. Evolution of labels through each preprocessing step are shown for
two randomly chosen regions (rows). The first columns shows the raw CDL labels
resampled at 10m resolution. The second columns shows a revised set of labels,
where similar classes have been combined and untrustworthy classes have been
grouped as unknown class (in light purple). The third column shows one level
of erosion done classwise at boundaries and also removal of connected
components of size less than 4 pixels. We refer to these labels as CDL-
combined-eroded, and use these for training our deep learning model.
### 4.2. Pre-processing of CDL
We use Google Earth Engine to fetch the labels and crop them using each
georeferenced Sentinel-2 tile, which produces a label image at 30m resolution
for each tile. We then resample the labels to 10m resolution to create 11
label tiles of shape (10980,10980). The overlay of the 11 labels tiles on the
California Central Valley crop belt is shown in Fig. 1. CDL provides labels
for more than 200 crop classes, many of which are completely absent or rarely
present in the California Central Valley region. In our dataset we exclude
these absent classes in the California Central Valley region. In addition, CDL
provides state-wise validation metrics for their labels using ground-truth
labels. We also exclude those classes for which the number of pixels used for
CDL validation is too few as their labels cannot be trusted. Specifically, we
include a crop class in our dataset if it fulfils the following conditions:
* •
The crop class has at least 1 million pixels in the study region (in this case
the 11 tiles).
* •
The crop class has at least 100 validation pixels used by CDL.
For non-crop classes we only apply the first condition (e.g., wetlands, grass,
forests, hay, urban etc.) as their validation metrics are not provided by
CDL.Following these steps we are left with 34 classes: {Corn, Cotton, Rice,
Sunflower, Barley, Winter Wheat, Safflower, Dry Beans, Onions, Tomatoes,
Cherries, Grapes, Citrus, Almonds, Walnut, Pistachio, Garlic, Olives,
Pomegranates, Alfalfa, Hay, Barren, Fallow and Idle, Deciduous Forests,
Evergreen forest, Mixed Forests, Clover and wildflower, Shrubland, Grass,
Woody wetlands, Herbaceous Wetlands, Water, Urban, Double Crops}. For training
and evaluation purposes we combine the different forest classes to a super
class “Forest Combined”, wetland classes to “Wetlands Combined”, and combine
{Grass, Shrubland, Clover, Wildflower} to “Grass combined”. We also do not use
Double Crops in our study and label all those pixels as unknown class.
Following the preprocessing of the labels we are left with 21 crop classes and
7 other classes and we refer to this label set as CDL-combined.
Since the CDL is originally at 30m resolution, which we resample to 10m (to
match with the resolution of input images), the boundary pixels are mixed and
thus they could contain regions of multiple classes. Given the uncertainty of
labels at spatial boundaries between any two classes, we perform 1 pixel
erosion for each class and replace these eroded pixels with unknown class and
remove connected components of a class that are less than or equal to size 4.
These labels are called CDL-combined-eroded. Fig 2 shows the progression of
the labels through these preprocessing steps. Similar to the image data, post
erosion we segment and store the label in arrays of shape (1098,1098) and have
the naming convention as TILEID_YEAR_ROW_COL_PREPROCESSED_CDL_LABEL.npy.
### 4.3. Grid curation
Figure 3. Distribution of Train/Val/Test grids. Green, light blue, and red
represent the regions used for training, validation and testing, respectively.
The purple regions denote the non-agricultural land and are not used in our
experiments.
As described earlier, in our dataset we have 1,100 grids of 1098$\times$1098
pixels in size covering the entire crop belt in California’s Central Valley.
Many of these grids are predominantly covered by non-crop classes, and hence
are removed from the dataset resulting in 367 acceptable grids. Specifically,
a grid is included if it follows both of the following conditions:
* •
Grid has at least 50% pixels that are not unknown
* •
Out of the valid pixels, Grid G has at least 50% pixels that belong to crop
classes
### 4.4. Label Improvement using STATT
As described earlier, CDL based labels cannot be used directly as reference
labels. To improve the quality of CDL labels, we used the STATT model proposed
by the authors in (Ghosh et al., 2021b) which uses spatial as well as temporal
information to effectively model the phenology of crops and reduce the effects
of clouds and other atmospheric disturbances. Specifically STATT uses a UNET
style architecture to extract spatial features and a bidirectional Long-Short
Term Memory (biLSTM) to model temporal progression of the crop specific
growing and harvesting patterns. Further it uses attention networks to
aggregate the hidden representations for each time-step based on their
contribution to the classification performance. Finally, using these attention
scores, the spatial features by the convolutional encoders at multiple
resolutions are aggregated and passed using skip connections to the
convolutional decoder to generate segmentation maps. A comparison of STATT
with alternative approaches that model either the spatial or temporal
information, or both (but not as effectively as STATT) is available in (Ghosh
et al., 2021b).
To demonstrate the efficacy of this method in improving the quality of CDL
labels, we divided the grids into train, validation and test set. The crop
distribution is not similar throughout the California Central Valley crop
belt. For example, Rice is grown mainly in the northern part of the California
Central Valley crop belt and is rarely found in the southern parts. To make
sure we create a training set that is balanced amongst classes and is also
spread uniformly across space, we adopt a gridwise count based data splitting
strategy. For each class, we sort the grids based on the number of pixels
present of that particular class in the grid. We take intersection of the
common grids amongst all classes such that the total number of grids comes out
to around 60% of the total girds we have. Following this first step we were
able to filter 210 grids for training (approximately 57%). Now after removing
these training girds we again sort grid intersections classwise to create
validation set such that around 20% more is used, then the remaining are used
for testing. With this approach we created a training set of 210 grids,
validation set of 84 grids and test set of 73 grids. The color coded final
distribution of the sets can be seen in the Fig. 3.
Figure 4. Argmax predictions vs Region Growing predictions on certain patches
in test area which demonstrate the advantage of Region Growing over Argmax.
For example in the first row, the region growing strategy has removed many
speckles of winter wheat (brown) misclassified by CDL. Moreover, majority of
the pixels converted to “unknown” by region growing lie in the boundary where
the pixels due to being mixed, are more likely to be misclassified. (Arrows
represent places of improvement by Region growing over Argmax)
Following the approach as outlined in (Ghosh et al., 2021b), STATT extracts
patches of size 32$\times$32 pixels from the training grids. Using this input
patch of size 32$\times$32, we output labels for a patch of size
16$\times$16\. For this task, we use three convolutional blocks in our encoder
each having two convolutional layers. Thus there are six convolutional layers
having 64,64,128,128,256,256 channels and filters of size 3$\times$3\. To
downsample the output of the convolutional blocks STATT uses max-pooling of
size 2$\times$2 after the first and second convolutional blocks. In the
decoder, STATT has two convolutional blocks each of which consistsof two
convolutional layers. The four convolutional layers of the decoder have
128,128,64,64 channels respectively. To upsample the output we add transposed-
convolutional layers before the first and second convolutional block of the
decoder having 128,64 channels respectively and kernel size of 2$\times$2\.
Finally, STATT has a fully-connected layer with input dimension of 64 and
output dimension equal to the number of classes i.e. 28. The model was trained
using the training dataset for 50 epochs and the validation performance was
used as the model selection criteria.
Figure 5. Flowchart of the entire pipeline used in our study.
The output of the model are softmax probabilities over the classes for each
pixel thus having shape of (16,16,34). By combining all the patches within a
grid, we create probability grids of shape (16,16,34). Usually for multi-class
classification the decision is made by predicting the class for which the
model gives the highest probability. We refer to it as the $argmax$
prediction. In a multi-class classification setting, confusion between classes
can easily occur when dealing with a large number of classes. Furthermore,
class confusion also happens at the geographical boundary of different classes
(e.g. fields with different crops or roads around field).
We use a region growing strategy to post-process the pixel-wise probability
outputs instead of directly taking $argmax$ outputs. Specifically, for each
class, the pixels that have highest probability value greater than 0.9 are
considered as confident anchor pixels. Starting from these anchor pixels, we
include all the pixels in their neighborhood which have at least 0.3
probability of belonging to the same class as the anchor pixels. Since the
region growing strategy produces class-wise prediction maps, clashes between
two or more class at certain pixels are bound to happen, in which case we
assign unknown values to those pixels. We observe that majority of such
clashes occur near the boundaries which is expected due to the reasons that
were described above. As illustrated in Fig 4, this method is very effective
in removing noise within fields and also removing confusion at boundaries by
replacing them with ”unknown”. We store the STATT labels in arrays of shape
(1098,1098) and have the naming convention as
TILEID_YEAR_ROW_COL_PREPROCESSED_STATT_LABEL.npy.
Figure 6. The classwise count of labels produced by STATT across all the
acceptable grids in the form of a bar chart. The red bar represents the
overall count of that class across the entire acceptable set, the green bar
represents the count in the northern region and the blue bar represents the
count in the southern region. The northern region is given by the tiles
T10SEH, T10SEJ, T10SFG, T10SFH, T10SFJ, T10SGG and T10TEK whereas the southern
region is given by the tiles T10SGF, T11SKA, T11SKV, and T11SLV. through this
bar chart one can observe that there is rich crop variety in our dataset. One
can also observe that some classes lie predominately in the north, such as
Rice, some lie predominately in the south, such as Pistachio, and some have a
good mix in both regions, such as Almonds
### 4.5. Final Dataset
In summary, our dataset covers the entire California Central Valley Crop Belt
using the 367 grids of cloud filtered multi-spectral images (each in
(1098,1098,10)), and we call these image grids. For each image grid, we also
provide both the raw and preprocessed CDL grid as well as STATT grid of size
(1098,1098). The diagrammatic flowchart of the entire pipeline can be found in
Figure 5. STATT labels are provided for a total of 442,456,668 pixels (4̃4,000
sq. km) covering 29 classes, of which 249,946,750 pixels (2̃5,000 sq. km)
belong to one of the 21 crop classes and the remaining 192,509,918 pixels
(1̃9,000 sq. km) belong to other 8 classes including unknown. The distribution
of the 29 classes in the form of a bar chart is given in Figure 6. Figure 6
also shows the distributions class wise in the north vs south of the region,
with The northern region given by the tiles T10SEH, T10SEJ, T10SFG, T10SFH,
T10SFJ, T10SGG and T10TEK and the southern region given by the tiles T10SGF,
T11SKA, T11SKV, and T11SLV.
The entire dataset including Image Grids, CDL grids, preprocessed CDL grids
and STATT grids for the acceptable grids as well as the Image grids and CDL
grids for the rest of the entire region can be found in the link given
below111https://drive.google.com/drive/folders/1EnXXRHNoTyIbM-_5p-P9pH4zH3xyTqBp?usp=sharing.
Table 1. Confusion matrix between STATT labels and CDL labels on test grids. X
axis (column data) represents the STATT predictions and Y axis (row data)
represents CDL predictions.
| | STATT
---|---|---
| Class | Corn | Cotton | Rice | Sunflower | Barley | Winter Wheat | Safflower | Dry Beans | Onions | Tomatoes | Cherries | Grapes | Citrus | Almonds | Walnut | Pistachio | Garlic | Olives | Pomegranates | Alfalfa | Hay | Barren | FallowIdle | ForestsCb | GrassCb | WetlandsCb | Water | Urban
Crop Data Layer | Corn | 607390 | 3178 | 4282 | 164 | 17 | 3285 | 73 | 413 | 326 | 10341 | 338 | 12767 | 3 | 8373 | 726 | 85 | 0 | 26 | 2 | 13656 | 19615 | 0 | 16406 | 0 | 2938 | 773 | 946 | 10778
Cotton | 5629 | 3277971 | 272 | 0 | 0 | 112 | 28 | 1824 | 22 | 59832 | 9 | 10382 | 0 | 9657 | 1157 | 283 | 28 | 0 | 1 | 1777 | 92 | 1 | 6252 | 0 | 357 | 250 | 14 | 6490
Rice | 5416 | 0 | 6879520 | 269 | 0 | 0 | 62 | 5 | 0 | 5946 | 25 | 6351 | 0 | 395 | 637 | 9 | 0 | 33 | 0 | 1126 | 891 | 0 | 13152 | 0 | 22 | 53 | 1281 | 4948
Sunflower | 7841 | 1 | 1466 | 221533 | 0 | 36 | 2413 | 35 | 0 | 7755 | 0 | 2321 | 0 | 1813 | 4063 | 17 | 0 | 6 | 0 | 192 | 66 | 0 | 9210 | 0 | 65 | 189 | 218 | 2023
Barley | 286 | 213 | 0 | 0 | 15238 | 31066 | 222 | 0 | 6 | 13 | 0 | 59 | 0 | 8821 | 0 | 525 | 0 | 3 | 0 | 49 | 8979 | 8 | 96979 | 0 | 8498 | 0 | 0 | 1063
Winter Wheat | 35205 | 356 | 9 | 0 | 15 | 1145627 | 6270 | 4886 | 23840 | 3049 | 1051 | 3189 | 0 | 4996 | 313 | 267 | 2472 | 20 | 143 | 7324 | 28273 | 0 | 569444 | 0 | 85098 | 50 | 204 | 5277
Safflower | 40897 | 21 | 351 | 2139 | 0 | 617 | 383917 | 15 | 87569 | 48333 | 6 | 5438 | 0 | 596 | 616 | 56 | 12049 | 4 | 0 | 16077 | 525 | 0 | 64979 | 0 | 16257 | 13 | 23 | 2227
Dry Beans | 1529 | 2009 | 38 | 7 | 0 | 13148 | 2 | 94384 | 90 | 572 | 71 | 1350 | 0 | 400 | 33 | 1 | 888 | 0 | 0 | 2744 | 3380 | 0 | 4315 | 0 | 55 | 81 | 1 | 972
Onions | 9514 | 50 | 0 | 0 | 2 | 1001 | 8001 | 0 | 201520 | 16235 | 0 | 305 | 0 | 15 | 0 | 1 | 3979 | 0 | 0 | 555 | 16 | 0 | 18561 | 0 | 24 | 0 | 0 | 945
Tomatoes | 36578 | 30306 | 446 | 639 | 0 | 655 | 1598 | 345 | 19816 | 2421624 | 76 | 5568 | 0 | 8861 | 172 | 166 | 323 | 0 | 2 | 4824 | 384 | 0 | 42105 | 0 | 600 | 60 | 8 | 5831
Cherries | 12 | 155 | 0 | 0 | 0 | 6 | 0 | 0 | 0 | 0 | 45327 | 22724 | 26 | 5012 | 4857 | 2124 | 0 | 0 | 324 | 60 | 0 | 0 | 15426 | 0 | 5259 | 0 | 0 | 769
Grapes | 14290 | 12029 | 0 | 0 | 0 | 1184 | 31 | 23 | 1956 | 18507 | 1977 | 2555800 | 14 | 126264 | 4362 | 14492 | 0 | 2255 | 6647 | 8998 | 851 | 0 | 64457 | 0 | 11970 | 1 | 11 | 8969
Citrus | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1967 | 0 | 739 | 145307 | 620 | 434 | 9 | 3 | 4063 | 9 | 371 | 0 | 0 | 17482 | 0 | 931 | 0 | 0 | 1426
Almonds | 9401 | 5609 | 25 | 231 | 0 | 16234 | 1287 | 3807 | 14 | 2206 | 3129 | 113893 | 1560 | 7592014 | 85562 | 29228 | 2715 | 6785 | 3114 | 34172 | 427 | 3 | 285501 | 0 | 99096 | 138 | 31 | 40524
Walnut | 6270 | 2281 | 2811 | 3124 | 0 | 508 | 4707 | 110 | 0 | 72 | 3787 | 269005 | 0 | 91716 | 2792583 | 43332 | 0 | 399 | 694 | 44839 | 1568 | 4 | 141135 | 0 | 13121 | 5735 | 686 | 40591
Pistachio | 332 | 290 | 0 | 0 | 0 | 73 | 1 | 17 | 8 | 7 | 2365 | 14843 | 14 | 48152 | 4853 | 2273489 | 1 | 210 | 8372 | 2236 | 0 | 0 | 235936 | 0 | 63432 | 0 | 11 | 11139
Garlic | 1063 | 23 | 0 | 0 | 0 | 8566 | 91 | 464 | 6964 | 604 | 11 | 65 | 6 | 48 | 0 | 8 | 302008 | 0 | 0 | 131 | 0 | 0 | 11529 | 0 | 102 | 43 | 0 | 913
Olives | 429 | 0 | 3 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 7524 | 10259 | 11251 | 1201 | 923 | 0 | 149718 | 0 | 516 | 12 | 6 | 24853 | 0 | 3977 | 0 | 0 | 4003
Pomegranates | 2 | 4611 | 0 | 0 | 0 | 0 | 0 | 2 | 1 | 2130 | 3140 | 12175 | 7 | 30375 | 56 | 17403 | 5 | 123 | 94072 | 361 | 0 | 0 | 50850 | 0 | 705 | 87 | 54 | 2882
Alfalfa | 31847 | 1599 | 322 | 23 | 0 | 11704 | 4852 | 7 | 6590 | 6543 | 860 | 27857 | 191 | 31837 | 5306 | 1852 | 1237 | 1087 | 130 | 1372785 | 14676 | 0 | 31217 | 0 | 8036 | 2733 | 271 | 12958
Hay | 13640 | 158 | 417 | 1407 | 0 | 26405 | 217 | 404 | 92 | 501 | 641 | 39422 | 624 | 25357 | 6998 | 1070 | 0 | 4805 | 6 | 144939 | 152060 | 1 | 96765 | 0 | 107317 | 171 | 120 | 20725
Barren | 0 | 150 | 51 | 0 | 12 | 0 | 0 | 0 | 0 | 14 | 1 | 278 | 0 | 359 | 144 | 75 | 0 | 40 | 1 | 42 | 4 | 20040 | 97624 | 0 | 106082 | 633 | 8816 | 38194
FallowIdle | 11712 | 17863 | 164556 | 986 | 44 | 34016 | 13008 | 7834 | 2990 | 71154 | 805 | 81176 | 76 | 125921 | 84253 | 89519 | 1102 | 7941 | 1363 | 32032 | 17392 | 1351 | 6817036 | 0 | 573836 | 7230 | 21056 | 262682
ForestsCb | 6761 | 0 | 4135 | 0 | 0 | 3 | 153 | 0 | 0 | 0 | 1721 | 7832 | 10142 | 2422 | 451 | 0 | 0 | 115216 | 0 | 39529 | 15 | 2 | 20653 | 0 | 257 | 731 | 48 | 1281
GrassCb | 12258 | 348 | 1042 | 0 | 823 | 11029 | 620 | 6 | 0 | 113 | 3004 | 81509 | 640 | 92248 | 17723 | 19635 | 0 | 26063 | 179 | 92681 | 141563 | 409 | 1307273 | 0 | 4677219 | 11878 | 2201 | 79275
WetlandsCb | 29639 | 614 | 32684 | 0 | 0 | 21 | 3 | 0 | 0 | 48 | 478 | 24263 | 0 | 811 | 7426 | 1226 | 0 | 31 | 2 | 8927 | 187 | 44 | 83276 | 0 | 76186 | 103289 | 19880 | 7644
Water | 271 | 0 | 1658 | 0 | 0 | 8 | 0 | 0 | 0 | 0 | 0 | 130 | 0 | 9 | 51 | 0 | 0 | 6 | 0 | 215 | 3 | 958 | 4940 | 0 | 2620 | 1748 | 920775 | 2100
Urban | 2469 | 9142 | 21946 | 574 | 0 | 3466 | 675 | 144 | 621 | 7711 | 384 | 28072 | 907 | 48990 | 22374 | 12213 | 971 | 4083 | 172 | 18503 | 2053 | 3045 | 201794 | 0 | 177117 | 2542 | 13400 | 2747186
FallowIdle - Fallow and Idle land; ForestsCb - Forests Combined; GrassCb -
Grass Combined; WetlandsCb - Wetlands Combined
Table 2. Precision, Recall, and F1-Score of STATT labels in the test region
with CDL as groundtruth. We also mention support(in pixels), that is the count
classwise of CDL labels used during evaluation (10000 pixels equals 1 sq.km).
STATT
---
CLASS | Precision | Recall | F1-score | Support | CLASS | Precision | Recall | F1-score | Support
Fallow and Idle | 0.6587 | 0.8069 | 0.7253 | 8448934 | Safflower | 0.8965 | 0.5623 | 0.6911 | 682725
Almonds | 0.9172 | 0.9107 | 0.9139 | 8336706 | Hay | 0.3869 | 0.2360 | 0.2932 | 644262
Rice | 0.9668 | 0.9941 | 0.9803 | 6920141 | Wetlands Combined | 0.7462 | 0.2604 | 0.386 | 396679
Grass Combined | 0.7742 | 0.7109 | 0.7412 | 6579739 | Garlic | 0.9214 | 0.9079 | 0.9146 | 332639
Walnut | 0.9167 | 0.8050 | 0.8572 | 3469078 | Barren | 0.7746 | 0.0735 | 0.1343 | 272560
Cotton | 0.9730 | 0.9691 | 0.9710 | 3382440 | Sunflower | 0.9586 | 0.8479 | 0.8999 | 261263
Urban | 0.8265 | 0.8248 | 0.8257 | 3330554 | Onions | 0.5718 | 0.7729 | 0.6573 | 260724
Grapes | 0.7663 | 0.8952 | 0.8258 | 2855088 | Pomegranates | 0.8164 | 0.4295 | 0.5628 | 219041
Pistachio | 0.9065 | 0.8528 | 0.8788 | 2665781 | Olives | 0.4636 | 0.6974 | 0.557 | 214675
Tomatoes | 0.9018 | 0.9383 | 0.9197 | 2580987 | Forests Combined | 0.0000 | 0.0000 | 0.0000 | 211352
Winter Wheat | 0.8753 | 0.5944 | 0.7080 | 1927378 | Citrus | 0.8559 | 0.8382 | 0.8469 | 173361
Alfalfa | 0.7422 | 0.8708 | 0.8013 | 1576520 | Barley | 0.9435 | 0.0886 | 0.162 | 172028
Water | 0.9300 | 0.9843 | 0.9564 | 935492 | Dry Beans | 0.8227 | 0.7487 | 0.7839 | 126070
Corn | 0.6819 | 0.8472 | 0.7557 | 716901 | Cherries | 0.6550 | 0.4440 | 0.5293 | 102081
OVERALL | Precision | Recall | F1-score | Support | CROPS ONLY | Precision | Recall | F1-score | Support
MEAN | 0.7732 | 0.6754 | 0.6885 | 57795199 | MEAN: | 0.8067 | 0.7262 | 0.7386 | 37,619,889
Weighted MEAN | 0.834 | 0.8307 | 0.8251 | 57795199 | Weighted MEAN | 0.8882 | 0.8699 | 0.8731 | 37,619,889
ACCURACY: | | | 0.8307 | | ACCURACY | | | 0.9303 |
## 5\. Evaluation
In this section we present the quantitative analysis of the results of our
approach on the test regions. Using the STATT and CDL labels we get the
confusion matrix as shown in Table 1 for the pixels where both STATT and CDL
are not unknown. We observe that out of the total 57,795,199 pixels, SAATT and
CDL labels differ in 9,785,767 pixels (16.93%). Focusing only on pixels that
are labeled as crop, disagreement drops to 6.97%. Table 2 shows precision,
recall, and F1-scores for all classes while treating pre-processed CDL labels
as ground truth. We notice that F1-score is usually high for classes that have
high support (see left half of Table 2) and usually low for classes that have
low support (right half of Table 2). As we discuss in the following, STATT
labels are generally more accurate than those provided by CDL.
Fig. 7 shows a comparison of the segmentation maps of STATT and the
corresponding patch from the CDL layer. In all four triplets, We notice that
STATT generally performs much better in detecting boundaries and removing
noise. In the first triplet of the first column, we can see how a noisy field
is replaced with a smooth prediction of fallow land. In the second we can see
how a fallow prediction by CDL is replaced with cotton by STATT and it can be
verified in the third image of the triplet, an image in July, that the field
cannot be fallow as there is a crop present. In the first triplet of the
second column, one can observe removal of erroneous cotton speckles present in
the CDL map, and in the final triplet we can see smoothing of multiple fields
by the STATT map over the region.
Further, we analyze the pixels where our map does not match with CDL. We have
noticed errors in the CDL layer at numerous locations throughout the crop belt
which are mainly of two types:
* •
incorrect labeling of complete (or large parts of) fields
* •
spatially discontinuous label prediction (i.e., label of a pixel differs from
its surrounding pixels that all belong to a different class)
Figure 7. Segmentation map comparisons on some patches from CDL and STATT in
the test regions, Each triplet shown depicts a situation where STATT produces
better labels. For description on each triplet please refer to Section 5
Figure 8. Visual Analysis of Grid T10SGF_2018_5_4. One can observe from the
visual images that many fields in this region are fallow throughout the year
but CDL labels them as Winter Wheat (such as the field next to the triangular
Cotton (red) field). However STATT does not make these mistakes and correctly
labels the region as Fallow land.
In the next few paragraphs we systemically discuss and analyze these cases on
some of the fields within California Crop belt. First, we visually analyze and
show the results of a sample of patches by looking at the satellite images
over the entire year. Next, we provide visual analysis of a sample of NDVI
time series. We assume that the NDVI time series of pixels where STATT and CDL
agree are correct and we show that on pixels where STATT disagrees with CDL,
the NDVI time series are similar to those pixels that have the same label as
provided by STATT and where STATT and CDL agree. Finally, we provide a
comprehensive (qualitative) analysis of all pixels where STATT and CDL
disagree by quantifying the number of pixels that have NDVI series closer to
the agreement NDVI series for each set of labels.
### 5.1. Visual analysis of a sample of patches
The first way to compare our dataset and CDL is to visually inspect images
over time, check the growing time, rate of greenness and harvest time to
assign a label to the field, and then check whether CDL or STATT is correct.
Although this method cannot be scaled to every field due to substantial manual
effort and expertise needed regarding crop growing patterns, we can still use
this approach to verify disagreement between CDL and STATT where one predicts
fallow and idle land and the other predicts a crop. Since no crop is grown
year around in a fallow or idle land, it should be easy to verify the correct
prediction. We observed numerous cases in the California Central Valley crop
belt where CDL predicted a crop and STATT predicted fallow land. On further
investigation as to why so much confusion has happened, we observed in the CDL
that some classes, such as almonds, grapes, and barley, are just carried over
from the year before without new analysis. This is mainly a problem when the
farmer decides not to plant a crop in that area that year or a drought occurs
in that area that year and so in reality the pixel is fallow land but CDL will
label it as a crop. In such cases even though STATT may label the pixel as
Fallow land it will be taken as an error with respect to CDL. In particular,
2018 was a dry year for the California Central Valley and many farmers were
not able to irrigate fields in 2018 that were wet and productive in 2017. We
found this to be the main reason as to why the F1 score for Fallow and Idle
land is low in the table in spite of a high count. An example of what was just
described can be seen in Fig. 8. In this grid, We can observe numerous fields
as fallow throughout the year (such as the one one next to the triangle shaped
cotton field) but CDL labels them as crop (the field next to the triangle
cotton field is labelled as winter wheat by CDL). Through this first method of
visual analysis, we were able to verify many cases of fallow vs crop
disagreement, in which the STATT prediction of fallow seems appropriate.
Figure 9. Comparison of NDVI for some fields with disagreeemnt between CDL
labels and STATT labels. Each triplet denotes a case where the labels produced
by STATT are better than CDL, as the series of the field (represented in
Green) lies closer to the series of the class denoted by STATT.
### 5.2. Visual analysis of a sample of NDVI time series
Here we resolve the disagreement between STATT and CDL labels by analyzing the
NDVI time series of the field in question (i.e. a continuous region where
STATT and CDL differs. In each disagreement there are two classes in analysis,
the CDL prediction class and the STATT prediction class. If the NDVI series of
field lies closer to the characteristic NDVI series of the STATT prediction
class than the CDL prediction class then we can say that the field is actually
the STATT prediction class and vice versa. Now the question arises, how do we
obtain this characteristic NDVI series of different classes in our dataset? To
get the characteristic NDVI series we take the median (timestamp wise) of the
NDVI series for pixels agreeing with the class of interest in the grid where
the field of interest is located. What we mean by pixels of agreement are
those pixels where CDL and STATT agree, i.e predict the same class at that
pixel. we use only agreement pixels within the grid of the field because we
found that across grids crops have different NDVI series due to local farmer
practices, weather conditions and cloud cover patterns. We also use median to
get the characteristic NDVI series due to the fact that it is better at
handling outliers when compared to other strategies such as mean or mode.
We now plot the characteristic NDVI series for both the CDL prediction class
and the STATT prediction class on the same graph. We then plot the median NDVI
series timestamp wise of all the pixels in the field of interest on the same
graph and check which characteristic NDVI series it lies closer to. If the
NDVI series of the field is closer to the characteristic series of the class
labeled by STATT compared to the characteristics series of the class labeled
by CDL, then we can say that STATT label was correct, and vice versa. We found
that in a vast majority of cases, whenever there is a field of disagreement,
the NDVI series of the field lies closer to the STATT prediction class
signature than the CDL prediction class signature. Fig. 9 shows 8 triplets for
some fields where we conducted this method of analysis. The first image in the
triplet is the CDL prediction and the second image is the STATT prediction,
and in each of these images there is a red boundary denoting the field of
interest. One can observe that in all the triplets, the predicted class within
the field of interest (i.e the red boundary) differs between the CDL image and
the STATT image. The third image is the NDVI plot of the three timeseries
described before, i.e the CDL prediction class characteristic NDVI series
(denoted by the plot in the color of the CDL prediction class), the STATT
prediction class characteristic NDVI series (denoted by the plot in the color
of the STATT prediction class) and the NDVI series of the field of interest
(denoted by the signature in the green color).
To give a better understanding let us look at the top leftmost triplet of Fig.
9 in detail. This triplet shows a field which has been labelled as winter
wheat by CDL but as fallow land by STATT. In the third image we can see the
NDVI series signature of winter wheat in dark brown and that of fallow land in
light brown (note that the colors of the lines are the same colors of the
fields in the images). We can also see the green line plot in the image which
denotes that of the field’s NDVI series. It can clearly be seen that the green
plot lies much closer to the light brown plot (fallow land) and so we can say
the STATT prediction of this field as fallow land is correct. Similarly the
top rightmost triplet shows a field with pistachio (CDL prediction) vs Almond
(STATT predication) and from the plot we can see that the green line lies
closer to the greenish blue line (Almond) than when compared to the light blue
line (Pistachio) showing that the STATT prediction in this field is correct.
All other examples in Figure 9 similarly show that the green line lies closer
to the STATT class NDVI line. The top two triplets of the right column show
cases where CDL predicts a crop class and STATT predicts fallow land. The
bottom next triplet of the right column show cases where CDL predicts fallow
land but STATT predicts a non fallow class (Cotton). The last triplet in this
column shows winter wheat vs corn. The top two triplets of the left column
showcase confusion of almonds and pistachio in both ways between the two tree
crops which are of high importance in the California region. The next triplet
shows walnut vs alfalfa and the final triplet shows alfalfa vs hay.
Figure 10. Class wise Area under the curve plots. The x axis represents the NMSE and the y axis represents the $Score(\cdot)$ value for the corresponding NMSE from x axis. The red and blue curves represent CDL and STATT, respectively. In each plot we also mention the F1-Score of that class as a measure of agreement between CDL and STATT. We can see that in classes with high F1 such as Garlic, where agreement is high, and in those with low F1 such as Olives, where agreement is low, STATT has a better curve than CDL. Table 3. Area under the curves (in Fig. 10) for each class along with number of agreement pixels and F1 score of class with CDL as groundtruth. | AREA UNDER THE CURVE | Count |
---|---|---|---
Class | CDL | STATT | Difference | Agreement | F1-Score
Garlic | 0.4899 | 0.7409 | 0.2510 | 173908 | 0.9146
Citrus | 0.5097 | 0.7555 | 0.2458 | 26018 | 0.8469
Dry Beans | 0.4388 | 0.6803 | 0.2415 | 59647 | 0.7839
Tomatoes | 0.4708 | 0.6927 | 0.2218 | 1344877 | 0.9197
Olives | 0.5745 | 0.7741 | 0.1995 | 52639 | 0.5570
Corn | 0.4850 | 0.6177 | 0.1327 | 68350 | 0.7557
Almonds | 0.5959 | 0.7072 | 0.1112 | 2867928 | 0.9139
Alfalfa | 0.6933 | 0.8000 | 0.1067 | 477421 | 0.8013
Pomegranates | 0.7310 | 0.8114 | 0.0804 | 71381 | 0.5628
Onions | 0.7007 | 0.7628 | 0.0621 | 146608 | 0.6573
Grass Combined | 0.8334 | 0.8910 | 0.0576 | 1336303 | 0.7412
Barren | 0.7997 | 0.8550 | 0.0552 | 8902 | 0.1343
Fallow and Idle | 0.8396 | 0.8825 | 0.0429 | 2451705 | 0.7253
Rice | 0.5055 | 0.5481 | 0.0426 | 501687 | 0.9803
Cherries | 0.4864 | 0.5277 | 0.0413 | 28185 | 0.5293
Walnut | 0.8223 | 0.8519 | 0.0296 | 369057 | 0.8572
Grapes | 0.7197 | 0.7465 | 0.0269 | 435258 | 0.8258
Pistachio | 0.7559 | 0.7816 | 0.0257 | 1106181 | 0.8788
Cotton | 0.6727 | 0.6918 | 0.0192 | 2481209 | 0.9710
Winter Wheat | 0.6292 | 0.6403 | 0.0111 | 372512 | 0.7080
Hay | 0.7887 | 0.7879 | -0.0009 | 28640 | 0.2932
Safflower | 0.7749 | 0.7638 | -0.0112 | 125555 | 0.6911
Barley | 0.3051 | 0.2474 | -0.0577 | 424 | 0.1620
Sunflower | 0.6578 | 0.4333 | -0.2246 | 3842 | 0.8999
MEAN | 0.6440 | 0.7195 | | |
### 5.3. Comprehensive analysis of all pixels where STATT and CDL disagree
The previous two methods prove to be very useful while doing field analysis
and using a combination of the two we can show for each field who is correct.
However, neither of these methods give a global perspective nor do they
quantify how much better STATT’s predictions are when compared to those of
CDL’s predictions. To address this issue, we use a third method of analysis in
which we devise a function to measure closeness of pixels to ground reality,
and after plotting the function, use area under the curve to establish which
strategy, i.e. CDL or STATT, is better.
After obtaining the map for STATT and CDL, we calculate the characteristic
NDVI series gridwise for each class using the agreement pixels as described in
the previous section. Now we consider a characteristic series to be valid only
if there are at least $T$ pixels in agreement in the grid, and $T$ is set to
100 in this work. Now for each pixel of disagreement for each class we
calculate the Normalised Mean Square Error (NMSE) with the characteristic NDVI
series and the NDVI series of the the pixel of disagreement. For each strategy
(CDL or STATT), we first sort all the disagreement pixels according to their
NMSE. Then we compute $Score(E)$ for each strategy, which is defined to be the
proportion of disagreement pixels with NMSE less than a particular error $E$
over all the disagreement pixels, i.e., $Score()$, for a particular error (E)
as follows:
(1) $\small
Score(E)=\frac{\\#\,disagreement\,pixels\,in\,strategy\,with\,NMSE\,less\,than\,E}{Total\,No.\,of\,pixels\,of\,disagreement\,in\,strategy\,}$
where $strategy$ represents either CDL or STATT.
What the function Score represents is the fraction of total disagreements
pixels whose NMSE lies below a set threshold error denoted by E. The notion
behind this function is that, the closer the NMSEs of the disagreement pixels
are to zero, the faster Score rises as E rises. At the max error, the Score
will be 1, as all NMSEs lie below the threshold. Our hypothesis is that the
STATT disagreement pixels have lower errors and so Score will rise faster for
STATT when compared to CDL. As a result, STATT will reach a higher Score
faster and will thus have more area under the plot of Score until the max
error. A plot of this function is constructed for each class with E starting
from 0 and ranging up til maximum NMSE error recorded for that class, which we
denote as $E_{max}$. Please note that $E_{max}$ changes from class to class
and that $E_{max}$ could come from either a CDL disagreement pixel or a STATT
disagreement pixel. We then calculate Area under the curve as follows:
(2) $Area_{strategy}=(\int_{0}^{E_{max}}Score(E)\,dE)/E_{max}$
We divide the area of each plot by $E_{max}$ to keep it within the range
(0,1).The plots of curve for each class can be seen in Fig. 10, with Blue
representing STATT and red representing CDL. The areas under these curves for
each strategy are summarized in Table 3. We can see that STATT has a higher
area when compared to CDL in almost all the classes. STATT has lower area for
a small number of classes which have low agreement count. We also see from the
figure that in a lot of classes the blue line lies above the red line
throughout the plot. This experiment solidifies our claim that STATT labels
are closer to the ground reality than when compared to the labels provided by
CDL.
## 6\. Conclusion
In this paper we presented CalCROP21, a georeferenced data set for a diverse
array of crops grown in the Central Valley of California. This dataset
contains multi spectral Sentinel imagery along with crop labels at 10m
resolution for year 2018 that are derived using a novel spatial-temporal deep
learning method that makes use of noisy CDL labels available at 30m
resolution. Our extensive analysis of this dataset demonstrates the
superiority of our dataset over CDL. We have also released our processing
pipeline and associated datasets that can be used by the community to generate
crop labels for other years and for creating similar data sets for other parts
of US. We anticipate this dataset will catalyze the innovation in machine
learning research on remote sensing data (e.g., classifying multiple
imbalanced classes and modeling heterogeneous data over space), and also
enable the use of this information for studying crop distribution and its
implications by the agricultural community.
## 7\. Acknowledgement
This work was funded by the NSF awards 1838159 and 1739191. Access to
computing facilities was provided by the Minnesota Supercomputing Institute.
## References
* (1)
* cdl (2021) 2021\. USDA NASS Cropland Data Layers. https://developers.google.com/earth-engine/datasets/catalog/USDA_NASS_CDL.
* Basu et al. (2015) Saikat Basu, Sangram Ganguly, Supratik Mukhopadhyay, Robert DiBiano, Manohar Karki, and Ramakrishna Nemani. 2015. DeepSat: A Learning Framework for Satellite Imagery. In _Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems_ (Seattle, Washington) _(SIGSPATIAL ’15)_. Association for Computing Machinery, New York, NY, USA, Article 37, 10 pages. https://doi.org/10.1145/2820783.2820816
* Belden et al. (2012) Jason B Belden, Brittany Rae Hanson, Scott T McMurry, Loren M Smith, and David A Haukos. 2012\. Assessment of the effects of farming and conservation programs on pesticide deposition in high plains wetlands. _Environmental science & technology_ 46, 6 (2012), 3424–3432.
* Boryan et al. (2012) Claire Boryan, Zhengwei Yang, and Liping Di. 2012. Deriving 2011 cultivated land cover data sets using usda national agricultural statistics service historic cropland data layers. In _2012 IEEE International Geoscience and Remote Sensing Symposium_. IEEE, 6297–6300.
* Boryan et al. (2011) Claire Boryan, Zhengwei Yang, Rick Mueller, and Mike Craig. 2011\. Monitoring US agriculture: the US Department of Agriculture, National Agricultural Statistics Service, Cropland Data Layer Program. _Geocarto International_ 26, 5 (2011), 341–358. https://doi.org/10.1080/10106049.2011.562309
* CDL (2021) CDL 2021. USDA Cropland Data Layer. https://www.nass.usda.gov/Research_and_Science/Cropland/docs/MuellerICASVI_CDL.pdf.
* Cibin et al. (2012) R Cibin, I Chaubey, and B Engel. 2012. Simulated watershed scale impacts of corn stover removal for biofuel on hydrology and water quality. _Hydrological processes_ 26, 11 (2012), 1629–1641.
* Demir et al. (2018) Ilke Demir, Krzysztof Koperski, David Lindenbaum, Guan Pang, Jing Huang, Saikat Basu, Forest Hughes, Devis Tuia, and Ramesh Raskar. 2018. DeepGlobe 2018: A Challenge to Parse the Earth through Satellite Images. _2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)_ (Jun 2018). https://doi.org/10.1109/cvprw.2018.00031
* Deng et al. (2009) Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009\. ImageNet: A large-scale hierarchical image database. In _2009 IEEE Conference on Computer Vision and Pattern Recognition_. 248–255. https://doi.org/10.1109/CVPR.2009.5206848
* Fitzgerald and Zimmerman (2013) Timothy Fitzgerald and Grant Zimmerman. 2013. Agriculture in the Tongue River Basin, Output, Water Quality, and Implications. (2013).
* Ghosh et al. (2021a) Rahul Ghosh, Xiaowei Jia, and Vipin Kumar. 2021a. Land Cover Mapping in Limited Labels Scenario: A Survey. _arXiv preprint arXiv:2103.02429_ (2021).
* Ghosh et al. (2021b) Rahul Ghosh, Praveen Ravirathinam, Xiaowei Jia, Chenxi Lin, Zhenong Jin, and Vipin Kumar. 2021b. Attention-augmented Spatio-Temporal Segmentation for Land Cover Mapping. arXiv:2105.02963 [cs.CV]
* Hartz et al. (2011) Laura Hartz, Fritz Boettner, and Jason Clingerman. 2011\. Greenbrier Valley Local Food: The Possibilities and Potential. _Greenbrier Valley Economic Develeopment Corporation_ (2011).
* Helber et al. (2017) Patrick Helber, Benjamin Bischke, Andreas Dengel, and Damian Borth. 2017. EuroSAT: A Novel Dataset and Deep Learning Benchmark for Land Use and Land Cover Classification. arXiv:1709.00029 [cs.CV]
* Lark et al. (2021) Tyler J Lark, Ian H Schelly, and Holly K Gibbs. 2021\. Accuracy, Bias, and Improvements in Mapping Crops and Cropland across the United States Using the USDA Cropland Data Layer. _Remote Sensing_ 13, 5 (2021), 968.
* Maggiori et al. (2017) Emmanuel Maggiori, Yuliya Tarabalka, Guillaume Charpiat, and Pierre Alliez. 2017. Can semantic labeling methods generalize to any city? the inria aerial image labeling benchmark. In _2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS)_. 3226–3229. https://doi.org/10.1109/IGARSS.2017.8127684
* Painter et al. (2013) Kathleen Painter, Hilary Donlon, Stephanie Kane, et al. 2013\. Results of a 2012 survey of Idaho oilseed producers. _AE Extension Series-Department of Agricultural Economics and Rural Sociology, University of Idaho_ 13-01 (2013).
* Penatti et al. (2015) Otávio A. B. Penatti, Keiller Nogueira, and Jefersson A. dos Santos. 2015. Do deep features generalize from everyday objects to remote sensing and aerial scenes domains?. In _2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)_. 44–51. https://doi.org/10.1109/CVPRW.2015.7301382
* Plourde et al. (2013) James D Plourde, Bryan C Pijanowski, and Burak K Pekin. 2013\. Evidence for increased monoculture cropping in the Central United States. _Agriculture, ecosystems & environment_ 165 (2013), 50–59.
* Pritsolas and Pearson ([n.d.]) Joshua Pritsolas and Randall Pearson. [n.d.]. A Cautionary Tale: A Recent Paper’s Use of Research Based on the USDA Cropland Data Layer to Assess the Environmental Impacts of Claimed Cropland Expansion. ([n. d.]).
* Rashford et al. (2013) Benjamin S Rashford, Shannon E Albeke, and David J Lewis. 2013\. Modeling grassland conversion: Challenges of using satellite imagery data. _American Journal of Agricultural Economics_ 95, 2 (2013), 404–411.
* Reitsma et al. (2015) Kurtis D Reitsma, David E Clay, Sharon A Clay, Barry H Dunn, and C Reese. 2015. Does the US Cropland Data Layer Provide an Accurate Benchmark for Land-Use Change Estimates? _Agronomy Journal_ 108, 108 (2015), 226.
* Schmitt et al. (2019) Michael Schmitt, Lloyd Haydn Hughes, Chunping Qiu, and Xiao Xiang Zhu. 2019. SEN12MS – A Curated Dataset of Georeferenced Multi-Spectral Sentinel-1/2 Imagery for Deep Learning and Data Fusion. arXiv:1906.07789 [cs.CV]
* Sumbul et al. (2019) Gencer Sumbul, Marcela Charfuelan, Begum Demir, and Volker Markl. 2019. Bigearthnet: A Large-Scale Benchmark Archive for Remote Sensing Image Understanding. _IGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium_ (Jul 2019). https://doi.org/10.1109/igarss.2019.8900532
* Wright and Wimberly (2013) Christopher K Wright and Michael C Wimberly. 2013. Recent land use change in the Western Corn Belt threatens grasslands and wetlands. _Proceedings of the National Academy of Sciences_ 110, 10 (2013), 4134–4139.
* Xia et al. (2018) Gui-Song Xia, Xiang Bai, Jian Ding, Zhen Zhu, Serge Belongie, Jiebo Luo, Mihai Datcu, Marcello Pelillo, and Liangpei Zhang. 2018. DOTA: A Large-Scale Dataset for Object Detection in Aerial Images. In _2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 3974–3983. https://doi.org/10.1109/CVPR.2018.00418
* Yang and Newsam (2010) Yi Yang and Shawn Newsam. 2010. Bag-of-Visual-Words and Spatial Extensions for Land-Use Classification. In _Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems_ (San Jose, California) _(GIS ’10)_. Association for Computing Machinery, New York, NY, USA, 270–279. https://doi.org/10.1145/1869790.1869829
NMSE SCATTERPLOT STATISTICS | ALL DISAGREEMENT | CROP DISAGREEMENT
---|---|---
TOTAL POINTS | 2681881 | 2027776
STATT BETTER | 1672366 | 1323883
CDL BETTER | 1009515 | 703893
STATT BETTER MEAN | 0.1321 | 0.1567
CDL BETTER MEAN | 0.0857 | 0.1091
Table 4. NMSE scatterplots
## 8\. Appendix
### 8.1. NMSE analysis
In this section we propose another method of analysis, estimated F1 score
analysis method. In this method we try to estimate the actual F1 score of CDL
and STATT based on proximity of NDVI series of pixels with respect to the
characteristic NDVI series using Normalised mean square error.
Like the AUC analysis we calculate the characteristic NDVI series gridwise for
each class using the agreement pixels and consider a characteristic series to
be valid only if there are at least ’T’ pixels in agreement in the grid. Once
again in this experiment, we set ’T’ to be 100. Once again for each pixel of
disagreement for each class we calculate the mean square error with the
characteristic NDVI series and the NDVI series of the the pixel of
disagreement and store all these scores and then normalise each after all
disagreement pixels series errors have been calculated. We then set a
threshold below which the NMSE should be for a pixel so that it can be
considered for F1 score calculation. We set this threshold by finding that
threshold at which at least 25 to 45 percent of the disagreement pixels have
an NMSE score less than that threshold. Note that in this step we are not
distinguishing between CDL and STATT pixels, but consider overall all the
pixels of disagreement. Now after setting the threshold, we then find out how
many of these pixels that cross the threshold are from CDL and how many are
from STATT. We also have the number of agreement pixels in that grid as well
and also number of disagreement pixels from STATT and CDL for the class and
the grid in question. Using these numbers we can calculate the F1 score for
CDL and STATT separately using the formula:
(3) $F1\\_Score_{strategy}=\frac{2\times Precision_{strategy}\times
Recall_{strategy}}{Precision_{strategy}+Recall_{strategy}}$
(4)
$Precision_{strategy}=\frac{count\\_thresholded_{strategy}+count\\_agreement}{count\\_disagree_{strategy}+count\\_agreement}$
(5)
$Recall_{strategy}=\frac{count\\_thresholded_{strategy}+count\\_agreement}{count\\_thresholded_{total}+count\\_agreement}$
where $strategy$ represents either CDL or STATT. We conducted this analysis on
all classes for which USDA reports statistics and the results can be found in
Table. 5. As can be seen from the table STATT has a higher F1 score when
compared to CDL on all but 3 classes. The table also verifies our fallow land
proposition by a significantly higher f1 score.
### 8.2. NMSE Scatterplot
In this section we present a scatter plot based method to globally show
improvement over CDL overall and not class wise. As mentioned before, for each
point of disagreement CDL predicts a class, which we call CDL class, and STATT
predicts another class, which we call STATT class. Now as mentioned in the
previous section, we create the characteristic NDVI series for each class
using the agreement pixels for each class. Now for each disagreement pixel, we
compare the Normalised Mean Square Error and plot in the form of a scatterplot
shown in the left of Fig. 11. The right scatterplot represents a subset of
these disagreement points where at least one of the strategies has predicted a
crop class.
Since the distinction between the methods is not exactly clear from the
scatterplots, the statistics for both the plots are present in 4. From the
table we can see that when we look at all the pixels overall STATT is closer
to the respective characteristic NDVI class series in 1672366 pixels when
compared to where CDL is closer,i.e 1009515 pixels. However, when we look at
just the crop confusion pixels we can see STATT is better in almost double the
amount of pixels that CDL is better in, thus showing global superiority of
STATT when compared to CDL.
Class | Nmse error threshold | $Count_{agreement}$ threshold | F1 CDL | F1 STATT | F1 USDA(rep) | % pixels
---|---|---|---|---|---|---
Almonds | 0.5 | 100 | 0.9513 | 0.9575 | 0.9516 | 0.4104
Rice | 0.2 | 100 | 0.9615 | 0.9845 | 0.9805 | 0.4616
Alfalfa | 0.3 | 100 | 0.8185 | 0.8612 | 0.8812 | 0.3162
Pistachio | 0.3 | 100 | 0.8012 | 0.9150 | 0.9632 | 0.2438
Grapes | 0.3 | 100 | 0.8945 | 0.8804 | 0.9830 | 0.4293
Fallow and Idle | 0.3 | 100 | 0.7229 | 0.8122 | 0.7183 | 0.5164
Cotton | 0.2 | 100 | 0.9532 | 0.9464 | 0.9314 | 0.4212
Walnut | 0.2 | 100 | 0.8859 | 0.8930 | 0.9514 | 0.5281
Tomatoes | 0.2 | 100 | 0.8829 | 0.9650 | 0.8764 | 0.3469
Winter Wheat | 0.2 | 100 | 0.8340 | 0.8976 | 0.7000 | 0.3003
Corn | 0.2 | 100 | 0.7734 | 0.8613 | 0.7530 | 0.4092
Citrus | 0.3 | 100 | 0.8407 | 0.8678 | 0.7583 | 0.2891
Sunflower | 0.2 | 100 | 0.9703 | 0.8630 | 0.7956 | 0.2856
Onions | 0.1 | 100 | 0.8064 | 0.8274 | 0.7553 | 0.2205
Olives | 0.2 | 100 | 0.8816 | 0.9663 | 0.9255 | 0.2298
Dry Beans | 0.3 | 100 | 0.9747 | 0.9929 | 0.6503 | 0.3472
Pomegranates | 0.2 | 100 | 0.7143 | 0.7796 | 0.9448 | 0.2401
Garlic | 0.2 | 100 | 0.9191 | 0.9572 | 0.8242 | 0.3481
Cherries | 0.4 | 100 | 0.9005 | 0.9240 | 0.9521 | 0.2533
Safflower | 0.1 | 100 | 0.8137 | 0.8083 | 0.6899 | 0.4173
AVG: | | | 0.8650 | 0.8980 | 0.8493 |
Table 5. NMSE analysis table Figure 11. NMSE Scatterplot for all disagreement
points as well as crop disagreement points
| arxiv-papers | 2021-07-26T22:20:16 | 2024-09-04T03:07:20.133415 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Rahul Ghosh, Praveen Ravirathinam, Xiaowei Jia, Ankush Khandelwal,\n David Mulla, Vipin Kumar",
"submitter": "Rahul Ghosh",
"url": "https://arxiv.org/abs/2107.12499"
} |
2107.12511 | # Regularity properties of passive scalars with rough divergence-free drifts
Dallas Albritton Courant Institute of Mathematical Sciences, New York
University, New York, NY 10012 [email protected] and Hongjie Dong
Division of Applied Mathematics, Brown University, 182 George Street,
Providence, RI 02912 [email protected]
###### Abstract.
We present sharp conditions on divergence-free drifts in Lebesgue spaces for
the passive scalar advection-diffusion equation
$\partial_{t}\theta-\Delta\theta+b\cdot\nabla\theta=0$
to satisfy local boundedness, a single-scale Harnack inequality, and upper
bounds on fundamental solutions. We demonstrate these properties for drifts
$b$ belonging to $L^{q}_{t}L^{p}_{x}$, where $\frac{2}{q}+\frac{n}{p}<2$, or
$L^{p}_{x}L^{q}_{t}$, where $\frac{3}{q}+\frac{n-1}{p}<2$. For steady drifts,
the condition reduces to $b\in L^{\frac{n-1}{2}+}$. The space
$L^{1}_{t}L^{\infty}_{x}$ of drifts with ‘bounded total speed’ is a borderline
case and plays a special role in the theory. To demonstrate sharpness, we
construct counterexamples whose goal is to transport anomalous singularities
into the domain ‘before’ they can be dissipated.
###### Contents
1. 1 Introduction
2. 2 Local boundedness and Harnack’s inequality
3. 3 Bounded total speed
4. 4 Counterexamples
5. 5 Upper bounds on fundamental solutions
## 1\. Introduction
We consider the linear advection-diffusion equation
$\partial_{t}\theta-\Delta\theta+b\cdot\nabla\theta=0.$ (A-D)
The solution $\theta=\theta(x,t)$ is known as a _passive scalar_ , and the
prescribed divergence-free velocity field $b=b(x,t)$ is known as the _drift_.
Our goal is to understand, in detail, the regularity properties of (A-D) when
the drift $b$ is _rough_. Rough divergence-free drifts arises naturally in the
context of nonlinear PDEs in fluid dynamics.
To understand what is ‘rough’, we recall the scaling symmetry
$u\to u(\lambda x,\lambda^{2}t),\quad b\to\lambda b(\lambda
x,\lambda^{2}t),\quad\lambda>0.$ (1.1)
In dimensional analysis, one writes $[x]=L$, $[t]=L^{2}$, and $[b]=L^{-1}$.
The scaling (1.1) identifies the Lebesgue spaces $L^{q}_{t}L^{p}_{x}$, where
$\frac{2}{q}+\frac{n}{p}\leq 1$, as _(sub)critical_ spaces for the drift,
meaning spaces whose norms do not grow upon ‘zooming in’ with the scaling
symmetry. For example,
$X=L^{\infty}_{t}L^{n}_{x},\,L^{2}_{t}L^{\infty}_{x},\,L^{n+2}_{t,x}$ (1.2)
are _critical spaces_ , whose norms are dimensionless, i.e., invariant under
the symmetry (1.1). Here, $n\geq 2$ is the spatial dimension.
When $b$ belongs to one of the above critical Lebesgue spaces, it is not
difficult to adapt the work of De Giorgi, Nash, and Moser [DG57, Nas58, Mos64]
to demonstrate that weak solutions of (A-D) are Hölder continuous and satisfy
Harnack’s inequality. The above threshold is known to be _sharp_ for Hölder
continuity within the scale of Lebesgue spaces, see the illuminating
counterexamples in [SVZ13, Wu21]. The divergence-free condition moreover
allows access to drifts in the critical spaces
$X=L^{\infty}_{t}L^{-1,\infty}_{x},L^{\infty}_{t}{\rm BMO}^{-1}_{x}$,
considered by [Osa87, SSvZ12, QX19b]. In these spaces, it is furthermore
possible to prove Gaussian upper and lower bounds on fundamental solutions in
the spirit of Aronson [Aro67].
In this paper, we are concerned with _supercritical_ drifts, for which
continuity may fail. Nonetheless, much of the regularity theory may be
salvaged. The divergence-free structure plays a crucial role here,111The
divergence-free structure plays a more subtle role in the critical case.
Without this structure, the drift is required to be small in a critical
Lebesgue space or Kato class, and local boundedness may depend on the
‘profile’ of the drift. as is already visible from the computation
$\int(b\cdot\nabla\theta)\theta\phi^{2}\,dx\,dt=\int
b\cdot\nabla\left(\frac{\theta^{2}}{2}\right)\phi^{2}\,dx\,dt=-\int\theta^{2}(b\cdot\nabla\phi)\phi.$
(1.3)
With this well known observation, one may apply Moser’s iteration scheme to
demonstrate that, when $b\in L^{q}_{t}L^{p}_{x}$ and
$\frac{2}{q}+\frac{n}{p}<2$, solutions are _locally bounded_ , see [NUt11].
Typical examples are
$X=L^{\infty}_{t}L^{\frac{n}{2}+}_{x},L^{\frac{n+2}{2}+}_{t,x}.$ (1.4)
Under these conditions (and a weak background assumption), the Harnack
inequality persists as a _single-scale Harnack inequality_ [IKR14, IKR16]: In
the steady case $\theta=\theta(x)$,
$\sup_{B_{R}}\theta\leq C_{R}\inf_{B_{R}}\theta,$ (1.5)
where $C_{R}$ may become unbounded as $R\to 0^{+}$. Whereas a scale-invariant
Harnack inequality implies Hölder continuity, it is perhaps less well known
that a single-scale Harnack may hold in the absence of Hölder continuity.
Finally, in this setting, pointwise upper bounds on fundamental solutions
continue to hold, although they have ‘fat tails’ compared to their Gaussian
counterparts [Zha04, QX19a].
Our first contribution is to understand the sharpness of the condition $b\in
L^{q}_{t}L^{p}_{x}$, $\frac{2}{q}+\frac{n}{p}<2$. We find that
$L^{1}_{t}L^{\infty}_{x}$, the space of drifts with ‘bounded total speed’ (in
the terminology of [Tao13]), plays a special role and informs the
counterexamples we construct in Section 4. We summarize the results pertaining
to this condition in Theorem 1.1.
In the steady case, there is an additional subtle feature, which is not well
known and that we find surprising: Local boundedness continues to hold when
$b\in L^{\frac{n-1}{2}+}$. To our knowledge, this ‘dimension reduction’ was
first observed in this context by Kontovourkis [Kon07] in his thesis.222 This
‘dimension reduction’ itself goes back at least to work of Frehse and
R$\overset{\circ}{\text{u}}$žička [FR96] on the steady Navier-Stokes equations
in $n=6$. The ‘slicing’ is also exploited by Struwe in [Str88]. Heuristically,
Kontovourkis’ key observation is as follows. Consider the basic $L^{2}$ energy
estimate, in a ball $B_{r}$ without smooth cut-off. The drift contributes the
boundary term
$\int_{B_{r}}(b\cdot\nabla\theta)\theta\,dx=\int_{\partial
B_{r}}\frac{\theta^{2}}{2}b\cdot n\,d\sigma,$ (1.6)
where $d\sigma$ is the surface area measure. Since $\nabla\theta\in
L^{2}(B_{R})$, on ‘many slices’ $r\in(R/2,R)$, we have $\nabla\theta\in
L^{2}(\partial B_{r})$, with a quantitative bound. Similarly, $b$ belongs to
$L^{\frac{n-1}{2}+}(\partial B_{r})$ on ‘many slices’. Thus, one may exploit
Sobolev embedding on the sphere $\partial B_{r}$ to estimate the boundary
term. This dimension reduction was recently rediscovered by Bella and
Schäffner [BS21], who proved local boundedness and a single-scale Harnack
inequality in the context of certain degenerate elliptic PDEs, which we review
below.
Since the work of Kontovourkis, it has been an interesting question, what
dimension reduction holds in the parabolic setting? In particular, is $b\in
L^{\frac{n+1}{2}+}_{t,x}$ enough for local boundedness? Very recently, X.
Zhang [Zha20] generalized the work [BS21] of Bella and Schäffner to the
parabolic setting, and among other things, demonstrated local boundedness
under the condition $b\in L^{p}_{x}L^{q}_{t}$, $\frac{3}{q}+\frac{n-1}{p}<2$,
$p\leq q$, see Corollary 1.5 therein. Crucially, the order of integration is
reversed. The condition $b\in L^{\frac{n-1}{2}+}_{x}L^{\infty}_{t}$ implies
the elliptic case of Kontovourkis. From this condition, we see that, perhaps,
one dimension is not ‘reduced’, but rather hidden into the time variable.
In Theorem 1.2, we present our second contribution, namely, (i) the parabolic
Harnack inequality and pointwise upper bounds on fundamental solutions in this
setting, and (ii) counterexamples which illustrate the meaning and sharpness
of the ‘dimension reduction’.
We now present the main results, which constitute a detailed picture of the
local regularity theory for the passive scalar advection-diffusion equation
(A-D) with supercritical drifts.
Let $n\geq 2$, $\Omega\subset\mathbb{R}^{n}$ be a bounded domain, and
$\Omega^{\prime}\subset\subset\Omega$ be a subdomain. Let $I=(S,T]$ and
$I^{\prime}=(S^{\prime},T^{\prime}]\subset I$ be finite intervals such that
$S<S^{\prime}$. Let $Q_{I}=\Omega\times I$ and
$Q_{I}^{\prime}=\Omega^{\prime}\times I^{\prime}$. Let $p,q\in[1,+\infty]$.
###### Theorem 1.1 ($b\in L^{q}_{t}L^{p}_{x}$).
_(Local boundedness)_ [NUt11] If
$\zeta_{0}:=\frac{2}{q}+\frac{n}{p}<2,$ (1.7)
then we have the following _quantitative local boundedness_ property: If
$\theta\in L^{1}(Q_{I})\cap C^{\infty}(Q_{I})$ satisfies the drift-diffusion
equation (A-D) in $Q_{I}$ with divergence-free drift $b\in C^{\infty}(Q_{I})$
and
$b\in L^{q}_{t}L^{p}_{x}(Q_{I}),$ (1.8)
then
$\sup_{Q_{I}^{\prime}}|\theta|\lesssim\lVert\theta\rVert_{L^{1}(Q_{I})},$
(1.9)
where the implied constant depends on $n$, $\Omega$, $\Omega^{\prime}$, $I$,
$I^{\prime}$, $p$, $q$, and $\lVert b\rVert_{L^{q}_{t}L^{p}_{x}(Q_{I})}$.
_(Single-scale Harnack)_ [IKR16] If, additionally, $b\in
L^{2}_{t}H^{-1}_{x}(Q_{I})$ and $\theta>0$, then we have the following
_quantitative Harnack inequality_ : If $I_{1},I_{2}\subset\subset I$ are
intervals satisfying $\sup I_{1}<\inf I_{2}$, then
$\sup_{\Omega^{\prime}\times I_{1}}\theta\lesssim\inf_{\Omega^{\prime}\times
I_{2}}\theta,$ (1.10)
where the implied constant depends on $n$, $\Omega$, $\Omega^{\prime}$, $I$,
$I_{1}$, $I_{2}$, $p$, $q$, $\lVert b\rVert_{L^{q}_{t}L^{p}_{x}(Q_{I})}$, and
$\lVert b\rVert_{L^{2}_{t}H^{-1}_{x}(Q_{I})}$.
_(Bounded total speed)_ If $(p,q)=(\infty,1)$, then the above quantitative
local boundedness property holds with constants depending on $b$ itself rather
than $\|b\|_{L^{1}_{t}L^{\infty}_{x}(Q_{I})}$. (The property is false without
this adjustment.)
_(Sharpness)_ Let $Q=B_{1}\times(0,1)$. There exist a smooth divergence-free
drift $b\in C^{\infty}(Q)$ belonging to $L^{q}_{t}L^{p}_{x}(Q)$ for all
$(p,q)\in[1,+\infty]^{2}$ with $2/q+n/p=2$, $(p,q)\neq(\infty,1)$, and
satisfying the following property. There exists a smooth solution $\theta\in
L^{\infty}_{t}L^{1}_{x}\cap C^{\infty}(Q)$ to the advection-diffusion equation
(A-D) in $Q$ with
$\sup_{B_{1/2}\times(0,T)}|\theta|\to+\infty\text{ as }T\to 1_{-}.$
In particular, the above quantitative local boundedness property fails when
$2/q+n/p=2$ and $q>1$.
_(Upper bounds on fundamental solutions)_ [QX19a] If the divergence-free drift
$b\in C^{\infty}_{0}(\mathbb{R}^{n}\times[0,+\infty))$ belongs to
$L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n}\times\mathbb{R}_{+})$ and
$1\leq\zeta_{0}<2$, then the fundamental solution $\Gamma=\Gamma(x,t;y,s)$ to
the parabolic operator $L=\partial_{t}-\Delta+b\cdot\nabla$ satisfies
$\displaystyle\Gamma(x,t;y,s)$ $\displaystyle\leq
C(t-s)\left(\frac{1}{t-s}+\frac{M_{0}}{(t-s)^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}$
(1.11)
$\displaystyle\quad\times\left[\exp\left(-\frac{c|x-y|^{2}}{t-s}\right)+\exp\left(-\frac{c|x-y|^{1+\frac{1}{1+\alpha_{0}}}}{((t-s)M_{0})^{\frac{1}{1+\alpha_{0}}}}\right)\right]$
for all $x,y\in\mathbb{R}^{n}$ and $0\leq s<t<+\infty$. Here,
$\alpha_{0}=\frac{\zeta_{0}-1}{\theta_{2}},\quad
M_{0}=C\|b\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n}\times\mathbb{R}_{+})}^{\frac{1}{\theta_{2}}}+\frac{1}{4},\quad\theta_{2}=1-\frac{\zeta_{0}}{2}.$
(1.12)
See Figure 1 for an illustration of Theorem 1.1.
Figure 1. Divergence-free drift $b\in L^{q}_{t}L^{p}_{x}$ in dimension $n\geq
2$ (dimension $n=3$ illustrated above). _Region A_ ($2/q+n/p\leq 1$): Local
boundedness, Harnack inequality, and Hölder continuity. _Region B_
($1<2/q+n/p<2$ or $(p,q)=(\infty,1)$): Local boundedness and single-scale
Harnack inequality. _Dashed line_ : Local boundedness is false.
###### Theorem 1.2 ($b\in L^{p}_{x}L^{q}_{t}$).
_(Local boundedness)_ [Zha20] If
$\zeta_{0}:=\frac{3}{q}+\frac{n-1}{p}<2,\quad p\leq q,$ (1.13)
then we have the following _quantitative local boundedness_ property: If
$\theta\in L^{1}(Q_{I})\cap C^{\infty}(Q_{I})$ satisfies the drift-diffusion
equation (A-D) in $Q_{I}$ with divergence-free drift $b\in C^{\infty}(Q_{I})$
and
$b\in L^{p}_{x}L^{q}_{t}(Q_{I}),$ (1.14)
then
$\sup_{Q_{I}^{\prime}}|\theta|\lesssim\lVert\theta\rVert_{L^{1}(Q_{I})},$
(1.15)
where the implied constant depends on $n$, $\Omega$, $\Omega^{\prime}$, $I$,
$I^{\prime}$, $p$, $q$, and $\lVert b\rVert_{L^{p}_{x}L^{q}_{t}(Q_{I})}$.
_(Single-scale Harnack)_ If, additionally, $b\in L^{2}_{t}H^{-1}_{x}(Q_{I})$
and $\theta>0$, then we have the following _quantitative Harnack inequality_ :
If $I_{1},I_{2}\subset\subset I$ are intervals satisfying $\sup I_{1}<\inf
I_{2}$, then
$\sup_{\Omega^{\prime}\times I_{1}}\theta\lesssim\inf_{\Omega^{\prime}\times
I_{2}}\theta,$ (1.16)
where the implied constant depends on $n$, $\Omega$, $\Omega^{\prime}$, $I$,
$I_{1}$, $I_{2}$, $p$, $q$, $\lVert b\rVert_{L^{p}_{x}L^{q}_{t}(Q_{I})}$, and
$\lVert b\rVert_{L^{2}_{t}H^{-1}_{x}(Q_{I})}$.
_(Sharpness, steady case)_. Let $n\geq 3$. The quantitative local boundedness
property fails for steady drifts $b\in L^{\frac{n-1}{2}}(B)$ and steady
solutions $\theta$ in the ball $B$.
_(Sharpness, time-dependent case)_. Let $n\geq 2$ and $Q=B_{1}\times(0,1)$.
There exist a smooth divergence-free drift $b\in C^{\infty}(Q)$ belonging to
$L^{p}_{x}L^{q}_{t}(Q)$ for all $p,q\in[1,+\infty]$ with $p\leq q$ and
$3/q+(n-1)/p>2$ and satisfying the following property. There exists a smooth
solution $\theta\in L^{\infty}_{t}L^{1}_{x}\cap C^{\infty}(Q)$ to the
advection-diffusion equation (A-D) in $Q$ with
$\sup_{B_{1/2}\times(0,T)}|\theta|\to+\infty\text{ as }T\to 1_{-}.$
In particular, the above quantitative local boundedness property fails when
$3/q+(n-1)/p>2$ and $p\leq q$. Finally, the drift additionally belongs to
$L^{q}_{t}L^{p}_{x}(Q)$ for all $(p,q)\in[1,+\infty]^{2}$ with $2/q+n/p>2$.
_(Upper bounds on fundamental solutions)_ If the divergence-free drift $b\in
C^{\infty}_{0}(\mathbb{R}^{n}\times[0,+\infty))$ belongs to
$L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n}\times\mathbb{R}_{+})$ and
$1\leq\zeta_{0}<2$, then the fundamental solution $\Gamma=\Gamma(x,t;y,s)$ to
the parabolic operator $L=\partial_{t}-\Delta+b\cdot\nabla$ satisfies
$\displaystyle\Gamma(x,t;y,s)$ $\displaystyle\leq
C(t-s)\left(\frac{1}{t-s}+\frac{M_{0}}{(t-s)^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}$
(1.17)
$\displaystyle\quad\times\left[\exp\left(-\frac{c|x-y|^{2}}{t-s}\right)+\exp\left(-\frac{c|x-y|^{1+\frac{1}{1+\alpha_{0}}}}{((t-s)M_{0})^{\frac{1}{1+\alpha_{0}}}}\right)\right]$
for all $x,y\in\mathbb{R}^{n}$ and $0\leq s<t<+\infty$. Here,
$\alpha_{0}=\frac{\zeta_{0}-1}{\theta_{2}},\quad
M_{0}=C\|b\|_{L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n}\times\mathbb{R}_{+})}^{\frac{1}{\theta_{2}}}+\frac{1}{4},\quad\theta_{2}=1-\frac{\zeta_{0}}{2}.$
(1.18)
See Figures 2 and 3 for an illustration of Theorem 1.2.
Figure 2. Divergence-free drift $b\in L^{p}_{x}L^{q}_{t}$, dimension $n\geq 3$
(dimension $n=4$ illustrated above). Local boundedness and single-scale
Harnack inequality. Figure 3. Divergence-free drift $b\in L^{p}_{x}L^{q}_{t}$,
dimension $n=2$. Local boundedness and single-scale Harnack inequality.
We prove Theorems 1.1 and 1.2, including the known results, in a self-
contained way below.
###### Remark 1.3.
The local boundedness property and Harnack inequality in Theorems 1.1 and 1.2
can be easily extended to accomodate drifts satisfying
$\operatorname{div}b\leq 0$ (with the background assumption $b\in
L^{2}_{t,x}(Q_{I})$ in the Harnack inequality). These properties and the
fundamental solution estimates can also be extended to divergence-form
elliptic operators $\operatorname{div}a\nabla\cdot$ with bounded, uniformly
elliptic $a$.
###### Remark 1.4.
Our condition $b\in L^{2}_{t}H^{-1}_{x}(Q_{I})$ appears to be new and is used
to connect the forward- and backward-in-time regions in the Harnack
inequality, see Lemma 2.11. In contrast, the background condition in the
single-scale Harnack inequality in [IKR16] is $b\in
L^{\infty}_{t}L^{2}_{x}(Q_{I})$.
### Discussion of dimension reduction principle
The ‘slicing’ described above in the steady setting is more subtle in the
time-dependent setting because the anisotropic condition $\theta\in
L^{\infty}_{t}L^{2}_{x}$ does not restrict well to slices in the radial
variable $r$; compare this to the isotropic condition $\nabla\theta\in
L^{2}_{t,x}$. Indeed, to ‘slice’ in a variable, it seems necessary for that
variable to be summed ‘last’ (that is, on the outside) in the norm. The
condition $b\in L^{p}_{x}L^{q}_{t}$, $p\leq q$, $\frac{3}{q}+\frac{n-1}{p}<2$,
in Theorem 1.2 comes, roughly speaking, from interpolating between the
isotropic condition $b\in L^{\frac{n+2}{2}+}_{t,x}$, in which the order of
integration may be changed freely, and the dimensionally reduced condition
$b\in L^{\frac{n-1}{2}+}_{x}L^{\infty}_{t}$, which implies that $b\in
L^{\infty}_{t}L^{\frac{n-1}{2}+}_{\sigma}(\partial B_{r}\times I)$ on ‘many
slices’, say, a set of $r\in A\subset(1/2,1)$ with measure $|A|>1/4$. Local
boundedness under this condition was already observed by X. Zhang in [Zha20,
Corollary 1.5], and the counterexamples we construct answer an open question
in Remark 1.6 therein.
Our proof of local boundedness and the Harnack inequality is built on a
certain _form boundedness condition_ (FBC), see Section 2, which subsumes a
wide variety of possible assumptions on $b$. For example, in Proposition 2.3,
we verify (FBC) not only in the context of Theorems 1.1 and 1.2 but also under
the more general conditions
$b\in L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}((B_{R}\setminus B_{R/2})\times
I),\quad\beta\geq\frac{n}{2},\quad\frac{2}{q}+\frac{1}{\beta}+\frac{n-1}{\gamma}<2$
(1.19)
and
$b\in L^{\kappa}_{r}L^{q}_{t}L^{p}_{\sigma}((B_{R}\setminus B_{R/2})\times
I),\quad p\leq q,\quad\frac{3}{q}+\frac{n-1}{p}<2.$ (1.20)
Furthermore, we allow arbitrarily low integrability $\kappa>0$ in the radial
variable; the slicing method does not require high integrability. Our proof of
upper bounds on fundamental solutions is centered on a variant
($\widetilde{\text{FBC}}$) of the form boundedness condition, see Section 5,
partially inspired by the work of Qi S. Zhang [Zha04].
We now describe the work [BS21], which was generalized to the parabolic
setting in [Zha20]. The conditions in [BS21] are on the ellipticity matrix
$a$, which is allowed to be degenerate: Define
$\lambda(x):=\inf_{|\xi|=1}\xi\cdot
a(x)\xi,\quad\mu(x):=\sup_{|\xi|=1}\frac{|a(x)\xi|^{2}}{\xi\cdot a(x)\xi}.$
(1.21)
If $n\geq 2$, $p,q\in(1,+\infty]$, and
$\lambda^{-1}\in L^{q}(B),\quad\mu\in
L^{p}(B),\quad\frac{1}{p}+\frac{1}{q}<\frac{2}{n-1},$ (1.22)
then weak solutions of $-\operatorname{div}a\nabla u=0$ are locally bounded
and satisfy a single-scale Harnack inequality. The analogous condition with
$\frac{2}{n}$ on the right-hand side is due to Trudinger in [Tru71]. By
examples in [FSSC98], the right-hand side cannot be improved to
$\frac{2}{n-1}+\varepsilon$. Divergence-free drifts $b$ belong to the above
framework: Under general conditions, it is possible to realize $b$ as the
divergence of an antisymmetric _stream matrix_ : $b_{i}=d_{ij,i}$. Then we
have
$-\Delta\theta+b\cdot\nabla\theta=-\operatorname{div}[(I+d)\nabla\theta]$, and
$\mu$ captures the antisymmetric part $d$. The steady examples we construct in
Section 4 handle the equality case in (1.22). We mention also the works
[BS20b, BS20a].
Earlier, it was hoped that the dimension reduction could be further adapted to
treat the case $b\in L^{\frac{n+1}{2}+}_{t,x}$ in the parabolic setting by
estimating a half-derivative in time: $|\partial_{t}|^{1/2}\theta\in
L^{2}_{t,x}$, since this condition is better adapted to slicing than
$\theta\in L^{\infty}_{t}L^{2}_{x}$. On the other hand, our counterexamples
rule out this possibility. Half time derivatives in parabolic PDE go back, at
least, to [LSUt68, Chapter III, Section 4], see [ABES19] for further
discussion.
### Discussion of counterexamples and ‘bounded total speed’
Solutions of (A-D) in the whole space and evolving from initial data
$\theta_{0}\in L^{1}(\mathbb{R}^{n})$ become bounded instantaneously. This is
captured by the famous Nash estimate [Nas58]:
$\|\theta(\cdot,t)\|_{L^{\infty}(\mathbb{R}^{n})}\lesssim
t^{-\frac{n}{2}}\|\theta_{0}\|_{L^{1}(\mathbb{R}^{n})},$ (1.23)
where the implied constant is _independent_ of the divergence-free drift $b$.
The Nash estimate indicates that a divergence-free drift does not impede
smoothing, in the sense of boundedness, of a density, even if the density is
initially a Dirac mass. Therefore, for rough drifts, local boundedness must be
violated in a different way: The danger is that the drift can ‘drag’ an
anomolous singularity into the domain of observation from outside. There is a
competition between the drift, which transports the singularity with some
speed, and the diffusion, which smooths the singularity at some rate. Will the
singularity, entering from outside, be smoothed before it can be observed
inside the domain?
Consider a Dirac mass $\delta_{x=-\vec{e_{1}}}$, which we seek to transport
inside the domain. If one can transport the Dirac mass inside $B_{1/2}$
_instantaneously_ , one can violate local boundedness. This can be done easily
via the drift $b(x,t)=\delta_{t=0}\vec{e}_{1}$, which is singular in time.
This example already demonstrates the importance of the space
$L^{1}_{t}L^{\infty}_{x}$, whose drifts cannot transport the mass inside
arbitrarily quickly.
To improve this example, we seek the most efficient way to transport the Dirac
mass. Heuristically, the evolution of the Dirac mass is mostly supported in a
ball of radius $R(t)\sim\sqrt{t}$. Therefore, we define our drift $b$ to be
$S(t)\vec{e}_{1}$ restricted to this support. That is, the drift lives on a
ball of radius $R(t)$ moving in the $x_{1}$-direction at speed $S(t)$. Since
we wish to move the Dirac mass instantaneously, we guess that $S(t)\sim 1/t$.
A back-of-the-envelope calculation gives
$\|b\|_{L^{q}_{t}L^{p}_{x}}^{q}\sim\int_{0}^{1}S(t)^{q}R(t)^{\frac{nq}{p}}\,dt\sim\int_{0}^{1}t^{-q+\frac{nq}{2p}}\,dt.$
(1.24)
The above quantity is finite when $2/q+n/p>2$; more care is required to get
the borderline cases in Theorem 1.1, see Section 4. This heuristic is the
basis for our time-dependent counterexamples in Section 4, except that we use
appropriate subsolutions to keep the compact support property, we glue
together many of these Dirac masses, and $S(t)$ must be chosen more carefully.
The above transport-vs.-smoothing phenomenon is also responsible for the ‘fat
tails’ in the upper bounds (1.11) and (1.17) on the fundamental solutions.
These upper bounds do not align with the Nash estimate (1.23) because the Nash
estimate does not effectively capture spatial localization.
The elliptic counterexample with $b\in L^{\frac{n-1}{2}}$ is achieved by
introducing an ansatz which reduces the problem to counterexamples for the
steady Schrödinger equation $-\Delta u+Vu=0$ in dimension $n-1$. These steady
counterexamples are singular on a line through the domain, as they must be to
respect the maximum principle.
The time-dependent counterexamples in $L^{p}_{x}L^{q}_{t}$ seem to be more
subtle, and we only exhibit them in the non-borderline cases
$\zeta_{0}=\frac{3}{q}+\frac{n-1}{p}>2$ and $p\leq q$. When $\zeta_{0}=2$, we
have counterexamples in the cases $p=q=\frac{n+2}{2}$ and
$(p,q)=(\frac{n-1}{2},+\infty)$ (the steady example). We believe that local
boundedness fails also between these two points, but the counterexamples are
yet to be exhibited, see Remark 4.4.
### Review of existing literature
Following the seminal works of De Giorgi [DG57] and Nash [Nas58], Moser
introduced his parabolic Harnack inequality [Mos64, Mos67] (see [Mos61] for
the elliptic case), whose original proof relied on a parabolic generalization
of the John-Nirenberg theorem concerning exponential integrability of ${\rm
BMO}$ functions. Later, Moser published a simplified proof [Mos71], whose
basic methods we follow. In [SSvZ12], Seregin, Silvestre, Šverák, and Zlatoš
generalized Moser’s methods to accomodate drifts in $L^{\infty}_{t}{\rm
BMO}^{-1}_{x}$. For recent work on boundary behavior in this setting, see
[LP19, HLMP21]. Generalizations to critical Morrey spaces and the
supercritical Lebesgue spaces are due to [NUt11, IKR14, IKR16, Ign14].
The Gaussian estimates on fundamental solutions were discovered by Aronson
[Aro67] and were generalized to divergence-free drifts by Osada in [Osa87]
($L^{\infty}_{t}L^{-1,\infty}_{x}$) and Qian and Xi ($L^{\infty}_{t}{\rm
BMO}^{-1}_{x}$) in [QX19b, QX19a]. Important contributions are due to [Zha04],
who developed Gaussian-like upper bounds in the supercritical case $b\in
L^{\frac{n}{2}+}(\mathbb{R}^{n})$, $n\geq 4$, and [LZ04, MS04, Sem06], among
others. For recent progress on Green’s function estimates with sharp
conditions on lower order terms, see [DK18, KS19, Sak20, Mou19].
The primary examples concerning the regularity of solutions to (A-D) can be
found in [SSvZ12, SVZ13, Wu21]. Counterexamples to continuity with time-
dependent drifts can be constructed by colliding two discs of $+1$
(subsolution) and $-1$ (supersolution) with radii $R(t)\sim\sqrt{1-t}$ and
speeds $S(t)\sim 1/\sqrt{1-t}$. The parabolic counterexamples with _steady_
velocity fields constructed therein are more challenging. See [Fil13, FS18]
for examples in the elliptic setting. We also mention Zhikov’s counterexamples
[Zhi04] to uniqueness when $b$ does not belong to $L^{2}$, whereas weak
solutions with zero Dirichlet conditions are known to be unique when $b\in
L^{2}$ [Zha04].
For recent counterexamples in the regularity theory of parabolic systems based
on self-similarity, see [Moo17].
###### Remark 1.5.
At a technical level, there is a small but, perhaps, non-trivial gap in the
proof of the weak Harnack inequality in [IKR16], see (3.22) therein, where it
is claimed that $\log_{+}(\theta/\mathbf{K})$ is a supersolution. This seems
related to a step in the proof of Lemma 6.20, p. 124, in Lieberman’s book
[Lie96], which we had difficulty following, see the first inequality therein.
Both of these are related to improving the weak $L^{1}$ inequality.
We opt to follow Moser’s proof in [Mos71] more directly and skip the weak
Harnack inequality. In principle, one could directly apply the parabolic John-
Nirenberg inequality in [Mos64, FG85] to obtain the weak Harnack inequality.
## 2\. Local boundedness and Harnack’s inequality
Let $b$ be a smooth, divergence-free vector field defined on $B_{R_{0}}\times
I_{0}$, where $R_{0}>0$ and $I_{0}$ is an open interval. In the sequel, we
will use a _form boundedness condition_ , which we denote by (FBC):
> There exist constants $M,N,\alpha>0$, $\varepsilon\in[0,1/2)$, and
> $\delta\in(0,1]$ satisfying the following property. For every
> $R\in[R_{0}/2,R_{0}]$, subinterval $I\subset I_{0}$, and Lipschitz $u\in
> W^{1,\infty}(B_{R}\times I)$, there exists a measurable set
> $A=A(\varrho,R,I,u)\subset(\varrho,R)$ with $|A|\geq\delta(R-\varrho)$ and
> satisfying
>
> $\displaystyle-\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times
> I}\frac{|u|^{2}}{2}(b\cdot
> n)\,dx\,dt\leq\frac{MR_{0}^{\alpha}}{\delta^{\alpha}R_{0}^{2}(R-\varrho)^{\alpha}}\int\kern-3.39996pt\int_{(B_{R}\setminus
> B_{\varrho})\times I}|u|^{2}\,dx\,dt$ (FBC)
> $\displaystyle\quad\quad+N\int\kern-3.39996pt\int_{(B_{R}\setminus
> B_{\varrho})\times I}|\nabla u|^{2}\,dx\,dt+\varepsilon\sup_{t\in
> I}\int_{B_{R}}|u(x,t)|^{2}\,dx,$
>
> where $B_{A}=\cup_{r\in A}\partial B_{r}$ and $n$ is the outer unit normal.
The LHS of (FBC) appears on the RHS of the energy estimates.
In the situations we consider, $M$ may depend on $R_{0}$, and we can predict
its dependence based on dimensional analysis. For example, since $b$ has
dimensions of $L^{-1}$, the quantity
$R_{0}^{1-\frac{2}{q}-\frac{n}{p}}\|b\|_{L^{q}_{t}L^{p}_{x}(B_{R_{0}}\times
R_{0}^{2}I)}$
is dimensionless.
In Proposition 2.3, we show that (FBC) is satisfied under the hypotheses of
Theorems 1.1 and 1.2.
_Notation_. In this section, $R_{0}/2\leq\varrho<R\leq R_{0}$ and
$-\infty<T<\tau<0$. Let us introduce the backward parabolic cylinders
$Q_{R,T}=B_{R}\times(T,0)$. Our working assumptions are that $\theta$ is a
non-negative Lipschitz function and $b$ is a smooth, divergence-free vector
field. To give precise constants, we will frequently use the notation
$\mathbf{C}(\varrho,\tau,R,T,M,\delta,\alpha)=\frac{1}{\delta^{2}(R-r)^{2}}+\frac{MR_{0}^{\alpha}}{\delta^{\alpha}R_{0}^{2}(R-r)^{\alpha}}+\frac{1}{\tau-T}$
(2.1)
involving the various parameters from (FBC). Our convention throughout the
paper is that all implied constants may depend on $n$.
###### Theorem 2.1 (Local boundedness).
Let $\theta$ be a non-negative Lipschitz subsolution and $b$ satisfy (FBC) on
$Q_{R,T}$. Then, for all $\gamma\in(0,2]$,
$\sup_{Q_{\varrho,\tau}}\theta\lesssim_{N,\alpha,\varepsilon,\gamma}\mathbf{C}^{\frac{n+2}{2\gamma}}\lVert\theta\rVert_{L^{\gamma}(Q_{R,T}\setminus
Q_{\varrho,\tau})}.$ (2.2)
###### Theorem 2.2 (Harnack inequality).
Let $\theta$ be a non-negative Lipschitz solution on
$Q^{*}=B\times(-T^{*},T^{*})$. Let $b\in
L^{2}_{t}H^{-1}_{x}(Q^{*};\mathbb{R}^{n})$ satisfying (FBC) on $Q^{*}$. Let
$0<\ell<T^{*}$ be the time lag. Then
$\sup_{B_{1/2}\times(-T^{*}+\ell,0)}\theta\lesssim_{N,M,A,T^{*},\delta,\alpha,\varepsilon,\ell}\inf_{B_{1/2}\times(\ell,T^{*})}\theta,$
(2.3)
where $A=\lVert b\rVert_{L^{2}_{t}H^{-1}_{x}(Q^{*};\mathbb{R}^{n})}^{2}$.
### 2.1. Verifying (FBC)
We verify that (FBC) is satisfied in the setting of the main theorems:
###### Proposition 2.3 (Verifying FBC).
Let $p,q,\beta,\gamma\in[1,+\infty]$, $\kappa\in(0,+\infty]$, and $b$ be a
smooth, divergence-free vector field defined on $B_{R_{0}}\times I_{0}$.
1\. If
$b\in L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}((B_{R_{0}}\setminus
B_{R_{0}/2})\times
I_{0}),\quad\beta\geq\frac{n}{2},\quad\zeta_{0}:=\frac{2}{q}+\frac{1}{\beta}+\frac{n-1}{\gamma}<2,$
(2.4)
then $b$ satisfies (FBC) with $\alpha=1/\theta_{2}$, $A=(\varrho,R)$,
$\delta=1$, $N=\varepsilon=1/4$, and
$M=C\left(R_{0}^{1-\zeta_{0}}\|b\|_{L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}((B_{R_{0}}\setminus
B_{R_{0}/2})\times I_{0})}\right)^{\frac{1}{\theta_{2}}}+\frac{1}{4},$ (2.5)
where $\theta_{2}=1-\zeta_{0}/2$.
2\. If
$b\in L^{\kappa}_{r}L^{q}_{t}L^{p}_{\sigma}((B_{R_{0}}\setminus
B_{R_{0}/2})\times I_{0}),\quad p\leq
q,\quad\zeta_{0}:=\frac{3}{q}+\frac{n-1}{p}<2,$ (2.6)
then $b$ satisfies (FBC) with $\alpha=(1/\kappa+(q-1)/q)/\theta_{2}$,
$\delta=1/2$, $N=\varepsilon=1/4$, and
$M=C\left(R_{0}^{1-\zeta_{0}}\|b\|_{L^{\kappa}_{r}L^{q}_{t}L^{p}_{\sigma}((B_{R_{0}}\setminus
B_{R_{0}/2})\times I_{0})}\right)^{\frac{1}{\theta_{2}}}+\frac{1}{4},$ (2.7)
where $\theta_{2}=1-\zeta_{0}/2$.
###### Corollary 2.4 (FBC in $L^{p}_{x}L^{q}_{t}$).
Let $p,q\in[1,+\infty]$ and $b$ be as above. If
$b\in L^{p}_{x}L^{q}_{t}((B_{R_{0}}\setminus B_{R_{0}/2})\times I_{0}),\quad
p\leq q,\quad\zeta_{0}:=\frac{3}{q}+\frac{n-1}{p}<2,$ (2.8)
then $b$ satisfies (FBC) with $\alpha=(1/p+(q-1)/q)/\theta_{2}$, $\delta=1/2$,
$N=\varepsilon=1/4$, and
$M=C\left(R_{0}^{1-\zeta_{0}}\|b\|_{L^{p}_{x}L^{q}_{t}((B_{R_{0}}\setminus
B_{R_{0}/2})\times I_{0})}\right)^{\frac{1}{\theta_{2}}}+\frac{1}{4},$ (2.9)
where $\theta_{2}=1-\zeta_{0}/2$.
By Minkowski’s inequality, (2.8) is a special case of (2.6) with $\kappa=p$.
###### Remark 2.5.
Condition (2.4) automatically enforces $q\in(1,+\infty]$ and
$\gamma\in\left(\frac{n-1}{2},+\infty\right]$. Condition (2.6) automatically
enforces $q\in\left(\frac{n+2}{2},+\infty\right]$ and
$p\in\left(\frac{n-1}{2},+\infty\right]$.
###### Proof of Proposition 2.3.
First, we rescale $R_{0}=1$. Let $1/2\leq\varrho<R\leq 1$, $I\subset I_{0}$.
We restrict to $n\geq 3$ and summarize $n=2$ afterward. Unless stated
otherwise, the norms below are on $(B_{R}\setminus B_{\varrho})\times I$.
1\. Summary of embeddings for $u$. By the Sobolev embedding theorem, we have
$\|u\|_{L^{2}_{t}L^{2^{*}_{n}}_{x}}\lesssim\|u\|_{L^{2}}+\|\nabla
u\|_{L^{2}},\quad 2^{*}_{n}=\frac{2n}{n-2}.$ (2.10)
After interpolating with $\|u\|_{L^{\infty}_{t}L^{2}_{x}}$ and
$\|u\|_{L^{2}_{t,x}}$, we have
$\|u\|_{L^{q_{1}}_{t}L^{p_{1}}_{x}}\lesssim\|u\|_{L^{2}}^{\theta_{1}}(\|u\|_{L^{2}}+\|\nabla
u\|_{L^{2}}+\|u\|_{L^{\infty}_{t}L^{2}_{x}})^{1-\theta_{1}}$ (2.11)
for suitable $\theta_{1}=\theta_{1}(q_{1},p_{1})\in(0,1)$ whenever
$\frac{2}{q_{1}}+\frac{n}{p_{1}}>\frac{n}{2},\quad q_{1}\in[2,+\infty),\quad
p_{1}\in[2,2^{*}_{n}).$ (2.12)
Next, we employ the Sobolev embedding theorem on the spheres $\partial B_{r}$,
$r\in(\varrho,R)$:
$\|u\|_{L^{2}_{t}L^{2}_{r}L^{2^{*}_{n-1}}_{\sigma}}\lesssim\|u\|_{L^{2}}+\|\nabla
u\|_{L^{2}}.$ (2.13)
Interpolating with (2.11), we have
$\|u\|_{L^{q_{2}}_{t}L^{\beta_{2}}_{r}L^{\gamma_{2}}_{\sigma}}\lesssim\|u\|_{L^{2}}^{\theta_{2}}(\|u\|_{L^{2}}+\|\nabla
u\|_{L^{2}}+\|u\|_{L^{\infty}_{t}L^{2}_{x}})^{1-\theta_{2}}$ (2.14)
for suitable $\theta_{2}=\theta_{2}(q_{2},\beta_{2},\gamma_{2})\in(0,1)$
whenever
$\frac{2}{q_{2}}+\frac{1}{\beta_{2}}+\frac{n-1}{\gamma_{2}}>\frac{n}{2},\quad
q_{2}\in[2,+\infty),\quad\beta_{2}\in[2,2^{*}_{n}),\quad\gamma_{2}\in[2,2^{*}_{n-1}).$
(2.15)
The condition (2.15) describes a region in the parameter space
$\\{(1/q_{2},1/\beta_{2},1/\gamma_{2})\\}\subset\mathbb{R}^{3}$ in a
tetrahedron with vertices $(1/2,1/2,1/2)$, $(1/2,1/2^{*}_{n},1/2^{*}_{n})$,
$(1/2,1/2,1/2^{*}_{n-1})$, and $(0,1/2,1/2)$. We compute $\theta_{2}$
according to
$\theta_{2}\left(\frac{n+2}{2}\right)+(1-\theta_{2})\left(\frac{n+2}{2}-1\right)=\frac{2}{q_{2}}+\frac{1}{\beta_{2}}+\frac{n-1}{\gamma_{2}}.$
(2.16)
2\. Verifying (FBC) for condition (2.4). Choose $q_{2}/2=q^{\prime}$ and
$\beta_{2}/2=\beta^{\prime}$, where ′ denotes Hölder conjugates. This is
admissible according to the restrictions on $q$, $\beta$, $q_{2}$, and
$\beta_{2}$ described in (2.4), Remark 2.5, and (2.15). We choose $\gamma_{2}$
to satisfy
$\left(\frac{2}{q}+\frac{1}{\beta}+\frac{n-1}{\gamma}\right)+2\left(\frac{2}{q_{2}}+\frac{1}{\beta_{2}}+\frac{n-1}{\gamma_{2}}\right)=n+2.$
(2.17)
This is possible according to the numerology in (2.4) and (2.15). Unfolding
(2.17), we find $\gamma_{2}/2=\gamma^{\prime}$. Finally, we choose
$A=(\varrho,R)$ and compute $\theta_{2}$ according to (2.16). Then
$\displaystyle\left|\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times
I}\frac{|u|^{2}}{2}b\cdot
n\,dx\,dt\right|\leq\frac{1}{R-\varrho}\|b\|_{L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}}\|u\|_{L^{q_{2}}_{t}L^{\beta_{2}}_{r}L^{\gamma_{2}}_{\sigma}}^{2}$
(2.18)
$\displaystyle\quad\overset{\eqref{eq:uinterpineq}}{\leq}\frac{C}{R-\varrho}\|b\|_{L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}}\|u\|_{L^{2}}^{2\theta_{2}}(\|u\|_{L^{2}}+\|\nabla
u\|_{L^{2}}+\|u\|_{L^{\infty}_{t}L^{2}_{x}})^{2-2\theta_{2}}$
$\displaystyle\quad\quad\leq
C\frac{\|b\|_{L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}}^{\frac{1}{\theta_{2}}}}{(R-\varrho)^{\frac{1}{\theta_{2}}}}\|u\|_{L^{2}}^{2}+\frac{1}{4}(\|u\|_{L^{2}}^{2}+\|\nabla
u\|_{L^{2}}^{2}+\|u\|_{L^{\infty}_{t}L^{2}_{x}}^{2}),$
where we used Young’s inequality in the last step. This implies (FBC).
3\. Verifying (FBC) for condition (2.6). First, we identify _good slices_ for
$b$. Specifically, we apply Chebyshev’s inequality in $r$ to the integrable
function
$r\mapsto\big{\lVert}b|_{I\times\partial
B_{r}}\big{\rVert}_{L^{q}_{t}L^{p}_{\sigma}(I\times\partial B_{r})}^{\kappa}$
(2.19)
to obtain that, on a set $A=A(\varrho,R,I)$ of measure $|A|\geq(R-\varrho)/2$,
we have
$\lVert b\rVert_{L^{\infty}_{r}L^{q}_{t}L^{p}_{\sigma}(B_{A}\times
I)}\lesssim\frac{1}{(R-\varrho)^{\frac{1}{\kappa}}}\lVert
b\rVert_{L^{\kappa}_{r}L^{q}_{t}L^{p}_{\sigma}((B_{R}\setminus
B_{\varrho})\times I)}$ (2.20)
where $B_{A}=\cup_{r\in A}\partial B_{r}$.
Now we choose $q_{2}/2=q^{\prime}$, $\beta_{2}=q_{2}$, and
$\gamma_{2}\in[2,2^{*}_{n-1})$ satisfying (2.15) and
$\left(\frac{3}{q}+\frac{n-1}{p}\right)+2\left(\frac{3}{q_{2}}+\frac{n-1}{\gamma_{2}}\right)=n+2.$
(2.21)
Unfolding (2.21), we discover $\gamma_{2}/2=p^{\prime}$. This allows us to
compute $\theta_{2}$ according to (2.16). Moreover, since $q_{2}=\beta_{2}$ in
(2.15), we have
$L^{q_{2}}_{t}L^{\beta_{2}}_{r}L^{\gamma_{2}}_{\sigma}=L^{\beta_{2}}_{r}L^{q_{2}}_{t}L^{\gamma_{2}}_{\sigma}$.
Then
$\displaystyle\left|\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times
I}\frac{|u|^{2}}{2}b\cdot
n\,dx\,dt\right|\leq\frac{C}{R-\varrho}\|b\|_{L^{\infty}_{r}L^{q}_{t}L^{p}_{\sigma}}(R-\varrho)^{1-\frac{2}{\beta_{2}}}\|u\|_{L^{\beta_{2}}_{r}L^{q_{2}}_{t}L^{\gamma_{2}}_{\sigma}}^{2}$
(2.22)
$\displaystyle\quad\overset{\eqref{eq:uinterpineq}}{\leq}\frac{C}{(R-\varrho)^{\frac{1}{\kappa}+\frac{2}{\beta_{2}}}}\lVert
b\rVert_{L^{\kappa}_{r}L^{q}_{t}L^{p}_{\sigma}((B_{R}\setminus
B_{\varrho})\times I)}\|u\|_{L^{2}}^{2\theta_{2}}(\|u\|_{L^{2}}+\|\nabla
u\|_{L^{2}}+\|u\|_{L^{\infty}_{t}L^{2}_{x}})^{2(1-\theta_{2})}$
$\displaystyle\quad\quad\leq C\frac{\lVert
b\rVert_{L^{\kappa}_{r}L^{q}_{t}L^{p}_{\sigma}((B_{1}\setminus B_{1/2})\times
I)}^{\frac{1}{\theta_{2}}}}{(R-\varrho)^{\frac{1}{\theta_{2}}(\frac{1}{\kappa}+\frac{2}{\beta_{2}})}}\|u\|_{L^{2}}^{2}+\frac{1}{4}(\|u\|_{L^{2}}^{2}+\|\nabla
u\|_{L^{2}}^{2}+\|u\|_{L^{\infty}_{t}L^{2}_{x}}^{2}).$
This completes the proof of (FBC).
4\. Dimension $n=2$. The Sobolev embedding (2.13) on the sphere bounds instead
$\|u\|_{L^{2}_{t}L^{2}_{r}C^{1/2}_{\sigma}}\lesssim\|u\|_{L^{2}}+\|\nabla
u\|_{L^{2}},$
so we must adjust the proof of the interpolation (2.14). After the initial
interpolation step between $L^{2}_{t}L^{2^{*}_{n}}_{x}$,
$L^{\infty}_{t}L^{2}_{x}$ and $L^{2}_{t,x}$ (where $2^{*}_{n}$ is now any
large finite number), we apply the following Gagliardo-Nirenberg inequality on
spheres:
$\|u\|_{L^{q}(B_{r})}\lesssim\|u\|_{L^{p}(B_{r})}^{\theta}\|u\|_{C^{1/2}(B_{r})}^{1-\theta},\quad-\frac{n-1}{q}=\theta\left(-\frac{n-1}{p}\right)+\frac{1-\theta}{2},$
(2.23)
where $p,q\in[1,+\infty]$, $\theta\in(0,1]$, and $r\in[1/2,1]$. This allows us
to recover (2.14), where now $\gamma_{2}=+\infty$ is also allowed, and
complete the proof.
To prove (2.23), we first use local coordinates on the sphere and a partition
of unity333Alternatively, since $n=2$, we could argue on the flat torus
without a partition of unity. The argument we present here is more general. to
reduce to functions $f$ on $\mathbb{R}^{n-1}$. Next, we use that $L^{p}\subset
B^{-\frac{n-1}{p}}_{\infty,\infty}$, $C^{1/2}=B^{1/2}_{\infty,\infty}$, and
real interpolation
$[B^{-\frac{n-1}{p}}_{\infty,\infty},B^{1/2}_{\infty,\infty}]_{\theta,1}=B^{0}_{q,1}\subset
L^{q}$ (2.24)
to demonstrate
$\|f\|_{L^{q}}\lesssim\|f\|_{L^{p}(B_{r})}^{\theta}\|f\|_{C^{1/2}(B_{r})}^{1-\theta}\lesssim\varepsilon^{\frac{1}{\theta}}\|f\|_{L^{p}(B_{r})}+\varepsilon^{-\frac{1}{1-\theta}}\|f\|_{C^{1/2}(B_{r})}.$
(2.25)
We piece together $u$ from the functions $f$ and optimize in $\varepsilon$ to
obtain (2.23). ∎
###### Remark 2.6 (On $\widetilde{\text{FBC}}$).
For pointwise upper bounds on fundamental solutions in Section 5, we require a
global, revised form boundedness condition ($\widetilde{\text{FBC}}$), in
which we allow $\varepsilon$ to vary in $(0,+\infty)$. We refine (2.18) by
keeping track of the $\varepsilon$ dependence in Hardy’s inequality:
$\displaystyle\left|\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times
I}\frac{|u|^{2}}{2}b\cdot
n\,dx\,dt\right|\leq\frac{C\|b\|_{L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}((B_{R}\setminus
B_{\varrho})\times
I)}^{\frac{1}{\theta_{2}}}}{\varepsilon^{\frac{1-\theta_{2}}{\theta_{2}}}(R-\varrho)^{\frac{1}{\theta_{2}}}}\|u\|_{L^{2}}^{2}+\varepsilon\left(\|u\|_{L^{2}}^{2}+\|\nabla
u\|_{L^{2}}^{2}+\|u\|_{L^{\infty}_{t}L^{2}_{x}}^{2}\right),$ (2.26)
A similar refinement holds in (2.22). We require these refinements in the
justification of Lemma 5.3.
### 2.2. Proof of local boundedness
To begin, we prove Cacciopoli’s inequality:
###### Lemma 2.7 (Cacciopoli inequality).
Under the hypotheses of Theorem 2.1,
$\sup_{t\in(\tau,0)}\int_{B_{r}}|\theta(x,t)|^{2}\,dx+\int\kern-3.39996pt\int_{Q_{\varrho,\tau}}|\nabla\theta|^{2}\,dx\,dt\lesssim_{N,\alpha,\varepsilon}\mathbf{C}\int\kern-3.39996pt\int_{Q_{R,T}\setminus
Q_{\varrho,\tau}}|\theta|^{2}\,dx\,dt.$ (2.27)
###### Proof of Lemma 2.7.
Let $\eta\in C^{\infty}_{0}(T,+\infty)$ satisfying $0\leq\eta\leq 1$ on
$\mathbb{R}$, $\eta\equiv 1$ on $(\tau,+\infty)$ and $0\leq d\eta/dt\lesssim
1/(\tau-T)$. Let $r\in(\varrho,R)$ and $t\in(\tau,0)$. To begin, we multiply
by $\theta\eta^{2}$ and integrate over $B_{r}\times(T,t)$:
$\displaystyle\frac{1}{2}\int_{B_{r}}|\theta(x,t)|^{2}\,dx+\int\kern-3.39996pt\int_{B_{r}\times(\tau,t)}|\nabla\theta|^{2}\,dx\,ds$
(2.28)
$\displaystyle\quad\leq\int\kern-3.39996pt\int_{B_{R}\times(T,t)}|\theta|^{2}\frac{d\eta}{ds}\eta\,dx\,ds+\int\kern-3.39996pt\int_{\partial
B_{r}\times(T,t)}\Big{(}\frac{d\theta}{dn}\theta\eta^{2}-\frac{\theta^{2}}{2}(b\cdot
n)\eta^{2}\Big{)}\,d\sigma\,ds.$
Next, we average in the $r$ variable over the set of ‘good slices’,
$A=A(\varrho,R,(T,t),\theta\eta)$, which was defined in (FBC):
$\displaystyle\frac{1}{2}\int_{B_{\varrho}}|\theta(x,t)|^{2}\,dx+\int\kern-3.39996pt\int_{B_{\varrho}\times(\tau,t)}|\nabla\theta|^{2}\,dx\,ds$
(2.29)
$\displaystyle\quad\leq\frac{C}{\tau-T}\int\kern-3.39996pt\int_{B_{R}\times(T,\tau)}|\theta|^{2}\,dx\,ds+\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times(T,t)}\Big{(}\frac{d\theta}{dn}\theta\eta^{2}-\frac{\theta^{2}}{2}(b\cdot
n)\eta^{2}\Big{)}\,dx\,ds,$
where $B_{A}=\cup_{r\in A}\partial B_{r}$. Let us estimate the term containing
$d\theta/dn$:
$\displaystyle\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times(T,t)}\frac{d\theta}{dn}\theta\eta^{2}\,dx\,ds$
(2.30)
$\displaystyle\quad\leq\frac{1}{\delta^{2}(R-r)^{2}}\int\kern-3.39996pt\int_{Q_{R,T}\setminus
Q_{\varrho,\tau}}|\theta|^{2}\,dx\,ds+\int\kern-3.39996pt\int_{Q_{R,T}\setminus
Q_{\varrho,\tau}}|\nabla\theta|^{2}\,dx\,ds.$
To estimate the term containing $b$, we use (FBC) with $u=\theta\eta$:
$\displaystyle-\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times(T,t)}\frac{\theta^{2}}{2}(b\cdot
n)\eta^{2}\,dx\,ds\leq\frac{M}{\delta^{\alpha}(R-r)^{\alpha}}\int\kern-3.39996pt\int_{Q_{R,T}\setminus
Q_{\varrho,\tau}}|\theta|^{2}\,dx\,ds$ (2.31)
$\displaystyle\quad+N\int\kern-3.39996pt\int_{Q_{R,T}\setminus
Q_{\varrho,\tau}}|\nabla\theta|^{2}\,dx\,ds+\varepsilon\sup_{s\in(T,t)}\int_{B_{R}}|\theta(x,s)|^{2}\,dx.$
Combining everything and applying $\sup_{t\in(T,0)}$, we obtain
$\displaystyle\frac{1}{2}\sup_{t\in(\tau,0)}\int_{B_{\varrho}}|\theta(x,t)|^{2}\,dx+\int\kern-3.39996pt\int_{Q_{\varrho,\tau}}|\nabla\theta|^{2}\,dx\,dt\leq
C\times\mathbf{C}\int\kern-3.39996pt\int_{Q_{R,T}\setminus
Q_{\varrho,\tau}}|\theta|^{2}\,dx\,dt$ (2.32)
$\displaystyle\quad\quad+(1+N)\int\kern-3.39996pt\int_{Q_{R,T}\setminus
Q_{\varrho,\tau}}|\nabla\theta|^{2}\,dx\,dt+\varepsilon\sup_{t\in(T,0)}\int_{B_{R}}|\theta(x,t)|^{2}\,dx.$
By Widman’s hole-filling trick, there exists
$\gamma:=\max\\{(N+1)/(N+2),2\varepsilon\\}\in(0,1)$ satisfying
$\displaystyle\frac{1}{2(N+2)}\sup_{t\in(\tau,0)}\int_{B_{\varrho}}|\theta(x,t)|^{2}\,dx+\int\kern-3.39996pt\int_{Q_{\varrho,\tau}}|\nabla\theta|^{2}\,dx\,dt\leq
C(N)\times\mathbf{C}\int\kern-3.39996pt\int_{Q_{R,T}\setminus
Q_{\varrho,\tau}}|\theta|^{2}\,dx\,dt$ (2.33)
$\displaystyle\quad\quad+\gamma\int\kern-3.39996pt\int_{Q_{R,T}}|\nabla\theta|^{2}\,dx\,dt+\frac{\gamma}{2(N+2)}\sup_{t\in(T,0)}\int_{B_{R}}|\theta(x,t)|^{2}\,dx.$
To remove the extra terms on the RHS, we use a standard iteration argument on
a sequence of scales (progressing ‘outward’) $\varrho_{0}=\varrho$,
$\varrho_{k+1}=\varrho+(1-\lambda^{k+1})(R-\varrho)$, $R_{k}=\varrho_{k+1}$,
$\tau_{0}=\tau$, $\tau_{k+1}=\tau+(1-\lambda^{2k+2})(T-\tau)$,
$T_{k}=\tau_{k+1}$, $k=0,1,2,\ldots$, where $0<\lambda<1$ is defined by the
relation $\lambda^{\max(\alpha,2)}=\gamma/2$. See [Giu03, p. 191, Lemma 6.1],
for example. This gives the desired Cacciopoli inequality. ∎
Next, we require a simple corollary:
###### Corollary 2.8 (Interpolation inequality).
Let $\chi=1+2/n$. Then
$\left(\int\kern-3.39996pt\int_{Q_{\varrho,\tau}}|\theta|^{2\chi}\,dx\,dt\right)^{\frac{1}{\chi}}\lesssim_{N,\alpha,\varepsilon}\mathbf{C}\int\kern-3.39996pt\int_{Q_{R,T}\setminus
Q_{\varrho,\tau}}|\theta|^{2}\,dx\,dt.$ (2.34)
###### Proof.
Let $0\leq\varphi\in C^{\infty}_{0}(B_{(R+\varrho)/2})$ satisfying
$\varphi\equiv 1$ on $B_{\varrho}$ and $|\nabla\varphi|\lesssim
1/(R-\varrho)$. Using (2.27) at an intermediate scale, we find
$\displaystyle\sup_{t\in(\tau,0)}\int_{B_{\varrho}}|\theta(x,t)\varphi|^{2}\,dx+\int\kern-3.39996pt\int_{Q_{\varrho,\tau}}|\nabla(\theta\varphi)|^{2}\,dx\,dt\lesssim_{N,\alpha,\varepsilon}\mathbf{C}\int\kern-3.39996pt\int_{Q_{R,T}\setminus
Q_{\varrho,\tau}}|\theta|^{2}\,dx\,dt.$ (2.35)
Then (2.34) follows from the Gagliardo-Nirenberg inequality on the whole
space. ∎
We are now ready to use Moser’s iteration:
###### Proof of local boundedness.
Let $\beta_{k}:=\chi^{k}$, where $k=0,1,2,\ldots$. A standard computation
implies that $\theta^{\beta_{k}}$ is also a non-negative Lipschitz
subsolution. Hence, it satisfies the Cacciopoli inequality (2.34) with
$R_{k}=\varrho+2^{-k}(R-\varrho)$, $r_{k}=R_{k+1}$,
$T_{k}=\tau-2^{-2k}(\tau-T)$, $\tau_{k}=T_{k+1}$, $k=0,1,2,\ldots$ (iterating
inward). In other words,
$\lVert\theta^{2\beta_{k+1}}\rVert_{L^{1}(Q_{\varrho_{k},\tau_{k}})}^{\frac{1}{\chi}}\lesssim_{N,\alpha,\varepsilon}\mathbf{C}(\varrho_{k},\tau_{k},R_{k},T_{k},M,\delta,\alpha)\lVert\theta^{2\beta_{k}}\rVert_{L^{1}(Q_{R_{k},T_{k}}\setminus
Q_{\varrho_{k},\tau_{k}})}.$ (2.36)
We may expand the domain of integration on the RHS as necessary. Define
$M_{0}:=\lVert\theta^{2}\rVert_{L^{1}(Q_{R_{0},T_{0}}\setminus
Q_{\varrho_{0},\tau_{0}})}$ (2.37)
and
$M_{k+1}:=\lVert\theta^{2}\rVert_{L^{\beta_{k+1}}(Q_{\varrho_{k},\tau_{k}})}=\lVert\theta^{2\beta_{k+1}}\rVert_{L^{1}(Q_{\varrho_{k},\tau_{k}})}^{\frac{1}{\beta_{k+1}}},\quad
k=0,1,2,\ldots$ (2.38)
Raising (2.36) to $1/\beta_{k}$ and using Eq. (2.1) defining $\mathbf{C}$, we
obtain
$M_{k+1}\leq
C(N,\alpha,\varepsilon)^{\frac{1}{\beta_{k}}}2^{\frac{\max(2,\alpha)k}{\beta_{k}}}\mathbf{C}(\varrho,\tau,R,T,M,\delta,\alpha)^{\frac{1}{\beta_{k}}}M_{k}.$
(2.39)
Iterating, we have
$M_{k+1}\leq
C(N,\alpha,\varepsilon)^{\sum_{j=0}^{k}\frac{1}{\chi^{j}}}2^{\sum_{j=0}^{k}\frac{\max(2,\alpha)j}{\chi^{j}}}\mathbf{C}(\varrho,\tau,R,T,M,\delta,\alpha)^{\sum_{j=0}^{k}\frac{1}{\chi_{j}}}M_{0}.$
(2.40)
Finally, we send $k\to+\infty$ and substitute $\sum_{j\geq
0}1/\chi^{j}=(n+2)/2$ to obtain
$\lVert\theta\rVert_{L^{\infty}(Q_{\varrho,\tau})}\lesssim_{N,\alpha,\varepsilon}\mathbf{C}^{\frac{n+2}{4}}\lVert\theta\rVert_{L^{2}(Q_{R,T}\setminus
Q_{\varrho,\tau})}.$ (2.41)
We now demonstrate how to replace $L^{2}$ on the RHS of (2.34) with
$L^{\gamma}$ ($0<\gamma<2$). To begin, use the interpolation inequality
$\lVert\theta\rVert_{L^{2}}\leq\lVert\theta\rVert_{L^{\gamma}}^{\gamma/2}\lVert\theta\rVert_{L^{\infty}}^{1-\gamma/2}$
in (2.41) and split the product using Young’s inequality. This gives
$\lVert\theta\rVert_{L^{\infty}(Q_{\varrho,\tau})}\leq
C(N,\alpha,\varepsilon,\gamma)\mathbf{C}^{\frac{n+2}{2\gamma}}\lVert\theta\rVert_{L^{\gamma}(Q_{R,T}\setminus
Q_{\varrho,\tau})}+\frac{1}{2}\lVert\theta\rVert_{L^{\infty}(Q_{R,T})}.$
(2.42)
The second term on the RHS is removed by iterating outward along a sequence of
scales, as in the proof of the Cacciopoli inequality in Lemma 2.7. ∎
###### Remark 2.9 (Elliptic case).
The analogous elliptic result is
$\sup_{B_{\varrho}}\theta\lesssim_{N,\alpha,\varepsilon,\gamma}\mathbf{C}^{\frac{n}{2\gamma}}\lVert\theta\rVert_{L^{\gamma}(B_{R}\setminus
B_{\varrho})},$ (2.43)
where
$\mathbf{C}(\varrho,R,M,\delta,\alpha)=1/[\delta^{2}(R-\varrho)^{2}]+MR_{0}^{\alpha-2}/[\delta^{\alpha}(R-\varrho)^{\alpha}]$.
The proof is the same except that $\chi=n/(n-2)$ and $\sum 1/\chi^{j}=n/2$.
### 2.3. Proof of Harnack inequality
In this subsection, $\theta$ is a strictly positive Lipschitz
solution.444There is no loss of generality if we replace $\theta$ by
$\theta+\kappa$ and let $\kappa\to 0^{+}$. Then $\log\theta$ is well defined.
Let $0\leq\psi\in C^{\infty}_{0}(B)$ be a radially decreasing function
satisfying $\psi\equiv 1$ on $B_{3/4}$. We use the notation
$f_{\rm avg}=\frac{1}{{\rm Vol}}\int_{\mathbb{R}^{n}}f\psi^{2}\,dx,\quad{\rm
Vol}=\int_{\mathbb{R}^{n}}\psi^{2}\,dx,$ (2.44)
whenever $f\in L^{1}_{\rm loc}(B)$. Let
$\mathbf{K}=\exp\left(\log\theta(\cdot,0)\right)_{\rm avg}.$ (2.45)
whose importance will be made clear in the proof of Lemma 2.11. Define
$v=\log\left(\frac{\theta}{\mathbf{K}}\right).$ (2.46)
Then $v(\cdot,0)_{\rm avg}=0$. A simple computation yields
$|\nabla v|^{2}=\partial_{t}v-\Delta v+b\cdot\nabla v.$ (2.47)
That is, $v$ is itself a supersolution, though it may not itself be positive.
We crucially exploit that $|\nabla v|^{2}$ appears on the LHS of (2.47).
First, we require the following decomposition of the drift:
###### Lemma 2.10 (Decomposition of drift).
We have the following decomposition on $B_{3/4}\times(-T^{*},T^{*})$:
$b=b_{1}+b_{2},\quad
b_{1}=-\operatorname{div}a,\quad\operatorname{div}b_{2}=0,$ (2.48)
where $a:B_{3/4}\times(-T^{*},T^{*})\to\mathbb{R}^{n\times n}_{\rm anti}$ is
antisymmetric and
$\|a\|_{L^{2}(B_{3/4}\times(-T^{*},T^{*}))}+\|b_{2}\|_{L^{2}(B_{3/4}\times(-T^{*},T^{*}))}\lesssim\|b\|_{L^{2}_{t}H^{-1}_{x}(Q^{*})},$
(2.49)
where $Q^{*}=B_{1}\times(-T^{*},T^{*})$.
###### Proof.
Let $\phi\in C^{\infty}_{0}(B_{1})$ with $\phi\equiv 1$ on $B_{15/16}$. Let
$\widetilde{b}=\phi b$. Hence,
$\|\widetilde{b}\|_{L^{2}_{t}H^{-1}_{x}(Q^{*})}\lesssim\|b\|_{L^{2}_{t}H^{-1}_{x}(Q^{*})}$.
We may decompose $\widetilde{b}(\cdot,t)\in H^{-1}(\mathbb{R}^{n})$ into
$\widetilde{b}_{1}(\cdot,t)\in\dot{H}^{-1}(\mathbb{R}^{n})$, whose Fourier
transform is supported outside of $B_{2}$, and $\widetilde{b}_{2}(\cdot,t)\in
L^{2}(\mathbb{R}^{n})$. Define
$a_{ij}=\Delta^{-1}(-\partial_{j}\widetilde{b}_{1i}+\partial_{i}\widetilde{b}_{1j}),\quad
g=\Delta^{-1}(-\operatorname{div}\widetilde{b}_{1}).$ (2.50)
This amounts to performing the Hodge decomposition in $\mathbb{R}^{n}$ ‘by
hand’.555We are simply exploiting the identity $\Delta=dd^{*}+d^{*}d$ on
differential $k$-forms, up to a sign convention, for differential $1$-forms
$\cong$ vector fields. Clearly, $a$ is antisymmetric, and we have the
decomposition
$-\widetilde{b}_{1}=\operatorname{div}a+\nabla g$ (2.51)
and the estimates
$\|a(\cdot,t)\|_{L^{2}(\mathbb{R}^{n})}+\|g(\cdot,t)\|_{L^{2}(\mathbb{R}^{n})}\lesssim\|\widetilde{b}_{1}(\cdot,t)\|_{\dot{H}^{-1}(\mathbb{R}^{n})}.$
(2.52)
Similarly, we decompose
$\widetilde{b}_{2}=\mathbb{P}\widetilde{b}_{2}+\mathbb{Q}\widetilde{b}_{2},$
(2.53)
where $\mathbb{P}$ is the Leray (orthogonal) projector onto divergence-free
fields, and $\mathbb{Q}=I-\mathbb{P}$ is the orthogonal projector onto
gradient fields. We denote $\mathbb{Q}\widetilde{b}_{2}=\nabla f$.
Since
$\widetilde{b}=\widetilde{b}_{1}+\widetilde{b}_{2}=-\operatorname{div}a+\mathbb{P}\widetilde{b}_{2}+\nabla(f-g)$
is divergence free in $B_{7/8}$ on time slices, we have
$\Delta(f-g)(\cdot,t)=0\text{ in }B_{7/8},$ (2.54)
and by elliptic regularity, for all $k\geq 0$,
$\|\nabla(f-g)(\cdot,t)\|_{H^{k}(B_{3/4})}\lesssim_{k}\|\widetilde{b}_{1}(\cdot,t)\|_{\dot{H}^{-1}(B_{7/8})}+\|\widetilde{b}_{2}(\cdot,t)\|_{L^{2}(B_{7/8})}.$
(2.55)
Finally, we define
$b_{2}=\mathbb{P}\widetilde{b}_{2}+\nabla(f-g)\in
L^{2}_{t,x}(B_{3/4}\times(-T^{*},T^{*})),$ (2.56)
which satisfies the claimed estimates and is divergence free in
$B_{7/8}\times(-T^{*},T^{*})$. ∎
We now proceed with the proof of Harnack’s inequality:
###### Lemma 2.11.
For all non-zero $t\in[-T^{*},T^{*}]$, we write $I_{t}=[0,t]$ if $t>0$ and
$I_{t}=[t,0]$ if $t<0$. Then
$-\operatorname{sgn}(t)v(\cdot,t)_{\rm avg}+\int_{I_{t}}\left(|\nabla
v|^{2}(\cdot,s)\right)_{\rm avg}\,ds\lesssim|t|+\lVert
b\rVert_{L^{2}_{t}H^{-1}_{x}(B\times I_{t})}^{2}.$ (2.57)
###### Proof.
We multiply (2.47) by $\psi^{2}$ and integrate over $B\times I_{t}$:
$\operatorname{sgn}(t)\int_{B}\left(v(x,0)-v(x,t)\right)\psi^{2}\,dx+\int\kern-3.39996pt\int_{B\times
I_{t}}|\nabla v|^{2}\psi^{2}\,dx\,ds\leq\int\kern-3.39996pt\int_{B\times
I_{t}}2\psi\nabla\psi\cdot\nabla v+(b\cdot\nabla v)\psi^{2}\,dx\,ds.$ (2.58)
By (2.45), $\int_{\mathbb{R}^{n}}v(x,0)\psi^{2}\,dx=0$. The first term on the
RHS is easily estimated:
$\int\kern-3.39996pt\int_{B\times I_{t}}2\psi\nabla\psi\cdot\nabla
v\,dx\,ds\leq\frac{1}{4}\int\kern-3.39996pt\int_{B\times I_{t}}|\nabla
v|^{2}\psi^{2}\,dx\,ds+C|t|.$ (2.59)
To estimate the term containing $b$, we require the drift decomposition
$b=b_{1}+b_{2}$ from Lemma 2.10. Then
$\int\kern-3.39996pt\int_{B\times I_{t}}(b_{1}\cdot\nabla
v)\psi^{2}\,dx\,ds=\int\kern-3.39996pt\int_{B\times I_{t}}2\psi
a(\nabla\psi,\nabla v)\,dx\,ds\leq\frac{1}{4}\int\kern-3.39996pt\int_{B\times
I_{t}}|\nabla v|^{2}\psi^{2}\,dx\,ds+C\lVert a\rVert_{L^{2}(B\times
I_{t})}^{2}.$ (2.60)
and
$\int\kern-3.39996pt\int_{B\times I_{t}}(b_{2}\cdot\nabla
v)\psi^{2}\,dx\,ds\leq\frac{1}{4}\int\kern-3.39996pt\int_{B\times
I_{t}}|\nabla v|^{2}\psi^{2}\,dx\,ds+C\lVert b_{2}\rVert_{L^{2}(B\times
I_{t})}^{2}.$ (2.61)
Recall the estimate (2.49) from the decomposition. Combining (2.58)–(2.61) and
dividing by ${\rm Vol}$ gives (2.57). ∎
In the following, we write $v=v_{+}-v_{-}$, where $v_{+},v_{-}\geq 0$. We also
use the notation
$A^{+}=\int_{0}^{T^{*}}\|b(\cdot,t)\|_{H^{-1}(B)}^{2}\,dt,\quad
A^{-}=\int_{-T^{*}}^{0}\|b(\cdot,t)\|_{H^{-1}(B)}^{2}\,dt.$ (2.62)
###### Lemma 2.12 (Weak–$L^{1}$ estimates).
With the above notation, we have
$\lVert v_{+}\rVert_{L^{1,\infty}_{t,x}(B_{3/4}\times(-T^{*},0))}\lesssim
1+T^{*}(T^{*}+A^{-})$ (2.63)
and
$\lVert v_{-}\rVert_{L^{1,\infty}_{t,x}(B_{3/4}\times(0,T^{*}))}\lesssim
1+T^{*}(T^{*}+A^{+}).$ (2.64)
###### Proof.
By (2.57) and a weighted Poincaré inequality [Mos64, Lemma 3, p. 120],
$-\operatorname{sgn}(t)v_{\rm
avg}(t)+\frac{1}{C_{1}}\int_{I_{t}}\left(|v-v_{\rm avg}|^{2}\right)_{\rm
avg}\,ds\leq
C_{0}\int_{I_{t}}\left(1+\|b(\cdot,t)\|_{H^{-1}(B)}^{2}\right)ds,$ (2.65)
where $C_{0}>0$ is the implied constant in (2.57). In the following, we focus
on the case $t\in[-T^{*},0]$. We use (2.65) to obtain a sub/supersolution
inequality corresponding to a quadratic ODE. First, we remove the forcing in
the ODE by defining
$p(x,t):=v(x,t)-C_{0}\underbrace{\int_{I_{t}}\left(1+\|b(\cdot,t)\|_{H^{-1}(B)}^{2}\right)ds}_{\leq
T^{*}+A^{-}}.$ (2.66)
Then (2.65) becomes
$p_{\rm avg}(t)+\frac{1}{C_{1}}\int_{I_{t}}\left(|p-p_{\rm
avg}|^{2}\right)_{\rm avg}\,ds\leq 0.$ (2.67)
Let us introduce the super-level sets, whose measures $\eta$ appear as a
coefficient in the ODE:
$\eta(\mu,t):=\left|\\{x\in B_{3/4}:p(x,t)>\mu\\}\right|,\quad\mu>0.$ (2.68)
Since $p_{\rm avg}\leq 0$, we have that $p(x,t)-p_{\rm avg}(t)>\mu-p_{\rm
avg}(t)>0$ whenever $p(x,t)>\mu$. Then
$p_{\rm avg}(t)+\frac{1}{C_{1}{\rm Vol}}\int_{I_{t}}\eta(\mu,s)(\mu-p_{\rm
avg})^{2}\,ds\leq 0.$ (2.69)
It is convenient to rephrase (2.69) in terms of a positive function evolving
forward-in-time: $\bar{p}(t)=-p_{\rm avg}(-t)$ with $t\in[0,T^{*}]$. Then
(2.69) becomes
$\bar{p}(t)\geq\frac{1}{C_{1}{\rm
Vol}}\int_{0}^{t}\eta(\mu,|s|)(\mu+\bar{p}(s))^{2}\,ds.$ (2.70)
The above inequality means that $\bar{p}$ is a supersolution of the quadratic
ODE
$\dot{q}=\frac{1}{C_{1}{\rm Vol}}\times\eta(\mu,|t|)(\mu+q)^{2}$ (2.71)
with $q(0)=0$. The above scalar ODE has a comparison principle. _A priori_ ,
since (2.71) is quadratic, its solutions may quickly blow-up depending on the
size of $\eta(\mu,\cdot)$ and $\mu$. However, because $\bar{p}$ lies above the
solution $q$, $q$ does not blow up, and we obtain a bound for the density
$\eta(\mu,\cdot)$ in the following way. After separating variables in (2.71),
we obtain
$\frac{1}{C_{1}{\rm
Vol}}\int_{0}^{T^{*}}\eta(\mu,|s|)\,ds=\frac{1}{\mu}-\frac{1}{\mu+q(T^{*})}\leq\frac{1}{\mu},$
(2.72)
since $q\geq 0$. That is,
$\lVert p_{+}\rVert_{L^{1,\infty}(B_{3/4}\times(-T^{*},0))}\lesssim 1.$ (2.73)
Finally, since $\lVert\cdot\rVert_{L^{1,\infty}(B_{3/4}\times(-T^{*},0))}$ is
a quasi-norm and $v\leq p+C_{0}(T^{*}+A^{-})$ pointwise due to (2.66), we have
$\displaystyle\lVert v_{+}\rVert_{L^{1,\infty}(B_{3/4}\times(-T^{*},0))}$
$\displaystyle\leq 2\lVert
p_{+}\rVert_{L^{1,\infty}(B_{3/4}\times(-T^{*},0))}+2C_{0}\lVert
T^{*}+A^{-}\rVert_{L^{1,\infty}(B_{3/4}\times(-T^{*},0))}$ (2.74)
$\displaystyle\lesssim 1+T^{*}(T^{*}+A^{-}).$
The proof for $t\in[0,T^{*}]$ is similar except that one uses sub-level sets
in (2.68) with $\mu<0$. ∎
We now require the following lemma of Moser [Mos71], which we quote almost
directly, and in which we denote by $Q(\varrho)$, $\varrho>0$ any family of
domains satisfying $Q(\varrho)\subset Q(r)$ for $0<\varrho<r$.
###### Lemma 2.13 (Lemma 3 in [Mos71]).
Let $m,\zeta,c_{0}$, $1/2\leq\theta_{0}<1$ be positive constants, and let
$w>0$ be a continuous function defined in a neighborhood of $Q(1)$ for which
$\sup_{Q(\varrho)}w^{p}<\frac{c_{0}}{(r-\varrho)^{m}{\rm
meas}(Q(1))}\int\kern-3.39996pt\int_{Q(r)}w^{p}\,dt\,dx$ (2.75)
for all $\varrho,r,p$ satisfying
$\frac{1}{2}\leq\theta_{0}\leq\varrho<r\leq 1,\quad 0<p<\zeta^{-1}.$ (2.76)
Moreover, let
${\rm meas}\\{(x,t)\in Q(1):\log w>\mu\\}<\frac{c_{0}\zeta}{s}{\rm
meas}(Q(1))$ (2.77)
for all $\mu>0$. Then there exists a constant function
$\gamma=\gamma(\theta_{0},m,c_{0})$ such that
$\sup_{Q(\theta_{0})}w<\gamma^{\zeta}.$ (2.78)
###### Proof of Harnack inequality.
We apply Lemma 2.13 to $w=\theta/\mathbf{K}$ with
$Q(\varrho)=B_{\varrho}\times(-T^{*}+2\ell(1-\varrho),0)$ and
$\theta_{0}=1/2$.666Technically, to satisfy the conditions in Lemma 2.13,
$w=\theta/\mathbf{K}$ should be extended arbitrarily to be continuous in a
neighborhood of $Q(1)$. Indeed, we recognize the requirement (2.75) as the
local boundedness guaranteed by Theorem 2.1 and (2.77) as the weak $L^{1}$
estimate from Lemma 2.12. This gives
$\sup_{B_{1/2}\times(-T^{*}+\ell,0)}\frac{\theta}{\mathbf{K}}\lesssim 1.$
(2.79)
Here, we suppress also the dependence on the time lag $\ell$. Meanwhile,
$v_{-}=\log_{+}(\mathbf{K}/\theta)$ is a subsolution. Hence,
$\lVert v_{-}\rVert_{L^{\infty}(B_{1/2}\times(\ell,T^{*}))}\lesssim\lVert
v_{-}\rVert_{L^{1,\infty}(B_{3/4}\times(0,T^{*}))}.$ (2.80)
On the other hand,
$\frac{\mathbf{K}}{\inf\theta}=\sup\frac{\mathbf{K}}{\theta}=\exp\left(\sup\log\frac{\mathbf{K}}{\theta}\right)\leq\exp\left(\sup
v_{-}\right)\lesssim\exp\left(\lVert v_{-}\rVert_{L^{1,\infty}}\right)\lesssim
1,$ (2.81)
where the $\inf$ and $\sup$ are taken on $B_{1/2}\times(\ell,T^{*})$.
Combining (2.79) and (2.81), we arrive at
$\sup_{B_{1/2}\times(-T^{*}+\ell,0)}\theta\lesssim\mathbf{K}\lesssim\inf_{B_{1/2}\times(\ell,T^{*})}\theta,$
(2.82)
as desired. ∎
## 3\. Bounded total speed
In this section, we prove the statements in Theorem 1.1 concerning the space
$L^{1}_{t}L^{\infty}_{x}$.
###### Proposition 3.1 (Local boundedness).
Let $T\in(-\infty,0)$ and $\tau\in(T,0)$. Let $b\colon
Q_{1,T}\to\mathbb{R}^{n}$ be a smooth divergence-free drift satisfying
$\lVert b\rVert_{L^{1}_{t}L^{\infty}_{x}(Q_{1,T})}\leq 1/8.$ (3.1)
Let $\theta$ be a non-negative Lipschitz subsolution on $Q_{1,T}$. Then, for
all $\gamma\in(0,2]$, we have
$\|\theta\|_{L^{\infty}(Q_{1/2,\tau})}\lesssim_{\gamma}\left(1+\frac{1}{\tau-T}\right)^{\frac{n+2}{2\gamma}}\lVert\theta\rVert_{L^{\gamma}(Q_{1,T})}.$
(3.2)
###### Proof.
For smooth $\lambda:[T,0]\to(0,+\infty)$, we define $x=\lambda y$ and
$\widetilde{\theta}(y,t)=\theta(\lambda y,t).$ (3.3)
That is, $\widetilde{\theta}$ is obtained by dynamically rescaling $\theta$ in
space. The new PDE is
$\partial_{t}\widetilde{\theta}-\frac{1}{\lambda^{2}}\Delta_{y}\widetilde{\theta}+\frac{1}{\lambda}\widetilde{b}\cdot\nabla_{y}\widetilde{\theta}\leq
0$ (3.4)
where
$\widetilde{b}(y,t)=b(\lambda y,t)-\dot{\lambda}y.$ (3.5)
Choose $\lambda(T)=1$, $\dot{\lambda}=-2\|b(\cdot,t)\|_{L^{\infty}}$ when
$t\in[T,0]$. Clearly, $3/4\leq\lambda\leq 1$. Our picture is that
$\widetilde{\theta}$ dynamically ‘zooms in’ on $\theta$. In particular, using
(3.1) and (3.5),
$\widetilde{b}(\cdot,t)\cdot\frac{y}{|y|}\geq-\|b(\cdot,t)\|_{L^{\infty}}+2\|b(\cdot,t)\|_{L^{\infty}}|y|\geq
0\text{ when }y\in B_{1}\setminus B_{1/2},$ (3.6)
and
$\operatorname{div}\widetilde{b}=2n\|b(\cdot,t)\|_{L^{\infty}}\geq 0.$ (3.7)
We now demonstrate Cacciopoli’s inequality in the new variables. Let
$3/4\leq\varrho<R\leq 1$. Let $\varphi\in C^{\infty}_{0}(B_{R})$ be a radially
symmetric and decreasing function satisfying $0\leq\varphi\leq 1$ on
$\mathbb{R}^{n}$, $\varphi\equiv 1$ on $B_{\varrho}$, and
$|\nabla\varphi|\lesssim 1/(R-\varrho)$. Let $\eta\in
C^{\infty}_{0}(T,+\infty)$ satisfying $0\leq\eta\leq 1$ on $\mathbb{R}$,
$\eta\equiv 1$ on $(\tau,0)$, and $|d\eta/dt|\lesssim 1/(\tau-T)$. Let
$\Phi=\varphi^{2}\eta$. We integrate Eq. (3.4) against
$\widetilde{\theta}\Phi$ on $B_{R}\times(T,t)$ for $t\in(\tau,0)$. Then
$\displaystyle\frac{1}{2}\int|\widetilde{\theta}|^{2}(y,t)\Phi\,dy+\int\kern-3.39996pt\int\lambda^{-2}|\nabla\widetilde{\theta}|^{2}\Phi\,dy\,ds$
(3.8)
$\displaystyle\quad\leq\frac{1}{2}\int\kern-3.39996pt\int|\widetilde{\theta}|^{2}\partial_{t}\Phi\,dy\,ds-\int\kern-3.39996pt\int\lambda^{-2}\widetilde{\theta}\nabla\widetilde{\theta}\cdot\nabla\Phi\,dy\,ds$
$\displaystyle\quad\quad+\frac{1}{2}\int\kern-3.39996pt\int\lambda^{-1}\underbrace{\widetilde{b}\cdot\nabla\Phi}_{\leq
0\text{ by
}\eqref{eq:tildebpointsoutward}}|\widetilde{\theta}|^{2}\,dy\,ds+\frac{1}{2}\int\kern-3.39996pt\int\lambda^{-1}\operatorname{div}\widetilde{b}|\widetilde{\theta}|^{2}\Phi\,dy\,ds.$
While $\operatorname{div}\widetilde{b}$ has a disadvantageous sign, it simply
acts as a bounded potential. Simple manipulations give the Cacciopoli
inequality:
$\displaystyle\sup_{t\in(\tau,0)}\int_{B_{\varrho}}|\widetilde{\theta}|^{2}(y,t)\,dy+\int\kern-3.39996pt\int_{Q_{\varrho,\tau}}|\nabla\widetilde{\theta}|^{2}\varphi^{2}\,dy\,ds$
(3.9)
$\displaystyle\quad\lesssim\left(\frac{1}{\tau-T}+\frac{1}{(R-\varrho)^{2}}\right)\int\kern-3.39996pt\int_{Q_{R,T}\setminus
Q_{\varrho,\tau}}|\widetilde{\theta}|^{2}\,dy\,ds.$
The remainder of the proof proceeds as in Theorem 2.1 except in the $(y,t)$
variables. Namely, we have the interpolation inequality as in Corollary 2.8,
and $\widetilde{\theta}^{\beta}$ is a subsolution of (3.4) whenever $\beta\geq
1$. Therefore, we may perform Moser’s iteration verbatim. As in (2.42), the
$L^{2}$ norm on the RHS may be replaced by the $L^{\gamma}$ norm. Finally,
undoing the transformation yields the inequality (3.2) in the $(x,t)$
variables, since $(y,t)\in B_{R}\times\\{t\\}$ corresponds to $(x,t)\in
B_{\lambda(t)R}\times\\{t\\}$. ∎
The quantitative local boundedness property in Theorem 1.1 follows from
applying Proposition 3.1 and its rescalings on finitely many small time
intervals. In Remark 4.3, we justify that the constant depends on the
‘profile’ of $b$ and not just its norm.
## 4\. Counterexamples
### 4.1. Elliptic counterexamples
Let $n\geq 3$. Our counterexamples will be axisymmetric in ‘slab’ domains
$B_{R}\times(0,1)$, where $R>0$ is arbitrary and $B_{R}$ is a ball in
$\mathbb{R}^{n-1}$. We use the notation $x=(x^{\prime},z)$, where
$x^{\prime}\in\mathbb{R}^{n-1}$, $r=|x^{\prime}|$, and $z\in(0,1)$. Let
$\underaccent{\bar}{\theta}(x)=u(r)z,$ (4.1) $b(x)=V(r)e_{z}.$ (4.2)
Since $b$ is a shear flow in the $e_{z}$ direction, it is divergence free.
Then
$-\Delta\underaccent{\bar}{\theta}+b\cdot\nabla\underaccent{\bar}{\theta}=-z\Delta_{x^{\prime}}u+Vu.$
(4.3)
We will a construct a subsolution $\underaccent{\bar}{\theta}$ and
supersolution $\bar{\theta}$ using the _steady Schrödinger equation_
$-\Delta u+Vu=0$ (4.4)
in dimension $n-1$, where additionally $u\geq 0$ and $V\leq 0$. By the scale
invariance in $x^{\prime}$, it will suffice to construct a solution at a
single fixed length scale $R=R_{0}$. The way to proceed is well known. We
define
$u=\log\log\frac{1}{r},$ (4.5) $V=\frac{\Delta u}{u},$ (4.6)
for $r\leq R_{0}\ll 1$ so that $u$ is well defined. A simple calculation
verifies that $0\leq u\in H^{1}_{\rm loc}$, $\Delta u,V\leq 0$, and $\Delta
u,V\in L^{(n-1)/2}_{\rm loc}$.777Since Schrödinger solutions with critical
potentials $V$ belong to $L^{p}_{\rm loc}$ for all $p<\infty$ (see Han and Lin
[HL97], Theorem 4.4), it is natural to choose $u$ with a $\log$. The double
$\log$ ensures that $u$ has finite energy when $n=3$. Notice also that $\Delta
u=-(r\log r^{-1})^{-2}$ when $n=3$. Therefore, $Vu=\Delta u\in L^{1}_{\rm
loc}$, and the PDE (4.4) is satisfied in the sense of distributions. Using
(4.3), we verify that $\underaccent{\bar}{\theta}$ is a distributional
subsolution:
$-\Delta\underaccent{\bar}{\theta}+b\cdot\nabla\underaccent{\bar}{\theta}=-z\Delta_{x^{\prime}}u+Vu=(1-z)Vu\leq
0\text{ in }B_{R_{0}}\times(0,1),$ (4.7)
with equality at $\\{z=1\\}$. We also wish to control solutions from above.
Since $\Delta u\leq 0$, we define
$\bar{\theta}(x^{\prime},z)=u(r).$ (4.8)
Clearly, $\underaccent{\bar}{\theta}\leq\bar{\theta}$, and $\bar{\theta}$ is a
distributional supersolution:
$-\Delta\bar{\theta}+b\cdot\nabla\bar{\theta}=-\Delta_{x^{\prime}}u\geq
0\text{ in }B_{R_{0}}\times(0,1).$ (4.9)
We now construct smooth subsolutions and supersolutions approximating
$\underaccent{\bar}{\theta}$ and $\bar{\theta}$ according to the above
procedure. Let $\varphi$ be standard mollifier and
$\varphi_{\varepsilon}=\frac{1}{\varepsilon^{n-1}}\varphi\left(\frac{\cdot}{\varepsilon}\right).$
(4.10)
Define $u_{\varepsilon}=\varphi_{\varepsilon}\ast u$, $V_{\varepsilon}=\Delta
u_{\varepsilon}/u_{\varepsilon}$, $b_{\varepsilon}=V_{\varepsilon}(r)e_{z}$,
$\underaccent{\bar}{\theta}_{\varepsilon}=zu_{\varepsilon}(r)$, and
$\bar{\theta}_{\varepsilon}=u_{\varepsilon}(r)$. Then
$(\underaccent{\bar}{\theta}_{\varepsilon})$ and
$(\bar{\theta}_{\varepsilon})$ trap a family $(\theta_{\varepsilon})$ of
smooth solutions to the PDEs
$-\Delta\theta_{\varepsilon}+b_{\varepsilon}\cdot\nabla\theta_{\varepsilon}=0\text{
on }B_{R_{0}/2}\times(0,1)$ (4.11)
when $\varepsilon\in(0,R_{0}/2)$. Moreover, we have the desired estimates
$\sup_{\varepsilon\in(0,R_{0}/2)}\|\theta_{\varepsilon}\|_{L^{p}(B_{R_{0}/2}\times(0,1))}\leq\|\bar{\theta}\|_{L^{p}(B_{R_{0}}\times(0,1))}<+\infty,\quad
p\in[1,+\infty),$ (4.12)
$\sup_{\varepsilon\in(0,R_{0}/2)}\|V_{\varepsilon}\|_{L^{\frac{n-1}{2}}(B_{R_{0}/2})}\lesssim\sup_{\varepsilon}\|\Delta
u_{\varepsilon}\|_{L^{\frac{n-1}{2}}(B_{R_{0}/2})}\lesssim\|\Delta
u\|_{L^{\frac{n-1}{2}}(B_{R_{0}})}<+\infty,$ (4.13)
and the singularity as $\varepsilon\to 0^{+}$:
$\sup_{B_{\frac{R_{0}}{4}}\times(\frac{1}{4},\frac{3}{4})}\theta_{\varepsilon}\geq\sup_{B_{\frac{R_{0}}{4}}\times(\frac{1}{4},\frac{3}{4})}\underaccent{\bar}{\theta}_{\varepsilon}\to+\infty\text{
as }\varepsilon\to 0^{+}.$ (4.14)
###### Remark 4.1 (Line singularity).
The solutions constructed above are singular on the $z$-axis, as the maximum
principle demands.
###### Remark 4.2 (Time-dependent examples).
The above analysis of unbounded solutions for the steady Schrödinger equation
with critical potential is readily adapted to the parabolic PDE
$\partial_{t}u-\Delta u+Vu=f$ in
$B_{R_{0}}\times(-T_{0},0)\subset\mathbb{R}^{n+1}$, $n\geq 2$, (i) with
potential $V$ belonging to $L^{q}_{t}L^{p}_{x}$, $2/q+n/p=2$, $q>1$, and zero
force, or (ii) with force $f$ belonging to the same space and zero potential.
For example, one can define $u=\log\log(-t+r^{2})$, $V=-(\partial_{t}u-\Delta
u)/u$, and $f=0$. The case $q=1$ is an endpoint case in which solutions remain
bounded. These examples are presumably well known, although we do not know a
suitable reference.
### 4.2. Parabolic counterexamples
###### Proof of borderline cases: $L^{q}_{t}L^{p}_{x}$,
$\frac{2}{q}+\frac{n}{p}=2$, $q>1$.
1\. A heat subsolution. Let
$\Gamma(x,t)=(4\pi t)^{-n/2}e^{-\frac{|x|^{2}}{4t}}$ (4.15)
be the heat kernel. Let
$E(x,t)=(\Gamma-c_{n})_{+},$ (4.16)
where $c_{n}=(8\pi)^{-n/2}$. Then $E$ is globally Lipschitz away from $t=0$,
and $E(\cdot,t)$ is supported in the ball $B_{R(t)}$, where
$R(t)^{2}=2nt\log\frac{2}{t},\quad t<2,$ (4.17)
and $E$ vanishes in $t\geq 2$.
2\. A steady, compactly supported drift. There exists a divergence-free vector
field $U\in C^{\infty}_{0}(B_{4})$ satisfying
$U\equiv\vec{e}_{1}\text{ when }|x|\leq 2.$ (4.18)
Here is a construction: Let $\phi\in C^{\infty}_{0}(B_{4})$ be a radially
symmetric cut-off function such that $\phi\equiv 1$ on $B_{3}$. By applying
Bogovskii’s operator in the annulus $B_{4}\setminus\overline{B_{2}}$, see
[Gal11, Theorem III.3.3, p. 179], there exists $W\in
C^{\infty}_{0}(B_{4}\setminus\overline{B_{2}})$ solving
$\operatorname{div}W=-\operatorname{div}(\phi\vec{e}_{1})\in
C^{\infty}_{0}(B_{4}\setminus\overline{B_{2}}).$ (4.19)
Notably, the property of compact support is preserved. Finally, we define
$U=\phi\vec{e}_{1}+W.$ (4.20)
3\. Building blocks. Let $0\leq S\in C^{\infty}_{0}(0,1)$ and
$X\colon\mathbb{R}\to\mathbb{R}^{n}$ be the solution of the ODE
$\dot{X}(t)=S(t)\vec{e}_{1},\quad X(0)=-10n\vec{e}_{1}.$ (4.21)
Define
$b_{S}(x,t)=S(t)U\left(\frac{x-X(t)}{R(t)}\right),$ (4.22)
where $R(t)$ was defined in (4.17) above, and
$E_{S}(x,t)=E(x-X(t),t).$ (4.23)
Then $E_{S}$ is a subsolution:
$\left(\partial_{t}-\Delta+b_{S}\cdot\nabla\right)E_{S}\leq 0\quad\text{ on
}\mathbb{R}^{n}\times(0,1).$ (4.24)
If $[a,a^{\prime}]\subset(0,1)$, $S\in C^{\infty}_{0}(a,a^{\prime})$, and
$\int S\,dt\geq 20n$, then we have $E_{S}(\cdot,t)|_{B_{3}}\equiv 0$ when
$t\leq a$ or $t\geq a^{\prime}$. Additionally,
$E_{S}(\cdot,\widetilde{t})=E(\cdot,\widetilde{t})$ for some
$\widetilde{t}\in(a,a^{\prime})$.
We also consider the solution $\Phi_{S}$ to the PDE:
$\displaystyle\left(\partial_{t}-\Delta+b_{S}\cdot\nabla\right)\Phi_{S}$
$\displaystyle=0\quad\text{ on }\mathbb{R}^{n+1}\setminus\\{(X(0),0)\\}$
(4.25) $\displaystyle\Phi_{S}|_{t=0}$ $\displaystyle=\delta_{x=X(0)},$
which for short times $|t|\ll 1$ and negative times is equal to the heat
kernel $\Gamma(x-X(0),t)$. By the comparison principle,
$E_{S}\leq\Phi_{S}.$ (4.26)
We have the following measurements on the size of the drift:
$\|b_{S}\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n+1})}^{q}\lesssim\int_{\mathbb{R}}S(t)^{q}R(t)^{\frac{nq}{p}}\,dt,$
(4.27)
where $1\leq p,q<+\infty$, and
$\|b_{S}\|_{L^{1}_{t}L^{\infty}_{x}(\mathbb{R}^{n+1})}=\|U\|_{L^{\infty}(\mathbb{R}^{n})}\int_{\mathbb{R}}S(t)\,dt.$
(4.28)
4\. Large displacement. For $S_{k}\in C^{\infty}_{0}(t_{k},t_{k}^{\prime})$,
$k\geq 1$, with $t_{k}=o_{k\to+\infty}(1)$ and
$[t_{k},t_{k}^{\prime}]\subset(0,1)$ disjoint-in-$k$, we consider the drifts
$b_{S_{k}}$. Let $M>0$. We claim that it is possible to choose $S_{k}$
satisfying
$\lVert b_{S_{k}}\rVert_{L^{1}_{t}L^{\infty}_{x}(\mathbb{R}^{n+1})}=M$ (4.29)
and
$\left\|\sum_{k\geq
1}b_{S_{k}}\right\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n+1})}<+\infty$ (4.30)
for all $p,q\in[1,+\infty]$ satisfying $2/q+n/p=2$ and $q>1$. Indeed, consider
$\bar{S}(t)=\left(t\log t^{-1}\log\log t^{-1}\right)^{-1}$ (4.31)
when $t\leq c_{0}$ so that the above expression is well defined, and extended
smoothly on $[c_{0},1]$. We ask also that $t_{1}\leq c_{0}$. Since
$\int_{a}^{a^{\prime}}\bar{S}(t)dt=\log\log\log
t^{-1}\big{|}_{a}^{a^{\prime}}$ (4.32)
when $a^{\prime}\leq c_{0}$, we have
$\int_{t=0}^{1}\bar{S}(t)\,dt=+\infty,$ (4.33)
whereas
$\displaystyle\int_{t=0}^{1}\bar{S}(t)^{q}R(t)^{\frac{nq}{p}}\,dt$
$\displaystyle\leq O(1)+C_{n}\int_{t=0}^{c_{0}}(t\log
t^{-1})^{-q+\frac{nq}{2p}}(\log\log t^{-1})^{-q}\,dt$ (4.34)
$\displaystyle\leq O(1)+C_{n}\int_{t=0}^{c_{0}}(t\log t^{-1})^{-1}(\log\log
t^{-1})^{-q}\,dt<+\infty$
when $q\in(1,+\infty)$. The case $q=+\infty$ is similar. We choose
$S_{k}=\bar{S}(t)\varphi_{k}$ with suitable smooth cut-offs $\varphi_{k}$ to
complete the proof of the claim.
5\. Unbounded solution. We choose $M=20n$ and a suitable sequence of $S_{k}$
as above. We reorder the building blocks we defined above so that the $k$th
subsolution and $k$th drift are ‘activated’ on times
$(1-t_{k}^{\prime},1-t_{k})$. Define
$b_{k}(\cdot,t)=b_{S_{k}}(\cdot,t-(1-t_{k}^{\prime})+t_{k}),\quad
b=\sum_{k\geq 1}b_{k}$ (4.35)
and, for size parameters $A_{k}\geq 0$,
$E_{k}(\cdot,t)=E_{S_{k}}(\cdot,t-(1-t_{k}^{\prime})+t_{k})\mathbf{1}_{(1-t_{k}^{\prime},1-t_{k})},\quad
E=\sum_{k\geq 1}A_{k}E_{k}.$ (4.36)
Then $E$ is a subsolution of the PDE
$(\partial_{t}-\Delta+b\cdot\nabla)E\leq 0\quad\text{ on
}B_{3}\times(-\infty,1).$ (4.37)
We further define
$\Phi_{k}(\cdot,t)=\Phi_{S_{k}}(\cdot,t-(1-t_{k}^{\prime})+t_{k}),\quad\theta=\sum_{k\geq
1}A_{k}\Phi_{k},$ (4.38)
which is a solution of the PDE
$(\partial_{t}-\Delta+b\cdot\nabla)\theta=0\quad\text{ on
}B_{2}\times(-\infty,1).$ (4.39)
Since $E_{k}\leq\Phi_{k}$, we have that $E\leq\theta$ on
$B_{2}\times(-\infty,1)$. Additionally, we have
$\sup_{t}A_{k}\|E_{k}(\cdot,t)\|_{L^{\infty}(B_{1})}\geq
A_{k}\|E_{k}(\cdot,1-\widetilde{t}_{k})\|_{L^{\infty}(B_{1})}\gtrsim
A_{k}{t_{k}^{\prime}}^{-n/2},$ (4.40)
where $\widetilde{t}_{k}\in(t_{k},t_{k}^{\prime})$ satisfies
$X_{S_{k}}(\widetilde{t_{k}})=0$. Therefore, by the comparison principle and
(4.40), we have
$\limsup_{t\to
1_{-}}\|\theta(\cdot,t)\|_{L^{\infty}(B_{1})}\gtrsim\limsup_{k\to+\infty}A_{k}{t_{k}^{\prime}}^{-n/2}.$
(4.41)
To control the solution from above, we use
$\|\theta\|_{L^{\infty}_{t}L^{1}_{x}(\mathbb{R}^{n+1})}\leq\sum A_{k}.$ (4.42)
Therefore, it is possible to choose $A_{k}\to 0$ as $k\to+\infty$ while
keeping the $\limsup$ in (4.41) infinite. Hence, by ‘pruning’ the sequence of
$A_{k}$ (meaning we pass to a subsequence, without relabeling), we can always
ensure that $\|\theta\|_{L^{\infty}_{t}L^{1}_{x}(\mathbb{R}^{n+1})}<+\infty$.∎
###### Remark 4.3.
The sequence of solutions $\\{\theta_{k}\\}$ above demonstrates that the
constant in the quantitative local boundedness property in Theorem 1.1 for
drifts $b\in L^{1}_{t}L^{\infty}_{x}$ depends on the ‘profile’ of $b$ rather
than just its norm.
###### Proof of non-borderline cases: $L^{p}_{x}L^{q}_{t}$,
$\frac{3}{q}+\frac{n-1}{p}>2$, $p\leq q$.
This construction exploits rescaled copies of $E$ and is, in a certain sense,
self-similar.
_1\. Building blocks_. Let $(t_{k})\subset(0,1)$ be an increasing sequence,
with $t_{k}\to 1$ as $k\to+\infty$. Define $I_{k}=(t_{k},t_{k+1})$,
$R_{k}^{2}=|I_{k}|$.
Let $0\leq S\in C^{\infty}(0,1)$ satisfying $\int_{0}^{1}S(t)\,dt=M$ with
$M=20n$. Define $X_{k}\colon\mathbb{R}\to\mathbb{R}^{n}$ to be the solution of
the ODE
$\dot{X}_{k}(t-t_{k})=\underbrace{\frac{1}{|I_{k}|}S\left(\frac{t}{|I_{k}|}\right)}_{=:S_{k}(t-t_{k})}\vec{e}_{1},\quad
X_{k}(t_{k})=-10n\vec{e}_{1}.$ (4.43)
The ‘total speed’ has been normalized: $\int|\dot{X}_{k}|\,dt=\int S\,dt=M$.
Define also
$b_{k}(x,t)=S_{k}(t)U\left(\frac{x-X_{k}(t)}{R_{k}}\right)$ (4.44)
and
$E_{k}(x,t)=\frac{1}{R_{k}^{n}}E\left(\frac{x-X_{k}(t)}{R_{k}},\frac{t-t_{k}}{|I_{k}|}\right).$
(4.45)
Then $E_{k}$ is a subsolution:
$\left(\partial_{t}-\Delta+b_{k}\cdot\nabla\right)E_{k}\leq 0\text{ on
}\mathbb{R}^{n+1}\setminus\\{(X_{k}(t_{k}),t_{k})\\}$ (4.46)
and satisfies many of the same properties as $E_{k}$ in the previous
construction, among which is
$E_{k}(\cdot,\widetilde{t_{k}})=\frac{1}{R_{k}^{n}}E\left(\frac{\cdot}{R_{k}},\widetilde{t}\right)$
(4.47)
for some $\widetilde{t_{k}}\in(t_{k},t_{k+1})$ and $\widetilde{t}\in(0,1)$. We
define the solution $\theta_{k}$ to the PDE:
$\displaystyle\left(\partial_{t}-\Delta+b_{k}\cdot\nabla\right)\theta_{k}$
$\displaystyle=0\quad\text{ on
}\mathbb{R}^{n+1}\setminus\\{(X_{k}(t_{k}),t_{k})\\}$ (4.48)
$\displaystyle\theta_{k}|_{t=t_{k}}$ $\displaystyle=\delta_{x=X_{k}(t_{k})},$
which for short times $|t-t_{k}|\ll_{k}1$ and times $t<t_{k}$ is equal to the
heat kernel $\Gamma(x-X_{k}(t_{k}),t)$. The comparison principle implies
$E_{k}\leq\theta_{k}.$ (4.49)
2\. Estimating the drift. We now estimate the size of $b_{k}$. To begin, we
estimate the $L^{q}_{t}L^{p}_{x}$ norms, $\frac{2}{q}+\frac{n}{p}>2$. Using
the scalings from (4.44), we have
$\max|b_{k}|\leq\|U\|_{L^{\infty}}\|S\|_{L^{\infty}}|I_{k}|^{-1}$ (4.50)
and
$\|b_{k}\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n+1})}\lesssim\|U\|_{L^{\infty}}\|S\|_{L^{\infty}}|I_{k}|^{\frac{1}{q}-1}R_{k}^{\frac{n}{p}}\lesssim
R_{k}^{\varepsilon(p,q)}=o_{k\to+\infty}(1),$ (4.51)
since $|I_{k}|=R_{k}^{2}$. Next, we estimate the
$L^{p}_{x^{\prime}}L^{\infty}_{x_{n}}L^{\widetilde{q}}_{t}$ norm, where
$\frac{2}{\widetilde{q}}+\frac{n-1}{p}>2$. We are most interested when
$\widetilde{q}=+\infty$ and $p=\frac{n-1}{2}-$, but it is not more effort to
estimate this. Importantly, we have
${\rm supp}\;b_{k}\subset
B^{\mathbb{R}^{n-1}}_{C_{n}R_{k}}\times(-C_{n},C_{n})\times I_{k}.$ (4.52)
Using this and (4.50), we have
$\|b_{k}\|_{L^{p}_{x^{\prime}}L^{\infty}_{x_{n}}L^{\widetilde{q}}_{t}(\mathbb{R}^{n+1})}\lesssim\|U\|_{L^{\infty}}\|S\|_{L^{\infty}}R_{k}^{\frac{n-1}{p}}|I_{k}|^{\frac{1}{\widetilde{q}}-1}\lesssim
R_{k}^{\varepsilon(p,\widetilde{q})}=o_{k\to+\infty}(1).$ (4.53)
Interpolating between (4.51) and (4.53) with
$(p,\widetilde{q})=(\frac{n-1}{2}-,\infty)$, we thus obtain
$\|b_{k}\|_{L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n+1})}=o_{k\to+\infty}(1)$ (4.54)
when $\frac{3}{q}+\frac{n-1}{p}>2$ and $p\leq q$. After ‘pruning’ the sequence
in $k$ (meaning we pass to a subsequence, without relabeling), we have
$\|b\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n+1})}\leq\sum\|b_{k}\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n+1})}<+\infty,\quad\frac{2}{q}+\frac{n}{p}>2$
(4.55)
and
$\|b\|_{L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n+1})}\leq\sum\|b_{k}\|_{L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n+1})}<+\infty,\quad\frac{3}{q}+\frac{n-1}{p}>2,\quad
p\leq q.$ (4.56)
_3\. Concluding_. The remainder of the proof proceeds as before, with the
notable difference that we do not need to reorder the blocks in time. To
summarize, we have
$\sup_{t}A_{k}\|E_{k}(\cdot,t)\|_{L^{\infty}(B_{1})}\geq
A_{k}\|E_{k}(\cdot,\widetilde{t_{k}})\|_{L^{\infty}(B_{1})}\gtrsim
A_{k}{R_{k}}^{-n},$ (4.57)
where $\widetilde{t}_{k}\in(t_{k},t_{k+1})$ satisfies
$X_{k}(\widetilde{t_{k}})=0$, and hence,
$\limsup_{t\to
1_{-}}\|\theta(\cdot,t)\|_{L^{\infty}(B_{1})}\gtrsim\limsup_{k\to+\infty}A_{k}{R_{k}}^{-n}$
(4.58)
To control the solution from above, we again use (4.42) and choose $A_{k}\to
0$ as $k\to+\infty$ while maintaining that the RHS (4.58) is infinite. By
again ‘pruning’ the sequence in $k$, we have
$\|\theta\|_{L^{\infty}_{t}L^{1}_{x}(\mathbb{R}^{n+1})}<+\infty$. This
completes the proof. ∎
###### Remark 4.4 (An open question).
As mentioned in the introduction, we do not construct counterexamples in the
endpoint cases $L^{p}_{x}L^{q}_{t}$, $\frac{3}{q}+\frac{n-1}{p}=2$, except
when $p=q=\frac{n+2}{2}$ or $(p,q)=(\frac{n-1}{2},+\infty)$ (steady example
constructed above). This seems to suggest, perhaps, that local boundedness
should also fail on the line between these two points, but that the
counterexamples may be more subtle. It would be interesting to construct these
examples. Since each ‘block’ above is uniformly bounded in the desired spaces,
we can say that, if local boundedness were to hold there, it must be depend on
the ‘profile’ of $b$ and not just its norm, as in Remark 4.3.
## 5\. Upper bounds on fundamental solutions
For the Gaussian-like upper bounds on fundamental solutions, we consider a
divergence-free vector field $b\in
C^{\infty}_{0}(\mathbb{R}^{n}\times[0,+\infty))$ and $\alpha_{0}\geq 0$,
$C_{0},M_{0}>0$ satisfying the following two properties:
I. _Local boundedness_ : For each $x_{0}\in\mathbb{R}^{n}$, $R>0$,
$t_{0}\in\mathbb{R}_{+}$, parabolic cylinder
$Q_{R}(x_{0},t_{0})=B_{R}(x_{0})\times(t_{0}-R^{2},t_{0})\subset\mathbb{R}^{n}\times\mathbb{R}_{+}$,
and Lipschitz solution $u\in W^{1,\infty}(Q_{R}(x_{0},t_{0}))$, we have
$\|u\|_{L^{\infty}(Q_{R/2}(x_{0},t_{0}))}\leq
C_{0}\left(\frac{M_{0}}{R^{\alpha_{0}+2}}+\frac{1}{R^{2}}\right)^{\frac{n+2}{4}}\|u\|_{L^{2}(Q_{R}(x_{0},t_{0}))}$
(5.1)
II. _Global, revised form boundedness condition_ , which we denote
($\widetilde{\text{FBC}}$):
> For each $x_{0}\in\mathbb{R}^{n}$, $R>0$, open interval
> $I\subset\mathbb{R}_{+}$, and Lipschitz function $u\in
> W^{1,\infty}(B_{R}\times I)$, there exists a measurable set
> $A=A(x_{0},R,b)\subset(R/2,R)$ with $|A|\geq R/4$ and satisfying
>
> $\displaystyle\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times
> I}\frac{|u|^{2}}{2}(b\cdot
> n)\,dx\,dt\leq\frac{M_{0}}{\varepsilon^{\alpha_{0}+1}R^{\alpha_{0}+2}}\int\kern-3.39996pt\int_{B_{R}\times
> I}|u|^{2}\,dx\,dt$ ($\widetilde{\text{FBC}}$)
> $\displaystyle\quad+\varepsilon\left(\frac{1}{R^{2}}\int\kern-3.39996pt\int_{B_{R}\times
> I}|u|^{2}\,dx\,dt+\int\kern-3.39996pt\int_{B_{R}\times I}|\nabla
> u|^{2}\,dx\,dt+\sup_{t\in I}\int_{B_{R}}|u(x,t)|^{2}\,dx\right),$
>
> where $n$ is the unit outer normal direction and $B_{A}=\cup_{r\in
> A}\partial B_{r}$.
Under the above conditions, we have
###### Theorem 5.1 (Upper bounds on fundamental solutions).
If $b\in C^{\infty}_{0}(\mathbb{R}^{n}\times[0,+\infty))$ is a divergence-free
vector field satisfying I and II, then the fundamental solution
$\Gamma=\Gamma(x,t;y,s)$ to the parabolic operator
$L=\partial_{t}-\Delta+b\cdot\nabla$ satisfies the following upper bounds:
$\displaystyle\Gamma(x,t;y,s)\leq
C(t-s)\left(\frac{1}{t-s}+\frac{M_{0}}{(t-s)^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}$
(5.2)
$\displaystyle\quad\times\left[\exp\left(-\frac{c|x-y|^{2}}{t-s}\right)+\exp\left(-\frac{c|x-y|^{1+\frac{1}{1+\alpha_{0}}}}{((t-s)M_{0})^{\frac{1}{1+\alpha_{0}}}}\right)\right]$
(5.3)
for all $x,y\in\mathbb{R}^{n}$ and $0\leq s<t<+\infty$, where $C,c>0$ may
depend on $C_{0}$, $\alpha_{0}$, and $n$.
###### Remark 5.2 (Comments on I and II).
Notice that ($\widetilde{\text{FBC}}$) in II bounds the _outflux_ of scalar
through the domain. The _influx_ , which was bounded explicitly in (FBC), is
handled implicitly by I.
The parameter $\alpha_{0}$ in ($\widetilde{\text{FBC}}$) does not track the
same information as the parameter $\alpha$ in (FBC). The constant $M_{0}$ in
($\widetilde{\text{FBC}}$) has dimensions $L^{\alpha_{0}}$, whereas the
constant $M$ in (FBC) is dimensionless. The upper bound in (5.2) is
dimensionally correct.
Upon optimizing in $\varepsilon$, one discovers that
($\widetilde{\text{FBC}}$) is equivalent to an interpolation inequality, see
the derivation in Remark 2.6. The above form is reflective of how the estimate
is utilized below.
It would be possible to incorporate a parameter $\delta_{0}\in(0,1/2)$ such
that $|A|\geq\delta_{0}R$, as in (FBC).
We verify that the above conditions are satisfied in the setting of the main
theorems:
###### Lemma 5.3 (Verifying $\widetilde{\text{FBC}}$).
Let $p,q\in[1,+\infty]$ and $b\in
C^{\infty}_{0}(\mathbb{R}^{n}\times[0,+\infty))$ be a divergence-free vector
field.
1\. If
$b\in L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n}\times\mathbb{R}_{+}),\quad
1\leq\zeta_{0}:=\frac{2}{q}+\frac{n}{p}<2,$ (5.4)
then $b$ satisfies I and II with
$\alpha_{0}=\frac{\zeta_{0}-1}{\theta_{2}}(=\frac{1}{\theta_{2}}-2)$,
$M_{0}=C\|b\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n}\times\mathbb{R}_{+})}^{\frac{1}{\theta_{2}}}+\frac{1}{4}$,
$C_{0}=C$, and $\theta_{2}=1-\frac{\zeta_{0}}{2}$.
2\. If
$b\in L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n}\times\mathbb{R}_{+}),\quad p\leq
q,\quad 1\leq\zeta_{0}:=\frac{3}{q}+\frac{n-1}{p}<2,$ (5.5)
then $b$ satisfies I and II with
$\alpha_{0}=\frac{\zeta_{0}-1}{\theta_{2}}(=\frac{1}{\theta_{2}}-2)$,
$M_{0}=C\|b\|_{L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n}\times\mathbb{R}_{+})}^{\frac{1}{\theta_{2}}}+\frac{1}{4}$,
$C_{0}=C$, and $\theta_{2}=1-\frac{\zeta_{0}}{2}$.
###### Proof.
I follows from Proposition 2.3, Theorem 2.1, and the translation and scaling
symmetries. II follows from rescaling $R_{0}$ in Remark 2.6. ∎
###### Proof of Theorem 5.1.
By a translation of the coordinates, we need only consider
$\Gamma(x_{0},t_{0};0,0)$ for $t_{0}>0$ and $x_{0}\in\mathbb{R}^{n}$. We adapt
a method due to E. B. Davies [Dav87]. Let $\psi=\psi(|x|)=\psi(r)$ be a
bounded radial Lipschitz function to be specified such that $\psi=0$ when
$r<|x_{0}|/2$ and $\psi$ is a constant when $r\geq|x_{0}|$. For now, we record
the property $|\nabla\psi|\leq\gamma$, where $\gamma>0$ will be specified
later.
_1\. Weighted energy estimates_. Let $f\in C^{\infty}_{0}(\mathbb{R}^{n})$ and
$u$ be the solution to the equation $Lu=0$ in
$\mathbb{R}^{n}\times\mathbb{R}^{+}$ with initial condition
$u(0,\cdot)=e^{-\psi}f$. For $t\geq 0$, denote
$J(t)=\frac{1}{2}\int_{\mathbb{R}^{n}}e^{2\psi(y)}u^{2}(y,t)\,dy.$ (5.6)
Then, by integration by parts, for $t>0$, we have
$\displaystyle\dot{J}(t)$
$\displaystyle=\int_{\mathbb{R}^{n}}e^{2\psi}u\partial_{t}u\,dy=\int_{\mathbb{R}^{n}}e^{2\psi}u(\Delta
u-b\cdot\nabla u)\,dy$ $\displaystyle=-\int_{\mathbb{R}^{n}}e^{2\psi}|\nabla
u|^{2}\,dy-2\int_{\mathbb{R}^{n}}e^{2\psi}u\nabla
u\cdot\nabla\psi\,dy-\int_{\mathbb{R}^{n}}e^{2\psi}b\cdot\nabla\frac{u^{2}}{2}\,dy$
$\displaystyle\leq-\frac{1}{2}\int_{\mathbb{R}^{n}}e^{2\psi}|\nabla
u|^{2}\,dy+C\gamma^{2}J(t)+\int_{\mathbb{R}^{n}}e^{2\psi}b\cdot\nabla\psi
u^{2}\,dy,$
where we applied Young’s inequality. Hence,
$\displaystyle
J(t)+\frac{1}{2}\int_{0}^{t}\int_{\mathbb{R}^{n}}e^{2\psi}|\nabla
u|^{2}\,dy\,ds$ (5.7) $\displaystyle\quad\leq
J(0)+C\gamma^{2}\int_{0}^{t}J(s)\,ds+\int_{0}^{t}\int_{\mathbb{R}^{n}}e^{2\psi}b\cdot\nabla\psi
u^{2}\,dy\,ds.$
Now for each $t>0$, we choose $\psi^{\prime}(r)=\gamma\mathbf{1}_{A}$, where
$A=A(x_{0},|x_{0}|,b)$ is the set of ‘good slices’ from
($\widetilde{\text{FBC}}$) in II. By ($\widetilde{\text{FBC}}$) applied to
$e^{\psi}u$, we have
$\displaystyle
J(t)+\frac{1}{2}\int_{0}^{t}\int_{\mathbb{R}^{n}}e^{2\psi}|\nabla
u|^{2}\,dy\,ds$ $\displaystyle\leq
J(0)+C\gamma^{2}\int_{0}^{t}J(s)\,ds+\gamma\int_{0}^{t}\int_{B_{A}}e^{2\psi}b\cdot\frac{y}{|y|}u^{2}\,dy\,ds$
$\displaystyle\leq
J(0)+C\gamma^{2}\int_{0}^{t}J(s)\,ds+\gamma\varepsilon|A|\left(\sup_{s\in[0,t]}J(s)+\int_{0}^{t}\int_{B_{|x_{0}|}}e^{2\psi}|\nabla
u|^{2}\,dy\,ds\right)$
$\displaystyle\quad+\gamma\varepsilon|A|\int_{0}^{t}\int_{B_{|x_{0}|}}e^{2\psi}|\nabla\psi|^{2}u^{2}\,dy\,ds+\left(\frac{\gamma
M_{0}|A|}{\varepsilon^{\alpha_{0}+1}(|x_{0}|/2)^{\alpha_{0}+2}}+\frac{\gamma\varepsilon|A|}{|x_{0}|^{2}}\right)\int_{0}^{t}\int_{B_{|x_{0}|}}e^{2\psi}u^{2}\,dy\,ds.$
Recall that $|A|\leq|x_{0}|/2$. We set $\varepsilon=(100|x_{0}|\gamma)^{-1}$
and take the supremum in $t$ in order to absorb the 3rd term on the right-hand
side, which has coefficient $\gamma\varepsilon|A|$:
$\displaystyle\frac{1}{2}\sup_{s\in[0,t]}J(s)+\frac{1}{4}\int_{0}^{t}\int_{\mathbb{R}^{n}}e^{2\psi}|\nabla
u|^{2}\,dy\,ds$ $\displaystyle\quad\leq
J(0)+\left(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2}\right)\int_{0}^{t}J(s)\,ds.$
Now, by the Gronwall inequality,
$J(t)\leq CJ(0)e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})t}.$
(5.8)
_2\. Duality argument_. For $s<t$, we define an operator
$P^{\psi}_{s\to
t}f(x)=e^{\psi(x)}\int_{\mathbb{R}^{n}}\Gamma(x,t;y,s)e^{-\psi(y)}f(y)\,dy.$
(5.9)
By the local boundedness estimate (5.1) in I, for any $x\in\mathbb{R}^{n}$ and
$R=\sqrt{t}$,
$\displaystyle e^{-2\psi(x)}|P_{0\to t}^{\psi}f(x)|^{2}=|u(x,t))|^{2}\leq
C_{0}\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\int_{0}^{t}\int_{B_{\sqrt{t}}(x)}u^{2}(y,s)\,dy\,ds.$
Thus, allowing $C$ to depend on $C_{0}$, from (5.8) we have
$\displaystyle|P_{0\to t}^{\psi}f(x)|^{2}\leq
C\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\int_{0}^{t}\int_{B_{\sqrt{t}}(x)}e^{2\psi(x)}u^{2}(y,s)\,dy\,ds$
$\displaystyle\leq
C\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\sup_{y\in
B_{\sqrt{t}}(x)}e^{2(\psi(x)-\psi(y))}\int_{0}^{t}J(s)\,ds$
$\displaystyle\overset{\eqref{eq1.23}}{\leq}Ct\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}e^{2\gamma\min\\{\sqrt{t},|x_{0}|/2\\}}\times
e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})t}J(0).$
Since $J(0)=\|f\|_{L^{2}}^{2}/2$, the above inequality together with a
translation in time implies that
$\displaystyle\|P_{s\to t}^{\psi}\|_{L^{2}\to L^{\infty}}^{2}\leq
C(t-s)\left(\frac{1}{t-s}+\frac{M_{0}}{(t-s)^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}$
$\displaystyle\quad\cdot
e^{2\gamma\min\\{\sqrt{t-s},|x_{0}|/2\\}}e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})(t-s)}J(0).$
By duality, we also have
$\displaystyle\|P_{s\to t}^{\psi}\|_{L^{1}\to L^{2}}^{2}\leq
C(t-s)\left(\frac{1}{t-s}+\frac{M_{0}}{(t-s)^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}$
$\displaystyle\quad\times
e^{2\gamma\min\\{\sqrt{t-s},|x_{0}|/2\\}}e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})(t-s)}J(0).$
Therefore,
$\displaystyle\|P_{0\to t}^{\psi}\|_{L^{1}\to L^{\infty}}\leq\|P_{0\to
t/2}^{\psi}\|_{L^{1}\to L^{2}}\|P_{t/2\to t}^{\psi}\|_{L^{2}\to L^{\infty}}$
$\displaystyle\leq
Ct\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}e^{2\gamma\min\\{\sqrt{t},|x_{0}|/2\\}}e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})t}.$
From (5.9), the above inequality implies that for any $x,y\in\mathbb{R}^{n}$,
$\displaystyle e^{\psi(x)-\psi(y)}\Gamma(x,t;y,0)$ $\displaystyle\leq
Ct\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}e^{2\gamma\min\\{\sqrt{t},|x_{0}|/2\\}}e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})t}.$
In particular, we have
$\displaystyle\Gamma(x_{0},t;0,0)$ $\displaystyle\leq
Ce^{-\psi(x_{0})}t\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}e^{2\gamma\min\\{\sqrt{t},|x_{0}|/2\\}}e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})t}$
$\displaystyle\leq
Ct\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\exp\left\\{2\gamma\min\Big{(}\sqrt{t},\frac{|x_{0}|}{2}\Big{)}-\frac{\gamma|x_{0}|}{4}+C\gamma^{2}t+CM_{0}\gamma^{2+\alpha_{0}}t+|x_{0}|^{-2}t\right\\}$
since $\psi(0)=0$ and $\psi(x_{0})\geq\gamma|x_{0}|/4$.
_3\. Optimizing $\gamma$_. In order to have a negative term in the
exponential, we first consider
$|x_{0}|\geq 16\sqrt{t}.$ (5.10)
Then
$2\min\Big{(}\sqrt{t},\frac{|x_{0}|}{2}\Big{)}-\frac{|x_{0}|}{4}\leq-\frac{|x_{0}|}{8}$
(5.11)
Notice that final term in the exponential is already controlled:
$t|x_{0}|^{-2}\lesssim 1.$ (5.12)
Hence,
$\Gamma(x_{0},t;0,0)\lesssim
t\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\exp\left(-\frac{1}{8}\gamma|x_{0}|+C\gamma^{2}t+CM_{0}\gamma^{2+\alpha_{0}}t\right).$
(5.13)
The new expression inside the exponential is
$-\frac{1}{8}\gamma|x_{0}|+\underbrace{C\gamma^{2}t}_{A}+\underbrace{CM_{0}\gamma^{2+\alpha_{0}}t}_{B}.$
(5.14)
We divide space into an ‘inner region’ and ‘outer region’, and we anticipate
that the rate of decay may be modified in the outer region, where $B$
dominates.
_3a. Outer region_. We consider scalings of $\gamma$ in which
$-\frac{1}{8}\gamma|x_{0}|$ overtakes $B$. Consider
$M_{0}\gamma^{2+\alpha_{0}}t=\varepsilon\gamma|x_{0}|.$ (5.15)
Then $\frac{1}{8}\gamma|x_{0}|\gg B$ when
$\gamma^{1+\alpha_{0}}=\varepsilon M_{0}^{-1}\frac{|x_{0}|}{t}$ (5.16)
and $\varepsilon\ll 1$. In this scaling, we have that $B\geq A$
($CM_{0}\gamma^{2+\alpha_{0}}\geq C\gamma^{2}$) when
$M_{0}\gamma^{\alpha_{0}}\geq 1,$ (5.17)
or
$\frac{M_{0}^{\frac{1}{\alpha_{0}}}|x_{0}|}{t}\geq\varepsilon^{-1}.$ (5.18)
In this region, under the additional assumption (5.10), we have the
exponential bound
$\Gamma(x_{0},t;0,0)\lesssim
t\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\exp\left(-\frac{c|x_{0}|^{1+\frac{1}{1+\alpha_{0}}}}{(tM_{0})^{\frac{1}{1+\alpha_{0}}}}\right)$
(5.19)
_3b. Inner region_. We now consider scalings of $\gamma$ in which
$-\frac{1}{8}\gamma|x_{0}|$ overtakes the term $A$. Consider
$\gamma^{2}t=\varepsilon\gamma|x_{0}|.$ (5.20)
Then $\frac{1}{8}\gamma|x_{0}|\gg A$ when
$\gamma=\varepsilon|x_{0}|/t$ (5.21)
and $\varepsilon\ll 1$. In this scaling, we have that $A\geq B$
($C\gamma^{2}\geq CM_{0}\gamma^{2+\alpha_{0}}$) when
$M_{0}\gamma^{\alpha_{0}}\leq 1,$ (5.22)
or
$M_{0}^{\frac{1}{\alpha_{0}}}\frac{|x_{0}|}{t}\leq\varepsilon^{-1}.$ (5.23)
In this region, under the additional assumption (5.10), we have the
exponential bound
$\Gamma(x_{0},t;0,0)\lesssim
t\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\exp\left(-\frac{c|x_{0}|^{2}}{t}\right).$
(5.24)
_3c. Patching_. Combining (5.19) and (5.24), we have
$\Gamma(x_{0},t;0,0)\lesssim
t\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\left[\exp\left(-\frac{c|x_{0}|^{2}}{t}\right)+\exp\left(-\frac{c|x_{0}|^{1+\frac{1}{1+\alpha_{0}}}}{(tM_{0})^{\frac{1}{1+\alpha_{0}}}}\right)\right].$
(5.25)
under the assumption (5.10). On the other hand, when $|x_{0}|\leq 16\sqrt{t}$,
the fundamental solution is controlled by the Nash estimate [Nas58]:
$\|\Gamma(\cdot,t;0,0)\|_{L^{\infty}(\mathbb{R}^{n})}\lesssim
t^{-\frac{n}{2}},$ (5.26)
which is independent of the divergence-free drift. This contributes to the
prefactor in (5.25). The proof is complete. ∎
#### Acknowledgments
DA thanks Vladimír Šverák for encouraging him to answer this question and
helpful discussions. DA also thanks Tobias Barker and Simon Bortz for helpful
discussions, especially concerning Remark 4.2, and their patience. DA was
supported by the NDSEG Fellowship and NSF Postdoctoral Fellowship Grant No.
2002023. HD was partially supported by the Simons Foundation, Grant No.
709545, a Simons Fellowship, and the NSF under agreement DMS-2055244.
## References
* [ABES19] Pascal Auscher, Simon Bortz, Moritz Egert, and Olli Saari. On regularity of weak solutions to linear parabolic systems with measurable coefficients. J. Math. Pures Appl. (9), 121:216–243, 2019.
* [Aro67] D. G. Aronson. Bounds for the fundamental solution of a parabolic equation. Bull. Amer. Math. Soc., 73:890–896, 1967.
* [BS20a] Peter Bella and Mathias Schäffner. Non-uniformly parabolic equations and applications to the random conductance model. arXiv preprint arXiv:2009.11535, 2020.
* [BS20b] Peter Bella and Mathias Schäffner. On the regularity of minimizers for scalar integral functionals with $(p,q)$-growth. Anal. PDE, 13(7):2241–2257, 2020.
* [BS21] Peter Bella and Mathias Schäffner. Local boundedness and Harnack inequality for solutions of linear nonuniformly elliptic equations. Comm. Pure Appl. Math., 74(3):453–477, 2021.
* [Dav87] E. B. Davies. Explicit constants for Gaussian upper bounds on heat kernels. Amer. J. Math., 109(2):319–333, 1987.
* [DG57] Ennio De Giorgi. Sulla differenziabilità e l’analiticità delle estremali degli integrali multipli regolari. Mem. Accad. Sci. Torino. Cl. Sci. Fis. Mat. Nat. (3), 3:25–43, 1957\.
* [DK18] Hongjie Dong and Seick Kim. Fundamental solutions for second-order parabolic systems with drift terms. Proc. Amer. Math. Soc., 146(7):3019–3029, 2018.
* [FG85] Eugene B. Fabes and Nicola Garofalo. Parabolic B.M.O. and Harnack’s inequality. Proc. Amer. Math. Soc., 95(1):63–69, 1985.
* [Fil13] N. Filonov. On the regularity of solutions to the equation $-\Delta u+b\cdot\nabla u=0$. Zap. Nauchn. Sem. S.-Peterburg. Otdel. Mat. Inst. Steklov. (POMI), 410(Kraevye Zadachi Matematicheskoĭ Fiziki i Smezhnye Voprosy Teorii Funktsiĭ. 43):168–186, 189, 2013.
* [FR96] Jens Frehse and Michael Ružička. Existence of regular solutions to the steady Navier-Stokes equations in bounded six-dimensional domains. Annali della Scuola Normale Superiore di Pisa-Classe di Scienze, 23(4):701–719, 1996.
* [FS18] Nikolay Filonov and Timofey Shilkin. On some properties of weak solutions to elliptic equations with divergence-free drifts. In Mathematical analysis in fluid mechanics—selected recent results, volume 710 of Contemp. Math., pages 105–120. Amer. Math. Soc., [Providence], RI, [2018] ©2018.
* [FSSC98] Bruno Franchi, Raul Serapioni, and Francesco Serra Cassano. Irregular solutions of linear degenerate elliptic equations. Potential Anal., 9(3):201–216, 1998.
* [Gal11] G. P. Galdi. An introduction to the mathematical theory of the Navier-Stokes equations. Springer Monographs in Mathematics. Springer, New York, second edition, 2011. Steady-state problems.
* [Giu03] Enrico Giusti. Direct methods in the calculus of variations. World Scientific Publishing Co., Inc., River Edge, NJ, 2003.
* [HL97] Qing Han and Fanghua Lin. Elliptic partial differential equations, volume 1 of Courant Lecture Notes in Mathematics. New York University, Courant Institute of Mathematical Sciences, New York; American Mathematical Society, Providence, RI, 1997.
* [HLMP21] Steve Hofmann, Linhan Li, Svitlana Mayboroda, and Jill Pipher. The dirichlet problem for elliptic operators having a BMO anti-symmetric part. Mathematische Annalen, June 2021.
* [Ign14] Mihaela Ignatova. On the continuity of solutions to advection-diffusion equations with slightly super-critical divergence-free drifts. Adv. Nonlinear Anal., 3(2):81–86, 2014.
* [IKR14] Mihaela Ignatova, Igor Kukavica, and Lenya Ryzhik. The Harnack inequality for second-order elliptic equations with divergence-free drifts. Commun. Math. Sci., 12(4):681–694, 2014.
* [IKR16] Mihaela Ignatova, Igor Kukavica, and Lenya Ryzhik. The Harnack inequality for second-order parabolic equations with divergence-free drifts of low regularity. Comm. Partial Differential Equations, 41(2):208–226, 2016.
* [Kon07] Michalis Kontovourkis. On elliptic equations with low-regularity divergence-free drift terms and the steady-state Navier-Stokes equations in higher dimensions. University of Minnesota, 2007.
* [KS19] Seick Kim and Georgios Sakellaris. Green’s function for second order elliptic equations with singular lower order coefficients. Comm. Partial Differential Equations, 44(3):228–270, 2019.
* [Lie96] Gary M. Lieberman. Second order parabolic differential equations. World Scientific Publishing Co., Inc., River Edge, NJ, 1996.
* [LP19] Linhan Li and Jill Pipher. Boundary behavior of solutions of elliptic operators in divergence form with a BMO anti-symmetric part. Comm. Partial Differential Equations, 44(2):156–204, 2019.
* [LSUt68] O. A. Ladyženskaja, V. A. Solonnikov, and N. N. Ural’ tseva. Linear and quasilinear equations of parabolic type. Translations of Mathematical Monographs, Vol. 23. American Mathematical Society, Providence, R.I., 1968. Translated from the Russian by S. Smith.
* [LZ04] Vitali Liskevich and Qi S. Zhang. Extra regularity for parabolic equations with drift terms. Manuscripta Math., 113(2):191–209, 2004.
* [Moo17] Connor Mooney. Finite time blowup for parabolic systems in two dimensions. Arch. Ration. Mech. Anal., 223(3):1039–1055, 2017.
* [Mos61] Jürgen Moser. On Harnack’s theorem for elliptic differential equations. Comm. Pure Appl. Math., 14:577–591, 1961.
* [Mos64] Jürgen Moser. A Harnack inequality for parabolic differential equations. Comm. Pure Appl. Math., 17:101–134, 1964.
* [Mos67] Jürgen Moser. Correction to: “A Harnack inequality for parabolic differential equations”. Comm. Pure Appl. Math., 20:231–236, 1967.
* [Mos71] J. Moser. On a pointwise estimate for parabolic differential equations. Comm. Pure Appl. Math., 24:727–740, 1971.
* [Mou19] Mihalis Mourgoglou. Regularity theory and Green’s function for elliptic equations with lower order terms in unbounded domains. arXiv preprint arXiv:1904.04722, 2019.
* [MS04] Pierre D. Milman and Yu. A. Semenov. Global heat kernel bounds via desingularizing weights. J. Funct. Anal., 212(2):373–398, 2004.
* [Nas58] John Nash. Continuity of solutions of parabolic and elliptic equations. Amer. J. math, 80(4):931–954, 1958.
* [NUt11] A. I. Nazarov and N. N. Ural’ tseva. The Harnack inequality and related properties of solutions of elliptic and parabolic equations with divergence-free lower-order coefficients. Algebra i Analiz, 23(1):136–168, 2011.
* [Osa87] Hirofumi Osada. Diffusion processes with generators of generalized divergence form. J. Math. Kyoto Univ., 27(4):597–619, 1987.
* [QX19a] Zhongmin Qian and Guangyu Xi. Parabolic equations with divergence-free drift in space $L^{\ell}_{t}L^{q}_{x}$. Indiana Univ. Math. J., 68(3):761–797, 2019.
* [QX19b] Zhongmin Qian and Guangyu Xi. Parabolic equations with singular divergence-free drift vector fields. J. Lond. Math. Soc. (2), 100(1):17–40, 2019.
* [Sak20] Georgios Sakellaris. Scale invariant regularity estimates for second order elliptic equations with lower order coefficients in optimal spaces. arXiv preprint arXiv:2005.14086, 2020.
* [Sem06] Yu. A. Semenov. Regularity theorems for parabolic equations. J. Funct. Anal., 231(2):375–417, 2006.
* [SSvZ12] Gregory Seregin, Luis Silvestre, Vladimír Šverák, and Andrej Zlatoš. On divergence-free drifts. J. Differential Equations, 252(1):505–540, 2012.
* [Str88] Michael Struwe. On partial regularity results for the Navier-Stokes equations. Comm. Pure Appl. Math., 41(4):437–458, 1988.
* [SVZ13] Luis Silvestre, Vlad Vicol, and Andrej Zlatoš. On the loss of continuity for super-critical drift-diffusion equations. Archive for Rational Mechanics and Analysis, 207(3):845–877, 2013\.
* [Tao13] Terence Tao. Localisation and compactness properties of the Navier-Stokes global regularity problem. Anal. PDE, 6(1):25–107, 2013.
* [Tru71] Neil S. Trudinger. On the regularity of generalized solutions of linear, non-uniformly elliptic equations. Arch. Rational Mech. Anal., 42:50–62, 1971.
* [Wu21] Bian Wu. On supercritical divergence-free drifts. arXiv preprint arXiv:2106.02408, 2021.
* [Zha04] Qi S. Zhang. A strong regularity result for parabolic equations. Communications in Mathematical Physics, 244(2):245–260, 2004.
* [Zha20] Xicheng Zhang. Maximum principle for non-uniformly parabolic equations and applications. arXiv preprint arXiv:2012.05026, 2020.
* [Zhi04] V. V. Zhikov. Remarks on the uniqueness of the solution of the Dirichlet problem for a second-order elliptic equation with lower order terms. Funktsional. Anal. i Prilozhen., 38(3):15–28, 2004.
| arxiv-papers | 2021-07-26T23:03:12 | 2024-09-04T03:07:20.156834 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Dallas Albritton, Hongjie Dong",
"submitter": "Dallas Albritton",
"url": "https://arxiv.org/abs/2107.12511"
} |
2107.12515 | # On the improved no-local-collapsing theorem of Ricci flow
Wangjian Jian Academy of Mathematics and Systems Science$\And$Hua Loo-Keng
Key Laboratory of Mathematics, Chinese Academy of Sciences, Beijing, 100190,
China. [email protected]
###### Abstract.
In this note we derive an improved no-local-collapsing theorem of Ricci flow
under the scalar curvature bound condition along the worldline of the
basepoint. It is a refinement of Perelman’s no-local-collapsing theorem.
## 1\. Introduction
In 1982, Hamilton [4] introduced the Ricci flow equation, which is defined by
$\frac{\partial g(t)}{\partial t}=-2\textnormal{Ric}(g(t)).$
Since then, Ricci flow has became a very powerful tool in understanding the
geometry and topology of Riemannian manifolds. In Perelman’s groundbreaking
work [5] [6] [7], the Ricci flow was used to give the proof of the Poincaré
and geometrization conjecture.
The no-local-collapsing theorem of Perelman is important in his work of Ricci
flow. In his work, whenever we need to take a Gromov-Hausdorff limit, we need
to apply the no-local-collapsing theorem. Perelman introduced two approaches
to prove the no-local-collapsing theorem: $\mathcal{W}$-entropy and spacetime
geometry, and both of them have became very useful tool in the study of Ricci
flow theory.
Let us first recall Perelman’s no-local-collapsing theorem.
###### Theorem 1.1 (Perelman [5]).
For any $A<\infty$ and dimension $n$, there exists $\kappa=\kappa(n,A)>0$ such
that the following holds:
Let $(M,(g(t))_{t\in[-r^{2}_{0},0]})$ be a Ricci flow on compact,
$n$-dimensional manifold that satisfies:
1. (1)
$|\textnormal{Rm}|\leq r_{0}^{-2}$, on $P(x_{0},-r_{0}^{2},r_{0};r_{0}^{2})$;
2. (2)
$\textnormal{Vol}_{g(-r_{0}^{2})}(B_{g(-r_{0}^{2})}(x_{0},r_{0}))\geq
A^{-1}r_{0}^{n}$.
Then for any other metric ball $B_{g(0)}(x,r)\subset B_{g(0)}(x_{0},Ar_{0})$
with $r\leq r_{0}$ and
(1.1) $|\textnormal{Rm}|\leq r^{-2},~{}on~{}P(x,0,r;-r^{2}),$
we have
(1.2) $\textnormal{Vol}_{g(0)}(B_{g(0)}(x,r))\geq\kappa r^{n}.$
Next, let us recall some extensions of this no-local-collapsing theorem.
In [13], Zhang localized Perelman’s $\mathcal{W}$-entropy and the differential
Harnack inequality, and proved a uniform local Sobolev inequality for the
metric ball $B_{g(0)}(x_{0},Ar_{0})$ (see [13, Theorem 6.3.2]). Then he showed
that the curvature condition (1.1) in Theorem 1.1 can be relaxed to scalar
curvature bound at the final time slice, namely
(1.3) $R\leq r^{-2},~{}on~{}B_{g(0)}(x,r).$
Then, Wang [12] gave an independent proof of this improved no-local-collapsing
theorem, where he can relax the curvature condition (1) in Theorem 1.1 to the
Ricci curvature bound
(1.4) $|\textnormal{Ric}|\leq
r_{0}^{-2},~{}on~{}P(x_{0},-r_{0}^{2},r_{0};r_{0}^{2}),$
and Wang also found its application to Kähler-Ricci flow on smooth minimal
models of general type.
Lately, under the same curvature condition (1.4), Tian-Zhang [11] established
a relative volume comparison theorem of Ricci flow, that is, they remove the
non-collapsing condition (2) in Theorem 1.1 for the initial metric, and obtain
(1.5)
$\frac{\textnormal{Vol}_{g(-r_{0}^{2})}(B_{g(-r_{0}^{2})}(x_{0},r_{0}))}{r_{0}^{n}}\geq\kappa\frac{\textnormal{Vol}_{g(0)}(B_{g(0)}(x,r))}{r^{n}}.$
Using this estimate, Song-Tian-Zhang [10] obtained the diameter bound for the
long time solution of the normalized Kähler-Ricci flow under the assumption of
a local Ricci curvature bound.
The author and Song [9] gave an alternative proof of Tian-Zhang’s [11]
relative volume comparison theorem by using the Nash entropy; using the idea
of the proof, we obtained the diameter bound for the long time solution of the
normalzied Kähler-Ricci flow without assuming local Ricci curvature bound.
The Nash entropy used in [9] was introduced by Hein-Naber [8], where they
obtained heat kernel bounds and $\varepsilon$-regularity theorem for Ricci
flow. Later in [1], Bamler established systematic results on the Nash entropy
and heat kernel bounds on Ricci flow background. With these bases, in [2] [3],
Bamler established the compactness theory of Ricci flow and the structure
theory of non-collapsed limits of Ricci flows.
Our main result in this note is the following theorem which improves
Perelman’s no-local-collapsing theorem.
###### Theorem 1.2.
For any $A<\infty$ and dimension $n$, there exists $\kappa=\kappa(n,A)>0$ such
that the following holds:
Let $(M,(g(t))_{t\in[-2r^{2}_{0},0]})$ be a Ricci flow on compact,
$n$-dimensional manifold, with a base point $x_{0}$ that satisfies:
1. (1)
$R(x_{0},t)\leq\frac{A}{|t|}$, for $t\in[-r_{0}^{2},0)$;
2. (2)
$\textnormal{Vol}_{g(-r_{0}^{2})}(B_{g(-r_{0}^{2})}(x_{0},r_{0}))\geq
A^{-1}r_{0}^{n}$.
Then for any other metric ball $B_{g(0)}(x,r)\subset B_{g(0)}(x_{0},Ar_{0})$
with $r\leq r_{0}$ and
(1.6) $R\leq r^{-2},~{}on~{}B_{g(0)}(x,r),$
we have
(1.7) $\textnormal{Vol}_{g(0)}(B_{g(0)}(x,r))\geq\kappa r^{n}.$
In the proof of the theorem, we shall also use the Nash entropy and heat
kernel bounds on Ricci flow background, which are establisehed by Bamler in
[1]. The ingredient of the proof is that we need to estimate the
$W_{1}$-distance of two points on the same worldline by using the heat kernel
upper bound of Ricci flow.
Acknowledgements The author would like to thank Gang Tian, Jian Song, Zhenlei
Zhang, Yalong Shi for inspiring discussions.
## 2\. Preliminaries
We recall some basic definitions and results of Ricci flow in this section.
This is the framework establisehed by Bamler in [1].
Let $(M,(g(t))_{t\in I})$ be a smooth Ricci flow on a compact $n$-manifold
with $I\subset\mathbb{R}$ being an interval. Let $(x_{0},t_{0})\in M\times I$
with $A,T^{-},T^{+}\geq 0$, the parabolic neighborhood is defined as
$P(x_{0},t_{0},A;-T^{-},T^{+}):=B(x_{0},t_{0},A)\times([t_{0}-T^{-},t_{0}+T^{+}]\cap
I).$
We consider the heat operator
$\Box:=\partial_{t}-\Delta_{g(t)},$
and the conjugate heat operator
$\Box^{*}:=-\partial_{t}-\Delta_{g(t)}+R,$
where $R$ denotes the scalar curvature at time $t$.
For any $x,y\in M$ and $s,t\in I$ with $s\leq t$, we denote by $K(x,t;y,s)$
the heat kernel along the Ricci flow. That is, for fixed $(y,s)$, the function
$K(\cdot,\cdot;y,s)$ is a heat kernel based at $(y,s)$:
$\Box K(\cdot,\cdot;y,s)=0;~{}~{}~{}~{}\lim_{t\searrow
s}K(\cdot,t;y,s)=\delta_{y},$
and for fixed $(x,t)$, the function $K(x,t;\cdot,\cdot)$ is a conjugate heat
kernel based at $(x,t)$:
$\Box^{*}K(x,t;\cdot,\cdot)=0;~{}~{}~{}~{}\lim_{s\nearrow
s}K(x,t;\cdot,s)=\delta_{x}.$
###### Definition 2.1.
For $(x,t)\in M\times I$ and $s\in I$ with $s\leq t$, we denote by
$\nu_{x,t;s}$ the conjugate heat kernel measure based at $(x,t)$ as follows:
$d\nu_{x,t;s}:=K(x,t;\cdot,\cdot)dg(t)=:(4\pi\tau)^{-n/2}e^{-f}dg(t),$
where $\tau=t_{0}-t$ and $f\in C^{\infty}(M\times(I\cap(\infty,t)))$ is called
the potential.
Basically, in Bamler’s viewpoint, instead of considering a point $(x,t)$ in
spcaetime, we shall consider its corresponding conjugate heat kernel measure
$d\nu_{x,t;s}$ as defined above. Then Bamler used the $W_{1}$-Wasserstein
distance to define distance between the conjugate heat kernel measures based
at different points. If $\mu_{1}$ and $\mu_{2}$ denotes two probability
measures on a complete manifold $M$ and $g$ is a Riemannian metric on $M$,
then we define the $W_{1}$-distance between $\mu_{1}$ and $\mu_{2}$ by
$d_{W_{1}}^{g}(\mu_{1},\mu_{2}):=\sup_{f}\left(\int_{M}fd\mu_{1}-\int_{M}fd\mu_{2}\right),$
where the supremum is taken over all bounded, $1$-Lipschitz function
$f:M\to\mathbb{R}$.
Bamler also used the important notion called variance, which in some sense is
the $L^{2}$-norm of the probability measures on a Riemannian manifold. The
definition is the following
$\textnormal{Var}(\mu_{1},\mu_{2}):=\int_{M}\int_{M}d^{2}(\mu_{1},\mu_{2})d\mu_{1}(x_{1})d\mu_{2}(x_{2}).$
If $(M,(g(t))_{t\in I})$ is a Ricci flow and if there is chance of confusion,
then we will also write $\textnormal{Var}_{t}$ for the variance with respect
to the metric $g(t)$. We have the following basic relation between the
variance and the $W_{1}$-distance:
(2.1)
$d^{g}_{W_{1}}(\mu_{1},\mu_{2})\leq\sqrt{\textnormal{Var}(\mu_{1},\mu_{2})},$
for any two probability measures.
Now we can define the $H_{n}$-center of a given base point in Ricci flow.
###### Definition 2.2.
A point $(z,t)\in M\times I$ is called an $H_{n}$-center of a point
$(x_{0},t_{0})\in M\times I$ if $t\leq t_{0}$ and
$\textnormal{Var}_{t}(\delta_{z},\nu_{x_{0},t_{0};t})\leq H_{n}(t_{0}-t).$
Given $(x_{0},t_{0})\in M\times I$ and $t\leq t_{0}$, there always exists at
least one $z\in M$ such that $(z,t)\in M\times I$ is an $H_{n}$-center of
$(x_{0},t_{0})$, (see [1, Proposition 3.12]),and for such $H_{n}$-center,
using inequality (2.1), we always have
$d^{g}_{W_{1}}(\delta_{z},\nu_{x_{0},t_{0};t})\leq\sqrt{\textnormal{Var}(\delta_{z},\nu_{x_{0},t_{0};t})}\leq\sqrt{H_{n}(t_{0}-t)}.$
Next, we come to define the so-called Nash entropy which was introduced by
Hein-Naber [8]. Let $(M,g)$ be a closed Riemannian manifold of dimension $n$,
$\tau>0$ and $d\nu=(4\pi\tau)^{-n/2}e^{-f}dg$ is a probability measure on $M$,
where $f\in C^{\infty}(M)$, then the Nash entropy is defined by
$\mathcal{N}[g,f,\tau]=\int_{M}fd\nu-\frac{n}{2}.$
Then we can define
###### Definition 2.3.
Consider a conjugate heat kernel measure
$d\nu_{x_{0},t_{0};t}:=K(x_{0},t_{0};\cdot,t)dg(t)=(4\pi\tau)^{-n/2}e^{-f_{t}}dg(t),$
based at some point $(x_{0},t_{0})\in M\times I$, where $\tau=t_{0}-t$, the
pointed Nash entropy based at $(x_{0},t_{0})$ is defined as
$\mathcal{N}_{x_{0},t_{0}}(\tau):=\mathcal{N}[g_{t_{0}-\tau},f_{t_{0}-\tau},\tau].$
We set $\mathcal{N}_{x_{0},t_{0}}(0)=0$. For $s<t_{0}$, $s\in I$, we will
write
$\mathcal{N}^{*}_{s}(x_{0},t_{0}):=\mathcal{N}_{x_{0},t_{0}}(t-s).$
The pointed Nash entropy $\mathcal{N}_{x_{0},t_{0}}(\tau)$ is non-increasing
when $\tau\geq 0$ is increasing. For more basic properties of the pointed Nash
entropy, We refer the readers to [1, Proposition 5.2]. (See also Hein-Naber’s
work [8].)
The following lemma is proved in [1, Theorem 5.9, Corollary 5.11].
###### Lemma 2.4.
If $R(\cdot,s)\geq R_{min}$ for some $s\in I$, then on $M\times
I\cap\left((s,\infty)\right)$,
(2.2)
$|\nabla\mathcal{N}^{*}_{s}|\leq\left(\frac{n}{2(t-s)}+|R_{min}|\right)^{1/2}.$
Furthermore, if $s<t^{*}\leq\min{t_{1},t_{2}}$ and $s,t_{1},t_{2}\in I$, then
for any $x_{1},x_{2}\in M$,
(2.3)
$\begin{split}&\mathcal{N}^{*}_{s}(x_{1},t_{1})-\mathcal{N}^{*}_{s}(x_{2},t_{2})\\\
\leq&\left(\frac{n}{2(t^{*}-s)}+|R_{min}|\right)^{1/2}d_{W_{1}}^{g(t^{*})}(\nu_{x_{1},t_{1}}(t^{*}),\nu_{x_{2},t_{2}}(t^{*}))+\frac{n}{2}\log\left(\frac{t_{2}-s}{t^{*}-s}\right).\\\
\end{split}$
The following volume non-collapsing estimate is proved in [1] as a
generalization of Perelman’s $\kappa$-non-collapsing theorem.
###### Lemma 2.5.
Let $(M,(g(t))_{t\in[-r^{2},0]})$ be a solution of the Ricci flow. If
$R\leq r^{-2},~{}on~{}B_{g(0)}(x,r)\times[-r^{2},0],$
then
(2.4) $\textnormal{Vol}_{g(0)}(B_{g(0)}(x,r))\geq
c\exp(\mathcal{N}^{*}_{-r^{2}}(x,0))r^{n}.$
The following volume non-inflation estimate is also proved in [1].
###### Lemma 2.6.
Let $(M,(g(t))_{t\in[-r^{2},0]})$ be a solution of the Ricci flow. If
$R\geq-r^{-2}$
on $M\times[-r^{2},0]$, then for any $A\geq 1$, there exists
$C_{0}=C_{0}(n),C=C(n)>0$ such that
(2.5) $\textnormal{Vol}_{g(0)}(x,Ar)\leq
C\exp(\mathcal{N}^{*}_{-r^{2}}(x,0)+C_{0}A^{2})r^{n}.$
The following heat kernel upper bound estimate is proved in [1] (Theorem 7.2).
###### Lemma 2.7.
Let $(M,(g(t))_{t\in I})$ be a solution of the Ricci flow. Suppose that
$[s,t]\subset I$ and $R\geq R_{\min}$ on $M\times[s,t]$. Let $(z,s)\in M\times
I$ be an $H_{n}$-center of $(x,t)\in M\times I$. Then for any $\varepsilon>0$
and $y\in M$, we have
(2.6)
$K(x,t;y,s)\leq\frac{C(R_{\min}(t-s),\varepsilon)}{(t-s)^{n/2}}\exp\left(-\mathcal{N}_{x,t}(t-s)\right)\exp\left(-\frac{d^{2}_{s}(z,y)}{C(\varepsilon)(t-s)}\right).$
For more results on the entropy and heat kernel bounds on Ricci flow, we refer
the readers to [1].
## 3\. Proof of the improved no-local-collapsing theorem
In this section, we come to prove Theorem 1.2. First, we need the following
proposition.
###### Proposition 3.1.
For any $T>0$, consider a smooth Ricci flow $(M,(g(t))_{t\in(-T,0)})$ on
compact $n$-dimensional manifold, and choose $(s,t)\subset(-T,0)$ with
$s+T>\varepsilon>0$. Consider a $C^{1}$ spacetime curve $\gamma:(0,t-s)\to
M\times(-T,0)$ with $\gamma(\tau)\in M\times\left\\{t-\tau\right\\}$ between
points $\gamma(0)=x$ and $\gamma(t-s)=y$. Then we have
(3.1) $d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)\leq
C(\varepsilon)\left(1+\frac{\mathcal{L}(\gamma)}{2\sqrt{t-s}}-\mathcal{N}_{x,t}(t-s)\right)^{\frac{1}{2}}\sqrt{t-s}.$
###### Proof.
This is obtain by Bamler in [3, Lemma 21.2], we include the proof for the
convenience of the readers.
First, from the definition of the reduced distance, we have
$\ell_{(x,t)}(y,s)\leq\frac{\mathcal{L}(\gamma)}{2\sqrt{t-s}}.$
Hence from the estimate of Perelman [5, Corollary 9.5], we have the following
lower bound on the heat kernel
(3.2)
$\begin{split}K(x,t;y,s)\geq&\frac{1}{(4\pi(t-s))^{n/2}}\exp\left(-\ell_{(x,t)}(y,s)\right)\\\
\geq&\frac{1}{(4\pi(t-s))^{n/2}}\exp\left(-\frac{\mathcal{L}(\gamma)}{2\sqrt{t-s}}\right).\\\
\end{split}$
But, since $s+T>\varepsilon$, we can apply the heat kernel upper bound
estimate of Bamler, say Lemma 2.7, to obtain
(3.3)
$K(x,t;y,s)\leq\frac{C(\varepsilon)}{(t-s)^{n/2}}\exp\left(-\mathcal{N}_{x,t}(t-s)\right)\exp\left(-\frac{d^{2}_{s}(z,y)}{C(\varepsilon)(t-s)}\right).$
where $(z,s)$ is an $H_{n}$-center of $(x,t)$. Hence by the triangle
inequality and (2.1), we have
(3.4)
$\begin{split}&\left|d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)-d_{s}\left(y,z\right)\right|\\\
=&\left|d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)-d^{g(s)}_{W_{1}}\left(\delta_{y,s},\delta_{z,s}\right)\right|\\\
\leq&d^{g(s)}_{W_{1}}\left(\delta_{z,s},\nu_{x,t;s}\right)\leq\sqrt{\textnormal{Var}\left(\delta_{z,s},\nu_{x,t;s}\right)}\\\
\leq&\sqrt{H_{n}(t-s)}.\\\ \end{split}$
Hence, using the trivial inequality $(a-b)^{2}\geq\frac{a^{2}}{2}-4b^{2}$ for
all $a,b\in\mathbb{R}$, we obtain
$H_{n}(t-s)\geq\frac{1}{2}d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)^{2}-4d^{2}_{s}\left(y,z\right).$
Plugging this into inequality (3.3), we obtain
(3.5)
$\begin{split}K(x,t;y,s)\leq&\frac{C(\varepsilon)}{(t-s)^{n/2}}\exp\left(-\mathcal{N}_{x,t}(t-s)\right)\exp\left(-\frac{d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)^{2}-C(n)(t-s)}{C(\varepsilon)(t-s)}\right)\\\
\leq&\frac{C(\varepsilon)}{(t-s)^{n/2}}\exp\left(-\mathcal{N}_{x,t}(t-s)-\frac{d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)^{2}}{C(\varepsilon)(t-s)}\right).\\\
\end{split}$
Combining (3.5) with (3.2),we obtain
$\frac{1}{(4\pi(t-s))^{n/2}}\exp\left(-\frac{\mathcal{L}(\gamma)}{2\sqrt{t-s}}\right)\leq\frac{C(\varepsilon)}{(t-s)^{n/2}}\exp\left(-\mathcal{N}_{x,t}(t-s)-\frac{d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)^{2}}{C(\varepsilon)(t-s)}\right).$
Rearranging this inequality, we obtain
$d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)\leq
C(\varepsilon)\left(1+\frac{\mathcal{L}(\gamma)}{2\sqrt{t-s}}-\mathcal{N}_{x,t}(t-s)\right)^{\frac{1}{2}}\sqrt{t-s},$
which finishes the proof of the proposition. ∎
Now we can prove Theorem 1.2.
###### Proof of Theorem 1.2.
After parabolic rescaling, we may assume without loss of generality that
$r_{0}=1$, and then $r\leq 1$.
Let $\gamma:[0,1]\to M\times[-1,0]$ be the spacetime curve defined by:
$\gamma(\tau)=(x_{0},-\tau),~{}~{}~{}\tau\in[0,1],$
which is what we usually called the worldline. Then from our assumption, we
have
$R(\gamma(\tau),-\tau)\leq\frac{A}{\tau},~{}~{}\forall\tau\in(0,1],$
and hence we can compute
(3.6)
$\begin{split}\mathcal{L}(\gamma)=&\int_{0}^{1}\sqrt{\tau}\left(|\gamma^{\prime}(\tau)|^{2}_{-\tau}+R(\gamma(\tau),-\tau)\right)d\tau\\\
=&\int_{0}^{1}\sqrt{\tau}R(\gamma(\tau),-\tau)d\tau\\\
\leq&\int_{0}^{1}\sqrt{\tau}\cdot\frac{A}{\tau}d\tau\\\ \leq&2A.\end{split}$
Next, by the monotonicity of the Nash entropy, we have that
$0\geq\mathcal{N}_{x_{0},0}(1)\geq\mathcal{N}_{x_{0},0}(2)$, and hence
$0\leq-\mathcal{N}_{x_{0},0}(1)\leq-\mathcal{N}_{x_{0},0}(2)$. Hence, we can
apply Proposition 3.1 together with (3.6) to obtain
(3.7)
$\begin{split}&d^{g(-1)}_{W_{1}}\left(\delta_{x_{0},-1},\nu_{x_{0},0;-1}\right)\\\
\leq&C\left(1+\frac{\mathcal{L}(\gamma)}{2\sqrt{0-(-1)}}-\mathcal{N}_{x_{0},0}(1)\right)^{\frac{1}{2}}\sqrt{0-(-1)}\\\
\leq&C\left(1-\mathcal{N}_{x_{0},0}(1)\right)^{\frac{1}{2}}.\\\ \end{split}$
where $C=C(n,A)$. Hence, by applying the Harnack estimate of Nash entropy
proved by Bamler, say Lemma 2.4, we have
(3.8)
$\begin{split}&\left|\mathcal{N}^{*}_{-2}(x_{0},-1)-\mathcal{N}^{*}_{-2}(x_{0},0)\right|\\\
\leq&\left(\frac{n}{2((-1)-(-2))}+n\right)^{\frac{1}{2}}d^{g(-1)}_{W_{1}}\left(\delta_{x_{0},-1},\nu_{x_{0},0;-1}\right)+\frac{n}{2}\log\left(\frac{0-(-2)}{(-1)-(-2)}\right)\\\
\leq&C\left(C-\mathcal{N}^{*}_{-2}(x_{0},0)\right)^{\frac{1}{2}}+C\\\
\leq&100C^{2}+\frac{1}{100}\left(C-\mathcal{N}^{*}_{-2}(x_{0},0)\right)+C.\end{split}$
Hence we obtain
(3.9)
$\frac{99}{100}\mathcal{N}_{-2}^{*}(x_{0},0)\geq\mathcal{N}_{-2}^{*}(x_{0},-1)-C$
But by the volume non-inflating estimate, say Lemma 2.6, since we can assumed
without loss of generality that $R\geq-n$, we have
$A^{-1}\leq\textnormal{Vol}_{g(-1)}(B_{g(-1)}(x_{0},1))\leq
C\exp\left(\mathcal{N}_{x_{0},-1}(1)\right),$
which can be written as
$\mathcal{N}_{-2}^{*}(x_{0},-1)=\mathcal{N}_{x_{0},-1}(1)\geq-C(n,A).$
Combining this with (3.9), we obtain
(3.10) $\mathcal{N}_{-2}^{*}(x_{0},0)\geq-C,$
for some $C=C(n,A)\leq\infty$.
Next, by the gradient estimate of the Nash entropy in Lemma 2.4 , we have
(3.11)
$\left|\mathcal{N}^{*}_{-2}(x_{0},0)-\mathcal{N}^{*}_{-2}(x,0)\right|\leq
C(n)d_{0}(x_{0},x)\leq C(n)A,$
Combining (3.10) and (3.11) we obtain
$\mathcal{N}_{x,0}(2)=\mathcal{N}^{*}_{-2}(x,0)\geq-C,$
Then we apply the monotonicity of the Nash entropy to obtain (note that $r\leq
1$)
$\mathcal{N}_{x,0}(r^{2})\geq\mathcal{N}_{x,0}(2)\geq-C.$
But we have assumed that $R\leq r^{-2}$ on $B_{g(0)}(x,r)$, we can apply the
lower volume bound estimate, say Lemma 2.5, to obtain that:
$\textnormal{Vol}_{g(0)}(B_{g(0)}(x,r))\geq
c(n)\exp\left(\mathcal{N}_{x,0}(r^{2})\right)r^{n}\geq\kappa(n,A)r^{n},$
which finishes the proof of the theorem. ∎
## References
* [1] Bamler, R., Entropy and heat kernel bounds on a Ricci flow background,arXiv:2008.07093.
* [2] Bamler, R., Compactness theory of the space of Super Ricci flows, arXiv:2008.09298.
* [3] Bamler, R., Structure theory of non-collapsed limits of Ricci flows, arXiv:2009.03243.
* [4] Hamilton, R., Three-manifolds with positive Ricci curvature, J. Differential Geom, 1982, 17: 255–306.
* [5] Perelman, G., The entropy formula for the Ricci flow and its geometric applications, preprint, math.DG/0211159.
* [6] Perelman, G., Ricci flow with surgery on three-manifolds, preprint, math.DG/0303109v1.
* [7] Perelman, G., Finite extinction time for the solutions to the Ricci flow on certain three manifolds, preprint, math.DG/0307245
* [8] Hein, H. and Naber, A., New logarithmic Sobolev inequalities and an $\varepsilon$-regularity theorem for the Ricci flow, Comm. Pure Appl. Math. 67 (2014), no. 9, 1543–1561.
* [9] Jian, W. and Song, J., Diameter and Ricci curvature estimates for long-time solutions of the Kähler-Ricci flow, arXiv:2101.04277.
* [10] Song, J., Tian, G. and Zhang, Z.L., Collapsing behavior of Ricci-flat Kahler metrics and long time solutions of the Kahler-Ricci flow, arXiv:1904.08345.
* [11] Tian, G. and Zhang, Z.L., Relative volume comparison of Ricci Flow, Sci. China Math. (2021). https://doi.org/10.1007/s11425-021-1869-5.
* [12] Wang, B., The local entropy along Ricci flow, Part A: the no-local-collapsing theorems, Camb. J. Math. 6 (2018), no. 3, 267-346.
* [13] Zhang, Q.S., Sobolev Inequalities, Heat Kernels under Ricci Flow, and the Poincaré Conjecture, Boca Raton: CRC Press, 2011.
| arxiv-papers | 2021-07-26T23:37:26 | 2024-09-04T03:07:20.181150 | {
"license": "Creative Commons Zero - Public Domain - https://creativecommons.org/publicdomain/zero/1.0/",
"authors": "Wangjian Jian",
"submitter": "Wangjian Jian",
"url": "https://arxiv.org/abs/2107.12515"
} |
2107.12519 | # Proactive Composition of Mobile IoT Energy Services
Abdallah Lakhdari School of Computer Science
The University of Sydney, Australia
[email protected] Athman Bouguettaya School of Computer
Science
The University of Sydney, Australia
[email protected]
###### Abstract
We propose a novel proactive composition framework of wireless energy services
in a crowdsourced IoT environment. We define a new model for energy services
and requests that includes providers’ and consumers’ mobility patterns and
energy usage behavior. The proposed composition approach leverages the
mobility and energy usage behavior to generate energy services and requests
proactively. Preliminary experimental results demonstrate the effectiveness of
generating proactive energy requests and composing proactive services.
###### Index Terms:
Crowdsourcing; Wireless Energy; IoT; Proactive composition; energy service;
Mobility; usage behavior;
## I Introduction
The proliferation of the Internet of things (IoT), particularly wearables, may
give rise to a self-sustained crowdsourced IoT ecosystem [1]. The augmented
capabilities of IoT devices such as sensing and computing resources may be
leveraged for peer-to-peer sharing. People can exchange a wide range of IoT
services such as computing offloading, hotspot proxies, energy sharing, etc.
These crowdsourced IoT services present a convenient, cost-effective, and
sometimes the only possible solution for a resource-constrained device [2].
For instance, a passenger’s smartphone with low battery power may elect to
receive energy from nearby wearables using Wifi [3]. The focus of this paper
is on crowdsourcing IoT energy services.
The concept of wireless crowdsharing has been recently introduced to provide
IoT users with power access, anywhere anytime, through crowdsourcing[3][4]. We
leverage the service paradigm to unlock the full potential of IoT energy
crowdsourcing. We define an IoT Energy Service as the abstraction of energy
wireless delivery from an IoT device (i.e., provider) to another device (i.e.,
consumer) [5]. Crowdsourcing IoT energy services has the potential of creating
a green service exchange environment by recycling the unused IoT energy or
relying on renewable energy sources. For example, an IoT device may share its
spare energy with another IoT device in its vicinity. Another example, a smart
shoe may harvest energy from the physical activity of its wearer [6][7].
Additionally, wireless charging allows energy crowdsharing to be a convenient
alternative as the devices do not need to be tethered to a power point, nor
use power banks. Crowdsourcing energy services can be deployed through already
existing wireless power transfer technologies such as
Energous111https://www.energous.com/ which can deliver up to 3 Watts power
within a 5-meter distance to multiple receivers.
Service composition is expected to play a vital role in the crowdsourced IoT
environment. A single IoT energy service may not fulfill the requirement of a
consumer due to the limited resources of wearables [8]. Instead, multiple
services need to be composed to provision one energy request. Existing energy
service composition frameworks mainly consist of the real-time discovery and
selection of nearby energy services to accommodate an energy request. These
techniques assume that a request can be fulfilled by the available energy
services within its vicinity [9]. The focus of these composition techniques
was only on the spatio-temporal composability [5] and addressing the
challenges related to the energy fluctuation, the mobility, and the conflicts
of the available services [10][11][12].
The crowdsourced IoT energy ecosystem is a dynamic environment that consists
of providers and consumers congregating and moving across microcells
boundaries. A microcell is any confined area in a smart city where people may
gather (e.g., coffee shops, restaurants, museums, library), see figure 1.
Energy service providers and consumers may have different spatio-temporal
preferences. These preferences’ incongruity may severely impact the balance
between energy services and existing energy requests. For instance, in a
particular location at a specific time, an energy consumer might not find the
required energy amount to fulfill their request. We propose a novel model for
mobile crowdsourced energy services, a major extension of the deterministic
energy service model in [5]. According to extensive experiments, it has been
proven that human mobility is highly predictable [13]. This predictability can
be related to the rough regularity of our daily routines [14]. We leverage
these mobility patterns and the energy usage behavior of energy consumers and
providers to propose a proactive composition approach. The proposed approach
(i) proactively defines services and requests for energy providers and
consumers, respectively, according to their spatio-temporal preferences and
energy requirements. (ii) For each consumer, the proactive composition
approach defines an optimal set of energy requests ahead of time after
estimating their spatio-temporal preferences, their energy usage behavior, and
the energy availability likelihood at each microcell.
Figure 1: Crowdsourcing IoT energy services
We propose a proactive service composition framework that captures and
leverages the spatio-temporal preferences of energy providers and consumers.
The proactive service composition identifies, for an energy request, when,
where, and which set of energy services to compose. The goal is to avoid the
under-provision of energy requests and balance the energy requests and
services within and across microcells. Our proposed solution’s novelty is that
energy services are composed seamlessly without affecting the usage behavior
and the mobility patterns of service providers and consumers. First, the
proposed composition framework anticipates the next required energy based on
the energy usage behavior. The proactive composition, then, plans, ahead of
time, the location, time, and required amount of one or multiple energy
requests according to the consumer’s mobility pattern. Additionally, the
proposed composition approach considers the availability of energy services
within the microcells to be passed by the consumer. The composition framework
determines the availability of energy services based on the energy usage
behavior and the mobility patterns of the providers. The preferred solution is
to select an optimal set of services and fulfill the requirement of an energy
consumer without affecting the spatio-temporal preferences of the providers
and consumers. The main contributions are:
* •
A novel model to represent the proactive energy services and requests by
leveraging IoT users’ spatio-temporal preferences and their energy usage
behavior.
* •
A proactive composition framework that automatically matches proactive service
with proactive energy requests in a crowdsourced IoT environment.
## II Motivating scenario
Figure 2: Student’s daily routine within the campus, spatio-temporal patterns
and energy usage behavior
We describe a scenario at the university campus where students move across,
gather, and practice various activities in different confined places (i.e.,
microcells), e.g., library, study spaces, food court. We assume that students
are incentivized to recycle the spare energy of their IoT devices by sharing
it with nearby devices [15]. Energy providers advertise their energy services
in different microcells within the smart campus according to their spatio-
temporal preferences and their energy usage behavior. The advertisement
presents a description of the provided service, e.g., location, start and end
time, the provided energy amount. A centralized IoT coordinator processes all
energy services, i.e., an edge server responsible for sharing crowdsourced IoT
energy services (see figure 1). Typically, in an energy crowdsharing
environment, whenever a student needs to recharge their smartphone, they
launch an energy request in a microcell in the following form: User $x$
requires an amount of energy $E$ in the location $L$ during the period
$[st~{},~{}et]$. The IoT coordinator then composes the available nearby energy
services to fulfill the said energy request [5]. However, sometimes, it is
unlikely to find the required energy amount in a specific location or a
specific time.
Figure 2 presents a student’s daily routine within the campus coupled with
their energy usage behavior. For example, the student has a class from 9 to 11
am, a 30 minutes coffee break after the class, then an important meeting with
their supervisor, lunch break, and finally a 2 hours study session in the
library before heading to the gym at the end of the day. The daily routine is
drawn as a sequence of spatio-temporal events. Each event is represented by
location, time frame, and the student’s smartphone energy status (i.e.,
battery state of charge and the estimated required energy). The student’s
smartphone is set to automatically launch an energy request to nearby IoT
devices whenever the battery state of charge reaches a predefined threshold,
e.g., 20%. In this case, an energy request would be launched by the student’s
smartphone in the library at around 4 pm to crowdsource nearby energy services
[5]. Unfortunately, it is unlikely for the student to fulfill their energy
requirement at this time in the library due to a supply shortage. This
shortage can be related to several reasons; for instance, energy providers may
run out of their spare energy. Another reason could be that multiple devices
are requesting energy to ensure the functioning of their devices for the rest
of the day.
A better solution to crowdsource energy is to leverage the mobility patterns
of students with their energy usage behavior to proactively define when,
where, and how much energy to request to fulfill their energy requirement.
Leveraging the student’s spatio-temporal preferences and their flexibility
would increase the likelihood of providing the requested energy along with an
insignificant alteration of the student’s daily routine. Instead of launching
an energy request re-actively whenever a State of Charge (SoC) threshold is
reached [4], the proactive composition selects the optimal time, location, and
energy amount to request to fulfill their requirement. For instance, it can be
easily anticipated that the smartphone’s battery at 4 pm in the library would
not suffice their energy requirement based on the student’s smartphone’s
estimated energy consumption behavior (see figure 2). Figure 2 also depicts
the energy availability likelihood at each microcell visited by the student
requesting energy. In that case, the energy provision likelihood in the
library is estimated to be very low (e.g., 20%) according to the energy usage
and provision behavior of the existing providers in the library at that time.
However, it is shown that the available energy in other microcells visited
earlier by the student according to their daily routine, namely, 70% in a
visited coffee shop and 80% in the food court at lunchtime. The framework
leverages the knowledge about the energy availability across microcells, the
energy consumption behavior, and the spatio-temporal preferences of the
student requesting energy to define one or multiple energy requests in the
class, the coffee shop, and the food court, respectively, to fulfill the
anticipated energy requirement.
## III Proactive energy services and requests
An energy service is the abstraction of the wireless delivery of energy from
an IoT device to another. We extend the existing energy service model to a
proactive energy service model [5]. The proactive service model leverages the
spatio-temporal patterns of energy providers along with the usage behavior of
their IoT devices to seamlessly define, advertise, and share their spare
energy without affecting their daily routine preferences. Each individual may
concur with a pattern for their spatio-temporal preferences [13]. They might
regularly visit particular places at specific times. These habits may define
the mobility patterns of individuals [14]. We leverage mobility and energy
usage patterns to define a model for proactive energy services and requests.
### III-A Proactive energy service model
We define an energy provider as an IoT user who is willing to share the spare
energy of their devices with nearby IoT devices. We use energy services to
abstract the energy sharing process. An energy service is the abstraction of
the wireless delivery of energy from an IoT device to another [4]. In the
previous energy service model. Energy provision was under the complete control
of the IoT device owners. They manually advertise their services [5].
We extend the existing energy service model by formally representing the
spatio-temporal patterns and the energy usage behavior of providers. The goal
is to automatically define the optimal time, location, and energy amount to
provide according to the daily routine of the provider. For example, if a
provider $i$ usually spends half an hour in a particular restaurant $L_{i}$ at
lunchtime $T_{i}$ and their battery state of charge is $SoC_{i}$, the proposed
model would capture the spatio-temporal pattern $<L_{i},T_{i},SoC_{i}>$. In
addition to capturing this pattern, the proactive energy service model
estimates the energy usage distribution and verifies if it is enough energy
for the rest of the day. Accordingly, the service model defines the energy
amount to share $E_{i}$ while staying at that restaurant. We formally define a
proactive energy service as follows:
###### Definition 1.
A proactive energy service _ $PES$ is represented as a tuple $<S,P,F,Q,M,U>$,
where: _
* •
$S$ is a unique ID for the energy service
* •
$P$ is a unique ID for the provider222In the rest of the paper, we assume that
an energy provider shares energy only from one IoT device. Hence, Energy
providers refers to both the device sharing energy and the owner of the
device.
* •
$F$ is the set of $PES$ functionalities offered by the service,
* •
$Q$ is a tuple of $<q_{1},q_{2},...,q_{n}>$, each $q_{i}$ denotes a QoS
property of $PES$. [4].
* •
$M$ is the mobility patterns of the provider $P$.
* •
$U$ represents the energy usage behavior of a provider $P$.
###### Definition 2.
The quality attributes of an energy service _QoS is a set of parameters that
allows energy consumers to distinguish among IoT energy services[5], namely:_
* •
$l$ is the location of the consumer.
* •
$r$ is the range for a successful wireless energy transfer.
* •
$st$ and $et$ represent the start time and end time of an energy service
respectively.
* •
$DEC$ is the deliverable energy capacity.
* •
$I$ is the intensity of the wirelessly transferred current.
* •
$Tsr$ represents the transmission success rate.
* •
$Rel_{i}$ is the reliability of the provider.
### III-B Proactive energy request model
An energy consumer in the crowdsourced IoT environment is an IoT user who
requests energy for their devices from nearby IoT devices. We define an energy
request as an abstraction of the energy consumer requirement according to
their spatio-temporal preferences [4]. In the existing energy service model.
Energy consumption is under the complete control of the IoT device owners.
They manually request energy according to their preferences [5].
Defining energy requests automatically, based on the anticipated mobility and
usage behavior, increases the chances to fulfill the requirement of a
consumer. For instance, a consumer might reserve proactive energy services
ahead of time according to their preferences and the availability of services
within the microcells visited by the consumer.
###### Definition 3.
A proactive energy service request _is a tuple $Rq<t,l,RE,CI,du>$, where:_
* •
$t$ is the timestamp when the energy request is launched.
* •
$l$ is the location of the consumer. We assume that the consumer is staying at
their location $l$ within one microcell after launching their energy request.
* •
$RE$ represents the required amount of energy.
* •
$CI$ is the maximum intensity of the wireless current that a consuming IoT
device can receive.
* •
$du$ refers to the charging period [4].
### III-C Patterns of energy providers and consumers
It has been proven that human mobility is highly predictable according to an
extensive set of experiments on capturing the movement of millions of humans
in metropolitan areas [13]. The regularity in human mobility could be
reflected on the IoT devices associated with their owners to define the
mobility patterns of energy services users in a crowdsourced IoT environment
[9]. Additionally, the energy consumption behavior of IoT devices reflects the
usage behavior of the devices by their owners. A recent study that adopted a
crowdsourcing-based method to model the energy consumption of smartphones
revealed a certain regularity in the energy consumption behavior tightly
correlated with the daily routine activities of the smartphone owners [16].
Similarly, we leverage the captured regularity in the energy consumption
behavior to automatically define energy services and requests in the
crowdsourced IoT environment. In what follows, we define the mobility and the
energy usage patterns of energy providers and consumers.
###### Definition 4.
Mobility patterns _The mobility pattern $M$ of an IoT user in the
crowdsourced IoT energy environment is the captured spatio-temporal sequence
of the IoT user activities during their daily routine._
The daily routine spatio-temporal sequence can be represented as a
probabilistic time series that denotes at each timestamp the availability
likelihood of the IoT user $i$ in a specific location $loc_{i}$ at a
particular time $t_{i}$. Formally, the mobility $M_{i}$ of an IoT user $i$ is
a tuple $M_{i}(t_{i},loc_{i},\theta_{i})$.
* •
$t_{i}=\\{t_{i0},t_{i1},t_{i2},~{}..,t_{in}\\}$ is the set of timestamps. In
this work, we consider a five minutes time interval between two consecutive
timestamps.
* •
$loc_{i}=\\{loc_{i0},loc_{i1},~{}..,loc_{in}\\}$ is the set of visited
locations by the IoT user $i$.
* •
$\theta_{i}$ is the likelihood that the provider $i$ is at location $loc_{i}$
at time $t_{i}$.
Each
$\theta_{ik}\in\theta_{i}=\\{\theta_{i0},\theta_{i1},\theta_{i2},~{}..,\theta_{in}\\}$
is the probability that IoT user $i$ is in the location $loc_{ik}$ at
timestamp $t_{i}k$.
$\theta_{i}<l_{i}=loc_{i}>=f(H_{i})$
The IoT user’s availability probability distribution function $f_{i}$ can be
obtained by statistical methods applied on the historical records $H_{i}$ of
the IoT user $i$ [17].
###### Definition 5.
Energy usage behavior _The usage behavior $U$ of an IoT user is the captured
state of charge of the user’s battery during the day._
The IoT user’s battery state of charge patterns are represented as a time
series that denotes at each timestamp the estimated battery level according to
their historical record of energy usage. Similarly, the energy usage behavior
$U_{i}$ can be formally represented as a tuple $U_{i}(t_{i},SoC_{i})$.
* •
$t_{i}=\\{t_{i0},t_{i1},t_{i2},~{}..,t_{in}\\}$ is the set of timestamps. In
this work, we also consider a five minutes time interval between two
consecutive timestamps to capture the energy usage behavior.
* •
$SoC_{i}=\\{SoC_{i0},SoC_{i1},SoC_{i2},~{}..,SoC_{in}\\}$ is the state of
charge temporal sequence of the IoT users $i$.
###### Definition 6.
The flexibility of energy consumers _is defined by their toleration to stick
or change the anticipated microcell to visit at a specific time and their
toleration to extend or shorten their stay time in that microcell_
Typically, according to the activities of our daily routine activities, some
of the visited places are unchangeable. For example, a student cannot change
the location or the time of their class from 9 to 11 am. However, it is
obviously possible to change the venue to have a coffee or a lunch (see red
and blue circles in figure 2). Additionally, the interval of time spent in
regularly visited places e.g., coffee shops or food courts can be defined as a
range between the minimum and the maximum duration a person would stay [18].
We incorporate the flexibility of energy consumers based on their toleration
to change the microcell and the range of their usual stay in that microcell.
The flexibility $Fx$ of an energy consumer $i$ is associated with their
mobility pattern. It can be modeled as a tuple $Fx_{i}<A_{i},Ch_{i},Sr_{i}>$
where:
* •
$A_{i}$ is the availability distribution for all visited microcells $MCL$
during the daily routine of the energy consumer $i$.
$MCL_{ik}\in MCL_{i}=\\{MCL_{i0},MCL_{i1},~{}..,MCL_{in}\\}$
* •
$Ch_{i}$ is the corresponding distribution that indicates for each microcell
if it is tolerated to be changed.
* •
$Sr_{i}$ is the tolerance distribution that indicates if the stay time can be
extended or shortened in a visited microcell.
The availability distribution of a consumer $i$ can be derived from the
mobility pattern of that consumer $M_{i}$. The toleration distributions
$Ch_{i}$ and $Sr_{i}$ can be presented as a binary sequence of the all the
visited microcells $MCL$ during the daily routine of the energy consumer $i$
$MCL_{ik}\in MCL_{i}=\\{MCL_{i0},MCL_{i1},MCL_{i2},~{}..,MCL_{in}\\}$ as
follows:
$Ch_{ik}=1~{}if~{}MCL_{ik}~{}is~{}changeable;~{}~{}0~{}otherwise$
$Sr_{ik}=1~{}if~{}T<MCL_{ik}>~{}is~{}flexible;~{}~{}0~{}otherwise$
Where $T<MCL_{ik}>$ is the stay time interval of the energy consumer $i$ at
the microcell $k$.
Algorithm 1 Proactive composition algorithm
1:$<$ $Provider$, $Consumer$, $Microcell$ $>$
2:$<Consumerplan>,~{}<ER>$
3:Define mobility plan for each provider $ProvPlan$
4:Define proactive services $<PES>$
5:Generate the mobility graph MG
6:Estimate the energy availability
7:Define proactive requests $<ER>$
8:Define mobility plan for each consumer $ConsPlan$
9:return $ConsPlan$
### III-D Proactive composition framework
The proposed framework utilizes the previous definitions in the composition as
follows (See Algorithm 1):
1. 1.
According to the daily behavior of the energy provider, one or multiple energy
services can be generated. The spatio-temporal quality attributes of these
energy services (i.e., $l,st$ and $et$) are defined based on the mobility
pattern $M$ of that provider, e.g., time spent in regularly visited places
based on their daily activity model [13]. $DEC$ and $Rel_{i}$ are estimated by
the energy usage model $U$ of their IoT device. $I$ and $Tsr$ are defined
based on the specifications of the IoT devices sharing energy [9].
2. 2.
Similarly, according to the daily routine of the energy consumer, one or
multiple energy requests can be generated. The spatio-temporal features of
these energy requests (i.e., $l,st$ and $du$) are defined based on the
mobility patterns of the energy consumer. $RE$ is estimated by the energy
usage model of the IoT device. $CI$ is defined based on the specifications of
the IoT devices requesting energy [5].
3. 3.
The framework creates a mobility graph where the nodes and the edges represent
the microcells and the movement of IoT users between these microcells,
respectively.
4. 4.
The framework estimates the energy availability at each microcell based on the
generated proactive services and the estimated energy to be shared by each
service.
5. 5.
The energy consumer then selects the microcells to visit according to the
activity sequence of their daily routine and their anticipated energy
requirement as follows:
1. (a)
The consumer first identifies the flexible and the non-flexible activities
based on their mobility pattern [10].
2. (b)
The consumer identifies their energy requirements during the day based on
their energy usage behavior.
3. (c)
The energy consumer defines their mobility plan in the form of a path within
the energy availability graph.
4. (d)
For each proactive energy request, the framework performs a spatio-temporal
composition of the available energy services [9].
## IV Preliminary experiments
We conduct a set of experiments to evaluate the proposed concepts of proactive
service and requests and the proactive composition. We assess the
effectiveness of the proactive composition approach by measuring the ratio of
successful requests in and across different microcells. We compare the
proposed approach with a state-of-the-art algorithm, i.e., the spatio-temporal
composition of energy services [5] and with a brute-force-based composition
approach.
Figure 3: Provisioning variation according to the energy availability
### IV-A Datasets and experiment environment
To the best of our knowledge, it is challenging to find a dataset about the
energy wireless transfer among human-centric IoT devices. We create a
crowdsourced IoT environment scenario close to reality. We mimic the crowd’s
energy harvesting and sharing behavior by utilizing QLD
smartgrid333https://data.gov.au/dataset an energy sharing smart-grid of 25
houses in Australia. In our experiment, we define the energy service QoS
parameters, the deliverable energy capacity $DEC$, and the intensity of the
transferred current $I$ from the QLD smartgrid dataset. The transmission
success rate $Tsr$ QoS parameter is randomly generated. Similarly, the energy
requirement of a request $Rq.RE$ is also generated from the daily energy
consumption of the houses.
We use Yelp444https://www.yelp.com/dataset dataset to simulate the spatio-
temporal features of energy services and requests. The dataset contains
information about the crowd’s behavior in different venues in multiple cities.
Our experiment only focuses on people’s check-ins information in confined
areas, e.g., coffee shops. For each venue ($business\\_id$), we extract the
crowd size ($Checkins$) at each hour ($hour$) of the day ($weekday$). We
assume these people as IoT users. They may offer energy services from their
IoT devices while staying in a confined area. We define spatio-temporal
features of energy services and requests by generating the check-in and check-
out timestamps of customers to microcells. For example, the start time $st$ of
an energy service from an IoT user is the time of their check-ins into a
coffee shop.
Figure 4: Successful requests with different techniques
### IV-B Effectiveness
We investigate the effectiveness of the proactive composition by comparing the
number of successfully served requests by the three composition algorithms
(see figure 4). This initial comparison aims to mention the overall behavior
of the three composition techniques in three different settings. Namely, high
availability (i.e., six energy services for one request), average availability
of energy across microcells (i.e., three energy services for one request),
scarce energy availability (i.e., one energy service for one energy request).
As a baseline to compare with, the brute force composition technique requests
energy from every visited microcell. It is expected to see the best behavior
with this composition technique. The poor performance of the spatio-temporal
composition is expected because the algorithm has not been designed to adjust
according to the external environment. It is worth mentioning that with the
change in the energy availability across microcells, the difference between
the three techniques remains almost similar. The closeness between the brute
force-based composition and the proactive composition is a positive indicator
of the effectiveness of the proactive composition.
We run another experiment to investigate the effectiveness of adapting energy
requests to the energy availability within and across microcells. We change
the ratio of number of services/number of requests from 1 to 9 and measure the
received energy amount per request. Figure 3 presents the behavior of the
three composition techniques. There is an apparent closeness between the
behavior of the brute force-based composition and the proactive composition
with a remarkable difference with the performance of the spatio-temporal
composition. However, the experiment shows no significant difference between
the spatio-temporal and the proactive composition algorithms when the energy
availability is low, namely when the ratio number of services/number of
requests is between 1 and 2.5. After these values, the proactive composition
behavior improves significantly. Adjusting the energy requirements and
proactively redefining energy requests according to the availability of energy
services and spatio-temporal preferences would increase the chances of
fulfilling the consumer’s requirements during their daily routine.
## V Conclusion
We propose a novel proactive spatio-temporal composition framework to
crowdsource energy services from IoT devices. The goal is to seamlessly meet
users’ energy requirements in the dynamic crowdsourced IoT environment. We
define a proactive energy service and request models to automatically generate
services and requests according to the spatio-temporal and energy usage
patterns of the providers and consumers respectively. The proactive
composition approach anticipates the requirements of energy consumers and
plans when, where, and how much energy to request for each energy consumer.
Preliminary experiments show that proactively generating requests is able to
balance the energy supply-demand in the crowdsourced energy market.
## References
* [1] L. Atzori _et al._ , “The internet of things: A survey,” _Computer networks_ , vol. 54, no. 15, pp. 2787–2805, 2010.
* [2] K. Habak _et al._ , “Femto clouds: Leveraging mobile devices to provide cloud service at the edge,” in _IEEE CLOUD_ , 2015.
* [3] T.P. Raptis, “Online social network information can influence wireless crowd charging,” in _IEEE DCOSS_ , 2019.
* [4] A. Lakhdari _et al._ , “Crowdsourcing energy as a service,” in _Springer ICSOC_ , 2018.
* [5] A. Lakhdari _et al._ , “Composing energy services in a crowdsourced iot environment,” _IEEE TSC_ , 2020.
* [6] Y.M. Choi _et al._ , “Wearable biomechanical energy harvesting technologies,” _MDPI Energies_ , 2017.
* [7] M. Gorlatova _et al._ , “Movers and shakers: Kinetic energy harvesting for the internet of things,” in _ACM SIGMETRICS Performance Evaluation Review_ , 2014.
* [8] A. Lakhdari _et al._ , “Crowdsharing wireless energy services,” in _2020 IEEE CIC_. USA: IEEE, 2020, pp. 18–24.
* [9] A. Lakhdari and A. Bouguettaya, “Fluid composition of intermittent iot energy services,” in _SCC_. IEEE, 2020.
* [10] A. Lakhdari _et al._ , “Elastic composition of crowdsourced iot energy services,” in _Mobiquitous_. EAI, 2020.
* [11] A. Abusafia and A. Bouguettaya, “Reliability model for incentive-driven iot energy services,” in _Mobiquitous_ , 2020.
* [12] D. Chaki _et al._ , “A conflict detection framework for iot services in multi-resident smart homes,” in _IEEE ICWS_ , 2020.
* [13] M.C. Gonzalez _et al._ , “Understanding individual human mobility patterns,” _nature_ , 2008.
* [14] Z. Yang _et al._ , “Mobility increases localizability: A survey on wireless indoor localization using inertial sensors,” _ACM Computing Surveys_ , 2015.
* [15] A. Abusafia _et al._ , “Incentive-based selection and composition of iot energy services,” in _SCC (accepted)_. IEEE, 2020.
* [16] E. Peltonen _et al._ , “Energy modeling of system settings: A crowdsourced approach,” in _PerCom_. IEEE, 2015\.
* [17] S. Deng _et al._ , “Constraints-driven service composition in mobile cloud computing,” in _IEEE ICWS_ , 2016.
* [18] T.M.T. Do and D. Gatica-Perez, “The places of our lives: Visiting patterns and automatic labeling from longitudinal smartphone data,” _IEEE Mobile Computing_ , 2013.
| arxiv-papers | 2021-07-26T23:48:47 | 2024-09-04T03:07:20.190976 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Abdallah Lakhdari and Athman Bouguettaya",
"submitter": "Abdallah Lakhdari",
"url": "https://arxiv.org/abs/2107.12519"
} |
2107.12528 | # Abstract Differential Equations and Caputo Fractional Derivative
Paulo M. de Carvalho-Neto Departamento de Matemática, Centro de Ciências
Físicas e Matemáticas, Universidade Federal de Santa Catarina, Florianópolis -
SC, Brazil [email protected]
###### Abstract.
In this work I consider the abstract Cauchy problems with Caputo fractional
time derivative of order $\alpha\in(0,1]$, and discuss the continuity of the
respective solutions regarding the parameter $\alpha$. I also present a study
about the continuity of the Mittag-Leffler families of operators (for
$\alpha\in(0,1]$), induced by sectorial operators.
###### Key words and phrases:
fractional differential equations, Mittag-Leffler operators, sectorial
operators, semilinear equations
###### 2010 Mathematics Subject Classification:
26A33, 35R11, 33E12
## 1\. Contextualization of the Main Problem
Let me begin by presenting the abstract Cauchy problem
$\left\\{\begin{array}[]{l}cD^{\alpha}_{t}u(t)=Au(t)+f(t,u(t)),\,\,\,t\geq
0,\\\ u(0)=u_{0}\in X,\end{array}\right.$ ($P_{\alpha}$)
where $X$ is a Banach space over $\mathbb{C}$, $\alpha\in(0,1]$,
$A:{D}(A)\subset X\rightarrow X$ is a sectorial operator, $f:[0,\infty)\times
X\rightarrow X$ is a continuous function and $cD^{\alpha}_{t}$ denotes Caputo
fractional derivative of order $\alpha$, when $\alpha\in(0,1)$, and denotes
the standard derivative when $\alpha=1$. (see Section 2 for more details).
In a previous work [3] (see also [4]), which was done with some collaborators,
I have presented several results about the existence, uniqueness and
continuation of mild solutions to problem ($P_{\alpha}$), when
$\alpha\in(0,1)$. In fact, the results obtained in [3] are similar to the
classical results that are obtained when $\alpha=1$. Therefore, in order to
clarify the differences between these two situations, let me present the
following notions and results.
###### Definition 1.
Consider $\alpha\in(0,1]$ and $T$ a positive real value.
* (a)
A function $\phi_{\alpha}:[0,T]\rightarrow X$ is called a local mild solution
of ($P_{\alpha}$) in $[0,T]$ if $\phi_{\alpha}\in C([0,T];X)$ and
$\phi_{\alpha}(t)=\left\\{\begin{array}[]{ll}E_{\alpha}(At^{\alpha})u_{0}+\displaystyle\int_{0}^{t}(t-s)^{\alpha-1}E_{\alpha,\alpha}(A(t-s)^{\alpha})f(s,\phi_{\alpha}(s))ds,&\\\
&\textrm{if }\alpha\in(0,1),\vspace*{0.2cm}\\\
e^{At}u_{0}+\displaystyle\int_{0}^{t}e^{A(t-s)}f(s,\phi_{\alpha}(s))ds,&\textrm{if
}\alpha=1,\end{array}\right.$
for every $t\in[0,T].$
* (b)
A function $\phi:[0,T)\rightarrow X$ is called a local mild solution of
($P_{\alpha}$) in $[0,T)$, if for any $T^{*}\in(0,T)$, $\phi(t)$ is a local
mild solution of ($P_{\alpha}$) in $[0,T^{*}]$.
###### Definition 2.
Let $\alpha\in(0,1]$ be given. A function $\phi:[0,\infty)\rightarrow X$ is
called a global mild solution of ($P_{\alpha}$), if for any $T^{*}>0$,
$\phi(t)$ is a local mild solution of ($P_{\alpha}$) in $[0,T^{*}]$.
It worths to recall that the family of operators $\\{e^{At}:t\geq
0\\}\subset\mathcal{L}(X)$ is the standard analytic semigroup generated by the
sectorial operator $A$, while the families $\\{E_{\alpha}(At^{\alpha}):t\geq
0\\}\subset\mathcal{L}(X)$ and $\\{E_{\alpha,\alpha}(At^{\alpha}):t\geq
0\\}\subset\mathcal{L}(X)$, which are called Mittag-Leffler operators, are
standard from the literature of fractional differential equations (see for
instance [3], and references therein). However, for the completeness of this
manuscript I also present more details about these operators in Section 2.
By introducing the notions of continuation of mild solution and maximal local
mild solution, it is possible to prove an interesting result, which was called
in [3] “Blow up Alternative”. The “Blow up Alternative” was what motivated the
discussion proposed in this work.
###### Definition 3.
Let $\alpha\in(0,1]$ and let $\phi_{\alpha}:[0,{T})\rightarrow X$ be a local
mild solution in $[0,{T})$ of problem ($P_{\alpha}$). If ${T^{*}}\geq{T}$ and
${\phi_{\alpha}}^{*}:[0,{T^{*}}]\rightarrow X$ is a local mild solution to
($P_{\alpha}$) in $[0,{T^{*}}]$, with
${\phi_{\alpha}}^{*}(t)=\phi_{\alpha}(t)$, for every $t\in[0,T)$, then I say
that ${\phi_{\alpha}}^{*}(t)$ is a continuation of $\phi_{\alpha}(t)$ over
$[0,{T^{*}}]$.
###### Definition 4.
Consider $\alpha\in(0,1]$ and $\phi_{\alpha}:[0,T)\rightarrow X$. If $\phi(t)$
is a local mild solution of ($P_{\alpha}$) in $[0,T)$ that does not have a
continuation in $[0,T]$, then I call it a maximal local mild solution of
($P_{\alpha}$) in $[0,T)$.
###### Theorem 5 (Blow up Alternative).
Let $\alpha\in(0,1)$ and $f:[0,\infty)\times X\rightarrow X$ be a continuous
function, locally Lipschitz in the second variable, uniformly with respect to
the first variable, and bounded (i.e. it maps bounded sets onto bounded sets).
Then problem ($P_{\alpha}$) has a global mild solution $\phi_{\alpha}(t)$ in
$[0,\infty)$ or there exist $\omega_{\alpha}\in(0,\infty)$ such that
$\phi_{\alpha}:[0,\omega_{\alpha})\rightarrow X$ is a maximal local mild
solution in $[0,\omega_{\alpha})$, and in such a case,
$\limsup_{t\rightarrow{\omega_{\alpha}}^{-}}\|\phi_{\alpha}(t)\|=\infty$.
###### Remark 6.
Although in [3] I have not presented a proof for Theorem 5 in the case
$\alpha=1$, it is simple to adapt such result. Therefore, since this proof
does not bring any gain to the results discussed in this paper, I prefer to
omit it from this manuscript.
Theorem 5 is my main concern from now on. Observe that for each
$\alpha\in(0,1)$ there exists $\omega_{\alpha}>0$ (it may occurs
$\omega_{\alpha}=\infty$ for some values of $\alpha\in(0,1]$) and a respective
maximal local mild solution (or global mild solution)
$\phi_{\alpha}:[0,\omega_{\alpha})\rightarrow X$ to problem ($P_{\alpha}$).
It is very natural that several questions can be raised from the facts
emphasized above. In this paper, the main questions I discuss are the
following:
* Q1)
Does $E_{\alpha}(At^{\alpha})$ converges to the semigroup $e^{At}$, when
$\alpha\rightarrow 1^{-}$, in some sense?
* Q2)
Does $E_{\alpha,\alpha}(At^{\alpha})$ converges to the semigroup $e^{At}$,
when $\alpha\rightarrow 1^{-}$, in some sense?
* Q3)
Is the intersection of every $[0,\omega_{\alpha})$ non trivial, i.e.,
$\\{0\\}\subsetneq\stackrel{{\scriptstyle[}}{{\alpha\in(0,1]}}]{}{\bigcap}[0,\omega_{\alpha})\,\,?$
* Q4)
Does $\phi_{\alpha}(t)$ converges to $\phi_{1}(t)$, when $\alpha\rightarrow
1^{-}$, in some sense?
The set of questions made above are called here the “Limit Problems”. The main
objective of this work is to answer these questions as fully as possible.
In order to describe the subjects dealt with in this work, I present a short
summary of each of the following sections.
Section 2 makes a small survey about the notions used in this manuscript as a
whole. To be more precise, in this section I recall the notions of sectorial
operators, analytical semigroups, Mittag-Leffler operators and Caputo
fractional derivative of order $\alpha\in(0,1)$.
Finally, in Section 3 I present the results that answer the four questions
called the Limit Problems, while in Section 4 I present a short last
discussion about the results obtained in Section 3.
## 2\. A Small Survey on Sectorial Operators and Fractional Calculus
Let me begin by recalling the notions of sectorial operators and analytical
semigroups. It worths to emphasize that for a complete discussion of these
notions I may refer to [8, 9, 10, 13] and the references therein.
###### Definition 7.
A semigroup of linear operators on $X$, or simply semigroup, is a family
$\\{T(t):t\geq 0\\}\subset\mathcal{L}(X)$ such that:
* i)
$T(0)=I_{X}$, where $I=I_{X}$ is the identity operator in $X$.
* ii)
It holds that $T(t)T(s)=T(t+s)$, for any $t,s\geq 0$.
###### Definition 8.
Assume that $\\{T(t):t\geq 0\\}$ is a semigroup. If it holds that
$\lim_{t\rightarrow 0^{+}}T(t)x=x,$
for every $x\in X$, then I say that it is a $C_{0}$-semigroup.
###### Definition 9.
Let $\\{T(t):t\geq 0\\}$ be a $C_{0}$-semigroup. Its Infinitesimal generator
is the linear operator $A:{D}(A)\subset X\to X$, where
${D}(A):=\left\\{x\in X:\lim_{t\rightarrow 0^{+}}\dfrac{T(t)x-x}{t}\,\textrm{
exists}\right\\}$
and
$Ax:=\lim_{t\rightarrow 0^{+}}\dfrac{T(t)x-x}{t}.$
From the definitions above, I may present the classical result that relates
semigroups and the linear part of ($P_{\alpha}$), when $\alpha=1$.
###### Theorem 10.
Suppose that $\\{T(t):t\geq 0\\}\subset\mathcal{L}(X)$ is a $C_{0}$-semigroup
on $X$. If $A:{D}(A)\subset X\to X$ is the infinitesimal generator of
$\\{T(t):t\geq 0\\}$, then $A$ is a closed and densely defined linear
operator. Also, for any $x\in{D}(A)$ the application $[0,\infty)\ni t\to
T(t)x\in X$ is continuously differentiable and
$\dfrac{d}{dt}T(t)x=AT(t)x=T(t)Ax,\qquad\forall t>0.$
###### Proof.
See Theorems 10.3.1 and 10.3.3 in [9]. ∎
###### Remark 11.
From now on, to avoid confusion in this manuscript, whenever $A$ is the
infinitesimal generator of $\\{T(t):t\geq 0\\}$, I shall write that $e^{At}$
instead of $T(t)$.
Now I describe an important curve in the complex plane, that is used
throughout the text.
###### Definition 12.
The symbol $Ha$ denotes the Hankel’s path, if there exist $\epsilon>0$ and
$\theta\in(\pi/2,\pi)$, where $Ha=Ha_{1}+Ha_{2}-Ha_{3}$, and the paths
$Ha_{i}$ are given by
$Ha=\left\\{\begin{array}[]{l}Ha_{1}:=\\{te^{i\theta}:t\in[\epsilon,\infty)\\},\\\
Ha_{2}:=\\{\epsilon e^{it}:t\in[-\theta,\theta)\\},\\\
Ha_{3}:=\\{te^{-i\theta}:t\in[\epsilon,\infty)\\}.\end{array}\right.$
The following discussion provides a brief description of the basic results of
the theory of sectorial operators and analytical semigroups.
###### Definition 13.
Let $A:{D}(A)\subset X\to X$ be a closed and densely defined operator. The
operator $A$ is said to be a sectorial operator if there exist
$\theta\in(\pi/2,\pi)$ and $M_{\theta}>0$ such that
$S_{\theta}:=\\{\lambda\in\mathbb{C}\,:\,|\arg(\lambda)|\leq\theta,\,\lambda\not=0\\}\subset\rho(A)$
and
$\|(\lambda-A)^{-1}\|_{\mathcal{L}(X)}\leq\dfrac{M_{\theta}}{|\lambda|},\,\,\,\,\forall\,\lambda\in
S_{\theta}.$
###### Theorem 14.
If $A:{D}(A)\subset X\to X$ is a sectorial operator, then $A$ generates a
$C_{0}$-semigroup $\\{e^{At}:t\geq 0\\}$, which is given by
$e^{At}=\dfrac{1}{2\pi i}\int_{Ha}{e^{\lambda
t}(\lambda-A)^{-1}}\,d\lambda,\quad\forall t\geq 0,$
where $Ha\subset\rho(A)$. Moreover, there exists $M_{1}>0$ such that
$\|e^{At}\|_{\mathcal{L}(X)}\leq
M_{1},\quad\|Ae^{At}\|_{\mathcal{L}(X)}\leq(M_{1}/t),$
for every $t>0$. Finally, for any $x\in X$ the function $[0,\infty)\ni
t\mapsto e^{At}x\in X$ is analytic and
$\dfrac{d}{dt}e^{At}x=Ae^{At}x,$
for every $t>0$.
###### Proof.
See Theorem 1.3.4 in [8] or Theorem 6.13 in [13, Chapter 2]. ∎
Now, let me draw our attention to the fractional calculus, the Mittag-Leffler
functions and their relations with the sectorial operators.
###### Definition 15.
For $\alpha\in(0,1)$ and $f:[0,T]\rightarrow{X}$, the Riemann-Liouville
fractional integral of order $\alpha>0$ of $f(t)$ is defined by
$J_{t}^{\alpha}f(t):=\dfrac{1}{\Gamma(\alpha)}\displaystyle\int_{0}^{t}{(t-s)^{\alpha-1}f(s)}\,ds,$
(1)
for every $t\in[0,T]$ such that integral (1) exists. Above $\Gamma$ denotes
the classical Euler’s gamma function.
###### Definition 16.
For $\alpha\in(0,1)$ and $f:[0,T]\rightarrow{X}$, the Caputo fractional
derivative of order $\alpha\in(0,1)$ of $f(t)$ is defined by
$cD_{t_{0},t}^{\alpha}f(t):=\dfrac{d}{dt}\Big{\\{}J_{t}^{1-\alpha}\big{[}f(t)-f(0)\big{]}\Big{\\}},$
(2)
for every $t\in[0,T]$ such that (2) exists.
###### Remark 17.
I could have defined Caputo fractional derivative for any $\alpha>0$, however
this is not the focus of this work. It also worths to emphasize that
$cD_{t}^{1}$ is indeed equal to $(d/dt)$.
I end this section presenting the Mittag-Leffler operators which are related
with the solution of the linear part of ($P_{\alpha}$), when $\alpha\in(0,1)$
(confront the following result with Theorem 14).
###### Theorem 18.
Let $\alpha\in(0,1)$ and suppose that $A:{D}(A)\subset X\to X$ is a sectorial
operator. Then, the operators
$E_{\alpha}(At^{\alpha}):=\frac{1}{2\pi i}\int_{Ha}e^{\lambda
t}\lambda^{\alpha-1}(\lambda^{\alpha}-A)^{-1}d\lambda,\quad t\geq 0,$
and
$E_{\alpha,\alpha}(At^{\alpha}):=\frac{t^{1-\alpha}}{2\pi
i}\int_{Ha}e^{\lambda t}(\lambda^{\alpha}-A)^{-1}d\lambda,\quad t\geq
0,\vspace*{0.2cm}$
where $Ha\subset\rho(A)$, are well defined. Furthermore, it holds that:
* (i)
$E_{\alpha}(At^{\alpha})x|_{t=0}=E_{\alpha,\alpha}(At^{\alpha})x|_{t=0}=x$,
for any $x\in X$;
* (ii)
$E_{\alpha}(At^{\alpha})$ and $E_{\alpha,\alpha}(At^{\alpha})$ are strongly
continuous, i.e., for each $x\in X$
$\lim_{t\rightarrow
0^{+}}{\|E_{\alpha}(At^{\alpha})x-x\|}=0\quad\textrm{and}\quad\lim_{t\rightarrow
0^{+}}{\|E_{\alpha,\alpha}(At^{\alpha})x-x\|}=0;$
* (iii)
There exists a constant $M_{2}>0$ (uniform on $\alpha$) such that
$\sup_{t\geq 0}{\|E_{\alpha}(At^{\alpha})\|_{\mathcal{L}(X)}}\leq
M_{2}\quad\textrm{and}\quad\sup_{t\geq
0}{\|E_{\alpha,\alpha}(At^{\alpha})\|_{\mathcal{L}(X)}}\leq M_{2};$
* (iv)
For each $x\in X$, the function $[0,\infty)\ni t\mapsto
E_{\alpha}(At^{\alpha})x$ is analytic and it is the unique solution of
$cD_{t}^{\alpha}E_{\alpha}(At^{\alpha})x=AE_{\alpha}(At^{\alpha})x,\qquad
t>0.$
###### Proof.
See Theorem 2.1 in [3] and Theorem 2.44 in [4]. ∎
###### Remark 19.
For a more complete survey on the special functions named Mittag-Leffler, I
suggest the very interesting book [6].
## 3\. The Limit Problems
Like it was pointed out in Section 1, here I focus my attention in the Limit
Problems. At first, I would like to emphasize that the study I am proposing
here was already discussed in the literature, however seeking to answer other
questions. I can cite as examples two papers, namely [1, 11].
For instance, Almeida-Ferreira in [1] studied this kind of limit questions
involving the solutions of the semilinear fractional partial differential
equation,
$\left\\{\begin{array}[]{ll}cD_{t}^{1+\alpha}u(t,x)=\triangle_{x}u(t,x)+|u(t,x)|^{\rho}u(t,x),&(t,x)\in[0,\infty)\times\mathbb{R}^{n},\\\
u(0,x)=u_{0}\textrm{ and
}\partial_{t}u(0,x)=0,&x\in\mathbb{R}^{n},\end{array}\right.$
for $\alpha\in(0,1)$, which interpolates the semilinear heat and wave
equations. They studied the existence, uniqueness and regularity of solution
to this problem in Morrey spaces and then showed that when $\alpha\rightarrow
1^{-}$, the solution of the problem loses its native regularity. On the other
hand, in [11] the authors discuss these kind of limits to $\alpha-$times
resolvent families, which are not our main objective here.
### 3.1. Questions Q1) and Q2)
In order to give a complete answer, let me begin by proving the following
limit theorems.
###### Theorem 20.
Let $A:D(A)\subset X\rightarrow X$ be a sectorial operator and
$\\{e^{At}:t\geq 0\\}$ the $C_{0}-$semigroup generated by $A$. Now assume that
$\alpha\in(0,1)$ and consider the Mittag-Leffler family of operators
$\\{E_{\alpha}(At^{\alpha}):t\geq 0\\}$. Then, for each $t\geq 0$ I have that
$\lim_{\alpha\rightarrow
1^{-}}{\|E_{\alpha}(At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}}=0.$
Moreover, the convergence is uniform on every compact $S\subset(0,\infty)$,
i.e.,
$\lim_{\alpha\rightarrow 1^{-}}\left\\{{\max_{s\in
S}\big{[}\|E_{\alpha}(As^{\alpha})-e^{As}\|_{\mathcal{L}(X)}\big{]}}\right\\}=0.$
###### Proof.
Let me assume that $x\in X$ and $t>0$. Consider $\theta\in(\pi/2,\pi)$,
$S_{\theta}$ the sector associated with the sectorial operator $A$ and
$M_{\theta}>0$ such that
$\|(\lambda-A)^{-1}\|_{\mathcal{L}(X)}\leq\dfrac{M_{\theta}}{|\lambda|},\,\,\,\,\forall\,\lambda\in
S_{\theta}.$ (3)
Choose $\epsilon>1$ and consider the Hankel’s path $Ha=Ha_{1}+Ha_{2}-Ha_{3}$,
where
$Ha_{1}:=\\{te^{i\theta}:t\in[\epsilon,\infty)\\},\ Ha_{2}:=\\{\epsilon
e^{it}:t\in[-\theta,\theta]\\},\\\
Ha_{3}:=\\{te^{-i\theta}:t\in[\epsilon,\infty)\\}.$
The choices made above ensures that $Ha\subset\rho(A)$, therefore observe by
Theorem 14 and Theorem 18 that
$E_{\alpha}(At^{\alpha})x-e^{At}x=\dfrac{1}{2\pi
i}\displaystyle\int_{Ha}e^{\lambda
t}\Big{[}\lambda^{\alpha-1}(\lambda^{\alpha}-A)^{-1}x-\lambda^{\alpha-1}(\lambda-A)^{-1}x\Big{]}\,d\lambda\\\
+\dfrac{1}{2\pi i}\displaystyle\int_{Ha}e^{\lambda
t}\Big{[}\lambda^{\alpha-1}(\lambda-A)^{-1}x-(\lambda-A)^{-1}x\Big{]}\,d\lambda,$
what is equivalent to
$E_{\alpha}(At^{\alpha})x-e^{At}x\\\ =\sum_{j=1}^{3}\left\\{\dfrac{1}{2\pi
i}\displaystyle\int_{Ha_{i}}e^{\lambda
t}\Big{[}\lambda^{\alpha-1}(\lambda^{\alpha}-A)^{-1}x-\lambda^{\alpha-1}(\lambda-A)^{-1}x\Big{]}\,d\lambda\right.\\\
\left.+\dfrac{1}{2\pi i}\displaystyle\int_{Ha_{i}}e^{\lambda
t}\Big{[}\lambda^{\alpha-1}(\lambda-A)^{-1}x-(\lambda-A)^{-1}x\Big{]}\,d\lambda\right\\}.$
Using the first resolvent identity (see [5, Lemma 6]) in the first term in the
right side of the above equality, I obtain the identity
$E_{\alpha}(At^{\alpha})x-e^{At}x\\\ =\dfrac{1}{2\pi
i}\left\\{\sum_{j=1}^{3}\left\\{\displaystyle\int_{Ha_{i}}e^{\lambda
t}\Big{[}\lambda^{\alpha-1}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{]}\,d\lambda\right.\right.\\\
\left.\left.+\displaystyle\int_{Ha_{i}}e^{\lambda
t}[\lambda^{\alpha-1}-1](\lambda-A)^{-1}x\,d\lambda\right\\}\right\\}.$ (4)
Now assume that $S\subset(0,\infty)$ is a compact set and define the real
values
$M_{1}=\min\\{s:s\in S\\}\quad\textrm{e}\quad
M_{2}=\max\\{\epsilon\cos(s)t:s\in[-\theta,\theta]\textrm{ and }t\in S\\}.$
If $t\in S$, I have that:
(i) Over $Ha_{1}$
$\int_{Ha_{1}}e^{\lambda
t}\Big{\\{}\lambda^{\alpha-1}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\\\
=\int_{\epsilon}^{\infty}e^{(\tau e^{i\theta})t}\Big{\\{}\big{(}\tau
e^{i\theta}\big{)}^{\alpha-1}\Big{[}\big{(}\tau e^{i\theta}\big{)}-\big{(}\tau
e^{i\theta}\big{)}^{\alpha}\Big{]}\\\ \times\Big{(}\big{(}\tau
e^{i\theta}\big{)}^{\alpha}-A\Big{)}^{-1}\Big{(}\big{(}\tau
e^{i\theta}\big{)}-A\Big{)}^{-1}x\Big{\\}}e^{i\theta}\,d\tau,$
and
$\displaystyle\int_{Ha_{1}}e^{\lambda
t}[\lambda^{\alpha-1}-1](\lambda-A)^{-1}x\,d\lambda\\\
=\int_{\epsilon}^{\infty}e^{(\tau e^{i\theta})t}\Big{\\{}\Big{[}\big{(}\tau
e^{i\theta}\big{)}^{\alpha-1}-1\Big{]}\Big{(}\big{(}\tau
e^{i\theta}\big{)}-A\Big{)}^{-1}x\Big{\\}}e^{i\theta}\,d\tau,$
from which, by considering the sectorial operator estimate (3), I deduce
$\left\|\int_{Ha_{1}}e^{\lambda
t}\Big{\\{}\lambda^{\alpha-1}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\right\|\\\
\leq(M_{\theta})^{2}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau
e^{i\theta}\big{)}-\big{(}\tau
e^{i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\,d\tau\right]=:\mathcal{J}_{1}(\alpha)\|x\|,$
for every $t\in S$, and
$\left\|\displaystyle\int_{Ha_{1}}e^{\lambda
t}[\lambda^{\alpha-1}-1](\lambda-A)^{-1}x\,d\lambda\right\|\\\ \leq
M_{\theta}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau
e^{i\theta}\big{)}^{\alpha-1}-1\Big{|}}{\tau^{2}}\,d\tau\right]=:\mathcal{J}_{2}(\alpha)\|x\|,$
for every $t\in S$.
(ii) Over $Ha_{2}$
$\int_{Ha_{2}}e^{\lambda
t}\Big{\\{}\lambda^{\alpha-1}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\\\
=\int_{-\theta}^{\theta}e^{(\epsilon e^{i\tau})t}\Big{\\{}\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha-1}\Big{[}\big{(}\epsilon
e^{i\tau}\big{)}-\big{(}\epsilon e^{i\tau}\big{)}^{\alpha}\Big{]}\\\
\times\Big{(}\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha}-A\Big{)}^{-1}\Big{(}\big{(}\epsilon
e^{i\tau}\big{)}-A\Big{)}^{-1}x\Big{\\}}i\epsilon e^{i\tau}\,d\tau,$
and
$\displaystyle\int_{Ha_{2}}e^{\lambda
t}[\lambda^{\alpha-1}-1](\lambda-A)^{-1}x\,d\lambda\\\
=\int_{-\theta}^{\theta}e^{(\epsilon
e^{i\tau})t}\Big{\\{}\Big{[}\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha-1}-1\Big{]}\Big{(}\big{(}\epsilon
e^{i\tau}\big{)}-A\Big{)}^{-1}x\Big{\\}}i\epsilon e^{i\tau}\,d\tau,$
by considering the sectorial operator estimate (3), I deduce
$\left\|\int_{Ha_{2}}e^{\lambda
t}\Big{\\{}\lambda^{\alpha-1}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\right\|\\\
\leq\dfrac{(M_{\theta})^{2}\|x\|}{\epsilon}\left[\int_{-\theta}^{\theta}e^{[\epsilon\cos(\tau)]t}\Big{|}\big{(}\epsilon
e^{i\tau}\big{)}-\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha}\Big{|}\,d\tau\right]\\\
\leq\dfrac{(M_{\theta})^{2}\|x\|}{\epsilon}\left[\int_{-\theta}^{\theta}e^{M_{2}}\Big{|}\big{(}\epsilon
e^{i\tau}\big{)}-\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha}\Big{|}\,d\tau\right]=:\mathcal{J}_{3}(\alpha)\|x\|,$
for every $t\in S$, and
$\left\|\displaystyle\int_{Ha_{2}}e^{\lambda
t}[\lambda^{\alpha-1}-1](\lambda-A)^{-1}x\,d\lambda\right\|\\\
\leq\dfrac{M_{\theta}\|x\|}{\epsilon}\left[\int_{-\theta}^{\theta}e^{M_{2}}\Big{|}\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha-1}-1\Big{|}\,d\tau\right]=:\mathcal{J}_{4}(\alpha)\|x\|.$
for every $t\in S$.
(iii) Over $Ha_{3}$ it is analogous to item (i), therefore
$\left\|\int_{Ha_{1}}e^{\lambda
t}\Big{\\{}\lambda^{\alpha-1}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\right\|\\\
\leq(M_{\theta})^{2}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau
e^{-i\theta}\big{)}-\big{(}\tau
e^{-i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\,d\tau\right]=:\mathcal{J}_{5}(\alpha)\|x\|,$
and
$\left\|\displaystyle\int_{Ha_{1}}e^{\lambda
t}[\lambda^{\alpha-1}-1](\lambda-A)^{-1}x\,d\lambda\right\|\\\ \leq
M_{\theta}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau
e^{-i\theta}\big{)}^{\alpha-1}-1\Big{|}}{\tau^{2}}\,d\tau\right]=:\mathcal{J}_{6}(\alpha)\|x\|.$
Therefore, I can estimate (4) by
$\|E_{\alpha}(At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}\leq\sum_{i=1}^{6}\mathcal{J}_{i}(\alpha),$
for every $t\in S$.
A consequence of the dominated convergence theorem ensures that
$\lim_{\alpha\rightarrow 1^{-}}\mathcal{J}_{i}(\alpha)=0,$
for every $i\in\\{1,\ldots,6\\}$, therefore I deduce that
$\lim_{\alpha\rightarrow 1^{-}}\left\\{{\max_{s\in
S}\big{[}\|E_{\alpha}(As^{\alpha})-e^{As}\|_{\mathcal{L}(X)}\big{]}}\right\\}=0.$
This is the second part of the proof. The first part, for the case $t>0$,
follows from this second part, while the first part is trivial when $t=0$. ∎
###### Theorem 21.
Consider $A:D(A)\subset X\rightarrow X$ a sectorial operator, $\\{e^{At}:t\geq
0\\}$ the $C_{0}-$semigroup generated by $A$ and
$\\{E_{\alpha}(At^{\alpha}):t\geq 0\\}$ the Mittag-Leffler family of
operators. Now assume that:
* (i)
$\\{\alpha_{n}\\}_{n=1}^{\infty}\subset(0,1]$ and $\alpha\in(0,1]$ is such
that
$\lim_{n\rightarrow\infty}\alpha_{n}=\alpha;$
* (ii)
$\\{\sigma_{n}\\}_{n=1}^{\infty}\subset[0,\infty)$ such that
$\lim_{n\rightarrow\infty}\sigma_{n}=0.$
Then, it holds that
$\lim_{n\rightarrow\infty}\|E_{\alpha_{n}}(A(\sigma_{n})^{\alpha_{n}})-E_{\alpha}(A(\sigma_{n})^{\alpha})\|_{\mathcal{L}(X)}=0.$
###### Proof.
By following the same process presented in the proof of Theorem 20, I deduce
that
$E_{\alpha_{n}}(A(\sigma_{n})^{\alpha_{n}})x-E_{\alpha}(A(\sigma_{n})^{\alpha})x\\\
=\dfrac{1}{2\pi
i}\left\\{\sum_{j=1}^{3}\left\\{\displaystyle\int_{Ha_{i}}e^{\lambda\sigma_{n}}\Big{[}\lambda^{\alpha_{n}-1}[\lambda^{\alpha}-\lambda^{\alpha_{n}}](\lambda^{\alpha_{n}}-A)^{-1}(\lambda^{\alpha}-A)^{-1}x\Big{]}\,d\lambda\right.\right.\\\
\left.\left.+\displaystyle\int_{Ha_{i}}e^{\lambda\sigma_{n}}[\lambda^{\alpha_{n}-1}-\lambda^{\alpha-1}](\lambda^{\alpha}-A)^{-1}x\,d\lambda\right\\}\right\\}.$
Last identity allows me to obtain the inequality
$\|E_{\alpha}(-At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}\leq\sum_{i=1}^{6}\mathcal{J}_{i}(\alpha,\alpha_{n}),$
for every $t\in S$, where
$\mathcal{J}_{1}(\alpha,\alpha_{n})=(M_{\theta})^{2}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]\sigma_{n}}\Big{|}\big{(}\tau
e^{i\theta}\big{)}^{\alpha}-\big{(}\tau
e^{i\theta}\big{)}^{\alpha_{n}}\Big{|}}{\tau^{2}}\,d\tau\right],\\\
\mathcal{J}_{2}(\alpha,\alpha_{n})=M_{\theta}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]\sigma_{n}}\Big{|}\big{(}\tau
e^{i\theta}\big{)}^{\alpha_{n}-1}-\big{(}\tau
e^{i\theta}\big{)}^{\alpha-1}\Big{|}}{\tau^{2}}\,d\tau\right],$
$\mathcal{J}_{3}(\alpha,\alpha_{n})=\dfrac{(M_{\theta})^{2}}{\epsilon}\left[\int_{-\theta}^{\theta}e^{M_{2}}\Big{|}\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha}-\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha_{n}}\Big{|}\,d\tau\right],\\\
\mathcal{J}_{4}(\alpha,\alpha_{n})=\dfrac{M_{\theta}}{\epsilon}\left[\int_{-\theta}^{\theta}e^{M_{2}}\Big{|}\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha_{n}-1}-\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha-1}\Big{|}\,d\tau\right],$
$\mathcal{J}_{5}(\alpha,\alpha_{n})=(M_{\theta})^{2}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]\sigma_{n}}\Big{|}\big{(}\tau
e^{-i\theta}\big{)}^{\alpha}-\big{(}\tau
e^{-i\theta}\big{)}^{\alpha_{n}}\Big{|}}{\tau^{2}}\,d\tau\right],\\\
\mathcal{J}_{6}(\alpha,\alpha_{n})=M_{\theta}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]\sigma_{n}}\Big{|}\big{(}\tau
e^{-i\theta}\big{)}^{\alpha_{n}-1}-\big{(}\tau
e^{-i\theta}\big{)}^{\alpha-1}\Big{|}}{\tau^{2}}\,d\tau\right].$
Again, the dominated convergence theorem ensures that
$\lim_{n\rightarrow\infty}\mathcal{J}_{i}(\alpha,\alpha_{n})=0,$
for every $i\in\\{1,\ldots,6\\}$, therefore I obtain
$\lim_{n\rightarrow\infty}\|E_{\alpha_{n}}(A(\sigma_{n})^{\alpha_{n}})-E_{\alpha}(A(\sigma_{n})^{\alpha})\|_{\mathcal{L}(X)}=0.$
∎
###### Theorem 22.
Let $A:D(A)\subset X\rightarrow X$ be a sectorial operator and
$\\{e^{At}:t\geq 0\\}$ the $C_{0}-$semigroup generated by $A$. Now assume that
$\alpha\in(0,1)$ and consider the Mittag-Leffler family of operators
$\\{E_{\alpha,\alpha}(At^{\alpha}):t\geq 0\\}$. Then, for each $t\geq 0$ I
have that
$\lim_{\alpha\rightarrow
1^{-}}{\|E_{\alpha,\alpha}(At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}}=0.$
Moreover, the convergence is uniform on every compact $S\subset(0,\infty)$,
i.e.,
$\lim_{\alpha\rightarrow 1^{-}}\left\\{{\max_{s\in
S}\big{[}\|E_{\alpha,\alpha}(As^{\alpha})-e^{As}\|_{\mathcal{L}(X)}\big{]}}\right\\}=0.$
###### Proof.
Like I did in the proof of Theorem 20, let me assume that $x\in X$ and $t>0$.
Consider $\theta\in(\pi/2,\pi)$, $S_{\theta}$ the sector associated with the
sectorial operator $A$ and $M_{\theta}>0$ such that
$\|(\lambda-A)^{-1}\|_{\mathcal{L}(X)}\leq\dfrac{M_{\theta}}{|\lambda|},\,\,\,\,\forall\,\lambda\in
S_{\theta}.$ (5)
Choose $\epsilon>1$ and consider the Hankel’s path $Ha=Ha_{1}+Ha_{2}-Ha_{3}$,
where
$Ha_{1}:=\\{te^{i\theta}:t\in[\epsilon,\infty)\\},\ Ha_{2}:=\\{\epsilon
e^{it}:t\in[-\theta,\theta]\\},\\\
Ha_{3}:=\\{te^{-i\theta}:t\in[\epsilon,\infty)\\}.$
The choices made above ensures that $Ha\subset\rho(A)$, therefore observe by
Theorem 14 and Theorem 18 that
$E_{\alpha,\alpha}(At^{\alpha})x-e^{At}x=\dfrac{1}{2\pi
i}\displaystyle\int_{Ha_{i}}e^{\lambda
t}\Big{[}(\lambda^{\alpha}-A)^{-1}x-(\lambda-A)^{-1}x\Big{]}\,d\lambda,$
what, thanks to the first resolvent identity (see [5, Lemma 6]), is equivalent
to
$E_{\alpha,\alpha}(At^{\alpha})x-e^{At}x=\dfrac{1}{2\pi
i}\sum_{j=1}^{3}\left\\{\displaystyle\int_{Ha_{i}}e^{\lambda
t}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\,d\lambda\right\\}.$
Now consider $S\subset(0,\infty)$ a compact set and
$M_{1}=\min\\{s:s\in S\\}\quad\textrm{e}\quad
M_{2}=\max\\{\epsilon\cos(s)t:s\in[-\theta,\theta]\textrm{ and }t\in S\\}.$
If $t\in S$, I have that:
(i) Over $Ha_{1}$
$\int_{Ha_{1}}e^{\lambda
t}\Big{\\{}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\\\
=\int_{\epsilon}^{\infty}e^{(\tau e^{i\theta})t}\Big{\\{}\Big{[}\big{(}\tau
e^{i\theta}\big{)}-\big{(}\tau
e^{i\theta}\big{)}^{\alpha}\Big{]}\Big{(}\big{(}\tau
e^{i\theta}\big{)}^{\alpha}-A\Big{)}^{-1}\Big{(}\big{(}\tau
e^{i\theta}\big{)}-A\Big{)}^{-1}x\Big{\\}}e^{i\theta}\,d\tau,$
from which, by considering the sectorial operator estimate (5), I deduce
$\left\|\int_{Ha_{1}}e^{\lambda
t}\Big{\\{}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\right\|\\\
\leq(M_{\theta})^{2}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau
e^{i\theta}\big{)}-\big{(}\tau
e^{i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{\alpha+1}}\,d\tau\right]=:\mathcal{J}_{1}(\alpha)\|x\|,$
for every $t\in S$.
(ii) Over $Ha_{2}$
$\int_{Ha_{2}}e^{\lambda
t}\Big{\\{}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\\\
=\int_{-\theta}^{\theta}e^{(\epsilon
e^{i\tau})t}\Big{\\{}\Big{[}\big{(}\epsilon e^{i\tau}\big{)}-\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha}\Big{]}\Big{(}\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha}-A\Big{)}^{-1}\Big{(}\big{(}\epsilon
e^{i\tau}\big{)}-A\Big{)}^{-1}x\Big{\\}}i\epsilon e^{i\tau}\,d\tau,$
and therefore, if I consider the sectorial operator estimate (5), I obtain
$\left\|\int_{Ha_{2}}e^{\lambda
t}\Big{\\{}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\right\|\\\
\leq(M_{\theta})^{2}\epsilon^{-\alpha}\|x\|\left[\int_{-\theta}^{\theta}e^{M_{2}}\Big{|}\big{(}\epsilon
e^{i\tau}\big{)}-\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha}\Big{|}\,d\tau\right]=:\mathcal{J}_{2}(\alpha)\|x\|,$
for every $t\in S$.
(iii) Over $Ha_{3}$ it is analogous to item (i), therefore
$\left\|\int_{Ha_{1}}e^{\lambda
t}\Big{\\{}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\right\|\\\
\leq(M_{\theta})^{2}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau
e^{-i\theta}\big{)}-\big{(}\tau
e^{-i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{\alpha+1}}\,d\tau\right]=:\mathcal{J}_{3}(\alpha)\|x\|.$
Thus, I achieve the estimate
$\|E_{\alpha}(At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}\leq\mathcal{J}_{1}(\alpha)+\mathcal{J}_{2}(\alpha)+\mathcal{J}_{3}(\alpha),$
for every $t\in S$.
A consequence of the dominated convergence theorem ensures
$\lim_{\alpha\rightarrow
1^{-}}\mathcal{J}_{1}(\alpha)=0,\quad\lim_{\alpha\rightarrow
1^{-}}\mathcal{J}_{2}(\alpha)=0,\quad\lim_{\alpha\rightarrow
1^{-}}\mathcal{J}_{3}(\alpha)=0,$
therefore I have
$\lim_{\alpha\rightarrow 1^{-}}\left\\{{\max_{s\in
S}\big{[}\|E_{\alpha,\alpha}(As^{\alpha})-e^{As}\|_{\mathcal{L}(X)}\big{]}}\right\\}=0.$
This is the second part of the proof. The first part, for the case $t>0$,
follows from this second part, while the first part is trivial when $t=0$. ∎
A natural question that arises at this point of this manuscript is: Is it
possible to obtain other modes of convergence to these operators? To answer
this question, I begin by presenting the following notion.
###### Definition 23.
Let $S\subset\mathbb{R}$ and $p\geq 1$. The symbol $L^{p}(S;\mathcal{L}(X))$
is used to represent the set of all Bochner measurable functions
$f:S\rightarrow\mathcal{L}(X)$ for which $\|f\|_{\mathcal{L}(X)}\in
L^{p}(S;\mathbb{R})$, where $L^{p}(S;\mathbb{R})$ stands for the classical
Lebesgue space. Moreover, $L^{p}(S;\mathcal{L}(X))$ is a Banach space when
considered with the norm
$\|f\|_{L^{p}(S;\mathcal{L}(X))}:=\left[\int_{S}{\|f(s)\|^{p}_{\mathcal{L}(X)}}\,ds\right]^{1/p}.$
The vectorial spaces $L^{p}(S;\mathcal{L}(X))$ are called Bochner-Lebesgue
spaces.
For more details on the Bochner measurable functions and Bochner-Lebesgue
integrable functions, I may refer to [2, 12] and references therein.
Now I present the last theorem of this subsection.
###### Theorem 24.
Let $A:D(A)\subset X\rightarrow X$ be a sectorial operator and
$\\{e^{At}:t\geq 0\\}$ the $C_{0}-$semigroup generated by $A$. Now assume that
$\alpha\in(0,1)$ and consider the Mittag-Leffler families
$\\{E_{\alpha}(At^{\alpha}):t\geq 0\\}$ and
$\\{E_{\alpha,\alpha}(At^{\alpha}):t\geq 0\\}$. If $p\geq 1$ and
$S\subset\mathbb{R}^{+}$ is compact, then
$e^{At}\in L^{p}(S;\mathcal{L}(X)),\quad E_{\alpha}(At^{\alpha})\in
L^{p}(S;\mathcal{L}(X))\quad\textrm{and}\quad
E_{\alpha,\alpha}(At^{\alpha})\in L^{p}(S;\mathcal{L}(X)).$
Moreover, it holds that
$\lim_{\alpha\rightarrow
1^{-}}\left[\int_{S}{\|E_{\alpha}(As^{\alpha})-e^{As}\|^{p}_{\mathcal{L}(X)}}\,ds\right]^{1/p}=0,\\\
\lim_{\alpha\rightarrow
1^{-}}\left[\int_{S}{\|E_{\alpha,\alpha}(As^{\alpha})-e^{As}\|^{p}_{\mathcal{L}(X)}}\,ds\right]^{1/p}=0.$
###### Proof.
Like it was done in the proof of Theorem 20, if I choose $\epsilon>1$ and
$\theta\in(\pi/2,\pi)$, with the aid of Theorem 14, I can deduce the existence
of $\widetilde{M}>0$ such that
$\|e^{At}\|_{\mathcal{L}(X)}\leq\widetilde{M}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]t}}{\tau}\,d\tau+\int_{-\theta}^{\theta}e^{[\epsilon\cos(\tau)]t}\,d\tau\right]$
for every $t\in S$. Thus, by considering Minkowski’s integral inequality (see
Theorem 202 in [7]) and the triangular inequality of $L^{p}(S;X)$, I obtain
$\left[\int_{S}\|e^{At}\|^{p}_{\mathcal{L}(X)}\,dt\right]^{1/p}\leq\widetilde{M}\left[\int_{S}\left(\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]t}}{\tau}\,d\tau+\int_{-\theta}^{\theta}e^{[\epsilon\cos(\tau)]t}\,d\tau\right)^{p}\,dt\right]^{1/p}\\\
\leq\widetilde{M}\left[\int_{\epsilon}^{\infty}\left(\dfrac{1}{\tau}\right)\left(\int_{S}{e^{p[\tau\cos(\theta)]t}}\,dt\right)^{1/p}\,d\tau+\int_{-\theta}^{\theta}\left(\int_{S}{e^{p[\epsilon\cos(\tau)]t}}\,dt\right)^{1/p}\,d\tau\right].$
Define $M_{1}=\min\\{s:s\in S\\}\geq 0$ and $M_{2}=\max\\{s:s\in S\\}\geq 0$.
Since $\cos(\theta)<0$ and $\cos(\tau)\leq 1$, if $\tau\in[-\theta,\theta]$, I
can estimate the right side of the above inequality by
$\widetilde{M}\left[\int_{\epsilon}^{\infty}\left(\dfrac{1}{\tau}\right)\left(\int_{M_{1}}^{M_{2}}{e^{p[\tau\cos(\theta)]t}}\,dt\right)^{1/p}\,d\tau+\int_{-\theta}^{\theta}|S|^{1/p}{e^{\epsilon
M_{2}}}\,d\tau\right],$
in order to obtain
$\left[\int_{S}\|e^{At}|^{p}_{\mathcal{L}(X)}\,dt\right]^{1/p}\\\
\leq\widetilde{M}\left[\left\\{\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}}{\big{[}p\tau^{p+1}(-\cos(\theta))\big{]}^{1/p}}\,d\tau\right\\}+2\theta|S|^{1/p}{e^{\epsilon
M_{2}}}\right]<\infty,$
i.e., $e^{At}\in L^{p}(S;\mathcal{L}(X))$.
Now, bearing in mind Theorem 18 and following the exact same steps done above,
I can deduce that
$\left[\int_{S}\|E_{\alpha}(At^{\alpha})|^{p}_{\mathcal{L}(X)}\,dt\right]^{1/p}\\\
\leq\widetilde{M}\left[\left\\{\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}}{\big{[}p\tau^{p+1}(-\cos(\theta))\big{]}^{1/p}}\,d\tau\right\\}+2\theta|S|^{1/p}{e^{\epsilon
M_{2}}}\right]<\infty,$
and
$\left[\int_{S}\|E_{\alpha,\alpha}(At^{\alpha})|^{p}_{\mathcal{L}(X)}\,dt\right]^{1/p}\\\
\leq\widetilde{M}\left[\left\\{\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}}{\big{[}p\tau^{\alpha
p+1}(-\cos(\theta))\big{]}^{1/p}}\,d\tau\right\\}+2\theta|S|^{1/p}{e^{\epsilon
M_{2}}}\right]<\infty.$
i.e., $E_{\alpha}(At^{\alpha}),E_{\alpha,\alpha}(At^{\alpha})\in
L^{p}(S;\mathcal{L}(X))$.
Now, let me prove the convergence. Like it was done in the proof of Theorem
20, I deduce the existence of $\widetilde{M}>0$ such that
$\|E_{\alpha}(-At^{\alpha})x-e^{At}x\|\leq\widetilde{M}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]t}\Big{|}\big{(}\tau
e^{i\theta}\big{)}-\big{(}\tau
e^{i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\,d\tau\right.\\\
\left.+\int_{-\theta}^{\theta}e^{M_{2}}\Big{|}\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha-1}-1\Big{|}\,d\tau+\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]t}\Big{|}\big{(}\tau
e^{-i\theta}\big{)}-\big{(}\tau
e^{-i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\,d\tau\right],$
for every $t\in S$.
At first, observe that the triangular inequality of $L^{p}(S;X)$ ensures that
$\left(\int_{S}\|E_{\alpha}(-At^{\alpha})-e^{At}\|^{p}_{\mathcal{L}(X)}\,dt\right)^{1/p}\\\
\leq\widetilde{M}\Big{[}\mathcal{I}_{\alpha}(t)+\mathcal{J}_{\alpha}+\mathcal{K}_{\alpha}(t)\Big{]},$
where
$\mathcal{I}_{\alpha}(t)=\left(\int_{S}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]t}\Big{|}\big{(}\tau
e^{i\theta}\big{)}-\big{(}\tau
e^{i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\,d\tau\right]^{p}dt\right)^{1/p},\\\
\mathcal{J}_{\alpha}=|S|^{1/p}e^{M_{2}}\left[\int_{-\theta}^{\theta}\Big{|}\big{(}\epsilon
e^{i\tau}\big{)}^{\alpha-1}-1\Big{|}\,d\tau\right],\\\ \textrm{ and
}\quad\mathcal{K}_{\alpha}(t)=\left(\int_{S}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]t}\Big{|}\big{(}\tau
e^{-i\theta}\big{)}-\big{(}\tau
e^{-i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\,d\tau\right]^{p}dt\right)^{1/p}.$
Like above, by applying Minkowski’s integral inequality (see Theorem 202 in
[7]) I deduce that
$\mathcal{I}_{\alpha}(t)\leq\int_{\epsilon}^{\infty}\left[\left(\int_{M_{1}}^{M_{2}}e^{[p\tau\cos(\theta)]t}dt\right)^{1/p}\dfrac{\Big{|}\big{(}\tau
e^{i\theta}\big{)}-\big{(}\tau
e^{i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\right]\,d\tau,$
what implies in the estimate
$\mathcal{I}_{\alpha}(t)\leq\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau
e^{i\theta}\big{)}-\big{(}\tau
e^{i\theta}\big{)}^{\alpha}\Big{|}}{\big{[}p\tau^{2p+1}\big{(}-\cos(\theta)\big{)}\big{]}^{1/p}}\,d\tau=:\mathcal{I}_{\alpha}.$
Similarly, I obtain
$\mathcal{K}_{\alpha}(t)\leq\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau
e^{-i\theta}\big{)}^{\alpha}-\big{(}\tau
e^{-i\theta}\big{)}\Big{|}}{\big{[}p\tau^{2p+1}\big{(}-\cos(\theta)\big{)}\big{]}^{1/p}}\,d\tau=:\mathcal{K}_{\alpha}.$
Again, as a consequence of the dominated convergence theorem I deduce that
$\lim_{\alpha\rightarrow
1^{-}}\mathcal{I}_{\alpha}=0,\quad\lim_{\alpha\rightarrow
1^{-}}\mathcal{J}_{\alpha}=0\quad\textrm{and}\quad\lim_{\alpha\rightarrow
1^{-}}\mathcal{K}_{\alpha}=0,$
therefore
$\lim_{\alpha\rightarrow
1^{-}}\left(\int_{S}\|E_{\alpha}(-At^{\alpha})-e^{At}\|^{p}_{\mathcal{L}(X)}\,dt\right)^{1/p}=0.$
By analogous arguments I also conclude that
$\lim_{\alpha\rightarrow
1^{-}}\left(\int_{S}\|E_{\alpha,\alpha}(-At^{\alpha})-e^{At}\|^{p}_{\mathcal{L}(X)}\,dt\right)^{1/p}=0.$
∎
###### Remark 25.
Observe that for $S\subset(0,\infty)$ the convergence presented in the above
result becomes a consequence of Theorems 20 and 22. However, since I am
considering $S\subset\mathbb{R}^{+}$, the above result is in fact more
general.
### 3.2. Questions Q3) and Q4)
In this subsection I begin to deal with the nonlinearity $f(t,x)$, introducing
new computations to the results obtained so far. Recall that if $f(t,x)$ is a
continuous function, locally Lipschitz in the second variable, uniformly with
respect to the first variable, and bounded (i.e. it maps bounded sets onto
bounded sets), Theorem 5 and Remark 6 ensure that for any $\alpha\in(0,1]$,
there exists $w_{\alpha}>0$ (which can be $\infty$) and a unique maximal local
mild solution (or global mild solution)
$\phi_{\alpha}:[0,\omega_{\alpha})\rightarrow X$ of the Cauchy problem
($P_{\alpha}$).
However there is no simple way to know if
$\stackrel{{\scriptstyle[}}{{\alpha\in(0,1]}}]{}{\bigcap}[0,\omega_{\alpha})=\\{0\\},$
(6)
which, if this is the case, would lead me to face the possibility of calculate
the fractional limit of the family of functions
$\\{\phi_{\alpha}(t):\alpha\in(0,1]\\}$, when $\alpha\rightarrow 1^{-}$, just
to the constant value $\phi_{\alpha}(0)=u_{0}$. This is exactly what question
Q3) intends to discuss.
Let me begin by presenting the following result.
###### Theorem 26.
Assume that $f:[0,\infty)\times X\rightarrow X$ is a continuous function,
locally Lipschitz in the second variable, uniformly with respect to the first
variable, and bounded (i.e. it maps bounded sets onto bounded sets), and
consider problem ($P_{\alpha}$), for $\alpha\in(0,1]$. If $\phi_{\alpha}(t)$
is the maximal local mild solution of ($P_{\alpha}$) defined over the interval
$[0,\omega_{\alpha})$ (which can be $(0,\infty)$ for some values of $\alpha$),
then for each $\alpha_{0}\in(0,1)$, there exists $t_{\alpha_{0}}>0$ such that
$[0,t_{\alpha_{0}}]\subset\stackrel{{\scriptstyle[}}{{\alpha\in[\alpha_{0},1]}}]{}{\bigcap}[0,\omega_{\alpha}).$
###### Proof.
Observe that for each $\alpha\in(0,1]$, Theorem 5 and Remark 6 ensure the
existence and uniqueness of a maximal local mild solution (or global mild
solution) of ($P_{\alpha}$), such that the maximal interval of existence for
the solution $\phi_{\alpha}(t)$ is $[0,\infty)$ or a finite interval
$[0,\omega_{\alpha})$ and, in such case,
$\limsup_{t\rightarrow\omega_{\alpha}^{-}}\|\phi_{\alpha}(t)\|=\infty.$ (7)
Since $f(t,x)$ is locally Lipschitz in the second variable, there exist
$R_{0},L_{0}>0$ such that
$\|f(t,x)-f(t,y)\|\leq L_{0}\|x-y\|$
for every $(t,x),(t,y)\in B\big{(}(0,u_{0}),R_{0}\big{)}$.
Let $\alpha_{0}\in(0,1)$ and suppose that
$\stackrel{{\scriptstyle[}}{{\alpha\in[\alpha_{0},1]}}]{}{\bigcap}[0,\omega_{\alpha})=\\{0\\}.$
Then, there should exist a sequence
$\\{\alpha_{n}\\}_{n=1}^{\infty}\subset[\alpha_{0},1]$ and a related
decreasing sequence of positive real numbers
$\\{\omega_{\alpha_{n}}\\}_{n=1}^{\infty}$, such that
$\lim_{n\rightarrow\infty}{\omega_{\alpha_{n}}}=0$. By choosing a subsequence
of $\\{\omega_{\alpha_{n}}\\}_{n=1}^{\infty}$, if necessary, I can suppose
that there exist $\alpha\in[\alpha_{0},1]$ such that $\alpha_{n}$ converges to
$\alpha$ and a sequence $\\{\sigma_{n}\\}_{n=1}^{\infty}$ with the following
properties:
* (i)
$0<\omega_{\alpha_{n+1}}<\sigma_{n}<\omega_{\alpha_{n}}$, for every
$n\in\mathbb{N}$;
* (ii)
$\|\phi_{\alpha_{n}}(t)-u_{0}\|<R_{0}/2$, for $t\in[0,\sigma_{n})$, and
$\|\phi_{\alpha_{n}}(\sigma_{n})-u_{0}\|=R_{0}/2$, for every $n\in\mathbb{N}$.
This assertion follows mainly from (7).
Now observe that
$\|E_{{\alpha_{n}}}(A(\sigma_{n})^{{\alpha_{n}}})u_{0}-u_{0}\|\leq\|E_{{\alpha_{n}}}(A(\sigma_{n})^{{\alpha_{n}}})u_{0}-E_{{\alpha}}(A(\sigma_{n})^{{\alpha}})u_{0}\|\\\
+\|E_{{\alpha}}(A(\sigma_{n})^{{\alpha}})u_{0}-u_{0}\|,$
therefore, Theorems 18 and 21 ensure that
$\lim_{n\rightarrow\infty}\|E_{{\alpha_{n}}}(A(\sigma_{n})^{{\alpha_{n}}})u_{0}-u_{0}\|=0.$
Thus, choose $N_{0}\in\mathbb{N}$ such that
$\sigma_{n}<R_{0}/2\qquad\textrm{and}\qquad\|E_{{\alpha_{n}}}(A(\sigma_{n})^{{\alpha_{n}}})u_{0}-u_{0}\|\leq
R_{0}/4,$
for any $n\geq N_{0}$. Then, if $n\geq N_{0}$ I have
$\|\phi_{\alpha_{n}}(\sigma_{n})-u_{0}\|\leq\|E_{{\alpha_{n}}}(A(\sigma_{n})^{{\alpha_{n}}})u_{0}-u_{0}\|\\\
+\displaystyle\left\|\int_{0}^{\sigma_{n}}(\sigma_{n}-s)^{{\alpha_{n}}-1}E_{{\alpha_{n}},{\alpha_{n}}}(A(\sigma_{n}-s)^{{\alpha_{n}}})f(s,\phi_{\alpha_{n}}(s))ds\right\|,$
and therefore
$\|\phi_{\alpha_{n}}(\sigma_{n})-u_{0}\|\leq(R_{0}/4)\\\
+M_{2}\displaystyle\int_{0}^{\sigma_{n}}(\sigma_{n}-s)^{{\alpha_{n}}-1}\Big{[}\big{\|}f(s,\phi_{\alpha_{n}}(s))-f(s,u_{0})\big{\|}+\big{\|}f(s,u_{0})\big{\|}\Big{]}\,ds,$
where $M_{2}>0$ is given uniformly on $\alpha\in[\alpha_{0},1]$ by Theorem 18.
Now, since $(\sigma_{n},\phi_{\alpha_{n}}(\sigma_{n})),(\sigma_{n},u_{0})\in
B\big{(}(0,u_{0}),R_{0}\big{)}$, I have that
$\|\phi_{\alpha_{n}}(\sigma_{n})-u_{0}\|\leq(R_{0}/4)+M_{2}M_{3}\sigma_{n}+M_{2}L_{0}\displaystyle\int_{0}^{\sigma_{n}}(\sigma_{n}-s)^{{\alpha_{n}}-1}\|\phi_{\alpha_{n}}(s)-u_{0}\|\,ds,$
where $M_{3}={\max_{s\in[0,\omega_{\alpha_{1}}]}{\|f(s,0)\|}}.$
Finally, from [8, Lemma 7.1.1] I have that
$\|\phi_{\alpha_{n}}(\sigma_{n})-u_{0}\|\leq\theta_{n}+\eta_{n}\displaystyle\int_{0}^{\sigma_{n}}(\sigma_{n}-s)^{{\alpha_{n}}-1}E_{\alpha_{n},\alpha_{n}}\left(\eta_{n}(\sigma_{n}-s)\right)\theta_{n}\,ds,$
where $\eta_{n}=\big{[}M_{2}L_{0}\Gamma(\alpha_{n})\big{]}^{1/\alpha_{n}}$ and
$\theta_{n}=(R_{0}/4)+M_{2}M_{3}\sigma_{n}$. Thus, using the dominated
convergence theorem and Theorems 18, I deduce that
$R_{0}/2=\lim_{n\rightarrow\infty}{\|\phi_{\alpha_{n}}(\sigma_{n})-u_{0}\|}\\\
\leq\lim_{n\rightarrow\infty}\theta_{n}+\left(\lim_{n\rightarrow\infty}\eta_{n}\right)\left[\lim_{n\rightarrow\infty}\displaystyle\int_{0}^{\sigma_{n}}(\sigma_{n}-s)^{{\alpha_{n}}-1}E_{\alpha_{n},\alpha_{n}}\left(\eta_{n}(\sigma_{n}-s)\right)\theta_{n}\,ds\right]\\\
=(R_{0}/4),$
what is a contradiction. This concludes the proof of this theorem.
∎
In order to give another characterization to the biggest interval contained in
the set $\cap_{\alpha\in[\alpha_{0},1]}[0,\omega_{\alpha})$, for each
$\alpha_{0}\in(0,1)$, I present the following result.
###### Theorem 27.
Consider same hypotheses of Theorem 26 and assume that for any $\alpha_{0}$ in
$(0,1)$, there exists $\alpha\in[\alpha_{0},1]$ such that
$\omega_{\alpha}<\infty$. Define
$\Omega_{\alpha_{0}}:=\sup\\{t>0:[0,t]\subset\cap_{\alpha\in[\alpha_{0},1]}[0,\omega_{\alpha})\\}.$
Then, I have that:
* (i)
for each $\alpha_{0}\in(0,1)$ it holds that
$\inf\\{\omega_{\alpha}:\alpha\in[\alpha_{0},1]\textrm{ with
}\omega_{\alpha}<\infty\\}=\Omega_{\alpha_{0}}$;
* (ii)
for each $\alpha_{0}\in(0,1)$ I have that
$[0,\Omega_{\alpha_{0}})\subset[0,\omega_{\alpha})$, for every
$\alpha\in[\alpha_{0},1]$;
* (iii)
if $\alpha_{1},\alpha_{2}\in(0,1]$, with $\alpha_{1}<\alpha_{2}$, then
$\Omega_{\alpha_{1}}\leq\Omega_{\alpha_{2}}$.
###### Proof.
$(i)$ Since by definition it holds that
$\Omega_{\alpha_{0}}\leq\inf\\{\omega_{\alpha}:\alpha\in[\alpha_{0},1]\textrm{
with }\omega_{\alpha}<\infty\\},$
let me assume for an instant that
$\Omega_{\alpha_{0}}<\inf\\{\omega_{\alpha}:\alpha\in[\alpha_{0},1]\textrm{
with }\omega_{\alpha}<\infty\\}$. If such is the case, by setting
$r:=\left[\Omega_{\alpha_{0}}+\inf\\{\omega_{\alpha}:\alpha\in[\alpha_{0},1]\textrm{
with }\omega_{\alpha}<\infty\\}\right]/2,$
I could verify that
$\Omega_{\alpha_{0}}+r\in\\{t>0:[0,t]\subset\cap_{\alpha\in[\alpha_{0},1]}[0,\omega_{\alpha})\\}$,
what would lead me to the contradiction
$\Omega_{\alpha_{0}}+r\leq\Omega_{\alpha_{0}}$. Therefore
$\Omega_{\alpha_{0}}=\inf\\{\omega_{\alpha}:\alpha\in[\alpha_{0},1]\textrm{
with }\omega_{\alpha}<\infty\\},$
as I wanted.
Finally item $(ii)$ follows from the definition of $\Omega_{\alpha_{0}}$,
while item $(iii)$ is a directly consequence of the infimum properties. ∎
###### Remark 28.
It worths to emphasize the importance of the hypotheses: “for any $\alpha_{0}$
in $(0,1)$, there exists $\alpha\in[\alpha_{0},1]$ such that
$\omega_{\alpha}<\infty$”. In fact, if this is not the case, there should
exists $\tilde{\alpha}\in(0,1)$ such that for every
$\alpha\in[\tilde{\alpha},1]$ I would have
$[0,\omega_{\alpha})=[0,\infty).$
Now, let me change the subject a little and begin to address question Q4).
###### Theorem 29.
Consider the Cauchy problem ($P_{\alpha}$) with $\alpha\in(0,1]$ and assume
that function $f:[0,\infty)\times X\rightarrow X$ is continuous, locally
Lipschitz in the second variable, uniformly with respect to the first
variable, and bounded (i.e. it maps bounded sets onto bounded sets). Then, if
$\phi_{\alpha}(t)$ is the maximum local mild solution (or global mild
solution) of ($P_{\alpha}$) defined over $[0,\omega_{\alpha})$ (or
$[0,\infty)$), there exists $t_{*}>0$ such that
$\lim_{\alpha\rightarrow 1^{-}}{\|\phi_{\alpha}(t)-\phi_{1}(t)\|}=0,$
for every $t\in[0,t^{*}]$.
###### Proof.
Observe that Theorem 5 and Remark 6 guarantee the existence of a maximal mild
solution (or global mild solution) $\phi_{\alpha}(r)$ defined over a maximal
interval of existence $[0,\omega_{\alpha})$ (or $[0,\infty)$), such that for
$\alpha\in(0,1]$ satisfies
$\phi_{\alpha}(t)=\left\\{\begin{array}[]{ll}E_{\alpha}(At^{\alpha})u_{0}+\displaystyle\int_{0}^{t}(t-s)^{\alpha-1}E_{\alpha,\alpha}(A(t-s)^{\alpha})f(s,\phi_{\alpha}(s))ds,&\\\
&\textrm{if }\alpha\in(0,1),\vspace*{0.2cm}\\\
e^{At}u_{0}+\displaystyle\int_{0}^{t}e^{A(t-s)}f(s,\phi_{\alpha}(s))ds,&\textrm{if
}\alpha=1.\end{array}\right.$
Now I need to make two considerations.
* (i)
Note that Theorem 27 and Remark 28 ensure that
$[0,\Omega_{1/2}/2]\subset\cap_{\alpha\in[1/2,1]}[0,\omega_{\alpha})\quad\textrm{or}\quad[0,\infty)\subset\cap_{\alpha\in[1/2,1]}[0,\omega_{\alpha}).$
In any case, it is not difficult to choose $t_{0}>0$ such that
$[0,t_{0}]\subset[0,\omega_{\alpha})$, for every $\alpha\in[1/2,1]$.
* (ii)
Recall that $f(r,x)$ is locally Lipschitz in the second variable, i.e., there
exist $R_{0},L_{0}>0$ such that
$\|f(r,x)-f(r,y)\|\leq L_{0}\|x-y\|$
for every $(r,x),(r,y)\in B\big{(}(0,u_{0}),R_{0}\big{)}$. In that way, I can
infer that there exists $t_{*}\in[0,t_{0}]$ such that
$\cup_{\alpha\in[1/2,1]}\\{(t,\phi_{\alpha}(t)):t\in[0,t_{*}]\\}\subset
B\big{(}(0,u_{0}),R_{0}/2\big{)},$
since otherwise, it would exist $\alpha_{*}\in[1/2,1]$ and two sequences of
real numbers $\\{\alpha_{n}\\}_{n=1}^{\infty}\subset[1/2,1]$ and
$\\{\tau_{n}\\}_{n=1}^{\infty}\subset[0,t_{0}]$, with
$\alpha_{n}\rightarrow\alpha_{*}$ and $\tau_{n}\rightarrow 0$, when
$n\rightarrow\infty$, that also satisfies
$\|\phi_{\alpha_{n}}(t)-u_{0}\|<R_{0}/2$, for all $t\in[0,\tau_{n})$, and
$\|\phi_{\alpha_{n}}(\tau_{n})-u_{0}\|=R_{0}/2$.
However this construction, like the one given in the proof of Theorem 26,
leads to a contradiction.
* (iii)
Define $N:=\sup\\{\|f(s,\phi_{1}(s))\|:s\in[0,t_{*}]\\}$, which is finite
since $f(s,\phi_{1}(s))$ is continuous and $[0,t_{*}]$ is a compact interval.
Taking into account considerations $(i)$, $(ii)$ and $(iii)$, I deduce that
$\|\phi_{\alpha}(t)-\phi_{1}(t)\|\leq\|E_{\alpha}(At^{\alpha})u_{0}-e^{At}u_{0}\|\\\
+\left\|\displaystyle\int_{0}^{t}(t-s)^{\alpha-1}E_{\alpha,\alpha}(A(t-s)^{\alpha})\Big{[}f(s,\phi_{\alpha}(s))-f(s,\phi_{1}(s)\Big{]}ds\right\|\hskip
85.35826pt\\\
+\left\|\displaystyle\int_{0}^{t}(t-s)^{\alpha-1}\Big{[}E_{\alpha,\alpha}(A(t-s)^{\alpha})-e^{A(t-s)}\Big{]}f(s,\phi_{1}(s))ds\right\|\\\
+\left\|\displaystyle\int_{0}^{t}\Big{[}(t-s)^{\alpha-1}-1\Big{]}e^{A(t-s)}f(s,\phi_{1}(s))ds\right\|,$
for every $\alpha\in[1/2,1]$ and $t\in[0,t_{*}]$, therefore, by considering
also Theorems 14 and 18, I obtain
$\|\phi_{\alpha}(t)-\phi_{1}(t)\|\leq\|E_{\alpha}(At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}\|u_{0}\|\\\
+L_{0}M_{2}\displaystyle\int_{0}^{t}(t-s)^{\alpha-1}\|\phi_{\alpha}(s))-\phi_{1}(s)\|ds\\\
\hskip
170.71652pt+N\displaystyle\int_{0}^{t}s^{\alpha-1}\Big{\|}E_{\alpha,\alpha}(As^{\alpha})-e^{As}\Big{\|}_{\mathcal{L}(X)}ds\\\
+NM_{1}\displaystyle\int_{0}^{t}\big{[}s^{\alpha-1}-1\big{]}ds.$
for every $\alpha\in[1/2,1]$ and $t\in[0,t_{*}]$. Note that I may rewrite the
above inequality as
$\|\phi_{\alpha}(t)-\phi_{1}(t)\|\leq
g_{\alpha}(t)+L_{0}M_{2}\displaystyle\int_{0}^{t}(t-s)^{\alpha-1}\|\phi_{\alpha}(s))-\phi_{1}(s)\|ds,$
(8)
for every $\alpha\in[1/2,1]$ and $t\in[0,t_{*}]$, where
$g_{\alpha}(t)=\|E_{\alpha}(At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}\|u_{0}\|+N\displaystyle\int_{0}^{t}s^{\alpha-1}\Big{\|}E_{\alpha,\alpha}(As^{\alpha})-e^{As}\Big{\|}_{\mathcal{L}(X)}ds\\\
+NM_{1}\displaystyle\int_{0}^{t}\big{[}s^{\alpha-1}-1\big{]}ds.$
Finally, by considering [8, Lemma 7.1.1], I have that (8), the dominated
convergence theorem, Theorems 20, 22 and 24 allow us to deduce that
$\lim_{\alpha\rightarrow 1^{-}}\|\phi_{\alpha}(t)-\phi_{1}(t)\|=0,$
for each $t\in[0,t_{*}]$. This completes the proof of the theorem. ∎
## 4\. Closing Remarks
All the computations done in this manuscript could have being more general. I
could have considered $\alpha_{0}\in(0,1]$ and studied the limit
$\lim_{\alpha\rightarrow\alpha_{0}}{u_{\alpha}(t)}=u_{\alpha_{0}}(t),$
or, I could have considered the Cauchy problem with initial condition
$u(t_{0})=u_{0}$. However, these two more general problems would only bring
technical difficulties, since the computations would be analogous. That is why
I avoided dealing with these situations here.
As a final commentary, recall that I can consider “well-behaved” functions
$f(t,x)$ in order to obtain better results.
###### Proposition 30.
If $f:[0,\infty)\times X\rightarrow X$ is globally Lipschitz on the second
variable, uniformly with respect to the first variable, that is, there exist
$L>0$ such that
$\|f(t,x)-f(t,y)\|\leq L\|x-y\|$
for every $x,y\in X$ and every $t\in[0,\infty)$, then $f$ maps bounded sets
into bounded sets.
###### Proof.
Just observe that for any $t\geq 0$ and $x\in X$ I have the inequality
$\|f(t,x)\|\leq\|f(t,x)-f(t,0)\|+\|f(t,0)\|\leq L\|x\|+\|f(t,0)\|.$
∎
Proposition 30 allows me to conclude that every solution of the Cauchy problem
($P_{\alpha}$), when $f(t,x)$ is globally Lipschitz on the second variable,
uniformly with respect to the first variable, is defined in $[0,\infty)$ (this
is a consequence of estimatives I have already done in this manuscript,
Theorem 5, Remark 6 and [8, Lemma 7.1.1]). Therefore, I would be able to
compute the limit done in Theorem 29 for every $t\in[0,\infty)$, in order to
obtain a more general result.
The discussion about functions $f(t,x)$ that are locally Lipschitz on the
second variable, uniformly with respect to the first variable, deserves a more
profound study, which is being developed.
## References
* [1] M. F. Almeida, L. C. F. Ferreira, Self-similarity, symmetries and asymptotic behavior in Morrey spaces for a fractional wave equation, Differ. Integral Equ. 25(9-10) (2012), 957–976.
* [2] W. Arendt, C.J.K. Batty, M. Hieber, F. Neubrander, Vector-Valued Laplace Transforms and Cauchy Problems, Birkhäuser, 2001
* [3] B. de Andrade, A. N. Carvalho, P. M. Carvalho-Neto, P. Marín-Rubio, Semilinear fractional differential equations: global solutions, critical non-linearities and comparison results, Topol. Methods Nonlinear Anal. 45 (2)(2015), 439–467.
* [4] P. M. Carvalho-Neto, Fractional differential equations: a novel study of local and global solutions in Banach spaces, Ph.D. Thesis, Universidade de São Paulo, São Carlos, 2013.
* [5] N. Dunford, J. T. Schwartz, Linear operators. Part I: General theory, New York, Interscience Publishers, 1958.
* [6] R. Gorenflo, A. A. Kilbas, F. Mainardi, S. V. Rogosin, Mittag-Leffler functions, related topics and applications, Springer Monographs in Mathematics, Berlin Heidelberg, 2014.
* [7] G. H. Hardy, J. E. Littlewood, G. Pólya, Inequalities, Cambridge Mathematical Library, 2nd ed, 1952.
* [8] D. Henry, Geometric theory of semilinear parabolic equations, Lecture Notes in Mathematics 840, Springer-Verlag, Berlin, 1981.
* [9] E. Hille, R. S. Phillips, Functional analysis and semi-groups, Publications Amer. Mathematical Soc., Colloquium Publications, Vol. 31, 1996.
* [10] T. Kato, Perturbation theory for linear operators, Springer-Verlag, Berlin, 1995.
* [11] M. Li and Q. Zheng, On spectral inclusions and approximations of $\alpha$-times resolvent families, Semigroup Forum 69 (2004), 356–368.
* [12] J. Mikusiński, The Bochner integral, Mathematische Reihe, Birkhäuser, 1978.
* [13] A. Pazy, Semigroups of linear operators and applications to partial differential equations, in Applied Mathematical Sciences, vol. 44, Springer, New York, NY, USA, 1983.
| arxiv-papers | 2021-07-27T00:23:37 | 2024-09-04T03:07:20.203314 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Paulo M. Carvalho-Neto",
"submitter": "Paulo Mendes Carvalho Neto",
"url": "https://arxiv.org/abs/2107.12528"
} |
2107.12534 | # On the Construction of Protograph-based Partially Doped GLDPC Codes
Jaewha Kim, Jae-Won Kim, and Jong-Seon No J. Kim is with the Department of
Electrical and Computer Engineering, INMC, Seoul National University, Seoul
08826, Korea (e-mail: [email protected]).J.-W. Kim is with the Department of
Electronic Engineering, Engineering Research Institute (ERI), Gyeongsang
National University, South Korea (e-mail: [email protected]).J.-S. No
with the Department of Electrical and Computer Engineering, INMC, Seoul
National University, Seoul 08826, Korea (e-mail: [email protected]).J.-W. Kim is
the corresponding author.
###### Abstract
A generalized low-density parity-check (GLDPC) code is a class of codes, where
single parity check nodes in a conventional low-density parity-check (LDPC)
code are replaced by linear codes with higher parity check constraints. In
this paper, we introduce a new method of constructing GLDPC codes by inserting
the generalized check nodes for partial doping. While the conventional
protograph GLDPC code dopes the protograph check nodes by replacing them with
the generalized check nodes, a new GLDPC code is constructed by adding the
generalized check nodes and partially doping the selected variable nodes to
possess higher degrees of freedom, called a partially doped GLDPC (PD-GLDPC)
code. The proposed PD-GLDPC codes can make it possible to do more accurate
extrinsic information transfer (EXIT) analysis and the doping granularity can
become finer in terms of the protograph than the conventional GLDPC code. We
also propose the constraint for the typical minimum distance of PD-GLDPC codes
and prove that the PD-GLDPC codes satisfying this condition have the linear
minimum distance growth property. Furthermore, we obtain the threshold
optimized protograph for both regular and irregular ensembles of the proposed
PD-GLDPC codes over the binary erasure channel (BEC). Specifically, we propose
the construction algorithms for both regular and irregular protograph-based
PD-GLDPC codes that enable the construction of GLDPC codes with higher rates
than the conventional ones. The block error rate performance of the proposed
PD-GLDPC code shows that it has a reasonably good waterfall performance with
low error floor and outperforms other LDPC codes for the same code rate, code
length, and degree distribution.
###### Index Terms:
Binary erasure channel (BEC), doping, generalized low-density parity-check
(GLDPC) code, low-density parity-check (LDPC) code, partially doped GLDPC (PD-
GLDPC) code, protograph, protograph extrinsic information transfer (PEXIT),
typical minimum distance.
## I Introduction
Low-density parity-check (LDPC) codes, first introduced in [1], have received
many interests due to their low decoding complexity by the sparsity of the
parity check matrix and Shannon capacity approaching error performance [2]. An
LDPC code is defined over a bipartite graph consisting of variable nodes and
single parity check (SPC) constraint nodes. A generalized LDPC (GLDPC) code
was first introduced in [3], which is constructed by replacing (doping) some
SPC nodes by generalized constraint (GC) nodes in a parity check matrix (PCM)
of a linear code with a larger minimum distance [4]. This makes the LDPC code
to have a larger minimum distance [5], faster decoding convergence [6], and a
better asymptotic threshold at the cost of using additional decoding
complexity and redundancy [7].
Many types of linear codes for GC nodes, also called as the component codes,
are used in the GLDPC codes such as Hamming codes [8], Hadamard codes [9],
Bose–Chaudhuri–Hocquenghem (BCH) codes, and Reed-Solomon (RS) codes [10]. The
research of the GLDPC codes is extended to spatially coupled LDPC (SC-LDPC)
codes [11, 12, 13] and doubly GLDPC (DGLDPC) codes [14, 15, 16]. While some
capacity-approaching GLDPC codes were constructed using irregular random GLDPC
codes [7, 17], there are limited works related to the capacity-approaching
protograph-based GLDPC codes due to two difficulties of the code construction.
First, since the rate-loss that is incurred during the doping process is not
negligible, constructing a protograph GLDPC code for a medium to high code
rate is difficult. Second, due to the high doping granularity, the
optimization of protograph GLDPC codes is limited. In order to replace a
specific SPC node with a GC node, the degree of the SPC node and length of the
component code should be the same. Thus, the selection of SPC nodes to be
replaced becomes limited, which makes the doping process difficult.
In this paper, we propose a new construction method of protograph-based GLDPC
code, called partially doped GLDPC (PD-GLDPC) codes, which resolves the
limitations for the construction of the conventional protograph GLDPC codes.
In the proposed construction, constraint rows for a GC node are added, rather
than replaced by partially doping the selected variable nodes, to the parity
check matrix after the lifting process of a protograph. Furthermore, we
propose an optimized construction method of the protograph-based PD-GLDPC
codes while the newly constructed code has a minimum distance that grows
linearly with the block length of the code from the constraint for the
existence of the typical minimum distance. Both the new optimized code
construction method and its analysis of the proposed protograph-based PD-GLDPC
codes are proposed in this paper, which makes the proposed protograph-based
PD-GLDPC code approach the channel capacity.
Specifically, by focusing the partial doping on the protograph variable nodes
of degree 2, we construct protograph-based PD-GLDPC codes with a good
waterfall performance. Furthermore, the proposed protograph-based PD-GLDPC
codes have more accurate protograph extrinsic information transfer (PEXIT)
analysis compared to conventional protograph GLDPC codes, which is due to the
exact computation of the extrinsic information transfer (EXIT) for a
protograph GC node in the proposed protograph-based PD-GLDPC codes. While a GC
node in conventional protograph GLDPC codes computes the average mutual
informations of its neighboring protograph variable nodes, a GC node in the
proposed protograph-based PD-GLDPC codes computes the mutual information of
single protograph variable node as its neighborhood. Thus, the computation of
the PEXIT of a GC node becomes more accurate in the proposed PD-GLDPC codes.
Since the proposed protograph-based PD-GLDPC codes are constructed through the
doping process by adding new GC nodes of the error correcting codes connected
to the subset of variable nodes lifted from single protograph variable node,
the code construction can be made over any base matrix, regardless of the
check node degree distribution of the original protograph. That is, the new
rows for the doped GC nodes are added by the component code after lifting,
where the lifting size is the multiple of the length of the component code and
the variable nodes in each added row are lifted from single protograph
variable node. Thus, the doping granularity can be much smaller than the
conventional GLDPC codes, which enables much flexible construction of the
proposed PD-GLDPC codes.
Finally, we propose the optimization method to construct large protographs for
the proposed protograph-based PD-GLDPC codes. Due to the large rate loss from
protograph GC nodes, it is difficult to construct GLDPC codes with medium to
high code rates from small protographs. The large protographs of high code
rates constructed from the degree distribution based on the random ensemble
enable the larger number of doping of GC nodes. Also, the number of doping of
GC nodes can be varied according to the code rate of the initial protograph.
The optimized balance between the number of doping nodes and the code rate of
the initial protograph is given in the proposed protograph-based PD-GLDPC
code. Furthermore, the construction of the proposed protograph-based PD-GLDPC
codes with code rates $1/2$ and $1/4$ are presented in this paper.
The rest of the paper is organized as follows. In Section II, we introduce
some preliminaries on the binary erasure channel (BEC) and protograph GLDPC
codes. Section III illustrates the proposed protograph-based PD-GLDPC code
structure and derives its PEXIT analysis with performance comparison with the
conventional GLDPC codes. The construction and optimization of protograph-
based PD-GLDPC codes from regular and irregular protographs are given in
Section IV. Section V shows the optimized results and error performance of the
proposed codes. Section VI concludes the paper with some discussion of the
results.
## II Backgrounds
In this section, we introduce some notations and concepts of a binary erasure
channel, protograph LDPC codes, and the construction method of conventional
protograph GLDPC codes. The EXIT analysis and the decoding process of
conventional GLDPC codes are also briefly introduced.
### II-A Protograph LDPC Code and BEC
Let $\mathbb{x}=\\{x_{1},{\cdots},x_{k}\\},x_{i}\in\\{0,1\\}$ be a $k$-bit
binary message vector, which is encoded via an $(n,k)$ linear code, forming an
$n$-bit codeword $\mathbb{c}=\\{c_{1},{\cdots},c_{n}\\},c_{i}\in\\{0,1\\}$.
The codeword passes through a memoryless BEC, where each bit is either erased
with probability $\epsilon$ or correctly received.
A protograph LDPC code is defined by a relatively small bipartite graph
$G=(V,C,E)$ representing a protograph, where
$V=\\{v_{1},{\cdots},v_{n_{v}}\\}$ is a set of variable nodes and
$C=\\{c_{1},{\cdots},c_{n_{c}}\\}$ is a set of check nodes. Let $E$ be the set
of edges $e$, where $e=(v,c)$ connects the variable node $v\in V$ and the
check node $c\in C$. The bipartite graph can also be expressed in terms of an
$n_{c}\times n_{v}$-sized base matrix ${\mathbb{B}}_{n_{c}\times
n_{v}}=\\{b_{i,j}\\},i\in[n_{c}],j\in[n_{v}]$, where
$b_{i,j}\in\\{0,1,2,{\cdots}\\}$ and $[A]$ is a set of positive integers less
than or equal to a positive integer $A$. The rows represent the check nodes
and the columns represent the variable nodes in the protograph. Each entry
$b_{i,j}$ of the base matrix represents the number of edges connected between
a variable node and a check node. Parallel edges are allowed and if there are
no edges connected between $v_{j}$ and $c_{i}$, the entry $b_{i,j}$ is zero.
The variable (check) node degree $deg(v_{j})$ ($deg(c_{i})$) is defined as the
number of edges incident to itself. A protograph LDPC code [19] is constructed
by copy-and-permute operation of $G$. The bipartite graph $G$ is copied by the
lifting factor $N$ and the copies of each edge $e=(v,c)\in E$ are permuted
among the copies of $v$ and $c$. In general, the large value of $N$ guarantees
the sparseness of the code.
### II-B Construction of Protograph GLDPC Code [18]
Conventionally, a protograph GLDPC code is constructed by replacing (doping) a
check node of a protograph with a GC node that has a parity check constraint
from an $(n_{i},k_{i},d_{min}^{i})$ linear code (component code), where
$n_{i}$ ($k_{i}$) is the code length (dimension) and $d_{min}^{i}$ is the
minimum distance of the component code for a check node $c_{i}$. The condition
for replacement is that the check node degree should be exactly equal to the
length of the component code, i.e., $deg(c_{i})=n_{i}$. Note that the original
check node has the parity check constraint of an
$(n_{i},k_{i})=(deg(c_{i}),deg(c_{i})-1)$ SPC code. The code rate $R$ of
protograph GLDPC code is $R=1-\frac{m_{proto}}{n_{v}}$, where
$m_{proto}=\sum_{i=1}^{n_{c}}(n_{i}-k_{i})$. While the minimum distance of an
SPC node is 2, the variable nodes connected to the GC node will be protected
by parity check constraints of the component code with the minimum distance
larger than two. Fig. 1 is the conventional protograph GLDPC code of code rate
$\frac{3}{7}$ by replacing an SPC node with the $(7,4)$ Hamming code.
Figure 1: Conventional protograph GLDPC code construction by replacing an SPC
node with a protograph GC node using the $(7,4)$ Hamming code as the component
code.
### II-C PEXIT Analysis and Decoding Process of Protograph GLDPC Code
Algorithm 1 The PEXIT analysis of a protograph GLDPC code [20]
Step 1) Initialization
Initialize $I_{ch}(j)=\epsilon$ for $j\in[n_{v}]$.
Step 2) Message update from variable node to check node
Update $I_{EV}(i,j)=1-\epsilon\prod_{t\in N(v_{j}),t\neq
i}\bigl{(}1-I_{AV}(t,j)\bigr{)}$ for all $j\in[{n_{v}}]$, where
$I_{EV}(i,j)=0$ if $b_{i,j}=0$. If $c_{i}$ is an SPC node,
$I_{AV}(i,j)=I_{EC}(i,j)$ and if $c_{i}$ is a GC node,
$I_{AV}(i,j)=I_{EGC}(i,j)$.
Step 3) Message update from check node to variable node
For all $i$, if $c_{i}$ is an SPC node, go to Step 3-1) and if $c_{i}$ is a GC
node, go to Step 3-2).
Step 3-1) $I_{EC}(i,j)=\prod_{t\in N(c_{i}),t\neq j}I_{AC}(i,t)$, where
$I_{AC}(i,t)=I_{EV}(i,t)$.
Step 3-2) For all $j\in$ $N(c_{i})$, compute
$I_{EGC}(i,j)=\frac{1}{n_{i}}\sum_{h=1}^{n_{i}}\bigl{(}1-I_{AGC}(i)\bigr{)}^{h-1}\bigl{(}I_{AGC}(i)\bigr{)}^{n_{i}-h}[h\tilde{e}_{h}-(n_{i}-h+1)\tilde{e}_{h-1}],$
(1)
where $I_{AGC}(i)=\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}I_{EV}(i,j)$.
Step 4) APP mutual information computation
For all $j\in[n_{v}],I_{APP}(j)=1-\epsilon\prod_{t\in
N(v_{j})}\bigl{(}1-I_{AV}(t,j)\bigr{)}$. If $c_{t}$ is an SPC node,
$I_{AV}(t,j)=I_{EC}(t,j)$ and if $c_{t}$ is a GC node,
$I_{AV}(t,j)=I_{EGC}(t,j)$.
Step 5) Convergence check of variable nodes
Repeat Step 2)–4) until $I_{APP}(j)=1,$ for all $j\in[n_{v}]$.
The asymptotic performance of the conventional protograph GLDPC codes is
evaluated by the PEXIT analysis. We use the EXIT and PEXIT analyses of the
GLDPC code over the BEC introduced in [20, 21, 22]. The PEXIT analysis tracks
down the mutual information of extrinsic messages and a priori error
probabilities of the variable nodes, SPC check nodes, and GC nodes of a
protograph GLDPC code. Let $I_{ch}(j)$ be the channel information from the
erasure channel for the protograph variable node $v_{j}$. In addition,
$I_{EV}(i,j)$ $(I_{EC}(i,j))$ is the extrinsic information sent from $v_{j}$
($c_{i}$) to $c_{i}$ ($v_{j}$) and $I_{AV}(i,j)$ $(I_{AC}(i,j))$ is the a
priori mutual information of $v_{j}$ ($c_{i}$) sent from $c_{i}$ ($v_{j}$),
where $c_{i}$ is an SPC node. For GC nodes, we use the notations $I_{AGC}(i)$
and $I_{EGC}(i,j)$ for a priori and extrinsic information. Let $N(c_{i})$
($N(v_{j})$) be the set of variable (check) nodes incident to $c_{i}$
($v_{j}$), i.e., neighborhood of $c_{i}$ ($v_{j}$). Finally, $I_{APP}(j)$ is a
posteriori probability of $v_{j}$. To explain (1), if $c_{i}$ is a GC node
with the $(n_{i},k_{i})$ Hamming code, the PEXIT of the GC node is computed
from a closed form using the property of the simplex code, which is the dual
code of a Hamming code. Also,
$I_{AGC}(i)=\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}I_{EV}(i,j)$ is the average a
priori mutual information for a GC node to compute the PEXIT message. In (1),
we have
$\tilde{e}_{h}=\sum_{t=1}^{h}t\sum_{u=0}^{t-1}(-1)^{u}2^{\binom{u}{t}}{k_{i}\brack
t}{t\brack u}\binom{2^{t-u}}{h}.$
For two positive integers $a$ and $b$, we also have
$\binom{a}{b}=\prod_{i=0}^{b-1}\frac{a-i}{b-i}$ and ${a\brack
b}=\prod_{i=0}^{b-1}\frac{2^{a}-2^{i}}{2^{b}-2^{i}}$, where $\binom{a}{0}=1$
and ${a\brack 0}=1$. The PEXIT process is given in Alg. 1, which searches for
the minimum $\epsilon$ to successfully decode, i.e., $I_{APP}(j)=1,$ for all
$j\in[n_{v}]$, in asymptotic sense.
Now, we briefly explain the decoding process of the conventional GLDPC codes
[13]. The variable nodes process the conventional message-passing decoding
over the BEC by sending correct extrinsic messages to the check nodes if any
of the incoming bits from its neighborhood is not erased. The SPC nodes send
correct extrinsic messages to the variable nodes if all of its incoming
messages are correctly received, and send an erasure message otherwise. In
this paper, the decoding of GC nodes is processed by the maximum likelihood
(ML) decoder. For each iteration, a GC node $c_{i}$ with the $(n_{i},k_{i})$
component code receives the set of erasure locations $\\{e_{i}\\}$ from
$N(c_{i})$. Let $H_{GC}$ be the parity check matrix of the component code and
$H_{e}$ be the submatrix of $H_{GC}$ indexed with $\\{e_{i}\\}$. The decoder
computes the Gaussian-elimination operation of $H_{e}$, making it into a
reduced row echelon form $H_{e}^{reduced}$. If
rank($H_{e}^{reduced}$)$=|\\{e_{i}\\}|$, the GC node solves all the input
erasures and otherwise, the decoder corrects the erasures corresponding to the
rows with weight 1 from $H_{e}^{reduced}$. The decoding complexity can be
further reduced if the GC node exploits bounded distance decoding; however,
the degradation of asymptotic performance is not negligible, as shown in [7].
## III The Proposed Protograph-based PD-GLDPC Code
(a)
(b)
(c)
Figure 2: Block diagram of the construction process of conventional GLDPC
codes and the proposed protograph-based PD-GLDPC codes.
In this section, a new construction method of protograph-based GLDPC codes is
proposed. While the conventional protograph GLDPC codes are constructed by
replacing some protograph SPC nodes in the original protograph by GC nodes
using the component code, the proposed protograph-based PD-GLDPC code is
constructed by adding the GC nodes for the subset of variable nodes using
component codes after the lifting process of the original protograph, where
each GC node is connected to the variable nodes copied from single protograph
variable node. A block diagram of the construction process of both codes
together with the conventional random GLDPC code is given in Fig. 2.
### III-A Construction Method of Protograph-based PD-GLDPC Code
Figure 3: An example of a proposed $({\mathbb{B}}_{2\times 3},7,4,14,1)$
protograph-based PD-GLDPC code construction, where ${\mathbb{B}}_{2\times
3}=[1\,1\,1;1\,0\,1]$ and $\pi$ is the $14\times 14$ sized permutation matrix.
First, we define the partial doping for variable nodes using the addition of
GC nodes to a lifted protograph, that is, the addition of rows for the parity
check matrix by the component code, where each GC node is incident to variable
nodes copied from single protograph variable node. Also, we define a partially
doped protograph variable node as a protograph variable node incident to the
added GC nodes. While the term doping in conventional GLDPC codes is used in
the perspective of check nodes, we use the term partial doping in the
perspective of variable nodes. Let ${\mathbb{B}}_{n_{c}\times n_{v}}$ be an
$n_{c}\times n_{v}$ base matrix, where some protograph variable nodes are
partially doped with a $(\mu,\kappa)$ component code after the lifting
process. Let $x=0,1,2,{\cdots}$ be the number of the partially doped
protograph variable nodes, where each protograph variable node is doped by
$N/\mu$ component codes after the lifting process. Then, a proposed
protograph-based PD-GLDPC code is defined with parameters
$({\mathbb{B}}_{n_{c}\times n_{v}},\mu,\kappa,N,x)$. We assume that the
component code used in the paper is the $(\mu,\kappa)$ Hamming code and that
$\mu$ divides the lifting factor $N$ such that $N=\mu\beta$, where $\beta$ is
a non-negative integer. The variable nodes copied from $x$ protograph variable
nodes in the base matrix are partially doped by the GC nodes. That is, in the
proposed PD-GLDPC code construction, the $N/\mu$ GC nodes are connected to the
$N$ variable nodes lifted from each protograph variable node. Thus, the
proposed construction method can choose the protograph variable nodes to
protect by partial doping. An example of the proposed construction is given in
Fig. 3, which illustrates the doping process by a $(7,4)$ component Hamming
code over a $2\times 3$ base matrix.
(a)
(b)
Figure 4: PCM of a protograph-based PD-GLDPC code.
The basic concept of the proposed construction is to focus on the protection
of the variable nodes lifted from a protograph variable node. Since $N$ is the
multiple of the component code length, all the variable nodes lifted from
single protograph variable node can be protected by using $\beta$ GC nodes.
The parity check matrix for $\beta$ GC nodes, connected to the variable nodes
lifted from a protograph variable node, $\textbf{H}_{\textbf{H}}$ is shown in
Fig. 4(a), where $\textbf{H}_{Hamm}$ is the parity check matrix of the Hamming
code. The constructed protograph-based PD-GLDPC code has a PCM
${\mathbb{H}}_{PD{\text{-}}GLDPC}$ as in Fig. 4(b), where the upper part is
the PCM of the added $\beta x$ GC nodes and the lower part
${\mathbb{H}_{proto}}$ refers to the PCM of the LDPC code lifted from the
original protograph. Since the doping proceeds after the lifting process, a
protograph-based PD-GLDPC code cannot be expressed in terms of a protograph.
Although for the proposed construction method, the number of partial doping
doesn’t necessarily have to be a multiple of $\mu$, in order to make the
number of added rows the multiple of the lifting size, similar to the size of
the conventional one, we partially dope the protograph variable nodes by a
granularity $\mu$, i.e., $x=0,\mu,2\mu,3\mu,{\cdots}$. Assuming that $x$ is a
multiple of $\mu$, let $y$ be a non-negative integer representing the number
of bulks of doped protograph variable nodes, where each bulk is a set of
protograph variable nodes with size $\mu$, i.e., $y=\frac{x}{\mu}$.
### III-B The PEXIT Analysis of Protograph-based PD-GLDPC Codes
Figure 5: An example of the Tanner graph representation of the proposed PD-
GLDPC code from the protograph ${\mathbb{B}}_{2\times 3}=[1\,1\,1;1\,0\,1]$,
where $x=1$.
The PEXIT of the proposed protograph-based PD-GLDPC codes is similar to that
of the conventional protograph GLDPC codes in Alg. 1 except for the EXIT of a
GC node. Since the incoming mutual information of each GC node is obtained
from only one protograph variable node in the proposed code, the average
mutual information sent to each GC node is the same as the extrinsic message
of the protograph variable node connected to the GC node. Let $b_{j},j\in[x]$
be the virtual node representing the set of $\beta$ GC nodes connected to the
protograph variable node $v_{j}$. An example of the representation of a
virtual node over a protograph is given in Fig. 5. Note that although $b_{j}$
is not a protograph node itself, it is possible to compute the PEXIT of a
protograph-based PD-GLDPC code. Also, let $I_{EV}^{(b_{j})}(j)$ be the
extrinsic information from $v_{j}$ to $b_{j}$ expressed as
$I_{EV}^{(b_{j})}(j)=1-\epsilon\prod_{t\in N(v_{j})}(1-I_{AV}(t,j)),j\in[x].$
Since $b_{j}$ is solely connected to $v_{j}$, the index term for the extrinsic
information from $v_{j}$ to $b_{j}$ is expressed by the notation of $j$ only.
In order to compute the EXIT of $b_{j}$, let $I_{AGC}^{(b_{j})}(j)$ and
$I_{EGC}^{(b_{j})}(j)$ be the a priori and extrinsic mutual informations of
$b_{j}$, respectively. Note that the EXIT of each GC node is computed from
single a priori mutual information to process single value of extrinsic mutual
information for the neighboring variable nodes. For the conventional
protograph GLDPC codes, the a priori mutual information of a protograph GC
node is computed by averaging the extrinsic mutual information of its
neighboring variable nodes. However, for the proposed protograph-based PD-
GLDPC codes, since $b_{j}$ receives the extrinsic mutual information of
$v_{j}$ only, it is clear that
$I_{AGC}^{(b_{j})}(j)=I_{EV}^{(b_{j})}(j),\,j\in[x]$. We also compute the
extrinsic mutual information from $b_{j}$ to $v_{j}$ denoted as
$I_{EGC}^{(b_{j})}(j)$ using (1), given the a priori mutual information
$I_{AGC}^{(b_{j})}(j)$, which is given as
$I_{EGC}^{(b_{j})}(j)=\frac{1}{\mu}\sum_{h=1}^{\mu}\bigl{(}1-I_{AGC}^{(b_{j})}(j)\bigr{)}^{h-1}\bigl{(}I_{AGC}^{(b_{j})}(j)\bigr{)}^{\mu-h}[h\tilde{e}_{h}-(\mu-h+1)\tilde{e}_{h-1}].$
(2)
Note that for the proposed protograph-based PD-GLDPC codes, the a priori
(extrinsic) EXIT of the GC node is computed from the extrinsic (a priori) EXIT
of single protograph variable node. While the EXIT of variable nodes and SPC
nodes for the proposed protograph-based PD-GLDPC codes is the same as that of
the conventional protograph GLDPC codes described in Alg. 1, the EXIT of the
GC nodes in the proposed codes is changed to (2) whereas the conventional
protograph GLDPC codes use (1).
In general, as the portion of degree-2 variable nodes in the LDPC codes
increases, the asymptotic performance is enhanced [23], but their minimum
distance decreases and then the error floor becomes worse. Although the
proposed protograph-based PD-GLDPC code construction method enables the
partial doping for any variable nodes in the given protographs, we focus only
on partial doping for degree-2 variable nodes as follows. First, we construct
the original base matrix ${\mathbb{H}_{proto}}$ with the large portion of
degree-2 variable nodes. Then, we partially dope some of the protograph
variable nodes of degree-2 to increase the minimum distance and improve their
performance. Thus, regular protographs of degree-2 variable nodes and
irregular protographs with many degree-2 variable nodes are used for the
construction of the proposed protograph-based PD-GLDPC codes. In terms of
irregular ensemble LDPC codes, a large portion of degree-2 variable nodes
enables the LDPC code to achieve the capacity approaching performance [24]. On
the other hand, by reasonably selecting the number of partially doped variable
nodes for degree-2, the property of the linear minimum distance growth with
the length of the LDPC code can be guaranteed. Thus, when we design the
proposed protograph-based PD-GLDPC codes, balancing the partial doping over
degree-2 variable nodes enables both the existence of a typical minimum
distance and a good asymptotic performance.
### III-C Condition for Typical Minimum Distance of Protograph-based PD-GLDPC
Code
The existence of a typical minimum distance in the given LDPC codes guarantees
that their minimum distance grows linearly with the block length of the code
in an asymptotic sense [25]. It was proved in [26] that a protograph LDPC code
has a typical minimum distance if there is no cycle consisting of only
degree-2 variable nodes in the protograph. Furthermore, in [27], the condition
for a typical minimum distance of the conventional protograph GLDPC codes was
given as follows. Assuming that there are no degree-2 variable nodes with
double edges, i.e., no type 1 degree-2 variable nodes defined in [27], the
neighborhoods of a check node $c_{i}$ that satisfy $d^{i}_{min}\geq
N^{(dv2)}(c_{i})$ are removed along with its edges, where $N^{(dv2)}(c_{i})$
is the number of degree-2 variable nodes among the neighborhoods of $c_{i}$.
This process is repeated until no further degree-2 variable nodes remain.
Then, the GLDPC code has a typical minimum distance if all degree-2 variable
nodes are removed.
The proposed protograph-based PD-GLDPC code also has a similar approach to
that of the conventional protograph GLDPC codes in [27]. However, since a GC
node of the proposed protograph-based PD-GLDPC code is not well defined by a
protograph node, the derivation of the weight enumerator of the proposed
codeword is quite different from that of the conventional GLDPC code. Thus,
the condition for the existence of the typical minimum distance of the
proposed protograph-based PD-GLDPC codes is slightly different from that of
the conventional protograph LDPC code. That is, the degree-2 variable nodes to
be partially doped are initially excluded before the degree-2 variable node
removing process stated in [26], because those variable nodes should be
changed to the variable nodes of degrees higher than two by partial doping.
Thus, we can regard the degree-2 variable nodes to be partially doped as the
variable nodes with higher degrees. Then, we have the following theorem for
the proposed protograph-based PD-GLPDC codes.
###### Theorem 1.
For a $({\mathbb{B}}_{n_{c}\times n_{v}},\mu,\kappa,N,x)$ protograph-based PD-
GLDPC code, if the undoped degree-2 variable nodes in the protograph have no
cycles among themselves, the proposed protograph-based PD-GLDPC code has a
typical minimum distance.
###### Proof.
The proof is given in Appendix A.
The existence of the typical minimum distance of the proposed protograph-based
PD-GLDPC code guarantees that the minimum distance of the proposed code grows
linearly with the code length of the LDPC code, and thus the proposed code has
low error floor for the large code length. In the next section, we use Theorem
1 as the constraint to optimize the protograph in order to guarantee the
existence of the typical minimum distance of the proposed protograph-based PD-
GLDPC code.
### III-D Comparison between the Proposed PD-GLDPC Code and the Conventional
Protograph GLDPC Code
The main difference between the proposed protograph-based PD-GLDPC codes and
the conventional protograph GLDPC codes is the perspective of doping. While
the conventional protograph GLDPC code replaces an entire row, i.e., a
protograph check node by the parity check matrix of the component code, the
proposed protograph-based PD-GLDPC code appends some rows incident to the
variable nodes copied from single protograph variable node. The focus of the
conventional protograph GLDPC code is to choose a certain protograph check
node, whereas the protograph-based PD-GLDPC code is focusing on choosing which
protograph variable nodes are further protected by partial doping. The
constraint for the conventional protograph GLDPC code is that the check nodes
to be replaced should have the degree equal to the component code length,
while the constraint for the proposed protograph-based PD-GLDPC codes is that
the lifting size of a protograph should be the multiple of the component code
length.
The selection of the check nodes to be replaced in the conventional protograph
GLDPC codes is generally difficult since it requires a combinatory search of
either the best threshold, minimum distance, or convergence speed. Also, since
many SPC nodes of a given base matrix connect the variable nodes with various
degrees, it is very difficult to select the variable nodes to be partially
doped for further protection in the conventional protograph GLDPC codes.
Furthermore, the conventional protograph GLDPC code construction has two
limitations in terms of PEXIT analysis and doping granularity. First, the
PEXIT analysis of the conventional protograph GLDPC codes is not accurate
because the PEXIT of the GC node is derived from averaged EXIT of $\mu$
(component code length) protograph variable nodes. Using a MAP-oriented
computation as in Alg. 1, the GC node outputs a single value that represents
the extrinsic mutual information for the $\mu$ protograph variable nodes.
Thus, a GC node averages up the a priori mutual information of the $\mu$
neighborhood protograph variable nodes and outputs uniform extrinsic mutual
information, which is similar to the EXIT analysis of a random ensemble LDPC
code [21]. Since each GC node receives a priori inputs from $\mu$ different
protograph variable nodes, the EXIT analysis is not accurate. Thus, the higher
variance of the a priori mutual information from the average, the greater the
deviation of the code between the threshold and the actual decoding
performance. On the other hand, since the EXIT of a GC node in the proposed
protograph-based PD-GLDPC code requires the a priori mutual information of the
same protograph variable node, there is no deviation since the $\mu$ mutual
information has the same value, which makes the PEXIT of the proposed code
more accurate.
The second limitation is that the conventional protograph GLDPC codes have
large doping granularity of protograph variable nodes compared to that of the
proposed one. By replacing a single protograph GC node by a component code
with parameters $(\mu,\kappa)$, the $\mu$ protograph variable nodes are doped.
Whereas, for every partial doping of $\beta$ GC nodes in the proposed
protograph-based PD-GLDPC code, the variable nodes copied from single
protograph variable node are partially doped. In other words, the doping
granularity is one, which is smaller than the conventional protograph GLDPC
codes.
In summary, compared to the conventional protograph GLDPC codes, the proposed
protograph-based PD-GLDPC code is more accurate in the PEXIT analysis and has
the smaller doping granularity.
## IV Constructions of Protograph-based PD-GLDPC Codes
In this section, a protograph-based PD-GLDPC code is constructed from both a
regular protograph and an irregular protograph. Threshold optimization of
protograph-based PD-GLDPC codes is also proposed.
### IV-A Construction from a Variable Node Regular Protograph
Algorithm 2 The construction method of a protograph-based PD-GLDPC code from a
variable node regular protograph
Input: $w_{r}$, $\mu$, $\kappa$, $n_{v}$, $R$
Output: $y$, $\mathbb{B}_{n_{c}\times n_{v}}$
Step 1) Initialization
For each $y$ in $\lceil\frac{n_{v}-n_{c}+1}{\mu}\rceil\leq
y\leq\lfloor\frac{n_{v}}{\mu}\rfloor$, construct a variable node regular base
matrix $\mathbb{B}$ of size $n_{c}\times n_{v}$ using the PEG method, where
each variable node has degree-$w_{r}$ and $n_{c}=n_{v}(1-R)-(\mu-\kappa)y$.
Step 2) Construction of the candidate protograph-based PD-GLDPC code
For each $y$, partially dope $(\mu,\kappa)$ Hamming codes on $y\mu$ blocks of
variable nodes in the base matrix.
Step 3) Check the existence of the typical minimum distance
For each $y$, $\lceil\frac{n_{v}-n_{c}+1}{\mu}\rceil\leq
y\leq\lfloor\frac{n_{v}}{\mu}\rfloor$, if there exists any cycle for the
submatrix induced by only undoped variable nodes of degree 2, re-initialize
the base matrix as in Step 1) for that $y$.
Step 4) Selection of the optimal protograph-based PD-GLDPC code
For each $y$, compute the PEXIT threshold of the constructed protograph-based
PD-GLDPC code and find $y$ with the best threshold.
We define a variable node regular protograph as a protograph, where all of its
variable nodes have the same degree. Similar to the conventional protograph
GLDPC code construction, we introduce the construction process of a proposed
protograph-based PD-GLDPC code from a regular protograph. In this paper, we
have strictly satisfied the variable node regularity for the protograph while
making the check nodes as regular as possible using the progressive edge-
growth (PEG) algorithm [28]. Since the PEG algorithm is a random construction
method, we have considered doping for variable nodes from the left part of the
base matrix, i.e., doping for $v_{j},\,j=1,2,{\cdots},y\mu$. After lifting by
$N$, the number of partially doped variable nodes is $\mu yN$ and each subset
of size $\mu$ variable nodes lifted from a protograph variable node
constitutes a Hamming code with PCM ${\mathbb{H}}_{Hamm}$ as a component code.
Note that the number of dopings for the protograph variable nodes should be
sufficient enough to satisfy the constraint for the existence of the typical
minimum distance. The necessary condition of $y$ for the typical minimum
distance condition is that the number of undoped degree-2 variable nodes is
less than the number of check nodes of the original protograph, that is,
$n_{v}-\mu y\leq n_{c}-1\leftrightarrow y\geq\frac{n_{v}-n_{c}+1}{\mu}.$
Furthermore, in order to satisfy the sufficient condition for the typical
minimum distance, we make sure that the undoped degree-2 variable nodes do not
form a protograph cycle among themselves. The code rate $R$ of the proposed
protograph-based PD-GLDPC is derived as
$R=1-\frac{n_{c}+(\mu-\kappa)y}{n_{v}}$, where for a given code rate and
$n_{v}$, a protograph-based PD-GLDPC code is constructed. The construction of
a protograph-based PD-GLDPC code from a regular protograph is summarized in
Alg. 2.
### IV-B Differential Evolution-based Construction from Irregular Protograph
Algorithm 3 Construction of $G_{c}$ and the protograph-based PD-GLDPC code
Input: $\mu$, $\kappa$, $n_{v}$, $R$, $l$, $r$, $y_{max}$
Output: $y^{opt}$, $G_{c}$, $G_{p}$
Step 1) Optimize degree distribution of $G_{c}$
Optimize
$\lambda_{G_{c}}(x)=\lambda_{2}x+\lambda_{3}x^{2}+\lambda_{4}x^{3}+\lambda_{5}x^{4}+\lambda_{6}x^{5}+\lambda_{l}x^{l-1}$
and $\rho_{G_{c}}(x)=\rho_{r-1}x^{r-2}+\rho_{r}x^{r-1}$ using differential
evolution under constraints (a)$\sim$(c): (a) Rate constraint
$R=1-\frac{\int_{0}^{1}\rho_{G_{c}}(x)dx}{\int_{0}^{1}\lambda_{G_{c}}(x)dx},0\leq\lambda_{i}\leq
1,0\leq\rho_{i}\leq 1$, (b) Typical minimum distance constraint
$\frac{\lambda_{2}/2}{\Sigma}\times n_{v}\leq
n_{c}-y_{max}(\mu-\kappa)\leftrightarrow\lambda_{2}\leq\frac{2\Sigma\\{n_{c}-1-y_{max}(\mu-\kappa)\\}}{n_{v}}$,
and (c) $G_{p}$ existence constraint $\lambda_{3}\geq\frac{12\Sigma
y_{max}}{n_{v}},\lambda_{4}\geq\frac{24\Sigma
y_{max}}{n_{v}},\lambda_{5}\geq\frac{20\Sigma
y_{max}}{n_{v}},\lambda_{6}\geq\frac{6\Sigma y_{max}}{n_{v}}$.
Step 2) Construction of $G_{c}$
From the optimized degree distribution and by using the random PEG algorithm,
construct $G_{c}$ defined as $\mathbb{D}^{(2,3,4,5,6,l)}=(a,b,c,d,e,f)$.
Step 3) Optimization of $G_{p}$
For each $y=1,2,{\cdots},y_{max}$, construct $G_{p}$ defined as
$\mathbb{D}^{(2,3,4,5,6,l)}=(a+15y,b-4y,c-6y,d-4y,e-y,f)$ and choose
$y^{opt}\in\\{y\\}$ with the best threshold.
Step 4) Typical minimum distance check of the protograph-based PD-GLDPC code
For the chosen $y^{opt}$ and $G_{p}$, if there exists any degree-2 cycle for
the submatrix induced by undoped variable nodes, go to Step 2). Otherwise,
output $y^{opt}$ and $G_{p}$.
An optimization of an irregular protograph ensemble is made by initially
obtaining the degree distribution of the random ensemble using differential
evolution [29] and constructing the protograph via the PEG algorithm for the
construction of the proposed protograph-based PD-GLPDC codes from irregular
protographs. In this paper, in order to make the check node degrees as even as
possible, we try to construct the protograph from the degree distribution of a
random ensemble. We define $G_{c}$ as the optimized protograph of the
conventional LDPC code and $G_{p}$ as the initial irregular protograph that is
used to construct the protograph-based PD-GLDPC code. $G_{c}$ is constructed
to have the same variable node degree distribution as the protograph-based PD-
GLDPC code constructed from $G_{p}$ after lifting by $N$.
Let $\lambda_{G_{c}}(x)$ and $\rho_{G_{c}}(x)$ be the variable and check node
degree distributions of irregular ensemble to construct $G_{c}$, which is the
optimized protograph for the conventional LDPC codes. In this paper, we assume
the degree distribution of the ensemble of
$\lambda_{G_{c}}(x)=\lambda_{2}x+\lambda_{3}x^{2}+\lambda_{4}x^{3}+\lambda_{5}x^{4}+\lambda_{6}x^{5}+\lambda_{l}x^{l-1}$
and $\rho_{G_{c}}(x)=\rho_{r-1}x^{r-2}+\rho_{r}x^{r-1}$, where $\lambda_{i}$
and $\rho_{i}$ are the portions of edges of variable and check nodes of
degree-$i$. Using the optimized degree distributions of $\lambda_{G_{c}}(x)$
and $\rho_{G_{c}}(x)$, a protograph $G_{c}$ is constructed by the PEG
algorithm. For the description of the protographs that construct the
conventional LDPC codes and the proposed protograph-based PD-GLDPC codes, let
${\mathbb{D}}^{\mathbb{dv}}=(a_{1},{\cdots},a_{max})$ be a
$|\mathbb{dv}|$-sized vector defining the numbers of protograph variable
nodes, where $a_{i}$ is the number of protograph variable nodes of degree
$l_{i}$ and $\mathbb{dv}=\\{l_{1},l_{2},{\cdots},l_{max}\\}$ is a set of
variable node degrees that exist in the protograph. That is, the protograph-
based PD-GLDPC code is constructed from an $n_{c}\times n_{v}$-sized
protograph with ${\mathbb{D}}^{\mathbb{dv}}$ by using the PEG algorithm.
Unlike the regular protograph case, in order to make the same variable node
degree distributions of $G_{c}$ and the protograph-based PD-GLDPC constructed
from $G_{p}$ after lifting by $N$, an optimization of $\lambda_{G_{c}}(x)$ and
$\rho_{G_{c}}(x)$ should be constrained by $y_{max}$, which is the maximum
number of bulks of protograph variable nodes allowed to be partially doped in
$G_{p}$. Then, we make sure that the check node degrees should be as even as
possible for both codes. A protograph-based PD-GLDPC code is constructed by
doping $y\mu$ protograph variable nodes in $G_{p}$. Construction of a
protograph-based PD-GLDPC code from $G_{p}$ is optimized by ranging the doping
bulk $y$, $1\leq y\leq y_{max}$. That is, we search for the optimal value $y$
which maximizes the coding gain between the protograph-based PD-GLDPC codes
constructed from $G_{p}$ and the conventional protograph LDPC codes
constructed from $G_{c}$. Conditions for the degree distributions in order to
construct $G_{c}$ are derived as follows. The conditions need to guarantee two
criteria: i) The variable node degree distributions of the protograph LDPC
code constructed from $G_{c}$ and the protograph-based PD-GLDPC code
constructed from $G_{p}$ after lifting by $N$ are the same and ii) a typical
minimum distance exists for both codes. In this paper, we assume that $\mu
y_{max}$ variable nodes are partially doped only from the degree-2 protograph
variable nodes. For the maximum number of $y_{max}$ bulks of partially doped
protograph variable nodes using the PCM of the $(15,11)$ Hamming code, the
degree distribution of $G_{p}$ should be
$\mathbb{D}^{(2,3,4,5,6,20)}=(a+15y_{max},b-4y_{max},c-6y_{max},d-4y_{max},e-y_{max},f).$
For the existence constraint of the typical minimum distance, the degree
distribution parameters should be non-negative. The parameters $a$$\sim$$f$
are approximated by the PEG construction as
$a\approx\lfloor n_{v}\frac{\lambda_{2}/2}{\Sigma}\rfloor,b\approx\lfloor
n_{v}\frac{\lambda_{3}/3}{\Sigma}\rfloor,c\approx\lfloor
n_{v}\frac{\lambda_{4}/4}{\Sigma}\rfloor,d\approx\lfloor
n_{v}\frac{\lambda_{5}/5}{\Sigma}\rfloor,e\approx\lfloor
n_{v}\frac{\lambda_{6}/6}{\Sigma}\rfloor,\,{\rm{and}}\,f\approx\lfloor
n_{v}\frac{\lambda_{l}/l}{\Sigma}\rfloor,$
where $\Sigma=\int_{0}^{1}\lambda_{G_{c}}(x)dx$. For the realization of the
protograph from the degree distribution using the PEG algorithm, if the
summation $a+b+c+d+e+f$ is lower than $n_{v}$, the values of $a$$\sim$$f$ are
added by 1 in order starting from the lowest variable node degree until the
summation is equal to $n_{v}$.
If $G_{c}$ is determined for a given $y_{max}$ as a variable node degree
distribution of $\mathbb{D}^{(2,3,4,5,6,20)}=(a,b,c,d,e,f)$, where
$a+b+c+d+e+f=n_{v}$, $G_{p}$ defined by
$\mathbb{D}^{(2,3,4,5,6,20)}=(a+15y,b-4y,c-6y,d-4y,e-y,f)$ can be constructed
for $y=1,{\cdots},y_{max}$. By allowing the PEG algorithm of the variable node
degree distribution over a base matrix with size
$\\{n_{c}-(\mu-\kappa)y\\}\times n_{v}$, both the code rate and the variable
node degree distributions for $G_{c}$ and the proposed protograph-based PD-
GLDPC codes constructed from $G_{p}$ after lifting by $N$ are matched. We
search for the value of $y$, which has the best PEXIT threshold while having a
typical minimum distance. The optimized doping value is denoted as $y^{opt}$.
The construction of $G_{c}$ and the PD-GLDPC code is described in Alg. 3.
## V Numerical Results and Analysis
In this section, we propose the optimized protograph design and show the BLER
of the proposed protograph-based PD-GLDPC codes. The performance of the
conventional protograph LDPC code is compared with that of the proposed
protograph-based PD-GLDPC code. In order to make this comparison, we construct
a protograph ensemble that has the same variable node degree distribution as
that of the proposed protograph-based PD-GLDPC code.
### V-A Simulation Results for Optimized Protograph-based PD-GLDPC Code from
Regular Protograph
(a)
(b)
Figure 6: Comparison of threshold and BLER for the regular LDPC codes,
irregular protograph LDPC codes, and the protograph-based PD-GLDPC codes from
a regular protograph for code rates $1/2$ and $1/4$.
For numerical analysis, we use a $(15,11)$ systematic Hamming code as the
component code. For a half-rate code, we construct a
$({\mathbb{B}}_{\\{200-4y\\}\times 400},15,11,75,15y)$ protograph-based PD-
GLDPC code, for a given $y$. Since the doping of single protograph variable
node requires $\mu-\kappa=4$ additional protograph rows, the original
protograph should have a total of $200-4y$ rows to construct a half-rate
protograph-based PD-GLDPC code. In order to satisfy the typical minimum
distance property for the proposed PD-GLDPC code, we make sure that there are
no cycles among the undoped degree-2 variable nodes if
$y\geq\frac{400-(200-4y)+1}{15}\leftrightarrow
y\geq\frac{400-200+1}{11}\approx 18.27$ during the PEG process of regular base
matrix construction. For $y=19,20,{\cdots}$, the best threshold is when
$y=19$, having a BEC threshold of 0.444. For comparison, we construct a
$(3,6)$ regular protograph with size $200\times 400$ and lift it by $75$,
which has a threshold of 0.429. Also, by comparing an irregular protograph
LDPC code that has the same degree distribution as the constructed protograph-
based PD-GLDPC code, we can find the performance gain from BP decoding to MAP
decoding over GC nodes. Since the doping of protograph variable nodes in the
proposed protograph-based PD-GLDPC codes occurs only over degree-2 variable
nodes, the degrees of $y\mu$ protograph variable nodes will change. Since the
parity check matrix of a $(15,11)$ systematic Hamming code has 4 degree-1
columns, 6 degree-2 columns, 4 degree-3 columns, and 1 degree-4 column, the
conventional irregular LDPC protograph without doping having the same variable
node degree distribution with the proposed protograph-based PD-GLDPC code is
defined as ${\mathbb{D}}^{(2,3,4,5,6)}=(115,76,114,76,19)$. Irregular
protograph LDPC code and the (3,6) regular protograph LDPC code are
constructed from the $200\times 400$ protograph and the protograph-based PD-
GLDPC code is constructed from the $124\times 200$ protograph with
$x=y\mu=285$. The irregular protograph LDPC code also has the same variable
node degree distribution as the proposed protograph-based PD-GLDPC code, where
it is defined by $\mathbb{D}^{(2,3,4,5,6)}=(115,76,114,76,19)$. Using the PEG
algorithm, we construct the irregular protograph LDPC code, having a threshold
of 0.4234. The BLER performances of the constructed irregular protograph LDPC
code, protograph-based PD-GLDPC code, and a $(3,6)$ regular code with
$(n,k)=(30000,15000)$ are shown in Fig. 6(a), where all three codes are half
rate LDPC codes constructed by $N=75$. The coding gain of the constructed
protograph-based PD-GLDPC code is 0.021 and 0.015 compared to irregular
protograph LDPC code and $(3,6)$ regular protograph LDPC code, respectively.
Similarly, we construct a $({\mathbb{B}}_{\\{300-4y\\}\times
400},15,11,105,15y)$ protograph-based PD-GLDPC code for code rate $1/4$. For
$y\geq\frac{400-(300-4y)+1}{15}\leftrightarrow
y\geq\frac{400-300+1}{11}\approx 9.18$, the optimized threshold is the highest
value $0.6935$ at $y=10$. Similar to the half-rate case, we construct a
$(3,4)$ regular protograph LDPC code using the PEG algorithm to have a
threshold of $0.647$. The irregular protograph ensemble has a variable degree
distribution of ${\mathbb{D}}^{(2,3,4,5,6)}=(250,40,60,40,10)$ and the
threshold is $0.6883$. The irregular protograph LDPC code and the $(3,4)$
regular protograph LDPC code are constructed from the $300\times 400$
protograph and the protograph-based PD-GLDPC code is constructed from the
$260\times 400$ protograph with $x=y\mu=150$. The irregular protograph also
has the same variable node degree distribution as the protograph-based PD-
GLDPC code, where it is defined by
$\mathbb{D}^{(2,3,4,5,6)}=(250,40,60,40,10)$. All the codes are lifted by
$105$ to make $(42000,10500)$ codes and the numerical results are in Fig.
6(b). The coding gain of the constructed protograph-based PD-GLDPC code is
0.0052 and 0.0465 compared to irregular protograph LDPC code and $(3,4)$
regular protograph LDPC code, respectively.
### V-B Simulation Result for Optimized Protograph-based PD-GLDPC Code from
Irregular Protograph
Figure 7: Comparison of threshold and BLER for the irregular protograph LDPC
code from $G_{c}$, the conventional random ensemble GLDPC code from [17], and
the protograph-based PD-GLDPC code from $G_{p}$ for code rate $1/2$. TABLE I:
Simulation results for optimized protograph-based PD-GLDPC code from irregular
protographs
$y_{max}$ | $\lambda_{G_{c}}(x),\rho_{G_{c}}(x)$ (threshold) | | $G_{c}$ protograph
---
$\mathbb{D}^{(2,3,4,5,6,20)}$
/ $G_{c}$ threshold
| $G_{p}$ protograph
---
$\mathbb{D}^{(2,3,4,5,20)}$, $y^{opt}$
/ PD-GLDPC threshold
Coding gain
5 | | $\lambda_{G_{c}}(x)=0.2049x+0.2489x^{2}+0.1150x^{3}$
---
$+0.074x^{4}+0.0210x^{5}+0.3363x^{19}$
$\rho_{G_{c}}(x)=0.9735x^{7}+0.0265x^{8}$ ($0.4815$)
| $(165,134,47,23,5,26)$
---
/ $0.4620$
| $(240,114,17,3,26)$, $y^{opt}=5$
---
/ $0.4699$
$0.0079$
10 | | $\lambda_{G_{c}}(x)=0.1894x+0.2255x^{2}+0.1431x^{3}$
---
$+0.1191x^{4}+0.0357x^{5}+0.2872x^{19}$
$\rho_{G_{c}}(x)=0.9908x^{7}+0.0012x^{8}$ ($0.4696$)
| $(152,121,57,38,9,23)$
---
/ $0.4523$
| $(287,85,3,2,23)$, $y^{opt}=9$
---
/ $0.4638$
$0.0115$
15 | | $\lambda_{G_{c}}(x)=0.1632x+0.1758x^{2}+0.2143x^{3}$
---
$+0.1827x^{4}+0.0543x^{5}+0.2098x^{19}$
$\rho_{G_{c}}(x)=0.9940x^{7}+0.0060x^{8}$ ($0.4476$)
| $(131,94,86,59,14,16)$
---
/ $0.4352$
| $(341,38,2,3,16)$, $y^{opt}=14$
---
/ $0.4534$
$0.0182$
The construction for the protograph of the conventional protograph LDPC code,
$G_{c}$ is made for $y_{max}=5,10,15$ for the half-rate protograph ensemble.
The numerical results are summarized in Table I, where the coding gain given
for the proposed PD-GLDPC code is compared to the conventional protograph LDPC
code with equal degree distribution. The random ensemble-based GLDPC code with
threshold $0.466$ in [17] is represented as a variable node ensemble
$\lambda(x)=0.8x^{2}+0.01x^{3}+0.01x^{5}+0.18x^{7}$ and a doping portion of
$40\%$ by Hamming code. Fig. 7 shows the performance comparison of three half-
rate codes which are the irregular protograph LDPC code constructed from
$G_{c}$, a random ensemble-based GLDPC code in [17], and the proposed
protograph-based PD-GLDPC code constructed from $G_{p}$, where $y_{max}=5$.
All three codes in Fig. 7 are $(n,k)=(30000,15000)$ codes of half-rate, where
$G_{c}$ is defined as $\mathbb{D}^{(2,3,4,5,6,20)}=(165,134,47,23,5,26)$ and
has the same variable node degree distribution as the PD-GLDPC code after
lifting by $N=105$. $x=y\mu=75$ protograph variable nodes are partially doped
in the PD-GLDPC code. The constructed protograph-based PD-GLDPC code for
$y_{max}=5$ has a coding gain of 0.0079 and 0.0039 compared to the GLDPC code
in [17] and the irregular protograph LDPC from $G_{c}$, respectively. Fig. 7
shows that the proposed protograph-based PD-GLDPC code has a good performance
both in the waterfall and low error floor region due to the fact that the code
is optimized by increasing the doping as much as possible, and at the same
time, the typical minimum distance constraint is satisfied. In terms of the
asymptotic analysis, increasing the portion of degree-2 variable nodes
increases the possibility of the code to approach the channel capacity [24].
However, the existence of a typical minimum distance of the protograph is also
important, which upper bounds the portion of degree-2 variable nodes in the
LDPC code. Thus, balancing of degree-2 variable nodes is needed in order to
satisfy both a typical minimum distance condition and a good threshold. The
proposed protograph-based PD-GLDPC code guarantees the balancing of the
degree-2 variable nodes by carefully choosing the rate of the protograph code
and the number of doping on degree-2 variable nodes.
Figure 8: Comparison of threshold and BLER for the irregular protograph LDPC
code from $G_{c}$ and the proposed protograph-based PD-GLDPC code from $G_{p}$
for code rate $1/4$.
Similarly, the construction of $G_{c}$ is made for the code rate $1/4$ case.
We simulate the proposed protograph-based PD-GLDPC with the small doping case,
where the optimization of random ensemble for $G_{c}$ is done under the
constraint $y_{max}=3$. The degree distribution of the optimized results is
obtained as
$\lambda_{G_{c}}(x)=0.2858x+0.1218x^{2}+0.0533x^{3}+0.0369x^{4}+0.0095x^{5}+0.4927x^{29},$
$\rho_{G_{c}}(x)=0.9995x^{5}+0.0005x^{6},$
which makes $G_{c}$ with $\mathbb{D}^{(2,3,4,5,6,30)}=(258,74,24,13,2,29)$ via
the PEG algorithm. The threshold of the proposed protograph-based PD-GLDPC
code is best when $y=2$ and for this instance, $G_{p}$ is then defined as
$\mathbb{D}^{(2,3,4,5,30)}=(288,66,12,5,29)$. Both codes are
$(n,k)=(42000,10500)$ codes of code rate $1/4$, where $G_{c}$ is defined as
$\mathbb{D}^{(2,3,4,5,6,30)}=(258,74,24,13,2,29)$ and has the same variable
node degree distribution as $G_{p}$ after lifting by $N=105$. $x=y\mu=30$
protograph variable nodes are partially doped in the protograph-based PD-GLDPC
code. The simulation result of both the irregular protograph LDPC code and the
proposed protograph-based PD-GLDPC code are shown for the same variable node
degree distribution in Fig. 8. The thresholds of $G_{c}$ and the proposed PD-
GLDPC code are 0.6702 and 0.7031, respectively, where the coding gain is
0.0329 compared to the irregular protograph LDPC code.
## VI Conclusion
We proposed a new construction method of a protograph-based PD-GLDPC code that
has advantages the accuracy of the PEXIT analysis and a finer granularity of
the protograph node doping compared to the conventional protograph GLDPC
codes. Also, the proposed optimized PD-GLDPC codes constructed from regular
and irregular protographs have good BLER performances compared to the regular
protograph LDPC codes and conventional GLDPC code constructed from irregular
random ensemble. While the PEXIT of a conventional GLDPC code over a GC node
averages out the a priori and extrinsic mutual information, the proposed
protograph-based PD-GLDPC code does not need such an averaging process because
the mutual information exchanges over the same protograph variable node.
Furthermore, since it is possible to partially dope the protograph variable
nodes with a granularity 1, the design of a protograph-based PD-GLDPC code
becomes more flexible in terms of balancing the rate loss and doping.
## Appendix A Proof of Theorem 1: The Constraint for the Existence of the
Typical Minimum Distance of the Proposed Protograph-based PD-GLDPC Codes
A proof for the constraint of the existence of a typical minimum distance for
the proposed protograph-based PD-GLDPC codes is given in this appendix.
Similar to that in [27], a typical minimum distance is driven by the weight
enumerator analysis over the lifted protograph. In order to use the notations
in [27], we’ve distinguished the indexing notations during the enumeration for
the partially doped variable nodes using ′. Also, the $c_{j}$ and $v_{i}$
notations are used for the check nodes and the variable nodes, respectively.
Suppose that the proposed protograph-based PD-GLDPC code is constructed from
the protograph defined by $G=(V,C,E)$ and the $x$ variable nodes are partially
doped, where component codes are identical with the parameters $(\mu,\kappa)$.
We are given a variable node set $V=\\{v_{1},{\cdots},v_{n_{v}}\\}$ and a
check node set $C_{PD{\text{-}}GLDPC}=B_{Hamm}\cup
C=\\{b_{1},{\cdots},b_{x}\\}\cup\\{c_{1},{\cdots},c_{n_{c}}\\}$ for the
protograph. It is important to note that the GC node set $B_{Hamm}$ is not
defined over a protograph. However, the codeword enumeration can be made when
the protograph is lifted, where $b_{i^{\prime}},i^{\prime}\in[x]$ is a virtual
check node that represents the Hamming check nodes used for partial doping for
$v_{i^{\prime}}$ in the original protograph. Although $b_{i^{\prime}}$ is not
a protograph check node, we define it for the enumeration of the partially
doped protograph variable nodes. The protograph-based PD-GLDPC code is
constructed by lifting the graph $G$ by $N$ times and permuting the replicated
edges. Each $v_{i}$ ($c_{j}$) has degree $q_{v_{i}}$ ($q_{c_{j}}$) and each
$b_{i^{\prime}}$ has degree $\mu$. For the enumeration of the GC node
$b_{i^{\prime}}$, we can think of it as a protograph node of degree $\mu$ that
is lifted by a factor of $\frac{N}{\mu}$. The upper bound of the weight
enumerator of the proposed protograph-based PD-GLDPC code with weight $d$,
denoted as $A_{d}^{PD{\text{-}}GLDPC}$ is derived as follows.
Let $w_{m,u},u\in[q_{v_{m}}]$ be the $u$th edge weight from a variable node
$v_{m}$. For a partially doped variable node $v_{m},m\in[x]$, there are $\mu$
weights sent towards the incident GC node, where the $u$th weight is defined
as $w^{\prime}_{m,u},u\in[\mu]$. For a given input weight vector
$\mathbb{d}=(d_{1},{\cdots},d_{n_{v}})$, we need to calculate
$A^{PD{\text{-}}GLDPC}(\mathbb{d})$ and sum it over every instance of
$\mathbb{d}$ that satisfies $d=d_{1}+{\cdots}+d_{n_{v}}$. For input
$d_{i^{\prime}},i^{\prime}\in[x]$, it is clear that
$\sum_{i=1}^{\mu}w^{\prime}_{m,i}=d_{i^{\prime}}$ because the extrinsic weight
$w^{\prime}_{m,i}$ consists of weights solely from $v_{m}$. We introduce the
following notations:
* •
$A^{v_{i}}_{d_{i}}(\mathbb{w}_{i})=\binom{N}{d_{i}}\delta_{d_{i},w_{i,1}},{\cdots},\delta_{d_{i},w_{i,q_{v_{i}}}}=\begin{cases}\binom{N}{d_{i}},\quad\mbox{if}\,w_{i,j}=d_{i},\forall
j\in[q_{v_{i}}]\\\ 0,\quad\mbox{otherwise}\end{cases}$ is the vector weight
enumerator for a variable node $v_{i}$ of the protograph [27].
* •
$A^{c_{j}}(\mathbb{z}_{j})$ is the vector weight enumerator for a check node
$c_{j}$ of the original protograph, for the incoming weight vector
$\mathbb{z}_{j}=[z_{j,1},{\cdots},z_{j,q_{c_{j}}}]$ [27].
* •
$B_{d_{i^{\prime}}}^{v_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})=\begin{cases}1,\quad\mbox{for}\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\\
0,\quad\mbox{otherwise}\end{cases}$ is the vector weight enumerator for
partially doped variable nodes $v_{i^{\prime}},\,i^{\prime}\in[x]$.
* •
$B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})$ is the vector weight
enumerator for check nodes that are created during the lifting process given
the weight vector $\mathbb{w}^{\prime}_{i^{\prime}}$.
$A^{b_{i^{\prime}}}(d_{i^{\prime}})$ is the summation of enumerators over all
possible $\mathbb{w}^{\prime}_{i^{\prime}}$ values given that
$w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}$
satisfying
$\displaystyle
A^{b_{i^{\prime}}}(d_{i^{\prime}})=\sum_{\mathbb{w}^{\prime}}B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})=\sum_{\mathbb{w}^{\prime}}\sum_{\\{\mathbb{m}\\}}C(\frac{N}{\mu};m_{1},{\cdots},m_{K}),$
where $\mathbb{w}^{\prime}=(w_{1}^{\prime},{\cdots},w_{\mu}^{\prime})$ such
that
$\sum_{i=1}^{\mu}w_{1}^{\prime}=d_{k}^{\prime},\,w_{i}^{\prime}\leq\frac{N}{\mu}.$
Then, the weight enumerator is given as
$\displaystyle A_{d}^{PD-GLDPC}=\sum_{\\{\mathbb{d}\\}}A^{PD-
GLDPC}(\mathbb{d}),$
where
$\displaystyle A^{PD{\text{-}}GLDPC}(\mathbb{d})$
$\displaystyle=\frac{\prod_{i=1}^{n_{v}}A^{v_{i}}_{d_{i}}(\mathbb{w}_{i})\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{z}_{j})\times\prod_{i^{\prime}=1}^{x}B_{d_{i^{\prime}}}^{v_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})}{\prod_{s=1}^{n_{v}}\prod_{r=1}^{q_{v_{s}}}\binom{N}{w_{s,r}}\times\prod_{s^{\prime}=1}^{x}\prod_{r^{\prime}=1}^{\mu}\binom{\frac{N}{\mu}}{w^{\prime}_{s^{\prime},r^{\prime}}}}$
$\displaystyle=\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})\times\prod_{i^{\prime}=1}^{x}B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}\times\prod_{s^{\prime}=1}^{x}\prod_{r^{\prime}=1}^{\mu}\binom{\frac{N}{\mu}}{w^{\prime}_{s^{\prime},r^{\prime}}}}.$
The solution to the equation $\mathbb{w}^{\prime}=\mathbb{m}\mathbb{M^{C}}$ is
given as $\mathbb{m}=\\{m_{1},{\cdots},m_{K}\\}$. The term
$\binom{\frac{N}{\mu}}{w^{\prime}_{s^{\prime},r^{\prime}}}$ is lower bounded
by
$(\frac{N}{\mu})^{w^{\prime}_{s^{\prime},r^{\prime}}}e^{-w^{\prime}_{s^{\prime},r^{\prime}}\cdot{\rm{ln}}\,w^{\prime}_{s^{\prime},r^{\prime}}}$.
Then, $A^{PD-GLDPC}(\mathbb{d})$ can be upper bounded as
$\displaystyle A^{PD{\text{-}}GLDPC}(\mathbb{d})$
$\displaystyle\leq\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})\times\prod_{i^{\prime}=1}^{x}B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}\times\prod_{s^{\prime}=1}^{x}\prod_{r^{\prime}=1}^{\mu}(\frac{N}{\mu})^{w^{\prime}_{s^{\prime},r^{\prime}}}e^{-w^{\prime}_{s^{\prime},r^{\prime}}\cdot{\rm{ln}}\,w^{\prime}_{s^{\prime},r^{\prime}}}}$
$\displaystyle\leq\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})\times\prod_{i^{\prime}=1}^{x}B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}\times\prod_{s^{\prime}=1}^{x}(\frac{N}{\mu})^{d_{s^{\prime}}}e^{-d_{s^{\prime}}\cdot{\rm{ln}}\,d_{s^{\prime}}}}$
$\displaystyle\leq\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})\times\prod_{i^{\prime}=1}^{x}B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}\times(\frac{N}{\mu})^{P}e^{-P\cdot{\rm{ln}}\,P}}$
$\displaystyle=\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})\times\prod_{i^{\prime}=1}^{x}\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}\times(\frac{N}{\mu})^{P}e^{-P\cdot{\rm{ln}}\,P}}$
$\displaystyle=\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})\times\prod_{i^{\prime}=1}^{x}A^{b_{i^{\prime}}}(d_{i^{\prime}})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}\times(\frac{N}{\mu})^{P}e^{-P\cdot{\rm{ln}}\,P}},$
(3)
where $P=\sum_{s^{\prime}=1}^{x}d_{s^{\prime}}$ is the total weight of the $x$
partially doped variable nodes. Then
$\sum_{t}(t\cdot{\rm{ln}}\,t)\leq(\sum_{t}t)\cdot{\rm{ln}}\,(\sum_{t}t)$ is
used for the second and the third inequalities in (3). It was shown in (18) of
[27] that the inequality
$\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}}\leq\prod_{i=1}^{n_{v}}e^{(q_{v_{i}}-1-\frac{q_{v_{i}}}{d_{min}^{(c)}})d_{i}{\rm{ln}}\,\frac{d_{i}}{N}+\frac{q_{v_{i}}(2+k_{max}^{(c)}{\rm{ln}\,2)}}{d_{min}^{(c)}}d_{i}}$
holds, where $d_{min}^{(c)}$ is the minimum distance of an SPC component code
for the original protograph and $k_{max}^{(c)}$ is the maximum number of
codewords of an SPC component code. Using the similar notations in [27], let
$d_{min}^{(b)}$ and $k^{(b)}$ be the minimum distance and the number of
codewords of the $(\mu,\kappa)$ component code for the GC nodes. Then,
$\prod_{i^{\prime}=1}^{x}A^{b_{i^{\prime}}}(d_{i^{\prime}})$ is upper bounded
as
$\displaystyle\prod_{i^{\prime}=1}^{x}A^{b_{i^{\prime}}}(d_{i^{\prime}})$
$\displaystyle\leq\prod_{i^{\prime}=1}^{x}\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}\prod_{i=1}^{\mu}{(\frac{N}{\mu})}^{\frac{1}{d_{min}^{(b)}}w^{\prime}_{i^{\prime},i}}e^{\frac{(2+k^{\prime}_{i^{\prime}}ln\,2)}{d_{min}^{(b)}}w^{\prime}_{i^{\prime},i}-\frac{1}{d_{min}^{(b)}}w^{\prime}_{i^{\prime},i}{\rm{ln}}\,w^{\prime}_{i^{\prime},i}}$
$\displaystyle=\prod_{i^{\prime}=1}^{x}\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}(\frac{N}{\mu})^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}}e^{\frac{(2+k^{\prime}_{i^{\prime}}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\sum_{i=1}^{\mu}\frac{1}{d_{min}^{(b)}}w^{\prime}_{i^{\prime},i}{\rm{ln}}\,w^{\prime}_{i^{\prime},i}}$
$\displaystyle\leq\prod_{i^{\prime}=1}^{x}\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}(\frac{N}{\mu})^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}}e^{\frac{(2+k^{\prime}_{i^{\prime}}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{d_{i^{\prime}}}{\mu}}$
$\displaystyle\leq\prod_{i^{\prime}=1}^{x}\binom{d_{i^{\prime}}+\mu-1}{d_{i^{\prime}}}(\frac{N}{\mu})^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}}e^{\frac{(2+k^{\prime}_{i^{\prime}}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{d_{i^{\prime}}}{\mu}}.$
(4)
For the inequality in the third line of (4), we use the fact that
$\sum_{i=1}^{p}t_{i}{\rm{ln}}\,t_{i}\leq s\cdot{\rm{ln}}\,\frac{s}{p}$ with
$s=t_{1}+{\cdots}+t_{p}$, which is clear by using the derivative on the
multivariable function that consists of independent $t_{i}$’s. The equality is
satisfied when all $t_{i}$ values are the same. Going back to (3), let
$f(P)=\frac{1}{\binom{N}{\mu}^{P}e^{-P{\rm{ln}}\,P}}$ for convenience. Then we
have
$\displaystyle A^{PD{\text{-}}GLDPC}(\mathbb{d})\leq$
$\displaystyle\prod_{i=1}^{n_{v}}e^{(q_{v_{i}}-1-\frac{q_{v_{i}}}{d_{min}^{(c)}})d_{i}{\rm{ln}}\,\frac{d_{i}}{N}+\frac{q_{v_{i}}(2+k_{max}^{(c)}{\rm{ln}\,2)}}{d_{min}^{(c)}}d_{i}}$
$\displaystyle\times\prod_{i^{\prime}=1}^{x}e^{d_{i^{\prime}}+\mu-1}(\frac{N}{\mu})^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}}e^{\frac{(2+k^{\prime}_{i^{\prime}}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{d_{i^{\prime}}}{\mu}}\times
f(P)$ $\displaystyle\leq$
$\displaystyle\prod_{i=1}^{n_{v}}e^{(q_{v_{i}}-1-\frac{q_{v_{i}}}{d_{min}^{(c)}})d_{i}{\rm{ln}}\,\frac{d_{i}}{N}+\frac{q_{v_{i}}(2+k_{max}^{(c)}{\rm{ln}\,2)}}{d_{min}^{(c)}}d_{i}}$
$\displaystyle\times
e^{x(\mu-1)}e^{P}\prod_{i^{\prime}=1}^{x}(\frac{N}{\mu})^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{d_{i^{\prime}}}{\mu}}\times
f(P).$ (5)
We classify the variable nodes in the protograph into three groups before
doping:
* •
Protograph variable nodes of degrees higher than 2
* •
Protograph variable nodes of degree 2 to be partially doped
* •
Protograph other variable nodes of degree 2.
We also separate the weights of codewords after lifting into three parts
according to the three groups of variable nodes: $u_{i}$, $p_{z}$, and
$l_{j}$, where $u_{i}$ is the weight of the sub-codeword corresponding to a
protograph variable node $v_{i}$ of degree higher than 2 and $p_{z}$ and
$l_{j}$ are the weights of codewords of each partially doped and undoped
protograph variable node $v_{z}$ and $v_{j}$ of degree 2 from the protograph,
respectively. The sum of sub-codeword weights for each group of variable nodes
is given as $U=\sum_{i}u_{i}$, $P=\sum_{z}p_{z}$, and $L=\sum_{j}l_{j}$. It is
clear that for the total codeword weight $d$, $d=U+P+L$. Then, the upper bound
of the first term in (5) is written as
$\displaystyle\prod_{i=1}^{n_{v}}e^{(q_{v_{i}}-1-\frac{q_{v_{i}}}{d_{min}^{(c)}})d_{i}{\rm{ln}}\,\frac{d_{i}}{N}+\frac{q_{v_{i}}(2+k_{max}^{(c)}{\rm{ln}\,2)}}{d_{min}^{(c)}}d_{i}}\leq$
$\displaystyle
e^{(2-\frac{3}{d_{min}^{(c)}})(d-P-L){\rm{ln}}\,\frac{d-P-L}{N}+\frac{3(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot(d-P-L)}$
$\displaystyle\times e^{\frac{2(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot L}\cdot
e^{\frac{2(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot P},$ (6)
which is derived by using three weight groups of codewords similar to (20) of
[27]. We share the same inequality
$u_{i}<Ne^{-\frac{(2+k_{max}^{(c)}{\rm{ln}}\,2)}{d_{min}^{(c)}-1}}$ over the
given codeword weight $d$ as in [27]. Using the derivation in [27], the upper
bound of the second term of (5) can be derived as
$\displaystyle\prod_{i^{\prime}=1}^{x}(\frac{N}{\mu})^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{d_{i^{\prime}}}{\mu}}=\prod_{i^{\prime}=1}^{x}e^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{N}{\mu}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{d_{i^{\prime}}}{\mu}}$
$\displaystyle=\prod_{i^{\prime}=1}^{x}e^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{N}{d_{i^{\prime}}}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}}=\prod_{z=1}^{x}e^{\frac{1}{d_{min}^{(b)}}p_{z}{\rm{ln}}\,\frac{N}{p_{z}}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}p_{z}}$
$\displaystyle\leq
e^{\frac{1}{d_{min}^{(b)}}P\cdot{\rm{ln}}\,\frac{Nx}{P}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}P}.$
(7)
Using (6) and (7), the upper bound of $A^{PD{\text{-}}GLDPC}(\mathbb{d})$ is
derived in terms of $E(d,P,L)$ as follows:
$\displaystyle A^{PD{\text{-}}GLDPC}(\mathbb{d})\leq$ $\displaystyle
e^{\frac{1}{d_{min}^{(b)}}P\cdot{\rm{ln}}\,\frac{Nx}{P}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}P}\cdot
e^{(2-\frac{3}{d_{min}^{(c)}})(d-P-L){\rm{ln}}\,\frac{d-P-L}{N}+\frac{3(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot(d-P-L)}$
$\displaystyle\times
e^{\frac{2(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot(P+L)}\cdot
e^{x(\mu-1)}e^{P}\cdot f(P).$ (8)
Let $E(d,P,L)$ be the parameter satisfying
$A^{PD{\text{-}}GLDPC}(\mathbb{d})\leq e^{x(\mu-1)}\cdot e^{E(d,P,L)}$. Then,
from the upper bound in (8), $E(d,P,L)$ is given as
$\displaystyle E(d,P,L)=$
$\displaystyle\frac{1}{d_{min}^{(b)}}P\cdot{\rm{ln}}\,\frac{Nx}{P}+\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}P+(2-\frac{3}{d_{min}^{(c)}})(d-P-L){\rm{ln}}\,\frac{d-P-L}{N}$
$\displaystyle+\frac{3(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot(d-P-L)+\frac{2(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot(P+L)+P+P{\rm{ln}}\,P-P{\rm{ln}}\,\frac{N}{\mu}.$
Assuming that there are no type 1 degree-2 variable nodes defined in [27] and
there are no cycles consisting only of undoped variable nodes of degree-2, we
use the result of (22) in [27] such that the inequality
$l_{2,k}^{(c_{j})}\leq\frac{1}{d_{min}^{(c_{j})}}(L_{2}^{(c_{j})}+\sum_{i}w_{i}^{(c_{j})})$
is satisfied for all $j\in[n_{c}]$, where $l_{2,k}^{(c_{j})}$ is the weight of
the degree-2 undoped variable node of $G_{p}$ and the total weight of them is
denoted as $L_{2}^{(c_{j})}$ for check node $c_{j}$. Similar to the result in
[27], we can derive the upper bound $L\leq\gamma(U+P)$, which is the same as
$L\leq\frac{\gamma}{1+\gamma}d$. Now, the upper bound of $E(d,P,L)$ needs to
be derived for independent values $L$ and $P$. The first and second partial
derivatives of $E(d,P,L)$ by $P$ are given as
$\displaystyle\frac{dE}{dP}=$
$\displaystyle\frac{1}{d_{min}^{(b)}}\cdot{\rm{ln}}\,\frac{Nx}{eP}+\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}-(2-\frac{3}{d_{min}^{(c)}}){\rm{ln}}\,\frac{e(d-P-L)}{N}-\frac{(2+k_{max}^{(c)}{\rm{ln}}\,2)}{d_{min}^{(c)}}$
$\displaystyle+1+{\rm{ln}}\,P+1-{\rm{ln}}\,\frac{N}{\mu}<0,$
$\displaystyle\frac{d^{2}E}{dP^{2}}=$
$\displaystyle-\frac{1}{d_{min}^{(b)}P}+(2-\frac{3}{d_{min}^{(c)}})\cdot\frac{1}{d-P-L}+\frac{1}{P}>0.$
Since the first derivative over $P$ is negative and the second derivative is
positive, $E(d,P,L)$ is upper bounded by
$\underset{P\to
0+}{\lim}E(d,P,L)=(2-\frac{3}{d_{min}^{(c)}})(d-L){\rm{ln}}\,\frac{d-L}{N}+\frac{3(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot(d-L)+\frac{2(2+k_{max}^{(c)}{\rm{ln}}\,2)}{d_{min}^{(c)}}L.$
Since the resulting upper bound of $E(d,L)$ is the same as (37) in [27], the
rest of the proof is the same as that in [27] and thus the proposed constraint
guarantees the existence of typical minimum distance of the proposed
protograph-based PD-GLDPC code.
## Acknowledgment
The authors would like to thank…
## References
* [1] R. G. Gallager, “Low-density parity-check codes,” _IRE Trans. Inf. Theory_ , vol. 8, no. 1, pp. 21–28, Jan. 1962.
* [2] D. J. C. MacKay and R. M. Neal, “Near shannon limit performance of low density parity check codes,” _IEEE Electron. Lett._ , vol. 32, no. 18, pp. 1645–1646, 1996.
* [3] R. M. Tanner, “A recursive approach to low complexity codes,” _IEEE Trans. Inf. Theory_ , vol. 27, no. 5, pp. 533–547, Sep. 1981.
* [4] G. Liva and W. E. Ryan, “Short low-error-floor Tanner codes with Hamming nodes,” in _Proc. IEEE MILCOM_ , 2005.
* [5] S. Abu-Surra, D. Divsalar, and W. E. Ryan, “Enumerators for protograph-based ensembles of LDPC and generalized LDPC codes,” _IEEE Trans. Inf. Theory_ , vol. 57, no. 2, pp. 858–886, Feb. 2011.
* [6] I. P. Mulholland, E. Paolini, and M. F. Flanagan, “Design of LDPC code ensembles with fast convergence properties,” in _Proc. IEEE BlackSeaCom_ , 2015.
* [7] Y. Liu, P. M. Olmos, and T. Koch, “A probabilistic peeling decoder to efficiently analyze generalized LDPC codes over the BEC,” _IEEE Trans. Inf. Theory_ , vol. 65, no. 8, pp. 4831–4853, Aug. 2019.
* [8] M. Lentmaier and K. S. Zigangirov, “On generalized low-density parity-check codes based on Hamming component codes,” _IEEE Commun. Lett._ , vol. 3, no. 8, pp. 248–250, Aug. 1999.
* [9] G. Yue, L. Ping, and X. Wang, “Generalized low-density parity-check codes based on Hadamard constraints,” _IEEE Trans. Inf. Theory_ , vol. 53, no. 3, pp. 1058–1079, Mar. 2007.
* [10] N. Miladinovic and M. Fossorier, “Generalized LDPC codes with Reed-Solomon and BCH codes as component codes for binary channels,” in _Proc. IEEE GLOBECOM_ , 2005.
* [11] D. G. M. Mitchell, M. Lentmaier, and D. J. Costello, “On the minimum distance of generalized spatially coupled LDPC codes,” in _Proc. IEEE ISIT_ , Jul. 2013.
* [12] P. M. Olmos, D. G. M. Mitchell, and D. J. Costello, “Analyzing the finite-length performance of generalized LDPC codes,” in _Proc. IEEE ISIT_ , Jun. 2015.
* [13] D. G. M. Mitchell, P. M. Olmos, M. Lentmaier, and D. J. Costello, “Spatially coupled generalized LDPC codes: Asymptotic analysis and finite length scaling,” _IEEE Trans. Inf. Theory_ , vol. 67, no. 6, pp. 3708–3723, Jun. 2021.
* [14] E. Paolini, M. P. C. Fossorier, and M. Chiani, “Generalized and doubly generalized LDPC codes with random component codes for the binary erasure channel,” _IEEE Trans. Inf. Theory_ , vol. 56, no. 4, pp. 1651–1672, Apr. 2010.
* [15] Y. Wang and M. Fossorier, “Doubly generalized LDPC codes,” in _Proc. IEEE ISIT_. 2006.
* [16] Y. Wang and M. Fossorier, “Doubly generalized LDPC codes over the AWGN channel,” _IEEE Trans. Commun._ , vol. 57, no. 5, pp. 1312–1319, May 2009.
* [17] R. Guan and L. Zhang, “Hybrid Hamming GLDPC codes over the binary erasure channel,” in _Proc. IEEE ASID_ , 2017.
* [18] G. Liva, W. E. Ryan, and M. Chiani, “Quasi-cyclic generalized LDPC codes with low error floors,” _IEEE Trans. Commun._ , vol. 56, no. 1, pp. 49–57, Jan. 2008.
* [19] J. Thorpe, “Low-density parity-check (LDPC) codes constructed from protographs,” Jet Propulsion Lab., Pasadena, CA, INP Progress Rep. 42–154, 2003.
* [20] Y. Yu, Y. Han, and L. Zhang, “Hamming-GLDPC codes in BEC and AWGN channel,” in _Proc. IEEE ICWMMN_ , 2015.
* [21] A. Ashikhmin, G. Kramer, and S. ten Brink, “Extrinsic information transfer functions: Model and erasure channel properties,” in _IEEE Tran. Inf. Theory_ , vol. 50, no. 11, pp. 2657–2673, Nov. 2004.
* [22] G. Liva and M. Chiani, “Protograph LDPC codes design based on EXIT analysis,” in _Proc. IEEE GLOBECOM_ , 2007.
* [23] A. K. Pradhan, A. Thangaraj, and A. Subramanian, “Construction of near-capacity protograph LDPC code sequences with block-error thresholds,” _IEEE Trans. Commun._ , vol. 64, no. 1, pp. 27–37, Jan. 2016.
* [24] C. Di, T. J. Richardson, and R. L. Urbanke, “Weight distribution of low-density parity-check codes,” _IEEE Trans. Inf. Theory_ , vol. 52, no. 11, pp. 4839–4855, Nov. 2006.
* [25] R. G. Gallager, _Low-density parity-check codes_. Cambridge, MA: MIT Press, 1963.
* [26] S. Abu-Surra, D. Divsalar, and W. E. Ryan, “On the existence of typical minimum distance for protograph-based LDPC codes,” in _Proc. IEEE ITA_ , 2010.
* [27] S. Abu-Surra, D. Divsalar, and W. E. Ryan, “On the typical minimum distance of protograph-based generalized LDPC codes,” in _Proc. IEEE ISIT_ , 2010,
* [28] Xiao-Yu Hu, E. Eleftheriou, and D. M. Arnold, “Regular and irregular progressive edge-growth Tanner graphs,” _IEEE Trans. Inf. Theory_ , vol. 51, no. 1, pp. 386–398, Jan. 2005.
* [29] A. Shokrollahi and R. Storn, “Design of efficient erasure codes with differential evolution,” in _Proc. IEEE ISIT_ , 2000.
| arxiv-papers | 2021-07-27T00:56:54 | 2024-09-04T03:07:20.217615 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Jaewha Kim, Jae-Won Kim, Hee-Youl Kwak, and Jong-Seon No",
"submitter": "Jaewha Kim",
"url": "https://arxiv.org/abs/2107.12534"
} |
2107.12535 | # Existence of solutions to a generalized self-dual Chern-Simons equation on
graphs
Yingshu Lü ***Email address: [email protected]. Peirong Zhong †††Email
address: [email protected].
###### Abstract
Let $G=(V,E)$ be a connected finite graph and $\Delta$ the usual graph
Laplacian. In this paper, we consider a generalized self-dual Chern-Simons
equation on the graph $G$
$\displaystyle\Delta{u}=-\lambda{e^{F(u)}[e^{F(u)}-1]^{2}}+4\pi\sum_{i=1}^{M}{\delta_{p_{j}}},$
(0.1)
where
$\displaystyle F(u)=\begin{cases}\widetilde{F}(u),\ \quad u\leq 0,\\\
0,\quad\quad\quad u>0,\end{cases}$
$\widetilde{F}(u)$ satisfies $u=1+{\widetilde{F}(u)}-e^{\widetilde{F}(u)}$,
$\lambda>0$, $M$ is any fixed positive integer, $\delta_{p_{j}}$ is the Dirac
delta mass at the vertex $p_{j}$, and $p_{1}$, $p_{2}$, $\cdots$, $p_{M}$ are
arbitrarily chosen distinct vertices on the graph. We first prove that there
is a critical value ${\lambda}_{c}$ such that if $\lambda\geq{\lambda}_{c}$,
then the generalized self-dual Chern-Simons equation has a solution
$u_{\lambda}$. Applying the existence result, we develop a new method to
construct a solution of the equation (0.1) which is monotonic with respect to
$\lambda$ when $\lambda\geq{\lambda}_{c}$. Then we establish that there exist
at least two solutions of the equation via the variational method for
$\lambda>{\lambda}_{c}$. Furthermore, we give a fine estimate of the monotone
solution which can be applied to other related problems.
School of Mathematical Sciences, Fudan University, Shanghai, China
_Keyword: Chern-Simons equation, finite graph, existence, the variational
method_
Mathematics Subject Classification: 35A01, 35A15, 35R02
## 1 Introduction
In this paper, we study the following generalized self-dual Chern-Simons
equation on a connected finite graph $G$
$\Delta{u}=-\lambda{e^{F(u)}[e^{F(u)}-1]^{2}}+4\pi\sum_{i=1}^{M}{\delta_{p_{j}}},$
(1.1)
where $\Delta$ is the graph Laplacian,
$\displaystyle F(u)=\begin{cases}\widetilde{F}(u),\ \quad u\leq 0,\\\
0,\quad\quad\quad u>0,\end{cases}$ (1.2)
$\widetilde{F}(u)$ satisfies $u=1+{\widetilde{F}(u)}-e^{\widetilde{F}(u)}$,
$p_{1},p_{2},...,p_{M}$ are distinct points in the graph $G$ and
$\delta_{p_{j}}$ satisfies
$\displaystyle\delta_{p_{j}}=\begin{cases}1,\ \quad\mbox{at $p_{j}$}\\\
0,\quad\mbox{otherwise}.\end{cases}$
Note that if $F(u)=u$, then the solutions of the generalized self-dual Chern-
Simons model is referred to as vortices. We remark that the notion of vortices
play important roles in many aspects of sciences including superconductivity
[15], optics [2], quantum Hall effects [19], for which one can read.
The study of vortices in (2+1)-dimensional Chern-Simons gauge theory has
attracted much attention recently. One of the important features of these
vortices, which differs from Nielsen-Olesen vortices [18], is that they are
magnetically and elecrically charged. In the Chern-Simons model, the Yang-
Mills (or Maxwell) term does not appear in the action Lagrangian density and
only the Chern-Simons term governs eletromagnetism. Under the condition that
the Higgs potential takes a sextic form, the static equations of motion can be
deduced by reducing a system of second-order differential equations to a self-
dual system of first-order equations, and then the topological multivortices
[20],[24], non-topological multivortices[3]-[6],[21], and doubly periodic
vortices [11] can all be studied rigorously in mathematical methods.
A generalized self-dual Chern-Simons model was later proposed by [12] and now
plays an important role in various areas of physics, many researchers did a
lot of significant work on the existence of non-topological vortices and
topological vortices in this Chern-Simons model [5],[23],[25]. However, the
existence of double periodic vortices in this Chern-Simons model had been an
open problem, until recently Han solved this problem in [11]. He reduced the
generalized self-dual Chern-Simons equation to a quasilinear elliptic equation
by appropriate transformations, and established the existence of double
periodic vortices of the Chern-Simons model by the methods of subsolutions and
supersolutions. In this paper, we investigate the existence of the solutions
to the generalized Chern-Simons equation on a connected finite graph.
In recent years, the research on the elliptic equations on graphs has
attracted attention increasingly from scientists. Grigor’yan, Lin and Yang [7]
considered the Kazdan-Warner equation on a finite graph, where the Kazdan-
Warner equation was initially studied on a manifold [16]. In [7], they gave
the solvability of the following equation depending on the sign of $c$
$\Delta u=c-he^{u},$
where $c$ is a constant and $h:V\to\mathbb{R}$ is a function. For more results
of solvability of the Kazdan-Warner equation, we refer readers to
[8]-[10],[17]. The Kazdan-Warner equation is closely related to the mean field
equation investigated originally in the prescribed curvature problem in
geometry. Huang, Lin and Yau [14] proved the existence of solution to the
following two mean field equations
$\displaystyle\Delta u+e^{u}=\rho\delta_{0},$ (1.3)
and
$\Delta u=\lambda e^{u}(e^{u}-1)+4\pi\sum_{j=1}^{M}\delta_{p_{j}}$
on an arbitrary connected finite graph, where $\rho>0$ and $\lambda>0$ are
constants.
From these results, we study the generalized Chern-Simons equation (1.1) on a
finite graph $G$. Inspired by the idea from [22], we first show that there is
a critical value $\lambda_{c}$ depending on the graph $G$ such that if
$\lambda>\lambda_{c}$, the equation (1.1) has a solution via the variation
method. Moreover, the existence of the solutions to the equation (1.1) also
holds when $\lambda=\lambda_{c}$ by the properties of finite graphs. Applying
the existence result for $\lambda\geq{\lambda}_{c}$, we put forward a new idea
to construct a solution of the equation (1.1) which is monotonic with respect
to $\lambda$. With the aid of the existence results and Mountain Pass theorem,
we show that there exist at least two solutions of the equation (1.1). The
crucial point is that we apply the properties of the equation on the finite
graph to prove the Palais-Smale condition used in Mountain Pass theorem which
is different from the equations on Euclidean spaces. Furthermore, under the
monotonicity property of the solutions, we give a fine estimate of the
solutions for almost everywhere $\lambda>{\lambda}_{c}$.
The organization of the paper is as follows. In Section 2, we introduce the
notations and preliminaries of the paper and then state our main results. In
Section 3, we present the existence of the solution to the generalized self-
dual Chern-Simons equation. A fine result about the solutions is established
in Section 4.
## 2 Settings and Main Results
Let $G=(V,E)$ be a connected finite graph. For any edge $xy\in E$, we assume
that the symmetric weights $\omega_{xy}=\omega_{yx}$ satisfying
$\omega_{xy}>0$. Let $\mu:V\to{\mathbb{R}^{+}}$ be a finite measure. For any
function $u:V\to\mathbb{R}$, the Laplace operator acting on $u$ is defined by
$\Delta{u}(x)=\frac{1}{\mu(x)}\sum_{y\sim{x}}\omega_{yx}[u(y)-u(x)],$ (2.1)
where $y\sim x$ means ${xy}\in E$. The associated gradient form stands for
$\displaystyle\Gamma{(u,v)}(x)=\frac{1}{2\mu(x)}\sum_{y\sim
x}\omega_{xy}(u(y)-u(x))(v(y)-v(x))$ (2.2)
for any $u,v:V\to\mathbb{R}$.
For any function $f:V\to\mathbb{R}$, an integral of $f$ over $V$ is defined by
$\displaystyle\int_{V}fd\mu=\sum_{x\in V}\mu(x)f(x),$ (2.3)
and then
$\frac{1}{2}\int_{V}{|\nabla u|}^{2}d\mu:=\frac{1}{2}\sum_{x\in
V}\sum_{y\sim{x}}\omega_{xy}{[u(y)-u(x)]}^{2}.$ (2.4)
Define a Sobolev space and a norm by
$\displaystyle W^{1,2}(V)=\\{u:V\to\mathbb{R}|\int_{V}(|\nabla
u|^{2}+u^{2})d\mu<+\infty\\},$
and
$\displaystyle\|u\|_{W^{1,2}(V)}=\left(\int_{V}(|\nabla
u|^{2}+u^{2})d\mu\right)^{\frac{1}{2}}$
respectively. Since $G$ is a finite graph, the Sobolev space $W^{1,2}(V)$ is
the set of all functions on $V$, a finite dimensional linear space. Then the
following Sobolev embedding was introduced in [[7], Lemma 5].
###### Lemma 2.1.
Let $G=(V,E)$ be a finite graph. The Sobolev space $W^{1,2}(V)$ is pre-
compact. Namely, if $\\{u_{j}\\}$ is bounded in $W^{1,2}(V)$, then there
exists some $u\in W^{1,2}(V)$ such that up to a subsequence, $u_{j}\to u$ in
$W^{1,2}(V)$.
Let $(X,\|\cdot\|)$ be a Banach space, $J:X\to\mathbb{R}$ be a functional. In
order to prove the existence of the solutions of the equation (1.1), we first
need the following Palais-Smale condition.
###### Definition 2.1.
A functional $J\in C^{1}(X,\mathbb{R})$ satisfies the Palais-Smale condition
if each sequence $\\{u_{k}\\}\subset X$ such that
$\displaystyle(1)\ J(u_{k})\to c\ \mbox{for some constant}\ c,\ as\
k\to+\infty,$ $\displaystyle(2)\ \|J^{\prime}(u_{k})\|\to 0\ \mbox{in}\ X,\
as\ k\to+\infty$
is precompact in $X$.
With the help of the Palais-Smale condition, Ambrosetti and Rabinowitz
established the following Mountain Pass theorem [1].
###### Lemma 2.2.
Let $(X,\|\cdot\|)$ be a Banach space, $J\in C^{1}(X,\mathbb{R})$, $e\in X$
and $r>0$ such that $\|e\|>r$ and
$\displaystyle b:=\inf_{\|u\|=r}J(u)>J(0)\geq J(e).$
If $J$ satisfies the Palais-Smale condition with
$c:=\inf_{\gamma\in\Gamma}\max_{t\in[0,1]}J(\gamma{(t)})$, where
$\Gamma:=\\{\gamma\in C([0,1],X)|\ \gamma(0)=0,\gamma(1)=e\\},$
then $c$ is a critical value of $J$.
Our first main result in this paper can be stated as follows.
###### Theorem 2.1.
There is a critical value $\lambda_{c}$ depending on $G$ satisfying
$\lambda_{c}\geq\frac{27\pi M}{|V|}$ (2.5)
such that
(i) If $\lambda\geq\lambda_{c}$, the equation (1.1) has a solution
$u_{\lambda}$ on $G$, and if $\lambda<\lambda_{c}$, the equation (1.1) has no
solution.
(ii) If $\lambda\geq\lambda_{c}$, there exists a solution
$\tilde{u}_{\lambda}$ of the equation (1.1) on $G$ satisfying
$\tilde{u}_{\lambda_{1}}\geq\tilde{u}_{\lambda_{2}}$ when
$\lambda_{1}>\lambda_{2}$.
(iii) If $\lambda>\lambda_{c}$, the equation (1.1) admits at least two
solutions on $G$.
Let $u_{0}$ be a solution of the Poisson equation
$\displaystyle\Delta u_{0}=-\frac{4\pi
M}{|V|}+4\pi\sum_{j=1}^{M}\delta_{p_{j}}.$ (2.6)
As is well known, the solution of (2.6) exists if the integral of the right
hand side is equal to 0. Inserting $u=u_{0}+v$ into the equation (1.1) yields
$\displaystyle\Delta
v=-\lambda{e^{F(u_{0}+v)}[e^{F(u_{0}+v)}-1]^{2}}+\frac{4\pi M}{|V|}.$ (2.7)
By Theorem 2.1, we investigate the existence result of the equation (1.1) and
show that $\tilde{v}_{\lambda}(=\tilde{u}_{\lambda}-u_{0})$ is a local minimum
of the functional related to the equation (2.7) when $\lambda>\lambda_{c}$.
For the solution $\tilde{v}_{\lambda}$, we give a further result as follows.
###### Theorem 2.2.
The solution $\tilde{v}_{\lambda}$ is a strict local minimum of the functional
related to the equation (2.7) for almost everywhere $\lambda>\lambda_{c}$.
###### Remark 2.1.
(i) In [13], Hou and Sun gave the same existence result of the equation (1.1)
as $(i)$ in Theorem 2.1 by the method of the subsolutions and supersolutions
for $\lambda>\lambda_{c}$ and further proved that the solution
$\hat{u}_{\lambda}$ is increasing respect to $\lambda$. In this paper, we
prove the existence result of (1.1) by another method, i.e. the variational
method. Since our method is variational, we cannot get the monotonicity of the
solution directly. This implies that the solution $\hat{u}_{\lambda}$
(obtained in [13]) may be different from the solution $u_{\lambda}$ of (1.1).
(ii) Hou and Sun [13] established the existence result of (1.1) at
$\lambda=\lambda_{c}$ by the integral estimation method. In our paper, we
apply properties of the equation on the finite graph and the contradiction
argument.
(iii) We give not only the existence of the single solution, but also the
existence of multiple solutions. To achieve this, we first put forward a new
method to construct a solution $\tilde{u}_{\lambda}$ of the equation (1.1)
which is monotonic with respect to $\lambda$. This implies that
$\tilde{v}_{\lambda}$ is monotonic with respect to $\lambda$. Then we
establish that $\tilde{v}_{\lambda}$ is a local minimum of the functional
related to the equation (2.7) when $\lambda>\lambda_{c}$ by the monotonicity
of $\tilde{v}_{\lambda}$. With the help of this result and the variational
method, we show that the equation (1.1) admits at least two solutions on $G$
when $\lambda>\lambda_{c}$.
## 3 Existence of solutions for the Chern-Simons equations
This section devotes to the proof of Theorem 2.1. We establish the existence
result of the solutions to the equation (1.1) by the variation methods. To
achieve this purpose, we first prove some basic lemmas.
###### Definition 3.1.
We say that $\underline{u}$ is a sub-solution of (1.1) if
$\Delta{\underline{u}}\geq-\lambda{e^{F(\underline{u})}[e^{F(\underline{u})}-1]^{2}}+4\pi\sum_{j=1}^{M}{\delta_{p_{j}}}$
(3.1)
for any $x\in V$.
###### Lemma 3.1.
If $\underline{u}$ is a sub-solution to (1.1), then $\underline{u}$ is non-
positive on $V$.
###### Proof..
Let
$\Omega_{1}=\\{x\in V|{\underline{u}}(x)>0\\},\quad\ \Omega_{2}=\\{x\in
V|{\underline{u}}(x)\leq 0\\}.$ (3.2)
If $\Omega_{1}$ is empty, then the conclusion holds. If $\Omega_{1}$ is non-
empty, we first claim that $\Omega_{1}\neq V$. Suppose that the claim does not
hold, then
$\Delta{\underline{u}}\geq 4\pi\sum_{j=1}^{M}{\delta_{p_{j}}}\
\quad\mbox{in}\quad{\Omega}_{1}.$ (3.3)
Summing the two sides of the above equation, one can obtain that the left hand
side of (3.3) is equal to zero and the right side of (3.3) is equal to $4\pi
M$. This leads to a contradiction.
Since
$\Delta{\underline{u}}\geq-\lambda{e^{F(\underline{u})}[e^{F(\underline{u})}-1]^{2}}+4\pi\sum_{j=1}^{M}{\delta_{p_{j}}}\quad\mbox{in}\quad{\Omega}_{1},$
and from (1.2), one has
$\Delta{\underline{u}}\geq 4\pi\sum_{j=1}^{M}{\delta_{p_{j}}}\geq
0\quad\mbox{in}\quad{\Omega}_{1}.$
Therefore, $\underline{u}$ is a sub-harmonic function in $\Omega_{1}$. Since
$\Omega_{1}$ and $\Omega_{2}$ are non-empty, it follows from the maximum
principle on graphs that
$\max\limits_{{\Omega}_{1}}\underline{u}\leq 0.$
This implies that
$\underline{u}(x)\leq 0\quad\mbox{in}\quad{\Omega}_{1},$
which contradicts with the definition of $\Omega_{1}$. Therefore,
$\underline{u}$ is non-positive on $V$. ∎
###### Remark 3.1.
If $u$ is a solution to (1.1), then $u$ is non-positive on $V$.
According to (1.1) and Remark 3.1, one can easily see that
$\Delta u\geq-\frac{4}{27}\lambda+4\pi\sum_{j=1}^{M}\delta_{p_{j}}.$ (3.4)
Summing the two sides of the above equation yields
$\lambda\geq\frac{27\pi M}{|V|}.$ (3.5)
This is a necessary condition for the existence of solutions to (1.1).
In order to prove the existence of the solutions to the equation (1.1), with
the aid of the decomposition $u=u_{0}+v$ and the equation (2.7), we only need
to consider the existence result of the equation (2.7).
###### Lemma 3.2.
If $\underline{v}$ is a subsolution of the equation (2.7), then there exists a
solution $v^{*}$ of the equation (2.7).
###### Proof..
Define the functional $J:W^{1,2}(V)\to\mathbb{R}$ by
$J(v)=\frac{1}{2}\int_{V}{|\nabla
v|}^{2}+\frac{\lambda}{4}\int_{V}[e^{F(u_{0}+v)}-1]^{4}+\frac{4\pi
M}{|V|}\int_{V}v,$ (3.6)
and let the functional $J$ among all functions $v$ belonging to the set
$\displaystyle\mathcal{A}:=\\{v\in W^{1,2}(V)|v\geq\underline{v}\ a.e.\
\mbox{in}\ V\\},$ (3.7)
Denote
$\displaystyle J_{0}=\inf_{\mathcal{A}}J(v).$
Then there exists a sequence $\\{v_{n}\\}\subset\mathcal{A}$ such that
$J(v_{n})\to J_{0}$. We claim that $\\{v_{n}\\}$ is bounded in $W^{1,2}(V)$.
In fact, we only need to prove that $\\{v_{n}(x)\\}$ is bounded for any $x\in
V$. Suppose not, then there exists a point $x^{k}\in V$ and a subsequence
$\\{v_{n_{k}}\\}\subset\\{v_{n}\\}$ such that
$\displaystyle v_{n_{k}}(x^{k})\rightarrow+\infty,\ \ \mbox{as}\ k\to+\infty.$
(3.8)
It follows from (3.6) that
$\displaystyle J(v_{n_{k}})$ $\displaystyle=$
$\displaystyle\frac{1}{2}\int_{V}{|\nabla
v_{n_{k}}|}^{2}+\frac{\lambda}{4}\int_{V}[e^{F(u_{0}+v_{n_{k}})}-1]^{4}+\frac{4\pi
M}{|V|}\int_{V}v_{n_{k}}$ $\displaystyle\geq$ $\displaystyle\frac{4\pi
M}{|V|}\int_{V}v_{n_{k}}$ $\displaystyle=$ $\displaystyle\frac{4\pi
M}{|V|}\int_{V\backslash\\{x^{k}\\}}v_{n_{k}}+\frac{4\pi
M}{|V|}\mu(x^{k})v_{n_{k}}(x^{k})\rightarrow+\infty,\ \ \mbox{as}\
k\to+\infty.$
This is impossible. Thus, $\\{v_{n}(x)\\}$ is bounded for any $x\in V$, and
therefore $\\{v_{n}\\}$ is bounded in $W^{1,2}(V)$. Applying the Sobolev
embedding theorem(Lemma 2.1), there exists a subsequence
$\\{v_{n_{l}}\\}\subset\\{v_{n}\\}$ and $v^{*}\in W^{1,2}(V)$ such that
$v_{n_{l}}\to v^{*}$ as $l\to+\infty$. One can easily see that
$v^{*}\in\mathcal{A}$. Hence, one has
$\displaystyle J_{0}=J(v^{*}).$
In the following, we prove that $v^{*}$ is a critical point for $J$ in
$W^{1,2}(V)$.
For any $\psi\in W^{1,2}(V)$, $\tau>0$, let
$\displaystyle v^{\tau}=v^{*}+\tau\psi+{\psi}^{\tau},$ (3.10)
with ${\psi}^{\tau}=\\{v^{*}+\tau\psi-\underline{v}\\}_{-}\geq 0\ \ a.e.\
\mbox{in}\ V$. Then, one has
$\displaystyle v^{\tau}\geq\underline{v}\ \ \ \ a.e.\ \mbox{in}\ V.$ (3.11)
This implies that $v^{\tau}\in\mathcal{A}$. Hence, we have
$\displaystyle 0$ $\displaystyle\leq$
$\displaystyle\frac{J(v^{\tau})-J(v^{*})}{\tau}$ $\displaystyle=$
$\displaystyle\frac{1}{2\tau}\int_{V}({|\nabla v^{\tau}|}^{2}-|\nabla
v^{*}|^{2})+\frac{\lambda}{4\tau}\int_{V}\\{[e^{F(u_{0}+v^{\tau})}-1]^{4}-[e^{F(u_{0}+v^{*})}-1]^{4}\\}+\frac{4\pi
M}{|V|\tau}\int_{V}(v^{\tau}-v^{*})$ $\displaystyle=$
$\displaystyle\frac{1}{\tau}\int_{V}(\nabla
v^{*}\cdot\nabla(\tau\psi+{\psi}^{\tau}))+\frac{1}{2\tau}\int_{V}{|\nabla(\tau\psi+{\psi}^{\tau})|}^{2}-\lambda\int_{V}{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi$
$\displaystyle\ \
+\frac{\lambda}{4\tau}\int_{V}\left[\\{[e^{F(u_{0}+v^{\tau})}-1]^{4}-[e^{F(u_{0}+v^{*})}-1]^{4}\\}+4\tau{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi\right]$
$\displaystyle\ \ \ +\frac{4\pi M}{|V|}\int_{V}\psi+\frac{4\pi
M}{|V|\tau}\int_{V}{\psi}^{\tau}.$
Thus,
$\displaystyle\int_{V}\nabla
v^{*}\cdot\nabla\psi-\lambda\int_{V}{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi+\frac{4\pi
M}{|V|}\int_{V}\psi$ $\displaystyle\geq$
$\displaystyle-\frac{1}{\tau}\int_{V}\nabla
v^{*}\cdot\nabla{\psi}^{\tau}-\frac{1}{2\tau}\int_{V}{|\nabla(\tau\psi+{\psi}^{\tau})|}^{2}-\frac{\lambda}{4\tau}\int_{V}[e^{F(u_{0}+v^{\tau})}-1]^{4}-[e^{F(u_{0}+v^{*})}-1]^{4}$
$\displaystyle\ \
+4\tau{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi+4{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}{\psi}^{\tau}$
$\displaystyle\ \
+\frac{\lambda}{\tau}\int_{V}{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}{\psi}^{\tau}-\frac{4\pi
M}{|V|\tau}\int_{V}{\psi}^{\tau}.$
By Taylor expansion, one has
$\displaystyle\\!\\!\\!\\!\\!\\!\\!\\!\\!-\frac{\lambda}{4\tau}\int_{V}[e^{F(u_{0}+v^{\tau})}-1]^{4}-[e^{F(u_{0}+v^{*})}-1]^{4}+4\tau{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi$
(3.12) $\displaystyle\ \ \ \ \
+4{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}{\psi}^{\tau}=O(\tau).$
It follows from the fact that
$\frac{1}{2\tau}\int_{V}{|\nabla(\tau\psi+{\psi}^{\tau})|}^{2}=O(\tau)$ and
(3.12) that
$\displaystyle\int_{V}\nabla
v^{*}\cdot\nabla\psi-\lambda\int_{V}{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi+\frac{4\pi
M}{|V|}\int_{V}\psi$ $\displaystyle\geq O(\tau)-\frac{1}{\tau}\int_{V}(\nabla
v^{*}-\nabla\underline{v})\cdot\nabla{\psi}^{\tau}-\frac{1}{\tau}\int_{V}\nabla\underline{v}\cdot\nabla{\psi}^{\tau}+\frac{\lambda}{\tau}\int_{V}{e^{F(u_{0}+\underline{v})}[e^{F(u_{0}+\underline{v})}-1]^{2}}{\psi}^{\tau}$
$\displaystyle\ \ \ \ \ \ \ \ \ \ -\frac{4\pi
M}{|V|\tau}\int_{V}{\psi}^{\tau}+\frac{\lambda}{\tau}\int_{V}\left\\{{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}-{e^{F(u_{0}+\underline{v})}[e^{F(u_{0}+\underline{v})}-1]^{2}}\right\\}{\psi}^{\tau}$
$\displaystyle\geq O(\tau)-\frac{1}{\tau}\int_{V}(\nabla
v^{*}-\nabla\underline{v})\cdot\nabla{\psi}^{\tau}+\frac{\lambda}{\tau}\int_{V}\left\\{{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}-{e^{F(u_{0}+\underline{v})}[e^{F(u_{0}+\underline{v})}-1]^{2}}\right\\}{\psi}^{\tau},$
$\displaystyle:=O(\tau)+I_{1}+I_{2},$
where the last inequality follows by the fact that $\underline{v}$ is the
subsolution of the equation (1.1).
Denote
$\displaystyle V_{0}=\\{x\in V|v^{*}(x)=\underline{v}(x)\\}\ \ \ \mbox{and}\ \
\ V_{1}=\\{x\in V|v^{*}(x)>\underline{v}(x)\\}.$
One can see that ${\psi}^{\tau}(x)=0$ for sufficiently small $\tau$ when $x\in
V_{1}$. Thus, one has
$\displaystyle I_{1}$ $\displaystyle=$
$\displaystyle-\frac{1}{\tau}\int_{V}(\nabla
v^{*}-\nabla\underline{v})\cdot\nabla{\psi}^{\tau}$ $\displaystyle=$
$\displaystyle-\frac{1}{\tau}\sum_{x\in
V}\sum_{y\sim{x}}\omega_{xy}{[(v^{*}-\underline{v})(y)-(v^{*}-\underline{v})(x)]}({\psi}^{\tau}(y)-{\psi}^{\tau}(x))$
$\displaystyle=$ $\displaystyle-\frac{1}{\tau}\sum_{x\in
V_{0}}\left\\{[\sum_{y\sim{x},y\in V_{0}}+\sum_{y\sim{x},y\in
V_{1}}]\omega_{xy}{[(v^{*}-\underline{v})(y)-(v^{*}-\underline{v})(x)]}({\psi}^{\tau}(y)-{\psi}^{\tau}(x))\right\\}$
$\displaystyle\ \ \ \ -\frac{1}{\tau}\sum_{x\in
V_{1}}\left\\{[\sum_{y\sim{x},y\in V_{0}}+\sum_{y\sim{x},y\in
V_{1}}]\omega_{xy}{[(v^{*}-\underline{v})(y)-(v^{*}-\underline{v})(x)]}({\psi}^{\tau}(y)-{\psi}^{\tau}(x))\right\\}$
$\displaystyle=$ $\displaystyle-\frac{1}{\tau}\sum_{x\in
V_{0}}\sum_{y\sim{x},y\in
V_{1}}\omega_{xy}{[(v^{*}-\underline{v})(y)-(v^{*}-\underline{v})(x)]}({\psi}^{\tau}(y)-{\psi}^{\tau}(x))$
$\displaystyle\ \ \ \ -\frac{1}{\tau}\sum_{x\in V_{1}}\sum_{y\sim{x},y\in
V_{0}}\omega_{xy}{[(v^{*}-\underline{v})(y)-(v^{*}-\underline{v})(x)]}({\psi}^{\tau}(y)-{\psi}^{\tau}(x))$
$\displaystyle\geq$ $\displaystyle 0$
for sufficiently small $\tau$.
Similarly, one can obtain that
$\displaystyle
I_{2}=\frac{\lambda}{\tau}\int_{V}\left\\{{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}-{e^{F(u_{0}+\underline{v})}[e^{F(u_{0}+\underline{v})}-1]^{2}}\right\\}{\psi}^{\tau}=0.$
(3.14)
Therefore,
$\displaystyle\int_{V}\nabla
v^{*}\cdot\nabla\psi-\lambda\int_{V}{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi+\frac{4\pi
M}{|V|}\int_{V}\psi\geq 0\ \ \mbox{as}\ \tau\to 0^{+}.$ (3.15)
This implies that $<J^{\prime}(v^{*}),\psi>\ \geq 0$ for any $\psi\in
W^{1,2}(V)$. Replacing $\psi$ with $-\psi$ we obtain the reverse inequality,
i.e. $<J^{\prime}(v^{*}),\psi>\ \leq 0$. Hence, we obtain that $v^{*}$ is a
critical point for $J$ in $W^{1,2}(V)$. ∎
###### Lemma 3.3.
If $\lambda>0$ is sufficiently large, then (1.1) has a solution on $G$.
###### Proof..
Choose ${\underline{u}}=-c$ to be a constant function. Then
$\Delta\underline{u}=0.$ (3.16)
If $\lambda$ is sufficient large, one has
${-\lambda}{{e^{F(\underline{u})}}{[{e^{F(\underline{u})}}-1]^{2}}}+4\pi\sum_{j=1}^{M}{\delta_{p_{j}}}\leq
0.$ (3.17)
Therefore,
$\Delta\underline{u}\geq{-\lambda}{{e^{F(\underline{u})}}{[{e^{F(\underline{u})}}-1]^{2}}}+4\pi\sum_{j=1}^{M}{\delta_{p_{j}}}.$
(3.18)
This implies that $\underline{u}$ is a subsolution of (1.1). It follows from
Lemma 3.2 that the equation (1.1) has a solution on $G$ for $\lambda$
sufficiently large.
This completes the proof of the lemma. ∎
###### Lemma 3.4.
There is a critical value $\lambda_{c}$ depending on $G$ satisfying
$\lambda_{c}\geq\frac{27\pi M}{|V|}$ (3.19)
such that when $\lambda>\lambda_{c}$, the equation (1.1) has a solution
$u_{\lambda}$.
###### Proof..
Denote
$\Lambda=\\{\lambda>0|\lambda\ \mbox{is such that (\ref{one}) has a
solution}\\}.$ (3.20)
We show that $\Lambda$ is an interval. If $\hat{\lambda}\in\Lambda$, denote by
$\hat{u}=u_{0}+\hat{v}$ a solution of (1.1) at $\lambda=\hat{\lambda}$, where
$\hat{v}$ is the corresponding solution of the equation (2.7). If
$\lambda\geq\hat{\lambda},$ one has
$\displaystyle\Delta{\hat{v}}$
$\displaystyle={-\hat{\lambda}}{e^{F({u_{0}+\hat{v}})}}{[{e^{F({u_{0}+\hat{v}})}}-1]^{2}}+\frac{4\pi
M}{|V|}$ (3.21)
$\displaystyle\geq{-\lambda}{e^{F({u_{0}+\hat{v}})}}{[{e^{F({u_{0}+\hat{v}})}}-1]^{2}}+\frac{4\pi
M}{|V|}.$
This implies that ${\hat{v}}$ is a subsolution of the equation (2.7) on $G$
for any $\lambda\geq\hat{\lambda}$. Then by Lemma 3.2, one can obtain the
existence of the solutions $v_{\lambda}$ to the equation (2.7) for any
$\lambda\geq\hat{\lambda}$. Thus, the equation (1.1) has a solution for any
$\lambda\geq\hat{\lambda}$. It implies that
$[\hat{\lambda},+\infty)\subset\Lambda.$
Set
${\lambda}_{c}=\mbox{inf}\\{\lambda|\lambda\in\Lambda\\}.$ (3.22)
It follows from (3.5) that
$\lambda\geq\frac{27\pi M}{|V|}\ \ \mbox{for any }\lambda>\lambda_{c}.$
Taking the limit, one can arrive at
${\lambda}_{c}\geq\frac{27\pi M}{|V|}.$
∎
In the following, we show that the existence of the solutions to the equation
(1.1) on $G$ if $\lambda=\lambda_{c}.$
###### Lemma 3.5.
If $\lambda=\lambda_{c}$, then (1.1) has a solution $u_{\lambda}$.
###### Proof..
Choose a sequence ${\lambda}_{n}\to{\lambda}_{c}$ as $n\to+\infty$. After
passing to a subsequence of $\\{\lambda_{n}\\}$, we may assume that
$u_{\lambda_{n}}(x)$ converges to a limit point in $[-\infty,0]$ for any $x\in
V$, and we denote this limit by $u(x)$. We prove that $u(x)\in(-\infty,0]$ for
any $x\in V$. Suppose not. Then we have two cases:
_Case (i)_.
$\displaystyle{\lim_{n\to\infty}}{u_{\lambda_{n}}}(x)=-\infty\ \mbox{ for any
}x\in V.$ (3.23)
_Case (ii)_. There exists $x\in V$ such that
${\lim_{n\to\infty}}{u_{\lambda_{n}}}(x)$ exists in $(-\infty,0]$.
If _Case (i)_ holds, when ${\lambda_{n}\to\lambda_{c}}$, summing the two sides
of (1.1) yields that the left hand side of (1.1) approaches $0$ and the right
hand side remains at least $2\pi$. This leads to a contradiction.
If _Case (ii)_ holds, we split $V$ into two subsets $V_{1}$ and $V_{2}$, where
$\displaystyle V_{1}$ $\displaystyle=\left\\{x\in
V\Big{|}\lim_{n\to\infty}{u_{\lambda_{n}}}(x)=-\infty\right\\}$ $\displaystyle
V_{2}$ $\displaystyle=\left\\{x\in
V\Big{|}\lim_{n\to\infty}{u_{\lambda_{n}}}(x)\ \mbox{exists in
}(-\infty,0]\right\\}.$ (3.24)
If $V_{1}$ is empty, then Lemma 3.5 holds. In the following, we consider that
both $V_{1}$ and $V_{2}$ are non-empty sets.
Since $G$ is a connected finite graph, one may choose $x_{2}\in V_{2}$ such
that there exists $x_{1}\in V_{1}$ satisfying $x_{1}\sim x_{2}$. Then
$\displaystyle\Delta{u_{\lambda_{n}}}(x_{2})$
$\displaystyle=\frac{1}{\mu(x_{2})}\sum_{y\sim{x_{2}}}\omega_{y{x_{2}}}[{u_{\lambda_{n}}}(y)-{u_{\lambda_{n}}}(x_{2})]$
(3.25) $\displaystyle=\frac{1}{\mu(x_{2})}\sum_{y\sim{x_{2}},y\in
V_{1}}\omega_{y{x_{2}}}[{u_{\lambda_{n}}}(y)-{u_{\lambda_{n}}}(x_{2})]+\frac{1}{\mu(x_{2})}\sum_{y\sim{x_{2}},y\in
V_{2}}\omega_{y{x_{2}}}[{u_{\lambda_{n}}}(y)-{u_{\lambda_{n}}}(x_{2})]$
$\displaystyle:=I_{1}+I_{2}.$
Now we calculate $I_{1}$ and $I_{2}$ respectively. It follows from (3) that
$I_{1}=\frac{1}{\mu(x_{2})}\sum_{y\sim{x_{2}},y\in
V_{1}}\omega_{y{x_{2}}}[{u_{\lambda_{n}}}(y)-{u_{\lambda_{n}}}(x_{2})]\to-\infty\
\ \mbox{as}\ n\to\infty.$ (3.26)
For $I_{2}$, since $x_{2},y\in V_{2}$, the limit of ${u_{\lambda_{n}}}$ as
${\lambda_{n}}$ tends to $\lambda_{c}$ exists. One can obtain that
$\frac{1}{\mu(x_{2})}\sum_{y\sim{x_{2}},y\in
V_{2}}\omega_{y{x_{2}}}[{u_{\lambda_{n}}}(y)-{u_{\lambda_{n}}}(x_{2})]$ (3.27)
is bounded. Taking the limit ${\lambda_{n}}\to\lambda_{c}$, one has
$\Delta{u_{\lambda_{n}}}(x_{2})\to-\infty.$ (3.28)
However, it follows from (1.1) that $\Delta{u_{\lambda_{n}}}(x_{2})$ is
finite, which is a contradiction with (3.28). This completes the proof of the
lemma. ∎
Combining Lemma 3.4 and Lemma 3.5, one can obtain that the equation (1.1) has
a solution $u_{\lambda}$ on $G$ when $\lambda\geq\lambda_{c}$. Hence, the
statement (i) of Theorem 2.1 is proved.
In the following, with the aid of Lemma 3.2, we prove that there exists a
solution $\tilde{u}_{\lambda}$ to the equation (1.1) satisfying
$\tilde{u}_{\lambda}$ is increasing with respect to $\lambda$.
###### Lemma 3.6.
There is a critical value $\lambda_{c}$ depending on $G$ satisfying
$\lambda_{c}\geq\frac{27\pi M}{|V|}$
such that equation (1.1) has a solution $\tilde{u}_{\lambda}$ on $G$ for any
$\lambda\geq\lambda_{c}$, and
$\displaystyle\tilde{u}_{\lambda_{1}}\geq\tilde{u}_{\lambda_{2}}\ \
\mbox{when}\ \lambda_{1}>\lambda_{2}.$ (3.29)
###### Proof..
Equation (1.1) has a solution $u_{\lambda}$ on $G$ when
$\lambda\geq\lambda_{c}$, and we denote the set of solvability parameters by
$\tilde{\Lambda}:=[{\lambda}_{c},+\infty)$. We fix a solution of equation
(1.1) with parameter $\lambda=\lambda_{c}$, and denote it by
$u_{\lambda_{c}}$. For any fixed $m\in\mathbb{N}$, let
$\displaystyle\tilde{\Lambda}=\bigcup_{k=0}^{\infty}\tilde{\Lambda}_{km},$
where
$\displaystyle\tilde{\Lambda}_{km}:=[{\lambda}_{c}+\frac{k}{2^{m}},{\lambda}_{c}+\frac{k+1}{2^{m}}]\
\ (k\in\mathbb{N}).$
Note that for any $\lambda>\lambda_{c}$, $u_{\lambda_{c}}$ is a subsolution of
the equation (1.1) with parameter $\lambda$. It then follows from the argument
of Lemma 3.2 that for any
$\lambda\in({\lambda}_{c},{\lambda}_{c}+\frac{1}{2^{m}}]$, there exists a
solution $u_{\lambda,m}$ of (1.1) such that
$\displaystyle u_{\lambda,m}\geq u_{{\lambda}_{c}},\ \ \
\lambda\in\tilde{\Lambda}_{0m}.$
Now consider the solution $u_{{\lambda}_{c}+\frac{1}{2^{m}},m}$. Similarly,
since $u_{{\lambda}_{c}+\frac{1}{2^{m}},m}$ is a subsolution of equation (1.1)
with parameter $\lambda>\lambda_{c}+\frac{1}{2^{m}}$, by the argument of Lemma
3.2, one can find a solution $u_{\lambda,m}$ of the equation (1.1) for any
$\lambda\in({\lambda}_{c}+\frac{1}{2^{m}},{\lambda}_{c}+\frac{2}{2^{m}}]$ such
that
$\displaystyle u_{\lambda,m}\geq u_{{\lambda}_{c}+\frac{1}{2^{m}},m},\ \ \
\lambda\in\tilde{\Lambda}_{1m}.$
Repeating the process above yields that for any
$\lambda\in[{\lambda}_{c},+\infty)$, there exists a solution $u_{\lambda,m}$
of equation (1.1) with parameter $\lambda$, and if
$\lambda\in\tilde{\Lambda}_{km}$ for some $k\in\\{0,1,2,...\\}$, then
$\displaystyle u_{\lambda,m}\geq u_{{\lambda}_{c}+\frac{k}{2^{m}},m}.$
Here, for convenience, we let $u_{\lambda_{c},m}=u_{\lambda_{c}}$. Then we
have constructed an increasing sequence
$\displaystyle u_{\lambda_{c},m}\leq u_{\lambda_{c}+\frac{1}{2^{m}},m}\leq
u_{\lambda_{c}+\frac{2}{2^{m}},m}\leq\cdots$ (3.30)
for any $m\in\mathbb{N}$.
Now define
$\displaystyle Q:=\left\\{{\lambda}_{c}+\frac{j}{2^{m}}\Big{|}m\in\mathbb{N},\
j\in\mathbb{N}\ \mbox{odd}\right\\}.$ (3.31)
We rearrange the elements in the countable set $Q$ and list them as
$Q=\\{q_{l}:l\in\mathbb{N}\\}$.
For any $q_{l}\in Q$, we have constructed a sequence of solutions
$\\{u_{q_{l},m}\\}_{m\in\mathbb{N}}$ of equation (1.1) with parameter
$\lambda=q_{l}$. Since the functions $u_{q_{l},m}$ $(l,m\in\mathbb{N})$ are
defined on the finite connected graph $G=(V,E)$ and
$\displaystyle u_{\lambda_{c}}\leq u_{q_{l},m}\leq 0\ \ (\forall
l,m\in\mathbb{N})$
there exists a subsequence $\\{n_{i}\\}\subset\mathbb{N}$ such that, for any
$q_{l}\in Q$, $\\{u_{q_{l},n_{i}}\\}$ converges as $i\to\infty$.
Define
$\displaystyle u_{q_{l}}:=\lim_{i\to\infty}u_{q_{l},n_{i}},$
and let
$\displaystyle U=\\{u_{q_{l}}|q_{l}\in Q\\}.$ (3.32)
It follows from (3.30) that if $q_{l_{1}},q_{l_{2}}\in Q$,
$q_{l_{1}}<q_{l_{2}}$ and $i$ is sufficiently large, then
$\displaystyle u_{q_{l_{1}},n_{i}}\leq u_{q_{l_{2}},n_{i}}$
and hence by taking limits as $i\to\infty$ we have
$\displaystyle u_{q_{l_{1}}}\leq u_{q_{l_{2}}}\ \ (q_{l_{1}}<q_{l_{2}}).$
(3.33)
This implies that $\\{u_{\lambda}:\lambda\in Q\\}$ is an increasing sequence
with respect to the parameter $\lambda\in Q$.
Now for any $\lambda\geq\lambda_{c}$, there exists an increasing sequence
$\\{q_{l}\\}\subset Q$ such that $q_{l}\to\lambda$. The increasing sequence
$\\{u_{q_{l}}\\}$ then has a limit and we define
$\displaystyle\tilde{u}_{\lambda}:=\lim_{l\to\infty}u_{q_{l}}.$ (3.34)
Then $\tilde{u}_{\lambda}$ is a solution of equation (1.1) for the parameter
$\lambda\in\tilde{\Lambda}$. Let
$\displaystyle\bar{U}=\\{\tilde{u}_{\lambda}|\lambda\in[{\lambda}_{c},+\infty)\\}.$
(3.35)
It follows from (3.33) and (3.34) that if $\lambda_{1}>\lambda_{2}$, then
$\displaystyle\tilde{u}_{\lambda_{1}}\geq\tilde{u}_{\lambda_{2}}.$ (3.36)
Hence, $\tilde{u}_{\lambda}$ is increasing with respect to
$\lambda\in[\lambda_{c},\infty)$. This completes the proof of the lemma. ∎
By Lemma 3.6, the statement (ii) of Theorem 2.1 is proved.
From Lemma 3.6 and the maximum principle, we can obtain that
$\tilde{u}_{\lambda}>\tilde{u}_{{\lambda}_{c}}$ when $\lambda>\lambda_{c}$.
Thus, $\tilde{v}_{\lambda}(=\tilde{u}_{\lambda}-u_{0})$ is the local minimum
point of the functional $J$ for any $\lambda>\lambda_{c}$. If $v_{\lambda}$
obtained by Lemma 3.4 is different from $\tilde{v}_{\lambda}$. Then we have
already found a second solution. If $v_{\lambda}$ is equal to
$\tilde{v}_{\lambda}$ as the local minimum of the functional $J$, there exists
${\rho}_{\lambda}$ such that
$\displaystyle J(v_{\lambda})\leq J(v)\ \ \mbox{for any}\ \
\|v-v_{\lambda}\|\leq{\rho}_{\lambda}.$ (3.37)
Then we have the following two cases.
Case (i). For any $\rho\in(0,{\rho}_{\lambda})$, one has
$\displaystyle\inf_{\|v-v_{\lambda}\|=\rho}J=J(v_{\lambda})(:={\eta}_{\lambda}).$
(3.38)
Thus, there is a local minimum $v_{\rho}$ of $J$ satisfying
$\|v_{\rho}-v_{\lambda}\|=\rho$ and $J(v_{\lambda})={\eta}_{\lambda}$ for any
$\rho\in(0,{\rho}_{\lambda})$. Therefore, one can obtain a one-parameter
family of solutions to the equation (1.1).
Case (ii). There exists $r_{\lambda}\in(0,{\rho}_{\lambda})$ such that
$J(v_{\lambda})<\inf_{\|w-v_{\lambda}\|=r_{\lambda}}J(w).$ (3.39)
In the following, we prove that there is a second solution of (1.1) on $G$ for
$\lambda>\lambda_{c}$ by Mountain Pass theorem. We first show that $J(v)$
satisfies the Palais-Smale condition in order to apply Mountain Pass theorem
for the functional $J$.
###### Lemma 3.7.
Every sequence $\\{v_{n}\\}\subset W^{1,2}(V)$ admits a convergent subsequence
if $\\{v_{n}\\}\subset W^{1,2}(V)$ satisfies
$\displaystyle(1)\ J(v_{n})\to c\ \mbox{for some constant}\ c,\ as\
n\to+\infty,$ (3.40) $\displaystyle(2)\ \|J^{\prime}(v_{n})\|\to 0\ \mbox{in}\
W^{1,2}(V),\ as\ n\to+\infty.$ (3.41)
###### Proof..
It follows from (3.41) that
$|\int_{V}\nabla{v_{n}}\cdot\nabla\varphi-\lambda\int_{V}e^{F(u_{0}+v_{n})}[e^{F(u_{0}+v_{n})}-1]^{2}\varphi+\frac{4\pi
M}{|V|}\int_{V}\varphi|\leq\varepsilon_{n}\|\varphi\|,$ (3.42)
where $\varphi\in W^{1,2}(V)$ and $\varepsilon_{n}\to 0$ as $n\to+\infty$. By
taking $\varphi=-1$, one has
$0<c\leq\int_{V}e^{F(u_{0}+v_{n})}[e^{F(u_{0}+v_{n})}-1]^{2}\leq C,$ (3.43)
where $c$ and $C$ are constants depending only on $\lambda$.
We claim that $\\{v_{n}(x)\\}$ is bounded for any $x\in V$. Suppose that the
claim is not true, there exists a point $x^{k}\in V$ and a subsequence
$\\{v_{n_{k}}(x^{k})\\}\subset\\{v_{n}\\}$ tends to $+\infty$ or $-\infty$ as
$k\to+\infty$. Without loss of generality, we assume that
$\\{v_{n_{k}}(x^{k})\\}$ tends to $+\infty$ as $k\to+\infty$.
In the following, for the subsequence $\\{v_{n_{k}}\\}$, we first show that
there exists a point $\hat{x}\in V$ such that $\\{v_{n_{k}}(\hat{x})\\}$ is
bounded. If not, one can obtain that $\\{v_{n_{k}}(y)\\}$ tends to $+\infty$
or $-\infty$ for any point $y\in V$ as $k\to+\infty$. Therefore, one can
derive that
$\int_{V}e^{F((u_{0}+v_{n_{k}})(y))}[e^{F({(u_{0}+v_{n_{k}})(y)})}-1]^{2}\rightarrow
0,\ \ \mbox{as}\ k\rightarrow+\infty,$ (3.44)
which contradicts with (3.43).
Let
$L_{k}:=\max\limits_{V}|v_{n_{k}}(x)|=v_{n_{k}}(x^{k}).$ (3.45)
From (3.40), one has
$\displaystyle J(v_{n_{k}})$ $\displaystyle=\frac{1}{2}\int_{V}{|\nabla
v_{n_{k}}|}^{2}+\frac{\lambda}{4}\int_{V}[e^{F(u_{0}+v_{n_{k}})}-1]^{4}+\frac{4\pi
M}{|V|}\int_{V}v_{n_{k}}$ $\displaystyle=c+o_{n}(1).$ (3.46)
Combining (2.4) and (3) yields that
$c\geq\frac{1}{2}\sum_{x\in
V}\sum_{y\sim{x}}\omega_{xy}{[v_{n_{k}}(y)-v_{n_{k}}(x)]}^{2}-4\pi ML_{k}.$
(3.47)
It implies that
$|v_{n_{k}}(x)-v_{n_{k}}(y)|\leq C\sqrt{c+4\pi ML_{k}},\ x\sim y\ ,\mbox{for
any }x,\ y\in V,$ (3.48)
where $C$ is a constant.
Since the graph $G$ is finite and connected, there is a path
$\\{x_{i}\\}_{i=0}^{l}\subset G$ between $\hat{x}$ and $x^{k}$ for
$l\in\mathbb{N}$, that is
$\displaystyle\hat{x}=x_{0}\sim x_{1}\sim x_{2}\sim\cdots\sim x_{l}=x^{k}.$
(3.49)
Combining (3.48) and (3.49), one can obtain that
$\displaystyle v_{n_{k}}(\hat{x})$ $\displaystyle\geq
v_{n_{k}}(x^{k})-(l-1)C\sqrt{c+4\pi ML_{k}}$
$\displaystyle=L_{k}-(l-1)C\sqrt{c+4\pi ML_{k}}$ $\displaystyle\to+\infty,\ \
\mbox{as}\ k\rightarrow+\infty.$ (3.50)
This is a contradiction with the conclusion that $\\{v_{n_{k}}(\hat{x})\\}$ is
bounded. Therefore, $\\{v_{n}(x)\\}$ is bounded for any $x\in V$. This implies
that $\\{v_{n}(x)\\}$ is bounded in $W^{1,2}(V)$. Applying Sobolev embedding
theorem(Lemma 2.1), there exists a subsequence ${v_{n_{k}}(x)}$ converges to
some function $v(x)$ in $W^{1,2}(V)$. Hence, the Palais-Smale condition holds.
∎
For $Q>0$, one has
$\displaystyle J(v_{\lambda}-Q)-J(v_{\lambda})$ $\displaystyle=$
$\displaystyle\frac{\lambda}{4}\int_{V}[e^{F(u_{0}+v_{\lambda}-Q)}-1]^{4}-\frac{\lambda}{4}\int_{V}[e^{F(u_{0}+v_{\lambda})}-1]^{4}-4\pi
MQ$ $\displaystyle\to$ $\displaystyle-\infty,\ \ \mbox{as}\ Q\to+\infty.$
Thus, one has
$\displaystyle J(v_{\lambda}-Q_{0})<J(v_{\lambda})\ \ \mbox{for some}\
Q_{0}>r_{\lambda}>0\ \mbox{sufficiently large}.$ (3.51)
Let
$\displaystyle\Gamma:=\\{\gamma\in
C([0,1],W^{1,2}(V))|\gamma{(0)}=v_{\lambda},\
\gamma{(1)}=v_{\lambda}-Q_{0}\\},$
and set
$\displaystyle c=\inf_{\gamma\in\Gamma}\max_{0\leq t\leq 1}J(\gamma(t)).$
It follows from (3.39) that $c>J(v_{\lambda})$. From Lemma 3.7, applying
Mountain Pass theorem(Lemma 2.2), we conclude that $c$ defines a critical
value of $J$. Since $c>J(v_{\lambda})$, the corresponding critical point
yields to a second solution for (2.7). Therefore, there exists a second
solution to the equation (1.1). Hence, the statement (iii) of Theorem 2.1 is
proved.
This completes the proof of Theorem 2.1.
## 4 The Proof of Theorem 2.2
In this section, we prove Theorem 2.2. From the analysis in Section 3, we know
that $\tilde{v}_{\lambda}$ is a local minimum of the functional $J(v)$ for
$\lambda>\lambda_{c}$. In the following, we show that $\tilde{v}_{\lambda}$ is
a strict local minimum of the functional $J$ for almost everywhere
$\lambda>\lambda_{c}$.
###### Proof..
It follows from Lemma 3.6 that $\tilde{v}_{\lambda}$ is increasing with
respect to $\lambda$ for $\lambda>\lambda_{c}$. This guaranties that
$\bar{v}_{\lambda}:=\frac{d\tilde{v}_{\lambda}}{d\lambda}$ (4.1)
is well-defined for almost everywhere $\lambda>\lambda_{c}$, and therefore
$\bar{v}_{\lambda}\geq 0\ a.e.$ in $V$.
Taking the derivative of both sides of the equation (2.7) with respect to
$\lambda$ yields that
$\Delta\bar{v}_{\lambda}=-e^{F(u_{0}+\tilde{v}_{\lambda})}[e^{F(u_{0}+\tilde{v}_{\lambda})}-1]^{2}-\lambda
e^{F(u_{0}+\tilde{v}_{\lambda})}[1-3e^{F(u_{0}+\tilde{v}_{\lambda})}]\cdot\bar{v}_{\lambda}.$
(4.2)
From the fact that $\tilde{v}_{\lambda}$ is the critical point of $J(v)$, one
can derive that
$0=<J^{\prime}(\tilde{v}_{\lambda}),\varphi>=\int_{V}\nabla\tilde{v}_{\lambda}\cdot\nabla\varphi-\lambda\int_{V}e^{F(u_{0}+\tilde{v}_{\lambda})}[e^{F(u_{0}+\tilde{v}_{\lambda})}-1]^{2}\varphi+\frac{4\pi
M}{|V|}\int_{V}\varphi,$ (4.3)
and
$\displaystyle<J^{\prime\prime}(\tilde{v}_{\lambda})\psi,\varphi>$
$\displaystyle=\int_{V}\nabla\psi\cdot\nabla\varphi-\lambda\int_{V}e^{F(u_{0}+\tilde{v}_{\lambda})}[1-3e^{F(u_{0}+\tilde{v}_{\lambda})}]\varphi\psi$
(4.4)
for any $\varphi,\psi\in W^{1,2}(V)$.
From (4.4), one can see that
$J^{\prime\prime}(\tilde{v}_{\lambda})h=-\Delta h-\lambda
e^{F(u_{0}+\tilde{v}_{\lambda})}[1-3e^{F(u_{0}+\tilde{v}_{\lambda})}]h\ \
\mbox{for any }h\in W^{1,2}(V).$ (4.5)
Then
$<J^{\prime\prime}(\tilde{v}_{\lambda})h,g>=<J^{\prime\prime}(\tilde{v}_{\lambda})g,h>\
\mbox{for any }h,g\in W^{1,2}(V).$
This implies that $J^{\prime\prime}(\tilde{v}_{\lambda})$ is a symmetric and
linear operator from $W^{1,2}(V)$ to $W^{1,2}(V)$.
Denote $\mu_{1},\mu_{2},\cdots,\mu_{|V|}$ be the eigenvalues of
$J^{\prime\prime}(\tilde{v}_{\lambda})$ satisfying
$\mu_{1}\leq\mu_{2}\leq\cdots\leq\mu_{|V|}$ and
${\theta}_{1},\dots,{\theta}_{|V|}$ be the related eigenvectors of
$J^{\prime\prime}(\tilde{v}_{\lambda})$, i.e.
$J^{\prime\prime}(\tilde{v}_{\lambda}){\theta}_{i}=\mu_{i}{\theta}_{i},$
where $<{\theta}_{i},{\theta}_{j}>=\delta_{ij},$ for any $i,j=1,2,\cdots,|V|$.
Then the eigenvalue
$\mu_{1}=\inf_{h\in{W^{1,2}(V)}}\frac{<J^{\prime\prime}(\tilde{v}_{\lambda})h,h>}{<h,h>}.$
In the following, we prove that $\mu_{1}>0$.
Noting that
$\displaystyle<J^{\prime\prime}(\tilde{v}_{\lambda})h,h>$
$\displaystyle=\int_{V}|\nabla
h|^{2}-\lambda\int_{V}e^{F(u_{0}+\tilde{v}_{\lambda})}[1-3e^{F(u_{0}+\tilde{v}_{\lambda})}]h^{2}$
(4.6) $\displaystyle=\sum_{x\in
V}\sum_{y\sim{x}}\omega_{xy}{[h(y)-h(x)]}^{2}-\lambda\int_{V}e^{F(u_{0}+\tilde{v}_{\lambda})}[1-3e^{F(u_{0}+\tilde{v}_{\lambda})}]h^{2}.$
Let $\tilde{h}=(|h_{1}|,|h_{2}|,\dots,|h_{|V|}|)$ for any
$h=(h_{1},h_{2},\dots,h_{|V|})\in W^{1,2}(V)$, it follows from (4.6) that
$<J^{\prime\prime}(\tilde{v}_{\lambda})\tilde{h},\tilde{h}>\ \leq\
<J^{\prime\prime}(\tilde{v}_{\lambda})h,h>.$ (4.7)
Thus, one can obtain that all of the components of $\theta_{1}$ have the same
sign. Without loss of generality, we assume that they are all non-negative,
i.e.
$\displaystyle\theta_{1,x_{i}}\geq 0,\ \ \mbox{for}\ \ 1\leq i\leq|V|,\
x_{i}\in V.$ (4.8)
Taking $\psi=\bar{v}_{\lambda}$, it follows from (4.4) that
$\displaystyle<J^{\prime\prime}(\tilde{v}_{\lambda})\bar{v}_{\lambda},\varphi>=\int_{V}e^{F(u_{0}+\tilde{v}_{\lambda})}[e^{F(u_{0}+\tilde{v}_{\lambda})}-1]^{2}\varphi$
(4.9)
for any $\varphi\in W^{1,2}(V)$. Let $\varphi={\theta}_{1}$, one has
$<J^{\prime\prime}(u_{\lambda})\bar{v}_{\lambda},{\theta}_{1}>=\int_{V}e^{F(u_{0}+\tilde{v}_{\lambda})}[e^{F(u_{0}+\tilde{v}_{\lambda})}-1]^{2}{\theta_{1}}>0.$
(4.10)
Since $\bar{v}_{\lambda}\in W^{1,2}(V)$, then $\bar{v}_{\lambda}$ can be
represented by
$\bar{v}_{\lambda}=\sum_{i=1}^{|V|}a_{i}{\theta_{i}},$
where $a_{i}=<\bar{v}_{\lambda},\theta_{i}>$, $1\leq i\leq|V|$. One can see
that $a_{1}\geq 0$, and
$0<\
<J^{\prime\prime}(\tilde{v}_{\lambda})\bar{v}_{\lambda},{\theta_{1}}>=a_{1}\mu_{1}.$
Thus, one has
$\displaystyle\mu_{1}>0.$ (4.11)
Therefore, $\tilde{v}_{\lambda}$ is the strictly minimum of
$J(\tilde{v}_{\lambda})$ for almost everywhere $\lambda>\lambda_{c}$. This
implies that for almost everywhere $\lambda$, there exists $r_{\lambda}$ such
that
$J(\tilde{v}_{\lambda})<\inf_{\|w-\tilde{v}_{\lambda}\|=r_{\lambda}}J(w).$
(4.12)
This completes the proof of Theorem 2.2.
∎
## 5 Acknowledgement
The authors would like to thank Professor Genggeng Huang for his interest in
this work and for many helpful discussions.
## References
* [1] A. Ambrosetti, P. Rabinowitz, _Dual variational methods in critical point theory and applications_ , J. Funct. Anal. 14 (1973), 349-381.
* [2] A. Bezryadina, E. Eugenieva, Z. Chen, _Self-trapping and flipping of double-charged vortices in opticall induced photonic lattices_ , Optim. Lett.31(2006), 2456-2458.
* [3] X. Chen, S. Hastings, J .B .McLeod, Y .Yang, _A nonlinear elliptic equation arising from gauge field theory and cosmology_ , Proc. Roy. Soc. London Ser. A 446 (1994), no. 1928, 453-478.
* [4] D. Chae, O. Y. Imanuvilov, _The existence of non-topological multivortex solutions in the relativistic self-dual Chern-Simons theory_ , Comm. Math. Phys. 215 (2000), no. 1, 119-142.
* [5] D. Chae, O. Y. Imanuvilov, _Non-topological solutions in the generalized self-dual Chern-Simons-Higgs theory_ , Calc. Var. Partial Differential Equations 16 (2003), no. 1, 47-61.
* [6] H. Chan, C. C. Fu, C. S. Lin, _Non-topological multi-vortex solutions to the self-dual Chern-Simons-Higgs equation_ , Comm. Math. Phys. 231 (2002), no. 2, 189-221.
* [7] A. Grigor’yan, Y. Lin, Y. Yang, _Kazdan-Warner equation on graph_ , Calc. Var. Partial Differential Equations 55 (2016), no. 4, Art. 92, 13 pp.
* [8] A. Grigor’yan, Y. Lin, Y. Yang, _Existence of positive solutions to some nonlinear equations on locally finite graphs_ , Sci. China Math. 60 (2017), no. 7, 1311-1324.
* [9] H. Ge, _Kazdan-Warner equation on graph in the negative case_ , J. Math. Anal. Appl. 453 (2017), no. 2, 1022-1027.
* [10] H. B. Ge, W. F. Jiang, _Kazdan-Warner equation on infinite graphs_ , J. Korean Math. Soc. 55 (2018), 1091-1101.
* [11] X. Han, _Existence of doubly periodic vortices in a generalized Chern-Simons model_ , Nonlinear Anal. Real World Appl. 16 (2014), 90-102.
* [12] J. Hong, Y. Kim, P. Y. Pac, _Multivortex solutions of the abelian Chern-Simons-Higgs theory_ , Phys. Rev. Lett. 64 (1990), no. 19, 2230-2233.
* [13] S. Hou, J. Sun, _Existence of solutions to Chern-Simons-Higgs equations on graphs_ , preprint.
* [14] A. Huang, Y. Lin, Yau. Shing-Tung, _Existence of solutions to mean field equations on graphs_ , Comm. Math. Phys. 377 (2020), no. 1, 613-621.
* [15] A. Jaffe, C. H. Taubes, _Vortices and monopoles_ , Structure of static gauge theories. Progress in Physics, 2. Birkhäuser, Boston, Mass., 1980.
* [16] J. Kazdan, F. W. Warner, _Curvature functions for compact 2-manifolds_ , Ann. of Math. (2) 99 (1974), 14-47.
* [17] M. Keller, M. Schwarz, _The Kazdan-Warner equation on canonically compactifiable graphs_ , Calc. Var. Partial Differential Equations 57 (2018), no. 2, Paper No. 70, 18 pp.
* [18] H. B. Nielsen, P. Olesen, _Vortex-line models for dual strings_ , Nucl. Phys. B61 (1973), 45-61.
* [19] J. B. Sokoloff, Charged vortex excitations in quantum Hall systems, Phys. Rev. B 31(1985), 1924-1928.
* [20] J. Spruck, Y. Yang, _Topological solutions in the self-dual Chern-Simons theory: existence and approximation_ , Ann. Inst. H. Poincaré Anal. Non Linéaire 12 (1995), no. 1, 75-97.
* [21] J. Spruck, Y. Yang, _The existence of nontopological solitons in the self-dual Chern-Simons theory_ , Comm. Math. Phys. 149 (1992), no. 2, 361-376.
* [22] G. Tarantello, _Multiple condensate solutions for the Chern-Simons-Higgs theory_ , J. Math. Phys. 37 (1996), no. 8, 3769-3796.
* [23] D. H. Tchrakian, Y. Yang, _The existence of generalised self-dual Chern-Simons vortices_ , Lett. Math. Phys. 36 (1996), no. 4, 403-413.
* [24] R. Wang, _The existence of Chern-Simons vortices_ , Comm. Math. Phys. 137 (1991), no. 3, 587-597.
* [25] Y. Yang, _Chern-Simons solitons and a nonlinear elliptic equation_ , Helv. Phys. Acta 71 (1998), no. 5, 573-585.
| arxiv-papers | 2021-07-27T00:57:38 | 2024-09-04T03:07:20.232983 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Yingshu L\\\"u and Peirong Zhong",
"submitter": "Yingshu L\\\"u",
"url": "https://arxiv.org/abs/2107.12535"
} |
2107.12536 | # A Data-Driven Biophysical Computational Model of Parkinson’s Disease based
on Marmoset Monkeys
Caetano M. Ranieri
Institute of Mathematical and Computer Sciences
University of Sao Paulo
Sao Carlos, SP, Brazil
[email protected]
&Jhielson M. Pimentel
Edinburgh Centre for Robotics
Heriot-Watt University
Edinburgh, Scotland, UK
[email protected]
&Marcelo R. Romano
School of Electrical and Computer Engineering
University of Campinas
Campinas, SP, Brazil
[email protected]
&Leonardo A. Elias
School of Electrical and Computer Engineering
University of Campinas
Campinas, SP, Brazil
[email protected]
&Roseli A. F. Romero
Institute of Mathematical and Computer Sciences
University of Sao Paulo
Sao Carlos, SP, Brazil
[email protected]
&Michael A. Lones
Edinburgh Centre for Robotics
Heriot-Watt University
Edinburgh, Scotland, UK
[email protected]
&Mariana F. P. Araujo
Health Sciences Centre
Federal University of Espirito Santo
Vitoria, ES, Brazil
[email protected]
&Patricia A. Vargas
Edinburgh Centre for Robotics
Heriot-Watt University
Edinburgh, Scotland, UK
[email protected]
&Renan C. Moioli
Digital Metropolis Institute
Federal University of Rio Grande do Norte
Natal, RN, Brazil
[email protected]
###### Abstract
In this work we propose a new biophysical computational model of brain regions
relevant to Parkinson’s Disease (PD) based on local field potential data
collected from the brain of marmoset monkeys. Parkinson’s disease is a
neurodegenerative disorder, linked to the death of dopaminergic neurons at the
substantia nigra pars compacta, which affects the normal dynamics of the basal
ganglia-thalamus-cortex (BG-T-C) neuronal circuit of the brain. Although there
are multiple mechanisms underlying the disease, a complete description of
those mechanisms and molecular pathogenesis are still missing, and there is
still no cure. To address this gap, computational models that resemble
neurobiological aspects found in animal models have been proposed. In our
model, we performed a data-driven approach in which a set of biologically
constrained parameters is optimised using differential evolution. Evolved
models successfully resembled single-neuron mean firing rates and spectral
signatures of local field potentials from healthy and parkinsonian marmoset
brain data. As far as we are concerned, this is the first computational model
of Parkinson’s Disease based on simultaneous electrophysiological recordings
from seven brain regions of Marmoset monkeys. Results show that the proposed
model could facilitate the investigation of the mechanisms of PD and support
the development of techniques that can indicate new therapies. It could also
be applied to other computational neuroscience problems in which biological
data could be used to fit multi-scale models of brain circuits.
_K_ eywords basal ganglia $\cdot$ brain modelling $\cdot$ computational
modelling $\cdot$ evolutionary computation $\cdot$ neural engineering $\cdot$
Parkinson’s Disease $\cdot$ 6-OHDA lesioned marmoset model
## 1 Introduction
Parkinson’s disease (PD) affects more than 3% of people over 65 years old,
with figures set to double in the next 15 years [71]. It is a
neurodegenerative disease, whose symptoms include cognitive and motor
deficits. In late stages, it can also lead to depression and dementia [93].
There is still no cure, and current therapies are only able to provide
symptomatic relief.
PD is characterised by a dopaminergic neuronal loss within the substantia
nigra pars compacta (SNc), which leads to a dysfunction of the basal ganglia-
thalamus-cortex (BG-T-C) circuit. The BG-T-C circuit is a neuronal network
with parallel loops that are involved in motor control, cognition, and
processing of rewards and emotions [64, 78]. There are also links between the
degeneration of dopamine neurons within those brain regions and changes in
electrophysiological behaviour [25].
Brain regions linked to PD present complex interactions, with mutual
excitatory and inhibitory feedback loops, which limit a comprehensive
understanding of the physiopathology of the disease. Studies aiming at
investigating the mechanisms underlying PD often use animal models. In classic
animal models of PD, symptoms are elicited by delivering neurotoxins that
damage the SNc dopaminergic neurons, such as
1-methyl-4-phenyl-1,2,3,6-tetrahydropyridine (MPTP) and 6-hydroxidopamine
(6-OHDA), or chemicals that transiently inhibit dopamine production, such as
alpha-methyl-p-tyrosine (AMPT) [41]. Antipsychotics like haloperidol are also
used, but have side effects that may promote dystonia and parkinsonism [38].
To date, no animal model of PD fully reproduces human features of the disease.
In addition, due to experimental limitations, animal data often include only a
limited set of PD-related brain regions, with subjects engaged in different
behavioural settings. In this context, computational models, with biologically
informed constraints that can be selectively altered, are a promising,
complementary approach to advance our knowledge about PD beyond that obtained
from anatomical and physiological studies [36, 62]. Some PD-related anomalies
observed in animal models, and efforts to reproduce those in computational
models, are presented by Rubin et al. [83].
All mammals have a similar set of BG structures that are similarly connected
with thalamic and cortical structures. Nevertheless, recent studies suggest
subtle differences between species [47, 30, 105, 7], also in the
neuropathophysiology of PD [41, 17], with primates (including marmosets) being
more similar to humans than rodents. For example, there are differences in the
distribution of dopaminergic neurons in the substantia nigra of rats and
primates, and the subthalamic nucleus and internal globus pallidus of rats
have less neurons containing parvalbumin than primates [30]. Thus, a primate
computational model of PD is of paramount importance.
In this work, we developed a new computational model of PD based on published
data from the BG-T-C brain circuit of marmoset monkeys [16]. We built upon a
neuronal computational model of rat models of PD, developed and made available
by Kumaravelu et al. [43], and adjusted its parameters to match the
electrophysiology data from the 6-OHDA+AMPT marmoset model of PD [88, 87].
It is important to highlight that, in our work, we are using the LFP signal
data to tune and validate our model, not spikes or other biosignals, thus the
whole optimisation framework relates to LFP-based metrics. The main
contributions of this paper are: (i) the first computational model of PD
validated on simultaneous, multi-site electrophysiological recordings (e.g.,
LFP recordings) from a marmoset monkey model of the disease and (ii) an
optimisation framework that can easily include novel biophysical parameters as
soon as they become available.
This paper is organised as follows. In Section 2, models of the BG-T-C network
and the anomalies caused by PD are discussed, with focus on computational
modelling of the disease. In Section 3, the building blocks of the
computational model are depicted, as well as the free parameters that were
optimised, the algorithm to update those parameters, the experimental setup,
and the evaluation protocol. In Section 4, the results are presented regarding
the optimisation process, the parameters learnt by the machine learning
algorithms, and the metrics observed on the simulations of the computational
models provided, considering spectral densities from simulated LFP, dynamics
of the firing rates from simulated neurons, and coherence analyses. In Section
5, a discussion is presented in order to contextualise our results and compare
them with the expectations from the data from animal models, and knowledge
from the literature. Section 6 concludes the paper.
## 2 Related Work
A commonly used model to explain how PD affects the neural connections within
the BG-T-C circuit, also known as the motor loop, is the so-called classic
model, illustrated in Figure 1a. It consists of projections from primary motor
(M1) and somatosensory cortical areas to BG input structures, specifically the
putamen (PUT) and the subthalamic nucleus (STN). In PUT, the cortical
projections establish excitatory glutamatergic synapses with medium spiny
neurons (MSNs).
The MSNs establish two distinct pathways to the BG output nuclei (globus
pallidus pars interna – GPi and substantia nigra pars reticulata – SNr). The
MSNs from the direct pathway (dMSN) directly project to the GPi/SNr, while the
MSNs from the indirect pathway (iMSN) project to the globus pallidus pars
externa (GPe), which in turn send projections to the GPi/SNr directly or
indirectly via the STN (for reviews, see Obeso et al. [64], Lanciego et al.
[45], and McGregor and Nelson [52]).
The cortical projection to the STN establish a third pathway, often called the
hyperdirect pathway [61]. Activation of the direct pathway facilitates
movement by inhibiting the activity of GPi/SNr, thus reducing the inhibition
of the ventral anterior nucleus (VA) and the ventral lateral nucleus (VL) and
increasing the excitatory thalamic input to the motor cortex. Activation of
the indirect and hyperdirect pathways, on the other hand, inhibit movement by
increasing the inhibitory activity of the GPi/SNr over the VA/VL, hence
decreasing the excitatory thalamic input to the motor cortex.
The activity of the motor loop is modulated by dopaminergic projections from
SNc to PUT. The main effect of dopamine (DA) release in PUT is movement
facilitation, since DA increases the excitability of the dMSNs and decreases
the excitability of the iMSNs. In PD, the depletion of striatal DA leads to an
enhanced activation of the indirect pathway and a decreased activation of the
direct pathway, resulting in the characteristic motor symptoms of this neural
disorder [97]. In addition to changes in firing rates, the functional
imbalance within the motor loop in PD also disrupts the firing patterns within
each nucleus and amongst the structures of the BG-T-C circuit, increasing
neuronal synchronisation, neuronal bursting, and enhancing the oscillatory
activity at the beta frequency band [24].
Figure 1: Models of the basal ganglia-thalamus-cortex (BG-T-C) circuit,
central to the underlying mechanisms of Parkinson’s Disease (PD), including
excitatory (blue) and inhibitory (red) connections between the regions
involved. (a) Classical model of BG-T-C circuit. The motor loop in the
mammalian brain is formed by the motor cortex (M1), the thalamus (TH) —
composed of structures such as the ventral anterior nucleus (VA), the ventral
lateral nucleus (VL), and the ventral posterolateral nucleus (VPL) —, and the
basal ganglia (BG), the latter composed of a subset of structures: the
striatum, which itself includes the putamen (PUT) and the caudate nucleus, the
globus pallidus, divided into pars interna (GPi) and pars externa (GPe), the
subthalamic nucleus (STN), and the substantia nigra, divided into pars
compacta (SNc) and pars reticulata (SNr). PD is caused by the loss of
dopaminergic neurons in the SNc, which weakens the connections represented by
dashed lines and leads to malfunctioning of both direct and indirect pathways.
(b) BG-T-C network used in this work, based on [43]. The cortex is represented
by regular spiking (CtxRS) excitatory neurons and fast spiking (CtxFSI)
inhibitory interneurons. The direct and indirect pathways in the striatum were
modelled separately, representing the medium spiny neurons (MSNs) modulation
by D1 and D2 dopamine receptors, respectively.
Bilateral 6-OHDA lesions in the marmoset medial forebrain bundle induce
several PD motor symptoms, including impairments in fine motor skills, limb
rigidity, bradykinesia, hypokinesia, and gait impairments. Alpha-methyl-p-
tyrosine (AMPT) administration to 6-OHDA lesioned marmosets can transiently
increase the severity of these symptoms. However, like MPTP macaques, these
animals do not exhibit resting tremor. Santana et al. [87] provides an
extensive characterisation of these symptoms, that were quantified through
manual scoring (adapted version of the unified PD rating scale for marmosets),
automated assessments of spontaneous motor activity in their home cages (using
actimeters), and automated motion tracking while the animals explored two
experimental apparatuses.
Computational models are established tools to facilitate understanding of
neural disorders [90, 86, 68] and, in the context of PD, accommodate several
levels of description and range from focusing on disease mechanisms to
understanding anomalous neuronal synchronisation [36]. For instance, Pavlides
et al. [66] conducted a detailed study to help unveil the mechanisms
underlying beta-band oscillations in PD and compared computational model
predictions with experimental data. Muddapu et al. [58] studied loss of
dopaminergic cells in the SNc due to neural dynamics between SNc and STN,
shedding light on the relevance of ongoing neural activity and neural loss.
Gurney et al. [27] described mounting evidence relating the BG-T-C network and
action selection mechanisms; actually, computational models showed a close
relationship between action selection and BG-T-C oscillatory activity [34, 33,
53].
Moren et al. [57] proposed a model of the spiking neurons within the BG-T-C
circuit, in order to observe the asynchronous firing rates around the 15 Hz
beta-range oscillations, as well as on lower frequency bands. Terman et al.
[100] developed a conductance-based computational network model which shed
light on the mechanisms underlying the neural dynamics of STN and GPe, a model
which was further developed by Rubin et al. [82] to investigate the effects of
deep brain stimulation (DBS) to eliminate anomalous synchronisation within the
BG-T-C network in the PD condition. In fact, one of the key areas in which
computational models serve as an invaluable tool for developing novel
therapies is that related to predicting the effects of DBS [35, 49]. Other
computational models of the BG-T-C network and its relashionship with PD are
presented by Farokhniaee and Lowery [21], and Fleming et al. [22].
Particularly important for the developments of this work is the research by
Kumaravelu et al. [43], which, based on a collection of previously published
studies, developed a computational model of the BG-T-C network tuned for the
6-OHDA rat model of PD (Fig. 1b). Compared to other computational models [36],
it was the first to specifically consider 6-OHDA and a single species.
Most computational models related to BG-T-C dynamics rely on rodent data [34,
48, 40], with only a handful focusing on primate data [47, 102]. Research by
Shouno et al. [92], for instance, provided a spiking neuron model of the
recurrent STN-GPe circuit for studying dysfunctions in oscillations within the
8-15 Hz (alpha) frequency band for PD primate models. In this work, we present
a computational model to resemble neurophysiological activity of healthy and
PD marmoset monkeys, based on the model by Kumaravelu et al. [43], and in
multisite, simultaneous LFP recordings from animal models.
## 3 Methods
To provide a computational model of the BG-T-C circuit for PD-related features
in primates, we began by re-writing the code by Kumaravelu et al. [43],
originally implemented in Matlab. We have ported the original code to the
Python programming language, with the NetPyNE framework and the libraries from
the NEURON simulator [31, 19]. Then, we performed a series of adaptations and
employed a data-driven approach to calibrate a set of parameters, in order to
derive a model that resembles local field potentials from marmoset data [88,
87]. More specifically, we employed an optimisation technique called
differential evolution (DE), an algorithm based on evolutionary computation
[2, 14]. This approach consists of optimising a predefined set of parameters
(i.e., genotype) by gradually adapting them through successive steps (i.e.,
generations), providing variability and selection of the best solutions (i.e.,
individuals) through mechanisms analogous to biological evolution.
In the model by Kumaravelu et al. [43], neuronal connectivity and membrane
initial conditions can be stochastic, and neuronal models include synaptic
transmission delay. All currents (ionic, synaptic, leakage, and bias) are not
subjected to noise. The model is general in the sense that it mimics the BG-
T-C neural dynamics of rodents that are not engaged in any specific
behavioural task. Thus, the dataset employed in our work was suitable to
calibrate such a model, since it was collected from marmoset monkeys that were
moving freely, without any event- or time-based stimulation.
After having calibrated our marmoset model, different analyses were performed
in order to enhance and validate it. The dataset used as ground truth for
adjusting the parameters of the computational model is not publicly available
due to legal restriction, but it is available from the corresponding author on
reasonable request. The next subsections will provide a detailed description
of the methods employed. The code to reproduce the results from this paper,
including the machine learning framework and the analyses of the results, is
publicly available at https://github.com/cmranieri/MarmosetModel.
### 3.1 Computational Model
The computational model was based on Kumaravelu et al. [43]. Their model was
build to reproduce the neurophysiological behaviour from rats based on data
from healthy and 6-OHDA-lesioned individuals. As an initial step, we
constructed an alternative implementation for their model within the NetPyNE
framework, and we validated this implementation by comparing its outputs with
those reported in [43].
Briefly, eight brain structures were modelled and connected based on a
simplified version of the classic model (Figure 1b). In particular, the direct
and indirect pathway in the striatum were modelled separately representing the
MSN modulation by D1 and D2 dopamine receptors, respectively [52]. The cortex
is represented by regular spiking (RS) excitatory neurons and fast spiking
(FSI) inhibitory interneurons. Neurons from all but cortical regions were
modelled using a biophysically based Hodgkin–Huxley [32] single-compartment
model, whereas cortical neurons were constructed based on the computationally
efficient Izhikevich’s model [37]. The reasoning for different neuronal models
lies on the fact that PD effects are captured by altering specific
conductances in selected structures (see below), thus a conductance-based
model is more suitable at these locations. Finally, a bias current was added
in the TH, GPe, and GPi, accounting for the inputs not explicitly modelled.
Remarkably, even though no oscillatory inputs are present in the model,
synaptic delays and network interactions by means of recurrent connections
promote sustained firing rate oscillations. For a detailed description of
connectivity schemes and other implementation details, the reader is referred
to Kumaravelu et al. [43].
The computational model described above can shift from the simulations of the
healthy to the PD condition by altering three conductances [43]: decreasing
the maximal M-type potassium conductance in direct and indirect MSN neurons
(MSN firing disfunction) from 2.6 to 1.5 $mS/cm^{2}$; decreasing the maximal
corticostriatal synaptic conductance (reduced sensitivity of direct MSN to
cortical inputs) from 0.07 to 0.026 $mS/cm^{2}$; and increasing the maximal
GPe axonal collaterals synaptic conductance from 0.125 to 0.5 $mS/cm^{2}$
(increase of GPe neuronal firing). This is implemented in the model with a
control flag.
One major addition to the model developed here is the simulation of local
field potentials (LFP). These measurements are related to the extracellular
activity produced by action potentials of the neurons within a brain region
[26]. A discussion on the dynamics of LFP signals within the basal ganglia and
its consequences to humans, especially regarding conditions such as PD, was
presented by Brown and Williams [9].
In our work, first, each simulated brain region is assigned to a spatial 3D
coordinate that matches that used in the stereotaxic surgery where electrodes
were placed in the real marmoset monkeys [67, 88]. Then, a simulated electrode
is placed at the centre of each region. In our model, each neuron is
represented as a single cylindrical compartment with a membrane area of 100
$\mu m^{2}$. For each electrode, NetPyNE estimates the simulated LFP by
summing the extracellular potential contributed by each neuronal segment
(based on the transmembrane current generated from the single cylindrical
source neuron), calculated using the “line source approximation” method and
assuming an Ohmic extracellular medium with conductivity $\sigma=0.30$ $mS/mm$
[65]. Thus, the electrical activity of neurons from each brain region
contributes to the waveforms recorded at each electrode (subject to
extracellular medium attenuation).
### 3.2 Dataset and preprocessing procedures
The dataset we used in the present work is based on a previous study by
Santana et al. [88]. Our dataset includes data from three adult males and one
adult female common marmosets (i.e., Callithrix jacchus). Data from two males
were part of the aforementioned study; data from one male and one female are
novel and followed exactly the same experimental procedures. A short summary
is presented in the next subsection, followed by the preprocessing steps.
#### 3.2.1 Dataset
The animals, weighing 300–550 g, were housed in a vivarium with natural light
cycle (12/12 hr) and outdoor temperature. All animal procedures followed
approved ethics committee protocols (CEUA-AASDAP 08/2011, 11/2011 and 03/2015)
strictly in accordance with the National Institutes of Health (NIH) Guide for
the Care and Use of Laboratory Animals. PD symptoms were elicited in all three
male animals with injections of 6-OHDA toxin in the medial forebrain bundle
under deep anaesthesia [87, 88]. Prior to neural recordings, animals that
received 6-OHDA were subjected to acute pharmacological inhibition of dopamine
synthesis (subcutaneous injections of AMPT $2\times 3240$ mg/kg) to further
exacerbate PD motor symptoms, mimicking a more severe stage of the disease.
Although 6-OHDA lesions impact on both behavioural and electrophysiological
features in all animals [87, 88], there are individual differences at earlier
stages of dopaminergic depletion that could hinder our model development
considering the relatively low number of subjects.
Both healthy and PD animals were implanted each with two custom-made
microelectrode arrays composed of 32 microwires (one array in each
hemisphere). The wires were 50 $\mu m$ in diameter and were organised in
bundles aimed to reach distinct areas of the BG-T-C system. Before the
surgery, the animals were sedated with ketamine (10-20 mg/kg i.m.) and
atropine (0.05 mg/kg i.m.), followed by deep anesthesia with isoflurane 1-5%
in oxygen at 1-1.5 L/min. The arrays were then implanted using a stereotaxic
manipulator to position electrodes at the targeted BG-T-C coordinates, which
were determined using Stephan et al. [96] and Paxinos et al. [67] stereotaxic
atlas. The microelectrode array and the implant procedures were thoroughly
described in Budoff et al. [10].
Once the animals recovered from the surgery, recording sessions were performed
in fully awaken animals behaving freely. LFPs were sampled at 1,000 Hz and
recorded using a 64 multi-channel recording system (Plexon). The position of
the recording microelectrodes were verified postmortem through either tyrosine
hydroxylase (TH) staining or Nissl staining. Similarly, the extent of
dopaminergic lesions were verified through the quantification of striatal
fiber density and dopaminergic midbrain cells in TH-stained sections. Further
experimental details are described in Santana et al. [88].
#### 3.2.2 Preprocessing
For our study, in total, 14 and 16 recording sessions were taken for the
healthy and PD conditions, respectively, considering the brain hemispheres
independent from each other. For the PD condition, we recorded from M1, PUT,
GPe, GPi, ventral lateral (VL) and ventral posterolateral (VPL) thalamic
nuclei, and STN, whereas for the healthy animal regions M1, PUT, GPe, and GPi
were recorded. The raw data was organised so that, for each recording session,
a data structure with $N_{\text{elec}}\times N_{T}$ was provided, where
$N_{\text{elec}}$ is the number of electrodes recorded and $N_{T}$ is the
number of samples of the recording session (variable but typically lasting for
several minutes).
Figure 2 illustrates the preprocessing steps adopted after data acquisition.
For each channel, the pipeline began with a zero-lag low-pass filter (cutoff
frequency of 250 Hz) and a high-pass filter (cutoff frequency of 0.50 Hz), to
eliminate frequencies that are outside the LFP scope and may relate to
electrical or mechanical interference. Then, we minimised power grid
interference (hum) with a notch filter centred at 60 Hz and its harmonics (120
Hz and 180 Hz). Each resulting signal was then scaled according to a z-score
normalisation, to account for the possible differences in signal amplitude due
to different electrode impedance.
Figure 2: Data acquisition and preprocessing steps implemented in out method.
Depending on the monkey condition (healthy or PD), different regions of the
brain were recorded. The input data was composed of a whole recording session,
with variable lengths and numbers of channels (i.e., electrodes) per region.
After preprocessing, the data was transformed into 2-seconds-long segments
with seven channels, each related to one of the regions analysed.
In the next step, we computed the cross-correlation matrix $Q$ according to
Equation 1, where $C_{ij}$ is the covariance matrix of the filtered and
z-scored signals from electrodes $i$ and $j$, which are located exclusively
within a brain region. Channels within each region with mean correlation
coefficient below the threshold of 0.70 were discarded. This procedure was
employed because electrodes in each recorded region are placed very close to
each other (see electrode and surgical procedures above), thus we expect LFP
signals to be highly correlated (if they are not, it may relate to a noisy
electrode signal) [12].
$Q_{ij}=\frac{C_{ij}}{\sqrt{C_{ii}\cdot C_{jj}}}$ (1)
All remaining LFP channels within a brain region were averaged, which provided
one data matrix for each recording session with dimensions $N_{R}\times
N_{T}$, where $N_{R}$ is the number of brain regions recorded. These average
LFP values were computed based solely on channels within each region. Next, we
segmented each time-series in 2-second segments, which was the same length as
the computational model simulations (see Section 3.3 for details). Considering
the data sampling rate (1,000 Hz) and frequencies of interest (up to 50 Hz),
2-second segments provide enough data for our analyses. Prohibitively noisy
segments were discarded using two criteria: first, segments with abnormal
amplitudes, detected using an upper threshold of 0.20 for the absolute value
of the mean of the signal over time; second, segments with limited (abnormal)
oscillatory patterns, detected using a lower threshold of 0.10 for the
amplitude standard deviation and a minimum threshold of 10 amplitude peaks.
For each recording session, our preprocessed dataset had a final shape of
$N_{R}\times 2000\times N_{\text{seg}}$, where $N_{\text{seg}}$ is the
resulting number of segments.
In the dataset adopted for this work, whether animals were still or moving
could have a profound effect on brain oscillatory activity and synchronisation
metrics, because all animals were behaving freely and were not engaged in any
particular behavioural task during the recording sessions. In fact, especially
in motor and pre-motor regions, modulations in neural oscillatory dynamics
linked to motor activity are well characterised (see Armstrong et al. [1] for
a review), and recent studies show that even breathing can modulate neural
oscillations [103]. However, we understand that action initiation, movement,
or breathing have low influence on averaged LFP amplitude values computed,
given that the 2-second window segments were randomly selected without time
alignment to any specific movement or action.
### 3.3 Evolutionary Algorithm
Evolutionary algorithms are optimisation techniques in which a set of
parameters, called genotypes, are gradually recombined and changed according
to mechanisms analogous to those of biological evolution, in order to maximise
a fitness function dependent of those parameters [2]. Differential evolution
(DE) [75] was employed to fit the computational model parameters so that it
matches the LFP beta-band power spectrum observed in the marmoset data.
The overall structure of the model was preserved from Kumaravelu et al. [43],
while a set of conductances, background currents and synaptic modulations, as
well as the numbers of neurons in each region of the BG-T-C circuit, were
calibrated through the evolutionary algorithm. The connectivity, the delays,
the synaptic mechanisms, the remaining conductances, and all other parameters
were kept as in the original model (see Section 3 from the Supplementary
Material).
More specifically, fourteen parameters compose the set of parameters to be
optimised (i.e., the genotype). Parameter $I_{TH}$ ($\mu A/cm^{2}$) relates to
cerebellar input currents to the thalamus, which are linked to sensorimotor
inputs [50]. Parameters $I_{GPe}$ ($\mu A/cm^{2}$) and $I_{GPi}$ ($\mu
A/cm^{2}$) relate to currents at GPe and GPi, respectively, from all sources
that were not explicitly modelled. The next two parameters, $g_{STN\\_KCA}$
(nS/cm2) and $g_{GP\\_AHP}$ (nS/cm2), refer to the maximum slow potassium
conductance yielding afterhyperpolarization (AHP) at the STN and the calcium-
activated potassium conductance at GPe and GPi, respectively. The sixth
parameter, $g_{syn\\_CTX\\_STR}$ (nS/cm2), modifies the synaptic conductance
from cortex (CTX) to striatum (STR). Finally, parameters seven to 14 map to
the number of neurons in each modelled region. All of the aforementioned
parameters were chosen because they have a direct influence on the firing
rates of neurons within each region, which in turn affect the LFP [65]. Also,
comparing marmoset with rodent literature, there is very limited quantitative
work on the anatomical and neurophysiological parameters of the BG-T-C
neuronal network.
Table 1: Free parameters of the computational model, optimised by DE to fit the marmoset data. ID | Parameter | Range | Description
---|---|---|---
1 | $I_{\text{TH}}$ | $[0.6,1.8]$ | Background currents at TH ($\mu A/cm^{2}$)
2 | $I_{\text{GPe}}$ | $[1.5,4.5]$ | Background currents at GPe ($\mu A/cm^{2}$)
3 | $I_{\text{GPi}}$ | $[1.5,4.5]$ | Background currents at GPi ($\mu A/cm^{2}$)
4 | $\bar{g_{\text{STN\\_KCa}}}$ | $[2.5,7.5]$ | $Ca^{2+}$–dependent AHP $K^{+}$ conductance
| | | at STN ($mS/cm^{2}$)
5 | $g_{\text{GP\\_AHP}}$ | $[5.0,15.0]$ | $Ca^{2+}$–dependent AHP $K^{+}$ conductance
| | | at GPe and GPi ($mS/cm^{2}$)
6 | $g_{\text{syn\\_ctx\\_str}}$ | $[0.8,1.2]$ | Synaptic modulation from cortex to
| | | striatum ($mS/cm^{2}$)
7 | $n_{\text{GPe}}$ | $[10,30]$ | Number of GPe neurons
8 | $n_{\text{GPi}}$ | $[10,30]$ | Number of GPi neurons
9 | $n_{\text{TH}}$ | $[10,30]$ | Number of TH neurons
10 | $n_{\text{StrD1}}$ | $[10,30]$ | Number of StrD1 neurons
11 | $n_{\text{StrD2}}$ | $[10,30]$ | Number of StrD2 neurons
12 | $n_{\text{CTX\\_RS}}$ | $[10,30]$ | Number of CTX_RS neurons
13 | $n_{\text{CTX\\_FSI}}$ | $[10,30]$ | Number of CTX_FSI neurons
14 | $n_{\text{STN}}$ | $[10,30]$ | Number of STN neurons
In the DE, each individual from the population was a model $M(G)$ that
consisted of an adaptation of the model of Kumaravelu et al. [43] in the PD
condition, in which the parameters of Table 1 were set to the values defined
by genotype $G$. Each model $M(G)$ was simulated for $t_{sim}=2000$
milliseconds, and the spike trains from each neuron and LFPs from each virtual
electrode were recorded. The LFP recordings were applied to calculate the
fitness function $f(M)$ as follows.
Given a categorical set $R$ containing $N_{R}$ brain regions, the mean power
spectral density (PSD) of the LFP from the electrode placed in region $r\in R$
is denoted by $S_{r}$ and defined in Equation 2, where
$[\omega_{a},\omega_{b}]$ is the frequency interval of interest and
$\hat{P}_{r}(\omega)$ is the periodogram computed with Welch’s method [77].
$S_{r}(\omega_{a},\omega_{b})=\int_{\omega_{a}}^{\omega_{b}}\hat{P}_{r}(\omega)d\omega$
(2)
According to the literature on the electrophysiology of PD [71, 101], a
noticeable abnormality is observed typically at the centre of the beta
frequency band of LFP recordings from the basal ganglia of PD individuals.
This frequency band corresponds approximately to the interval [13,30] Hz,
although this range varies within human patients and animal model species. For
the formulation of the fitness function, let a coefficient $y_{r}$ be the
summation of the beta-band mean PSD plus the mean PSD of adjacent bands,
composing the interval [8,50] Hz, normalised by the mean PSD of all
frequencies up to $50$ Hz, as stated in Equation 3. This broader interval was
defined to account for possible wider spectrum modulations in adjacent bands.
$y_{r}=\frac{S_{r}(8,50)}{S_{r}(0.5,50)}$ (3)
The fitness function $f(M)$ is defined in Equation 4, where $y_{r(target)}$ is
the average value of Equation 3 calculated from the preprocessed data of all
marmosets of PD condition, and $y_{r(M)}$ is calculated considering the
simulated LFP of a computational model $M$. Notice that the healthy marmoset
condition lacks readings from TH and STN regions (i.e., no electrodes were
implanted in these regions). In addition, the dataset includes three PD model
animals. For this reason, DE optimised parameters for mimicking the PD
condition. Fitness values vary from 0, if simulated and marmoset data LFP in
all brain regions substantially differ, to $N_{R}$, if they match.
$f(M)=N_{R}-\sum_{r\in
R}\min\left\\{1,\left|\frac{y_{r}(M)-y_{r}(target)}{y_{r}(target)}\right|\right\\}$
(4)
Eight brain regions are simulated, thus $N_{R}=8$. PSD target values for the
simulated regions StrD1 and StrD2 are drawn from marmoset LFP PSD values for
PUT. Simulated TH is tuned based on the average PSD from marmoset VL and VPL,
and simulated CtxRS and CTxFSI are tuned based on marmoset M1. Simulated GPe,
GPi, and STN LFP PSDs are matched to the respective marmoset LFP PSDs.
The DE initial population was set to 200 individuals, whose initial parameters
were drawn from a random uniform distribution in the interval $[0,1]$.
Parameters were normalised to the ranges listed in Table 1 (i.e., the actual
values set in the computational model) only at simulation time. In each DE
generation, a set of 20 individuals were selected through tournaments of size
two. Pairs of those selected individuals were randomly chosen, in order to
generate two offspring by applying uniform crossover. This led to a child
population of size 20. The mutation rate was set to 10% and followed a normal
distribution $\mathcal{N}(\mu=0.0,\sigma=0.3)$. The DE implements generational
replacement with elitism, with only one elite individual of the parent
population being kept, resulting in a population size of 21 individuals. Each
model $M(G_{k})$, where $k\in\\{1,\dots,N_{M}\\}$, was evolved for
$N_{gen}=60$ generations. We have performed 150 evolutionary runs, so that the
highest fitness individual of each run was selected to compose the set
$\mathcal{G}=\\{G_{1},\dots,G_{N_{M}}\\}$ of evolved genotypes.
### 3.4 Clustering
Upon completion of parameter optimisation by DE, we investigated whether high
fitness individuals had different genotypes. The rationale is that different
parameter sets, even if biologically plausible, could lead to incompatible
healthy and PD network dynamics [4]. Considering that the fitness function was
computed based on LFP values of the PD condition only, and that the healthy
condition was obtained by changing the same parameters listed by Kumaravelu et
al. [43], there was no guarantee that the genotypes evolved would lead
necessarily to models that resemble the healthy and PD conditions of the
animal models. For this reason, we performed a clustering analysis [106] to
the set $\mathcal{G}$ of evolved genotypes, which we could then evaluate
separately based on their spectral densities. This validation step is based on
the fact that PD individuals present a peak at the beta band (13-30 Hz) when
compared to healthy individuals [101].
Let $\mathcal{C}=\\{C_{1},\dots,C_{n_{c}}\\}$ be a set of clusters, with
$C_{p}=\\{G_{1},\dots,G_{n_{p}}\\}$, where $n_{c}$ is the number of clusters,
$p\in\\{1,\dots,n_{p}\\}$, and $n_{p}$ is the total number of genotypes within
cluster $p$. Considering $s_{p}(G_{k})$ to be the sample silhouette [81] of
genotype $G_{k}$ with respect to $C_{p}\in\mathcal{C}$, consider
$s_{p}(G_{k})\geq s_{p}(G_{k+1})$ for all $k\in[1,P]$, it is, each cluster is
ordered from highest to lowest silhouette. In exploratory experiments (not
shown), we investigated different clustering paradigms, namely K-means,
density-based spatial clustering of applications with noise (DBSCAN), and
agglomerative clustering. Based on these experiments, we opted for the K-means
algorithm with two centroids (i.e., $p=2$), because this configuration led to
the highest mean silhouette score. Hence, the K-means algorithm was fed with
all the individuals with the highest fitness per evolutionary run (i.e., set
$\mathcal{G}$), and the Euclidean distances for the algorithm were computed on
the 14 normalised parameters of the genotype.
### 3.5 Computational model spike and LFP analysis
The different clusters of genotypes were compared with respect to their
parameter values, spike firing rates and LFP power spectra. For each cluster,
the 50 highest fitness genotypes were chosen for the following analyses.
Spectral analysis was performed by simulating $C_{p}[1,\dots,50]$, for
$t_{sim}=2000$ milliseconds, in both healthy and PD conditions. Thus, for each
condition, $50$ simulated LFP recordings were analysed per cluster for each
condition. Since we simulated the same individuals (i.e., sets of parameters),
with the same seeds for generation of random numbers, in each of the
conditions (healthy and PD), the samples across these conditions were
considered to be dependent. The PSDs were computed and evaluated with respect
to the mean of the density spectrum per cluster, and the average power at the
beta band.
For PSD analyses on the LFP of either the animal and computational models, to
highlight the presence of a peak in the beta band in the PD condition, a ratio
$R$ was defined as in Equation 5, where $\hat{P}_{r}^{PD}(\omega)$ and
$\hat{P}_{r}^{H}(\omega)$ are the mean spectral power across the PD and
healthy models, respectively, for frequency $\omega$. A lower threshold value
$\epsilon$ was defined because, for denominators too close to zero, the ratio
may lead to high values that actually have little meaning for interpretation.
For the analyses with the animal models, $\epsilon$ was defined as the median
power across the mean spectrum of the healthy condition. For the computational
models, it was set to the $80$th percentile of the healthy spectrum.
$R(\omega)=\begin{cases}\frac{\hat{P}_{r}^{PD}(\omega)}{\hat{P}_{r}^{H}(\omega)}\quad,\quad\hat{P}_{r}^{H}(\omega)>\epsilon\\\
0\quad,\quad\text{otherwise}\end{cases}$ (5)
Regarding spike dynamics, the models within each cluster were simulated for
$t_{sim}=2000$ milliseconds with time step size $dt=0.10$ milliseconds, always
with the same seed for random number generation, and the firing frequency of
all neurons was calculated in $50$ time bins, each corresponding to $20$
milliseconds.
### 3.6 Computational model validation
Considering that different currents, conductances, and numbers of neurons may
influence the firing rate in each simulated brain region, which in turn
modulates the LFP power spectra, one may conclude that even if there are
different clusters, their neural dynamics are comparable because both clusters
are formed by high fitness individuals. However, even if our computational
model was optimised to replicate the LFP power spectra from marmoset animal
models of PD, it should also mimic the power spectra from healthy marmosets
(by changing selected conductances, see Section 3.1). In other words, if the
computational model accurately captures the physiological phenomena
responsible for the different beta-band centred LFP power spectra from PD
marmoset monkeys, it should also replicate the healthy spectra (a scenario in
which it was not evolved).
Therefore, we first confirmed that our marmoset animal model of PD presented
frequency spectra in accordance with previous works, following Section 3.2.
Then, we investigated whether the computational model would also capture this
phenomena. For that, for each genotype cluster found (Section 3.4), we
compared the LFP power spectra from the evolved PD computational model with
that from the healthy model. This was performed by modifying a predefined set
of conductances in the simulation (Section 3.1). To highlight the differences,
we first analysed the ratios between the mean PSD of the PD and healthy
simulated individuals from each cluster.
During evolution, fitness is given by LFP PSD in the vicinity of the beta band
calculated in the whole $t_{sim}=2000ms$ sequence, hence it is possible that
the same spectra relate to different LFP rhythms over shorter time scales.
Thus, different neuronal spiking dynamics may lead to similar LFP dynamics
over time. Moreover, spikes from single neurons are noisy and vary
considerably over time and over repeated simulations. With large recordings,
joint neuronal averages over time may hinder comprehension of neural
population dynamics. Finally, one of the advantages of computational models
such as the one used here is the direct access of each neuron state at any
given time, but it is not trivial to interpret the dynamics of large
populations of neurons over time. To clarify these issues, we studied low-
dimensional neuronal trajectories for both healthy and PD computational model
conditions [15].
To compute the neuronal trajectories, we first calculated the firing
frequencies for all neurons from each simulated model in a particular cluster
and condition (i.e., healthy and PD), based on the mean firing rates (MFR)
taken from bins of size $50$ ms. Since the number of neurons within each
region varies from 10 to 30 (see Table 1), and there are eight regions
considered for the computational model, this procedure generates time series
with high dimensionality, ranging from 80 to 240, which would be difficult to
visualise and analyse. To reduce the dimensionality, we employed principal
component analysis (PCA) [109]; that is, we analysed neural trajectories by
projecting high-dimensional neural population activity in a 3D space using PCA
of the spike MFR time series.
However, what if, instead of clearly occupying different regions in the state
space, neuronal responses from the same conditions result in similar paths in
the reduced dimensional space? To address this hypothesis and to compare PCA
trajectories, we used Dynamic Time Warping (DTW) with Euclidean distance [60].
DTW finds the optimum non-linear alignment between two time series, hence it
can estimate whether neuronal trajectories share a similar path, regardless of
initial conditions. In the analysis performed, we employed the fastdtw Python
package, which implements the method proposed by Salvador and Chan [85]. Each
pair of three-dimensional time series, computed from the MFR signals and
dimensionally reduced with PCA, was fed to the algorithm, which provided, as
output, a scalar proportional to the dissimilarity between the two time series
being compared.
More specifically, we compared the similarity of all possible pairs of neural
trajectories considering all individuals within the clusters (healthy and PD
dynamics). We compared all pairs of trajectories generated by individuals
within the same condition (healthy or PD), which gave a measurement of how
different the healthy or PD individuals are compared to each other (i.e.,
within-group comparison), and we compared pairs of trajectories between
healthy and PD conditions (i.e., between-groups comparison).
Finally, one of the hallmarks of PD is the anomalous widespread
synchronisation in the BG-T-C network. To validate our model in that respect,
we calculated the magnitude-squared coherence between nuclei and intranucleus.
Based on a similar analysis performed in healthy and PD marmosets reported in
Santana et al. [88], we expect a widespread increase in this metric. The
magnitude-squared coherence was calculated from the spike trains of neurons of
each nucleus using Welch’s method with Hanning windowing without overlap and
with spectral resolution of 1 Hz. The average was taken as recommended by
Bendat and Piersol [5]: the squared value of the average of the cross spectra
divided by the product of the mean values of the auto spectra of each nucleus.
The value of the magnitude-squared coherence between brain regions $r_{A}$ and
$r_{B}$, defined as $C(r_{A},r_{B})$, was computed as in Equation 6, where
$N_{A}$ is the number of neurons in region $r_{A}$, and $N_{B}$ is the number
of neurons in region $r_{B}$, and $S(r_{x}^{m},r_{y}^{n})$ is the cross
spectrum between the spike trains from the $m$-th neuron from region $r_{x}$
and the $n$-th neuron from region $r_{y}$.
$C(r_{A},r_{B})=\frac{\left[\frac{1}{N_{A}\cdot
N_{B}}\sum\limits_{i=1}^{N_{A}}\sum\limits_{j=1}^{N_{B}}S(r_{A}^{i},r_{B}^{j})\right]^{2}}{\left[\frac{1}{N_{A}}\sum\limits_{i=1}^{N_{A}}S(r_{A}^{i},r_{A}^{i})\right]\cdot\left[\frac{1}{N_{B}}\sum\limits_{i=1}^{N_{B}}S(r_{B}^{i},r_{B}^{i})\right]}$
(6)
Then, we considered the peak of the coherence in the 7-30 Hz band to highlight
PD-related effects [88]. The significance level for coherence was defined as
$1-(1-\alpha)^{1/(L-1)}$ [80], with $\alpha=0.95$ and $L=100$, because the
windowing was done with 100 segments and we adopted as 95% the significance
level. As the computational models have eight nuclei, an $8\times 8$ matrix
was constructed, representing the coherence between each pairs of nuclei. The
median of this matrix was considered as the global coupling metric between
nuclei in each simulation, because it is less sensitive to outliers than the
mean.
## 4 Results
Based on two-seconds-long segments, computed according to the data
preprocessing steps described in Section 3.2, (see Figure 3a for a sample),
the PSDs of LFPs from healthy and PD marmosets were computed (see Figure 3b
for the average spectrum). In all regions of the PD subjects, an increased PSD
magnitude from 5 Hz to 25 Hz was observed, which is in accordance with the
reported electrophysiological signatures of PD [101].
Figure 3: Animal data from marmoset monkeys, collected through electrodes
implanted to each region of the BG-T-C circuit in a previous study [88], and
made available for our research. (a) Example of a two-second time window of
the preprocessed LFP of a PD-induced (i.e., 6-OHDA lesioned) marmoset. For a
clearer visualisation, signals were bandpass filtered to the [8,50] Hz
interval, only for this panel. (b) Top two rows show the mean power density
spectra (PSD) over all segments for the healthy (blue) and PD (red) marmosets
(data for each individual marmoset is included as supplementary material). For
thalamic regions (i.e., VL and VPL) and STN, only 6-OHDA lesioned hemispheres
are represented, since these regions were not recorded in the healthy
marmoset. PSDs were normalised by the maximum PSD value for each time window.
The bottom row shows the ratio (R) between PD and healthy PSD for each
frequency (see Equation 5). To improve visualisation, $\epsilon$ is set to the
median of the healthy spectrum. a.u.: arbitrary units.
From the estimated LFP power spectra from PD marmosets, the target LFP power
spectra values for the computational marmoset model were computed as in
Equation 3. The results, presented in Table 2, were fed to the DE fitness
function (Equation 4).
Table 2: Target LFP power spectra values for the computational marmoset model, calculated from data from marmoset monkeys in the PD condition (Equation 3). $y_{StrD1}$ | $y_{StrD2}$ | $y_{TH}$ | $y_{GPi}$ | $y_{GPe}$ | $y_{CtxRS}$ | $y_{CtxFSI}$ | $y_{STN}$
---|---|---|---|---|---|---|---
0.44 | 0.44 | 0.38 | 0.46 | 0.42 | 0.39 | 0.39 | 0.37
### 4.1 Evolutionary algorithm successfully found high fitness genotypes
After running the DE $N_{M}=150$ times, the resulting set of high fitness
individuals $\mathcal{G}$ (i.e., the highest fitness individual in the
population at the end of each of the 60 generations at each evolutionary run)
was analysed. The fitness values of all individuals were recorded at all
generations of each evolutionary run.
Figure 4 reports the best and mean individual fitness across generations, and
the distribution of those values at the end of the evolutionary runs.
Concretely, the best individual in a given generation is the set of parameters
that led to the highest fitness value according to Equation 4. The mean
individual fitness across generations refers to the average fitness of all
individuals achieved at each generation.
Regarding the best individual fitness curve, results show that, at every
evolutionary run, the initial population contained at least one individual
with fitness value close to 6, and that value improved by approximately 1 at
the end of evolution (the maximum fitness value possible is $8.0$, see
Equation 4). Considering the whole population, the initial average fitness was
low (approximately 4.5), reaching a plateau close to 5.75 as evolution
progressed. The mean fitness across individuals and the best individual’s
fitness have marginal improvement after generation 40, thus the DE was stopped
at $N_{gen}=60$ generations.
Figure 4: Fitness values $f(M)$ (Equation 4) per generation of the
evolutionary algorithm (box plots summarising the $k=150$ runs at each
generation). The genotypes (i.e., parameter sets for the free parameters
elicited in Table 1) were meant to maximise $f$, which, by definition, would
be upper bounded at $8.0$. The upper row refers to the highest fitness
individuals at each evolutionary run, and the lower row refers to the mean
fitness values of all individuals. (a) Box plots of the best (upper row) and
mean (lower row) fitness values at each generation. Outliers were represented
by black diamonds. (b) Probability distribution of the best (upper row) and
mean (lower row) fitness.
For all $G\in\mathcal{G}$, we looked at the distribution of parameter values
for clusters $C_{1}$ and $C_{2}$, represented in Figure 5. Both clusters
present similar distributions for most of the parameters, either with small
variance (e.g., the numbers of neurons at the cortex populations) or more
uniform distributions with high variance (e.g., the number of neurons at the
striatum). Other parameters, such as $I_{\text{TH}}$ and $I_{\text{GPe}}$, had
a clear mean peak and reduced variance in the distribution for $C_{2}$, but a
large variance for $C_{1}$.
Figure 5: Violin plots showing the distribution of each free parameter (see
Table 1) across the best individuals found at each run of the evolutionary
algorithm employed for optimising this set of parameters (i.e., genotype).
Although scales vary across parameters (see Table 1), all parameters were
linearly scaled (i.e., normalised) to the interval $[0,1]$ at evolution time.
For example, for parameters 7-14 (i.e., the numbers of neurons), a value of
zero corresponds to the lower bound of the parameter interval, that is, 10
neurons. a.u.: arbitrary units.
### 4.2 High fitness genotypes form two clusters
A set of 150 high fitness individuals was generated by repeatedly running the
evolutionary algorithm with different seeds. It is possible that high fitness
individuals do not have a unique parameter distribution, and diverse parameter
settings could lead to high fitness values. To investigate this issue, we
performed a clustering analysis based on the evolved individuals.
Following the methods from Section 3.4, the K-means algorithm was employed to
determine $p=2$ clusters. Figure 6 provides a radar plot representation of
genotypes learnt for each cluster, and the correspondence between the mean
value of each parameter and those of the rat computational model by Kumaravelu
et al. [43].
Figure 6a shows 4 representative genotypes $c_{p}[1,\dots,4]$, chosen based on
the highest silhouettes with respect to each cluster. For comparison, the
parameters from the rat model [43] are superposed with the mean values between
all individuals from both clusters in Figure 6b. This representation
highlights substantial differences between clusters. For instance, the
$I_{GPe}$ is at its maximum value in $C_{2}$, while it shows a much lower
value for $C_{1}$. On the other hand, the number of neurons at the GPe is
higher in $C_{1}$ than in $C_{2}$.
Figure 6: Radar representations of the genotypes (i.e., sets of parameters,
see Table 1) from individuals at each cluster obtained by applying the K-means
algorithm, applying these parameters as features for the clustering technique.
Although scales vary across parameters (see Table 1), all parameters were
linearly scaled (i.e., normalised) to the interval $[0,1]$ at evolution time.
For example, for parameters 7-14 (i.e., the numbers of neurons), a value of
zero corresponds to the lower bound of the parameter interval, that is, 10
neurons. The first row represents cluster $C_{1}$ and the second row cluster
$C_{2}$. (a) Four individuals with the highest silhouettes with respect to
each cluster. Data at the left refers to the fitness $f$ computed as in
Equation 4. (b) Comparison between the parameters of the rat model and the
mean values from each cluster. As in Figure 5, parameter values were scaled to
the ranges shown in Table 1, except parameter 4 ($\bar{g_{\text{STN\\_KCa}}}$)
of the rat model, whose original value is 1.0 $mS/cm^{2}$.
### 4.3 Healthy and PD spectral signatures from computational model resembles
those from marmoset monkeys
Regarding the spectral analyses of simulated sessions of the computational
model, we employed the same procedure for normalisation as we did for the
spectra of the animal model (see Figure 3); that is, we normalised each data
segment by the maximum value. The sample signals of Figure 7a, shown as an
example, were bandpass-filtered to the same range as in Figure 3a to the
interval [8-50] Hz. The mean spectral power and the ratio $R$ are shown for
the healthy and PD conditions for each cluster in Figure 7b (see Equation 5).
In $C_{1}$, results show higher magnitudes of most frequencies up to 50 Hz for
PD models, a fact that is less visible for $C_{2}$. The mean PSD ratio from
genotypes $G\in C_{2}$ is close to 1 regardless of frequency range and brain
region, whereas genotypes $G\in C_{1}$ show prominent peaks in beta
frequencies. A detailed analysis of box-plots (Figure 7c) confirm the
significant differences in the beta band for cluster $C_{1}$ only. Considering
the spectral densities from the LFP data from animal models (Figure 3b), in
which we observe a significant difference in the beta band, results displayed
in Figure 7c confirm that spectral signatures from genotypes in $C_{1}$
resemble those from marmoset monkeys. Notice that the LFP mean PSDs from the
computational model (Figure 7b) has a different shape compared to that from
the animal LFP (Figure 3b), but the spectral signature is similar in both
healthy and PD conditions and resemble those from marmoset monkeys. This can
be explained by the relatively small number of neurons simulated in the
computational model [65]. Therefore, for the forthcoming analyses, only $G\in
C_{1}$ will be considered.
Figure 7: Extracellular activity simulated by the computational models
resulting from the parameters optimised (i.e., genotypes computed with the
evolutionary algorithm), modelled as local field potentials (LFP) at the
centre of the regions involved in the BG-T-C circuit. The clusters $C_{1}$ and
$C_{2}$ were computed by applying the K-means technique directly to the
genotypes, hence were not influenced by the simulated neurophysiological
activity. (a) Example of simulated LFPs for the highest silhouette evolved
individual from cluster $C_{1}$, PD condition. For a clearer visualisation,
signals were bandpass filtered to the [8,50] Hz interval, only for this panel.
Compare with Figure 3a. (b) Mean PSD for healthy (blue) and PD (red)
conditions from the 50 models with the highest silhouette of each cluster,
normalised by maximum PSD value for each time window, followed by the ratio
$R$ between PD and healthy PSD for each frequency (see Equation 5). To improve
visualisation, $\epsilon$ is set to the percentile $80$ of the healthy
spectrum. (c) Box plot regarding the beta band (13-30 Hz) of the LFP from the
50 models with the highest silhouette of clusters 1 (left) and 2 (right).
Outliers were represented by black diamonds. Unpaired t-tests were applied to
evaluate statistical significance against the null hypothesis that H and PD
values are drawn from the same underlying distribution (p-value notation:
$p>0.05\rightarrow\text{ns}$; $p\in[0.01,0.05]\rightarrow\text{*}$;
$p\in[0.01,0.001]\rightarrow\text{**}$;
$p\in[0.001,0.0001]\rightarrow\text{***}$; $p<0.0001\rightarrow\text{****}$).
a.u.: arbitrary units.
### 4.4 Spike activity from healthy models are significantly different from
those of PD models
Regarding spike activity, the marmosets’ dataset was not provided with a
representative set of spike trains from all regions of the circuit, hence they
were not a suitable ground truth for validating the activity from the
computational model. For this reason, the spikes synthesised by the
computational model were analysed based on evidence from the literature [73].
First, we assessed the differences in mean firing rates (MFR) between the
healthy and PD conditions for the marmoset-based computational models in
cluster $C_{1}$. Figure 8a shows the simulated MFR in each brain region for
$t_{sim}=2000$ ms, considering the 50 models in $C_{1}$ with the highest
silhouette with respect to the cluster. Results indicate a counter-intuitive
relationship between the MFR and the LFP power spectra observed in Figure 7c.
Consider, for instance, the GPe and GPi. Both regions show a higher beta-band
LFP magnitude in PD condition, but while GPi MFR in PD condition is higher
than that from healthy condition, GPe MFR is the opposite.
From Figure 8b and Figure 8c, we observe that neuronal trajectories are
intertwined, with no clear difference in the reduced-dimension state space.
This is justified by the relatively mild, though statistically significant,
differences in MFR (Figure 8a). As described in Section 3.5, neuronal
trajectories were compared with DTW in three scenarios: healthy vs healthy
models (HxH), PD vs PD models (PDxPD), and healthy vs PD models (HxPD). As
$len(C_{1})=53$, the number of pairs from which the DTW was computed was
$len(DTW_{C_{1}})=\binom{53}{2}=1378$ for each scenario. The results from this
analysis are shown in Figure 8d, in which the scalar outputs of the DTW
algorithm are considered for all possible pairs within groups, for the HxH and
PDxPD comparisons, or between groups, for the HxPD comparisons. Since two
trajectories generated by the same individual were not compared on any of the
analyses, we have computed statistical significance using unpaired tests,
differently from the remaining analyses in the paper.
Figure 8: Firing rates and dynamics regarding the spike activity simulated
with the computational models derived by the parameter sets from cluster
$C_{1}$. Simulations were ran for $t_{sim}=2000ms$. (a) Mean firing rates for
each region in cluster (means and standard deviations). (b) Projection of
three principal components of the most representative individual (i.e.,
highest silhouette) of cluster $C_{1}$, where $Z_{1}$, $Z_{2}$ and $Z_{3}$ are
the principal components with the highest variance. (c) Representation of
those components using contour lines. (d) Box plot of the DTW between the
dynamics of one simulation of all genotypes belonging to cluster $C_{1}$. All
simulations were performed with the same seed for the generation of random
numbers. Higher DTW values mean that the pairs of trajectories being compared
are less similar to each other. Unpaired t-tests were applied to evaluate
statistical significance in (a), against the null hypothesis that H and PD MFR
values at each region are drawn from the same underlying distribution, and in
(d), against the null hypothesis that a given pair of DTW vectors is drawn
from the same distribution as each of the others (p-value notation:
$p>0.05\rightarrow\text{ns}$; $p\in[0.01,0.05]\rightarrow\text{*}$;
$p\in[0.001,0.0001]\rightarrow\text{***}$; $p<0.0001\rightarrow\text{****}$).
a.u.: arbitrary units.
Trajectories from the HxH scenario were statistically more similar than
trajectories from the other conditions. Thus, the intertwined trajectories
observed in PCA (Figure 8b and Figure 8c) in fact relate to significant
differences between healthy and PD neuronal dynamics. Interestingly, PDxPD
trajectories differ more than those from HxH, which can be interpreted as a
less homogeneous, regarding neuronal dynamics, genotype to phenotype mapping.
### 4.5 Healthy and PD spike coherences from the computational model resemble
that from marmoset monkeys
To conclude our model validation, we selected the top five genotypes with
highest silhouette from cluster $C_{1}$ and calculated the magnitude-squared
coherence (MSC) within and between each simulated brain region (Section 4.5)
for healthy and PD conditions. Results revealed that computational models ran
in the healthy condition provided a lower peak MSC in the 13-30 Hz band when
compared to that from the PD condition (Figure 9a), with two important
observations: genotype I has higher peak MSC when compared to the other 4
genotypes in the healthy condition, and genotypes II and III have a lower
widespread peak MSC when in the PD condition compared to that from other
genotypes in the same condition. Statistical analysis confirmed the
significant differences in all five genotypes when comparing the global
coupling metric (see Section 3.6 and Equation 6) between healthy and PD
conditions (Figure 9b); that is, PD models present a higher widespread
coherence in the 13-30 Hz band than that observed in healthy models.
Figure 9: Coherence analyses computed for the spike activity of the five
parameter sets, optimised through the evolutionary algorithm, with the highest
silhouettes with respect to cluster $C_{1}$. These parameter sets were used to
construct the healthy and PD computational models that were considered in the
coherence analyses. (a) Peak magnitude-squared coherence (MSC) in the 13-30 Hz
band within and between each simulated brain region for the top five genotypes
with highest silhouette from cluster $C_{1}$. Only connections whose peak MSC
values are above significance level are shown. (b) Global coupling metric
(median value of the MSC matrix) between brain regions for healthy and PD
conditions (see Section 3.6 and Equation 6). (p–value notation:
$p<0.0001\rightarrow\text{****}$)
## 5 Discussion
Marmoset monkeys are prominent in neuroscience research [16, 39, 56, 54].
Although there are anatomical and physiological differences between BG-T-C
circuit in rodents and primates, neurophysiological data from rodents are far
more available than from primates. Considering the similarities on the overall
structure of the BG-T-C circuit among all vertebrates [41], we assumed that
the rat model presented by Kumaravelu et al. [43] was a suitable starting
point to build a computational model of those structures in primates. The core
hypothesis was that, by keeping the same brain regions and connectivity
patterns of the rat model and modifying a set of parameters, the computational
model could reproduce neural dynamics of healthy and PD marmoset conditions.
The dataset used in this work included simultaneous LFP recordings from
regions of the BG-T-C network and power spectra (PSD) analysis revealed
significantly higher 13 to 30 Hz LFP PSD magnitudes for PD marmosets in all
regions. This result might be interpreted cautiously, given that one healthy
marmoset is being compared to three PD marmosets. Also, results refer to a
broad range of frequencies, hence different interval choices may influence the
analysis. Nonetheless, one would expect a widespread significant increase in
LFP power centred in (but not limited to) the beta band in PD affected brains
[88, 101].
Regarding the MFR results from the computational model (Figure 8a), there are
significant differences between the healthy and PD conditions. Single-neuron
firing rates vary considerably depending on animal species, whether the animal
is fully awaken, engaged in behavioural tasks, or anaesthetised [30, 105,
52]). Data from human subjects, even though scarce, are in line with animal
results [18]. Moreover, there is a great neuronal diversity within the BG-T-C
network, both in terms of neuronal physiology and connectivity, which have
been shown to have a non-trivial relationship with field potentials [91, 8,
33, 6]. Our model takes into account this diversity, which was shown in
Figures 8b and 8c; nevertheless, the reported MFR are in agreement with the
literature: comparing PD with healthy conditions, a higher MFR in GPi, STN,
and Str, and a lower MFR in GPe, TH, and CTX.
The data-driven modelling strategy adopted in this paper is consolidated in
computational neuroscience literature [63], but often leads to multiple models
fitting a particular data set [4]. Therefore, model optimisation should be
followed by a model selection phase. We clustered high fitness solutions with
respect to evolved parameters and obtained two clusters, and found two clear
sets of parameters that reproduce the increased beta-band oscillations
observed in PD marmosets [88]. However, when perturbing the model to shift
from PD to healthy dynamics, only one of the clusters fitted the marmoset
data. Notably, we evolved solutions based on LFP data but computational model
firing rates resemble those reported in previous works [105, 46, 18].
Nevertheless, as data becomes available, future works should explore different
fitness functions based on single-neuron activities or other features of LFP.
Lastly, in this context, our simulated neurons are formed by a single
cylindrical compartment, thus future works should consider using neurons with
more complex compartments and connections, possibly including multiple
dendritic branches and active ionic channels. This would lead to more
realistic simulated LFP signals [65], but at the expense of heavier computing
resources.
One of the great challenges in neuroscience is to link the activity of large
neural populations to motor and cognitive behaviours. One strategy is to study
the intrinsic high-dimensional dynamics of neural populations from its low-
dimensional dynamics given by time-varying trajectories [15, 99], thus
emphasising circuit over single-neuron function. For example, Humphries et al.
[36] showed that neural low-dimensional dynamics given by PCA of neuronal
activity can explain Aplysia rhythmic movement control and propose that only
the low-dimensional dynamics are consistent within and between nervous
systems. Also, the shape and amplitude of neural trajectories can explain
different behavioural outcomes [28]. Combining PCA and DTW, we found that
neural trajectories from high-fitness models are more similar in healthy
conditions than in PD conditions. This is in line with results from Russo et
al. [84], who demonstrated, using computer simulations, later confirmed by
data from the supplementary motor area in monkeys, that low trajectory
divergence is essential in neural circuits involved in action control. PCA is
a simple, established method for dimensionality reduction, but other
computational tools tailored to neuronal data, such as Gaussian-Process Factor
Analysis (GPFA) [110] and jPCA [13], should be considered in further analyses.
Another possible approach is to use more advanced machine learning methods to
identify PD-related features from neural data, as demonstrated by Ranieri et
al. [76], who employed a deep learning framework to unveil PD features from
marmoset data.
Finally, as part of our model validation, we assessed functional coupling
within and between simulated brain regions by means of coherence between spike
trains. In contrast to structural coupling, characterised by physical neuronal
connections, functional connectivity is an emergent phenomenon commonly linked
to synchronisation in neural rhythms at diverse spatiotemporal scales and is
the basis of neural communication and cognitive processing [94, 11, 23, 44].
Several neural disorders, including PD, present a disruption in functional
connectivity [104, 51, 29]. In particular, Santana et al. [88] showed that
6-OHDA marmoset models of PD have a widespread coherence peak in the beta band
when compared to healthy individuals. Our computational model is in line with
this result, which is relevant not only as further evidence of its biological
plausibility, but also because one of the established therapies to alleviate
PD motor symptoms is the use of deep brain stimulation (DBS) [71]. Thus, we
believe that the work presented here can be used to test hypotheses that
employ DBS. For instance, Romano et al. [79] performed a comprehensive
analysis of frequency-dependent effects of DBS on the same model that we used
here, tuned for rodent data [43], and found that neural oscillatory
modulations were similar to those observed in electrical brain and spinal cord
stimulation of primates [107, 88].
Certain simplifications inherent to our approach should also be mentioned, as
they may serve as inspiration for improvements in future research. In our
work, LFP generation followed the method described in Parasuram et al. [65],
and implemented in NetPyNE, which does not consider the influence of sinks.
Despite being a simplification, the method has been able to reproduce features
of real LFP data, and is computationally feasible. In this approach, LFP
waveforms are directly related to transmembrane ionic currents from each
neuronal source, which in turn relate to neuronal firing rates, and electrode
position. As we have assigned coordinates to the simulated electrodes
corresponding to the centre of each simulated region, we can assume that
simulated LFP dynamics are due to altered spiking activity in multiple
neuronal sources from different brain regions.
Likewise Kumaravelu et al. [43] and previous seminal BG-T-C modelling works
such as Humphries et al. [34], and van Albada and Robinson [105], we did not
model any structural synaptic plasticity mechanisms. Our synapses were
modelled as bi-exponential and alpha synapses, including transmission delays.
Nevertheless, as model dynamics unfold, functional plasticity mechanisms may
take place in the sense that the closed-loop, recursive network architecture
could lead to single neurons and brain regions whose electrical activity are
sensitive to past network states. In fact, the depletion of dopamine, one of
the hallmarks of PD, affects structural and functional plasticity. Our model
considers the loss of dopaminergic neurons (see Section 3.1, for a complete
description), thus we believe that the model is suited for the investigation
of functional plasticity phenomena. This analysis is beyond the scope of our
work, but the reader can relate the change in oscillatory neural dynamics we
described to different functional states. For instance, Humphries et al. [34]
show that action selection in the BG is closely linked to oscillatory
activity.
There are several directions for future work. Based on the study of Wang et
al. [108], a phase amplitude coupling analysis in the STN in our computational
model may shed light on the different aspects of LFP oscillations observed in
healthy and PD conditions, as well as the mechanisms underlying these
oscillations. In another perspective, most PD computational models do not
consider brain-body-environment interactions. Embodied cognitive science
studies have provided solid evidence that neural activity is shaped by such
interactions [20, 69, 3, 59]. In PD and other neural disorders, body-
environment interactions influence motor control [95, 89], but its impact on
neural dynamics remains unclear. Moreover, the BG-T-C neuronal network is
clearly related to action selection and decision making [34, 55, 98].
Therefore, we believe that associating our marmoset-based computational model
with a physical robot may offer an alternative approach to elucidate the
mechanisms underlying brain-body-environment interactions in PD [27, 72, 42,
74, 70]. A possible approach would be to employ this computational model in a
sensorimotor loop based on visual inputs from video cameras and motor outputs
to actuators such as the robot’s motors. In this scenario, computer vision
algorithms would transform the images into stimuli for the computational
model, so that the resulting currents and action potentials would be used to
generate perturbations that would govern the behaviours of the actuators. The
resulting framework could become a new tool for studying the underlying
mechanisms of PD and the effects of different interventions regarding the
simulated circuit.
## 6 Conclusions
Computational models are invaluable tools for advancing our knowledge of the
neural dynamics of our brain, either under healthy conditions or with
neurological disorders. Even though the physiopathology underlying PD shares
similarities across vertebrate species, there are important, species-specific
differences in the anatomy and neural dynamics of the BG-T-C circuit. For
example, the number of neurons in the GPe is considerably increased in primate
models, when compared to rodent models. Hence, the design of a primate
computational model of PD is of paramount importance. In this work, we created
the first computational model of the dynamics of BG-T-C motor circuit based on
data from Marmoset monkeys both in healthy and parkinsonian conditions. Our
data-driven approach used simultaneous, multisite electrophysiological
recordings from healthy and 6-OHDA+AMPT marmoset models of PD. We are aware
that there are simplifications in our computational model; nevertheless,
results show that LFP power spectral densities at frequencies of interest,
firing frequency dynamics, and spike coherence resemble those from healthy and
PD marmosets.
Electrophysiological datasets from animal models often do not include
comprehensive biophysical data such as single-neuron membrane conductances and
neuronal cell densities. These parameters were central for building a
biophysical computational model. Thus, to address this gap, we used an
optimisation algorithm (differential evolution) to search the multidimensional
model parameter space for solutions that could reproduce features of the
animal LFP recordings. Our model was based on a well known rat model of PD
[43]. The main aspects of novelty in our modelling approach are: 1) we use a
marmoset monkey BG-T-C electrophysiological database; 2) we added LFP
simulations to the model, in addition to spike dynamics; and 3) we developed a
DE-based optimisation to search for unknown parameters. With this framework,
we were able to reproduce several of the previously reported PD
electrophysiological biomarkers observed and recorded from marmoset monkeys.
Our computational model presents beta-band LFP power spectra differences
between the healthy and the PD conditions, which Wang et al. [108] also found
in human patients with dystonia. This is in line with a body of literature
that shows that beta-band LFP modulations are not a PD-specific biomarker (see
Poewe et al. [71] and references therein). Although our model is focused on
PD, the electrophysiological features we use are known to be related to other
neural disorders and thus should not be considered as exclusive to PD.
## Acknowledgement
This work is part of the Neuro4PD project, granted by Royal Society and Newton
Fund (NAF\R2\180773), and São Paulo Research Foundation (FAPESP), grants
2017/02377-5 and 2018/25902-0. Moioli and Araujo acknowledge the support from
the National Institute of Science and Technology, program Brain Machine
Interface (INCT INCEMAQ) of the National Council for Scientific and
Technological Development(CNPq/MCTI), the Rio Grande do Norte Research
Foundation (FAPERN), the Coordination for the Improvement of Higher Education
Personnel (CAPES), the Brazilian Innovation Agency (FINEP), and the Ministry
of Education (MEC). Romano was the recipient of a master’s scholarship from
FAPESP, grant 2018/11075-5. Elias is funded by a CNPq Research Productivity
Grant (312442/2017-3). This research was carried out using the computational
resources from the Center for Mathematical Sciences Applied to Industry
(CeMEAI) funded by FAPESP, grant 2013/07375-0. Additional resources were
provided by the Robotics Lab within the Edinburgh Centre for Robotics, and by
the Nvidia Grants program.
## References
* [1] Samuel Armstrong, Martin V. Sale, and Ross Cunnington. Neural oscillations and the initiation of voluntary movement. Frontiers in Psychology, 9:2509, 2018.
* [2] Daniel Ashlock. Evolutionary computation for modeling and optimization. Springer Science & Business Media, 2006.
* [3] Paul B Badcock, Karl J Friston, and Maxwell JD Ramstead. The hierarchically mechanistic mind: A free-energy formulation of the human psyche. Physics of life Reviews, 31:104–121, 2019.
* [4] Jyotika Bahuguna, Tom Tetzlaff, Arvind Kumar, Jeanette Hellgren Kotaleski, and Abigail Morrison. Homologous basal ganglia network models in physiological and Parkinsonian conditions. Frontiers in Computational Neuroscience, 11(August):1–21, 2017\.
* [5] Julius S. Bendat and Allan G. Piersol. Random Data: Analysis and Measurement Procedures. John Wiley and Sons, Inc., USA, 4th edition, 2010.
* [6] Liora Benhamou, Maya Bronfeld, Izhar Bar-Gad, and Dana Cohen. Globus Pallidus External Segment Neuron Classification in Freely Moving Rats: A Comparison to Primates. PLoS ONE, 7(9), 2012.
* [7] Sarah F. Beul, Helen Barbas, and Claus C. Hilgetag. A Predictive Structural Model of the Primate Connectome. Scientific Reports, 7:1–30, 2017.
* [8] J. P. Bolam, J. J. Hanley, P. A. C. Booth, and M. D. Bevan. Synaptic organisation of the basal ganglia. Journal of anatomy, 196:527–542, 2000.
* [9] Peter Brown and David Williams. Basal ganglia local field potential activity: character and functional significance in the human. Clinical neurophysiology, 116(11):2510–2519, 2005.
* [10] S. A. Budoff, J. F. Rodrigues Neto, V. Arboés, M. S. L. Nascimento, C. B. Kunicki, and M. F. P. Araújo. Stereotaxic surgery for implantation of microelectrode arrays in the common marmoset (callithrix jacchus). J. Vis. Exp., 151(e60240), 2019.
* [11] György Buzsáki. Neural Syntax: Cell Assemblies, Synapsembles, and Readers. Neuron, 68(3):362–385, 2010.
* [12] György Buzsáki, Costas A Anastassiou, and Christof Koch. The origin of extracellular fields and currents–EEG, ECoG, LFP and spikes. Nature reviews. Neuroscience, 13(6):407–20, 5 2012.
* [13] Mark M. Churchland, John P. Cunningham, Matthew T. Kaufman, Justin D. Foster, Paul Nuyujukian, Stephen I. Ryu, Krishna V. Shenoy, and Krishna V. Shenoy. Neural population dynamics during reaching. Nature, 487(7405):51–56, 2012.
* [14] David Corne and Michael Adam Lones. Evolutionary algorithms. In Handbook of Heuristics. Springer, 2018.
* [15] John P. Cunningham and Byron M. Yu. Dimensionality reduction for large-scale neural recordings. Nature Neuroscience, 17(11):1500–1509, 2014.
* [16] D. Cyranoski. Marmoset model takes centre stage. Nature, 459(492), 2009.
* [17] Ted M. Dawson, Todd E. Golde, and Clotilde Lagier-Tourenne. Animal models of neurodegenerative diseases. Nature Neuroscience, 21(10):1370–1379, 2018.
* [18] G. Du, P. Zhuang, M. Hallett, Y. Q. Zhang, J. Y. Li, and Y. J. Li. Properties of oscillatory neuronal activity in the basal ganglia and thalamus in patients with Parkinson’s disease. Translational Neurodegeneration, 7(1):1–13, 2018.
* [19] Salvador Dura-Bernal, Benjamin A Suter, Padraig Gleeson, Matteo Cantarelli, Adrian Quintana, Facundo Rodriguez, David J Kedziora, George L Chadderdon, Cliff C Kerr, Samuel A Neymotin, Robert A McDougal, Michael Hines, Gordon MG Shepherd, and William W Lytton. Netpyne, a tool for data-driven multiscale modeling of brain circuits. eLife, 8:e44494, apr 2019.
* [20] Andreas K. Engel, Pascal Fries, and Wolf Singer. Dynamic predictions: Oscillations and synchrony in top–down processing. Nature Reviews Neuroscience, 2(10):704–716, 2001.
* [21] AmirAli Farokhniaee and Madeleine M Lowery. Cortical network effects of subthalamic deep brain stimulation in a thalamo-cortical microcircuit model. Journal of Neural Engineering, 18(5):056006, 2021.
* [22] John E Fleming, Eleanor Dunn, and Madeleine M Lowery. Simulation of closed-loop deep brain stimulation control schemes for suppression of pathological beta oscillations in parkinson’s disease. Frontiers in neuroscience, 14:166, 2020.
* [23] Pascal Fries. Rhythms for Cognition: Communication through Coherence. Neuron, 88(1):220–235, 2015.
* [24] Adriana Galvan, Annaelle Devergnas, and Thomas Wichmann. Alterations in neuronal activity in basal ganglia-thalamocortical circuits in the parkinsonian state. Frontiers in Neuroanatomy, 9(February):5, 2015.
* [25] Adriana Galvan and Thomas Wichmann. Pathophysiology of parkinsonism. Clinical neurophysiology, 119(7):1459–1474, 2008.
* [26] Carl Gold, Darrell A Henze, Christof Koch, and Gyorgy Buzsaki. On the origin of the extracellular action potential waveform: a modeling study. Journal of neurophysiology, 95(5):3113–3128, 2006.
* [27] Kevin Gurney, Tony J. Prescott, Jeffery R. Wickens, and Peter Redgrave. Computational models of the basal ganglia: from robots to membranes. Trends in Neurosciences, 27(8):453 – 459, 2004.
* [28] Jorge Gámez, Germán Mendoza, Luis Prado, Abraham Betancourt, and Hugo Merchant. The amplitude in periodic neural state trajectories underlies the tempo of rhythmic tapping. PLOS Biology, 17(4):1–32, 04 2019.
* [29] P. Halje, Ivani Brys, Juan J. Mariman, Claudio Da Cunha, Romulo Fuentes, and Per Petersson. Oscillations in cortico-basal ganglia circuits: Implications for parkinson’s disease and other neurologic and psychiatric conditions. Journal of Neurophysiology, 122(1):203–231, 2019.
* [30] Craig Denis Hardman, Jasmine Monica Henderson, David Isaac Finkelstein, Malcolm Kenneth Horne, George Paxinos, and Glenda Margaret Halliday. Comparison of the basal ganglia in rats, marmosets, macaques, baboons, and humans: Volume and neuronal number for the output, internal relay, and striatal modulating nuclei. Journal of Comparative Neurology, 445(3):238–255, 2002.
* [31] Michael Hines, Andrew Davison, and Eilif Muller. Neuron and python. Frontiers in Neuroinformatics, 3:1, 2009.
* [32] Allan L Hodgkin and Andrew F Huxley. Currents carried by sodium and potassium ions through the membrane of the giant axon of loligo. The Journal of physiology, 116(4):449–472, 1952.
* [33] A. J. N. Holgado, J. R. Terry, and R. Bogacz. Conditions for the Generation of Beta Oscillations in the Subthalamic Nucleus-Globus Pallidus Network. Journal of Neuroscience, 30(37):12340–12352, 2010.
* [34] M. D. Humphries, R. D. Stewart, and K. N. Gurney. A Physiologically Plausible Model of Action Selection and Oscillatory Activity in the Basal Ganglia. Journal of Neuroscience, 26(50):12921–12942, 2006.
* [35] Mark Humphries and Kevin Gurney. Network effects of subthalamic deep brain stimulation drive a unique mixture of responses in basal ganglia output. The European journal of neuroscience, 36:2240–51, 07 2012.
* [36] Mark D. Humphries, Jose Angel Obeso, and Jakob Kisbye Dreyer. Insights into Parkinson’s disease from computational models of the basal ganglia. Journal of Neurology, Neurosurgery and Psychiatry, 40, 2018.
* [37] E. M. Izhikevich. Simple model of spiking neurons. IEEE Transactions on Neural Networks, 14(6):1569–1572, 2003.
* [38] Geetika Kharkwal, Karen Brami-Cherrier, José E. Lizardi-Ortiz, Alexandra B. Nelson, Maria Ramos, Daniel Del Barrio, David Sulzer, Anatol C. Kreitzer, and Emiliana Borrelli. Parkinsonism driven by antipsychotics originates from dopaminergic control of striatal cholinergic interneurons. Neuron, 91(1):67–78, 2016.
* [39] Noriyuki Kishi, Kenya Sato, Erika Sasaki, and Hideyuki Okano. Common marmoset as a new model animal for neuroscience research and genome editing technology. Development Growth and Differentiation, 56(1):53–62, 2014.
* [40] Lucas A. Koelman and Madeleine M. Lowery. Beta-band resonance and intrinsic oscillations in a biophysically detailed model of the subthalamic nucleus-globus pallidus network. Frontiers in Computational Neuroscience, 13:77, 2019.
* [41] James B. Koprich, Lorraine V. Kalia, and Jonathan M. Brotchie. Animal models of $\alpha$-synucleinopathy for Parkinson disease drug development. Nature Reviews Neuroscience, 18(9):515–529, 8 2017.
* [42] Jeffrey L. Krichmar. Neurorobotics—a thriving community and a promising pathway toward intelligent cognitive robots. Frontiers in Neurorobotics, 12:42, 2018.
* [43] Karthik Kumaravelu, David T. Brocker, and Warren M. Grill. A biophysical model of the cortex-basal ganglia-thalamus network in the 6-OHDA lesioned rat model of Parkinson’s disease. Journal of Computational Neuroscience, 40(2):207–229, 4 2016.
* [44] Peter Lakatos, Joachim Gross, and Gregor Thut. A New Unifying Account of the Roles of Neuronal Entrainment. Current Biology, 29(18):R890–R905, 2019.
* [45] José Lanciego, Natasha Luquin, and José Obeso. Functional neuroanatomy of the basal ganglia. Cold Spring Harbor perspectives in medicine, 2, 10 2012.
* [46] Xiaoyu Li, Ping Zhuang, and Yongjie Li. Altered neuronal firing pattern of the basal ganglia nucleus plays a role in levodopa-induced dyskinesia in patients with parkinson’s disease. Frontiers in Human Neuroscience, 9:630, 2015.
* [47] Jean Liénard and Benoît Girard. A biologically constrained model of the whole basal ganglia addressing the paradoxes of connections and selection. Journal of Computational Neuroscience, 36(3):445–468, 2014.
* [48] Mikael Lindahl and Jeanette Hellgren Kotaleski. Untangling basal ganglia network dynamics and function: Role of dopamine depletion and inhibition investigated in a spiking network model. eNeuro, 3(6), 2016.
* [49] M. Lu, X. Wei, Y. Che, J. Wang, and K. A. Loparo. Application of reinforcement learning to deep brain stimulation in a computational model of parkinson’s disease. IEEE Transactions on Neural Systems and Rehabilitation Engineering, 28(1):339–349, 2020.
* [50] Mario Manto, Donna L. Gruol, Jeremy D. Schmahmann, Noriyuki Koibuchi, and Ferdinando Rossi. Handbook of the cerebellum and cerebellar disorders. Handbook of the Cerebellum and Cerebellar Disorders, pages 1–2424, 2013.
* [51] Daniel H. Mathalon and Vikaas S. Sohal. Neural oscillations and synchrony in brain dysfunction and neuropsychiatric disorders it’s about time. JAMA Psychiatry, 72(8):840–844, 2015.
* [52] Matthew M. McGregor and Alexandra B. Nelson. Circuit Mechanisms of Parkinson’s Disease, 3 2019.
* [53] Robert Merrison-Hort, Nada Yousif, Andrea Ferrario, and Roman Borisyuk. Oscillatory Neural Models of the Basal Ganglia for Action Selection in Healthy and Parkinsonian Cases, pages 149–189. Springer International Publishing, Cham, 2017.
* [54] Cory T. Miller, Winrich A. Freiwald, David A. Leopold, Jude F. Mitchell, Afonso C. Silva, and Xiaoqin Wang. Marmosets: A Neuroscientific Model of Human Social Behavior. Neuron, 90(2):219–233, 2016.
* [55] Jonathan W. Mink. Basal ganglia mechanisms in action selection, plasticity, and dystonia. European Journal of Paediatric Neurology, 22(2):225 – 229, 2018\. Movement Disorders.
* [56] Jude F. Mitchell and David A. Leopold. The marmoset monkey as a model for visual neuroscience. Neuroscience Research, 93:20 – 46, 2015. Marmoset Neuroscience.
* [57] Jan Morén, Jun Igarashi, Osamu Shouno, Junichiro Yoshimoto, and Kenji Doya. Dynamics of basal ganglia and thalamus in parkinsonian tremor. In Multiscale Models of Brain Disorders, pages 13–20. Springer, 2019.
* [58] Vignayanandam Ravindernath Muddapu, Alekhya Mandali, V. Srinivasa Chakravarthy, and Srikanth Ramaswamy. A computational model of loss of dopaminergic cells in parkinson’s disease due to glutamate-induced excitotoxicity. Frontiers in Neural Circuits, 13:11, 2019.
* [59] Simon Musall, Anne E Urai, David Sussillo, and Anne K Churchland. Harnessing behavioral diversity to understand neural computations for cognition. Current Opinion in Neurobiology, 58:229 – 238, 2019. Computational Neuroscience.
* [60] Meinard Müller. Dynamic Time Warping, pages 69–84. Springer Berlin Heidelberg, Berlin, Heidelberg, 2007.
* [61] Atsushi Nambu, Hironobu Tokuno, and Masahiko Takada. Functional significance of the cortico-subthalamo-pallidal ’hyperdirect’ pathway. Neuroscience Research, 43(2):111–117, 2002.
* [62] Eva M Navarro-Lopez, Utku Çelikok, and Neslihan S Şengör. A dynamical model for the basal ganglia-thalamo-cortical oscillatory activity and its implications in parkinson’s disease. Cognitive Neurodynamics, pages 1–28, 2020.
* [63] Christian Nowke, Sandra Diaz-Pier, Benjamin Weyers, Bernd Hentschel, Abigail Morrison, Torsten W. Kuhlen, and Alexander Peyser. Toward rigorous parameterization of underconstrained neural network models through interactive visualization and steering of connectivity generation. Frontiers in Neuroinformatics, 12:32, 2018.
* [64] Jose A. Obeso, Concepcio Marin, C. Rodriguez-Oroz, Javier Blesa, B. Benitez-Temiño, Juan Mena-Segovia, Manuel Rodríguez, and C. Warren Olanow. The basal ganglia in Parkinson’s disease: Current concepts and unexplained observations. Annals of Neurology, 64(S2):S30–S46, 1 2009.
* [65] Harilal Parasuram, Bipin Nair, Egidio D’Angelo, Michael Hines, Giovanni Naldi, and Shyam Diwakar. Computational modeling of single neuron extracellular electric potentials and network local field potentials using lfpsim. Frontiers in Computational Neuroscience, 10:65, 2016.
* [66] Alex Pavlides, S. John Hogan, and Rafal Bogacz. Computational models describing possible mechanisms for generation of excessive beta oscillations in parkinson’s disease. PLOS Computational Biology, 11:1–29, 12 2015.
* [67] George Paxinos, Charles Watson, Michael Petrides, Marcello Rosa, and Hironobu Tokuno. The marmoset brain in stereotaxic coordinates. Academic Press, 2012.
* [68] Rodrigo Pena, Cesar Ceballos, Júnia de Deus, Antonio Roque, Norberto Garcia-Cairasco, Ricardo Leao, and Alexandra Cunha. Modeling hippocampal ca1 gabaergic synapses of audiogenic rats. International Journal of Neural Systems, 30:2050022, 03 2020.
* [69] Rolf Pfeifer and Josh C. Bongard. How the Body Shapes the Way We Think: A New View of Intelligence (Bradford Books). The MIT Press, 2006.
* [70] Jhielson M. Pimentel, Renan C. Moioli, Mariana F. P. de Araujo, Caetano M. Ranieri, Roseli A. F. Romero, Frank Broz, and Patricia A. Vargas. Neuro4pd: An initial neurorobotics model of parkinson’s disease. Frontiers in Neurorobotics, 15:88, 2021.
* [71] Werner Poewe, Klaus Seppi, Caroline M. Tanner, Glenda M. Halliday, Patrik Brundin, Jens Volkmann, Anette Eleonore Schrag, and Anthony E. Lang. Parkinson disease. Nature Reviews Disease Primers, 3:1–21, 2017.
* [72] Tony Prescott, Fernando González, Kevin Gurney, Mark Humphries, and Peter Redgrave. A robot model of the basal ganglia: Behavior and intrinsic processing. Neural networks : the official journal of the International Neural Network Society, 19:31–61, 02 2006.
* [73] Tony J. Prescott, Fernando M. Montes González, Kevin Gurney, Mark D. Humphries, and Peter Redgrave. A robot model of the basal ganglia: Behavior and intrinsic processing. Neural Networks, 19(1):31–61, 1 2006.
* [74] Savva Pronin, Liam Wellacott, Jhielson M Pimentel, Renan C Moioli, and Patricia A Vargas. Neurorobotic Models of Neurological Disorders: A Mini Review. Frontiers in Neurorobotics, 15:26, 2021.
* [75] Kenneth Price Rainer Storn. Differential Evolution – A Simple and Efficient Heuristic for Global Optimization over Continuous Spaces. Journal of Global Optimization, 11:341–359, 1997.
* [76] C. M. Ranieri, R. C. Moioli, R. A. F. Romero, M. F. P. de Araújo, M. B. De Santana, J. M. Pimentel, and P. A. Vargas. Unveiling parkinson’s disease features from a primate model with deep neural networks. In 2020 International Joint Conference on Neural Networks (IJCNN), pages 1–8, 2020.
* [77] K. Deergha Rao, M.N.S. Swamy, K. Deergha Rao, and M.N.S. Swamy. Spectral analysis of signals. In Digital Signal Processing, pages 721–751. Springer Singapore, 2018.
* [78] Peter Redgrave, Manuel Rodriguez, Yoland Smith, Maria C. Rodriguez-Oroz, Stephane Lehericy, Hagai Bergman, Yves Agid, Mahlon R. Delong, and Jose A. Obeso. Goal-directed and habitual control in the basal ganglia: Implications for Parkinson’s disease. Nature Reviews Neuroscience, 11(11):760–772, 2010.
* [79] M. R. Romano, R. C. Moioli, and L. A. Elias. Evaluation of frequency-dependent effects of deep brain stimulation in a cortex-basal ganglia-thalamus network model of parkinson’s disease*. In 2020 42nd Annual International Conference of the IEEE Engineering in Medicine Biology Society (EMBC), pages 3638–3641, 2020.
* [80] J.R. Rosenberg, A.M. Amjad, P. Breeze, D.R. Brillinger, and D.M. Halliday. The fourier approach to the identification of functional coupling between neuronal spike trains. Progress in Biophysics and Molecular Biology, 53(1):1 – 31, 1989\.
* [81] Peter J Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of computational and applied mathematics, 20:53–65, 1987\.
* [82] Jonathan Rubin and David Terman. High frequency stimulation of the subthalamic nucleus eliminates pathological thalamic rhythmicity in a computational model. Journal of computational neuroscience, 16:211–35, 05 2004.
* [83] Jonathan E Rubin, Cameron C McIntyre, Robert S Turner, and Thomas Wichmann. Basal ganglia activity patterns in parkinsonism and computational modeling of their downstream effects. European Journal of Neuroscience, 36(2):2213–2228, 2012.
* [84] Abigail A. Russo, Ramin Khajeh, Sean R. Bittner, Sean M. Perkins, John P. Cunningham, Laurence F. Abbott, and Mark M. Churchland. Neural trajectories in the supplementary motor area and primary motor cortex exhibit distinct geometries, compatible with different classes of computation. bioRxiv, 2019.
* [85] Stan Salvador and Philip Chan. Toward accurate dynamic time warping in linear time and space. Intelligent Data Analysis, 11(5):561–580, 2007.
* [86] Terence D. Sanger. A computational model of deep-brain stimulation for acquired dystonia in children. Frontiers in Computational Neuroscience, 12:77, 2018.
* [87] M. Santana, T. Palmér, H. Simplício, R. Fuentes, and P. Petersson. Characterization of long-term motor deficits in the 6-OHDA model of Parkinson’s disease in the common marmoset. Behavioural Brain Research, 290:90–101, 2015.
* [88] Maxwell B. Santana, Pär Halje, Hougelle Simplício, Ulrike Richter, Marco Aurelio M. Freire, Per Petersson, Romulo Fuentes, and Miguel A.L. Nicolelis. Spinal cord stimulation alleviates motor deficits in a primate model of Parkinson Disease. Neuron, 84(4):716–722, 11 2014.
* [89] Luis Santos, Javier Fernandez-Rio, Kristian Winge, Beatriz Barragán-Pérez, Vicente Rodríguez-Pérez, Vicente González-Díez, Miguel Blanco-Traba, Oscar E. Suman, Charles Philip Gabel, and Javier Rodríguez-Gómez. Effects of supervised slackline training on postural instability, freezing of gait, and falls efficacy in people with parkinson’s disease. Disability and Rehabilitation, 39(16):1573–1580, 2017. PMID: 27416005.
* [90] Henning Schroll and Fred Hamker. Computational models of basal-ganglia pathway functions: focus on functional neuroanatomy. Frontiers in Systems Neuroscience, 7:122, 2013.
* [91] A. Sharott, C. K. E. Moll, G. Engler, M. Denker, S. Grun, and A. K. Engel. Different Subtypes of Striatal Neurons Are Selectively Modulated by Cortical Oscillations. Journal of Neuroscience, 29(14):4571–4585, 2009.
* [92] Osamu Shouno, Yoshihisa Tachibana, Atsushi Nambu, and Kenji Doya. Computational model of recurrent subthalamo-pallidal circuit for generation of parkinsonian oscillations. Frontiers in neuroanatomy, 11:21, 2017.
* [93] J. Shulman, P. De Jager, and M. Feany. Parkinson’s disease: Genetics and pathogenesis. Parkinson’s Disease: Genetics and Pathogenesis, pages 1–386, 2011\.
* [94] W. Singer. Neuronal Synchrony: A Versatile Code for the Definition of Relations? Neuron, 24:49–65, 1999.
* [95] Anke H. Snijders and Bastiaan R. Bloem. Cycling for freezing of gait. New England Journal of Medicine, 362(13):e46, 2010. PMID: 20357278.
* [96] H. Stephan, G. Baron, and W. K. Schwerdtfeger. The Brain of the Common Marmoset (Callithrix jacchus). Springer-Verlag Berlin Heidelberg, 1980.
* [97] D. James Surmeier, Steven M. Graves, and Weixing Shen. Dopaminergic modulation of striatal networks in health and Parkinson’s disease. Current Opinion in Neurobiology, 29:109–117, 2014.
* [98] Shreyas M. Suryanarayana, Jeanette Hellgren Kotaleski, Sten Grillner, and Kevin N. Gurney. Roles for globus pallidus externa revealed in a computational model of action selection in the basal ganglia. Neural Networks, 109:113–136, 2019.
* [99] David Sussillo. Neural circuits as computational dynamical systems. Current Opinion in Neurobiology, 25:156–163, 2014.
* [100] D Terman, J E Rubin, A C Yew, and C J Wilson. Activity Patterns in a Model for the Subthalamopallidal Network of the Basal Ganglia. The Journal of Neuroscience, 22(7):1–14, 2002.
* [101] Gerd Tinkhauser, Alek Pogosyan, Huiling Tan, Damian M. Herz, Andrea A. Kühn, and Peter Brown. Beta burst dynamics in Parkinson’s disease off and on dopaminergic medication. Brain, 140(11):2968–2981, 11 2017.
* [102] Meropi Topalidou, Daisuke Kase, Thomas Boraud, and Nicolas P. Rougier. A computational model of dual competition between the basal ganglia and the cortex. eNeuro, 5(6), 2018.
* [103] Adriano BL Tort, Maximilian Hammer, Jiaojiao Zhang, Jurij Brankačk, and Andreas Draguhn. Causal relations between cortical network oscillations and breathing frequency. bioRxiv, 2020.
* [104] Peter J. Uhlhaas and Wolf Singer. Abnormal neural oscillations and synchrony in schizophrenia. Nature Reviews Neuroscience, 11(2):100–113, 2010.
* [105] S. J. van Albada and P. A. Robinson. Mean-field modeling of the basal ganglia-thalamocortical system. I. Firing rates in healthy and parkinsonian states. Journal of Theoretical Biology, 257(4):642–663, 2009.
* [106] Manish Verma, Mauly Srivastava, Neha Chack, Atul Kumar Diswar, and Nidhi Gupta. A comparative study of various clustering algorithms in data mining. International Journal of Engineering Research and Applications (IJERA), 2(3):1379–1384, 2012.
* [107] Doris D. Wang, Coralie de Hemptinne, Svjetlana Miocinovic, Jill L. Ostrem, Nicholas B. Galifianakis, Marta San Luciano, and Philip A. Starr. Pallidal deep-brain stimulation disrupts pallidal beta oscillations and coherence with primary motor cortex in parkinson’s disease. Journal of Neuroscience, 38(19):4556–4568, 2018.
* [108] Doris D Wang, Coralie de Hemptinne, Svjetlana Miocinovic, Salman E Qasim, Andrew M Miller, Jill L Ostrem, Nicholas B Galifianakis, Marta San Luciano, and Philip A Starr. Subthalamic local field potentials in parkinson’s disease and isolated dystonia: an evaluation of potential biomarkers. Neurobiology of disease, 89:213–222, 2016.
* [109] Svante Wold, Kim Esbensen, and Paul Geladi. Principal component analysis. Chemometrics and intelligent laboratory systems, 2(1-3):37–52, 1987\.
* [110] Byron M. Yu, John P. Cunningham, Gopal Santhanam, Stephen I. Ryu, Krishna V. Shenoy, and Maneesh Sahani. Gaussian-process factor analysis for low-dimensional single-trial analysis of neural population activity. Journal of Neurophysiology, 102(1):614–635, 2009. PMID: 19357332.
| arxiv-papers | 2021-07-27T01:09:11 | 2024-09-04T03:07:20.248418 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Caetano M. Ranieri, Jhielson M. Pimentel, Marcelo R. Romano, Leonardo\n A. Elias, Roseli A. F. Romero, Michael A. Lones, Mariana F. P. Araujo,\n Patricia A. Vargas, Renan C. Moioli",
"submitter": "Caetano Mazzoni Ranieri",
"url": "https://arxiv.org/abs/2107.12536"
} |
2107.12540 | # A Neurorobotics Approach to Behaviour Selection based on Human Activity
Recognition
Caetano M. Ranieri
Institute of Mathematical and Computer Sciences
University of Sao Paulo
Sao Carlos, SP, Brazil
[email protected]
&Renan C. Moioli
Digital Metropolis Institute
Federal University of Rio Grande do Norte
Natal, RN, Brazil
[email protected] &Patricia A. Vargas
Edinburgh Centre for Robotics
Heriot-Watt University
Edinburgh, Scotland, UK
[email protected]
&Roseli A. F. Romero
Institute of Mathematical and Computer Sciences
University of Sao Paulo
Sao Carlos, SP, Brazil
[email protected]
###### Abstract
Behaviour selection has been an active research topic for robotics, in
particular in the field of human-robot interaction. For a robot to interact
effectively and autonomously with humans, the coupling between techniques for
human activity recognition, based on sensing information, and robot behaviour
selection, based on decision-making mechanisms, is of paramount importance.
However, most approaches to date consist of deterministic associations between
the recognised activities and the robot behaviours, neglecting the uncertainty
inherent to sequential predictions in real-time applications. In this paper,
we address this gap by presenting a neurorobotics approach based on
computational models that resemble neurophysiological aspects of living
beings. This neurorobotics approach was compared to a non-bioinspired,
heuristics-based approach. To evaluate both approaches, a robot simulation is
developed, in which a mobile robot has to accomplish tasks according to the
activity being performed by the inhabitant of an intelligent home. The
outcomes of each approach were evaluated according to the number of correct
outcomes provided by the robot. Results revealed that the neurorobotics
approach is advantageous, especially considering the computational models
based on more complex animals.
_K_ eywords Behaviour selection $\cdot$ Human activity recognition $\cdot$
Robot simulation $\cdot$ Neurorobotics $\cdot$ Bioinspired computational model
## 1 Introduction
Truly autonomous behaviour is still not the norm for robots designed to
interact socially with humans [6]. In general, behaviour selection has been an
active research topic for robotics in general, and human-robot interaction in
particular [19]. In this context, the need for a real-time understanding of
human actions is of paramount importance for the robotic agent to behave
proactively and effectively. Such a requirement could be achieved with
techniques for human activity recognition [32].
When dealing with complex modalities (e.g., videos or data from inertial
units), activity recognition approaches often rely on machine learning. For
instance, video-based activity recognition have been approached by
architectures based on convolutional and recurrent neural networks [15, 29].
For inertial data, similar architectures have been proposed, processing either
raw data [35, 10] or descriptors obtained through feature extraction methods
[47, 1]. To provide a wider range of possibilities, robots may act
symbiotically with other pervasive devices, such as wearable technologies or
ambient sensors in intelligent environments, which may provide additional
capabilities for sensing and acting based on application-specific components
[2]. When synchronised data from different sensors are available, activity
recognition techniques may rely on multiple sensor modalities to provide more
accurate results, giving rise to techniques for multimodal activity
recognition [28, 17, 43].
Although human activity recognition has been a quite fertile field of
research, few approaches have been developed to link the outputs from those
algorithms into actual response behaviours from a robot. Related works usually
consist of direct associations between the recognised activities and the
response behaviours [11, 25, 44]. One of the possibilities consist of
combining computational neuroscience to the robotics scenarios, characterising
the field of neurorobotics [51], which may build upon different biological
aspects that influence the behaviour of living beings.
Li et al. [24] provided a comprehensive survey on neurorobotics systems (NRS)
and the different components that may integrate them. According to the
authors, a generalised framework can be depicted for most NRSs in the
literature, composed of a simulated brain, which is fed with sensory signals
from a body and turns them into control signals for a hierarchical controller,
responsible for decoding these signals into control commands for the body,
which actuates and senses an external environment. Bioinspired strategies may
be introduced to different aspects of the framework, according to the required
task of a particular study.
The basal ganglia, a group of subcortical nuclei present in the vertebrate’s
brain, is known to have an important role in action selection mechanisms,
especially regarding striatal circuits [30]. The so-called direct and indirect
pathways are characterised by competitive or complementary functions that
mediate the excitation of the motor system based on inputs from the
motivational system of an individual, deciding whether to ”go” or to ”stop”
performing a certain behaviour [4]. The potential roles of such a mechanism in
robotic frameworks have also been evaluated, including simulations in which
bioinspired networks receiving different stimuli are expected to respond with
different behaviours, resulting in cooperative interactions that produce robot
behaviours [3].
In this paper, we present a neurorobotics model which embeds computational
models of the basal ganglia-thalamus-cortex (BG-T-C) circuit [22, 40] to
provide a decision-making mechanism for a robot - in this context, we may call
it a neurorobot. The neurorobotics approach has been proposed for enhancing
the decision-making mechanism, as suggested by related researches in
neurorobotics [26, 33]. It consisted of simulating neurophysiological aspects
within a cognitive framework, in which different stimuli was introduced to
certain brain structures within the circuit, according to real-time outputs of
the activity recognition module. The resulting spike trains from the
neurorobotics model were then converted to neural firing frequencies across
brain regions, which would be further decoded using convolutional neural
networks, in order to infer the most suitable response behaviour for the
robot.
The application scenario is a simulated smart home, in which an activity
recognition model, presented in [41] for the HWU-USP activities dataset [38],
was employed in human-robot interaction tasks, using a mobile robot. In
summary, the robot needs to produce response behaviours according to the
contextual information inferred by the user (i.e., the recognised activity).
The neurorobotics approach, which is the central contribution of this work,
was compared to a heuristics approach, in which a deterministic behaviour
selection mechanism was considered using simple heuristics that associate
recognised activities to robot behaviours. This neurorobotics approach
embedded two computational models, one that resembled neurophysiological data
of rodents (i.e., the rat model), and one that resembled data from marmoset
monkeys (i.e., the primate model).
The different factors considered for this study were evaluated according to
the relative number of correct outcomes of the robot simulation. Considering
the activity recognition framework, the results have confirmed that more
accurate classifiers for the activity recognition module led to a greater
number of robot tasks successfully completed. Although the performances of the
heuristic and neurorobotics approaches varied according to the computational
model embedded, the study confirmed that the most complex neurorobotics model
(i.e., the marmoset-based model of the BG-T-C circuit) led to an increased
performance in relation to the heuristic approaches when a more accurate
activity recogniser was considered (i.e., the video-based classifier).
The remainder of this paper is organised as follows. The brain structures
considered for this neurorobotics approach and the computational modelling
adopted are presented in Section 2. In Section 3, are presented the general
aspects of the robotic system, and the integration between each of its
modules. In Section 4, the neurorobotics approach is detailed. In Section 5,
the methods and implementations are depicted. The corresponding results are
presented in Section 6 and discussed in Section 7. Finally, the concluding
remarks and directions for future research are provided in Section 8.
## 2 The BG-T-C Circuit and Original Computational Models
In this section, we present the basic concepts on the brain structures present
in the basal ganglia-thalamus-cortex (BG-T-C) circuit, and the original
computational modelling. The BG-T-C circuit, illustrated in Figure 1, is
formed by the motor cortex (M1), the thalamus (TH), and the basal ganglia
(BG), the latter composed of a subset of structures: the striatum (Str), the
globus pallidus, divided into pars interna (GPi) and pars externa (GPe), the
subthalamic nucleus (STN), and the substantia nigra, divided into pars
compacta (SNc) and pars reticulata (SNr).
In [31], is provided a discussion about the mechanisms of this circuit and
presented models to describe it. The most useful model to explain the
connections within this circuit, especially those affected by PD, is the so-
called classic model, illustrated in Figure 1(a).
(a) Classic model, as described by [31].
(b) Computational model, as designed by [22] for rodent data, and adapted by
[40] for primate data.
Figure 1: Schematic representations of the classic and computational models of
the BG-T-C circuit. In the connections, excitatory synapses are shown as blue
arrows, and inhibitory synapses, as red squares.
The pathways start with an excitatory connection from the cortex to the
striatum, which projects its output neurons, named medium spiny neurons (MSN),
to other structures inside the BG. In the direct pathway, the direct MSN
(dMSN) inhibits the GPi, which reduces its inhibition to the TH. Then, it
excites the motor cortex. In the indirect pathway, the indirect MSN (iMSN)
inhibits the GPe, which reduces its inhibition to the STN, which excites the
GPi. Thus, this results on inhibition of the TH and absence of excitatory
outputs to the motor cortex. In other words, the direct pathway excites the
cortex (i.e., positive feedback loop), while the indirect pathway inhibits it
(i.e., negative feedback loop).
In [22], a computational model of the BG-C-T circuit, originaly developed to
study the underlying mechanisms of Parkinson’s Disease (PD), was proposed and
implemented based on neural data from healthy and PD-induced (i.e., 6-OHDA
lesioned) rats [18]. Eight brain structures were modelled and connected based
on a simplified version of the classic model (see Figure 1(b)). In particular,
the direct and indirect pathways were modelled separately representing the MSN
modulation by D1 and D2 dopamine receptors in the striatum (i.e., StrD1 and
StrD2, respectively). The cortex is represented by regular spiking (RS)
excitatory neurons and fast spiking (FSI) inhibitory interneurons (i.e., CtxRS
and CtxFSI, respectively). A bias current was added in the TH, GPe, and GPi,
accounting for the inputs not explicitly modelled. This model was designed
with the ability to shift from the simulation of healthy to the PD status,
which is done by altering certain conductances.
Although all mammals have a similar set of BG structures that are similarly
connected with thalamic and cortical structures, subtle differences between
species may be found, with primates being more similar to humans than rodents
[27, 21, 7]. A data-driven approach was proposed in [40] to obtain a primate-
based computational model of the BG-T-C circuit and the mechanisms of PD. The
resulting marmoset computational model was evaluated based on the differences
between healthy and PD individuals, with respect to the spectral signature of
the brain activity [49], the dynamics of the firing rates of neurons across
brain regions [50], and the coherence between spike trains [14].
The implementation used in [40] built on a Python translation of the original
computational model of [22], originally made by [46] using the NetPyNE
framework and the libraries from the NEURON simulator [8]. Based on the
results of the machine learning framework, a practical setup of either the rat
or marmoset computational models was made available. The adaptations performed
in this work to the original computational models (see Subsection 4.1) were
based on the code made available by the authors. For all neurorobotics model
evaluations, we considered both the rat and primate computational models,
always with the healthy state set on.
## 3 Integrated System
The modules of the application scenario, and the interactions between them,
are illustrated in Figure 2. In this scenario, the human activities are
inferred by a machine learning algorithm, and the supporting behaviours are
performed by a mobile robot placed in a simulated environment, composing an
ambient assisted living (AAL) application [5].
The general information flow was: given the multimodal data provided by a set
of sensors within a sensed environment, apply an activity recognition module
to classify such data into a set of predefined human activities, and produce
correspondent response behaviours for a mobile robot.
The neurorobotics approach was compared to a heuristics approach. The
heuristics approach (Figure 2(a)) consisted of associating the predictions of
the activity recognition module to response behaviours based on simple
heuristics, presented in Subsection 5.4. In the neurorobotics approach (Figure
2(b)), the predictions from the activity recognition module were employed to
stimulate a bioinspired computational model, whose outputs (i.e., neural
firing frequencies of brain simulated regions) were decoded by a CNN-based
decoder, which provided the decisions for the mobile robot.
(a) Heuristics approach: the predictions from the activity recognition module
are fed directly to the mobile robot.
(b) Neurorobotics approach: the predictions are used as stimuli for the
embedded, bioinspired computational model of the BG-T-C circuit, which
simulates neural activity that is further interpreted by a CNN-based decoder,
responsible for deciding the behaviour to be performed by the robot. Both the
bioinspired computational model and the CNN-based decoder compose the
neurorobotics model presented in this research.
Figure 2: Interaction between modules for the application scenario proposed.
More specifically, a sensed environment consisted of a previously collected
dataset [38], composed by a set of recording sessions $X$, with each $x\in X$
associated to an activity $a\in A=\\{a_{1},\dots,a_{N_{A}}\\}$, where $N_{A}$
is the number of classes (i.e., labels) considered for this dataset. The
function describing these associations is given by Equation 1.
$\begin{split}f_{A}:X\rightarrow A\Longleftrightarrow f_{A}(x)=a,\\\ x\in
X,\quad a\in A\end{split}$ (1)
Each data tuple $x(t)$ comprises a segment, with a previously defined length,
of a recording session $x$ starting at timestep $t\in
T_{x}=\\{1,\dots,N_{T_{X}}\\}$, equally spaced among them, to be segmented
from $x$. The activity recognition module is a machine learning classifier
$g\in G$, which might associate a recording session $x\in X$ at timestep $t\in
T_{X}$ to an activity $a\in A$, through a prediction vector $y_{x}^{t}\in Y$
(see Equation 2). In other words, considering that $a$ is unknown at inference
time, the inference model $g$, learned from labelled samples, provides a
prediction vector $y_{x}^{t}$, where $y_{x}^{t}(a)$ is the probability that a
given input $x(t)$ corresponds to activity $a$.
$\begin{split}g:X\times T\rightarrow Y\Longleftrightarrow g(x,t)=y_{x}^{t},\\\
x\in X,\quad t\in T,\quad y_{x}^{t}\in Y\end{split}$ (2)
The application scenario was designed so that each activity in $A$ was
associated to a desired response for the mobile robot. We defined a set of
response behaviours $B=\\{b1,\dots,b_{N_{B}}\\}$, so that each human activity
$a\in A$ can be, but not necessarily is, associated to a response behaviour of
the robot. The ”no action” behaviour is denoted as $b_{\emptyset}$. Hence, the
function that associates recognised activities to response behaviours is given
by Equation 3.
$\begin{split}f_{B}:A\rightarrow B\cup\\{b_{\emptyset}\\}\Longleftrightarrow
f_{B}(a)=b,\\\ a\in A,\quad b\in B\cup\\{b_{\emptyset}\\}\end{split}$ (3)
The robot simulation would be considered successfully completed if:
* •
For an activity $a$ being performed in the environment in a session $x$, the
robot completed an expected response behaviour $b\in B$ before $x$ was
finished; or
* •
No response behaviour was expected (i.e., $f_{B}(a)=b_{\emptyset}$) and the
robot did not complete any of the behaviours in $B$.
It is worth to notice that, according to this evaluation policy, besides an
accuracy requirement (i.e., the correct behaviour must be given in response to
a human activity), there was also a time constraint that must be satisfied
(i.e., if required, the response behaviour must be completed while the human
is still performing the given activity).
Since, by definition, $f_{A}(x)=a$ is not known at runtime, and can only be
inferred by a classifier $g\in G$ as successive prediction vectors $y_{x}^{t}$
are provided, a decision-making mechanism was needed to perform adaptive
decisions based on partial, time-localised predictions. To this aim, we
proposed the neurorobotics model presented in Section 4, and compared it to a
simple heuristics-based approach as described in Section 5.
## 4 The Neurorobotics Model
The neurorobotics model embeds the bioinspired computational model and the
CNN-based decoder (see Figure 2). It consists of simulating and decoding the
neurophysiological mechanisms of the basal ganglia-thalamus-cortex (BG-T-C)
circuit in mammals (see Section 2), responsible for abilities such as motor
control, decision-making, and learning [12, 26, 33]. As already stated in
Section 2, both the rat-based [22] and the marmoset-based [40] computational
models were evaluated as a decision-making mechanism of the neurorobotics
model.
### 4.1 Bioinspired Computational Model
Motivated by the work of [33], two key modifications were introduced to the
computational models of the BG-T-C circuit adopted in this work [22, 40].
First, an additional structure, called prefrontal cortex (PFC), was included
as a variable source of excitatory stimuli towards the striatum (see Figure
3(a)). Second, $N_{C}=N_{B}$ populations of neurons were implemented as
independent channels $c\in C$, each associated to exactly one response
behaviour $b\in B$ (see Figure 3(b)), as defined in Equation 4.
$\begin{split}f_{C}:B\rightarrow C\Longleftrightarrow f_{C}(c)=b,\\\ b\in
B,\quad c\in C\end{split}$ (4)
(a) Schematic representation of the computational model as adapted in this
work. In the connections, excitatory synapses are shown as blue or green
arrows, and inhibitory synapses, as red squares. The blue arrows and red
squares correspond to the original synapses as designed by [22] and adapted by
[40], while the green arrows are the adaptations provided in this work to
allow the stimulation of the circuit in the context of the application
scenario proposed.
(b) Predictions from the activity recognition module are interpreted as
stimulation originated on the prefrontal cortex (PFC), which selectively
stimulates different populations of the computational model, each associated
to one response behaviour of the robot.
Figure 3: Adapted version of the computational model of the BG-T-C circuit.
At each timestep, the channels $c\in C$ received a stimulus $s\in
S=\\{s_{1},\dots,s_{N_{C}}\\}$, whose intensity was based on the linear
combination between a prediction vector $y_{x}^{t}$ and a weight function
$f_{W}$, given by Equation 5. The actual value of $s$ is given by function
$f_{S}$, defined as in Equation 6.
$\begin{split}f_{W}:C\times A\rightarrow\\{0,1\\}\Longleftrightarrow
f_{W}(c,a)=\begin{cases}1,\quad\text{if }f_{B}(a)=f_{C}(c)\\\
0,\quad\text{otherwise}\end{cases}\\\ c\in C,\quad a\in A\end{split}$ (5)
$\begin{split}f_{S}:C\times A\rightarrow S\Longleftrightarrow
f_{S}(c,a)=s=\sum_{a\in A}f_{W}(c,a)\cdot y_{x}^{t}(a)\\\ c\in C,\quad a\in
A,\quad s\in S\end{split}$ (6)
Considering that, as ensured by the softmax activation on the classifiers,
$\sum_{a\in A}y_{x}^{t}(a)=1$, then $s\in[0,1]\mu A/cm^{2}$, which has shown
to be a stable, biologically plausible interval. For a recording sequence $x$,
the set of prediction vectors $y_{x}$ is employed to update periodically each
stimulus $s\in S$, during the course of a corresponding simulation of the
computational model (not to be confused with the robot simulation). For each
simulation, $N_{T_{\text{sim}}}$ subsequent updates would be done for all
$s\in S$, computed for the timesteps in $y_{x}$.
A simulation, after finished, produced a spike train for each of the brain
regions modelled, contemplating all its length (i.e., all $N_{T_{\text{sim}}}$
updates were considered). The neural firing frequencies were computed
according to [23], with the parameters detailed in Subsection 5.3, and summed
across each region of each channel, resulting in $N_{R}\cdot N_{C}$ output
signals for each simulation, each with length $L_{U}$, where $N_{R}=8$ is the
number of regions (see Figure 1b).
Formally, let $u_{x}^{g,m}\in U$ be defined as the output for a given
simulation, where $x\in X$ is a recording session, $g\in G$ is the classifier
employed for activity recognition, and $m\in M$, a computational model.
Therefore, let a simulation be defined as $f_{U}$ (see Equation 7), whose
output is as a multivariate time-series with $N_{R}\cdot N_{C}$ variables and
$L_{U}$ timesteps.
$\begin{split}f_{U}:X\times G\times M\rightarrow U\Longleftrightarrow
f_{U}(x,g,m)=u_{x}^{g,m}\\\ (x,g,m)\in X\times G\times M,\quad u\in
U\end{split}$ (7)
After the simulations were completed, the spike trains at the cortex
populations were converted into temporal signals (i.e., neural firing
frequencies) based on the mean firing rates across brain regions [23]. The
resulting signals were segmented in smaller windows and applied to train and
evaluate a convolutional neural network (CNN), which would be employed to
determine the decision of the robot at each timestep of the robot simulation
(i.e., the CNN-based decoder). More details on the implementation of the CNN-
based decoder are presented in the next section.
### 4.2 CNN-Based Decoder
Each simulation of the computational model provided the summed neural firing
frequencies of each channel and brain region, generating a data structure
$u_{x}^{g,m}$, associated to the whole recording session that generated it. As
a requirement to provide a realistic scenario for the robot simulation, time-
localised decisions were required, which must be taken based only in past
events. In other words, at a timestep $t_{\text{robot}}=i$ of the robot
simulation, only predictions obtained on timesteps $t_{j},j<i$ could be taken
into account when providing a response behaviour to the robot.
To fulfil this requirement, each instance $u_{x}^{g,m}$, correspondent to the
recording session $x\in X$ in the set of conditions $g\in G$ and $m\in M$ (see
Equation 7), was segmented in windows of $N_{V}$ timesteps, with partial
superposition, producing $N_{\text{segs}}$ segments. Considering $N_{X}$
recording sessions in a given set of conditions, the function $f_{v}$ would
generate a total of $N_{X}\cdot N_{\text{segs}}$ instances $v\in V$, as
defined in Equation 8.
$\begin{split}f_{v}:U\times T\rightarrow V\Longleftrightarrow
f_{v}(u_{x}^{g,m},t)=v=u_{x}^{g,m}[t,t+N_{V}]\\\ u_{x}^{g,m}\in U,\qquad t\in
T\quad|\quad t+N_{V}<L_{U},\qquad v\in V\end{split}$ (8)
The resulting segments were employed to train a machine learning decoder
(i.e., the CNN-based decoder). We considered only the cortex regions to
compose the input tuples for the decoder, aiming to preserve biological
plausibility regarding this aspect. Given that each channel of the
computational model has two cortex regions (i.e., cortex RS and FSI), and that
the experiments were performed with $N_{C}$ channels, associated to the
response behaviours $b\in B$, the resulting instances $v$ had shape
$N_{V}\times 2N_{C}$. The decoder $f_{Q}$ might be trained to provide a
decision vector $q_{x}^{t}$, which corresponds to the probability that a given
segment of cortex firing frequencies, given by$v=f_{v}(u_{x}^{g,m},t)$, might
be associated to a behaviour in $B\cup\\{b_{\emptyset}\\}$. This decoding
function may be defined as in Equation 9.
$\begin{split}f_{Q}:V\rightarrow Q\Longleftrightarrow f_{Q}(v)=q_{x}^{t},\\\
v\in V,\quad q_{x}^{t}\in Q\end{split}$ (9)
We have adopted a one-dimensional convolutional neural network (CNN) as
decoder, which has shown to provide state-of-the-art results in related work
[42] (for the architectural choices and hyperparameter settings, see
Subsection 5.3). Classification metrics were provided considering that the
categorical output is chosen according to Equation 10, where $d_{Q}$
corresponds to a response behaviour.
$d_{Q}:Q\rightarrow B\Longleftrightarrow d_{Q}(q_{x}^{t})=argmax(q_{x}^{t})$
(10)
Finally, the decisions decoded would be fed to the robot simulation and turned
into commands, as discussed in Subsection 5.4.
## 5 Methods
In Figure 4, the different factors assessed in this work, already mentioned,
are illustrated. Both the heuristics and the neurorobotics approaches were
evaluated with two different models of the activity recognition module: the
IMU + ambient and the video-based (see Subsection 5.1). For the heuristics
approach, a couple heuristics was considered and compared: the window and the
exponential (see Subsection 5.4). For the neurorobotics approach, the rat and
marmoset computational models were assessed (see Subsections 4.1 and 4.2).
Figure 4: Factors and conditions analysed for the heuristics and neurorobotics
approaches. For both approaches, two models for the activity recognition
module were considered: the IMU + ambient and the video-based. For the
heuristics approach, two approaches were analysed for the decision-making
mechanism: window or exponential (see Subsection 5.4). For the neurorobotics
approach, two computational models of the BG-T-C circuit were considered: the
rat-based and the marmoset-based.
All code was developed in Python language. The machine learning techniques
presented for the activity recognition and the CNN-based decoder were
implemented with the Tensorflow/Keras framework. The computational models were
implemented using the NetPyNE platform [8]. The robot simulation was
implemented in the Gazebo simulator [20] with the Robot Operating System (ROS)
[37] as a middleware. The next subsections will provide the implementation
details of this work.
### 5.1 Dataset and Classifiers
We have adopted the HWU-USP activities dataset [38], a multimodal and
heterogeneous dataset of human activities recorded in the Robotic Assisted
Living Testbed (RALT), at Heriot-Watt University (UK). It is composed by
readings of ambient sensors (e.g., switches at wardrobes and drawers, presence
detectors, power measurements), inertial units attached to the waist and to
the dominant wrist of the subjects, and videos. A set of nine well-defined,
pre-segmented activities of daily living was performed by the 16 participants
of the data collection. A total of $N_{X}=144$ recording sessions were
provided, all of them pre-segmented and labelled (i.e., $X$, $A$ and $f_{A}$
were provided). The length of the recording sessions varied from less than 25
to over 100 seconds, with high variance either between-classes and between-
subjects.
As the activity recognition module, we have employed the framework presented
and evaluated in [41]. This was composed by different time-localised
classifiers based on artificial neural networks, each focused on a particular
modality (i.e., set of similar sensors) or set of modalities. We adopted a
couple pre-trained classifiers (i.e., the IMU + ambient and the video-based
classifiers) from the framework to provide the prediction vectors, respecting
the between-subjects 8-fold approach for training and evaluating. Let those
classifiers be denoted by $g_{\text{I+A}}\in G$ and $g_{\text{video}}\in G$,
respectively. Although both classifiers were described in [41], we give a
brief presentation of their architectures in the next paragraphs, for the sake
of completeness.
Classifier $g_{\text{I+A}}$ was fed with two parallel inputs: a two-seconds-
long (i.e., $100$ timesteps-long) time-window with the raw signals from the
inertial sensors, and the mean values of the ambient sensors in the
correspondent timestamps. The inertial data was processed by a one-dimensional
Convolutional Neural Network (CNN) [53], composed of two convolutional layers
interspersed with pooling layers, followed by a Long Short-Term Memory (LSTM)
recurrent layer [16], generating the feature vector $v_{1}$. The ambient data
was processed by a single fully-connected layer, generating the feature vector
$v_{2}$. Both $v_{1}$ and $v_{2}$ were concatenated and sent to a softmax
output layer.
Classifier $g_{\text{video}}$ has taken, as input, a sequence of $25$ optical
flow pairs, correspondent to two seconds of video, computed with the TVL1
algorithm [52]. The InceptionV3 CNN architecture [48] was trained to classify
each optical flow pair individually. The CNN-LSTM architecture, adopted by the
authors, consisted of feeding each optical flow pair within a sequence to this
pre-trained InceptionV3 module, and feeding the resulting features as inputs
to each timestep of a LSTM layer, whose outputs were connected to a softmax
output layer.
Both above-mentioned classifiers were endowed with softmax activation in their
outputs, which ensured that the prediction vector respects a valid probability
distribution. To provide the prediction vectors, we split each recording
session in $N_{T}=140$ timesteps, regardless to its original length, and used
the referred framework to provide the predictions on each of those timesteps.
The effect is to assume that all activities have similar length, a
simplification that allowed the design of more uniform and comparable
experiments related to the bioinspired computational models (Subsection 4.1),
and the robot simulation (Subsection 5.4).
The output of the activity recognition module is, for a whole recording
session $x$ processed by a classifier $g$, a total of $N_{X}=144$ sets of
prediction vectors $y_{x}=\\{y_{x}^{1},\dots,y_{x}^{N_{T}}\\}$, with
$N_{T}=140$. Outputs from both classifiers $g_{\text{I+A}}$ and
$g_{\text{video}}$ were applied to all simulations, as described in the
following subsections.
### 5.2 Heuristics Model Implementation
Two policies $H$ were considered for the heuristics model, named window or
exponential, that is, $H=\\{h_{\text{window}},h_{\text{exponential}}\\}$. This
experimental setup resulted in a total of four conditions for evaluation in
the neurorobotics approach, given by the space $G\times H$.
The window policy consisted of deriving a wider prediction vector $y_{w}^{t}$,
correspondent to $N_{r_{w}}$ timesteps. This was done by averaging the
$N_{r_{w}}$ most recent prediction vectors in $y_{x}$, from the activity
recognition module, as in Equation 11. We have set $N_{r_{w}}=8$, which
corresponds to windows of four seconds from the recording sessions, because
this was the length of the segments considered for the neurorobotics approach
(see Subsection 4.2). On the other hand, the exponential policy consisted of
deriving a prediction vector $y_{e}^{t}$ that considered the whole sequence of
previous prediction vectors in $y_{x}$, with an exponential decay across
iterations, as in Equation 12. If $R=\\{r_{w},r_{e}\\}$ is the set of the
functions to compute $y_{w}^{t}$ and $y_{e}^{t}$, then the decision $d_{r}$ of
the heuristics approach, for either the window or exponential policies, is
given by Equation 13. It is important to note that, for the window policy of
the heuristics approach, as in the neurorobotics approach, the robot can only
begin to move after the first four seconds of each simulation, in which it is
gathering the number of prediction vectors necessary to compute the first
decision.
$\begin{split}r_{w}:Y\times T\rightarrow Y\Longleftrightarrow
y_{w}^{t}=r_{w}(y_{x},t)=\frac{\sum_{i=0}^{N_{r_{w}}-1}y_{x}^{t-i}}{N_{r_{w}}}\\\
y_{x}\in Y,\quad t\in T_{X}|t>N_{r_{w}},\end{split}$ (11)
$\begin{split}r_{e}:Y\times T\rightarrow Y\Longleftrightarrow
y_{e}^{t}=\begin{cases}r_{e}(y_{x},t=0)=y_{x}^{t}\\\ r_{e}(y_{x},t>0)=0.9\cdot
r_{e}(y_{x},t-1)+y_{x}^{t}\end{cases}\\\ \quad y_{x}\in Y,\quad t\in
T_{X}\end{split}$ (12)
$\begin{split}d_{R}:Y\times T\times R\rightarrow B\Longleftrightarrow
d_{R}(y_{x},t,r)=f_{B}(argmax[r(y_{x},t)])\\\ y_{x}\in Y,\quad t\in
T_{X},\quad r\in R\end{split}$ (13)
As a reference, we introduced an additional approach, a control condition in
which the ground truth labels are directly fed to the robot simulation,
providing a unique decision $d_{GT}$ every timestep, as shown by Equation 14.
$\begin{split}d_{GT}:X\rightarrow B\Longleftrightarrow
d_{GT}(x)=f_{B}(f_{A}(x)),\\\ x\in X\end{split}$ (14)
### 5.3 Neurorobotics Model Implementation
Let $M$ be the bioinspired computational model, which can be rat-based or
marmoset-based, that is, $M=\\{m_{\text{rat}},m_{\text{marmoset}}\\}$. This
experimental setup resulted in a total of four conditions for evaluation in
the neurorobotics approach, given by the space $G\times M$. Each independent
simulation of the computational model (not to be confused with the robot
simulation) was ran for each of the $N_{X}=144$ recording sessions under each
condition being evaluated, that is, the simulations of the computational
models were required to contemplate all instances in the space $X\times
G\times M$. Hence, a total of $576$ simulations of the computational model was
performed.
Each of those simulations ran for $70$ seconds with sampling rate of $1,000$
Hz. The stimuli set $S$ was updated every $0.5$ second (i.e., update frequency
of 2 Hz). This led to an adaptive dynamic that would respond to successive
prediction vectors $y_{x}^{t}$,
$t_{\text{sim}}\in\\{1,\dots,N_{T_{\text{sim}}\\}}$, with
$N_{T_{\text{sim}}}=140$, according to the confidence of each response
behaviour. The resulting spike trains in each neuron population were converted
to neural firing frequencies (for details, see [23]), with bins of size $20$,
which resulted in sequences of length $N_{U}=3,500$. As stated in Subsection
5.1, for the experiments reported in this work, $N_{B}=2$, hence $N_{C}=2$.
Considering that $N_{R}=8$, the multivariate time-series $u_{x}^{g,m}\in U$
had $N_{R}\cdot N_{C}=16$ variables and $L_{U}=3,500$ timesteps, composing a
data structure with dimensions $3,500\times 16$,
The segments for the decoder we set to $N_{V}=200$ timesteps (i.e., four-
seconds-long) with $75\%$ superposition (i.e., a one-second-long step between
the beginning of each segment), resulting in $66$ segments. Considering the
each condition was composed of $N_{x}=144$ recording sessions, these
simulations of the computational models led to a total of $144\cdot 66=9,504$
instances $v\in V$, for each $(g,m)\in G\times M$.
The CNN architecture for decoding these time-series into response behaviours
is depicted in Table 1. It was composed of two convolutional layers, with
$128$ and $256$ filters, respectively, interspersed with max-pooling layers. A
global average pooling operation preceded the softmax output layer, which
produced the decision vector $q_{x}^{t}$.
Table 1: Layers in the CNN-based decoder. The inputs to the neural network are windows of $200$ timesteps from the four cortex channels of the output signals (i.e., neural firing frequencies) of the simulations under a given condition. The output is a decision vector $q_{x}^{t}$ with the confidences for each response behaviour. Layer | Type | Output shape | Free parameters
---|---|---|---
1 | Input | $200\times 4$ | -
2 | Conv1D | $200\times 128$ | $3,712$
3 | MaxPool1D | $100\times 128$ | -
4 | Conv1D | $100\times 256$ | $229,632$
5 | MaxPool1D | $50\times 256$ | -
6 | Global Average Pooling | $256$ | -
7 | Softmax | $3$ | -
For each set of conditions, the CNN was trained in a cross-subject 8-fold
cross-validation scheme, similar to the one adopted for the activity
recognition module [41]. The input data was linearly normalised to the range
$[0,1]$, and the classification models were trained for $40$ epochs with batch
size $32$. The ADAM algorithm was employed, with learning rate $10^{-3}$, to
optimise the categorical cross-entropy loss function. The outputs of the
evaluations were stored and organised, in order to serve as inputs to the next
steps. The resulting sequences $u_{x}^{g,m}$ were then introduced to the
decision-making mechanism.
### 5.4 Robot Behaviours
The behaviours $b\in B$ consisted of transporting an object $o\in O$, from a
starting position $z\in Z$ to a fixed destination $z_{\text{dest}}$. This task
was adopted because it comprises a basic and generic functionality for a
mobile robot in a home environment. The associations between the behaviours
and the objects are given by Equation 15, while the associations between the
objects and their starting positions in the map are given by Equation 16.
$\displaystyle f_{O}:B\rightarrow O\Longleftrightarrow f_{O}(b)=o,\quad b\in
B,\quad o\in O$ (15) $\displaystyle f_{Z}:O\rightarrow Z\Longleftrightarrow
f_{Z}(o)=z,\quad o\in O,\quad z\in Z$ (16)
At each timestep $t_{\text{robot}}$, a decision $d\in
B\cup\\{b_{\emptyset}\\}$ (i.e., a response for each recording session $x\in
X$ of the activity recognition module) was sent to the robot simulation,
composed of a mobile social robot in a home environment (for details on the
platforms and implementations employed, see Subsection 5.5). For the
neurorobotics approach, this decision is given by Equation 10, already
presented in Subsection 4.2. For the heuristics approach, the two policies
mentioned (i.e., window and exponential) were evaluated.
The decisions were turned into commands to the robot following a table of
rules, depicted in Table 2. A decision $d$ is sent to the robot at each
timestep. This decision can be one of the behaviours in $b\in B$ or the ”no
action” behaviour $b_{\emptyset}$. Let $o_{c}$ be the object being carried by
the robot at a certain timestep. Two types of situations might be considered:
$d\in B$ or $d=b_{\emptyset}$.
Table 2: Table of rules associating a response behaviour $f(d)=b$ to an output command at each timestep $t_{\text{robot}}$ of the robot simulation, considering the object being carried and the current robot position. Decision | Object carried | Robot position | Output command
---|---|---|---
$b\in B$ | $o_{c}=\emptyset$ | $z\neq f_{Z}[f_{O}(b)]$ | Move towards $f_{Z}[f_{O}(b)]$
$b\in B$ | $o_{c}=\emptyset$ | $z=f_{Z}[f_{O}(b)]$ | Set $o_{c}=f_{O}(b)$
$b\in B$ | $o_{c}=f_{O}(b)$ | $z\neq z_{\text{dest}}$ | Move towards $z_{\text{dest}}$
$b\in B$ | $o_{c}=f_{O}(b)$ | $z=z_{\text{dest}}$ | Finish behaviour
$b\in B$ | $o_{c}=o_{k}\in O\quad|\quad o_{k}\neq f_{O}(b)$ | $z\neq f_{Z}[o_{k}]$ | Move towards $f_{Z}[o_{k}]$
$b\in B$ | $o_{c}=o_{k}\in O\quad|\quad o_{k}\neq f_{O}(b)$ | $z=f_{Z}[o_{k}]$ | Set $o_{c}=\emptyset$
$b_{\emptyset}$ | $o_{c}=o_{k}\in O$ | $z\neq f_{Z}[o_{k}]$ | Move towards $f_{Z}[o_{k}]$
$b_{\emptyset}$ | $o_{c}=o_{k}\in O$ | $z=f_{Z}[o_{k}]$ | Set $o_{c}=\emptyset$
$b_{\emptyset}$ | $o_{c}=\emptyset$ | $\forall z\in Z$ | Wait
The first type of situation is characterised by $d=b_{\emptyset}$, in which
the robot must return any object that it may be carrying to the corresponding
position, and then stand still, waiting for any further commands. Otherwise,
$d=b\in B$, the second type of situation, in which the robot is supposed to
grab an object $o_{c}=f_{O}(b)\in O$ from position $f_{Z}[f_{O}(b)]$ to a
destination $z_{\text{dest}}$. If the robot is not carrying any object, that
is, $o_{c}=\emptyset$, then it must move to $f_{Z}[f_{O}(b)]$ and take the
object. If it is already carrying the correct object, then it must move
towards the destination $z_{\text{dest}}$. If it is carrying the wrong object,
it is, $o_{c}=o_{k}\in O\quad|\quad o_{k}\neq f_{O}(b)$, then it must return
it to $f_{Z}[o_{k}]$.
### 5.5 Robot Simulator
The simulator adopted for the robotics experiments was previously made
available as part of the LARa framework [39], consisted of a robot and a
software library. The LARa robot was a mobile social robot built on the top of
a Pioneer P3-DX platform, endowed with a Hokuyo laser, a mini computer, a
Microsoft Kinect sensor, a microphone, a screen, and a speaker. The LARa
library was a set of functionalities implemented to control the robot based on
high-level software interfaces, integrated within the Robot Operating System
(ROS) [37]. Besides navigation skills and a framework for human-robot
interaction, this included a platform for simulation, under conditions that
resembled those of the actual robot, deployed to allow offline experiments.
The Gazebo simulator [20] was employed, and a map of a typical home
environment was designed, as reproduced in Figure 5(a). The simulated robot -
a simplified version of the LARa robot - is shown in Figure 5(b), while the
pieces of furniture employed in the experiments are shown in Figure 5(c).
(a) Map of the whole home environment employed for the experiments.
(b) Simulated mobile robot.
(c) In a different camera angle, the section of the map in which the robot
behaviours were performed, with the indications of the robot and the pieces of
furniture involved in the tasks (i.e., shelf 1, shelf 2 and table).
Figure 5: Virtual environment for the robot simulation, using the Gazebo
platform.
This setting comprised a realistic environment, which provided several
challenging aspects resembling those of a real-world scenario, such as
sensors’ noise, communication delays and mechanical issues. The ROS platform
was employed to connect this simulated environment to a navigation stack,
which provided a 2D occupancy grid in which each position (i.e., cell) might
be considered empty, navigable or obstacle. This representation was generated
previously to the robot simulations reported here, via the GMapping algorithm
[13] for Simultaneous Localisation and Mapping (SLAM). The mapping algorithm
ran while the robot was teleoperated through the whole environment, with the
laser readings and the wheels’ encoders combined to gradually compose the
occupancy grid. Once the grid was created, the Augmented Monte Carlo
Localisation (AMCL) and A* algorithms could be employed as a global planner to
perform autonomous navigation. The navigation package was also endowed with a
local planner, responsible for creating adaptable short-term paths for
obstacle avoidance and environmental changes.
For this work, a set of two response behaviours was defined as
$B=\\{b_{1},b_{2}\\}$. In Table 3, are shown the set of daily activities from
the dataset (i.e., $a_{p}\in A$, $p\in\\{1,\dots,N_{A}\\}$), and the expected
response behaviours associated to each of those activities (i.e.,
$f_{B}(a_{p})$). These were chosen respecting semantic relationships between
the activities (i.e., $b_{1}$ is the desired response when the user is
preparing meals, and $b_{2}$, when he is quietly consuming or exchanging
information).
Table 3: List of activities provided by the HWU-USP activities dataset, and expected response behaviours in the application scenario. Activity $a$ | Description | Response behaviour $b$
---|---|---
$a_{1}$ | making a cup of tea | $b_{1}$
$a_{2}$ | making a sandwich | $b_{1}$
$a_{3}$ | making a bowl of cereals | $b_{1}$
$a_{4}$ | using a laptop | $b_{2}$
$a_{5}$ | using a phone | $b_{2}$
$a_{6}$ | reading a newspaper | $b_{2}$
$a_{7}$ | setting the table | $b_{\emptyset}$
$a_{8}$ | cleaning the dishes | $b_{\emptyset}$
$a_{9}$ | tidying the kitchen | $b_{\emptyset}$
These behaviours were based on the assumption that the user is located in the
kitchen, and that the human activities are being monitored by sensors that are
not affected by the robot actions. The starting position for only the first
robot simulation in a battery of experiments is given in Figure 5. However, it
had negligible effect in the overall results, since this position was not
reset for each simulation, as we discuss later in this subsection.
As shown in Figure 5(c), three pieces of furniture are considered. These are
shelf 1, associated to the robot position $z_{\text{s1}}=f_{Z}(o_{1})$,
$o_{1}\in O$; shelf 2, associated to the robot position
$z_{\text{s2}}=f_{Z}(o_{2})$, $o_{2}\in O$; and table, the destination,
associated to the robot position $z_{\text{dest}}$. The two specific
behaviours considered for the experiments performed, $b_{1}$ and $b_{2}$,
consist, respectively, of transporting object $o_{1}$ from $z_{1}$ (i.e.,
shelf 1) to $z_{\text{dest}}$ (i.e., the table), and transporting object
$o_{2}$ from $z_{2}$ (i.e., shelf 2) to $z_{\text{dest}}$ (i.e., the table).
Considering that shelf 2 is closer to the table than shelf 1, then the
distances required for $b_{1}$ are larger than those for $b_{2}$. As a
consequence, it was expected that, on average, $b_{1}$ required more time to
be completed than $b_{2}$.
The maximum robot simulation time was set to $N_{T_{\text{robot}}}=140$
seconds, with each timestep
$t_{\text{robot}}\in\\{1,\dots,N_{T_{\text{robot}}}\\}$ corresponding to one
second in the simulation. Consequently, an expected response behaviour had to
be finished within $N_{T_{\text{robot}}}$ seconds to be considered
successfully completed. We configured $N_{T_{\text{robot}}}=140$, which in
exploratory experiments has shown to give a reasonable margin for the robot
simulations.
A total of $N_{X}=144$ robot simulations was performed for each condition
analysed. The first simulation for each approach began with the robot
positioned as in Figure 5(c). All the next simulations began without resetting
the robot position after the ending of the previous one, with only the object
flag, corresponding to the object $o_{c}$ being carried by the robot, being
cleared. In this scenario, each simulation could be started with the robot in
any of the positions in $Z$, or in locations belonging to the path between
them.
## 6 Results
Concerning the activity recognition module, its classification results are
presented in [41]. The overall accuracy registered for the classifiers were
computed by taking a set of $25$ prediction vectors obtained for a recording
session and averaging it. A categorical classification was provided by
returning the $argmax$ element in the averaged vector. A cross-validation
approach, following the same cross-subject partitioning adopted for evaluating
the CNN-based decoder in this work, have been performed. The accuracy reported
for the modalities considered for the experiments reported here was $74.30\%$
for $g_{I+A}$, and $93.75\%$ for $g_{\text{video}}$.
The other modules in this work relied on important adaptations to frameworks
previously implemented in related work, as happened to the computational
models and the robot simulation, or to components developed from scratch, case
of the CNN-based decoder. The corresponding results are shown in the following
subsections. The classification metrics from the neural firing frequencies
synthesised with the bioinspired computational models are presented in
Subsection 6.1. The outcomes of the robot simulations, in all conditions
analysed, are presented in Subsection 6.2.
### 6.1 Simulated Neural Firing Frequencies
A sample of the segments $v\in V$, provided in the simulations of the
computational models, is shown in Figure 6. This was generated from a rat
model, being stimulated according to an IMU + ambient classifier as the
activity recognition module. A larger stimulus introduced to the striatum is
expected to increase neural firing rates in the BG-T-C circuit, which might be
propagated to the cortex.
Figure 6: Sample output from the bioinspired computational model of the BG-C-T
circuit. For the motor cortex of each channel, RS and FSI, we considered the
overall mean firing rates computed with time bins of size $20$ milliseconds,
and evaluated on two-seconds-long time windows. This data was used as input
for the CNN-based decoder, in the next step of the bioinspired pipeline.
The overall accuracy and F1-score of the decoder, trained and evaluated
according to the 8-fold cross-subject approach described, are shown in the
bars plot of Figure 7. The classifier used in the activity recognition module
and the computational model employed are shown side-by-side.
Figure 7: Accuracy and F1-score for the CNN-based decoder in classifying a MFR
signal into a set of three possible decisions: B1, B2 or "no action". On
choosing the models for evaluation, two factors were analysed: the modalities
and models employed for activity recognition (IMU + ambient sensors or video-
based) [41], and the computational model considered (rat-based or marmoset-
based) [22, 40].
The decoder was applied as a part of the decision-making mechanism,
responsible for providing decision vectors for the robot simulation. Hence,
its results might be correlated to the correct outcomes of the decisions made
during the robot simulation. In other words, a good accuracy of the decoder
might result in more correct decisions of the robot, which may more often
complete the tasks with the correct outcome. The next subsection will present
the experiments performed to validate this statement. These are the outcomes
of the robot simulation not only for each of those conditions, but also for
each policy employed for the heuristics approach.
### 6.2 Outcomes of the Robot Simulations
As it was mentioned before, three possible outcomes were considered for the
robot simulations, with $f_{A}(x)=a$ being the activity associated to a
recording session $x\in X$:
* •
Correct, if $f_{B}(a)\in B$ and the activity was completed before the end of
the simulation, or if $f_{B}(a)=b_{\emptyset}$ and no behaviour was completed;
* •
Incorrect, if the robot completed a behaviour $b_{\text{robot}}\in B$
different from $f_{B}(a)$, i.e., $b_{\text{robot}}\neq f_{B}(a)$;
* •
Unfinished, if a response behaviour $b\in B$ was expected from the robot, but
no behaviour was completed before the end of the simulation.
In Subsection 5.5, a control condition was introduced, with ground truth
decisions being sent for the robot. For this approach, as it was expected, all
robot simulations let to the correct outcome. In Figure 8(a), the outcomes for
the heuristics approach are presented, with each of the policies analysed
(i.e., window and exponential) being represented in different plots, each
illustrating the outcomes for each classifier considered for the activity
recognition module. The outcomes for the neurorobotics approach are shown in
Figure 8(a), with the classifiers for activity recognition (IMU + ambient or
video) and the computational models (rat or marmoset) being represented.
(a) Outcomes for the robot simulations performed with the heuristics approach.
Four batteries of simulations were performed, considering two factors: the
classifiers employed for activity recognition (IMU + ambient sensors and
video-based) and the policy for the decision-making mechanism (window or
exponential) (see Figure 4a).
(b) Outcomes for the robot simulations performed with the neurorobotics
approach. Four batteries of simulations were performed, related to two factors
analysed: the modalities and models employed for activity recognition (IMU +
ambient sensors or video-based) [41], the computational model considered (rat-
based or marmoset-based) [40] (see Figure 4b).
Figure 8: Outcomes for the robot simulations. Three possible outcomes were
considered: the robot completed the expected (correct) behaviour; the robot
concluded the incorrect behaviour; no behaviour was completed (unfinished),
although an action was required from the robot.
The times elapsed for providing the correct outcome, when a response behaviour
was expected from the robot, were also recorded. The mean and standard
deviations, within all simulations performed for each condition, are
represented in Figure 9. Two separate plots were provided, separating the
classifiers employed for the activity recognition module. The ground truth
approach was reproduced in both of them, since it does not depend on
prediction vectors, but in the ground truth activities.
This metric considers only the outcomes completed successfully. An approach
that provides a fast response with poor accuracy would provide a low time
response, though it would not necessarily provide the correct response
behaviours very often. Hence, the fact that the heuristics approach with the
window policy led to a faster average response than the ground-truth condition
is consistent. Since incorrect and unfinished outcomes were not considered for
the computation of this mean value, this result only shows that, for this
model, the correct outcomes were mostly associated to activities that could be
completed in less time (e.g., the behaviour $b_{2}$).
Figure 9: Average times elapsed across the 144 sequences on each simulation in
which the correct behaviour was performed. Incorrect and unfinished outcomes,
as well as correct outcomes when no action was required from the robot, were
not considered in this evaluation. All simulated models, basend on either
heuristics or neurorobotics, are shown.
## 7 Discussion
The results from the CNN-based decoder, shown in Figure 7, confirmed some
expectations regarding the output signals produced by the simulations of the
computational models according to the stimuli provided: it performed better
for the the video-based classifier than for the IMU + ambient, and for the
marmoset-based model, compared to the rat-based. The accuracy and F1-score
metrics were very close, which considering a strictly balanced dataset, points
that the results were not affected by any serious issues regarding the trade-
off between precision and recall.
All evaluations led to an accuracy measure of over $70\%$ for three classes
(i.e., response behaviours $b_{1}$, $b_{2}$ or $b_{\emptyset}$). It is
important to consider that the stimuli came from noisy prediction vectors from
activity recognition algorithms, whose accuracy is variable across successive
segments [41], with overall accuracy values of $74.30\%$, for $g_{I+A}$, and
$93.75\%$, for $g_{\text{video}}$. These results show that the neural activity
provided by the computational models could be reliably interpreted by the
proposed decoder, even considering segments of limited length (i.e., four-
seconds-long segments within a 70-seconds-long sequence). Hence, this
particular technique for brain signals, analysed in previous studies for
processing related neuronal data of the BG-T-C circuit [34, 42], has shown to
be suitable for the decision-making approach proposed.
Since the accuracy measure of the classifier for activity recognition was
significantly higher for the video-based classifier than for the IMU +
ambient, it was expected that it could be more easily decoded by the neural
network, which was confirmed by the decoder results (see Figure 7). Also, the
marmoset-based model led to better decoding performances than the rat-based
model, which also meets the expectations, considering a more sophisticated
morphology and dynamics in the underlying brain structures in primates than in
rodents [27].
Regarding the robot simulations, heuristics approaches were evaluated in
parallel to the neurorobotics approaches. In most experiments performed in
this work, better performances were found for the models fed by the video-
based classifier than those fed by the IMU + ambient classifier, which was
expected, since the video classifier is expressively more accurate [41]. As
shown in Figure 8(a), the window policy led to a lower number of successfully
completed response behaviours, especially when fed with prediction vectors
coming from the IMU + ambient classifier (less accurate). This condition may
be the fairest comparison to the neurorobotics approach since it limits its
decisions to data from the four-seconds-long segment that precedes a given
decision, the same constraint applied to the CNN-based decoder.
In this context, the neurorobotics approach has shown to provide more accurate
outcomes in most conditions, especially for the marmoset model. For the
IMU+ambient modality of the activity recogniser, the window policy of the
heuristics approach led to $79.9\%$ of correct outcomes, which was surpassed
by the $84.7\%$ result for either the rat or marmoset models. For the video
modality, the window policy of the heuristics approach led to $86.0\%$ of
correct outcomes, which was only slightly above the rat model, which hit
$85.3\%$, and expressively below the marmoset model, which hit $93.7\%$. These
results point that the proposed neurorobotics approach, in the conditions
analysed in this study, may lead to better outcomes than a simple heuristics
for a real-time task of an autonomous robot.
For the exponential policy of the heuristics approach, a particularity was
found: it led to similar results for either the video and IMU + ambient
conditions (i.e., $88.2\%$ and $88.8\%$ of correct outcomes, respectively),
both with more correct outcomes than those of the window policy. This result
is relevant, since it reveals that, by performing a long-term aggregation of
prediction vectors obtained subsequently from a single recording session, it
may be possible to compensate lower accuracy values provided by certain
classifiers that work with different sets of sensors. This possibility might
be considered in practical applications, in which more informative modalities
that usually lead to high accuracy, such as videos, may be either difficult to
be obtained, due to privacy concerns [9], or unfeasible to provide real-time
outputs, due to the high computational cost inherent to the operations
required for processing them [45].
Regarding the different conditions considered for the neurorobotics approach
(i.e., the activity recogniser and the computational model), the expectation
was that, when applied to the robot simulation, the number of correct outcomes
would be comparatively proportional to the accuracy measures of the decoder
(see Figure 7). As shown in Figure 8(b), this expectation was met for most
conditions, although some exceptions were found.
Better results for the marmoset model were expected, since the number of
neurons and the connectivity are larger [36, 21]. The results of the decoder,
previously discussed, corroborate to this hypothesis. For the robot
simulations, considering the video modality, the marmoset model led to the
best results found among all of the simulations, with $93.7\%$ of correct
outcomes, against $85.3\%$ achieved by the rat model. However, for the IMU +
ambient modality, the results were similar for both models. A possible
explanation for this result is that such an increased capacity could
compensate the mistakes for a more accurate activity recognise. In other
words, the prediction vectors across successive segments could assign higher
confidence values (i.e., probabilities) to the expected label (i.e., the
ground-truth activity) for the video-based classifier than for the IMU +
ambient, and the marmoset-based model, more sophisticated, was able to take
more advantage on it than the rat-based.
By measuring the time elapsed in the robot simulations with correct outcomes,
we can see only modest variations across conditions. An important observation
regarding this metric is that a fast response is not necessarily an indication
of a good performance, since this result is affected not only for the
assertiveness of the correct outcomes (i.e., few changes of decision within a
simulation), but also to the accuracy of the simulations in a given set of
conditions. For instance, a given condition may lead to fast response when it
provides the correct outcome, but most simulations may lead to an incorrect or
unfinished outcome.
For the neurorobotics approach, the times were approximately similar between
both classifiers, except for the marmoset model, which took significantly
longer to finish, on average, when fed with the video-based classifier.
Considering the heuristics approach, the video-based classifier led to clearly
longer times for completing the behaviours, which was probably because some of
the changes in decisions (i.e., the robot is performing behaviour $b_{1}$, but
the decision-making mechanism changes it to $b_{2}$ after receiving new,
updated prediction vectors) within the simulations allowed for completing more
simulations with the correct outcome. The same reason explains why the correct
outcomes of the window policy for the IMU + ambient classifier led to a faster
response, on average, than the ground-truth value.
## 8 Conclusions and Future Work
In this paper, we employed a neurorobotics approach based on the embodiment of
validated computational models of brain structures for creating a decision-
making mechanism to provide effective response behaviours to a mobile robot in
a simulated environment.
The chosen application scenario was a simulated smart home where data from the
sensed environment was processed with a previously designed activity
recognition framework. The neurorobotics approach was compared to some
heuristics. For this, two simple heuristics were proposed and evaluated to
provide real-time decisions based on the outputs from an activity recognition
classifier.
The neurorobotics model used computational models (CM) of the basal ganglia-
thalamus-cortex (BG-T-C) circuit, originally designed to study the underlying
mechanisms of Parkinson’s Disease. The CM were adapted, so that the outputs
from the activity recognition module were applied as stimuli to the striatum
of the circuit, and spike activity at the cortex was decoded with a
convolutional neural network (CNN) to provide decisions to the robot
simulation. Different conditions were analysed, including whether the
computational models were based on rodent or primate models.
Results were reported with respect to the accuracy obtained for the CNN-based
decoder in each condition for the computational model, and to the outcomes of
the robot simulations, considering the neurorobotics and the heuristics
approaches. The expectations were met for most of the different conditions
regarding the neurorobotics approaches. The primate-based computational model
led to the best outcomes between the simulations analysed.
Hence, one can conclude that the proposed neurorobotics approach is promising
not only as an embedded tool for understanding the neurophysiological aspects
of animal behaviour, but also as a practical component to integrate decision-
making mechanisms for action selection in mobile robots engaged in human-
robot-interaction scenarios.
Future work may consist of providing a real-time simulation of the proposed
application scenario, with a robot placed in a physical environment in which
human participants may be performing activities. This would require the
integration among the different modules shown in the pipelines presented, thus
ensuring that all of them can work in real-time. Such an experiment may
validate our approach in even more challenging conditions and scenarios, which
may foster a wide range of applications.
## Acknowledgement
This work was funded by the Sao Paulo Research Foundation (FAPESP), grants
2017/02377-5, 2017/01687-0 and 2018/25902-0, and the Neuro4PD project - Royal
Society and Newton Fund (NAF\R2\180773). Moioli acknowledge the support from
the Brazilian institutions: INCT INCEMAQ of the CNPq/MCTI, FAPERN, CAPES,
FINEP, and MEC. This research was carried out using the computational
resources from the CeMEAI funded by FAPESP, grant 2013/07375-0. Additional
resources were provided by the Robotics Lab within the ECR, and by the Nvidia
Grants program.
## References
* [1] Sara Ashry, Tetsuji Ogawa, and Walid Gomaa. CHARM-Deep: Continuous Human Activity Recognition Model Based on Deep Neural Network Using IMU Sensors of Smartwatch. IEEE Sensors Journal, 20(15):8757–8770, 8 2020.
* [2] Davide Bacciu, Maurizio Di Rocco, Mauro Dragone, Claudio Gallicchio, Alessio Micheli, and Alessandro Saffiotti. An ambient intelligence approach for learning in smart robotic environments. Computational Intelligence, pages 1–28, 7 2019.
* [3] Jyotika Bahuguna, Philipp Weidel, and Abigail Morrison. Exploring the role of striatal D1 and D2 medium spiny neurons in action selection using a virtual robotic framework. Wiley Online Library, 49(6):737–753, 3 2018.
* [4] S. Bariselli, W. C. Fobbs, M. C. Creed, and A. V. Kravitz. A competitive model for striatal action selection, 6 2019.
* [5] Davide Calvaresi, Daniel Cesarini, Paolo Sernani, Mauro Marinoni, Aldo Franco Dragoni, and Arnon Sturm. Exploring the ambient assisted living domain: a systematic review. Journal of Ambient Intelligence and Humanized Computing, 8(2):239–257, 2017.
* [6] Caitlyn Clabaugh and Maja Matarić. Escaping Oz: Autonomy in Socially Assistive Robotics. Annual Review of Control, Robotics, and Autonomous Systems, 2(1):33–61, 5 2019.
* [7] Ted M. Dawson, Todd E. Golde, and Clotilde Lagier-Tourenne. Animal models of neurodegenerative diseases. Nature Neuroscience, 21(10):1370–1379, 2018.
* [8] Salvador Dura-Bernal, Benjamin A Suter, Padraig Gleeson, Matteo Cantarelli, Adrian Quintana, Facundo Rodriguez, David J Kedziora, George L Chadderdon, Cliff C Kerr, Samuel A Neymotin, Robert A McDougal, Michael Hines, Gordon MG Shepherd, and William W Lytton. Netpyne, a tool for data-driven multiscale modeling of brain circuits. eLife, 8:e44494, apr 2019.
* [9] Francisco Erivaldo Fernandes Junior, Guanci Yang, Ha Manh Do, and Weihua Sheng. Detection of Privacy-sensitive Situations for Social Robots in Smart Homes. In Automation Science and Engineering (CASE), 2016 IEEE International Conference on, pages 727–732. IEEE, 2016.
* [10] Felipe Aparecido Garcia, Caetano Mazzoni Ranieri, and Roseli Aparecida Francelin Romero. Temporal approaches for human activity recognition using inertial sensors. In Proceedings - 2019 Latin American Robotics Symposium, 2019 Brazilian Symposium on Robotics and 2019 Workshop on Robotics in Education, LARS/SBR/WRE 2019, pages 121–125. Institute of Electrical and Electronics Engineers Inc., 10 2019.
* [11] Ilche Georgievski, Tuan Anh Nguyen, Faris Nizamic, Brian Setz, Alexander Lazovik, and Marco Aiello. Planning meets activity recognition: Service coordination for intelligent buildings. Pervasive and Mobile Computing, 38:110–139, 7 2017.
* [12] B. Girard, N. Tabareau, Q. C. Pham, A. Berthoz, and J. J. Slotine. Where neuroscience and dynamic system theory meet autonomous robotics: A contracting basal ganglia model for action selection. Neural Networks, 21(4):628–641, 5 2008.
* [13] Giorgio Grisetti, Cyrill Stachniss, and Wolfram Burgard. Improved techniques for grid mapping with rao-blackwellized particle filters. IEEE transactions on Robotics, 23(1):34–46, 2007.
* [14] P. Halje, Ivani Brys, Juan J. Mariman, Claudio Da Cunha, Romulo Fuentes, and Per Petersson. Oscillations in cortico-basal ganglia circuits: Implications for parkinson’s disease and other neurologic and psychiatric conditions. Journal of Neurophysiology, 122(1):203–231, 2019.
* [15] Samitha Herath, Mehrtash Harandi, and Fatih Porikli. Going deeper into action recognition: A survey. Image and Vision Computing, 60:4–21, 4 2017.
* [16] Sepp Hochreiter and Jürgen Schmidhuber. Long short-term memory. Neural Computation, 9(8):1735–1780, 11 1997.
* [17] Javed Imran and Balasubramanian Raman. Evaluating fusion of RGB-D and inertial sensors for multimodal human action recognition. Journal of Ambient Intelligence and Humanized Computing, 11(1):189–208, 1 2020.
* [18] Hitoshi Kita and Takako Kita. Cortical stimulation evokes abnormal responses in the dopamine-depleted rat basal ganglia. Journal of Neuroscience, 31(28):10311–10322, 2011.
* [19] Woo Ri Ko and Jong Hwan Kim. Behavior Selection of Social Robots Using Developmental Episodic Memory-Based Mechanism of Thought. In 2018 IEEE International Conference on Consumer Electronics - Asia, ICCE-Asia 2018. Institute of Electrical and Electronics Engineers Inc., 11 2018.
* [20] Nathan Koenig and Andrew Howard. Design and use paradigms for gazebo, an open-source multi-robot simulator. In 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)(IEEE Cat. No. 04CH37566), volume 3, pages 2149–2154. IEEE, 2004.
* [21] James B. Koprich, Lorraine V. Kalia, and Jonathan M. Brotchie. Animal models of alpha-synucleinopathy for Parkinson disease drug development. Nature Reviews Neuroscience, 18(9):515–529, 8 2017.
* [22] Karthik Kumaravelu, David T. Brocker, and Warren M. Grill. A biophysical model of the cortex-basal ganglia-thalamus network in the 6-OHDA lesioned rat model of Parkinson’s disease. Journal of Computational Neuroscience, 40(2):207–229, 4 2016.
* [23] Petr Lánský, Roger Rodriguez, and Laura Sacerdote. Mean Instantaneous Firing Frequency is Always Higher Than the Firing Rate. Neural Computation, 16(3):477–489, 3 2004.
* [24] Junjun Li, Zhijun Li, Fei Chen, Antonio Bicchi, Yu Sun, and Toshio Fukuda. Combined Sensing, Cognition, Learning, and Control for Developing Future Neuro-Robotics Systems: A Survey. IEEE Transactions on Cognitive and Developmental Systems, 11(2):148–161, 6 2019.
* [25] Kang Li, Jinting Wu, Xiaoguang Zhao, and Min Tan. Real-Time Human-Robot Interaction for a Service Robot Based on 3D Human Activity Recognition and Human-Mimicking Decision Mechanism. In 8th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems, CYBER 2018, pages 498–503. Institute of Electrical and Electronics Engineers Inc., 4 2019.
* [26] Yabin Liang, Zikai Yan, Qi Zhang, Hongyu Liang, Xiyu Ji, Yin Liu, and Rong Liu. A decision-making model based on basal ganglia account of action prediction. In IEEE International Conference on Robotics and Biomimetics, ROBIO 2019, pages 1705–1710. Institute of Electrical and Electronics Engineers Inc., 12 2019.
* [27] Jean Liénard and Benoît Girard. A biologically constrained model of the whole basal ganglia addressing the paradoxes of connections and selection. Journal of Computational Neuroscience, 36(3):445–468, 2014.
* [28] Yantao Lu and Senem Velipasalar. Autonomous Human Activity Classification from Wearable Multi-Modal Sensors. IEEE Sensors Journal, 19(23):11403–11412, 12 2019.
* [29] Chih Yao Ma, Min Hung Chen, Zsolt Kira, and Ghassan AlRegib. TS-LSTM and temporal-inception: Exploiting spatiotemporal dynamics for activity recognition. Signal Processing: Image Communication, 71:76–87, 2 2019.
* [30] Jeffrey E. Markowitz, Winthrop F. Gillis, Celia C. Beron, Shay Q. Neufeld, Keiramarie Robertson, Neha D. Bhagat, Ralph E. Peterson, Emalee Peterson, Minsuk Hyun, Scott W. Linderman, Bernardo L. Sabatini, and Sandeep Robert Datta. The Striatum Organizes 3D Behavior via Moment-to-Moment Action Selection. Cell, 174(1):44–58, 6 2018.
* [31] Matthew M. McGregor and Alexandra B. Nelson. Circuit Mechanisms of Parkinson’s Disease, 3 2019.
* [32] Roghayeh Mojarad, Ferhat Attal, Abdelghani Chibani, Sandro Rama Fiorini, and Yacine Amirat. Hybrid Approach for Human Activity Recognition by Ubiquitous Robots. In IEEE International Conference on Intelligent Robots and Systems, pages 5660–5665. Institute of Electrical and Electronics Engineers Inc., 12 2018.
* [33] Garrett Mulcahy, Brady Atwood, and Alexey Kuznetsov. Basal ganglia role in learning rewarded actions and executing previously learned choices: Healthy and diseased states. PLoS ONE, 15(2):1–26, 2020.
* [34] Shu Lih Oh, Yuki Hagiwara, U. Raghavendra, Rajamanickam Yuvaraj, N. Arunkumar, M. Murugappan, and U. Rajendra Acharya. A deep learning approach for Parkinson’s disease diagnosis from EEG signals. Neural Computing and Applications, pages 1–7, 2018.
* [35] Francisco Ordóñez and Daniel Roggen. Deep convolutional and LSTM recurrent neural networks for multimodal wearable activity recognition. Sensors, 16(1):115, 1 2016.
* [36] Tony J. Prescott, Fernando M. Montes González, Kevin Gurney, Mark D. Humphries, and Peter Redgrave. A robot model of the basal ganglia: Behavior and intrinsic processing. Neural Networks, 19(1):31–61, 1 2006.
* [37] Morgan Quigley, Ken Conley, Brian Gerkey, Josh Faust, Tully Foote, Jeremy Leibs, Rob Wheeler, and Andrew Y Ng. Ros: an open-source robot operating system. In ICRA workshop on open source software, volume 3, page 5. Kobe, Japan, 2009.
* [38] Caetano M. Ranieri, Scott MacLeod, Mauro Dragone, Patricia A. Vargas, and Roseli A. F. Romero. Human activities with videos, inertial units and ambient sensors. Dryad Digital Repository, 2021.
* [39] Caetano M. Ranieri, Guilherme Nardari, Adam H.M. Pinto, Daniel C. Tozadore, and Roseli A.F. Romero. LARa: A robotic framework for human-robot interaction on indoor environments. In Proceedings - 15th Latin American Robotics Symposium, 6th Brazilian Robotics Symposium and 9th Workshop on Robotics in Education, LARS/SBR/WRE 2018, pages 383–389. Institute of Electrical and Electronics Engineers Inc., 12 2018.
* [40] Caetano M. Ranieri, Jhielson M. Pimentel, Marcelo R. Romano, Leonardo A. Elias, Roseli A. F. Romero, Michael Lones, Mariana F. P. Araujo, Patricia A. Vargas, and Renan C. Moioli. A data-driven biophysical computational model of parkinson’s disease based on marmoset monkeys. Manuscript submitted for publication., 2021.
* [41] Caetano Mazzoni Ranieri, Scott MacLeod, Mauro Dragone, Patricia Amancio Vargas, and Roseli Aparecida Francelin Romero. Activity Recognition for Ambient Assisted Living with Videos, Inertial Units and Ambient Sensors. Sensors, 21(3):768–, 1 2021.
* [42] C.M. Ranieri, R.C. Moioli, R.A.F. Romero, M.F.P. De Araujo, M.B. De Santana, J.M. Pimentel, and P.A. Vargas. Unveiling Parkinson’s Disease Features from a Primate Model with Deep Neural Networks. In Proceedings of the International Joint Conference on Neural Networks, 2020.
* [43] C.M. Ranieri, P.A. Vargas, and R.A.F. Romero. Uncovering Human Multimodal Activity Recognition with a Deep Learning Approach. In Proceedings of the International Joint Conference on Neural Networks, 2020.
* [44] Francisco J. Rodriguez Lera, Francisco Martín Rico, Angel Manuel Guerrero Higueras, and Vicente Matellán Olivera. A context-awareness model for activity recognition in robot-assisted scenarios. Expert Systems, 37(2):e12481, 4 2020.
* [45] Itsaso Rodríguez-Moreno, José María Martínez-Otzeta, Basilio Sierra, Igor Rodriguez, and Ekaitz Jauregi. Video Activity Recognition: State-of-the-Art. Sensors, 19(14):3160, 7 2019.
* [46] Marcelo R. Romano, Renan C. Moioli, and Leonardo A. Elias. Evaluation of Frequency-Dependent Effects of Deep Brain Stimulation in a Cortex-Basal Ganglia-Thalamus Network Model of Parkinson’s Disease. In Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS, volume 2020-July, pages 3638–3641. Institute of Electrical and Electronics Engineers Inc., 7 2020\.
* [47] Odongo Steven Eyobu and Dong Han. Feature Representation and Data Augmentation for Human Activity Classification Based on Wearable IMU Sensor Data Using a Deep LSTM Neural Network. Sensors, 18(9):2892, 8 2018.
* [48] Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jon Shlens, and Zbigniew Wojna. Rethinking the inception architecture for computer vision. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 2818–2826, Las Vegas, NV, USA, 2016. IEEE.
* [49] Gerd Tinkhauser, Alek Pogosyan, Huiling Tan, Damian M. Herz, Andrea A. Kühn, and Peter Brown. Beta burst dynamics in Parkinson’s disease off and on dopaminergic medication. Brain, 140(11):2968–2981, 11 2017.
* [50] S. J. van Albada and P. A. Robinson. Mean-field modeling of the basal ganglia-thalamocortical system. I. Firing rates in healthy and parkinsonian states. Journal of Theoretical Biology, 257(4):642–663, 2009.
* [51] Patrick Van Der Smagt, Michael A. Arbib, and Giorgio Metta. Neurorobotics: From vision to action. In Springer Handbook of Robotics, pages 2069–2094. Springer International Publishing, 1 2016.
* [52] C. Zach, T. Pock, and H. Bischof. A duality based approach for real-time TV-L 1 optical flow. In Joint Pattern Recognition Symposium, pages 214–223. Springer, 2007.
* [53] Matthew D. Zeiler and Rob Fergus. Visualizing and understanding convolutional networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8689 LNCS:818–833, 2014.
| arxiv-papers | 2021-07-27T01:25:58 | 2024-09-04T03:07:20.267603 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Caetano M. Ranieri, Renan C. Moioli, Patricia A. Vargas, Roseli A. F.\n Romero",
"submitter": "Caetano Mazzoni Ranieri",
"url": "https://arxiv.org/abs/2107.12540"
} |
2107.12542 | # Energy-based Unknown Intent Detection with Data Manipulation
Yawen Ouyang, Jiasheng Ye, Yu Chen, Xinyu Dai,
Shujian Huang ∗ Corresponding author. Jiajun Chen
National Key Laboratory for Novel Software Technology, Nanjing University,
China
{ouyangyw,yejiasheng,cheny98}@smail.nju.edu.cn
{daixinyu,huangsj,chenjj}@nju.edu.cn
###### Abstract
Unknown intent detection aims to identify the out-of-distribution (OOD)
utterance whose intent has never appeared in the training set. In this paper,
we propose using energy scores for this task as the energy score is
theoretically aligned with the density of the input and can be derived from
any classifier. However, high-quality OOD utterances are required during the
training stage in order to shape the energy gap between OOD and in-
distribution (IND), and these utterances are difficult to collect in practice.
To tackle this problem, we propose a data manipulation framework to Generate
high-quality OOD utterances with importance weighTs (GOT). Experimental
results show that the energy-based detector fine-tuned by GOT can achieve
state-of-the-art results on two benchmark datasets.
## 1 Introduction
Unknown intent detection is a realistic and challenging task for dialogue
systems. Detecting out-of-distribution (OOD) utterances is critical when
employing dialogue systems in an open environment. It can help dialogue
systems gain a better understanding of what they do not know, which prevents
them from yielding unrelated responses and improves user experience.
A simple approach for this task relies on the softmax confidence score and
achieves promising results Hendrycks and Gimpel (2017). The softmax-based
detector will classify the input as OOD if its softmax confidence score is
smaller than the threshold. Nevertheless, further works demonstrate that using
the softmax confidence score might be problematic as the score for OOD inputs
can be arbitrarily high Louizos and Welling (2017); Lee et al. (2018).
Another appealing approach is to use generative models to approximate the
distribution of in-distribution (IND) training data and use the likelihood
score to detect OOD inputs. However, Ren et al. (2019) and Gangal et al.
(2019) find that likelihood scores derived from such models are problematic
for this task as they can be confounded by background components in the
inputs.
Figure 1: An overview of our framework GOT. For the utterance “How much did I
spend this week” from CLINC150 dataset Larson et al. (2019). Our locating
module locates the intent-related word “spend”. And then our generating module
generates words “drink”, “lose” to replace it and obtains OOD utterances.
Finally, our weighting module assigns a weight for each of OOD utterances.
In this paper, we propose using energy scores Liu et al. (2020) for unknown
intent detection. The benefit is that energy scores are theoretically well
aligned with the density of the inputs, hence more suitable for OOD detection.
Inputs with higher energy scores mean lower densities, which can be classified
as OOD by the energy-based detector. Moreover, energy scores can be derived
from any pre-trained classifier without re-training. Nevertheless, the energy
gap between IND and OOD utterances might not always be optimal for
differentiation. Thus we need auxiliary OOD utterances to explicitly shape the
energy gap between IND and OOD utterances during the training stage Liu et al.
(2020). This poses a new challenge in that the variety of possible OOD
utterances is almost infinite. It is impossible to sample all of them to
create the gap. Zheng et al. (2019) demonstrate that OOD utterances akin to
IND utterances, such as sharing the same phrases or patterns, are more
effective, whereas these high-quality OOD utterances are difficult and
expensive to collect in practice.
To tackle this problem, we propose a data manipulation framework GOT to
generate high-quality OOD utterances as well as importance weights. GOT
generates OOD utterances by perturbing IND utterances locally, which allows
the generated utterances to be closer to IND. Specifically, GOT contains three
modules: (1) a locating module to locate intent-related words in IND
utterances; (2) a generating module to generate OOD utterances by replacing
intent-related words with desirable candidate words, evaluated in two aspects:
whether the candidate word is suitable given the context, and whether the
candidate word is irrelevant to IND; (3) a weighting module to reduce the
weights of potential harmful generated utterances. Figure 1 illustrates the
overall process of GOT. Experiments show that the generated weighted OOD
utterances can further improve the performance of the energy-based detector in
unknown intent detection. Our code and data will be available at:
https://github.com/yawenouyang/GOT.
To summarize, the key contributions of the paper are as follows:
* •
We propose using energy scores for unknown intent detection. We conduct
experiments on real-world datasets including CLINC150 and SNIPS to show that
the energy score can achieve comparable performance as strong baselines.
* •
We put forward a new framework GOT to generate high-quality OOD utterances and
reweight them. We demonstrate that GOT can further improve the performance of
the energy score by explicitly shaping the energy gap and achieves state-of-
the-art results.
* •
We show the generality of GOT by applying generated weighted OOD utterances to
fine-tune the softmax-based detector, and the fine-tuned softmax-based
detector can also yield significant improvements.
## 2 Related Work
Lane et al., 2006, Manevitz and Yousef, 2007 and Dai et al., 2007 address OOD
detection for the text-mining task. Recently, this problem has attracted
growing attention from researchers Tur et al. (2014); Fei and Liu (2016); Fei
et al. (2016); Ryu et al. (2017); Shu et al. (2017). Hendrycks and Gimpel
(2017) present a simple baseline that utilizes the softmax confidence score to
detect OOD inputs. Shu et al. (2017) create a binary classifier and calculate
the confidence threshold for each class. Some distance-based methods Oh et al.
(2018); Lin and Xu (2019); Yan et al. (2020) are also used to detect unknown
intents as OOD utterances highly deviate from IND utterances in their local
neighborhood. Simultaneously, with the advancement of deep generative models,
learning such a model to approximate the distribution of training data is
possible. However, Ren et al. (2019) find that likelihood scores derived from
these models can be confounded by background components, and propose a
likelihood ratio method to alleviate this issue. Gangal et al. (2019)
reformulate and apply this method to unknown intent detection.
Different from these methods, we introduce the energy score for this task. Liu
et al. (2020) prove that the energy score is theoretically aligned with the
density of the input, and can be derived from any classifier without re-
training, hence desirable for our task. We further propose a data manipulation
framework to generate high-quality OOD utterances to shape the energy gap
between IND and OOD utterances.
Note that there are some related works that also generate OOD samples to
improve OOD detection performance. Lee et al. (2017) generate OOD samples with
Generative Adversarial Network (GAN) Goodfellow et al. (2014), and Zheng et
al. (2019) explore this method for unknown intent detection. However, there
are two major distinctions between our study and these works. First, they
generate OOD utterances according to continuous latent variables, which cannot
be easily interpreted. In contrast, our framework generates utterances by
performing local replacements to IND utterances, which is more interpretable
to human. Second, our framework additionally contains a weighting module to
reform the generated utterances. Our work is also inspired by Cai et al.
(2020), which proposes a framework to augment the IND data, while our
framework aims to generate OOD data.
## 3 Preliminary
In this section, we formalize unknown intent detection task. Then we introduce
the energy score, and its superiority and limitations for this task.
### 3.1 Problem Formulation
Given a training dataset
$\mathcal{D}^{\rm{train}}_{\rm{in}}=\\{(\mathbf{u}^{(i)},y^{(i)})\\}^{N}_{i=1}$
where $\mathbf{u}^{(i)}$ is an utterance and $y^{(i)}\in
Y_{\rm{in}}=\\{y_{1},y_{2},...,y_{K}\\}$ is its intent label. In testing,
given an utterance, unknown intent detection aims to detect whether its intent
belongs to existing intents $Y_{\rm{in}}$. In general, unknown intent
detection is an OOD detection task. The essence of all methods is to learn a
score function that maps each utterance $\mathbf{u}$ to a single scalar that
is distinguishable between IND and OOD utterances.
### 3.2 Energy-based OOD Detection
An energy-based model LeCun et al. (2006) builds an energy function
$E(\mathbf{u})$ that maps an input $\mathbf{u}$ to a scalar called energy
score (i.e., $E:\mathbb{R}^{D}\rightarrow\mathbb{R}$). Using the energy
function, probability density $p(\mathbf{u})$ can be expressed as:
$\displaystyle p(\mathbf{u})=\frac{\exp(-E(\mathbf{u})/T)}{Z},$ (1)
where $Z=\int_{\mathbf{u}}\exp(-E(\mathbf{u})/T)$ is the normalizing constant
also known as the partition function and $T$ is the temperature parameter.
Take the logarithm of both side of (1), we can get the equation:
$\displaystyle\log p(\mathbf{u})=-E(\mathbf{u})/T-\log Z.$ (2)
Since $Z$ is constant for all input $\mathbf{u}$, we can ignore the last term
$\log Z$ and find that the negative energy function $-E(\mathbf{u})$ is in
fact linearly aligned with the log likelihood function, which is desirable for
OOD detection Liu et al. (2020).
The energy-based model has a connection with a softmax-based classifier. For a
classification problem with $K$ classes, a parametric function $f$ maps each
input $\mathbf{u}$ to $K$ real-valued numbers (i.e.,
$f:\mathbb{R}^{D}\rightarrow\mathbb{R}^{K}$), known as logits. Logits are used
to parameterize a categorical distribution using a softmax function:
$\displaystyle
p(y|\mathbf{u})=\frac{\exp(f_{y}(\mathbf{u})/T)}{\sum_{y^{\prime}}\exp(f_{y^{\prime}}(\mathbf{u})/T)},$
(3)
where $f_{y}(\mathbf{u})$ indicates the $y^{\mathrm{th}}$ index of
$f(\mathbf{u})$, i.e., the logit corresponding the $y^{\mathrm{th}}$ class
label. And these logits can be reused to define an energy function without
changing function $f$ Liu et al. (2020); Grathwohl et al. (2020):
$\displaystyle
E(\mathbf{u})=-T\cdot\log\sum_{y^{\prime}}\exp{(f_{y^{\prime}}(\mathbf{u})/T)}.$
(4)
According to the above, a classifier can be reinterpreted as an energy-based
model. It also means the energy score can be derived from any classifier.
Due to its consistency with density and accessibility, we introduce the energy
score for unknown intent detection, and utterances with higher energy scores
can be viewed as OOD. Mathematically, the energy-based detector $G$ can be
described as:
$\displaystyle
G(\mathbf{u};\delta,E)=\begin{cases}\mbox{IND}&E(\mathbf{u})\leq\delta,\\\
\mbox{OOD}&E(\mathbf{u})>\delta,\end{cases}$ (5)
where $\delta$ is the threshold.
Although the energy score can be easily computed from the classifier, the
energy gap between IND and OOD samples might not always be optimal for
differentiation. To solve this problem, Liu et al. (2020) propose an energy-
bounded learning objective to further widen the energy gap. Specifically, the
training objective of the classifier combines the standard cross-entropy loss
with a regularization loss:
$\displaystyle\mathcal{L}=\mathbb{E}_{(\mathbf{u},y)\sim\mathcal{D}^{\rm{train}}_{\rm{in}}}[-\log
F_{y}(\mathbf{u})]+\lambda\cdot\mathcal{L}_{\rm{energy}},$ (6)
where $F(\mathbf{u})$ is the softmax output, $\lambda$ is the auxiliary loss
weight. The regularization loss is defined in terms of energy:
$\displaystyle\mathcal{L}_{\rm{energy}}=\mathbb{E}_{(\mathbf{u},y)\sim\mathcal{D}^{\rm{train}}_{\rm{in}}}(\max(0,E(\mathbf{u})-m_{\rm{in}}))^{2}$
$\displaystyle+\mathbb{E}_{\hat{\mathbf{u}}\sim\mathcal{D}^{\rm{train}}_{\rm{out}}}(\max(0,m_{\rm{out}}-E(\hat{\mathbf{u}})))^{2},$
(7)
which utilizes both labeled IND data $\mathcal{D}^{\rm{train}}_{\rm{in}}$ and
auxiliary unlabeled OOD data $\mathcal{D}^{\rm{train}}_{\rm{out}}$. This term
differentiates the energy scores between IND and OOD samples by using two
squared hinge loss with the margin hyper-parameters $m_{\rm{in}}$ and
$m_{\rm{out}}$.
Ideally, one has to sample all types of OOD utterances to create the gap,
which is impossible in practice. Zheng et al. (2019) demonstrate that OOD
utterances akin to IND utterances could be more effective, but more difficult
to collect. To address this problem, we propose a data manipulation framework,
which can generate these high-quality OOD utterances and assign each generated
utterance an importance weight to reduce the impact of potential bad
generation.
## 4 Approach
In this section, we will introduce our data manipulation framework GOT in
detail. GOT aims to generate high-quality OOD utterances by replacing intent-
related words in IND utterances, and then assign a weight to each generated
OOD utterance. Eventually, the weighted OOD utterances can be used to shape
the energy gap.
### 4.1 Locating Module
Since not all words in utterances are meaningful, such as stop words, when
generating OOD utterances, replacing these words may not change the intent. It
is more efficient and effective to replace those intent-related words. Hence,
we design an intent-related score function $S$ to measure how a word $w$
related to an intent $y$:
$\displaystyle
S(w,y)=\sum_{\mathbf{u}\in\mathcal{D}^{\rm{train}}_{y}}\sum_{w_{j}\in\mathbf{u}}$
$\displaystyle\mathbb{I}(w_{j}=w)[\log p(w_{j}|\boldsymbol{w}_{<j},y)$
$\displaystyle-\log p(w_{j}|\boldsymbol{w}_{<j})],$ (8)
where $\mathcal{D}^{\rm{train}}_{y}$ is the subset of
$\mathcal{D}^{\rm{train}}_{\rm{in}}$, which contains utterances with intent
$y$, $\mathbb{I}$ is the indicator function, $w_{j}$ is the $j^{\rm{th}}$ word
in $\mathbf{u}$, and $\boldsymbol{w}_{<j}=w_{1},...,w_{j-1}$.
Given $w$ and $y$, the intent-related score function is the sum of the log-
likelihood ratios for all $w$ in $\mathcal{D}^{\rm{train}}_{y}$. If $w$ is
related to $y$, $w$ tends to occur more frequently in
$\mathcal{D}^{\rm{train}}_{y}$ than other words. For each occurrence of $w$,
i.e., $w_{j}$ equals $w$, $p(w|\boldsymbol{w}_{<j},y)$ should be higher than
$p(w|\boldsymbol{w}_{<j})$ as the former is additionally conditioned on the
related $y$, while the latter is not, hence resulting in a higher $S(w,y)$. In
contrast, if $w$ is not related to $y$, $p(w|\boldsymbol{w}_{<j},y)$ is much
less likely to be higher than $p(w|\boldsymbol{w}_{<j})$, or $w$ tends to have
a lower frequency in $\mathcal{D}^{\rm{train}}_{y}$, hence $S(w,y)$ is likely
to be small. Therefore, $S(w,y)$ can serve as a valid score function to
measure how a word $w$ is related to an intent $y$.
With the help of $S$, given an utterance to be replaced and its intent label,
the locating module calculates the intent-related score for each word in this
utterance, and a word with a higher score (i.e., larger than a given
threshold) can be viewed as an intent-related word.
#### Implementation:
We use two generative models to estimate $p(w_{j}|\boldsymbol{w}_{<j},y)$ and
$p(w_{j}|\boldsymbol{w}_{<j})$ separately. Specifically, we train a class-
conditional language model Yogatama et al. (2017) with
$\mathcal{D}^{\rm{train}}_{\rm{in}}$ to estimate
$p(w_{j}|\boldsymbol{w}_{<j},y)$, shown in Figure 2. To predict the word
$w_{j}$, we can combine the hidden state $h_{j}$ with the intent embedding
from a learnable label embedding matrix $\mathbf{E}_{y}$, then pass it through
a fully connected (FC) layer and a softmax layer to estimate the word
distribution. In the training process, the input is the utterance with its
intent from $\mathcal{D}^{\rm{train}}_{\rm{in}}$, and the training objective
is to maximize the conditional likelihood of utterances. To estimate
$p(w_{j}|\boldsymbol{w}_{<j})$, we directly use pre-trained GPT-2 Radford et
al. (2019) without tuning. Note that the whole training process only needs
$\mathcal{D}^{\rm{train}}_{\rm{in}}$, and does not need auxiliary supervised
data.
Figure 2: A class-conditional language model to estimate
$p(w_{j}|\boldsymbol{w}_{<j},y)$.
### 4.2 Generating Module
After detecting intent-related words in the utterance $\mathbf{u}$, for each
of the intent-related words $w_{t}$, the generating module aims to generate
the replacement words from the vocabulary set to replace $w_{t}$ and obtain
OOD utterances. We design a candidate score function $Q$ to measure the
desirability of the candidate word $c$:
$\begin{split}Q(c;\mathbf{u},w_{t})&=\log
p(c|\boldsymbol{w}_{<t},\boldsymbol{w}_{>t})\\\ &-\log\sum_{y\in
Y_{\rm{in}}}p(c|\boldsymbol{w}_{<t},y)p(y).\end{split}$ (9)
The first term of the right hand side is the log-likelihood of $c$ conditioned
on the context of $w_{t}$; the higher it is, the more suitable $c$ is given
the context. The second term of the right hand side is the negative log of the
average likelihoods of $c$ conditioned on the IND label and previous context;
the higher it is, the less relevant $c$ is to IND utterances. Therefore, if
$c$ has a higher candidate score, that means it fits the context well and has
a low density under the IND utterance distribution, thus can be selected as
the replacement word to replace $w_{t}$. The resulting generated OOD utterance
is:
$\hat{\mathbf{u}}=\\{\boldsymbol{w}_{<t},c,\boldsymbol{w}_{>t}\\}.$ (10)
#### Implementation:
Similar with the locating module, we also do not need auxiliary supervised
data to train the generating module. We use the same class-conditional
language model mentioned in Section 4.1 to estimate
$p(c|\boldsymbol{w}_{<t},y)$. $p(y)$ is the training set label ratios. To
estimate $p(c|\boldsymbol{w}_{<t},\boldsymbol{w}_{>t})$, we use pre-trained
BERT Devlin et al. (2018) without tuning.
### 4.3 Weighting Module
Since we cannot ensure the generation process is perfect, given a generated
OOD utterance set
$\mathcal{D}^{\rm{gen}}_{\rm{out}}=\\{\hat{\mathbf{u}}^{(i)}\\}^{M}_{i=1}$,
there might be some unfavorable utterances that are useless or even harmful
for tuning the classifier. To fit these utterances, the generalization ability
of the classifier will decrease. The weighting module aims to assign these
utterances small weights.
We first use Equation 6 as the loss function to train a classifier by taking
$\mathcal{D}^{\rm{gen}}_{\rm{out}}$ as $\mathcal{D}^{\rm{train}}_{\rm{out}}$.
Then we calculate the influence value $\phi\in\mathbb{R}$ Wang et al. (2020)
for each generated utterance $\hat{\mathbf{u}}$. The influence value
approximates the influence of removing this utterance on the loss at
validation samples. An utterance with positive $\phi$ implies that its removal
will reduce the validation loss and strengthen the classifier’s generalization
ability, thus we should assign it a small weight. ***Details about how to
calculate the influence can be found in Koh and Liang (2017); Wang et al.
(2020). In particular, given $\phi$, we calculate weight $\alpha$ as follows:
$\alpha=\frac{1}{1+e^{\frac{\gamma\phi}{\max_{\phi}-\min_{\phi}}}},$ (11)
where $\gamma\in\mathbb{R}^{+}$ is used to make the weight distribution flat
or steep, $\max_{\phi}$ and $\min_{\phi}$ are the maximum and minimum
influence value of utterances in $\mathcal{D}^{\rm{gen}}_{\rm{out}}$.
#### Implementation:
We still do not need auxiliary supervised data for this module. The validation
loss is the cross-entropy loss on the validation set.
Algorithm 1 Data Manipulation Process
1:Training set $\mathcal{D}^{\rm{train}}_{\rm{in}}$, intent-related score
function $S$, candidate score function $Q$, intent-related word threshold
$\epsilon$, candidate number K, weight term $\gamma$
2:Generated weighted OOD utterances set $\mathcal{D}^{\rm{gw}}_{\rm{out}}$
3:$\mathcal{D}^{\rm{gen}}_{\rm{out}}=\\{\\}$ # generated OOD utterances
without weights
4:for $(\mathbf{u},y)\in\mathcal{D}^{\rm{train}}_{\rm{in}}$ do
5: for $w_{j}\in\mathbf{u}$ do
6: if $S(w_{j},y)>\epsilon$ then
7: $\mathcal{C}=\rm{top-}K_{c}\,Q(c;\mathbf{u},w_{j})$
8: for $c\in\mathcal{C}$ do
9: $\hat{\mathbf{u}}=\\{\boldsymbol{w}_{<j},c,\boldsymbol{w}_{>j}\\}$
10: Add $\hat{\mathbf{u}}$ into $\mathcal{D}^{\rm{gen}}_{\rm{out}}$
11: end for
12: end if
13: end for
14:end for
15:$\mathcal{D}^{\rm{gw}}_{\rm{out}}=\\{\\}$ Comment# generated weighted OOD
utterances
16:for $\hat{\mathbf{u}}\in\mathcal{D}^{\rm{gen}}_{\rm{out}}$ do
17: Calculate the weight $\alpha$ by Equation 11
18: Add $(\hat{\mathbf{u}},\alpha)$ into $\mathcal{D}^{\rm{gw}}_{\rm{out}}$
19:end for
20:return $\mathcal{D}^{\rm{gw}}_{\rm{out}}$
### 4.4 Overall Data Manipulation Process
We summarize the process of GOT in Algorithm 1. Line 4 shows that $w_{j}$ can
be viewed as an intent-related word for $y$ if $S(w_{j},y)$ is greater than
the intent-related word threshold $\epsilon$. Line 5 shows that we generate
$K$ replacement words with the top-$K$ $Q(c;\mathbf{u},w_{t})$.
### 4.5 Shape the energy gap with GOT
After obtaining weighted OOD utterances set
$\mathcal{D}^{\rm{gw}}_{\rm{out}}$, we can explicitly shape the energy gap
with them, resulting in IND utterances with smaller energy scores and OOD
utterances with higher energy scores. Specifically, we redefine the
regularization loss in Equation 6 as follows and use it to re-train the
classifier:
$\displaystyle\mathcal{L}_{\rm{energy}}=\mathbb{E}_{(\mathbf{u},y)\sim\mathcal{D}^{\rm{train}}_{\rm{in}}}(\max(0,E(\mathbf{u})-m_{\rm{in}}))^{2}$
$\displaystyle+\mathbb{E}_{(\hat{\mathbf{u}},\alpha)\sim\mathcal{D}^{\rm{gw}}_{\rm{out}}}\alpha(\max(0,m_{\rm{out}}-E(\hat{\mathbf{u}})))^{2}.$
(12)
In the testing process, we can calculate the energy score for the utterance by
Equation 4, and identify whether it is OOD by Equation 5.
## 5 Experimental Setup
### 5.1 Datasets
To evaluate the effectiveness of the energy score and our proposed framework,
we conducted experiments on two public datasets:
* •
CLINC150†††https://github.com/clinc/oos-eval (Larson et al., 2019): this
dataset covers 150 intent classes over ten domains. It supports some OOD
utterances that do not fall into any of the system’s supported intents to
avoid splitting unknown intents manually.
* •
SNIPS‡‡‡https://github.com/snipsco/nlu-benchmark (Coucke et al., 2018): this
dataset is a personal voice assistant dataset that contains seven intent
classes. SNIPS does not explicitly include OOD utterances. We kept two classes
SearchCreativeWork and SearchScreeningEvent as unknown intents.
Table 1 provides summary statistics about these two datasets. Note that the
training set and validation set do not include OOD utterances.
Statistic | CLINC150 | SNIPS
---|---|---
Train | 15000 | 9385
Validation | 3000 | 500
Test-IND | 4500 | 486
Test-OOD | 1000 | 214
Test-IND: Test-OOD | 4.5: 1 | 2.3: 1
Number of IND classes | 150 | 5
Table 1: Statistics of CLINC150 and SNIPS datasets.
Method | CLINC150 | SNIPS
---|---|---
AUROC $\uparrow$ | FPR95$\downarrow$ | AUPR In$\uparrow$ | AUPR Out$\uparrow$ | AUROC $\uparrow$ | FPR95$\downarrow$ | AUPR In$\uparrow$ | AUPR Out$\uparrow$
MSP | 0.955 | 0.164 | 0.990 | 0.814 | 0.951 | 0.370 | 0.970 | 0.922
DOC | 0.943 | 0.221 | 0.985 | 0.790 | 0.938 | 0.493 | 0.956 | 0.910
Mahalanobis | 0.969 | 0.118 | 0.993 | 0.871 | 0.979 | 0.088 | 0.989 | 0.964
LMCL | 0.962 | 0.124 | 0.992 | 0.810 | 0.976 | 0.087 | 0.987 | 0.960
SEG | 0.959 | 0.152 | 0.991 | 0.823 | 0.974 | 0.074 | 0.986 | 0.948
Energy | 0.967 | 0.143 | 0.991 | 0.897 | 0.944 | 0.497 | 0.964 | 0.924
Energy + GOT | 0.973 | 0.114 | 0.993 | 0.914 | 0.989 | 0.039 | 0.995 | 0.972
Energy + GOT w/o weighting | 0.972 | 0.123 | 0.992 | 0.909 | 0.979 | 0.083 | 0.989 | 0.969
Table 2: AUROC, FPR95, AUPR In, AUPR Out on CLINC150, SNIPS datasets. Best
results are in bold. All results are averaged across five seeds.
### 5.2 Metrics
We used four common metrics for OOD detection to measure the performance.
AUROC (Davis and Goadrich, 2006), AUPR In and AUPR Out (Manning et al., 1999)
are threshold-independent performance evaluations and higher values are
better. FPR95 is the false positive rate (FPR) when the true positive rate
(TPR) is 95%, and lower values are better.
Considering the smaller proportion of OOD utterances in the test set on two
datasets, AUPR Out is more informative here.
### 5.3 Baselines
We introduce the following classifier-based methods as baselines:
* •
MSP (Hendrycks and Gimpel, 2017) trains a classifier with IND utterances and
uses the softmax confidence score to detect OOD utterances.
* •
DOC (Shu et al., 2017) trains a binary classifier for each IND intent and uses
maximum binary classifier output to detect OOD utterances.
* •
Mahalanobis (Lee et al., 2018) trains a classifier with softmax loss and uses
Mahalanobis distance of the input to the nearest class-conditional Gaussian
distribution to detect OOD utterances.
* •
LMCL (Lin and Xu, 2019) uses LOF (Breunig et al., 2000) in the utterance
representation learned by a classifier. In training, they replace the softmax
loss with LMCL (Wang et al., 2018).
* •
SEG (Yan et al., 2020) also uses LOF in the utterance representation. In
training, they use semantic-enhanced large margin Gaussian mixture loss.
### 5.4 Implementation Details
For a fair comparison, all classifiers used in the above methods and ours are
pre-trained BERT (Devlin et al., 2018) with a multi-layer perceptron (MLP). We
select parameter values based on validation accuracy. For energy score, we
follow Liu et al. (2020) to set $T$ as 1, $\lambda$ as 0.1, $m_{\rm{in}}$ as
-8 and $m_{\rm{out}}$ as -5. For influence value, we focus on changes on MLP
parameters and use stochastic estimation Koh and Liang (2017) with the scaling
term 1000 and the damping term 0.003. For LMCL implementation, we set nearest
neighbor number as 20, scaling factor s as 30 and cosine margin m as 0.35,
which is recommended by Lin and Xu (2019). For SEG, we follow Yan et al.
(2020) to set margin as 1 and trade-off parameter as 0.5.
For our framework, we set candidate number $K$ as 2, weight term $\gamma$ as
20. In particular, for CLINC150, we set threshold $\epsilon$ as 150 and
generate 100 weighted utterances for each intent. For SNIPS, we set threshold
$\epsilon$ as 1500 and generate 1800 weighted utterances for each intent. The
difference in settings between two datasets is due to the different sizes of
per intent in the training set.
## 6 Results and Analysis
In this part, we will show the results of different methods on two datasets
and offer some further analysis.
### 6.1 Overall Results
As shown in Table 2, we can observe that:
* •
The energy score can achieve comparable results on two datasets. Note that on
SNIPS dataset, the advantages of the energy score are not as obvious. The
reason is that SNIPS dataset is not as challenging as CLINC150 dataset, most
methods can achieve good results, such as AUPR out is greater than 0.9.
* •
Energy + GOT achieves better results on two datasets as compared to the raw
energy score. It indicates that our generated weighted OOD utterances can
effectively shape the energy gap, resulting in more distinguishable between
IND and OOD utterances.
* •
We also report ablation study results. “w/o weighting” is the energy score
tuned by OOD utterances without reweighting. We can see that there is a
decrease in performance on both datasets, which shows the advantage of the
weighting module (p-value < 0.005).
Figure 3: Effect of the auxiliary loss weight (left) and the number of
generated weighted OOD utterances per intent (right).
### 6.2 Effect of Hyper-parameters
During the training process, we find that the method performance is sensitive
to two hyper-parameters: auxiliary loss weight $\lambda$ and the number of
generated weighted OOD utterances per intent. We conduct two experiments to
demonstrate their effects separately. We choose CLINC150 dataset as it is more
challenging as mentioned before.
#### Auxiliary Loss Weight:
We set the auxiliary loss weight $\lambda$ from $0$ to $0.5$ with an interval
of $0.1$ to observe its impact.
Results are shown in Figure 3 (left). With the increase of auxiliary loss
weight, the performance increases first and then decreases. $\lambda=0.1$
achieves the highest AUPR Out $0.914$ and outperforms $\lambda=0$ with an
improvement of 1.7% (AUPR Out). The results suggest that although shaping the
energy gap can improve the performance, there exists a trade-off between
optimizing the regularization loss and optimizing cross-entropy loss.
#### Number of OOD Utterances:
we compare the performance of generated weighted utterance numbers for each
intent by adjusting the number from $0$ to $100$ with an interval of $20$.
Results are shown in Figure 3 (right). As a whole, AUPR Out increases as more
OOD utterances are incorporated into training. We can see that the performance
is also improved even with a small generated number, which indicates the
necessity of explicitly shaping the energy gap.
Method | AUROC $\uparrow$ | FPR95$\downarrow$ | AUPR In$\uparrow$ | AUPR Out$\uparrow$
---|---|---|---|---
Energy | 0.967 | 0.143 | 0.991 | 0.897
Energy + Wiki | 0.961 | 0.170 | 0.988 | 0.889
Table 3: Effect of using Wikipedia sentences to shape the energy gap.
Method | AUROC $\uparrow$ | FPR95$\downarrow$ | AUPR In$\uparrow$ | AUPR Out$\uparrow$
---|---|---|---|---
MSP | 0.955 | 0.164 | 0.990 | 0.814
MSP + GOT | 0.972 | 0.118 | 0.993 | 0.903
Table 4: Effect of using GOT to fine-tune the softmax-based detector.
Intent | IND utterance and intent-related word [w] | Replacement word | Weight
---|---|---|---
Insurance | i need to know more about my health [plan] | problems | 0.50
what [benefits] are provided by my insurance | services | 0.19
Credit Limit Change | can i get a higher limit on my american express [card] | ticket | 0.46
can you [increase] how much i can spend on my visa | guess | 0.54
Reminder | can you list each item on my [reminder] list | contacts | 0.50
what’s on the [reminder] list | agenda | 0.78
Redeem Rewards | walk me through the process of cashing in on [credit] card points | those | 0.22
i have credit card [points] but don’t know how to use them | privileges | 0.50
Table 5: Weighted OOD utterances generated by GOT on CLINC150 dataset.
### 6.3 Compare with Wikipedia Sentences
An easy way to obtain OOD utterances is from the Wikipedia corpus. We
investigate the effect of regarding Wikipedia sentences as OOD utterances to
shape the energy gap on CLINC150 dataset. The Wikipedia sentences are from
Larson et al. (2019) and the number is 14750.
As shown in Table 3, we can observe that these sentences cannot improve the
performance and even have a negative effect (We experimented with several
hyper-parameters, this is the best result we could get). After observing these
Wikipedia sentences, we find that they have little relevance to IND
utterances. Therefore, simply using Wikipedia sentences is unrepresentative
and ineffective for shaping the energy gap.
### 6.4 GOT for Softmax-based Detector
As mentioned in Section 1, when using the softmax-based detector, OOD inputs
may also receive a high softmax confidence score. To tackle this problem, Lee
et al. (2017) replace the cross entropy loss with the confidence loss. The
confidence loss adds the Kullback-Leibler loss (KL loss) on the original cross
entropy loss, which forces OOD inputs less confident by making their
predictive distribution to be closer to uniform.
To verify the generality of GOT, we directly use the generated weighted OOD
utterances to fine-tune the softmax-based detector with the confidence loss.
The results are shown in Table 4. Our MSP + GOT has a significant improvement
and outperforms MSP by 8.9% (AUPR Out). Figure 4 provides an intuitive
presentation. The softmax confidence scores of OOD from MSP form smooth
distributions (see Figure 4 (left)). In contrast, the softmax confidence
scores of OOD from MSP + GOT concentrate on small values (see Figure 4
(right)). Overall the softmax confidence score is more distinguishable between
IND and OOD after tuning by GOT.
Figure 4: Histogram of the softmax confidence score from MSP (left) and MSP +
GOT (right).
### 6.5 Case Study for GOT
We sample some intents and showcase generated weighted OOD utterances in Table
5. We can observe that intent-related words that located by our locating
module are diverse, containing not only words appeared in the intent label.
The replacement word fits the context well, and the intent of the generated
utterance is exactly changed in most conditions. Admittedly, GOT may have a
bad generation, like replace “benefits” with “services” in the second
utterance, which leads the generated utterance is still in-domain.
Fortunately, the weighting module assigns these utterances a lower weight to
reduce their potential harm.
## 7 Conclusion and Future Work
In this paper, we propose using energy scores for unknown intent detection and
provide empirical evidence that the energy-based detector is comparable to
strong baselines. To shape the energy gap, we propose a data manipulation
framework GOT to generate high-quality OOD utterances and assign their
importance weights. We show that the energy-based detector tuned by GOT can
achieve state-of-the-art results. We further employ generated weighted
utterances to fine-tune the softmax-based detector and also achieve
improvements.
In the future, we will explore more operations, such as insertion, drop, etc.,
to enhance the diversity of generated utterances.
## Acknowledgments
We would like to thank the anonymous reviewers for their constructive
comments. This work was supported by NSFC Projects (Nos. 61936012 and
61976114), the National Key R&D Program of China (No. 2018YFB1005102).
## References
* Breunig et al. (2000) Markus M Breunig, Hans-Peter Kriegel, Raymond T Ng, and Jörg Sander. 2000. Lof: identifying density-based local outliers. In _Proceedings of the 2000 ACM SIGMOD international conference on Management of data_ , pages 93–104.
* Cai et al. (2020) Hengyi Cai, Hongshen Chen, Yonghao Song, Cheng Zhang, Xiaofang Zhao, and Dawei Yin. 2020. Data manipulation: Towards effective instance learning for neural dialogue generation via learning to augment and reweight. In _Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics (ACL)_.
* Coucke et al. (2018) Alice Coucke, Alaa Saade, Adrien Ball, Théodore Bluche, Alexandre Caulier, David Leroy, Clément Doumouro, Thibault Gisselbrecht, Francesco Caltagirone, Thibaut Lavril, et al. 2018. Snips voice platform: an embedded spoken language understanding system for private-by-design voice interfaces. _arXiv preprint arXiv:1805.10190_.
* Dai et al. (2007) Wenyuan Dai, Gui-Rong Xue, Qiang Yang, and Yong Yu. 2007. Co-clustering based classification for out-of-domain documents. In _Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining_ , pages 210–219.
* Davis and Goadrich (2006) Jesse Davis and Mark Goadrich. 2006. The relationship between precision-recall and roc curves. In _Proceedings of the 23rd international conference on Machine learning_ , pages 233–240.
* Devlin et al. (2018) Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. _arXiv preprint arXiv:1810.04805_.
* Fei and Liu (2016) Geli Fei and Bing Liu. 2016. Breaking the closed world assumption in text classification. In _Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies_ , pages 506–514, San Diego, California. Association for Computational Linguistics.
* Fei et al. (2016) Geli Fei, Shuai Wang, and Bing Liu. 2016. Learning cumulatively to become more knowledgeable. In _Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining_ , pages 1565–1574.
* Gangal et al. (2019) Varun Gangal, Abhinav Arora, Arash Einolghozati, and Sonal Gupta. 2019. Likelihood ratios and generative classifiers for unsupervised out-of-domain detection in task oriented dialog. _arXiv preprint arXiv:1912.12800_.
* Goodfellow et al. (2014) Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger, editors, _Advances in Neural Information Processing Systems 27_ , pages 2672–2680. Curran Associates, Inc.
* Grathwohl et al. (2020) Will Grathwohl, Kuan-Chieh Wang, Jörn-Henrik Jacobsen, David Duvenaud, Mohammad Norouzi, and Kevin Swersky. 2020. Your classifier is secretly an energy based model and you should treat it like one. _International Conference on Learning Representatinos_.
* Hendrycks and Gimpel (2017) Dan Hendrycks and Kevin Gimpel. 2017. A baseline for detecting misclassified and out-of-distribution examples in neural networks. _Proceedings of International Conference on Learning Representations_.
* Koh and Liang (2017) Pang Wei Koh and Percy Liang. 2017. Understanding black-box predictions via influence functions. In _International Conference on Machine Learning_ , pages 1885–1894. PMLR.
* Lane et al. (2006) Ian Lane, Tatsuya Kawahara, Tomoko Matsui, and Satoshi Nakamura. 2006. Out-of-domain utterance detection using classification confidences of multiple topics. _IEEE Transactions on Audio, Speech, and Language Processing_ , 15(1):150–161.
* Larson et al. (2019) Stefan Larson, Anish Mahendran, Joseph J. Peper, Christopher Clarke, Andrew Lee, Parker Hill, Jonathan K. Kummerfeld, Kevin Leach, Michael A. Laurenzano, Lingjia Tang, and Jason Mars. 2019. An evaluation dataset for intent classification and out-of-scope prediction. In _Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP)_ , pages 1311–1316, Hong Kong, China. Association for Computational Linguistics.
* LeCun et al. (2006) Yann LeCun, Sumit Chopra, Raia Hadsell, M Ranzato, and F Huang. 2006. A tutorial on energy-based learning. _Predicting structured data_ , 1(0).
* Lee et al. (2017) Kimin Lee, Honglak Lee, Kibok Lee, and Jinwoo Shin. 2017. Training confidence-calibrated classifiers for detecting out-of-distribution samples. _arXiv preprint arXiv:1711.09325_.
* Lee et al. (2018) Kimin Lee, Kibok Lee, Honglak Lee, and Jinwoo Shin. 2018. A simple unified framework for detecting out-of-distribution samples and adversarial attacks. In S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett, editors, _Advances in Neural Information Processing Systems 31_ , pages 7167–7177. Curran Associates, Inc.
* Lin and Xu (2019) Ting-En Lin and Hua Xu. 2019. Deep unknown intent detection with margin loss. In _Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics_ , pages 5491–5496, Florence, Italy. Association for Computational Linguistics.
* Liu et al. (2020) Weitang Liu, Xiaoyun Wang, John Owens, and Yixuan Li. 2020. Energy-based out-of-distribution detection. _Advances in Neural Information Processing Systems_ , 33.
* Louizos and Welling (2017) Christos Louizos and Max Welling. 2017. Multiplicative normalizing flows for variational bayesian neural networks. In _Proceedings of the 34th International Conference on Machine Learning-Volume 70_ , pages 2218–2227. JMLR. org.
* Manevitz and Yousef (2007) Larry Manevitz and Malik Yousef. 2007. One-class document classification via neural networks. _Neurocomputing_ , 70(7-9):1466–1481.
* Manning et al. (1999) Christopher D Manning, Christopher D Manning, and Hinrich Schütze. 1999. _Foundations of statistical natural language processing_. MIT press.
* Oh et al. (2018) Kyo-Joong Oh, DongKun Lee, Chanyong Park, Young-Seob Jeong, Sawook Hong, Sungtae Kwon, and Ho-Jin Choi. 2018. Out-of-domain detection method based on sentence distance for dialogue systems. In _2018 IEEE International Conference on Big Data and Smart Computing (BigComp)_ , pages 673–676. IEEE.
* Radford et al. (2019) Alec Radford, Jeff Wu, Rewon Child, David Luan, Dario Amodei, and Ilya Sutskever. 2019. Language models are unsupervised multitask learners.
* Ren et al. (2019) Jie Ren, Peter J Liu, Emily Fertig, Jasper Snoek, Ryan Poplin, Mark Depristo, Joshua Dillon, and Balaji Lakshminarayanan. 2019. Likelihood ratios for out-of-distribution detection. In _Advances in Neural Information Processing Systems_ , pages 14680–14691.
* Ryu et al. (2017) Seonghan Ryu, Seokhwan Kim, Junhwi Choi, Hwanjo Yu, and Gary Geunbae Lee. 2017. Neural sentence embedding using only in-domain sentences for out-of-domain sentence detection in dialog systems. _Pattern Recognition Letters_ , 88:26–32.
* Shu et al. (2017) Lei Shu, Hu Xu, and Bing Liu. 2017. DOC: Deep open classification of text documents. In _Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing_ , pages 2911–2916, Copenhagen, Denmark. Association for Computational Linguistics.
* Tur et al. (2014) Gokhan Tur, Anoop Deoras, and Dilek Hakkani-Tür. 2014. Detecting out-of-domain utterances addressed to a virtual personal assistant. In _Fifteenth Annual Conference of the International Speech Communication Association_.
* Wang et al. (2018) Feng Wang, Jian Cheng, Weiyang Liu, and Haijun Liu. 2018. Additive margin softmax for face verification. _IEEE Signal Processing Letters_ , 25(7):926–930.
* Wang et al. (2020) Zifeng Wang, Hong Zhu, Zhenhua Dong, Xiuqiang He, and Shao-Lun Huang. 2020. Less is better: Unweighted data subsampling via influence function. In _Proceedings of the AAAI Conference on Artificial Intelligence_ , volume 34, pages 6340–6347.
* Yan et al. (2020) Guangfeng Yan, Lu Fan, Qimai Li, Han Liu, Xiaotong Zhang, Xiao-Ming Wu, and Albert Y.S. Lam. 2020. Unknown intent detection using Gaussian mixture model with an application to zero-shot intent classification. In _Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics_ , pages 1050–1060, Online. Association for Computational Linguistics.
* Yogatama et al. (2017) Dani Yogatama, Chris Dyer, Wang Ling, and Phil Blunsom. 2017. Generative and discriminative text classification with recurrent neural networks. _arXiv preprint arXiv:1703.01898_.
* Zheng et al. (2019) Yinhe Zheng, Guanyi Chen, and Minlie Huang. 2019. Out-of-domain detection for natural language understanding in dialog systems. _arXiv preprint arXiv:1909.03862_.
| arxiv-papers | 2021-07-27T01:32:23 | 2024-09-04T03:07:20.283703 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Yawen Ouyang, Jiasheng Ye, Yu Chen, Xinyu Dai, Shujian Huang, Jiajun\n Chen",
"submitter": "Yawen Ouyang",
"url": "https://arxiv.org/abs/2107.12542"
} |
2107.12547 | # Probing neural networks with t-SNE, class-specific projections and a guided
tour
Christopher R. Hoyt
Stanford University Art B. Owen
Stanford University
(July 2021)
###### Abstract
We use graphical methods to probe neural nets that classify images. Plots of
t-SNE outputs at successive layers in a network reveal increasingly organized
arrangement of the data points. They can also reveal how a network can
diminish or even forget about within-class structure as the data proceeds
through layers. We use class-specific analogues of principal components to
visualize how succeeding layers separate the classes. These allow us to sort
images from a given class from most typical to least typical (in the data) and
they also serve as very useful projection coordinates for data visualization.
We find them especially useful when defining versions guided tours for
animated data visualization.
## 1 Introduction
Probing is a term used to describe certain exploratory analyses of neural
networks. It allows the user to see what happens as the number of layers used
[1] or amount of training time taken [14] increases. Nguyen et al. [13]
consider changes to both depth and breadth of networks. One could also study
changes to a network as the volume of training data increases.
Alain and Bengio [1] investigate networks of $L$ layers by passing the output
of the first $\ell<L$ layers through a specially retrained softmax layer as
the $\ell+1$’st and final layer. They can then study the progress that the
network makes as layers are added. They have the interesting observation that
the information content in layer $\ell+1$ can be less than what is in layer
$\ell$ but not more, and yet accuracy may improve because the information has
a better representation at later layers.
In this work, we present some tools for graphically probing neural nets. The
nets we study as examples are designed to classify an image into one of $K$
classes. Instead of passing the output of an intermediate layer through a
special softmax layer we explore each layer’s output visually. First, we run
t-SNE [17] on the outputs of intermediate layers. Sometimes we see interesting
phenomena in the intermediate layers that have disappeared by the final
layers. For instance, within-class clustering could be evident in the early
layers but forgotten by the final layer without harming the final
classification accuracy that the network was trained to optimize.
Next, we look at principal components (PC) projections of intermediate layer
results. By watching how those change from layer to layer we can see how the
group separations evolve. The PC projections have the advantage that we can
project additional points, such as held out data points, onto their
coordinates. This is different from t-SNE where including additional points
would change the mapping of all the points. Also, PC mappings are
deterministic given the data, and hence more reproducible, while the t-SNE
images are randomly generated. We do not always see the neural collapse
phenomenon from [14]. That analysis predicts that the neuron outputs for
different categories will end up as roughly spherical clusters at the corners
of a simplex. Instead of clusters we often see ellipsoids extending from such
a corner towards the origin. Neural collapse predicts an angle of about $90$
degrees between clusters. We see that this emerges as layers progress, but in
early layers than angle can be much less. In intermediate layers we often see
angles much greater than $90$ degrees as if hard to separate classes are being
treated as opposites.
When there are many classes, principal components trained on all of them can
make it harder to spot patterns among a few commonly confused classes. We
could get better resolution by defining principal components tuned to one
subset of classes. That, however, requires a separate PCA analysis for every
subset of variables. We have found it beneficial to define one class-specific
vector per output class in a way that is analagous to the PC eigenvectors.
Then each subset of categories comes with a prescribed set of vectors for
projection. Similar class-specfic vectors were previously studied by
Krzanowski [11] but that work was not about visualization. We can also use
these vectors to rank input images from most typical to least typical members
of their respective classes. Note that typical is defined with respect to the
set of images gathered for training and those images might not remain typical
when an algorithm is deployed.
We also consider some animated tours [2, 3] of data at each level where we
probe. Li et al. [12] previously used grand tours on the output of a neural
network. In the terminology of [3] our tours are guided tours: we select pairs
of interesting projections and interpolate between them. We develop guided
tours based on class-specific projections of data including looks at
intermediate layers.
We use two well studied neural networks as running examples. One is the
CIFAR-10 dataset [9] of sixty thousand 32 by 32 color images selected from 10
classes consisting of four mechanical groups (e.g., airplanes and automobiles)
and six animal groups (e.g., cats and dogs). For this we use the network and
trained weights from https://github.com/geifmany/cifar-vgg which utilizes the
VGG model with 15 layers. VGG stands for the ‘visual geometry group’ at Oxford
who developed the architecture. The other example is the fashion-MNIST data
with sixty thousand 28 by 28 grayscale images selected from 10 classes of
clothing items (like trousers and pullovers), which was then subsequently
padded out with zeros along the edges to become 32 by 32 images with three
channels. For this we consider the ResNet50 network architecture [8] with
weights initialized from ImageNet pretraining [6].
The outline of this paper is as follows. Section 2 gives background about the
neural networks we explore. Section 3 shows a use of t-SNE for probing. We can
see how class separation progresses as the layers increase. Section 4 defines
our class-specific vectors and compares plots in those coordinates to
principal components plots. Section 5 describes our class-specific tours. It
include still shots of the tours and a link to animated versions. Section 6
describes how our class-specific vectors can potentially identify separations
of groups within a single classification.
## 2 Image data sets, architectures, and
The network we use for CIFAR-10 from https://github.com/geifmany/cifar-vgg has
thirteen convolution layers and two fully connected layers that we study.
Those are layers
$\ell=2,6,9,14,18,22,26,30,34,38,42,46,50,56,60$
of that network. Figure 1 shows their positions in the overall architecture.
We probed the network outputs at these layers by passing the output from layer
$\ell$ through a specially trained final softmax layer. Figure 2 plots the
accuracy attained this way versus the layer indices. What we see is that the
accuracy on test data increased up to layer 30, and subsequent layers did not
improve it by much. The accuracy on the training data saturated at $100$% by
layer 18. In a Shapley value analysis (to be reported elsewhere) we found that
of these layers, layer $2$ was most important for ultimate accuracy. At layer
2, the network is not anywhere near it’s final accuracy.
Dropout Block Block Input Conv2D(3x3) ReLU BatchNorm Dropout Output Pooling
Block Block Input Conv2D(3x3) ReLU BatchNorm MaxPool(2x2) Output VGG15
ModelModel Input Dropout Block Pooling Block Dropout Block Pooling Block
Dropout Block Dropout Block Pooling Block Dropout Block Dropout Block Pooling
Block Dropout Block Dropout Block Pooling Block Dropout(0.5) Flatten
Dense(512) ReLU BatchNorm Dropout(0.5) Dense(10) Softmax Output $0.3$ Dropout
Rate $0.4$ Dropout Rate $0.5$ Dropout Rate Figure 1: The model architecture
for the VGG15 model. The model consists of thirteen convolution layers and two
dense layers, creating fifteen natural checkpoints for the model overall.
Refer to https://github.com/geifmany/cifar-vgg for more specific details on
the model architecture.
For fashion-MNIST we used the ResNet50 architecture from [8] which has 177
layers. See Figure 3. We probed the network at the outputs of the sixteen
convolution / identity blocks, corresponding to layers
$\ell=17,27,37,49,59,69,79,91,101,111,121,131,141,153,163,173.$
The accuracy attained by adjoining a softmax layer after layer $\ell$ is
plotted versus $\ell$ in Figure 2. There we do not see the rapid initial gain
in accuracy versus $\ell$. We attribute this difference to that network having
been initialized with values from training on ImageNet [6].
Figure 2: Intermediate accuracies of the models used for the CIFAR10 and FashionMNIST datasets using a logistic regression trained on a random subset of $n=10,000$ samples from the training dataset. We plot the accuracy of the model versus layer with one curve for the training inputs and another for the test inputs. Convolution Block Block Input Conv2D(1x1) BatchNorm ReLU Conv2D(3x3) BatchNorm ReLU Conv2D(1x1) BatchNorm Conv2D(1x1) BatchNorm Add ReLU Block Output Identity Block Block Input Conv2D(1x1) BatchNorm ReLU Conv2D(3x3) BatchNorm ReLU Conv2D(1x1) BatchNorm Conv2D(1x1) BatchNorm Add ReLU Block Output ResNet50 ModelModel Input Conv2D(7x7) BatchNorm ReLU MaxPool(3x3) Conv. Block Identity Block Identity Block Conv. Block Identity Block Identity Block Identity Block Conv. Block Identity Block Identity Block Identity Block Identity Block Identity Block Conv. Block Identity Block Identity Block AvgPool Dense(10) Softmax Model Output Figure 3: ]The model architecture for the ResNet50 model. The model starts off with an initial processing section, and then proceeds with a series of 16 residual units (the identity and convolution blocks). As we progress through the blocks, we decrease the width and height of the inputs and increase the number of channels. Refer to [8] for more specific details on the model architecture. | Predicted class
---|---
True class | plane | car | bird | cat | deer | dog | frog | horse | ship | truck
plane | 924 | 2 | 20 | 4 | 3 | 0 | 1 | 3 | 36 | 7
car | 3 | 972 | 0 | 0 | 0 | 1 | 0 | 0 | 5 | 19
bird | 13 | 0 | 929 | 11 | 16 | 10 | 11 | 5 | 5 | 0
cat | 5 | 0 | 24 | 848 | 12 | 88 | 14 | 3 | 4 | 2
deer | 3 | 0 | 12 | 16 | 946 | 10 | 5 | 8 | 0 | 0
dog | 2 | 2 | 11 | 68 | 11 | 895 | 2 | 6 | 1 | 2
frog | 4 | 1 | 14 | 12 | 2 | 5 | 961 | 0 | 1 | 0
horse | 5 | 1 | 9 | 6 | 8 | 12 | 0 | 958 | 0 | 1
ship | 7 | 0 | 2 | 4 | 1 | 1 | 1 | 0 | 979 | 5
truck | 9 | 26 | 0 | 2 | 1 | 2 | 0 | 1 | 12 | 947
Table 1: This is the confusion matrix for the CIFAR10 test data. | Predicted class
---|---
True class | t-shirt/top | trouser | pullover | dress | coat | sandal | shirt | sneaker | bag | ankle
t-shirt/top | 873 | 1 | 12 | 12 | 4 | 1 | 94 | 0 | 3 | 0
trouser | 1 | 987 | 1 | 6 | 1 | 0 | 2 | 0 | 2 | 0
pullover | 15 | 1 | 879 | 10 | 43 | 0 | 51 | 0 | 1 | 0
dress | 14 | 6 | 7 | 919 | 26 | 0 | 26 | 1 | 0 | 1
coat | 0 | 0 | 55 | 24 | 878 | 0 | 43 | 0 | 0 | 0
sandal | 0 | 0 | 0 | 0 | 0 | 983 | 0 | 15 | 0 | 2
shirt | 86 | 3 | 47 | 19 | 69 | 0 | 768 | 0 | 8 | 0
sneaker | 0 | 0 | 0 | 0 | 0 | 8 | 0 | 973 | 0 | 19
bag | 3 | 2 | 1 | 1 | 3 | 1 | 2 | 3 | 983 | 1
ankle boot | 0 | 0 | 0 | 0 | 0 | 5 | 1 | 32 | 0 | 962
Table 2: This is the confusion matrix for the FashionMNIST test data.
The confusion matrix for the CIFAR10 data is in Table 1. Separating cat images
from dog images appears to be the hardest task. Trucks and cars are also
frequently confused with each other. Many planes are labeled as ships but the
reverse is less common. Table 2 shows the confusion matrix for the
FashionMNIST data. Coats and pullovers are commonly confused with each other
as are ankle boots and sneakers, while shirts are confused with four other
classes.
## 3 Probing with t-SNE
An alternative to training an $\ell+1$’st layer is to use t-SNE on the
$N\times M_{\ell}$ matrix of output at layer $\ell$. The t-SNE algorithm
produces a lower dimensional representation of the points, that like
multidimensional scaling [16, 10, 5] seeks to have low dimensional interpoint
distances be representative of the original higher dimensional interpoint
distances. It also emphasizes smaller interpoint distances as in local
multidimensional scaling [4]. The algorithm proceeds without knowing the
classifications of the data or even the number $K$ of levels of the
categorical response. Following [7] we projected the $M_{\ell}$ dimensional
points onto their first $50$ principal components before running t-SNE. The
t-SNE algorithm involves some randomness. Its criterion is also invariant to
rotations or reflections of the point clouds. In order to make the images more
nearly comparable we used the same random seed at each layer. Furthermore, the
practice of projecting the intermediate outputs down to the same dimension,
50, using PCA in each case makes the starting points for the layers more
closely aligned with each other than they would otherwise be. The lone
exception to the above description is for the output of layer 60 of the VGG15
model for the CIFAR10 dataset. This output is 10-dimensional as it is the
output of the entire network with one value per class. In this case, we use
all 10 dimensions in the t-SNE algorithm. Because t-SNE’s criterion is
dominated by small interpoint distances, the precise location and orientation
of a cluster well separated from the rest of the data could be strongly
influenced by the random seed. The relative position of clusters that overlap
or nearly do is likely to be a more stable feature.
Figures 4, 5, and 6 show t-SNE outputs for the fashion-MNIST data. These
images depict the held out, testing data, not the training data. Up to and
including layer 49, the images for ‘bag’ clearly plot as two disjoint and even
widely separated clusters. Inspection in Section 6 reveals that there are two
kinds of bag image, one that we could call purses and another that mixes
clutchs and satchels. By purse images we mean those with handles/straps that
are well separated from and above the rest of the bag. The clutchs don’t have
straps, while the satchels have straps that are nearly adjacent to the rest of
the bag. Interestingly, by about layer 91 the two ‘bag’ groups have connected
and by around layer 163 or 173 they appear to have merged into one. The loss
function used in training does not reward the network for noticing that there
are two kinds of bag and, as it happens, that distinction weakens or even
disappears from the t-SNE plot.
In Section 6 we use a method of ranking images from most like their own class
to least like their own class. We find that there are also two very different
kinds of sandal images and possibly two very different kinds of trouser
images. Figures 14, 15 and 16 there depict examples of extreme bags, sandals
and trousers.
We also see in Figures 4, 5, and 6 that the trouser and to a lesser extent bag
images are already well separated from the other classes by layer 17. The
footwear groups (sandals, sneakers, and ankle boots) start very connected with
one another until sandals separate by layer 69, and the sneakers and ankle
boots separate from one another by layer 101. Similarly, the upper body wear
classes (t-shirt/tops, pullovers, dresses, coats, shirts) start out well
merged, and only really separate out from one another towards the very end at
layer 173.
Figure 4: t-SNE output for FashionMNIST data after layers 17, 27, 37, 49, 59,
and 69. The types of these blocks are listed above in the titles. Figure 5:
t-SNE output for FashionMNIST data after layers 79, 91, 101, 111, 121, and
131. The types of these blocks are listed above in the titles. Figure 6:
t-SNE output for FashionMNIST data after layers 141, 153, 163, and 173. The
types of these blocks are listed above in the titles.
Figures 7 and 8 show the corresponding t-SNE plots for the CIFAR-10 data at 12
different output layers ranging from layer 14 to layer 60. A striking
difference in these figures is that in the early layers (14 and 18) the points
are not at all separated into disjoint clouds. Recall that the fashion-MNIST
network was initialized to weights from training in ImageNet. The network for
CIFAR-10 by contrast was trained from a random start. By layer 30 we start to
see groups forming though there is still a lot of overlap. Cats and dogs
remain closely connected up to and including layer 56, the second last one
shown. Recall that from the confusion matrices, separating cats from dogs is
especially hard.
By the final layer 60, the $10$ classes are very well separated in a two
dimensional view, forming narrow and bent clusters. There are still errors in
the classification. Many of those points plot within clusters for another
category, very often near one of the tips and very often nearer the center of
the image. That latter pattern was more pronounced for FashionMNIST. In the
t-SNE for layer 60, cat and dog clusters are well separated but some of the
cat images are at one end of the dog image cluster. On inspection we find that
these points were misclassified but with high confidence.
Figure 7: t-SNE output for CIFAR10 data after layers 14, 18, 22, 26, 30, and
34. The types of these layers are listed above in the titles. Figure 8:
t-SNE output for CIFAR10 data after layers 38, 42, 46, 50, 56, and 60. The
types of these layers are listed above in the titles.
## 4 Class specific vectors
While t-SNE is powerful and evocative, the spatial placement of individual
points is hard to interpret. A principal components analysis offers some
alternative functionality. Given the data, the PC mapping is not random, so
the position of points is more reproducible and in particular, the closeness
of clusters is not subject to algorithmic noise. Second, having constructed
principal components for one set of data, we can project additional data onto
them. For instance we could define principal components using the training
data and, retaining those eigenvectors, project test data into the same space.
The data we use are $X\in^{N\times M}$ and $Y\in\\{0,1,\dots,K-1\\}^{N}$. The
matrix $X$ changes from layer to layer as does $M$, while $Y$ remains
constant. Each column of $X$ represents the output from one neuron in the
layer under study. We center these outputs by subtracting the mean from each
column of $X$. That way we ensure that
$\sum_{i=1}^{N}\boldsymbol{x}_{i}=\boldsymbol{0}\in^{M}$ where
$\boldsymbol{x}_{i}\in^{M}$ is the $i$’th row of $X$ expressed as a column
vector.
We are interested to see the arrangements among commonly confused classes. For
instance, it is of interest to see the relative arrangements among the
mechanical images because there are frequent errors within those classes.
Figure 9 shows the global principal components plots for the outputs of only
the groups of ships, planes, cars, and trucks in CIFAR10. What we see there is
that projecting all ten classes at once yields a lot of overlap. We get a
better view from PC plots based on just those classes as in Figure 10. There
we see that in the later layers the four classes plot as lengthy ellipsoids
from a common origin.
We see that the last pre-softmax layers are mostly consistent with neural
collapse [14] in that the vectors for most pairs of groups are nearly
orthogonal to each other by the later layers. The clouds do extend towards the
origin where we see some overlap.
We also see that in layers 30 to 42, the data for images of planes projects to
nearly the origin in the first two principal components. Only later do the
planes clearly stand out from the other mechanical classes. Layer 60 reflects
data after the softmax transformation and it shows clearly that most points
have at most one or two non-negligible possibilities because the points are
mostly projected from a tetrahedral wireframe pattern.
Figure 9: Projections from the top two principal components in a global PCA
for all activation layers, visualizing the planes, cars, ships, and trucks in
CIFAR10. Figure 10: Projections from the top two principal components in a
PCA involving only the mechanical groups (planes, cars, ships, and trucks) for
the outputs of all activation layers, visualizing the planes, cars, ships, and
trucks in CIFAR10.
It is a nuisance to redefine the principal components for every subset of
variables that we might wish to explore. We prefer to define class-specific
projections of the data. For each $k\in\\{0,1,\dots,K-1\\}$ we choose a one-
dimensional projection especially representative of class $k$, as described
below, and then view the data in projections given by two of those vectors.
Class-specific vectors were studied by [11]. That work did not look at them
for visualization.
Let $N_{k}$ be the number of indices $i$ with $Y_{i}=k$. The matrix
$X_{k}\in^{N_{k}\times M}$ has all the $\boldsymbol{x}_{i}$ for which
$Y_{i}=1$. Now we choose a special vector $\theta_{k}\in^{M}$ for cluster $k$.
There are several choices. We could take $\theta_{k}$ to be the unit vector
proportional to $(1/N_{k})\sum_{i:Y_{i}=k}\boldsymbol{x}_{i}$ the mean vector
for cluster $k$. A second choice is the unit vector
$\theta_{k}=\arg\max_{\|\theta\|=1}\theta^{\mathsf{T}}X_{k}^{\mathsf{T}}X_{k}\theta$.
The third choice is the first principal component vector of $X_{k}$. This
differs from the second choice in that we must recenter $X_{k}$ to make its
rows have mean zero, yielding $\tilde{X}_{k}$. Then $\theta_{k}$ maximizes
$\theta^{\mathsf{T}}\tilde{X}_{k}^{\mathsf{T}}\tilde{X}_{k}\theta$ over unit
vectors $\theta\in^{M}$. Below we work with the third choice. The vectors we
get characterize the principal direction of points within each point cloud,
not differences in the per class means.
When we take the within-class principal component vector we have also to
choose its sign. If $\theta$ is the first principal component vector then
$-\theta$ has an equal claim to that label. We choose the sign so that the
mean of the data for class $k$ has a larger inner-product with $\theta$ than
the global mean has.
Using class-specific projections, we make scatterplots of $X\theta_{k}\in^{N}$
versus $X\theta_{k^{\prime}}$ for pairs of classes $k\neq k^{\prime}$. These
plots show one point per sample. Figure 11 shows the mechanical images plotted
in the space defined by the car versus plane vectors. This is a projection but
not an orthogonal projection into 2 because $\theta_{k}$ and
$\theta_{k^{\prime}}$ need not be orthogonal. In the early layers, the class-
specific projections produce highly correlated scatter plots. This is largely
because the vectors $\theta_{k}$ and $\theta_{k^{\prime}}$ start out
correlated. In later layers, points vary greatly in the projections from their
own class and much less in the other projections. The class-specific asxes for
cars and trucks start off approximately parallel start to become nearly
orthogonal by layer 18 (though the point clouds still overlap a lot). By layer
30 we see meaningful separations among the points. In layers 46 and 50 it
appears that the angle between those clouds is more than 90 degrees. This is
confirmed by a tour image (in Section 5) that makes an orthogonal projection
of the data into the plane spanned by those two vectors. We also observe that
in layers 46, 50, and 56, while the car and truck axes are nearly
perpendicular, the clusters of points for these two groups “bend” into one
another where they meet.
Figure 11: In each plot, the vertical axis has data projected on the class-
specific vector for ‘car’ images and the horizontal axis uses the class-
specific vector for ‘truck’ images. The points are for the plane, car, ship,
and truck images in CIFAR10.
Car and truck images are fairly similar. At layer 30, we see that trucks tend
to plot at positive values along the car axis. By layer 46, trucks are now
plotting at negative values along the car axis. The intervening layers have
been configured to push those classes farther apart. Planes and ships do not
proceed through such a process. Instead they have near zero projections along
both car and truck directions through training.
## 5 Class specific guided tour
A tour of $X\in^{N\times M}$ is an animated sequence of projections (also
commonly referred to as frames) of $X$ into N×d, where $d$ is typically a
small value such as 2 or 3. The best known of these is the grand tour [2]
which generates a sequence of such projections designed to explore the space
of all projections by eventually getting close to every point in the manifold
of projections from M to d. That manifold is quite large, so it can take a
long time to get close to every view. Therefore specific tours have been
developed to make a more focussed exploration of views. Simple tours generally
consist of moving along a sequence of projections using interpolated paths
between sequential pairs of projections of interest. The resulting animation
rotates smoothly between these pairs. The technical procedure is outlined in
Section 4.1 of Buja et al. [3]. Planned tours refer to tours where the
(usually finite) sequence of frames are predetermined.
To visualize the data, we choose to explore the space created by the span of
the ten class-specific vectors. For ease of computation, we fit a PCA with a
single component to the class specific data $X_{k}\in\mathbb{R}^{N_{k}\times
M}$ to acquire the principle axes $\theta_{k}\in\mathbb{R}^{M}$ and the
decomposition of the data onto the class-specific axis
$(X-\boldsymbol{1}\bar{x}_{k}^{\mathsf{T}})\theta_{k}$, where
$\boldsymbol{1}\in^{N}$ is the all ones vector.. At this point, we flip the
value of $\theta_{k}$ via products with negative one so that the class mean
has a larger dot product with $\theta_{k}$ than the global mean, or
equivalently that $(\bar{x}-\bar{x}_{k})^{\mathsf{T}}\theta_{k}<0$ where
$\bar{x}\in\mathbb{R}^{M}$ is the global mean. Aggregating this information,
we then have collected
$X^{\prime}=[(X-\boldsymbol{1}\bar{x}_{1}^{\mathsf{T}})\theta_{1},\ldots,(X-\boldsymbol{1}\bar{x}_{K}^{\mathsf{T}})\theta_{K}]\in\mathbb{R}^{N\times
K}$ as well as $\Theta=[\theta_{1},\ldots,\theta_{K}]$. We then center
$X^{\prime}$ so that the columns have means zero, producing
$\tilde{X}^{\prime}=(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})\Theta$, which is
used as the data to produce the class-specific pair plots.
To produce the tours that leverage the class specific vectors $\theta_{k}$, we
apply the technique used in [3] and project the data $X$ into the space
spanned by the $K$ class-specific vectors since $K$ is usually much smaller
than $M$. Note that we cannot use tours on
$(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})\Theta$ directly since this is not an
orthogonal projection of the original centered data
$X-\boldsymbol{1}\bar{x}^{\mathsf{T}}$. To get around this, we perform the QR-
decomposition $\Theta=Q_{\theta}R_{\theta}$ with
$Q_{\theta}\in\mathbb{R}^{M\times K}$ and $R_{\theta}\in\mathbb{R}^{K\times
K}$. We then visualize the projection of the data
$(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})Q_{\theta}$. If $K$ is much smaller
than $M$ and that the class-specific vectors are linearly independent, we can
compute this efficiently as $(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})\Theta\cdot
R_{\theta}^{-1}$ since we already have
$(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})\Theta$ from the computation for the
class specific pair plots.
In the case that the $K$ class-specific vectors are not linearly independent,
special considerations need to be made. While most layers do not have this
issue, the output layers, such as layer 60 in the VGG15 model, ordinarily do.
This is because the output is 10-dimensional with the constraint that the ten
components need to add up to one, and thus the space spanned by the ten class
specific axes is at most 9-dimensional. In this case, we again compute the QR-
decomposition $\Theta=Q_{\theta}R_{\theta}$, but we now force
$Q_{\theta}\in\mathbb{R}^{M\times r}$ and $R_{\theta}\in\mathbb{R}^{r\times
K}$ where $r$ is the rank of $\Theta$ and calculate
$(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})Q_{\theta}$ directly.
In either case, we note that $R_{\theta}=Q_{\theta}^{\mathsf{T}}\Theta$
implies that the columns of $R_{\theta}=[r_{1},\ldots,r_{K}]$ are the
projections of each of the class-specific vectors to the space spanned by all
of the class-specific vectors. Doing so, we can condense all information about
tours in the space spanned by the class specific vectors down to the
projections $(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})Q_{\theta}$ and
$R_{\theta}=Q_{\theta}^{\mathsf{T}}\Theta$ of the data and the class specific
vectors respectively.
For an animated view of the see
https://purl.stanford.edu/zp755hs7798.
Figure 12 shows still images of frames that can be seen on an example toy
Swiss Roll dataset. Figure 13 shows frames that can be seen when exploring the
VGG15 and ResNet50 models for both training and testing intermediate outputs.
Figure 12: The plots show a possible path that could be seen on a tour on the
Swiss Roll Manifold [15]. We start from a top-down perspective at $t=0$ to a
side-on perspective by $t=1$. At each $t\in[0,1]$ we move between these two
perspectives with constant speed.
Figure 13: The plots show frames shown within the mechanical tour of the
intermediate outputs of the VGG15 model (top row) and the ResNet50 model
(bottom row). We can see several differences both between the two models as
well as with the intermediate outputs of the training (left column) and
testing data (right column).
For the CIFAR10 dataset, we visualize planned two-dimensional tours inspired
by the class specific vectors. One option is to consider a grand tour-like
approach, where we generate a collection of two-dimensional frames by picking
them uniformly at random from the set of such frames embedded in the space
spanned by the ten class specific vectors. A second option is to restrict our
attention to two-dimensional frames that are generated from pairs of the
class-specific vectors by using frames of the form
$[\theta_{j},\theta_{k}^{\prime}]$ where $\theta_{k}^{\prime}$ is the
component of $\theta_{k}$ that is orthogonal to $\theta_{j}$ in order to
explore the centered data $X-\bar{x}$. Note that we can equivalently use
frames of the form $[r_{j},r_{k}^{\prime}]$ where $r_{k}^{\prime}$ is the
component of $r_{k}$ orthogonal to $r_{j}$ to explore
$(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})Q_{\theta}$ for better computational
efficiency. For example, we consider a mechanical tour, where we use the
frames generated by the pairs plane versus truck, car versus truck, car versus
ship, and plane versus ship.
In general, we see that the planned tour strategy works much better compared
to the grand tour-like strategy in the sense that the planned tours creates
animations that are more interpretable and show more interesting features. For
example, for layer 56 in the grand tour-like approach, we can see some key
features of the network. We see that the ten groups form comet like formations
that point away from a shared common core. However beyond this, it is
difficult to tell any relational information between the clusters. In
contrast, for layer 56 in the mechanical tour approach, we see that the comets
are much more clearly defined and we can extract additional information from
the plots. For example, we notice that for each frame, all classes have comets
that generally point upwards and to the right. We also note that there is
quite a bit of curvature within particular pairs, like how the truck points
appear to bend into the cars three seconds in. We also note that at this
point, the other eight groups overlap quite a bit. In contrast, for the frame
of trucks vs planes at the very start, we notice that the trucks and planes
points form orthogonal comets, and the rest of the eight groups spread out
much more from one another.
This can also be seen in layer 30 within the VGG15 model, where the grand
tour-like approach has comet like formations moving away from a common core,
but the planned tour showcases how these spokes are typically orthogonal. For
the car versus truck frame, we note that all of the eight other groups mainly
cluster around the origin, meaning that they have negligible components in the
class specific axes associated with cars and trucks. In comparison, for the
plane versus ship axis, we see that most of the groups tend to stick to the
origin. The lone exception is cars, which has a distinctly negative ship
component. These are distinct features that are much harder to visualize
within the grand tour-like approach.
We perform a similar visualization for FashionMNIST intermediate outputs
within the ResNet50 model. Again we consider a grand tour-like approach,
selecting randomly generated frames from the span of the ten principal axes.
We also consider two planned tours where we look at frames generated by pairs
of class specific vectors. The first tour is composed of pairs of classes that
are rarely confused for one another: t-shirt/tops versus ankle boots, trousers
versus ankle boots, trousers versus bags, and t-shirt/tops vs bags. The second
tour is composed of classes that are associated with upper-body clothing:
t-shirt/tops versus shirts, pullovers versus shirts, pullovers versus coats,
and t-shirt/tops versus coats.
When we visualize these tours, we see that the same trends as the CIFAR10 data
persist. For example, in layer 141 of the grand tour-like approach, we again
notice that the different groups form comet like shapes. However, beyond this,
it’s hard to observe any trends about how the comets are oriented about one
another in space. When we move towards the rarely confused and upper-body
planned tours, we can see other interesting features within the data. For
layer 141 of the upper-body tour, we observe that bags and sandals have no
component along the class specific vectors associated with t-shirt/tops,
pullovers, shirts, or coats. However, we see that trousers, ankle boots, and
sneakers all have fairly positive components along these vectors. Visualizing
the rarely confused planed tour of layer 141, we notice that for the frame
generated by the ankle boot and trouser class specific vectors, coats have a
very large component in both of these vectors, while most other groups have
components much closer to zero. We also notice that when we shift to the frame
generated by bags and trousers that unlike other groups, bags will form two
comet like clusters pointed in opposite directions. These features seen in the
planned tours are generally harder to discover within the grand tour-like
approach.
There are major differences between the VGG15 and ResNet50 models. One major
difference is in how the intermediate points for the testing data compare to
the training data. In the VGG15 model, we notice that in later layers that the
class specific clusters from training data will form comets pointing away from
a shared core, but their tails will overlap with one another. In contrast, the
training data will have a similar shape and position, but their tails will not
reach as far down and thus do not overlap. This can be seen prominently in
layer 50 of the mechanical tour amongst the testing data and training data.
This same effect can be seen to a much more limited extent in the ResNet50
model for layer 153 for the training data and the testing data for the
pullovers class, but the effect is not as common among the other groups and
layers. This is likely an indicator that the VGG15 model is more overtrained
compared to the ResNet50 model.
A second difference is in the shape of the arms. We notice that in general,
the comet-shapes for the class specific clusters for the ResNet50 model are
fairly sharp and extend out fairly far. Specifically, we see fairly sharp arms
for the rarely confused tour on the intermediate training output for layer 151
and for layer 163. We note that the arms frequently extend out as more than
100 away from the origin, and become extremely sharp, especially on layer 163.
In contrast, with layer 42 and layer 56 of the mechanical tour on the
intermediate training data, we notice that the arms only extend out to at most
40, and the arms are much thicker. This is especially pronounced in layer 56
where the comets are much shorter and wider.
The final difference is in how fast the arms form. We notice that in the
ResNet50 model, the arms have formed as early as layer 49 for the training
data in the rarely confused tour, which is only about a fourth of the way
through the model. Although some classes haven’t well differentiated well from
others, some groups like bags and trousers have already spread away and formed
arms away from the center. In contrast, the arms develop much later in the
VGG15 model. We only see the arms clearly develop by about layer 30 for the
training data in the mechanical tour, which is about halfway through the
model.
## 6 In-group Clustering
In our t-SNE plots we saw strong evidence of two kind of bag images. That
evidence was present in intermediate layers but had disappeared by the final
layers. In this section we use class-specific projections to make a systematic
search for such subclusters and also identify examples of extreme images so a
human can interpret them.
At each intermediate layer we project the observations from class $k$ on the
vector $\theta_{k}$ to rank images from most typical of their class to least
typical. We normalize $N_{k}$ values to have mean zero variance one when taken
over all ten classes, not just class $k$. so that they have mean square one.
Figure 14 shows those histograms for the images of bags. A bimodal pattern
becomes clear by layer 27 if not earlier, and then becomes quite pronounced.
By final layer the modes are not very separated, nearly touching. Recall that
in the t-SNE plot those points had merged into a single cluster. The top panel
in Figure 17 shows images of the bags at the extreme ends of the histogram for
the final layer. These represent two quite different kinds of image. Although
the final histogram is less bimodal than the earlier ones we still see two
very different image types. It is intuitively reasonable that these bag images
look different in early network layers that are forming image features. It is
also plausible that a network trained to distinguish bags from other image
types without regard to what type of bag they are would in its later layers
treat them similarly. It would take further research to understand why the gap
closes so late in the pipeline instead of earlier.
The class-specific projection gives us a tool to look for subclasses. Figure
16 shows histograms for trouser images. There we see no bimodal structure and
Figure 17 shows no especially striking difference between the most and least
typical trouser images.
Figure 15 shows layer by layer histograms for images of sandals. The sandal
images are bimodal at intermediate layers despite the t-SNE images not placing
the images into two clear groups. As with bags, these histograms become much
less bimodal at later layers. The bimodality disappears much earlier for
sandals than for bags. The histograms for sandals become more skewed. From
Figure 17 we see a sharp distinction between the types of sandals. The
histogram is distinguishing flat ones from high healed ones.
In this section we have looked for two kinds of image by checking the extreme
entries in a linear ordering. We expect that more elaborate clustering methods
could work when an image class has three or more types. Our main point is that
looking at intermediate layers gives additional insights.
Figure 14: Histograms of the intermediate outputs for test images labeled as
bags for the outputs of the 16 residual units in the FashionMNIST network.
Figure 15: Histograms of the intermediate outputs for test images labeled as
sandals for the outputs of the 16 residual units in the FashionMNIST network.
Figure 16: Histograms of the intermediate outputs for test images labeled as
trousers for the outputs of the 16 residual units in the FashionMNIST network.
Figure 17: The most extreme examples of three groups along their group
specific axis as intermediate outputs of the last residual unit (layer 173)
for FashionMNIST.
## 7 Conclusions
We have presented some graphical methods for probing neural networks layer by
layer. In doing so we saw that some clustering within a class can become muted
or even disappear as data progress through layers.
We devised class-specific projections and found that they can help identify
differences among image types within a class. We had to make several choices
in defining class-specific projections. We believe that our choices are
reasonable but we also believe that other choices could reveal interesting
phenomena.
The class-specific projections also provide very focussed looks at point
clouds when incorporated into dynamic projections (tours). We saw a big
difference between the organization of early layer outputs when comparing a
network that was trained using transfer learning from ImageNet and one that
was trained from a random start. We saw a variant of neural collapse wherein
the outputs form ellipsoidal clusters instead of spherical ones.
## Acknowledgments
This work was supported by a grant from Hitachi Limited and by the US National
Science Foundation under grant IIS-1837931. We thank Masayoshi Mase of Hitachi
for comments and discussions about explainable AI.
## References
* [1] G. Alain and Y. Bengio. Understanding intermediate layers using linear classifier probes. Technical report, arXiv:1610.01644, 2016.
* [2] D. Asimov. The grand tour: a tool for viewing multidimensional data. SIAM journal on scientific and statistical computing, 6(1):128–143, 1985.
* [3] A. Buja, D. Cook, D. Asimov, and C. Hurley. Computational methods for high-dimensional rotations in data visualization. Handbook of statistics, 24:391–413, 2005.
* [4] L. Chen and A. Buja. Local multidimensional scaling for nonlinear dimension reduction, graph drawing, and proximity analysis. Journal of the American Statistical Association, 104(485):209–219, 2009.
* [5] M. A. A. Cox and T. F. Cox. Multidimensional scaling. In Handbook of data visualization, pages 315–347. Springer, 2008\.
* [6] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet: A large-scale hierarchical image database. In 2009 IEEE conference on computer vision and pattern recognition, pages 248–255. Ieee, 2009.
* [7] L. Derksen. Visualising high-dimensional datasets using PCA and t-SNE in Python. https://towardsdatascience.com/visualising-high-dimensional-datasets-using-pca-and-t-sne-in-python-8ef87e7915b, 2016\. Updated April 29, 2019.
* [8] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. CoRR, abs/1512.03385, 2015.
* [9] Alex Krizhevsky. Learning multiple layers of features from tiny images, 4 2009.
* [10] J. B. Kruskal. Multidimensional scaling. Number 11. Sage, 1978.
* [11] W. J. Krzanowski. Between-groups comparison of principal components. Journal of the American Statistical Association, 74(367):703–707, 1979.
* [12] M. Li, Z. Zhao, and C. Scheidegger. Visualizing neural networks with the grand tour. Distill, 5(3):e25, 2020.
* [13] T. Nguyen, M. Raghu, and S. Kornblith. Do wide and deep networks learn the same things? uncovering how neural network representations vary with width and depth. Technical report, arXiv2010.15327, 2020.
* [14] V. Papyan, X. Y. Han, and D. L. Donoho. Prevalence of neural collapse during the terminal phase of deep learning training. Proceedings of the National Academy of Sciences, 117(40):24652–24663, 2020.
* [15] J. Tenenbaum, V. Silva, and J. Langford. A global geometric framework for nonlinear dimensionality reduction. Science, 290(5500):2319–2323, 2000.
* [16] W. S. Torgerson. Multidimensional scaling: I. Theory and method. Psychometrika, 17(4):401–419, 1952.
* [17] Laurens Van der Maaten and Geoffrey Hinton. Visualizing data using t-SNE. Journal of machine learning research, 9(11), 2008.
| arxiv-papers | 2021-07-27T01:42:07 | 2024-09-04T03:07:20.297000 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Christopher R. Hoyt and Art B. Owen",
"submitter": "Art Owen",
"url": "https://arxiv.org/abs/2107.12547"
} |
2107.12551 | ∎
11institutetext: Yuki Iwamoto 22institutetext: Department of Chemistry,
Graduate School of Science, Kyoto University, Kyoto 606-8502, Japan
22email: [email protected] 33institutetext: Yoshitaka Tanimura
44institutetext: Department of Chemistry, Graduate School of Science, Kyoto
University, Kyoto 606-8502, Japan
44email: [email protected]
# Open quantum dynamics theory on the basis of periodical system-bath model
for discrete Wigner function††thanks: Y. T. is supported by JSPS KAKENHI Grant
Number B 21H01884
Yuki Iwamoto Yoshitaka Tanimura
(Received: date / Accepted: date)
###### Abstract
Discretizing a distribution function in a phase space for an efficient quantum
dynamics simulation is a non-trivial challenge, in particular for a case that
a system is further coupled to environmental degrees of freedom. Such open
quantum dynamics is described by a reduced equation of motion (REOM) most
notably by a quantum Fokker-Planck equation (QFPE) for a Wigner distribution
function (WDF). To develop a discretization scheme that is stable for
numerical simulations from the REOM approach, we employ a two-dimensional (2D)
periodically invariant system-bath (PISB) model with two heat baths. This
model is an ideal platform not only for a periodic system but also for a non-
periodic system confined by a potential. We then derive the numerically
”exact” hierarchical equations of motion (HEOM) for a discrete WDF in terms of
periodically invariant operators in both coordinate and momentum spaces. The
obtained equations can treat non-Markovian heat-bath in a non-perturbative
manner at finite temperatures regardless of the mesh size. As demonstrations,
we numerically integrate the discrete QFPE for a 2D free rotor and harmonic
potential systems in a high-temperature Markovian case using a coarse mesh
with initial conditions that involve singularity.
###### Keywords:
Discrete Wigner distribution function Open quantum dynamics theory quantum
Fokker-Planck Equation Hierarchical equations of motion
## 1 Introduction
A central issue in the development of a computational simulation for a quantum
system described in a phase space distribution is the instability of the
numerical integration of a kinetic equation in time, which depends upon a
discretization scheme of the coordinate and momentumFrensley ; Jacoboni2004 ;
Grossman ; Kim2007 ; Weinbub . In this paper, we introduce a new approach in
order to construct a Wigner distribution function (WDF) for an open quantum
dynamics system on the basis of a finite-dimensional quantum mechanics
developed by Schwinger Schwinger . Here, open quantum dynamics refers to the
dynamics of a system coupled to baths consisting of surrounding atoms or
molecules that is typically modeled by an infinite number of harmonic
oscillators Caldeira-AP-1983 ; Weiss08 ; Breuer ; CaldeiraPhysica83 ;
WaxmanLeggett1985 ; Tanimura89A ; TanimuraPRA91 ; TanimuraJCP92 ;
Tanimura-2006 ; YTperspective ; YTJCP2014 ; YTJCP2015 . After reducing the
bath-degrees of freedom, the derived reduced equation of motion can describe
the time irreversibility of the dynamics toward the thermal equilibrium state.
The energy supplied by fluctuations and the energy lost through dissipation
are balanced in the thermal equilibrium state, while the bath temperature does
not change, because its heat capacity is infinite.
In previous studies, the Boltzmann collision operator JensenPRL1991 ;
JensenIEEE1991 and the Ornstein–Uhlenbeck operator CaldeiraPhysica83 ;
WaxmanLeggett1985 have been used for a description of dissipative effects in
the quantum Boltzmann equation and quantum Fokker-Planck equation (QFPE),
respectively. The former one, however, is phenomenological Zhan2016 , whereas
the latter one is valid only at high temperature TanimuraPRA91 that leads to
a breakdown of the positivity of population distributions at low temperature
Tanimura-2006 ; YTperspective ; YTJCP2014 . This is because a Markovian
assumption cannot take into account the effects of quantum noise, which is
non-Markovian at low temperature. Thus, numerically “exact” approach, for
example quantum hierarchical Fokker-Planck equations (QHFPE) YTJCP2015 for a
reduced WDF must be used as the rigorous quantum mechanical treatments. These
equations are derived on the basis of the hierarchical equation of motion
(HEOM) formalism Tanimura89A ; Tanimura-2006 ; YTperspective . By using the
QHFPE, for example, self-excited currentoscillations of the resonant tunneling
diode (RTD) in the negative differential resistance region described by a
Caldeira-Leggett model was discovered in a numerically rigorous manner
SakuraiJPSJ13 ; SakuraiNJP14 ; GrossmanSakuraiJPSJ .
For a case of isolated time-reversible processes, a finite-difference
approximation of momentum operators allows us to solve a kinetic equation
using a uniformly spaced mesh in the coordinate space. Then the wave function
is expressed in this discretized space. While the quantum dynamics of an
isolated $N$-discretized coordinate system are described using the wave
function as a $N$-dimensional vector, an open quantum system must be described
using a $N\times N$ reduced density matrix, most notably for the quantum
master equation (QME) approach or a $N\times M$ WDF for the $N$-discretized
coordinate and the $M$-discretized momentum, most notably for the QFPE
approach Frensley .
Whether a system is isolated or is coupled to a heat bath, the WDF is
numerically convenient and physically intuitive to describe the system
dynamics. This is because the WDF is a real function in a classical phase like
space and the described wavepacket in the momentum space is localized in a
Gaussian like form following the Boltzmann statics, while the distribution in
the coordinate space is spread. Various numerical schemes for the WDF,
including the implementation of boundary conditions, for example inflow,
outflow, or absorbing boundary conditions Ringhofer1989 ; Jiang2014 ;
Mahmood2016 , and a Fourier based treatment of potential operators Frensley ;
Grossman , have been developed. Varieties of application for quantum
electronic devices Tsuchiya2009 ; Morandi2011 ; Barraud2011 ; Jonasson2015 ;
Tilma2016 ; Ivanov2017 ; Kim2016 ; Kim2017 , most notably the RTD Frensley1986
; Frensley1987 ; FerryPRB1989 ; Ferry2003 ; Buot1991 ; BuotPRL1991 ; Buot2000
; Biegel1996 ; Yoder2010 ; Jiang2011 ; Dorda2015 that includes the results
from the QHFPE approach SakuraiJPSJ13 ; SakuraiNJP14 ; GrossmanSakuraiJPSJ ,
quantum ratchet Zueco ; Coffey2009 ; KatoJPCB13 , chemical reaction
TanimuraPRA91 ; TanimuraJCP92 , multi-state nonadiabatic electron transfer
dynamics MS-QFP94 ; MS-QFPChernyak96 ; TanimuraMaruyama97 ; MaruyamaTanimura98
; Ikeda2019Ohmic ; Ikeda2017JCP , photo-isomerization through a conical
intersection Ikeda2018CI , molecular motor Ikeda2019JCP , linear and nonlinear
spectroscopies SakuraiJPC11 ; Ikeda2015 ; Ito2016 , in which the quantum
entanglement between the system and bath plays an essential role, have been
investigated.
The above mentioned approaches have utilized a discrete WDF. Because original
equations defined in continuum phase space are known to be stable under a
relevant physical condition, any instability arises from a result of the
discretization scheme. In principle, discussions for a stability of the scheme
involve a numerical accuracy of the discretization scheme with respect to the
coordinate and momentum. Generally, the stability becomes better for finer
mesh. However, computational costs become expensive and numerical accuracy
becomes worse if the mesh size is too small. In addition, when the mesh size
is too large, the computed results diverge as a simulation time goes on. Thus,
we have been choosing the mesh size to weigh the relative merits of numerical
accuracy and costs.
In this paper, we introduce a completely different scheme for creating a
discrete WDF. Our approach is an extension of a discrete WDF formalism
introduced by Wootters Wootters that is constructed on the basis of a finite-
dimensional quantum mechanics introduced by Schwinger Schwinger . To apply
this formalism to an open quantum dynamics system, we found that a
rotationally invariant system-bath (RISB) Hamiltonian developed for the
investigation of a quantum dissipative rotor system is ideal Iwamoto-2018 .
Although the bath degrees of freedom are traced out in the framework of the
reduced equation of motion approach, it is important to construct a total
Hamiltonian to maintain a desired symmetry of the system, including the
system-bath interactions. If the symmetry of the total system is different
from the main system, the quantum nature of the system dynamics is altered by
the bath Iwamoto-2018 ; Iwamoto2019 ; Suzuki-2003 .
Here, we employ a 2D periodically invariant system-bath (PISB) model to derive
a discrete reduced equation of motion that is numerically stable regard less
of the mesh size. For this purpose, we introduce two sets of the
$N$-dimensional periodic operators for a momentum and coordinate spaces: The
discretized reduced equation of motion is expressed in terms of these two
operators, which is stable for numerical integration even if $N$ is extremely
small. The obtained equations of motion can be applied not only for a periodic
system but also a system confined by a potential.
The remainder of the paper is organized as follows. In Sec. 2, we introduce
the periodically invariant system-bath model. In Sec. 3, we derive the HEOM
for a discrete WDF. In Sec. 4, we demonstrate a stability of numerical
calculations for a periodic system and a harmonic potential system using the
discrete QFPE. Sec. 5 is devoted to concluding remarks.
## 2 Periodically invariant system-bath (PISB) model
### 2.1 Hamiltonian
We consider a periodically invariant system expressed by the Hamiltonian as
$\displaystyle\hat{H}_{S}$ $\displaystyle=T(\hat{p})+U(\hat{x}),$ (1)
where $T(\hat{p})$ and $U(\hat{x})$ are the kinetic and potential part of the
system Hamiltonian expressed as a function of the momentum and coordinate
operators $\hat{p}$ and $\hat{x}$, respectively. In this discretization
scheme, it is important that $T(\hat{p})$ and $U(\hat{x})$ must be periodic
with respect to the momentum and the coordinate, because all system operators
must be written by the displacement operators in a finite-dimensional Hilbert
space described subsequently.
This system is independently coupled to two heat baths through
$\hat{V}_{x}\equiv\hbar\cos({\hat{x}dp}/{\hbar})/dp$ and
$\hat{V}_{y}\equiv\hbar\sin({\hat{x}dp}/{\hbar})/dp$, where $dp$ is the mesh
size of momentum Iwamoto-2018 . Then, the PISB Hamiltonian is expressed as
$\displaystyle\hat{H}_{tot}$
$\displaystyle=\hat{H_{S}}+\hat{V}_{x}\sum_{k}c_{k}\hat{q}_{x,k}+\hat{V}_{y}\sum_{k}c_{k}\hat{q}_{y,k}+\hat{H_{B}},$
(2)
where
$\displaystyle\hat{H_{B}}$
$\displaystyle=\sum_{k}\left(\frac{\hat{p}_{x,k}^{2}}{2m_{k}}+\frac{1}{2}m_{k}\omega_{k}\hat{q}_{x,k}^{2}\right)+\sum_{k}\left(\frac{\hat{p}_{y,k}^{2}}{2m_{k}}+\frac{1}{2}m_{k}\omega_{k}\hat{q}_{y,k}^{2}\right),$
(3)
and $m_{k}^{\alpha}$, $\hat{p}_{k}^{\alpha}$, $\hat{q}_{k}^{\alpha}$ and
$\omega_{k}^{\alpha}$ are the mass, momentum, position and frequency variables
of the $k$th bath oscillator mode in the $\alpha=x$ or $y$ direction. The
corrective coordinate of the bath
$\hat{\Omega}_{\alpha}(t)\equiv\sum_{k}c_{k}\hat{q}_{\alpha,k}(t)$ is regarded
as a random driving force (noise) for the system through the interactions
${\hat{V}}_{\alpha}$. The random noise is then characterized by the canonical
and symmetrized correlation functions, expressed as
$\eta_{\alpha}(t)\equiv\beta\langle\hat{\Omega}_{\alpha};\hat{\Omega}_{\alpha}(t)\rangle_{\mathrm{B}}$
and
$C_{\alpha}(t)\equiv\frac{1}{2}\langle\\{\hat{\Omega}_{\alpha}(t),\hat{\Omega}_{\alpha}(0)\\}\rangle_{\mathrm{B}}$,
where $\beta\equiv 1/k_{\mathrm{B}}T$ is the inverse temperature divided by
the Boltzmann constant $k_{\mathrm{B}}$, $\hat{{\Omega}_{\alpha}}(t)$ is
$\hat{{\Omega}_{\alpha}}$ in the Heisenberg representation and
$\langle\cdots\rangle_{\mathrm{B}}$ represents the thermal average over the
bath modes Tanimura89A ; Tanimura-2006 . In the classical case,
$\eta^{\alpha}(t)$ corresponds to the friction, whereas $C_{\alpha}(t)$
corresponds to the correlation function of the noise, most notably utilized in
the generalized Langevin formalism. The functions $\eta^{\alpha}(t)$ and
$C_{\alpha}(t)$ satisfy the quantum version of the fluctuation-dissipation
theorem, which is essential to obtain a right thermal equilibrium state
Tanimura89A ; Tanimura-2006 ; KatoJPCB13 .
The harmonic baths are characterized by the spectral distribution functions
(SDF). In this paper, we assume the SDF of two heat baths are identical and
are expressed as
$\displaystyle
J(\omega)=\frac{\pi}{2}\sum_{k}\frac{(c_{k})^{2}}{m_{k}\omega_{k}}\delta(\omega-\omega_{k}).$
(4)
Using the spectral density $J(\omega)$, we can rewrite the friction and noise
correlation function, respectively, as
$\displaystyle\eta(t)=\frac{2}{\pi}\int^{\infty}_{0}d\omega\frac{J(\omega)}{\omega}\cos(\omega
t),$ (5)
and
$\displaystyle C(t)=\frac{2}{\pi}\int^{\infty}_{0}d\omega
J(\omega)\coth\left(\frac{\beta\hbar\omega}{2}\right)\sin(\omega t).$ (6)
In order for the heat bath to be an unlimited heat source possessing an
infinite heat capacity, the number of heat-bath oscillators $k$ is effectively
made infinitely large by replacing $J(\omega)$ with a continuous distribution:
Thus the harmonic heat baths are defined in the infinite-dimensional Hilbert
space.
### 2.2 System operators in a finite Hilbert space
We consider a $(2N+1)$–dimensional Hilbert space for the system, where $N$ is
an integer value. We then introduce a discretized coordinate $X$ and momentum
$P$, expressed in terms of the eigenvectors $|X,n\rangle$ and $|P,m\rangle$,
where $n$ and $m$ are the integer modulo $2N+1$ Vourdas . The eigenvectors of
the coordinate state satisfy the orthogonal relations
$\displaystyle\langle X,m|X,n\rangle=\delta^{\prime}_{m,n},$ (7)
where $\delta^{\prime}_{m,n}$ is the Kronecker delta, which is equal to 1 if
$n\equiv m(mod\ 2N+1)$ (i. e. in the case that satisfies $(n-m)=(2N+1)\times$
integer), and
$\displaystyle\sum_{m=-N}^{N}|X,m\rangle\langle X,m|=I,$ (8)
where $I$ is the unit matrix. The momentum state is defined as the Fourier
transformation of the position states as
$\displaystyle|P,m\rangle=\frac{1}{2N+1}\sum_{n=-N}^{N}\omega^{mn}|X,n\rangle,$
(9)
where $\omega=\exp\left[i2\pi/(2N+1)\right]$. The position and momentum
operators are then defined as
$\displaystyle\hat{x}=\sum_{m=-N}^{N}x_{m}|X,m\rangle\langle X,m|,$ (10)
and
$\displaystyle\hat{p}=\sum_{m=-N}^{N}p_{m}|P,m\rangle\langle P,m|,$ (11)
where $x_{m}=mdx$, $p_{m}=mdp$, and $dx$ and $dp$ are the mesh sizes of the
position and momentum, respectively. They satisfy the relation
$\displaystyle dxdp=\frac{2\pi\hbar}{2N+1}.$ (12)
To adapt the present discretization scheme, we express all system operators,
including the position and momentum operators, in terms of the displacement
operators (Schwinger’s unitary operators Schwinger ) defined as
$\displaystyle\hat{U}_{x}$
$\displaystyle\equiv\exp\left(\frac{i\hat{x}dp}{\hbar}\right),$ (13)
$\displaystyle\hat{U}_{p}$
$\displaystyle\equiv\exp\left(\frac{-i\hat{p}dx}{\hbar}\right).$ (14)
These operators satisfy the relations,
$\displaystyle\hat{U}_{x}|P,m\rangle$ $\displaystyle=|P,m+1\rangle,$ (15)
$\displaystyle\hat{U}_{x}|X,m\rangle$ $\displaystyle=\omega|X,m-1\rangle,$
(16) $\displaystyle\hat{U}_{p}|X,m\rangle$ $\displaystyle=|X,m+1\rangle,$ (17)
$\displaystyle\hat{U}_{p}|X,m\rangle$
$\displaystyle=\frac{1}{\omega}|X,m-1\rangle,$ (18)
and $\hat{U}_{x}^{2N+1}=\hat{U}_{p}^{2N+1}=I$ and
$\hat{U}_{x}\hat{U}_{p}=\hat{U}_{p}\hat{U}_{x}\omega^{-1}$. It should be noted
that except in the case of $N\to\infty$, $\hat{x}$ and $\hat{p}$ do not
satisfy the canonical commutation relation as in the case of the Pegg-Barnett
phase operators Pegg . (See Appendix A.) To have a numerically stable
discretization scheme, all system operators must be defined in terms of the
periodic operators. Because the cosine operator in the momentum space is
expanded as
$\cos({\hat{p}dx}/{\hbar})=1-({\hat{p}dx}/{\hbar})^{2}/2+({\hat{p}dx}/{\hbar})^{4}/24+O(dx^{6})$,
we defined the kinetic energy as
$\displaystyle
T({\hat{p}})\equiv\frac{\hbar^{2}}{dx^{2}}\left[1-\cos\left(\frac{\hat{p}dx}{\hbar}\right)\right],$
(19)
which is equivalent to $T({\hat{p}})\approx\hat{p}^{2}/2$ with the second-
order accuracy $O(dx^{2})$. As the conventional QFPE approaches use a higher-
order finite difference scheme, for example a third-order SakuraiNJP14 and
tenth-order central difference Ikeda2019Ohmic , the present approach can
enhance the numerical accuracy by incorporating the higher-order cosine
operators, for example, as
$T({\hat{p}})=\hbar^{2}[15-16\cos\left({\hat{p}dx}/{\hbar}\right)+\cos\left({2\hat{p}dx}/{\hbar}\right)]/12dx^{2}+O(dx^{4})$.
Any potential $U(\hat{x})$ is also expressed in terms of the periodic
operators in the coordinate space as
$\displaystyle
U({\hat{x}})\equiv\sum_{k=-N}^{N}\left[a_{k}\cos\left(k\frac{\hat{x}dp}{\hbar}\right)+b_{k}\sin\left(k\frac{\hat{x}dp}{\hbar}\right)\right],$
(20)
where $a_{k}$ and $b_{k}$ are the Fourier series of the potential function
$U(\hat{x})$. The distinct feature of this scheme is that the WDF is periodic
not only in the $\hat{x}$ space but also in the $\hat{p}$ space. The
periodicity in the momentum space is indeed a key feature to maintain the
stability of the equation of motion. Because the present description is
developed on the basis of the discretized quantum states, the classical
counter part of the discrete WDF does not exist.
## 3 Reduced equations of motion
### 3.1 Reduced hierarchical equations of motion
For the above Hamiltonian with the Drude SDF
$\displaystyle J(\omega)=\frac{\eta\gamma^{2}\omega}{\gamma^{2}+\omega^{2}},$
(21)
we have the dissipation (friction) as
$\displaystyle\eta(t)=\eta\exp[-\gamma t]$ (22)
and the noise correlation functions (fluctuation) as
$\displaystyle C(t)=c_{0}^{\alpha}\exp[-\gamma
t]+\sum_{k=1}^{\infty}c_{k}^{\alpha}\exp[-k\nu t],$ (23)
where $c_{k}^{\alpha}$ are the temperature dependent coefficients and
$\nu=2\pi/\beta\hbar$ is the Matsubara frequency Tanimura-2006 ; YTperspective
. This SDF approaches the Ohmic distribution, $J(\omega)=\eta\omega$, for
large $\gamma$. In the classical limit, both the friction and noise
correlation functions become Markovian as $\eta(t)\propto\delta(t)$ and
$C(t)\propto\delta(t)$. On the other hand, in the quantum case, $C(t)$ cannot
be Markovian and the value of $C(t)$ becomes negative at low temperature,
owing to the contribution of the Matsubara frequency terms in the region of
small $t$. This behavior is characteristic of quantum noise. The infamous
positivity problem of the Markovian QME for a probability distribution of the
system arises due to the unphysical Markovian assumption under the fully
quantum condition Tanimura-2006 ; YTperspective ; YTJCP2014 . The fact that
the noise correlation takes negative values introduces problems when the
conventional QFPE is applied to quantum tunneling at low temperatures
YTJCP2015 .
Because the HEOM formalism treats the contribution from the Matsubara terms
accurately utilizing hierarchical reduced density operators in a non-
perturbative manner, there is no limitation to compute the dynamics described
by the system-bath Hamiltonian TanimuraPRA91 ; TanimuraJCP92 ; Tanimura-2006 ;
YTperspective ; YTJCP2014 ; YTJCP2015 ; SakuraiJPSJ13 ; SakuraiNJP14 ;
GrossmanSakuraiJPSJ ; KatoJPCB13 ; MS-QFP94 ; MS-QFPChernyak96 ;
TanimuraMaruyama97 ; MaruyamaTanimura98 ; Ikeda2019Ohmic ; Ikeda2017JCP . The
HEOM for the 2D PISB model is easily obtained from those for the three-
dimensional RISB model as Iwamoto2019
$\displaystyle\frac{\partial}{{\partial t}}\hat{\rho}_{\\{n_{\alpha}\\}}(t)=$
$\displaystyle-\left({\frac{\rm
i}{\hbar}\hat{H}_{S}^{\times}+\sum_{\alpha=x,y}n_{\alpha}\gamma}\right)\hat{\rho}_{\\{n_{\alpha}\\}}(\,t)$
$\displaystyle-\sum_{\alpha=x,y}\frac{\rm
i}{\hbar}\hat{V}_{\alpha}^{\times}\hat{\rho}_{\\{n_{\alpha}+1\\}}(t)-\sum_{\alpha=x,y}\frac{{{\rm
i}n_{\alpha}}}{\hbar}\hat{\Theta}_{\alpha}\hat{\rho}_{\\{n_{\alpha}-1\\}}(t),$
(24)
where $\\{n_{\alpha}\\}\equiv(n_{x},n_{y})$ is a set of integers to describe
the hierarchy elements and $\\{n_{\alpha}\pm 1\\}$ represents, for example,
$(n_{x},n_{y}\pm 1)$ for $\alpha=y$, and
$\displaystyle\hat{\Theta}_{\alpha}\equiv\eta\gamma\left(\frac{1}{\beta}{\hat{V}_{\alpha}^{\times}-\frac{\hbar}{2}\hat{H}_{S}^{\times}\hat{V}_{\alpha}^{\circ}}\right),$
(25)
with $\hat{A}^{\times}\hat{\rho}\equiv\hat{A}\hat{\rho}-\hat{\rho}\hat{A}$ and
$\hat{A}^{\circ}\hat{\rho}\equiv\hat{A}\hat{\rho}+\hat{\rho}\hat{A}$ for any
operator $\hat{A}$. We set $\hat{\rho}_{\\{n_{\alpha}-1\\}}(t)=0$ for
$n_{\alpha}=0$.
For $(n_{\alpha}+1)\gamma\gg\eta/\beta$ and
$(n_{\alpha}+1)\gamma\gg\omega_{0}$ (the high temperature Markovian limit),
where $\omega_{0}$ is the characteristic frequency of the system, we can set
${\rm
i}\hat{V}_{\alpha}^{\times}\hat{\rho}_{\\{n_{\alpha}+1\\}}(t)/\hbar=\hat{\Gamma}_{\alpha}\hat{\rho}_{\\{n_{\alpha}\\}}(t)$
to truncate the hierarchy, where
$\displaystyle\hat{\Gamma}_{\alpha}\equiv\frac{{1}}{{\gamma\hbar^{2}}}\hat{V}_{\alpha}^{\times}\hat{\Theta}_{\alpha}$
(26)
is the damping operator Tanimura89A ; TanimuraPRA91 ; TanimuraJCP92 ;
Tanimura-2006 ; YTperspective ; YTJCP2014 ; YTJCP2015 .
In a high temperature Markovian case with $J(\omega)=\eta\omega/\pi$, the HEOM
reduces to the Markovian QME without the rotating wave approximation (RWA)
expressed as Iwamoto-2018
$\displaystyle\frac{\partial}{\partial t}\hat{\rho}(t)$
$\displaystyle=\frac{\rm
i}{\hbar}{\hat{H}}_{S}^{\times}\hat{\rho}(t)-\frac{1}{\beta\hbar^{2}}\sum_{\alpha=x,y}\hat{\Gamma}_{\alpha}\hat{\rho}(t).$
(27)
To demonstrate a role of the counter term in the present 2D PISB model, we
derive the above equation from the perturbative approach in Appendix B.
### 3.2 Discrete quantum hierarchical Fokker-Planck equation
The HEOM for the conventional WDF have been used for the investigation of
various problems TanimuraPRA91 ; TanimuraJCP92 ; Tanimura-2006 ; YTperspective
; YTJCP2014 ; YTJCP2015 ; KatoJPCB13 ; TanimuraMaruyama97 ; MaruyamaTanimura98
; Ikeda2019Ohmic ; Ikeda2017JCP , including the RTD problem SakuraiJPSJ13 ;
SakuraiNJP14 ; GrossmanSakuraiJPSJ . Here we introduce a different expression
on the basis of a discrete WDF. While there are several definitions of a
discrete WDF Galetti ; luis ; klimov , in this paper, we use a simple
expression introduced by Vourdas Vourdas . For any operator $\hat{A}$ is then
expressed in the matrix form as
$\displaystyle\bm{A}(p_{j},q_{k})$
$\displaystyle=\sum_{l=-N}^{N}\exp\left(i\frac{2p_{j}(q_{k}-q_{l})}{\hbar}\right)\langle
X,l|\hat{A}|X,2k-l\rangle$ (28)
$\displaystyle=\sum_{l=-N}^{N}\exp\left(i\frac{-2q_{k}(p_{j}-p_{l})}{\hbar}\right)\langle
P,l|\hat{A}|P,2j-l\rangle,$ (29)
where we introduced $q_{k}=kdx$ and $p_{j}=jdp$. For $\hat{A}=\hat{\rho}$, we
have the discrete WDF expressed as $W$$(p_{j},q_{k})$. This discrete WDF is
analogous to the conventional WDF, although the discretized regions in the $p$
and $q$ spaces are both from -$N$ to $N$ and are periodic in this case. Thus,
for example, for $k<-N$, we have $k\to k+2N+1$ and $q_{k}=(k+2N+1)dx$, and for
$j>N$, we have $j\to j-2N-1$ and $p_{j}=(j-2N-1)dp$. The Wigner representation
of the reduced equations of motion, for example Eq. (24) and Eq.(27) can be
obtained by replacing the product of any operators $\hat{A}_{1}$ and
$\hat{A}_{2}$ by the star product defined as
$\displaystyle[\bm{A_{1}}\star\bm{A_{2}}](p_{j},q_{k})$
$\displaystyle\equiv\frac{1}{(2N+1)^{2}}\sum_{j_{1},j_{2},k_{1},k_{2}=-N}^{N}\exp\left(i\frac{2p_{j_{2}}q_{k_{1}}-2p_{j_{1}}q_{k_{2}}}{\hbar}\right)$
$\displaystyle\times\bm{A_{1}}(p_{j}+p_{j_{1}},q_{k}+q_{k_{1}})\bm{A_{2}}(p_{j}+p_{j_{2}},q_{k}+q_{k_{2}}).$
(30)
Accordingly, the quantum commutator $[\ ,\ ]$ is replaced as the discrete
Moyal bracket defined as
$\\{\bm{A_{1}},\bm{A_{2}}\\}_{M}\equiv\bm{A_{1}}\star\bm{A_{2}}-\bm{A_{2}}\star\bm{A_{1}}$.
The HEOM in the desecrate WDF (the discrete QHFPE) are then expressed as
$\displaystyle\frac{\partial}{\partial t}\bm{W}_{\\{n_{\alpha}\\}}$
$\displaystyle=-\frac{i}{\hbar}\\{\bm{H_{S}},\bm{W}_{\\{n_{\alpha}\\}}\\}_{M}$
$\displaystyle+\sum_{\alpha=x,y}n_{\alpha}\gamma\bm{W}_{\\{n_{\alpha}\\}}-\sum_{\alpha=x,y}\frac{\rm
i}{\hbar}\\{\bm{V_{\alpha}},\bm{W}_{\\{n_{\alpha}+1\\}}(t)\\}_{M}$
$\displaystyle-\sum_{\alpha=x,y}\frac{{{\rm
i}n_{\alpha}\eta\gamma}}{\beta\hbar}\left(\\{\bm{V_{\alpha}},\bm{W}_{\\{n_{\alpha}-1\\}}(t)\\}_{M}\right.$
$\displaystyle\left.-\frac{\hbar}{2}\\{\bm{H_{S}},\bm{\hat{V}_{\alpha}}\star\bm{W}_{\\{n_{\alpha}-1\\}}(t)+\bm{W}_{\\{n_{\alpha}-1\\}}(t)\star\bm{\hat{V}_{\alpha}}\\}_{M}\right).$
(31)
As illustrated by Schwinger Schwinger , although we employed the periodic WDF,
we can investigate the dynamics of a system confined by a potential by taking
the limit $N\to\infty$ for $dx=x_{0}\sqrt{2\pi/(2N+1)}$ and
$dp=p_{0}\sqrt{2\pi/(2N+1)}$ with $x_{0}p_{0}=\hbar$, while we set
$dx=L/(2N+1)$ and $dp=2\pi\hbar/L$ in the periodic case, where $L$ is the
periodic length.
### 3.3 Discrete quantum Fokker-Planck equation
In the high temperature Markovian limit, as the regular HEOM (Eq. (24))
reduces to the QME (Eq.(27)), the discrete QHFPE reduces to the discrete QFPE
expressed as
$\displaystyle\frac{\partial}{\partial t}\bm{W}$
$\displaystyle=-\frac{i}{\hbar}\\{\bm{H_{S}},\bm{W}\\}_{M}$
$\displaystyle+\sum_{\alpha=x,y}\left[-\frac{\eta}{\beta\hbar^{2}}\left(\\{\bm{\hat{V}_{\alpha}},\bm{\hat{V}_{\alpha}}\star\bm{W}\\}_{M}-\\{\bm{\hat{V}_{\alpha}},\bm{W}\star\bm{\hat{V}_{\alpha}}\\}_{M}\right)\right.$
$\displaystyle+\frac{\eta}{2\hbar^{2}}\left(\\{\bm{\hat{V}_{\alpha}},\bm{H_{S}}\star\bm{\hat{V}_{\alpha}}\star\bm{W}\\}_{M}+\\{\bm{\hat{V}_{\alpha}},\bm{H_{S}}\star\bm{W}\star\bm{\hat{V}_{\alpha}}\\}_{M}\right.$
$\displaystyle\left.\left.-\\{\bm{\hat{V}_{\alpha}},\bm{\hat{V}_{\alpha}}\star\bm{W}\star\bm{H_{S}}\\}_{M}-\\{\bm{\hat{V}_{\alpha}},\bm{W}\star\bm{\hat{V}_{\alpha}}\star\bm{H_{S}}\\}_{M}\right)\right].$
(32)
Here, the terms proportional to $\eta/\beta\hbar^{2}$ and $\eta/2\hbar^{2}$
represent the effects of thermal fluctuation and dissipation arise from the
heat bath, respectively. More explicitly, the above equation is expressed as
(Appendix C)
$\displaystyle\frac{\partial}{\partial t}W(p_{j},q_{k})$
$\displaystyle=-\hbar\sin\left(\frac{p_{j}dx}{\hbar}\right)\frac{W(p_{j},q_{k+N+1})-W(p_{j},q_{k-N-1})}{dx^{2}}$
$\displaystyle-\frac{i}{\hbar}\\{\bm{U},\bm{W}\\}_{M}$
$\displaystyle+\frac{\eta}{\beta}\frac{W(p_{j+1},q_{k})-2W(p_{j},q_{k})+W(p_{j-1},q_{k})}{dp^{2}}$
$\displaystyle-\frac{\hbar^{2}\eta(\omega-2+\omega^{-1})V_{p_{j}}}{4dx^{2}dp^{2}}\left(W(p_{j},q_{k+N+1})+W(p_{j},q_{k-N-1})\right)$
$\displaystyle+\frac{\hbar^{2}\eta(V_{p_{j}}-V_{p_{j+1}})}{4dx^{2}dp^{2}}(W(p_{j+1},q_{k+N+1})+W(p_{j+1},q_{k-N-1}))$
$\displaystyle+\frac{\hbar^{2}\eta(V_{p_{j}}-V_{p_{j-1}})}{4dx^{2}dp^{2}}(W(p_{j-1},q_{k+N+1})+W(p_{j-1},q_{k-N-1})),$
(33)
where $V_{p_{j}}\equiv\cos({p_{j}dx}/{\hbar})$. The numerical stability of the
above equation arises from the finite difference scheme in the periodic phase
space. For example, the finite difference of the kinetic term (the first term
in the RHS of Eq.(33)) is constructed from the elements not the vicinity of
$q_{k}$ (i.e. $q_{k+1}$ and $q_{k-1}$), but the boundary of the periodic $q$
state (i.e. $q_{k+N+1}$ and $q_{k-N-1}$). The dissipation terms (the last
three terms in the RHS of Eq.(33)) are also described by the boundary
elements. As we will show the harmonic case below, the potential term (the
second term in the RHS of Eq.(33)) is constructed from the boundary of the
periodic $p$ state. Because Eq. (33) satisfies
$\sum_{k=-N}^{N}\sum_{j=-N}^{N}W(p_{k},q_{j})=1$ and because the operators in
the discrete QFPE are non-local, the calculated results are numerically stable
regardless of a mesh size.
For large $N$, we have $\sin({p_{j}dx}/{\hbar})\approx p_{j}dx/{\hbar}$ and
$\cos({p_{j}dx}/{\hbar})\approx 1-(p_{j}dx/{\hbar})^{2}$. Then the above
equation is expressed in a similar form as the QFPE obtained by Caldeira and
Leggett CaldeiraPhysica83 ; TanimuraPRA91 , although the finite difference
expressions for discrete WDF are quite different from those for the
conventional WDF. (See Appendix D).
## 4 Numerical results
In principle, with the discrete WDF, we are able to compute various physical
quantities by adjusting the mesh size determined from $N$ for any periodic
system and a system confined by a potential. A significant aspect of this
approach is that even small $N$, the equation of motion is numerically stable,
although accuracy may not be sufficient.
In the following, we demonstrate this aspect by numerically integrating Eq.
(33) for the a free rotor case and a harmonic potential case, for which we
have investigated from the regular QME approach Iwamoto-2018 and QFPE
approach TanimuraPRA91 . In both cases, we considered a weak damping condition
($\eta=0.05$) at high temperature ($\beta=0.1$). For time integrations, we
used the fourth-order Runge-Kutta method with the step $\delta t=0.001$. In
the free rotor case, we chose $N$ to minimize the momentum space distribution
near the boundary, whereas, in the harmonic case, we chose $N$ to minimize the
population of the discrete WDF near the boundary in both the $q$ and $p$
directions.
Figure 1: Snapshots of the momentum space distribution function,
$P(p_{k})=\sum_{j=-N}^{N}W(p_{k},q_{j})$, in the free rotor case calculated
from Eq. (33) for mesh size (a) $N=5$ and (b) $N=20$ with the waiting times
$t=0,2,5$, and $100$ (equilibrium state). Figure 2: The equilibrium
distribution ($t=100$) of the discrete WDF in the free rotor case for (a)
$N=5$ and (b) $N=20$.
### 4.1 Free rotor case
We first examine the numerical stability of Eq. (33) for a simple free rotor
case, $U(\hat{x})=0$ with $L=2\pi$. For demonstration, we considered localized
initial conditions expressed as $W(p_{0},q_{j})=1$ for $-N\leq j\leq N$ with
$p_{0}=0$, and zero otherwise. While such initial conditions that involve a
singularity in the $p$ direction is not easy to conduct numerical simulation
from a conventional finite difference approach, there is no difficulty from
this approach. Moreover, the total population is alway conserved within the
precision limit of the numerical integration, because we have
$\sum_{k=-N}^{N}\sum_{j=-N}^{N}W(p_{k},q_{j})=1$.
We first depict the time evolution of the momentum distribution function
$P(p_{k})=\sum_{j=-N}^{N}W(p_{k},q_{j})$ for (a) $N=5$ and (b) $20$,
respectively. Here, we do not plot $P(q_{j})=\sum_{k=-N}^{N}W(p_{k},q_{j})$,
because this is always constant as a function of $q$, as expected for the free
rotor system. As illustrated in Fig. 1, even the distribution was localized at
$p_{0}=0$ at $t=0$, calculated $P(p_{k})$ was alway stable. As the waiting
time increased, the distribution became a Gaussian-like profile in the $p$
direction owing to the thermal fluctuation and dissipation both of which arose
from the heat bath. In this calculation, the larger $N$ we used, the more
accurate results we had. We found that the results converged approximately
$N=20$, and coincided with the results obtained from the conventional QME
approach with use of the finite difference scheme Iwamoto-2018 . The
equilibrium distributions of the discrete WDF for different $N$ are depicted
in Fig. 2. As $N$ increases, the distribution in the $p$ direction approached
the Gaussian profile.
Figure 3: Snapshots of the coordinate space distribution function,
$P(q_{j})=\sum_{k=-N}^{N}W(p_{k},q_{j})$, in the harmonic potential case
calculated from Eq. (33) with $N=150$ with the waiting times $t=0,2,20$, and
$200$ (equilibrium state). Figure 4: Snapshots of the momentum space
distribution function, $P(p_{k})=\sum_{j=-N}^{N}W(p_{k},q_{j})$, in the
harmonic potential case calculated from Eq. (33) with $N=150$ with the waiting
times $t=0,2,20$, and $200$ (equilibrium state). Figure 5: Snapshots of the
discrete WDFs in the harmonic case for various values of the waiting time.
Contours in red and blue represent positive and negative values, respectively.
The mesh size is $N=150$.
### 4.2 Harmonic case
We next consider a harmonic potential case, $U(\hat{x})=\hat{x}^{2}/2$. Here,
we describe the potential using the periodic operator as
$U(\hat{x})\approx\hbar^{2}(1-\cos({\hat{x}dp}/{\hbar}))/dp^{2}+O(dp^{2})$.
Then the potential term is expressed as
$\displaystyle-\frac{i}{\hbar}\\{\bm{U},\bm{W}\\}_{M}=\hbar\sin\left(\frac{x_{k}dp}{\hbar}\right)\frac{W(p_{j+N+1},q_{k})-W(p_{j-N-1},q_{k})}{dp^{2}}.$
(34)
With this expression, we simulated the time-evolution of the discrete WDF by
numerically integrating Eq.(33) with $N=150$. We chose the same system-bath
coupling strength and inverse temperature as in the free rotor case (i.e.
$\eta=0.05$ and $\beta=0.1$). In Figs. 3 and 4, we depict the time-evolution
of the position and momentum distribution functions $P(q_{j})$ and $P(p_{k})$
in the harmonic case from the same localized initial conditions as in the free
rotor case. As illustrated in Figs. 3 and 4, both $P(q_{j})$ and $P(p_{k})$
approached the Gaussian-like profiles as analytic derived solution of the
Brownian model predicted. Note that, although the discrete WDF is a periodic
function, we can describe such distribution that is confined in a potential by
combining the periodicity in the coordinate and momentum spaces.
To illustrate a role of periodicity, we depict the time-evolution of the
discrete WDF for various values of the waiting time in Fig. 5. At time (a)
$t=0$, the distribution was localized at $p_{0}=0$, while the distribution in
the $q$ direction was constantly spread. At time (b) $t=0.5$, the distribution
symmetrically splits into the positive and negative $p$ directions because the
total momentum of the system is zero. Due to the kinetic operator (the first
term in the RHS in Eq.(33)), the vicinity of the distributions at
$(p,q)=(p_{0},q_{-(N+1)})$, and $(p_{0},q_{N+1})$ appeared and the profiles of
the distribution are similar to the distribution near $(p_{0},q_{0})$. We also
observed the distribution along the vicinity of the $p=p_{N+1}$ and
$p=p_{-(N+1)}$ axises, respectively. These distributions arose owing to the
finite difference operator of the potential term in Eq. (34), which created
the positive and negative populations $W(p_{N+1},q_{k})$ and
$-W(p_{-(N+1)},q_{k})$ from $W(p_{0},q_{k})$. The sign of these distributions
changed at $q=q_{0}$, because of the presence of the prefactor
$\sin\left({x_{k}dp}/{\hbar}\right)$. In Fig. 5(d), we observed the tilted $x$
letter-like distributions centered at $(p,q)=(12,0)$ and $(-12,0)$,
respectively. These distributions appeared as twin peaks in the momentum
distribution depicted in Fig. 4.
From time (e) $t=1.0$ to (i) $t=10$, the distributions rotated clockwise to
the centered at $(q_{0},p_{0})$ as in the conventional WDF case. Owing to the
periodic nature of the kinetic and potential operators, we also observe the
mirror images of the central distribution at $(q_{0},p_{N+1})$,
$(q_{0},p_{-(N+1)})$, $(q_{-(N+1)},p_{0})$, and $(q_{N+1},p_{0})$,
respectively. At time (j) $t=20$, the spiral structures of the distributions
disappeared owing to the dissipation, then the profiles of distributions
became circular. The peaks of the circular distributions became gradually
higher due to the thermal fluctuation (excitation), as depicted in Fig. 5 (k)
$t=40$. The distributions were then reached to the equilibrium profiles, in
which the energy supplied by fluctuations and the energy lost through
dissipation were balanced, as presented in Fig. 5 (i) $t=100$. It should be
noted that, although $P(q_{j})$ and $P(p_{k})$ in Figs. 3 and 4 exhibited the
Gaussian profiles, each circular distribution observed in Fig. 5 (l) need not
be the Gaussian, because the discrete WDF itself is not a physical observable.
The negative distributions in the four edges of the phase space arose due to
the prefactors of the kinetic and potential terms
$\sin\left({x_{k}dp}/{\hbar}\right)$ and $\sin\left({p_{j}dx}/{\hbar}\right)$.
Although the appearance of the discrete WDF is very different from the
conventional WDF, this is not surprising, because the discrete WDF does not
have classical counter part. This unique profile of the discrete WDF is a key
feature to maintain the numerical stability of the discrete QFPE.
## 5 Conclusion
In this paper, we developed an open quantum dynamics theory for the discrete
WDF. Our approach is based on the PISB model with a discretized operator
defined in the $2N+1$ periodic eigenstates in both the $q$ and $p$ spaces. The
kinetic, potential, and system-bath interaction operators in the equations of
motion are then expressed in terms of the periodic operators; it provide
numerically stable discretization scheme regardless of a mesh size. The
obtained equations are applicable not only for a periodic system but also a
system confined by a potential. We demonstrated the stability of this approach
in a Markovian case by integrating the discrete QFPE for a free rotor and
harmonic cases started from singular initial conditions. It should be noted
that the Markovian condition can be realized only under high-temperature
conditions even if we consider the Ohmic SDF due to the quantum nature of the
noise. To investigate a system in a low temperature environment, where quantum
effects play an essential role, we must include low-temperature correction
terms in the framework of the HEOM formalism Tanimura-2006 ; YTperspective ,
for example the QHFPE YTJCP2014 or the low-temperature corrected QFPE
Ikeda2019Ohmic .
As we numerically demonstrated, we can reduce the computational cost of
dynamics simulation by suppressing the mesh size, while we have to examine the
accuracy of the results carefully. If necessary, we can employ a present model
with small $N$ as a phenomenological model for an investigation of a system
described by a multi-electronic and multi-dimensional potential energy
surfaces, for example, an open quantum system that involves a conical
intersection Ikeda2018CI .
Finally, we briefly discuss some extensions of the present study. In the
current frameworks, it is not easy to introduce open boundary conditions, most
notably the in flow and out flow boundary conditions Ringhofer1989 ; Jiang2014
; Mahmood2016 , because our approach is constructed on the basis of the
periodical phase space. Moreover, when the system is periodic, it is not clear
whether we can include a non-periodical external field, for example a bias
field SakuraiJPSJ13 ; SakuraiNJP14 ; GrossmanSakuraiJPSJ or ratchet
refrigerant forces KatoJPCB13 . Moreover, numerical demonstration of the
discrete QHFPE (Eq. (31)) has to be conducted for a strong system-bath
coupling case at low temperature. Such extensions are left for future
investigation.
## Acknowledgements
Y. T. is supported by JSPS KAKENHI Grant Number B 21H01884.
## Conflict of interest
The authors declare that they have no conflict of interest.
## Data availability
The data that support the findings of this study are available from the
corresponding author upon a reasonable request.
## Appendix A Canonical commutation relation in the large $N$ limit
In this Appendix, we show that our coordinate and momentum operators satisfy
the canonical commutation relation in the large $N$ limit.
First we consider a non-periodic case, $dx=x_{0}\sqrt{2\pi/(2N+1)}$ and
$dp=p_{0}\sqrt{2\pi/(2N+1)}$ with $x_{0}p_{0}=\hbar$. We employ the
relationship between the displaced operator,
$\hat{U}_{x}\hat{U}_{p}-\hat{U}_{p}\hat{U}_{x}\omega^{-1}=0$. Assuming large
$N$, we express $\hat{U}_{x}$ and $\hat{U}_{p}$ in Taylor expansion forms as
$\displaystyle\left[1+\frac{idp\hat{x}}{\hbar}+\frac{(idp)^{2}}{2\hbar^{2}}\hat{x}^{2}\right]\left[1+\frac{i\hat{p}dx}{\hbar}+\frac{(idx)^{2}}{2\hbar^{2}}\hat{p}^{2}\right]$
$\displaystyle-\left[1+\frac{i\hat{p}dx}{\hbar}+\frac{(idx)^{2}}{2\hbar^{2}}\hat{p}^{2}\right]\left[1+\frac{idp\hat{x}}{\hbar}+\frac{(idp)^{2}}{2\hbar^{2}}\hat{x}^{2}\right]\left[1-\frac{idxdp}{\hbar})+O((N^{\frac{-3}{2}})\right]$
$\displaystyle=\frac{dxdp}{\hbar^{2}}(\hat{x}\hat{p}-\hat{p}\hat{x})-\frac{idxdp}{\hbar}+O(N^{\frac{-3}{2}}).$
(35)
This indicates that the canonical commutation relation
$[\hat{x},\hat{p}]=i\hbar$ satisfies to an accuracy of $O(N^{\frac{-3}{2}})$.
In the $2\pi$-periodic case, we set $dx={2\pi}/{(2N+1)}$ and $dp=\hbar$. Then
we obtain
$\displaystyle(\cos\hat{x}+i\sin\hat{x})\left(1-\frac{idx}{\hbar}\hat{p}\right)-\left(1-\frac{idx}{\hbar}\hat{p}\right)(\cos\hat{x}+i\sin\hat{x})(1-idx)+O(N^{-2})$
$\displaystyle=\frac{dx}{\hbar}(\sin\hat{x}\hat{p}-\hat{p}\sin\hat{x}-i\hbar\cos\hat{x})+\frac{idx}{\hbar}(\cos\hat{x}\hat{p}-\hat{p}\cos\hat{x}+i\hbar\sin\hat{x})+O(N^{-2}).$
(36)
The first and second terms of the RHS in Eq. (36) are the anti-Hermite and
Hermite operators. Therefore, the contributions from these terms are zero.
Thus, for large $N$, we obtain the canonical commutation relations for a
periodic case as Curruthers
$\displaystyle[\sin\hat{x},\hat{p}]$ $\displaystyle=i\hbar\cos\hat{x},$ (37)
and
$\displaystyle[\cos\hat{x},\hat{p}]$ $\displaystyle=-i\hbar\sin\hat{x},$ (38)
to an accuracy of $O(N^{-2})$.
## Appendix B QME for 2D PISB model and counter term
To demonstrate a role of the counter term, here we employ the QME for the 2D
PISB model. As shown in Iwamoto-2018 , the QME for the reduced density matrix
of the system, $\hat{\rho}(t)$, is derived from the second-order perturbation
approach as
$\displaystyle\frac{\partial}{\partial t}\hat{\rho}(t)$
$\displaystyle=-\frac{i}{\hbar}[\hat{H}_{S},\hat{\rho}(t)]-\frac{1}{\hbar^{2}}\int^{t}_{0}d\tau\left(\hat{\Gamma}_{x}(\tau)\hat{\rho}(t-\tau)+\hat{\Gamma}_{y}(\tau)\hat{\rho}(t-\tau)\right),$
(39)
where
$\displaystyle\hat{\Gamma}_{\alpha}(\tau)\hat{\rho}(t-\tau)$
$\displaystyle\equiv
C(\tau)[\hat{V}_{\alpha},\hat{G}_{S}(\tau)\hat{V}_{\alpha}\hat{\rho}(t-\tau)\hat{G}_{S}^{\dagger}(\tau)]$
$\displaystyle-C(-\tau)[\hat{V}_{\alpha},\hat{G}_{S}(\tau)\hat{\rho}(t-\tau)\hat{V}_{\alpha}\hat{G}_{S}^{\dagger}(\tau)]$
(40)
is the damping operator for $\alpha=x$ or $y$, in which
$\displaystyle C(\tau)$
$\displaystyle=\hbar\int^{\infty}_{0}\frac{d\omega}{\pi}J(\omega)\left[\coth\left(\frac{\beta\hbar\omega}{2}\right)\cos(\omega\tau)-i\sin(\omega\tau)\right]$
(41)
is the bath correlation function and $\hat{G}_{S}(\tau)$ is the time evolution
operator of the system. For the Ohmic SDF $J(\omega)=\eta\omega$, $C(\tau)$
reduces to the Markovian form as
$\displaystyle
C(\tau)=\eta\left(\frac{2}{\beta}+i\hbar\frac{d}{d\tau}\right)\delta(\tau).$
(42)
Using the relation
$\int^{t}_{0}d\tau\hat{\Gamma}_{\alpha}(\tau)\hat{\rho}(t-\tau)=\hat{\bar{\Gamma}}_{\alpha}\hat{\rho}(t)+{i\hbar\eta}\delta(0)[(\hat{V}_{\alpha})^{2},\hat{\rho}(t)]$,
we can rewrite the damping operator, Eq. (40), as
$\displaystyle\hat{\bar{\Gamma}}_{\alpha}\hat{\rho}(t)$
$\displaystyle=\frac{\eta}{\beta}\left([\hat{V}_{\alpha},\hat{V}_{\alpha}\hat{\rho}(t)]-[\hat{V}_{\alpha},\hat{\rho}(t)\hat{V}_{\alpha}]\right)+\frac{i\hbar\eta}{2}\left[(\hat{V}_{\alpha})^{2},\frac{d\hat{\rho}(t-\tau)}{d\tau}|_{\tau=0}\right]$
$\displaystyle-\frac{\eta}{2}\left([\hat{V}_{\alpha},\hat{H}_{S}\hat{V}_{\alpha}\hat{\rho}(t)]+[\hat{V}_{\alpha},\hat{H}_{S}\hat{\rho}(t)\hat{V}_{\alpha}]-[\hat{V}_{\alpha},\hat{V}_{\alpha}\hat{\rho}(t)\hat{H}_{S}]-[\hat{V}_{\alpha},\hat{\rho}(t)\hat{V}_{\alpha}\hat{H}_{S}]\right).$
(43)
In the case if there is only $\hat{V}_{y}=\hbar\sin({\hat{x}dp}/{\hbar})/dp$
interaction in the PISB model, (i.e. $\hat{V}_{x}=0$), we encounter the
divergent term ${i\hbar\eta}\delta(0)[(\hat{V}_{y})^{2},\hat{\rho}(t)]$ that
arises from the second term in the RHS of Eq. (43). Because $\hat{V}_{y}$
reduces to the linear operator of the coordinate $\hat{V}_{y}\approx\hat{x}$
in the large $N$ limit, the PISB model under this condition corresponds to the
Caldeira-Leggett model without the counter term: Divergent term arises because
we exclude the counter term in the bath Hamiltonian, Eq. (3). (See also
Suzuki-2003 .) If we include $\hat{V}_{x}=\hbar\cos({\hat{x}dp}/{\hbar})/dp$,
this divergent term vanishes, because, by using the relation
$\sin^{2}({\hat{x}dp}/{\hbar})+\cos^{2}({\hat{x}dp}/{\hbar})=1$, we have
$\displaystyle{i\hbar\eta}\delta(0)[(\hat{V}_{x})^{2},\hat{\rho}(t)]+{i\hbar\eta}\delta(0)[(\hat{V}_{y})^{2},\hat{\rho}(t)]$
$\displaystyle={i\hbar\eta}\delta(0)[\hat{I},\hat{\rho}(t)]$
$\displaystyle=0.$ (44)
This implies that the interaction $\hat{V}_{y}$ plays the same role as the
counter term. This fact indicates the significance of constructing a system-
bath model with keeping the same symmetry as the system itself. If we ignore
this point, the system dynamics are seriously altered by the bath even if the
system-bath interaction is feeble Suzuki-2003 .
## Appendix C Discrete Moyal bracket
Using the kinetic term (the first term in the RHS of Eq. (32)) as an example,
here we demonstrate the evaluation of the discrete Moyal bracket defined as
Eq. (30). The kinetic energy in a finite Hilbert space representation is
expressed as
$\displaystyle\bm{T}(p_{j},q_{k})$
$\displaystyle=\frac{\hbar^{2}}{dx^{2}}\left(1-\sum_{l=-N}^{N}\exp\left(i\frac{-2q_{k}(p_{j}-p_{l})}{\hbar}\right)\langle
P,l|\cos\left(\frac{\hat{p}dx}{\hbar}\right)|P,2j-l\rangle\right)$
$\displaystyle=\frac{\hbar^{2}}{dx^{2}}\left(1-\sum_{l=-N}^{N}\exp\left(i\frac{-2q_{k}(p_{j}-p_{l})}{\hbar}\right)\cos\left(\frac{p_{l}dx}{\hbar}\right)\delta_{l,2j-l}\right)$
$\displaystyle=\frac{\hbar^{2}}{dx^{2}}\left(1-\cos\left(\frac{p_{j}dx}{\hbar}\right)\right).$
(45)
Because the Moyal bracket with $\bm{A_{1}}=\hbar^{2}/dx^{2}$ and
$\bm{A_{2}}=\bm{W}$ is zero, we focus on the
$\cos\left({p_{j}dx}/{\hbar}\right)$ term. Let $\bm{A_{1}}=\exp\left(\pm
i{p_{j}dx}/{\hbar}\right)$ and $\bm{A_{2}}=\bm{W}$ in Eq. (30). Then we have
$\displaystyle\left[\exp\left(\pm
i\frac{p_{j}dx}{\hbar}\right)\star\bm{W}\right](p_{j},q_{k})=\frac{1}{(2N+1)^{2}}\sum_{j_{1},j_{2},k_{1},k_{2}=-N}^{N}\exp\left(i\frac{2p_{j_{2}}q_{k_{1}}-2p_{j_{1}}q_{k_{2}}}{\hbar}\right)$
$\displaystyle\times\exp\left(\pm
i\frac{(p_{j}+p_{j_{1}})dx}{\hbar}\right)\bm{W}(p_{j}+p_{j_{2}},q_{k}+q_{k_{2}})$
$\displaystyle=\frac{1}{(2N+1)}\sum_{j_{1},k_{2}=-N}^{N}\exp\left(i\frac{(\pm
1-2k_{2})p_{j_{1}}dx}{\hbar}\right)\exp\left(\pm
i\frac{p_{j}dx}{\hbar}\right)\bm{W}(p_{j},q_{k}+q_{k_{2}})$
$\displaystyle=\sum_{k_{2}=-N}^{N}\delta^{\prime}_{\pm
1-2k_{2},0}\exp\left(\pm
i\frac{p_{j}dx}{\hbar}\right)\bm{W}(p_{j},q_{k}+q_{k_{2}})$
$\displaystyle=\exp\left(\pm
i\frac{p_{j}dx}{\hbar}\right)\bm{W}(p_{j},q_{k\pm(N+1)})$ (46)
Similarly, for $\bm{A_{1}}=\bm{W}$ and $\bm{A_{2}}=\exp\left(\pm
i{p_{j}dx}/{\hbar}\right)$, we have
$\displaystyle\left[\bm{W}\star\exp\left(\pm
i\frac{p_{j}dx}{\hbar}\right)\right](p_{j},q_{k})=\exp\left(\mp
i\frac{p_{j}dx}{\hbar}\right)\bm{W}(p_{j},q_{k\pm(N+1)}).$ (47)
Thus the discrete Moyal product of the kinetic energy is expressed as
$\displaystyle-\frac{i}{\hbar}[\bm{T}\star\bm{W}](p_{j},q_{k})=-\hbar\sin\left(\frac{p_{j}dx}{\hbar}\right)\frac{\bm{W}(p_{j},q_{k+N+1})-\bm{W}(p_{j},q_{k-N-1})}{dx^{2}}.$
(48)
For example, for $q_{0}$, the above expression involves the contributions from
$q_{N+1\equiv-N(mod\ 2N+1)}$ and $q_{-N-1\equiv N(mod\ 2N+1)}$, which are the
elements near the boundary of the periodic state. Note that $N+1$ arises from
$\delta^{\prime}_{1-2k_{2},0}$ that is the inverse element of 2 modulo $2N+1$.
For large $N$, the above expression reduces to the kinetic term of the
conventional QFPE by regarding the finite difference near the boundary as the
derivative of the coordinate.
## Appendix D Discrete quantum Fokker-Planck equation for large $N$
For a large $N$, Eq. (33) reduces to
$\displaystyle\frac{\partial}{\partial t}W(p,q)$
$\displaystyle=-p\frac{\partial}{\partial
q}W(p,q)-\frac{i}{\hbar}\\{\bm{U},\bm{W}\\}_{M}+\frac{\eta}{\beta}\frac{\partial^{2}}{\partial
p^{2}}W(p,q)$
$\displaystyle+\frac{\eta}{2}\left(\hat{M}^{2}_{p}\hat{M}_{x}W(p,q)+p\hat{M}_{x}\frac{\partial}{\partial
p}W(p,q)\right),$ (49)
where
$\displaystyle\frac{\partial W(p,q)}{\partial
q}\equiv\frac{W(p_{j},q_{k+N+1)}-W(p_{j},q_{k-N-1})}{dx},$ (50)
$\displaystyle\frac{\partial W(p,q)}{\partial
p}\equiv\frac{W(p_{j+N+1},q_{k})-W(p_{j-N-1},q_{k})}{dp},$ (51)
$\displaystyle\hat{M}_{x}W(p,q)\equiv\frac{W(p_{j},q_{k+N+1)}+W(p_{j},q_{k-N-1})}{2},$
(52)
and
$\displaystyle\hat{M}_{p}W(p,q)\equiv\frac{W(p_{j+N+1},q_{k})+W(p_{j-N-1},q_{k})}{2}.$
(53)
Although the above expression has a similar form to the QFPE, the finite
difference operators for the discrete WDF are defined by the elements near the
periodic boundary, i.e., for $W(p_{0},q_{0})$, $\partial/\partial q$ is
evaluated from $W(p_{0},q_{-(N+1)})$, and $W(p_{0},q_{N+1})$. Thus the
appearance of the discrete WDF can be different from the regular WDF, as
depicted in Fig. 5 even for large $N$.
## References
* (1) Frensley, W. R.: Boundary conditions for open quantum systems driven far from equilibrium. Rev. Mod. Phys. 62, 745 (1990).https://doi.org/10.1103/RevModPhys.62.745
* (2) Jacoboni, C. and Bordone, P. : The Wigner-function approach non-equilibrium electron transport, Reports on Progress in Physics 67, 1033 (2004). https://doi=10.1088/0034-4885/67/7/R01
* (3) Grossmann, F., Koch, W.: A finite-difference implementation of the Caldeira–Leggett master equation. J. Chem. Phys., 130, 034105 (2009). https://doi.org/10.1063/1.3059006
* (4) Kim, K. Y.: A discrete formulation of the Wigner transport equation. J. Appl. Phys. 102, 113705 (2007). https://doi.org/10.1063/1.2818363
* (5) Weinbub, J., Ferry, D. K.: Recent advances in Wigner function approaches. Apply. Phys. Rev. 5, 041104 (2018). https://doi.org/10.1063/1.5046663
* (6) Schwinger, J : Quantum Mechanics: Symbolism of atomic measurements, P84, Englert, B.-G. (ed.) Berlin: Springer (2001). ISBN 13:9783662045893
* (7) Caldeira, A. O., Leggett, A. J.: Quantum tunneling in a dissipative system. Ann. Phys. (N.Y.), 149, 374 (1983). https://doi.org/10.1016/0003-4916(83)90202-6
* (8) U. Weiss, Quantum Dissipative Systems (World Scientific, Singapore, 2012) 4th ed.
* (9) Breuer, H. P., Petruccione, F.: The Theory of Open Quantum Systems (Oxford University Press, New York, 2002).
* (10) Caldeira, A. O., Leggett, A. J.: Path integral approach to quantum Brownian motion. Physica 121A, 587 (1983). https://doi.org/10.1016/0378-4371(83)90013
* (11) Waxman, D., Leggett, A. J.: Dissipative quantum tunneling at finite temperatures. Phys. Rev. B 32, 4450 (1985).https://doi.org/10.1103/PhysRevB.32.4450
* (12) Tanimura, Y., Kubo, R.: Time evolution of a quantum system in contact with a nearly Gaussian-Markoffian noise bath. J. Phys. Soc. Jpn. 58, 101 (1989).https://doi.org/10.1143/JPSJ.58.101
* (13) Tanimura, Y., Wolynes, P. G.: Quantum and classical Fokker-Planck equations for a Gaussian-Markovian noise bath. Phys. Rev. A 43, 4131 (1991).https://doi.org/10.1103/PhysRevA.43.4131
* (14) Tanimura, Y., Wolynes, P. G.: The interplay of tunneling, resonance, and dissipation in quantum barrier crossing: A numerical study. J. Chem. Phys. 96, 8485 (1992).https://doi.org/10.1063/1.462301
* (15) Tanimura, Y. : Stochastic Liouville, Langevin, Fokker-Planck, and master equation approaches to quantum dissipative systems. J. Phys. Soc. Jpn., 75, 082001 (2006).https://doi.org/10.1143/JPSJ.75.082001
* (16) Tanimura, Y. : Numerically “exact” approach to open quantum dynamics: The hierarchical equations of motion (HEOM).,J. Chem. Phys. 153, 020901 (2020).https://doi.org/10.1063/5.0011599
* (17) Tanimura, Y. : Reduced hierarchical equations of motion in real and imaginary time: Correlated initial states and thermodynamic quantities. J. Chem. Phys. 141, 044114 (2014).https://doi.org/10.1063/1.4890441
* (18) Tanimura, Y. : Real-time and imaginary-time quantum hierarchal Fokker-Planck equations. J. Chem. Phys. 142, 144110 (2015).https://doi.org/10.1063/1.4916647
* (19) Jensen, K. L. and Buot, F. A., Numerical simulation of intrinsic bistability and high-frequency current oscillations in resonant tunneling structures, Phys. Rev. Lett., 66, 1078 (1991).
* (20) Jensen, K.L. and Buot, F.A., The methodology of simulating particle trajectories through tunneling structures using a Wigner distribution approach, IEEE Transactions on Electron, 38, 2337 (1991). https://doi=10.1109/16.88522
* (21) Zhan, Z., Colomes, E., Oriols, X. : Unphysical features in the application of the Boltzmann collision operator in the time-dependent modeling of quantum transport. J. Comput. Electron. 15, 1206 (2016).
* (22) Sakurai, A.,Tanimura, Y.: An approach to quantum transport based on reduced hierarchy equations of motion: Application to a resonant tunneling diode. J. Phys. Soc. Jpn, 82, 033707 (2013).https://doi.org/10.7566/JPSJ.82.033707
* (23) Sakurai, A.,Tanimura, Y.: Self-excited current oscillations in a resonant tunneling diode described by a model based on the Caldeira–Leggett Hamiltonian. New J. Phys. 16, 015002 (2014). https://doi.org/10.1088/1367-2630/16/1/015002
* (24) Grossmann, F., Sakurai, A.,Tanimura, Y.: Electron pumping under non-Markovian dissipation: The role of the self-consistent field. J. Phys. Soc. Jpn, 85, 034803 (2016). https://doi.org/10.7566/JPSJ.85.034803
* (25) Ringhofer, C., Ferry, D. K., Kluksdahl, N.:Absorbing boundary conditions for the simulation of quantum transport phenomena. Transp. Theory Stat. Phys. 18, 331 (1989).
* (26) Jiang, H., Lu, T.,Cai, W.: A device adaptive inflow boundary condition for Wigner equations of quantum transport. J. Comput. Phys. 258, 773 (2014).
* (27) Schulz D. and A. Mahmood A., Approximation of a Phase Space Operator for the Numerical Solution of the Wigner Equation, in IEEE J. of Quantum Electronics, 52, 1 (2016). https://doi:10.1109/JQE.2015.2504086.
* (28) Yamada Y., Tsuchiya H., and Ogawa M., Quantum Transport Simulation of Silicon-Nanowire Transistors Based on Direct Solution Approach of the Wigner Transport Equation, in IEEE Transactions on Electron Devices, 56, 1396 (2009). https://doi:10.1109/TED.2009.2021355.
* (29) Morandi, O., Schurrer, F.: Wigner model for quantum transport in graphene. J. Phys. A, Math. Theor. 44, 265301 (2011).
* (30) Barraud, S.: Dissipative quantum transport in silicon nanowires based on Wigner transport equation. J. Appl. Phys. 110, 093710 (2011). https://doi.org/10.1063/1.3654143
* (31) Jonasson, O., Knezevic, I.: Dissipative transport in superlattices within the Wigner function formalism. J. Comput. Electron. 14, 879 (2015).
* (32) Tilma, T., Everitt, M. J., Samson, J. H., Munro, W. J., Nemoto, K.: Wigner functions for arbitrary quantum systems. Phys. Rev. Lett. 117, 180401 (2016). https://doi.org/10.1103/PhysRevLett.117.180401
* (33) Ivanov, A., Breuer, H. P.: Quantum corrections of the truncated Wigner approximation applied to an exciton transport model. Phys. Rev. E 95, 042115 (2017). https://doi.org/10.1103/PhysRevE.95.042115
* (34) Kim, K. Y., Kim, J., Kim, S.: An efficient numerical scheme for the discrete Wigner transport equation via the momentum domain narrowing. AIP Adv. 6, 065314 (2016). https://doi.org/10.1063/1.4954237
* (35) Kim, K. Y., Kim, S., Tang, T.: Accuracy balancing for the finite-difference-based solution of the discrete Wigner transport equation. J. Comput. Electron. 16, 148 (2017). https://doi.org/10.1007/s10825-016-0944-9
* (36) Frensley, W.R. Transient Response of a Tunneling Device Obtainefrom the Wigner Function, Phys. Rev. Lett., 57, 2853 (1986). https://doi:10.1103/PhysRevLett.57.2853,
* (37) Frensley, W.R. Wigner-function model of a resonant-tunneling semiconductor device, Physical Review B, 36 1570 (1987). https://doi:10.1103/PhysRevB.36.1570,
* (38) Kluksdahl N C, Kriman A M and Ferry D K.: Self-consistent study of the resonant-tunneling diode, Phys. Rev. B 39 7720 (1989).
* (39) Shifren, L. and Ringhofer, C. and Ferry, D.K., A Wigner function-based quantum ensemble Monte Carlo study of a resonant tunneling diode, 50, 769 (2003). https://doi:10.1109/TED.2003.809434,
* (40) Jensen, K.L. and Buot, F.A., The methodology of simulating particle trajectories through tunneling structures using a Wigner distribution approach, IEEE Transactions on Electron Devices 38, 2337 (1991). https://doi:10.1109/16.88522
* (41) Jensen, K. L. and Buot, F. A., Numerical simulation of intrinsic bistability and high-frequency current oscillations in resonant tunneling structures, Phys. Rev. Lett., 66, 1078 (1991).https://doi:10.1103/PhysRevLett.66.1078
* (42) Zhao, P. Cui, H. L. Woolard,D. Jensen,K. L. and Buot,F. A., Simulation of resonant tunneling structures: Origin of the I–V hysteresis and plateau-like structure, J. App. Phys. 87, 1337 (2010).https://doi:10.1063/1.372019
* (43) Biegel, B. A. and Plummer, J. D., Comparison of self-consistency iteration options for the Wigner function method of quantum device simulation, Phys. Rev. B, 54, 8070 (1996).https://doi:10.1103/PhysRevB.54.8070,
* (44) Yoder P. D., Grupen M. and Smith R. K. , Demonstration of Intrinsic Tristability in Double-Barrier Resonant Tunneling Diodes With the Wigner Transport Equation, IEEE Transactions on Electron Devices, 57 3265 (2010). https://doi:10.1109/TED.2010.2081672.
* (45) L. Schulz and D. Schulz, ”Application of a Slowly Varying Envelope Function Onto the Analysis of the Wigner Transport Equation,” in IEEE Transactions on Nanotechnology, vol. 15, no. 5, pp. 801-809, Sept. 2016, doi: 10.1109/TNANO.2016.2581880.
* (46) Dorda, A., Schurrer, F.: A WENO-solver combined with adaptive momentum discretization for the Wigner transport equation and its application to resonant tunneling diodes. J. Comput. Phys. 284, 95 (2015).
* (47) Zueco, D. , Garcıa-Palacios, J. L. :Quantum ratchets at high temperatures. Phys. E 29, 435 (2005). https://doi.org/10.1016/j.physe.2005.05.043
* (48) Cleary, L. and Coffey, W. T. and Kalmykov, Y. P. and Titov, S. V, Semiclassical treatment of a Brownian ratchet using the quantum Smoluchowski equation Phys. Rev. E. 80, 051106 (2009). https://doi.org/10.1103/PhysRevE.80.051106
* (49) Kato, A., Tanimura, Y.: Quantum suppression of ratchet rectification in a Brownian system driven by a biharmonic force. J. Phys. Chem. B 117,13132 (2013).https://doi.org/10.1021/jp403056h
* (50) Tanimura, Y., Mukamel, S.: Multistate quantum Fokker–Planck approach to nonadiabatic wave packet dynamics in pump–probe spectroscopy. J. Chem. Phys. 101, 3049 (1994).https://doi.org/10.1063/1.467618
* (51) Chernyak, V., Mukamel, S.: Collective coordinates for nuclear spectral densities in energy transfer and femtosecond spectroscopy of molecular aggregates. J. Chem. Phys. 105, 4565 (1996).https://doi.org/10.1063/1.472302
* (52) Tanimura, Y., Maruyama, Y.: Gaussian–Markovian quantum Fokker–Planck approach to nonlinear spectroscopy of a displaced Morse potentials system: Dissociation, predissociation, and optical Stark effects. J. Chem. Phys. 107, 1779 (1997).https://doi.org/10.1063/1.474531
* (53) Maruyama, Y., Tanimura, Y.: Pump-probe spectra and nuclear dynamics for a dissipative molecular system in a strong laser field: predissociation dynamics. Chem. Phys. Lett. 292, 28 (1998).https://doi.org/10.1016/S0009-2614(98)00634-4
* (54) Ikeda, T., Tanimura, Y. : Low-temperature quantum Fokker–Planck and Smoluchowski equations and their extension to multistate systems. J. Chem. Theory Comput. 15, 2517 (2019).https://doi.org/10.1021/acs.jctc.8b01195
* (55) Ikeda, T., Tanimura, Y. : Probing photoisomerization processes by means of multi-dimensional electronic spectroscopy: The multi-state quantum hierarchical Fokker-Planck equation approach. J. Chem. Phys. 147, 014102 (2017).https://doi.org/10.1063/1.4989537
* (56) Ikeda, T., Tanimura, Y. : Phase-space wavepacket dynamics of internal conversion via conical intersection: Multi-state quantum Fokker-Planck equation approach. Chem. Phys. 515, 203 (2018).https://doi.org/10.1016/j.chemphys.2018.07.013
* (57) Ikeda, T., Tanimura, Y., Dijkstra, A. : Modeling and analyzing a photo-driven molecular motor system: Ratchet dynamics and non-linear optical spectra. J. Chem. Phys. 150, 114103 (2019).https://doi.org/10.1063/1.5086948
* (58) Sakurai, A., Tanimura, Y.: Does $\hbar$ play a role in multidimensional spectroscopy? Reduced hierarchy equations of motion approach to molecular vibrations. J. Phys. Chem. A 115, 4009 (2011).https://doi.org/10.1021/jp1095618
* (59) Ikeda, T., Ito, H., Tanimura, Y.: Analysis of 2D THz-Raman spectroscopy using a non-Markovian Brownian oscillator model with nonlinear system-bath interactions. J. Chem. Phys. 142, 212421 (2015).https://doi.org/10.1063/1.4917033
* (60) Ito, H., Tanimura, Y.: Simulating two-dimensional infrared-Raman and Raman spectroscopies for intermolecular and intramolecular modes of liquid water. J. Chem. Phys. 144, 074201 (2016).https://doi.org/10.1063/1.4941842
* (61) Wootters, W.K.: A Wigner-function formulation of finite-state quantum mechanics. Ann. Phys. (N.Y.) 176, 1 (1987).
* (62) Iwamoto, Y., Tanimura, Y.: Linear absorption spectrum of a quantum two-dimensional rotator calculated using a rotationally invariant system-bath Hamiltonian. J. Chem. Phys, 149, 084110 (2018).https://doi.org/10.1063/1.5044585
* (63) Iwamoto, Y., Tanimura, Y.: Open quantum dynamics of a three-dimensional rotor calculated using a rotationally invariant system-bath Hamiltonian: Linear and two-dimensional rotational spectra. J. Chem. Phys. 151, 044105 (2019).https://doi.org/10.1063/1.5108609
* (64) Suzuki, Y., Tanimura, Y.: Two-dimensional spectroscopy for a two-dimensional rotator coupled to a Gaussian–Markovian noise bath. J. Chem. Phys. 119, 1650 (2003).https://doi.org/10.1063/1.1578630
* (65) Vourdas, A.: Quantum systems with finite Hilbert space. Rep. Prog. Phys. 67, 267 (2004). https://doi.org/10.1088/0034-4885/67/3/r03
* (66) Pegg, D.T., Barnett, S.M.: Phase properties of the quantized single-mode electromagnetic field. Phys. Rev. A. 39, 1665 (1989). https://doi.org/10.1103/PhysRevA.39.1665
* (67) Galetti, D., de Toledo Piza, A.: An extended Weyl-Wigner transformation for special finite spaces. Physica. A. 149, 267 (1988). https://doi.org/10.1016/0378-4371(88)90219-1
* (68) Luis A. and Perina J.: Discrete Wigner function for finite-dimensional systems. J. Phys. A: Math. Gen. 31 1423 (1998).
* (69) Klimov, A.B., Munoz, C.: Discrete Wigner function dynamics. J. Opt. B. 7, S588 (2005).
* (70) Carruthers, P., Nieto,M. M.: Phase and angle variables in quantum mechanics. Rev. Mod. Phys. 40, 411 (1968).
| arxiv-papers | 2021-07-27T01:58:49 | 2024-09-04T03:07:20.311208 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Yuki Iwamoto and Yoshitaka Tanimura",
"submitter": "Yoshitaka Tanimura",
"url": "https://arxiv.org/abs/2107.12551"
} |
2107.12552 | landscapetable
Estimating high-dimensional Markov-switching VARs111I am grateful to Bin Chen
and Nese Yildiz for their invaluable advice and encouragement. I thank Neil
Ericsson, David Hendry, and seminar participants at the 23rd Dynamic
Econometrics conference and the 2021 China Meeting of the Econometric Society
for their useful comments and discussion. Any remaining errors are solely
mine.
$\begin{array}[]{c}\text{{\large Kenwin Maung}}\\\ \text{University of
Rochester}\\\ \end{array}$
Abstract: Maximum likelihood estimation of large Markov-switching vector
autoregressions (MS-VARs) can be challenging or infeasible due to parameter
proliferation. To accommodate situations where dimensionality may be of
comparable order to or exceeds the sample size, we adopt a sparse framework
and propose two penalized maximum likelihood estimators with either the Lasso
or the smoothly clipped absolute deviation (SCAD) penalty. We show that both
estimators are estimation consistent, while the SCAD estimator also selects
relevant parameters with probability approaching one. A modified EM-algorithm
is developed for the case of Gaussian errors and simulations show that the
algorithm exhibits desirable finite sample performance. In an application to
short-horizon return predictability in the US, we estimate a 15 variable
2-state MS-VAR(1) and obtain the often reported counter-cyclicality in
predictability. The variable selection property of our estimators helps to
identify predictors that contribute strongly to predictability during economic
contractions but are otherwise irrelevant in expansions. Furthermore, out-of-
sample analyses indicate that large MS-VARs can significantly outperform
”hard-to-beat” predictors like the historical average.
JEL Classifications: C13, C32, C55, G12
Key words: high-dimensional time series, Markov regime-switching, oracle
property, SCAD, stock return predictability.
## Model
We consider the asymptotic properties of the maximum likelihood estimator
(MLE) for high-dimensional Markov-switching (MS) vector autoregressive (VAR)
models in a double asymptotic framework where both the sample size and number
of parameters are allowed to diverge. Specifically, we study the following:
$y_{t}=\sum_{j=1}^{p_{T}}A_{j,T}(S_{t})y_{t-j}+\sum_{j=1}^{q_{T}}B_{j,T}(S_{t})x_{t-j}+\varepsilon_{t},$
(1)
where $y_{t}\in\mathbb{R}^{d_{T}}$ is a vector of endogenous time series,
$x_{t}\in\mathbb{R}^{d^{*}_{T}}$ allows for the inclusion of exogenous
variables, and $\varepsilon_{t}$ is independently and identically distributed
with mean zero and positive definite variance-covariance matrix
$\Sigma_{T}(S_{t})$. The parameters $A_{j,T}(S_{t})$, $B_{j,T}(S_{t})$, and
$\Sigma_{T}(S_{t})$ are respectively $d_{T}\times d_{T}$, $d_{T}\times
d_{T}^{*}$, and $d_{T}\times d_{T}$ matrices that depend on an underlying
state $\\{S_{t}\\}$, which is modeled as a latent first-order Markov chain on
a finite and discrete state space taking values from $\\{1,\ldots,M\\}$ with
$M$ known and fixed. The transition probabilities of the chain are given by
$P(S_{t}=j|S_{t-1}=i)=p_{i\shortrightarrow j}$, and initial distributions are
given by $P(S_{1}=j)=p_{j}$. We define the precision matrix to be the inverse
of the variance-covariance matrix, $Q_{T}(S_{t})\equiv\Sigma_{T}(S_{t})^{-1}$.
By including the transition matrix and initial probability distributions as
estimable parameters, we have a total of $K_{T}\equiv
M(p_{T}d_{T}^{2}+q_{T}d_{T}d_{T}^{*}+d_{T}(d_{T}+1)/2)+M^{2}$ parameters.
Furthermore, the dimensions of the model, namely $d_{T}$, $d_{T}^{*}$,
$p_{T}$, and $q_{T}$, are allowed to increase with the sample size subject to
regularity conditions. Nonetheless, it is easy to see that, especially with
many regimes, such a set-up could easily lead to a high-dimensional problem
where the number of parameters exceed the sample size.
To address this, we assume that the model in (1) is sparse. This means that
only a small subset of parameters, relative to the sample size, are truly non-
zero, while the rest are regarded as irrelevant. Effectively, this means that
the ’true’ model with only the relevant parameters is a low-dimension system.
A key question is thus whether we are able to asymptotically recover the
’true’ model given the full data without a priori knowledge of the sparsity
pattern and the latent states.
Low-dimensional MS models, where the number of parameters are small and fixed,
are ubiquitous in macroeconometrics and empirical finance. Univariate and
multivariate MS models have been used in investigations of the business cycle
(e.g. Hamilton, 1989), monetary policy (e.g. Sims and Zha, 2006), exchange
rates and currency crisis (e.g. Cerra and Saxena, 2005; Ichiue and Koyama,
2011), forecast combinations (Elliott and Timmermann, 2005), equity returns
(e.g. Henkel et al., 2011), and asset allocation (e.g. Ang and Bekaert, 2002;
Guidolin and Timmermann, 2007, 2008) among other applications111See the
surveys by Hamilton (2016) and Ang and Timmermann (2012) for a more extensive
list of theoretical and empirical applications in macroeconomics and finance
respectively.
Many empirical investigations in macroeconomics and finance are fundamentally
questions about high-dimensional endogenous systems. For example, Bianchi et
al. (2019) study the stock returns of 83 S&P100 firms, within the framework of
Markov-switching Seemingly Unrelated Regressions, to address questions on
network centrality and systemic risk. If we consider larger models or when the
number of variables are allowed to diverge, the modeling of such systems may
lead to parameter proliferation which causes estimation to be computationally
infeasible or unstable. On the other hand, forecasting or policy analysis that
restricts the system to only a few variables may suffer from significant
omitted variable bias (See for e.g. Chan et al., 2020; Koop and Korobilis,
2013; Bańbura et al., 2010).
There are at least four traditional responses to this problem: (i) using
aggregated data to conserve on degrees of freedom (e.g. stock indices instead
of individual prices); (ii) limiting the number of endogenous variables either
in an ad-hoc fashion or by invoking economic theory; (iii) factor-augmented
approaches introduced by Bernanke et al. (2005) and related work on factor
analysis by Stock and Watson (2002) and Bai and Ng (2008), and (iv) Bayesian
estimation when the number of parameters is relatively large but still smaller
than the sample size to obtain more stable parameter estimates. Note that (i)
and (ii) are compromises and might entail a change in research question, while
(iii) does indeed work with high-dimensional data and can be extended to the
regime-switching setting as in Liu and Chen (2016).
More recently, Callot and Kock (2015) introduced an alternative to factor
models in estimating stationary high-dimensional VAR(p) models by means of
shrinkage. The authors showed that penalization via the (adaptive) least
absolute shrinkage and selection operator (Lasso) allows one to asymptotically
recover the sparsity patterns in the coefficient matrices (here, $A_{j,T}$).
Han et al. (2015) show similar theoretical results under milder conditions but
with the number of lags fixed at 1, while Zhu (2020) provide similar results
for the smoothly clipped absolute deviation (SCAD) penalty.
The model in (1) can be viewed as a generalization of Callot and Kock (2015)
by introducing dependency of the multivariate process and its sparsity pattern
on a latent state, while allowing for exogenous covariates. We propose two
shrinkage type estimators for high-dimensional MS-VARs using either the Lasso
or the SCAD penalty, which is a folded concave penalty222See Fan et al. (2014)
for a characterization.. We include SCAD penalization in our investigation
because it requires only mild conditions for model selection consistency as
opposed to the Lasso333The Lasso requires a strong irrepresentability
condition (Zhao and Yu, 2006), which may not hold in some empirical settings..
More practically, folded concave penalties have been documented to yield
better finite sample performance in empirical applications.
The extension for MS is notably non-trivial as it classically requires some
form of MLE, which is not only computationally more intensive compared to the
equation-by-equation Lasso framework in Callot and Kock (2015), but also
theoretically more challenging. Furthermore, the inclusion of folded concave
penalties to a optimization problem generally introduces multiple local
optima. Existing asymptotic results on high-dimensional penalized MLE, for
example Kwon and Kim (2012) for the SCAD penalty, establish oracle properties
for a theoretic local optimum444The oracle property is satisfied when the
penalized MLE is asymptotically equivalent to the estimator obtained from
maximizing the likelihood with irrelevant parameters and penalty terms
excluded.. However, there is no guarantee that a computed solution to our
penalized likelihood function is indeed the desired local optimum. For that to
be true unequivocally, we require at least an assumption of strict concavity
which is only possible when the number of parameters is smaller than the
sample size (see theorem 3 of Kim et al. (2008) or theorem 2 of Kwon and Kim
(2012)), and hence is not directly applicable here.
To deal with this without deviating from our high-dimensional setting, we
adopt a similar estimation strategy as in Fan et al. (2014), which relies on
the local linear approximation (LLA) algorithm for the folded concave
penalties introduced by Zou and Li (2008). This approach does not attempt to
find the desired local optimum, but instead seeks a lower probability bound to
the claim that the computed solution is indeed the desired optimum. As the
SCAD penalty requires an initial estimator, theorem 1 of Fan et al. (2014)
claims that if we can find an initial estimate that is asymptotically close to
the true parameter vector, in a sense to be made clear in fsconst, then the
LLA algorithm delivers the oracle estimator in a single step with probability
approaching one. Borrowing from their terminology, we will call such an
initial estimator ”localizable”. However, given that the likelihood function
of MS models tend to be general and potentially multimodal, we discipline our
investigation by requiring the likelihood surface at the true parameter to be
locally concave and the oracle solution to be unique. Such a restriction is
nonetheless considerably weaker than the strict concavity condition required
in Kim et al. (2008) or Kwon and Kim (2012). Taken together, this suggests a
two-stage approach for the SCAD estimator, similar to that in Li et al. (2015)
and Chen and Maung (2020), with the search of a localizable initial estimator
in the first stage, and the SCAD-penalized MLE subsequently.
Our results open up the possibility of studying Markov regime-switching
dynamics in high-dimensional macroeconomic and financial systems. To
illustrate, we extend the investigation on short-horizon stock return
predictability considered in Henkel et al. (2011) to incorporate 14 aggregate
return predictors from Goyal and Welch (2008), up from the original 4, which
mitigates potential omitted variable bias. This results in a relatively high-
dimensional system with 711 estimable parameters. Penalized maximum likelihood
estimation with the SCAD penalty yields the often reported counter-cyclicality
in return predictability. Furthermore, the variable selection property of our
estimators helps to identify predictors that contribute strongly to
predictability during economic contractions but are otherwise irrelevant in
expansions.
The rest of this paper is organized as follows. Section 2 describes the
penalized maximum likelihood problems while Section 3 provides an EM algorithm
for the special case of Gaussian errors. Section 4 contains the key asymptotic
results. Section 5 consider Monte Carlo experiments to assess the finite
sample properties of the proposed estimators, while section 6 applies it to
the problem of short-horizon return predictability. Finally, section 7
concludes. All proofs are collected in the appendix.
## Problem formulation
In this section, we describe the maximum likelihood problem in a manner
amenable to the derivation of theoretical results. This construction is
however, not convenient for computation, which will be accomplished in section
3. There, we will rely on the Expectation-Maximization (EM) algorithm.
### Notation and sparsity
Before proceeding, we define some notation. For this section and the next, we
suppress the dependence of the parameters on the sample size for notational
convenience.
To begin, set
$\phi\equiv(\theta_{A}^{\top},\theta_{B}^{\top},Q^{ND\top},Q^{D\top},\pi^{\top})^{\top}$
to include all parameters across all states. Let
$A(s)=[A_{1}(s),\ldots,A_{p_{T}}(s)]$, and $A=[A(1),\ldots,A(M)]$, then
$\theta_{A}=vech(A)$, which is a $Mp_{T}d_{T}^{2}\times 1$ vector.
$\theta_{B}$ is a $Mq_{T}d_{T}d_{T}^{*}\times 1$ vector that is defined
analogously. Recall that the precision matrix is given as
$Q(s)=\Sigma(s)^{-1}$. Let $Q^{ND}$ be the vector containing unique off-
diagonal elements of the precision matrix across all states i.e.
$Q^{ND}=(q_{21}(1),q_{31}(1),\ldots,q_{d_{T}1}(1),q_{23}(1),\ldots,q_{d_{T}(d_{T}-1)}(1),q_{21}(2),\ldots,q_{d_{T}(d_{T}-1)}(M))^{\top}$,
and $Q^{D}$ includes the diagonal elements:
$Q^{D}=(q_{11}(1),\ldots,q_{d_{T}d_{T}}(1),\ldots,q_{d_{T}d_{T}}(M))^{\top}$.
$Q=(Q^{ND\top},Q^{D\top})^{\top}$ is $Md_{T}(d_{T}+1)/2\times 1$. Finally,
$\pi=(p_{1\shortrightarrow 1},p_{1\shortrightarrow
2},\ldots,p_{1\shortrightarrow M},\ldots,p_{M\shortrightarrow
M},p_{1},\ldots,p_{M})^{\top}$ is a vector of transition probabilities and
initial distributions.
Written this way, it is clear that our characterization of sparsity is
equivalent to saying that the vectors $\theta_{A}$ , $\theta_{B}$, and
$Q^{ND}$ are sparse. Formally, we assume that only $h^{A}$, $h^{B}$, and
$h^{Qnd}$ elements of $\theta_{A}$, $\theta_{B}$, and $Q^{ND}$ respectively,
are non-zero and that $h^{A}+h^{B}+h^{Qnd}\ll T$. Sparsity cannot be imposed
on $Q^{D}$ to maintain positive definiteness.
### Two estimators of a high-dimensional MS-VAR
To begin, let
$\mathcal{I}^{t-1}_{t-v}=(y_{t-v},\ldots,y_{t-1},x_{t-v},\ldots,x_{t-1})$ be
the information set from time $t-v$ to $t-1$ for some integer $v$,
$\Phi_{s}=(A(s),B(s),Q(s))$ be the state-specific VAR parameters, and define
$\mathcal{Y}_{T}=(y_{1},\ldots,y_{T})$ and analogously for $\mathcal{X}_{T}$.
Without loss of generality, assume that $p_{T}=\max\\{p_{T},q_{T}\\}$ is the
largest lag, and thus we can denote the conditional density of $y_{t}$ from
(1) as $g(y_{t}|\mathcal{I}^{t-1}_{t-p_{T}};\Phi_{S_{t}})$.
Then, it can be shown that the (non-penalized) conditional likelihood is given
as
$\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi)=\sum_{S_{p_{T}+1}=1}^{M}\ldots\sum_{S_{T}=1}^{M}p_{S_{p_{T}+1}}(\phi)\prod_{t=p_{T}+2}^{T}p_{(S_{t-1})\shortrightarrow(S_{t})}(\phi)\prod_{t=p_{T}+1}^{T}g(y_{t}|\mathcal{I}^{t-1}_{t-p_{T}};\Phi_{S_{t}}).$
(2)
Here we emphasize that $p_{i\shortrightarrow j}$ and the initial distributions
$p_{j}$ are functions of the parameter vector $\phi$. As prefaced earlier,
direct optimization of (2) is challenging because the transition probabilities
$p_{i\shortrightarrow j}$ are highly non-linear functions of the parameters.
To deal with this issue, we will rely on a modified EM algorithm in section 3.
#### Lasso & gLasso
We propose solving the following optimization problem with Lasso penalty for
VAR coefficients and graphical Lasso (gLasso) penalty for the precision matrix
(Friedman et al., 2008) to induce sparsity,
$\max_{\phi}\
T^{-1}\log\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi)-\sum_{s=1}^{M}\bigg{\\{}\lambda^{Lasso}\bigg{(}\sum_{m=1}^{d_{T}}\sum_{n=1}^{d_{T}p_{T}}|a_{mn}(s)|+\sum_{m=1}^{d_{T}^{*}}\sum_{n=1}^{d_{T}^{*}q_{T}}|b_{mn}(s)|\bigg{)}+\lambda^{gLasso}\sum_{m\neq
n}|q_{mn}(s)|\bigg{\\}}$ (3)
where $a_{mn}(s)$ refers to the element in the $m^{th}$ row and $n^{th}$
column of $A(s)$, and analogously for $b_{mn}(s)$ and $q_{mn}(s)$ for $B(s)$
and $Q(s)$ respectively. $\lambda^{Lasso}$ and $\lambda^{gLasso}$ are penalty
terms. Note that only the non-diagonal elements are penalized in the sparse
precision matrix estimation. It is possible to set $\lambda^{Lasso}$ to be
different for parameters in $A(s)$, and $B(s)$ as long as the penalties are
proportional to one another, however, doing so may introduce significant
computational costs when tuning the penalty terms. Nonetheless, we call the
solution to (3) the Lasso estimator.
#### SCAD
To use the LLA (Zou and Li, 2008) for the SCAD problem, we require a
localizable initial estimate, $\tilde{\phi}$. As we show later in section 4,
the Lasso estimate above satisfies this property. Hence, we re-optimize the
log-likelihood with the Lasso estimate as $\tilde{\phi}$ with the LLA for the
SCAD penalty. This utilizes the first derivative of the penalty which is
defined as
$p_{\lambda}^{{}^{\prime}}(x)=\lambda\bigg{[}1(x\leq\lambda)+\frac{(a\lambda-x)_{+}}{(a-1)\lambda}1(x>\lambda)\bigg{]},$
(4)
where $(m)_{+}=m$ if $m>0$ and $0$ otherwise, $\lambda$ is a penalty
parameter, and $a>2$ is a constant. Here, we set $a=3.7$ as suggested in Fan
and Li (2001). The optimization problem is given by
$\displaystyle\max_{\phi}\
T^{-1}\log\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi)-\sum_{s=1}^{M}\bigg{\\{}\sum_{m=1}^{d_{T}}$
$\displaystyle\sum_{n=1}^{d_{T}p_{T}}p_{\lambda}^{{}^{\prime}}(|\tilde{a}_{mn}(s)|)|a_{mn}(s)|+$
$\displaystyle\sum_{m=1}^{d_{T}^{*}}\sum_{n=1}^{d_{T}^{*}q_{T}}p_{\lambda}^{{}^{\prime}}(|\tilde{b}_{mn}(s)|)|b_{mn}(s)|+\sum_{m\neq
n}p_{\lambda^{*}}^{{}^{\prime}}(|\tilde{q}_{mn}(s)|)|q_{mn}(s)|\bigg{\\}}$ (5)
where $\lambda$ and $\lambda^{*}$ are penalty terms, and parameters with tilde
are from the initial estimate $\tilde{\phi}$.
A key theoretical advantage of using the SCAD penalty instead of simply
stopping once we have obtained the Lasso estimate, is that we can, under
relatively mild conditions, attain selection consistency, or in other words,
asymptotically recover the true sparse support of the parameters. On the other
hand, penalization with Lasso requires strong irrepresentability conditions
(Zhao and Yu, 2006). However, if prediction is the main goal of estimation,
then both Lasso and SCAD are applicable.
## EM algorithm for Gaussian errors
In this section, we propose an EM algorithm to solve (3) and (2.2.2) similar
to that of Ailliot and Monbet (2017). For concreteness and parsimony, we focus
only on the scenario where $\varepsilon_{t}\sim^{i.i.d}N(0,\Sigma(S_{t}))$ in
this section, which implies that the conditional density $g(y|\cdot)$ is
Gaussian. Not only is this assumption standard in the VAR literature, it also
induces a closed form problem which simplifies the estimation of the VAR
parameters.
The EM algorithm was proposed to estimate models with incomplete or hidden
data. Baum et al. (1970) applied the algorithm to estimate hidden Markov
models, which is a general class that encompasses many MS models in
econometrics. Intuitively, the algorithm works not by directly optimizing the
likelihood function in (2), which as mentioned earlier is a highly non-linear
function of the parameters, but instead optimizes a constructed auxiliary
function (label it $\Omega(\cdot)$) to derive a monotonically increasing lower
bound on the value of the original likelihood.
Formally, the algorithm works iteratively with two steps per iteration:
expectation (E) and maximization (M). With each iteration applied to
$\Omega(\cdot)$, we obtain updates on the parameters. The corresponding
likelihood $\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi)$ is guaranteed
to be non-decreasing with each update and eventually finds a stationary
point555This can mean a local or global maximum, or a saddle point. in the
likelihood surface (Dempster et al., 1977). Although the statistical
guarantees on the EM algorithm have been developed for the low-dimensional
context, it is not difficult to show that Theorem 1 of Dempster et al. (1977)
(monotonicity of the algorithm) will still hold with penalization.
Since both estimators in section 2 entail a maximization problem, we can apply
the EM algorithm to optimize either (3) or (2.2.2). The E-step for both
problems will be similar, while the M-step is different because of differences
in penalization.
To begin, we define the auxiliary function in the E-step.
E-step. We consider the complete-data log-likelihood given as
$\ell(\mathcal{S}_{T},\mathcal{Y}_{T};\mathcal{X}_{T},\phi)$ where
$\mathcal{S}_{T}=(S_{1},\ldots,S_{T})$. Note that the incomplete-data
likelihood in (2) can be written as
$\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi)=\int\exp(\ell(\mathcal{S}_{T},\mathcal{Y}_{T}|\mathcal{X}_{T};\phi))d\mathcal{S}_{T},$
and thus
$\ell(\mathcal{S}_{T},\mathcal{Y}_{T};\mathcal{X}_{T},\phi)=\log\bigg{[}p_{S_{p_{T}+1}}(\phi)\prod_{t=p_{T}+2}^{T}p_{(S_{t-1})\shortrightarrow(S_{t})}(\phi)\prod_{t=p_{T}+1}^{T}g(y_{t}|\mathcal{I}^{t-1}_{t-p_{T}};\Phi_{S_{t}})\bigg{]}.$
The log-likelihood is called ’complete’ because it treats the latent state as
observable data. However, since we do not actually observe it, we consider its
conditional expectation,
$E[\ell(\mathcal{S}_{T},\mathcal{Y}_{T};\mathcal{X}_{T},\phi)\\\
|\mathcal{I}_{T},\phi^{(j-1)}]$, where $\phi^{(j-1)}$ is the estimate from the
previous $(j-1)^{th}$ EM iteration and is treated as pre-determined during the
current iteration. Since we have additive penalties, we can construct the
auxiliary function as
$\Omega^{\mathrm{N}}(\phi,\phi^{(j-1)})\equiv
E[\ell(\mathcal{S}_{T},\mathcal{Y}_{T};\mathcal{X}_{T},\phi)|\mathcal{I}_{T},\phi^{(j-1)}]-\text{pen}(\mathrm{N})$
(6)
where pen(N) for N $\in\\{\text{Lasso, SCAD}\\}$ refers to either group of
penalties. Ignoring penalties for now, we have
$\displaystyle E[\ell(\mathcal{S}_{T},\mathcal{Y}_{T};\mathcal{X}_{T},\phi)$
$\displaystyle|\mathcal{I}_{T},\phi^{(j-1)}]=\sum_{s=1}^{M}\sum_{t=p_{T}+1}^{T}P(S_{t}=s|\mathcal{I}_{T};\phi^{(j-1)})\log
g(y_{t}|\mathcal{I}^{t-1}_{t-p_{T}};\Phi_{s})$
$\displaystyle+\sum_{s,s^{{}^{\prime}}=1}^{M}\sum_{t=p_{T}+2}^{T}P(S_{t}=s^{{}^{\prime}},S_{t-1}=s|\mathcal{I}_{T},\phi^{(j-1)})\log
P(S_{t}=s^{{}^{\prime}}|S_{t-1}=s,\mathcal{I}^{t-1}_{t-p_{T}};\pi)$
$\displaystyle+\sum_{s=1}^{M}P(S_{P_{T}+1}=s|\mathcal{I}_{t-p_{T}}^{t-1};\pi)$
$\displaystyle\equiv\sum_{s=1}^{M}Z_{1}(s;\Phi_{s})+\sum_{s,s^{{}^{\prime}}=1}^{M}Z_{2}(s,s^{{}^{\prime}};\pi)+\sum_{s=1}^{M}Z_{3}(s;\pi).$
By construction, pen(N) would be relevant to the optimization of VAR
parameters in $Z_{1}(s)$. On the other hand, $Z_{2}(s,s^{{}^{\prime}})$ and
$Z_{3}(s)$ are only a function of $\pi$ and thus can be maximized by standard
optimization procedures as this is a low-dimensional problem.
Since we have Gaussianity of $g(y_{t}|\cdot)$, we can show that
$\operatorname*{arg\,max}_{(A(s),B(s),Q(s))}Z_{1}(s;\Phi_{s})=\operatorname*{arg\,max}_{(A(s),B(s),Q(s))}\log|Q(s)|-\operatorname{Tr}{(\hat{S}(s)Q(s))},$
(7)
where
$\hat{S}(s)=\frac{\sum_{t=p_{T}+1}^{T}P(S_{t}=s|\mathcal{I}_{T};\phi^{(j-1)})\times\omega_{t}\omega_{t}^{\top}}{\sum_{t=p_{T}+1}^{T}P(S_{t}=s|\mathcal{I}_{T};\phi^{(j-1)})},$
and
$\omega_{t}=y_{t}-\sum_{j=1}^{p_{T}}A_{j}(S_{t})y_{t-j}-\sum_{j=1}^{q_{T}}B_{j}(S_{t})x_{t-j}.$
Note that $Z_{2}(s,s^{{}^{\prime}};\pi)$ contains the smoothed probabilities
$P(S_{t}=s^{{}^{\prime}}|S_{t-1}=s,\mathcal{I}_{T},\phi^{(j-1)})$, which can
be computed via an iterative backward-forward recursion (see for e.g. Hamilton
(1990)).
M-step. Here, we maximize the auxiliary function in (6) with respect to
$\phi$. Suppose we are executing the EM algorithm for the N estimator (i.e.
either (3) or (2.2.2)). Then, for all states $s$, we solve
$\operatorname*{arg\,max}_{(A(s),B(s),Q(s))}\log|Q(s)|-\operatorname{Tr}{(\hat{S}(s)Q(s))}-\text{pen(N},s\text{)},$
(8) $\operatorname*{arg\,max}_{\pi}Z_{2}(s,s^{{}^{\prime}};\pi)\text{ and
}\operatorname*{arg\,max}_{\pi}Z_{3}(s;\pi),$ (9)
where pen(N,$s$) refers to the $s^{th}$ state penalties for the N estimator.
For computational efficiency, it might be convenient to further separate (8)
into two parts. To illustrate, consider a M-step for the Lasso. Firstly, fix
the coefficient values $A(s)$ and $B(s)$, and estimate
$\operatorname*{arg\,max}_{Q(s)}\log|Q(s)|-\operatorname{Tr}(\hat{S}(s)Q(s))-\lambda^{gLasso}\sum_{m\neq
n}|q_{mn}(s)|.$
Next, given an estimate of $Q(s)$, we optimize
$\operatorname*{arg\,max}_{A(s),B(s)}-\operatorname{Tr}(\hat{S}(s)Q(s))-\lambda^{Lasso}\bigg{(}\sum_{m=1}^{d_{T}}\sum_{n=1}^{d_{T}p_{T}}|a_{mn}(s)|+\sum_{m=1}^{d_{T}^{*}}\sum_{n=1}^{d_{T}^{*}q_{T}}|b_{mn}(s)|\bigg{)}.$
This sequential partitioning helps with computation because we can now
individually apply fast (block) coordinate descent algorithms (Friedman et
al., 2007, 2008) to each part of the problem. Note that these algorithms will
also work with the SCAD penalty as defined in (2.2.2).
The M-step provides an update of the parameters $\phi^{(j)}$. It can be shown
that repeated updating of $\phi^{(j)}$ will lead the respective original
likelihoods in (3) or (2.2.2) to either increase or remain constant in value,
but not decrease. Hence, the maximizer can be found subject to some
termination condition on the implied increments of the original penalized
likelihood.
To implement the algorithm, we require an initial vector of parameters
$\phi^{(0)}$. We recommend using reasonable randomly generated values for the
Lasso problem, and subsequently the computed Lasso optimum as $\phi^{(0)}$ for
the SCAD problem.
### Selecting tuning parameters
Similar to Callot and Kock (2015), we propose selecting $\lambda^{Lasso}$ and
$\lambda^{gLasso}$ for the Lasso estimator, and $\lambda$ and $\lambda^{*}$
for the SCAD estimator, using a modified version of the Bayes Information
Criterion (BIC). Specifically, for either Lasso or SCAD, choose $\lambda_{1}$
and $\lambda_{2}$ to minimize
$BIC(\lambda_{1},\lambda_{2})=\log(\text{pooled}_{SSR})+C_{T}(l\log(T)/T)$
where
$\text{pooled}_{SSR}=\left|\sum_{t={p_{T}+1}}^{T}\sum_{m=1}^{M}\hat{P}(S_{t}=m|\mathcal{I}_{T};\hat{\phi})\left(y_{t}-\sum_{j=1}^{p_{T}}\hat{A}_{j,T}(m)y_{t-j}+\sum_{j=1}^{q_{T}}\hat{B}_{j,T}(m)x_{t-j}\right)\right|,$
and parameters with ’hats’ indicate estimates. Following Wang et al. (2009),
$C_{T}$ is set at $\log K_{T}$, where we recall that $K_{T}$ is the total
number of parameters in the system, to help obtain consistency of the BIC in
high-dimensional regressions, while $l$ is the number of estimates that are
identified as non-zero in the system. Simulation results in section 5 indicate
that tuning parameter selection with BIC can yield consistent estimates.
## Asymptotic theory
We establish theoretical properties for each estimator in a double asymptotic
framework, where we allow the sample size $T\rightarrow\infty$ and the
dimensions of the candidate models $p_{T},q_{T},d_{T},$ and $d_{T}^{*}$ to
diverge at appropriate rates. By extension, it is natural to allow the
dimensions of the true non-zero parameters $h^{A}_{T}$, $h^{B}_{T}$, and
$h^{Qnd}_{T}$ to grow albeit subject to stricter restrictions. Consequently,
the dimension of the true parameter vector, $\phi_{T}$, may extend to
infinity.
Traditionally, theoretical results on consistency in MS models with finite
state spaces rely on limit theorems from random matrix theory to attain some
generalized form of the Kullback-Leibler divergence (for e.g. Leroux, 1992;
Francq and Roussignol, 1998), whereby consistency follows from an
identification condition. This strategy is challenging in the high-dimensional
context because of the dependence of $\phi_{T}$ on the sample size. Instead,
we adopt a modified approach to Fan and Peng (2004) to establish consistency
and oracle properties under a diverging parameter framework.
Recall that $K_{T}$ is the total number of VAR and transition matrix
parameters from (1). Let $\phi^{*}_{T}\in\Theta_{T}$ be a vector of true
(sparse) parameters where $\Theta_{T}\subset\mathbb{R}^{K_{T}}$ is an open
subset. In addition, let $K^{Sp}_{T}=h_{T}^{A}+h_{T}^{B}+h_{T}^{Qnd}$ be the
number of non-zero parameters out of those that are subject to penalization
(i.e. the VAR parameters), and let $K_{T}^{*}=K^{Sp}_{T}+Md_{T}+M^{2}$ be the
total number of non-zero parameters in the true parameter vector where $M^{2}$
and $Md_{T}$ are from the transition matrix and the diagonals of variance-
covariance matrices respectively. Without loss of generality, we assume that
$\phi^{*}_{T}$ can be re-arranged in the following form
$\phi_{T}^{*}=(\underbrace{\phi_{1}^{*},\ldots,\phi_{K_{T}^{Sp}}^{*}}_{\begin{subarray}{c}K_{T}^{Sp}\text{
non-zero}\\\ \text{VAR
parameters}\end{subarray}},\underbrace{0,\ldots,0}_{\begin{subarray}{c}\text{irrelevant}\\\
\text{VAR
parameters}\end{subarray}},\underbrace{q_{11}^{*}(1),\ldots,q_{d_{T}d_{T}}^{*}(M)}_{\begin{subarray}{c}Md_{T}\text{
parameters from}\\\ \text{diagonals of precision
matrices}\end{subarray}},\underbrace{p_{1\shortrightarrow
1}^{*},\ldots,p_{M\shortrightarrow M}^{*}}_{\text{transition
probabilities}})^{\top}.$ (10)
### Regularity conditions
We impose the following regularity conditions for deriving our asymptotic
results. Let
$\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi_{T})=\mathcal{L}_{T}(\phi_{T})$.
In addition, $\nabla^{k}$ represents the $k^{th}$ derivative with respect to
$\phi_{T}$, and $\nabla^{k}_{j_{1},\ldots,j_{k}}$ represent the $k^{th}$
derivative with respect to the $j_{1},\ldots,j_{k}^{th}$ element in
$\phi_{T}$.
* (A1)
For all $\phi_{T}\in\Theta_{T}$, $\\{(y_{t},x_{t})\\}_{t=0}^{\infty}$ is a
stationary and ergodic process. The Markov chain $\\{S_{t}\\}$ is irreducible
and aperiodic.
* (A2)
For all $i,j$, the functions $p_{j}(\cdot)$ and $p_{i\shortrightarrow
j}(\cdot)$ are twice continuously differentiable over $\Theta_{T}$.
Furthermore, given $I_{t-1}$ and $S_{t}$,
$g(y_{t}|\mathcal{I}^{t-1}_{t-v};\Phi_{S_{t},T})$ is a probability density
function with two continuous derivatives over $\Theta_{T}$ for any integer
$v\leq t$.
* (A3)
For all $S_{t}$, $j,k,l$, we have:
(i) $E[\sup_{\phi_{T}\in\Theta_{T}}|\nabla^{1}_{j}\log
g(y_{t}|\mathcal{I}_{t-v}^{t-1};\Phi_{S_{t}})|^{2}]<\infty$ and
$E[\sup_{\phi_{T}\in\Theta_{T}}|\nabla^{2}_{j,k}\log
g(y_{t}|\mathcal{I}_{t-v}^{t-1};\Phi_{S_{t}})|^{2}]<\infty$; (ii)
$E[\sup_{\phi_{T}\in\tilde{\Theta}_{T}}|\nabla^{3}_{j,k,l}\log
g(y_{t}|\mathcal{I}_{t-v}^{t-1};\Phi_{S_{t}})|^{2}]<\infty$, where
$\tilde{\Theta}_{T}$ is defined in (A5) and (A6)(i).
* (A4)
Let
$\rho(y_{t})=\sup_{\phi_{T}\in\Theta_{T}}\max_{s,s^{{}^{\prime}}\in\\{1,\ldots,M\\}}\frac{g(y_{t}|\mathcal{I}_{t-v}^{t-1};\Phi_{s})}{g(y_{t}|\mathcal{I}_{t-v}^{t-1};\Phi_{s^{{}^{\prime}}})}$,
and assume that $P(\rho(y_{t})=\infty|\mathcal{I}_{t-v}^{t-1},S_{t}=s)<1$ for
all $s\in\\{1\ldots,M\\}$.
* (A5)
(i) Assume that there exists an open subset
$\tilde{\Theta}_{T}\subset\Theta_{T}$ such that
$\tilde{\phi}_{T},\phi_{T}^{*}\in\tilde{\Theta}_{T}$, and
$\log\mathcal{L}_{T}(\phi_{T})$ is locally concave over $\tilde{\Theta}_{T}$.
(ii) Let
$\boldsymbol{u}_{1},\boldsymbol{u}_{2},\boldsymbol{u}_{3},\boldsymbol{v}_{1}$,
and $\boldsymbol{v}_{2}$ be vectors that share the same dimensions as
$\theta_{A},\theta_{B},Q^{ND},Q^{D}$ and $\pi$ respectively. Fix a scalar
constant $W$ that can be sufficiently large, and define the set
$\Omega(W)=\\{\boldsymbol{u}=(\boldsymbol{u}_{1}^{\top},\boldsymbol{u}_{2}^{\top},\boldsymbol{u}_{3}^{\top},\boldsymbol{v}_{1}^{\top},\boldsymbol{v}_{2}^{\top})^{\top}|\
\|\boldsymbol{u}\|=W;\ \|u_{1}\|_{1}+\|u_{2}\|_{1}+\|u_{3}\|_{1}\leq
C[\sum_{i\in S(h_{T}^{A})}|u_{1i}|+\sum_{i\in S(h_{T}^{B})}|u_{2i}|+\sum_{i\in
S(h_{T}^{Qnd})}|u_{3i}|]\\}$, where $\|\cdot\|_{1}$ refers to the sum of
absolute values of vector elements, and $C>1$ is some constant. Let
$\gamma_{T}$ be some scalar function that depends on $T$, then define the ball
$\tilde{\Theta}_{T,\gamma,W}=\\{(\phi_{T}^{*}+\gamma_{T}\boldsymbol{u})|\boldsymbol{u}\in\Omega(W)\\}$.
Assume that $\tilde{\Theta}_{T,\gamma,W}\subseteq\tilde{\Theta}_{T}$.
* (A6)
(i) $\log\mathcal{L}_{T}(\phi_{T})$ admits a third derivative over
$\tilde{\Theta}_{T}$ which includes $\phi^{*}_{T}$; (ii) There exists an open
set $\tilde{\Theta}^{*}_{T}\subseteq\tilde{\Theta}_{T}$ and
$\phi^{*}_{T}\in\tilde{\Theta}^{*}_{T}$ for which
$\nabla^{2}\log\mathcal{L}_{T}(\phi_{T})$ is concave.
* (A7)
(i) Let the information matrix be
$I_{T}(\phi_{T}^{*})=E[(\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*}))(\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*}))^{\top}]$,
and let $I_{T}^{(\neg 0)}(\phi_{T}^{*})$ refer to the non-zero submatrix
constructed from $I_{T}(\phi_{T}^{*})$. Assume that $I_{T}^{(\neg
0)}(\phi_{T}^{*})$ is positive definite.
(ii) In addition, assume that
$0<\rho_{1}\leq\inf_{\omega\in\Omega(W)}\omega^{\top}(-\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*}))\omega\leq\sup_{\omega\in\Omega(W)}\omega^{\top}(-\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*}))\omega\leq\rho_{2}<\infty,$
with probability approaching one.
* (A8)
(i) $K_{T}^{*}=o(T^{1/4})$; (ii) The Lasso penalty terms satisfy
$\lambda^{Lasso}\propto\lambda^{gLasso}$, where $\lambda^{Lasso}\rightarrow 0$
satisfies $(\sqrt{T}\lambda^{Lasso})^{-1}\rightarrow 0$. (iii) The SCAD
penalty terms satisfy $\lambda\propto\lambda^{*}$, where $\lambda\rightarrow
0$, and $[\sqrt{K_{T}^{*}}\lambda^{Lasso}]\lambda^{-1}\rightarrow 0$.
Furthermore, $\frac{K_{T}}{T\lambda^{2}}\rightarrow 0$, where recall that
$K_{T}$ is the number of candidate parameters.
* (A9)
Assume $\min_{1\leq j\leq K_{T}^{Sp}}|\phi_{i}^{*}|>\lambda$ such that
$\min_{1\leq j\leq K_{T}^{Sp}}|\phi_{i}^{*}|/\lambda\rightarrow\infty$, where
$\phi_{i}^{*}$ are true non-zero parameters as described in (10).
Remarks. (A1)-(A4) are standard assumptions in the MS literature on asymptotic
normality (see Bickel et al., 1998). The assumption of local concavity in (A5)
is much weaker than that of strict concavity commonly assumed in high-
dimensional regularized MLE problems. We need the likelihood to be (locally)
concave between the localizable initial estimator and the true parameter to
apply theorem 1 of Fan et al. (2014) so that the SCAD estimation initialized
with Lasso estimates delivers the oracle result. The assumption of a locally
concave neighborhood is not uncommon in the theoretical literature on high-
dimensional problems. For example, in the context of a two-step estimation
procedure for high-dimensional sparse principal components analysis, Janková
and van de Geer (2018) assumes that a rough initial estimate can be found in a
locally convex neighborhood of the population parameter. (A6)(i) is commonly
assumed in the SCAD literature and helps us to establish selection
consistency, while (A6)(ii) is essentially identical to assumption 2(ii) in Li
et al. (2015). (A7)(ii) is a modification of the restricted eigenvalue
condition in Bickel et al. (2009), and this particular formulation follows
assumption 2(iii) in Li et al. (2015). (A8) restricts the number of true
parameters $K_{T}^{*}$ to only increase at a rate slower than $T^{1/4}$.
Furthermore, $\lambda^{lasso}\rightarrow 0$ but converges slower than
$1/\sqrt{T}$, and $\lambda\rightarrow 0$ but slower than
$\sqrt{K_{T}^{*}}\lambda^{lasso}$. (A9) is a standard assumption on the
minimum signal strength of relevant parameters. This condition is required for
proving the oracle property of the SCAD estimator and mirrors the
characterization in Zhu (2020).
### Asymptotic results
Our first result states that the Lasso estimator is consistent. Let
$\|\cdot\|$ denote the $\ell_{2}$ norm.
###### Proposition 1.
fsconst Under the conditions of (A1)-(A8), the Lasso estimate
$\tilde{\phi}_{T}$ satisfies
$\|\tilde{\phi}_{T}-\phi_{T}^{*}\|=O_{p}(\sqrt{K_{T}^{*}}\lambda^{Lasso})=o_{p}(1).$
(11)
We obtain the final equality because of (A8). This means that the Lasso
estimator exhibits estimation consistency, although we do not guarantee that
it is able to asymptotically identify the relevant parameters.
Next, define $\hat{S}=\\{j:|\hat{\phi}_{T,j}|>0\\}$ where $\hat{\phi}_{T,j}$
is the $j^{th}$ element in $\hat{\phi}_{T}$. Hence, $\hat{S}$ is the index set
of estimated non-zero parameters from the SCAD procedure. Define $S_{0}$ for
$\phi_{T}^{*}$ in an analogous manner (i.e. the index set of truly relevant
population parameters). The following result shows that the SCAD estimator,
initialized by the Lasso estimates, achieves not just estimation consistency,
but also selection consistency.
###### Theorem 1.
consistency Let $\hat{\phi}_{T}$ be the MLE to the SCAD problem in (2.2.2)
initialized with Lasso estimates. Under the conditions of (A1)-(A9), we have
that
* (1)
$\|\hat{\phi}_{T}-\phi_{T}^{*}\|=O_{p}(\sqrt{K_{T}^{*}/T})=o_{p}(1)$,
* (2)
$P(\hat{S}=S_{0})\rightarrow 1$.
Part (1) of consistency states that the SCAD estimator is consistent since
$\sqrt{K_{T}^{*}/T}\rightarrow 0$ by (A8). The second part claims that the
sparsity property holds. In other words, we are able to exactly distinguish
the parameters that are truly non-zero from those that are irrelevant in the
theoretical limit. Note that these results hold even if the dimensions of the
parameter vectors diverge.
Next, we discuss the asymptotic normality of the SCAD estimator. To do so,
define $\hat{\phi_{T}}^{(\neg 0)}$ to be the estimate $\hat{\phi}_{T}$ with
the zeroes removed, and similarly for $\phi_{T}^{*(\neg 0)}$.
###### Theorem 2.
norm Assume that conditions (A1)-(A9) are satisfied. Then,
$\sqrt{T}G_{T}[I_{T}^{(\neg 0)}(\phi_{T}^{*})]^{1/2}(\hat{\phi_{T}}^{(\neg
0)}-\phi_{T}^{*(\neg 0)})\rightarrow^{d}\mathcal{N}(0,G),$ (12)
where $G_{T}$ is a conformable matrix such that $G_{T}G_{T}^{\top}\rightarrow
G$ for positive definite $G$, and $I_{T}^{(\neg 0)}$ is defined in (A7).
We remark that the pre-multiplication of $G_{T}$ helps with the exposition
since $\phi_{T}^{*}$ can be diverging in dimension. norm implies that it is
asymptotically justifiable to apply the same statistical inference for the
estimate obtained from maximizing the problem with a priori knowledge on the
sparsity pattern, to the SCAD-penalized solution $\hat{\phi}_{T}$. Here, we
note that this convergence in distribution is a pointwise result, and is not
guaranteed to hold uniformly with respect to the parameter vector (Leeb and
Pötscher, 2005). Uniform inference for model selection in multivariate time
series is however still a nascent area of research (Masini et al., 2020) and
is beyond the scope of this paper.
## Monte Carlo Simulation
This section studies the finite sample properties of the proposed EM algorithm
in estimating large MS-VARs using both Lasso and SCAD penalization
schemes666For SCAD, we initialize the algorithm with Lasso estimates as
described earlier.. The number of endogenous variables considered are $d=10$
and $16$. We consider three experiments777The numerical experiments here are
similar to those considered in Callot and Kock (2015). with 2 states ($M=2$)
throughout:
* •
Experiment 1: The data generating process (DGP) is a MS-VAR(1) with the
following coefficient matrices. In state 1, $A_{1}(1)=diag(0.8,\ldots,0.8)$,
and $A_{1}(2)=-A_{1}(1)$ for state 2. Effectively, within each state, we have
a stationary AR(1) process, as the lagged terms of other variables do not
appear in the DGP for a given variable.
* •
Experiment 2: $A_{1}(1)$ is a block diagonal matrix with upper-left and lower-
right non-zero blocks. Each block has dimension $d/2\times d/2$, and is a
tridiagonal matrix with $0.5$ on the diagonal, while the sub- and
superdiagonal are set at $-0.45$. All other elements in $A_{1}(1)$ are 0,
while $A_{1}(2)=-A_{1}(1)$. The variance-covariance matrices are also non-
sparse: $\Sigma(1)_{ij}=0.7^{|i-j|}$ and $\Sigma(2)_{ij}=0.4^{|i-j|}$.
* •
Experiment 3: The DGP is a MS-VAR(2). $A_{1}(1)$ and $A_{1}(2)$ are the same
from the second experiment, while $A_{2}(1)_{ij}=(A_{1}(1)_{ij})^{2}$ and
$A_{2}(2)=-A_{2}(1)$. We set $\Sigma(1)=diag(0.8,\ldots,0.8)$ and
$\Sigma(2)=diag(0.4,\ldots,0.4)$. Such a process might be of interest in
macroeconomics where the influence of variables in the past is usually weaker
than that of recent lags.
In all experiments, we exclude an intercept and set the transition
probabilities to be $p_{1\rightarrow 1}=p_{2\rightarrow 2}=0.8$.
500 iterations are generated for sample sizes $T=100,200,$ and $300$. To
evaluate our procedures, we consider the following metrics. The first three
metrics are concerned with selection consistency. True model included looks at
the share of iterations in which the estimate includes the true model for both
states (i.e. truly non-zero coefficients are estimated as non-zero). Selected
variables is the number of non-zero parameters estimated by the system. As it
may be the case that the estimation sets a truly non-zero coefficient to zero,
it is informative to study the share of truly non-zero parameters that are
identified correctly as non-zero by the algorithm. Subsequently, we consider
estimation consistency as measured by the root mean squared error (RMSE) of
the parameters. This is given by
$\sqrt{\frac{1}{200}\sum_{i=1}^{200}\|\hat{\phi}_{T}(i)-\phi_{T}^{*}\|}$ where
$\hat{\phi}_{T}(i)$ is the estimated parameter vector for iteration $i$
containing all parameters in the system. $RMSE_{VAR},RMSE_{COV},$ and
$RMSE_{p}$ are similarly defined RMSE measures for estimated VAR coefficients,
variance-covariance parameters, and transition probabilities respectively.
Table 1: Results of 500 simulations for experiments 1, 2 and 3 as described in
the text.
| Lasso | | SCAD
---|---|---|---
d | T = 100 | T = 200 | T = 300 | | T = 100 | T = 200 | T = 300
Experiment 1 | | | | | | |
True model included | | | | | | |
10 | 0.956 | 1.000 | 1.000 | | 0.954 | 1.000 | 1.000
16 | 0.886 | 1.000 | 1.000 | | 0.878 | 1.000 | 1.000
Selected parameters | | | | | | |
10 | 70.50 | 65.72 | 56.87 | | 71.70 | 59.17 | 55.29
16 | 167.62 | 123.53 | 101.54 | | 146.25 | 107.03 | 90.55
Share of non-zero | | | | | | |
10 | 0.998 | 1.000 | 1.000 | | 0.997 | 1.000 | 1.000
16 | 0.996 | 1.000 | 1.000 | | 0.996 | 1.000 | 1.000
RMSE | | | | | | |
10 | 1.452 | 1.390 | 0.938 | | 1.608 | 1.231 | 0.947
16 | 2.945 | 2.055 | 1.697 | | 2.809 | 1.889 | 1.267
$RMSE_{VAR}$ | | | | | | |
10 | 1.227 | 0.813 | 0.683 | | 0.949 | 0.488 | 0.313
16 | 1.728 | 1.069 | 0.914 | | 1.346 | 0.648 | 0.482
$RMSE_{COV}$ | | | | | | |
10 | 0.776 | 1.128 | 0.643 | | 1.298 | 1.130 | 0.894
16 | 2.384 | 1.755 | 1.430 | | 2.465 | 1.774 | 1.172
$RMSE_{p}$ | | | | | | |
10 | 0.128 | 0.086 | 0.070 | | 0.128 | 0.086 | 0.070
16 | 0.120 | 0.081 | 0.069 | | 0.120 | 0.081 | 0.069
Experiment 2 | | | | | | |
True model included | | | | | | |
10 | 0.268 | 0.854 | 0.998 | | 0.264 | 0.972 | 1.000
16 | 0.066 | 0.810 | 0.990 | | 0.060 | 0.924 | 1.000
Selected parameters | | | | | | |
10 | 98.89 | 89.55 | 90.87 | | 95.58 | 91.53 | 102.63
16 | 188.84 | 157.81 | 138.47 | | 181.29 | 167.15 | 165.00
Share of non-zero | | | | | | |
10 | 0.947 | 0.998 | 1.000 | | 0.945 | 0.999 | 1.000
16 | 0.930 | 0.996 | 1.000 | | 0.928 | 0.999 | 1.000
RMSE | | | | | | |
10 | 2.527 | 2.323 | 1.367 | | 2.526 | 1.593 | 1.201
16 | 3.739 | 2.496 | 2.078 | | 3.757 | 2.101 | 1.647
$RMSE_{VAR}$ | | | | | | |
10 | 1.517 | 0.942 | 0.666 | | 1.533 | 0.808 | 0.465
16 | 2.110 | 1.350 | 1.057 | | 2.116 | 1.148 | 0.733
$RMSE_{COV}$ | | | | | | |
10 | 2.021 | 2.124 | 1.194 | | 2.007 | 1.374 | 1.107
16 | 3.087 | 2.100 | 1.789 | | 3.104 | 1.760 | 1.475
$RMSE_{p}$ | | | | | | |
10 | 0.128 | 0.084 | 0.067 | | 0.128 | 0.084 | 0.067
16 | 0.126 | 0.081 | 0.068 | | 0.126 | 0.081 | 0.068
Experiment 3 | | | | | | |
True model included | | | | | | |
10 | 0.008 | 0.302 | 0.624 | | 0.002 | 0.300 | 0.666
16 | 0.000 | 0.068 | 0.458 | | 0.000 | 0.056 | 0.470
Selected parameters | | | | | | |
10 | 273.39 | 256.94 | 238.20 | | 264.71 | 252.06 | 233.77
16 | 604.87 | 587.33 | 546.63 | | 565.69 | 569.72 | 534.27
Share of non-zero | | | | | | |
10 | 0.937 | 0.984 | 0.994 | | 0.918 | 0.984 | 0.995
16 | 0.906 | 0.978 | 0.994 | | 0.848 | 0.975 | 0.994
RMSE | | | | | | |
10 | 2.193 | 1.280 | 0.993 | | 2.908 | 1.362 | 0.946
16 | 3.542 | 1.994 | 1.461 | | 5.501 | 2.274 | 1.459
$RMSE_{VAR}$ | | | | | | |
10 | 1.901 | 1.149 | 0.908 | | 2.646 | 1.220 | 0.845
16 | 2.982 | 1.740 | 1.315 | | 5.037 | 2.012 | 1.289
$RMSE_{COV}$ | | | | | | |
10 | 1.092 | 0.563 | 0.400 | | 1.207 | 0.604 | 0.426
16 | 1.912 | 0.973 | 0.636 | | 2.210 | 1.060 | 0.683
$RMSE_{p}$ | | | | | | |
10 | 0.125 | 0.082 | 0.067 | | 0.125 | 0.082 | 0.067
16 | 0.124 | 0.082 | 0.068 | | 0.124 | 0.082 | 0.068
* •
Notes: True model included is the average share of estimates that includes all
truly non-zero coefficients. Selected parameters is the number of non-zero
estimates. Share of non-zero is the average share of truly non-zero
coefficients that was estimated by the algorithm as non-zero.
$RMSE=\sqrt{\frac{1}{200}\sum_{i=1}^{200}\|\hat{\phi}_{T}(i)-\phi_{T}^{*}\|}$
where $\hat{\phi}_{T}(i)$ is the estimated parameter vector for iteration $i$
containing all parameters in the system. $RMSE_{VAR},RMSE_{COV},$ and
$RMSE_{p}$ are similarly defined RMSE measures for estimated VAR coefficients,
variance-covariance parameters, and transition probabilities respectively.
The results of the experiments are presented in Table 1. Looking at the
metrics for estimation consistency, we see that all $RMSE$ measures are
declining as the sample size increases for both Lasso and SCAD. It is
interesting to note that SCAD appears to perform better for larger sample
sizes in terms of estimation accuracy as measured by $RMSE$. Furthermore, we
see that, in most cases, both estimators get better at including the true
model while the number of selected parameters fall, which provides evidence of
model selection consistency. We also note that SCAD has a slight advantage
over the Lasso in selection accuracy for larger sample sizes as seen in
experiments 2 and 3.
## Short-horizon stock return predictability
It is well established that short-horizon stock return predictability (both
in- and out-of-sample) exhibits significant time-variation (e.g. Chen and
Hong, 2012; Rapach and Zhou, 2013). Specifically, Henkel et al. (2011)
(henceforth HMN) and Dangl and Halling (2012) show that return predictability
is correlated with business cycles in a distinctively counter-cyclical
fashion. In particular, HMN estimate a MS-VAR(1) with 2 states, one state
corresponding to an ’expansion’ regime and the other to a ’recession’, for the
period of 1953 to 2008 with excess returns, dividend yield, short rate, term
spread, and default spread as endogenous variables for the US. With the
estimated system, they calculate the adjusted $R^{2}$ ($\overline{R}^{2}$)
from a predictive regression of lagged predictors on one-month ahead excess
returns (the first equation from the VAR888Excess returns are ordered first in
the system.) for both model-implied periods of recession and expansion. The
authors find that $\overline{R}^{2}$ is close to 0 during expansions while it
averages around 0.175 for recessions. This led them to argue that return
predictability is negligible during expansions and is present exclusively
during recessions.
A major drawback of this strategy is that the predictors were selected in a
relatively ad-hoc manner, which may yield significant omitted variable bias.
The framework precludes the possibility that changes in return predictability
are due to predictors beyond that of the chosen variables. This is a
significant problem because if, as the authors argued, aggregate predictor
variables are jointly determined by the ”micro-level objectives of firms and
central banks” which are in turn driven by business cycles, we should expect
this counter-cyclical relationship between predictor and excess returns to
potentially manifest in any predictor that relate to the ”micromotives” of
economic agents, which the literature on return predictability is not short
of.
We approach this problem by incorporating 14 predictors as considered by Goyal
and Welch (2008) in their study on return predictability: dividend price ratio
(d/p), dividend yield (d/y), earnings price ratio (e/p), dividend payout ratio
(d/e), stock variance (svar), book-to-market ratio (b/m), net equity expansion
(ntis), treasury bill rate (tbl), long term rate of returns (ltr), long term
yield (lty), term spread (tms), default yield spread (dfy), default return
spread (dfr), and inflation (infl). Note that d/p, tbl, tms, and dfy overlap
with the predictors in HMN. This results in a 2 state MS-VAR(1) system with 15
endogenous variables including excess returns (r) ordered first, with 711
estimable parameters including an intercept999To maintain the assumption of
stationarity, we detrend all time series by subtracting a moving average of
the past 12 months following Ang and Bekaert (2007). Furthermore, as is
customary in the literature on Lasso, we rescale all variables to have zero
mean and a standard deviation of 1.. Additionally, we update the investigation
period to cover April 1953 to December 2018 (sample size of 787).
Given the large number of parameters involved, the system is estimated with
the SCAD penalty initialized with Lasso estimates. As a diagnostic check on
the EM algorithm, we first verify that the estimated system yields regimes
consistent with the interpretation of expansions and recessions. Figure 1
compares the smoothed probabilities for state 1 with that of an NBER-based
recession indicator from the St. Louis FRED database (USREC). We see that when
the probability of state 1 is close to unity, the NBER-based index often
indicates a recession (value of 1), which provides evidence that state 1
corresponds to that of a recession. More formally, if we classify recessions
as having a state 1 probability of greater than 0.5 and subsequently compare
the resultant series with the NBER-based indicator, we get an agreement rate
of 70%, which is comparable to the 77% obtained in HMN.
Figure 1: Probability estimates of recession compared with an NBER-based
recession indicator.
* •
Notes: (left axis, navy ’+’ labels) Smoothed probabilites from the MS-VAR for
state 1 labelled by navy ’+’; (right axis, turquoise line) Monthly NBER-based
recession indicator from St. Louis FRED (USREC). A value of 1 indicates a
recession, and 0 for expansion.
Several other features of our system are similar. The estimated transition
probability matrix yields $p_{1\rightarrow 1}=0.79$ (recession to recession)
and $p_{2\rightarrow 2}=0.88$ (expansion to expansion), which are close to the
respective estimates of $0.80$ and $0.91$ in HMN. We also replicate the
finding of increased volatility for all predictors during recession relative
to periods of expansion as reported in table 2.
Table 2: Differences in the volatility of predictors between periods of
recessions and expansions.
Difference in volatility:
---
(estimated variance in state 1 - estimated variance in state 2)
r | 0.844 | ltr | 0.952
d/p | 0.191 | tms | 0.410
d/y | 0.003 | dfy | 0.230
e/p | 0.125 | dfr | 1.101
svar | 1.687 | infl | 0.267
b/m | 0.286 | d/e | 0.088
ntis | 0.169 | lty | 0.388
tbl | 0.315 | |
* •
Notes: As discussed in the main text, state 1 corresponds to recession while
state 2 corresponds to expansions. r: excess return; d/p: dividend price
ratio; d/y: dividend yield; e/p: earnings price ratio; svar: stock variance;
b/m: book-to-market ratio; ntis: net equity expansion; tbl: treasury bill
rate; ltr: long term rate of return; tms: term spread; dfy: default yield
spread; dfr: default return spread; infl: inflation; d/e: dividend payout
ratio; lty: long term yield. See Goyal and Welch (2008) for a detailed
description of the variables.
Panel A of Table 3 reports the $\overline{R}^{2}$ derived from using the first
equation of the MS-VAR (since $r$ is ordered first) in predicting one-month
ahead excess returns conditional on state. These results present strong
evidence in favor of the counter-cyclicality of return predictability given
the larger magnitude of $\overline{R}^{2}$ during recessions (0.126) compared
to expansion (0.112), which is in line with HMN. However, our estimate of
$\overline{R}^{2}$ during expansions is at least 4 times larger than theirs,
which is consistent with the findings of Dangl and Halling (2012) that return
predictability might still be present during booms, but are indeed stronger
during busts.
Table 3: Estimated $\overline{R}^{2}$, coefficients from predictive
regressions of one-month ahead excess returns on lagged predictor variables
for periods of expansion and recession, and out-of-sample forecasting results.
Panel A: | Adjusted R2 from predictive regressions
---|---
| Expansion | | Recession | |
| 0.112 | | 0.126 | |
Panel B: | Coefficients of selected variables
| Expansion | | Recession | |
d/p | 0.247 | | 0.399 | |
svar | -0.040 | | -0.258 | |
tbl | -0.344 | | | |
e/p | | | 0.019 | |
ltr | | | 0.142 | |
tms | | | 0.201 | |
dfr | | | 0.062 | |
infl | | | -0.019 | |
lty | | | -0.245 | |
Panel C: | OOS Forecast Accuracy | | Forecast comparison tests
01.2010 - 12.2018 | MSFE | | | DM test | RC test
MS-VAR (SCAD) | 0.527 | | MS-VAR | |
MS-VAR (HMN) | 0.560 | | vs MS-VAR (HMN) | 0.143 | 0.206
Hist. Avg. | 0.640 | | vs Hist. Avg. | 0.044 | 0.074
ARMA(1,1) | 0.665 | | vs ARMA | 0.033 | 0.057
Panel D: | OOS Forecast Accuracy | | Forecast comparison tests
01.2007 - 12.2018 | MSFE | | | DM test | RC test
MS-VAR (SCAD) | 0.913 | | MS-VAR | |
MS-VAR (HMN) | 0.964 | | vs MS-VAR (HMN) | 0.299 | 0.253
Hist. Avg. | 0.928 | | vs Hist. Avg. | 0.468 | 0.480
ARMA(1,1) | 0.920 | | vs ARMA | 0.482 | 0.465
* •
Notes: Panel A: adjusted $R^{2}$ from the estimated predictive regression
(first equation in MS-VAR) of one-month ahead excess returns on relevant
lagged predictors as identified by the algorithm. Dates of expansion and
recession are determined by estimated smooth probabilities of states.Panel B:
Estimated coefficients from the first equation in the MS-VAR across the 2
states. Predictors that are not included here are regarded as not relevant and
dropped by the algorithm. d/p: dividend price ratio; e/p: earnings price
ratio; svar: stock variance; tbl: treasury bill rate; ltr: long term rate of
return; dfy: default yield spread; dfr: default return spread; infl:
inflation; lty: long term yield. See Goyal and Welch (2008) for a detailed
description of the variables. Panel C and D: MSFE results for OOS period of
Jan 2010 to Dec 2018 and Jan 2007 to Dec 2018 respectively. p-values of
forecast comparison tests for Diebold and Mariano test (DM) (Diebold and
Mariano, 1995) and ’Reality Check’ test (RC) (White, 2000) are included.
”$x<y$” refers to a test of null hypothesis of equal predictive ability
between $x$ and $y$, with the one-sided alternative of superior predictive
ability of $x$ over $y$.
A key merit of our regularized MS-VAR in this context is the ability to
identify predictors that contribute the most to this counter-cyclical behavior
of return predictability. Looking at Panel B of Table 3, we see that 2
predictors are relevant to both states: d/p, and svar. More importantly, we
see that tbl drops out during times of crisis, which is reasonable given that
the policy rate has recently been set constantly close to zero during
protracted periods of economic slowdown. The inclusion of 6 new relevant
predictors during recessions (e/p, ltr, tms, dfr, infl and lty) indicate that
they contribute to return predictability during bad times only, which is a
finding that is challenging to replicate in small MS-VARs with few endogenous
variables. Interestingly, of all the selected variables, only d/p, tbl and tms
were included in the MS-VAR of HMN, which suggests a potential omitted
variable bias problem. Capturing these dynamics matter because they may help
to consolidate the narrative on return predictability. For example, the non-
relevance of e/p during expansions and its relevance during recessions is
consistent with the idea of ”accounting conservatism”, as argued by HMN, which
meant that balance sheets may be quicker in reporting bad news while reacting
slower during good times. Slower disclosure and propagation of reported
earnings information during expansions may hinder the predictive power of
earnings ratios during such a period, while a faster response with bad news
during crisis may lead to more accurate reporting of earnings, and contribute
to predictive power.
Next, we study the out-of-sample (OOS) forecasting properties of the proposed
large MS-VAR with an OOS period of January 2010 to December 2018. The model is
estimated with an expanding window and one-step ahead forecasts are
constructed as the weighted average of predictions from both states. To
compare our results, we consider also the original 5 variable MS-VAR estimated
in HMN. In addition, we form forecasts of $r$ using an expanding window
historical average and include predictions from an ARMA(1,1) model.
Specifically, the historical average is often hailed as notoriously difficult
to beat (Goyal and Welch, 2008). To formally compare the results, we employ
two forecast comparison tests: Diebold and Mariano test Diebold and Mariano
(1995) and the ’Reality check’ test (White, 2000).
Panel C of Table 3 reports the results. Notably, the proposed MS-VAR achieves
the lowest mean squared forecast errors (MSFE) followed by the MS-VAR of HMN.
Although the difference between the proposed MS-VAR and that of HMN is not
statistically significant, we note that the large MS-VAR performs
significantly better than both the historical average and ARMA(1,1), as
indicated by both tests.
Additionally, we consider an out-of-sample period encompassing the 2008
financial crisis in Panel D. Here, we expect regime-switching methods to
perform better given that the possibility of having a recession state is
explicitly accounted for. Indeed, we see that, relative to the historical
average benchmark, this is the case for the SCAD-penalized MS-VAR but not for
the original MS-VAR in HMN. One conjecture for the difference is that, as
suggested in Panel B, many of the predictors that are relevant for
predictability during recessions are included in the large MS-VAR but not the
HMN model. This provides some evidence that prediction performance can be
improved by considering more predictors. This is particularly the case because
the large MS-VAR continues to perform the best in terms of achieving the
lowest MSFE although this difference in predictive accuracy does not appear to
be statistically significant.
## Concluding remarks
In this paper, we have proposed two new shrinkage type estimators to handle
parameter proliferation in sparse high-dimensional MS-VARs. Theoretically, we
have shown that both the Lasso and SCAD estimators are estimation consistent,
while the latter has the added benefit of selecting relevant variables with
high probability. Consequently, the SCAD estimator exhibits the oracle
property in that it is asymptotically equivalent to an estimator that assumes
a priori knowledge of the sparsity pattern in the system. Results from
numerical experiments show that the proposed EM algorithm is able to handle
large MS-VARs well and the finite sample performance of the estimators
provides support for our theoretical results. The empirical investigation on
the counter-cyclicality of return predictability highlights the flexibility of
the proposed estimation in incorporating many endogenous predictors and the
merit of allowing for variable selection in regime-switching applications.
Furthermore, the significantly better OOS performance of our model suggests
that sizeable improvements to stock return prediction can be attained with a
larger pool of predictors. Notably, this suggests that our framework can be
generalized to other applications where regime-switching is of interest but
where high-dimensionality may be a limiting factor, such as those frequently
encountered in monetary policy, asset allocation, and other macroeconomic or
financial systems.
## References
* Ailliot and Monbet (2017) Ailliot, P., Monbet, V., 2017\. Sparse vector markov switching autoregressive models. application to multivariate time series of temperature. Computational Statistics & Data Analysis 108, 40–51.
* Ang and Bekaert (2002) Ang, A., Bekaert, G., 2002. International asset allocation with regime shifts. The review of financial studies 15, 1137–1187.
* Ang and Bekaert (2007) Ang, A., Bekaert, G., 2007. Stock return predictability: Is it there? The Review of Financial Studies 20, 651–707.
* Ang and Timmermann (2012) Ang, A., Timmermann, A., 2012\. Regime changes and financial markets. Annu. Rev. Financ. Econ. 4, 313–337.
* Bai and Ng (2008) Bai, J., Ng, S., 2008. Large dimensional factor analysis. Now Publishers Inc.
* Bańbura et al. (2010) Bańbura, M., Giannone, D., Reichlin, L., 2010. Large bayesian vector auto regressions. Journal of applied Econometrics 25, 71–92.
* Baum et al. (1970) Baum, L.E., Petrie, T., Soules, G., Weiss, N., 1970\. A maximization technique occurring in the statistical analysis of probabilistic functions of markov chains. The annals of mathematical statistics 41, 164–171.
* Bernanke et al. (2005) Bernanke, B.S., Boivin, J., Eliasz, P., 2005. Measuring the effects of monetary policy: a factor-augmented vector autoregressive (favar) approach. The Quarterly journal of economics 120, 387–422.
* Bianchi et al. (2019) Bianchi, D., Billio, M., Casarin, R., Guidolin, M., 2019\. Modeling systemic risk with markov switching graphical sur models. Journal of econometrics 210, 58–74.
* Bickel et al. (1998) Bickel, P.J., Ritov, Y., Ryden, T., 1998. Asymptotic normality of the maximum-likelihood estimator for general hidden markov models. The Annals of Statistics 26, 1614–1635.
* Bickel et al. (2009) Bickel, P.J., Ritov, Y., Tsybakov, A.B., 2009. Simultaneous analysis of lasso and dantzig selector. The Annals of statistics 37, 1705–1732.
* Callot and Kock (2015) Callot, L., Kock, A.B., 2015\. Oracle inequalities for high dimensional vector autoregressions. Journal of Econometrics 186, 325–344.
* Cerra and Saxena (2005) Cerra, V., Saxena, S.C., 2005\. Did output recover from the asian crisis? IMF Staff Papers 52, 1–23.
* Chan et al. (2020) Chan, J.C., Eisenstat, E., Strachan, R.W., 2020. Reducing the state space dimension in a large TVP-VAR. Journal of Econometrics .
* Chen and Hong (2012) Chen, B., Hong, Y., 2012. Testing for smooth structural changes in time series models via nonparametric regression. Econometrica 80, 1157–1183.
* Chen and Maung (2020) Chen, B., Maung, K., 2020. Time-varying forecast combination for high-dimensional data. arXiv preprint arXiv:2010.10435 .
* Dangl and Halling (2012) Dangl, T., Halling, M., 2012\. Predictive regressions with time-varying coefficients. Journal of Financial Economics 106, 157–181.
* Dempster et al. (1977) Dempster, A.P., Laird, N.M., Rubin, D.B., 1977. Maximum likelihood from incomplete data via the em algorithm. Journal of the Royal Statistical Society: Series B (Methodological) 39, 1–22.
* Diebold and Mariano (1995) Diebold, F.X., Mariano, R.S., 1995\. Comparing predictive accu racy. Journal of Business and Economic Statistics 13, 253–263.
* Elliott and Timmermann (2005) Elliott, G., Timmermann, A., 2005\. Optimal forecast combination under regime switching. International Economic Review 46, 1081–1102.
* Fan and Li (2001) Fan, J., Li, R., 2001. Variable selection via nonconcave penalized likelihood and its oracle properties. Journal of the American statistical Association 96, 1348–1360.
* Fan and Peng (2004) Fan, J., Peng, H., 2004. Nonconcave penalized likelihood with a diverging number of parameters. The Annals of Statistics 32, 928–961.
* Fan et al. (2014) Fan, J., Xue, L., Zou, H., 2014. Strong oracle optimality of folded concave penalized estimation. Annals of statistics 42, 819\.
* Francq and Roussignol (1998) Francq, C., Roussignol, M., 1998\. Ergodicity of autoregressive processes with markov-switching and consistency of the maximum-likelihood estimator. Statistics: A Journal of Theoretical and Applied Statistics 32, 151–173.
* Friedman et al. (2007) Friedman, J., Hastie, T., Höfling, H., Tibshirani, R., 2007\. Pathwise coordinate optimization. The annals of applied statistics 1, 302–332.
* Friedman et al. (2008) Friedman, J., Hastie, T., Tibshirani, R., 2008. Sparse inverse covariance estimation with the graphical lasso. Biostatistics 9, 432–441.
* Goyal and Welch (2008) Goyal, A., Welch, I., 2008. A comprehensive look at the empirical performance of equity premium prediction. The Review of Financial Studies 21, 1455–1508.
* Guidolin and Timmermann (2007) Guidolin, M., Timmermann, A., 2007\. Asset allocation under multivariate regime switching. Journal of Economic Dynamics and Control 31, 3503–3544.
* Guidolin and Timmermann (2008) Guidolin, M., Timmermann, A., 2008\. International asset allocation under regime switching, skew, and kurtosis preferences. The Review of Financial Studies 21, 889–935.
* Hamilton (1989) Hamilton, J.D., 1989. A new approach to the economic analysis of nonstationary time series and the business cycle. Econometrica: Journal of the Econometric Society , 357–384.
* Hamilton (1990) Hamilton, J.D., 1990. Analysis of time series subject to changes in regime. Journal of econometrics 45, 39–70.
* Hamilton (2016) Hamilton, J.D., 2016. Macroeconomic regimes and regime shifts, in: Handbook of macroeconomics. Elsevier. volume 2, pp. 163–201.
* Han et al. (2015) Han, F., Lu, H., Liu, H., 2015\. A direct estimation of high dimensional stationary vector autoregressions. The Journal of Machine Learning Research 16, 3115–3150.
* Henkel et al. (2011) Henkel, S.J., Martin, J.S., Nardari, F., 2011. Time-varying short-horizon predictability. Journal of financial economics 99, 560–580.
* Ichiue and Koyama (2011) Ichiue, H., Koyama, K., 2011\. Regime switches in exchange rate volatility and uncovered interest parity. Journal of International Money and Finance 30, 1436–1450.
* Janková and van de Geer (2018) Janková, J., van de Geer, S., 2018\. De-biased sparse pca: Inference and testing for eigenstructure of large covariance matrices. arXiv preprint arXiv:1801.10567 .
* Kim et al. (2008) Kim, Y., Choi, H., Oh, H.S., 2008. Smoothly clipped absolute deviation on high dimensions. Journal of the American Statistical Association 103, 1665–1673.
* Koop and Korobilis (2013) Koop, G., Korobilis, D., 2013\. Large time-varying parameter vars. Journal of Econometrics 177, 185–198.
* Kwon and Kim (2012) Kwon, S., Kim, Y., 2012. Large sample properties of the scad-penalized maximum likelihood estimation on high dimensions. Statistica Sinica , 629–653.
* Leeb and Pötscher (2005) Leeb, H., Pötscher, B.M., 2005\. Model selection and inference: Facts and fiction. Econometric Theory , 21–59.
* Leroux (1992) Leroux, B.G., 1992. Maximum-likelihood estimation for hidden markov models. Stochastic processes and their applications 40, 127–143.
* Li et al. (2015) Li, D., Ke, Y., Zhang, W., 2015. Model selection and structure specification in ultra-high dimensional generalised semi-varying coefficient models. The Annals of Statistics 43, 2676–2705.
* Liu and Chen (2016) Liu, X., Chen, R., 2016. Regime-switching factor models for high-dimensional time series. Statistica Sinica , 1427–1451.
* Masini et al. (2020) Masini, R.P., Medeiros, M.C., Mendes, E.F., 2020. Machine learning advances for time series forecasting. arXiv preprint arXiv:2012.12802 .
* Maung (2021) Maung, K., 2021. Online appendix for ’estimating high-dimensional markov-switching vars’. Online appendix.
* Rapach and Zhou (2013) Rapach, D., Zhou, G., 2013. Forecasting stock returns, in: Handbook of economic forecasting. Elsevier. volume 2, pp. 328–383.
* Sims and Zha (2006) Sims, C.A., Zha, T., 2006. Were there regime switches in us monetary policy? American Economic Review 96, 54–81.
* Stock and Watson (2002) Stock, J.H., Watson, M.W., 2002\. Forecasting using principal components from a large number of predictors. Journal of the American statistical association 97, 1167–1179.
* Wang et al. (2009) Wang, H., Li, B., Leng, C., 2009. Shrinkage tuning parameter selection with a diverging number of parameters. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 71, 671–683.
* White (2000) White, H., 2000. A reality check for data snooping. Econometrica 68, 1097–1126.
* Zhao and Yu (2006) Zhao, P., Yu, B., 2006. On model selection consistency of lasso. Journal of Machine learning research 7, 2541–2563.
* Zhu (2020) Zhu, X., 2020. Nonconcave penalized estimation in sparse vector autoregression model. Electronic Journal of Statistics 14, 1413–1448.
* Zou and Li (2008) Zou, H., Li, R., 2008. One-step sparse estimates in nonconcave penalized likelihood models. Annals of statistics 36, 1509\.
## Appendix A Proofs for section 4
Before proving consistency, we require some intermediate results. We assume
the following results hold under the conditions of consistency. The proofs for
these technical results can be found in an online appendix (Maung, 2021).
###### Lemma 1.
momentresult The log-likelihood function evaluated at the true parameter,
$\log\mathcal{L}_{T}(\phi_{T}^{*})$, satisfies
$\displaystyle E[\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})]=\boldsymbol{0}$
(13) $\displaystyle
E[(\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*}))(\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*}))^{\top}]=-E[\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*}))].$
(14)
Lemma 1 states that the Fisher score vector has zero mean when evaluated at
the true parameter, and that the information matrix equality holds.
###### Lemma 2.
boundedmoments Let $\|\cdot\|_{2}$ represent the $L_{2}$ norm. We have
$\|\nabla^{1}_{j}\mathcal{L}_{T}(\phi_{T}^{*})\|_{2}\leq C_{1}$,
$\|\nabla^{2}_{j,k}\mathcal{L}_{T}(\phi_{T}^{*})\|_{2}\\\ \leq C_{2}$, and
$\|\nabla^{3}_{j,k,l}\mathcal{L}_{T}(\phi_{T})\|_{2}\leq C_{3}$ for
$\phi_{T}\in\tilde{\Theta}_{T}$, where $C_{i}<\infty$ ($i=1,2,3$).
###### Corollary 1.
Oprate Define
$\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})=\partial\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})/\partial\phi_{T}^{(\neg
0)}$, where $\phi_{T}^{(\neg 0)}$ refers to the parameters that are non-zero,
and recall that $\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})$ is the $j^{th}$
element in $\nabla^{1}\log\mathcal{L}_{T}(\phi_{T})$. Note that
$\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})$ is a
$K_{T}^{*}\times 1$ vector. In addition, define
$\partial^{2}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})=\partial^{2}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})/\partial\phi_{T}^{{(\neg
0)}2}$ which is a $K_{T}^{*}\times K_{T}^{*}$ matrix. Then, we have the
following probability bounds
1. (1)
$\|\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})\|=O_{p}(\sqrt{TK_{T}^{*}}),$
2. (2)
$\|\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})-E[\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})]\|_{\textbf{1}}=O_{p}(\sqrt{T}K_{T}^{*}),$
3. (3)
$\|\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T}^{*})-E[\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T}^{*})]\|=O_{p}(\sqrt{TK_{T}^{*}})$,
4. (4)
$\|\nabla^{3}\log\mathcal{L}_{T}(\phi_{T}^{*})\|_{\textbf{1}}=O_{p}(\sqrt{T}K_{T}^{*3/2}),$
5. (5)
$\|\partial^{2}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})\|_{\textbf{1}}=O_{p}(\sqrt{T}K_{T}^{*})$
for $\phi_{T}\in\tilde{\Theta}_{T}$,
where $\|A\|_{\textbf{1}}$ refers to the sum of all absolute values of
elements.
### Proof of fsconst
First, following Bickel et al. (2009), we bind the Lasso error with a cone
constraint. For notation, equate the expression in (3) with
$\mathcal{L}_{T}(\phi_{T})^{FS}$. Then, by construction
$\mathcal{L}_{T}(\tilde{\phi}_{T})^{FS}\geq\mathcal{L}_{T}(\phi_{T}^{*})^{FS}$.
Hence,
$\displaystyle
T^{-1}[\log\mathcal{L}_{T}(\tilde{\phi}_{T})-\log\mathcal{L}_{T}(\phi_{T}^{*})]$
$\displaystyle\geq\sum_{s=1}^{M}\lambda^{Lasso}\bigg{\\{}\sum_{m=1}^{d_{T}}\sum_{n=1}^{d_{T}p_{T}}(|\tilde{a}_{mn}(s)|-|a^{*}_{mn}(s)|)+\sum_{m=1}^{d_{T}^{*}}\sum_{n=1}^{d_{T}^{*}q_{T}}(|\tilde{b}_{mn}(s)|-|b^{*}_{mn}(s)|)\bigg{\\}}$
(15) $\displaystyle+\sum_{s=1}^{M}\lambda^{gLasso}\bigg{\\{}\sum_{m\neq
n}(|\tilde{q}_{mn}(s)|-|q^{*}_{mn}(s)|)\bigg{\\}}$ (16)
Let $S(h_{T}^{A})$ and $S(h_{T}^{B})$ be the set of indices where the VAR
coefficients are non-zero across all states (see proof of consistency below).
So, we can rewrite (15) as
$\displaystyle\lambda^{Lasso}\bigg{\\{}\bigg{[}\sum_{i\in
S(h_{T}^{A})}(|\tilde{a}_{i}|-|a^{*}_{i}|)+\sum_{i\notin
S(h_{T}^{A})}|\tilde{a}_{i}|\bigg{]}+\bigg{[}\sum_{i\in
S(h_{T}^{B})}(|\tilde{b}_{i}|-|b^{*}_{i}|)+\sum_{i\notin
S(h_{T}^{B})}|\tilde{b}_{i}|\bigg{]}\bigg{\\}}$
$\displaystyle\geq\lambda^{Lasso}\bigg{\\{}\bigg{[}-\sum_{i\in
S(h_{T}^{A})}|\Delta a_{i}|+\sum_{i\notin
S(h_{T}^{A})}|\tilde{a}_{i}|\bigg{]}+\bigg{[}-\sum_{i\in S(h_{T}^{B})}|\Delta
b_{i}|+\sum_{i\notin S(h_{T}^{B})}|\tilde{b}_{i}|\bigg{]}\bigg{\\}}$ (17)
where we have defined $\Delta x_{i}\equiv\tilde{x}_{i}-x_{i}$. We can do the
same for $S(h_{T}^{Qnd})$ and (16), to get
$\eqref{variance}\geq\lambda^{gLasso}\bigg{\\{}-\sum_{i\in
S(h_{T}^{Qnd})}|\Delta q_{i}|+\sum_{i\notin
S(h_{T}^{Qnd})}|\tilde{q}_{i}|\bigg{\\}}.$ (18)
On the other hand, by the local concavity assumption in (A5), we get
$T^{-1}[\log\mathcal{L}_{T}(\tilde{\phi}_{T})-\log\mathcal{L}_{T}(\phi_{T}^{*})]\leq\boldsymbol{\delta}^{\top}[T^{-1}\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})],$
where $\boldsymbol{\delta}$ is a vector of differences of parameter values at
$\tilde{\phi}_{T}$ and $\phi^{*}_{T}$, which includes $((\Delta a_{i})_{i})$,
$(\Delta b_{i})_{i}$, and $(\Delta q_{i})_{i}$.
Note that from Oprate,
$T^{-1}\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})=O_{p}(\sqrt{K_{T}^{*}/T})=o_{p}(1)$,
where the last equality comes from (A8). Furthermore, observing that
$\lambda^{Lasso}\propto\lambda^{gLasso}$, $\sum_{i\notin
S(h_{T}^{X})}|\tilde{x}_{i}|=\sum_{i\notin S(h_{T}^{X})}|\Delta x_{i}|$, we
conclude that with probability approaching one,
$\sum_{i\notin S(h_{T}^{A})}|\Delta a_{i}|+\sum_{i\notin S(h_{T}^{B})}|\Delta
b_{i}|+\sum_{i\notin S(h_{T}^{Qnd})}|\Delta q_{i}|\leq C\bigg{\\{}\sum_{i\in
S(h_{T}^{A})}|\Delta a_{i}|+\sum_{i\in S(h_{T}^{B})}|\Delta b_{i}|+\sum_{i\in
S(h_{T}^{Qnd})}|\Delta q_{i}|\bigg{\\}},$ (19)
where $C>1$ is some constant.
Bickel et al. (2009) show that this cone constraint on the Lasso error in (19)
is necessary for proving convergence of the Lasso estimator.
Now, we show (11). Define $\gamma_{T}^{FS}=\sqrt{K_{T}^{*}}\lambda^{Lasso}$
and recall the definition of $\Omega(W)$ from (A5). We want to show that there
exists a local maximizer in the set $\tilde{\Theta}_{T,\gamma^{FS},W}$. To
begin, note that we can write
$\sum_{s=1}^{M}\sum_{m=1}^{d_{T}}\sum_{n=1}^{d_{T}p_{T}}|a_{mn}(s)|=\sum_{i}a_{i}$,
where $a_{i}$ are elements of $\theta_{A}$. We can do the same for $b_{mn}(s)$
and $q_{mn}(s)$. For simplicity, let $\\#A$ denote the dimensions of $A$.
Then, pick any $\boldsymbol{u}\in\Omega(W)$ and observe that
$\displaystyle\mathcal{L}_{T}(\phi_{T}^{*}+\gamma_{T}^{FS}\boldsymbol{u})^{FS}-\mathcal{L}_{T}(\phi_{T}^{*})^{FS}$
$\displaystyle=T^{-1}[\log\mathcal{L}_{T}(\phi_{T}^{*}+\gamma_{T}^{FS}\boldsymbol{u})-\log\mathcal{L}_{T}(\phi_{T}^{*})]$
$\displaystyle-\lambda^{Lasso}\bigg{\\{}\sum_{i=1}^{\\#\theta_{A}}(|a_{i}^{*}+\gamma_{T}^{FS}\boldsymbol{u}_{1i}|-|a_{i}^{*}|)+\sum_{i=1}^{\\#\theta_{B}}(|b_{i}^{*}+\gamma_{T}^{FS}\boldsymbol{u}_{2i}|-|b_{i}^{*}|)\bigg{\\}}$
$\displaystyle-\lambda^{gLasso}\bigg{\\{}\sum_{i=1}^{\\#Q^{ND}}(|q_{i}^{*}+\gamma_{T}^{FS}\boldsymbol{u}_{3i}|-|q_{i}^{*}|)\bigg{\\}}$
$\displaystyle\equiv I_{1}+I_{2}+I_{3}.$
For $I_{1}$, by the mean value theorem, for a $\check{\phi}_{T}$ between
$\phi_{T}^{*}+\gamma_{T}^{FS}\boldsymbol{u}$ and $\phi_{T}^{*}$,
$I_{1}=\gamma_{T}^{FS}\boldsymbol{u}^{\top}[T^{-1}\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})]+\frac{1}{2}\gamma_{T}^{FS^{2}}\boldsymbol{u}^{\top}[T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T})]\boldsymbol{u}\equiv
I_{1,1}+I_{1,2}$
Then,
$I_{1,1}\leq\gamma_{T}^{FS}\|\boldsymbol{u}\|O_{p}(\sqrt{K_{T}^{*}/T})=\gamma_{T}^{FS}\|\boldsymbol{u}\|o_{p}(\sqrt{K_{T}^{*}}\lambda^{Lasso})=\|\boldsymbol{u}\|o_{p}(\gamma_{T}^{FS^{2}})$
where we have used Oprate and (A8). Next,
$I_{1,2}=\frac{1}{2}\gamma_{T}^{{FS}^{2}}\boldsymbol{u}^{\top}[T^{-1}\\{\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T})-\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})\\}]\boldsymbol{u}+\frac{1}{2}\gamma_{T}^{{FS}^{2}}\boldsymbol{u}^{\top}\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})\boldsymbol{u}.$
Using the concavity assumption in (A6), we have
$\displaystyle
T^{-1}\gamma_{T}^{{FS}^{2}}\boldsymbol{u}^{\top}[\\{\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T})-\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})\\}]\boldsymbol{u}$
$\displaystyle\leq\gamma_{T}^{{FS}^{2}}\nabla^{1}(\boldsymbol{u}^{\top}[T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\phi^{*}_{T})]\boldsymbol{u})\|\check{\phi}_{T}-\phi_{T}^{*}\|$
$\displaystyle\leq
O_{p}(K_{T}^{*3/2}/\sqrt{T})\|\boldsymbol{u}\|^{3}\gamma_{T}^{{FS}^{3}}$
$\displaystyle=o_{p}(\gamma_{T}^{{FS}^{2}})\|\boldsymbol{u}\|^{2},$
where we have used (4) in boundedmoments for the penultimate inequality. Next,
observe that by the restricted eigenvalue condition in (A7), we get
$\frac{1}{2}\gamma_{T}^{{FS}^{2}}\boldsymbol{u}^{\top}\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})\boldsymbol{u}=-\frac{1}{2}\gamma_{T}^{{FS}^{2}}\boldsymbol{u}^{\top}[-\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})]\boldsymbol{u}\leq-\frac{1}{2}\gamma_{T}^{{FS}^{2}}\rho_{1}\|\boldsymbol{u}\|^{2}<0.$
So we conclude that the leading term in $I_{1,2}$ is negative.
Next, recalling that $\lambda^{gLasso}\propto\lambda^{Lasso}$, we have
$\displaystyle I_{3}$
$\displaystyle\leq\lambda^{gLasso}\sum_{i=1}^{h_{T}^{Qnd}}(|q_{i}^{*}+\gamma_{T}^{FS}\boldsymbol{u}_{3i}|-|q_{i}^{*}|)-\lambda^{gLasso}\sum_{i=h_{T}^{Qnd}+1}^{\\#Q^{ND}}|\gamma_{T}^{FS}\boldsymbol{u}_{3i}|$
$\displaystyle=O_{p}(\gamma_{T}^{{FS}^{2}})\|\boldsymbol{u}_{3}\|-\lambda^{gLasso}\sum_{i=h_{T}^{Qnd}+1}^{\\#Q^{ND}}|\gamma_{T}^{FS}\boldsymbol{u}_{3i}|,$
where the final leading term is negative. Furthermore, the same procedure can
be applied to $I_{2}$ to yield similar results.
Hence the leading terms in $I_{1,2}$, $I_{2}$, and $I_{3}$ imply that for any
$\varepsilon>0$, we can find a large $W>0$, such that
$P\big{(}\sup_{\boldsymbol{u}\in\Omega(W)}\mathcal{L}_{T}(\phi_{T}^{*}+\gamma_{T}^{FS}\boldsymbol{u})^{FS}<\mathcal{L}_{T}(\phi_{T}^{*})^{FS}\big{)}\geq
1-\varepsilon.$
Therefore, we can find a local maximizer in
$\tilde{\Theta}_{T,\gamma^{FS},W}$. Given the assumption of local concavity
over $\tilde{\Theta}_{T}\supseteq\tilde{\Theta}_{T,\gamma^{FS},W}$, and that
$\tilde{\phi}_{T},\phi_{T}^{*}\in\tilde{\Theta}_{T}$, we obtain the result in
(11). ∎
### Proof of consistency
Before approaching the proof proper, we define the following oracle problem,
that is the maximum likelihood estimation of the model assuming a priori
knowledge of the sparsity pattern. Since this is unknowable in practice, this
discussion is theoretical and functions as a device to judge the accuracy of
our variable selection procedure.
Let $\phi_{T}^{o}$ represent the vector where the irrelevant VAR parameters
have been fixed at 0 prior to estimation. We define $S(h)$, for
$h=h_{T}^{A},h_{T}^{B}$ and $h_{T}^{Qnd}$, to be the set of indices whose
corresponding parameter is non-zero, and $a_{i}$ is the $i^{th}$ element of
$\theta_{A}$, likewise for $b_{i}$ ($\theta_{B}$) and $q_{i}$ ($Q^{ND}$). The
(penalized) oracle problem is
$\max_{\phi^{o}_{T}}T^{-1}\log\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi^{o})-\bigg{\\{}\sum_{i\in
S(h_{T}^{A})}p^{{}^{\prime}}_{\lambda}(|\tilde{a}_{i}|)|a_{i}|+\sum_{i\in
S(h_{T}^{B})}p^{{}^{\prime}}_{\lambda}(|\tilde{b}_{i}|)|b_{i}|+\sum_{i\in
S(h_{T}^{Qnd})}p^{{}^{\prime}}_{\lambda}(|\tilde{q}_{i}|)|q_{i}|\bigg{\\}}.$
(20)
Notice that this is essentially the same problem as (2.2.2) but with
irrelevant parameters set to 0 before estimation.
Suppose $\hat{\phi}_{T}^{o}$ is the unique solution to (20). To ensure that
the dimensions of $\hat{\phi}_{T}^{o}$ and $\phi_{T}^{*}$ match, we define
$\bar{\phi}_{T}^{o}=(\hat{\phi}_{1},\ldots,\hat{\phi}_{K_{T}^{Sp}},0,\ldots,0,\hat{q}_{11}(1),\ldots,\hat{q}_{d_{T}d_{T}}(M),\hat{p}_{1\shortrightarrow
1},\ldots,\hat{p}_{M\shortrightarrow M})^{\top},$ (21)
where parameters with hats are from $\hat{\phi}_{T}^{o}$.
Proof of (1)
Define $\gamma_{T}^{SS}=\sqrt{K_{T}^{*}/T}$ and construct the set
$\tilde{\Theta}_{T,\gamma^{SS},W}$ for a sufficiently large constant $W$.
Since $1/\sqrt{T}=o(\lambda^{Lasso})$, observe that
$\tilde{\Theta}_{T,\gamma^{SS},W}\subseteq\tilde{\Theta}_{T,\gamma^{FS},W}$.
Pick $\boldsymbol{u}^{*}\in\Omega(W)$, such that the elements
$\boldsymbol{u}^{*}_{ji}=0$ for $j=1,2,3$ and $i\notin S(h_{T}^{X})$ where $X$
is either $\theta_{A},\theta_{b},$ or $Q^{ND}$. Define
$\mathcal{L}_{T}(\phi_{T})^{SS}$ to represent the expression (2.2.2) in the
SCAD problem. Consider
$\displaystyle\mathcal{L}_{T}(\phi_{T}^{*}+\gamma_{T}^{SS}\boldsymbol{u}^{*})^{SS}$
$\displaystyle-\mathcal{L}_{T}(\phi_{T}^{*})^{SS}=T^{-1}[\log\mathcal{L}_{T}(\phi_{T}^{*}+\gamma_{T}^{SS}\boldsymbol{u}^{*})-\log\mathcal{L}_{T}(\phi_{T}^{*})]$
$\displaystyle+\bigg{[}\sum_{i=1}^{\\#\theta_{A}}p_{\lambda}^{{}^{\prime}}(|\tilde{a}_{i}|)\bigg{(}|a_{i}^{*}|-|a_{i}^{*}+\gamma_{T}^{SS}\boldsymbol{u}^{*}_{1i}|\bigg{)}+\sum_{i=1}^{\\#\theta_{B}}p_{\lambda}^{{}^{\prime}}(|\tilde{b}_{i}|)\bigg{(}|b_{i}^{*}|-|b_{i}^{*}+\gamma_{T}^{SS}\boldsymbol{u}^{*}_{2i}|\bigg{)}\bigg{]}$
$\displaystyle+\sum_{i=1}^{\\#Q^{ND}}p_{\lambda^{*}}^{{}^{\prime}}(|\tilde{q}_{i}|)\bigg{(}|q_{i}^{*}|-|q_{i}^{*}+\gamma_{T}^{SS}\boldsymbol{u}^{*}_{3i}|\bigg{)}$
$\displaystyle\equiv I_{1}^{S}+I_{2}^{S}+I_{3}^{S}.$
Again, notice that since $1/\sqrt{T}=o(\lambda^{Lasso})$, the proof from
fsconst of $I_{1}$ is directly applicable to $I_{1}^{S}$ here and this shows
that the leading terms are both, of an order larger than
$\gamma_{T}^{{SS}^{2}}$, and are negative.
Next, consider $I_{3}^{S}$. By construction of $\boldsymbol{u}^{*}$, we have
$I_{3}^{S}=\sum_{i=1}^{h_{T}^{Qnd}}p_{\lambda^{*}}^{{}^{\prime}}(|\tilde{q}_{i}|)\bigg{(}|q_{i}^{*}|-|q_{i}^{*}+\gamma_{T}^{SS}\boldsymbol{u}^{*}_{3i}|\bigg{)},$
since $q_{i}^{*}=0$ and $\boldsymbol{u}_{3i}^{*}=0$ for $i>h_{T}^{Qnd}$. Next,
note that
$|\tilde{q}_{i}|\geq\min_{1\leq i\leq h_{T}^{Qnd}}|\tilde{q}_{i}|-\max_{1\leq
i\leq h_{T}^{Qnd}}|\tilde{q}_{i}-q_{i}^{*}|\geq\lambda+o_{p}(\lambda),$ (22)
where we have used (A9) for the first term, and fsconst for the second term to
show that it is $O_{p}(\sqrt{K_{T}^{*}}\lambda^{Lasso})=o_{p}(\lambda)$, where
the last equivalence follow from assumption (A8). By the structure of the SCAD
penalty in (4), $p_{\lambda}^{{}^{\prime}}=\theta$ if $0<\theta\leq\lambda$
and $0$ if $\theta>\lambda$. Since $\lambda^{*}\propto\lambda$, we can say
that $I_{3}^{S}=o_{p}(\gamma_{T}^{{SS}^{2}})\|\boldsymbol{u}_{3}^{*}\|$.
Likewise, we have that
$I_{2}^{S}=o_{p}(\gamma_{T}^{{SS}^{2}})(\|\boldsymbol{u}_{1}^{*}\|+\|\boldsymbol{u}_{2}^{*}\|)$.
Taken together, we arrive at the existence of a local maximizer in the ball
$\tilde{\Theta}_{T,\gamma^{SS},W}\subseteq\tilde{\Theta}_{T}$, where the log
likelihood is locally concave on $\tilde{\Theta}_{T}$.
Proof of (2)
Recall that $\bar{\phi}_{T}^{o}$ is defined in (21), which is the solution to
a problem where we know the true sparsity pattern. Hence, we can complete the
proof by showing $P(\hat{\phi}_{T}=\bar{\phi}_{T}^{o})\rightarrow 1$.
For ease of exposition, we emphasize that the sub-vector
$(\hat{\phi}_{1},\ldots,\hat{\phi}_{K_{T}^{Sp}})$ is made up of the following
vectors: $(\hat{a}_{i})_{i}$, $(\hat{b}_{i})_{i}$, and $(\hat{q}_{i})_{i}$ for
$i\in S(h_{T}^{A}),S(h_{T}^{B})$, and $S(h_{T}^{Qnd})$ respectively, where
$\hat{x}_{i}$ for $x=a,b,q$ refers to estimated parameters in $\theta_{A}$,
$\theta_{B}$ and $Q^{ND}$. On the other hand, the subvector of zeros in
$\bar{\phi}_{T}^{o}$ corresponds to $\hat{x}_{i}=0$ for $i\notin
S(h_{T}^{A}),S(h_{T}^{B})$, and $S(h_{T}^{Qnd})$.
To show that $\bar{\phi}_{T}^{o}$ is the solution to (2.2.2) with probability
approaching one, we need to verify that it satisfies the following Karush-
Kuhn-Tucker conditions:
1. (I)
$T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial
a_{i}}\big{|}_{\hat{a}_{i}}-p_{\lambda}^{{}^{\prime}}(|\tilde{a}_{i}|)\frac{\hat{a}_{i}}{|\hat{a}_{i}|}=0$,
$T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial
b_{i}}\big{|}_{\hat{b}_{i}}-p_{\lambda}^{{}^{\prime}}(|\tilde{b}_{i}|)\frac{\hat{b}_{i}}{|\hat{b}_{i}|}=0$,
2. (II)
$T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial
q_{i}}\big{|}_{\hat{q}_{i}}-p_{\lambda^{*}}^{{}^{\prime}}(|\tilde{q}_{i}|)\frac{\hat{q}_{i}}{|\hat{q}_{i}|}=0$,
$T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial
q^{D}_{i}}\big{|}_{\hat{q}_{i}^{D}}=0$,
3. (III)
$T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial\pi_{i}}\big{|}_{\hat{\pi}_{i}}=0$,
where $q_{i}^{D}$ and $\pi_{i}$ are parameters from $Q^{D}$ and $\pi$. Note
that by construction of $\bar{\phi}_{T}^{o}$, (IV) and (V) automatically holds
for all $i$, and (I)-(III) holds for $i\in S(h_{T}^{A}),S(h_{T}^{B})$, and
$S(h_{T}^{Qnd})$ respectively. For indices $i$ that do not fall in those sets
(i.e. the zeroes), we have to verify that the sub-differentials satisfy:
1. (i)
$\max_{i\notin
S(h_{T}^{A})}\big{|}T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial
a_{i}}\big{|}_{\hat{a}_{i}}\leq\min_{i\notin
S(h_{T}^{A})}p_{\lambda}^{{}^{\prime}}(|\tilde{a}_{i}|)$,
2. (ii)
$\max_{i\notin
S(h_{T}^{B})}\big{|}T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial
b_{i}}\big{|}_{\hat{b}_{i}}\leq\min_{i\notin
S(h_{T}^{B})}p_{\lambda}^{{}^{\prime}}(|\tilde{b}_{i}|)$,
3. (iii)
$\max_{i\notin
S(h_{T}^{Qnd})}\big{|}T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial
q_{i}}\big{|}_{\hat{q}_{i}}\leq\min_{i\notin
S(h_{T}^{Qnd})}p_{\lambda^{*}}^{{}^{\prime}}(|\tilde{q}_{i}|)$.
We prove (i)-(iii) more generally by looking at $\max_{j\leq
K_{T}}T^{-1}|\nabla^{1}_{j}\log\mathcal{L}_{T}(\hat{\phi}_{T})|$ where $K_{T}$
is the total number of candidate parameters. Recall the definition of
$\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})$ and
$\partial^{2}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})$ from Oprate. We want
to show that $\max_{j\leq
K_{T}}T^{-1}|\nabla^{1}_{j}\log\mathcal{L}_{T}(\hat{\phi}_{T})|=o_{p}(\lambda)$,
and we do so by adopting a similar approach to Kwon and Kim (2012).
Observe that
$\displaystyle P(\max_{j\leq K_{T}}|\nabla^{1}_{j}\log$
$\displaystyle\mathcal{L}_{T}(\hat{\phi}_{T})|>T\lambda)\leq P(\max_{j\leq
K_{T}}|\nabla^{1}_{j}\log\mathcal{L}_{T}(\phi_{T}^{*})|>T\lambda/4)$
$\displaystyle+P(\max_{j\leq
K_{T}}\|\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})-E[\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})]\|\|\hat{\phi}_{T}-\phi_{T}^{*}\|>T\lambda/4)$
$\displaystyle+P(\max_{j\leq
K_{T}}\|E[\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})]\|\|\hat{\phi}_{T}-\phi_{T}^{*}\|>T\lambda/4)$
$\displaystyle+P(\max_{j\leq
K_{T}}\|\partial^{2}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})\|_{\textbf{1}}\|\hat{\phi}_{T}-\phi_{T}^{*}\|^{2}>T\lambda/2)$
$\displaystyle\equiv J_{1}+J_{2}+J_{3}+J_{4}.$
To begin,
$J_{1}\leq\sum_{i=K_{T}^{*}+1}^{K_{T}}P\bigg{(}|\nabla^{1}_{j}\log\mathcal{L}_{T}(\phi_{T}^{*})|>T\lambda/4\bigg{)}=O\bigg{(}\frac{K_{T}}{T\lambda^{2}}\bigg{)}=o(1).$
Next,
$\displaystyle J_{2}$ $\displaystyle\leq P\bigg{(}\max_{j\leq
K_{T}}\|\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})-E[\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})]\|>T\sqrt{T}\lambda/4\sqrt{K_{T}^{*}}\bigg{)}$
$\displaystyle+P\bigg{(}\|\hat{\phi}_{T}-\phi_{T}^{*}\|>\sqrt{K_{T}^{*}/T}\bigg{)}$
$\displaystyle=O\bigg{(}\frac{K_{T}}{T^{2}\lambda^{2}/K_{T}^{*2}}\bigg{)}+o(1)=o(1),$
where we have use (3) from Oprate for the first term, and the first part of
consistency for the second term.
For $J_{3}$, since
$E[\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})]$ is bounded as per
boundedmoments, we have
$J_{3}\leq
P\bigg{(}\|\hat{\phi}_{T}-\phi_{T}^{*}\|>T\lambda/4\sqrt{K_{T}^{*}}C\bigg{)}=o(1)$
where the last equality is again by part (1) of consistency.
Finally, using (5) in Oprate,
$\displaystyle J_{4}$ $\displaystyle\leq P\bigg{(}\max_{j\leq
K_{T}}\|\partial^{2}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})\|_{\textbf{1}}>T^{*2}\lambda/2K_{T}^{*}\bigg{)}+P\bigg{(}\|\hat{\phi}_{T}-\phi_{T}^{*}\|^{2}>K_{T}^{*}/T\bigg{)}$
$\displaystyle=O\bigg{(}\frac{K_{T}}{T^{2}\lambda^{2}/K_{T}^{*4}}\bigg{)}+o(1)=o(1).$
Therefore, we have $\max_{j\leq
K_{T}}T^{-1}|\nabla^{1}_{j}\log\mathcal{L}_{T}(\hat{\phi}_{T})|=o_{p}(\lambda)$.
Next, recall that $|\tilde{\phi}_{i}|$ is
$O_{p}(\sqrt{K_{T}^{*}}\lambda^{Lasso})$ by fsconst. Furthermore, (A8) imply
that $\sqrt{K_{T}^{*}}\lambda^{Lasso}=o(\lambda)$. Then, by the structure of
the SCAD penalty where $p^{{}^{\prime}}_{\lambda}(\theta)=\theta$ for
$0<\theta\leq\lambda$ or 0 otherwise, we have $\min_{j\leq
K_{T}}p^{{}^{\prime}}_{\lambda}(|\tilde{\phi}_{j}|)=\lambda$.
Taken together, this implies that the inequalities (i)-(iii) hold, which
establishes part (2) of consistency.
∎
### Proof of norm
First we consider the unpenalized oracle sub-problem given as
$\max_{\phi^{o}_{T}}T^{-1}\log\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi^{o}).$
(23)
Note that this problem is identical to the oracle problem in (20) but with the
penalties removed. Let $\bar{\bar{\phi}}^{o}_{T}$ be the solution to (23). The
proof can be accomplished by showing the following results:
1. (1)
$\|\hat{\phi_{T}}^{(\neg 0)}-\bar{\bar{\phi}}_{T}^{o}\|=o_{p}(T^{-1/2}).$
2. (2)
$\sqrt{T}G_{T}[I_{T}^{(\neg
0)}(\phi_{T}^{*})]^{1/2}(\bar{\bar{\phi}}^{o}_{T}-\phi_{T}^{*(\neg
0)})\rightarrow^{d}\mathcal{N}(0,G).$
Intuitively, part (1) implies that $\hat{\phi}_{T}$ is asymptotically close to
$\bar{\bar{\phi}}^{o}_{T}$ while part (2) shows that
$\bar{\bar{\phi}}^{o}_{T}$ is asymptotically normal. Together, these results
suggests that the same statistical inference for $\bar{\bar{\phi}}^{o}_{T}$
can be applied to $\hat{\phi}_{T}$, and that it shares the same efficiency as
the oracle estimator.
Proof for (1)
With a slight abuse of notation, for this proof, we let
$\phi^{*}_{T}=\phi_{T}^{*(\neg 0)}$.
In light of part (2) in consistency, the penalized oracle estimator,
$\bar{\phi}_{T}^{o}$ is indeed the solution to the SCAD problem initialized
with Lasso estimates with probability approaching one. Hence, it suffices to
check $\|\hat{\phi}_{T}^{o}-\bar{\bar{\phi}}_{T}^{o}\|=o_{p}(T^{-1/2})$, where
recall that $\hat{\phi}_{T}^{o}$ is the solution to the penalized oracle
problem in (20) (i.e. $\bar{\phi}_{T}^{o}$ with the zeroes removed).
Define
$\dot{\lambda}=\big{(}p_{\lambda}^{{}^{\prime}}(|\tilde{a}_{1}|)\frac{\hat{a}_{1}}{|\hat{a}_{1}|},\ldots,p_{\lambda}^{{}^{\prime}}(|\tilde{a}_{h_{T}^{A}}|)\frac{\hat{a}_{h_{T}^{A}}}{|\hat{a}_{h_{T}^{A}}|},p_{\lambda}^{{}^{\prime}}(|\tilde{b}_{1}|)\frac{\hat{b}_{1}}{|\hat{b}_{1}|},\ldots,p_{\lambda^{*}}^{{}^{\prime}}(|\tilde{q}_{h_{T}^{Qnd}}|)\frac{\hat{q}_{h_{T}^{Qnd}}}{|\hat{q}_{h_{T}^{Qnd}}|}\big{)}^{\top}$.
Then, note that for a $\check{\phi}_{T}^{b}$ between $\hat{\phi}_{T}^{o}$ and
$\phi^{*}_{T}$, $\hat{\phi}_{T}^{o}$ satisfies
$T^{-1}\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})=T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}^{b})(\phi_{T}^{*}-\hat{\phi}_{T}^{o})-\dot{\lambda}.$
(24)
Next, for $\check{\phi}_{T}$ between $\bar{\bar{\phi}}_{T}^{o}$ and
$\phi^{*}_{T}$, $\bar{\bar{\phi}}_{T}^{o}$ satisfies
$T^{-1}\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})=T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T})(\phi_{T}^{*}-\bar{\bar{\phi}}_{T}^{o}).$
(25)
Taking the difference of (24) and (25), we get
$\dot{\lambda}=[T^{-1}(\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}^{b})-\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}))]\phi_{T}^{*}+T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T})\bar{\bar{\phi}}_{T}^{o}-T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}^{b})\hat{\phi}_{T}^{o}.$
(26)
Note that by (A6) and (4) from Oprate,
$\displaystyle
T^{-1}(\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}^{b})-\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}))\phi^{*}_{T}$
$\displaystyle=[T^{-1}(\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}^{b})-\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*}))]\phi_{T}^{*}$
$\displaystyle+[T^{-1}(\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})-\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}))]\phi_{T}^{*}$
$\displaystyle=O_{p}(K_{T}^{*2}/T).$ (27)
Furthermore, By the same logic in (22), the term $\dot{\lambda}$ goes to zero.
Under the assumptions of (A1)-(A4), we can use Lemma 2 of Bickel et al. (1998)
to get $T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\phi)\rightarrow^{p}-I_{T}^{\neg
0}(\phi_{T}^{*})$ where $\phi$ refers to either $\check{\phi}_{T}^{b}$ or
$\check{\phi}_{T}$ since both converge to $\phi^{*}_{T}$ in probability.
Hence, $T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\phi)=O_{p}(1)$. Therefore, we get
$\|\bar{\bar{\phi}}_{T}^{o}-\hat{\phi}_{T}^{o}\|=o_{p}(T^{-1/2})$ by noting
that $\sqrt{T}O_{p}(K_{T}^{*2}/T)\\\ =o_{p}(1)$ in (27), and using (26).
Proof for (2)
Here, we cannot directly apply the result or proof of asymptotic normality
from low-dimensional papers such as Bickel et al. (1998) because of the
diverging number of parameters. Instead, we approach it with the Lindeberg-
Feller CLT as in Fan and Peng (2004).
We start with (25). Pre-multiply the left hand side with
$\sqrt{T}G_{T}[I_{T}^{(\neg 0)}(\phi_{T}^{*})]^{-1/2}$ and define the
triangular array $Z_{Ti}\equiv\frac{1}{\sqrt{T}}G_{T}[I_{T}^{(\neg
0)}(\phi_{T}^{*})]^{-1/2}\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*})$. Now,
we verify Lindeberg’s condition. Let $\varepsilon>0$ be an arbitrary constant,
and note that by Cauchy-Schwarz
$\sum_{i=1}^{T}E\\{\|Z_{Ti}\|^{2}\textbf{1}_{(\|Z_{Ti}\|>\varepsilon)}\\}\leq
TE\\{\|Z_{Ti}\|^{4}\\}^{1/2}P\\{\|Z_{Ti}\|>\varepsilon\\}^{1/2}.$
Then, by Chebyshev,
$P\\{\|Z_{Ti}\|>\varepsilon\\}\leq\frac{E\|G_{T}[I_{T}^{(\neg
0)}(\phi_{T}^{*})]^{-1/2}\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*})\|^{2}}{T\varepsilon^{2}}=O(1/T),$
where we have used the definition of the information matrix, and that
$G_{T}G_{T}^{\top}\rightarrow G$.
Again by Cauchy-Schwarz, and the fact that the induced matrix norm of a
symmetric matrix is equivalent to its spectral radius, we have
$\displaystyle E\\{\|Z_{Ti}\|^{4}\\}$ $\displaystyle\leq
T^{-2}\lambda_{max}(G_{T}G_{T}^{\top})\lambda_{max}(I_{T}^{(\neg
0)}(\phi_{T}^{*}))E\|\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*})[\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*})]^{\top}\|^{2}$
$\displaystyle=O(K_{T}^{*2}/T^{2}),$
where
$E\|\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*})[\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*})]^{\top}\|^{2}$
has $K_{T}^{*2}$ bounded elements as implied by the proof of boundedmoments.
So we conclude that Lindeberg’s condition is satisfied since
$\sum_{i=1}^{T}E\\{\|Z_{Ti}\|^{2}\\\
\textbf{1}_{(\|Z_{Ti}\|>\varepsilon)}\\}=O(K_{T}^{*}/\sqrt{T})=o(1)$.
Furthermore, for the asymptotic variance, we have
$var(\sum_{i}^{T}Z_{Ti})=Tcov(Z_{Ti})=cov(G_{T}[I_{T}^{(\neg
0)}(\phi_{T}^{*})]^{-1/2}\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*}))\rightarrow
G$. Therefore, by the Lindeberg-Feller CLT,
$\frac{1}{\sqrt{T}}G_{T}[I_{T}^{(\neg
0)}(\phi_{T}^{*})]^{-1/2}\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})\rightarrow^{d}\mathcal{N}(0,G)$.
Again, under the assumptions (A1)-(A4) we can use Lemma 2 of Bickel et al.
(1998) to obtain
$T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T})\rightarrow^{p}-I_{T}^{\neg
0}(\phi_{T}^{*})$ in (25). Hence, putting all these results together in (25)
completes the proof.
∎
| arxiv-papers | 2021-07-27T02:02:40 | 2024-09-04T03:07:20.325745 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Kenwin Maung",
"submitter": "Kenwin Maung",
"url": "https://arxiv.org/abs/2107.12552"
} |
2107.12553 | SUS-20-003
SUS-20-003
# Search for chargino-neutralino production in events with Higgs and bosons
using 137of proton-proton collisions at $\sqrt{s}=13\TeV$
###### Abstract
A search for electroweak production of supersymmetric (SUSY) particles in
final states with one lepton, a Higgs boson decaying to a pair of bottom
quarks, and large missing transverse momentum is presented. The search uses
data from proton-proton collisions at a center-of-mass energy of 13collected
using the CMS detector at the LHC, corresponding to an integrated luminosity
of 137. The observed yields are consistent with backgrounds expected from the
standard model. The results are interpreted in the context of a simplified
SUSY model of chargino-neutralino production, with the chargino decaying to a
boson and the lightest SUSY particle (LSP) and the neutralino decaying to a
Higgs boson and the LSP. Charginos and neutralinos with masses up to 820are
excluded at $95\%$ confidence level when the LSP mass is small, and LSPs with
mass up to 350are excluded when the masses of the chargino and neutralino are
approximately 700.
## 0.1 Introduction
Supersymmetry (SUSY) [1, 2, 3] is an appealing extension of the standard model
(SM) that predicts the existence of a superpartner for every SM particle, with
the same gauge quantum numbers but differing by one half unit of spin. SUSY
allows addressing several shortcomings of the SM. For example, the
superpartners can play an important role in stabilizing the mass of the Higgs
boson () [4, 5]. In R-parity conserving SUSY models, the lightest
supersymmetric particle (LSP) is stable and therefore is a viable dark matter
candidate [6].
The SUSY partners of the SM gauge bosons and the Higgs boson are known as
winos (partners of the SU(2)L gauge fields), the bino (partner of the U(1)
gauge field), and higgsinos. Neutralinos () and charginos () are the
corresponding mass eigenstates of the winos, bino and higgsinos. They do not
carry color charge and are therefore produced only via electroweak
interactions or in the decay of colored superpartners. Because of the smaller
cross sections for electroweak processes, the masses of these particles are
experimentally less constrained than the masses of colored SUSY particles.
Depending on the mass spectrum, the neutralinos and charginos can have
significant decay branching fractions to vector or scalar bosons. In
particular, the decays via the and the Higgs boson are expected to be
significant if the and particles are wino-like, the is bino-like, and the
difference between their masses is larger than the Higgs boson mass, where the
subscript $1(2)$ denotes the lightest (second lightest) neutralino or
chargino, respectively. These considerations strongly motivate a search for
the electroweak production of SUSY partners presented in this paper.
This paper reports the results of a search for chargino-neutralino production
with subsequent $\PSGcpmDo\to\PW^{\pm}\PSGczDo$ and $\PSGczDt\to\PH\PSGczDo$
decays, as shown in Fig. 1. The data analysis focuses on the final state with
a charged lepton produced in the boson decay, two jets reconstructed from the
$\PH\to\PQb\PAQb$ decay, and significant missing transverse momentum ()
resulting from the LSPs and the neutrino. This final state benefits from the
large branching fraction for $\PH\to\PQb\PAQb$, 58%. The chargino and
neutralino are assumed to be wino-like, and the produced in their decays is
assumed to be the stable LSP. As wino-like charginos $\PSGcpmDo$ and
neutralinos $\PSGczDt$ would be nearly degenerate, this analysis considers a
simplified model [7, 8, 9] with a single mass parameter for both the chargino
and neutralino ($m_{\PSGczDt/\PSGcpmDo}$), as well as an additional mass
parameter for the LSP ($m_{\PSGczDo}$). Results of searches in this final
state were previously presented by ATLAS [10, 11] and CMS [12, 13, 14] using
data sets at center of mass energy 8 and 13.
Figure 1: Diagram for a simplified SUSY model with electroweak production of
the lightest chargino and next-to-lightest neutralino . The decays to a boson
and the lightest neutralino . The decays to a Higgs boson and a .
This analysis uses 13proton-proton ($\Pp{}\Pp{}$) collision data collected
with the CMS detector during the 2016–2018 data-taking periods, corresponding
to an integrated luminosity of $137\fbinv$. Relative to the most recent result
from the CMS Collaboration targeting this signature [12], the results
significantly extend the sensitivity to the mass of the chargino and
neutralino. The improved sensitivity is achieved through a nearly four-fold
increase in the integrated luminosity, as well as from numerous improvements
in the analysis, including the addition of a discriminant that identifies
Higgs boson decays collimated into large-radius jets, regions that include
additional jets from the initial-state radiation, and an expanded
categorization in .
## 0.2 The CMS detector
The central feature of the CMS apparatus is a superconducting solenoid of 6m
internal diameter, providing a magnetic field of 3.8T. Within the solenoid
volume are a silicon pixel and strip tracker, a lead tungstate crystal
electromagnetic calorimeter, and a brass and scintillator hadron calorimeter,
each composed of a barrel and two endcap sections. Forward calorimeters extend
the pseudorapidity ($\eta$) coverage provided by the barrel and endcap
detectors. Muons are detected in gas-ionization chambers embedded in the steel
flux-return yoke outside the solenoid. A more detailed description of the CMS
detector, together with a definition of the coordinate system used and the
relevant kinematic variables, can be found in Ref. [15].
Events of interest are selected using a two-tiered trigger system. The first
level, composed of custom hardware processors, uses information from the
calorimeters and muon detectors to select events at a rate of approximately
100kHz within a fixed time interval of about 4 [16]. The second level, known
as the high-level trigger, consists of a farm of processors running a version
of the full event reconstruction software optimized for fast processing, and
reduces the event rate to approximately 1kHz before data storage [17].
## 0.3 Simulated samples
Monte Carlo (MC) simulation is used to design the search strategy, study and
estimate SM backgrounds, and evaluate the sensitivity of the analysis to the
SUSY signal. Separate MC simulations are used to reflect the detector
configuration and running conditions of different periods (2016, 2017, and
2018). The 2 (versions 2.2.2 for 2016 and 2.4.2 for 2017–2018) generator [18]
at leading order (LO) in quantum chromodynamics (QCD) is used to generate
samples of events of SM $\ttbar$, $\PW{}\text{+jets}$, and $\PW\PH$ processes,
as well as chargino-neutralino production, as described by a simplified model
of SUSY. Samples of $\PW{}\text{+jets}$, , and SUSY events are generated with
up to four, three, and two additional partons included in the matrix-element
calculations, respectively. The generator at next-to-leading-order (NLO) in
QCD is used to generate samples of $\ttbar\PZ$ and $\PW\PZ$ events, while
single top quark events are generated at NLO in QCD using the 2.0 [19, 20, 21,
22] program.
The NNPDF3.0 (3.1) parton distribution functions, PDFs, are used to generate
all 2016 (2017–2018) MC samples [23, 24, 25]. The parton shower and
hadronization are modeled with 8.226 (8.230) [26] in 2016 (2017–2018) samples.
The MLM [27] and FxFx [28] prescriptions are employed to match partons from
the matrix-element calculation to those from the parton showers for the LO and
NLO samples, respectively.
The 2016 MC samples are generated with the CUETP8M1 tune [29]. For later data-
taking periods, the CP5 and CP2 tunes [30] are used for SM and SUSY signal
samples, respectively. The [31] package is used to simulate the response of
the CMS detector for all SM processes, while the CMS fast simulation program
[32, 33] is used for signal samples.
Cross section calculations performed at next-to-next-to-leading-order (NNLO)
in QCD are used to normalize the MC samples of $\PW{}\text{+jets}$ [34], and
at NLO in QCD to normalize single top quark samples [35, 36]. The $\ttbar$
samples are normalized to a cross section determined at NNLO in QCD that
includes the resummation of the next-to-next-to-leading-logarithmic soft-gluon
terms [37, 38, 39, 40, 41, 42, 43]. MC samples of other SM background
processes are normalized to cross sections obtained from the MC event
generators at either LO or NLO in QCD. Cross sections for wino-like chargino-
neutralino production are computed at approximate NLO plus next-to-leading
logarithmic (NLL) precision. Other SUSY particles except for the LSP are
assumed to be heavy and decoupled [44, 45, 46, 47]. A SM-like
$\PH\to\PQb\PAQb$ branching fraction of 58.24% [48] is assumed.
Nominal distributions of additional $\Pp{}\Pp{}$ collisions in the same or
adjacent bunch crossings (pileup) are used in the generation of simulated
samples. These samples are reweighted such that the number of interactions per
bunch crossing matches the observation.
## 0.4 Event selection and search strategy
In order to search for the chargino-neutralino production mechanism shown in
Fig. 1, the analysis targets decay modes of the boson to leptons and the to a
bottom quark-antiquark pair. The analysis considers events with a single
isolated electron or muon, two jets identified as originating from two bottom
quarks, and large from the LSPs and the neutrino. The major backgrounds in
this final state arise from SM processes containing top quarks and bosons.
These backgrounds are suppressed with the analysis strategy described below
that uses physics objects summarized in Table 0.4, which are similar to those
presented in Ref. [49].
Events are reconstructed using the particle-flow (PF) algorithm [50], which
combines information from the CMS subdetectors to identify charged and neutral
hadrons, photons, electrons, and muons, collectively referred to as PF
candidates. These candidates are associated with reconstructed vertices, and
the vertex with the largest sum of squared physics-object transverse momenta
is taken to be the primary $\Pp{}\Pp{}$ interaction vertex. The physics
objects used for the primary vertex determination include a special collection
of jets reconstructed by clustering only tracks associated to the vertex, and
the magnitude of the associated missing transverse momentum. The missing
transverse momentum in this case is defined as the negative vector sum of the
transverse momentum () of the jets in this collection. In all other cases, the
missing transverse momentum () is taken as the negative vector sum of the of
all PF candidates, excluding charged hadron candidates that do not originate
from the primary vertex [51].
Electron candidates are reconstructed by combining clusters of energy deposits
in the electromagnetic calorimeter with charged tracks [52]. The electron
identification is performed using shower shape variables, track-cluster
matching variables, and track quality variables. The selection on these
variables is optimized to identify electrons from the decay of and bosons
while rejecting electron candidates originating from jets. To reject electrons
originating from photon conversions inside the detector, electrons are
required to have at most one missing measurement in the innermost tracker
layers and to be incompatible with any conversion-like secondary vertices.
Muon candidates are reconstructed by geometrically matching tracks from
measurements in the muon system and tracker, and fitting them to form a global
muon track. Muons are selected using the quality of the geometrical matching
and the quality of the tracks [53].
Selected muons (electrons) are required to have $\pt>25\>(30)\GeV$,
$\abs{\eta}<2.1\>(1.44)$, and be isolated. Events containing electrons with
$\abs{\eta}>1.44$ have been found to exhibit an anomalous tail in the
transverse mass distribution and are not included in the search. Lepton
isolation is determined from the scalar sum ($\pt^{\text{sum}}$) of PF
candidates not associated with the lepton within a cone of -dependent radius
starting at $\Delta
R=\sqrt{\smash[b]{\left(\Delta\phi\right)^{2}+\left(\Delta\eta\right)^{2}}}=0.2$,
where $\phi$ is the azimuthal angle in radians. This radius is reduced to
$\Delta R=\max(0.05,10\GeV/\pt$) for a lepton with $\pt>50\GeV$. Leptons are
considered isolated if the scalar sum within this radius is less than 10% of
the lepton . Additionally, leptons are required to have a scalar sum within a
fixed radius of $\Delta R=0.3$ less than $5\GeV$. Typical lepton selection
efficiencies are approximately 85% for electrons and 95% for muons, depending
on the and $\eta$ of the lepton.
Events containing a second lepton passing a looser “veto lepton” selection, a
passing a “veto tau” selection, or an isolated charged PF candidate are
rejected. Hadronic decays are identified by a multi-variate analysis (MVA)
isolation algorithm that selects both one– and three–pronged topologies and
allows for the presence of additional neutral pions [54, 55]. These vetoes are
designed to provide additional rejection against events containing two
leptons, or a lepton and a hadronic decay.
Hadronic jets are reconstructed from neutral and charged PF candidates
associated with the primary vertex, using the anti-clustering algorithm [56,
57]. Two collections of jets are produced, with different values of the
distance parameter $R$. Both collections of jets are corrected for
contributions from event pileup and the effects of nonuniform detector
response [58].
“Small-$R$” jets are reconstructed with a distance parameter $R=0.4$, and aim
to reconstruct jets arising from a single parton. Selected small-$R$ jets have
$\pt>30\GeV$, $\abs{\eta}<2.4$, and are separated from isolated leptons by
$\Delta R>0.4$. Small-$R$ jets that contain the decay of a -flavored hadron
are identified as bottom quark jets (-tagged jets) using a deep neural network
algorithm, DeepCSV. The discriminator working point is chosen so that the
misidentification rate to tag light-flavor or gluon jets is approximately
1–2%. This choice results in an efficiency to identify a bottom quark jet in
the range 65–80% for jets with between 30 and 400, and an efficiency of 10–15%
for jets originating from a charm quark. The tagging efficiency in simulation
is corrected using scale factors derived from comparisons of data with
simulation in control samples [59].
Summary of the requirements for the physics objects used in this analysis.
Lepton $\ell=\PGm(\Pe)$ with $\pt^{\ell}>25(30)\GeV$,
$\abs{\eta^{\ell}}<2.1~{}(1.44)$ $\pt^{\text{sum}}<0.1\>\pt^{\ell}$,
$\pt^{\text{sum}}<5\GeV$ Veto lepton $\PGm$ or $\Pe$ with $\pt^{\ell}>5\GeV$,
$\abs{\eta^{\ell}}<2.4$ $\pt^{\text{sum}}<0.2\>\pt^{\ell}$ Veto track charged
PF candidate, $\pt>10\GeV$, $\abs{\eta}<2.4$ $\pt^{\text{sum}}<0.1\>\pt$,
$\pt^{\text{sum}}<6\GeV$ Veto hadronic with $\pt>10\GeV$, $\abs{\eta}<2.4$
MVA isolation Jets anti-jets, $R=0.4$, $\pt>30\GeV$, $\abs{\eta}<2.4$ anti-
jets, $R=0.8$, $\pt>250\GeV$, $\abs{\eta}<2.4$ tagging DeepCSV algorithm (1%
misidentification rate) tagging mass-decorrelated tagging discriminator
$\pt^{\text{sum}}$ cone size $\ell$ relative isolation: $\Delta
R=\min[\max(0.05,10\GeV/\pt^{\ell}),0.2]$ veto track, and $\ell$ absolute
isolation: $\Delta R=0.3$
When the of the Higgs boson is not too large compared to its mass, the jets
resulting from its decay to bottom quarks are spatially separated. As the
Higgs boson increases, the separation between the jets decreases. For the SUSY
signal, this becomes important when the mass splitting between the neutralino
and the LSP is large. To improve the sensitivity to large masses, a second
collection of “large-$R$” jets is formed with distance parameter $R=0.8$.
Selected large-$R$ jets have $\pt>250\GeV$, $\abs{\eta}<2.4$, and are
separated from isolated leptons by $\Delta R>0.8$. Large-$R$ jets containing a
candidate $\PH\to\PQb\PAQb$ decay are identified as -tagged jets using a
dedicated deep neural network algorithm [60]. We use the mass-decorrelated
version of the DeepAK8 algorithm, which considers the properties of jet
constituent particles and secondary vertices. The imposed requirement on the
neural network score corresponds to a misidentification rate of approximately
2.5% for large-$R$ jets with a of 500–700without an $\PH\to\PQb\PAQb$ decay in
multijet events. The efficiency to identify an decay to bottom quarks is
60–80% depending on the of the large-$R$ jet.
The is modified to account for corrections to the energy scale of the
reconstructed jets in the event. Events with possible contributions from beam
halo interactions or anomalous noise in the calorimeter are rejected using
dedicated filters [61]. Additionally, during part of the 2018 data-taking
period, two sectors of the endcap hadronic calorimeter experienced a power
loss, affecting approximately 39of data. As the identification of both
electrons and jets depends on correct energy fraction measurements, events
from the affected data-taking periods containing an electron or a jet in the
region $-2.4<\eta<-1.4$ and $-1.6<\phi<-0.8$ are rejected. The total loss in
signal efficiency considering all event filters is less than 1%.
Data events are selected using a logical “or” of triggers that require either
the presence of an isolated electron or muon; or large and , where is the
magnitude of the negative vector sum of all jets and leptons. The combined
trigger efficiency, measured with an independent data sample of events with a
large scalar sum of small-$R$ jets, is greater than 99% for events with
$\ptmiss>225\GeV$ and lepton $\pt>20\GeV$. The trigger requirements are
summarized in Table 0.4.
Summary of the triggers used to select the analysis data set. Events are
selected using a logical “or” of the following triggers. $\ptmiss>120\GeV$
and $\mht>120\GeV$ (2016–2018) $\ptmiss>170\GeV$ (2016) Isolated $\PGm(\Pe)$
with $\pt^{\ell}>24\>(25)\GeV$ (2016) Isolated $\PGm(\Pe)$ with
$\pt^{\ell}>24\>(35)\GeV$ (2017–2018)
Table 0.4 defines the event preselection common to all signal regions, which
requires exactly one isolated lepton, $\ptmiss>125\GeV$, two or three
small-$R$ jets, and no isolated tracks or veto tau candidates.
Exactly two of the small-$R$ jets must be -tagged. The primary SM processes
that contribute to the preselection region are , single top quark (mostly in
the $\PQt\PW$ channel), and $\PW{}\text{+jets}$ production.
The SM processes with one boson that decays to leptons, originating primarily
from semileptonic and $\PW{}\text{+jets}$, are suppressed by requiring the
transverse mass, , to be greater than $150\GeV$. is defined as
$\mT=\sqrt{2\pt^{\ell}\ptmiss(1-\cos\Delta\phi)},$ (1)
where $\pt^{\ell}$ denotes the lepton $\pt$ and $\Delta\phi$ is the azimuthal
separation between $\ptvec^{\ell}$ and . After requiring a large , the
dominant remaining background comes from processes with two bosons that decay
to leptons (including leptons), primarily $\ttbar$ and . To suppress these
backgrounds, events with an additional veto lepton or a hadronic decay are
rejected, as described above.
Additional background rejection is obtained using the cotransverse mass
variable, $m_{\mathrm{CT}}$, which is defined as
$m_{\mathrm{CT}}=\sqrt{2\pt^{\PQb_{1}}\pt^{\PQb_{2}}(1+\cos(\Delta\phi_{\PQb\PAQb}))},$
(2)
where $\pt^{b_{1}}$ and $\pt^{b_{2}}$ are the magnitudes of the transverse
momenta of the two -tagged jets and $\Delta\phi_{\PQb\PAQb}$ is the azimuthal
angle between the two -tagged jets [62]. This variable has a kinematic
endpoint close to $150\GeV$ for events when both jets are correctly
identified, while signal events tend to have higher values of
$m_{\mathrm{CT}}$. Requiring $m_{\mathrm{CT}}>200\GeV$ is effective at
reducing the dilepton and backgrounds.
Summary of the preselection requirements common to all signal regions. The
$N_{\PQb}$ is the multiplicity of -tagged jets and
$\pt^{\mathrm{non\mbox{-}\PQb}}$ is the of the non--tagged jet. Lepton Single
$\Pe$ or $\PGm$ and no additional veto lepton, track or tau Small-$R$ jets
$2\leq N_{\text{jets}}\leq 3$, $N_{\PQb}=2$,
$\pt^{\mathrm{non\mbox{-}\PQb}}<300\GeV$ $>$125 $m_{\bbbar}$ 90–150 $>$150
$m_{\mathrm{CT}}$ $>$200
Events entering the signal regions must pass the preselection and satisfy the
and $m_{\mathrm{CT}}$ requirements above. We also require that the invariant
mass of the pair of -tagged jets, $m_{\bbbar}$, be between 90 and 150,
consistent with the mass of an SM Higgs boson. In events with 3 small-$R$
jets, the non--tagged jet must have $\pt<300\GeV$. This requirement rejects
some events that survive the $m_{\mathrm{CT}}$ and selections. These
requirements define the baseline signal selection. Figure 2 shows the
distributions of , $m_{\mathrm{CT}}$, $m_{\bbbar}$, , the number of small-$R$
jets ($N_{\text{jets}}$), and the discriminator output of the tagging
algorithm in simulated signal and background samples. All preselection
requirements specified in Table 0.4 are applied except the one on the plotted
variable, illustrating the discrimination power of each variable.
Figure 2: Distributions of , $m_{\mathrm{CT}}$, $m_{\bbbar}$, ,
$N_{\text{jets}}$, and the $\PH\to\PQb\PAQb$ large-$R$ jet discriminator in
simulated background and signal samples. Three benchmark signal points
corresponding to masses in GeV ($m_{\PSGczDt/\PSGcpmDo}$, $m_{\PSGczDo}$) of
(800, 100), (425, 150) and (225, 75) are shown as solid, dashed, and short-
dashed lines, respectively. Events are taken from the 2-jet signal regions
with $\ptmiss>125\GeV$, with all of the requirements specified in Table 0.4
except for the one on the plotted variable. The shaded areas correspond to the
statistical uncertainty of the simulated backgrounds. The dashed vertical
lines indicate the thresholds used to define the signal regions. These
indicators are not shown on the tagging discriminator score distribution
because the required values vary between 0.83 and 0.90, depending on the data-
taking year.
Events passing the baseline signal selection are further categorized into
signal regions according to $N_{\text{jets}}$, the number of -tagged large-$R$
jets $N_{\PH}$, and the value of . The twelve non-overlapping signal regions
are defined in Table 0.4.
Definition of the 12 non-overlapping signal regions categorized in $N_{\PH}$,
$N_{\text{jets}}$, and , where $N_{\PH}$ is the number of large-$R$ jets
tagged as $\PH\to\PQb\PAQb$.
$N_{\PH}$ | $N_{\text{jets}}$ | [GeV]
---|---|---
0 | 2, 3 | [125, 200), [200, 300), [300, 400), [400, $\infty$)
1 | 2, 3 | [125, 300), [300, $\infty$)
## 0.5 Background estimation
There are two dominant background categories relevant for this search: top
quark production and boson production. The contributions of these backgrounds
to the yields in the signal regions are estimated using observed yields in
control regions (CRs) and transfer factors obtained from simulated samples.
The transfer factors are validated in non-overlapping regions adjacent to the
signal regions. The top quark backgrounds include pair production, single top
quark production (), and a small contribution from $\ttbar\PW$ and $\ttbar\PZ$
production. These backgrounds dominate in the lower-search regions and are
estimated from CRs in data using the method described in Section 0.5.1. In the
high-regions, boson production becomes the dominant background. The method
described in Section 0.5.2 estimates the background arising from
$\PW{}\text{+jets}$, , and production using CRs in data. The remaining
background arises from standard model production. This process contributes
less than 5% of the total background in any of the search regions, and its
yield is estimated from simulation. A 25% uncertainty in the cross section of
this process is assigned, based on the uncertainty in the cross section
measurement [63].
### 0.5.1 Top quark background
Events containing top quarks constitute the dominant background, particularly
in bins with $N_{\text{jets}}=3$ or low . These events contain jets and
isolated leptons from bosons, so they lead to similar final states as the
signal. Owing to the high requirement, the majority of the top quark
background stems from events with two leptonically decaying bosons. In this
case, one of the leptons either is not reconstructed, fails the identification
requirements, is not isolated, or is outside of kinematic acceptance.
The background is further suppressed by the $m_{\mathrm{CT}}$ requirement,
which has an endpoint at approximately $150\GeV$ for events in the case when
both daughter jets are reconstructed and identified. The $m_{\mathrm{CT}}$
value for events can exceed the cutoff for three reasons: (i) if there are
mistagged light-flavor jets or extra jets, (ii) if a jet is reconstructed with
excess because it overlaps with other objects, or (iii) because of excess jet
arising due to the finite jet energy resolution.
A control sample enriched in top quark events is obtained by inverting the
$m_{\mathrm{CT}}$ requirement. For each signal region (SR), we form a
corresponding control region spanning a range of $m_{\mathrm{CT}}$ from $100$
to $200\GeV$. These CRs are used to normalize the top quark background to data
in a single-lepton, high-region in each bin of , $N_{\PH}$, and
$N_{\text{jets}}$. In each CR, a transfer factor from MC simulation
($R_{\text{top}}$) is used to extrapolate the yield for the corresponding
high-$m_{\mathrm{CT}}$ signal regions. The top quark background estimate is
then given by
$N_{\mathrm{SR}}^{\text{top}}(\ptmiss,N_{\text{jets}},N_{\PH})=R_{\text{top}}(\ptmiss,N_{\text{jets}},N_{\PH})N_{\mathrm{CR}}^{\text{obs.}}(\ptmiss,N_{\text{jets}},N_{\PH}),$
(3)
where the $N_{\mathrm{SR}}^{\text{top}}$ is the number of expected events in
the SR, $N_{\mathrm{CR}}^{\text{obs.}}$ is the number of observed events in
the CR, and $R_{\text{top}}$ are defined as
$R_{\text{top}}(\ptmiss,N_{\text{jets}},N_{\PH})=\frac{N_{\mathrm{SR}}^{\text{top}~{}\mathrm{MC}}(\ptmiss,N_{\text{jets}},N_{\PH})}{N_{\mathrm{CR}}^{\mathrm{SM}~{}\mathrm{MC}}(\ptmiss,N_{\text{jets}},N_{\PH})}.$
(4)
The $N_{\mathrm{SR}}^{\text{top}~{}\mathrm{MC}}$ and
$N_{\mathrm{CR}}^{\mathrm{SM}~{}\mathrm{MC}}$ are the expected top quark and
total SM yields in the signal and control regions, respectively, according to
simulation.
The contamination from other processes (primarily boson production) in the
low-$m_{\mathrm{CT}}$ CRs is as low as 2% in the lower-regions, growing to 25%
in the highest control region. This contamination is included in the
denominator of $R_{\text{top}}$ as shown in Eq. (4). Additionally, to increase
the expected yields in the CRs, two modifications to the CR definitions are
made. First, for the CRs with an -tagged large-$R$ jet, the $m_{\mathrm{CT}}$
lower bound is removed (for a total range of $0$–$200\GeV$). Second, for CRs
with $\ptmiss>300\GeV$, the $m_{\bbbar}$ window is expanded to 90–300.
The data yields, transfer factors, and the resulting top quark background
predictions are summarized in Table 0.5.1. These predictions, combined with
the other background estimates, are compared with the observed yields in
Section 0.6.
The values of the $R_{\text{top}}$ transfer factors, the observed yields in
the low-$m_{\mathrm{CT}}$ CRs, and the resulting top quark background
prediction in each bin of , $N_{\text{jets}}$, and $N_{\PH}$. The uncertainty
shown for $R_{\text{top}}$ is only of statistical origin. For the top quark
prediction both the statistical and systematic uncertainties are shown
(discussed in the text.)
$N_{\text{jets}}$ | $N_{\PH}$ | [] | $R_{\text{top}}$ | $N_{\mathrm{CR}}^{\text{obs.}}$ | $N_{\mathrm{SR}}^{\text{top}}$
---|---|---|---|---|---
2 | 0 | 125–200 | $0.006\pm 0.001$ | $978$ | $6.3\pm 0.9\pm 0.9$
200–300 | $0.015\pm 0.003$ | $161$ | $2.4\pm 0.5\pm 0.4$
300–400 | $0.05\pm 0.02$ | $6$ | $0.3\pm 0.1\pm 0.1$
$>$400 | $0.02\pm 0.02$ | $1$ | $0.02\pm 0.02\pm 0.01$
1 | 125–300 | $0.26\pm 0.06$ | $6$ | $1.6\pm 0.8\pm 0.4$
$>$300 | $0.03\pm 0.01$ | $11$ | $0.4\pm 0.2\pm 0.3$
3 | 0 | 125–200 | $0.020\pm 0.002$ | $851$ | $17.5\pm 1.6\pm 2.6$
200–300 | $0.05\pm 0.01$ | $151$ | $7.1\pm 1.1\pm 1.3$
300–400 | $0.04\pm 0.01$ | $19$ | $0.8\pm 0.3\pm 0.3$
$>$400 | $0.2\pm 0.2$ | $1$ | $0.2\pm 0.2\pm 0.1$
1 | 125–300 | $0.28\pm 0.05$ | $18$ | $5.0\pm 1.4\pm 1.4$
$>$300 | $0.12\pm 0.03$ | $14$ | $1.7\pm 0.7\pm 1.4$
To assess the modeling of the top quark background, we conduct a validation
test in a sideband requiring $m_{\bbbar}>150\GeV$ and the same
$m_{\mathrm{CT}}$ and requirements as the SR. The relative contributions from
SM processes are similar in the sideband and the signal regions. The modeling
of the top quark background in this region is also affected by the same
sources of uncertainty, including the imperfect knowledge of the object
efficiencies, jet energy scale and resolution, and the distribution of
additional pileup interactions. An analogous background prediction is
performed in this region, and the level of agreement observed is used to
derive a systematic uncertainty in the $R_{\text{top}}$ factors.
The yields in the $m_{\bbbar}>150\GeV$ validation regions (VRs) are estimated
using CRs defined with the same and $m_{\mathrm{CT}}$ requirements as the CRs
for the SR predictions: $\mT>150\GeV$, and $m_{\mathrm{CT}}>100$ $(0)\GeV$ for
$N_{\PH}=0$ $(1)$. Two modifications are introduced to improve the statistical
precision of the test: first, the $N_{\text{jets}}=2$ and $N_{\text{jets}}=3$
bins are combined; and second, all regions with $\ptmiss>300$and
$\ptmiss>400$are combined. Additionally, to avoid overlap with the
low-$m_{\mathrm{CT}}$ control regions used to estimate the top quark
background in the SR, the low-$m_{\mathrm{CT}}$ regions used for the VR
predictions in bins with $\ptmiss>300\GeV$ are restricted to
$m_{\bbbar}>300\GeV$.
A comparison of the $R_{\text{top}}$ factors obtained from data and simulation
in the VRs is shown in Fig. 3. Good agreement is observed, and we assign the
statistical uncertainties in the differences of the observed and simulated
values as the systematic uncertainties in the corresponding $R_{\text{top}}$
factors. These uncertainties reflect the degree to which we can evaluate the
modeling of $R_{\text{top}}$ factors in data. This validation approach has the
advantage of probing both the known sources of uncertainty as well as any
unknown sources that could affect the $m_{\mathrm{CT}}$ extrapolation. The
uncertainties derived from this test, together with those associated with the
finite yields in the low-$m_{\mathrm{CT}}$ CRs and the MC statistical
precision form the complete set of uncertainties assigned to the top quark
background prediction.
Additional cross-checks of the top quark background estimate are performed in
a dilepton validation region and in a region with exactly one jet. These
studies are performed in all 12 bins of , $N_{\text{jets}}$, and $N_{\PH}$,
and the results agree with those obtained from the studies performed in the
$m_{\bbbar}$ sideband. A second, independent estimate of the top quark
background is performed following the “lost-lepton” method described in Ref.
[49]. In this method, the contribution from top quark processes in each signal
region is normalized using a corresponding control region requiring two
leptons and all other signal region selections. The estimates obtained from
the two methods are consistent. These additional cross-checks are not used
quantitatively to determine uncertainties, but they build confidence in the
modeling of the $R_{\text{top}}$ factors.
Figure 3: Observed and simulated $R_{\text{top}}$ values in the
$m_{\bbbar}>150\GeV$ validation regions. The differences between observed and
simulated $R_{\text{top}}$ values, divided by the total statistical
uncertainties, are also listed in the figure as $\Delta R_{\text{top}}$. The
statistical precision of each difference, $\sigma_{\mathrm{stat}}$, is taken
as the systematic uncertainty on $R_{\text{top}}$ for the corresponding bin in
the signal region.
### 0.5.2 boson background
Events arising from boson production, mainly $\PW{}\text{+jets}$, , and , are
the second largest background in this search and are the dominant SM
contribution in bins with high . Events from $\PW{}\text{+jets}$ production
satisfy the baseline selection when they contain true jets originating from
$\Pg\to\bbbar$ (associated production with heavy-flavor jets,
$\PW{}\mathrm{+HF}$) or when light-flavor jets are misidentified as jets
(associated production with light flavor jets, $\PW{}\text{+LF}$). Because of
the low misidentification rate of light-flavor jets, more than 75% of the
selected $\PW{}\text{+jets}$ events contain at least one genuine jet. The
$\PW{}\text{+jets}$ background is reduced by the $\mT>150\GeV$ requirement. In
absence of large mismeasurements of the , the boson must be produced off-shell
in order to satisfy this threshold.
The boson background is normalized in a data control sample obtained by
requiring the number of -tagged jets ($N_{\PQb}$) to be less or equal to 1 and
the same , $m_{\mathrm{CT}}$, and $m_{\bbbar}$ requirements as the signal
regions. The $N_{\PQb}=0$ region of this sample is used to normalize the boson
background while the $N_{\PQb}=1$ region is used to constrain the
contamination from top quark events. The two jets with the highest tagging
discriminator values are used to calculate $m_{\bbbar}$ and $m_{\mathrm{CT}}$.
The control sample is binned in $N_{\text{jets}}$ and following the definition
of the signal regions and has a high purity of boson events for $N_{\PQb}=0$.
The contribution from processes involving top quarks, mostly single or pair
production of top quarks, is up to 20% in some $N_{\PQb}=0$ CRs. The
contamination is estimated by fitting the $N_{\PQb}$ distribution in each CR
using templates of $\PW{}\text{+jets}$ and top quark events obtained from
simulation. The templates are extracted from simulated boson and top quark
samples, respectively. The number of boson events in each CR,
$N^{\PW}_{\mathrm{CR}}$, is obtained by subtracting from the observed yield,
$N_{\mathrm{CR}}^{\text{obs.}}$, the contribution of top quark events
$N^{\text{top}}_{\mathrm{CR}}$. For the yield $N^{\text{top}}_{\mathrm{CR}}$,
a correction factor obtained from the fit, which is typically close to 1.1, is
taken into account.
We define a transfer factor $R_{\PW}$ to extrapolate from each $N_{\PQb}=0$ CR
to the corresponding $N_{\PQb}=2$ signal region. Simulated samples of boson
processes are used to calculate $R_{\PW}$. Since there are very few events
with an -tagged large-$R$ jet in the control samples, it is not feasible to
form dedicated CRs with $N_{\PH}=1$. Instead, the control samples are
inclusive in $N_{\PH}$, and the extrapolation into $N_{\PH}=0$ and $N_{\PH}=1$
is handled by the $R_{\PW}$ factors. The predicted yield of the boson
background in each of the signal regions, $N^{\PW}_{\mathrm{SR}}$, is
therefore given by
$N^{\PW}_{\mathrm{SR}}(\ptmiss,N_{\text{jets}},N_{\PH})=N^{\PW}_{\mathrm{CR}}(\ptmiss,N_{\text{jets}})R_{\PW}(\ptmiss,N_{\text{jets}},N_{\PH})$
(5)
with
$N^{\PW}_{\mathrm{CR}}(\ptmiss,N_{\text{jets}})=N_{\mathrm{CR}}^{\text{obs.}}(\ptmiss,N_{\text{jets}})-N^{\text{top}}_{\mathrm{CR}}(\ptmiss,N_{\text{jets}}),$
(6)
and $R_{\PW}$ is defined as
$R_{\PW}(\ptmiss,N_{\text{jets}},N_{\PH})=\frac{N^{\PW~{}\textrm{MC}}_{\mathrm{SR}}(\ptmiss,N_{\text{jets}},N_{\PH})}{N^{\PW~{}\textrm{MC}}_{\mathrm{CR}}(\ptmiss,N_{\text{jets}})}.$
(7)
The resulting predictions are shown in Table 0.5.2. Section 0.6 shows a
comparison with the observed yields after combining with the other background
estimates.
The observed ($N_{\mathrm{CR}}^{\text{obs.}}$) and top quark background yield
($N_{\mathrm{CR}}^{\PW}$) in the $\mathrm{CR}$, together with the values of
$R_{\PW}$ for the extrapolation of the boson background from the $\mathrm{CR}$
to the $\mathrm{SR}$, and the final boson prediction, $N^{\PW}_{\mathrm{SR}}$.
The uncertainties in $R_{\PW}$ include the statistical uncertainty only. The
boson prediction shows both the statistical and systematic uncertainties.
$N_{\text{jets}}$ [GeV] $N_{\mathrm{CR}}^{\text{obs.}}$
$N^{\text{top}}_{\mathrm{CR}}$ $N_{\mathrm{CR}}^{\PW}$ $N_{\PH}$
$R_{\PW}\times 10^{3}$ $N^{\PW}_{\mathrm{SR}}$ 2 125–200 449 $65\pm 7$ $384\pm
23$ 0 $1.3\pm 0.6$ $0.5\pm 0.2\pm 0.1$ 200–300 314 $34\pm 45$ $280\pm 19$
$3.6\pm 0.7$ $1.0\pm 0.2\pm 0.2$ 300–400 191 $10\pm 1$ $181\pm 14$ $3.7\pm
0.7$ $0.7\pm 0.1\pm 0.1$ $>$400 110 $2.5\pm 0.7$ $108\pm 11$ $2.8\pm 0.8$
$0.3\pm 0.1\pm 0.1$ 125–300 1 $1.1\pm 0.2$ $0.7\pm 0.2\pm 0.1$ $>$300 $1.7\pm
0.7$ $0.5\pm 0.2\pm 0.2$ 3 125–200 329 $67\pm 5$ $262\pm 19$ 0 $0.9\pm 0.6$
$0.2\pm 0.2\pm 0.1$ 200–300 152 $32\pm 5$ $120\pm 14$ $5.9\pm 1.5$ $0.7\pm
0.2\pm 0.1$ 300–400 81 $7\pm 1$ $74\pm 10$ $9.4\pm 2.6$ $0.7\pm 0.2\pm 0.2$
$>$400 44 $3.7\pm 1.7$ $40\pm 7$ $6.5\pm 1.9$ $0.3\pm 0.1\pm 0.1$ 125–300 1
$2.0\pm 0.5$ $0.8\pm 0.2\pm 0.2$ $>$300 $2.9\pm 1.7$ $0.3\pm 0.2\pm 0.1$
To assess the modeling of heavy-flavor jets in the simulated
$\PW{}\mathrm{+HF}$ samples, we perform a similar extrapolation in $N_{\PQb}$
in a Drell–Yan (DY) validation sample assuming $\PZ\to\ell\ell$. The large
contribution from in the $N_{\PQb}=2$ region is suppressed by requiring two
opposite-charge, same-flavor leptons with an invariant mass compatible with a
boson, $\abs{m(\ell\ell)-m_{\PZ}}<5\GeV$. In the validation sample, the
predicted and observed $\mathrm{DY}\mathrm{+HF}$ yields agree within 20%.
Based on this test, we vary the fraction of $\PW{}\text{+jets}$ events with at
least one generated jet by 20% and assign the resulting variation of $R_{\PW}$
as a systematic uncertainty.
We also study the distribution of $N_{\PQb}$ in a low-control sample, obtained
by selecting events with $\ptmiss>125\GeV$, $50<\mT<150\GeV$,
$N_{\text{jets}}=2$, and without a requirement on $m_{\bbbar}$. The top quark
contribution in this region is largely suppressed by the
$m_{\mathrm{CT}}>200\GeV$ requirement, yielding a sample with a
$\PW{}\mathrm{+HF}$ purity of approximately 40% for $N_{\PQb}=2$. Good
agreement between data and simulation is observed in this region, as shown in
Fig. 4.
Figure 4: Distribution of $N_{\PQb}$ in the low-control sample. The
$\ttbar{}\text{+jets}$ contribution is suppressed by requiring
$m_{\mathrm{CT}}>200\GeV$. The shaded area reflects the statistical
uncertainty in the simulation.
Additional contributions to the uncertainty in the factor $R_{\PW}$ are
evaluated. The difference of the $\PW{}\mathrm{+HF}$ fraction with respect to
the one derived from the $\mathrm{DY}\mathrm{+HF}$ validation test results in
a systematic uncertainty of up to 16% in $R_{\PW}$. Based on the latest
measurements [64, 65, 66] and considering the delicate phase space requiring
significant and $N_{\PQb}=2$, the diboson production cross section is varied
by 25%, yielding a maximum systematic uncertainty of 12%. The uncertainties
from the measurement of the tagging efficiency scale factors are propagated to
the simulated $\PW{}\text{+jets}$ and diboson events resulting in an
uncertainty of up to 10% in $R_{\PW}$. The simulated samples are reweighted
according to the distribution of the true number of interactions per bunch
crossing. The uncertainty in the total inelastic $\Pp{}\Pp{}$ cross section
results in uncertainties of 2–6% in $R_{\PW}$. The uncertainty arising from
the jet energy calibration [67] is assessed by shifting jet momenta in
simulated samples up and down, and propagating the resulting changes to
$R_{\PW}$. Typical values for the systematic uncertainty from the jet energy
scale range from 2–10%, reaching up to 20% for events with a boosted Higgs
boson candidate.
The mistag rate of the tagging algorithm for large-$R$ jets that do not
contain a true is measured in a control sample obtained by requiring low-,
$N_{\PQb}=2$, and at least one large-$R$ jet. Scale factors are measured and
applied to simulation to correct for differences in the observed mistag rates.
The uncertainty in the scale factors is dominated by the limited statistical
precision of the control sample and results in a systematic uncertainty up to
14% in $R_{\PW}$.
The renormalization ($\mu_{\mathrm{R}}$) and factorization
($\mu_{\mathrm{F}}$) scales are varied up and down by a factor of 2, omitting
the combination of variations in opposite directions. The envelope of the
variations reaches values up to 15% and is assigned as systematic uncertainty.
The uncertainties resulting from variations of the PDF and the strong coupling
are less than 2%. The systematic uncertainties in $R_{\PW}$ are summarized in
Table 0.5.2.
Systematic uncertainties on $R_{\PW}$. Source Typical values
$\PW{}\mathrm{+HF}$ fraction 7–16% Diboson cross section 1–12% tagging
efficiency 3–10% mistag rate 3–14% Jet energy scale 2–20% Pileup 1–6% PDF
$<$2% $<$2% $\mu_{\mathrm{R}}$ and $\mu_{\mathrm{F}}$ 3–15%
## 0.6 Results and interpretation
The observed data yields and the expected yields from SM processes in the
signal regions are summarized in Table 0.6. No significant disagreement is
observed. A binned maximum likelihood fit for the SUSY signal strength, the
yields of background events, and various nuisance parameters is performed. The
likelihood function is built using Poisson probability functions for all
signal regions, and log-normal or gamma function PDFs for all nuisance
parameters. Figure 5 shows the post-fit expectation of the SM background.
Combining all signal bins, $51\pm 5$ background events are expected and 49
events are observed.
Summary of the predicted SM background and the observed yield in the signal
regions, together with the expected yields for three signal benchmark models.
The total prediction, $N_{\mathrm{SR}}^{\mathrm{BG}}$, is the sum of the top
quark and boson predictions, $N_{\mathrm{SR}}^{\text{top}}$ and
$N_{\mathrm{SR}}^{\mathrm{\PW}}$, as well as small contributions from standard
model production. The values shown are taken before the signal extraction fit
to the observed yields in the signal regions is performed. The uncertainties
include the statistical and systematic components. For each benchmark model
column, the ordered pairs indicate the masses (in GeV) of the /and ,
respectively. $N_{\text{jets}}$ $N_{\PH}$ [GeV]
$N_{\mathrm{SR}}^{\text{top}}$ $N_{\mathrm{SR}}^{\mathrm{\PW}}$
$N_{\mathrm{SR}}^{\mathrm{BG}}$ Observed
$\PSGczDt\to\PH\PSGczDo,~{}\PSGcpmDo\to\PW^{\pm}\PSGczDo$ 800, 100 425, 150
225, 75 2 0 125–200 6.3 0.5 $6.9\pm 1.3$ 8 $0.08\pm 0.02$ $2.0\pm 0.4$ $2.6\pm
0.8$ 200–300 2.4 1.0 $3.4\pm 0.6$ 2 $0.3\pm 0.1$ $4.5\pm 0.7$ $2.9\pm 0.6$
300–400 0.3 0.7 $1.0\pm 0.3$ 1 $0.3\pm 0.1$ $2.1\pm 0.4$ $0.3\pm 0.2$ $>$400
0.02 0.3 $0.3\pm 0.1$ 1 $0.5\pm 0.2$ $0.4\pm 0.3$ $\leq 0.01$ 1 125–300 1.6
0.7 $2.5\pm 0.9$ 3 $0.5\pm 0.1$ $3.9\pm 0.7$ $2.8\pm 1.0$ $>$300 0.4 0.5
$0.9\pm 0.5$ 1 $2.6\pm 0.4$ $4.3\pm 0.8$ $1.4\pm 0.4$ 3 0 125–200 17.5 0.2
$17.8\pm 3.0$ 17 $0.05\pm 0.02$ $1.0\pm 0.2$ $2.9\pm 0.6$ 200–300 7.1 0.7
$7.8\pm 1.7$ 6 $0.14\pm 0.03$ $2.6\pm 0.3$ $2.1\pm 0.5$ 300–400 0.8 0.7
$1.5\pm 0.5$ 0 $0.18\pm 0.04$ $1.2\pm 0.4$ $0.4\pm 0.4$ $>$400 0.2 0.3 $0.5\pm
0.3$ 0 $0.3\pm 0.1$ $0.3\pm 0.2$ $0.06\pm 0.06$ 1 125–300 5.0 0.8 $5.9\pm 2.1$
10 $0.4\pm 0.1$ $2.6\pm 0.5$ $2.0\pm 0.6$ $>$300 1.7 0.3 $2.1\pm 1.6$ 0
$1.5\pm 0.2$ $2.4\pm 0.5$ $0.6\pm 0.2$
Figure 5: Predictions of the SM background after performing the signal
extraction fit (filled histograms) and observed yields in the signal regions.
Three signal models with different values of $m_{\PSGczDt/\PSGcpmDo}$ and
$m_{\PSGczDo}$ are shown as solid, short dashed, and long dashed lines. The
lower panel provides the ratio between the observation and the predicted SM
backgrounds. The shaded band shows the post-fit combination of the systematic
and statistical uncertainties in the background prediction.
We next evaluate the experimental and theoretical uncertainties in the
expected signal yield. Varying the lepton, tagging, and tagging efficiency
scale factors by their respective uncertainties varies the signal yield by
less than 1, 4, and 20%. For the tagger, this scale factor is measured as a
function of the candidate using a sample of jets in data and simulation that
mimic the rare $\PH\to\PQb\PAQb$ case [60].
The efficiencies obtained using the fast or full detector simulation are found
to be compatible, with no significant dependence on the mass splitting $\Delta
m=m_{\PSGczDt/\PSGcpmDo}-m_{\PSGczDo}$. The systematic uncertainty in the
signal yields, due to the uncertainty in the trigger efficiency measurement,
is generally less than 5%.
The uncertainties in the simulated yields obtained by varying the jet energy
scale and the jet energy resolution are each between 1 and 7%. A 3% difference
in the jet energy scale between the fast and full detector simulations is
observed, resulting in a 1–10% change in the expected signal yield.
The effect of missing higher-order corrections on the signal acceptance is
estimated by varying $\mu_{\mathrm{R}}$ and $\mu_{\mathrm{F}}$ [68, 69, 70] up
and down by a factor of 2, omitting the combination of variations in opposite
directions. The envelope of the variations reaches values up to 15% and is
assigned as a systematic uncertainty. The resulting variation of the expected
signal yield is less than 1%. To account for uncertainty in the modeling of
the multiplicity of additional jets from initial state radiation, a 1%
uncertainty is applied to the $N_{\text{jets}}=3$ signal regions.
The integrated luminosities of the 2016, 2017, and 2018 data-taking periods
are individually known with uncertainties in the 2.3–2.5% range [71, 72, 73],
while the total Run 2 (2016–2018) integrated luminosity has an uncertainty of
1.8%, the improvement in precision reflecting the (uncorrelated) time
evolution of some systematic effects. The signal samples are reweighted
according to the distribution of the true number of interactions per bunch
crossing. The uncertainty in the total inelastic $\Pp{}\Pp{}$ cross section
leads to changes in the expected signal yield of less than 2%. A summary of
the systematic uncertainties in the signal yields is given in Table 0.6.
Sources and ranges of systematic uncertainties on the expected signal yields.
The ranges reported reflect the magnitudes of the median 68% of all impacts,
considering the distribution of variations in all 12 signal regions and the
full range of signal mass hypotheses used. When the lower bound is very close
to 0, an upper bound is shown instead. Source Typical values Simulation
statistical uncertainty 1–10% Lepton efficiency $<$1% tagging efficiency $<$4%
tagging efficiency 7–20% Trigger efficiency $<$5% Jet energy scale 1–7% Jet
energy resolution 1–7% jet energy scale 1–10% $\mu_{\mathrm{R}}$ and
$\mu_{\mathrm{F}}$ $<$1% Initial-state radiation 1% Integrated luminosity 1.8%
Pileup $<$2%
The results are interpreted in the context of the simplified SUSY model shown
in Fig. 1. The chargino and second-lightest neutralino are assumed to have the
same mass, and the branching fractions for the decays shown are taken to be
100%. Wino-like cross sections are assumed. Cross section limits as a function
of the masses of the produced particles are set using a modified frequentist
approach at 95% confidence level (), with the criterion and an asymptotic
formulation [74, 75, 76]. All signal regions are considered simultaneously and
correlations among uncertainties are included.
Figure 6 shows the 95% upper limits on the cross section, together with the
expected and observed exclusion limits in the $m_{\PSGczDo}$-$m_{\PSGczDt}$
plane for chargino-neutralino production.
This analysis excludes charginos with mass below 820for a low-mass LSP, and
values of the LSP mass up to approximately 350for a chargino mass near 700.
The excluded cross section for models with large mass splitting reaches
approximately 5fb.
Figure 6: Cross section upper limits calculated with the background estimates
and all of the background systematic uncertainties described in Sections 0.5.1
and 0.5.2. The color on the $z$ axis represents the 95% CL upper limit on the
cross section calculated at each point in the $m_{\PSGczDo}$-$m_{\PSGczDt}$
plane. The area below the thick black curve (dashed red line) represents the
observed (expected) exclusion region at this . The region containing 68% of
the distribution of limits expected under the background-only hypothesis is
bounded by thin dashed red lines. The thin black lines show the effect of the
theoretical uncertainties in the signal cross section.
## 0.7 Summary
This paper presents the results of a search for chargino-neutralino production
in a final state containing a boson decaying to leptons, a Higgs boson
decaying to a bottom quark-antiquark pair, and missing transverse momentum.
Expected yields from standard model processes are estimated by extrapolating
the yields observed in control regions using transfer factors obtained from
simulation. The observed yields agree with those expected from the standard
model. The results are interpreted as an exclusion of a simplified model of
chargino-neutralino production. In the simplified model, the chargino decays
to a boson and a lightest supersymmetric particle (LSP), and the next-to-
lightest neutralino decays to a Higgs boson and an LSP. Charginos with mass
below 820are excluded at 95% confidence level for an LSP with mass below 200,
and values of LSP mass up to approximately 350are excluded for a chargino mass
near 700.
Relative to the previous result from the CMS Collaboration targeting this
signature [12], the sensitivity of the search has been significantly extended.
The constraints on the masses of the chargino and LSP exceed those from the
previous analysis by nearly 350 and 250, respectively. This represents a
factor of 14 reduction in the excluded cross section for models with large
mass splittings. Roughly half of this improvement is the result of the four-
fold increase in integrated luminosity, with the remainder coming from
analysis optimizations such as the inclusion of the tagger and events with
$N_{\text{jets}}=3$, as well as finer categorization of events based on made
possible by the increased size of the data set.
###### Acknowledgements.
We congratulate our colleagues in the CERN accelerator departments for the
excellent performance of the LHC and thank the technical and administrative
staffs at CERN and at other CMS institutes for their contributions to the
success of the CMS effort. In addition, we gratefully acknowledge the
computing centers and personnel of the Worldwide LHC Computing Grid and other
centers for delivering so effectively the computing infrastructure essential
to our analyses. Finally, we acknowledge the enduring support for the
construction and operation of the LHC, the CMS detector, and the supporting
computing infrastructure provided by the following funding agencies: BMBWF and
FWF (Austria); FNRS and FWO (Belgium); CNPq, CAPES, FAPERJ, FAPERGS, and
FAPESP (Brazil); MES (Bulgaria); CERN; CAS, MoST, and NSFC (China);
MINCIENCIAS (Colombia); MSES and CSF (Croatia); RIF (Cyprus); SENESCYT
(Ecuador); MoER, ERC PUT and ERDF (Estonia); Academy of Finland, MEC, and HIP
(Finland); CEA and CNRS/IN2P3 (France); BMBF, DFG, and HGF (Germany); GSRT
(Greece); NKFIA (Hungary); DAE and DST (India); IPM (Iran); SFI (Ireland);
INFN (Italy); MSIP and NRF (Republic of Korea); MES (Latvia); LAS (Lithuania);
MOE and UM (Malaysia); BUAP, CINVESTAV, CONACYT, LNS, SEP, and UASLP-FAI
(Mexico); MOS (Montenegro); MBIE (New Zealand); PAEC (Pakistan); MSHE and NSC
(Poland); FCT (Portugal); JINR (Dubna); MON, RosAtom, RAS, RFBR, and NRC KI
(Russia); MESTD (Serbia); SEIDI, CPAN, PCTI, and FEDER (Spain); MOSTR (Sri
Lanka); Swiss Funding Agencies (Switzerland); MST (Taipei); ThEPCenter, IPST,
STAR, and NSTDA (Thailand); TUBITAK and TAEK (Turkey); NASU (Ukraine); STFC
(United Kingdom); DOE and NSF (USA). Individuals have received support from
the Marie-Curie program and the European Research Council and Horizon 2020
Grant, contract Nos. 675440, 724704, 752730, 758316, 765710, 824093, and COST
Action CA16108 (European Union); the Leventis Foundation; the Alfred P. Sloan
Foundation; the Alexander von Humboldt Foundation; the Belgian Federal Science
Policy Office; the Fonds pour la Formation à la Recherche dans l’Industrie et
dans l’Agriculture (FRIA-Belgium); the Agentschap voor Innovatie door
Wetenschap en Technologie (IWT-Belgium); the F.R.S.-FNRS and FWO (Belgium)
under the “Excellence of Science – EOS” – be.h project n. 30820817; the
Beijing Municipal Science & Technology Commission, No. Z191100007219010; the
Ministry of Education, Youth and Sports (MEYS) of the Czech Republic; the
Deutsche Forschungsgemeinschaft (DFG), under Germany’s Excellence Strategy –
EXC 2121 “Quantum Universe” – 390833306, and under project number 400140256 -
GRK2497; the Lendület (“Momentum”) Program and the János Bolyai Research
Scholarship of the Hungarian Academy of Sciences, the New National Excellence
Program ÚNKP, the NKFIA research grants 123842, 123959, 124845, 124850,
125105, 128713, 128786, and 129058 (Hungary); the Council of Science and
Industrial Research, India; the Latvian Council of Science; the Ministry of
Science and Higher Education and the National Science Center, contracts Opus
2014/15/B/ST2/03998 and 2015/19/B/ST2/02861 (Poland); the National Priorities
Research Program by Qatar National Research Fund; the Ministry of Science and
Higher Education, project no. 0723-2020-0041 (Russia); the Programa Estatal de
Fomento de la Investigación Científica y Técnica de Excelencia María de
Maeztu, grant MDM-2015-0509 and the Programa Severo Ochoa del Principado de
Asturias; the Stavros Niarchos Foundation (Greece); the Rachadapisek Sompot
Fund for Postdoctoral Fellowship, Chulalongkorn University and the
Chulalongkorn Academic into Its 2nd Century Project Advancement Project
(Thailand); the Kavli Foundation; the Nvidia Corporation; the SuperMicro
Corporation; the Welch Foundation, contract C-1845; and the Weston Havens
Foundation (USA).
## References
* [1] P. Ramond, “Dual theory for free fermions”, Phys. Rev. D 3 (1971) 2415, 10.1103/PhysRevD.3.2415.
* [2] J. Wess and B. Zumino, “Supergauge transformations in four dimensions”, Nucl. Phys. B 70 (1974) 39, 10.1016/0550-3213(74)90355-1.
* [3] H. P. Nilles, “Supersymmetry, supergravity and particle physics”, Phys. Rept. 110 (1984) 1, 10.1016/0370-1573(84)90008-5.
* [4] B. de Carlos and J. A. Casas, “One-loop analysis of the electroweak breaking in supersymmetric models and the fine tuning problem”, Phys. Lett. B 309 (1993) 320, 10.1016/0370-2693(93)90940-J, arXiv:hep-ph/9303291.
* [5] S. Dimopoulos and G. F. Giudice, “Naturalness constraints in supersymmetric theories with nonuniversal soft terms”, Phys. Lett. B 357 (1995) 573, 10.1016/0370-2693(95)00961-J, arXiv:hep-ph/9507282.
* [6] G. R. Farrar and P. Fayet, “Phenomenology of the production, decay, and detection of new hadronic states associated with supersymmetry”, Phys. Lett. B 76 (1978) 575, 10.1016/0370-2693(78)90858-4.
* [7] J. Alwall, P. Schuster, and N. Toro, “Simplified models for a first characterization of new physics at the LHC”, Phys. Rev. D 79 (2009) 075020, 10.1103/PhysRevD.79.075020, arXiv:0810.3921.
* [8] LHC New Physics Working Group, “Simplified models for LHC new physics searches”, J. Phys. G 39 (2012) 105005, 10.1088/0954-3899/39/10/105005, arXiv:1105.2838.
* [9] CMS Collaboration, “Interpretation of searches for supersymmetry with simplified models”, Phys. Rev. D 88 (2013) 052017, 10.1103/PhysRevD.88.052017, arXiv:1301.2175.
* [10] ATLAS Collaboration, “Search for direct production of electroweakinos in final states with one lepton, missing transverse momentum and a Higgs boson decaying into two b-jets in pp collisions $\sqrt{s}=$ 13 TeV with the ATLAS detector”, Eur. Phys. J. C 80 (2020) 691, 10.1140/epjc/s10052-020-8050-3, arXiv:1909.09226.
* [11] ATLAS Collaboration, “Search for the electroweak production of supersymmetric particles in $\sqrt{s}$ = 8 TeV $pp$ collisions with the ATLAS detector”, Phys. Rev. D 93 (2016) 052002, 10.1103/PhysRevD.93.052002, arXiv:1509.07152.
* [12] CMS Collaboration, “Search for electroweak production of charginos and neutralinos in WH events in proton-proton collisions at $\sqrt{s}=13$ TeV”, JHEP 11 (2017) 029, 10.1007/JHEP11(2017)029, arXiv:1706.09933.
* [13] CMS Collaboration, “Searches for electroweak neutralino and chargino production in channels with Higgs, Z, and W bosons in pp collisions at 8 TeV”, Phys. Rev. D 90 (2014) 092007, 10.1103/PhysRevD.90.092007, arXiv:1409.3168.
* [14] CMS Collaboration, “Searches for electroweak production of charginos, neutralinos, and sleptons decaying to leptons and W, Z, and Higgs bosons in pp collisions at 8 TeV”, Eur. Phys. J. C 74 (2014) 3036, 10.1140/epjc/s10052-014-3036-7, arXiv:1405.7570.
* [15] CMS Collaboration, “The CMS experiment at the CERN LHC”, JINST 3 (2008) S08004, 10.1088/1748-0221/3/08/S08004.
* [16] CMS Collaboration, “Performance of the CMS Level-1 trigger in proton-proton collisions at $\sqrt{s}=13$ TeV”, JINST 15 (2020) P10017, 10.1088/1748-0221/15/10/P10017, arXiv:2006.10165.
* [17] CMS Collaboration, “The CMS trigger system”, JINST 12 (2017) P01020, 10.1088/1748-0221/12/01/P01020, arXiv:1609.02366.
* [18] J. Alwall et al., “The automated computation of tree-level and next-to-leading order differential cross sections, and their matching to parton shower simulations”, JHEP 07 (2014) 079, 10.1007/JHEP07(2014)079, arXiv:1405.0301.
* [19] P. Nason, “A new method for combining NLO QCD with shower Monte Carlo algorithms”, JHEP 11 (2004) 040, 10.1088/1126-6708/2004/11/040, arXiv:hep-ph/0409146.
* [20] S. Frixione, P. Nason, and C. Oleari, “Matching NLO QCD computations with parton shower simulations: the method”, JHEP 11 (2007) 070, 10.1088/1126-6708/2007/11/070, arXiv:0709.2092.
* [21] S. Alioli, P. Nason, C. Oleari, and E. Re, “A general framework for implementing NLO calculations in shower Monte Carlo programs: the BOX”, JHEP 06 (2010) 043, 10.1007/JHEP06(2010)043, arXiv:1002.2581.
* [22] E. Re, “Single-top $\PW\PQt$-channel production matched with parton showers using the POWHEG method”, Eur. Phys. J. C 71 (2011) 1547, 10.1140/epjc/s10052-011-1547-z, arXiv:1009.2450.
* [23] NNPDF Collaboration, “Unbiased global determination of parton distributions and their uncertainties at NNLO and at LO”, Nucl. Phys. B 855 (2012) 153, 10.1016/j.nuclphysb.2011.09.024, arXiv:1107.2652.
* [24] NNPDF Collaboration, “Parton distributions for the LHC Run II”, JHEP 04 (2015) 040, 10.1007/JHEP04(2015)040, arXiv:1410.8849.
* [25] NNPDF Collaboration, “Parton distributions from high-precision collider data”, Eur. Phys. J. C 77 (2017) 663, 10.1140/epjc/s10052-017-5199-5, arXiv:1706.00428.
* [26] T. Sjöstrand et al., “An introduction to PYTHIA 8.2”, Comput. Phys. Commun. 191 (2015) 159, 10.1016/j.cpc.2015.01.024, arXiv:1410.3012.
* [27] J. Alwall et al., “Comparative study of various algorithms for the merging of parton showers and matrix elements in hadronic collisions”, Eur. Phys. J. C 53 (2008) 473, 10.1140/epjc/s10052-007-0490-5, arXiv:0706.2569.
* [28] R. Frederix and S. Frixione, “Merging meets matching in MC@NLO”, JHEP 12 (2012) 061, 10.1007/JHEP12(2012)061, arXiv:1209.6215.
* [29] CMS Collaboration, “Event generator tunes obtained from underlying event and multiparton scattering measurements”, Eur. Phys. J. C 76 (2016) 155, 10.1140/epjc/s10052-016-3988-x, arXiv:1512.00815.
* [30] CMS Collaboration, “Extraction and validation of a new set of CMS PYTHIA8 tunes from underlying-event measurements”, Eur. Phys. J. C 80 (2020) 4, 10.1140/epjc/s10052-019-7499-4, arXiv:1903.12179.
* [31] Collaboration, “ — a simulation toolkit”, Nucl. Instrum. Meth. A 506 (2003) 250, 10.1016/S0168-9002(03)01368-8.
* [32] S. Abdullin et al., “The fast simulation of the CMS detector at LHC”, J. Phys. Conf. Ser. 331 (2011) 032049, 10.1088/1742-6596/331/3/032049.
* [33] A. Giammanco, “The fast simulation of the CMS experiment”, J. Phys. Conf. Ser. 513 (2014) 022012, 10.1088/1742-6596/513/2/022012.
* [34] Y. Li and F. Petriello, “Combining QCD and electroweak corrections to dilepton production in FEWZ”, Phys. Rev. D 86 (2012) 094034, 10.1103/PhysRevD.86.094034, arXiv:1208.5967.
* [35] M. Aliev et al., “HATHOR: HAdronic Top and Heavy quarks crOss section calculatoR”, Comput. Phys. Commun. 182 (2011) 1034, 10.1016/j.cpc.2010.12.040, arXiv:1007.1327.
* [36] P. Kant et al., “HatHor for single top-quark production: Updated predictions and uncertainty estimates for single top-quark production in hadronic collisions”, Comput. Phys. Commun. 191 (2015) 74, 10.1016/j.cpc.2015.02.001, arXiv:1406.4403.
* [37] M. Beneke, P. Falgari, S. Klein, and C. Schwinn, “Hadronic top-quark pair production with NNLL threshold resummation”, Nucl. Phys. B 855 (2012) 695, 10.1016/j.nuclphysb.2011.10.021, arXiv:1109.1536.
* [38] M. Cacciari et al., “Top-pair production at hadron colliders with next-to-next-to-leading logarithmic soft-gluon resummation”, Phys. Lett. B 710 (2012) 612, 10.1016/j.physletb.2012.03.013, arXiv:1111.5869.
* [39] M. Czakon and A. Mitov, “Top++: A program for the calculation of the top-pair cross-section at hadron colliders”, Comput. Phys. Commun. 185 (2014) 2930, 10.1016/j.cpc.2014.06.021, arXiv:1112.5675.
* [40] P. Bärnreuther, M. Czakon, and A. Mitov, “Percent level precision physics at the Tevatron: First genuine NNLO QCD corrections to $q\bar{q}\to t\bar{t}+X$”, Phys. Rev. Lett. 109 (2012) 132001, 10.1103/PhysRevLett.109.132001, arXiv:1204.5201.
* [41] M. Czakon and A. Mitov, “NNLO corrections to top-pair production at hadron colliders: the all-fermionic scattering channels”, JHEP 12 (2012) 054, 10.1007/JHEP12(2012)054, arXiv:1207.0236.
* [42] M. Czakon and A. Mitov, “NNLO corrections to top pair production at hadron colliders: the quark-gluon reaction”, JHEP 01 (2013) 080, 10.1007/JHEP01(2013)080, arXiv:1210.6832.
* [43] M. Czakon, P. Fiedler, and A. Mitov, “Total top-quark pair-production cross section at hadron colliders through $O(\alpS^{4})$”, Phys. Rev. Lett. 110 (2013) 252004, 10.1103/PhysRevLett.110.252004, arXiv:1303.6254.
* [44] W. Beenakker, M. Klasen, and Kr “Production of charginos, neutralinos, and sleptons at hadron colliders”,.
* [45] J. Debove, B. Fuks, and M. Klasen, “Threshold resummation for gaugino pair production at hadron colliders”, Nuc. Phys. B 842 (2011) 10.1016/j.nuclphysb.2010.08.016, arXiv:1005.2909.
* [46] B. Fuks, M. Klasen, D. R. Lamprea, and M. Rothering, “Precision predictions for electroweak superpartner production at hadron colliders with resummino”, Eur. Phys. J. C 73 (2013) 2480, 10.1140/epjc/s10052-013-2480-0, arXiv:1304.0790.
* [47] J. Fiaschi and M. Klasen, “Neutralino-chargino pair production at $\mathrm{NLO}\text{+NLL}$ with resummation-improved parton density functions for LHC Run II”, Phys. Rev. D 98 (2018) 055014, 10.1103/PhysRevD.98.055014, arXiv:1805.11322.
* [48] LHC Higgs Cross Section Working Group, “Handbook of LHC Higgs cross sections: 4. Deciphering the nature of the Higgs sector”, CERN Report CERN-2017-002-M, 2016. 10.23731/CYRM-2017-002, arXiv:1610.07922.
* [49] CMS Collaboration, “Search for direct top squark pair production in events with one lepton, jets, and missing transverse momentum at 13 TeV with the CMS experiment”, JHEP 05 (2020) 032, 10.1007/jhep05(2020)032, arXiv:1912.08887.
* [50] CMS Collaboration, “Particle-flow reconstruction and global event description with the CMS detector”, JINST 12 (2017) P10003, 10.1088/1748-0221/12/10/P10003, arXiv:1706.04965.
* [51] CMS Collaboration, “Performance of missing transverse momentum reconstruction in proton-proton collisions at $\sqrt{s}=$ 13 TeV using the CMS detector”, JINST 14 (2019) P07004, 10.1088/1748-0221/14/07/P07004, arXiv:1903.06078.
* [52] CMS Collaboration, “Electron and photon reconstruction and identification with the CMS experiment at the CERN LHC”, JINST 16 (2021) P05014, 10.1088/1748-0221/16/05/p05014, arXiv:2012.06888.
* [53] CMS Collaboration, “Performance of the CMS muon detector and muon reconstruction with proton-proton collisions at $\sqrt{s}=13\TeV$”, JINST 13 (2018) P06015, 10.1088/1748-0221/13/06/P06015, arXiv:1804.04528.
* [54] CMS Collaboration, “Reconstruction and identification of $\tau$ lepton decays to hadrons and $\nu$τ at CMS”, JINST 11 (2016) P01019, 10.1088/1748-0221/11/01/P01019, arXiv:1510.07488.
* [55] CMS Collaboration, “Performance of reconstruction and identification of $\uptau$ leptons decaying to hadrons and $\nu$τ in pp collisions at $\sqrt{s}=13$ TeV”, JINST 13 (2018) P10005, 10.1088/1748-0221/13/10/p10005, arXiv:1809.02816.
* [56] M. Cacciari, G. P. Salam, and G. Soyez, “The anti-$\kt$ jet clustering algorithm”, JHEP 04 (2008) 063, 10.1088/1126-6708/2008/04/063, arXiv:0802.1189.
* [57] M. Cacciari, G. P. Salam, and G. Soyez, “FastJet user manual”, Eur. Phys. J. C 72 (2012) 1896, 10.1140/epjc/s10052-012-1896-2, arXiv:1111.6097.
* [58] CMS Collaboration, “Determination of jet energy calibration and transverse momentum resolution in CMS”, JINST 6 (2011) P11002, 10.1088/1748-0221/6/11/P11002, arXiv:1107.4277.
* [59] CMS Collaboration, “Identification of heavy-flavour jets with the CMS detector in $\Pp\Pp$ collisions at 13 TeV”, JINST 13 (2018) P05011, 10.1088/1748-0221/13/05/P05011, arXiv:1712.07158.
* [60] CMS Collaboration, “Identification of heavy, energetic, hadronically decaying particles using machine-learning techniques”, JINST 15 (2020) P06005, 10.1088/1748-0221/15/06/P06005, arXiv:2004.08262.
* [61] CMS Collaboration, “Missing transverse energy performance of the CMS detector”, JINST 6 (2011) P09001, 10.1088/1748-0221/6/09/P09001, arXiv:1106.5048.
* [62] D. R. Tovey, “On measuring the masses of pair-produced semi-invisibly decaying particles at hadron colliders”, JHEP 04 (2008) 034, 10.1088/1126-6708/2008/04/034, arXiv:0802.2879.
* [63] CMS Collaboration, “Observation of Higgs boson decay to bottom quarks”, Phys. Rev. Lett. 121 (2018) 121801, 10.1103/PhysRevLett.121.121801, arXiv:1808.08242.
* [64] CMS Collaboration, “Measurements of the pp $\to$ WZ inclusive and differential production cross section and constraints on charged anomalous triple gauge couplings at $\sqrt{s}=$ 13 TeV”, JHEP 04 (2019) 122, 10.1007/JHEP04(2019)122, arXiv:1901.03428.
* [65] CMS Collaboration, “W+W- boson pair production in proton-proton collisions at $\sqrt{s}=$ 13 TeV”, Phys. Rev. D 102 (2020) 092001, 10.1103/PhysRevD.102.092001, arXiv:2009.00119.
* [66] CMS Collaboration, “Measurements of ${\mathrm{p}}{\mathrm{p}}\rightarrow{\mathrm{Z}}{\mathrm{Z}}$ production cross sections and constraints on anomalous triple gauge couplings at $\sqrt{s}=13\,\text{TeV}$”, Eur. Phys. J. C 81 (2021) 200, 10.1140/epjc/s10052-020-08817-8, arXiv:2009.01186.
* [67] CMS Collaboration, “Jet energy scale and resolution performance with 13 TeV data collected by CMS in 2016-2018”, CMS Detector Performance Summary, CMS-DP-2020-019, 2020.
* [68] S. Catani, D. de Florian, M. Grazzini, and P. Nason, “Soft gluon resummation for Higgs boson production at hadron colliders”, JHEP 07 (2003) 028, 10.1088/1126-6708/2003/07/028, arXiv:hep-ph/0306211.
* [69] M. Cacciari et al., “The cross-section at 1.8 TeV and 1.96 TeV: A study of the systematics due to parton densities and scale dependence”, JHEP 04 (2004) 068, 10.1088/1126-6708/2004/04/068, arXiv:hep-ph/0303085.
* [70] A. Kalogeropoulos and J. Alwall, “The SysCalc code: A tool to derive theoretical systematic uncertainties”, 2018. arXiv:1801.08401.
* [71] CMS Collaboration, “CMS luminosity measurements for the 2016 data-taking period”, CMS Physics Analysis Summary, CMS-PAS-LUM-17-001, 2017.
* [72] CMS Collaboration, “CMS luminosity measurement for the 2017 data-taking period at $\sqrt{s}=13~{}\mathrm{TeV}$”, CMS Physics Analysis Summary, CMS-PAS-LUM-17-004, 2018\.
* [73] CMS Collaboration, “CMS luminosity measurement for the 2018 data-taking period at $\sqrt{s}=13~{}\mathrm{TeV}$”, CMS Physics Analysis Summary, CMS-PAS-LUM-18-002, 2019\.
* [74] T. Junk, “Confidence level computation for combining searches with small statistics”, Nucl. Instrum. Meth. A 434 (1999) 435, 10.1016/s0168-9002(99)00498-2.
* [75] A. L. Read, “Presentation of search results: the $\CL_{s}$ technique”, J. Phys. G 28 (2002) 2693, 10.1088/0954-3899/28/10/313.
* [76] G. Cowan, K. Cranmer, E. Gross, and O. Vitells, “Asymptotic formulae for likelihood-based tests of new physics”, Eur. Phys. J. C 71 (2011) 1554, 10.1140/epjc/s10052-011-1554-0, arXiv:1007.1727. [Erratum: 10.1140/epjc/s10052-013-2501-z].
## .8 The CMS Collaboration
Yerevan Physics Institute, Yerevan, Armenia
A. Tumasyan Institut für Hochenergiephysik, Wien, Austria
W. Adam, J.W. Andrejkovic, T. Bergauer, S. Chatterjee, M. Dragicevic, A.
Escalante Del Valle, R. Frühwirth1, M. Jeitler1, N. Krammer, L. Lechner, D.
Liko, I. Mikulec, P. Paulitsch, F.M. Pitters, J. Schieck1, R. Schöfbeck, M.
Spanring, S. Templ, W. Waltenberger, C.-E. Wulz1 Institute for Nuclear
Problems, Minsk, Belarus
V. Chekhovsky, A. Litomin, V. Makarenko Universiteit Antwerpen, Antwerpen,
Belgium
M.R. Darwish2, E.A. De Wolf, X. Janssen, T. Kello3, A. Lelek, H. Rejeb Sfar,
P. Van Mechelen, S. Van Putte, N. Van Remortel Vrije Universiteit Brussel,
Brussel, Belgium
F. Blekman, E.S. Bols, J. D’Hondt, J. De Clercq, M. Delcourt, H. El Faham, S.
Lowette, S. Moortgat, A. Morton, D. Müller, A.R. Sahasransu, S. Tavernier, W.
Van Doninck, P. Van Mulders Université Libre de Bruxelles, Bruxelles, Belgium
D. Beghin, B. Bilin, B. Clerbaux, G. De Lentdecker, L. Favart, A. Grebenyuk,
A.K. Kalsi, K. Lee, M. Mahdavikhorrami, I. Makarenko, L. Moureaux, L. Pétré,
A. Popov, N. Postiau, E. Starling, L. Thomas, M. Vanden Bemden, C. Vander
Velde, P. Vanlaer, D. Vannerom, L. Wezenbeek Ghent University, Ghent, Belgium
T. Cornelis, D. Dobur, J. Knolle, L. Lambrecht, G. Mestdach, M. Niedziela, C.
Roskas, A. Samalan, K. Skovpen, M. Tytgat, W. Verbeke, B. Vermassen, M. Vit
Université Catholique de Louvain, Louvain-la-Neuve, Belgium
A. Bethani, G. Bruno, F. Bury, C. Caputo, P. David, C. Delaere, I.S. Donertas,
A. Giammanco, K. Jaffel, Sa. Jain, V. Lemaitre, K. Mondal, J. Prisciandaro, A.
Taliercio, M. Teklishyn, T.T. Tran, P. Vischia, S. Wertz Centro Brasileiro de
Pesquisas Fisicas, Rio de Janeiro, Brazil
G.A. Alves, C. Hensel, A. Moraes Universidade do Estado do Rio de Janeiro, Rio
de Janeiro, Brazil
W.L. Aldá Júnior, M. Alves Gallo Pereira, M. Barroso Ferreira Filho, H.
BRANDAO MALBOUISSON, W. Carvalho, J. Chinellato4, E.M. Da Costa, G.G. Da
Silveira5, D. De Jesus Damiao, S. Fonseca De Souza, D. Matos Figueiredo, C.
Mora Herrera, K. Mota Amarilo, L. Mundim, H. Nogima, P. Rebello Teles, A.
Santoro, S.M. Silva Do Amaral, A. Sznajder, M. Thiel, F. Torres Da Silva De
Araujo, A. Vilela Pereira Universidade Estadual Paulista a, Universidade
Federal do ABC b, São Paulo, Brazil
C.A. Bernardesa,a,5, L. Calligarisa, T.R. Fernandez Perez Tomeia, E.M.
Gregoresa,b, D.S. Lemosa, P.G. Mercadantea,b, S.F. Novaesa, Sandra S. Padulaa
Institute for Nuclear Research and Nuclear Energy, Bulgarian Academy of
Sciences, Sofia, Bulgaria
A. Aleksandrov, G. Antchev, R. Hadjiiska, P. Iaydjiev, M. Misheva, M. Rodozov,
M. Shopova, G. Sultanov University of Sofia, Sofia, Bulgaria
A. Dimitrov, T. Ivanov, L. Litov, B. Pavlov, P. Petkov, A. Petrov Beihang
University, Beijing, China
T. Cheng, Q. Guo, T. Javaid6, M. Mittal, H. Wang, L. Yuan Department of
Physics, Tsinghua University, Beijing, China
M. Ahmad, G. Bauer, C. Dozen7, Z. Hu, J. Martins8, Y. Wang, K. Yi9,10
Institute of High Energy Physics, Beijing, China
E. Chapon, G.M. Chen6, H.S. Chen6, M. Chen, F. Iemmi, A. Kapoor, D. Leggat, H.
Liao, Z.-A. LIU6, V. Milosevic, F. Monti, R. Sharma, J. Tao, J. Thomas-
wilsker, J. Wang, H. Zhang, S. Zhang6, J. Zhao State Key Laboratory of Nuclear
Physics and Technology, Peking University, Beijing, China
A. Agapitos, Y. Ban, C. Chen, Q. Huang, A. Levin, Q. Li, X. Lyu, Y. Mao, S.J.
Qian, D. Wang, Q. Wang, J. Xiao Sun Yat-Sen University, Guangzhou, China
M. Lu, Z. You Institute of Modern Physics and Key Laboratory of Nuclear
Physics and Ion-beam Application (MOE) - Fudan University, Shanghai, China
X. Gao3, H. Okawa Zhejiang University, Hangzhou, China
Z. Lin, M. Xiao Universidad de Los Andes, Bogota, Colombia
C. Avila, A. Cabrera, C. Florez, J. Fraga, A. Sarkar, M.A. Segura Delgado
Universidad de Antioquia, Medellin, Colombia
J. Mejia Guisao, F. Ramirez, J.D. Ruiz Alvarez, C.A. Salazar González
University of Split, Faculty of Electrical Engineering, Mechanical Engineering
and Naval Architecture, Split, Croatia
D. Giljanovic, N. Godinovic, D. Lelas, I. Puljak University of Split, Faculty
of Science, Split, Croatia
Z. Antunovic, M. Kovac, T. Sculac Institute Rudjer Boskovic, Zagreb, Croatia
V. Brigljevic, D. Ferencek, D. Majumder, M. Roguljic, A. Starodumov11, T. Susa
University of Cyprus, Nicosia, Cyprus
A. Attikis, K. Christoforou, E. Erodotou, A. Ioannou, G. Kole, M. Kolosova, S.
Konstantinou, J. Mousa, C. Nicolaou, F. Ptochos, P.A. Razis, H. Rykaczewski,
H. Saka Charles University, Prague, Czech Republic
M. Finger12, M. Finger Jr.12, A. Kveton Escuela Politecnica Nacional, Quito,
Ecuador
E. Ayala Universidad San Francisco de Quito, Quito, Ecuador
E. Carrera Jarrin Academy of Scientific Research and Technology of the Arab
Republic of Egypt, Egyptian Network of High Energy Physics, Cairo, Egypt
A.A. Abdelalim13,14, E. Salama15,16 Center for High Energy Physics (CHEP-FU),
Fayoum University, El-Fayoum, Egypt
M.A. Mahmoud, Y. Mohammed National Institute of Chemical Physics and
Biophysics, Tallinn, Estonia
S. Bhowmik, A. Carvalho Antunes De Oliveira, R.K. Dewanjee, K. Ehataht, M.
Kadastik, S. Nandan, C. Nielsen, J. Pata, M. Raidal, L. Tani, C. Veelken
Department of Physics, University of Helsinki, Helsinki, Finland
P. Eerola, L. Forthomme, H. Kirschenmann, K. Osterberg, M. Voutilainen
Helsinki Institute of Physics, Helsinki, Finland
S. Bharthuar, E. Brücken, F. Garcia, J. Havukainen, M.S. Kim, R. Kinnunen, T.
Lampén, K. Lassila-Perini, S. Lehti, T. Lindén, M. Lotti, L. Martikainen, M.
Myllymäki, J. Ott, H. Siikonen, E. Tuominen, J. Tuominiemi Lappeenranta
University of Technology, Lappeenranta, Finland
P. Luukka, H. Petrow, T. Tuuva IRFU, CEA, Université Paris-Saclay, Gif-sur-
Yvette, France
C. Amendola, M. Besancon, F. Couderc, M. Dejardin, D. Denegri, J.L. Faure, F.
Ferri, S. Ganjour, A. Givernaud, P. Gras, G. Hamel de Monchenault, P. Jarry,
B. Lenzi, E. Locci, J. Malcles, J. Rander, A. Rosowsky, M.Ö. Sahin, A. Savoy-
Navarro17, M. Titov, G.B. Yu Laboratoire Leprince-Ringuet, CNRS/IN2P3, Ecole
Polytechnique, Institut Polytechnique de Paris, Palaiseau, France
S. Ahuja, F. Beaudette, M. Bonanomi, A. Buchot Perraguin, P. Busson, A.
Cappati, C. Charlot, O. Davignon, B. Diab, G. Falmagne, S. Ghosh, R. Granier
de Cassagnac, A. Hakimi, I. Kucher, M. Nguyen, C. Ochando, P. Paganini, J.
Rembser, R. Salerno, J.B. Sauvan, Y. Sirois, A. Zabi, A. Zghiche Université de
Strasbourg, CNRS, IPHC UMR 7178, Strasbourg, France
J.-L. Agram18, J. Andrea, D. Apparu, D. Bloch, G. Bourgatte, J.-M. Brom, E.C.
Chabert, C. Collard, D. Darej, J.-C. Fontaine18, U. Goerlach, C. Grimault,
A.-C. Le Bihan, E. Nibigira, P. Van Hove Institut de Physique des 2 Infinis de
Lyon (IP2I ), Villeurbanne, France
E. Asilar, S. Beauceron, C. Bernet, G. Boudoul, C. Camen, A. Carle, N. Chanon,
D. Contardo, P. Depasse, H. El Mamouni, J. Fay, S. Gascon, M. Gouzevitch, B.
Ille, I.B. Laktineh, H. Lattaud, A. Lesauvage, M. Lethuillier, L. Mirabito, S.
Perries, K. Shchablo, V. Sordini, L. Torterotot, G. Touquet, M. Vander Donckt,
S. Viret Georgian Technical University, Tbilisi, Georgia
A. Khvedelidze12, I. Lomidze, Z. Tsamalaidze12 RWTH Aachen University, I.
Physikalisches Institut, Aachen, Germany
L. Feld, K. Klein, M. Lipinski, D. Meuser, A. Pauls, M.P. Rauch, N. Röwert, J.
Schulz, M. Teroerde RWTH Aachen University, III. Physikalisches Institut A,
Aachen, Germany
A. Dodonova, D. Eliseev, M. Erdmann, P. Fackeldey, B. Fischer, S. Ghosh, T.
Hebbeker, K. Hoepfner, F. Ivone, H. Keller, L. Mastrolorenzo, M. Merschmeyer,
A. Meyer, G. Mocellin, S. Mondal, S. Mukherjee, D. Noll, A. Novak, T. Pook, A.
Pozdnyakov, Y. Rath, H. Reithler, J. Roemer, A. Schmidt, S.C. Schuler, A.
Sharma, L. Vigilante, S. Wiedenbeck, S. Zaleski RWTH Aachen University, III.
Physikalisches Institut B, Aachen, Germany
C. Dziwok, G. Flügge, W. Haj Ahmad19, O. Hlushchenko, T. Kress, A. Nowack, C.
Pistone, O. Pooth, D. Roy, H. Sert, A. Stahl20, T. Ziemons Deutsches
Elektronen-Synchrotron, Hamburg, Germany
H. Aarup Petersen, M. Aldaya Martin, P. Asmuss, I. Babounikau, S. Baxter, O.
Behnke, A. Bermúdez Martínez, S. Bhattacharya, A.A. Bin Anuar, K. Borras21, V.
Botta, D. Brunner, A. Campbell, A. Cardini, C. Cheng, F. Colombina, S.
Consuegra Rodríguez, G. Correia Silva, V. Danilov, L. Didukh, G. Eckerlin, D.
Eckstein, L.I. Estevez Banos, O. Filatov, E. Gallo22, A. Geiser, A. Giraldi,
A. Grohsjean, M. Guthoff, A. Jafari23, N.Z. Jomhari, H. Jung, A. Kasem21, M.
Kasemann, H. Kaveh, C. Kleinwort, D. Krücker, W. Lange, J. Lidrych, K. Lipka,
W. Lohmann24, R. Mankel, I.-A. Melzer-Pellmann, J. Metwally, A.B. Meyer, M.
Meyer, J. Mnich, A. Mussgiller, Y. Otarid, D. Pérez Adán, D. Pitzl, A.
Raspereza, B. Ribeiro Lopes, J. Rübenach, A. Saggio, A. Saibel, M. Savitskyi,
M. Scham, V. Scheurer, C. Schwanenberger22, A. Singh, R.E. Sosa Ricardo, D.
Stafford, N. Tonon, O. Turkot, M. Van De Klundert, R. Walsh, D. Walter, Y.
Wen, K. Wichmann, L. Wiens, C. Wissing, S. Wuchterl University of Hamburg,
Hamburg, Germany
R. Aggleton, S. Albrecht, S. Bein, L. Benato, A. Benecke, P. Connor, K. De
Leo, M. Eich, F. Feindt, A. Fröhlich, C. Garbers, E. Garutti, P. Gunnellini,
J. Haller, A. Hinzmann, G. Kasieczka, R. Klanner, R. Kogler, T. Kramer, V.
Kutzner, J. Lange, T. Lange, A. Lobanov, A. Malara, A. Nigamova, K.J. Pena
Rodriguez, O. Rieger, P. Schleper, M. Schröder, J. Schwandt, D. Schwarz, J.
Sonneveld, H. Stadie, G. Steinbrück, A. Tews, B. Vormwald, I. Zoi Karlsruher
Institut fuer Technologie, Karlsruhe, Germany
J. Bechtel, T. Berger, E. Butz, R. Caspart, T. Chwalek, W. De
Boer${}^{\textrm{\textdagger}}$, A. Dierlamm, A. Droll, K. El Morabit, N.
Faltermann, M. Giffels, J.o. Gosewisch, A. Gottmann, F. Hartmann20, C.
Heidecker, U. Husemann, I. Katkov25, P. Keicher, R. Koppenhöfer, S. Maier, M.
Metzler, S. Mitra, Th. Müller, M. Neukum, A. Nürnberg, G. Quast, K. Rabbertz,
J. Rauser, D. Savoiu, M. Schnepf, D. Seith, I. Shvetsov, H.J. Simonis, R.
Ulrich, J. Van Der Linden, R.F. Von Cube, M. Wassmer, M. Weber, S. Wieland, R.
Wolf, S. Wozniewski, S. Wunsch Institute of Nuclear and Particle Physics
(INPP), NCSR Demokritos, Aghia Paraskevi, Greece
G. Anagnostou, G. Daskalakis, T. Geralis, A. Kyriakis, D. Loukas, A. Stakia
National and Kapodistrian University of Athens, Athens, Greece
M. Diamantopoulou, D. Karasavvas, G. Karathanasis, P. Kontaxakis, C.K. Koraka,
A. Manousakis-katsikakis, A. Panagiotou, I. Papavergou, N. Saoulidou, K.
Theofilatos, E. Tziaferi, K. Vellidis, E. Vourliotis National Technical
University of Athens, Athens, Greece
G. Bakas, K. Kousouris, I. Papakrivopoulos, G. Tsipolitis, A. Zacharopoulou
University of Ioánnina, Ioánnina, Greece
I. Evangelou, C. Foudas, P. Gianneios, P. Katsoulis, P. Kokkas, N. Manthos, I.
Papadopoulos, J. Strologas MTA-ELTE Lendület CMS Particle and Nuclear Physics
Group, Eötvös Loránd University, Budapest, Hungary
M. Csanad, K. Farkas, M.M.A. Gadallah26, S. Lökös27, P. Major, K. Mandal, A.
Mehta, G. Pasztor, A.J. Rádl, O. Surányi, G.I. Veres Wigner Research Centre
for Physics, Budapest, Hungary
M. Bartók28, G. Bencze, C. Hajdu, D. Horvath29, F. Sikler, V. Veszpremi, G.
Vesztergombi${}^{\textrm{\textdagger}}$ Institute of Nuclear Research ATOMKI,
Debrecen, Hungary
S. Czellar, J. Karancsi28, J. Molnar, Z. Szillasi, D. Teyssier Institute of
Physics, University of Debrecen, Debrecen, Hungary
P. Raics, Z.L. Trocsanyi30, B. Ujvari Karoly Robert Campus, MATE Institute of
Technology
T. Csorgo31, F. Nemes31, T. Novak Indian Institute of Science (IISc),
Bangalore, India
J.R. Komaragiri, D. Kumar, L. Panwar, P.C. Tiwari National Institute of
Science Education and Research, HBNI, Bhubaneswar, India
S. Bahinipati32, C. Kar, P. Mal, T. Mishra, V.K. Muraleedharan Nair Bindhu33,
A. Nayak33, P. Saha, N. Sur, S.K. Swain, D. Vats33 Panjab University,
Chandigarh, India
S. Bansal, S.B. Beri, V. Bhatnagar, G. Chaudhary, S. Chauhan, N. Dhingra34, R.
Gupta, A. Kaur, M. Kaur, S. Kaur, P. Kumari, M. Meena, K. Sandeep, J.B. Singh,
A.K. Virdi University of Delhi, Delhi, India
A. Ahmed, A. Bhardwaj, B.C. Choudhary, M. Gola, S. Keshri, A. Kumar, M.
Naimuddin, P. Priyanka, K. Ranjan, A. Shah Saha Institute of Nuclear Physics,
HBNI, Kolkata, India
M. Bharti35, R. Bhattacharya, S. Bhattacharya, D. Bhowmik, S. Dutta, S. Dutta,
B. Gomber36, M. Maity37, P. Palit, P.K. Rout, G. Saha, B. Sahu, S. Sarkar, M.
Sharan, B. Singh35, S. Thakur35 Indian Institute of Technology Madras, Madras,
India
P.K. Behera, S.C. Behera, P. Kalbhor, A. Muhammad, R. Pradhan, P.R. Pujahari,
A. Sharma, A.K. Sikdar Bhabha Atomic Research Centre, Mumbai, India
D. Dutta, V. Jha, V. Kumar, D.K. Mishra, K. Naskar38, P.K. Netrakanti, L.M.
Pant, P. Shukla Tata Institute of Fundamental Research-A, Mumbai, India
T. Aziz, S. Dugad, M. Kumar, U. Sarkar Tata Institute of Fundamental
Research-B, Mumbai, India
S. Banerjee, R. Chudasama, M. Guchait, S. Karmakar, S. Kumar, G. Majumder, K.
Mazumdar, S. Mukherjee Indian Institute of Science Education and Research
(IISER), Pune, India
K. Alpana, S. Dube, B. Kansal, A. Laha, S. Pandey, A. Rane, A. Rastogi, S.
Sharma Department of Physics, Isfahan University of Technology, Isfahan, Iran
H. Bakhshiansohi39, M. Zeinali40 Institute for Research in Fundamental
Sciences (IPM), Tehran, Iran
S. Chenarani41, S.M. Etesami, M. Khakzad, M. Mohammadi Najafabadi University
College Dublin, Dublin, Ireland
M. Grunewald INFN Sezione di Bari a, Università di Bari b, Politecnico di Bari
c, Bari, Italy
M. Abbresciaa,b, R. Alya,b,42, C. Arutaa,b, A. Colaleoa, D. Creanzaa,c, N. De
Filippisa,c, M. De Palmaa,b, A. Di Florioa,b, A. Di Pilatoa,b, W.
Elmetenaweea,b, L. Fiorea, A. Gelmia,b, M. Gula, G. Iasellia,c, M. Incea,b, S.
Lezkia,b, G. Maggia,c, M. Maggia, I. Margjekaa,b, V. Mastrapasquaa,b, J.A.
Merlina, S. Mya,b, S. Nuzzoa,b, A. Pellecchiaa,b, A. Pompilia,b, G.
Pugliesea,c, A. Ranieria, G. Selvaggia,b, L. Silvestrisa, F.M. Simonea,b, R.
Vendittia, P. Verwilligena INFN Sezione di Bologna a, Università di Bologna b,
Bologna, Italy
G. Abbiendia, C. Battilanaa,b, D. Bonacorsia,b, L. Borgonovia, L.
Brigliadoria, R. Campaninia,b, P. Capiluppia,b, A. Castroa,b, F.R. Cavalloa,
M. Cuffiania,b, G.M. Dallavallea, T. Diotalevia,b, F. Fabbria, A. Fanfania,b,
P. Giacomellia, L. Giommia,b, C. Grandia, L. Guiduccia,b, S. Lo Meoa,43, L.
Lunertia,b, S. Marcellinia, G. Masettia, F.L. Navarriaa,b, A. Perrottaa, F.
Primaveraa,b, A.M. Rossia,b, T. Rovellia,b, G.P. Sirolia,b INFN Sezione di
Catania a, Università di Catania b, Catania, Italy
S. Albergoa,b,44, S. Costaa,b,44, A. Di Mattiaa, R. Potenzaa,b, A.
Tricomia,b,44, C. Tuvea,b INFN Sezione di Firenze a, Università di Firenze b,
Firenze, Italy
G. Barbaglia, A. Cassesea, R. Ceccarellia,b, V. Ciullia,b, C. Civininia, R.
D’Alessandroa,b, E. Focardia,b, G. Latinoa,b, P. Lenzia,b, M. Lizzoa,b, M.
Meschinia, S. Paolettia, R. Seiditaa,b, G. Sguazzonia, L. Viliania INFN
Laboratori Nazionali di Frascati, Frascati, Italy
L. Benussi, S. Bianco, D. Piccolo INFN Sezione di Genova a, Università di
Genova b, Genova, Italy
M. Bozzoa,b, F. Ferroa, R. Mulargiaa,b, E. Robuttia, S. Tosia,b INFN Sezione
di Milano-Bicocca a, Università di Milano-Bicocca b, Milano, Italy
A. Benagliaa, F. Brivioa,b, F. Cetorellia,b, V. Cirioloa,b,20, F. De Guioa,b,
M.E. Dinardoa,b, P. Dinia, S. Gennaia, A. Ghezzia,b, P. Govonia,b, L.
Guzzia,b, M. Malbertia, S. Malvezzia, A. Massironia, D. Menascea, L. Moronia,
M. Paganonia,b, D. Pedrinia, S. Ragazzia,b, N. Redaellia, T. Tabarelli de
Fatisa,b, D. Valsecchia,b,20, D. Zuoloa,b INFN Sezione di Napoli a, Università
di Napoli ’Federico II’ b, Napoli, Italy, Università della Basilicata c,
Potenza, Italy, Università G. Marconi d, Roma, Italy
S. Buontempoa, F. Carnevalia,b, N. Cavalloa,c, A. De Iorioa,b, F. Fabozzia,c,
A.O.M. Iorioa,b, L. Listaa,b, S. Meolaa,d,20, P. Paoluccia,20, B. Rossia, C.
Sciaccaa,b INFN Sezione di Padova a, Università di Padova b, Padova, Italy,
Università di Trento c, Trento, Italy
P. Azzia, N. Bacchettaa, D. Biselloa,b, P. Bortignona, A. Bragagnoloa,b, R.
Carlina,b, P. Checchiaa, T. Dorigoa, U. Dossellia, F. Gasparinia,b, U.
Gasparinia,b, S.Y. Hoha,b, L. Layera,45, M. Margonia,b, A.T. Meneguzzoa,b, J.
Pazzinia,b, M. Presillaa,b, P. Ronchesea,b, R. Rossina,b, F. Simonettoa,b, G.
Stronga, M. Tosia,b, H. YARARa,b, M. Zanettia,b, P. Zottoa,b, A. Zucchettaa,b,
G. Zumerlea,b INFN Sezione di Pavia a, Università di Pavia b, Pavia, Italy
C. Aime‘a,b, A. Braghieria, S. Calzaferria,b, D. Fiorinaa,b, P. Montagnaa,b,
S.P. Rattia,b, V. Rea, C. Riccardia,b, P. Salvinia, I. Vaia, P. Vituloa,b INFN
Sezione di Perugia a, Università di Perugia b, Perugia, Italy
P. Asenova,46, G.M. Bileia, D. Ciangottinia,b, L. Fanòa,b, P. Laricciaa,b, M.
Magherinib, G. Mantovania,b, V. Mariania,b, M. Menichellia, F. Moscatellia,46,
A. Piccinellia,b, A. Rossia,b, A. Santocchiaa,b, D. Spigaa, T. Tedeschia,b
INFN Sezione di Pisa a, Università di Pisa b, Scuola Normale Superiore di Pisa
c, Pisa Italy, Università di Siena d, Siena, Italy
P. Azzurria, G. Bagliesia, V. Bertacchia,c, L. Bianchinia, T. Boccalia, E.
Bossinia,b, R. Castaldia, M.A. Cioccia,b, V. D’Amantea,d, R. Dell’Orsoa, M.R.
Di Domenicoa,d, S. Donatoa, A. Giassia, F. Ligabuea,c, E. Mancaa,c, G.
Mandorlia,c, A. Messineoa,b, F. Pallaa, S. Paroliaa,b, G. Ramirez-Sancheza,c,
A. Rizzia,b, G. Rolandia,c, S. Roy Chowdhurya,c, A. Scribanoa, N. Shafieia,b,
P. Spagnoloa, R. Tenchinia, G. Tonellia,b, N. Turinia,d, A. Venturia, P.G.
Verdinia INFN Sezione di Roma a, Sapienza Università di Roma b, Rome, Italy
M. Campanaa,b, F. Cavallaria, M. Cipriania,b, D. Del Rea,b, E. Di Marcoa, M.
Diemoza, E. Longoa,b, P. Meridiania, G. Organtinia,b, F. Pandolfia, R.
Paramattia,b, C. Quarantaa,b, S. Rahatloua,b, C. Rovellia, F.
Santanastasioa,b, L. Soffia, R. Tramontanoa,b INFN Sezione di Torino a,
Università di Torino b, Torino, Italy, Università del Piemonte Orientale c,
Novara, Italy
N. Amapanea,b, R. Arcidiaconoa,c, S. Argiroa,b, M. Arneodoa,c, N. Bartosika,
R. Bellana,b, A. Belloraa,b, J. Berenguer Antequeraa,b, C. Biinoa, N.
Cartigliaa, S. Comettia, M. Costaa,b, R. Covarellia,b, N. Demariaa, B.
Kiania,b, F. Leggera, C. Mariottia, S. Masellia, E. Migliorea,b, E.
Monteila,b, M. Montenoa, M.M. Obertinoa,b, G. Ortonaa, L. Pachera,b, N.
Pastronea, M. Pelliccionia, G.L. Pinna Angionia,b, M. Ruspaa,c, K.
Shchelinaa,b, F. Sivieroa,b, V. Solaa, A. Solanoa,b, D. Soldia,b, A. Staianoa,
M. Tornagoa,b, D. Trocinoa,b, A. Vagnerini INFN Sezione di Trieste a,
Università di Trieste b, Trieste, Italy
S. Belfortea, V. Candelisea,b, M. Casarsaa, F. Cossuttia, A. Da Rolda,b, G.
Della Riccaa,b, G. Sorrentinoa,b, F. Vazzolera,b Kyungpook National
University, Daegu, Korea
S. Dogra, C. Huh, B. Kim, D.H. Kim, G.N. Kim, J. Kim, J. Lee, S.W. Lee, C.S.
Moon, Y.D. Oh, S.I. Pak, B.C. Radburn-Smith, S. Sekmen, Y.C. Yang Chonnam
National University, Institute for Universe and Elementary Particles, Kwangju,
Korea
H. Kim, D.H. Moon Hanyang University, Seoul, Korea
B. Francois, T.J. Kim, J. Park Korea University, Seoul, Korea
S. Cho, S. Choi, Y. Go, B. Hong, K. Lee, K.S. Lee, J. Lim, J. Park, S.K. Park,
J. Yoo Kyung Hee University, Department of Physics, Seoul, Republic of Korea
J. Goh, A. Gurtu Sejong University, Seoul, Korea
H.S. Kim, Y. Kim Seoul National University, Seoul, Korea
J. Almond, J.H. Bhyun, J. Choi, S. Jeon, J. Kim, J.S. Kim, S. Ko, H. Kwon, H.
Lee, S. Lee, B.H. Oh, M. Oh, S.B. Oh, H. Seo, U.K. Yang, I. Yoon University of
Seoul, Seoul, Korea
W. Jang, D. Jeon, D.Y. Kang, Y. Kang, J.H. Kim, S. Kim, B. Ko, J.S.H. Lee, Y.
Lee, I.C. Park, Y. Roh, M.S. Ryu, D. Song, I.J. Watson, S. Yang Yonsei
University, Department of Physics, Seoul, Korea
S. Ha, H.D. Yoo Sungkyunkwan University, Suwon, Korea
M. Choi, Y. Jeong, H. Lee, Y. Lee, I. Yu College of Engineering and
Technology, American University of the Middle East (AUM), Egaila, Kuwait
T. Beyrouthy, Y. Maghrbi Riga Technical University, Riga, Latvia
T. Torims, V. Veckalns47 Vilnius University, Vilnius, Lithuania
M. Ambrozas, A. Juodagalvis, A. Rinkevicius, G. Tamulaitis National Centre for
Particle Physics, Universiti Malaya, Kuala Lumpur, Malaysia
N. Bin Norjoharuddeen, W.A.T. Wan Abdullah, M.N. Yusli, Z. Zolkapli
Universidad de Sonora (UNISON), Hermosillo, Mexico
J.F. Benitez, A. Castaneda Hernandez, M. León Coello, J.A. Murillo Quijada, A.
Sehrawat, L. Valencia Palomo Centro de Investigacion y de Estudios Avanzados
del IPN, Mexico City, Mexico
G. Ayala, H. Castilla-Valdez, E. De La Cruz-Burelo, I. Heredia-De La Cruz48,
R. Lopez-Fernandez, C.A. Mondragon Herrera, D.A. Perez Navarro, A. Sanchez-
Hernandez Universidad Iberoamericana, Mexico City, Mexico
S. Carrillo Moreno, C. Oropeza Barrera, M. Ramirez-Garcia, F. Vazquez Valencia
Benemerita Universidad Autonoma de Puebla, Puebla, Mexico
I. Pedraza, H.A. Salazar Ibarguen, C. Uribe Estrada University of Montenegro,
Podgorica, Montenegro
J. Mijuskovic49, N. Raicevic University of Auckland, Auckland, New Zealand
D. Krofcheck University of Canterbury, Christchurch, New Zealand
S. Bheesette, P.H. Butler National Centre for Physics, Quaid-I-Azam
University, Islamabad, Pakistan
A. Ahmad, M.I. Asghar, A. Awais, M.I.M. Awan, H.R. Hoorani, W.A. Khan, M.A.
Shah, M. Shoaib, M. Waqas AGH University of Science and Technology Faculty of
Computer Science, Electronics and Telecommunications, Krakow, Poland
V. Avati, L. Grzanka, M. Malawski National Centre for Nuclear Research,
Swierk, Poland
H. Bialkowska, M. Bluj, B. Boimska, M. Górski, M. Kazana, M. Szleper, P.
Zalewski Institute of Experimental Physics, Faculty of Physics, University of
Warsaw, Warsaw, Poland
K. Bunkowski, K. Doroba, A. Kalinowski, M. Konecki, J. Krolikowski, M. Walczak
Laboratório de Instrumentação e Física Experimental de Partículas, Lisboa,
Portugal
M. Araujo, P. Bargassa, D. Bastos, A. Boletti, P. Faccioli, M. Gallinaro, J.
Hollar, N. Leonardo, T. Niknejad, M. Pisano, J. Seixas, O. Toldaiev, J. Varela
Joint Institute for Nuclear Research, Dubna, Russia
S. Afanasiev, D. Budkouski, I. Golutvin, I. Gorbunov, V. Karjavine, V.
Korenkov, A. Lanev, A. Malakhov, V. Matveev50,51, V. Palichik, V. Perelygin,
M. Savina, D. Seitova, V. Shalaev, S. Shmatov, S. Shulha, V. Smirnov, O.
Teryaev, N. Voytishin, B.S. Yuldashev52, A. Zarubin, I. Zhizhin Petersburg
Nuclear Physics Institute, Gatchina (St. Petersburg), Russia
G. Gavrilov, V. Golovtcov, Y. Ivanov, V. Kim53, E. Kuznetsova54, V. Murzin, V.
Oreshkin, I. Smirnov, D. Sosnov, V. Sulimov, L. Uvarov, S. Volkov, A. Vorobyev
Institute for Nuclear Research, Moscow, Russia
Yu. Andreev, A. Dermenev, S. Gninenko, N. Golubev, A. Karneyeu, D.
Kirpichnikov, M. Kirsanov, N. Krasnikov, A. Pashenkov, G. Pivovarov, D.
Tlisov${}^{\textrm{\textdagger}}$, A. Toropin Institute for Theoretical and
Experimental Physics named by A.I. Alikhanov of NRC ‘Kurchatov Institute’,
Moscow, Russia
V. Epshteyn, V. Gavrilov, N. Lychkovskaya, A. Nikitenko55, V. Popov, A.
Spiridonov, A. Stepennov, M. Toms, E. Vlasov, A. Zhokin Moscow Institute of
Physics and Technology, Moscow, Russia
T. Aushev National Research Nuclear University ’Moscow Engineering Physics
Institute’ (MEPhI), Moscow, Russia
M. Chadeeva56, A. Oskin, P. Parygin, E. Popova, V. Rusinov P.N. Lebedev
Physical Institute, Moscow, Russia
V. Andreev, M. Azarkin, I. Dremin, M. Kirakosyan, A. Terkulov Skobeltsyn
Institute of Nuclear Physics, Lomonosov Moscow State University, Moscow,
Russia
A. Belyaev, E. Boos, M. Dubinin57, L. Dudko, A. Ershov, A. Gribushin, V.
Klyukhin, O. Kodolova, I. Lokhtin, S. Obraztsov, S. Petrushanko, V. Savrin, A.
Snigirev Novosibirsk State University (NSU), Novosibirsk, Russia
V. Blinov58, T. Dimova58, L. Kardapoltsev58, A. Kozyrev58, I. Ovtin58, Y.
Skovpen58 Institute for High Energy Physics of National Research Centre
‘Kurchatov Institute’, Protvino, Russia
I. Azhgirey, I. Bayshev, D. Elumakhov, V. Kachanov, D. Konstantinov, P.
Mandrik, V. Petrov, R. Ryutin, S. Slabospitskii, A. Sobol, S. Troshin, N.
Tyurin, A. Uzunian, A. Volkov National Research Tomsk Polytechnic University,
Tomsk, Russia
A. Babaev, V. Okhotnikov Tomsk State University, Tomsk, Russia
V. Borshch, V. Ivanchenko, E. Tcherniaev University of Belgrade: Faculty of
Physics and VINCA Institute of Nuclear Sciences, Belgrade, Serbia
P. Adzic59, M. Dordevic, P. Milenovic, J. Milosevic Centro de Investigaciones
Energéticas Medioambientales y Tecnológicas (CIEMAT), Madrid, Spain
M. Aguilar-Benitez, J. Alcaraz Maestre, A. Álvarez Fernández, I. Bachiller, M.
Barrio Luna, Cristina F. Bedoya, C.A. Carrillo Montoya, M. Cepeda, M. Cerrada,
N. Colino, B. De La Cruz, A. Delgado Peris, J.P. Fernández Ramos, J. Flix,
M.C. Fouz, O. Gonzalez Lopez, S. Goy Lopez, J.M. Hernandez, M.I. Josa, J. León
Holgado, D. Moran, Á. Navarro Tobar, A. Pérez-Calero Yzquierdo, J. Puerta
Pelayo, I. Redondo, L. Romero, S. Sánchez Navas, L. Urda Gómez, C. Willmott
Universidad Autónoma de Madrid, Madrid, Spain
J.F. de Trocóniz, R. Reyes-Almanza Universidad de Oviedo, Instituto
Universitario de Ciencias y Tecnologías Espaciales de Asturias (ICTEA),
Oviedo, Spain
B. Alvarez Gonzalez, J. Cuevas, C. Erice, J. Fernandez Menendez, S. Folgueras,
I. Gonzalez Caballero, J.R. González Fernández, E. Palencia Cortezon, C. Ramón
Álvarez, J. Ripoll Sau, V. Rodríguez Bouza, A. Trapote, N. Trevisani Instituto
de Física de Cantabria (IFCA), CSIC-Universidad de Cantabria, Santander, Spain
J.A. Brochero Cifuentes, I.J. Cabrillo, A. Calderon, J. Duarte Campderros, M.
Fernandez, C. Fernandez Madrazo, P.J. Fernández Manteca, A. García Alonso, G.
Gomez, C. Martinez Rivero, P. Martinez Ruiz del Arbol, F. Matorras, P.
Matorras Cuevas, J. Piedra Gomez, C. Prieels, T. Rodrigo, A. Ruiz-Jimeno, L.
Scodellaro, I. Vila, J.M. Vizan Garcia University of Colombo, Colombo, Sri
Lanka
MK Jayananda, B. Kailasapathy60, D.U.J. Sonnadara, DDC Wickramarathna
University of Ruhuna, Department of Physics, Matara, Sri Lanka
W.G.D. Dharmaratna, K. Liyanage, N. Perera, N. Wickramage CERN, European
Organization for Nuclear Research, Geneva, Switzerland
T.K. Aarrestad, D. Abbaneo, J. Alimena, E. Auffray, G. Auzinger, J. Baechler,
P. Baillon${}^{\textrm{\textdagger}}$, D. Barney, J. Bendavid, M. Bianco, A.
Bocci, T. Camporesi, M. Capeans Garrido, G. Cerminara, S.S. Chhibra, L.
Cristella, D. d’Enterria, A. Dabrowski, N. Daci, A. David, A. De Roeck, M.M.
Defranchis, M. Deile, M. Dobson, M. Dünser, N. Dupont, A. Elliott-Peisert, N.
Emriskova, F. Fallavollita61, D. Fasanella, S. Fiorendi, A. Florent, G.
Franzoni, W. Funk, S. Giani, D. Gigi, K. Gill, F. Glege, L. Gouskos, M.
Haranko, J. Hegeman, Y. Iiyama, V. Innocente, T. James, P. Janot, J. Kaspar,
J. Kieseler, M. Komm, N. Kratochwil, C. Lange, S. Laurila, P. Lecoq, K. Long,
C. Lourenço, L. Malgeri, S. Mallios, M. Mannelli, A.C. Marini, F. Meijers, S.
Mersi, E. Meschi, F. Moortgat, M. Mulders, S. Orfanelli, L. Orsini, F.
Pantaleo, L. Pape, E. Perez, M. Peruzzi, A. Petrilli, G. Petrucciani, A.
Pfeiffer, M. Pierini, D. Piparo, M. Pitt, H. Qu, T. Quast, D. Rabady, A. Racz,
G. Reales Gutiérrez, M. Rieger, M. Rovere, H. Sakulin, J. Salfeld-Nebgen, S.
Scarfi, C. Schäfer, C. Schwick, M. Selvaggi, A. Sharma, P. Silva, W. Snoeys,
P. Sphicas62, S. Summers, V.R. Tavolaro, D. Treille, A. Tsirou, G.P. Van
Onsem, M. Verzetti, J. Wanczyk63, K.A. Wozniak, W.D. Zeuner Paul Scherrer
Institut, Villigen, Switzerland
L. Caminada64, A. Ebrahimi, W. Erdmann, R. Horisberger, Q. Ingram, H.C.
Kaestli, D. Kotlinski, U. Langenegger, M. Missiroli, T. Rohe ETH Zurich -
Institute for Particle Physics and Astrophysics (IPA), Zurich, Switzerland
K. Androsov63, M. Backhaus, P. Berger, A. Calandri, N. Chernyavskaya, A. De
Cosa, G. Dissertori, M. Dittmar, M. Donegà, C. Dorfer, F. Eble, K. Gedia, F.
Glessgen, T.A. Gómez Espinosa, C. Grab, D. Hits, W. Lustermann, A.-M. Lyon,
R.A. Manzoni, C. Martin Perez, M.T. Meinhard, F. Nessi-Tedaldi, J. Niedziela,
F. Pauss, V. Perovic, S. Pigazzini, M.G. Ratti, M. Reichmann, C. Reissel, T.
Reitenspiess, B. Ristic, D. Ruini, D.A. Sanz Becerra, M. Schönenberger, V.
Stampf, J. Steggemann63, R. Wallny, D.H. Zhu Universität Zürich, Zurich,
Switzerland
C. Amsler65, P. Bärtschi, C. Botta, D. Brzhechko, M.F. Canelli, K. Cormier, A.
De Wit, R. Del Burgo, J.K. Heikkilä, M. Huwiler, A. Jofrehei, B. Kilminster,
S. Leontsinis, A. Macchiolo, P. Meiring, V.M. Mikuni, U. Molinatti, I.
Neutelings, A. Reimers, P. Robmann, S. Sanchez Cruz, K. Schweiger, Y.
Takahashi National Central University, Chung-Li, Taiwan
C. Adloff66, C.M. Kuo, W. Lin, A. Roy, T. Sarkar37, S.S. Yu National Taiwan
University (NTU), Taipei, Taiwan
L. Ceard, Y. Chao, K.F. Chen, P.H. Chen, W.-S. Hou, Y.y. Li, R.-S. Lu, E.
Paganis, A. Psallidas, A. Steen, H.y. Wu, E. Yazgan, P.r. Yu Chulalongkorn
University, Faculty of Science, Department of Physics, Bangkok, Thailand
B. Asavapibhop, C. Asawatangtrakuldee, N. Srimanobhas Çukurova University,
Physics Department, Science and Art Faculty, Adana, Turkey
F. Boran, S. Damarseckin67, Z.S. Demiroglu, F. Dolek, I. Dumanoglu68, E.
Eskut, Y. Guler, E. Gurpinar Guler69, I. Hos70, C. Isik, O. Kara, A. Kayis
Topaksu, U. Kiminsu, G. Onengut, K. Ozdemir71, A. Polatoz, A.E. Simsek, B.
Tali72, U.G. Tok, S. Turkcapar, I.S. Zorbakir, C. Zorbilmez Middle East
Technical University, Physics Department, Ankara, Turkey
B. Isildak73, G. Karapinar74, K. Ocalan75, M. Yalvac76 Bogazici University,
Istanbul, Turkey
B. Akgun, I.O. Atakisi, E. Gülmez, M. Kaya77, O. Kaya78, Ö. Özçelik, S.
Tekten79, E.A. Yetkin80 Istanbul Technical University, Istanbul, Turkey
A. Cakir, K. Cankocak68, Y. Komurcu, S. Sen81 Istanbul University, Istanbul,
Turkey
S. Cerci72, B. Kaynak, S. Ozkorucuklu, D. Sunar Cerci72 Institute for
Scintillation Materials of National Academy of Science of Ukraine, Kharkov,
Ukraine
B. Grynyov National Scientific Center, Kharkov Institute of Physics and
Technology, Kharkov, Ukraine
L. Levchuk University of Bristol, Bristol, United Kingdom
D. Anthony, E. Bhal, S. Bologna, J.J. Brooke, A. Bundock, E. Clement, D.
Cussans, H. Flacher, J. Goldstein, G.P. Heath, H.F. Heath, M.l. Holmberg82, L.
Kreczko, B. Krikler, S. Paramesvaran, S. Seif El Nasr-Storey, V.J. Smith, N.
Stylianou83, K. Walkingshaw Pass, R. White Rutherford Appleton Laboratory,
Didcot, United Kingdom
K.W. Bell, A. Belyaev84, C. Brew, R.M. Brown, D.J.A. Cockerill, C. Cooke, K.V.
Ellis, K. Harder, S. Harper, J. Linacre, K. Manolopoulos, D.M. Newbold, E.
Olaiya, D. Petyt, T. Reis, T. Schuh, C.H. Shepherd-Themistocleous, I.R.
Tomalin, T. Williams Imperial College, London, United Kingdom
R. Bainbridge, P. Bloch, S. Bonomally, J. Borg, S. Breeze, O. Buchmuller, V.
Cepaitis, G.S. Chahal85, D. Colling, P. Dauncey, G. Davies, M. Della Negra, S.
Fayer, G. Fedi, G. Hall, M.H. Hassanshahi, G. Iles, J. Langford, L. Lyons,
A.-M. Magnan, S. Malik, A. Martelli, D.G. Monk, J. Nash86, M. Pesaresi, D.M.
Raymond, A. Richards, A. Rose, E. Scott, C. Seez, A. Shtipliyski, A. Tapper,
K. Uchida, T. Virdee20, M. Vojinovic, N. Wardle, S.N. Webb, D. Winterbottom,
A.G. Zecchinelli Brunel University, Uxbridge, United Kingdom
K. Coldham, J.E. Cole, A. Khan, P. Kyberd, I.D. Reid, L. Teodorescu, S. Zahid
Baylor University, Waco, USA
S. Abdullin, A. Brinkerhoff, B. Caraway, J. Dittmann, K. Hatakeyama, A.R.
Kanuganti, B. McMaster, N. Pastika, M. Saunders, S. Sawant, C. Sutantawibul,
J. Wilson Catholic University of America, Washington, DC, USA
R. Bartek, A. Dominguez, R. Uniyal, A.M. Vargas Hernandez The University of
Alabama, Tuscaloosa, USA
A. Buccilli, S.I. Cooper, D. Di Croce, S.V. Gleyzer, C. Henderson, C.U. Perez,
P. Rumerio87, C. West Boston University, Boston, USA
A. Akpinar, A. Albert, D. Arcaro, C. Cosby, Z. Demiragli, E. Fontanesi, D.
Gastler, J. Rohlf, K. Salyer, D. Sperka, D. Spitzbart, I. Suarez, A. Tsatsos,
S. Yuan, D. Zou Brown University, Providence, USA
G. Benelli, B. Burkle, X. Coubez21, D. Cutts, M. Hadley, U. Heintz, J.M.
Hogan88, G. Landsberg, K.T. Lau, M. Lukasik, J. Luo, M. Narain, S. Sagir89, E.
Usai, W.Y. Wong, X. Yan, D. Yu, W. Zhang University of California, Davis,
Davis, USA
J. Bonilla, C. Brainerd, R. Breedon, M. Calderon De La Barca Sanchez, M.
Chertok, J. Conway, P.T. Cox, R. Erbacher, G. Haza, F. Jensen, O. Kukral, R.
Lander, M. Mulhearn, D. Pellett, B. Regnery, D. Taylor, Y. Yao, F. Zhang
University of California, Los Angeles, USA
M. Bachtis, R. Cousins, A. Datta, D. Hamilton, J. Hauser, M. Ignatenko, M.A.
Iqbal, T. Lam, W.A. Nash, S. Regnard, D. Saltzberg, B. Stone, V. Valuev
University of California, Riverside, Riverside, USA
K. Burt, Y. Chen, R. Clare, J.W. Gary, M. Gordon, G. Hanson, G. Karapostoli,
O.R. Long, N. Manganelli, M. Olmedo Negrete, W. Si, S. Wimpenny, Y. Zhang
University of California, San Diego, La Jolla, USA
J.G. Branson, P. Chang, S. Cittolin, S. Cooperstein, N. Deelen, D. Diaz, J.
Duarte, R. Gerosa, L. Giannini, D. Gilbert, J. Guiang, R. Kansal, V.
Krutelyov, R. Lee, J. Letts, M. Masciovecchio, S. May, M. Pieri, B.V. Sathia
Narayanan, V. Sharma, M. Tadel, A. Vartak, F. Würthwein, Y. Xiang, A. Yagil
University of California, Santa Barbara - Department of Physics, Santa
Barbara, USA
N. Amin, C. Campagnari, M. Citron, A. Dorsett, V. Dutta, J. Incandela, M.
Kilpatrick, J. Kim, B. Marsh, H. Mei, M. Oshiro, M. Quinnan, J. Richman, U.
Sarica, J. Sheplock, D. Stuart, S. Wang California Institute of Technology,
Pasadena, USA
A. Bornheim, O. Cerri, I. Dutta, J.M. Lawhorn, N. Lu, J. Mao, H.B. Newman, J.
Ngadiuba, T.Q. Nguyen, M. Spiropulu, J.R. Vlimant, C. Wang, S. Xie, Z. Zhang,
R.Y. Zhu Carnegie Mellon University, Pittsburgh, USA
J. Alison, S. An, M.B. Andrews, P. Bryant, T. Ferguson, A. Harilal, C. Liu, T.
Mudholkar, M. Paulini, A. Sanchez University of Colorado Boulder, Boulder, USA
J.P. Cumalat, W.T. Ford, A. Hassani, E. MacDonald, R. Patel, A. Perloff, C.
Savard, K. Stenson, K.A. Ulmer, S.R. Wagner Cornell University, Ithaca, USA
J. Alexander, S. Bright-thonney, Y. Cheng, D.J. Cranshaw, S. Hogan, J. Monroy,
J.R. Patterson, D. Quach, J. Reichert, M. Reid, A. Ryd, W. Sun, J. Thom, P.
Wittich, R. Zou Fermi National Accelerator Laboratory, Batavia, USA
M. Albrow, M. Alyari, G. Apollinari, A. Apresyan, A. Apyan, S. Banerjee,
L.A.T. Bauerdick, D. Berry, J. Berryhill, P.C. Bhat, K. Burkett, J.N. Butler,
A. Canepa, G.B. Cerati, H.W.K. Cheung, F. Chlebana, M. Cremonesi, K.F. Di
Petrillo, V.D. Elvira, Y. Feng, J. Freeman, Z. Gecse, L. Gray, D. Green, S.
Grünendahl, O. Gutsche, R.M. Harris, R. Heller, T.C. Herwig, J. Hirschauer, B.
Jayatilaka, S. Jindariani, M. Johnson, U. Joshi, T. Klijnsma, B. Klima, K.H.M.
Kwok, S. Lammel, D. Lincoln, R. Lipton, T. Liu, C. Madrid, K. Maeshima, C.
Mantilla, D. Mason, P. McBride, P. Merkel, S. Mrenna, S. Nahn, V. O’Dell, V.
Papadimitriou, K. Pedro, C. Pena57, O. Prokofyev, F. Ravera, A. Reinsvold
Hall, L. Ristori, B. Schneider, E. Sexton-Kennedy, N. Smith, A. Soha, W.J.
Spalding, L. Spiegel, S. Stoynev, J. Strait, L. Taylor, S. Tkaczyk, N.V. Tran,
L. Uplegger, E.W. Vaandering, H.A. Weber University of Florida, Gainesville,
USA
D. Acosta, P. Avery, D. Bourilkov, L. Cadamuro, V. Cherepanov, F. Errico, R.D.
Field, D. Guerrero, B.M. Joshi, M. Kim, E. Koenig, J. Konigsberg, A. Korytov,
K.H. Lo, K. Matchev, N. Menendez, G. Mitselmakher, A. Muthirakalayil Madhu, N.
Rawal, D. Rosenzweig, S. Rosenzweig, K. Shi, J. Sturdy, J. Wang, E. Yigitbasi,
X. Zuo Florida State University, Tallahassee, USA
T. Adams, A. Askew, R. Habibullah, V. Hagopian, K.F. Johnson, R. Khurana, T.
Kolberg, G. Martinez, H. Prosper, C. Schiber, O. Viazlo, R. Yohay, J. Zhang
Florida Institute of Technology, Melbourne, USA
M.M. Baarmand, S. Butalla, T. Elkafrawy16, M. Hohlmann, R. Kumar Verma, D.
Noonan, M. Rahmani, F. Yumiceva University of Illinois at Chicago (UIC),
Chicago, USA
M.R. Adams, H. Becerril Gonzalez, R. Cavanaugh, X. Chen, S. Dittmer, O.
Evdokimov, C.E. Gerber, D.A. Hangal, D.J. Hofman, A.H. Merrit, C. Mills, G.
Oh, T. Roy, S. Rudrabhatla, M.B. Tonjes, N. Varelas, J. Viinikainen, X. Wang,
Z. Wu, Z. Ye The University of Iowa, Iowa City, USA
M. Alhusseini, K. Dilsiz90, R.P. Gandrajula, O.K. Köseyan, J.-P. Merlo, A.
Mestvirishvili91, J. Nachtman, H. Ogul92, Y. Onel, A. Penzo, C. Snyder, E.
Tiras93 Johns Hopkins University, Baltimore, USA
O. Amram, B. Blumenfeld, L. Corcodilos, J. Davis, M. Eminizer, A.V. Gritsan,
S. Kyriacou, P. Maksimovic, J. Roskes, M. Swartz, T.Á. Vámi The University of
Kansas, Lawrence, USA
A. Abreu, J. Anguiano, C. Baldenegro Barrera, P. Baringer, A. Bean, A.
Bylinkin, Z. Flowers, T. Isidori, S. Khalil, J. King, G. Krintiras, A.
Kropivnitskaya, M. Lazarovits, C. Lindsey, J. Marquez, N. Minafra, M. Murray,
M. Nickel, C. Rogan, C. Royon, R. Salvatico, S. Sanders, E. Schmitz, C. Smith,
J.D. Tapia Takaki, Q. Wang, Z. Warner, J. Williams, G. Wilson Kansas State
University, Manhattan, USA
S. Duric, A. Ivanov, K. Kaadze, D. Kim, Y. Maravin, T. Mitchell, A. Modak, K.
Nam Lawrence Livermore National Laboratory, Livermore, USA
F. Rebassoo, D. Wright University of Maryland, College Park, USA
E. Adams, A. Baden, O. Baron, A. Belloni, S.C. Eno, N.J. Hadley, S. Jabeen,
R.G. Kellogg, T. Koeth, A.C. Mignerey, S. Nabili, M. Seidel, A. Skuja, L.
Wang, K. Wong Massachusetts Institute of Technology, Cambridge, USA
D. Abercrombie, G. Andreassi, R. Bi, S. Brandt, W. Busza, I.A. Cali, Y. Chen,
M. D’Alfonso, J. Eysermans, C. Freer, G. Gomez Ceballos, M. Goncharov, P.
Harris, M. Hu, M. Klute, D. Kovalskyi, J. Krupa, Y.-J. Lee, B. Maier, C.
Mironov, C. Paus, D. Rankin, C. Roland, G. Roland, Z. Shi, G.S.F. Stephans, K.
Tatar, J. Wang, Z. Wang, B. Wyslouch University of Minnesota, Minneapolis, USA
R.M. Chatterjee, A. Evans, P. Hansen, J. Hiltbrand, Sh. Jain, M. Krohn, Y.
Kubota, J. Mans, M. Revering, R. Rusack, R. Saradhy, N. Schroeder, N. Strobbe,
M.A. Wadud University of Nebraska-Lincoln, Lincoln, USA
K. Bloom, M. Bryson, S. Chauhan, D.R. Claes, C. Fangmeier, L. Finco, F. Golf,
C. Joo, I. Kravchenko, M. Musich, I. Reed, J.E. Siado, G.R.
Snow${}^{\textrm{\textdagger}}$, W. Tabb, F. Yan State University of New York
at Buffalo, Buffalo, USA
G. Agarwal, H. Bandyopadhyay, L. Hay, I. Iashvili, A. Kharchilava, C. McLean,
D. Nguyen, J. Pekkanen, S. Rappoccio, A. Williams Northeastern University,
Boston, USA
G. Alverson, E. Barberis, Y. Haddad, A. Hortiangtham, J. Li, G. Madigan, B.
Marzocchi, D.M. Morse, V. Nguyen, T. Orimoto, A. Parker, L. Skinnari, A.
Tishelman-Charny, T. Wamorkar, B. Wang, A. Wisecarver, D. Wood Northwestern
University, Evanston, USA
S. Bhattacharya, J. Bueghly, Z. Chen, A. Gilbert, T. Gunter, K.A. Hahn, Y.
Liu, N. Odell, M.H. Schmitt, M. Velasco University of Notre Dame, Notre Dame,
USA
R. Band, R. Bucci, A. Das, N. Dev, R. Goldouzian, M. Hildreth, K. Hurtado
Anampa, C. Jessop, K. Lannon, J. Lawrence, N. Loukas, D. Lutton, N. Marinelli,
I. Mcalister, T. McCauley, F. Meng, K. Mohrman, Y. Musienko50, R. Ruchti, P.
Siddireddy, A. Townsend, M. Wayne, A. Wightman, M. Wolf, M. Zarucki, L. Zygala
The Ohio State University, Columbus, USA
B. Bylsma, B. Cardwell, L.S. Durkin, B. Francis, C. Hill, M. Nunez Ornelas, K.
Wei, B.L. Winer, B.R. Yates Princeton University, Princeton, USA
F.M. Addesa, B. Bonham, P. Das, G. Dezoort, P. Elmer, A. Frankenthal, B.
Greenberg, N. Haubrich, S. Higginbotham, A. Kalogeropoulos, G. Kopp, S. Kwan,
D. Lange, M.T. Lucchini, D. Marlow, K. Mei, I. Ojalvo, J. Olsen, C. Palmer, D.
Stickland, C. Tully University of Puerto Rico, Mayaguez, USA
S. Malik, S. Norberg Purdue University, West Lafayette, USA
A.S. Bakshi, V.E. Barnes, R. Chawla, S. Das, L. Gutay, M. Jones, A.W. Jung, S.
Karmarkar, M. Liu, G. Negro, N. Neumeister, G. Paspalaki, C.C. Peng, S.
Piperov, A. Purohit, J.F. Schulte, M. Stojanovic17, J. Thieman, F. Wang, R.
Xiao, W. Xie Purdue University Northwest, Hammond, USA
J. Dolen, N. Parashar Rice University, Houston, USA
A. Baty, M. Decaro, S. Dildick, K.M. Ecklund, S. Freed, P. Gardner, F.J.M.
Geurts, A. Kumar, W. Li, B.P. Padley, R. Redjimi, W. Shi, A.G. Stahl Leiton,
S. Yang, L. Zhang, Y. Zhang University of Rochester, Rochester, USA
A. Bodek, P. de Barbaro, R. Demina, J.L. Dulemba, C. Fallon, T. Ferbel, M.
Galanti, A. Garcia-Bellido, O. Hindrichs, A. Khukhunaishvili, E. Ranken, R.
Taus Rutgers, The State University of New Jersey, Piscataway, USA
B. Chiarito, J.P. Chou, A. Gandrakota, Y. Gershtein, E. Halkiadakis, A. Hart,
M. Heindl, O. Karacheban24, I. Laflotte, A. Lath, R. Montalvo, K. Nash, M.
Osherson, S. Salur, S. Schnetzer, S. Somalwar, R. Stone, S.A. Thayil, S.
Thomas, H. Wang University of Tennessee, Knoxville, USA
H. Acharya, A.G. Delannoy, S. Spanier Texas A&M University, College Station,
USA
O. Bouhali94, M. Dalchenko, A. Delgado, R. Eusebi, J. Gilmore, T. Huang, T.
Kamon95, H. Kim, S. Luo, S. Malhotra, R. Mueller, D. Overton, D. Rathjens, A.
Safonov Texas Tech University, Lubbock, USA
N. Akchurin, J. Damgov, V. Hegde, S. Kunori, K. Lamichhane, S.W. Lee, T.
Mengke, S. Muthumuni, T. Peltola, I. Volobouev, Z. Wang, A. Whitbeck
Vanderbilt University, Nashville, USA
E. Appelt, S. Greene, A. Gurrola, W. Johns, A. Melo, H. Ni, K. Padeken, F.
Romeo, P. Sheldon, S. Tuo, J. Velkovska University of Virginia,
Charlottesville, USA
M.W. Arenton, B. Cox, G. Cummings, J. Hakala, R. Hirosky, M. Joyce, A.
Ledovskoy, A. Li, C. Neu, B. Tannenwald, S. White, E. Wolfe Wayne State
University, Detroit, USA
N. Poudyal University of Wisconsin - Madison, Madison, WI, USA
K. Black, T. Bose, J. Buchanan, C. Caillol, S. Dasu, I. De Bruyn, P.
Everaerts, F. Fienga, C. Galloni, H. He, M. Herndon, A. Hervé, U. Hussain, A.
Lanaro, A. Loeliger, R. Loveless, J. Madhusudanan Sreekala, A. Mallampalli, A.
Mohammadi, D. Pinna, A. Savin, V. Shang, V. Sharma, W.H. Smith, D. Teague, S.
Trembath-reichert, W. Vetens †: Deceased
1: Also at TU Wien, Wien, Austria
2: Also at Institute of Basic and Applied Sciences, Faculty of Engineering,
Arab Academy for Science, Technology and Maritime Transport, Alexandria,
Egypt, Alexandria, Egypt
3: Also at Université Libre de Bruxelles, Bruxelles, Belgium
4: Also at Universidade Estadual de Campinas, Campinas, Brazil
5: Also at Federal University of Rio Grande do Sul, Porto Alegre, Brazil
6: Also at University of Chinese Academy of Sciences, Beijing, China
7: Also at Department of Physics, Tsinghua University, Beijing, China,
Beijing, China
8: Also at UFMS, Nova Andradina, Brazil
9: Also at Nanjing Normal University Department of Physics, Nanjing, China
10: Now at The University of Iowa, Iowa City, USA
11: Also at Institute for Theoretical and Experimental Physics named by A.I.
Alikhanov of NRC ‘Kurchatov Institute’, Moscow, Russia
12: Also at Joint Institute for Nuclear Research, Dubna, Russia
13: Also at Helwan University, Cairo, Egypt
14: Now at Zewail City of Science and Technology, Zewail, Egypt
15: Also at British University in Egypt, Cairo, Egypt
16: Now at Ain Shams University, Cairo, Egypt
17: Also at Purdue University, West Lafayette, USA
18: Also at Université de Haute Alsace, Mulhouse, France
19: Also at Erzincan Binali Yildirim University, Erzincan, Turkey
20: Also at CERN, European Organization for Nuclear Research, Geneva,
Switzerland
21: Also at RWTH Aachen University, III. Physikalisches Institut A, Aachen,
Germany
22: Also at University of Hamburg, Hamburg, Germany
23: Also at Department of Physics, Isfahan University of Technology, Isfahan,
Iran, Isfahan, Iran
24: Also at Brandenburg University of Technology, Cottbus, Germany
25: Also at Skobeltsyn Institute of Nuclear Physics, Lomonosov Moscow State
University, Moscow, Russia
26: Also at Physics Department, Faculty of Science, Assiut University, Assiut,
Egypt
27: Also at Karoly Robert Campus, MATE Institute of Technology, Gyongyos,
Hungary
28: Also at Institute of Physics, University of Debrecen, Debrecen, Hungary,
Debrecen, Hungary
29: Also at Institute of Nuclear Research ATOMKI, Debrecen, Hungary
30: Also at MTA-ELTE Lendület CMS Particle and Nuclear Physics Group, Eötvös
Loránd University, Budapest, Hungary, Budapest, Hungary
31: Also at Wigner Research Centre for Physics, Budapest, Hungary
32: Also at IIT Bhubaneswar, Bhubaneswar, India, Bhubaneswar, India
33: Also at Institute of Physics, Bhubaneswar, India
34: Also at G.H.G. Khalsa College, Punjab, India
35: Also at Shoolini University, Solan, India
36: Also at University of Hyderabad, Hyderabad, India
37: Also at University of Visva-Bharati, Santiniketan, India
38: Also at Indian Institute of Technology (IIT), Mumbai, India
39: Also at Deutsches Elektronen-Synchrotron, Hamburg, Germany
40: Also at Sharif University of Technology, Tehran, Iran
41: Also at Department of Physics, University of Science and Technology of
Mazandaran, Behshahr, Iran
42: Now at INFN Sezione di Bari a, Università di Bari b, Politecnico di Bari
c, Bari, Italy
43: Also at Italian National Agency for New Technologies, Energy and
Sustainable Economic Development, Bologna, Italy
44: Also at Centro Siciliano di Fisica Nucleare e di Struttura Della Materia,
Catania, Italy
45: Also at Università di Napoli ’Federico II’, NAPOLI, Italy
46: Also at Consiglio Nazionale delle Ricerche - Istituto Officina dei
Materiali, PERUGIA, Italy
47: Also at Riga Technical University, Riga, Latvia, Riga, Latvia
48: Also at Consejo Nacional de Ciencia y Tecnología, Mexico City, Mexico
49: Also at IRFU, CEA, Université Paris-Saclay, Gif-sur-Yvette, France
50: Also at Institute for Nuclear Research, Moscow, Russia
51: Now at National Research Nuclear University ’Moscow Engineering Physics
Institute’ (MEPhI), Moscow, Russia
52: Also at Institute of Nuclear Physics of the Uzbekistan Academy of
Sciences, Tashkent, Uzbekistan
53: Also at St. Petersburg State Polytechnical University, St. Petersburg,
Russia
54: Also at University of Florida, Gainesville, USA
55: Also at Imperial College, London, United Kingdom
56: Also at Moscow Institute of Physics and Technology, Moscow, Russia,
Moscow, Russia
57: Also at California Institute of Technology, Pasadena, USA
58: Also at Budker Institute of Nuclear Physics, Novosibirsk, Russia
59: Also at Faculty of Physics, University of Belgrade, Belgrade, Serbia
60: Also at Trincomalee Campus, Eastern University, Sri Lanka, Nilaveli, Sri
Lanka
61: Also at INFN Sezione di Pavia a, Università di Pavia b, Pavia, Italy,
Pavia, Italy
62: Also at National and Kapodistrian University of Athens, Athens, Greece
63: Also at Ecole Polytechnique Fédérale Lausanne, Lausanne, Switzerland
64: Also at Universität Zürich, Zurich, Switzerland
65: Also at Stefan Meyer Institute for Subatomic Physics, Vienna, Austria,
Vienna, Austria
66: Also at Laboratoire d’Annecy-le-Vieux de Physique des Particules,
IN2P3-CNRS, Annecy-le-Vieux, France
67: Also at Şırnak University, Sirnak, Turkey
68: Also at Near East University, Research Center of Experimental Health
Science, Nicosia, Turkey
69: Also at Konya Technical University, Konya, Turkey
70: Also at Istanbul University - Cerrahpasa, Faculty of Engineering,
Istanbul, Turkey
71: Also at Piri Reis University, Istanbul, Turkey
72: Also at Adiyaman University, Adiyaman, Turkey
73: Also at Ozyegin University, Istanbul, Turkey
74: Also at Izmir Institute of Technology, Izmir, Turkey
75: Also at Necmettin Erbakan University, Konya, Turkey
76: Also at Bozok Universitetesi Rektörlügü, Yozgat, Turkey, Yozgat, Turkey
77: Also at Marmara University, Istanbul, Turkey
78: Also at Milli Savunma University, Istanbul, Turkey
79: Also at Kafkas University, Kars, Turkey
80: Also at Istanbul Bilgi University, Istanbul, Turkey
81: Also at Hacettepe University, Ankara, Turkey
82: Also at Rutherford Appleton Laboratory, Didcot, United Kingdom
83: Also at Vrije Universiteit Brussel, Brussel, Belgium
84: Also at School of Physics and Astronomy, University of Southampton,
Southampton, United Kingdom
85: Also at IPPP Durham University, Durham, United Kingdom
86: Also at Monash University, Faculty of Science, Clayton, Australia
87: Also at Università di Torino, TORINO, Italy
88: Also at Bethel University, St. Paul, Minneapolis, USA, St. Paul, USA
89: Also at Karamanoğlu Mehmetbey University, Karaman, Turkey
90: Also at Bingol University, Bingol, Turkey
91: Also at Georgian Technical University, Tbilisi, Georgia
92: Also at Sinop University, Sinop, Turkey
93: Also at Erciyes University, KAYSERI, Turkey
94: Also at Texas A&M University at Qatar, Doha, Qatar
95: Also at Kyungpook National University, Daegu, Korea, Daegu, Korea
| arxiv-papers | 2021-07-27T02:09:15 | 2024-09-04T03:07:20.345368 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "CMS Collaboration",
"submitter": "The CMS Collaboration",
"url": "https://arxiv.org/abs/2107.12553"
} |
2107.12554 | # Bi-Directional Grid Constrained Stochastic Processes’ Link to Multi-Skew
Brownian Motion
Aldo Taranto, Ron Addie, Shahjahan Khan Aldo.Taranto@, Ron.Addie@,
Shahjahan.Khan@, @usq.edu.au
School of Sciences
University of Southern Queensland
Toowoomba, QLD 4350, Australia
###### Abstract.
Bi-Directional Grid Constrained (BGC) stochastic processes (BGCSPs) constrain
the random movement toward the origin steadily more and more, the further they
deviate from the origin, rather than all at once imposing reflective barriers,
as does the well-established theory of Itô diffusions with such reflective
barriers. We identify that BGCSPs are a variant rather than a special case of
the multi-skew Brownian motion (M-SBM). This is because they have their own
complexities, such as the barriers being hidden (not known in advance) and not
necessarily constant over time. We provide a M-SBM theoretical framework and
also a simulation framework to elaborate deeper properties of BGCSPs. The
simulation framework is then applied by generating numerous simulations of the
constrained paths and the results are analysed. BGCSPs have applications in
finance and indeed many other fields requiring graduated constraining, from
both above and below the initial position.
###### Key words and phrases:
Wiener Processes, Itô Processes, Reflecting Barriers, Stochastic Differential
Equation (SDE), Stopping Times, First Passage Time (FPT), Multi-Skew Brownian
Motion (M-SBM)
2021 Mathematics Subject Classification: Primary 60G40, Secondary 60J60,
65R20, 60J65.
The first author was supported by an Australian Government Research Training
Program (RTP) Scholarship.
We would like to thank the Editors of this journal for their positive feedback
and invaluable advice on refining this paper.
###### Contents
1. 1 Introduction
2. 2 Literature Review
1. 2.1 Constraining Stochastic Processes by Reflective Barriers
2. 2.2 Multi-Skew Brownian Motion
3. 3 Methodology
1. 3.1 Itô Diffusions Constrained by Two Reflective Barriers
2. 3.2 Multi-Skew Brownian Motion
3. 3.3 Constructing BGC Stochastic Processes
4. 4 Results and Discussion
5. 5 Conclusions
## Notation
Term | Description
---|---
BGC | Bi-Directional grid constrained
BGCSP | BGC stochastic process
M-SBM | Multi-skew Brownian motion
$X_{t}$ | Stochastic process over time $t$
$B_{t}$ | Brownian motion over time $t$
$W_{t}$ | Wiener process over time $t$
$T$ | Time
$f(X_{t},t)$, $\mu$ | Drift coefficient of $X$ over $t$
$g(X_{t},t)$, $\sigma$ | Diffusion coefficient of $X$ over $t$
$\Psi(X_{t},t)$ | BGC coefficient of $X$ over $t$
$\operatorname{sgn}[X_{t}]$ | Sign function of $X_{t}$
$\mathfrak{B}_{L}$ | Lower barrier
$\mathfrak{B}_{U}$ | Upper barrier
$\tau_{\mathfrak{B}}$ | Stopping time when $\mathfrak{B}$ is hit
$|x|$ | Absolute value of $x$
## 1\. Introduction
In Taranto et al., [33], the concept of Bi-Directional Grid Constrained (BGC)
stochastic processes (BGCSPs) was introduced, and the impact of BGC on the
iterated logarithm bounds of the corresponding stochastic differential
equation (SDE) was derived. In the subsequent paper (Taranto and Khan, 2021b
[32]), the hidden geometry of the BGC process was examined, in particular how
the hidden reflective barriers are formed, the various possible formulations
that can be formed, and an algorithm to simulate BGCSPs was provided. BGCSPs
were also compared to the Langevin equation, the Ornstein-Uhlenbeck process
(OUP), and it was shown how BGCSPs are more complex due to a more general
framework that does not always admit an exact solution. In this paper, we
examine in what respects a BGCSP resembles and in what respect it differs from
a type of multi-skew Brownian motion (M-SBM).
Before we do this, we recall that the BGC term
$\operatorname{sgn}[X_{t}]\Psi(X_{t},t)$, from now onwards simply
$\Psi(X_{t},t)$, unless required to be fully expressed, has been defined as
impacting the $dt$ term as in [33] or the $dW_{t}$ term to a lesser extent as
in [32]. Here, we notice that even if this term is placed as a factor outside
the sum of the $dt$ and $dW_{t}$ terms, it will still constrain the Itô
diffusion in a slightly different, yet fundamentally the same way. Since
$\Psi(x)$ is continuous and differentiable, we require $\Psi(x)$ to include
the infinitessimal $d$, giving $d\Psi(x)$. We thus provide the following third
alternative definition of the BGCSP.
###### Definition 1.1.
(Definition III of BGC Stochastic Processes). For a complete filtered
probability space $(\Omega,\mathcal{F},\\{\mathcal{F}\\}_{t\geqslant
0},\mathbb{P})$ and a (continuous) BGC function
$\Psi(x):\mathbb{R}\rightarrow\mathbb{R}$, $\forall x\in\mathbb{R}$,
$f(X_{t},t)$ is the drift coefficient, $g(X_{t},t)$ is the diffusion
coefficient, $\Psi(X_{t},t)$ is the BGC function. $f(X_{t},t)$, $g(X_{t},t)$
and $\Psi(X_{t},t)$ are convex functions and $\operatorname{sgn}[x]$ is the
sign function defined in the usual sense,
$\displaystyle\operatorname{sgn}[x]$ $\displaystyle=$
$\displaystyle{\begin{cases}\displaystyle\phantom{-}1&,\quad x>0\\\
\displaystyle\phantom{-}0&,\quad x=0\\\ \displaystyle-1&,\quad
x<0\end{cases}}.$
Then, the corresponding BGC Itô diffusion is defined as follows,
$dX_{t}=f(X_{t},t)\,dt+g(X_{t},t)\,dW_{t}-\underbrace{\operatorname{sgn}[X_{t}]\,d\Psi(X_{t},t)}_{\textbf{BGC}}.$
(1.1)
$\blacksquare$
By choosing $\Psi(X_{t},t)$ to be a ‘suitable’ parabolic cylinder function in
relation to the underlying Itô diffusion, as shown in [32], namely
$\Psi(X_{t},t)=\left(\frac{X_{t}}{10}\right)^{2}$, the hidden barriers become
visible when enough simulations hit them. Figure 1 shows that (1.1) is
simulated 1,000 times for both with and without BGC, together with the hidden
lower reflective barrier $a=\mathfrak{B}_{L}$ and the hidden reflective upper
barrier $b=\mathfrak{B}_{U}$ also being displayed.
Figure 1. Hidden Reflective Barriers due to Ideal $\Psi(X_{t},t)$
An even more specialized case that is of great interest, due to its
simplicity, is where drift function $f(x):\mathbb{R}\rightarrow\mathbb{R}$ is
set to $f(x)=\mu$, $\forall x\in\mathbb{R}$ and similarly, the diffusion
function $g(x):\mathbb{R}\rightarrow\mathbb{R}$ is set to $g(x)=\sigma$,
$\forall x\in\mathbb{R}$. One can even define $f(x)$ and $g(x)$ in a more
gradual manner such that in the limit they approach the typical constant
expressions for the drift and diffusion coefficients,
$\lim_{x\rightarrow\infty}f(x)=\mu\quad,\quad\lim_{x\rightarrow\infty}g(x)=\sigma.$
(1.2)
Depending on whether the generalized $f(x)$ and $g(x)$ are used, or whether
the simplified $\mu$ and $\sigma$ are used, then the resulting reflective
boundary theorems will either have more complexity, or less complexity,
respectively.
Before proceeding to the Methodology section, (1.1) is discussed within a
multi-Dimensional context with some examples, which will help explain the
multidimensionality of M-SBMs.
###### Remark 1.2.
By multi-Dimensional diffusion, we are not referring to the usage in papers
such as Sacerdote et al., [27] in which each dimension is reserved for each
possible path or simulation, as shown in Figure 2(a).
(a). (b).
Figure 2. Clarifying Subtle Differences for BGC Stochastic Processes
Notice that in Figure 2(b), the BGCSP exhibits a ‘skew’ and can be considered
as a 2-SBM -which will be elaborated in the Methodology section. Instead of
the usage in Figure 2(a), we use the standard interpretation and generally
accepted usage of the term ‘multi-Dimensional diffusion’ in which each
dimension is reserved for each co-ordinate of the multivariate Itô process, as
shown in Figure 3.
(a). 2-D Itô Diffusion as seen from $\bm{X}$ (b). 2-D Itô Diffusion as seen
from $\bm{Y}$
Figure 3. 2-Dimensional Itô Diffusion as seen from 2 Different Dimensions
We also note that the Methodology, Results and Discussion sections are either
directly multi-Dimensional or can be extended to multi-Dimensional
expressions.
We now have a more geometric understanding of how BGCSPs can be constrained
along multiple dimensions, to be in a better position to express (1.1) in a
more generalized $n$-Dimensional framework in (1.3).
###### Definition 1.3.
(Definition IV - Multi-Dimensional BGC Stochastic Processes). Let $\textstyle
X:[0,\infty)\times\Omega\rightarrow\mathbb{R}^{n}$ defined on a probability
space $(\Omega,\mathcal{F},\mathcal{\\{F\\}}_{t\geqslant 0},\mathbb{P})$ be an
Itô diffusion satisfying the conditions given in the definition of the
1-Dimensional Itô process for each $\\{1\leqslant i\leqslant n\\}$,
$\\{1\leqslant j\leqslant m\\}$, then we can form $n$ 1-Dimensional Itô
processes in an SDE of the form,
$\begin{array}[]{ccc}dX_{1}&=&f_{1}(X_{t},t)\,dt+\underbrace{g_{1,1}(X_{t},t)\,dW_{1}(t)+\cdots+g_{1,m}(X_{t},t)\,dW_{m}(t)}_{\textbf{m}}\\\
&&-\underbrace{\operatorname{sgn}[X_{t}]\,d\Psi_{1}(X_{t},t)-...-\operatorname{sgn}[X_{t}]\,d\Psi_{m}(X_{t},t)}_{\textbf{m
BGC}}\\\ \vdots&\vdots&\vdots\\\
dX_{n}&=&f_{n}(X_{t},t)\,dt+\underbrace{g_{n,1}(X_{t},t)\,dW_{1}(t)+\cdots+g_{n,m}(X_{t},t)\,dW_{m}(t)}_{\textbf{m}}\\\
&&-\underbrace{\operatorname{sgn}[X_{t}]\,d\Psi_{1}(X_{t},t)-...-\operatorname{sgn}[X_{t}]\,d\Psi_{m}(X_{t},t)}_{\textbf{m
BGC}}\end{array}$
(1.3)
where $W_{t}=(W_{1}(X_{t},t),...,W_{m}(X_{t},t))$ is an $m$-Dimensional Wiener
process and $f:\mathbb{R}^{n}\rightarrow\mathbb{R}^{n}$ and
$g:\mathbb{R}^{n}\rightarrow\mathbb{R}^{n\times m}$ are the drift and
diffusion fields respectively. For a point $\displaystyle x\in\mathbb{R}^{n}$,
let $\displaystyle\mathbb{P}^{x}$ denote the law of $X$ given initial datum
$\displaystyle X_{0}=x$, and let $\displaystyle\mathbb{E}^{x}$ denote
expectation with respect to $\displaystyle\mathbb{P}^{x}$. Now, (1.3) can also
be expressed in matrix notation as,
$d\mathbf{X}_{t}=\bm{f}_{t}\,dt+\bm{g}_{t}\,d\mathbf{W}_{t}-\bm{h}_{t},$ (1.4)
where,
$\mathbf{X}_{t}=\left(\begin{array}[]{c}dX_{1}(t)\\\ \vdots\\\
dX_{n}(t)\end{array}\right),\text{
}\bm{f}_{t}=\left(\begin{array}[]{c}f_{1}(X_{t},t)\\\ \vdots\\\
f_{n}(X_{t},t)\end{array}\right),\text{
}\bm{g}_{t}=\left(\begin{array}[]{ccc}g_{1,1}(X_{1}(t),t)&\cdots&g_{1,m}(X_{1}(t),t)\\\
\vdots&\ddots&\vdots\\\
g_{n,1}(X_{n}(t),t)&\cdots&g_{n,m}(X_{n}(t),t)\end{array}\right),$
$d\mathbf{W}_{t}=\left(\begin{array}[]{c}dW_{1}(t)\\\ \vdots\\\
dW_{n}(t)\end{array}\right),\text{
}\bm{h}_{t}=\left(\begin{array}[]{c}\operatorname{sgn}[X_{1}(t)]\,d\Psi_{1}(X_{1}(t),t)\\\
\vdots\\\
\operatorname{sgn}[X_{n}(t)]\,d\Psi_{n}(X_{n}(t),t)\end{array}\right),$
for vectors $\bm{f}_{t}$, $\bm{h}_{t}$, $\bm{W}_{t}$ and matrix $\bm{g}_{t}$.
$\blacksquare$
Having reviewed the multi-Dimensional nature of unconstrained and BGC Itô
diffusions, the paper is structured as follows; Section 2 provides the
Literature Review, Section 3 the Methodology, Section 4 the Results and
Discussion, and finally, Section 5 the Conclusion.
## 2\. Literature Review
### 2.1. Constraining Stochastic Processes by Reflective Barriers
The constraining of stochastic processes in the form of discrete random walks
and continuous Wiener processes has been researched for many decades. By
reviewing Weesakul, [34] and the references therein, we see an established and
rigorous analysis of random walks between a reflecting and an absorbing
barrier. Lehner, [16] extended this to 1-Dimensional random walks with a
partially reflecting (semipermeable) barrier. Gupta, [9] generalised this
concept further to random walks in the presence of a multiple function barrier
(MFB) where the barrier can either be partially reflective, absorptive,
transmissive or hold for a moment, but not terminating or killing the random
variable. Dua et al., [7] extended the work of [16] to random walks in the
presence of partially reflecting barriers in which the probability of a random
variable or datum reaching certain states was determined. Lions and Sznitman,
[20] extended the research on reflecting boundary conditions through the
refinement to SDEs. Percus, [24] considered an asymmetric random walk, with
one or two boundaries, on a 1-Dimensional lattice. At the boundaries, the
walker is either absorbed or reflected back to the system. Budhiraja and
Dupuis, [5] considered the large deviation properties of the empirical measure
for 1-Dimensional constrained processes, such as reflecting Wiener processes,
the M/M/1 queue, and discrete-time analogs. L’epingle, [18] examined
stochastic variational inequalities to provide a unified treatment for SDEs
existing in a closed domain with normal reflection and (or) singular repellent
drift. When the domain is a polyhedron, he proved that the reflected-repelled
Wiener process does not hit the non-smooth part of the boundary. Bramson et
al., [4] examined the positive recurrence (to the origin) of reflecting Wiener
processes in 3-Dimensional space. Ball and Roma, [3] examined the detection of
mean reversion within reflecting barriers with an application to the European
exchange rate mechanism (EERM).
### 2.2. Multi-Skew Brownian Motion
The concept of skew Brownian motion (SBM) was first introduced in the book by
Itô and McKean, [13] as a diffusion with a drift represented by a generalized
function, which solves an SDE involving its symmetric local time.
Specifically, an SBM $X=\\{X_{t}\\}_{t\in[0,T]}$ is the solution of,
$X_{t}=B_{t}+(2\alpha-1)L^{0}_{t}(X),\quad\alpha\in(0,1),$
where $B=\\{B_{t}\\}_{t\in[0,T]}$ is a standard Brownian motion (BM). However,
standard Brownian motion is oftentimes abbreviated as SBM, so to reduce any
possible confusion and to eliminate any reference to the original botanical
context of Robert Brown -to which the term ‘Brownian motion’ is attributed -we
will express $B_{t}$ in the rest of this paper in the more mathematically
precise context as a Wiener process $W=\\{W_{t}\\}_{t\in[0,T]}$.
$L^{0}_{t}(X)=\lim_{\epsilon\downarrow
0}\frac{1}{2\epsilon}\int^{t}_{0}\mathds{1}_{\\{|B_{X_{s}}|\leqslant\epsilon\\}}\,ds$
is the symmetric local time at $X_{0}$. Note that for $\alpha=\frac{1}{2}$,
the above equation is reduced to a Wiener process. Harrison and Shepp, [10]
then considered diffusions with a discontinuous local time. The literature on
SBMs was consolidated by Harrison and Shepp, [10] and later by Lejay, [17].
Applications of SMBs were extended by Ramirez, [26] by applying multi-SBM
(M-SBM) and diffusions in layered media that involve advection flows.
Appuhamillage and Sheldon, [1] linked SBMs to existing research by deriving
the first passage time (FPT) of SBM. In 2015, the multiple barrier research of
[26] was extended by Atar and Budhiraja, [2], Ouknine et al., [23] who
collapsed barriers to an accumulation point, and by Dereudre et al., [6] who
derived an explicit representation of the transition densities of SBM with
drift and two semipermeable barriers. Mazzonetto, [21] extended her prior
research [6] on SBMs by deriving exact simulations of SBMs and M-SBMs with
discontinuous drift in her Doctoral dissertation. Gairat and Shcherbakov, [8]
applied SBMs and their functionals to finance. Krykun, [14] also extended the
convergence of SBM with local times at several points that are contracted into
a single one. Mazzonetto, [22] has also recently examined the rates of
convergence to the local time of oscillating and SBMs.
For applications of BGC stochastic processes, the reader is referred to [30],
[28], [29], [31].
## 3\. Methodology
Before proceeding to the main result of this paper, it is instructive to
establish a theoretical foundation by considering the key research for Itô
diffusions constrained by two reflective barriers and then examining the
necessary extensions that need to be derived for M-SBM constrained Itô
diffusions.
### 3.1. Itô Diffusions Constrained by Two Reflective Barriers
Given a filtered probability space
$\Lambda:=(\Omega,\mathcal{F},\\{\mathcal{F}_{t}\\}_{t\geqslant
0},\mathbb{P})$ with the filtration $\\{\mathcal{F}_{t}\\}_{t\geqslant 0}$,
then the reflected diffusion $\\{X_{t}:t\geqslant 0\\}$ with two-sided
barriers $\mathfrak{B}_{L}$, $\mathfrak{B}_{U}$ at $a$, $b$ respectively can
be defined as,
$dX_{t}=f(X_{t})\,dt+g(X_{t})\,dW_{t}+\underbrace{\overbrace{d\mathcal{A}_{t}}^{a}-\overbrace{d\mathcal{B}_{t}}^{b}}_{\text{regulators}},\quad
X_{0}\in(a,b),\quad x\in[a,b].$ (3.1)
###### Remark 3.1.
The process $\mathcal{A}$ and $\mathcal{B}$ are known in the literature as
‘regulators’ for the points $a$ and $b$, however, we believe that a better
term is ‘detectors’ because they mainly detect or count how many times $X_{t}$
reaches $a$ and $b$.
Here, the drift $f(x)$ is Lipschitz continuous, the diffusion $g(x)$ is
strictly positive and Lipschitz continuous. $a$, $b$ with
$-\infty<a<b<+\infty$ are given real numbers, and $(W_{t},0\leqslant
t<\infty)$ is the 1-Dimensional standard Wiener process on $\Lambda$. The
processes $\mathcal{A}=\\{\mathcal{A}_{t}\\}_{t\geqslant 0}$ and
$\mathcal{B}=\\{\mathcal{B}_{t}\\}_{t\geqslant 0}$ are the minimal non-
decreasing and non-negative processes, which restrict the process
$X_{t}\in[a,b],\forall t\geqslant 0$. More precisely, the processes
$\\{\mathcal{A}_{t},t\geqslant 0\\}$ and $\\{\mathcal{B}_{t},t\geqslant 0\\}$
increase only when $X_{t}$ hits the boundary $a$ and $b$, respectively, so
that $\mathcal{A}_{0}=\mathcal{B}_{0}=0$, $\mathds{1}$ is the characteristic
function of the set and,
$\int^{\infty}_{0}\mathds{1}_{\\{X_{t}>a\\}}\,d\mathcal{A}_{t}=0,\quad\int^{\infty}_{0}\mathds{1}_{\\{X_{t}<b\\}}\,d\mathcal{B}_{t}=0.$
(3.2)
Furthermore, the processes $\mathcal{A}$ and $\mathcal{B}$ are uniquely
determined by the following properties (Harrison, [11]),
1. (1)
both $t\rightarrow\mathcal{A}_{t}$ and $t\rightarrow\mathcal{B}_{t}$ are
nondecreasing processes,
2. (2)
$\mathcal{A}$ and $\mathcal{B}$ increase only when $X=a$ and $X=b$,
respectively, that is
$\int^{t}_{0}\mathds{1}_{\\{X_{s}=a\\}}\,d\mathcal{A}_{s}=\mathcal{A}_{t}$ and
$\int^{t}_{0}\mathds{1}_{\\{X_{s}=b\\}}\,d\mathcal{B}_{s}=\mathcal{B}_{t}$,
for $t\geqslant 0$.
We can consider the two reflective barriers as forming a 2-SBM. Furthermore,
it is instructive for BGCSP to see the two barriers $a$ and $b$ in
$\mathbb{R}^{2}$, shown in Figure 4(a) as embedded in $\mathbb{R}^{3}$ by a
governing BGC surface $\Psi(X_{t},t)$, as shown in Figure 4(b).
(a). Barriers in $\bm{\mathbb{R}^{2}}$ \- Contour plot (b). Barriers in
$\bm{\mathbb{R}^{3}}$\- Contour & surface plot
Figure 4. Diffusion Between Two Constant Reflective Barriers
###### Remark 3.2.
Many papers such as [12] and Linetsky, [19] define the two barriers at the
boundaries of $[0,r]$ for some $r\in\mathbb{R}_{+}$. By applying a series of
transformations, one can map their findings to the context of BGCSP, as shown
in Figure 5.
Figure 5. Mapping Traditional Barriers to BGC Barriers
$\blacksquare$
### 3.2. Multi-Skew Brownian Motion
Having examined Itô diffusions constrained by two reflective barriers, we now
consider the so-called multi-skew Brownian motion, constrained by multiple
barriers of varying degrees of reflectiveness.
###### Definition 3.3.
(M-SBM). A multi-skew Brownian motion (M-SBM) represented (adapted from
Mazzonetto, [21]) by $(\beta_{1},...,\beta_{n})$-SBM, or more simply by
$\beta$-SBM with $n$ semipermeable barriers of varying permeability
coefficients, respectively $\beta=(\beta_{1},...,\beta_{n})$, $x_{0}$ is the
starting position, the coefficients $\beta_{j}\in[-1,1]$, barriers
$x_{1}<...<x_{n}$, local times $L^{x_{j}}_{t}$, and $\mathcal{E}$ is the set
of all parameters of the M-SBM, then the M-SBM is expressed as,
$\displaystyle{\begin{cases}\begin{array}[]{ccl}\displaystyle
dX_{t}&=&\mu\,dt+\sigma\,dW_{t}+\beta_{1}\,dL^{x_{1}}_{t}+...+\beta_{n}\,dL^{x_{n}}_{t}\\\
\displaystyle X_{0}&=&x_{0}\\\
\displaystyle\mathcal{E}&=&\big{\\{}\mu,\sigma,\left(\beta_{1},...,\beta_{n}\right)\big{\\}}\in\mathbb{R}\\\
\displaystyle
L^{x_{j}}_{t}&=&\int^{t}_{0}\mathds{1}_{\\{X_{s}=x_{j}\\}}\,dL^{x_{j}}_{s},\text{
}\forall j\in\\{1,...,n\\}\end{array}.\end{cases}}$
$\blacksquare$
###### Remark 3.4.
The term $\sigma$ has been added to the [21] definition so that the process
can fit a wider range of models. We require that $\beta_{i}\in[-1,1]$. The
cases when $\beta_{i}=\\{-1,1\\}$ are said to exhibit zero permeability (i.e.
impermeability or full reflectiveness), and when $\beta_{i}\in(-1,1)$ the
process is said to exhibit partial reflectiveness (i.e. semi permeability).
Note that a 0-SBM is simply a Wiener process and a $\pm$ $1$-SBM is a
positively/negatively reflected Wiener process. The definition of M-SBM is
illustrated in Figure 6, representing a typical example of M-SBM. The standard
definition of a skew Brownian motion has a drift term $\mu\in\mathbb{R}$
making it no longer, strictly speaking, Brownian motion.
Figure 6. Example Standard M-SBM Framework
The M-SBM of Definition 3.3 allows any barrier combination to be either fully
reflective or semipermeable.
###### Remark 3.5.
If the permeability is $\beta_{j}=1$ at the barrier $x_{j}$ for some
$j\in\\{1,...,j_{1},j,j+1,...,n\\}$ and the initial position is
$x_{0}\in(x_{j},+\infty)$, then the lower barriers $x_{1},...,x_{j-1}$ will
almost surely be never reached [21]. For this to happen, it must be that
$\beta_{j}=-1$, so that as the Itô diffusion descends (down) to $x_{j}$, it is
fully reflected back (up). This of course assumes that the diffusion
coefficient $\sigma$ is ‘relatively small’ and so allows the Itô diffusion to
be ‘well behaved’ and never ‘jump over’ and go below the $x_{j}$ barrier, as
also illustrated in Figure 6.
###### Theorem 3.6.
(Multiple Barriers of M-SBM Merging to One, adapted from Mazzonetto, [21]).
Before expressing the skewness parameter $\beta$ for a general number of
barriers $n$, we derive $\beta$ for the first two simplest scenarios.
If $n=2$, $\beta_{1},\beta_{2}\in[-1,1]$, $\mu\in\mathbb{R}$ and
$x^{(n)}_{2}=x_{1}+\frac{1}{n}$, $\forall n\in\mathbb{N}$. Let,
$\beta:=\frac{\beta_{1}+\beta_{2}}{1+\beta_{1}\beta_{2}}.$
Let us denote by $(X^{(n)}_{t})_{t}$ the $(\beta_{1},\beta_{2})$-SBM with
drift $\mu$, barriers $x_{1},...,x_{n}$, and denote by $(Y_{t})_{t}$ the 1-SBM
with drift $\mu$, and barrier $x_{1}$. Let us assume $X^{(n)}_{0}=Y_{0}$, then
$X^{(n)}$ converges to $Y$ in the following sense,
$\mathbb{E}\left[\sup_{s\in[0,t]}|X^{(m)}_{s}-Y_{s}|\right]\xrightarrow{m\to\infty}0,\text{
}\forall t\geqslant 0.$
The same holds in the case of $n>2$ barriers merging. In this case
$(X^{(n)}_{t})_{t}$ is the $(\beta_{1},...,\beta_{n})$-SBM with drift
$\mu\in\mathbb{R}$, skewness parameters $\beta_{1},...,\beta_{n}\in[-1,1]$ and
barriers $x_{1}\in\mathbb{R}$, $x_{j+1}:=\frac{j}{n}+x_{1},\text{ }\forall
j\in\\{1,...,n-1\\}$.
The skewness parameter $\beta$ of the limit $1$-SBM is given by,
$\beta:=\frac{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})}{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})}.$
(3.3)
If $n$ is even,
$\beta=\frac{\displaystyle\sum^{n}_{j=1}\beta_{j}+\sum_{j_{1}<j_{2}<j_{3}}\beta_{j_{1}}\beta_{j_{2}}\beta_{j_{3}}+...+\sum_{j_{1}<...<j_{n-1}}\beta_{j_{1}}...\beta_{j_{n-1}}}{\displaystyle
1+\sum_{j_{1}<j_{2}}\beta_{j_{1}}\beta_{j_{2}}+\sum_{j_{1}<...<j_{4}}\beta_{j_{1}}\beta_{j_{2}}\beta_{j_{3}}\beta_{j_{4}}+...+\beta_{1}\beta_{2}...\beta_{j_{n}}}.$
(3.4)
If $n$ is odd,
$\beta=\frac{\displaystyle\sum^{n}_{j=1}\beta_{j}+\sum_{j_{1}<j_{2}<j_{3}}\beta_{j_{1}}\beta_{j_{2}}\beta_{j_{3}}+...+\beta_{j_{1}}...\beta_{j_{n}}}{\displaystyle
1+\sum_{j_{1}<j_{2}}\beta_{j_{1}}\beta_{j_{2}}+\sum_{j_{1}<...<j_{4}}\beta_{j_{1}}\beta_{j_{2}}\beta_{j_{3}}\beta_{j_{4}}+...+\sum_{j_{1}<...<j_{n-1}}\beta_{1}\beta_{2}...\beta_{j_{n-1}}}.$
(3.5)
###### Proof.
Refer to [21] and [15]. ∎
The M-SBM framework also only considers one half-plane at a time, so that the
transition density (or distribution) of the upper plane is assumed to be the
same for the lower half plane, which is not always the case (except for
BGCSP). We show below that whilst BGCSPs are a special case of M-SBMs, they
have some unique properties that make them of particular interest among the
larger class.
### 3.3. Constructing BGC Stochastic Processes
We can compliment Mazzonetto by condensing all possible local barrier
combinations to the following four possible global barrier combinations that
comprise a lower barrier $\alpha_{j}$ and an upper barrier $\alpha_{k}$, as
shown in Figure 7.
(a). (b).
(c). (d).
Figure 7. Generalised Barrier Combination Arguments
The diagrammatic summary of possible cases represented in Figure 7 is formally
stated as Lemma 3.7 which is then used in Theorem 3.8. This Theorem formally
expresses that the barriers of an M-SBM merge to a 1-SBM, to which the process
converges.
###### Lemma 3.7.
If any $|\alpha_{j}|<1$ for some $|\alpha_{k}|=1$, or similarly for any
$|\alpha_{k}|<1$, then the barrier $\pm 1$ will dominate the barrier $\neq\pm
1$, almost surely, as shown in Figure 7. Furthermore, if there are more than
two fully reflective barriers, they will merge and effectively operate as one
of the four possible combinations of Figure 7.
###### Proof.
We first assume that there exists only one reflective barrier $|\alpha_{j}|=1$
and $n$ semipermeable barriers $|\alpha_{j}|<1$. We then consider the two
SDEs;
$\begin{array}[]{rcl}X_{t}&=&\mu_{1}\,dt+\sigma_{1}\,dW_{t}+\underbrace{\alpha_{1}\,dL^{\alpha_{1}}_{t}}_{|\alpha_{i}|=1}+\underbrace{\alpha_{2}\,dL^{\alpha_{2}}_{t}+...+\alpha_{n}\,dL^{\alpha_{n}}_{t}}_{|\alpha_{i}|<1}\\\
Y_{t}&=&\mu_{2}\,dt+\sigma_{2}\,dW_{t}+\underbrace{\alpha_{1}\,dL^{\alpha_{1}}_{t}}_{|\alpha_{i}|=1}\end{array},$
(3.6)
where $Y_{t}$ is an unconstrained Itô diffusion and $X_{t}$ is a constrained
Itô diffusion according to the above barrier constraints. Let
$\delta=\sum^{n}_{i=1}\alpha_{i}$, so $\delta<1$ or $\delta\geqslant 1$.
If $\delta<1$, then $\alpha_{i}$ will dominate $\delta$ as it will vanish
(i.e. $\delta\rightarrow 0$) such that,
$\displaystyle\sup_{t\rightarrow\infty}\Big{\\{}|X_{t}|-|Y_{t}|\Big{\\}}=0.$
If $\delta\geqslant 1$, then $\delta$ will dominate $\alpha_{1}$ and merge
(i.e. $\alpha_{1}\rightarrow\delta$) such that,
$\displaystyle\sup_{t\rightarrow\infty}\Big{\\{}|X_{t}|-|Y_{t}|\Big{\\}}=X_{t}.$
Next, assume that there exist two fully reflective barriers $|\alpha_{j}|=1$,
$|\alpha_{k}|=1$ and $n$ semipermeable barriers $|\alpha_{i}|<1$. (3.6) now
equates to,
$\begin{array}[]{rcl}X_{t}&=&\mu_{1}\,dt+\sigma_{1}\,dW_{t}+\underbrace{\alpha_{1}\,dL^{\alpha_{1}}_{t}}_{|\alpha_{i}|=1}+\underbrace{\alpha_{2}\,dL^{\alpha_{2}}_{t}+...+\alpha_{n}\,dL^{\alpha_{n}}_{t}}_{|\alpha_{j}|=1,\text{
}|\alpha_{k}|=1}\\\
&&+\underbrace{\alpha_{1}\,dL^{\alpha_{1}}_{t}}_{|\alpha_{i}|=1}+\underbrace{\alpha_{2}\,dL^{\alpha_{2}}_{t}+...+\alpha_{n}\,dL^{\alpha_{n}}_{t}}_{\delta=|\alpha_{i}|<1}\\\
Y_{t}&=&\mu_{2}\,dt+\sigma_{2}\,dW_{t}+\underbrace{\alpha_{1}\,dL^{\alpha_{1}}_{t}}_{\delta=|\alpha_{i}|<1}\end{array}.$
(3.7)
If $\delta<1$, then $\alpha_{j}$ and (or) $\alpha_{k}$ will dominate $\delta$
and as it will vanish (i.e. $\delta\rightarrow 0$) and if $\delta\geqslant 1$,
then $\delta$ will dominate $\alpha_{j}$ and (or) $\alpha_{k}$ hence merge to
$\alpha_{j}$ and $\alpha_{k}$, such that
$\sup_{t\rightarrow\infty}\Big{\\{}|X_{t}|-|Y_{t}|\Big{\\}}=0$ and
$\sup_{t\rightarrow\infty}\Big{\\{}|X_{t}|-|Y_{t}|\Big{\\}}=X_{t}$,
respectively.
Finally, if there are more than $N\geqslant 3$ fully reflective barriers
$|\alpha_{i}|=1$ and $n$ semipermeable barriers, then the new barriers will
effectively be a linear combination of any two possible combinations in Figure
7, depending on how the fully reflective barriers of $N$ are defined,
completing the proof for all scenarios. ∎
To contrast Figure 4 for two reflective constant barriers, for BGCSP we have
two hidden reflective barriers which also constrain the interior between the
boundaries, as shown in Figure 8, where (a) shows the multiple barriers in
$\mathbb{R}^{2}$, and (b) shows how the multiple barriers are projected from
$\mathbb{R}^{3}$.
(a). Barrier in $\bm{\mathbb{R}^{2}}$ \- Contour plot (b). Barrier in
$\bm{\mathbb{R}^{3}}$\- Contour & surface plot
Figure 8. Diffusion Between Two BGC Reflective Barriers
Leveraging the work of Ramirez, [26], we partition $X$ into countably infinite
intervals $I_{k}=(x_{k},x_{k+1})$, $\forall k\in\mathbb{R}$ forming the
sequence $\\{I_{-\infty},...,I_{-1},I_{1},...,I_{\infty}\\}$ such that the
standard conditions are met; $I_{k}\bigcap I_{k+1}=\varnothing\text{ }\text{
}\forall k\in\mathbb{R}$, $\varnothing\notin X$ and
$\bigcup^{\infty}_{k=-\infty}I_{k}=X$. We wish to shrink the size of each
interval $|I_{k}|=|x_{k+1}-x_{k}|$ to zero as we apply more and more
intervals, where $\lim_{k\rightarrow\infty}|x_{k+1}-x_{k}|\rightarrow 0$ and
$\int^{\infty}_{-\infty}I_{k}\,dk<\infty$. This is because we wish to
constrain the Itô diffusion by the BGC function $\Psi(X_{t},t)\in\mathbb{R}$.
In terms of BGC stochastic processes, we effectively have a
$(\beta_{-n},...,\beta_{-1},\beta_{1},...,\beta_{n})$-SBM and will express it
as,
$\displaystyle{\begin{cases}\begin{array}[]{ccl}\displaystyle
dX_{t}&=&\mu\,dt+\sigma\,dW_{t}+\underbrace{\underbrace{\sum^{-1}_{j=-n}\beta_{j}\,dL^{x_{j}}_{t}}_{<0}+\underbrace{\sum^{n}_{j=1}\beta_{j}\,dL^{x_{j}}_{t}}_{>0}}_{\displaystyle\Psi(X_{t},t)}\\\
\displaystyle X_{0}&=&0\\\
\displaystyle\mathcal{E}&=&\big{\\{}\mu,\sigma,(\beta_{-n},...,\beta_{-1},\beta_{1},...,\beta_{n})\big{\\}}\in\mathbb{R}\\\
\displaystyle
L^{x_{j}}_{t}&=&\int^{t}_{0}\mathds{1}_{\\{X_{s}=z_{j}\\}}\,dL^{x_{j}}_{s},\text{
}j\in\\{-n,...,-1,1,...,n\\}\end{array},\end{cases}}$ (3.8)
as illustrated in Figure 9.
Figure 9. Constructing BGC Stochastic Processes from M-SBM Framework
###### Theorem 3.8.
(Skewness Parameter of BGC Stochastic Processes). Let us denote by
$(X^{(n)}_{t})_{t}$ the $(\beta_{-n},...,\beta_{n})$-SBM with drift $\mu$ and
barriers $x_{-n},...,x_{n}$, and denote by $(Y_{t})_{t}$ the 2-SBM (i.e.
$\beta_{1},\beta_{2}$-SMB) with drift $\mu$, diffusion $\sigma$ and barrier
$x_{1}$. Let us assume $X^{(n)}_{0}=Y_{0}$, then $X^{(n)}$ converges to $Y$ in
the following sense,
$\lim_{n\to\infty}\left\\{\mathbb{E}\Big{[}\sup_{s\in[0,t]}|X^{(n)}_{s}-Y_{s}|\Big{]}\right\\}=0,\text{
}\forall t\in[0,T].$
The same holds in the case of $n>2$ barriers merging. In this case
$(X^{(n)}_{t})_{t}$ is the $(\beta_{-n},...,\beta_{n})$-SBM with drift
$\mu\in\mathbb{R}$, diffusion $\sigma\in\mathbb{R}$, skewness parameters
$\beta_{-n},...,\beta_{n}\in[-1,1]$ and barrier $x_{1}\in\mathbb{R}$,
$x_{j+1}:=\frac{j}{n}+x_{1},\text{ }\forall j\in\\{1,...,n-1\\}$. Then
$\beta=0$.
###### Proof.
In contrast to the skewness parameter of the limit $1$-SBM in (3.3), the
corresponding skewness parameter of the limit $2$-SBM for BGCSP is given by
(3.9),
$\begin{array}[]{rcl}\beta&:=&\underbrace{\frac{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})}{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})}}_{\bm{>0}}+\underbrace{\frac{\displaystyle\prod^{-n}_{j=-1}(1+\beta_{j})-\prod^{-n}_{j=-1}(1-\beta_{j})}{\displaystyle\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})}}_{\bm{<0}}\\\
&=&\leavevmode\resizebox{422.77661pt}{}{$\frac{\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})\right]\left[\displaystyle\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})\right]+\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\right]\left[\displaystyle\prod^{-n}_{j=-1}(1+\beta_{j})-\prod^{-n}_{j=-1}(1-\beta_{j})\right]}{\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\right]\left[\displaystyle\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})\right]}$}\\\
&=&\leavevmode\resizebox{422.77661pt}{}{$\frac{\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})\right]}{\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})\right]}$}\\\
&&+\leavevmode\resizebox{422.77661pt}{}{$\frac{\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})-\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})\right]}{\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})\right]}.$}\end{array}$
(3.9)
Noting that due to the symmetry of BGCSP about the origin,
$\displaystyle\prod^{-n}_{j=-1}(1-\beta_{j})=\prod^{n}_{j=1}(1+\beta_{j}),\quad\displaystyle\prod^{-n}_{j=-1}(1+\beta_{j})=\prod^{n}_{j=1}(1-\beta_{j}),$
which allows the $\prod^{n}_{j=1}(1+\beta_{j})$ terms to factor out in (3.9)
giving,
$\begin{array}[]{rcl}\beta&=&\leavevmode\resizebox{422.77661pt}{}{$\frac{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\left[\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})-\left.\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\left[\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})+\left.\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}$}\\\
&&+\leavevmode\resizebox{422.77661pt}{}{$\frac{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\left[\prod^{-n}_{j=-1}(1+\beta_{j})-\prod^{-n}_{j=-1}(1-\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})+\left.\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\left[\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})+\left.\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}$}\end{array}$
which expands to,
$\begin{array}[]{rcl}\beta&=&\leavevmode\resizebox{422.77661pt}{}{$\frac{\displaystyle\left[\prod^{-n}_{j=-1}(1-\beta_{j})-\left.\left(\prod^{n}_{j=1}(1-\beta_{j})\right)^{2}\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}{\displaystyle\left[\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})+\left.\left(\prod^{n}_{j=1}(1-\beta_{j})\right)^{2}\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}$}\\\
&&+\leavevmode\resizebox{422.77661pt}{}{$\frac{\displaystyle\left[-\prod^{-n}_{j=-1}(1-\beta_{j})+\left.\left(\prod^{n}_{j=1}(1-\beta_{j})\right)^{2}\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}{\displaystyle\left[\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})+\left.\left(\prod^{n}_{j=1}(1-\beta_{j})\right)^{2}\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}.$}\end{array}$
(3.10)
It is clear that the numerator equates to 0 and so $\beta=0$, completing the
proof. ∎
###### Remark 3.9.
Due to the bi-directionality of BGC stochastic processes, then $n$ in (3.4) is
always even, so $\beta=0$. From Portenko, [25], if $|x_{i}|\leqslant 1$, then
$|\sum^{n}_{i=1}\alpha_{i}|\geqslant 1$ is of special interest. With BGCSP,
$\alpha_{-n}+\alpha_{n}=0$,
$\alpha_{-n+1}+\alpha_{n-1}=0$,…,$\alpha_{-1}+\alpha_{1}=0$ due to their
symmetry about the origin, hence $|\sum^{n}_{i=1}\alpha_{i}|=0$ as well.
###### Theorem 3.10.
(Cylindrical BGCSPs are 2-SBMs). For a complete filtered probability space
$(\Omega,\mathcal{F},\\{\mathcal{F}\\}_{t\geqslant 0},\mathbb{P})$ and a BGC
function $\Psi(y):\mathbb{R}\rightarrow\mathbb{R}$, $\forall y\in\mathbb{R}$,
then the corresponding BGC Itô diffusion is defined as follows,
$dY_{t}=f(Y_{t},t)\,dt+g(Y_{t},t)\,dW_{t}-\underbrace{\operatorname{sgn}[Y_{t}]\Psi(Y_{t},t)}_{\textbf{BGC}},$
(3.11)
where $f(Y_{t},t)$ is the drift coefficient, $g(Y_{t},t)$ is the diffusion
coefficient, $\operatorname{sgn}[x]$ is the usual sign function, $f(Y_{t},t)$,
$g(Y_{t},t)$, $\Psi(Y_{t},t)$ are convex functions and the 2-SBM is defined
by,
$\displaystyle{\begin{cases}\begin{array}[]{rcl}\displaystyle
dX_{t}&=&\mu\,dt+\sigma\,dW_{t}+\underbrace{\beta_{-1}\,dL^{x_{-1}}_{t}}_{<0}+\underbrace{\beta_{1}\,dL^{x_{1}}_{t}}_{>0}\\\
\displaystyle X_{0}&=&0,\text{
}\mathcal{E}\Big{(}\mu,\sigma,(\beta_{-1},\beta_{1})\Big{)}\\\ \displaystyle
L^{x_{j}}_{t}&=&\int^{t}_{0}\mathds{1}_{\\{X_{s}=z_{j}\\}}\,dL^{x_{j}}_{s},\text{
}j\in\\{-1,1\\}\end{array},\end{cases}}$ (3.12)
then, $Y_{t}\rightarrow X_{t}$ almost surely.
###### Proof.
It is conceivable that under general non-constant $f(X_{t},t)$ and
$g(X_{t},t)$ and some generalized BGC function
$\Psi^{\prime}(f(X_{t},t),g(X_{t},t),X_{t},t)$ that $\Psi^{\prime}(x)$ could
modulate $X_{t}$ such that it is bounded above and below by a constant barrier
at $a$ and $b$, respectively, where $b=-a$. For this theorem, we are required
to prove that constant over time (i.e. cylindrical) BGC functions
$\Psi(X_{t},t)$ will converge almost surely to a 2-SBM. We know from at least
Krykun, [14] that if $|\alpha_{i}|\leqslant 1$, $i\in\\{1,...,n\\}$, there
exists a strong solution to (3.12). Since the BGC functions
$\Psi(X_{t},t)\in\mathbb{R}$ are convex, there exists some value $\kappa$ for
both a hidden lower barrier $\mathfrak{B}_{L}$ and a hidden upper barrier
$\mathfrak{B}_{L}$ that are induced by $\Psi(X_{t},t)$. For BGCSP, there is no
fully reflective barrier defined in advance as there is with M-SBM. However,
there are still two fully reflective barriers in BGCSP because the BGC term
$\Psi(X_{t},t)$ will enable the constrained Itô process $Y_{t}$ to eventually
be overtaken by the underlying unconstrained Itô process $X_{t}$ such that
$|X^{(n)}_{s}|\geqslant|Y_{s}|$ giving,
$\mathfrak{B}_{U}=\kappa\text{ for
}\lim_{n\uparrow\kappa}\left\\{\mathbb{E}\Big{(}\sup_{s\in[0,t]}\Big{|}|X^{(n)}_{s}|-|Y_{s}|\Big{|}\Big{)}\right\\}=0,$
(3.13) $\mathfrak{B}_{L}=-\kappa\text{ for
}\lim_{n\downarrow-\kappa}\left\\{\mathbb{E}\Big{(}\sup_{s\in[0,t]}\Big{|}|X^{(n)}_{s}|-|Y_{s}|\Big{|}\Big{)}\right\\}=0.$
(3.14)
For this to be true, it must be shown that $\kappa>0$ exists. We create a
small neighborhood $\mathcal{N}$ about the initial point $x_{0}$ of radius
$\epsilon\in\mathbb{R}_{+}$ such that
$\mathcal{N}(x_{0})=(x_{0}-\epsilon,x_{0}+\epsilon)$. As
$\epsilon\rightarrow+\infty$, $\mathfrak{B}_{L}$ and $\mathfrak{B}_{U}$ will
eventually lie in $\mathcal{N}(x_{0})$.
If $x_{0}>0$, then $\sup\\{\mathcal{N}(x_{0})\\}=x_{0}+\min(\epsilon)$ such
that $\mathfrak{B}_{U}=\sup\\{\mathcal{N}(x_{0})\\}=\kappa$.
If $x_{0}=0$, then $\sup\\{\mathcal{N}(x_{0})\\}=\inf\\{\mathcal{N}(x_{0})\\}$
such that $\mathfrak{B}_{L}=-\mathfrak{B}_{U}=|\mathfrak{B}_{U}|=\kappa$.
If $x_{0}<0$, then $\inf\\{\mathcal{N}(x_{0})\\}=x_{0}-\min(\epsilon)$ such
that $\mathfrak{B}_{L}=\inf\\{\mathcal{N}(x_{0})\\}=-\kappa$.
Hence $\kappa$ exists and its value is
$\kappa=f(\Psi(X_{t},t),X_{t},t,\mu,\sigma)$ for some function
$f:\mathbb{R}\rightarrow\mathbb{R}$. Having found $\kappa$, we know that the
reflectiveness at $\pm\kappa$, i.e. $|\beta_{\kappa}|=1$,
$|\beta_{-\kappa}|=1$ and before $\pm\kappa$, i.e. $|\beta_{i}|<1$,
$|\beta_{-i}|<1$. Hence,
$\beta_{-\kappa},...,\beta_{-1},\beta_{1},...,\beta_{\kappa}$ for $X_{t}$ must
be scaled for $Y_{t}$ by $\Psi(X_{t},t)$ and since $\Psi(X_{t},t)$ is strictly
convex and symmetrical about the origin, then the ordering is preserved,
$\frac{\beta_{-\kappa}}{\Psi(\kappa,t)}<...<\frac{\beta_{-1}}{\Psi(\kappa,t)}<\frac{\beta_{1}}{\Psi(\kappa,t)}<...<\frac{\beta_{\kappa}}{\Psi(\kappa,t)}.$
(3.15)
(3.15) ensures that a strong solution to BGCSP exists within a 2-SBM
framework, completing the proof. ∎
So far, our formulations of BGC functions have been expressed in the general
form $\Psi(X_{t},t)$, but we have considered BGC barriers induced by time-
independent convex surfaces which can be specified by just $\Psi(X_{t})$,
hence M-SBM is related to BGCSPs with $\Psi(X_{t})$. However, since the
barriers have been specified to be able to change not only under space
(distance) but over time as well, we demonstrate this additional complexity of
BGCSPs in Figure 10.
Figure 10. Example BGC Function $\Psi(X_{t},t)$ Constraining BGCSPs over Space
and Time, more so than in M-SBM
Having developed the M-SBM and 2-SBM frameworks for BGCSP, we can now support
this by numerical simulations in the Results and Discussion section.
## 4\. Results and Discussion
In the following simulations, the underlying unconstrained Itô diffusions have
drift $\mu=0$ and diffusion $\sigma=1$, resulting in just the Wiener process.
This is so that the subsequent impact of BGC can be easily compared. Despite
this, we still refer to these as the more general Itô diffusions because these
parameters can be modified for one’s specific requirements.
To validate the existing M-SBM research and to support our comparison of BGCSP
with M-SBM, we develop Algorithm 1 which is used to progressively introduce
additional reflective barriers. In the subsequent series of simulations, we
introduce 2, 4, 8, 16 and finally 32 semipermeable barriers, with increasing
reflectiveness (i.e. decreasing permeability) the further the Itô diffusion is
from the origin, which are simulated via Algorithm 1.
1 # Pseudocode based on R
2 INPUT:
3 $\mu=drift,\text{ }\sigma=diffusion,\text{ }i=simulation\text{ }index,\text{
}$s$=\\#\text{ }simulations=10,000,\text{ }t=time\text{ }steps=1001,\text{
}j=time\text{ }index,\text{ }Print\\_Simulations=TRUE$
4 OUTPUT:
5 $ID\\_value\leftarrow matrix(0:0,nrow=TimeSteps,ncol=Simulations)$
6 $T\\_1000\leftarrow matrix(0:0,nrow=Simulations,ncol=1)$
7 for _(i=1:s)_ do
8 for _(j=1:t)_ do
9 if _(t $==$1)_ then
10 $ID\\_value[t,i]\leftarrow 0$
11 else
12 $dt=(t/TimeSteps)$
13 $ID\\_value[t,i]\leftarrow(\mu*dt+\sigma*rnorm(1))$
14 $Sum\\_ID\\_value\leftarrow sum(ID\\_value[,i])$
15
16 $\\#$ UPPER BARRIERS$================================$
17 if _$((Sum\\_ID\\_value >0)\text{ }\&\&\text{
}(Sum\\_ID\\_value<=UpperBarrier\\_01))$_ then
18 Do nothing;
19 else if _$((Sum\\_ID\\_value >UpperBarrier\\_01)\text{ }\&\&\text{
}(Sum\\_ID\\_value<=UpperBarrier\\_02))$_ then
20
$ID\\_value[t,i]\leftarrow(ID\\_value[t,i]-abs(ID\\_value[t,i]*ID\\_value[t,i])/100)$
21 else if _$(Sum\\_ID\\_value >UpperBarrier\\_16)$_ then
22 $ID\\_value[t,i]\leftarrow(-abs(ID\\_value[t,i]))$
23 else
24 $ID\\_value[t,i]\leftarrow ID\\_value[t,i]$
25 end if
26
27 $\\#$ LOWER BARRIERS$================================$
28 if _$((Sum\\_ID\\_value <0)\text{ }\&\&\text{
}(Sum\\_ID\\_value>=LowerBarrier\\_01))$_ then
29 Do nothing;
30
31 else if _$(Sum\\_ID\\_value <LowerBarrier\\_16)$_ then
32 $ID\\_value[t,i]\leftarrow(abs(ID\\_value[t,i]))$
33 else
34 $ID\\_value[t,i]\leftarrow ID\\_value[t,i]$
35 end if
36
37 end if
38 if _(Print_Simulations $==$TRUE)_ then
39 if _(i $==$1)_ then
40 $plot(T,cumsum(ID_{v}alue[,i]),type="l",ylim=c(yMax,yMin))$
41 else
42 $lines(T,cumsum(ID_{v}alue[,i]),type="l",ylim=c(yMax,yMin))$
43 end if
44
45 end if
46
47 end for
48 $T\\_1000[i]<-sum(ID\\_value[,i])$
49 end for
Algorithm 1 Approximating BGC Stochastic Processes via Successive Reflective
Barriers
The simplest application of Algorithm 1 is shown for two fully reflective
barriers in Figure 11.
(a). 1,000 Simulations, (b). 10,000 Simulation Density
Figure 11. 10,000 Simulations of 1,000 Step 1-Dimensional Itô Diffusions With
2 Reflective Barriers
Figure 11 has 2 fully reflective barriers at $\pm 10$ generated using
Algorithm 1. This was then increased to 4 barriers (2 fully reflective and 2
semipermeable) as shown in Figure 12.
(a). 1,000 Simulations, (b). 10,000 Simulation Density
Figure 12. 10,000 Simulations of 1,000 Step 1-Dimensional Itô Diffusions With
4 Reflective Barriers
In Figure 12, we make the barriers at $\pm 20$ fully reflective and the
barriers at $\pm 10$ now to be semipermeable. Although it may not yet be
apparent due to the thickness of the drawn barriers, we have and will continue
to increase the thickness of the barriers to highlight the increasing
reflectiveness (and decreasing semipermeability) the further the Itô
diffusions are from the origin. The total number of barriers was doubled again
to result in 8 barriers (2 fully reflective and 6 semipermeable), as shown in
Figure 13.
(a). 1,000 Simulations, (b). 10,000 Simulation Density
Figure 13. 10,000 Simulations of 1,000 Step 1-Dimensional Itô Diffusions With
8 Reflective Barriers
In Figure 13(b), we start to notice a corrugation or ‘crinkling’ of the
density due to 2 fully reflective barriers and 6 semipermeable barriers. This
was doubled again to 16 barriers (2 fully reflective and 14 semipermeable), as
shown in Figure 14.
(a). 1,000 Simulations, (b). 10,000 Simulation Density
Figure 14. 10,000 Simulations of 1,000 Step 1-Dimensional Itô Diffusions With
16 Reflective Barriers
In Figure 14(b), we notice that the corrugation effect has become more
pronounced due to another doubling of the number of barriers. This was doubled
again to 32 barriers (2 fully reflective and 30 semipermeable), as shown in
Figure 15.
(a). 1,000 Simulations, (b). 10,000 Simulation Density
Figure 15. 10,000 Simulations of 1,000 Step 1-Dimensional Itô Diffusions With
32 Reflective Barriers
Finally, in Figure 15(b), we notice the most amount of the corrugation effect
due to yet another doubling of the number of semipermeable barriers. Due to
the importance of this density as a sufficient approximation of BGC densities,
we plot the density again in Figure 16 without the barriers depicted and
slightly larger.
Figure 16. Typical Density of BGC Itô Diffusions Approximated by 10,000
Simulations of 1,000 Step 1-Dimensional Itô Diffusions With 32 Reflective
Barriers
Figure 16 shows that after 32 barriers, we effectively arrive at the typical
density of BGC Itô diffusions, which have an infinite number of increasingly
reflective barriers, with just 2 fully reflective hidden barriers. If we take
the limit of this numerical approximation process, the number of such barriers
$n$ would approach infinitely many barriers, of smaller and smaller size and
hence smaller constraining contribution. These approximation barriers are thus
replaced by the main BGC function itself,
$\Psi(X_{t},t)=(\frac{X_{t}}{10})^{2}$, as shown in Figure 17, where the
algorithm for BGCSP was stated in [32].
(a). 1,000 Simulations, (b). 10,000 Simulation Density
Figure 17. 10,000 Simulations of 1,000 Step BGC 1-Dimensional Itô Diffusions
From Figure 17, we see the typical characteristics of BGCSPs; 1). a certain
amount of discretization or banding at various local times, 2). the emergence
of two hidden reflective barriers that are not known exactly in advance and
can only be estimated, 3). the density is ‘corrugated’ or ‘rough’.
The random component of the Itô diffusions, i.e. the $dW_{t}$ term is sampled
from a standard normal distribution that is then constrained by BGCSP. The
density of Figure 17(b) has no discontinuities. However, if we sample the path
increments from a discrete binary (i.e. binomial) random distribution, we
obtain a random walk that is then constrained by BGCSP. When a histogram is
derived for the corresponding simulated data rather than fitting a density
through the distribution, we obtain Figure 18, which shows the
discontinuities, also evident in [33].
(a). $\bm{t\in[0,1000]}$, (b). $\bm{t=1000}$.
Figure 18. Histogram of 10,000 Simulations of 1,000 Step BGC 1-Dimensional Itô
Diffusions Showing Discretization or Banding, for Sampling $dW_{t}$ from a
Binomial Distribution
Figure 18 shows that 1). reflection occurs at the barriers as seen by the
peaks on either side of the distribution (more prominent in (a)), and 2).
discretization or banding occurs at prominent local times that are contracted
together due to the BGC function $\Psi(X_{t},t)$. Figure 18(a) shows similar
‘corrugation’ as in the continuous case in Figure 16. Figure 18(b) shows that
at $t=T$, the BGC Itô diffusion is less likely to be at the origin and more
likely to be near the barrier(s). To further demonstrate the characteristics
of BGCSP, a detailed plot of 10,000 simulations are shown in Figures 19 and
20.
Figure 19. 200 BGC Itô Diffusions Sampled from the Standard Normal
Distribution
Figure 20. 1,000 BGC Itô Diffusions Sampled from the Standard Normal
Distribution
## 5\. Conclusions
This paper has extended the previous theoretical research on BGCSP by
comparing them to a type of multi-skew Brownian motion (M-SBM). This was
achieved both theoretically by leveraging existing research, and heuristically
by generating new simulations. Working within the M-SBM framework, we proved
one Lemma and two Theorems for BGCSPs. This research provides a richer
framework in which the semipermeable barriers are modulated in a non-constant
manner over distance $X$, allowing for a new constraining regime that is more
complex than the Ornstein-Uhlenbeck process (OUP) and yet still related to it.
BGCSPs have applications in many fields requiring the constraining of the
underlying stochastic process in a gradual manner where the two ultimate
reflective barriers are not known in advance.
## References
* Appuhamillage and Sheldon, [2012] Appuhamillage, T. and Sheldon, D. (2012). First passage time of skew brownian motion. J. Appl. Probab., 49(3):685–696.
* Atar and Budhiraja, [2015] Atar, R. and Budhiraja, A. (2015). On the multi-dimensional skew brownian motion. Stochastic Process. Appl., 125(5):1911–1925.
* Ball and Roma, [1998] Ball, C. A. and Roma, A. (1998). Detecting mean reversion within reflecting barriers: application to the european exchange rate mechanism. Applied Mathematical Finance, 5(1):1–15.
* Bramson et al., [2010] Bramson, M., Dai, J., and Harrison, J. (2010). Positive recurrence of reflecting brownian motion in three dimensions. The Annals of Applied Probability, 20(2):753–83.
* Budhiraja and Dupuis, [2003] Budhiraja, A. and Dupuis, P. (2003). Large deviations for the emprirical measures of reflecting brownian motion and related constrained processes in r+. Electronic Journal of Prob., 8.
* Dereudre et al., [2015] Dereudre, D., Mazzonetto, S., and Roelly, S. (2015). An explicit representation of the transition densities of the skew brownian motion with drift and two semipermeable barriers. arXiv preprint arXiv:1509.02846.
* Dua et al., [1976] Dua, S., Khadilkar, S., and Sen, K. (1976). A modified random walk in the presence of partially reflecting barriers. J. Appl. Prob., 13:169–175.
* Gairat and Shcherbakov, [2017] Gairat, A. and Shcherbakov, V. (2017). Density of skew brownian motion and its functionals with application in finance. Mathematical Finance, 27(4):1069–1088.
* Gupta, [1966] Gupta, H. (1966). Random walk in the presence of a multiple function barrier. Journ. Math. Sci., 1:18–29.
* Harrison and Shepp, [1981] Harrison, J. and Shepp, L. (1981). On skew brownian motion. Ann. Probab., 9(2):309–313.
* Harrison, [1986] Harrison, M. (1986). Brownian Motion and Stochastic Flow Systems. John Wiley & Sons.
* Hu et al., [2012] Hu, Q., Wang, Y., and Yang, X. (2012). The hitting time density for a reflected brownian motion. Computational Economics, 40(1):1–18.
* Itô and McKean, [1965] Itô, K. and McKean, H. (1965). Diffusion Processes and Their Sample Paths. Springer, New York.
* Krykun, [2017] Krykun, I. (2017). Convergence of skew brownian motions with local times at several points that are contracted into a single one. Journal of Mathematical Sciences, 221(5):671–678.
* LeGall, [1984] LeGall, J. (1984). One-dimensional stochastic differential equations involving the local times of the unknown process. Springer, Berlin, Heidelberg.
* Lehner, [1963] Lehner, G. (1963). One-dimensional random walk with a partially reflecting barrier. Ann. Math. Stat., 34:405–412.
* Lejay, [2006] Lejay, A. (2006). On the constructions of the skew brownian motion. Probab. Surv., 3:413–466.
* L’epingle, [2009] L’epingle, D. (2009). Boundary behavior of a constrained brownian motion between reflecting-repellent walls.
* Linetsky, [2005] Linetsky, V. (2005). On the transition densities for reflected diffusions. Advances in Applied Probability, 37(2):435–460.
* Lions and Sznitman, [1984] Lions, P. and Sznitman, A. (1984). Stochastic differential equations with reflecting boundary conditions. Communications on Pure and App. Maths, 37(4):511–537.
* Mazzonetto, [2016] Mazzonetto, S. (2016). On the exact simulation of (skew) Brownian diffusions with discontinuous drift (Doctoral dissertation, Universität Potsdam).
* Mazzonetto, [2019] Mazzonetto, S. (2019). Rates of convergence to the local time of oscillating and skew brownian motions. arXiv preprint arXiv:1912.04858.
* Ouknine et al., [2015] Ouknine, Y., Russo, F., and Trutnau, G. (2015). On countably skewed brownian motion with accumulation point. Electron. J. Probab., 20(82):1–27.
* Percus, [1985] Percus, O. (1985). Phase transition in one-dimensional random walk with partially reflecting boundaries. Adv. Appl. Prob., 17:594–606.
* Portenko, [1976] Portenko, N. (1976). Generalized diffusion processes. Springer, Berlin.
* Ramirez, [2011] Ramirez, J. (2011). Multi-skewed brownian motion and diffusion in layered media. Proceedings of the American Mathematical Society, 139(10):3739–3752.
* Sacerdote et al., [2016] Sacerdote, L., Tamborrino, M., and Zucca, C. (2016). First passage times of two-dimensional correlated processes: Analytical results for the wiener process and a numerical method for diffusion processes. Journal of Computational and Applied Mathematics, 296:275–292.
* [28] Taranto, A. and Khan, S. (2020a). Bi-directional grid absorption barrier constrained stochastic processes with applications in finance and investment. Risk Governance & Control: Financial Markets & Institutions, 10(3):20–33.
* [29] Taranto, A. and Khan, S. (2020b). Drawdown and drawup of bi-directional grid constrained stochastic processes. Journal of Mathematics and Statistics, 16(1):182–197.
* [30] Taranto, A. and Khan, S. (2020c). Gambler’s ruin problem and bi-directional grid constrained trading and investment strategies. Investment Management and Financial Innovations, 17(3):54–66.
* [31] Taranto, A. and Khan, S. (2021a). Application of bi-directional grid constrained stochastic processes to algorithmic trading. Journal of Mathematics and Statistics, 17(1):22–29.
* [32] Taranto, A. and Khan, S. (2021b). Hidden geometry of bi-directional grid constrained stochastic processes. arXiv preprint.
* Taranto et al., [2020] Taranto, A., Khan, S., and Addie, R. (2020). Iterated logarithm bounds of bi-directional grid constrained stochastic processes. arXiv Preprint: Modern StochAstic Models & ProbleMs Of Actuarial MaTHematics (MAMMOTH) Conference, pages 1–21.
* Weesakul, [1961] Weesakul, B. (1961). The random walk between a reflecting and an absorbing barrier. Ann. Math. Statist., 32:765–769.
| arxiv-papers | 2021-07-27T02:12:51 | 2024-09-04T03:07:20.367284 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Aldo Taranto, Ron Addie, Shahjahan Khan",
"submitter": "Aldo Taranto",
"url": "https://arxiv.org/abs/2107.12554"
} |
2107.12556 | figure table
# The Keck Planet Imager and Characterizer: A dedicated single-mode fiber
injection unit for high resolution exoplanet spectroscopy
Jacques-Robert Delorme Department of Astronomy, California Institute of
Technology, Pasadena, CA 91106, USA W. M. Keck Observatory, 65-1120 Mamalahoa
Highway., Kamuela, HI 96743, USA. Nemanja Jovanovic Department of Astronomy,
California Institute of Technology, Pasadena, CA 91106, USA Daniel Echeverri
Department of Astronomy, California Institute of Technology, Pasadena, CA
91106, USA Dimitri Mawet Department of Astronomy, California Institute of
Technology, Pasadena, CA 91106, USA Jet Propulsion Laboratory, California
Institute of Technology, Pasadena, CA 91109, USA J. Kent Wallace Jet
Propulsion Laboratory, California Institute of Technology, Pasadena, CA 91109,
USA Randall D. Bartos Jet Propulsion Laboratory, California Institute of
Technology, Pasadena, CA 91109, USA Sylvain Cetre W. M. Keck Observatory,
65-1120 Mamalahoa Highway., Kamuela, HI 96743, USA. Peter Wizinowich W. M.
Keck Observatory, 65-1120 Mamalahoa Highway., Kamuela, HI 96743, USA. Sam
Ragland W. M. Keck Observatory, 65-1120 Mamalahoa Highway., Kamuela, HI
96743, USA. Scott Lilley W. M. Keck Observatory, 65-1120 Mamalahoa Highway.,
Kamuela, HI 96743, USA. Edward Wetherell W. M. Keck Observatory, 65-1120
Mamalahoa Highway., Kamuela, HI 96743, USA. Greg Doppmann W. M. Keck
Observatory, 65-1120 Mamalahoa Highway., Kamuela, HI 96743, USA. Jason J.
Wang Department of Astronomy, California Institute of Technology, Pasadena,
CA 91106, USA Evan C. Morris U.C. Santa Cruz, 1156 High Street, Santa Cruz,
Ca 95064, USA. Jean-Baptiste Ruffio Department of Astronomy, California
Institute of Technology, Pasadena, CA 91106, USA Emily C. Martin U.C. Santa
Cruz, 1156 High Street, Santa Cruz, Ca 95064, USA. Michael P. Fitzgerald
Department of Physics & Astronomy, University of California, Los Angeles, CA
90095, USA Garreth Ruane Jet Propulsion Laboratory, California Institute of
Technology, Pasadena, CA 91109, USA Tobias Schofield Department of
Astronomy, California Institute of Technology, Pasadena, CA 91106, USA Nick
Suominen Jet Propulsion Laboratory, California Institute of Technology,
Pasadena, CA 91109, USA Benjamin Calvin Department of Astronomy, California
Institute of Technology, Pasadena, CA 91106, USA Eric Wang Department of
Physics & Astronomy, University of California, Los Angeles, CA 90095, USA
Kenneth Magnone Department of Physics & Astronomy, University of California,
Los Angeles, CA 90095, USA Christopher Johnson Department of Physics &
Astronomy, University of California, Los Angeles, CA 90095, USA Ji Man Sohn
Department of Physics & Astronomy, University of California, Los Angeles, CA
90095, USA Ronald A. López Department of Physics & Astronomy, University of
California, Los Angeles, CA 90095, USA Charlotte Z. Bond W. M. Keck
Observatory, 65-1120 Mamalahoa Highway., Kamuela, HI 96743, USA. Jacklyn
Pezzato Department of Astronomy, California Institute of Technology,
Pasadena, CA 91106, USA Jorge Llop Sayson Department of Astronomy,
California Institute of Technology, Pasadena, CA 91106, USA Mark Chun
Institute for Astronomy, University of Hawaii, 640 N. Aohoku Place, Hilo, HI
96720, USA. Andrew J. Skemer U.C. Santa Cruz, 1156 High Street, Santa Cruz,
Ca 95064, USA.
###### Abstract
The Keck Planet Imager and Characterizer (KPIC) is a purpose-built instrument
to demonstrate new technological and instrumental concepts initially developed
for the exoplanet direct imaging field. Located downstream of the current Keck
II adaptive optic system, KPIC contains a fiber injection unit (FIU) capable
of combining the high-contrast imaging capability of the adaptive optics
system with the high dispersion spectroscopy capability of the current Keck
high resolution infrared spectrograph (NIRSPEC). Deployed at Keck in September
2018, this instrument has already been used to acquire high resolution spectra
($R>30,000$) of multiple targets of interest. In the near term, it will be
used to spectrally characterize known directly imaged exoplanets and low-mass
brown dwarf companions visible in the northern hemisphere with a spectral
resolution high enough to enable spin and planetary radial velocity
measurements as well as Doppler imaging of atmospheric weather phenomena. Here
we present the design of the FIU, the unique calibration procedures needed to
operate a single-mode fiber instrument and the system performance.
###### keywords:
Instrumentation, W. M. Keck Observatory, Exoplanets, High contrast imaging,
High dispersion coronagraphy, High resolution spectroscopy
* Corresponding author: Jacques-Robert Delorme, [email protected]
## 1 Introduction
Since the first exoplanet detections almost three decades ago [1, 2],
thousands have been detected and confirmed using various indirect and direct
observing strategies. Each technique provides access to specific planet
populations and allows the observer to retrieve specific parameters of the
systems observed. Characterization of these planetary systems is critical to
understanding their properties, formation and evolution. Photometric and
spectroscopic data are particularly valuable as they give access to multiple
parameters (orbital parameters, spin, temperature, atmospheric composition,
cloud coverage…). High dispersion spectroscopy (HDS) has quickly been
recognized as a powerful way to characterize exoplanet atmospheres and some
strategies has been developed to spectrally characterize exoplanets detected
using indirect methods [3, 4]. However, these measurements were challenging
until more advanced observing strategies became available and used with stable
infrared spectrographs such as Keck/NIRSPEC [5] or VLT/CRIRES [6]. The first
molecular detections in exoplanet atmospheres allowed observers to constraint
orbital parameters and retrieve new information such as wind flow and molecule
mixing ratios [7].
In parallel, the adaptive optic (AO) system and the infrared detectors of
VLT/NACO [8, 9] have been used to image the first exoplanet in 2004 [10]
followed in 2008 by the detection of the first three companions to HR 8799
[11], using the high contrast imaging (HCI) capabilities of both Keck and
Gemini telescopes. These high HCI techniques have since been improved and many
new observing strategies developed. Today most of the large telescopes have
HCI capabilities, which enabled the detection of a few dozen companions.
Photometric and spectroscopic data have slowly been collected on all the
companions imaged using low to medium resolving power instruments
(R$\sim$10–5,000) such as Keck/OSIRIS [12], Keck/Nirc2, LBT/LMIRcam [13],
Palomar/P1640 [14], VLT/Sphere [15], Gemini/GPI [16] or Subaru/CHARIS [17].
The next step in the field is to push to higher resolving power (R$>$30,000)
in order to collect spectral data where absorption and emission lines begin to
be resolved by using the high dispersion coronagraphy (HDC) technique [18, 19,
20, 21, 22]. This technique optimally combines HCI and HDS and provides the
ability to do species-by-species molecular characterization (e.g. water,
carbon monoxide, methane,…), thermal (vertical) atmospheric structure,
planetary spin measurements (length of day), and potentially Doppler imaging
of atmospheric (clouds) and/or surface features (continents versus oceans)
[20]. As none of the current facility instruments at large telescopes offers
both HCI and HDS capabilities together, several projects recently commenced to
combine the HCI capabilities with the HDS capabilities of various instruments
at those observatories. Among them the Fiber Injection Unit (FIU) part of the
Keck Planet Imager and Characterizer (KPIC) project presented in this paper,
the Rigorous Exoplanetary Atmosphere Characterization with High dispersion
coronography instrument (REACH) [23, 24] and High-Resolution Imaging and
Spectroscopy of Exoplanets (HiRISE) [25]. The first two projects are both
transitioning from commissioning to early science at the time of writing of
this article and offer complimentary wavelength coverage across the near-IR
(NIR) on Mauna Kea (REACH operates from Y-H and the KPIC-FIU operates in K and
L bands), while HiRISE is still in the development stage.
In this paper, we present a detailed overview of the design and performance of
the dedicated FIU for the Keck II telescope. In Sect. 2 we briefly introduce
the KPIC demonstrator in which the FIU is contained and presents its goals and
the requirement who must be satisfied to reach them. In Sect. 3, we present
details of the design of the FIU, a quick description of the key components of
NIRSPEC and our studies into the two key properties of the FIU: background and
throughput. In Sect. 4, we describe the main calibration procedures performed
to prepare the FIU for science observations. Section 5 presents the
acquisition sequence used during the night to acquire science data and we
present some example data acquired on one of our first test targets (HR 7672 B
[26]). In Sect. 6 we demonstrate the sorts of information that can be extract
from HDC data. Finally, Sect. 7 rounds out the paper with some concluding
thoughts.
## 2 Keck Planet Imager and Characterizer
The Keck Planet Imager and Characterizer is a demonstrator deployed at the W.
M. Keck Observatory. Located downstream of the Keck II adaptive optic system
[27], the goal of this platform is to demonstrate multiple new concepts to
image and characterize exoplanets on-sky. In order to reduce the complexity of
such a project, the project is broken into phases. Phase I, deployed at the
summit of Maunakea in fall 2018, contains an infrared pyramid wavefront sensor
(PyWFS) [28] and the modules and components critical for the demonstration of
the FIU. Figure 1 presents several pictures of the KPIC optomechanics before
their deployment. The vertical aluminum plate (unanodized) is the FIU plate.
It supports optics commons to both the FIU and PyWFS as well as the components
for the FIU. The black anodized plate is the PyWFS plate. It supports all the
optics of the PyWFS. The horizontal plate located under the two previous
plates is a kinematic platform to simplify co-alignment between the two
vertical plates. The orange module supported by 3 struts is a SAPHIRA detector
used by the PyWFS.
---
Figure 1: Pictures of KPIC before its deployment.
The second phase, planned to deploy in late 2021 will contain extra modules:
an atmospheric dispersion compensator, phase induced amplitude apodization
optics, a high order deformable mirror and coronagraphs, whose goal will be to
improve the overall throughput for the planet light, while reducing star light
leakage to reduce overall integration times[29, 30, 31]. In this paper, we
present a detailed overview of the first phase FIU and its performance.
### 2.1 FIU phase I goals and requirements
The first version of the FIU presented in this paper has been designed as a
prototype. The design has been driven by the space available in the Keck II AO
bench, the existing science instruments available at Keck (i.e. NIRC2 and
NIRSPEC) and the science goals. Its main goal was to demonstrate the concept
by acquiring high resolution spectral data on a variety of targets. We wanted
the instrument to be able to observe of all known substellar companions
accessible to Keck, which sets most of the requirements as shown in Table 1.
To achieve this goal, the target or its host star must be observable by the
Keck II AO system. Although the FIU can be used in combination with the
visible Shack Hartmann wavefront sensor, we mainly use it with the IR PyWFS.
Since its deployment, this wavefront sensor, which operates in H band, has
been consistently used to observe targets up to $12^{th}$ magnitude. The
Strehl ratio measured in K band is 65% in 0.5 arcsec seeing and 45% in 1
arcsec seeing when the H magnitude of the star observed is $\leq 6$. Above
this magnitude performance progressively decreases. The performance of this
wavefront sensor has been described in detail in Ref. 28. It is currently not
possible to close the AO loop on a system with two or more components if they
have a similar H magnitude and a separation between 0.5 and 2 arc-seconds.
This issue will be addressed when the second phase will be deployed. Because
the PyWFS is using most of the H band light and the targets of interest are
brighter in the K and L bands, the first version of the FIU was designed to
collect spectral data in those photometric bands.
Once the AO loop is closed, the main challenge is to precisely align the
object of interest with a single mode fiber (SMF) with a precision of less
than one fifth of a $\lambda/D$ ($\leq$ 10 mas in K band) to achieve and
maintain high coupling. To align the object of interest with a SMF, we image
the system on a detector. Usually not visible on this detector, the object of
interest is aligned with a SMF by tracking the position of its host star at a
relatively low frequency ($<1$Hz). This camera is sensitive to both J and H
bands. However, we permanently installed a H band filter in front of it. In
the second phase of this project we will installed it in a filter wheel with
multiple filter options.In order to observe all known substellar companions
accessible to Keck, we must be able to track the position of object with a
H-mag up to 12 and have a capture range of $\pm 2.5$ arcsec.
The use of SMFs makes the observation with such a system more challenging than
observations with conventional AO-fed slit spectrographs such as Keck/NIRSPEC
or VLT/CRIRES. However, they provide multiple benefits. Specifically, the SMF
has a small solid angle on sky minimizing thermal background leaking into the
spectrograph, which is critical in K and L band. They can also help filter out
unwanted speckle (star light) [32] and they make future wavefront control
relatively simple in that only a few spatial frequencies need to be addressed
[33], which allows the bandwidth to be increased with these algorithms [34].
Finally, they allow the use of compact fiber-fed spectrographs that can be
located of the telescope in a more stable environment. If fed by an SMF, the
position and shape of the beam inside a fiber-fed spectrograph is agnostic of
input conditions and greatly simplifies the spectral calibration by making the
line spread function, a Gaussian profile in this case, which is extremely
stable.
In order to reduce the cost and the time needed for this project, we designed
the FIU as an interface to connect the AO bench to NIRSPEC. Because NIRSPEC
was not designed as a fiber-fed spectrograph, it constrained the design in
multiple ways (shape of the cold stop, injection outside of the cryostat, size
and shape of the slits available, etc) described later in this paper.NIRSPEC
sets the resolving power to 35,000 if we maintain a sampling of at least 2
pixels at all wavelengths across the bands observed (K or L band). The data
collected are compared to models by computing the cross correlation function
(CCF). To be usable, we must be able to detect the spectral signature of the
object of interest with a signal-to-noise ratio (S/N) greater than 3 after two
hours of integration. The table 1 summarizes all the baseline requirements for
the KPIC FIU.
Tracking and acquisition
---
Specifications | Value | Notes
Scale of optical fibers | $\sim\lambda/D$ | SMF optimally matched to PSF
Capture range | $\pm 2.5$ arcseconds | Covers most high contrast targets
Alignment accuracy | $<0.2\lambda/D$ | —
Tracking speed | $<1$ Hz | Tracking, not tip/tilt correction
Tracking stability | $<0.2\lambda/D$ RMS | —
Tracking bands | J or H band | —
Limiting magnitude | $>12$ in H-mag | PyWFS limitation
Spectroscopy
Specifications | Value | Notes
Spectral Range | K & L band | Not simultaneously
Resolving Power | $\geq 30,000$ | NIRSPEC limitation
Sampling | $\geq 2$ pixels | At all wavelengths
Overall performance
Specifications | Value | Notes
Total Peak Efficiency | $\geq 2\%$ | From top of atmosphere
Pt sources sensitivity | $\geq 16$ K-mag | S/N $\geq$ 3 in CCF in $\approx$ 2h.
Table 1: FIU Phase I requirements.
## 3 Fiber injection unit design
The FIU deployed at Keck is based on three modules: an injection module, a
bundle of fibers and an extraction module. This section describes these
modules, the NIRSPEC instrument used to acquire the data and the expected
performances of the overall instrument. The interaction between these
components and the way we are using them to achieve our goals is described in
the following sections of this paper.
### 3.1 Injection module
Located downstream of the Keck II AO system the goal of the injection module
is to inject the light of faint companions (exoplanets, brown dwarf, etc) into
one of the single-mode fibers (SMFs) of a bundle described in Sect. 3.2.
Figure 2 shows a schematic of the KPIC optical layout. This diagram is not to
scale and the orientation of the optics is not correct. In this paper, we only
describe the optical layout of the FIU.
---
Figure 2: Diagram of the KPIC optical layout. The scale and the orientation
of the optics are not correct. The FIU and PyWFS plates as well as the Saphira
detector are visible in the first figure of this paper.
To direct the light to the FIU, the converging beam coming from the AO bench
is reflected by the three optics constituting a field steering mirror module
(FSM - See Fig. 2). The first optic of this FSM (A) is the KPIC pick off. It
consists of an actuated dichroic and a static flat mirror installed on a
translation stage. When neither optic is in the beam, all the light goes to
the facility infrared imager NIRC2. If the dichroic is in the beam, 90% of the
J and H band light goes to KPIC while the rest goes to NIRC2 . If the flat
mirror is in the beam, all the light goes to KPIC.
After the FSM, the converging beam is directed to the FIU plate. This plate is
visible in the images presented in Fig. 1 (unanodized), and supports all the
components of the injection module. After going through two optical relays
(D-J in Fig. 2), comprised of simple reflective optics in phase I, the light
is collimated by a 168.31 mm focal length off axis parabola (OAP, K) made of
Zerodur and coated with protected gold (Nu-Tek). The two optical relays are
based on four identical OAPs to the one used for collimation (Nu-Tek \- D, G,
K, J) and two flat mirrors (Newport \- E and I). All these optics are made of
Zerodur and coated with protected gold. The F# of the input and output focal
plane are the same as the F# of the telescope (13.66). The diameter of the
collimated beams in these relays is 12.32 mm. In the first optical relay, the
static pick off dichroic of the PWS (Asahi Spectra \- F) reflects 90% of the J
and H band light in the direction of the sensor while the rest of the light is
transmitted (K and L band). These two optical relays mostly empty during the
first phase of the project will be populated in the phase two [30, 31].
After the two relays, a tip-tilt mirror (TTM) is situated in the pupil plane
of the instrument for aligning the target with the fiber as well as fine
tuning the pointing onto the fibers (L). The TTM (Physik Instrumente,
S-330.8SL) is a piezo mechanism, which offers a field steering of $\pm$ 2.4
arc-second in two axes. An off-the-shelf protected gold flat mirror (Thorlabs,
19 mm diameter) is attached to the platform using a custom made, flexure-based
mirror holder. Made of Invar and titanium, this mirror holder has been
designed to minimize the forces applied to the flat mirror in order to
minimize distortions and to be as light as possible in order to optimize the
response of the overall TTM module.
A custom dichroic (Asahi Spectra, M) is used to split light and direct it to
the camera for tracking purposes while allowing science light to pass through
to the injection unit. It reflect 90% of the J and H band light while longer
wavelength light ($\geq$K and L) is transmitted.
The reflected path towards the camera contains a H band filter (Asahi Spectra,
P), an air-spaced achromatic doublet (Thorlabs, Q), a plano-concave lens
(Edmund Optics, R) and a low noise InGaAs detector (First Light Imaging,
Cred-2 [35]), which offers a 4.125 $\times$ 5.125 arc-second field-of-view
(FOV, 512 x 620 pixels, with an $\approx$ 8.06 mas/pixel sampling). When KPIC
is used as a FIU, this detector is used to track the position of the science
targets. For this reason, we refer to it as the “tracking camera”. A stage can
be used to translate the plano-concave lens in/out of the beam. When out of
the beam, a pupil image of the Keck primary is formed. When in the beam, a
focal plane image is formed. The FOV of this detector has been carefully
selected to be able to observe the targets of interest selected for this
project. It limits the maximum separation between the objects of the systems
observed. However, this FOV allows us to observe most of the exoplanets
already imaged and visible from Maunakea. The K and L band light is next
incident on the injection optic (N): a 35 mm focal length OAP (Nu-Tek). Made
of Zerodur and coated with protected gold, this optic is the last of the FIU
module before the fiber bundle (O) described in the following section. The
bundle is carefully positioned at the focus (F# = 2.8) and on the optical axis
of the OAP. The effective focal length of the OAP is the one which maximizes
the injection into the fiber for both K and L bands.
To aid in aligning the incoming beam with the bundle, a corner cube (T) is
located beneath the dichroic. Its role will be explained in the calibration
procedures of the system (see Sect. 4.1.1 ).
### 3.2 Fiber bundle
The fiber bundle has several key roles: 1) it is used to route the science
light to the spectrograph and 2) it has peripheral fibers that light can be
reverse injected into to aid with alignment optimization. The layout of the
bundle used in KPIC is shown in Fig. 3. On the input end, the fiber bundle is
connected to the injection module (see Sect. 3.1) located inside the Keck AO
bench. On the output side, the fiber bundle is connected to the extraction
module (see Sect. 3.3) located in the calibration unit of NIRSPEC [36] a
facility class high spectral resolution spectrograph of the W. M. Keck
Observatory.
---
Figure 3: Diagram the first KPIC-FIU fiber bundle.
Manufactured by Fiber Guide Industries this critical component of the FIU is
based on ZBLAN 6.5/125 fluoride fibers (Le Verre Fluoré) and SMF-28-ULTRA
silica fibers (Corning). The bundle contains five ZBLAN 6.5/125 science fibers
going from the input to the output connectors (note, this indicates the fibers
have a $6.5~{}\mu$m diameter core and $125~{}\mu$m cladding). These are
indicated in red on the diagram. This part of the bundle is 5 m long, a length
necessary to connect the injection and extraction modules. The science fibers
are surrounded by six SMF-28-ULTRA calibration fibers at the input connector
end and two ZBLAN 6.5/125 calibration fibers on the output connector end,
represented in blue and orange in the figure respectively. These alignment
fibers are contained within the furcation tubing of the main bundle for about
$50$ cm before they are broken out into individual fibers with FC/PC
connectors. The input and output connectors also contain dummy fibers which
act as scaffolding to locate the science and calibration fibers during
manufacturing. Represented in black in the diagram, these fibers are segments
of SMF-28-ULTRA terminated within the package.
The custom input and output connectors were manufactured using two different
approaches compatible with the specific needs of each connector. The input
connector contains three layers of fibers where the position of each fiber is
not critical. In this connector, the fibers are butted cladding-to-cladding
and their position is maintained by an outer metallic structure. The cladding-
to-cladding construction maintains the core separation of two adjacent fibers
to $\approx 125\>\mu$m which corresponds to $\approx 800$ mas in K band.
The output connector contains only one layer of fibers but these fibers must
be aligned with a high precision to make sure they pass through the mechanical
slit of NIRSPEC downstream. For this reason, the fibers are supported using a
V-groove on this side. The pitch of the V-groove used set the core-to-core
separation between two adjacent fibers to $127\>\mu$m. On the input side, four
of the input calibration fibers, labeled $C_{1}$, $C_{2}$, $C_{4}$ and $C_{6}$
in the diagram, are connected to a 1550 nm laser source. The two other input
calibration fibers ($C_{3}$ and $C_{5}$) were connected to two high speed
InGaAs photo-detectors. On the output side, the two calibration fibers
($C_{A}$ and $C_{B}$) were connected to two broadband infrared light sources
(tungsten lamps, Thorlabs, SLS202L). In section 4 we describe how and when
these elements are used.
Figure 4 shows a picture of the fiber bundle currently used by KPIC (left) and
a picture of the input connector (right). For reference, the diameter of the
connector is 7 mm. The gold coating visible on the input connector is an anti-
reflection (AR) coating to optimize the throughput of the bundle in K and L
bands, and is used at the output as well. The overall throughput of the bundle
in K band was measured in the laboratory to be $95.3\%$ in K band. According
to the manufacturer, the attenuation of the ZBLAN fiber varied between 2.6 and
5.3 dB/km across the K-band which corresponds to a throughput $\geq 99.4\%$
for 5 meters of fiber. The rest of the throughput loss is due to the Fresnel
reflections which occur at both ends of the bundle due to imperfect AR
coatings. The L-band throughput has not been measured because of a lack of
equipment in those bands. However, some preliminary observations in L-band
indicate that the throughput of the bundle in this band is close to
expectation.
---
Figure 4: Left: Picture of the bundle. Right: Picture of the input connector
of the bundle.
The minimum number of fibers needed to acquire HDC data is three: one for the
target of interest, one for its host star and one for the sky background. The
final number of science fibers was chosen as a trade off between the price of
the bundle and various technical constraints. For instance, the shape and size
of the NIRSPEC slit limits the number of fibers on the output connector and
imposes a linear arrangement of fibers. We decided to use a design with five
science fibers to cover most science cases and to have redundancy in case one
of the science fibers was damaged. Regarding the calibration fibers, the
bundle has been designed to be functional even if one of the calibration
fibers of each set is damaged (one fiber connected to the laser, one to the
photo-detector and one to the broadband light source). The position of the
fibers on the input connector was not critical. We required the arrangement of
fiber relatively to be compact in order to image most or all of them on the
tracking camera if needed. To keep the system simple and efficient, we chose
to maintain a coarse separation between the fibers. The minimum separation
between two fibers is $\approx 800$ mas and the maximum is $\approx 4000$ mas.
Because the star is usually brighter than the companion by several magnitudes,
we can collect stellar light even if the star is not aligned with a fiber
(light from the speckle field). We can adjust the amount of stellar light
injected into a science fiber using the rotator of the telescope by bringing
the star closer to a science fiber or moving it away. If the host star cannot
be brought close enough to a science fiber when data are collected on the
companion, we can collect spectral data on the host star before or/and after
by aligning it with one of the science fibers. Finally, because the separation
between the first and last science fiber is $\approx 4$ arcsec, one of the
fibers will always be far enough from the star to acquire background data.
### 3.3 Extraction module
The extraction module, known as the fiber extraction unit (FEU) is the
interface between the fiber bundle and NIRSPEC. Its goal is to reshape the
light coming from the different fibers of the bundle and optimally inject this
light into the high-resolution spectrograph, which was originally designed to
work in the seeing limit. The left panel of Figure 5 shows a picture of the
FEU installed in the calibration unit of NIRSPEC, and the right panel is the
computer-aided design (CAD) model.
---
Figure 5: Left: picture of the FEU installed in NIRSPEC’s calibration unit.
Right: a CAD model view of the FEU.
A custom made brass part visible in the right panel of Fig. 5 (labeled 2)
guides the output connector of the bundle (labeled 1) and aids in aligning it
with an air-spaced doublet collimating lens mounted in the same part. This
part has been made of brass mainly because this material is relatively soft
and easy to machine. On the doublet side, we built a custom barrel to match
the diameter of the lenses and to adjust the distance between the lenses if
needed. For the bundle, we chose the material of the barrel to be softer than
the material of the bundle (aluminum) to minimize the risk of galling when the
bundle slides in the barrel. The doublet is composed of a germanium and
silicon lens (Rocky Mountain Instrument). The effective focal length of this
doublet is 10.84 mm and the throughput in K and L bands was measured to be
$>92\%$. The numerical aperture of the science fiber has been measured in
laboratory to be 0.175 at 2 $\mu$m. After the air-spaced doublet, the
$1/e^{2}$ diameter of the collimated Gaussian beam is 3.8 mm. Close to its
output connector, the stainless steel mono-coil jacket of the bundle is
attached to a motorized translation stage (labeled 4) using a custom made
kinematic interface (labeled 3). The translation stage is used to move the
bundle along the optical axis guided by the brass part, which corresponds to
the focus axis of the bundle/lens system. The brass piece prevents the bundle
from moving in the axes perpendicular to the optical axis and constrains the
pitch and yaw of the output connector while the bundle is being focused. The
rotation of the bundle about the optical axis is constrained by a clamp and
kinematic interface. This simple kinematic interface combined with the brass
holder have proved reliable when it comes to returning the fiber bundle to the
same position and orientation each time it has been connected. This assembly
is mounted on two motorized translation stages, labeled 5, used as a pupil
steering mechanism to move the fiber bundle and the air spaced doublet in the
plane perpendicular to the optical axis. This mechanism is used each time the
bundle is connected to align the beam coming from the bundle to the NIRSPEC
field stop located into the cryostat. The next and last optical element of the
fiber extraction unit is a TTM (labeled 6) held by a custom made bracket
(labeled 7). Based on a Newport CONEX-AG-M100D, this element reflects the
light in the direction of NIRSPEC calibration unit. This TTM is located in a
pupil plane and is used to align the images of fibers with the slit of the
spectrograph.
### 3.4 NIRSPEC
Figure 6 presents a diagram of the optical layout of NIRSPEC (not to scale).
For more information regarding the NIRSPEC optical layout please consult: Ref.
36, 37 and 38. NIRSPEC’s calibration unit located to the left side of this
diagram contains the FEU described in the previous section.
---
Figure 6: Diagram of the NIRSPEC optical layout with the FEU installed in its
calibration unit. This diagram is not to scale and does not show the optics in
the correct orientation.
A fold mirror (labeled D) installed in the calibration unit of NIRSPEC was
motorized using a flip mechanism (OWIS,KSHM 65-LI-MDS). It is used to select
the input of the calibration unit. When in the beam, the mirror directs light
coming from the calibration sources of NIRSPEC’s integrating sphere (and an
air-spaced collimating triplet) to the slit in order to calibrate the
spectrograph. When out of the beam, the light from the FEU is directed to
NIRSPEC. After this optical element, the light is focused by an air-spaced
triplet (E - EFL = 152.4 mm) and reflected by a motorized fold mirror (F)
before it enters into the NIRSPEC cryostat. When KPIC is in use, this fold
mirror is in the beam. After this mirror, the beam goes through the uncoated
CaF2 window of the NIRSPEC cryostat before being reflected by the three
mirrors of the rotator. The second optic of this rotator (I) is an OAP (EFL =
400 mm). After the rotator the collimated Gaussian beam ($1/e^{2}$ diameter of
10.0 mm) passes through two filter wheels (K) before being focused by an OAP
(M) onto the selected slit located in a slit wheel (O). All NIRSPEC slits are
reflective. The light passing through the slit is dispersed and imaged on the
science detector named ‘Spec’ (Teledyne, science grade Hawaii-2RG detector).
The light reflected by the slit is imaged by a slit-viewing camera named
‘Scam’ (Teledyne, engineering grade Hawaii-2RG detector).
Figure 7 presents a combination of images acquired with the slit-viewing
camera. This image has been obtained by combining images acquired with light
injected into each fiber of the output connector of the bundle (see Sect.
3.2). This image presents the case where the PSFs associated with the fibers
has been offset from the slit. This mode is mainly used during the calibration
of the instrument. Indeed, unlike the science detector, the light coming from
the fiber is not dispersed in the focal plane of the slit-viewing camera,
which allows quick flux measurements. To align the PSFs and the slit, we use
the FEU TTM (C). If the fibers contained in the bundle are not properly
oriented with respect to the slit, we use the internal NIRSPEC rotator to make
small adjustments.
---
Figure 7: A composite image with all fibers illuminated acquired with the
slit-viewing camera. In this case, the seven PSFs are offset from the slit.
The seven PSFs visible on this image are respectively associated to (from left
to right): CA, S1, S2, S3, S4, S5 and CB. The slit (dark blue) used in this
case was the 0.0407”x1.13”.
Figure 8 presents two of the nine orders visible on the science detector when
configured for K band observations. This image is also a combination of images
obtained by combining images acquired with light injected into each fiber of
the output connector of the bundle. Each order contains seven spectra. The
five central spectra are associated with the five science fibers of the bundle
while the two lateral spectra are associated with the two calibration fibers.
Depending on the slit selected (short or long), the light from the calibration
fibers is reflected in the direction of Scam or transmitted to Spec. The
separation between the spectra is fixed ($\approx 19$ pixels) and set by the
separation between the fibers in the output connector of the bundle. The width
of the trace can be adjusted by moving the bundle along the optical axis using
the focus actuator (labeled 4 in Fig. 5). We adjust the position of this
actuator during a calibration procedure of the FEU (see Sect. 4.2) to properly
sampled the data.
---
Figure 8: Two of the nine orders visible on the science detector when
configured for K band observations. Each order of this patchwork of images
contained seven spectra. The upper and lower spectra of each order are
associated with the two calibration fibers contained in the output connector
of the bundle while the five other spectra are associated with the science
fibers. This image is a composite image with all fibers illuminated
.
### 3.5 Expected performance
Because the FIU module of KPIC aims to spectrally characterize faint objects
with a high resolution ($R>$30,000), the background seen by the science
instrument and the overall throughput are the key properties that need to be
understood. In this section we present our estimations and measurements of
these parameters in K band. Although, the phase I version of the instrument
has been designed to allow science observations in K and L bands, we have
mainly focused our work on the K band to date. We will start to work in L
bands once most of the other challenges of this project will be overcome.
#### 3.5.1 Background
For a fiber-fed spectrograph, the background seen by the science instrument
can be decomposed into four components: the background injected into the
science fibers of the bundle (sky background and upstream optical elements),
the emissivity of the fiber itself, the background emitted between the fiber
bundle and the cold stop of NIRSPEC and the background emitted in the
cryostat.
The first component of the background is relatively small. SMFs are extremely
efficient at rejecting upstream background from sky, telescope and FIU because
of their relatively small solid angle projected on sky (45 mas2 in K band).
For reference, the average sky brightness in K band at zenith during dark
times and during a clear night at the summit of Maunakea is equal to 12.6
mag/arcsec2 (http://www.cfht.hawaii.edu/). The second component of the
background is the emissivity of the fiber itself. We have not quantified this
component yet. However, KPIC uses a relatively short (5 m) SMF with very high
transmission and with a very small core diameter ($6.5~{}\mu$m). We can
compute the background emitted based on the energy absorbed by the material of
the fiber ($\leq 0.6\%$ in K band). However, it is difficult to estimate the
fraction of this background transmitted to the FEU side of the bundle.
The third component of the background is the sum of the emissivities of all
the warm optics used to project the light from the fiber onto the NIRSPEC slit
(labeled A-G in the Fig. 6). To reduce this component of the background, we
use a cold stop, named ”FEU stop”, located in both filter wheels of NIRSPEC
(labeled K on the Fig. 6). These stops have been installed in both wheels in
order to be able to use them with all the NIRSPEC filters available. The stops
consist of a hole in a metallic plate, which has been black painted. The hole
diameter has been optimized to maximize the signal-to-noise ratio (SNR) seen
by the science detector. The radius of the cold stop which maximizes the SNR
‘$R_{\text{max}}$’ is:
$R_{\text{max}}\approx 1.5852\sigma\approx 0.6731\text{FWHM}$
where $\sigma$ and FWHM (Full Width Half Maximum) characterize the Gaussian
profile’s
width111https://wise2.ipac.caltech.edu/staff/fmasci/GaussApRadius.pdf. By
using the ratio between the $1/e^{2}$ diameter and the FWHM
($2\sqrt{2ln(2)}\approx 1.7$), we can compute the optimal diameter for the
cold stop. Because the mode field diameter of the science fibers as well as
the effective focal length of the air-spaced doublet and triplet (labeled B
and E on Fig. 6) are wavelength dependent, the optimal diameter is also
wavelength dependent. Moreover, the diameter of the beam at the location of
the stop can be affected by the defocus applied to the bundle to optimize the
size of the PSF on the slit (see Sect. 4.3). At 2 $\mu$m, we computed the
optimal diameter of the stop to be $\approx$7.9 mm. We decided to use a
slightly larger cold stops (8.1 mm diameter) because the optical elements of
the NIRSPEC calibration unit were never calibrated (as it wasn’t needed) and
because the K and L bands go beyond 2 $\mu$m. Moreover, the impact of
increasing the thermal background sightly is not as severe as restricting the
light from the companion.
These stops are used in addition to a blocking filter, which suppresses the
science and background light outside of K band to prevent order overlap.
Several filters are available in each filter wheel. Thus far, we have mainly
observed in K band (1.9 to 2.5 $\mu$m). In this case, we are using the filter
named “Thin” located in the first filter wheel. It consists of a substrate of
PK-50. This material is a thermal-IR flux blocker opaque for wavelengths
$>2.8\mu$m. At wavelengths $<1.9~{}\mu$m the background is negligible and the
light coming from the target is absorbed by the germanium lens of the air
spaced doublet located in the FEU (labeled B in Fig. 6). The few observations
made in L band have been made using the broad ’KL’ filter.
The last component of the background is the internal background of the
spectrograph itself. In the case of NIRSPEC, a recently discovered light leak
currently adds to the instrument thermal background [39].
Figure 9 shows the central section of one of the orders visible on a Spec
frame (left panel) acquired by pointing at a dark region of the sky (no
visible target). The left half of the image is not reduced while the right
side is reduced by removing a background acquired during the day (no light
injected into the fibers) and correcting for hot pixels. The graphic on the
right side of the figure presents a vertical line profile of the same order.
This profile is the median of the profiles associated to all the wavelengths
of the order. The profile computed from the raw data is represented in blue
while the profile computed from the reduced data is represented in red.
---
Figure 9: Left: Central section of order 33 of a Spec frame acquired with no
object in the tracking camera FOV (exposure time = 599 sec, Nirspec setup for
K band observation, clear sky, elevation = 54.2∘ and no moon). The left side
of this image has not been reduced while the right side has been reduced by
subtracting a background acquired during the previous night with the same
settings and by removing the bad pixels. The horizontal lines of each side
indicate the position of the fibers. From top to bottom: CA, S1, S2, S3, S4,
S5, CB (see Fig. 3). The slit induced background is visible in the raw data
(bright band around the 5 science fibers). Right: Line profiles across order
33. This profile is the median of the profiles associated to all the
wavelengths of the order. The profile computed from the raw data is
represented in blue while is computed from the reduced data is represented in
red.
The two first components of the background (sky and fiber emissivity) are not
visible in the Fig. 9. If they were visible, we would see small peaks at the
locations of the fibers in the red trace. Because we do not use exposure times
longer than those used to acquire this data during science observations (599
seconds), we can consider these two components as negligible in standard
observing conditions. More tests need to be done to determine if the
conclusion will be the same in L band, with the telescope pointed at lower
elevation or during a night with the moon visible.
The third component, emitted by warm optomechanical components located in the
calibration unit of NIRSPEC (see Fig. 6), is visible in the raw data (bright
band around the 5 science fibers) but can be removed efficiently by reducing
the data. This contribution to the background is not dependent of the
observing conditions but can probably be affected by variation of temperature
in the AO room. In this case for an AO room temperature of 6.1∘C, we measured
an average of 0.5 counts per second for the reddest order (order 39 –
$\lambda\in[2440:2484]$ nm) and less than 0.05 counts per second for the
bluest order (order 31 – $\lambda\in[1943:1977]$ nm).
Regarding the last background component, the thermal background of the
instrument, it is combined with all the noise and offsets of the science
detectors. This component affects the entire image. Visible as an offset below
and above the bright green band on the left side of the image presented by the
Fig. 9, the sum of these effects contributes 180 counts on the reddest side of
the detector and 90 counts on the bluest side. As the temperature inside the
cryostat is controlled, we can consider this to be constant. As shown by the
Fig. 9, this component can be removed efficiently. The optical leak discussed
previously is not visible is the sub-image presented in this paragraph.
#### 3.5.2 Throughput
Figure 10 presents the throughput of the overall system (sky to detector
included) as a function of the wavelength measured on July the 3rd 2020 on the
star Kappa Andromedae. The throughput is the ratio between the number of
photon expected and the number of photons detect by the science detector. Nine
orders are visible on this plot. The left one is the 31st order of NIRSPEC
while the right one is the 39th order. For this measurement, the light was
injected into the second science fiber (labeled $S_{2}$ in Fig. 3). This set
of data has been acquired during a clear night. according to the Canada France
Hawaii Telescope, the MASS seeing was $\leq 0.2$ arc second and a DIMM seeing
of $\approx 0.6$ arc second (both measured for a wavelength of 0.5 $\mu$m).
During this measurement the target was at a 64.5∘ elevation.
---
Figure 10: Throughput as a function of the wavelength from sky-to-detector
measured on July the 3rd 2020 on the star Kappa Andromedae. For this
measurement, the light was injected into science fiber $ScF_{2}$ of the
bundle.
It can be seen that the peak throughput in K band reaches 3% (well above our
2% requirement). The data in the figure represents one of the best results
achieved to date. Multiple parameters can affect the throughput: seeing,
weather, AO performance, calibration quality. Despite this, over the last few
observing runs, we have consistently measured a throughput between 1.5 and 2.5
% over the K band.
Neither the Keck II AO system nor the KPIC instrument contains an atmospheric
dispersion compensator (ADC). As such, the light of the target is slightly
dispersed in the focal plane of the input connector of the bundle for non-zero
Zenith angles. For this reason the injection is not uniform across the K band.
In the case presented in Fig. 10, the injection was optimized for a selected
wavelength (center of the K band). This effect is a function of the elevation
of the telescope. To optimize the overall throughput of the system for all the
wavelengths, an ADC will be deployed in the phase II of the KPIC project.
We also measured the throughput in L band using Kappa Andromeda at the end of
the same night. We measured a preliminary throughput of up to $6\%$ between
3.7 and 3.8 $\mu$m.
The peak throughput measured on-sky of $3.2\%$ in K band is consistent with
the expected value of $3.4\%$, computed assuming 200 nm RMS of residual
aberration and taking into account the performance of each of the optics. We
have identified several ways to improve the overall performance of the system,
which should result in an increase in the quality of the science data in the
near future. The following table presents the throughput budget computed for
the FIU in both K and L bands.
Throughput budget
---
Components | K-band | L-band | Description
Sky | 98% | 85% | —
Telescope | 90% | 90% | 3 reflective optics
Keck II AO optics | 63% | 63% | 7 reflective & 1 transmissive optics
Fiber Injection Unit | 77% | 77% | 12 reflective & 2 transmissive optics
Strehl | 72% | 90% | Assuming 200 nm RMS wavefront error
Dispersion & Pointing loss | 95% | 95% | At 30 degrees zenith angle
Fiber injection efficiency | 60% | 60% | Keck pupil geometry and NA mismatch
Bundle | 95% | 97% | Material absorption & Fresnel reflections
FEU + Calibration unit | 89% | 89% | 2 reflective & 5 transmissive optics
NIRSPEC throughput | 30% | 30% | Diffraction efficiency & optic throughput
Filter and background stop | 80% | 80% | —
H2RG Quantum efficiency | 95% | 95% | —
Total | 3.4% | 3.7% | From top of atmosphere
Table 2: Throughput budget computed for the FIU in both K and L bands.
## 4 Calibrations
Injecting light into a SMF, which subtends a very small solid angle on-sky,
requires precise calibration of the instrument. In this section, we describe
the various calibrations performed before and during the observations.
### 4.1 Fiber injection unit calibrations
#### 4.1.1 Science fibers position
The science fibers are not visible on any sensors, so their positions are
unknown at first. The tracking camera is integral to finding the position of
the science fibers and optimizing the coupling of a target. By virtue of the
dichroic beamsplitter before the tracking camera (M in Fig 2), J and H band
light can be used to determine the location of a target. To determine the
position of the science fibers on the tracking camera, we follow a two step
calibration process. The first one is quick but not highly accurate while the
second one is time consuming but very accurate.
The first calibration procedure relies on light to be retro-fed through the
peripheral calibration fibers in the bundle. An infrared laser is used and
injected into four of the six fibers and emitted from the input connector of
the bundle (see Sect. 3.2). The light coming from those fibers is collimated
by the focusing OAP of the injection module (H in Fig. 2). A fraction of this
light is reflected by the dichroic (M) in the direction of the corner cube
(T), which reflects the light in the direction of the dichroic. The light
transmitted forms an image on the tracking camera composed of four PSFs (one
per retro-fed calibration fiber). By retro-feeding an asymmetric pattern of
calibration fibers and by knowing the geometry of the bundle, we can determine
the position of the other fibers (science fibers) in the input connector of
the bundle. The image presented in Fig. 11 is the output automatically
generated by the algorithm used to perform this calibration procedure. It
takes only a few seconds to get a result but the estimated positions are not
highly accurate (usually a couple of pixels) for multiple reasons: the shape
of the PSFs for the four calibration fibers are altered by the OAP and the
corner cube, which makes the position measurement of these fibers inaccurate,
even if the geometry of the bundle is precisely known, we do not take into
account field distortions at the detector, and the corner cube is not perfect
so the incident and reflected beams are not parallel, to name a few.
---
Figure 11: Output figure automatically generated by the algorithm used to
roughly determine the position of each fiber of the bundle. The ”X” shape of
the PSFs is due to the corner cube
In order to maximize the throughput of the instrument, we use a second
calibration procedure based on a direct measurement of the light injected into
the fibers. For this step, we turn on the calibration source of the Keck II AO
bench to create a PSF on the tracking camera and then use the TTM of the fiber
injection unit (labeled L on Fig. 2) to align this PSF with one of the science
fibers. Then we scan the TTM across the expected location of the fiber and
record the flux on the slit viewing camera of NIRSPEC, Scam (see Fig. 6) as
well as the tracking camera. The SCAM images are used to measure the flux
injected into the science fiber while the tracking camera images are used to
measure the flux variation of the light source and track the PSF position
associated with each flux measurement. In this way, we can build and injection
map through the fiber and by fitting the peak, we can determine the TTM
position of optimum coupling very accurately and the corresponding PSF
position that yields this optimum alignment on the tracking camera at the same
time. The left image presented in Fig. 12, is the injection map obtained by
performing such a scan. The position of each pixel of this injection map
correspond to a position of the PSF on the tracking camera and the value
associated with each pixel is the flux measured by using Scam normalized by
the flux of the calibration source measured by the tracking camera. This
calibration method is time consuming. We are currently limited by the minimum
exposure time of the Scam detector ($\approx 600$ ms) and its read-out
($\approx 1200$ ms). We tried multiple scan patterns to reduce the time needed
to perform this calibration but for the moment, the grid scans are the most
accurate and reliable. As shown by the injection map radial profile presented
on the right side of Fig. 12, knowledge of the position of each fiber is
critical if we want to maximize throughput. An offset of one pixel on the
tracking camera (8.06 mas) corresponds to a loss of 10% of throughput, two
pixels (16.12 mas) corresponds to a loss of 30% and three pixels (24.18 mas)
to a loss of 55%. An offset of 50 mas which correspond to the angular
resolution of the Keck telescopes at 2$\mu$m correspond to a loss of 97% of
the throughput. This is why we take the time to perform these calibrations
properly and why we perform these calibration before each science night even
if the bundle has not be disconnected between two observations.
---
Figure 12: Left: injection map obtained by performing a 25 by 25 grid scan.
The pitch of the grid is 5 mas in both direction. Right: Radial profile
computed from the injection map.
During the calibrations, the PSFs in H, K and L bands are superimposed. As
neither the Keck II AO system nor the first phase of the KPIC project contains
an atmospheric dispersion corrector, when on-sky the PSFs of the target in H,
K and L bands are superimposed only when observing at Zenith. Therefore, when
observing away from Zenith, the location of the PSF on the tracking camera,
which operates in H band, will not correspond to the location of the K and L
band PSFs in the focal plane of the injection OAP. As such, an additional step
is taken during the acquisition sequence, whereby the PSF is offset with the
TTM along the elevation axis by the calculated offset expected from the
differential atmospheric refraction between the H and science bands (K or L).
This offset is a function of the elevation of the target and the refractive
index of the air versus wavelength. To compute the latter, we use an
analytical approximation of the refractive index which depends on the
temperature, pressure and relative humidity of the air above the primary
mirror [40]. The tracking loop used to align the target with the fiber
computes this value and applies the offset at each iteration of the loop (see
Sect. 5).
#### 4.1.2 Tracking camera
The calibration of the tracking camera is critical because we use it as a
reference to inject the light of the target of interest into one of the
science fibers. Key to calibrating the camera is understanding the plate
scale, the orientation and the field distortion map. We use two different
methods to calibrate the tracking camera. The first one can be performed
during the day by using NIRC2 as a reference. The plate scale, the orientation
and the distortion map of this detector is regularly calibrated and can be
considered as reliable. By using a dichroic like the KPIC-pick off (labeled A
on Fig. 2) we can image the PSF of the calibration unit of the Keck II AO
bench on both NIRC2 and the tracking camera at the same time. We translate the
calibration source in both the X and Y axis and acquire images for each
position with both detectors. We compute the position of the PSF in each
image. A set of two positions can be used to determine the plate scale of the
tracking camera and a set of three positions forming an asymmetric pattern can
be use to determine the orientation of the tracking camera with respect to
NIRC2. The more sets of data available the more accurate the plate scale and
the orientation. The variation as a function of x/y on the detector of plate
scale and orientation between those sets of data is used to compute the
distortion map of the tracking camera. To model the distortion in X and Y on
the detector, we use the methodology of Service et al. 2016 [41] and use a 5th
order bivariate Legendre polynomial. A second calibration method performed
during the night is routinely used to refine this. This method consists of
observing an object with multiple components (a binary star for example).
Because the astrometry of such an object (position angle and separation) is
stable during the calibration, we can use images of this object acquired on
different parts of the detector to calibrate the distortion map of the
tracking camera. To move the object around the detector we steer the TTM in
the FIU. Indeed, in the presence of local field distortions, the position
angle and separation vary across the detector. The average separation of this
target can be used to determine the plate scale and the orientation of the
detector. In order to mitigate orbital motion uncertainties of the system
observed to perform this calibration, we image the system with NIRC2 and the
Cred2 in parallel. We also tried to observe known fields of stars, like M92.
However, the FOV of the tracking camera (4.5 x 5.5 arc-second) is too narrow
to image many bright stars at the same time (H-mag $\leq$ 10).
The offsets computed from the calibrations outlined above, are applied to the
tracking loop (see Sect. 5) to align the science target with the selected
science fiber. We verify at the beginning of each run that we can align the
PSF with a sub-pixel resolution to confirm the validity of the tracking camera
calibrations.
#### 4.1.3 Coupling Optimization
To optimize the coupling, we must reduce the wavefront error in the system in
order to maximize the image quality in the focal plane of the input connector
of the fiber bundle. However, this plane is not easily accessible and cannot
be imaged with a detector so we cannot use any standard focal plane wavefront
sensing strategy in this case. The solution found to overcome this problem is
to use two calibration procedures. The first one is used to optimize the image
quality on the tracking camera while the second one is used to calibrate the
non-common path aberrations (NCPA) between the two paths of the FIU (tracking
camera and injection module).
To optimize the image quality on the tracking camera we use a phase diversity
algorithm called “image sharpening”. This is used in the calibration procedure
for some of the Keck facility instruments. This procedure can be run before
each science night as it takes only a few minutes to complete. Indeed, even if
the version used is not fully automated yet, we never start from a very
deformed PSF. We usually start with less than 100 nm RMS of wavefront
aberration in the system and consistently reach wavefront errors $<20$ nm RMS
by using this procedure.
Once the wavefront error is reduced to maximize the image quality on the
tracking camera, we use a Zernike optimization strategy which measures the
flux transmitted through the fiber bundle to indirectly reduce the NCPA
between the two paths of the FIU. We first select a Zernike mode (we usually
start with the defocus). Then we scan this mode in amplitude by using the Keck
AO DM. For each amplitude we perform a tip-tilt scan in order to build an
injection map (see Sect. 4.1.1). This is done incase the PSF move laterally
while being defocus (i.e. in case there is cross-coupling between modes). By
fitting a 2D Gaussian to each injection map we obtain the optimal injection
for each Zernike amplitue. The optimal amplitude for the selected Zernike mode
is determined by fitting a second order polynomial on the optimal injection
values measured for each amplitude of the selected Zernike mode. We then apply
this value to the DM and continue the calibration procedure by scanning the
next Zernike mode. This calibration procedure is completed once all the
Zernike modes selected have been scanned. Because we currently only scan one
mode at a time, we assume the modes in the system are orthogonal, which is a
reasonable assumption. In addition, most of the NCPA is in the lowest order
modes so we typically dont need to scan beyond 15 Zernike modes.
Figure 13 presents some of the injection maps obtained while optimizing the
defocus for the first three science fibers. Each row is associated to a fiber
(top row to S1, central row to S2, and bottom row to S3) and each column to a
defocus amplitude (from left to right: -180, -90, 0, +90 and +180 nm RMS). In
this figure, we can see that the NCPA are not the same for each fiber of the
bundle. Indeed, the elongation in the injection maps hints at the presence of
astigmatism in the PSF at the location of some of the fibers. Because this
calibration is time consuming and because we mainly use the second science
fiber of the bundle on sky, we only run the calibration for this fiber
routinely.
---
Figure 13: Measured injection maps from data collected on three fibers: S1
(top row), S2 (central row), S3 (bottom row) and five defocus amplitudes
centered on the initial defocus. From left to right: -180, 90, 0, +90 and +180
nm RMS. The flux of the injection map has been normalized by the maximum of
all the injection maps measured for those three fibers (63 total).
By using this calibration procedure, we have been able to improve the
injection by $\sim 13\%$. This result has been obtained by scanning eight
Zernike modes (Noll index $\in[4:11]$). The results presented in this
paragraph have been obtained by connecting the bundle to a photo-detector
using a simple optomechanical assembly. The use of the photo-detector allows
us to run the calibration faster but prevents us from running the calibration
when the bundle is connected to NIRSPEC. In the future we aim to be able to
run this calibration, by using Scam and/or Spec. In addition, we need to
improve the algorithm to converge faster. We also want to characterize the
NCPA and determined how it has evolved over time in order to determine how
often this calibration has to be performed.
### 4.2 Fiber extraction unit calibrations
NIRSPEC can be used on both Nasmyth platforms of the Keck II telescope. As
such, the bundle has to be reconnected to the FEU each time the instrument is
transported. Even if the re-positioning of the bundle (focus and orientation)
is repeatable and the FEU stable over time, we perform basic calibrations of
this module before each science night in order to optimize the performance of
the instrument.
The first calibration is used to co-align the fibers contained in the output
connector of the bundle with the slit selected for the observation. To move
the fibers with respect to the slit, we use the FEU-TTM (labeled C on the Fig.
6). To rotate the fibers with respect to the slit we use the rotator mirror
contained inside the NIRSPEC cryostat. Usually the rotator does not need to be
rotated by more than a degree, because the bundle were clocked to
approximately the right orientation by hand initially.
The second calibration is used to co-align the beam coming from the fiber
bundle with the stop used to reduce the background (see Sect. 3.4). This stop
is in the pupil plane of the fore-optics. To move the beam with respect to the
stop, we translate the bundle in the planes perpendicular to the optical axis
using two of the motorized translation stages contained in the FEU (see Sect.
3.3).
The third calibration is used to focus the bundle and adjust the size of the
PSFs coming from each fiber of the bundle on the slit. Because NIRSPEC has not
been designed to be diffraction-limited, the PSF is smaller than the slit when
the bundle is perfectly in focus. In this case, the spectrum acquired by the
science detector of NIRSPEC is undersampled. To overcome this problem, we have
the capability to defocus the bundle in order to optimize the sampling of the
science data. We adjust the focus of the bundle using one of the motorized
translation stages contained in the FEU (see Sect. 3.3). At the shortest
observed wavelength in a given band, we adjust the focus of the bundle to get
2.4 pixels/FWHM and this produces an R$\sim$35k.
These three calibration procedures are relatively rapid to perform due to the
stability of the FEU (usually less than one hour). The adjustments between two
consecutive nights are typically minor.
### 4.3 NIRSPEC calibrations
KPIC uses NIRSPEC in non-standard ways, so additional calibration steps on top
of the standard ones, are necessary. The days before the observation we take
the standard backgrounds and darks with multiple instrument set ups we are
likely to use during the science nights. We have the possibility to take extra
calibration data after the night if needed but calibration data acquired
before the science night can be used to quickly reduce the data during the
night to verify if everything is working as expected.
During the days before the observation, a wavelength solution calibration of
the science detector is performed by using NIRSPEC’s calibration sources (see
Fig. 6). The different arc lamp sources available in this unit have known
emission spectra, that enable wavelength calibration of the instrument. The
calibration unit also contains an extended white light source. We use this
source to acquire flats for every configuration we plan to use during the
night.
The next step of the NIRSPEC calibrations consist on determining where the
traces associated with each fiber in the bundle is located on the science
detector. The position of these spectra must be known to extract the spectral
information of each target observed. In the case of a bright object, the
location of the spectra is obvious but this is not the case for faint objects,
and so determining where to look for the traces with a calibration source off-
sky can be beneficial. To perform this calibration, we set up NIRSPEC, align
the fibers of the output connector with the slit using the position determined
previously (see Sect. 4.2) and inject the light of the calibration source of
the Keck II AO bench in each science fiber, one at a time. For each science
fiber, we acquire an image with the science detector. Because the calibration
source of the Keck II AO bench is bright and its emission spectra continuous,
we can extract the position of the traces associated with each science fiber,
across all the orders visible on the detector. Because the position of the
spectrum on the science detector and the wavelength solution are dependent on
the position of all the opto-mechanical elements located downstream of the
bundle, we need to perform this calibration for each instrument configuration
we plan to use during the science nights.
When we observe a target with at least one bright component (K or L magnitude
$<$ 10), we repeat this calibration on-sky. By acquiring such a data set on-
sky, we can insure that our calibrations were not affected by long term
thermal variations as the calibration is taken close to when the science data
is acquired. In addition, we can observe the target of interest and perform
the calibration by keeping all the opto-mechanical elements located downstream
of the bundle fixed, which yields a superior wavelength solution. Finally, the
data collected on the main star of the system can be used in the reduction of
the science data.
## 5 Science data acquisition
The FIU can be used to observe different kinds of targets. In this section we
only described the data acquisition procedure followed to acquire high-
resolution spectra of exoplanets and brown dwarfs. In most cases, we cannot
image the exoplanet using the tracking camera during an observation. So, in
order to blindly align the PSF of an exoplanet with one of the science fibers
of the bundle, we need to have an accurate knowledge of the astrometry of the
system being observed (position angle and separation). For companions with
well-characterized orbits such as the HR 8799 planets for example [42], we can
use the predicted relative astrometry or use data collected during the most
recent observation to measure the position. To predict the position of a
planet we use the algorithm used by the website
”http://whereistheplanet.com/”. If the information is not available or not
reliable, we can observe the target with NIRC2 at the beginning of our
observing run to measure the astrometric parameters of the companion.
During the observation, the first step of the acquisition sequence consists of
aligning the star with the selected science fiber. To achieve this, we use a
tracking loop. Its goal is to align the science target or its host star with a
science fiber by controlling the TTM in the FIU (labeled L , on Fig. 2). It
uses as inputs the image from the tracking camera as well as multiple
parameters provided by the telescope, the calibration procedures as well as
the user.
The algorithm uses tracking camera images to determine the position of the
host star on the detector. Using the position of the science fibers determined
during the calibration (see Sect. 4.1), the algorithm determines the FIU-TTM
offset needed and applies the command. As described in Sect. 4.1, we need to
take into account the atmospheric dispersion. This effect is automatically
compensated by the tracking loop at each iteration. For a given Zenith angle,
temperature, pressure and relative humidity, the offset in the differential
atmospheric refraction between H, where the camera tracks and K, where science
is conducted, is calculated and applied along the elevation axis (axis of
refraction). At this point we usually acquire data using the science detector
of NIRSPEC on the host. These data are used to measure the throughput of the
instrument and to reduce the science data acquired later in this sequence.
Figure 14 presents data acquired with the star of the HR7672 system aligned
with the second science fiber (labeled S2 on Fig. 3) on July 3rd, 2020. The
left panel presents the central section of the order 33 ($\lambda\in$
[2047:2083] nm) before and after reduction. The graph presented on the right
side of the figure presents the median line profile of this order. The blue
curve is the line profile computed from the raw data while the red one is
computed from the reduced data. The spectra of the star, aligned with the
second science fiber of the bundle, is clearly visible on both the Spec frame
and the graph presented by this figure.
---
Figure 14: Left: Central section of order 33 of a Spec frame acquired with
the star of the HR 7672 system align with the second science fiber (exposure
time = 29.5 sec). The left side of this image has not been reduced while the
right side has been reduced by subtracting the background and removing the bad
pixels. The horizontal lines of each side indicate the position of the fibers.
From top to bottom: CA, S1, S2, S3, S4, S5, CB (see Fig. 3). Right: Profiles
of order 33. This profile is the median of the profiles associated across all
the wavelengths of the order. The profile computed from the raw data is
represented in blue while the line profile computed from the reduced data is
represented in red.
After aligning the star with the selected science fiber and the spectral data
collected, we use the relative astrometry of the companion to offset the star
in order to align the science target with the fiber. This offset is applied by
providing the astrometric parameters of the target (position angle and
separation) to the tracking loop. After correcting the astrometric parameters
to take into account the field distortion of the tracking camera, the tracking
loop computes the offset needed and sends a command to the FIU-TTM to apply
the offset. We verify at the beginning of each run that we can apply such
offsets with a sub-pixel accuracy by observing several binary stars with both
components visible on the tracking camera. At this point, integration on the
science target (the companion) begins. In the case of faint targets (K or L
magnitude $\geq$ 13), we acquire multiple 10 min exposure frames with the
science detector of NIRSPEC. Figure 15 presents, on its left side, a section
of order 33 extracted from one of the science frames acquired the HR7672b
system aligned with the second science fiber. The graph presented on the right
side of the figure presents the median profiles of this order. The blue curve
is the profile computed from the raw data while the red one is computed from
the reduced data. Three peaks are visible in the line profile, which indicate
the position of the fiber traces. The one associated with the second science
fiber contains a combination of the light coming from the science target, the
speckle field of the star and the multiple backgrounds described in Sect.
3.5.1. The line associated with the third and fourth science fiber contains
the light of the the speckle field of the star and the multiple backgrounds
(see Sect. 3.5.1). We cannot adjust the intensity of the light coming from the
speckle field of the star in the science fiber aligned with the companion as
the separation between the companion and its host start is constant. However,
it can be adjusted for the other fiber by moving the star around the science
target using the rotator of the telescope. The offset applied to the rotator
is automatically taken into account by the tracking loop.
---
Figure 15: Left: Central section of the order 33 of a Spec frame acquired
with the companion of the HR 7672 system align with the second science fiber
(exposure time = 599 sec). The left side of this image has not been reduced
while the right side has been reduced by subtracting the background and
removing the bad pixel. The horizontal lines of each side indicate the
position of the fibers. From top to bottom: CA, S1, S2, S3, S4, S5, CB (see
Fig. 3). Right: Profiles of the order 33 computed by averaging the profile
associated to each wavelength of the order. The profile computed from the raw
data is represented in blue while the profile computed from the reduced data
is represented in red.
During the observation of a faint target, we regularly acquire data with the
star of the system aligned with the selected fiber (every hour or 6 science
frames) in order to get enough calibration data and to make sure the injection
into the fiber is high and stable by measuring the throughput of the system.
## 6 On sky performance and first results
To demonstrate the science capabilities of the system, we observed HR 7672 B
on September 28 2020, a bright ($K=13$ mag) early L-type brown dwarf that is
expected to have a similar spectral signature as many of our more challenging
targets [26]. Residing 0.64 arcsec from the star at the epoch of observation
[43], the companion also resides at comparable separations from the star as
our exoplanet targets. We obtained ten 600 seconds exposures of the brown
dwarf placed on science fiber S2, resulting in a total integration time of 100
minutes. The data were reduced using a preliminary version of the KPIC data
reduction pipeline. The thermal background of the instrument was subtracted
using 8 hours of backgrounds taken during the day with the same instrument
setup. The A0 standard star ups Her was observed at the start of the night to
calibrate the position and width of all of the fiber traces. We used this
trace information to extract spectra from all of the science fibers of the HR
7672 exposures, resulting in on-axis observations of both HR 7672 A and B on
S2. The extracted spectra were then averaged in time, removing bad pixels due
to cosmic ray contamination. The M-giant HIP 81497 was observed in each fiber
to compute the wavelength solution of each fiber. The A0 star zet Aql was
observed immediately before the HR 7672 observations to measure the total end-
to-end spectral response, including the telluric absorption profile.
The spectral response, wavelength solution, on-axis observations of S2, and
planetary atmosphere models were used to construct forward models of the on-
axis spectra of the brown dwarf companion. We used a BT-SETTL atmosphere model
with an effective temperature of 1800 K and a $\log(g)=5.0$ for the planet
spectrum [44]. We varied the radial velocity of the planet, rotational
broadening, and overall flux of the planet in fitting the forward model to the
data. A more detailed description of the data extraction and fitting technique
will be discussed in a subsequent paper. Figure 16 presents the best-fit model
and data from order 37 of the spectrum of HR 7672 B. The best-fit forward
model matches the data very well, as can be seen in visual inspection. To
better visualize the detection, we show the cross correlation function
detection of HR 7672 B in the top row of Fig. 17. There is a clear detection
of the brown dwarf and is consistent with previous $R\sim 1400$ spectra at the
same wavelength [26]. The posterior distributions for the radial velocity of
the planet and its rotational broadening are shown in the bottom row of Fig.
17. The vsin(i) measured is (42.6$\pm$0.8) km/s, and is the first detection of
rotational broadening for this companion. The detection and spin measurement
of a companion just 0.64 arcsec from its host star demonstrates the HDC
capabilities of KPIC.
---
Figure 16: Spectrum of HR 7672 B (37th NIRSPEC order). The middle panel
includes the extracted spectrum of the science fiber including its 1-$\sigma$
uncertainties (orange contours). The spectra were high-pass filtered but
plotted with an offset corresponding to the continuum median value. The best-
fit forward model of the data is shown as a black line. Because the spectrum
of the companion is contaminated by the glare of the star, we jointly fit an
on-axis starlight spectrum with a model of the planet. Both components of the
model, which include telluric lines, are shown separately as dashed lines. The
companion is modeled with a BT-SETTL template assuming a $1800\,\mathrm{K}$
temperature and a $\log(g)=5.0$ surface gravity. The top panel features
spectral templates that can be used to identify spectral lines in the data.
The system transmission includes: the transmission of the atmosphere and the
instrument. The BT-Settl model includes spin broadening of the companion,
while the molecular template is only broadened to the resolution of the
instrument. The lower panel shows the residuals of the fit.
---
Figure 17: Detection of HR 7672 B using the four reddest NIRSPEC orders
(Order 36-39). The top left panel is a type a cross correlation analysis. It
is calculated using the forward model framework illustrated in Figure 16 as
the estimated flux and associated uncertainty of the brown-dwarf companion as
a function of the radial velocity (RV) shift of the model assuming a null spin
for the companion. Fictitious fibers that only include background and dark
flux are also analyzed with the same model as a way to sample the noise. The
top right panel is the signal to noise (S/N) of the detection as a function of
RV assuming the best fit spin ($v\sin(i)=42.6\,\mathrm{km/s}$) for the model.
The S/N is calculated as the estimated amplitude of the companion divided by
its estimated uncertainty featured in the top right panel. The bottom two
panels are the marginalized posteriors for the radial velocity and the spin of
the companion respectively. The estimated radial velocity of the companion is
consistent with the prediction from relative astrometry measurements of the
companion and the radial velocity of the host star.
## 7 Conclusion
The fiber injection unit, part of the KPIC demonstrator, is a powerful tool to
acquire high spectral resolution data on faint objects surrounding stars,
faint isolated objects and close binaries. Deployed at the summit of Maunakea
in the fall 2018, the FIU has completed commissioning and has begun regular
science operations earlier this year. Numerous known stellar systems have been
imaged already and science data acquired. These data, currently being reduced
and analyzed, will be published in subsequent papers. After multiple months of
science exploitation, the second phase of the project will be deployed in
order to improve the overall performance of the instrument. The hardware,
software and observing strategies developed, tested and used by both phases of
this project will help to prepare future instruments on both ground and space
based telescopes.
###### Acknowledgements.
This work was supported by the Heising-Simons Foundation through grant
#2019-1312. It has been previously submitted as an SPIE proceeding [45]. W. M.
Keck Observatory is operated as a scientific partnership among the California
Institute of Technology, the University of California, and the National
Aeronautics and Space Administration (NASA). The Observatory was made possible
by the generous financial support of the W. M. Keck Foundation. The authors
wish to recognize and acknowledge the very significant cultural role and
reverence that the summit of Mauna Kea has always had within the indigenous
Hawaiian community. We are most fortunate to have the opportunity to conduct
observations from this mountain.
## References
* [1] A. Wolszczan and D. A. Frail, “A planetary system around the millisecond pulsar PSR1257 + 12,” Nature 355, 145–147 (1992).
* [2] M. Mayor and D. Queloz, “A Jupiter-mass companion to a solar-type star,” Nature 378, 355–359 (1995).
* [3] D. Charbonneau, R. W. Noyes, S. G. Korzennik, et al., “An Upper Limit on the Reflected Light from the Planet Orbiting the Star $\tau$ Bootis,” Astrophysical Journal Letters 522, L145–L148 (1999).
* [4] C. Moutou, A. Coustenis, J. Schneider, et al., “Search for spectroscopical signatures of transiting HD 209458b’s exosphere,” Astronomy and Astrophysics 371, 260–266 (2001).
* [5] I. S. McLean, E. E. Becklin, D. F. Figer, et al., “NIRSPEC: a near-infrared cross-dispersed echelle spectrograph for the Keck II telescope,” in Infrared Detectors and Instrumentation for Astronomy, A. M. Fowler, Ed., 2475, 350 – 358, International Society for Optics and Photonics, SPIE (1995).
* [6] H.-U. Kaeufl, P. Ballester, P. Biereichel, et al., “CRIRES: a high-resolution infrared spectrograph for ESO’s VLT,” in Ground-based Instrumentation for Astronomy, A. F. M. Moorwood and M. Iye, Eds., 5492, 1218 – 1227, International Society for Optics and Photonics, SPIE (2004).
* [7] I. A. G. Snellen, R. J. de Kok, E. J. W. de Mooij, et al., “The orbital motion, absolute mass and high-altitude winds of exoplanet hd 209458b,” Nature 465(7301), 1049–1051 (2010).
* [8] G. Rousset, F. Lacombe, P. Puget, et al., “Status of the VLT Nasmyth adaptive optics system (NAOS),” in Adaptive Optical Systems Technology, P. L. Wizinowich, Ed., 4007, 72 – 81, International Society for Optics and Photonics, SPIE (2000).
* [9] R. Lenzen, R. Hofmann, P. Bizenberger, et al., “CONICA: the high-resolution near-infrared camera for the ESO VLT,” in Infrared Astronomical Instrumentation, A. M. Fowler, Ed., 3354, 606 – 614, International Society for Optics and Photonics, SPIE (1998).
* [10] G. Chauvin, A.-M. Lagrange, C. Dumas, et al., “A giant planet candidate near a young brown dwarf,” Astronomy and Astrophysics 425, L29–L32 (2004).
* [11] C. Marois, B. Macintosh, T. Barman, et al., “Direct imaging of multiple planets orbiting the star hr 8799,” Science 322(5906), 1348–1352 (2008).
* [12] J. Larkin, M. Barczys, A. Krabbe, et al., “OSIRIS: A diffraction limited integral field spectrograph for Keck,” New Astronomy Reviews 50, 362–364 (2006).
* [13] M. F. Skrutskie, T. Jones, P. Hinz, et al., “The Large Binocular Telescope mid-infrared camera (LMIRcam): final design and status,” in Ground-based and Airborne Instrumentation for Astronomy III, I. S. McLean, S. K. Ramsay, and H. Takami, Eds., 7735, 1368 – 1378, International Society for Optics and Photonics, SPIE (2010).
* [14] B. R. Oppenheimer, C. Beichman, D. Brenner, et al., “Project 1640: the world’s first ExAO coronagraphic hyperspectral imager for comparative planetary science,” in Adaptive Optics Systems III, B. L. Ellerbroek, E. Marchetti, and J.-P. Véran, Eds., 8447, 736 – 748, International Society for Optics and Photonics, SPIE (2012).
* [15] J. L. Beuzit, A. Vigan, D. Mouillet, et al., “SPHERE: the exoplanet imager for the Very Large Telescope,” Astronomy and Astrophysics 631, A155 (2019).
* [16] B. Macintosh, J. R. Graham, P. Ingraham, et al., “First light of the Gemini Planet Imager,” Proceedings of the National Academy of Science 111, 12661–12666 (2014).
* [17] T. D. Groff, J. Chilcote, N. J. Kasdin, et al., “Laboratory testing and performance verification of the CHARIS integral field spectrograph,” in Ground-based and Airborne Instrumentation for Astronomy VI, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 9908, 99080O (2016).
* [18] I. A. G. Snellen, B. R. Brandl, R. J. de Kok, et al., “Fast spin of the young extrasolar planet $\beta$ Pictoris b,” Nature 509, 63–65 (2014).
* [19] I. Snellen, R. de Kok, J. L. Birkby, et al., “Combining high-dispersion spectroscopy with high contrast imaging: Probing rocky planets around our nearest neighbors,” Astronomy and Astrophysics 576, A59 (2015).
* [20] J. Wang, D. Mawet, G. Ruane, et al., “Observing Exoplanets with High Dispersion Coronagraphy. I. The Scientific Potential of Current and Next-generation Large Ground and Space Telescopes,” The Astronomical Journal 153, 183 (2017).
* [21] D. Mawet, G. Ruane, W. Xuan, et al., “Observing Exoplanets with High-dispersion Coronagraphy. II. Demonstration of an Active Single-mode Fiber Injection Unit,” The Astrophysical Journal 838, 92 (2017).
* [22] H. Kawahara, N. Murakami, T. Matsuo, et al., “Spectroscopic Coronagraphy for Planetary Radial Velocimetry of Exoplanets,” The Astrophysical Journal, Supplement 212, 27 (2014).
* [23] N. Jovanovic, O. Guyon, T. Kotani, et al., “Developing post-coronagraphic, high-resolution spectroscopy for terrestrial planet characterization on ELTs,” arXiv e-prints 1, arXiv:1712.07762 (2017).
* [24] T. Kotani, H. Kawahara, M. Ishizuka, et al., “Extremely high-contrast, high spectral resolution spectrometer REACH for the Subaru Telescope,” in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 11448, 1144878 (2020).
* [25] A. Vigan, G. P. P. L. Otten, E. Muslimov, et al., “Bringing high-spectral resolution to VLT/SPHERE with a fiber coupling to VLT/CRIRES+,” in Ground-based and Airborne Instrumentation for Astronomy VII, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 10702, 1070236 (2018).
* [26] M. C. Liu, D. A. Fischer, J. R. Graham, et al., “Crossing the Brown Dwarf Desert Using Adaptive Optics: A Very Close L Dwarf Companion to the Nearby Solar Analog HR 7672,” The Astrophysical Journal 571, 519–527 (2002).
* [27] P. Wizinowich, D. S. Acton, C. Shelton, et al., “First light adaptive optics images from the keck II telescope: A new era of high angular resolution imagery,” Publications of the Astronomical Society of the Pacific 112, 315–319 (2000).
* [28] C. Z. Bond, S. Cetre, S. Lilley, et al., “Adaptive optics with an infrared pyramid wavefront sensor at Keck,” Journal of Astronomical Telescopes, Instruments, and Systems 6, 039003 (2020).
* [29] N. Jovanovic, J.-R. Delorme, C. Z. Bond, et al., “The Keck Planet Imager and Characterizer: demonstrating advanced exoplanet characterization techniques for future extremely large telescopes (Conference Presentation),” in Techniques and Instrumentation for Detection of Exoplanets IX, S. B. Shaklan, Ed., 11117, International Society for Optics and Photonics, SPIE (2019).
* [30] J. Pezzato, N. Jovanovic, D. Mawet, et al., “Status of the Keck Planet Imager and Characterizer phase II development,” in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 11117, 111170U (2019).
* [31] N. Jovanovic, B. Calvin, M. Porter, et al., “Enhanced high-dispersion coronagraphy with KPIC phase II: design, assembly and status of sub-modules,” in Ground-based and Airborne Instrumentation for Astronomy VIII, C. J. Evans, J. J. Bryant, and K. Motohara, Eds., 11447, 970 – 981, International Society for Optics and Photonics, SPIE (2020).
* [32] D. Mawet, J. R. Delorme, N. Jovanovic, et al., “A fiber injection unit for the Keck Planet Imager and Characterizer,” in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 10400, 1040029 (2017).
* [33] J. Llop-Sayson, N. Jovanovic, G. Morrissey, et al., “Wavefront control experiments with a single mode fiber at the High-Contrast Spectroscopy Testbed for Segmented Telescopes (HCST),” in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 11443, 114432Q (2020).
* [34] C. T. Coker, J. Llop Sayson, S. Shaklan, et al., “A multi-object spectrograph using single-mode fibers with a coronagraph: progress towards laboratory results on the high-contrast testbed for segmented telescopes,” in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 11117, 111171A (2019).
* [35] R. K. Gibson, R. Oppenheimer, C. T. Matthews, et al., “Characterization of the C-RED 2: a high-frame rate near-infrared camera,” Journal of Astronomical Telescopes, Instruments, and Systems 6(1), 1 – 9 (2019).
* [36] I. S. McLean, E. E. Becklin, O. Bendiksen, et al., “Design and development of NIRSPEC: a near-infrared echelle spectrograph for the Keck II telescope,” in Infrared Astronomical Instrumentation, A. M. Fowler, Ed., 3354, 566 – 578, International Society for Optics and Photonics, SPIE (1998).
* [37] J. L. Robichaud, B. Zellers, R. Philippon, et al., “Cryogenic performance of the NIRSPEC three-mirror anastigmat,” in Infrared Astronomical Instrumentation, A. M. Fowler, Ed., 3354, 1068 – 1076, International Society for Optics and Photonics, SPIE (1998).
* [38] E. C. Martin, M. P. Fitzgerald, I. S. McLean, et al., “An overview of the NIRSPEC upgrade for the Keck II telescope,” in Ground-based and Airborne Instrumentation for Astronomy VII, C. J. Evans, L. Simard, and H. Takami, Eds., 10702, 63 – 74, International Society for Optics and Photonics, SPIE (2018).
* [39] R. A. Lopez, E. Hoffman, G. Doppmann, et al., “Characterization and Performance of the Upgraded NIRSPEC on the W. M. Keck Telescope,” in Ground-based and Airborne Instrumentation for Astronomy VIII, C. J. Evans, J. J. Bryant, and K. Motohara, Eds., 11447, International Society for Optics and Photonics, SPIE (2020).
* [40] R. J. Mathar, “Refractive index of humid air in the infrared: model fits,” Journal of Optics A: Pure and Applied Optics 9, 470–476 (2007).
* [41] M. Service, J. R. Lu, R. Campbell, et al., “A new distortion solution for NIRC2 on the keck II telescope,” Publications of the Astronomical Society of the Pacific 128, 095004 (2016).
* [42] J. J. Wang, J. R. Graham, R. Dawson, et al., “Dynamical constraints on the hr 8799 planets with gpi,” The Astronomical Journal 156, 192 (2018).
* [43] J. R. Crepp, J. A. Johnson, D. A. Fischer, et al., “The Dynamical Mass and Three-dimensional Orbit of HR7672B: A Benchmark Brown Dwarf with High Eccentricity,” The Astrophysical Journal 751, 97 (2012).
* [44] F. Allard, D. Homeier, and B. Freytag, “Models of very-low-mass stars, brown dwarfs and exoplanets,” Philosophical Transactions of the Royal Society of London Series A 370, 2765–2777 (2012).
* [45] J.-R. Delorme, N. Jovanovic, D. Echeverri, et al., “The Keck Planet Imager and Characterizer: A dedicated single-mode fiber injection unit for high resolution exoplanet spectroscopy,” in Ground-based and Airborne Instrumentation for Astronomy VIII, C. J. Evans, J. J. Bryant, and K. Motohara, Eds., 11447, 351 – 377, International Society for Optics and Photonics, SPIE (2020).
| arxiv-papers | 2021-07-27T02:20:36 | 2024-09-04T03:07:20.381553 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Jacques-Robert Delorme, Nemanja Jovanovic, Daniel Echeverri, Dimitri\n Mawet, J. Kent Wallace, Randall D. Bartos, Sylvain Cetre, Peter Wizinowich,\n Sam Ragland, Scott Lilley, Edward Wetherell, Greg Doppmann, Jason J. Wang,\n Evan C. Morris, Jean-Baptiste Ruffio, Emily C. Martin, Michael P. Fitzgerald,\n Garreth Ruane, Tobias Schofield, Nick Suominen, Benjamin Calvin, Eric Wang,\n Kenneth Magnone, Christopher Johnson, Ji Man Sohn, Ronald A. Lopez, Charlotte\n Z. Bond, Jacklyn Pezzato, Jorge Llop Sayson, Mark Chun and Andrew J. Skemer",
"submitter": "Jacques-Robert Delorme",
"url": "https://arxiv.org/abs/2107.12556"
} |
2107.12557 | # Frobenius manifolds on orbit spaces of non-reflection representations
###### Abstract
We prove the orbit spaces of some non-reflection representations of finite
groups posses Frobenius manifold structures.
Zainab Al-Maamari 111Sultan Qaboos University, Muscat, Oman,
[email protected], Yassir Dinar 222Sultan Qaboos University, Muscat,
Oman, [email protected].
Mathematics Subject Classification (2020) Primary 53D45; Secondary 16W22,
57R18, 14B05.
Keywords: Invariant rings, Frobenius manifold, Representations of finite
groups, Flat pencil of metrics, Quotient singularities, Orbifolds.
###### Contents
1. 1 Introduction
2. 2 Flat pencil of metrics and Frobenius manifolds
1. 2.1 Frobenius manifolds
2. 2.2 Flat pencil of metrics
3. 2.3 A duality and inversion symmetry
3. 3 Coxeter groups
1. 3.1 Duality on orbits of reflection groups
2. 3.2 Sign times reflection representation
4. 4 Dihedral and dicyclic groups
1. 4.1 Dihedral groups
2. 4.2 Dicyclic groups
3. 4.3 Finite subgroups of $SL_{2}(\mathbb{C})$
5. 5 Finite subgroups of $SL_{3}(\mathbb{C})$
6. 6 Conclusions
## 1 Introduction
Frobenius manifold is a geometric realization introduced by B. Dubrovin for a
potential satisfying a system of partial differential equations known as
Witten-Dijkgraaf-Verlinde-Verlinde (WDVV) equations which describes the module
space of two dimensional topological field theory. Remarkably, Frobenius
manifolds are also recognized in many other fields in mathematics like
invariant theory, quantum cohomology, integrable systems and singularity
theory [5]. Briefly, a Frobenius algebra is a commutative associative algebra
with unity $e$ and a nondegenerate bilinear form $\Pi$ invariant under
product, i.e., $\Pi(a\cdot b,c)=\Pi(a,b\cdot c)$. A Frobenius manifold is a
manifold with a smooth structure of a Frobenius algebra on the tangent space
at any point with certain compatibility conditions. Globally, we require the
metric $\Pi$ to be flat and the unity vector field $e$ is constant with
respect to it. In this article, we will show that orbit spaces of some non-
reflection representations of finite groups acquire Frobenius structures.
We use the following notations and facts for a finite group $G$ and a complex
linear representation $\psi:G\to GL(V)$. We denote by $\mathbb{C}[V]$ the ring
of polynomial functions on $V$, $\mathbb{C}[\psi]$ the subring of invariant
polynomials in $\mathbb{C}[V]$, and $\mathcal{O}(\psi)$ the orbit space of the
action of $G$ on $V$. Then $\mathbb{C}[\psi]$ is finitely generated by
homogeneous polynomials and $\mathcal{O}(\psi)$ is a variety with coordinate
ring $\mathbb{C}[\psi]$ ([17], [3]). By Chevalley–Shephard–Todd theorem,
$\mathbb{C}[\psi]$ is a polynomial ring if and only if $\psi$ is generated by
pseudo-reflections. Let $(x_{1},\ldots,x_{n})$ be linear coordinates on $V$
and $f\in\mathbb{C}[\psi]$. Then the Hessian
$\mathrm{H}(f):={\partial^{2}f\over\partial x_{i}\partial x_{j}}$ defines a
bilinear from on the tangent space of $\mathcal{O}(\psi)$ and if
$\det(\mathrm{H}(f))\neq 0$ then $f$ is a minimal degree invariant polynomial
([18], page 6). In this article, we will drop the word pseudo as all
representations will be considered as complex representations.
Let ${\mathcal{W}}$ be a finite irreducible Coxeter group or Shephard group of
rank $r$ and $\rho_{ref}$ is the standard reflection representation of
${\mathcal{W}}$. Boris Dubrovin proved that the orbit space
$\mathcal{O}(\rho_{ref})$ acquire a polynomial Frobenius structure ([4],[8]).
This result led to the classification of irreducible semisimple polynomial
Frobenius manifolds with positive degrees (see section 3.1 for more details).
His method was used in [25] when ${\mathcal{W}}$ is a Coxeter group of type
$B_{r}$ or $D_{r}$ to construct $r$ Frobenius manifolds on
$\mathcal{O}(\rho_{ref})$. However, all above-mentioned constructions seem
like they depend on the fact that the invariant rings are polynomial rings. In
this article, we report applying successfully Dubrovin’s method on some non-
reflection representations, i.e., their invariant rings are not polynomial
rings.
We mention that Dubrovin and his collaborators constructed Frobenius manifolds
using invariant rings of infinite discrete groups being extensions of affine
Weyl groups ([7], [10], [26]). However, also in these cases, the cardinality
of a minimal set of generators equals the rank of the representation.
Let us fix a finite group $G$ and a linear representation $\psi:G\to GL(V)$ of
rank $r$. Then we summarize Dubrovin’s method to prove existence of a
Frobenius structure on $\mathcal{O}(\psi)$ as follows:
1. 1.
Fix a homogenous invariant polynomial $f_{1}$ having the minimal positive
degree.
2. 2.
Verify that
$\text{the inverse of the Hessian }\mathrm{H}(f_{1})\text{ defines a
contravariant flat metric }<\cdot,\cdot>_{2}$ (1.1)
on some open subset $U$ of $\mathcal{O}(\psi)$. For example, this happens if
$\psi$ is a real representation (in this case degree $f_{1}$ equals 2) [11] or
$\psi$ is the standard reflection representation of a Shephard group [18].
3. 3.
Construct another contravariant metric $<\cdot,\cdot>_{1}$ which forms with
$<\cdot,\cdot>_{2}$ a regular quasihomogenius flat pencil of metrics (abbr.
regular QFPM) on $U$ ( see section 2.2 for details).
4. 4.
Using theorem 2.5 due to Dubrovin, we get a Frobenius structure on $U$ which
depends on the representation $\psi$ of $G$ or $\mathbb{C}[\psi]$.
By abuse of language, we say $\mathcal{O}(\psi)$ acquires a natural Frobenius
structure.
We will prove the orbit spaces of the following representations posses
Frobenius structures using Dubrovin’s method:
1. 1.
The standard reflection representation of a finite irreducible Coxeter group:
We prove there is a natural rational Frobenius structure different from the
ones constructed in [4] and [25]. We give details in section 3.1. Note that
here the invariant ring is a polynomial ring.
2. 2.
The non-reflection irreducible representation of dimension $r$ of Coxeter
group of type $A_{r}$: We show the orbit space carries the same Frobenius
structures that can be obtained on orbit space of the standard reflection
representation. We give details in section 3.2.
3. 3.
Irreducible representations of dihedral groups and dicyclic groups: These
groups have only rank 1 and 2 irreducible representations. We will prove that
any rank 2 representation has two Frobenius structures. Some of them acquire
Frobenius structures with rational degrees. See section 4 for details.
4. 4.
All finite subgroups of the special linear group $SL_{2}(\mathbb{C})$: We get
polynomial and rational Frobenius structures related to dihedral groups. See
section 4.3.
5. 5.
All finite subgroups of the special linear group $SL_{3}(\mathbb{C})$ where
the invariant rings are complete intersection: Dubrovin’s method fails on some
of them. However we find a total of 8 types of Frobenius structures including
a trivial one. Details are given in section 5.
We mention that except for the second item in the list above, there are enough
information in the literature about the invariant rings in order to apply
Dubrovin’s method. For the non-reflection irreducible representation of
dimension $r$ of Coxeter group of type $A_{r}$, we have to construct $r$
algebraically independent invariant polynomials.
We emphasis that constructing a flat pencil of metric for a given
contravariant metric is not a simple task (see for example [9] and [21] for
details). In this article, we will find regular QFPMs using a simple criterion
(see lemma 2.4 below). However, in some cases we will use a set of invariant
polynomials different from the generators of the invariant ring.
To make the article as self-contained as possible, we recall in section 2.1
and 2.2 the definition of Frobenius manifold and its relation with flat
pencils of metrics. In section 2.3 we review a duality theorem for certain
class of flat pencil of metrics obtained in [1]. In section 3.1, we give some
details about the work of Dubrovin and Zuo on standard reflection
representations of finite irreducible Coxeter groups and the classification of
polynomial Frobenius manifolds.
## 2 Flat pencil of metrics and Frobenius manifolds
### 2.1 Frobenius manifolds
Let $M$ be a Frobenius manifold with flat metric $\Pi$ and identity vector
field $e$. In flat coordinates $(t^{1},...,t^{r})$ for $\Pi$ where
$e=\partial_{t^{r}}$ the compatibility conditions imply that there exists a
function $\mathbb{F}(t^{1},...,t^{r})$ which encodes the Frobenius structure,
i.e., the flat metric is given by
$\Pi_{ij}(t)=\Pi(\partial_{t^{i}},\partial_{t^{j}})=\partial_{t^{r}}\partial_{t^{i}}\partial_{t^{j}}\mathbb{F}(t)$
(2.1)
and, setting $\Omega_{1}(t)$ to be the inverse of the matrix $\Pi(t)$, the
structure constants of the Frobenius algebra are given by
$C_{ij}^{k}(t)=\Omega_{1}^{kp}(t)\partial_{t^{p}}\partial_{t^{i}}\partial_{t^{j}}\mathbb{F}(t).$
Here, and in what follows, summation with respect to repeated upper and lower
indices is assumed. In this article, we assume the quasihomogeneity condition
for $\mathbb{F}(t)$ takes the form
$E\mathbb{F}(t)=d_{i}t^{i}\partial_{t^{i}}\mathbb{F}(t)=\left(3-d\right)\mathbb{F}(t);~{}~{}d_{r}=1.$
(2.2)
The vector field $E=d_{i}t^{i}\partial_{t_{i}}$ is known as Euler vector field
and it defines the degrees $d_{i}$ and the charge $d$ of $M$. The
associativity of the Frobenius algebra implies that the potential
$\mathbb{F}(t)$ satisfies WDVV equations, i.e.,
$\partial_{t^{i}}\partial_{t^{j}}\partial_{t^{k}}\mathbb{F}(t)~{}\Omega_{1}^{kp}~{}\partial_{t^{p}}\partial_{t^{q}}\partial_{t^{n}}\mathbb{F}(t)=\partial_{t^{n}}\partial_{t^{j}}\partial_{t^{k}}\mathbb{F}(t)~{}\Omega_{1}^{kp}~{}\partial_{t^{p}}\partial_{t^{q}}\partial_{t^{i}}\mathbb{F}(t),~{}~{}\forall
i,j,q,n.$ (2.3)
We say $M$ is polynomial (rational) if $\mathbb{F}(t)$ is polynomial
(rational) function.
###### Definition 2.1.
Let $M$ and $\widetilde{M}$ be two Frobenius manifolds with flat metrics $\Pi$
and $\widetilde{\Pi}$ and potentials $\mathbb{F}$ and
$\widetilde{\mathbb{F}}$, respectively. We say $M$ and $\widetilde{M}$ are
(locally) equivalent if there are open sets $U\subseteq M$ and
$\widetilde{U}\subseteq\widetilde{M}$ with a local diffeomorphism
$\phi:U\to\widetilde{U}$ such that
$\phi^{*}\widetilde{\Pi}=c^{2}\Pi,$ (2.4)
for some nonzero constant $c$, and $\phi_{*}:T_{t}U\to
T_{\phi(t)}\widetilde{U}$ is an isomorphism of Frobenius algebras.
Note that, if $M$ and $\widetilde{M}$, are equivalent Frobenius structures
then it is not necessary that $\phi^{*}\widetilde{\mathbb{F}}=\mathbb{F}$ [4].
### 2.2 Flat pencil of metrics
We review the relation between flat pencils of metrics and Frobenius manifolds
outlined in [6].
Let $M$ be a smooth manifold of dimension $r$ and fix local coordinates
$(u^{1},...,u^{r})$ on $M$.
###### Definition 2.2.
A symmetric bilinear form $(.,.)$ on $T^{*}M$ is called a contravariant metric
if it is invertible on an open dense subset $M_{0}\subseteq M$. We define the
contravariant Levi-Civita connection or Christoffel symbols $\Gamma^{ij}_{k}$
for a contravariant metric $(.,.)$ by
$\Gamma^{ij}_{k}:=-g^{im}\Gamma_{mk}^{j}$ (2.5)
where $\Gamma_{mk}^{j}$ are the Christoffel symbols of the metric $<.,.>$
defined on $TM_{0}$ by the inverse of the matrix
$\Omega^{ij}(u)=(du^{i},du^{j})$. We say the metric $(.,.)$ is flat if $<.,.>$
is flat.
Let $(.,.)$ be a contraviariant metric on $M$ and set
$\Omega^{ij}(u)=(du^{i},du^{j})$. Then we will use $\Omega$ to refer to the
metric and $\Omega(u)$ to its matrix in the coordinates. In particular, Lie
derivative of $(.,.)$ along a vector field $X$ will be written
$\mathfrak{L}_{X}\Omega$ while $X\Omega^{ij}$ means the vector field $X$
acting on the entry $\Omega^{ij}$.
###### Definition 2.3.
[6] Let $\Omega_{2}$ and $\Omega_{1}$ be two flat contravariant metrics on $M$
with Christoffel symbols $\Gamma_{2k}^{ij}$ and $\Gamma_{1k}^{ij}$,
respectively. Then they form a flat pencil of metrics (abbr. FPM) if
$\Omega_{\lambda}:=\Omega_{2}+\lambda\Omega_{1}$ defines a flat metric on
$T^{*}M$ for generic constant $\lambda$ and the Christoffel symbols of
$\Omega_{\lambda}$ are given by $\Gamma_{\lambda
k}^{ij}=\Gamma_{2k}^{ij}+\lambda\Gamma_{1k}^{ij}$. Such flat pencil of metrics
is called quasihomogenous of degree $d$ if there exists a function $\tau$ on
$M$ such that the vector fields
$\displaystyle E$ $\displaystyle:=$
$\displaystyle\nabla_{2}\tau,~{}~{}E^{i}=\Omega_{2}^{ij}(u)\partial_{u^{j}}\tau$
(2.6) $\displaystyle e$ $\displaystyle:=$
$\displaystyle\nabla_{1}\tau,~{}~{}e^{i}=\Omega_{1}^{ij}(u)\partial_{u^{j}}\tau$
satisfy the following properties
$[e,E]=e,~{}~{}\mathfrak{L}_{E}\Omega_{2}=(d-1)\Omega_{2},~{}~{}\mathfrak{L}_{e}\Omega_{2}=\Omega_{1}~{}~{}\mathrm{and}~{}~{}\mathfrak{L}_{e}\Omega_{1}=0.$
(2.7)
In addition, the quasihomogenous flat pencil of metrics (abbr. QFPM) is called
regular if the (1,1)-tensor
$R_{i}^{j}=\frac{d-1}{2}\delta_{i}^{j}+{\nabla_{1}}_{i}E^{j}$ (2.8)
is nondegenerate on $M$.
We will use the following source for FPM.
###### Lemma 2.4.
[4] Let $\Omega_{2}$ be a contravariant flat metric on $M$. Assume that in the
coordinates $(u^{1},...,u^{r})$, $\Omega^{ij}_{2}(u)$ and
$\Gamma^{ij}_{2k}(u)$ depend almost linearly on $u^{r}$. Suppose that
$\Omega_{1}:=\mathfrak{L}_{\partial_{u^{r}}}\Omega_{2}=\partial_{u^{r}}\Omega_{2}(u)$
is nondegenerate. Then $\Omega_{2}$ and $\Omega_{1}$ form a FPM. The
Christofell symbols of $\Omega_{1}$ has the form
$\Gamma^{ij}_{1k}(u)=\partial_{u^{r}}\Gamma^{ij}_{2k}(u).$
If $M$ is a Frobenius manifold then $M$ has a QFPM but it does not necessarily
satisfy the regularity condition. In the notations of section 2.1, the QFPM
consists of the intersection form ${\Omega}_{2}(t)$ and the flat metric
${\Omega}_{1}(t)$ with degree $d$ where
${\Omega}_{2}^{ij}(t):=(d-1+d_{i}+d_{j})\Omega^{i\alpha}_{1}\Omega^{j\beta}_{1}\partial_{t^{\alpha}}\partial_{t^{\beta}}\mathbb{F}.$
(2.9)
Furthermore, $\tau=t^{1}$ and $E$ with $e$ are defined by (2.6) and satisfy
equations (2.7) [6]. The converse is given by the following theorem
###### Theorem 2.5.
[6] Let $M$ be a manifold carrying a regular quasihomogenous flat pencil of
metrics formed by $\Omega_{2}$ and $\Omega_{1}$. Denote by $M_{0}\subseteq M$
the subset of $M$ where the metric $\Omega_{1}$ is invertible. Define the
multiplication of 1-forms on $M_{0}$ putting
$u.v:=\Delta(u,R^{-1}v)\
where~{}\Delta^{ijk}=\Omega^{im}_{1}\Gamma^{ik}_{1m}-\Omega_{2}^{im}\Gamma^{jk}_{1m}.$
(2.10)
Then there exists a unique Frobenius structure on $M$ such that
1. 1.
The flat metric is given by the inverse of $\Omega_{1}$.
2. 2.
The product on the tangent space is dual to the product (2.10) under the
metric $\Omega_{1}$.
3. 3.
The intersection form is $\Omega_{2}$.
4. 4.
The unity vector field $e$ and the Euler vector field $E$ are defined by
(2.6).
### 2.3 A duality and inversion symmetry
Let $M$ be a Frobenius manifold, we adapt the notations of section 2.1.
###### Theorem 2.6.
[5] Suppose $\Pi_{rr}(t)=0$ and all the degrees $d_{i}$’s are distinct. Then
there is a linear change of the coordinates $(t^{1},...,t^{r})$ such that
$\Pi_{ij}=\delta_{i+j,r+1}$. In these flat coordinates, the potential
$\mathbb{F}$ takes the form
$\mathbb{F}(t)=\frac{1}{2}(t^{r})^{2}t^{1}+\frac{1}{2}t^{r}\sum_{i=2}^{r-1}t^{i}t^{r-i+1}+G(t^{1},...,t^{r-1})$
(2.11)
and the degrees satisfy the duality
$d_{i}+d_{r-i+1}=2-d.$ (2.12)
It is straightforward to prove under the hypothesis of theorem 2.6 that the
associated flat pencil of metrics is regular if and only if
$\frac{d_{1}}{2}\neq d_{i}$ for every $i$.
###### Theorem 2.7.
[1] Let $M$ be a Frobenius manifold with a flat coordinates
$(t^{1},\ldots,t^{r})$ where the potential has the form (2.11). Assume the
associated quasihomogenous flat pencil of metrics defined by the intersection
form $\Omega_{2}$ and the flat metric $\Omega_{1}$ is regular of degree $d\neq
1$. Then there is another Frobenius structure on $M\backslash\\{t^{1}=0\\}$
having the flat coordinates
$s^{1}=-t^{1},\ \ s^{i}=t^{i}(t^{1})^{\frac{d_{1}-2d_{i}}{d_{1}}}\ \ for\ \
1<i<r,\ \
s^{r}=\frac{1}{2}\sum_{i=1}^{r}t^{i}t^{r-i+1}(t^{1})^{\frac{-2}{d_{1}}-1}$
(2.13)
and its flat pencil of metrics is also regular and consists of the
intersection form $\Omega_{2}$ and the flat metric $\widetilde{\Omega}_{1}$
where $\widetilde{\Omega}_{1}$ is Lie derivative of $\Omega_{2}$ along the
vector field ${\partial_{s^{r}}}$.
We prove in [1] that the potential $\widetilde{\mathbb{F}}(s)$ of new
Frobenius structure constructed in theorem 2.7 is nothing but the inversion
symmetry of the solution $\mathbb{F}(t)$ (see [4], appendix B for details
about inversion symmetry). Furthermore, the potential
$\widetilde{\mathbb{F}}(s)$ has the form
$\widetilde{\mathbb{F}}(s)=(t^{1})^{\frac{-4}{d_{1}}}\left(\mathbb{F}(t^{1},\ldots,t^{r})-\frac{1}{2}t^{r}\sum_{1}^{r}t^{i}t^{r-i+1}\right)$
(2.14)
which will be rational in $s^{1}$. The degrees of the new Frobenius structure
are
$\widetilde{d}_{1}=-d_{1},\ \ \widetilde{d}_{r}=1,\ \
\widetilde{d}_{i}=d_{i}-d_{1}\ \ for\ \ 1<i<r.$ (2.15)
and the charge is $\widetilde{d}=2-d$. Form the point of view of this article,
theorem 2.7 explains the appearance of some rational Frobenius structures in
next sections.
Here is an example where theorem 2.7 can not apply. For convenience, we write
in examples, indices of coordinates using subscripts instead of superscripts.
###### Example 2.8.
A Frobenius manifold is called trivial if the structure constants does not
depend on the point. In this case, all monomials in the potential are cubic,
all degrees equal 1 and the charge is 0. Then the method given in this section
will not give a dual Frobenius structure. An example in dimension 3 will
encounter later is the trivial Frobenius manifold $T_{3}$ given by the
potential
$\mathbb{F}=\frac{1}{2}t_{2}^{2}t_{1}+\frac{2}{3}t_{1}^{3}-t_{2}t_{1}^{2}+2t_{3}^{2}t_{1}-t_{2}t_{3}^{2},$
where $e=\partial_{t_{1}}$. This has no dual since $\mathbb{F}$ can not have
the form (2.11).
## 3 Coxeter groups
### 3.1 Duality on orbits of reflection groups
In this section, we recall the standard reflection representations of
irreducible finite Coxeter groups and review the construction of Frobenius
manifolds on their orbit spaces. Then we apply theorem 2.7 and give some
examples.
We fix an irreducible finite Coxeter system $({\mathcal{W}},S)$ of rank $r$,
i.e.,
${\mathcal{W}}=<S|\,(ss^{\prime})^{m(s,s^{\prime})}=1;\,\forall
s,s^{\prime}\in S>,~{}~{}r=|S|.$ (3.1)
Let $V$ be the formal vector space over $\mathbb{C}$ with basis
$\\{\alpha_{s}\ |\ s\in S\\}$. Then the standard reflection representation of
${\mathcal{W}}$ is defined by
$\displaystyle{\rho_{ref}}$ $\displaystyle:{\mathcal{W}}\rightarrow
GL(V),~{}~{}s\mapsto R_{s},~{}s\in S.$ $\displaystyle R_{s}(v)$
$\displaystyle:=v-2B(\alpha_{s},v)\alpha_{s},~{}~{}v\in
V,~{}~{}B(\alpha_{s},\alpha_{s^{\prime}}):=-\cos\frac{\pi}{m(s,s^{\prime})}.$
Here $B$ is the standard positive-definite Hermitian form on $V$ which is
invariant under $\rho_{ref}$.
By Chevalley–Shephard–Todd theorem, the invariant ring
$\mathbb{C}[\rho_{ref}]$ is a polynomial ring generated by $r$ homogeneous
polynomial. We fix generators $u^{1},...,u^{r}$ for $\mathbb{C}[\rho_{ref}]$.
We assume $\deg u^{i}=\eta_{i}$ and
$2=\eta_{1}<\eta_{2}\leq\eta_{3}\leq\ldots\leq\eta_{r+1}<\eta_{r}.$ (3.2)
These degrees are an intrinsic property of the group ${\mathcal{W}}$ [14] and
we list them in Table 1.
Type of ${\mathcal{W}}$ | $\eta_{1},\ldots,\eta_{r}$
---|---
$A_{r}$ | $2,3,\ldots,r+1$
$B_{r}$ | $2,4,6,\ldots,2r$
$D_{r}$ | $2,4,6,\ldots,2r-2,r$
$E_{6}$ | $2,5,6,8,9,12$
$E_{7}$ | $2,6,8,10,12,14,18$
$E_{8}$ | $2,8,12,14,18,20,24,30$
$F_{4}$ | $2,6,8,12$
$H_{3}$ | $2,6,10$
$H_{4}$ | $2,12,20,30$
$I_{2}(m)$ | $2,m$
Table 1: Degrees of invariant polynomials of $\rho_{ref}$
We set $u^{1}$ equals the quadratic from of $B$. Hence, the inverse of the
Hessian of $u^{1}$ defines a flat contravariant metric $\Omega_{2}$ on
$\mathcal{O}(\rho_{ref})$. It is easy to prove that $\Omega_{2}(u)$ is almost
linear in $u^{r}$ by analysing the degrees of $\Omega^{ij}_{2}(u)$. We fix the
vector field $e=\partial_{u^{r}}$. Note that changing the generators of
$\mathbb{C}[\rho_{ref}]$, $e$ is uniquely defined up to a constant factor.
Dubrovin proved that $\Omega_{2}$ and $\Omega_{1}:=\mathfrak{L}_{e}\Omega_{2}$
form a regular QFPM of charge $\eta_{r}-2\over\eta_{r}$ [6]. In this case,
$\tau={1\over\eta_{r}}u_{1}$ and the vector field $E$ is given by
$E={1\over\eta_{r}}\sum_{i}\eta_{i}u^{i}\partial_{u^{i}}$. This result
initiated what we call Dubrovin’s method in the introduction. Below, we
restate Dubrovin theorem. We observe that $E$ is uniquely defined and does not
depend on the choice of invariants $u^{i}$. Also, we mention that the flat
metric $\Omega_{1}$ was studied by K. Saito [20], [19] and his results was
very important to the work [4].
###### Theorem 3.1.
([4], [6]) The FPM formed by $\Omega_{2}$ and $\Omega_{1}$ defines a unique
(up to equivalence) polynomial Frobenius manifold on $\mathcal{O}(\rho_{ref})$
with degrees $\eta_{i}\over\eta_{r}$ and charge $\eta_{r}-2\over\eta_{r}$.
The following theorem was conjectured by Dubrovin and proved by C. Hertling.
###### Theorem 3.2.
[13] Any irreducible massive polynomial Frobenius manifold with positive
degrees is isomorphic to a polynomial Frobenius manifold constructed by
theorem 3.1 on the orbit space of the standard reflection representation of an
irreducible finite Coxeter group.
Then theorem 2.7 gives another Frobenius structure on
$\mathcal{O}(\rho_{ref})$.
###### Theorem 3.3.
There is exist a unique (up to equivalence) rational Frobenius manifold
structure on $\mathcal{O}(\rho_{ref})$ with the intersection form $\Omega_{2}$
and flat metric $\mathfrak{L}_{\tilde{e}}\Omega_{2}$ where
$\tilde{e}=(u^{1})^{\eta_{r}}e$. The charge of this Frobenius manifold is
$\eta_{r}+2\over\eta_{r}$ and the degrees are
$d_{1}=-{2\over\eta_{r}},\ \ d_{i}={\eta_{i}-2\over\eta_{r}};\ \ i=2,\ldots
r-1,\ \ \text{and}\ \ d_{r}=1.$ (3.3)
The potential in the flat coordinates $(t^{1},\ldots,t^{r})$ is polynomial in
$\frac{1}{t^{1}},t^{1},t^{2},\ldots,t^{r}$.
###### Proof.
From the work of K. Saito (see also [4]), there exist invariant polynomials
$t^{1},\ldots,t^{r}$ which form a flat coordinates and the potential of the
polynomial Frobenius structure on $\mathcal{O}(\rho_{ref})$ has the form
(2.11). Looking at the degrees, theorem 2.7 is applicable. The result is a
rational Frobenius manifold in $s^{1}$ with the claimed data. Uniqness follow
from the uniqness of polynomial Frobenius structures. ∎
Let us assume ${\mathcal{W}}$ is of type $B_{r}$. Then Dafeng Zuo obtained $r$
Frobenius structures on $\mathcal{O}(\rho_{ref})$ by fixing a certain
generators $z^{1},\ldots,z^{r}$ of $\mathbb{C}[\rho_{ref}]$ [25]. Under these
generators, $\Omega_{2}(z)$ and its Christoffel symbols $\Gamma^{ij}_{2,k}(z)$
are almost linear in each $z^{k}$, $k=1,2,\ldots,r$. Then he proved lemma 2.4
can be applied and he constructed $r$ rational Frobenius structure using the
FPM formed by $\Omega_{2}$ and
$\Omega_{k}:=\mathfrak{L}_{\partial_{z^{k}}}\Omega_{2}$. He also proved that
the same Frobenius manifolds can be constructed when we replace type $B_{r}$
with $D_{r}$. We confirm that Zuo’s work falls into Dubrovin’s method as we
can read from his work that the FPM is regular quasihomogenous of charge
$1-{1\over k}$ with $\tau={1\over 4k}z^{1}$. Thus, we can obtain these
Frobenius manifolds equivalently using theorem 2.5. We state below Zuo’s
theorem.
###### Theorem 3.4.
[25] There exists a unique Frobenius structure for each $1\leq k\leq r$ of
charge $d=1-\frac{1}{k}$ on the orbit space $\mathcal{O}(\rho_{ref})$ when
${\mathcal{W}}$ is of type $B_{r}$ and $D_{r}$ polynomial in
$t^{1},t^{2},\ldots,t^{r},\frac{1}{t^{r}}$ such that:
1. 1.
$e=\frac{\partial}{\partial z^{k}}=\frac{\partial}{\partial t^{k}}$.
2. 2.
$E=\sum_{i=1}^{r}d_{i}t^{i}\partial_{t^{i}}$, where
$d_{1}=\frac{1}{k},\ \ d_{i}=\frac{i}{k}\ \ for\ \ 2\leq i\leq k,\ \
d_{i}=\frac{2k(r-i)+r}{2k(r-k)}\ \ for\ \ k+1\leq i\leq r.$
3. 3.
The invariant flat metric and the intersection form of Frobenius structure
coincide with the metric $\Omega_{k}$ and $\Omega_{2}$ resp..
###### Theorem 3.5.
There is exist a unique rational Frobenius manifold structure for each $2\leq
k\leq r$ of charge ${d}=1+\frac{1}{k}$ on the orbit space when ${\mathcal{W}}$
is of type $B_{r}$ and $D_{r}$ with intersection form $\Omega_{2}$ and flat
metric $\mathfrak{L}_{\widetilde{e}}\Omega_{2}$ where
$\widetilde{e}=(z^{1})^{\eta_{k}}\partial_{z^{k}}$. It has the degrees
${d}_{1}=\frac{-1}{k},\ \ {d}_{i}=\frac{i-1}{k}\ \ for\ \ 2\leq i\leq k-1,\ \
{d}_{k}=1,\ \ {d}_{i}=\frac{2k(r-i+1)-r}{2k(r-k)}\ \ for\ \ k+1\leq i\leq r.$
(3.4)
The potential in the flat coordinates $(t^{1},\ldots,t^{r})$ is polynomial in
$\frac{1}{t^{1}},\frac{1}{t^{r}},t^{1},t^{2},\ldots,t^{r}$.
###### Proof.
Similar to the proof of theorem 3.3, we use thoerem 2.7 under the hypothesis
of theorem 3.4.
∎
We emphasis that Frobenius structures obtained by theorems 3.3 and 3.5 fall
into Dubrovin’s method since they are obtained using the same intersection
form $\O_{2}$.
Let $K$ be the type of ${\mathcal{W}}$, then we say a Frobenius structure is
of type $K$ (rep. of type $\widetilde{K}$) if it isomorphic to a Frobenius
manifold constructed on $\mathcal{O}(\rho_{ref})$ by theorem 3.1 (resp.
theorem 3.3).
###### Example 3.6.
We list in table 2 all Frobenius structures constructed on
$\mathcal{O}(\rho_{ref})$ when ${\mathcal{W}}$ is of rank 3 using the above
theorems. We borrow the potentials of Frobenius structures of type $A_{3}$,
$B_{3}$ and $H_{3}$ from [6]. From these potentials, we find Frobenius
structures of type $\widetilde{A}_{3}$, $\widetilde{B}_{3}$ and
$\widetilde{H}_{3}$ using the formula (2.14). Then applying theorem 3.4 with
Coxeter group of type $B_{3}$, we get a Frobenius manifold of type $B_{3}$
(resp. $A_{3}$) when $k=3$ (resp. $k=2$). For $k=1$, we get a rational
Frobenius manifold $B_{3}^{1}$ which has no dual, i.e., the potential can not
have the form (2.11).
Notations | $\mathbb{F}(t_{1},t_{2},t_{3})$ | $d_{1},d_{2},d_{3}$ | d
---|---|---|---
$A_{3}$ | $\frac{1}{2}t_{3}^{2}t_{1}+\frac{1}{2}t_{2}^{2}t_{3}+\frac{1}{4}t_{1}^{2}t_{2}^{2}+\frac{1}{60}t_{1}^{5}$ | $\frac{1}{2},\frac{3}{4},1$ | $\frac{1}{2}$
$\widetilde{A}_{3}$ | $\frac{1}{2}t_{3}^{2}t_{1}+\frac{1}{2}t_{2}^{2}t_{3}+\frac{t_{2}^{4}}{8t_{1}}+\frac{t_{2}^{2}}{4t_{1}^{2}}-\frac{1}{60t_{1}^{3}}$ | $\frac{-1}{2},\frac{1}{4},1$ | $\frac{3}{2}$
$B_{3}$ | $\frac{1}{2}t_{3}^{2}t_{1}+\frac{1}{2}t_{2}^{2}t_{3}+\frac{1}{6}t_{2}^{2}t_{1}^{3}+\frac{1}{6}t_{2}^{3}t_{1}+\frac{1}{210}t_{1}^{7}$ | $\frac{1}{3},\frac{2}{3},1$ | $\frac{2}{3}$
$\widetilde{B}_{3}$ | $\frac{1}{2}t_{3}^{2}t_{1}+\frac{1}{2}t_{2}^{2}t_{3}+\frac{t_{2}^{4}}{8t_{1}}+\frac{t_{2}^{3}}{6t_{1}^{2}}-\frac{t_{2}^{2}}{6t_{1}^{3}}-\frac{1}{210t_{1}^{5}}$ | $\frac{-1}{3},\frac{1}{3},1$ | $\frac{4}{3}$
$H_{3}$ | $\frac{1}{2}t_{3}^{2}t_{1}+\frac{1}{2}t_{2}^{2}t_{3}+\frac{1}{20}t_{2}^{2}t_{1}^{5}+\frac{1}{6}t_{2}^{3}t_{1}^{2}+\frac{1}{3960}t_{1}^{11}$ | $\frac{1}{5},\frac{3}{5},1$ | $\frac{4}{5}$
$\widetilde{H}_{3}$ | $\frac{1}{2}t_{3}^{2}t_{1}+\frac{1}{2}t_{2}^{2}t_{3}+\frac{t_{2}^{4}}{8t_{1}}-\frac{t_{2}^{3}}{6t_{1}^{3}}-\frac{t_{2}^{2}}{20t_{1}^{5}}-\frac{1}{3960t_{1}^{9}}$ | $\frac{-1}{5},\frac{2}{5},1$ | $\frac{6}{5}$
$B_{3}^{1}$ | $\frac{1}{2}t_{3}^{4}+\frac{3}{2}t_{1}t_{2}t_{3}+\frac{1}{8}t_{1}^{3}+{1\over 16}\frac{t_{2}^{3}}{t_{3}}$ | $1,\frac{3}{4},\frac{5}{4}$ | $0$
Table 2: Frobenius manifolds on orbits of reflection groups of rank 3
### 3.2 Sign times reflection representation
We keep the notations of the last section and we assume ${\mathcal{W}}$ is of
type $A_{r}$. We study an irreducible representation $\rho_{new}$ of
${\mathcal{W}}$ which can be defined using the sign representation and the
representation $\rho_{ref}$. The definition will enable us to construct $r$
invariant polynomials of $\rho_{new}$. We will prove the invariant ring
$\mathbb{C}[\rho_{new}]$ is not a polynomial ring when $r>2$.
We consider the sign representation of ${\mathcal{W}}$,
$\rho_{sign}:{\mathcal{W}}\rightarrow\mathbb{C}^{*}$ defined by sending each
element $s\in S$ to $-1$. Then we define the representation $\rho_{new}$ of
${\mathcal{W}}$ by
$\rho_{new}:{\mathcal{W}}\rightarrow GL(\mathbb{C}\otimes
V),~{}~{}\rho_{new}(w)=\rho_{sign}(w)\otimes\rho_{ref}(w),~{}~{}\forall
w\in{\mathcal{W}}.$ (3.5)
The following proposition proves $\rho_{new}$ is an irreducible
representation. Note that $\rho_{new}$ is a real representation of rank $r$.
###### Proposition 3.7.
The new representation $\rho_{new}$ is an irreducible representation of
${\mathcal{W}}$. Moreover, $\rho_{new}$ and $\rho_{ref}$ are isomorphic when
$r=2$ and different otherwise.
###### Proof.
Recall that if $\chi_{\psi}$ denotes the character of a representation $\psi$
of a finite group $G$, then $\psi$ is irreducible if and only if [22]
$\frac{1}{|G|}\sum_{g\in G}\chi_{\psi}(g)\overline{\chi_{\psi}(g)}=1.$ (3.6)
Note that $\rho_{ref}$ and $\rho_{sign}$ are irreducible representations and
$\chi_{\rho_{new}}(w)=\chi_{\rho_{sign}}(w)\chi_{\rho_{ref}}(w)$. Then
$\displaystyle\frac{1}{|{\mathcal{W}}|}\sum_{w\in{\mathcal{W}}}\chi_{{\rho_{new}}}(w)\overline{\chi_{{\rho_{new}}}(w)}$
$\displaystyle=\frac{1}{|{\mathcal{W}}|}\sum_{w\in{\mathcal{W}}}(\chi_{\rho_{sign}}(w)\chi_{\rho_{ref}}(w))\overline{(\chi_{\rho_{sign}}(w)\chi_{\rho_{ref}}(w))}$
(3.7)
$\displaystyle=\frac{1}{|{\mathcal{W}}|}\sum_{w\in{\mathcal{W}}}(\chi_{\rho_{ref}}(w)\overline{\chi_{\rho_{ref}}(w)})=1.$
For the second part, note that for any generator $s\in S$,
$\chi_{{\rho_{new}}}(s)=-\chi_{{\rho_{ref}}}(s)=-(r-2)$. Hence, the two
representations are different when $r\neq 2$. When $r=2$, ${\mathcal{W}}$ is
of type $I_{2}(m)$ for some integer $m$. Let $s$ and $s^{\prime}$ be the two
generators of the group. Setting $\sigma=ss^{\prime}$, then elements of
${\mathcal{W}}$ are in the form $\sigma^{i}$ and $s\sigma^{i}$ for some
integer $i$. But then
$\chi_{\rho_{ref}}(s\sigma^{i})=\chi_{\rho_{new}}(s\sigma^{i})=0$, since
$\rho_{ref}(s\sigma^{i})$ is a reflection, and
$\chi_{\rho_{ref}}(\sigma^{i})=\chi_{\rho_{new}}(\sigma^{i})$ since
$\rho_{sign}(\sigma^{i})=1$. Thus, the two representation $\chi_{\rho_{new}}$
and $\chi_{\rho_{ref}}$ are isomorphic.
∎
The Coxeter group of type $A_{r}$ is isomorphic to the symmetric group
$S_{r+1}$. Thus, irreducible representations of $A_{r}$ are in one to one
correspondence with the partition of $r+1$. For a given partition $\lambda$ of
$r+1$, the corresponding irreducible representation can be constructed using
Young tableaux associated to $\lambda$ [11]. Under this construction, the
reflection representation $\rho_{ref}$ is associated with the partition
$[r,1]$, $\rho_{sign}$ is associated with the partition $[r+1]$ while
$\rho_{new}$ is associated with $[2,1,1,\ldots,1]$. The character of each
representation is given by Frobenius formula [11]. We use this formula to
prove the following proposition.
For the remainder of this section we assume the rank $r>2$.
###### Proposition 3.8.
The irreducible representation $\rho_{new}$ is not a reflection
representation. In particular the ring $\mathbb{C}[\rho_{new}]$ is not a
polynomial ring.
###### Proof.
Assume that $\rho_{new}$ is a reflection representation. Then, it is generated
by a set involutions $w_{1},\ldots,w_{r}$. Since $\rho_{new}$ is a real
representation, we must have $\chi_{\rho_{new}}(w_{i})=r-2$. From
$\rho_{new}(w_{i})=\rho_{sign}(w_{i})\rho_{ref}(w_{i})$,
$\rho_{sign}(w_{i})=-1$, since if $\rho_{sign}(w_{i})=1$, then
$\rho_{ref}(w_{i})$ is a reflection and we get a contradiction. Thus,
$\chi_{\rho_{ref}}(w_{i})=2-r$. In the one-to-one correspondence between
conjugacy classes of $S_{r+1}$ and partitions of $r+1$, $w_{i}$ corresponds to
a partition of the from $[2,2,\ldots,2,1,1\ldots,1]=[2^{p},1^{q}]$ with
$2p+q=r+1$, $p>0$. Using Frobenius formula, $\chi_{\rho_{ref}}(w_{i})$ equals
the coefficient of $x^{r+1}y$ in the expansion
$(x-y)(x^{2}+y^{2})^{p}(x+y)^{r+1-2p}$. Hence,
$\chi_{\rho_{ref}}(w_{i})=r-2p$. Using the fact that $2p\leq r+1$ and
$\chi_{\rho_{ref}}(w_{i})=2-r$ we get $r\leq 3$. However, the case $r=3$ is
excluded by direct computations. ∎
We study the ring $\mathbb{C}[\rho_{new}]$ in order to use Dubrovin’s method.
We fix a basis $e_{1},e_{2},\ldots,e_{r}$ for $V$ and let $x^{1},\ldots,x^{r}$
be the dual basis satisfying $x^{i}(e_{j})=\delta^{i}_{j}$. Then
$\tilde{e_{i}}:=\textbf{1}\otimes e_{i}$, $i=1,...,r$ form a basis of
$\mathbb{C}\otimes V$ and we get a natural isomorphism
$\theta:\mathbb{C}\otimes V\rightarrow V,\,\tilde{e_{i}}\mapsto e_{i}.$ (3.8)
Then the pullback $\tilde{x}^{i}=\theta^{*}(x^{i})$ defines the dual basis of
$\tilde{e}_{i}$. Let $w\in{\mathcal{W}}$ and $a_{i}^{j}$ be the matrix of
$\rho_{ref}(w)$ under the basis $e_{i}$. Then
$\rho_{new}(w)(\tilde{e_{i}})=\rho_{sign}(w)\textbf{1}\otimes\rho_{ref}(w)e_{i}=\rho_{sign}(w)a_{i}^{j}\
\tilde{e_{j}}$. Therefore, $\rho_{new}(w)=\rho_{sign}(w)\rho_{ref}(w)$.
###### Lemma 3.9.
Let $w\in{\mathcal{W}}$ with
$\rho_{sign}(w)\rho_{new}(w)\notin\rho_{ref}({\mathcal{W}})$ and
$f\in\mathbb{C}[\rho_{ref}]$ be homogeneous polynomial. Then
$w\cdot\theta^{*}(f)=(\rho_{sign}(w))^{deg(f)}\theta^{*}(f).$ (3.9)
In particular, if degree $f$ is even then
$\theta^{*}(f)\in\mathbb{C}[\rho_{new}]$.
###### Proof.
We obtain $\theta^{*}(f)$ simply by replacing the coordinate $x^{i}$ with
$\tilde{x}^{i}$. Therefore,
$\displaystyle
w.\theta^{*}(f)(\tilde{x}^{1},\tilde{x}^{2},\ldots,\tilde{x}^{n})$
$\displaystyle=\theta^{*}(f)(\rho_{new}(w)\tilde{x^{1}},\rho_{new}(w)\tilde{x^{2}},\ldots,\rho_{new}(w)\tilde{x^{n}})$
$\displaystyle=\theta^{*}(f)(\rho_{sign}(w)\rho_{ref}(w)\tilde{x^{1}},\rho_{sign}(w)\rho_{ref}(w)\tilde{x^{2}},\ldots,\rho_{sign}(w)\rho_{ref}(w)\tilde{x^{n}})$
$\displaystyle=(\rho_{sign}(w))^{deg(f)}\theta^{*}(f)(\tilde{x}^{1},\tilde{x}^{2},\ldots,\tilde{x}^{n}).$
∎
Let $z^{1},...,z^{r}$ be algebraically independent invariant polynomials of
$\rho_{new}$ and $u^{1},...,u^{r}$ be the generators of
$\mathbb{C}[\rho_{ref}]$ (in the notation of section 3.1). We assume
$z^{1}=\theta^{*}(u^{1})$. Hence, the Hessian of $z^{1}$ defines a
contravariant flat metric $\Omega_{2}$ on $\mathcal{O}(\rho_{new})$. Examples
show that the entries of $\Omega_{2}(z)$ are rational in general and it is
hard to construct flat pencil of metrics. We overcome this problem by defining
certain invariants for $\rho_{new}$ which also leads to the construction of
Frobenius structures.
###### Proposition 3.10.
There exist $r$ algebraically independent invariant polynomials
$z^{1},z^{2},\ldots,z^{r}$ of $\rho_{new}$ with the degrees
$\tilde{\eta_{1}},\ldots,\tilde{\eta_{r}}$ listed in table 3.
###### Proof.
We will use the invariants $u^{1},...,u^{r}$ of $\rho_{ref}$ to construct
invariants of $\rho_{new}$. We set $I=\\{i:\eta_{i}\mathrm{~{}is~{}even}\\}$
and $J=\\{j:\eta_{j}\mathrm{~{}is~{}odd}\\}$. Using lemma 3.9,
$\theta^{*}(u^{i})$ is an invariant of $\rho_{new}$ for any $i\in I$. Let
$\kappa$ be the minimal index in $J$. Then $\theta^{*}(u^{\kappa}u^{j})$ is an
invariant of $\rho_{new}$ for any $j\in J$. By this way we construct $r$
invariants polynomial, $z^{1},\ldots,z^{r}$ for $\rho_{new}$ with the degrees
given in table 3. Note that any polynomial in $z^{1},\ldots,z^{r}$ can be
written as a polynomial in $u^{1},\ldots,u^{r}$. Hence, $z^{1},\ldots,z^{r}$
are algebraically independent. ∎
###### Remark 3.11.
We observe that the invariant polynomials constructed by proposition 3.10 do
not necessarily form a set of primary invariant polynomials of $\rho_{new}$.
According to the invariant theory [3], the product of the degrees of primary
invariants is divisible by the order of the group. For example, when
${\mathcal{W}}$ is type $A_{4}$, the degrees of $z^{i}$ are $2,4,6,8$. The
product of these degrees is not divisible by the order 120 of the group.
Type of ${\mathcal{W}}$ | $\tilde{\eta_{1}},\ldots,\tilde{\eta_{r}}$
---|---
$A_{r}$ | $2,4,6,\ldots,2\lfloor\frac{r+1}{2}\rfloor;6,8,\ldots,2\lceil\frac{r+3}{2}\rceil$
Table 3: Degrees of invariant polynomials of $\rho_{new}$
We keep the notations $z^{1},...,z^{r}$ for the invariant polynomials of
$\rho_{new}$ constructed in proposition 3.10.
###### Theorem 3.12.
The orbits space $\mathcal{O}(\rho_{new})$ has the structure of Frobenius
manifolds isomorphic to Frobenius manifolds defined on
$\mathcal{O}(\rho_{ref})$ by theorem 3.1 and theorem 3.2.
###### Proof.
We consider the map $(u^{1},...,u^{r})\to(z^{1},z^{2},\ldots,z^{r})$ given in
proposition 3.10 as diffeomorphism on some open subset of $u^{\kappa}\neq 0$
where $\kappa$ is defined in proposition 3.10. Note that, under this
diffeomorphism, the metric defined by the Hessian of $u^{1}$ is identified
with the metric defined by the Hessian of $z^{1}$. Thus, we can transfer to
$\mathcal{O}(\rho_{new})$, any regular QFPM formed by $\Omega_{2}$ and
$\Omega_{1}$ given by the theorems 3.1 and 3.1. In this way we obtain s
Frobenius structures on $\mathcal{O}(\rho_{new})$. ∎
###### Example 3.13.
The irreducible reflection representation $\rho_{ref}$ of Coxeter group of
type $A_{4}$ is generated by the matrices
$\sigma=\begin{pmatrix}1&0&0&-1\\\ 0&1&0&-1\\\ 0&0&1&-1\\\
0&0&0&-1\end{pmatrix}\ \ and\ \ \tau=\begin{pmatrix}-1&1&0&0\\\ -1&0&1&0\\\
-1&0&0&1\\\ -1&0&0&0\end{pmatrix}$ (3.10)
The polynomial ring
$\mathbb{C}[\rho_{ref}]=\mathbb{C}[u_{1},u_{2},u_{3},u_{4}]$ where
$\displaystyle u_{1}$ $\displaystyle=$ $\displaystyle
x_{1}^{2}-\frac{1}{2}x_{1}x_{2}-\frac{1}{2}x_{1}x_{3}-\frac{1}{2}x_{1}x_{4}+x_{2}^{2}-\frac{1}{2}x_{2}x_{3}-\frac{1}{2}x_{2}x_{4}+x_{3}^{2}-\frac{1}{2}x_{3}x_{4}+x_{4}^{2},$
$\displaystyle u_{2}$ $\displaystyle=$ $\displaystyle
x_{1}^{3}-\frac{3}{4}x_{1}^{2}x_{2}-\frac{3}{4}x_{1}^{2}x_{3}-\frac{3}{4}x_{1}^{2}x_{4}-\frac{3}{4}x_{1}x_{2}^{2}+x_{1}x_{2}x_{3}+x_{1}x_{2}x_{4}-\frac{3}{4}x_{1}x_{3}^{2}+x_{1}x_{3}x_{4}-\frac{3}{4}x_{1}x_{4}^{2}+x_{2}^{3}-\frac{3}{4}x_{2}^{2}x_{3}$
$\displaystyle-\frac{3}{4}x_{2}^{2}x_{4}-\frac{3}{4}x_{2}x_{3}^{2}+x_{2}x_{3}x_{4}-\frac{3}{4}x_{2}x_{4}^{2}+x_{3}^{3}-\frac{3}{4}x_{3}^{2}x_{4}-\frac{3}{4}x_{3}x_{4}^{2}+x_{4}^{3},$
$\displaystyle u_{3}$ $\displaystyle=$ $\displaystyle
x_{1}^{4}-x_{1}^{3}x_{2}-x_{1}^{3}x_{3}-x_{1}^{3}x_{4}+x_{1}^{2}x_{2}x_{3}+x_{1}^{2}x_{2}x_{4}+x_{1}^{2}x_{3}x_{4}-x_{1}x_{2}^{3}+x_{1}x_{2}^{2}x_{3}+x_{1}x_{2}^{2}x_{4}+x_{1}x_{2}x_{3}^{2}-3x_{1}x_{2}x_{3}x_{4}$
$\displaystyle+x_{1}x_{2}x_{4}^{2}-x_{1}x_{3}^{3}+x_{1}x_{3}^{2}x_{4}+x_{1}x_{3}x_{4}^{2}-x_{1}x_{4}^{3}+x_{2}^{4}-x_{2}^{3}x_{3}-x_{2}^{3}x_{4}+x_{2}^{2}x_{3}x_{4}-x_{2}x_{3}^{3}+x_{2}x_{3}^{2}x_{4}+x_{2}x_{3}x_{4}^{2}$
$\displaystyle-
x_{2}x_{4}^{3}+x_{3}^{4}-x_{3}^{3}x_{4}-x_{3}x_{4}^{3}+x_{4}^{4},$
$\displaystyle u_{4}$ $\displaystyle=$ $\displaystyle
x_{1}^{5}-\frac{5}{4}x_{1}^{4}x_{2}-\frac{5}{4}x_{1}^{4}x_{3}-\frac{5}{4}x_{1}^{4}x_{4}+\frac{5}{3}x_{1}^{3}x_{2}x_{3}+\frac{5}{3}x_{1}^{3}x_{2}x_{4}+\frac{5}{3}x_{1}^{3}x_{3}x_{4}-\frac{5}{2}x_{1}^{2}x_{2}x_{3}x_{4}-\frac{5}{4}x_{1}x_{2}^{4}+\frac{5}{3}x_{1}x_{2}^{3}x_{3}$
$\displaystyle+\frac{5}{3}x_{1}x_{2}^{3}x_{4}-\frac{5}{2}x_{1}x_{2}^{2}x_{3}x_{4}+\frac{5}{3}x_{1}x_{2}x_{3}^{3}-\frac{5}{2}x_{1}x_{2}x_{3}^{2}x_{4}-\frac{5}{2}x_{1}x_{2}x_{3}x_{4}^{2}+\frac{5}{3}x_{1}x_{2}x_{4}^{3}-\frac{5}{4}x_{1}x_{3}^{4}+\frac{5}{3}x_{1}x_{3}^{3}x_{4}$
$\displaystyle+\frac{5}{3}x_{1}x_{3}x_{4}^{3}-\frac{5}{4}x_{1}x_{4}^{4}+x_{2}^{5}-\frac{5}{4}x_{2}^{4}x_{3}-\frac{5}{4}x_{2}^{4}x_{4}+\frac{5}{3}x_{2}^{3}x_{3}x_{4}-\frac{5}{4}x_{2}x_{3}^{4}+\frac{5}{3}x_{2}x_{3}^{3}x_{4}+\frac{5}{3}x_{2}x_{3}x_{4}^{3}-\frac{5}{4}x_{2}x_{4}^{4}+x_{3}^{5}$
$\displaystyle-\frac{5}{4}x_{3}^{4}x_{4}-\frac{5}{4}x_{3}x_{4}^{4}+x_{4}^{5}.$
The Frobenius manifold of type $A_{4}$ is a result of the regular QFPM
consists of $\Omega_{2}(u)$ and
$\Omega_{1}=\mathfrak{L}_{\partial_{u_{r}}}\Omega_{2}(u)$ where
$\Omega_{2}(u)$ is defined by the Hessian of $u_{1}$. The representation
$\rho_{new}$ is generated by $\tau$ and $-\sigma$. Then the primary invariants
of $\rho_{new}$ have degrees $2,4,6,10$ while the secondary invariants have
degrees $8,13,15$. The Hessian of the degree 2 invariant $z_{1}$ leads to the
flat contravariant metric $\Omega_{2}$ but it is hard to find a FPM. We fix
the following $4$ invariants polynomials for $\mathcal{O}(\rho_{new})$ of
degrees $2,4,6$ and $8$: ${z_{1}}=u_{1},\ \ {z_{2}}=u_{3},\ \
{z_{3}}=u_{2}^{2},\ \ z_{4}=u_{2}u_{4}$. Then the matrix of $\Omega_{2}(z)$
consists of the columns
${\Omega_{2}^{i1}(z)}=\begin{pmatrix}z_{1}\\\ 2z_{2}\\\ 3z_{3}\\\
4z_{4}\end{pmatrix},\ \ {\Omega_{2}^{i2}(z)}=\begin{pmatrix}2z_{2}\\\
-\frac{64}{625}z_{1}^{3}+\frac{68}{25}z_{1}z_{2}+\frac{864}{625}z_{3}\\\
\frac{12}{5}z_{1}z_{3}+\frac{18}{5}z_{4}\\\
\frac{64}{75}z_{1}^{2}z_{3}+\frac{43}{15}z_{2}z_{3}+\frac{62}{25}z_{1}z_{4}+\frac{9}{5}\frac{z_{4}^{2}}{z_{3}}\end{pmatrix},\
\ $ ${\Omega_{2}^{i3}(z)}=\begin{pmatrix}3z_{3}\\\
\frac{12}{5}z_{1}z_{3}+\frac{18}{5}z_{4}\\\
\frac{2}{3}z_{1}^{2}z_{3}+\frac{25}{3}z_{2}z_{3}\\\
-\frac{26}{45}z_{1}^{3}z_{3}+\frac{95}{18}z_{1}z_{2}z_{3}+\frac{14}{5}z_{3}^{2}+\frac{1}{3}z_{1}^{2}z_{4}+\frac{25}{6}z_{2}z_{4}\end{pmatrix}$
and
${\Omega_{2}^{i4}(z)}=\begin{pmatrix}4z_{4}\\\
\frac{64}{75}z_{1}^{2}z_{3}+\frac{43}{15}z_{2}z_{3}+\frac{62}{25}z_{1}z_{4}+\frac{9}{5}\frac{z_{4}^{2}}{z_{3}}\\\
-\frac{26}{45}z_{1}^{3}z_{3}+\frac{95}{18}z_{1}z_{2}z_{3}+\frac{14}{5}z_{3}^{2}+\frac{1}{3}z_{1}^{2}z_{4}+\frac{25}{6}z_{2}z_{4}\\\
\frac{214}{2025}z_{1}^{4}z_{3}+\frac{52}{81}z_{1}^{2}z_{2}z_{3}+\frac{625}{324}z_{2}^{2}z_{3}+\frac{56}{25}z_{1}z_{3}^{2}-\frac{26}{45}z_{1}^{3}z_{4}+\frac{95}{18}z_{1}z_{2}z_{4}+\frac{62}{15}z_{3}z_{4}+\frac{1}{z_{3}}\frac{z_{1}^{2}z_{4}^{2}}{z_{3}}+\frac{25}{12}\frac{z_{2}z_{4}^{2}}{z_{3}}\end{pmatrix}$
Therefore, on $\mathcal{O}(\rho_{new})$, we get the regular QFPM formed by
$\Omega_{2}(z)$ and ${\Omega}_{1}(z)=\mathfrak{L}_{e}{\Omega_{2}}$ where
$e=\sqrt{z_{3}}\partial_{z_{4}}$. Of course, the resulted Frobenius manifold
is of type $A_{4}$.
###### Remark 3.14.
It is straightforward to generalized the results of this section to other
types of Coxeter groups and we obtain Frobenius manifolds on
$\mathcal{O}(\rho_{new})$. But we lack sorting when $\rho_{new}$ is not a
reflections group (i.e. see proposition 3.8). Robert Howett informed us that
when ${\mathcal{W}}$ is of type $E_{8}$, the representation $\rho_{new}$ is
generated by reflections.
## 4 Dihedral and dicyclic groups
### 4.1 Dihedral groups
In this section we apply Dubrovin’s method to irreducible representations of
the dihedral groups (Coxeter groups of type) $I_{2}(m)$, $m>2$.
Irreducible representations of $I_{2}(m)$ are of rank 1 or 2. Let $\xi_{m}$ be
a primitive $m$-th root of unity. The rank 2 representations are $\rho_{k}$,
$k=1,2,\ldots,\frac{m-2}{2}$ for even $m$, and $k=1,2,\ldots,\frac{m-1}{2}$
for odd $m$. Here, $\rho_{k}$ is generated by the matrices
$\ \begin{pmatrix}\xi_{m}^{k}&0\\\
0&\xi_{m}^{-k}\end{pmatrix},~{}\begin{pmatrix}0&1\\\ 1&0\end{pmatrix}.$ (4.1)
When $k=1$, we get the standard reflection representation of $I_{2}(m)$. It is
straightforward to show that $\mathbb{C}[\rho_{k}]$ is the same as the
invariant ring of the standard reflection representation of $I_{2}(h)$,
$h=\frac{m}{\gcd(m,k)}$. Hence, applying Dubrovin’s method, we get the
polynomial Frobenius manifold of type $I_{2}(h)$ and its dual
$\widetilde{I}_{2}(h)$. More precisely, fix the generators of
$\mathbb{C}[\rho_{k}]$ to be
$t_{1}=\frac{1}{h}x_{1}x_{2},\ t_{2}=x_{1}^{h}+x_{2}^{h};$
we get Frobenius structures with the following data
Notations | $\mathbb{F}(t_{1},t_{2})$ | $d_{1},d_{2}$ | d
---|---|---|---
$I_{2}(h)$ | $\frac{1}{2}t_{1}t_{2}^{2}+\frac{h^{1+h}}{h^{2}-1}t_{1}^{1+h}$ | $\frac{2}{h},1$ | $\frac{h-2}{h}$
$\widetilde{I}_{2}(h)$ | $\frac{1}{2}t_{1}t_{2}^{2}+\frac{(-1)^{-h}h^{1+h}}{h^{2}-1}t_{1}^{1-h}$ | $-\frac{2}{h},1$ | $\frac{h+2}{2}$
Table 4: Frobenius manifolds on orbit space of $\rho_{k}$.
### 4.2 Dicyclic groups
In this section we give results of applying Dubrovin’s method to all
irreducible representation of dicyclic groups. We get a Frobenius structure
with rational degrees.
We fix a natural number $m$. The dicyclic group $\mathrm{Dic}_{m}$ is a group
of order $4m$ defined by
$\mathrm{Dic}_{m}=\langle\sigma,\alpha|\sigma^{2m}=1,\alpha^{2}=\sigma^{m},\alpha^{-1}\sigma\alpha=\sigma^{-1}\rangle.$
(4.2)
The irreducible representation of $\mathrm{Dic}_{m}$ are of rank 1 or 2. The
2-dimensional irreducible representations are
$\psi_{k}(\sigma)=\left(\begin{array}[]{cc}\xi_{2m}^{k}&0\\\
0&\xi_{2m}^{-k}\end{array}\right),~{}\psi_{k}(\alpha)=\left(\begin{array}[]{cc}0&1\\\
-1&0\end{array}\right),$ (4.3)
and
$\varrho_{l}(\sigma)=\left(\begin{array}[]{cc}\xi_{m}^{k}&0\\\
0&\xi_{m}^{-k}\end{array}\right),~{}\varrho_{l}(\alpha)=\left(\begin{array}[]{cc}0&1\\\
1&0\end{array}\right).$ (4.4)
Where $1\leq k\leq\frac{m-2}{2}$ and $1\leq l\leq m-1$ when $m$ is even while
$1\leq k\leq\frac{m-1}{2}$ and $1\leq l\leq m-2$ when $m$ is odd. Then
$\psi_{1}$ is the standard representation of $\mathrm{Dic}_{m}$.
The invariant ring $\mathbb{C}[\varrho_{l}]$ is the same as
$\mathbb{C}[\rho_{l}]$ where $\rho_{l}$ is the representation of $I_{2}(m)$ in
section 4.1. Thus, the result of applying Dubrovin’s method to $\varrho_{l}$
is given in that section. We consider here the representations $\psi_{k}$. Let
us fix the integer $k$ and set $h={m\over\gcd(m,k)}$. We define
$u_{1}=x_{1}^{2}x_{2}^{2},~{}u_{2}=x_{1}^{2h}+x_{2}^{2h},~{}u_{3}=x_{1}x_{2}(x_{1}^{2h}-x_{2}^{2h}).$
(4.5)
It is straightforward to verify that $u_{1}$, $u_{2}$ and $u_{3}$ are
invariants under the action of $\psi_{k}$.
###### Proposition 4.1.
The invariant ring $\mathbb{C}[\psi_{k}]$ is generated by $u_{1},u_{2}$ and
$u_{3}$.
###### Proof.
A general homogeneous polynomial of degree $q$ have the form
$f(x_{1},x_{2})=a_{q}x_{1}^{q}+a_{q-1}x_{1}^{q-1}x_{2}+\cdots+a_{1}x_{1}x_{2}^{q-1}+a_{0}x_{2}^{q}$
(4.6)
where $a_{0},\cdots,a_{q}\in\mathbb{C}$. Being invariant under
$\psi_{k}(\alpha)$, we get
$\displaystyle f$
$\displaystyle=a_{q}x_{1}^{q}+a_{q-1}x_{1}^{q-1}x_{2}+\cdots+a_{1}x_{1}x_{2}^{q-1}+a_{0}x_{2}^{q}$
$\displaystyle=\psi_{k}(\alpha)f$
$\displaystyle=(-1)^{q}a_{q}x_{2}^{q}+(-1)^{q-1}a_{q-1}x_{2}^{q-1}x_{1}+\cdots-
a_{1}x_{2}x_{1}^{q-1}+a_{0}x_{1}^{q}$
Thus $a_{i}=(-1)^{q-i}a_{q-i}$ for all $i=0,\cdots,q$. Similarly, the
invariants of $f$ under $\psi_{k}(\alpha^{2})$ implies $q$ is even. Hence, $f$
has the form
$\displaystyle f$
$\displaystyle=\sum_{i=0}^{\frac{q}{2}}a_{q-i}(x_{1}x_{2})^{i}[x_{1}^{q-2i}+(-1)^{q-i}x_{2}^{q-2i}].$
Moreover,
$\displaystyle f$
$\displaystyle=\psi_{k}(\sigma)f=\sum_{i=0}^{\frac{q}{2}}a_{q-i}(x_{1}x_{2})^{i}[\xi^{-k(q-2i)}x_{1}^{q-2i}+(-1)^{q-i}\xi^{k(q-2i)}x_{2}^{q-2i}]$
implies $k(q-2i)=0\mod(2m)$. Then $q-2i=2hl$ for some integer $l$. Therefore,
we can write
$f=\sum_{q=2hl+2i}a_{q-i}(x_{1}x_{2})^{i}[x_{1}^{2hl}+(-1)^{q-i}x_{2}^{2hl}].$
(4.7)
Now we show that $f\in\mathbb{C}[u_{1},u_{2},u_{3}]$. Taking $i$ even or odd,
it is sufficient to prove $\widetilde{f}_{l}=x_{1}^{2hl}+x_{2}^{2hl}$ and
$\widehat{f}_{l}=x_{1}x_{2}(x_{1}^{2hl}-x_{2}^{2hl})$ are invariant for every
natural number $l$. When $l=1$, $\widetilde{f}_{l}=u_{2}$ and
$\widehat{f}_{l}=u_{3}$. For $l+1$, we get
$\displaystyle\widetilde{f}_{l+1}$
$\displaystyle=x_{1}^{2h(l+1)}+x_{2}^{2h(l+1)}=(x_{1}^{2h}+x_{2}^{2h})^{l+1}-\displaystyle{\sum_{d=1}^{l}}\left({}^{l+1}_{\
\ d}\right)x_{1}^{2hd}x_{2}^{(l+1-d)2h}$ (4.8)
$\displaystyle=(x_{1}^{2h}+x_{2}^{2h})^{l+1}-\displaystyle{\sum_{d=1}^{\lfloor\frac{l}{2}\rfloor}}\left({}^{l+1}_{\
\ d}\right)(x_{1}x_{2})^{2hd}(x_{2}^{2h(l+1-2d)}+x_{1}^{2h(l+1-2d)}).$
Since $d\geq 1$, we have $l+1-2d\leq l-1<l$. Therefore, by the induction
$\widetilde{f}_{l+1}\in\mathbb{C}[u_{1},u_{2},u_{3}]$. Likewise
$\widehat{f}_{l+1}\in\mathbb{C}[u_{1},u_{2},u_{3}]$ since
$\displaystyle\widehat{f}_{l+1}$
$\displaystyle=x_{1}x_{2}(x_{1}^{2h}-x_{2}^{2h})(x_{1}^{2hl}+x_{1}^{2h(l-1)}x_{2}^{2h}+x_{1}^{2h(l-2)}x_{2}^{4h}+\ldots+x_{2}^{2hl})$
(4.9)
$\displaystyle=x_{1}x_{2}(x_{1}^{2h}-x_{2}^{2h})[(x_{1}^{2hl}+x_{2}^{2hl})+(x_{1}x_{2})^{2h}(x_{1}^{2h(l-2)}+x_{2}^{2h(l-2)})+(x_{1}x_{2})^{4h}(x_{1}^{2h(l-4)}+x_{2}^{2h(l-4)})+\ldots].$
This proves the proposition. ∎
We note that the invariant ring $\mathbb{C}[\psi_{k}]$ is the same as the
invariant ring of the standard representation of $\mathrm{Dic}_{h}$. A result
of applying Dubrovin’s method is obtained in [2]. We summarize the
construction here.
The inverse of the Hessian of $u_{1}$ define a flat contravariant metric
$\Omega_{2}(u)=\left(\begin{array}[]{cc}\frac{4}{3}u_{1}&\frac{2h}{3}u_{2}\\\
\frac{2h}{3}u_{2}&-\frac{2h^{2}}{3u_{1}}(u_{2}^{2}-6u_{1}^{h})\end{array}\right)$
(4.10)
Then it turns out that for any vector field in the form
$e=f(u_{1})\partial_{u_{2}}$ the Lie derivative
$\Omega_{1}^{ij}(u):=\mathfrak{L}_{e}\Omega^{ij}_{2}(u)$ is flat. Here
$\Omega_{1}(u)=\left(\begin{array}[]{cc}0&\frac{2}{3}\left(hf-2u_{1}f^{\prime}\right)\\\
\frac{2}{3}\left(hf-2u_{1}f^{\prime}\right)&-\frac{4}{3u_{1}}\left(h^{2}u_{2}f+ht_{1}u_{2}f^{\prime}\right)\end{array}\right)$
(4.11)
The choice of $e$ was inspired by example 3.13. The two metrics $\Omega_{2}$
and $\Omega_{1}$ form a flat pencil of metrics. However, to be
quasihomogenous, we must have $\mathfrak{L}_{e}\Omega^{ij}_{1}(u)=0$ which
leads to the following differential equation
$2hu_{1}ff^{\prime}-2u_{1}^{2}(f^{\prime})^{2}+h^{2}f^{2}=0$ (4.12)
which has two independent solutions
$f_{\pm}=u_{1}^{\frac{h}{2}\left(1\pm\sqrt{3}\right)}.$ (4.13)
Let us take
$e=f_{+}\partial_{u_{2}}=u_{1}^{\frac{h}{2}\left(1+\sqrt{3}\right)}\partial_{u_{2}}$.
In this case,
$\Omega_{1}(u)=\left(\begin{array}[]{cc}0&-\frac{2h}{\sqrt{3}}u_{1}^{\frac{1}{2}\left(1+\sqrt{3}\right)h}\\\
-\frac{2h}{\sqrt{3}}u_{1}^{\frac{1}{2}\left(1+\sqrt{3}\right)h}&-\frac{2}{3}\left(3+\sqrt{3}\right)h^{2}u_{1}^{\frac{1}{2}\left(1+\sqrt{3}\right)h-1}u_{2}\end{array}\right)$
(4.14)
The two metrics $\Omega_{2}$ and $\Omega_{1}$ form a regular QFPM with charge
$d=\frac{2+\sqrt{3}h}{\sqrt{3}h}.$ Then $\tau=-{\sqrt{3}\over 2h}u_{1}$ and
the Euler vector field
$E=-\frac{2}{\sqrt{3}h}u_{1}\partial_{u_{1}}-\frac{1}{\sqrt{3}}u_{2}\partial_{u_{2}}.$
(4.15)
The flat coordinates of $\Omega_{1}$ reads
$t_{1}=-\frac{\sqrt{3}}{2h}u_{1},~{}~{}t_{2}=u_{2}u_{1}^{-\frac{1}{2}\left(1+\sqrt{3}\right)h}.$
(4.16)
The degrees of this Frobenius manifold are $-\frac{2}{\sqrt{3}n}$ and 1. We
denote the type of this manifold by $\widetilde{Dic}_{m}$. It has the
potential
${\mathbb{F}}=\frac{2^{-\sqrt{3}h}3^{\frac{1}{2}\left(\sqrt{3}h+1\right)}\left(-ht_{1}\right){}^{1-\sqrt{3}h}}{3h^{2}-1}+\frac{1}{2}t_{1}t_{2}^{2}.$
(4.17)
Using theorem 2.6, the dual of $\widetilde{Dic}_{m}$ exists and we refer to it
by ${Dic}_{m}$. It can be obtained equivalently by fixing
$e=f_{-}\partial_{u^{2}}=u_{1}^{\frac{j}{2}\left(1-\sqrt{3}\right)}\partial_{u_{2}}$
in the computations above. It has the charge
$d=\frac{2-\sqrt{3}h}{\sqrt{3}h}$, the degrees $\frac{2}{\sqrt{3}n},\,1$ and
the potential
$\mathbb{F}=\frac{2^{\sqrt{3}h}3^{\frac{1}{2}-\frac{\sqrt{3}h}{2}}\left(ht_{1}\right){}^{\sqrt{3}h+1}}{3h^{2}-1}+\frac{1}{2}t_{1}t_{2}^{2}.$
(4.18)
We observe that Dubrovin computed by ad hoc procedure all possible potentials
of 2-dimensional Frobenius manifolds [5]. The potentials found in this article
are equivalent to Frobenius manifolds of charge $d$ having the potential
$\mathbb{F}(z_{1},z_{2})=z_{1}^{k}+\frac{1}{2}z_{2}^{2}z_{1},~{}k={3-d\over
1-d}$ (4.19)
However, finding them by using Dubrovin’s method on invariant rings is an
interesting result.
### 4.3 Finite subgroups of $SL_{2}(\mathbb{C})$
In this section we use Dubrovin’s method on finite non trivial subgroups of
$SL_{2}(\mathbb{C})$. They are classified up to conjugation and they are
called binary polyhedral groups. They consist of the cyclic groups
$\mathcal{C}_{m}$ and binary dihedral groups $\mathcal{D}_{m}$, binary
tetrahedral group $\mathcal{T}$, binary octahedral group $\mathcal{O}$ and
binary icosahedral group $\mathcal{I}$. We treat them as representations of
the corresponding groups. It is known that the invariant rings of these
representations are not polynomial rings and the relations between the
generators lead to the classification of simple hypersurface singularities. We
use the sets of generators of the invariant rings listed in [15]. Applying
Dubrovin’s method, we obtain polynomial Frobenius manifolds. We know from
section 3.1 that all of them has a dual rational Frobenius manifold. Thus, we
write below only the flat coordinates and the type of the resulting Frobenius
structure. Note that the results are not apparent by just examining the
invariant rings.
1. 1.
Cyclic groups $\mathcal{C}_{m}$: Here $m\geq 2$ and the invarinat ring is
generated by $xy,~{}x^{m},~{}y^{m}$. We fix the following invariant
polynomials
$t_{1}=\frac{1}{m}xy,\ t_{2}=x^{m}+y^{m}$
Then the ring generated by $t_{1}$ and $t_{2}$ is isomorphic to the invariant
ring of the standard representation of the dihedral group $I_{2}(m)$. Thus,
using Dubrovin’s method and $(t_{1},t_{2})$ as coordinates on the orbits
space, we get Frobenius manifold of type $I_{2}(m)$ and its dual.
For the case of $t_{1}=\frac{1}{m}xy$ and $t_{2}=x^{m}$ then the Frobenius
structure takes $\frac{1}{2}t_{1}t_{2}^{2}$ of charge $\frac{m-2}{m}$ and
degrees $\frac{2}{m},1$. While by the change of coordinates $s_{1}=-t_{1},\
s_{2}=t_{2}t_{1}^{-w}$ the dual structure takes the form
$\frac{1}{2}s_{1}s_{2}^{2}$.
2. 2.
The binary dihedral group $\mathcal{D}_{m}$: This is the standard
representation of the dicyclic group $\mathrm{Dic}_{m}$. A result of applying
Dubrovin’s method is given in section 4.2.
3. 3.
The binary tetrahedral $\mathcal{T}$: We fix the following set of generators
of the invariant ring
$t_{1}={5\over 12}xy\left(x^{4}-y^{4}\right),\ \
t_{2}=\left(x^{4}+y^{4}\right)^{3}-36x^{4}y^{4}\left(x^{4}+y^{4}\right),\ \
t_{3}=16x^{4}y^{4}+2\left(x^{4}-y^{4}\right).$ (4.20)
We choose $(t_{1},t_{2})$ as coordinates on the orbits space. Then the Hessian
of ${12\over 5}t_{1}$ defines a flat metric $\Omega_{2}(t)$ linear in $t_{2}$.
Here, lemma 2.4 is applicable and we get a regular QFPM of charge
$d=\frac{1}{2}$ with $\tau=t_{1}$ consists of
$\Omega_{2}^{ij}(t)=\left(\begin{array}[]{cc}\frac{1}{2}t_{1}&t_{2}\\\
t_{2}&\frac{-4478976}{625}t_{1}^{3}\\\
\end{array}\right),\Omega_{1}^{ij}=\mathfrak{L}_{\partial_{t_{2}}}\Omega_{2}^{ij}(t)=\left(\begin{array}[]{cc}0&1\\\
1&0\\\ \end{array}\right)$ (4.21)
The resulting Frobenius manifold is of type $I_{2}(4)$.
4. 4.
The binary octahedral $\mathcal{O}$: Let us fix the generators
$t_{1}={7\over 12}(16x^{4}y^{4}+\left(x^{4}-y^{4}\right)^{2}),\ \
t_{2}=\left(xy\left(x^{4}-y^{4}\right)\right)^{2},\ \
t_{3}=yx^{17}-34y^{5}x^{13}+34y^{13}x^{5}-y^{17}x$ (4.22)
In the coordinates $(t_{1},t_{2})$, the metric $\Omega_{2}(t)$ defined by the
Hessian of ${12\over 7}t_{1}$ is linear in $t_{2}$ and leads to a regular QFPM
with charge $\frac{1}{3}$. The resulting Frobenius manifold is of type
$I_{2}(3)$.
5. 5.
The binary icosahedral $\mathcal{I}$: We fix the generators of the invariant
ring
$\displaystyle t_{1}$ $\displaystyle={11\over
30}(x^{11}y+11x^{6}y^{6}-xy^{11}),\ \
t_{3}=x^{20}-228x^{15}y^{5}+494x^{10}y^{10}+228x^{5}y^{15}+y^{20}$ (4.23)
$\displaystyle t_{2}$
$\displaystyle=x^{30}+522x^{25}y^{5}-10005x^{20}y^{10}-10005x^{10}y^{20}-522x^{5}y^{25}+y^{30}$
Fix $(t_{1},t_{2})$ as coordinates, the Hessian of ${30\over 11}t_{1}$ leads
to a metric $\Omega_{2}(t)$ linear in $t_{2}$. The regular QFPM formed by
$\Omega_{2}$ and $\Omega_{1}=\partial_{t_{2}}\Omega_{2}$ leads to a Frobenius
manifold of type $I_{2}(5)$.
## 5 Finite subgroups of $SL_{3}(\mathbb{C})$
Finite subgroups of $SL(3,\mathbb{C})$ are classified into the families
$(\mathcal{A})$, $(\mathcal{B})$, …, $(\textbf{L})$ [24]. We treat them as
representation of the corresponding groups. The fact that they are subset of
$SL_{3}(2,\mathbb{C})$ means that they are not a reflection representation.
Watanabe and Rotillon listed in [23] those subgroups where the invariant rings
are complete intersections missing type $(\mathcal{J})$ and $(\mathcal{K})$.
These missing groups were recognized by Yau and Yu [24]. In the end, there is
a total of 29 types of finite subgroups of $SL_{3}(\mathbb{C})$ whose
invariant rings are complete intersection and their sets of generators are
known explicitly. We apply Dubrovin’s method to these groups and we summarize
the result below. The set of generators is taken from [23] and we use the same
numbering $(1)$, $(2)$, …, $(27)$ of the 27 subgroups listed there.
Recall from the introduction that in order to apply Dubrovin’s method, we must
find
a minimal degree invariant polynomial where the Hessian defines a flat
contravariant metric. (5.1)
This condition excluded the following subgroups
1. 1.
$(17)$ which are of type $(\mathcal{A})$.
2. 2.
$(3)-(8)$, $(19)-(23)$ which are of type $(\mathcal{B})$.
3. 3.
$(10)$, $(24)$ and $(25)$ which are of type $(\mathcal{C})$.
4. 4.
$(13)$, $(15)$, $(16)$ and $(27)$ which are of types $(\mathcal{G})$,
$(\textbf{L})$, $(\textbf{I})$ and $(\textbf{ E})$, respectively.
5. 5.
The groups $(\mathcal{J})$ and $(\mathcal{K})$ which are not considered in
[23].
Applying Dubrovin’s method to the remaining subgroups, we will find Frobenius
structures of types $A_{3}$, $B_{3}$, $H_{3}$, $B_{3}^{1}$ (see example 3.6 )
and the trivial $T_{3}$ (see example 2.8). We know from section 3.1 that once
an orbit space has Frobenius structure of type $A_{3}$, $B_{3}$ or $H_{3}$
then it also possesses the dual of that structure. Thus we will not mention
explicitly the appearance of the dual structures $\widetilde{A}_{3}$,
$\widetilde{B}_{3}$ and $\widetilde{H}_{3}$. In all cases below, we construct
the regular QFPM using lemma 2.4. However, sometimes we fix a set of invariant
polynomials different from the standard set of generators of the invariant
ring. In each case, we will mention the type of the resulting Frobenius
structure and its flat coordinates.
1. $(1)$
These groups are of type $(\mathcal{A})$ depending on an integer $m>1$. A
minimal set of generators of the invariant rings consists of
$x^{m},y^{m},z^{m},xyz$. The Hessian of $xyz$ does not define a flat metric.
Hence, condition (5.1) exclude the case $m>3$.
For $m=2$, we fix the invariant polynomials
$u_{1}=x^{2}+y^{2}+z^{2},\ u_{2}=x^{2}y^{2}+z^{2}y^{2}+x^{2}z^{2},\
u_{3}=(xyz)^{2}.$ (5.2)
Then $\\{u_{1},u_{2},u_{3}\\}$ can be identified with the set of generators of
the invariant ring of the standard representations of Coxeter groups of type
$B_{3}$. Thus, applying Dubrovin’s method, we get 5 Frobenius structures of
the types listed in example 3.6.
We also get the trivial Frobenius structure of type $T_{3}$ using the setting
of the case (2) below. Thus we proved that the orbit spaces of this group has
6 different Frobenius structures.
For $m=3$, we fix the invariant polynomials
$u_{1}=x^{3}+y^{3}+z^{3},\ u_{2}=x^{3}y^{3}+y^{3}z^{3}+z^{3}x^{3},\
u_{3}=(xyz)^{3}.$ (5.3)
The Hessian of $u_{1}$ defines a contravariant flat metric $\Omega_{2}$. This
metric and its Christoffel symbols are almost linear in each variable $u_{i}$
and lemma 2.4 is applicable and we get three regular QFPM.
Here, similar to the case $m=2$, we get 5 Frobenius manifold structures
equivalence to the ones given in example 3.6. For QFPM formed by $\Omega_{2}$
and $\mathfrak{L}_{\partial_{u_{3}}}\Omega_{2}$, we get the type $B_{3}$. It
has flat coordinates
$t_{1}=\frac{2}{9}u_{1},\ t_{2}=-\frac{u_{1}^{2}-4u_{2}}{6\sqrt{2}},\
t_{3}=\frac{7u_{1}^{3}}{216}-\frac{1}{6}u_{2}u_{1}+u_{3}.$ (5.4)
The FPM consists of $\Omega_{2}$ and
$\mathfrak{L}_{\partial_{u_{2}}}\Omega_{2}$ leads to type $A_{3}$. It has flat
coordinates
$t_{1}={1\over 3}u_{1},\ t_{2}=u_{2}-{1\over 8}u_{1}^{2},\
t_{3}=\sqrt{u_{3}}.$ (5.5)
While for the FPM formed by $\Omega_{2}$ and
$\mathfrak{L}_{\partial_{u_{1}}}\Omega_{2}$, we get the type $B_{3}^{1}$. We
can fix the flat coordinates
$t_{1}=u_{1},\ t_{2}=u_{2}u_{3}^{-{1\over 4}},t_{3}={4\over 3}u_{3}^{1\over
4}.$ (5.6)
2. $(2)$
These are family of groups of type $(\mathcal{B})$ where $m\geq 1$. The
polynomials $x^{2m}+y^{2m},\ (xy)^{2}$, $xyz\left(x^{2m}-y^{2m}\right)$ and
$z^{2}$ form a minimal sets of generators for the invariant rings. However,
because of condition (5.1), we need only to consider $m=1$. In this case, we
fix the invariant polynomials
$u_{1}=x^{2}+y^{2}+z^{2},u_{2}=z^{2},u_{3}=x^{2}y^{2}$
The metric $\Omega_{2}(u)$ defined by the Hessian of $u_{1}$ and its
Christoffel symbols are linear in each variable $u_{i}$. However, lemma 2.4 is
applicable only for $u_{2}$. The FPM consisting of $\Omega_{2}$ and
$\Omega_{1}:=\mathfrak{L}_{\partial_{u_{2}}}\Omega_{2}$ is a regular
quasihomogenous of charge 0 with $\tau=u_{1}$. We can fix the flat coordinates
to be
$t_{1}={1\over 2}u_{1},\ t_{2}=u_{2},\ t_{3}=u_{3}^{1\over 2}$ (5.7)
which leads to a trivial Frobenius structure $T_{3}$.
3. $(9)$
These groups are of type $(\mathcal{C})$ with order $3m^{2}$ where $m>1$.
Minimal sets of generators of the invariant rings consists of
$xyz,x^{m}+y^{m}+z^{m},x^{m}y^{m}+x^{m}z^{m}+y^{m}z^{m}$, and
$(x^{m}-y^{m})(z^{m}-x^{m})(y^{m}-z^{m})$. The argument of applying Dubrovin’s
method is the same as of type $(1)$ above.
4. $(11)$
These groups are also of type $(\mathcal{C})$ where $m>1$. Minimal sets of
generators of the invariant rings consists of
$u_{1}=x^{m}+y^{m}+z^{m},\ u_{2}=x^{2}y^{2}z^{2},\
u_{3}=x^{m}y^{m}+y^{m}z^{m}+z^{m}x^{m}$ (5.8)
and
$u_{4}=xyz\left(x^{m}-y^{m}\right)\left(z^{m}-x^{m}\right)\left(y^{m}-z^{m}\right).$
(5.9)
Since the Hessian $u_{2}$ does not define a flat metric, we consider only
$2\leq m\leq 6$. The argument of applying Dubrovin’s method to the case $m=2$
is similar to (1).
For $3\leq m\leq 6$, the contravariant metric $\Omega^{ij}_{2}$ defined by the
Hessian of $u_{1}$ and its Christofel symbols are almost linear in $u_{1}$ and
$u_{3}$ and we can apply lemma 2.4 to both variables.
The FPM formed by $\Omega_{2}$ and
$\Omega_{1}:=\mathfrak{L}_{\partial_{u_{3}}}\Omega_{2}$ is regular
quasihomogeneous of degree $1\over 2$ with $\tau=u_{1}$. We can fix the flat
coordinates
$t_{1}={m-1\over 2m}u_{1},\ t_{2}=u_{2}^{m\over 4},\ t_{3}=u_{3}-{1\over
8}u_{1}^{2}.$ (5.10)
The resulting Frobenius structure is polynomial of type $A_{3}$.
Also, the FPM consists of $\Omega_{2}$ and
$\Omega_{1}:=\mathfrak{L}_{\partial_{u_{1}}}\Omega_{2}$ is regular
quasihomogeneous of degree $0$ with $\tau={m-1\over m}u_{1}$. We can fix the
flat coordinates
$t_{1}=u_{1},\ t_{2}=u_{2}^{m\over 8},\ t_{3}=u_{3}u_{2}^{-{m\over 8}}.$
(5.11)
The results Frobenius structure is of type $B_{3}^{1}$.
5. $(12)$
This is a group of type $(\mathcal{F})$. A minimal set of generators of the
invariant ring consists of
$u_{1}=(x^{3}+y^{3}+z^{3})^{2}-12(x^{3}y^{3}+y^{3}z^{3}+z^{3}x^{3}),u_{2}=(x^{3}-y^{3})(y^{3}-z^{3})(z^{3}-x^{3}),$
(5.12)
$u_{3}=(xyz)^{4}+216(xyz)^{3}(x^{3}+y^{3}+z^{3}),u_{4}=((x^{3}+y^{3}+z^{3})^{2}-18(xyz)^{2})^{2}.$
The FPM formed by $\Omega^{ij}_{2}$ and
$\Omega^{ij}_{1}:=\mathfrak{L}_{\partial_{u_{3}}}\Omega^{ij}_{2}$ is regular
quasihomogeneous of charge $d={1\over 2}$ with $\tau={5\over 12}u_{1}$. Flat
coordinates are given by
$t_{1}=\frac{5}{12}u_{1},\ t_{2}=10\sqrt{\frac{62}{41}}u_{2},\
t_{3}=u_{3}-\frac{847}{1312}u_{1}^{2}.$ (5.13)
The resulting Frobenius structure is of type $A_{3}$.
6. $(14)$
This is a group of type $(\mathcal{H})$ and it has a minimal set of generators
of the invariant ring consists of
$u_{1}=x^{2}+yz,\ \
u_{2}=8yzx^{4}-2y^{2}z^{2}x^{2}-\left(y^{5}+z^{5}\right)x+y^{3}z^{3},$
$u_{3}=y^{10}+6z^{5}y^{5}+20x^{2}z^{4}y^{4}-160x^{4}z^{3}y^{3}+320x^{6}z^{2}y^{2}+z^{10}-4x\left(y^{5}+z^{5}\right)\left(32x^{4}-20yzx^{2}+5y^{2}z^{2}\right).$
The Hessian of $10u_{1}$ leads to a regular QFPM with $\Omega_{2}$ and
$\Omega_{1}=\partial_{u_{3}}\Omega_{2}$ of charge $d={4\over 5}$ with
$\tau={1\over 10}u_{1}$. By fixing the flat coordinates
$t_{1}=\frac{1}{10}u_{1},\ t_{2}=\sqrt{2}u_{2}-\sqrt{2}u_{1}^{3},\
t_{3}=14u_{1}^{5}-20u_{2}u_{1}^{2}+u_{3},$
we arrive to a polynomial Frobenius structure of type $H_{3}$.
7. $(18)$
A family of representation of type $(\mathcal{B})$ of order $8pq^{2}$ where
$p\geq 1$ and $q\geq 2$. The minimal set of generators of the invariant rings
consists of
$(x^{2pq}+y^{2pq}),(xy)^{2q},(xyz)^{2},(x^{2pq}-y^{2pq})xyz,z^{2q}$. The
Hessian of $(xyz)^{2}$ does not define a flat metric. Hence, because of
condition (5.1), we consider only two cases when $q=2$ or $q=3$ with $p=1$. In
both cases we get 3 types of Frobenius structures as follows.
First Frobenius structure is obtained by the regular QFPM formed by
$\Omega_{2}$ and $\Omega_{1}=\partial_{t_{2}}\Omega_{2}$ of charge $d=0$ with
$\tau=t_{1}$. The flat coordinates are
$t_{1}=\frac{2q-1}{2q}(x^{2q}+y^{2q}+z^{2q}),\ t_{2}=\frac{1}{2}z^{2q},\
t_{3}=(xy)^{q}.$ (5.14)
The resulting Frobenius manifold is a trivial of type $T_{3}$. Other Frobenius
structures are obtained by fixing the invariants
$u_{1}=x^{2q}+y^{2q}+z^{2q},\ u_{2}=(xyz)^{2},\
u_{3}=-2x^{2q}y^{2q}-2x^{2q}z^{2q}-2y^{2q}z^{2q}.$ (5.15)
We get regular QFPM with $\Omega_{2}$ and
$\Omega_{1}=\partial_{t_{1}}\Omega_{2}$ of charge 0 with
$\tau=\frac{2q-1}{2q}u_{1}$. We choose the flat coordinates
$t_{1}=\frac{2q-1}{2q}u_{1},\ t_{2}=u_{2}^{\frac{q}{4}},\
t_{3}=u_{3}u_{2}^{\frac{-q}{4}}$ (5.16)
The resulting structure is of type $B_{3}^{1}$.
Finally, we have regular QFPM with $\Omega_{2}$ and
$\Omega_{1}=\partial_{t_{3}}\Omega_{2}$ of charge $\frac{1}{2}$ with
$\tau=\frac{2q-1}{4q}u_{1}$, we get type $A_{3}$ of the flat coordinates
$t_{1}=\frac{2q-1}{4q}u_{1},\
t_{2}=\frac{2\sqrt{2q-1}}{\sqrt{q}}u_{2}^{\frac{q}{2}},\
t_{3}=u_{3}+\frac{1}{4}u_{1}^{2}.$ (5.17)
8. $(26)$
These are groups of type $(\mathcal{C})$ of order $9m^{2}$ for even $m\geq 2$.
The set of minimal generators of invariant ring has
$x^{3m}+y^{3m}+z^{3m},(xyz)^{2},x^{2m}y^{m}+x^{m}y^{2m}+y^{2m}z^{m}+y^{m}z^{2m}+z^{2m}x^{m}+z^{m}x^{2m},$
$xyz(x^{m}-y^{m})(y^{m}-z^{m})(z^{m}-x^{m}),(x^{m}-y^{m})^{2}(y^{m}-z^{m})^{2}(z^{m}-x^{m})^{2}.$
The only possible case for condition (5.1) is when $m=2$. We choose the flat
coordinates
$t_{1}=\frac{5}{12}(x^{6}+y^{6}+z^{6}),\ t_{2}=\sqrt{\frac{20}{3}}(xyz)^{3},\
t_{3}=x^{12}+y^{12}+z^{12}-\frac{3}{4}(x^{6}+y^{6}+z^{6})^{2}.$
Hence the Hessian of ${12\over 5}t_{1}$ leads to a regular QFPM with
$\Omega_{2}$ and $\Omega_{1}=\partial_{t_{3}}\Omega_{2}$ of charge $d={1\over
2}$ with $\tau=t_{1}$. Then the Frobenius structure is of type $A_{3}$.
On the other hand, the Hessian of ${5\over 6}t_{1}$ leads to a regular QFPM
formed by $\Omega_{2}$ and $\Omega_{1}=\partial_{t_{1}}\Omega_{2}$ of degree 0
with $\tau=t_{1}$. We fix the flat coordinates
$t_{1}=\frac{5}{6}(x^{6}+y^{6}+z^{6}),\ t_{2}=(xyz)^{\frac{3}{2}},\
t_{3}=\frac{-5}{6}(xyz)^{\frac{-1}{2}}\left(x^{12}+y^{12}+z^{12}-\frac{3}{4}(x^{6}+y^{6}+z^{6})^{2}\right).$
(5.18)
The resulting Frobenius structure is of type $B_{3}^{1}$.
## 6 Conclusions
In this article, we consider invariants rings (not only polynomial ones) of
finite linear representations as a source for Frobenius manifolds. The
construction at the moment depends on explicit knowledge of the sets of
generators. Then, it will be important to classify or characterize those
finite groups representations when the Hessian of a minimal degree invariant
polynomial defines a flat contravariant metric. Recall that this condition is
satisfied for real representations but not for complex reflection
representations which are not Shephard groups [18].
## Acknowledge
The authors thank Robert Howett, Hans-Christian Herbig and Christopher Seaton
for useful discussions. They very much appreciate the Magma program’s support
team for their helpful cooperation. This work was funded by the internal grant
of Sultan Qaboos University (IG/SCI/DOMS/19/08).
## References
* [1] Al-Maamari, Z.; Dinar, Y., Inversion symmetry on Frobenius manifolds, arXiv:2106.08000 (2021).
* [2] Al-Maamari Z.; Dinar, Y., Dicyclic groups and Frobenius manifolds, SQU Journal for Science, 25(2), 107-111, (2020).
* [3] Derksen, H.; Kemper, G., Computational invariant theory, Springer, (2015).
* [4] Dubrovin, B., Differential geometry of the space of orbits of a Coxeter group, Surveys in differential geometry IV: integrable systems, 181–211, (1998).
* [5] Dubrovin, B., Geometry of $2$D topological field theories, Integrable systems and quantum groups (Montecatini Terme, 1993), 120–348, Lecture Notes in Math., 1620, Springer, Berlin, (1996).
* [6] Dubrovin B., Flat pencils of metrics and Frobenius manifolds, Integrable systems and algebraic geometry (Kobe/Kyoto, 1997), 47–72, World Sci. Publ., River Edge, NJ, (1998).
* [7] Dubrovin B.; Zhang, Y., Extended affine Weyl groups and Frobenius manifolds, Compositio Math. 111, no. 2, 167–219 (1998).
* [8] Dubrovin, B., On almost duality for Frobenius manifolds, Geometry, topology and mathematical physics, 75–132. Am. Math. Soc. Transl. Ser. 2, 212 (2004).
* [9] Fordy, A. P.; Mokhov, O. I., ON a special class of compatible Poisson structures of hydrodynamic type, Physica D 152-153 475-490 (2001).
* [10] Dubrovin, B.; Strachan, I. A. B.; Zhang, Y.; Zuo, D., Extended affine Weyl groups of BCD-type: their Frobenius manifolds and Landau-Ginzburg superpotentials, Adv. Math. 351, 897–946 (2019).
* [11] Fulton, W.; Harris, J., Representation theory: A first course, V(129). Springer Science and Business Media, (2013).
* [12] Howett, Robert; in personal communications.
* [13] Hertling, C., Frobenius manifolds and moduli spaces for singularities, Cambridge Tracts in Mathematics, V(151), Cambridge University Press, (2002).
* [14] Humphreys, J. E., Reflection groups and Coxeter groups, V(29), Cambridge University Press, (1990).
* [15] Leuschke, G. J.; Wiegand, R, Cohen-Macaulay representations,Mathematical Surveys and Monographs, 181. American Mathematical Society, ISBN: 978-0-8218-7581-0 (2012).
* [16] Mokhov, O. I., Compatible Dubrovin-Novikov Hamiltonian operators, the Lie derivative, and integrable systems of hydrodynamic type. (Russian) Teoret. Mat. Fiz. 133, no. 2, 279–288; translation in Theoret. and Math. Phys. 133 , no. 2, 1557–1564 (2002).
* [17] Neusel, M., Invariant Theory, American Mathematical Society, Student Mathematical Library (Book 36), ISBN: 978-0821841327 (2006).
* [18] Orlik, P.; Solomon, L., The Hessian map in the invariant theory of reflection groups, Nagoya Math. J. 109 , 1–21 (1988).
* [19] Saito, K., On a linear structure of the quotient variety by a finite reflexion group. Publ. Res. Inst. Math. Sci. 29 , no. 4, 535–579 (1993).
* [20] Saito, K.; Yano, T.; Sekeguchi, J., On a certain generator system of the ring of invariants of a finite reflection group, Comm. in Algebra 8(4) (1980).
* [21] Sergyeyev, A. A simple way of making a Hamiltonian system into a bi-Hamiltonian one, Acta Applicandae Mathematica, 83(1), 183-197,2004.
* [22] Steinberg, B., Representation Theory of Finite Groups An Introductory Approach, Springer Science$+$Business Media, (2012).
* [23] Watanabe, K. I.; Rotillon, D., Invariant subrings of $\mathbb{C}[X,Y,Z]$ which are complete intersections, manuscripta mathematica, 39(2), 339-357, (1982).
* [24] Yau, S. T.; Yau, S. S. T.; Yu, Y, Gorenstein quotient singularities in dimension three, (Vol. 505), American Mathematical Soc, (1993).
* [25] Zuo, D., Frobenius Manifolds Associated to $B_{l}$ and $D_{l}$, Revisited, International Mathematics Research Notices, Vol. (2007).
* [26] Zuo, D., Frobenius manifolds and a new class of extended affine Weyl groups $\widetilde{W}^{(k,k+1)}(A_{l})$, 2000 Mathematics Subject Classification, (2019).
Yassir Dinar
[email protected]
Zainab Al-Maamari
[email protected]
Depatment of Mathematics
College of Science
Sultan Qaboos University
Muscat, Oman
| arxiv-papers | 2021-07-27T02:25:44 | 2024-09-04T03:07:20.401377 | {
"license": "Creative Commons Zero - Public Domain - https://creativecommons.org/publicdomain/zero/1.0/",
"authors": "Zainab Al-Maamari, Yassir Dinar",
"submitter": "Yassir Dinar I",
"url": "https://arxiv.org/abs/2107.12557"
} |
2107.12566 | # Thunder CTF: Learning Cloud Security on a Dime
Nicholas Springer Portland State University
[email protected] Wu-chang Feng Portland State University
[email protected]
###### Abstract
Organizations have rapidly shifted infrastructure and applications over to
public cloud computing services such as AWS (Amazon Web Services), Google
Cloud Platform, and Azure. Unfortunately, such services have security models
that are substantially different and more complex than traditional enterprise
security models. As a result, misconfiguration errors in cloud deployments
have led to dozens of well-publicized breaches. This paper describes Thunder
CTF, a scaffolded, scenario-based CTF (Capture-the-Flag) for helping students
learn about and practice cloud security skills. Thunder CTF is easily deployed
at minimal cost and is highly extensible to allow for crowd-sourced
development of new levels as security issues evolve in the cloud.
###### Index Terms:
Cloud Security, Security Education, Capture-the-Flag
## I Introduction
An overwhelming percentage of companies are leveraging public cloud services
for their computing infrastructure, finding its economies of scale hard to
pass up [1]. As companies move infrastructure and applications to public cloud
platforms such as AWS, Google Cloud Platform, and Azure, it is becoming
increasingly important for practitioners to be aware of security issues that
may lead to compromise. More than 2/3 of all enterprises list security as the
most significant concern for moving to the cloud [2]. Such concern is not
unfounded, as the cloud presents its users with a new set of operational
security configurations that can be difficult to comprehend and set up
properly. As a result, breaches ranging from the discovery of unprotected
cloud resources such as storage buckets [3] and search indexes [4], to more
sophisticated application compromises [5] have led to the exposure of millions
of financial and voter records. The shift to the cloud has added significant
complexity to the practice of security. While legacy infrastructure must deal
with machines, operating systems, routers, firewalls, software patching of
vendor-supported software, as well as username and password management, cloud
infrastructure must handle all of those issues potentially, while also dealing
with role-based access control, zero-trust networks, API security, account
access keys, authentication tokens, and federated identity providers.
Additionally, cloud infrastructure security is moving increasingly into the
hands of software development teams as well as a vast open-source software
supply chain that no one in particular is in charge of, making things even
more difficult to secure.
Learning cloud security can be a daunting task with the broad range of topics
to learn and skills to practice. One popular way is through Capture-the-Flag
(CTF) exercises, which challenge players to find security flaws and execute
exploits on intentionally vulnerable systems. CTF exercises have been
successfully used as both a vehicle for experienced practitioners to sharpen
their skills and for beginners to develop them. Unfortunately, with cloud
security in a formative state, there are few CTFs that focus on providing
guidance for beginners to learn about cloud security. Additionally, existing
CTFs focus exclusively on securing AWS deployments [6, 7, 8, 9]. To address
this, this paper describes Thunder CTF, a CTF and framework for helping both
experienced and novice practitioners learn about securing projects on Google
Cloud Platform [10].
Section II describes the overall design of the CTF including its initial
levels and its framework for supporting extensibility. Section III describes
the results of an initial deployment in an advanced elective course in our
program. Finally, Section IV concludes and describes future work.
## II Curriculum and CTF
Thunder CTF is designed with several overall goals. These goals include 1)
modeling exercises on actual compromises and commonly found problems in
existing cloud deployments, 2) scaffolding exercises to support differentiated
instruction for the benefit of both novices and experienced practitioners, 3)
creating an extensible framework that allows developers to add, remove, and
customize levels based on current vectors of exploitation, and 4) making the
CTF easily deployable to minimize the friction of setting it up and the cost
to run it.
### II-A Scenario-based
Rather than focusing on a single concept or skill, Thunder CTF levels are
scenario-based and tied to actual compromises in order to better motivate the
skills being practiced and to provide students a more engaging, realistic
roleplaying experience. Scenarios are explicitly tied back to the real
breaches that inspired them via a write-up at the end of each individual
level, and scenarios often mirror the tactics and techniques enumerated in
MITRE’s ATTACK matrix [11]: a framework for classifying typical adversarial
behavior (e.g. initial access, persistence, privilege escalation, defence
evasion, credential access, discovery, collection, exfiltration, and impact).
This allows students to see a bit of the “forest” in which adversaries
operate, rather than only looking at the ”trees” of individual exploits.
Thunder CTF levels chain together multiple techniques and concepts in order to
achieve an overall operational goal. Currently, the CTF consists of an initial
set of 6 levels that cover important concepts in cloud security, such as open
storage buckets, overprovisioned permissions, exfiltration of sensitive
information via log files, security keys in source repositories, unsanitized
error messages, access token compromise, backdoors via metadata, misconfigured
IAM (Identity and Access Management) policies, IAM privilege escalation,
exposed container images, and metadata credential compromise via server-side
request forgery.
Table I displays the 6 different scenarios currently implemented in Thunder
CTF. As the table shows, scenarios chain together security vulnerabilities in
order to show students how they would function in a context of compromising a
project.
Fig. 1 shows a screenshot of a student solving a6container, a level that
recreates a series of steps similar to those used in the Capital One breach
[5]. As the figure shows, a vulnerable proxy service is found that the student
can use to access the internal metadata service. The service exposes a session
token that can be activated by the student to access storage buckets that the
proxy has access to. Within one of these buckets, a file containing credit
card information is then found.
Figure 1: Capital One breach level
### II-B Scaffolded
CTF levels often target a particular level of expertise. Unfortunately,
students that find the levels too easy can become bored and stop playing,
while those that find the levels too difficult can become frustrated and stop
playing. To overcome this, Thunder CTF is designed to support differentiated
instruction across users with disparate abilities. It features scaffolded
levels with incrementally increasing difficulties as well as an extensive hint
system. The hint system allows novices to make consistent progress through the
CTF, while affording experienced players a challenging experience when the
hints are ignored and the levels are completed in an open-ended manner. Such a
setup also allows a student to revisit the CTF and replay its levels with less
support from hints to solidify their skill level.
Fig. 2 shows an example of a hint that is available for students to use on a
particular level when they are stuck. Thunder CTF hints are sequentially
accessed by users to guide them towards level completion. As the figure shows,
explanations within the hints teach not only the concepts required to perform
the next step, but also the syntax of the commands, and code required to run
them.
Figure 2: Hint system in Thunder CTF
### II-C Extensible and Modular
Security issues are constantly evolving. Where vulnerabilities such as
Unvalidated Redirects and Forwards and Cross-Site Request Forgery were in the
OWASP Top 10 in 2013, they are now nowhere to be found. Similarly, while
access token compromise via Metadata exploitation (an exploit used in level 6)
may be possible now, by the time this paper is published, the addition of a
required, custom HTTP request header may completely remove it as a vector of
future compromise [12, 13]. As a result of the rapidly changing landscape of
security issues, Thunder CTF has been designed to be highly configurable and
extensible, allowing levels to be quickly added and removed.
Thunder CTF levels are modular and follow a specific structure, which reduces
the process of creating new levels to simply filling in a template. Each level
module contains as few as three files, which are displayed in Fig. 3. These
files include a deployment configuration that specifies the cloud resources
needed for the level, a deployment script that encodes the logic for deploying
and configuring infrastructure, and a hint list file containing the HTML
content of each hint. A level development guide, which explains the process of
writing each file of a level module, as well as a template level module, are
provided for level creators in the Thunder CTF repository [14].
Initial infrastructure deployment is done using Deployment Manager, GCP’s
infrastructure-as-code solution. The level creator provides a YAML deployment
configuration that specifies the infrastructure required by the level, which
the deployment script passes to the framework’s deployment interface. The
deployment interface renders the configuration using a template engine,
allowing level creators to customize configurations at runtime. Then, the
deployment interface uses the Google Cloud Deployment Manager API to launch
the level infrastructure. By abstracting away the specifics of dealing with
the Deployment Manager API, the deployment interface allows level creators to
focus on actual level-specific configurations. An outline of a possible
deployment configuration is shown in the first column of Fig. 3.
Figure 3: Outline of example level module TABLE I: Thunder CTF level scenarios Scenario | Walkthrough description
---|---
a1openbucket | • List all storage buckets for a project using the command-line interface. • Copy a secret file stored within a bucket left open
a2finance | • Activate a service account credential. • List permissions associated with a credential. • Download the contents of an accessible bucket. • Navigate a git repository that previously contained a sensitive ssh key. • Checkout repository version containing the initial commit of the key. • List project’s VM instances to find one containing an ssh key in its Metadata. • ssh into the instance and use its role to access the project’s logging service. • Find credit-card numbers in log entries that have not been properly sanitized
a3password | • List all of the serverless functions for a project. • Access an API endpoint for a function to discover it requires authentication. • Obtain an identity token using your initial credentials and access API again. • Reverse-engineer endpoint to discover it requires a password field. • Use over-provisioned credential to download the function’s source code from its REST API. • Reverse-engineer function to expose a sensitive environment variable. • List the function’s Metadata to discover the secret and access the endpoint.
a4error | • Obtain an identity token and use it to access a function via its URL. • Inject unexpected input to trigger an error. • Use credential to read the function’s log entries. • Find the function’s credentials within the error log and list its permissions. • Use the function’s credentials to list the project’s VM instances. • Add an ssh key to ethe Metadata of a VM instance. • Log into the instance to access a secret file.
a5power | • List credential permissions to find its ability to overwrite a serverless function. • Overwrite function code to return credentials of the VM executing function. • List VM’s credential permissions to find its ability to view and edit IAM policies. • View IAM policy via an API to discover its update role permission. • Escalate privileges via an API to gain permissions to access storage buckets. • Access secret file in storage bucket
a6container | • List the project’s VM instances to discover a web server run via a container. • Pull the container image and examine its code to find a hidden route implementing a proxy. • Perform a server-side request forgery (SSRF) attack on the Metadata service for the VM to obtain its credentials. • List VM’s credentials to find its ability to access storage buckets. • Access secret file in storage bucket
In many cases, after infrastructure is deployed, it must be configured further
before the level is ready to be played. The deployment script of each level
performs these configurations after the initial infrastructure deployment is
complete. An outline of a possible deployment script is shown in the second
column of Fig. 3.
Infrastructure could be configured using Google Cloud REST APIs, but using the
APIs directly complicates level development. To address this, the CTF
framework provides helper functions that perform common infrastructure
configurations, such as uploading files to storage buckets or modifying
security policies. The abstraction of common API calls into helper functions
allows level creators to focus on the overall configuration logic of their
level, rather than dealing with the details of the underlying Google Cloud API
calls. Documentation of the framework helper functions is provided on the
Thunder CTF website [15].
An important aspect of the scaffolding in Thunder CTF is provided by the hint
system. To build an attractive, functional hint system, a good deal of
development work is required. To simplify the process for level creators,
Thunder CTF provides a hint templating system that allows level creators to
focus solely on producing the content of hints rather than the formatting.
When creating a level, level creators can provide a hint list file that
contains the content of each hint. Using the hint list as input, the framework
generates a styled HTML document that displays the hints in a sequential
slideshow. This simplification takes the burden of hint styling and delivery
away from level creators, allowing them to focus on the content of the hints
versus their presentation.
Finally, the framework of Thunder CTF provides extensibility both by
supporting new level contributions within an existing CTF such as the 6 levels
previously described, as well as by supporting the addition of entirely
separate sequences of levels, effectively allowing content developers to
design their own CTFs focused on new topics [10]. For that, Thunder CTF has a
namespace system that allows the same framework to implement a different set
of levels with a correspondingly different site to serve the web content.
Using this, we are currently implementing a separate CTF focused on web and
application security issues that leverages the Thunder CTF framework for
deployment in the cloud.
### II-D Deployable
Regardless of how well a CTF is designed, in order to be impactful, it must be
widely used. Specifically, its code and content must be accessible, it must be
easy to set up, and it must be either free to use or incur minimal cost. In
addition, if being used in the context of a course, it must support levels
that are polymorphic in nature to ensure each student has individually solved
each level. Thunder CTF attempts to address each of these aspects.
#### II-D1 Freely available code and content
The code itself is free (as in speech), and students download the entire code
repository as part of running Thunder CTF. While the hint-system is included
in the repository and can be used directly by students, for convenience, we
provide a hosted site for accessing level instructions and hints [10]. The
repository is also structured to allow level contributions from the community
in order to enable crowd-sourced development and deployment of new content.
#### II-D2 Frictionless setup
The setup for Thunder CTF can be done within minutes. Students that are new to
Google Cloud sign up for a free account with up to $300 in credit [16]. From a
web browser, they then launch Cloud Shell, a GCP-based command line interface
that is already set up for accessing cloud resources, and clone the Thunder
CTF repository. From there, they run a single Python script to deploy the
level they wish to play (e.g. python3 thunder.py create thunder/a1openbucket).
The script interfaces with Google’s Cloud Deployment Manager API to
programmatically set up all of the level’s resources on-demand. When the level
is completed, the same script is used to bring down all of the resources that
have been deployed (e.g. python3 thunder.py destroy). This simplistic
interface makes it easy for students to deploy and navigate levels.
#### II-D3 Low cost
Labs for cloud-based exercises often require a paid subscription to use [17].
Thunder CTF instead has been designed to be free (as in beer), with its
resource consumption falling well within the free tier of Google Cloud.
Specifically, each level utilizes virtual machines, cloud functions,
containers, and API endpoints that fit within the “always-free” umbrella of
Google Cloud. In addition, CTF levels make heavy use of serverless
infrastructure that is billed only upon usage over a certain threshold. As a
result, run-throughs of the CTF can cost as little as a dime, making the CTF a
cost-effective way to learn and practice important cloud skills.
#### II-D4 Polymorphic levels
Finally, for deployments in courses, it is important to ensure that each
student performs individual work in completing the exercises, and that
solutions to the levels can’t simply be shared amongst them. To address this,
the CTF framework includes a function that generates unique secret flags,
which students look for when playing each level. This is done by hashing the
combination of a constant level seed and the GCP project identifier for the
player’s cloud project. With this, a validation site can be easily built to
check solutions on a per-user basis. Although the students have full access to
CTF code, flags could potentially be reversed, but we believe it is easier to
solve the levels than to reverse-engineer the flags from code.
## III Evaluation
The first use of Thunder CTF occurred in our Fall 2019 offering of Portland
State University’s CS 430/530 Internet, Web, and Cloud Systems course with 48
students. The first half of the 10-week course covers key concepts in
networking, operating systems, web development, and databases before
transitioning to their use in cloud computing environments. At the beginning
of the 6th week, a lecture on Google Cloud Identity and Access Management is
given to students, followed by two weeks of labs that walk students through
the basics of leveraging Cloud Storage, Cloud Datastore, App Engine, Cloud
Run, Cloud Functions, and Kubernetes Engine to scale applications seamlessly.
At the end of this sequence, the Thunder CTF levels were assigned to
demonstrate how such services can be misconfigured in ways that expose them to
attack. Students were given a due date for the exercises at the end of the 9th
week, allowing them about a week to finish the levels.
To assess the effectiveness of the CTF, we surveyed students at the beginning
of the 10th week. Table II lists the questions that were asked in the survey.
Our goal was to measure how well the CTF helped students learn about cloud
security issues and develop skills in navigating cloud systems. In addition,
we were interested in measuring the utility of the hint system for supporting
students as they completed the exercise.
TABLE II: Survey questions for Thunder CTF in CS 430/530: Internet, Web, and
Cloud Systems (Fall 2019) Question
---
Q1: Rate the CTF exercises for understanding security issues in the cloud.
Q2: Rate the CTF exercises for developing skills in navigating the cloud.
Q3: Rate the hint system as a mechanism for providing help as needed in
solving CTF exercises.
Of the 48 students in the class, 36 responded to the survey. Table III shows
the results. As the table shows, students felt that the lecture material and
CTF exercises were both helpful for learning about security issues and for
developing cloud skills, while students found the hint system very helpful as
a learning aid, validating our design.
TABLE III: Helpfulness ratings of Thunder CTF (1=Very Unhelpful, 2=Somewhat Unhelpful, 3=Neither Helpful nor Unhelpful, 4=Somewhat Helpful, 5=Very Helpful) Question | 1 | 2 | 3 | 4 | 5 | Mean rating
---|---|---|---|---|---|---
Q1 | 1 | 3 | 3 | 19 | 10 | 3.94
Q2 | 1 | 2 | 4 | 20 | 9 | 3.94
Q3 | 1 | 0 | 1 | 10 | 24 | 4.56
## IV Conclusion and Future Work
With the move to cloud-based infrastructure, securing cloud applications and
deployments is becoming extremely important. This paper describes a curriculum
and CTF for not only teaching cloud security issues to students, but also
developing their skills in applying them. Thunder CTF is designed to be
applicable, extensible, and deployable, allowing it to be used in as an
efficient training tool in an educational setting. Additionally, the
scaffolded hint system makes the CTF accessible and informative even for
novice practitioners with little background in cloud security. Results from an
initial deployment of the CTF are promising, indicating that scaffolded CTFs
can be effective at teaching security concepts to students.
In future work, we will need to deploy and evaluate the use of the CTF in
additional course offerings in order to attain a greater sample size.
Similarly, deployments of the CTF in other course curriculums (such as
security-specific courses) are necessary to understand how the technical
background of students affects their experience using the CTF.
## Acknowledgment
This material is supported by the National Science Foundation under Grant No.
1821841. Any opinions, findings, and conclusions or recommendations expressed
in this material are those of the author and do not necessarily reflect the
views of the National Science Foundation.
## References
* [1] 451 Research, ”Voice of the Enterprise: Cloud Transformation Survey,” November 2017, https://451research.com.
* [2] L. Columbus, ”83% of Enterprise Workloads Will Be In The Cloud By 2020,” January 2018, https://www.forbes.com.
* [3] D. O’Sullivan, ”The RNC Files: Inside the Largest US Voter Data Leak,” https://www.upguard.com/breaches/the-rnc-files.
* [4] B. Diachenko, ”Document Management Company Left Credit Reports Online,” January 2019, https://securitydiscovery.com.
* [5] R. Walikar, ”An SSRF, Privileged AWS Keys and the Capital One Breach” August 2019, https://blog.appsecco.com.
* [6] Rhino Security Labs, ”CloudGoat: The Vulnerable-by-Design AWS Environment,” https://github.com/RhinoSecurityLabs/cloudgoat.
* [7] S. Piper, ”flAWS,” http://flaws.cloud.
* [8] S. Piper, ”flAWS2,” http://flaws2.cloud.
* [9] OWASP, ”OWASP ServerlessGoat: A Serverless Application Demonstrating Common Serverless Security FLaws,” https://github.com/OWASP/Serverless-Goat.
* [10] N. Springer, ”Thunder CTF,” https://thunder-ctf.cloud.
* [11] MITRE Corporation, ”MITRE ATTACK Cloud Matrix,” https://attack.mitre.org/matrices/enterprise/cloud.
* [12] Google Cloud Platform, ”Migrating to v1 Metadata Server Endpoint,” https://cloud.google.com/compute/docs/migrating-to-v1-metadata-server.
* [13] E. Johnson, ”Preventing the Capital One Breach,” https://ejj.io/blog/capital-one.
* [14] N. Springer, ”Thunder CTF Level Development Guide,” https://https://github.com/NicholasSpringer/thunder-ctf/wiki.
* [15] N. Springer, ”Thunder CTF Framework Documentation,” https://https:/thunder-ctf.cloud/pydocs/framework.
* [16] Google Cloud Platform, ”GCP Free Tier,” https://cloud.google.com/free.
* [17] Infosec Learning, ”Virtual Labs,” https://www.infoseclearning.com/virtual-labs.
| arxiv-papers | 2021-07-27T03:01:47 | 2024-09-04T03:07:20.417320 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Nicholas Springer (1), Wu-chang Feng (1) ((1) Portland State\n University)",
"submitter": "Nicholas Springer",
"url": "https://arxiv.org/abs/2107.12566"
} |
2107.12567 | # Guided Optimization for Image Processing Pipelines
Yuka Ikarashi1 , Jonathan Ragan-Kelley1 , Tsukasa Fukusato2 , Jun Kato3 ,
Takeo Igarashi2 MIT CSAIL1, The University of Tokyo2, AIST3
###### Abstract
Writing high-performance image processing code is challenging and labor-
intensive. The Halide programming language simplifies this task by decoupling
high-level algorithms from “schedules” which optimize their implementation.
However, even with this abstraction, it is still challenging for Halide
programmers to understand complicated scheduling strategies and productively
write valid, optimized schedules. To address this, we propose a programming
support method called “guided optimization.” Guided optimization provides
programmers a set of valid optimization options and interactive feedback about
their current choices, which enables them to comprehend and efficiently
optimize image processing code without the time-consuming trial-and-error
process of traditional text editors. We implemented a proof-of-concept system,
Roly-poly, which integrates guided optimization, program visualization, and
schedule cost estimation to support the comprehension and development of
efficient Halide image processing code. We conducted a user study with novice
Halide programmers and confirmed that Roly-poly and its guided optimization
was informative, increased productivity, and resulted in higher-performing
schedules in less time.
###### Index Terms:
Guided optimization, interactive scheduling, Halide, programming environment,
program visualization
## I Introduction
Performance optimization is challenging even for experts because the number of
optimization choices they have is enormous. The barrier is even higher for
novices, for whom it is difficult to reason about what choices are valid and
what their impact might be, and it is essential to help them break down the
choice space to a manageable set of valid options. Performance and program
visualization techniques are investigated widely in both academia and industry
to address this issue, such as always-on visualization of call stacks [1], and
parallel execution [2]. These methods, however, are text-based, and
programmers need to carefully write syntactically correct code and manually
explore a large space of optimization choices to decide an appropriate
optimization strategy.
The Halide programming language [3, 4] is a widely used open-source domain-
specific language (DSL) for image processing. It is explicitly designed to
achieve high-performance while significantly simplifying the coding process.
Halide decouples high-level algorithms from their schedules. An algorithm is a
functional definition of what to compute (e.g., a box blur algorithm or corner
detection algorithm). Schedules define how to compute a given algorithm,
especially issues related to performance optimization, including choices
affecting memory locality and parallelism. Compared with general purpose
programming languages such as C++ and Python, this separation allows Halide
programmers to write the algorithm part first and optimize its performance
independently.
Figure 1: The overview of Roly-poly.
However, writing optimized schedules in Halide is still challenging. While the
scheduling language is concise, different scheduling choices cause complex,
global transformations of the generated code. Understanding what choices are
valid, and what effect they will have, is difficult as the implied
transformations are invisible to the programmer and their effect must be
modeled in the programmer’s head. It is also difficult to predict how
schedules will perform. The most efficient schedules require complex trade-
offs between parallelism, locality, and the total amount of computation in
different places throughout a program. To find the best result, programmers
need to repeatedly change scheduling code, compile and execute the program,
benchmark the result, and inspect the generated code. Ongoing research
explores removing this burden by automatically inferring fast schedules with
no user involvement [5], but these techniques are still limited, and manual
programming of schedules remains the standard practice in industry to retain
explicit control.
To make authoring schedules more accessible and productive, we present an
interface and workflow for authoring schedules called guided optimization.
Guided optimization presents multiple valid scheduling options to the user,
together with interactive feedback on the current schedule state. This allows
users to directly explore the space of valid schedules without struggling to
mentally model the impact of individual scheduling operations, and to make
more effective choices based on integrated feedback about their performance
impacts. With such systematic help, we believe that Halide programmers can
optimize image processing code more productively and effectively than with
traditional manual scheduling. This paper introduces our prototype
implementation, Roly-poly, to show the feasibility and effectiveness of the
proposed method. Roly-poly also features program visualization and scheduling
cost estimation to support guided optimization. Figure 1 shows the system
overview of Roly-poly.
This paper makes the following contributions:
* •
The proposal of guided optimization, a semi-automatic scheduling approach
where the system enumerates a series of valid scheduling choices and asks
users to choose one of the options at each step.
* •
An integration of cost estimation into guided optimization.
* •
A visualization of the scheduling strategy at each step of the guided
optimization.
* •
An interview with Halide experts and a user study with Halide novices on the
effectiveness of guided optimization.
## II Image Processing Scheduling in Halide
Halide is embedded in C++ and can be used to build computational photography
and computer vision applications efficiently. It decouples image processing
code into an algorithm, which is a mathematical representation of image pixel
transformation, and into a schedule, which dictates the order of computation
and storage. The program output depends only on the algorithm, and changing
schedules solely affects the performance. This separation allows programmers
to explore various schedules after defining an algorithm without
unintentionally changing the program output.
Var x, y;
Func kernel, bounded, blur_y, blur;
kernel(x) = exp($-$x$\ast$x/(2$\ast$sigma$\ast$sigma))/
(sqrtf(2$\ast$ M_PI) $\ast$ sigma);
bounded = BoundaryConditions::repeat_edge(input);
blur_y(x, y) = (kernel(0) $\ast$ input(x, y) +
kernel(1) $\ast$ (bounded(x, y-1) + bounded(x, y+1)) +
kernel(2) $\ast$ (bounded(x, y-2) + bounded(x, y+2)) +
kernel(3) $\ast$ (bounded(x, y-3) + bounded(x, y+3)));
blur(x, y) = (kernel(0) $\ast$ blur_y(x, y) +
kernel(1) $\ast$ (blur_y(x-1, y) + blur_y(x+1, y)) +
kernel(2) $\ast$ (blur_y(x-2, y) + blur_y(x+2, y)) +
kernel(3) $\ast$ (blur_y(x-3, y) + blur_y(x+3, y)));
Algorithm 1: Gaussian Blur algorithm written in Halide. Figure 3: A dependency
graph of a Gaussian Blur algorithm.
### II-A Scheduling Example with Gaussian Blur
We describe basic scheduling concepts by considering an example of a Gaussian
Blur algorithm run on a 256x256 image. Algorithm 1 shows a Gaussian algorithm
written in Halide, and Figure 3 shows its dependency graph. It first sets a
boundary condition on the input image and stores the result in bounded. Then,
it applies a one-dimensional Gaussian kernel function vertically, storing the
result in blur_y, and then applies a Gaussian kernel horizontally to blur_y to
produce blur.
The default schedule generates the following implementation:
for x in 0..255
for y in 0..255
blur $(\cdots)$ = (kernel(0) $\ast$ blur_y(x, y) + $\cdots$;
All functions are inlined to blur, and the loop simply iterates x and y. This
inlining schedule has a maximal memory locality because seven elements of
blur_y are produced and immediately are consumed by blur (likely readout of
the CPU’s registers). However, this schedule also induces a maximal redundant
computation. This schedule does not cache the result of blur_y, and it is
computed each time it is used from blur with the same arguments.
A schedule method called pre-computation can be used to reduce redundant
computation. For example:
for x in 0..255
for y in 0..255
blur_y $(\cdots)=\cdots$;
for x in 0..255
for y in 0..255
blur $(\cdots)=\cdots$;
In this schedule, blur_y is pre-computed before blur. This schedule has
minimal redundant computations because all required elements of blur_y are
pre-computed and stored in memory before they are subsequently loaded to
compute blur. However, memory locality is sacrificed because an entire pre-
computed image is usually too large to fit in a cache.
Finally, tiling can be used to balance the advantages and the disadvantages of
inlining and pre-computation. For example:
for x_outer in 0..31
for y_outer in 0..15
for x_inner in 0..7
for y_inner in 0..15
blur_y $(\cdots)=\cdots$;
for x_inner in 0..7
for y_inner in 0..15
blur $(\cdots)=\cdots$;
Tiling divides a loop into an outer-loop and a smaller inner-loop. In this
example, the outer-loop variables of x_outer and y_outer divide the input
image into 512 (32x16) tiles. Each of these tiles has a size of 8x16. In this
paper, we call the for-loop range (x_outer range of 32 and y_outer range of
16) a tile range and the divided image size (8x16 in this example) a tile
size. The tile range is usually just called “for-loop range,” but we use this
word to distinguish and emphasize that this for-loop exists only for dividing
the image into smaller tiles. In short, if a for-loop of function child is
nested inside a for-loop of function parent, (a tile size of child) = (tile
size of parent) / (tile range of child).
This schedule pre-computes blur_y for each tile of blur, which saves redundant
computations while taking advantage of the memory locality of blur_y. Memory
locality is important for efficient scheduling because loading data from a
cache is significantly faster than loading it from the main memory. However,
taking a too small tile size will result in redundant computation at the edge
of each tiling. Therefore, calibrating the tile size so that it is small
enough to fit in a cache and large enough to avoid too many redundant
computations is essential for balancing redundant computation and memory
locality trade-off.
To summarize, choosing the function’s i) compute location in the for-loop
(pre-computing or inlining) and ii) tile range are key methods for image
processing optimization.
### II-B Expert Interview
To understand the representative workflow of manual scheduling optimization
and to collect advice in creating a tool for novice image processing
programmers, we conducted interviews with Halide scheduling experts.
We invited three experts aged $25$ to $30$ years with at least two years of
Halide experience (one of them had an experience as a teaching assistant at an
image processing class teaching Halide) and asked them to perform manual
scheduling on Unsharp Masking (see Algorithm 2). The interview was conducted
informally, asking them to explain the reasons for their schedule choices. We
chose this task because its scheduling choices were complex enough to measure
experts’ realistic scheduling procedures. After the participants completed the
task, we asked them how they felt about manual scheduling process and what
they felt short in the current programming environment.
On average, an interview took 26 minutes, and the average runtime of a
schedule was 32 ms. We learned from the interview the basic strategy of
scheduling, which we explained in Section II-A. Participants told us that the
iterative process of editing, compiling, and executing to check the runtime
was laborious and said that they would like to use a tool integrating them
into one screen with instant feedback. They also stated that even Halide
experts often find it challenging to imagine the CPU and cache state given a
schedule, and said that visualization would certainly be useful to picture
them. Based on their comments, we designed an initial concept of Roly-poly.
## III Related Work
### III-A Performance Visualization
Performance visualization techniques help programmers improve the time and
energy efficiency of their programs [6]. Callgrind and Kcachegrind are tools
that output the profile information about cache events and the dynamic call
graph of the execution [7]. The Linux kernel supports the perf profiling tool,
which displays CPU usage [8]. gprof implements more aesthetically pleasing
visualization [9], and Intel’s VTune Amplifier is proprietary software used
widely in professional high-performance computing (HPC) settings [10]. These
systems focus on low-level visualizations, such as processor and memory
visualization. Giving high-level (for-loop level) visualizations and
suggestions are beyond the scope of these techniques. We believe that
providing users with more abstract-level visual feedback will help them better
comprehend image processing optimization. Moreover, these techniques target
general programming languages and environments and do not utilize domain
knowledge. Our target domain is image processing, which enables us to provide
domain-specific optimization and visualization.
The HPC community suggested many memory visualization techniques [6] such as
visualization of cache hit and misses [13, 14], dynamic memory allocation
[15], and the complex relationships between memory performance factors [16].
Halide visualization tools highlights computed memory region represented as
image cells in each execution step [11], [12]. Although these techniques are
powerful in visualizing the cache or memory state at one particular moment,
their visualizations are low level, and they tend to express temporal
transitions by continuous animation or not visualizing them at all. This
limits users’ ease of understanding because they still need to observe the
animation and guess what the performance bottleneck is by manually comparing
the source code and the visualization. We envision addressing this issue in
Roly-poly by visualizing the whole image processing pipeline as a single
static image.
### III-B Program Visualization in General
Program visualization maps programs to visual representations by analyzing
source code, executable binaries, and data [17]. Omnicode visualizes the
entire history of all runtime values for all program variables [18]. DejaVu
shows an interactive video-player-like interface to visualize the value
changes of user-selected variables [19]. Hoffswell et al. proposed to embed
runtime value visualization within the text-based code [20]. Projection Boxes
allows on-the-fly customization of visualizing runtime values of expressions
at the code editor cursor [21]. These research focuses on comprehensible
visualization of data structures and variables, and performance visualization
is beyond their scope.
### III-C Program Visualization for Performance Improvement
Few studies have pushed the boundaries and explored program visualizations
aimed at performance improvement. PerformanceHat [22] and Beck et al. [23]
augments the source code with runtime performance traces. Theseus enables
always-on program visualization of call stacks and its interactive exploration
during the web-based application development [1]. Projection Boxes shows
program visualization next to the code and enables its flexible customization
at the programmer’s will [21]. Cilkpride interactively updates the IDE with
outputs of the Cilk performance profiler for parallel programs [2]. Skyline is
a domain-specific IDE for deep neural network training programs that shows
performance predictions and visualizations [24]. In adjacent research areas
such as live coding, live programming, and exploratory programming,
performance visualization is not yet actively investigated [25].
Roly-poly aims to achieve a similar goal as these works but is different for
the following reasons: 1) Existing methods require users to write optimization
code in text editors and provide performance visualization as an editor
extension. Writing performance optimization code on text editors have an
advantage of being highly customizable, but users are not free from making
syntactical mistakes and still need to decide an optimization strategy within
a large space of optimization choices. Roly-poly’s guided optimization
controls the image processing optimization workflow itself, and sequentially
provides a valid set of scheduling choices to users. The optimization choice a
user can make is thus limited to valid schedules, and it is impossible to make
syntactic errors in Roly-poly. 2) Roly-poly provides the performance cost
estimation of each scheduling option, which is the first attempt in
performance visualization literature. The key difference between Roly-poly and
existing systems such as Cilkpride and Skyline is that Roly-poly’s cost does
not show the current schedule’s performance, but it shows the predicted cost
of the entire resulting pipeline. Thus, we believe that Roly-poly’s cost
feedback is more global than existing systems.
### III-D Neural Network Visualization
In the field of machine learning research, several methods have been proposed
to visualize complex neural networks [26, 27, 28, 29, 30]. In contrast to
traditional performance visualization techniques, most neural network
visualization approaches show spatial and temporal information in one image,
thus visualizing the whole pipeline. This approach helps users understand the
overall system instead of one particular moment. These visualizations can be
applied to 2D array computation in general, including our target domain of
image processing pipelines. Inspired by these visualizations, Roly-poly takes
a similar approach. Instead of animating the visualization, we envision
visualizing the whole execution of the image processing pipeline in a single
view.
### III-E Visual Programming Language
Visual programming languages (VPLs) use an interactive and graphical approach
to help users avoid syntactic errors. Agentsheets utilizes a drag-and-drop
mechanism to prevent syntactic mistakes [31]. Alice [32] and Scratch [33] are
block-based VPLs for novice programmers to learn the basic principles of
programming by combining the provided blocks. Weintrop and Wilensky found that
block-based programming tools were easier to use for high school students than
text-based alternatives [34].
Inspired by the prior work on VPLs, Roly-poly offers an interactive block-like
visualization of the execution of the image processing pipeline. Compared with
manual text-based scheduling, we narrow users’ freedom by only providing a set
of choices. However, our design choices are that using visual constraints in
Roly-poly will help users focus only on essential ideas, not on syntactical
mistakes. Also, some VPLs assign colors to categories based on their
functionalities (e.g., control blocks and operators blocks). This inspired
Roly-poly to assign distinguished colors to different functions.
## IV Design and Implementation of Roly-Poly
Figure 4: A snapshot of Roly-poly’s user interface during the scheduling task
of Unsharp Masking (see Algorithm 2). (a) Visualization of tile sizes. Each
tile corresponds to a for-loop block in (c). (b) A dependency graph of the
functions obtained by a static analysis of the algorithm. (c) Schedule section
showing the for-loop blocks of the current schedule. (d) Instruction from the
system. (e) Scheduling cost estimation of possible compute locations.
(a)
(b)
(c)
Figure 5: A snapshot of (a) the compute location selection phase and (b) tile
range selection phase in the Gaussian Blur task. (c) The cost details can be
shown in both phases.
Our proof-of-concept system, Roly-poly, is divided into the front-end and
back-end. The front-end of Roly-poly is implemented as a desktop application
built with Electron111https://www.electronjs.org, which communicates with the
always-on back-end Halide compiler. We utilized the Halide compiler’s program
generation infrastructure for cost estimation and elimination of illegal
schedules. Its program generator supports the essential image processing
optimization methods of tiling and pre-computation.
### IV-A System Overview
Figure 4 shows a screenshot of Roly-poly during the scheduling task of Unsharp
Masking (see Algorithm 2). Section (a) shows a visualization of the tile
sizes. Section (b) shows a dependency graph of the functions obtained by a
static analysis of the algorithm. This is an automatically generated graph
representing the functional dependencies, which is the same concept as in
Figure 3. It updates the currently scheduled function with a red background
(ratio is highlighted in Figure 4 (b)). This dependency graph visualization
enables users understand the algorithm dependencies at a glance, without
switching back and forth between the source code and schedule views.
Section (c) shows a for-loop representation of the current schedule. Each for-
loop block corresponds to a tile size visualization in section (a). Section
(d) gives instructions for what users should do next. In the instructions, the
currently scheduled function is highlighted in red (ratio is highlighted in
this case). Section (e) shows a scheduling cost estimation by the compiler. It
is important to note that these costs are just “estimates” and do not always
match with the actual performance. So, the users still need to experiment with
various schedules to find optimal schedule, using these cost estimation as a
hint.
### IV-B Guided Optimization
Guided optimization is a semi-automatic method that assists manual scheduling.
Roly-poly provides step-by-step instructions to a user with a set of valid
options. Users can experiment with various “valid” scheduling possibilities
just by selecting options presented by the system.
As we explained in the earlier section, the key factors to consider in image
processing optimization are tiling and compute location. There are two
scheduling phases in this system to support them. The compute location
selection phase asks users to choose the function’s compute location (see
Figure 5(a)), and the tile range selection phase allows them to choose or type
the tile ranges (see Figure 5(b)). The system can only be one of these two
phases. Users follow the system’s instructions and keep choosing from the
suggestions until the scheduling of all functions has been completed.
Users start scheduling an output function (e.g., blur in Algorithm 1 and
unsharp in Algorithm 2) and continue scheduling functions following an inverse
topological order from the output to input (e.g., input in Algorithm 1 and 2).
For each function, users select a compute location and a tile range. When
tiling does not apply to a function, the system skips the tiling phase.
#### IV-B1 Compute location selection phase
The schedule section (Figure 4 (c,e) and Figure 5(a)) shows a for-loop block
of the current schedule. In the compute location selection phase, users choose
the function’s compute location by clicking an arrow on the right side. If a
user clicks Cost 3 in Figure 5(a), the system communicates with the Halide
compiler and schedules Func sharpen between first and the second inner-most
for-loop block in Figure 5(a). Tile sizes of for-loop blocks in (c) is
visualized in (a). The cost of each compute location is shown on the right
side.
#### IV-B2 Tile range selection phase
In the tile range selection phase, users choose a function’s tile range, as
shown in Figure 5(b). Users either click the tile range suggestion or enter
the custom tile range in the input box. The estimated cost of each tile range
is shown on the right side. The tile range panel is hidden in the compute
location selection phase, and it appears in the tile range selection phase.
Each function is initially scheduled to be computed by two-fold for-loops, an
external loop and a vectorized inner loop. The external loop is further
divided into outer external loop and inner external loop. The tile range
selection phase lets the user specify how to divide the external loop into the
two loops. The user specifies the tile range of the outer loop and the system
automatically computes the tile range of the inner loop. We made a design
choice to let users select the tile ranges instead of letting them directly
select the tile sizes, because it is more intuitive for novice Halide
programmers to specify the ranges of for-loop than defining the unfamiliar
concept of tile sizes.
The system enumerates multiples of four for width and height to suggest tile
ranges. It generates (tile_size_width_of_a_parent/4) $\times$
(tile_size_height_of_a_parent/4) number of tile ranges in total and calculates
the estimated cost for each one. Then, the system sorts them in cost ascending
order (the lowest cost first) and suggests the top five tile ranges. We
empirically found that users often do not look at suggestions below the fifth
one because they prefer entering a custom tile range to scrolling through too
many options to explore their schedules.
#### IV-B3 Visualization
As users change the schedule, the visualization panel (a) is updated to
reflect the current schedule. It visualizes the tile size of each for-loop
block in the schedule section (c). Each function is assigned a color that is
consistent throughout the scheduling process and in the visualization (see
Figure 4 (a)).
We divide the parent’s tile or image size by the children’s tile range to
obtain the children’s tile size. For example, the image size is
2560$\times$1600 in Figure 4. The range of the for-loop block #1 is
(0$\ldots$3)$\times$(0$\ldots$51), so the tile size of tile #1 becomes
640$\times$31 (x: 2560/4 = 640, y: 1600/52 $\approx$ 31). Similarly, the tile
size of tile #2 is 32$\times$1 (640/20 = 32, 31/31 = 1).
Tiles with parallel are automatically parallelized. Tiles with vectorized and
the corresponding for-loop block are the innermost for-loop and they are
automatically vectorized to use SIMD. Parallelization and vectorization are
done by the compiler when applicable and users do not need to specify them.
The system uses the Snap.svg JavaScript SVG library to render each tile.
#### IV-B4 Cost Estimation
Roly-poly uses a cost model generated by backend Halide compiler to
interactively estimate the performance characteristics of different choices.
Guided optimization guides users to schedule functions one by one, and the
cost of not yet scheduled functions are set default to the cost of inline
schedule. The estimated total cost and cost details are shown in both the
compute location selection phase and the tile range selection phase. It also
shows the estimated cost of the current schedule below the instruction section
(see Figure 4 (d)). The estimated total cost is calculated by many internal
parameters, and three main parameters are shown. The load cost is a cost of
loading from memory, the store cost is a cost of storing to the memory, and
the compute cost is a cost of CPU computation.
### IV-C Usage Scenario
We will explain the scheduling flow step-by-step, taking an example of one
particular scheduling flow in a Gaussian Blur optimization task (see Algorithm
1). Suppose that a programmer called Sofia is optimizing a Gaussian Blur using
Roly-poly.
She first loads an algorithm file into the system. The system analyzes the
algorithm, creates a default schedule, and presents an initial user interface.
Note that users do not need to manually write any scheduling code before and
throughout the scheduling process. The system then gives the first instruction
“Choose or type the tile range of Func blur.” She notices “Func blur” in the
instruction and in the dependency graph are highlighted in red. She then
understands that she needs to choose the tile range for the highlighted
function. In the bottom right of the UI, she sees five buttons with x, y, and
two numbers. Those buttons are highlighted in yellow when she mouse-overs
them, so she notices that these are clickable. She also notices that “Cost:”
and numbers are shown on the right side of buttons. She thinks that a lower
cost indicates a better runtime, but she wants to try a slightly larger tiling
size as an experiment, so she chooses the second top tile size with “Cost: 9.”
The instruction and the tile range suggestion in this stage are shown in
Figure 5(b).
After clicking the tile range, the system gives a new instruction “Choose the
compute location of Func blur_y.” She notices that the highlight of a function
dependency graph changed to blur_y. She mouse-overs the arrows on the right
side of scheduling section, noticing that those are buttons and are clickable.
She understands that the tile size of this for-loop block is shown on the
left, in the visualization. Then, she explores the system and compares the
costs and decides to choose an arrow with cost 15 because she wants to compute
blur_y in the outer loop. The actual schedule section in this stage is shown
in Figure 5(a).
After she clicks the button, the instruction tells her to “Choose the compute
location of Func bounded.” She compares the costs and tile sizes in
visualization, and chooses the third arrow. After that, the instruction says,
“Choose a compute location of Func kernel.” She chooses the first arrow
because she wants to pre-compute kernel before the other for-loops. Finally,
she chooses Func kernel’s tile range in response to an instruction “Choose or
type the tile range of Func kernel.” After that, she notices that the
scheduling is completed because the instruction says “Done!”
## V User Study
We conducted a user study with novice Halide programmers to compare the
effectiveness of Roly-poly and the manual scheduling operation.
### V-A Procedure
Var x, y, c;
Func kernel, bounded, gray, blur_y, blur, sharpen, ratio, unsharp;
kernel(x) = exp(-x$\ast$x /(2 $\ast$ sigma $\ast$ sigma)) /
(sqrtf(2 $\ast$ M_PI) $\ast$ sigma);
bounded = BoundaryConditions::repeat_edge(input);
gray(x, y) = 0.299f $\ast$ bounded(x, y, 0) +
0.587f $\ast$ bounded(x, y, 1) +
0.114f $\ast$ bounded(x, y, 2);
blur_y(x, y) = (kernel(0) $\ast$ gray(x, y) +
kernel(1) $\ast$ (gray(x, y-1) + gray(x, y+1)) +
kernel(2) $\ast$ (gray(x, y-2) + gray(x, y+2)) +
kernel(3) $\ast$ (gray(x, y-3) + gray(x, y+3)));
blur(x, y) = (kernel(0) $\ast$ blur_y(x , y) +
kernel(1) $\ast$ (blur_y(x-1, y) + blur_y(x+1, y)) +
kernel(2) $\ast$ (blur_y(x-2, y) + blur_y(x+2, y)) +
kernel(3) $\ast$ (blur_y(x-3, y) + blur_y(x+3, y)));
sharpen(x, y) = 2 $\ast$ gray(x, y) - blur(x, y);
ratio(x, y) = sharpen(x, y) / gray(x, y);
unsharp(x, y, c) = ratio(x, y) $\ast$ input(x, y, c);
Algorithm 2: Unsharp Masking algorithm written in Halide.
We asked 10 participants (P1, P2, $\cdots$, P10) to perform the Unsharp
Masking scheduling task with Roly-poly and manual scheduling in a within-
subjects design. Participants had eight years of programming experience on
average. All participants had professional programming experience in image
processing for commercial and research purposes. All participants had no
previous experience with the Halide programming language and none of them
participated in the expert interview (Section II-B).
Each participant was invited to a 60-minute session. We conducted all of our
studies online using Chrome Remote Desktop. We first gave 20-minute tutorials
on the basic concepts of image processing in Halide. The introduction covered
the content of Section II which we presented earlier, such as to consider the
cache locality and to avoid redundant computation. We provided the Unsharp
Masking algorithm, as shown in Algorithm 2, and asked participants to write
schedules and optimize its runtime as much as possible within 15 minutes. For
each task, half of the participants were asked to perform the scheduling with
Roly-poly first, and the other half were asked to perform scheduling manually
first. In the manual scheduling task, we provided an example code of two
methods (compute_at(...) for pre-computing a function and tile(...) for tiling
a function) and allowed them to browse the Halide tutorial if they wanted.
After the scheduling session, we spent 10 minutes giving them a questionnaire
and a semi-structured interview. We recorded their manipulation process and
analyzed it afterward.
Figure 7: A box and whisker plot showing the distribution of the best runtime
of unsharp masking by participants with manual and Roly-poly scheduling, the
best runtime from expert interview (see Section II-B), runtime from the auto-
scheduler, and runtime of the default inline schedule. Figure 8: The results
of user study questionnaire.
### V-B Overview of Results
Figure 7 is a box and whisker plot showing the distribution of the best
runtime of unsharp masking by participants with manual and Roly-poly
scheduling, the best runtime from expert interview (Section II-B), runtime
from the auto-scheduler [5], and runtime of the default inline schedule.
Halide provides the default inlining schedule for algorithms without any user-
specified schedule, and the runtime of the Unsharp Masking default schedule
was 128 ms. From the user study, five participants could not write any faster
code than the default schedule with manual, and all participants achieved
better runtime with Roly-poly than with manual. The average runtime of the
unsharp masking with Roly-poly was 16.5 ms, and the average runtime with
manual was 82 ms. The best runtime from expert interview was 9.8ms and runtime
from the auto-scheduler was 12.7 ms. Thus the result was better in the order
of expert, auto-scheduler, Roly-poly, manual, and default. This result
supports our initial motivation that the expert’s manually scheduled runtime
is faster than auto-scheduler’s. Moreover, while novices were not quite able
to beat the auto-scheduler in their first 15 minutes with Roly-poly, they
already come surprisingly close, while their results with manual scheduling
are several times slower.
We analyzed the recording video to understand the challenges faced by
participants on manual scheduling. We found that six participants spent most
of their time becoming familiar with Halide scheduling syntax, such as how
each schedule function take different arguments. Four participants quickly
understood the syntax and spent their time figuring out good schedules by
trying different schedules.
Figure 8 shows the post-study questionnaire results. All participants answered
that they were able to schedule more efficiently with Roly-poly. Nine
participants answered that they could better explore schedules with Roly-poly.
Nine participants answered that they could learn more about optimization with
Roly-poly. All participants answered that they would recommend Roly-poly to
other novice Halide programmers over the manual scheduling.
Below are the results of semi-structured interviews. All participants stated
that they found manual scheduling challenging, reasoning that the search space
was too large, or they felt the effect of each method was a black box. P5, P7,
and P9 gave overall comments on their experience.
* •
P9: I prefer this tool (Roly-poly) more as a Halide scheduling beginner, as it
does a lot of hand-holding for people who haven’t done scheduling before. The
concept and effect of the scheduling methods (e.g., tile size, compute
location) were clearly visualized and provided a more intuitive explanation to
learn about scheduling.
* •
P5: I was not familiar with typical code structures in image processing
optimization nor Halide syntax, and Roly-Poly as a visual programming tool
helped me in overcoming these obstacles.
* •
P7: It was difficult to understand how the manual scheduling works because the
search space was too large, and I couldn’t find out which function I should
have tiled or set compute location to. In the end, it kind of got faster by
trying out some methods, but I didn’t understand at all how it got faster.
### V-C Guided Optimization
All participants said that the guided optimization features were especially
useful in Roly-poly. In particular, P9 and P6 said that the features of
sequentially scheduling functions and the instruction telling the next step
were useful.
* •
P9: Guided optimization gave me a clear idea of which function should be
scheduled in what order and prevents a lot of potential errors from happening.
* •
P6: Guided optimization helped me build a step-by-step strategy for
optimization. Necessary information were displayed at the right time of the
optimization step.
P7 and P10 said that the guided optimization feature of selecting a schedule
from valid options was useful because they did not have to understand the
Halide syntax and the details of image processing optimization.
* •
P7: For novice users like myself, limiting the search space to valid choices
was more understandable.
* •
P10: Roly-poly was a better starting point for image processing optimization
as I didn’t need to fully understand the Halide language syntax. The
optimization process was self-contained within a GUI.
P1 and P6 said that Roly-poly was useful because it gave them faster and
interactive feedback, which enabled them to explore more schedules.
* •
P1: Roly-Poly gave me faster and more interactive feedback, so I had more time
to do trial-and-error within the time limit, which helped me better understand
the scheduling as a result.
* •
P6: I had to go back and forth between the tutorial and code with manual
scheduling, which took me a while to experiment. Roly-poly made it easy to do
what I wanted to do and especially made it easier to explore.
However, on a more negative note, P3 mentioned that it was “too kind” and that
it might prevent users from learning. Also, P5 mentioned that if he was not a
novice he would prefer using the manual scheduling, even though he found that
Roly-poly was useful as a beginner.
* •
P3: When we consider teaching or learning the optimization in Halide, I think
Roly-Poly is ‘too kind’ for users (annoying things, which is important for
programming in many cases, are almost completely hidden!). For example, I
encountered compile errors when I tried manual scheduling. However, Roly-Poly
hides such errors (it doesn’t allow me to choose invalid compute location),
and this would prevent users from learning things such as ‘Why is this compute
location invalid?’
* •
P5: Roly-Poly enables a more friendly way to explore arguments for me, but
just in a subspace of the scheduling space. If I am not a novice, maybe I will
prefer to use manual scheduling.
### V-D Cost Estimation
Eight participants said that the cost estimation helped them select schedules
from valid options, because it helped them narrow down the optimization space
and made it easier to understand the relationship between scheduling methods
and the resulting optimization.
* •
P1: The cost estimation was really informative and helpful to make decisions
on scheduling. I could understand which choice I should make at each step.
* •
P7: Roly-poly showed costs in detail, showing total costs, memory costs, and
compute costs. I could prioritize regarding each details.
P9, however, added that the cost could be deceiving.
* •
P9: Cost estimation was useful but could be deceiving. It provides you with
‘probably good’ guesses that basically avoid irrational choices, but it also
discourage the user from exploring other options which could lead to a
potentially better solution.
This comment provided the insight that the cost suggestion might prevent users
from exploring the scheduling space freely and deepening their understanding
of scheduling strategies when they just follow the best cost estimation.
### V-E Visualization
Participants found that the visualization of tile sizes was useful, because it
gave a meaning to for-loop blocks. P3 and P9 mentioned that the visualization
helped them comprehend the one to one correspondence of for-loop blocks and
tile sizes. P7 mentioned that the visualization made the compute location
selection phase clearer.
* •
P3: I understood from the visualization that the input image was split into
multiple tiles and each tile is also split into multiple sub-tiles. The
visualization also told me how functions were executed by step-by-step
execution procedure.
* •
P9: Associating the visualization result (tile sizes) with the for-loop block
and showing them in the same row gave me an intuitive idea on how each
decision affected the scheduling process.
* •
P7: It was clear from the arrow and the dashed line that I can click the arrow
and execute the current Func between for-loop blocks.
However, P6 found that the visualization was hard to grasp at a glance.
* •
P6: Visualization was helpful when I examined closely, but when the scheduling
pipeline became more complex, it displayed too much information on the screen
and it was slightly difficult to keep track of each tile size.
## VI Discussion and Future Work
We learned from the user study that cost suggestions might lead users to
blindly follow the best cost without understanding why. It is necessary to
assess this effect by conducting a user study with and without the cost
suggestion and identify the best way to present a cost to foster users’
understanding. For example, showing the cost at first and hiding it after
several attempts might help users’ understanding.
We utilized the Halide compiler’s program generator to generate valid schedule
options. This approach has the advantage that we can show the estimated cost,
but it has the disadvantage of limiting the user’s search space to that of
program generator’s. Although the key optimization methods of tiling and pre-
computation are supported, advanced methods such as fusing and cloning are not
supported by the program generator. Moreover, Roly-poly guides users through
the functions sequentially, which forces users to schedule functions in a
given order. We plan to investigate whether it is useful to give users the
freedom to choose the order of functions to schedule, or whether it is too
much detail.
Roly-poly’s guided optimization and the visualization can be ported to other
algorithm-schedule decoupled languages such as Taichi [35] and Tiramisu [36]
by writing schedule generators for them. One area of future work that Roly-
poly has inspired is to create a guided optimization system for these
languages and also for different application domains, such as optimization for
machine learning.
## VII Conclusion
We presented an interactive scheduling system that features guided
optimization as well as cost estimation and program visualization. Guided
optimization lets users select tile ranges and compute locations from valid
choices step-by-step and provides interactive feedback of the current
schedule, thereby helping Halide programmers achieve good performance. We
conducted a user study to assess the effectiveness and limitations of Roly-
poly by recruiting novice Halide programmers. All participants preferred Roly-
poly to manual when it came to optimization efficiency and learning, and many
of them appreciated the guided optimization features. Cost estimation received
mixed feedback, and we suggested some possible research directions for further
investigation. We hope that Roly-poly encourages further development of
interactive scheduling systems in the future.
## Acknowledgments
This work was supported by JSPS KAKENHI Grant Number JP19K20316 and JST CREST
Grant Number JPMJCR20D4, Japan.
## References
* [1] T. Lieber, J. R. Brandt, and R. C. Miller, “Addressing misconceptions about code with always-on programming visualizations,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York, NY, USA, Apr. 2014, pp. 2481–2490, doi: 10.1145/2556288.2557409.
* [2] G. Chau, “Cilkpride: Always-on Visualizations for Parallel Programming,” Master thesis, Massachusetts Institute of Technology, 2017.
* [3] J. Ragan-Kelley, A. Adams, S. Paris, M. Levoy, S. Amarasinghe, and F. Durand, “Decoupling algorithms from schedules for easy optimization of image processing pipelines,” ACM Trans. Graph., vol. 31, no. 4, p. 32:1-32:12, Jul. 2012, doi: 10.1145/2185520.2185528.
* [4] J. Ragan-Kelley, C. Barnes, A. Adams, S. Paris, F. Durand, and S. Amarasinghe, “Halide: a language and compiler for optimizing parallelism, locality, and recomputation in image processing pipelines,” in Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, New York, NY, USA, Jun. 2013, pp. 519–530, doi: 10.1145/2491956.2462176.
* [5] A. Adams et al., “Learning to optimize halide with tree search and random programs,” ACM Trans. Graph., vol. 38, no. 4, p. 121:1-121:12, Jul. 2019, doi: 10.1145/3306346.3322967.
* [6] K. E. Isaacs et al., “State of the Art of Performance Visualization,” 2014, doi: 10.2312/eurovisstar.20141177.
* [7] J. Weidendorfer, “Sequential Performance Analysis with Callgrind and KCachegrind,” in Tools for High Performance Computing, Berlin, Heidelberg, 2008, pp. 93–113, doi: 10.1007/978-3-540-68564-7_7.
* [8] “Tutorial - Perf Wiki.” https://perf.wiki.kernel.org/index.php/Tutorial (accessed Apr. 20, 2021).
* [9] S. L. Graham, P. B. Kessler, and M. K. Mckusick, “Gprof: A call graph execution profiler,” SIGPLAN Not., vol. 17, no. 6, pp. 120–126, Jun. 1982, doi: 10.1145/872726.806987.
* [10] “Fix Performance Bottlenecks with Intel® VTune™ Profiler,” Intel. https://www.intel.com/content/www/us/en/develop/tools/oneapi/ components/vtune-profiler.html (accessed Apr. 20, 2021).
* [11] J. Knezevic, “Schedule Visualization and Analysis for Halide Image Processing Language,” Master thesis, Massachusetts Institute of Technology, 2013.
* [12] “HalideTraceViz,” https://github.com/halide/Halide/blob/master/util/ HalideTraceViz.cpp (accessed Apr. 20, 2021).
* [13] A. N. M. I. Choudhury, K. C. Potter, and S. G. Parker, “Interactive visualization for memory reference traces,” in Proceedings of the 10th Joint Eurographics / IEEE - VGTC conference on Visualization, Chichester, GBR, May 2008, pp. 815–822, doi: 10.1111/j.1467-8659.2008.01212.x.
* [14] A. N. M. I. Choudhury and P. Rosen, “Abstract visualization of runtime memory behavior,” in 2011 6th International Workshop on Visualizing Software for Understanding and Analysis (VISSOFT), Sep. 2011, pp. 1–8, doi: 10.1109/VISSOF.2011.6069452.
* [15] S. Moreta and A. Telea, “Visualizing Dynamic Memory Allocations,” in 2007 4th IEEE International Workshop on Visualizing Software for Understanding and Analysis, Jun. 2007, pp. 31–38, doi: 10.1109/VISSOF.2007.4290697.
* [16] A. Giménez et al., “MemAxes: Visualization and Analytics for Characterizing Complex Memory Performance Behaviors,” IEEE Transactions on Visualization and Computer Graphics, 2018, doi: 10.1109/TVCG.2017.2718532.
* [17] G.- Roman and K. C. Cox, “Program visualization: the art of mapping programs to pictures,” in International Conference on Software Engineering, May 1992, pp. 412–420, doi: 10.1145/143062.143157.
* [18] H. Kang and P. J. Guo, “Omnicode: A Novice-Oriented Live Programming Environment with Always-On Run-Time Value Visualizations,” in Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology, New York, NY, USA, Oct. 2017, pp. 737–745, doi: 10.1145/3126594.3126632.
* [19] J. Kato, S. McDirmid, and X. Cao, “DejaVu: integrated support for developing interactive camera-based programs,” in Proceedings of the 25th annual ACM symposium on User interface software and technology, New York, NY, USA, Oct. 2012, pp. 189–196, doi: 10.1145/2380116.2380142.
* [20] J. Hoffswell, A. Satyanarayan, and J. Heer, “Augmenting Code with In Situ Visualizations to Aid Program Understanding,” in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, New York, NY, USA, Apr. 2018, pp. 1–12, doi: 10.1145/3173574.3174106.
* [21] S. Lerner, “Projection Boxes: On-the-fly Reconfigurable Visualization for Live Programming,” in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, New York, NY, USA, Apr. 2020, pp. 1–7, doi: 10.1145/3313831.3376494.
* [22] J. Cito, P. Leitner, C. Bosshard, M. Knecht, G. Mazlami, and H. C. Gall, “PerformanceHat: augmenting source code with runtime performance traces in the IDE,” in Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, New York, NY, USA, May 2018, pp. 41–44, doi: 10.1145/3183440.3183481.
* [23] F. Beck, O. Moseler, S. Diehl, and G. D. Rey, “In situ understanding of performance bottlenecks through visually augmented code,” in 2013 21st International Conference on Program Comprehension (ICPC), May 2013, pp. 63–72, doi: 10.1109/ICPC.2013.6613834.
* [24] G. X. Yu, T. Grossman, and G. Pekhimenko, “Skyline: Interactive In-Editor Computational Performance Profiling for Deep Neural Network Training,” in Proceedings of the 33rd Annual ACM Symposium on User Interface Software and Technology, New York, NY, USA, Oct. 2020, pp. 126–139, doi: 10.1145/3379337.3415890.
* [25] P. Rein, S. Ramson, J. Lincke, R. Hirschfeld, and T. Pape, Exploratory and Live, Programming and Coding: A Literature Study Comparing Perspectives on Liveness, vol. 3. 2018.
* [26] W. Abdulla and P. Ferriere, “Hiddenlayer,” https://github.com/waleedka/hiddenlayer (accessed Apr. 20, 2021).
* [27] H. Iqbal, “PlotNeuralNet,” https://github.com/HarisIqbal88/PlotNeuralNet (accessed Apr. 20, 2021).
* [28] “NN-SVG.” https://alexlenail.me/NN-SVG/ (accessed Apr. 20, 2021).
* [29] “TensorSpace.js.” https://tensorspace.org/ (accessed Apr. 20, 2021).
* [30] K. Wongsuphasawat et al., “Visualizing Dataflow Graphs of Deep Learning Models in TensorFlow,” IEEE Transactions on Visualization and Computer Graphics, vol. 24, no. 1, pp. 1–12, Jan. 2018, doi: 10.1109/TVCG.2017.2744878.
* [31] A. Repenning, A. Ioannidou, and J. Zola, “AgentSheets: End-User Programmable Simulations.,” J. Artificial Societies and Social Simulation, vol. 3, Jun. 2000.
* [32] S. Cooper, W. Dann, and R. Pausch, “Alice: a 3-D tool for introductory programming concepts,” J. Comput. Sci. Coll., vol. 15, no. 5, pp. 107–116, Apr. 2000.
* [33] M. Resnick et al., “Scratch: programming for all,” Commun. ACM, vol. 52, no. 11, pp. 60–67, Nov. 2009, doi: 10.1145/1592761.1592779.
* [34] D. Weintrop and U. Wilensky, “To block or not to block, that is the question: students’ perceptions of blocks-based programming,” in Proceedings of the 14th International Conference on Interaction Design and Children, New York, NY, USA, Jun. 2015, pp. 199–208, doi: 10.1145/2771839.2771860.
* [35] Y. Hu, T.-M. Li, L. Anderson, J. Ragan-Kelley, and F. Durand, “Taichi: a language for high-performance computation on spatially sparse data structures,” ACM Trans. Graph., vol. 38, no. 6, p. 201:1-201:16, Nov. 2019, doi: 10.1145/3355089.3356506.
* [36] R. Baghdadi et al., “Tiramisu: A Polyhedral Compiler for Expressing Fast and Portable Code,” arXiv:1804.10694 [cs], Dec. 2018, Accessed: Apr. 20, 2021. [Online]. Available: http://arxiv.org/abs/1804.10694.
| arxiv-papers | 2021-07-27T03:02:17 | 2024-09-04T03:07:20.428721 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Yuka Ikarashi, Jonathan Ragan-Kelley, Tsukasa Fukusato, Jun Kato,\n Takeo Igarashi",
"submitter": "Yuka Ikarashi",
"url": "https://arxiv.org/abs/2107.12567"
} |
2107.12568 | # Version Space Algebras are Acyclic Tree Automata
James Koppel MITCambridgeMAUSA [email protected]
###### Abstract.
Version space algebras are ways of representing spaces of programs which can
be combined using union, intersection, and cross-product/“join" operators. In
their reified form as ASTs with explicit union and join nodes, they have the
ability to compactly represent exponentially-large spaces of programs, owing
to which they have become become the most popular approach to enumerative
program synthesis since the introduction of FlashFill in 2010. We present a
linear-time semantics-preserving constructive embedding from version space
algebras into nondeterministic finite tree automata, showing that the former
are but a special case of the latter. Combined with recent results finding a
correspondence between e-graphs and minimal deterministic tree automata, this
shows that tree automata are strict generalizations of all recent major
approaches to efficiently representing large spaces of programs by sharing.
synthesis e-graphs tree-automata
††conference: ; ; ††copyright: rightsretained
## 1\. Introduction
Enumerative program synthesis is the technique of listing a large number of
programs and choosing the best one; deductive program synthesis is the process
of starting with description and finding the right set of rewrites to
transform it into the desired program. Since there can be exponentially many
terms and rewrite sequences of a given size, both are greatly aided by compact
representations of large spaces of terms.
In the past decade, two approaches have gained great popularity for solving
this problem, version space algebras (VSAs) and equivalence graphs (e-graphs),
with the latter also being applied to semantic code search (Premtoon et al.,
2020) and equivalence-checking (Alet et al., 2021; Stepp et al., 2011). More
recently, Wang (Wang et al., 2017) applied a third and very old data structure
to the same problem of representing spaces of terms: tree automata.
We give an example of each. Consider representing the set of $9$ terms
$\mathcal{T}=\\{f(g(X),g(Y))\\}$, where $X,Y\in\\{a,b,c\\}$. Fig. 1 gives the
e-graph, VSA, and tree automaton representing this set.
But the similarity between the three is striking, and they all appear to
function by sharing subterms in the same way. Though works involving VSAs,
e-graphs, and tree automata typically construct and use them very differently,
their representational capabilities appear quite similar.
In fact, we shall see that their capabilities are not only similar but
identical, with tree automata being strict generalizations of the other two,
which correspond to restricted forms of tree automata. Pollock and Haan
(Pollock and Haan, 2021) provided half this story in a recent write-up,
showing that e-graphs are isomorphic to minimal determinstic finite tree
automata (minimal DFTAs), with the well-known congruence-closure algorithm
used in e-graph maintenance being equivalent to tree-automata minimization. In
this short paper, we show the other half, that version space algebra
correspond to acyclic nondeterministic tree automata.
(a) E-graph
(b) Version-space algebra
(c) Tree automaton. Rectangles represent transitions.
Figure 1.
There has been foreshadowing in the literature of a connection between VSAs
and automata. The FlashFill paper (Gulwani, 2011), which sparked the wave of
synthesis papers based on version-space algebras, featured an intersection
algorithm for associative VSAs immediately noted to be similar to the
intersection of string automata. Correspondences between schemes for sharing
substructure and automata go at least back to the discovery of the
correspondence between binary decision diagrams and string automata (Michon
and Champarnaud, 1998). Yet, though the similarities between VSAs and tree
automata may be obvious to one who digests Fig. 1, this paper appears to be
the first to state it publicly and give a formal correspondence.
## 2\. Preliminaries
We now present formal definitions of both version space algebras and tree
automata. In both developments, we shall use $\Sigma$ to denote a signature, a
set of symbols. Both VSAs and tree automata represent sets of terms over a
given signature $\Sigma$. We do not formally restrict symbols to be of a given
arity. We shall also provide a normalized form of version space algebras which
makes their correspondence with tree automata particularly simple.
### 2.1. Version Space Algebra
Abstractly speaking, a version space algebra (VSA) is a space of programs
equipped with union, intersection, and independent join operators. (Lau et
al., 2003) In the past decade however, they have become synonymous with their
typical concrete representation as ASTs augmented with explicit union and join
nodes, used for compactly storing large spaces of programs in enumerative
synthesis. In this form, they can be considered the general version of
searching program spaces by dynamic programming, as they achieve their
efficiency by sharing common subterms of programs within the space. The
FlashMeta/PROSE paper (Polozov and Gulwani, 2015) is the definitive work for
VSAs as currently used; we replicate their formalism in brief here.
###### Definition 2.1 (Version space algebra (Orthodox definition)).
Let $N$ be a symbol in a signature $\Sigma$. A _version space algebra_ over
$\Sigma$ is a representation for a set $\widetilde{N}$ of terms rooted at $N$.
The grammar of VSAs is:
$\displaystyle\widetilde{N}\;:=\;\left\\{P_{1},\dots,P_{k}\right\\}\;|\;\boldsymbol{\mathsf{U}}(\widetilde{N}_{1},\dots,\widetilde{N}_{k})\;|\;F_{\text{\tiny\Bowtie}}(\widetilde{N}_{1},\dots,\widetilde{N}_{k})$
where $F$ is any $k$-ary node in $\Sigma$, and $P_{j}$ are terms generated by
signature $\Sigma$. The semantics of a VSA as a set of programs is given as
follows:
$\displaystyle\llbracket\left\\{P_{1},\dots,P_{k}\right\\}\rrbracket^{\textsc{VSA}}$
$\displaystyle=$ $\displaystyle\left\\{P_{1},\dots,P_{k}\right\\}$
$\displaystyle\llbracket\boldsymbol{\mathsf{U}}(\widetilde{N}_{1},\dots,\widetilde{N}_{k})\rrbracket^{\textsc{VSA}}$
$\displaystyle=$
$\displaystyle\bigcup_{i=1}^{k}\llbracket\widetilde{N}_{i}\rrbracket^{\textsc{VSA}}$
$\displaystyle\llbracket
F_{\text{\tiny\Bowtie}}(\widetilde{N}_{1},\dots,\widetilde{N}_{k})\rrbracket^{\textsc{VSA}}$
$\displaystyle=$
$\displaystyle\left\\{F(P_{1},\dots,P_{k})\mathrel{\big{|}}P_{i}\in\llbracket\widetilde{N}_{i}\rrbracket^{\textsc{VSA}}\right\\}$
While syntactically represented as trees, VSAs are treated as DAGs by
automatically sharing all identical subterms. The requirement that all
duplicate nodes are shared, while semantically unnecessary, becomes quite
important when analyzing the embedding into tree automata. We hence modify our
presentations to annotate every distinct $\boldsymbol{\mathsf{U}}$ and
$F_{\text{\tiny\Bowtie}}$ node with a unique explicit label $l$. The VSA must
satisfy the uniqueness property that no two distinct nodes may have the same
children. Further, we shall henceforth assume that these are the only two node
types in a VSA:
###### Observation 1.
If a language has a finite set of constructors and constants, then the set
nodes of VSAs are redundant. All program sets can be expressed using union and
join nodes, e.g.: $\left\\{f(A,g(B)),g(C)\right\\}$ can be represented
$\boldsymbol{\mathsf{U}}(f(A(),g(B())),g(C()))$, treating $A,B$, and $C$ as
nullary constructors.
Finally, note that any join node
$F_{\text{\tiny\Bowtie}}(\widetilde{N}_{1},\dots,\widetilde{N}_{k})$ can be
replaced with a unary union node, namely
$\boldsymbol{\mathsf{U}}(F_{\text{\tiny\Bowtie}}(\widetilde{N}_{1},\dots,\widetilde{N}_{k}))$.
Combining these observations, we can thus transform any VSA to be composed of
strictly-alternating layers of union and join nodes. We use the symbol
$\mathbb{P}(\widetilde{N})$ (i.e.: sets of VSAs) to represent the union-node
layers. Here is a definition for these normalized VSAs; the semantics are the
same as in orthodox VSAs.
###### Definition 2.2 (Version space algebra (Normalized definition)).
A _normalized version space algebra_ is a representation for a set
$\widetilde{N}$ of terms. The grammar of normalized VSAs is:
$\displaystyle\widetilde{N}$
$\displaystyle\;:=\;F_{\text{\tiny\Bowtie}}^{l}(\mathbb{P}(\widetilde{N})_{1},\dots,\mathbb{P}(\widetilde{N})_{k})$
$\displaystyle\mathbb{P}(\widetilde{N})$
$\displaystyle\;:=\;\boldsymbol{\mathsf{U}}^{l}(\widetilde{N}_{1},\dots,\widetilde{N}_{k})$
### 2.2. Tree Automata
Tree automata are generalizations of ordinary string automata to trees. Tree
automata consume a tree bottom-to-top, associating a state with every node,
choosing the state for each node based on the states of its children. When
every node is unary except for a special “start" symbol, they behave
identically to string automata. Tree automata can both be considered
operationally, as a machine that inputs a tree over a signature $\Sigma$ and
outputs “accept" or “reject," and denotationally, as a representation of a set
(or language) of trees. The definitive treatment of tree automata is Comon
(Comon, 1997).
We present our definition below, along with that of the denotation of a tree
automaton:
###### Definition 2.3 ((Bottom-up) Nondeterministic Finite Tree Automata
(NFTA)).
A (bottom-up) finite tree automaton over signature $\Sigma$ is a tuple
$\mathcal{A}=(\mathcal{Q},\Sigma,\mathcal{Q}_{f},\Delta)$ where $\mathcal{Q}$
is a set of states, $\mathcal{Q}_{f}\subset\mathcal{Q}$ is a set of final
states, and $\Delta\subseteq\Sigma\times\mathcal{Q}^{*}\times\mathcal{Q}$ is a
set of transitions of the form $f(q_{1},\dots,q_{k})\rightarrow q$.
The denotation of a transition and state, both within a larger automaton with
transitions $\Delta$, are given mutually-recursively by:
$\displaystyle\llbracket q\rrbracket^{\textsf{TA}}_{\Delta}$ $\displaystyle=$
$\displaystyle\bigcup\left\\{\llbracket F(q_{1},\dots,q_{k})\rightarrow
q\rrbracket^{\textsf{TA}}_{\Delta}\mathrel{\big{|}}(F(q_{1},\dots,q_{k})\rightarrow
q)\in\Delta\right\\}$ $\displaystyle\llbracket F(q_{1},\dots,q_{k})\rightarrow
q\rrbracket^{\textsf{TA}}_{\Delta}$ $\displaystyle=$
$\displaystyle\left\\{F(P_{1},\dots,P_{k})\mathrel{\big{|}}P_{i}\in\llbracket
q_{i}\rrbracket^{\textsf{TA}}_{\Delta}\right\\}$
## 3\. Embedding
In this section, we present the embedding of a version space algebras into
tree automaton, and prove that the resulting automaton represents the same set
of terms.
###### Definition 3.1 (Embedding of VSA into TA).
Let $\widetilde{N}$ be a normalized VSA over $\Sigma$. We shall construct a
tree automaton corresponding to $\boldsymbol{\mathsf{U}}^{r}(\widetilde{N})$,
where $r$ is a new “root" label.
Let $\mathsf{subs}(\boldsymbol{\mathsf{U}}^{r}(\widetilde{N}))$ be the set of
subnodes of $\boldsymbol{\mathsf{U}}^{r}(\widetilde{N})$. For each union node
$\boldsymbol{\mathsf{U}}^{l}(\dots)\in\mathsf{subs}(\boldsymbol{\mathsf{U}}^{r}(\widetilde{N}))$,
define the automaton state $q^{l}$. Let the set of all such states be
$\mathcal{Q}$. We define the transitions as
$\Delta=\left\\{F(q^{l_{1}},\dots,q^{l_{k}})\rightarrow
q^{l}\mathrel{\big{|}}\boldsymbol{\mathsf{U}}^{l}(\dots,F_{\text{\tiny\Bowtie}}(\boldsymbol{\mathsf{U}}^{l_{1}}(\dots),\dots,\boldsymbol{\mathsf{U}}^{l_{k}}(\dots)),\dots)\in\mathsf{subs}(F_{\text{\tiny\Bowtie}}^{r}(\widetilde{N}))\right\\}$
Finally, we define
$\displaystyle\mathsf{VSAToTA}(\widetilde{N})=(\mathcal{Q},\Sigma,\left\\{q^{r}\right\\},\Delta)$
Note that the resulting automaton is not necessarily deterministic, as the
same join node may be a child of distinct union nodes. It is, however,
acyclic, as VSAs are acyclic.
###### Remark 1.
The construction of Definition 3.1 creates one transition in the tree
automaton per edge between a join and union in the VSA, and each such
transition may have as children a significant fraction of states in the
automaton. Naively implemented, for a VSA with $V$ nodes and $E$ edges, it is
thus actually $O(VE)$ in time and space, although the number of states and
transitions is still $O(V+E)$. However, this can be accelerated by giving
identity to repeated transitions. That is, given the set of transitions
$F(q_{1},\dots,q_{k})\rightarrow r_{1},\dots,F(q_{1},\dots,q_{k})\rightarrow
r_{m}$
One can represent these by the factored representation
$\delta_{i}=F(q_{1},\dots,q_{k})$ and $\delta_{i}\rightarrow
r_{1},\dots,\delta_{i}\rightarrow r_{m}$, where $i$ is some new label, thus
restoring the implementation to $O(V+E)$ time and space. Graphically, this
appears as multiple states of the tree automaton sharing the same inbound
transitions (hyperedges).
###### Theorem 3.2 (Correctness of Embedding).
$\llbracket\widetilde{N}\rrbracket^{\textsc{VSA}}=\llbracket\mathsf{VSAToTA}(\widetilde{N})\rrbracket^{\textsf{TA}}$
###### Proof.
Let $\mathcal{Q}$ be the states of $\mathsf{VSAToTA}(\widetilde{N})$, with
union nodes $\boldsymbol{\mathsf{U}}^{l}$ corresponding to states $q^{l}$. We
show by mutual induction that
$\llbracket\boldsymbol{\mathsf{U}}^{j}(\dots)\rrbracket^{\textsc{VSA}}=\llbracket
q^{j}\rrbracket^{\textsf{TA}}_{\Delta}$
and that, for any $q$,
$\llbracket
F_{\text{\tiny\Bowtie}}(\boldsymbol{\mathsf{U}}^{i_{1}}(\dots),\dots,F_{\text{\tiny\Bowtie}}(\boldsymbol{\mathsf{U}}^{i_{k}}(\dots))\rrbracket^{\textsc{VSA}}=\llbracket
q^{i}\rrbracket^{\textsf{TA}}_{\Delta}$
The theorem immediately follows.
First, for join nodes:
$\displaystyle\llbracket
F_{\text{\tiny\Bowtie}}(\boldsymbol{\mathsf{U}}^{i_{1}}(\dots),\dots,\boldsymbol{\mathsf{U}}^{i_{k}}(\dots)\rrbracket^{\textsc{VSA}}$
$\displaystyle=\left\\{F(P_{1},\dots,P_{k})\mathrel{\big{|}}P_{j}\in\llbracket\boldsymbol{\mathsf{U}}^{i_{j}}\rrbracket^{\textsc{VSA}}\right\\}$
$\displaystyle=\left\\{F(P_{1},\dots,P_{k})\mathrel{\big{|}}P_{j}\in\llbracket
q^{i_{j}}\rrbracket^{\textsf{TA}}_{\Delta}\right\\}$ $\displaystyle=\llbracket
F(q^{i_{1}},\dots,q^{i_{k}})\rightarrow q\rrbracket^{\textsf{TA}}_{\Delta}$
Now, for union nodes:
$\displaystyle\llbracket\boldsymbol{\mathsf{U}}^{l}(F_{\text{\tiny\Bowtie}}^{i_{1}}(\dots),\dots,F_{\text{\tiny\Bowtie}}^{i_{k}}(\dots))\rrbracket^{\textsc{VSA}}$
$\displaystyle=\bigcup_{j=1}^{k}\llbracket
F^{i_{j}}(\dots)\rrbracket^{\textsc{VSA}}$
$\displaystyle=\bigcup_{j=1}^{k}\llbracket F^{i_{j}}(\dots)\rightarrow
q^{l}\rrbracket^{\textsf{TA}}_{\Delta}$ $\displaystyle=\llbracket
q^{l}\rrbracket^{\textsf{TA}}_{\Delta}$
∎
## 4\. Conclusion
E-graphs became very popular in 2020-2021 with the publication of egg (Willsey
et al., 2021) and a number of deductive synthesis/transformation papers based
on it. By connecting e-graphs to tree automata, Pollock and Haan allowed a
wealth of prior work to be applied to e-graphs. In particular, they solved the
problem of e-graph intersection, making them usable in inductive synthesis.
(Pollock and Haan, 2021)
But, through another lens, they showed that much of the excitement around
e-graphs may be better directed at tree automata. Our work furthers this
story, showing that tree automata were secretly behind another of the past
decade’s great advances in program synthesis, and promising to unite both
communities in continuing to gain new techniques by study of tree automata.
Finally, a word to all data structure designers: if ever you encounter a tree-
like or DAG-like data structure with alternating levels of conjunction-esque
and disjunction-esque nodes, you may be dealing with a tree automaton in
disguise.
## References
* (1)
* Alet et al. (2021) Ferran Alet, Javier Lopez-Contreras, James Koppel, Maxwell Nye, Armando Solar-Lezama, Tomas Lozano-Perez, Leslie Kaelbling, and Joshua Tenenbaum. 2021. A Large-Scale Benchmark for Few-Shot Program Induction and Synthesis. In _International Conference on Machine Learning_. PMLR, 175–186.
* Comon (1997) Hubert Comon. 1997\. Tree Automata Techniques and Applications. _http://www. grappa. univ-lille3. fr/tata_ (1997).
* Gulwani (2011) Sumit Gulwani. 2011\. Automating String Processing in Spreadsheets using Input-Output Examples. _ACM Sigplan Notices_ 46, 1 (2011), 317–330.
* Lau et al. (2003) Tessa Lau, Steven A Wolfman, Pedro Domingos, and Daniel S Weld. 2003. Programming by Demonstration Using Version Space Algebra. _Machine Learning_ 53, 1 (2003), 111–156.
* Michon and Champarnaud (1998) Jean-Francis Michon and Jean-Marc Champarnaud. 1998. Automata and Binary Decision Diagrams. In _International Workshop on Implementing Automata_. Springer, 178–182.
* Pollock and Haan (2021) Joshua Pollock and Altan Haan. 2021. E-Graphs Are Minimal Deterministic Finite Tree Automata (DFTAs) · Discussion #104 · egraphs-good/egg. https://github.com/egraphs-good/egg/discussions/104
* Polozov and Gulwani (2015) Oleksandr Polozov and Sumit Gulwani. 2015. FlashMeta: A Framework for Inductive Program Synthesis. In _Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications_. 107–126.
* Premtoon et al. (2020) Varot Premtoon, James Koppel, and Armando Solar-Lezama. 2020\. Semantic Code Search via Equational Reasoning. In _Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation_. 1066–1082.
* Stepp et al. (2011) Michael Stepp, Ross Tate, and Sorin Lerner. 2011. Equality-Based Translation Validator for LLVM. In _International Conference on Computer Aided Verification_. Springer, 737–742.
* Wang et al. (2017) Xinyu Wang, Isil Dillig, and Rishabh Singh. 2017. Synthesis of Data Completion Scripts using Finite Tree Automata. _Proceedings of the ACM on Programming Languages_ 1, OOPSLA (2017), 1–26.
* Willsey et al. (2021) Max Willsey, Chandrakana Nandi, Yisu Remy Wang, Oliver Flatt, Zachary Tatlock, and Pavel Panchekha. 2021\. Egg: Fast and Extensible Equality Saturation. _Proceedings of the ACM on Programming Languages_ 5, POPL (2021), 1–29.
| arxiv-papers | 2021-07-27T03:02:56 | 2024-09-04T03:07:20.442350 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "James Koppel",
"submitter": "James Koppel",
"url": "https://arxiv.org/abs/2107.12568"
} |
2107.12571 | # CFLOW-AD: Real-Time Unsupervised Anomaly Detection with Localization
via Conditional Normalizing Flows
Denis Gudovskiy1 Shun Ishizaka2 Kazuki Kozuka2
1Panasonic AI Lab, USA 2Panasonic Technology Division, Japan
[email protected] {ishizaka.shun,
kozuka.kazuki}@jp.panasonic.com
###### Abstract
Unsupervised anomaly detection with localization has many practical
applications when labeling is infeasible and, moreover, when anomaly examples
are completely missing in the train data. While recently proposed models for
such data setup achieve high accuracy metrics, their complexity is a limiting
factor for real-time processing. In this paper, we propose a real-time model
and analytically derive its relationship to prior methods. Our CFLOW-AD model
is based on a conditional normalizing flow framework adopted for anomaly
detection with localization. In particular, CFLOW-AD consists of a
discriminatively pretrained encoder followed by a multi-scale generative
decoders where the latter explicitly estimate likelihood of the encoded
features. Our approach results in a computationally and memory-efficient
model: CFLOW-AD is faster and smaller by a factor of 10$\times$ than prior
state-of-the-art with the same input setting. Our experiments on the MVTec
dataset show that CFLOW-AD outperforms previous methods by 0.36% AUROC in
detection task, by 1.12% AUROC and 2.5% AUPRO in localization task,
respectively. We open-source our code with fully reproducible
experiments111Our code is available at github.com/gudovskiy/cflow-ad.
## 1 Introduction
Anomaly detection with localization (AD) is a growing area of research in
computer vision with many practical applications _e.g_. industrial inspection
[4], road traffic monitoring [20], medical diagnostics [44] _etc_. However,
the common supervised AD [32] is not viable in practical applications due to
several reasons. First, it requires labeled data which is costly to obtain.
Second, anomalies are usually rare long-tail examples and have low probability
to be acquired by sensors. Lastly, consistent labeling of anomalies is
subjective and requires extensive domain expertise as illustrated in Figure 1
with industrial cable defects.
Figure 1: An example of the proposed out-of-distribution (OOD) detector for
anomaly localization trained on anomaly-free $\mathcal{D_{\mathrm{train}}}$
(top row). Sliced cable images are from the MVTec dataset [4], where the
bottom row illustrates $\mathcal{D_{\mathrm{test}}}$ ground truth masks for
anomalies (red) and the middle row shows examples of anomaly-free patches
(green). The OOD detector learns the distribution of anomaly-free patches
${\bm{x}}$ with $p_{X}({\bm{x}})$ density and transforms it into a Gaussian
distribution with $p_{Z}({\bm{z}})$ density. Threshold $\tau$ separates in-
distribution patches from the OOD patches with $p_{\tilde{Z}}({\bm{z}})$
density.
With these limitations of the supervised AD, a more appealing approach is to
collect only unlabeled anomaly-free images for train dataset
$\mathcal{D_{\mathrm{train}}}$ as in Figure 1 (top row). Then, any deviation
from anomaly-free images is classified as an anomaly. Such data setup with low
rate of anomalies is generally considered to be unsupervised [4]. Hence, the
AD task can be reformulated as a task of out-of-distribution detection (OOD)
with the AD objective.
While OOD for low-dimensional industrial sensors (_e.g_. power-line or
acoustic) can be accomplished using a common $k$-nearest-neighbor or more
advanced clustering methods [10], it is less trivial for high-resolution
images. Recently, convolutional neural networks (CNNs) have gained popularity
in extracting semantic information from images into downsampled feature maps
[4]. Though feature extraction using CNNs has relatively low complexity, the
post-processing of feature maps is far from real-time processing in the state-
of-the-art unsupervised AD methods [8].
To address this complexity drawback, we propose a CFLOW-AD model that is based
on conditional normalizing flows. CFLOW-AD is agnostic to feature map spatial
dimensions similar to CNNs, which leads to a higher accuracy metrics as well
as a lower computational and memory requirements. We present the main idea
behind our approach in a toy OOD detector example in Figure 1. A distribution
of the anomaly-free image patches ${\bm{x}}$ with probability density function
$p_{X}({\bm{x}})$ is learned by the AD model. Our translation-equivariant
model is trained to transform the original distribution with $p_{X}({\bm{x}})$
density into a Gaussian distribution with $p_{Z}({\bm{z}})$ density. Finally,
this model separates in-distribution patches ${\bm{z}}$ with $p_{Z}({\bm{z}})$
from the out-of-distribution patches with $p_{\tilde{Z}}({\bm{z}})$ using a
threshold $\tau$ computed as the Euclidean distance from the distribution
mean.
## 2 Related work
We review models222For comprehensive review of the existing AD methods we
refer readers to Ruff _et al_. [31] and Pang _et al_. [26] surveys. that
employ the data setup from Figure 1 and provide experimental results for
popular MVTec dataset [4] with factory defects or Shanghai Tech Campus (STC)
dataset [22] with surveillance camera videos. We highlight the research
related to a more challenging task of pixel-level anomaly localization
(segmentation) rather than a more simple image-level anomaly detection.
Napoletano _et al_. [25] propose to use CNN feature extractors followed by a
principal component analysis and $k$-mean clustering for AD. Their feature
extractor is a ResNet-18 [13] pretrained on a large-scale ImageNet dataset
[16]. Similarly, SPADE [7] employs a Wide-ResNet-50 [43] with multi-scale
pyramid pooling that is followed by a $k$-nearest-neighbor clustering.
Unfortunately, clustering is slow at test-time with high-dimensional data.
Thus, parallel convolutional methods are preferred in real-time systems.
Numerous methods are based on a natural idea of generative modeling. Unlike
models with the discriminatively-pretrained feature extractors [25, 7],
generative models learn distribution of anomaly-free data and, therefore, are
able to estimate a proxy metrics for anomaly scores even for the unseen images
with anomalies. Recent models employ generative adversarial networks (GANs)
[35, 36] and variational autoencoders (VAEs) [3, 38].
A fully-generative models [35, 36, 3, 38] are directly applied to images in
order to estimate pixel-level probability density and compute per-pixel
reconstruction errors as anomaly scores proxies. These fully-generative models
are unable to estimate the exact data likelihoods [6, 24] and do not perform
better than the traditional methods [25, 7] according to MVTec survey in [4].
Recent works [34, 15] show that these models tend to capture only low-level
correlations instead of relevant semantic information. To overcome the latter
drawback, a hybrid DFR model [37] uses a pretrained feature extractor with
multi-scale pyramid pooling followed by a convolutional autoencoder (CAE).
However, DFR model is unable to estimate the exact likelihoods.
Another line of research proposes to employ a student-teacher type of
framework [5, 33, 41]. Teacher is a pretrained feature extractor and student
is trained to estimate a scoring function for AD. Unfortunately, such
frameworks underperform compared to state-of-the-art models.
Patch SVDD [42] and CutPaste [19] introduce a self-supervised pretraining
scheme for AD. Moreover, Patch SVDD proposes a novel method to combine multi-
scale scoring masks to a final anomaly map. Unlike the nearest-neighbor search
in [42], CutPaste estimates anomaly scores using an efficient Gaussian density
estimator. While the self-supervised pretraining can be helpful in uncommon
data domains, Schirrmeister _et al_. [34] argue that large natural-image
datasets such as ImageNet can be a more representative for pretraining
compared to a small application-specific datasets _e.g_. industrial MVTec [4].
The state-of-the-art PaDiM [8] proposes surprisingly simple yet effective
approach for anomaly localization. Similarly to [37, 7, 42], this approach
relies on ImageNet-pretrained feature extractor with multi-scale pyramid
pooling. However, instead of slow test-time clustering in [7] or nearest-
neighbor search in [42], PaDiM uses a well-known Mahalanobis distance metric
[23] as an anomaly score. The metric parameters are estimated for each feature
vector from the pooled feature maps. PaDiM has been inspired by Rippel _et
al_. [29] who firstly advocated to use this measure for anomaly detection
without localization.
DifferNet [30] uses a promising class of generative models called normalizing
flows (NFLOWs) [9] for image-level AD. The main advantage of NFLOW models is
ability to estimate the exact likelihoods for OOD compared to other generative
models [35, 36, 3, 38, 37]. In this paper, we extend DifferNet approach to
pixel-level anomaly localization task using our CFLOW-AD model. In contrast to
RealNVP [9] architecture with global average pooling in [30], we propose to
use conditional normalizing flows [2] to make CFLOW-AD suitable for low-
complexity processing of multi-scale feature maps for localization task. We
develop our CFLOW-AD with the following contributions:
* •
Our theoretical analysis shows why multivariate Gaussian assumption is a
justified prior in previous models and why a more general NFLOW framework
objective converges to similar results with the less compute.
* •
We propose to use conditional normalizing flows for unsupervised anomaly
detection with localization using computational and memory-efficient
architecture.
* •
We show that our model outperforms previous state-of-the art in both detection
and localization due to the unique properties of the proposed CFLOW-AD model.
Figure 2: Overview of our CFLOW-AD with a fully-convolutional translation-
equivariant architecture. Encoder $h({\bm{\lambda}})$ is a CNN feature
extractor with multi-scale pyramid pooling. Pyramid pooling captures both
global and local semantic information with the growing from top to bottom
receptive fields. Pooled feature vectors ${\bm{z}}^{k}_{i}$ are processed by a
set of decoders $g_{k}({\bm{\theta}}_{k})$ independently for each $k$th scale.
Our decoder is a conditional normalizing flow network with a feature input
${\bm{z}}^{k}_{i}$ and a conditional input ${\bm{c}}^{k}_{i}$ with spatial
information from a positional encoder (PE). The estimated multi-scale
likelihoods $p^{k}_{i}$ are upsampled to the input size and added up to
produce anomaly map.
## 3 Theoretical background
### 3.1 Feature extraction with Gaussian prior
Consider a CNN $h({\bm{\lambda}})$ trained for classification task. Its
parameters ${\bm{\lambda}}$ are usually found by minimizing Kullback-Leibler
($D_{KL}$) divergence between joint train data distribution
$Q_{{\bm{x}},{\bm{y}}}$ and the learned model distribution
$P_{{\bm{x}},{\bm{y}}}({\bm{\lambda}})$, where $({\bm{x}},{\bm{y}})$ is an
input-label pair for supervised learning.
Typically, the parameters ${\bm{\lambda}}$ are initialized by the values
sampled from the Gaussian distribution [12] and optimization process is
regularized as
$\operatorname*{arg\,min}_{{\bm{\lambda}}}D_{KL}\left[Q_{{\bm{x}},{\bm{y}}}\|P_{{\bm{x}},{\bm{y}}}({\bm{\lambda}})\right]+\alpha
R({\bm{\lambda}}),$ (1)
where $R({\bm{\lambda}})$ is a regularization term and $\alpha$ is a
hyperparameter that defines regularization strength.
The most popular CNNs [13, 43] are trained with $L_{2}$ weight decay [17]
regularization ($R({\bm{\lambda}})=\|{\bm{\lambda}}\|_{2}^{2}$). That imposes
multivariate Gaussian (MVG) prior not only to parameters ${\bm{\lambda}}$, but
also to the feature vectors ${\bm{z}}$ extracted from the feature maps of
$h({\bm{\lambda}})$ [11] intermediate layers.
### 3.2 A case for Mahalanobis distance
With the same MVG prior assumption, Lee _et al_. [18] recently proposed to
model distribution of feature vectors ${\bm{z}}$ by MVG density function and
to use Mahalanobis distance [23] as a confidence score in CNN classifiers.
Inspired by [18], Rippel _et al_. [29] adopt Mahalanobis distance for anomaly
detection task since this measure determines a distance of a particular
feature vector ${\bm{z}}$ to its MVG distribution. Consider a MVG distribution
$\mathcal{N}({\bm{\mu}},{\bm{\Sigma}})$ with a density function
$p_{Z}({\bm{z}})$ for random variable ${\bm{z}}\in\mathbb{R}^{D}$ defined as
$p_{Z}({\bm{z}})=(2\pi)^{-D/2}\det{\bm{\Sigma}}^{-1/2}e^{-\frac{1}{2}({\bm{z}}-{\bm{\mu}})^{T}{\bm{\Sigma}}^{-1}({\bm{z}}-{\bm{\mu}})},$
(2)
where ${\bm{\mu}}\in\mathbb{R}^{D}$ is a mean vector and
${\bm{\Sigma}}\in\mathbb{R}^{D\times D}$ is a covariance matrix of a true
anomaly-free density $p_{Z}({\bm{z}})$.
Then, the Mahalanobis distance $M({\bm{z}})$ is calculated as
$M({\bm{z}})=\sqrt{({\bm{z}}-{\bm{\mu}})^{T}{\bm{\Sigma}}^{-1}({\bm{z}}-{\bm{\mu}})},$
(3)
Since the true anomaly-free data distribution is unknown, mean vector and
covariance matrix from (3) are replaced by the estimates $\hat{{\bm{\mu}}}$
and $\hat{{\bm{\Sigma}}}$ calculated from the empirical train dataset
$\mathcal{D_{\mathrm{train}}}$. At the same time, density function
$p_{\tilde{Z}}({\bm{z}})$ of anomaly data has different $\tilde{{\bm{\mu}}}$
and $\tilde{{\bm{\Sigma}}}$ statistics, which allows to separate out-of-
distribution and in-distribution feature vectors using $M({\bm{z}})$ from (3).
This framework with MVG distribution assumption shows its effectiveness in
image-level anomaly detection task [29] and is adopted by the state-of-the-art
PaDiM [8] model in pixel-level anomaly localization task.
### 3.3 Relationship with the flow framework
Dinh _et al_. [9] introduce a class of generative probabilistic models called
normalizing flows. These models apply change of variable formula to fit an
arbitrary density $p_{Z}({\bm{z}})$ by a tractable base distribution with
$p_{U}({\bm{u}})$ density and a bijective invertible mapping
$g^{-1}:Z\rightarrow U$. Then, the $\log$-likelihood of any ${\bm{z}}\in Z$
can be estimated by
$\log\hat{p}_{Z}({\bm{z}},{\bm{\theta}})=\log
p_{U}({\bm{u}})+\log\left|\det{\bm{J}}\right|,$ (4)
where a sample ${\bm{u}}\sim p_{U}$ is usually from standard MVG distribution
$({\bm{u}}\sim\mathcal{N}({\bm{0}},{\bm{I}}))$ and a matrix
${\bm{J}}=\nabla_{{\bm{z}}}g^{-1}({\bm{z}},{\bm{\theta}})$ is the Jacobian of
a bijective invertible flow model $({\bm{z}}=g({\bm{u}},{\bm{\theta}})$ and
${\bm{u}}=g^{-1}({\bm{z}},{\bm{\theta}}))$ parameterized by vector
${\bm{\theta}}$.
The flow model $g({\bm{\theta}})$ is a set of basic layered transformations
with tractable Jacobian determinants. For example, $\log|\det{\bm{J}}|$ in
RealNVP [9] coupling layers is a simple sum of layer’s diagonal elements.
These models are optimized using stochastic gradient descent by maximizing
$\log$-likelihood in (4). Equivalently, optimization can be done by minimizing
the reverse
$D_{KL}\left[\hat{p}_{Z}({\bm{z}},{\bm{\theta}})\|p_{Z}({\bm{z}})\right]$
[27], where $\hat{p}_{Z}({\bm{z}},{\bm{\theta}})$ is the model prediction and
$p_{Z}({\bm{z}})$ is a target density. The loss function for this objective is
defined as
$\mathcal{L}({\bm{\theta}})=\mathbb{E}_{\hat{p}_{Z}({\bm{z}},{\bm{\theta}})}\left[\log\hat{p}_{Z}({\bm{z}},{\bm{\theta}})-\log
p_{Z}({\bm{z}})\right].$ (5)
If $p_{Z}({\bm{z}})$ is distributed according to Section 3.1 MVG assumption,
we can express (5) as a function of Mahalanobis distance $M({\bm{z}})$ using
its definition from (3) as
$\mathcal{L}({\bm{\theta}})=\mathbb{E}_{\hat{p}_{Z}({\bm{z}},{\bm{\theta}})}\left[\frac{M^{2}({\bm{z}})-E^{2}({\bm{u}})}{2}+\log\frac{|\det{\bm{J}}|}{\det{\bm{\Sigma}}^{-1/2}}\right],$
(6)
where $E^{2}({\bm{u}})=\|{\bm{u}}\|_{2}^{2}$ is a squared Euclidean distance
of a sample ${\bm{u}}\sim\mathcal{N}({\bm{0}},{\bm{I}})$ (detailed proof in
Appendix A).
Then, the loss in (6) converges to zero when the likelihood contribution term
$|\det{\bm{J}}|$ of the model $g({\bm{\theta}})$ (normalized by
$\det{\bm{\Sigma}}^{-1/2}$) compensates the difference between a squared
Mahalanobis distance for ${\bm{z}}$ from the target density and a squared
Euclidean distance for ${\bm{u}}\sim\mathcal{N}({\bm{0}},{\bm{I}})$.
This normalizing flow framework can estimate the exact likelihoods of any
arbitrary distribution with $p_{Z}$ density, while Mahalanobis distance is
limited to MVG distribution only. For example, CNNs trained with $L_{1}$
regularization would have Laplace prior [11] or have no particular prior in
the absence of regularization. Moreover, we introduce conditional normalizing
flows in the next section and show that they are more compact in size and have
fully-convolutional parallel architecture compared to [7, 8] models.
## 4 The proposed CFLOW-AD model
### 4.1 CFLOW encoder for feature extraction
We implement a feature extraction scheme with multi-scale feature pyramid
pooling similar to recent models [7, 8]. We define the discriminatively-
trained CNN feature extractor as an encoder $h({\bm{\lambda}})$ in Figure 2.
The CNN encoder maps image patches ${\bm{x}}$ into a feature vectors
${\bm{z}}$ that contain relevant semantic information about their content.
CNNs accomplish this task efficiently due to their translation-equivariant
architecture with the shared kernel parameters. In our experiments, we use
ImageNet-pretrained encoder following Schirrmeister _et al_. [34] who show
that large natural-image datasets can serve as a representative distribution
for pretraining. If a large application-domain unlabeled data is available,
the self-supervised pretraining from [42, 19] can be a viable option.
One important aspect of a CNN encoder is its effective receptive field [21].
Since the effective receptive field is not strictly bounded, the size of
encoded patches ${\bm{x}}$ cannot be exactly defined. At the same time,
anomalies have various sizes and shapes, and, ideally, they have to be
processed with the variable receptive fields. To address the ambiguity between
CNN receptive fields and anomaly variability, we adopt common multi-scale
feature pyramid pooling approach. Figure 2 shows that the feature vectors
${\bm{z}}^{k}_{i}\in\mathbb{R}^{D_{k}},i\in\\{H_{k}\times W_{k}\\}$ are
extracted by $K$ pooling layers. Pyramid pooling captures both local and
global patch information with small and large receptive fields in the first
and last CNN layers, respectively. For convenience, we number pooling layers
in the last to first layer order.
### 4.2 CFLOW decoders for likelihood estimation
We use the general normalizing flow framework from Section 3.3 to estimate
$\log$-likelihoods of feature vectors ${\bm{z}}$. Hence, our generative
decoder model $g({\bm{\theta}})$ aims to fit true density $p_{Z}({\bm{z}})$ by
an estimated parameterized density $\hat{p}_{Z}({\bm{z}},{\bm{\theta}})$ from
(1). However, the feature vectors are assumed to be independent of their
spatial location in the general framework. To increase efficacy of
distribution modeling, we propose to incorporate spatial prior into
$g({\bm{\theta}})$ model using conditional flow framework. In addition, we
model $\hat{p}^{k}_{Z}({\bm{z}},{\bm{\theta}})$ densities using $K$
independent decoder models $g_{k}({\bm{\theta}}_{k})$ due to multi-scale
feature pyramid pooling setup.
Our conditional normalizing flow (CFLOW) decoder architecture is presented in
Figure 2. We generate a conditional vector ${\bm{c}}^{k}_{i}$ using a 2D form
of conventional positional encoding (PE) [39]. Each
${\bm{c}}^{k}_{i}\in\mathbb{R}^{C_{k}}$ contains $\sin$ and $\cos$ harmonics
that are unique to its spatial location $(h_{k},w_{k})_{i}$. We extend
unconditional flow framework to CFLOW by concatenating the intermediate
vectors inside decoder coupling layers with the conditional vectors
${\bm{c}}_{i}$ as in [2].
Then, the $k$th CFLOW decoder contains a sequence of conventional coupling
layers with the additional conditional input. Each coupling layer comprises of
fully-connected layer with $(D_{k}+C_{k})\times(D_{k}+C_{k})$ kernel, softplus
activation and output vector permutations. Usually, the conditional extension
does not increase model size since $C_{k}\ll D_{k}$. For example, we use the
fixed $C_{k}=128$ in all our experiments. Our CFLOW decoder has translation-
equivariant architecture, because it slides along feature vectors extracted
from the intermediate feature maps with kernel parameter sharing. As a result,
both the encoder $h({\bm{\lambda}})$ and decoders $g_{k}({\bm{\theta}}_{k})$
have convolutional translation-equivariant architectures.
We train CFLOW-AD using a maximum likelihood objective, which is equivalent to
minimizing loss defined by
$\begin{split}\mathcal{L}({\bm{\theta}})&=D_{KL}\left[p_{Z}({\bm{z}})\right\|\hat{p}_{Z}({\bm{z}},{\bm{c}},{\bm{\theta}})]\approx\\\
&\frac{1}{N}\sum^{N}_{i=1}\left[\frac{\|{\bm{u}}_{i}\|_{2}^{2}}{2}-\log\left|\det{\bm{J}}_{i}\right|\right]+\text{const},\end{split}$
(7)
where the random variable
${\bm{u}}_{i}=g^{-1}({\bm{z}}_{i},{\bm{c}}_{i},{\bm{\theta}})$, the Jacobian
${\bm{J}}_{i}=\nabla_{{\bm{z}}}g^{-1}({\bm{z}}_{i},{\bm{c}}_{i},{\bm{\theta}})$
for CFLOW decoder and an expectation operation in $D_{KL}$ is replaced by an
empirical train dataset $\mathcal{D_{\mathrm{train}}}$ of size $N$. For
brevity, we drop the $k$th scale notation. The derivation is given in Appendix
B.
After training the decoders $g_{k}({\bm{\theta}}_{k})$ for all $K$ scales
using (7), we estimate test dataset $\mathcal{D_{\mathrm{test}}}$
$\log$-likelihoods as
$\log\hat{p}_{Z}({\bm{z}}_{i},{\bm{c}}_{i},\hat{{\bm{\theta}}})=-\frac{\|{\bm{u}}_{i}\|_{2}^{2}+D\log(2\pi)}{2}+\log\left|\det{\bm{J}}_{i}\right|.$
(8)
Next, we convert $\log$-likelihoods to probabilities
$p^{k}_{i}=e^{\log\hat{p}_{Z}({\bm{z}}^{k}_{i},{\bm{c}}^{k}_{i},\hat{{\bm{\theta}}}_{k})}$
for each $k$th scale using (8) and normalize them to be in $\left[0:1\right]$
range. Then, we upsample $p^{k}_{i}$ to the input image resolution ($H\times
W$) using bilinear interpolation ${\bm{P}}_{k}=b(p^{k})\in\mathbb{R}^{H\times
W}$. Finally, we calculate anomaly score maps ${\bm{S}}^{H\times W}$ by
aggregating all upsampled probabilities as
${\bm{S}}=\max_{\sum^{K}_{k=1}{\bm{P}}_{k}}-\sum^{K}_{k=1}{\bm{P}}_{k}$.
Table 1: Complexity estimates for SPADE [7], PaDiM [8] and our CFLOW-AD. We compare train and test complexity as well as memory requirements. All models use the same encoder $h({\bm{\lambda}})$ setup, but diverge in the post-processing. SPADE allocates memory for a train gallery ${\mathbb{G}}$ used in $k$-nearest-neighbors. PaDiM keeps large matrices $({\bm{\Sigma}}^{k}_{i})^{-1},i\in\\{H_{k}\times W_{k}\\}$ for Mahalanobis distance. Our model employs trained decoders $g_{k}({\bm{\theta}}_{k})$ for post-processing. Model | Train | Test | Memory
---|---|---|---
SPADE [7] | ${\mathbb{G}}$ | $\sum\nolimits_{{\bm{v}}\in{\mathbb{G}}}\|{\bm{v}}-{\bm{z}}_{i}\|_{2}^{2}$ | ${\bm{\lambda}}+{\mathbb{G}}$
PaDiM [8] | ${\bm{\Sigma}}^{-1}_{i}$ | $M({\bm{z}}_{i})$ | ${\bm{\lambda}}+{\bm{\Sigma}}^{-1}_{i}$
Ours | $\mathcal{L}({\bm{\theta}})$ | $\log\hat{p}_{Z}({\bm{z}}_{i},{\bm{c}}_{i},{\bm{\theta}})$ | ${\bm{\lambda}}+{\bm{\theta}}$
### 4.3 Complexity analysis
Table 1 analytically compares complexity of CFLOW-AD and recent state-of-the-
art models with the same pyramid pooling setup _i.e_.
${\bm{z}}^{k\in\\{1\ldots K\\}}=h({\bm{x}},{\bm{\lambda}})$.
SPADE [7] performs $k$-nearest-neighbor clustering between each test point
${\bm{z}}^{k}_{i}$ and a gallery ${\mathbb{G}}$ of train data. Therefore, the
method requires large memory allocation for gallery ${\mathbb{G}}$ and a
clustering procedure that is typically slow compared to convolutional methods.
PaDiM [8] estimates train-time statistics _i.e_. inverses of covariance
matrices $({\bm{\Sigma}}^{k}_{i})^{-1}\in\mathbb{R}^{D_{k}\times
D_{k}},i\in\\{H_{k}\times W_{k}\\}$ to calculate $M({\bm{z}}^{k}_{i})$ at
test-time. Hence, it has low computational complexity, but it stores in memory
$H_{k}\times W_{k}$ matrices of $D_{k}\times D_{k}$ size for every $k$th
pooling layer.
Our method optimizes generative decoders $g_{k}({\bm{\theta}}_{k})$ using (7)
during the train phase. At the test phase, CFLOW-AD simply infers data
$\log$-likelihoods
$\log\hat{p}_{Z}({\bm{z}}_{i},{\bm{c}}_{i},\hat{{\bm{\theta}}})$ using (8) in
a fully-convolutional fashion. Decoder parameters
${\bm{\theta}}_{k\in\\{1\ldots K\\}}$ are relatively small as reported in
Table 6.
## 5 Experiments
Table 2: Ablation study of CFLOW-AD using localization AUROC metric on the MVTec [4] dataset, %. We experiment with input image resolution ($H\times W$), encoder architecture (ResNet-18 (R18), WideResnet-50 (WRN50) and MobileNetV3L (MNetV3)), type of normalizing flow (unconditional (UFLOW) and conditional (CFLOW)), number of coupling (# of CL) and pooling layers (# of PL). Encoder | WRN50 | WRN50 | WRN50 | WRN50 | WRN50 | R18 | R18 | MNetV3 | MNetV3
---|---|---|---|---|---|---|---|---|---
# of CL | 4 $\quad\longrightarrow\quad$ 8 | 8 | 8 | 8 | 8 | 8 | 8 | 8
# of PL | 2 | 2 $\quad\longrightarrow\quad$ 3 | 3 | 3 | 3 | 3 | 3 | 3
H$\times$W | 256 | 256 | 256 $\quad\longrightarrow\quad$ 512 | 512 | 256 $\quad\longrightarrow\quad$ 512 | 256 $\quad\longrightarrow\quad$ 512
Type | CFLOW | CFLOW | CFLOW | CFLOW $\rightarrow$ UFLOW | CFLOW | CFLOW | CFLOW | CFLOW
Bottle | 97.28$\pm$0.03 | 97.24$\pm$0.03 | 98.76$\pm$0.01 | 98.98$\pm$0.01 | 98.83$\pm$0.01 | 98.47$\pm$0.03 | 98.64$\pm$0.01 | 98.74 | 98.92
Cable | 95.71$\pm$0.01 | 96.17$\pm$0.07 | 97.64$\pm$0.04 | 97.12$\pm$0.06 | 95.29$\pm$0.04 | 96.75$\pm$0.04 | 96.07$\pm$0.06 | 97.62 | 97.49
Capsule | 98.17$\pm$0.02 | 98.19$\pm$0.05 | 98.98$\pm$0.00 | 98.64$\pm$0.02 | 98.40$\pm$0.12 | 98.62$\pm$0.02 | 98.28$\pm$0.05 | 98.89 | 98.75
Carpet | 98.50$\pm$0.01 | 98.55$\pm$0.01 | 99.23$\pm$0.01 | 99.25$\pm$0.01 | 99.24$\pm$0.00 | 99.00$\pm$0.01 | 99.29$\pm$0.00 | 98.64 | 99.00
Grid | 93.77$\pm$0.05 | 93.88$\pm$0.16 | 96.89$\pm$0.02 | 98.99$\pm$0.02 | 98.74$\pm$0.00 | 93.95$\pm$0.04 | 98.53$\pm$0.01 | 94.75 | 98.81
Hazelnut | 98.08$\pm$0.01 | 98.13$\pm$0.02 | 98.82$\pm$0.01 | 98.89$\pm$0.01 | 98.88$\pm$0.01 | 98.81$\pm$0.01 | 98.41$\pm$0.01 | 98.88 | 99.00
Leather | 98.92$\pm$0.02 | 99.00$\pm$0.06 | 99.61$\pm$0.01 | 99.66$\pm$0.00 | 99.65$\pm$0.00 | 99.45$\pm$0.01 | 99.51$\pm$0.02 | 99.50 | 99.64
Metal Nut | 96.72$\pm$0.03 | 96.72$\pm$0.06 | 98.56$\pm$0.03 | 98.25$\pm$0.04 | 98.16$\pm$0.03 | 97.59$\pm$0.05 | 96.42$\pm$0.03 | 98.36 | 98.78
Pill | 98.46$\pm$0.02 | 98.46$\pm$0.01 | 98.95$\pm$0.00 | 98.52$\pm$0.05 | 98.20$\pm$0.08 | 98.34$\pm$0.02 | 97.80$\pm$0.05 | 98.69 | 98.44
Screw | 94.98$\pm$0.06 | 95.28$\pm$0.06 | 98.10$\pm$0.05 | 98.86$\pm$0.02 | 98.78$\pm$0.01 | 97.38$\pm$0.03 | 98.40$\pm$0.03 | 98.04 | 99.09
Tile | 95.52$\pm$0.02 | 95.66$\pm$0.06 | 97.71$\pm$0.02 | 98.01$\pm$0.01 | 97.98$\pm$0.02 | 95.10$\pm$0.02 | 95.80$\pm$0.10 | 96.07 | 96.48
Toothbrush | 98.02$\pm$0.03 | 97.98$\pm$0.00 | 98.56$\pm$0.02 | 98.93$\pm$0.00 | 98.89$\pm$0.00 | 98.44$\pm$0.02 | 99.00$\pm$0.01 | 98.09 | 98.80
Transistor | 93.09$\pm$0.28 | 94.05$\pm$0.11 | 93.28$\pm$0.40 | 80.52$\pm$0.13 | 76.28$\pm$0.14 | 92.71$\pm$0.23 | 83.34$\pm$0.46 | 97.79 | 95.22
Wood | 90.65$\pm$0.10 | 90.59$\pm$0.07 | 94.49$\pm$0.03 | 96.65$\pm$0.01 | 96.56$\pm$0.02 | 93.51$\pm$0.03 | 95.00$\pm$0.04 | 92.24 | 94.96
Zipper | 96.80$\pm$0.02 | 97.01$\pm$0.05 | 98.41$\pm$0.09 | 99.08$\pm$0.02 | 99.06$\pm$0.01 | 97.71$\pm$0.06 | 98.98$\pm$0.01 | 97.50 | 99.07
Average | 96.31 | 96.46 | 97.87 | 97.36 | 96.86 | 97.06 | 96.90 | 97.59 | 98.16
Table 3: The detailed comparison of PaDiM [8], SPADE [7], CutPaste [19] and our CFLOW-AD on the MVTec [4] dataset for every class using AUROC or, if available, a tuple (AUROC, AUPRO) metric, %. CFLOW-AD model is with the best hyperparameters from Section 5.2 ablation study. For fair comparison, we group together results with the same encoder architectures such as ResNet-18 and WideResNet-50. Task | Localization | Detection | Localization
---|---|---|---
Encoder | ResNet-18 | EffNetB4 | WideResNet-50
Class/Model | CutPaste | Ours | CutPaste | Ours | CutPaste | Ours | SPADE | PaDiM | Ours
Bottle | 97.6 | 98.64 | 98.3 | 100.00 | 100.0 | 100.0 | (98.4, 95.5) | (98.3, 94.8) | (98.98, 96.80)
Cable | 90.0 | 96.75 | 80.6 | 97.62 | 96.2 | 97.59 | (97.2, 90.9) | (96.7, 88.8) | (97.64, 93.53)
Capsule | 97.4 | 98.62 | 96.2 | 93.15 | 95.4 | 97.68 | (99.0, 93.7) | (98.5, 93.5) | (98.98, 93.40)
Carpet | 98.3 | 99.29 | 93.1 | 98.20 | 100.0 | 98.73 | (97.5, 94.7) | (99.1, 96.2) | (99.25, 97.70)
Grid | 97.5 | 98.53 | 99.9 | 98.97 | 99.1 | 99.60 | (93.7, 86.7) | (97.3, 94.6) | (98.99, 96.08)
Hazelnut | 97.3 | 98.81 | 97.3 | 99.91 | 99.9 | 99.98 | (99.1, 95.4) | (98.2, 92.6) | (98.89, 96.68)
Leather | 99.5 | 99.51 | 100.0 | 100.00 | 100.0 | 100.0 | (97.6, 97.2) | (98.9, 88.8) | (99.66, 99.35)
Metal Nut | 93.1 | 97.59 | 99.3 | 98.45 | 98.6 | 99.26 | (98.1, 94.4) | (97.2, 85.6) | (98.56, 91.65)
Pill | 95.7 | 98.34 | 92.4 | 93.02 | 93.3 | 96.82 | (96.5, 94.6) | (95.7, 92.7) | (98.95, 95.39)
Screw | 96.7 | 98.40 | 86.3 | 85.94 | 86.6 | 91.89 | (98.9, 96.0) | (98.5, 94.4) | (98.86, 95.30)
Tile | 90.5 | 95.80 | 93.4 | 98.40 | 99.8 | 99.88 | (87.4, 75.9) | (94.1, 86.0) | (98.01, 94.34)
Toothbrush | 98.1 | 99.00 | 98.3 | 99.86 | 90.7 | 99.65 | (97.9, 93.5) | (98.8, 93.1) | (98.93, 95.06)
Transistor | 93.0 | 97.69 | 95.5 | 93.04 | 97.5 | 95.21 | (94.1, 87.4) | (97.5, 84.5) | (97.99, 81.40)
Wood | 95.5 | 95.00 | 98.6 | 98.59 | 99.8 | 99.12 | (88.5, 97.4) | (94.9, 91.1) | (96.65, 95.79)
Zipper | 99.3 | 98.98 | 99.4 | 96.15 | 99.9 | 98.48 | (96.5, 92.6) | (98.5, 95.9) | (99.08, 96.60)
Average | 96.0 | 98.06 | 95.2 | 96.75 | 97.1 | 98.26 | (96.0, 91.7) | (97.5, 92.1) | (98.62, 94.60)
### 5.1 Experimental setup
We conduct unsupervised anomaly detection (image-level) and localization
(pixel-level segmentation) experiments using the MVTec [4] dataset with
factory defects and the STC [22] dataset with surveillance camera videos. The
code is in PyTorch [28] with the FrEIA library [1] used for generative
normalizing flow modeling.
Industrial MVTec dataset comprises 15 classes with total of 3,629 images for
training and 1,725 images for testing. The train dataset contains only
anomaly-free images without any defects. The test dataset contains both images
containing various types of defects and defect-free images. Five classes
contain different types of textures (carpet, grid, leather, tile, wood), while
the remaining 10 classes represent various types of objects. We resize MVTec
images without cropping according to the specified image resolution (_e.g_.
$H\times W=256\times 256,512\times 512$ _etc_.) and apply $\pm 5^{\circ}$
augmentation rotations during training phase only.
STC dataset contains 274,515 training and 42,883 testing frames extracted from
surveillance camera videos and divided into 13 distinct university campus
scenes. Because STC is significantly larger than MVTec, we experiment only
with $256\times 256$ resolution and apply the same pre-processing and
augmentation pipeline as for MVTec.
We compare CFLOW-AD with the models reviewed in Section 2 using MVTec and STC
datasets. We use widely-used threshold-agnostic evaluation metrics for
localization: area under the receiver operating characteristic curve (AUROC)
and area under the per-region-overlap curve (AUPRO) [4]. AUROC is skewed
towards large-area anomalies, while AUPRO metric ensures that both large and
small anomalies are equally important in localization. Image-level AD
detection is reported by the AUROC only.
We run each CFLOW-AD experiment four times on the MVTec and report mean
($\mu$) of the evaluation metric and, if specified, its standard deviation
($\pm\sigma$). For the larger STC dataset, we conduct only a single
experiment. As in other methods, we train a separate CFLOW-AD model for each
MVTec class and each STC scene. All our models use the same training
hyperparameters: Adam optimizer with 2e-4 learning rate, 100 train epochs, 32
mini-batch size for encoder and cosine learning rate annealing with 2 warm-up
epochs. Since our decoders are agnostic to feature map dimensions and have low
memory requirements, we train and test CFLOW-AD decoders with 8,192
(32$\times$256) mini-batch size for feature vector processing. During the
train phase 8,192 feature vectors are randomly sampled from 32 random feature
maps. Similarly, 8,192 feature vectors are sequentially sampled during the
test phase. The feature pyramid pooling setup for ResNet-18 and WideResnet-50
encoder is identical to PaDiM [8]. The effects of other architectural
hyperparameters are studied in the ablation study.
### 5.2 Ablation study
Table 2 presents a comprehensive study of various design choices for CFLOW-AD
on the MVTec dataset using AUROC metric. In particular, we experiment with the
input image resolution ($H\times W$), encoder architecture (ResNet-18 [13],
WideResnet-50 [43], MobileNetV3L [14]), type of normalizing flow
(unconditional (UFLOW) or conditional (CFLOW)), number of flow coupling layers
(# of CL) and pooling layers (# of PL).
Our study shows that the increase in number of decoder’s coupling layers from
4 to 8 gives on average 0.15% gain due to a more accurate distribution
modeling. Even higher 1.4% AUROC improvement is achieved when processing
3-scale feature maps (layers 1, 2 and 3) compared 2-scale only (layers 2, 3).
The additional feature map (layer 1) with larger scale ($H_{1}\times
W_{1}=32\times 32$) provides more precise spatial semantic information. The
conditional normalizing flow (CFLOW) is on average 0.5% better than the
unconditional (UFLOW) due to effective encoding of spatial prior. Finally,
larger WideResnet-50 outperforms smaller ResNet-18 by 0.81%. MobileNetV3L,
however, could be a good design choice for both fast inference and high AUROC.
Importantly, we find that the optimal input resolution is not consistent among
MVTec classes. The classes with macro objects _e.g_. cable or pill tend to
benefit from the smaller-scale processing (256$\times$256), which,
effectively, translates to larger CNN receptive fields. Majority of classes
perform better with 512$\times$512 inputs _i.e_. smaller receptive fields.
Finally, we discover that the transistor class has even higher AUROC with the
resized to 128$\times$128 images. Hence, we report results with the highest
performing input resolution settings in the Section 5.3 comparisons.
Table 4: Average AUROC and AUPRO on the MVTec [4] dataset, %. Both the best detection and localization metrics are presented, if available. CFLOW-AD is with WideResNet-50 encoder. Metric | AUROC | AUPRO
---|---|---
Model | Detection | Localization
DifferNet [30] | 94.9 | - | -
DFR [37] | - | 95.0 | 91.0
SVDD [42] | 92.1 | 95.7 | -
SPADE [7] | 85.5 | 96.0 | 91.7
CutPaste [19] | 97.1 | 96.0 | -
PaDiM [8] | 97.9 | 97.5 | 92.1
CFLOW-AD (ours) | 98.26 | 98.62 | 94.60
Table 5: Average AUROC on the STC [22] dataset, %. Both the best available detection and localization metrics are showed. CFLOW-AD is with WideResNet-50 encoder. Metric | AUROC
---|---
Model | Detection | Localization
CAVGA [40] | - | 85.0
SPADE [7] | 71.9 | 89.9
PaDiM [8] | - | 91.2
CFLOW-AD (ours) | 72.63 | 94.48
### 5.3 Quantitative comparison
Table 4 summarizes average MVTec results for the best published models. CFLOW-
AD with WideResNet-50 encoder outperforms state-of-the-art by 0.36% AUROC in
detection, by 1.12% AUROC and 2.5% AUPRO in localization, respectively. Table
3 contains per-class comparison for the subset of models grouped by the task
and type of encoder architecture. CFLOW-AD is on par or significantly exceeds
the best models in per-class comparison with the same encoder setups.
Table 5 presents high-level comparison of the best recently published models
on the STC dataset. CFLOW-AD outperforms state-of-the-art SPADE [7] by 0.73%
AUROC in anomaly detection and PaDiM [8] by 3.28% AUROC in anomaly
localization tasks, respectively.
Note that our CFLOW-AD models in Tables 3-4 use variable input resolution as
discussed in the ablation study: 512$\times$512, 256$\times$256 or
128$\times$128 depending on the MVTec class. We used fixed 256$\times$256
input resolution in Table 5 for the large STC dataset to decrease training
time. Other reference hyperparameters in Tables 4-5 are set as: WideResnet-50
encoder with 3-scale pooling layers, conditional normalizing flow decoders
with 8 coupling layers.
Figure 3: Examples of the input images with ground truth anomaly masks (top
row) for various classes of the MVTec. Our CFLOW-AD model from Table 4
estimates anomaly score maps (middle row) and generates segmentation masks
(bottom row) for a threshold selected to maximize F1-score. The predicted
segmentation mask should match the corresponding ground truth as close as
possible. Figure 4: Distribution of anomaly scores for the cable class from
the MVTec learned by CFLOW-AD model from Table 4. Green density represent
scores for the anomaly-free feature vectors, while region of red-color density
shows scores for feature vectors with anomalies. The threshold $\tau$ is
selected to optimize F1-score.
### 5.4 Qualitative results
Figure 3 visually shows examples from the MVTec and the corresponding CFLOW-AD
predictions. The top row shows ground truth masks from
$\mathcal{D_{\mathrm{test}}}$ including examples with and without anomalies.
Then, our model produces anomaly score maps (middle row) using the
architecture from Figure 2. Finally, we show the predicted segmentation masks
with the threshold selected to maximize F1-score.
Figure 4 presents an additional evidence that our CFLOW-AD model actually
addresses the OOD task sketched in Figure 1 toy example. We plot distribution
of output anomaly scores for anomaly-free (green) and anomalous feature
vectors (red). Then, CFLOW-AD is able to distinguish in-distribution and out-
of-distribution feature vectors and separate them using a scalar threshold
$\tau$.
### 5.5 Complexity evaluations
Table 6: Complexity comparison in terms of inference speed (fps) and model size (MB). Inference speed for CFLOW-AD models from Table 3 is measured for (256$\times$256) / (512$\times$512) inputs. Complexity metric and Model | Inference speed, fps | Model size, MB
---|---|---
STC | MVTec
R18 encoder only | 80 / 62 | 45
PaDiM-R18 [8] | 4.4 | 210 | 170
CFLOW-AD-R18 | 34 / 12 | 96
WRN50 encoder only | 62 / 30 | 268
SPADE-WRN50 [7] | 0.1 | 37,000 | 1,400
PaDiM-WRN50 [8] | 1.1 | 5,200 | 3,800
CFLOW-AD-WRN50 | 27 / 9 | 947
MNetV3 encoder only | 82 / 61 | 12
CFLOW-AD-MNetV3 | 35 / 12 | 25
In addition to analytical estimates in Table 1, we present the actual
complexity evaluations for the trained models using inference speed and model
size metrics. Particularly, Table 1 compares CFLOW-AD with the models from
Tables 4-5 that have been studied by Defard _et al_. [8].
The model size in Table 6 is measured as the size of all floating-point
parameters in the corresponding model _i.e_. its encoder and decoder (post-
processing) models. Because the encoder architectures are identical, only the
post-processing models are different. Since CFLOW-AD decoders do not
explicitly depend on the feature map dimensions (only on feature vector
depths), our model is significantly smaller than SPADE and PaDiM. If we
exclude the encoder parameters for fair comparison, CFLOW-AD is 1.7$\times$ to
50$\times$ smaller than SPADE and 2$\times$ to 7$\times$ smaller than PaDiM.
Inference speed in Table 6 is measured with INTEL I7 CPU for SPADE and PaDiM
in Defard _et al_. [8] study with 256$\times$256 inputs. We deduce that this
suboptimal CPU choice was made due to large memory requirements for these
models in Table 6. Thus, their GPU allocation for fast inference is
infeasible. In contrast, our CFLOW-AD can be processed in real-time with
8$\times$ to 25$\times$ faster inference speed on 1080 8GB GPU with the same
input resolution and feature extractor. In addition, MobileNetV3L encoder
provides a good trade-off between accuracy, model size and inference speed for
practical inspection systems.
## 6 Conclusions
We proposed to use conditional normalizing flow framework to estimate the
exact data likelihoods which is infeasible in other generative models.
Moreover, we analytically showed the relationship of this framework to
previous distance-based models with multivariate Gaussian prior.
We introduced CFLOW-AD model that addresses the complexity limitations of
existing unsupervised AD models by employing fully-convolutional translation-
equivariant architecture. As a result, CFLOW-AD is faster and smaller by a
factor of 10$\times$ than prior models with the same input resolution and
feature extractor setup.
CFLOW-AD achieves new state-of-the-art for popular MVTec with 98.26% AUROC in
detection, 98.62% AUROC and 94.60% AUPRO in localization. Our new state-of-
the-art for STC dataset is 72.63% and 94.48% AUROC in detection and
localization, respectively. Our ablation study analyzed design choices for
practical real-time processing including feature extractor choice, multi-scale
pyramid pooling setup and the flow model hyperparameters.
## References
* [1] Lynton Ardizzone, Jakob Kruse, Carsten Rother, and Ullrich Köthe. Analyzing inverse problems with invertible neural networks. In Proceedings of the International Conference on Learning Representations (ICLR), 2019.
* [2] Lynton Ardizzone, Carsten Lüth, Jakob Kruse, Carsten Rother, and Ullrich Köthe. Guided image generation with conditional invertible neural networks. arXiv:1907.02392, 2019.
* [3] Christoph Baur, Benedikt Wiestler, Shadi Albarqouni, and Nassir Navab. Deep autoencoding models for unsupervised anomaly segmentation in brain MR images. arXiv:1804.04488, 2018.
* [4] Paul Bergmann, Michael Fauser, David Sattlegger, and Carsten Steger. MVTec AD – a comprehensive real-world dataset for unsupervised anomaly detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2019.
* [5] Paul Bergmann, Michael Fauser, David Sattlegger, and Carsten Steger. Uninformed students: Student-teacher anomaly detection with discriminative latent embeddings. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2020.
* [6] Paul Bergmann, Sindy Löwe, Michael Fauser, David Sattlegger, and Carsten Steger. Improving unsupervised defect segmentation by applying structural similarity to autoencoders. Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 2019\.
* [7] Niv Cohen and Yedid Hoshen. Sub-image anomaly detection with deep pyramid correspondences. arXiv:2005.02357v3, 2021.
* [8] Thomas Defard, Aleksandr Setkov, Angelique Loesch, and Romaric Audigier. PaDiM: a patch distribution modeling framework for anomaly detection and localization. In Proceedings of the International Conference on Pattern Recognition (ICPR) Workshops, 2021.
* [9] Laurent Dinh, Jascha Sohl-Dickstein, and Samy Bengio. Density estimation using real NVP. In Proceedings of the International Conference on Learning Representations (ICLR), 2017.
* [10] Markus Goldstein and Seiichi Uchida. A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLOS ONE, 2016.
* [11] Ian J. Goodfellow, Yoshua Bengio, and Aaron Courville. Deep Learning. MIT Press, 2016.
* [12] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Delving deep into rectifiers: Surpassing human-level performance on ImageNet classification. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2015.
* [13] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2016.
* [14] Andrew Howard, Mark Sandler, Grace Chu, Liang-Chieh Chen, Bo Chen, Mingxing Tan, Weijun Wang, Yukun Zhu, Ruoming Pang, Vijay Vasudevan, Quoc V. Le, and Hartwig Adam. Searching for MobileNetV3. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2019.
* [15] Polina Kirichenko, Pavel Izmailov, and Andrew Gordon Wilson. Why normalizing flows fail to detect out-of-distribution data. In Advances in Neural Information Processing Systems, 2020.
* [16] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. ImageNet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems, 2012.
* [17] Anders Krogh and John Hertz. A simple weight decay can improve generalization. In Advances in Neural Information Processing Systems, 1992.
* [18] Kimin Lee, Kibok Lee, Honglak Lee, and Jinwoo Shin. A simple unified framework for detecting out-of-distribution samples and adversarial attacks. In Advances in Neural Information Processing Systems, 2018.
* [19] Chun-Liang Li, Kihyuk Sohn, Jinsung Yoon, and Tomas Pfister. CutPaste: Self-supervised learning for anomaly detection and localization. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021.
* [20] Yingying Li, Jie Wu, Xue Bai, Xipeng Yang, Xiao Tan, Guanbin Li, Shilei Wen, Hongwu Zhang, and Errui Ding. Multi-granularity tracking with modularlized components for unsupervised vehicles anomaly detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, 2020.
* [21] Wenjie Luo, Yujia Li, Raquel Urtasun, and Richard Zemel. Understanding the effective receptive field in deep convolutional neural networks. In Advances in Neural Information Processing Systems, 2016.
* [22] Weixin Luo, Wen Liu, and Shenghua Gao. A revisit of sparse coding based anomaly detection in stacked RNN framework. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2017.
* [23] Prasanta Chandra Mahalanobis. On the generalized distance in statistics. Proceedings of the National Institute of Sciences (Calcutta), 1936\.
* [24] Eric Nalisnick, Akihiro Matsukawa, Yee Whye Teh, Dilan Gorur, and Balaji Lakshminarayanan. Do deep generative models know what they don’t know? In Proceedings of the International Conference on Learning Representations (ICLR), 2019.
* [25] Paolo Napoletano, Flavio Piccoli, and Raimondo Schettini. Anomaly detection in nanofibrous materials by CNN-based self-similarity. Sensors, 2018.
* [26] Guansong Pang, Chunhua Shen, Longbing Cao, and Anton Van Den Hengel. Deep learning for anomaly detection: A review. ACM Comput. Surv., 2021.
* [27] George Papamakarios, Eric Nalisnick, Danilo Jimenez Rezende, Shakir Mohamed, and Balaji Lakshminarayanan. Normalizing flows for probabilistic modeling and inference. Journal of Machine Learning Research, 2021.
* [28] Adam Paszke, Sam Gross, Soumith Chintala, Gregory Chanan, Edward Yang, Zachary DeVito, Zeming Lin, Alban Desmaison, Luca Antiga, and Adam Lerer. Automatic differentiation in PyTorch. In Autodiff workshop at Advances in Neural Information Processing Systems, 2017.
* [29] Oliver Rippel, Patrick Mertens, and Dorit Merhof. Modeling the distribution of normal data in pre-trained deep features for anomaly detection. arXiv:2005.14140, 2020.
* [30] Marco Rudolph, Bastian Wandt, and Bodo Rosenhahn. Same same but DifferNet: Semi-supervised defect detection with normalizing flows. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2021.
* [31] Lukas Ruff, Jacob Reinhard Kauffmann, Robert Vandermeulen, Gregoire Montavon, Wojciech Samek, Marius Kloft, Thomas G. Dietterich, and Klaus-Robert Müller. A unifying review of deep and shallow anomaly detection. Proc of the IEEE, 2021.
* [32] Babak Saleh, Ali Farhadi, and Ahmed Elgammal. Object-centric anomaly detection by attribute-based reasoning. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2013.
* [33] Mohammadreza Salehi, Niousha Sadjadi, Soroosh Baselizadeh, Mohammad Hossein Rohban, and Hamid R. Rabiee. Multiresolution knowledge distillation for anomaly detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021.
* [34] Robin Tibor Schirrmeister, Yuxuan Zhou, Tonio Ball, and Dan Zhang. Understanding anomaly detection with deep invertible networks through hierarchies of distributions and features. In Advances in Neural Information Processing Systems, 2020.
* [35] Thomas Schlegl, Philipp Seeböck, Sebastian M Waldstein, Georg Langs, and Ursula Schmidt-Erfurth. f-AnoGAN: Fast unsupervised anomaly detection with generative adversarial networks. Medical image analysis, 2019.
* [36] Thomas Schlegl, Philipp Seeböck, Sebastian M Waldstein, Ursula Schmidt-Erfurth, and Georg Langs. Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In International Conference on Information Processing in Medical Imaging, 2017.
* [37] Yong Shi, Jie Yang, and Zhiquan Qi. Unsupervised anomaly segmentation via deep feature reconstruction. Neurocomputing, 2021.
* [38] A. Vasilev, V. Golkov, M. Meissner, I. Lipp, E. Sgarlata, V. Tomassini, D.K. Jones, and D. Cremers. q-space novelty detection with variational autoencoders. MICCAI 2019 International Workshop on Computational Diffusion MRI, 2019.
* [39] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Ł ukasz Kaiser, and Illia Polosukhin. Attention is all you need. In Advances in Neural Information Processing Systems, 2017.
* [40] Shashanka Venkataramanan, Kuan-Chuan Peng, Rajat Vikram Singh, and Abhijit Mahalanobis. Attention guided anomaly localization in images. In Proceedings of the European Conference on Computer Vision (ECCV), 2020.
* [41] Guodong Wang, Shumin Han, Errui Ding, and Di Huang. Student-teacher feature pyramid matching for unsupervised anomaly detection. arXiv:2103.04257, 2021.
* [42] Jihun Yi and Sungroh Yoon. Patch SVDD: Patch-level SVDD for anomaly detection and segmentation. In Proceedings of the Asian Conference on Computer Vision (ACCV), 2020.
* [43] Sergey Zagoruyko and Nikos Komodakis. Wide residual networks. In Proceedings of the British Machine Vision Conference (BMVC), 2016\.
* [44] Kang Zhou, Yuting Xiao, Jianlong Yang, Jun Cheng, Wen Liu, Weixin Luo, Zaiwang Gu, Jiang Liu, and Shenghua. Gao. Encoding structure-texture relation with P-Net for anomaly detection in retinal images. In Proceedings of the European Conference on Computer Vision (ECCV), 2020.
## Appendix A Relationship with the flow framework
The loss function for the reverse
$D_{KL}\left[\hat{p}_{Z}({\bm{z}},{\bm{\theta}})\|p_{Z}({\bm{z}})\right]$
objective [27], where $\hat{p}_{Z}({\bm{z}},{\bm{\theta}})$ is the model
prediction and $p_{Z}({\bm{z}})$ is a target density, is defined as
$\mathcal{L}({\bm{\theta}})=\mathbb{E}_{\hat{p}_{Z}({\bm{z}},{\bm{\theta}})}\left[\log\hat{p}_{Z}({\bm{z}},{\bm{\theta}})-\log
p_{Z}({\bm{z}})\right].$ (5)
The first term in (5) can be written using (4) definition for a standard MVG
prior $({\bm{u}}\sim\mathcal{N}({\bm{0}},{\bm{I}}))$ as
$\log\hat{p}_{Z}({\bm{z}},{\bm{\theta}})=\log(2\pi)^{-D/2}-E^{2}({\bm{u}})/2+\log\left|\det{\bm{J}}\right|,$
(5.1)
where $E^{2}({\bm{u}})=\|{\bm{u}}\|_{2}^{2}$ is a squared Euclidean distance
of ${\bm{u}}$.
Similarly, the second term in (5) can be written for MVG density (2) using a
square of Mahalanobis distance as
$\log
p_{Z}({\bm{z}})=\log(2\pi)^{-D/2}+\log\det{\bm{\Sigma}}^{-1/2}-M^{2}({\bm{z}})/2.$
(5.2)
By substituting (5.1-5.2) into (5), the constants $\log(2\pi)^{-D/2}$ are
eliminated and the loss is
$\mathcal{L}({\bm{\theta}})=\mathbb{E}_{\hat{p}_{Z}({\bm{z}},{\bm{\theta}})}\left[\frac{M^{2}({\bm{z}})-E^{2}({\bm{u}})}{2}+\log\frac{|\det{\bm{J}}|}{\det{\bm{\Sigma}}^{-1/2}}\right].$
(6)
## Appendix B CFLOW decoders for likelihood estimation
We train CFLOW-AD using a maximum likelihood objective, which is equivalent to
minimizing the forward $D_{KL}$ objective [27] with the loss defined by
$\mathcal{L}({\bm{\theta}})=D_{KL}\left[p_{Z}({\bm{z}})\right\|\hat{p}_{Z}({\bm{z}},{\bm{c}},{\bm{\theta}})],$
(7)
where $\hat{p}_{Z}({\bm{z}},{\bm{c}},{\bm{\theta}})$ is a conditional
normalizing flow (CFLOW) model with a condition vector
${\bm{c}}\in\mathbb{R}^{C}$.
The target density $p_{Z}({\bm{z}})$ is usually replaced by a constant because
the parameters ${\bm{\theta}}$ do not depend on this density during gradient-
based optimization. Then by analogy with unconditional flow (4), the loss (7)
for $\hat{p}_{Z}({\bm{z}},{\bm{c}},{\bm{\theta}})$ can be written as
$\mathcal{L}({\bm{\theta}})=-\mathbb{E}_{p_{Z}({\bm{z}})}\left[\log
p_{U}({\bm{u}})+\log\left|\det{\bm{J}}\right|\right]+\text{const}.$ (7.1)
In practice, the expectation operation in (7.1) is replaced by an empirical
train dataset $\mathcal{D_{\mathrm{train}}}$ of size $N$. Using the definition
of base distribution with $p_{U}({\bm{u}})$, the final form of (7) can be
expressed as
$\mathcal{L}({\bm{\theta}})\approx\frac{1}{N}\sum^{N}_{i=1}\left[\frac{\|{\bm{u}}_{i}\|_{2}^{2}}{2}-\log\left|\det{\bm{J}}_{i}\right|\right]+\text{const},$
(7.2)
where the random variable
${\bm{u}}_{i}=g^{-1}({\bm{z}}_{i},{\bm{c}}_{i},{\bm{\theta}})$ and the
Jacobian
${\bm{J}}_{i}=\nabla_{{\bm{z}}}g^{-1}({\bm{z}}_{i},{\bm{c}}_{i},{\bm{\theta}})$
depend both on input features ${\bm{z}}_{i}$ and conditional vector
${\bm{c}}_{i}$ for CFLOW model.
| arxiv-papers | 2021-07-27T03:10:38 | 2024-09-04T03:07:20.453433 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Denis Gudovskiy, Shun Ishizaka, Kazuki Kozuka",
"submitter": "Denis Gudovskiy",
"url": "https://arxiv.org/abs/2107.12571"
} |
2107.12577 | # Quantum control of nuclear spin qubits in a rapidly rotating diamond
A. A. Wood [email protected] School of Physics, University of
Melbourne, Victoria 3010, Australia R. M. Goldblatt School of Physics,
University of Melbourne, Victoria 3010, Australia R. E. Scholten School of
Physics, University of Melbourne, Victoria 3010, Australia A. M. Martin
School of Physics, University of Melbourne, Victoria 3010, Australia
###### Abstract
Nuclear spins in certain solids couple weakly to their environment, making
them attractive candidates for quantum information processing and inertial
sensing. When coupled to the spin of an optically-active electron, nuclear
spins can be rapidly polarized, controlled and read via lasers and
radiofrequency fields. Possessing coherence times of several milliseconds at
room temperature, nuclear spins hosted by a nitrogen-vacancy center in diamond
are thus intriguing systems to observe how classical physical rotation at
quantum timescales affects a quantum system. Unlocking this potential is
hampered by precise and inflexible constraints on magnetic field strength and
alignment in order to optically induce nuclear polarization, which restricts
the scope for further study and applications. In this work, we demonstrate
optical nuclear spin polarization and rapid quantum control of nuclear spins
in a diamond physically rotating at $1\,$kHz, faster than the nuclear spin
coherence time. Free from the need to maintain strict field alignment, we are
able to measure and control nuclear spins in hitherto inaccessible regimes,
such as in the presence of a large, time-varying magnetic field that makes an
angle of more than $100^{\circ}$ to the nitrogen-lattice vacancy axis. The
field induces spin mixing between the electron and nuclear states of the
qubits, decoupling them from oscillating rf fields. We are able to demonstrate
that coherent spin state control is possible at any point of the rotation, and
even for up to six rotation periods. We combine continuous dynamical
decoupling with quantum feedforward control to eliminate decoherence induced
by imperfect mechanical rotation. Our work liberates a previously inaccessible
degree of freedom of the NV nuclear spin, unlocking new approaches to quantum
control and rotation sensing.
## I Introduction
Robust solid state substrates such as diamond confer an important advantage to
the spin qubits hosted within: coherent operation in real-world environments
at room temperature. This makes diamond quantum sensors promising probes of
physical phenomena in demanding environments, such as rotation at timescales
commensurate with quantum decoherence [1, 2]. Employing color-center based
spin qubits as precision quantum sensors in a range of applications is rapidly
evolving, and understanding how quantum spins in solids behave when motional
and rotational degrees of freedom are present is becoming of critical
importance [3, 4, 5, 6, 7]. Of the many known solid state color-centers, the
nitrogen-vacancy center in diamond [8, 9] is the most widely studied and, for
quantum applications, the most eminently promising.
While much interest is focused on the remarkable properties of the negatively-
charged NV- center (hereafter simply NV) electron spin, the intrinsic nuclear
spin hosted within the defect underpins some of the most important emerging
applications. Unlike 13C nuclear spins, which are randomly distributed about
the diamond lattice, the 14N or 15N nitrogen nucleus is intrinsic to every NV
center, an attractive feature for scalable quantum processors and memories
based on nuclear spins [10, 11] as well as multi-modal ancilla based sensing
[12, 13]. Featuring millisecond-long coherence times due to isolation from the
environment [14, 15], the intrinsic nuclear spin is also an eminently feasible
system to probe the interplay between classical rotation and quantum angular
momentum, having found applications in quantum rotation sensing [16, 17, 18,
19, 20, 21] and quantum information processing [22].
Accessing the nuclear degree of freedom and its myriad benefits in the
rotating frame first requires nuclear spin hyperpolarization, which can be
achieved using the electron spin. While a range of alternative methods exist
[23, 24, 25, 26, 27, 28], the simplest and fastest method uses a magnetic
field applied precisely parallel to the N-V axis, which induces an avoided
crossing in the NV excited state triplet [29]. At this excited-state level
anti-crossing (ESLAC), $B\sim 500$ G, the NV $m_S=0$ and $m_S=-1$ states
approach degeneracy in the excited state. During optical illumination, coupled
electron-nuclear spin states undergo spin-conserving flip-flop transitions
that, with further optical cycling, result in a transfer of population to a
single nuclear spin sublevel $m_I$. This process, which can be completed with
a single $5$-$10\,\upmu$s laser pulse, also results in nuclear state-dependent
fluorescence and enables optical quantum state readout [30, 31].
The optical polarization procedure described above is relatively insensitive
to magnetic field strength [31], but misalignments of less than a degree from
the NV axis are sufficient to totally suppress optically-mediated nuclear spin
polarization and readout [29]. Polarization at high magnetic fields is
desirable due to the enhanced nuclear gyromagnetic ratio ($20\times$ higher at
500 G [32] than at zero field), enabling fast quantum gate operations. As a
consequence, the NV-nuclear spin system typically must be deployed with the
strict condition of magnetic field alignment parallel to the NV axis. This
inflexible requirement severely restricts the usefulness of nuclear spins in
scenarios where the motional and rotational degrees of freedom of a quantum
system are not fixed [33, 34, 35, 4]. However, precise magnetic field
alignment is only necessary for the optical polarization and readout
procedure, and is not necessary to coherently _control_ the nuclear spin.
In this work, we overcome the restrictive, inflexible conditions of optically-
induced nuclear hyperpolarization in a truly demanding sensing environment: a
frame physically rotating at 1 kHz, faster than the quantum decoherence rate.
In our experiment, a (100)-cut diamond is mounted so that one NV orientation
class makes a $54.7^{\circ}$ angle to the rotation axis, and a $\sim$500 G
magnetic field is aligned so that at a given initialization time, within a
narrow window, the nuclear spin can be optically polarized via the ESLAC.
Beyond this alignment window, the NV axis and magnetic field are free to
assume any possible relative orientation dictated by the rotation of the
diamond. Resonant radiofrequency fields can then be applied to drive the
nuclear spins, with optical readout occurring when the NV-magnetic field
alignment is reached again after one period. We are thus able to study for the
first time the NV nuclear spin at high fields free from the restrictions of
precise magnetic field alignment, performing first-time measurements that are
virtually impossible with a stationary diamond.
Rapid rotation in the presence of a large off-axis field represents a
significant perturbation to the NV-nuclear spin system, inducing mixing
between electron and nuclear spin states. The rotation is also mechanical, and
thus subject to the vicissitudes of mechanically-driven processes such as
period jitter and drift which invariably impact the coherence of the rotating
qubits. We use feedforward control to eliminate the significant frequency
shifts imposed by the off-axis magnetic field and dynamical decoupling to
suppress the deleterious aspects of mechanical rotation. This quantum
decoupling sequence can be made to eliminate _any_ detectable effects of
physical rotation on-demand: preserving the nuclear spins through an entire
cycle of rotation in the presence of a noisy perturbation and demonstrating
the precise level of control our experiments can achieve.
## II Experiment
Rapid physical rotation on the order of the NV electron spin coherence time
$T_2\sim 100\,\upmu$s imposes significant but achievable demands on the
stability and reproducibility of mechanical rotation. In previous work, we
have demonstrated quantum control and measurement of single NV electron spins
rotating at up to 200,000 rpm ($3.33\,$kHz) [36, 37]. Working with ensembles
of NV centers reduces some of the complexity associated with optical
measurement of a rotating diamond [1, 38]. However, magnetic field alignment
during rotation for optical polarization of nuclear spins imposes challenges
comparable to that of measuring single NV centers, given the strict
requirements for alignment.
A schematic of our experiment is depicted in Figure 1(a) and more details can
be found in Ref. 111See Supplemental Material.. An electronic grade diamond
(ppb N concentration, Element6) containing an ensemble of NV centers is
mounted on its (100) face to the end of the shaft of a high-speed electric
motor. A $480\,$G magnetic field from a permanent magnet is applied at a
$54.7^{\circ}$ angle to the rotation axis. Spinning at $1\,$kHz, the motor
controller generates a timing signal that is fed into a delay generator to
trigger laser, radiofrequency and microwave pulses synchronous with the
diamond rotation [36]. Adjusting the delay time effectively controls the
azimuthal angle of the diamond, which is then set so that the NV and magnetic
field are precisely aligned at a particular time during the rotation. A
microscope objective on a three-axis piezo scanner focuses $1\,$mW of 532 nm
laser light near the exact rotation center of the diamond. The green light
optically pumps the NV and its nuclear spin into the $|m_S=0,m_I=+1\rangle$
state, and the same objective lens collects the emitted red fluorescence and
directs it to an avalanche photodiode, forming a confocal microscope.
Figure 1: Rotating diamond experiment and NV energy levels (a) Schematic of
the experiment: a diamond containing an ensemble of NV centers is rotated by
an electric motor at $1\,$kHz. A $480\,$G magnetic field is applied so that at
a particular azimuthal rotation angle, the field momentarily aligns with the
NV axis, polarizing the host 14N nuclear spin. Radiofrequency (microwave)
fields are generated by a coil (wire) antenna (lower panel) and are used with
a 532 nm laser to prepare, read and control the NV and its nuclear spin. (b)
NV energy levels, showing nuclear spin rf transitions, excited state level
anti-crossing and optical pumping process.
## III Optical polarization
An NV electron spin state can be optically pumped to almost $100\,\%$
polarization within one microsecond [40, 41]. The nuclear spin polarization
process is slower, typically taking up to five or more microseconds to
complete [31]. The degree of polarization also depends on the magnetic field
strength [42]. In our experiments, the temporal dependence of optical pumping
is convolved with the angular variation of the magnetic field alignment
imposed by rotation, and therefore the nuclear spin polarization efficiency is
also affected by rotation. To understand this effect, we study the time-
dependent photoluminescence (PL) emitted from the NV during optical pumping.
Figure 2: Quantum state measurement and control of a rotating ensemble of
nuclear spins. (a) Ensemble NV PL as a function of time while rotating at 1
kHz, with the laser switched on approximately 10$\upmu$s before the NV and
magnetic field come into alignment. When this occurs, optical pumping
polarises the 14NV into the $|m_S=0,m_I=+1\rangle$ state, which exhibits
brighter fluorescence. After this point, the laser depolarizes the nuclear
spin, leading to a characteristic $4\,\upmu$s-wide Gaussian profile in time,
equivalent to a $1.2\,^{\circ}$ angular window where polarization of the
nuclear spin is possible. (b) State dependence of NV PL while rotating (left).
Optimizing the fluorescent contrast (right) amounts to timing the laser pulse
to activate on the rising edge of the Gaussian feature (approximately
2$\upmu$s from the peak) and subsequently extinguish without depolarizing the
spin ensemble. We find that between 2-3 $\upmu$s yields optimum results. (c) A
variable duration pulse of resonant (5.1 MHz) rf is applied immediately
following nuclear polarization. The diamond then rotates a full period before
state readout, and we observe Rabi oscillations (blue circles). We can also
first apply a resonant $\pi$-pulse after polarization, which flips the nuclear
spin into the dark $m_I=0$ state before applying a variable duration rf pulse
after a rotation period (orange squares).
After first ensuring optimum optical pumping while stationary 222See
Supplementary Information [URL], we then studied the nuclear spin polarization
dynamics while the diamond was rotating. Figure 2(a) depicts the measured
photoluminescence as the NV axis approaches alignment with the magnetic field,
$t_p=8\,\upmu$s after the laser is switched on. For meaningful quantum
measurement, we must detect the difference in brightness dependent on the 14N
spin state. We reduced $t_p$ so that the laser switched on just before the NV
axis and magnetic field are aligned, and observe a difference in fluorescence
when an rf $\pi$-pulse is applied prior to readout (Fig. 2(b)). If the laser
is not promptly extinguished, the light rapidly depolarizes the 14N beyond the
point where the magnetic field and the NV axis are aligned. The nuclear spin
polarization is therefore limited to what is possible within the narrow window
depicted in Fig. 2(b).
The maximum fluorescence contrast (and thus nuclear spin polarization) is
markedly lower while rotating compared to stationary ($2.5\,\%$ vs. $6\,\%$).
Nevertheless, we were able to perform and unambiguously detect quantum spin
manipulations on the rotating ensemble. We varied the duration of the rf
pulse, tracing out time-domain Rabi oscillations with the nuclear spin first
initialized into the $|m_S=0,m_I=+1\rangle$ state after optical pumping. In a
further experiment, we applied a resonant $\pi$-pulse and a variable-duration
rf pulse at the start and end of the cycle respectively, and thus measured
Rabi oscillations from the nuclear spin initialized to the
$|m_S=0,m_I=0\rangle$ state. The nuclear (and electron) spin adiabatically
follows the quantization axis set by the NV zero-field splitting and magnetic
field during the rotation. The second measurement in Fig 2(c) effectively
confirms this adiabaticity, since the NV electron and nuclear spin state is
the same at the start and end of the rotation.
## IV Electron-nuclear spin-mixing
Rotation in the presence of a large field imparts a significant perturbation,
effectively tilting the magnetic field from $0$ to $109^{\circ}$ and back,
which results in strong, time-dependent mixing of the electron and nuclear
spin levels. Mixing of the electron spin levels augments the nuclear spin
energies, resulting in larger perturbations to the nuclear spin transition
frequencies than that of the magnetic field alone. Misalignment of the
magnetic field not only suppresses nuclear spin polarisation, it also quenches
the fluorescence of the NV electron spin [44] for much smaller fields than
that used in this work. Rotation of the diamond therefore provides us with a
unique means of studying both the NV and its nuclear spin in hitherto
inaccessible regimes of magnetic field strength and alignment. Before further
experimental investigation, we consider the Hamiltonian of the NV-14N system
and the effects of a large, time-dependent off-axis magnetic field. For the
electron spin $\bm{S}$ and nuclear spin $\bm{I}$ (both spin-1), the
interaction Hamiltonian is
$\displaystyle H$
$\displaystyle=D_\text{zfs}S_z^{2}-\gamma_e\bm{S}\cdot\bm{B}-\gamma_n\bm{I}\cdot\bm{B}+QI_z^{2}$
(1) $\displaystyle+A_\parallel S_zI_z+A_\perp(S_xI_x+S_yI_y).$
Here, $D_\text{zfs}/2\pi=2.870\,$GHz is the NV zero-field splitting,
$\gamma_e/2\pi=-2.8$ MHz G-1 and $\gamma_n/2\pi=307\,$Hz G-1 the electron and
nuclear gyromagnetic ratios, $Q/2\pi=-4.9457\,$ MHz [31] the nuclear
quadrupolar splitting and $A_\parallel/2\pi=-2.162\,$MHz and
$A_\perp/2\pi=-2.62\,$MHz the longitudinal and transverse coupling constants
for the electron-nuclear hyperfine interaction, respectively. It is simplest
to include the effects of physical rotation by considering the magnetic field
as initially parallel to the NV axis and rotating about an axis $z^{\prime}$.
In our case $z^{\prime}$ makes an angle of $54.7^{\circ}$ to the diamonds
rotation axis due to the $\langle 100\rangle$ cut. In Figure 3(a), we project
the instantaneous eigenstates of $H(t)$ on to the bare eigenvectors of $H(0)$
for the initial configuration of electron and nuclear spin state that follows
immediately after optical pumping, that is, $|m_S=0,m_I=+1\rangle$. This state
adiabatically evolves into an almost equal superposition of $m_I=\pm 1$
nuclear spin states, before returning to the initial state at the completion
of the rotation.
Figure 3: State mixing in the electron and nuclear spin manifolds of the
NV-14N system. (a) Initialized to the $|m_S,m_I\rangle=|0,+1\rangle$ ground
state, we project the corresponding instantaneous eigenstate of
$H(\phi_\text{rot})$ onto the bare eigenstates of $H$ when the field is
aligned to the NV axis. (b) Experimental pulse sequence used: a laser pulse
optically pumps the NV-nuclear spin, followed by an rf pulse with swept
frequency is applied after a variable delay time, and after a full period the
resultant spin state is read out. (c,top) NODMR contrast as a function of rf
frequency and delay time. (c, bottom) Fitted center frequency extracted from
Gaussian fits to the data in (b). Overlaid is the theoretical prediction
derived from solving for the instantaneous energies of the system Hamiltonian.
Error bars are smaller than data points, and represent standard error of fits.
To proceed further, we next consider driving the nuclear spin in the
intervening regime with rf, where the NV-magnetic field angle is significant.
We perform NODMR spectroscopy at different stages of the rotation by
controlling the time between rf $\pi$-pulse ($t_\pi=7\,\upmu$s when
stationary) and laser readout ($1\,\upmu$s) at a rotational speed of 1 kHz. We
extract the resonance frequency from Gaussian fits to the data shown in Fig
3(c, top) and compare against the expected NODMR transition frequency
predicted by solving for the eigenvalues of $H(t)$ for the known magnetic
field strength ($480\,$G), which shows remarkably good agreement. The time
offset is attributed to the extended duration of the rf pulses: while the rf
Rabi $\pi$-pulse is $t_\pi\approx 7\,\upmu$s while stationary near the field
alignment point, we must increase the pulse duration to $20\,\upmu$s in order
to see any contrast for delay times where the magnetic field is at a
significant angle. We used a coil antenna that produces rf fields parallel to
the rotation axis, which should therefore result in a rotationally-symmetric
rf rabi frequency. That we see significant azimuthal angular dependence of the
rf coupling as the diamond rotates implies some other interaction is at work.
## V Nuclear spin de-augmentation
To better understand why the rf coupling is reduced, we examine several key
aspects of how the nuclear spin, augmented by the NV electron spin, couples to
the rf field. At the ESLAC and when $B$ is parallel to the NV axis, the
observed rf Rabi frequencies are $\alpha_0\sim 20$ times what would be
predicted based purely on the ${}^{14}N$ gyromagnetic ratio,
$\gamma_{14N}/2\pi=307.7\,$Hz/G, due to the presence of the NV electron spin
[32, 45]. The electronic augmentation stems from the transverse hyperfine
coupling interaction, which is quantified by the constant $A_\perp$. In the
presence of an off-axis magnetic field, the effective hyperfine coupling has
different components parallel and perpendicular to the new quantization axis
$z^{\prime}$, which is no longer parallel to the NV axis. The Hamiltonian $H$
in Eq. 1 is diagonalized by the transformation $P^{-1}HP=E$, with $P$ the
matrix of eigenvectors and $E$ a diagonal matrix of energy eigenvalues. To
reveal the augmentation of the nuclear spin gyromagnetic ratio, we transform
the rf coupling Hamiltonian
$H_\text{rf}=B_\text{rf}(t)\left(\gamma_eS_x+\gamma_NI_x\right)$ into the
basis where $H$ is diagonal, $H^{\prime}_\text{rf}=P^{-1}H_\text{rf}P$.
Eliminating the time dependence of $H_\text{rf}$ with the rotating-wave
approximation and computing the matrix element corresponding to the nuclear
spin transition of interest, in this case,
$|m_S=0,m_I=+1\rangle\rightarrow|0,0\rangle$, we have
$\alpha_0=\frac{1}{\gamma_NB_\text{rf,0}}\langle
0,0|H^{\prime}_\text{rf}|0,+1\rangle$ (2)
for $B||z$ and $B_\text{rf,0}$ the amplitude of the oscillating field. When
the diamond is rotated, the increasingly off-axis magnetic field tilts the
quantization axis further from the NV axis. Since the nuclear spin
eigenenergies never approach degeneracy (and the rotation rate $f=1/T$ is slow
and thus adiabatic), we can denote the instantaneous eigenstates as
$|\eta(t)\rangle$ and $|\zeta(t)\rangle$, with
$|\eta(0)\rangle=|\eta(T)\rangle=|0,+1\rangle$ and
$|\zeta(0)\rangle=|\zeta(T)\rangle=|0,0\rangle$. We then extract the effective
augmentation factor
$\alpha^{\prime}_0(t)=1/\gamma_NB_\text{rf,0}\langle\zeta(t)|H^{\prime}_\text{rf}(t)|\eta(t)\rangle.$
(3)
In our previous experiment, the rf field was roughly parallel to the rotation
axis. A purely geometric argument, whereby
$\Omega(t)\sim|\hat{\bm{n}}(t)\times\bm{B}_\text{rf}|$, would have the Rabi
frequency remain constant across the rotation. The tilted quantization axis
due to the magnetic field results in a significant reduction of the rf Rabi
frequency through a rotation cycle. Our experiment gives us a unique
opportunity to detect this effect, given that the angle between the NV and
magnetic field is free to assume any angle after (and before) optical
polarization (readout). In the next section, we compare experimental
measurements of this effect with theory.
## VI Feed-forward quantum control
To further characterize the time/angle dependence of gyromagnetic
augmentation, we would ideally measure the rf Rabi frequency across the full
rotation in an experiment. However, the large, rapid changes in the transition
energy (Fig. 3(c)), far exceeding our maximum achievable Rabi frequency
($70\,$kHz), preclude straightforward investigation. We tackle this problem by
applying feed-forward quantum control. With the data in Fig. 3(c) as a guide,
we can synthesize a sine wave signal, frequency modulated in a manner set by
the angular variation of the two-level splitting using an arbitrary waveform
generator (AWG). This feed-forward ensures the rf frequency is always close to
resonance with the nuclear spin throughout the rotation cycle, as shown in
Fig. 6(a), eliminating to a significant extent the strong modulation of the
transition energy imparted by the off-axis magnetic field.
We determine the feedforward waveform by first measuring the frequency $f_0$
of the nuclear spin transition (while stationary) to a precision of better
than 100 Hz with optimized magnetic field alignment. From this, we then
compute the FM profile by diagonalizing Eq. 1 for the equivalent magnetic
field $B_0$ at each azimuthal angle corresponding to the experiment time,
assuming that at the peak alignment point $\theta_B\approx 0$ and
$\theta_{NV}=54.7^{\circ}$. Using just this simple assumption, we can obtain
high-fidelity rf pulses at any point of the rotation.
Figure 4: Feed-forward quantum control of nuclear spins in a rapidly rotating
diamond. (a) Using the observed variation of the
$|0,+1\rangle\rightarrow|0,0\rangle$ transition frequency with rotation angle,
we generate a frequency-modulated rf signal using an AWG that ensures the rf
is always resonant with the nuclear spin transition. The rf is digitally gated
synchronous with the rotation after a delay time $t_d$, and Rabi oscillations
are traced out by varying the gate time. (b) We are able to drive near-
resonant Rabi oscillations at any point in the rotation which markedly slow
down due to the time-varying electron-nuclear spin augmentation. Error bars
derive from photon counting statistics. (c) The relative variation of the Rabi
frequency matches well with a fully-constrained model of the effective nuclear
gyromagnetic ratio, based on Eq. 3. Error bars represent uncertainty in fitted
Rabi frequencies.
We then initiate Rabi oscillations at a delay time $t_D$ with a variable-
duration gated rf pulse from the AWG. The results are shown in Fig. 4(b), and
in Fig. 4(c) we plot the extracted Rabi frequency. Our experimental results
are well explained by the model and the arguments based on the loss of
gyromagnetic augmentation induced by an off-axis magnetic field, Eq. 3.
Despite the reduced rf coupling, we are able to control the quantum state of
the nuclear spin at essentially any point throughout the rotation, which
enables us to then deploy interferometric measurement sequences to quantify
the coherence of the rotating nuclear spin.
## VII Coherence of rotating nuclear spins
The results of the previous section allow us to map out the angular variation
of the rf Rabi frequency and adjust the pulse durations in a multiple-pulse
sequence such as Ramsey interferometry, or spin-echo. As the control signal is
generated by an arbitrary waveform generator, we have the freedom of absolute
phase control of the rf at any point of the rotation. To measure the ensemble
dephasing time $T_2^{\ast}$ of the nuclear spins, we use a Ramsey pulse
sequence, $\pi/2-\tau-\pi/2$ and vary the phase of the final rf $\pi/2$-pulse
to trace out fringes. This way, phase shifts induced by an imperfect
feedforward profile do not affect the perceived fringe visibility. The spin
coherence time $T_2$ is measured using a $\pi/2-\tau/2-\pi-\tau/2-\pi/2$ spin-
echo sequence, where again the phase of the final rf pulse is varied to
measure the fringe amplitude.
An additional control parameter is the time the pulse sequence starts at,
$t_D$, which allows us to select the state superpositions used in the
interferometry sequence. Figure 5(a,b) shows the pulse sequence, Ramsey and
spin-echo data with the extracted fringe phase and amplitude for $t_D=0$ and
$t_D=200\,\upmu$s. We observe that when the interferometric interrogation
region includes the rapid change in state populations around the time where
the magnetic field and NV axis come into alignment (0 - 200 $\upmu$s and 800 -
1000 $\upmu$s), the coherences drop sharply, $T_2^{\ast}=86(9)\,\mu$s and
$T_2=186(22)\,\mu$s. When the Ramsey or spin-echo sequence excludes these
regions, the coherence times are much longer: $T_2^{\ast}=299(22)\,\mu$s and
$T_2=2(1)$ms. A particularly stark example of this difference being for spin-
echo starting at 200 $\upmu$s: around $800\,\upmu$s in Fig. 5, the state
populations begin to change rapidly and the spin-echo signal quickly damps
333Due to the long rf pulse durations ($t_\pi\approx 50\,\upmu$s),
$\tau=800\,\upmu$s corresponds to the final rf pulse occurring almost
$900\,\upmu$s into the rotation..
While excluding the rapidly varying regions improves the coherence times, our
observed rotating coherence times are still well below that observed when the
diamond is held stationary ($T_2^{\ast}=1.5\,$ms, $T_2=6.5(4)$ms). In Fig.
5(c), we increase the spin-echo time in two-period intervals ($2\,$ms), with
the rf pulses applied only when the NV axis and magnetic field are aligned
($t_D=0$). Here, we see the contrast persists to times commensurate with what
is observed while stationary, $T_2=5.0(1)$ms, demonstrating coherent quantum
measurement of nuclear spins physically rotating at 1 kHz.
Figure 5: Quantum coherence measurement of rapidly rotating nuclear spins. a)
Pulse sequence: using feedforward control of the rf frequency, and adjusting
rf pulse lengths to execute $\pi/2$ or $\pi$-pulses, we perform Ramsey or
spin-echo interferometry on the rotating nuclear spin ensemble. The phase of
the final $\pi/2$-pulse is varied to trace out fringes (b). The spin coherence
times while rotating are then derived by fitting an exponential decay to the
fringe amplitudes as a function of interrogation time $\tau$. In (c), we do
the same spin-echo measurement but restrict $\tau$ to twice-integer multiples
of the rotation period (1 ms). Phase differences accumulated in subsequent
periods cancel, and we recover the spin-echo signal (d). The observed spin
coherence time $T_2=5.0(1)$ ms is close to the measured stationary value of
$6.5(4)$ ms. Error bars in signal data derive from photon counting statistics,
and error bars on fringe amplitudes are standard error in the fitted
sinusoidal amplitude.
With these results, we can begin to piece together the effect of rotation on
the coherence of the NV nuclear spin. The data in Fig. 5(c,d) are compelling
evidence that the intrinsic coherence of the nuclear spin is unaffected by
adiabatic physical rotation in the presence of a large off-axis magnetic
field. However, the rotation is not necessarily perfect, and spin-echo
contrast observed at 2$n$ period intervals only means that the period-to-
period variability of the rotation speed is small, since whatever (noisy)
phase accumulated in the first period is canceled in the second period that
immediately follows it. Moreover, if the angular velocity within a period is
not constant, such that the NV axis traces out an ellipse or more complicated
parametric shape each period, phase effects from this effect will aslo be
eliminated with spin-echo at two-period intervals. Loss of coherence at non-
periodic intervals does not automatically imply that our feedforward frequency
control is imperfect either, since for coherence to vanish, noise and
irreproducibility must be present.
The most obvious source of noise is the stability of the diamond rotation. We
performed an independent measurement of the motor stability using laser
detection of a fiducial 444See Supplementary Information and found that the
period exhibited a typical standard deviation of 323 ns. Even such small
period jitter has a disproportionately severe effect on the relative phase
between the local oscillator (the AWG waveform) and the NV due to the large
perturbation induced by the magnetic field, in particular the rapid vartiation
in transition frequency close to the magnetic field alignment point. A linear
frequency increase results in a quadratic increase in integrated phase, and
while this is partially canceled by the feedforward waveform, small
differences in the nuclear spin phase due to period jitter are nevertheless
amplified quadratically and result in a loss of phase coherence between the
start and end of the frequency sweep. After $t_D=200\,\upmu$s, the phase
increases approximately linearly (the transition frequency is almost constant
in time), and thus coherence loss from period jitter is suppressed. When the
nonlinear phase accumulation begins towards the end of the period (_i.e._
total sequence times $>800\,\upmu$s), we again see a sharp drop in coherence.
## VIII Continuous dynamical decoupling of an ensemble of strongly-perturbed
nuclear spins
The detrimental effect of motor period jitter can be eliminated by working in
a frame where phase accumulation is determined entirely by the phase coherence
of the rf field, dynamically decoupling the nuclear spin from its environment.
Since the rf Rabi frequency varies across the rotation due to gyromagnetic
augmentation (Sec. V), multi-pulse dynamical decoupling is nontrivial to
implement without risk of introducing significant pulse fidelity issues. We
instead opt to employ continuous dynamical decoupling, or spin-locking, in
conjunction with quantum feedforward control. A pure $|0,+1\rangle$ is
prepared at the NV axis-magnetic field alignment point, an rf $\pi/2$-pulse is
then applied followed immediately by a variable duration spin-locking rf pulse
$90^{\circ}$ out of phase to the first rf pulse. After a variable spin-locking
time, a final $\pi/2$-pulse (calibrated to the requisite length based on
gyromagnetic augmentation) is applied, and its phase varied to reveal fringes.
The results of spin-lock control for rotation at $1\,$kHz are depicted in
Figure 6, and compared against stationary results. The lower amplitude of the
rotating data is due to the deficiencies of state polarization discussed in
Sec. III. The slight dips in contrast coincide with lower Rabi frequency
regions (Fig. 4(c)), we thus attribute the contrast dip to imperfect readout
($\pi/2$-pulse) calibration. We also observe a small but measurable phase
change across the rotation, which we attribute to a time-dependent detuning
introduced through imperfect calibration of the feedforward profile.
Otherwise, the stationary and rotating spin-lock measurements are in
remarkable agreement, with the spin coherence and phase before and after a
rotation virtually the same. The data in Fig. 6 demonstrate coherent
decoupling of the nuclear spin while adiabatically rotating in the presence of
a significant, noisy, time-dependent perturbation; that is, the off-axis
magnetic field. The combination of feedforward quantum control and spin-
locking allow us to eliminate the significant effects of the off-axis magnetic
field, jitter of the rotation period, and effectively even the rotation
itself, since the nuclear spin accumulates essentially no phase during the
rotation while under spin-lock control.
Figure 6: Spin-lock dynamical decoupling of rotating nuclear spins. (a) AWG
pulse sequence. While generating a feedforward rf signal synchronous with the
diamond rotation, the output is gated into three pulses, a $\pi/2$ pulse (zero
phase), a variable duration pulse $90^{\circ}$ out of phase to the initiation
pulse and a final $\pi/2$ pulse with variable phase and a duration set by the
instantaneous Rabi frequency (Fig.4). Laser pulses before (after) prepare
(read) the NV spin state. (b) Sample spin-lock signal fringes for rotation at
$1\,$kHz. Error bars derive from photon counting statistics. (c) Fitted fringe
amplitude as a function of spin-locking time for rotating and stationary
diamond. Error bars are standard error in fitted fringe amplitudes.
## IX Discussion
This work represents the first study of the effects of rapid physical rotation
and significant magnetic field angles on the quantum properties of the 14N
nuclear spin in diamond. Magnetic fields used in this work allow rapid
polarization of the nuclear spin via the NV excited state level anticrossing,
and an interesting new regime to probe how off-axis magnetic fields affect the
nuclear spin where mixing with the electron spin is significant. Optical
polarization and readout of nuclear spins can still be achieved while rotating
at periods much shorter than the ensemble dephasing time of the nuclear spin,
and standard quantum state manipulations ($\pi/2$, $\pi$-pulses) can be
carried out with high fidelity. The large perturbation imposed by the off-axis
magnetic field leads to considerable state mixing within each electron spin
manifold of the NV, resulting in a $20\,\%$ modulation of the nuclear spin
transition frequency as the diamond is rotated. We counter this effect with
feedforward quantum control, modulating the rf waveform that drives the
nuclear spins with the same characteristic function imposed by the magnetic
field.
With feedforward control, the rf and two-level system remain in resonance
despite the significant perturbation of the off-axis magnetic field, and for
the first time we can observe how the NV nuclear spin behaves in such
circumstances. A key observation we make is that the electronic augmentation
of the nuclear gyromagnetic ratio depends sensitively on the alignment of the
magnetic field, and as a result the nuclear spin Rabi frequency drops by
almost an order of magnitude throughout the rotation. Nevertheless, we retain
coherent control over the nuclear spin with appropriately tailored FM quantum
control pulses that still execute high-fidelity gate operations. Using
feedforward control and the standard quantum sensing protocols of Ramsey and
spin-echo interferometry, we observe the effects of noisy, imperfect rotation
on the coherence of the nuclear spin, and with spin-locking, we eliminate
these effects as well, demonstrating almost complete decoupling of the nuclear
spins from the significant perturbations imposed by rotation.
We attribute the reduced coherence times we see when performing interferometry
within a single period as evidence of imperfect rotation, a conclusion
reinforced by the observation that coherence remains when the interrogation
time is set to an even multiple of rotation periods. Imperfect rotation
couples to the coherence of the qubits magnetically, via the perturbed
transition frequency induced by rotation in the presence of an off axis bias
magnetic field. While feedforward eliminates a significant fraction of the
relative phase between the rf and the qubits, noise in the form of period
jitter of the motor makes the relative phase vary with each iteration of the
experiment, an effect accentuated when the transition frequency varies sharply
(_i.e._ at the beginning and end of the rotation). This effect is the same for
spin-echo and Ramsey, and in spin-echo the sensitivity can in fact be higher
depending on the difference between feedforward signal and qubit transition
frequency.
One avenue of improvement is an optimization procedure for the feedforward
waveform. To accommodate the possibility of non-circular rotation, we require
an ‘on-the-fly’ means of optimizing the feedforward profile using quantum
measurement of the nuclear spins while rotating. However, this is a non-
trivial undertaking, given the subtle, more interesting effects of rotation
such a procedure may erase. There are two non-trivial quantum phases that the
qubit accumulates while rotating that are related to the geometric Berry phase
[48, 49]. The first of these relates to the path the rf field traces out in
real space, and its subsequent appearance in projective Hilbert space (the
Bloch sphere), which we reported on previously in [37]. The second is the
‘conventional’, state-dependent Berry phase equivalent to the solid angle
swept out by the quantization axis of the system (tilted from the N-V axis by
the magnetic field) as the diamond is rotated. In a rotating quantum
interferometry sequence, we detect an indistinguishable combination of these
‘interesting’ physical effects and more mundane effects such as an offset or
skew in the feedforward profile compared to the transition frequency. Before a
rigorous, definitive quantum measurement of rotationally-induced phases can be
undertaken, further work is needed to better understand how the desired phase
and systematic effects can be distinguished.
The unique capabilities developed in this work lay the foundations for several
interesting avenues of future inquiry. The strong off-axis field regime of the
NV is also generally inaccessible due to quenched optical contrast [44]. While
control of the NV electron spin with microwaves is not considered here, it
could bring new insights to our understanding of the NV coupling to strain and
electric fields in the high transverse field regime, and considerable richness
to future work employing nuclear spins in the rotating frame. Another
intriguing possibility is employing other nuclear spin species, such as 13C,
which couple to each other via the dipolar interaction in natural abundance
samples. An interesting interplay is then expected between NV-mediated nuclear
hyperpolarization and spin diffusion [50, 51] and rotational averaging of
homonuclear couplings, since the experimental configuration in our work
emulates that of NMR magic-angle spinning [52, 53].
Devoid of the nuclear quadrupole interaction exhibited by the spin-1 14N
nucleus, the ground state splitting of the 15N is only $\sim 200$ kHz,
allowing exploration of the regime where rotation speed, Rabi frequency and
Larmor frequency are all comparable. Additionally, the nuclear spin state
mixing observed in this work would be radically different in the case of 15N,
with the nuclear spin more inclined to follow the external magnetic field due
to the absence of the intrinsic quadrupole axis. Finally, extension to the
ground-state level anticrossing (GSLAC) and the consequent effects on
gyromagnetic augmentation [54, 45, 32] would be possible with a stronger
magnetic field than used in our experiments.
## X Conclusions
In this work, we have demonstrated quantum measurement and control of an
ensemble of nuclear spins rotating in the presence of a large, off-axis
magnetic field. We have shown, for the first time, how quantum feedforward of
the rf drive can be used to maintain coherent control of the nuclear spins
even when the magnetic field is orthogonal to the NV axis. Furthermore, we
reveal how imperfect rotation couples to the coherence of the nuclear spins,
and using continuous dynamical decoupling, preserve the coherence of the spin
ensemble over a full rotation period. Our work highlights the unique
flexibility the NV center in diamond brings to quantum sensing, allowing
access to a long-lived nuclear quantum memory embedded within a robust
substrate that can be rapidly rotated at quantum coherent timescales. We also
harness the power of dynamical decoupling to suppress all traces of the large
magnetic perturbation and noisy, imperfect rotation, effectively giving us the
ability to induce physical rotation on-demand. This work unlocks a previously
frozen degree of freedom for the NV and its host nuclear spin, opening a wide
range of possibilities for practical quantum sensing [20, 21] and fundamental
quantum science with rotating systems [35, 4, 6, 37, 55, 56].
## Acknowledgements
We thank L. C. L. Hollenberg, J.-P. Tetienne and L. D. Turner for insightful
discussions. This work was supported by the Australian Research Council
(DP190100949). A. A. W. acknowledges valuable support from the UoM Albert
Shimmins Research Continuity Scheme.
## References
* Wood _et al._ [2017] A. A. Wood, E. Lilette, Y. Y. Fein, V. S. Perunicic, L. C. L. Hollenberg, R. E. Scholten, and A. M. Martin, Magnetic pseudo-fields in a rotating electron–nuclear spin system, Nat Phys 13, 1070-1073 (2017).
* Fu _et al._ [2020] K.-M. C. Fu, G. Z. Iwata, A. Wickenbrock, and D. Budker, Sensitive magnetometry in challenging environments, AVS Quantum Sci. 2, 044702 (2020).
* Hoang _et al._ [2016] T. M. Hoang, J. Ahn, J. Bang, and T. Li, Electron spin control of optically levitated nanodiamonds in vacuum, Nat Comms 7, 12250 (2016).
* Delord _et al._ [2018] T. Delord, P. Huillery, L. Schwab, L. Nicolas, L. Lecordier, and G. Hétet, Ramsey Interferences and Spin Echoes from Electron Spins Inside a Levitating Macroscopic Particle, Phys. Rev. Lett. 121, 053602 (2018).
* Delord _et al._ [2017a] T. Delord, L. Nicolas, Y. Chassagneux, and G. Hétet, Strong coupling between a single nitrogen-vacancy spin and the rotational mode of diamonds levitating in an ion trap, Phys. Rev. A 96, 063810 (2017a).
* Delord _et al._ [2020] T. Delord, P. Huillery, L. Nicolas, and G. Hétet, Spin-cooling of the motion of a trapped diamond, Nature 580, 56 (2020).
* Perdriat _et al._ [2021a] M. Perdriat, C. Pellet-Mary, P. Huillery, L. Rondin, and G. Hétet, Spin-Mechanics with Nitrogen-Vacancy Centers and Trapped Particles, Micromachines 12, 651 (2021a).
* Doherty _et al._ [2013] M. W. Doherty, N. B. Manson, P. Delaney, F. Jelezko, J. Wrachtrup, and L. C. L. Hollenberg, The nitrogen-vacancy colour centre in diamond, Phys Rep , 528, 1 (2013).
* Schirhagl _et al._ [2014] R. Schirhagl, K. Chang, M. Loretz, and C. L. Degen, Nitrogen-Vacancy Centers in Diamond: Nanoscale Sensors for Physics and Biology, Ann Rev of Phys Chem 65, 83 (2014).
* Fuchs _et al._ [2011] G. D. Fuchs, G. Burkard, P. V. Klimov, and D. D. Awschalom, A quantum memory intrinsic to single nitrogen-vacancy centres in diamond, Nat Phys 7, 789 (2011).
* Zaiser _et al._ [2016] S. Zaiser, T. Rendler, I. Jakobi, T. Wolf, S.-Y. Lee, S. Wagner, V. Bergholm, T. Schulte-Herbrüggen, P. Neumann, and J. Wrachtrup, Enhancing quantum sensing sensitivity by a quantum memory, Nat Comms 7, 12279 (2016).
* Liu _et al._ [2019] Y.-X. Liu, A. Ajoy, and P. Cappellaro, Nanoscale Vector dc Magnetometry via Ancilla-Assisted Frequency Up-Conversion, Phys. Rev. Lett. 122, 100501 (2019).
* Qiu _et al._ [2021] Z. Qiu, U. Vool, A. Hamo, and A. Yacoby, Nuclear spin assisted magnetic field angle sensing, npj Quant Inform 7, 1 (2021).
* Smeltzer _et al._ [2009] B. Smeltzer, J. McIntyre, and L. Childress, Robust control of individual nuclear spins in diamond, Phys. Rev. A 80, 050302 (2009).
* Neumann _et al._ [2010] P. Neumann, J. Beck, M. Steiner, F. Rempp, H. Fedder, P. R. Hemmer, J. Wrachtrup, and F. Jelezko, Single-Shot Readout of a Single Nuclear Spin, Science 329, 542 (2010).
* Maclaurin _et al._ [2012] D. Maclaurin, M. W. Doherty, L. C. L. Hollenberg, and A. M. Martin, Measurable Quantum Geometric Phase from a Rotating Single Spin, Phys. Rev. Lett. 108, 240403 (2012).
* Ledbetter _et al._ [2012] M. P. Ledbetter, K. Jensen, R. Fischer, A. Jarmola, and D. Budker, Gyroscopes based on nitrogen-vacancy centers in diamond, Phys. Rev. A 86, 052116 (2012).
* Ajoy and Cappellaro [2012] A. Ajoy and P. Cappellaro, Stable three-axis nuclear-spin gyroscope in diamond, Phys. Rev. A 86, 062104 (2012).
* Jaskula _et al._ [2018] J.-C. Jaskula, K. Saha, A. Ajoy, D. J. Twitchen, M. Markham, and P. Cappellaro, Cross-sensor Feedback stabilization of an emulated quantum spin gyroscope, Phys. Rev. Applied 11, 054010 (2019).
* Soshenko _et al._ [2020] V. V. Soshenko, S. V. Bolshedvorskii, O. Rubinas, V. N. Sorokin, A. N. Smolyaninov, V. V. Vorobyov, and A. V. Akimov, Nuclear spin gyroscope based on the NV center in diamond, Phys. Rev. Lett. 126, 197702 (2021).
* Jarmola _et al._ [2021] A. Jarmola, S. Lourette, V. M. Acosta, A. G. Birdwell, P. Blümler, D. Budker, T. Ivanov, and V. S. Malinovsky, Demonstration of diamond nuclear spin gyroscope, arXiv:2107.04257 (2021).
* Wrachtrup and Jelezko [2006] J. Wrachtrup and F. Jelezko, Processing quantum information in diamond, J. Phys.: Condens. Matter 18, S807 (2006).
* Pagliero _et al._ [2014] D. Pagliero, A. Laraoui, J. D. Henshaw, and C. A. Meriles, Recursive polarization of nuclear spins in diamond at arbitrary magnetic fields, Appl. Phys. Lett. 105, 242402 (2014).
* Chakraborty _et al._ [2017] T. Chakraborty, J. Zhang, and D. Suter, Polarizing the electronic and nuclear spin of the NV-center in diamond in arbitrary magnetic fields: analysis of the optical pumping process, New J. Phys. 19, 073030 (2017).
* Xu _et al._ [2019] N. Xu, Y. Tian, B. Chen, J. Geng, X. He, Y. Wang, and J. Du, Dynamically Polarizing Spin Register of N-V Centers in Diamond Using Chopped Laser Pulses, Phys. Rev. Applied 12, 024055 (2019).
* Goldman _et al._ [2020] M. Goldman, T. Patti, D. Levonian, S. Yelin, and M. Lukin, Optical Control of a Single Nuclear Spin in the Solid State, Phys. Rev. Lett. 124, 153203 (2020).
* Gulka _et al._ [2021] M. Gulka, D. Wirtitsch, V. Ivády, J. Vodnik, J. Hruby, G. Magchiels, E. Bourgeois, A. Gali, M. Trupke, and M. Nesladek, Room-temperature control and electrical readout of individual nitrogen-vacancy nuclear spins, arXiv:2101.04769 (2021).
* Huillery _et al._ [2021] P. Huillery, J. Leibold, T. Delord, L. Nicolas, J. Achard, A. Tallaire, and G. Hétet, Coherent microwave control of a nuclear spin ensemble at room temperature, Phys. Rev. B 103, L140102 (2021).
* Jacques _et al._ [2009] V. Jacques, P. Neumann, J. Beck, M. Markham, D. Twitchen, J. Meijer, F. Kaiser, G. Balasubramanian, F. Jelezko, and J. Wrachtrup, Dynamic Polarization of Single Nuclear Spins by Optical Pumping of Nitrogen-Vacancy Color Centers in Diamond at Room Temperature, Phys. Rev. Lett. 102, 057403 (2009).
* Steiner _et al._ [2010] M. Steiner, P. Neumann, J. Beck, F. Jelezko, and J. Wrachtrup, Universal enhancement of the optical readout fidelity of single electron spins at nitrogen-vacancy centers in diamond, Phys. Rev. B 81, 035205 (2010).
* Jarmola _et al._ [2020] A. Jarmola, I. Fescenko, V. M. Acosta, M. W. Doherty, F. K. Fatemi, T. Ivanov, D. Budker, and V. S. Malinovsky, Robust optical readout and characterization of nuclear spin transitions in nitrogen-vacancy ensembles in diamond, Phys. Rev. Research 2, 023094 (2020).
* Chen _et al._ [2015] M. Chen, M. Hirose, and P. Cappellaro, Measurement of transverse hyperfine interaction by forbidden transitions, Phys. Rev. B 92, 020101 (2015).
* McGuinness _et al._ [2011] L. P. McGuinness, Y. Yan, A. Stacey, D. A. Simpson, L. T. Hall, D. Maclaurin, S. Prawer, P. Mulvaney, J. Wrachtrup, F. Caruso, R. E. Scholten, and L. C. L. Hollenberg, Quantum measurement and orientation tracking of fluorescent nanodiamonds inside living cells, Nat Nano 6, 358 (2011).
* Maclaurin _et al._ [2013] D. Maclaurin, L. T. Hall, A. M. Martin, and L. C. L. Hollenberg, Nanoscale magnetometry through quantum control of nitrogen–vacancy centres in rotationally diffusing nanodiamonds, New J. Phys. 15, 013041 (2013).
* Delord _et al._ [2017b] T. Delord, L. Nicolas, L. Schwab, and G. Hétet, Electron spin resonance from NV centers in diamonds levitating in an ion trap, New J. Phys. 19, 033031 (2017b).
* Wood _et al._ [2018a] A. A. Wood, E. Lilette, Y. Y. Fein, N. Tomek, L. P. McGuinness, L. C. L. Hollenberg, R. E. Scholten, and A. M. Martin, Quantum measurement of a rapidly rotating spin qubit in diamond, Science Advances 4, eaar7691 (2018a).
* Wood _et al._ [2020] A. Wood, L. Hollenberg, R. Scholten, and A. Martin, Observation of a Quantum Phase from Classical Rotation of a Single Spin, Phys. Rev. Lett. 124, 020401 (2020).
* Wood _et al._ [2018b] A. A. Wood, A. G. Aeppli, E. Lilette, Y. Y. Fein, A. Stacey, L. C. L. Hollenberg, R. E. Scholten, and A. M. Martin, $T_2$-limited sensing of static magnetic fields via fast rotation of quantum spins, Phys. Rev. B 98, 174114 (2018b).
* Note [1] See Supplemental Material [URL].
* Robledo _et al._ [2011] L. Robledo, H. Bernien, T. v. d. Sar, and R. Hanson, Spin dynamics in the optical cycle of single nitrogen-vacancy centres in diamond, New J. Phys. 13, 025013 (2011).
* Tetienne _et al._ [2012] J.-P. Tetienne, L. Rondin, P. Spinicelli, M. Chipaux, T. Debuisschert, J.-F. Roch, and V. Jacques, Magnetic-field-dependent photodynamics of single NV defects in diamond: an application to qualitative all-optical magnetic imaging, New J. Phys. 14, 103033 (2012).
* Busaite _et al._ [2020] L. Busaite, R. Lazda, A. Berzins, M. Auzinsh, R. Ferber, and F. Gahbauer, Dynamic 14N nuclear spin polarization in nitrogen-vacancy centers in diamond, Phys. Rev. B 102, 224101 (2020).
* Note [2] See Supplemental Material [URL].
* Epstein _et al._ [2005] R. J. Epstein, F. M. Mendoza, Y. K. Kato, and D. D. Awschalom, Anisotropic interactions of a single spin and dark-spin spectroscopy in diamond, Nature Physics 1, 94 (2005).
* Sangtawesin _et al._ [2016] S. Sangtawesin, C. A. McLellan, B. A. Myers, A. C. B. Jayich, D. D. Awschalom, and J. R. Petta, Hyperfine-enhanced gyromagnetic ratio of a nuclear spin in diamond, New J. Phys. 18, 083016 (2016).
* Note [3] Due to the long rf pulse durations ($t_\pi\approx 50\tmspace+{.1667em}\upmu$s), $\tau=800\tmspace+{.1667em}\upmu$s corresponds to the final rf pulse occurring almost $900\tmspace+{.1667em}\upmu$s into the rotation.
* Note [4] See Supplemental Material [URL].
* Berry [1984] M. V. Berry, Quantal Phase Factors Accompanying Adiabatic Changes, Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences 392, 45 (1984).
* Aharonov and Anandan [1987] Y. Aharonov and J. Anandan, Phase change during a cyclic quantum evolution, Phys. Rev. Lett. 58, 1593 (1987).
* Wunderlich _et al._ [2017] R. Wunderlich, J. Kohlrautz, B. Abel, J. Haase, and J. Meijer, Optically induced cross relaxation via nitrogen-related defects for bulk diamond 13C hyperpolarization, Phys. Rev. B 96, 220407 (2017).
* Pagliero _et al._ [2018] D. Pagliero, K. R. K. Rao, P. R. Zangara, S. Dhomkar, H. H. Wong, A. Abril, N. Aslam, A. Parker, J. King, C. E. Avalos, A. Ajoy, J. Wrachtrup, A. Pines, and C. A. Meriles, Multispin-assisted optical pumping of bulk 13C nuclear spin polarization in diamond, Phys. Rev. B 97, 024422 (2018).
* Andrew _et al._ [1958] E. R. Andrew, A. Bradbury, and R. G. Eades, Nuclear Magnetic Resonance Spectra from a Crystal rotated at High Speed, Nature 182, 1659 (1958).
* Wood _et al._ [2021] A. A. Wood, R. M. Goldblatt, R. P. Anderson, L. C. L. Hollenberg, R. E. Scholten, and A. M. Martin, Anisotropic electron-nuclear interactions in a rotating quantum spin bath, arXiv:2105.07365 (2021).
* Sangtawesin _et al._ [2014] S. Sangtawesin, T. Brundage, and J. Petta, Fast Room-Temperature Phase Gate on a Single Nuclear Spin in Diamond, Phys. Rev. Lett. 113, 020506 (2014).
* Pellet-Mary _et al._ [2021] C. Pellet-Mary, P. Huillery, M. Perdriat, and G. Hétet, Magnetic-Torque Enhanced by Tunable Dipolar interactions, arXiv:2103.00836 (2021).
* Perdriat _et al._ [2021b] M. Perdriat, P. Huillery, C. Pellet-Mary, and G. Hétet, Angle Locking of a Levitating Diamond using Spin-Diamagnetism, arXiv:2102.13637 (2021b).
| arxiv-papers | 2021-07-27T03:39:36 | 2024-09-04T03:07:20.466664 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Alexander A. Wood, Russell M. Goldblatt, Robert E. Scholten and Andy\n M. Martin",
"submitter": "Alexander Wood",
"url": "https://arxiv.org/abs/2107.12577"
} |
2107.12590 | # The Reflectance Spectra of CV-CK Carbonaceous chondrites from the Near
Infrared to the Visible
S. Tanbakouei ,1,2 Josep M. Trigo-Rodríguez ,1,2 J. Llorca,3 C.E. Moyano-
Cambero,1,2 I.P. Williams,4 Andrew S. Rivkin 5
1Institute of Space Sciences (CSIC), Meteorites, Minor Bodies and Planetary
Sciences Group, Campus UAB, c/Can Magrans s/n,
08193 Cerdanyola del Vallès (Barcelona), Catalonia, Spain
2Institut d’Estudis Espacials de Catalunya (IEEC), Gran Capità, 2-4, despatx
201, 08034 Barcelona, Catalonia, Spain
3Institute of Energy Technologies, Department of Chemical Engineering and
Barcelona Research Center in Multiscale Science and Engineering,
Universitat Politècnica de Catalunya, EEBE, 08019 Barcelona, Catalonia, Spain
4School of Physics and Astronomy, Queen Mary, University of London, Mile End
Rd. London E1 4NS, UK.
5John Hopkins University Applied Physics Laboratory, Laurel, MD, USA.
E-mails: [email protected], [email protected]
(Accepted XXX. Received YYY; in original form ZZZ)
###### Abstract
Carbonaceous chondrite meteorites are so far the only available samples
representing carbon-rich asteroids and in order to allow future comparison
with samples returned by missions such as Hayabusa 2 and OSIRIS-Rex, is
important to understand their physical properties. Future characterization of
asteroid primitive classes, some of them targeted by sample-return missions,
requires a better understanding of their mineralogy, the consequences of the
exposure to space weathering, and how both affect the reflectance behavior of
these objects. In this paper, the reflectance spectra of two chemically-
related carbonaceous chondrites groups, precisely the Vigrano (CVs) and
Karoonda (CKs), are measured and compared. The available sample suite includes
polished sections exhibiting different petrologic types: from 3 (very low
degree of thermal metamorphism) to 5 (high degree of thermal metamorphism). We
found that the reflective properties and the comparison with the Cg asteroid
reflectance class point toward a common chondritic reservoir from which the
CV-CK asteroids collisionally evolved. In that scenario the CV and CK
chondrites could be originated from 221 Eos asteroid family, but because of
its collisional disruption, both chondrite groups evolved separately,
experiencing different stages of thermal metamorphism, annealing and space
weathering.
###### keywords:
Asteroids-Meteoites-Minor bodies
††pubyear: 2019††pagerange: The Reflectance Spectra of CV-CK Carbonaceous
chondrites from the Near Infrared to the Visible –B
Accepted for publication in MNRAS on July 19th, 2021
## 1 Introduction
Most meteorites originates from asteroids and as such they provide samples
that can be directly studied in laboratories. Though they have different size
scales, an asteroid and a meteorite can share compositional and reflectance
properties because they contain similar rock-forming minerals (Cloutis et al.,
2012; Trigo-Rodríguez et al., 2015). The undifferentiated chondritic
meteorites have proven to be good proxies to understand the properties of
chondritic asteroids (Cloutis et al., 2012; Trigo-Rodriguez et al., 2014; Beck
et al., 2014; Moyano-Cambero et al., 2017; Tanbakouei et al., 2019).
Meteorites can be studied in through dedicated laboratory experiments, but the
properties of an asteroid are usually inferred from ground-based observations,
though a few also have been observed from spacecraft (see e.g. Gaffey et al.,
2002). Asteroids are subjected to space weathering processes that alter the
initial surface properties of the body (Brunetto et al., 2015; Colonna et al.,
2019). Collisional evolution of asteroids provides meter-sized meteoroids that
are producing meteorite falls (Trigo-Rodriguez & Blum, 2009; Beitz et al.,
2016). So that, the Earth receives a continuous delivery of asteroidal
materials providing invaluable source of scientific information (Colonna et
al., 2019). Each one of these rocks has the potential to explain the story of
its progenitor body and provide information about the processes that occurred
in their parent asteroids (Binzel et al., 2010, 2015). For instance,
collisional gardening has been at work for 4.5 Gyrs and this bombardment
modified the primordial properties of chondritic asteroids (Beitz et al.,
2016; Blum et al., 2006). The spectral properties of the near-Earth target
asteroid 162173 Ryugu reported by Hayabusa 2 mission, have compared so far by
Kitazato et al. (2019) with the meteorites of CMs, CIs and CV3 Allende.
Another mission, called OSIRIS - REx (Origins, Spectral Interpretation,
Resource Identification, Security, Regolith Explorer), explored the near-Earth
asteroid (101955) Bennu providing a good insight about the reflectance
properties of the asteroid in the visible and near infrared range (Lauretta et
al., 2017; Barucci et al., 2020; Rizos et al., 2021). Hamilton et al. (2019)
also established a comparison with CMs and CIs chondrites to infer the
different degrees of hydration of the parent asteroids.
Laboratory reflectance spectra of meteorites are often used to identify the
main rock-forming minerals of asteroids (Gaffey et al., 2002; Cloutis et al.,
2011; Cloutis et al., 2012; Beck et al., 2014). Over the years, additional
information such as physico-chemical properties of carbonaceous chondrites
(CCs) and primitive asteroids and their reflective behavior, was obtained by
increasingly sensitive and precise spectrometers (Barucci et al., 2005;
Cloutis et al., 2011; Trigo-Rodriguez et al., 2014). Carbonaceous chondrites
come from undifferentiated objects with sizes between one and hundreds of
kilometres, formed in the outer region of the main asteroid belt (MB) or
beyond, and sculpted by collisions (Chapman et al., 1975; Vernazza et al.,
2011; Beitz et al., 2016). The characterization of carbonaceous chondrites is
often challenging because their reflectance spectra are dark, sometimes
involving silicates and oxides, but also including minor contribution from
opaque amorphous materials. The crystalline and amorphous materials within
protoplanetary disks are thermally processed and accreted to make bodies of
various sizes and compositions, depending on the heliocentric distance of
formation (Trigo-Rodríguez et al., 2019). The presence of some of these
components alter their light scattering properties, and link these meteorites
to some of the darkest objects of our Solar System (Cloutis et al., 2011).
In this paper we study the similarities in the reflectance behavior of the CV
group- named after Vigarano meteorite- and the CK group, named after Karoonda,
given that a chemical similarity was already established between both groups
previously (Greenwood et al., 2010; Wasson et al., 2013). According to the
relation between CV and CKs, different degrees of thermal metamorphism and
aqueous alteration, resulting from the asteroidal collision and differentiated
metamorphism could be studied (Wasson, Isa & Rubin, 2013; Trigo-Rodríguez,
2015; Chaumard & Devouard, 2016; Rubin & Ma, 2017).
We explore a scenario in which CV and CK chondrites evolved differently as
consequence of the catastrophic disruption of a moderately large progenitor
asteroid. The surviving asteroid fragments were dynamically separated and
exposed to impacts with other bodies, so at the end the degree of oxidation
was different. Oxidation, experienced by the presence of Fe+3 in low-Ca
pyroxenes, and abundant Ni in olivine, are indicative that metamorphism
occurred in most CK samples, since petrographic type 4 or higher types
indicate thermal metamorphism (Noguchi, 1993). Such physical process also
leads to Fe enrichment in CAIs (Chaumard et al., 2014). As a consequence of
metamorphism, the total carbon contents of CKs tend to decrease with
increasing metamorphic grade (Jarosewich, 2006; Greenwood et al., 2010). In
fact, Geiger & Bischoff (1995) suggested that CK chondrites formed by
metamorphic heating of a CV like precursor under oxidizing conditions. Some
part of the metamorphism is due to collisions and the associated shocks, and
so the resultant minerals are those being identified in our spectra (Urzaiz,
Trigo-Rodriguez & Mestres, 2015). Huber et al. (2006) chose CK samples of un-
weathered Antarctic meteorites to analyse the bulk elemental chemistry using
INAA (Instrumental Neutron Activation Analysis) and petrographic techniques.
These authors concluded that, as consequence of the aqueous alteration on the
parent asteroid, CK chondrites became highly oxidized (Clayton & Mayeda,
1999).
All CK chondrites contain shock-induced fractured and darkened silicates
exhibiting tiny (< 0.3-10 $\mu$m) grains of magnetite and pentlandite
throughout the interiors of many silicate grains (Brearley & Jones, 1998;
Kallemeyn, Rubin & Wasson, 1991). Hashiguchi, Tomeoka & Ohnishi (2008)
proposed that these opaque regions were produced as a consequence of the
progressive shock-darkening that creates vesicles and holes. The olivine in CK
chondrites had been seen as spherical grains (0.1–5 ${\mu}$m) of magnetite and
pentlandite, and other silicates. Noguchi (1993) and Geiger & Bischoff (1995)
remarked that $\mu$m-sized magnetite grains act as opaque in the interior of
silicates, thus contributing to shock darkening. The process of post-shock
annealing could led to minimize influence of shock in olivine (Bauer, 1979;
Rubin, 2004, 2012). According to Brearley (1991) silicate blackening could be
due to shock but other processes could have been at work.
We use CV and CK meteorite reflectance spectra to identify specific spectral
features that can be used to characterize the parent bodies of these
meteorites in remote telescopic observations. As these groups have experienced
different degrees of metamorphism, their reflectance behavior might help us to
establish some evolutionary patterns with other CC classes, which we wish to
identify how these patterns deal with the effects of shock in the history of
their parental asteroids. Another clear example of the importance of the
collisional history of asteroids is (2) Pallas (Marsset et al., 2020).
Establishing new reflectance spectra links is of key importance as
collisionally processed transitional asteroids and short period comets could
also produce carbonaceous chondrites (Tanbakouei et al., 2020).
The paper is organized as follow: In Section 2, sample selection and the
instrumental procedures are explanied in details. One section is also
didecated to data analysis which explains the parameters in Table 3. In
Section 3 the results and obtained spectrcal reflectivity figures are
provided. Section 4 will talk about the comparisons of our result with
previuos methods, comparison of the reflectivity between CVs and Cks, and
comparison of these chondrites with Cg asteroidal classes. Also a brief
paragraph is provided about the Eos Family compare to CK carbonaceous
chondrites. Section 5 is the conclusion part of the study. Appendix is
provided as some supplmentary figures.
## 2 Instrumental procedure
### 2.1 Samples characterization using microscope techniques
At the Institute of Space Sciences meteorite clean laboratory, we previously
study the sections using a Zeiss Scope, with magnifications up to 500X, and
with a Motic BA310Pol Binocular microscope. Main minerals are identified using
Reflected (RL) and Transmitted light (TL) techniques and later confirmed using
Energy-Dispersive X-ray Spectrometry (EDS) using an electron microscope (see
below). In this way we recognize the principal features and minerals forming
each rock (Table 1). In addition, TL informs about the degree of terrestrial
weathering experienced by each meteorite. Transmitted light (TL) microscopy is
particularly useful as allows distinguishing the action of water in some
aqueous alteration minerals like e.g. oxides and clays. Under the action of
water crystalline silicates become blurry and show distinguishable alteration
colors and textures. We always look for well-preserved sections, exhibiting a
minimum terrestrial weathering. We applied similar methods for characterizing
aqueous alteration as in chondrites (Trigo-Rodriguez et al., 2006; Rubin et
al., 2007; Trigo-Rodríguez, 2015; Trigo-Rodríguez et al., 2019) allow us to
make sure that our thin sections are not too altered. Rusty interiors with Fe-
oxides can be clearly identified as an orange background in transmitted light,
not observed in our selected sections.
Once we identify a quite pristine section, we bring it for study using a
Scanning Electron Microscope (SEM) at the Institut Català de Nanociència i
Nanotecnologia (ICN2). In particular we used a FEI Quanta 650 FEG with a Back
Scattered Electron Detector (BSED). This SEM was operated in low-vacuum mode
with each thin section uncoated so we can detect the C abundance using a
Energy-Dispersive X-ray Spectrometer (EDS) attached to the SEM. In particular,
the instrument is an Inca 250 SSD XMax20 with Peltier cooling and with a
detector area of 20 mm2. These analyses were used over selected 1 mm2 regions
of interest (ROIs) and also on specific points in order to understand the
sample’s mineralogy. Using all these chemical data we can rule out possible
weathered areas. This is an important point as we wish having a minimum
participation of minerals produced during the stay of meteorites on Earth.
### 2.2 UV-NIR spectroscopy and data analysis
The next step is to obtain the reflectance spectrum of each meteorite. To make
sure that the reflectance spectrum is not affected by terrestrial weathering
we chose a ROI of the interior of the meteorite section, far from the
meteorite thin section. A Shimadzu UV3600 UV–Vis–NIR spectrometer was used to
obtain reflectance spectra of thick and thin meteorite sections. As our
spectrometer has a slot window of 1 $\times$ 0.2 mm2 we chose regions
unaffected by weathering to be as much representative of the original parent
body mineralogy.
Several CV and CK carbonaceous chondrites from the NASA Antarctic collection
were selected (Table 1) and measured using the spectrometer setup described by
(Trigo-Rodriguez et al., 2014). The standard setting for the spectrometer is
an integrating sphere (ISR) with a working range of 180-2600 nm, although the
signal becomes noisy beyond about 2000 nm. In order to cover a wide range of
wavelengths, the spectrometer uses multiple lamps, detectors and diffraction
gratings which produce some artefacts that are removed in the spectra
presented below.
We used thin ($\sim$30 $\mu$m) and thick ($\sim$1 mm) meteorite sections to
obtain the spectra. All our samples had a larger area than the spectrometer
beam to avoid signal reflections by other materials, following procedure
(Trigo-Rodríguez, 2015). Moyano-Cambero et al. (2016) demonstrated using the
same instrument that the incident light is not transmitted through the
section. The spectra presented here covers the 400 to 1800 nm spectral range
and allows comparison with asteroidal spectra taken from ground or space-based
telescopes.
The spectrometer diffraction illumination originates from one of two lamps and
passes through a variable slit, then is filtered with a grating to select the
desired wavelength and afterwards is split into two alternating but identical
beams with a chopper. Next the beam interacts with the sample and is routed to
the detector. The reference beam interacts with the material and then goes to
the same detector. The interior of the integrating sphere is coated with a
duraflect reflecting polymer. The spectra obtained via this specific
spectrometer, always shows noise between 800 and 900 nm plus two instrumental
peaks (one from 1500 to 1600 nm and the other from 1900 to 2200 nm) (Moyano-
Cambero et al., 2016). Above 2000 nm, the spectra becomes noisy and loses
uniformity, due mostly to humidity, carbon dioxide, and system hardware. To
avoid displaying unreliable data, the spectra above the 1800 nm are not
included. The peaks at 1500-1600 nm and at 1900-2200 nm are attributed to an
unsuccessful instrumental correction applied by the software to remove the
presence of the BaSO4 (Fig 10 in the appendix) substrate of the final spectra
that has been previously explained in these papers (Moyano-Cambero et al.,
2016; Tanbakouei et al., 2019). A new correction had been applied to the
spectra to remove those peaks, but the final result in those regions became a
bit noisier than desired. The region between 800 and 900 nm was deleted, as it
does not include usable data and was too noisy to be reliable. The meteorite
specimens studied here are listed in Table 1. We have tried to chose samples
from different petrologic types from CK3 to CK5.
Table 1: Meteorite specimens analyzed, petrologic type, estimated weathering
grade, oxidation state and main rock-forming minerals.
Meteorite name Petrologic type Weathering grade Oxidation state Dominant rock-
forming minerals Allende CV3 W1 Oxidized Oliv., pyrox., troilite and CAIs ALH
84028 CV3 W0 Oxidized Oliv., pyrox., trolilite and CAIs ALH 85002 CK4 W1
Oxidized Oliv., pyrox., plagioclase and magnetite LAR 12265 CK5 W2 Oxidized
Oliv., pyrox., sulphide and magnetite (shock darkened) LAR 04318 CK4 W1
Oxidized Oliv., pyrox., sulphide and magnetite MET 00430 CV3 W2 Oxidized
Oliv., pyrox., and CAIs MET 01017 CV3-an W2 Reduced Oliv., pyrox., metal and
sulphide MET 01074 CV3 W1 Oxidized Oliv., pyrox., and CAIs MIL 07002 CV3 W2
Oxidized Oliv., pyrox., and CAIs PCA 82500 CK3 W2-3 Oxidized Oliv., pyrox.,
troilite, metal and CAIs
To obtain the spectral features of different minerals existed on our studied
samples, the main peak of each mineral band is identified. The band center and
width of the peaks are given in Table 3. All the spctral parameters including
maximum and minimum peaks, their centers, and the width of each band are
measured by a python code. The instrumental error is basically the step of the
spectrometer which is $\sim$1 nm.
## 3 Results
The discovery of a significant number of new CK chondrites in Antarctica has
increased the availability of such chondrites. Some of these new CK chondrites
exhibit low levels of terrestrial weathering, making them a good source for
spectroscopic comparison with other carbonaceous chondrites and to some extent
with asteroids. The reflectance spectra of five CK chondrites obtained in this
work are shown in Fig 1. We used the average data among CK spectral
reflectance and made the BaS$O_{4}$ correction above. Pecora Escarpment (PCA
82500) and Larkman Nunatak 04318 (LAR 04318) were corrected two times to
reduce noises (Moyano-Cambero et al., 2016).
Figure 1: The reflectance spectra of five CK chondrites. The arrows mark the
band positions of various minerals
.
The newly-obtained reflectance spectra of CK chondrites sections included in
this study are shown in Fig 1 with different wavelength ranges. They have
slightly red to blue spectral slopes beyond 900 nm (mostly red in the 900 to
1800 nm region and a bit blue slopped, above 1500 nm), exhibiting an olivine-
like absorption band in the 1000-1200 nm region ( Fig 1).
In the CK spectra it can be seen that the centre of the absorption bands does
not change its position with the metamorphic grades, but correlates with the
olivine composition. The depth of the bands, however, increases with higher
degrees of thermal metamorphism, with the deepest band being found in CK6
spectra (Fig 2), while CK3–5 petrographic grades display shallower band depths
(Fig 2).
Figure 2: Comparison of CK reflectance spectra from meteorite powders studied
in the RELAB spectral database in the range of 300 nm to 2500 nm range. a)
Mean spectral reflectance of three different petrological types of CKs. b)
Mean spectral reflectance of three different petrological type of CKs with
error bars.
The reflectance spectra of CV chondrites, with the exception of Allende,
displays a decreasing reflectance toward wavelengths short ward of 500 nm,
which is the plausible result of the formation of iron oxyhydroxides due to
terrestrial weathering. Significantly, the narrow absorption band in ALH 85002
and Allende, is due to its deep extinction below 400 nm and could be
correlated with maghemite and magnetite (Tang et al., 2003). It appears in Fig
3 that fine-grained CVs have shallower olivine absorption bands. Particularly,
the 1000 nm olivine absorption band is the main feature observed in CK and CV
spectra, but it is deeper in CKs than in CV chondrites. In our reflectance
spectra of CK chondrites, the olivine absorption feature at 1050 nm is
dominant, indicating that it is a major rock-forming component. Another
distinguishable bands are a low-Ca pyroxene band at 900 nm and a plagioclase
feldspar band at 1250 nm (see Table 3). Cloutis et al. (2012) suggests that
some CCs do not have well-defined olivine absorption bands, due to not having
experienced high enough temperatures to reduce the spectrum-darkening effects
of opaques or to recrystallize from pre-existing phyllosilicates.
Figure 3: Reflectance spectra of CV carbonaceous chondrites between 400 and
1900 nm. The spectra were normalized to 8 at 650 nm. Ol. is Olivine, Pl. is
Plagioclase feldspear, Fe-hy is Iron-Oxydydroxide and Low-Ca Py. is Low-Ca
Pyroxene.
Several representative absorption bands have been reported in different CK and
CV spectra. First, a narrow band at 600 nm, attributed to FeO and Fe2O3
contents (Hunt & Ashley, 1979) are described in several spectra (Lazzarin et
al., 2004; Belskaya et al., 2010). There is also a broader band around 650 nm,
which is assigned to plagioclase feldspar (Geiger & Bischoff, 1995). Another
commonly found band appears between 900 to 1100 nm, being associated with
olivine (Hunt & Ashley, 1979). The most common mineral in CK chondrites is
indeed olivine (Cloutis et al., 2012). It exhibits an absorption feature
centred near 1060 nm that can be seen in our Figure 4. With increasing Fe2+
content, the centre of this absorption band moves to longer wavelengths,
becomes deeper and darker by increasing the overall reflectance (see e.g. King
& Ridley, 1987). In our data the olivine band extends between 950 and 1150 nm
(see Fig 4), which has shown in Table 2 and Table 3 as the spectral properties
of the studied chondrites. Plagioclase feldspar is a minor silicate phase in
CK chondrites (< 0.1 wt. %) that may exhibit a weak Fe absorption band near
1250 nm which appears weakly represented in our spectra (Adams & Goullaud,
1978).
Figure 4: Comparison of the spectra of CK4 chondrite ALH 85002 obtained for
this study, and another one from Brown University Keck/NASA RELAB obtained
from a powder of the same meteorite. They are normalized to 1 at 550 nm and a
$BaSO_{4}$ correction was applied to ours.
The presence of pyroxene is noticeable as a 2000 nm absorption band in RELAB
data, which varies from 1800 to 2080 nm when corresponding to low–Ca
pyroxenes, to 1900-2380 nm for high–Ca Pyroxenes (Cloutis et al., 2012). Due
to the noise introduced by our spectrometer, we cannot properly characterize
pyroxene on the samples analyzed here, but the CK spectral data shows a tail
of this band near 1850 nm. The presence of pyroxene generally affects the
olivine band positions, but this effect is less important in CKs than in other
CCs (Cloutis et al., 1986). This is because pyroxene abundances in CKs are
generally too low compared to olivine to appreciably affect olivine band
positions (Cloutis et al., 2012). The spectral shape of the magnetite is a
function of grain size and location (Morris et al., 1985) but it commonly
represented by an absorption band that can be seen near 1000 nm. In our CK
spectra, the location of this absorption band varies from 980 to 1050 nm
depending on the specimen analysed (Fig 5). We also noticed that other minor
phases associated with refractory inclusions can be weakly featured as well,
with fassaite, the most common mineral forming Ca- and Al- rich Inclusions
(CAIs), being the best example at about 980 nm (Table 2).
Figure 5: Comparison of reflectance spectra of three petrologic types of CK
chondrites in our study (One CK3, two CK4 and two CK5 are mentioned in Table
1). A $BaSO_{4}$ correction was applied to all.
## 4 Discussion
In this section we compare the obtained reflectance spectra with previously
published data. This is important, to do this since our procedure obtains the
reflectance spectra using polished sections of the meteorites, while previous
published results used powders from ground meteorites (Trigo-Rodriguez et al.,
2014; Moyano-Cambero et al., 2017).
### 4.1 Comparison between samples prepared by different methods
Here we start the comparison of our reflectance spectra with the most extended
procedure that describes the reflectance spectra obtained from meteorite
powders. Cloutis et al. (2012) identified compositions and spectral features
in CK chondrites with small grain sizes (10-30 $\mu$m). The CK chondrites are
highly oxidized with petrologic types from 3 to 6, with high abundance of the
fayalite Fe2SiO4 member of the olivine family (Geiger & Bischoff, 1995; Huber
et al., 2006). The RELAB database at Brown University Keck/NASA also contains
CK chondrite spectra covering a wavelength range from 400 to 1900 nm and
measured on powders of various sizes (Cloutis et al., 2012). Our spectra show
significant differences compared with RELAB data shown in Fig 4. The spectrum
of Allan Hills 85002 (ALH 85002) in RELAB has a lower reflectance than the
spectrum obtained for this meteorite in our studies. These differences may be
due to measuring a polished meteorite surface instead of the fine-grained
powders (<125 $\mu$m) which are used in RELAB. Moyano-Cambero et al. (2017)
also indicated that the behavior of reflectance spectra in the UV region of
the ground samples is remarkably different from our meteorite sections. In our
ALH 85002 data the steep slope found by RELAB below 600 nm does not exist.
This is possibly produced by terrestrial weathering in the samples studied by
RELAB (Moyano-Cambero et al., 2017). Hendrix & Vilas (2006) also mentioned
that flattening between 400 and 600 nm indicates high Fe content (Cloutis et
al., 2010). As we work with polished samples, the metal grains contribute more
to the spectrum than in the powder used in RELAB (Trigo-Rodriguez et al.,
2014). As a result, the behavior below 600 nm and other features in our
spectra are very similar to changes in space-weathered asteroids (Hendrix &
Vilas, 2006). It is notable that the narrow absorption band in ALH 85002
around 450 nm (see Fig 1) could be assigned to magnetite, due to its deep
extinction below 400 nm (Tang et al., 2003). We can also notice that the
spectrum of ALH 85002 exhibits the lower reflectance in the NIR (see Fig 1).
This is consistent with a CK5 shock-darkened specimen (Table 2) which has
decreased its reflectance due to the presence of fractured materials, melts
and opaques. PCA 82500 is another CK chondrite that have experienced shock-
darkening so its reflectance spectrum is almost flat in NIR (See Fig 1). In
consequence, both meteorites are excellent examples of the effect of impact
processing in this C-rich asteroids: the initial red slopes are flattened as
consequence of shock-darkening to end as neutral in NIR.
To compare with previous papers, Salisbury et al. (1975) found that the
spectrum of CK4 Karoonda, which is a well preserved fall, shows the shallowest
absorption features in the 500-600 nm interval and a very weak olivine
absorption band in 1000 nm region. Hiroi et al. (1993) also identified the
blue-sloped reflectance spectra for <125 $\mu$m powders of CK4 ALH 85002 and
CK4/5 Yamato 693 (Y 693) in the range of 500-2500 nm, and an olivine-like
absorption band near 1050 nm.
### 4.2 Comparison of CKs with CV carbonaceous chondrites
The CK chondrite group was defined by Kallemeyn et al. (1991) as having close
compositional and textural relationship with the CV chondrites, but they are
distinguishable from one another by their refractory lithophile abundances,
refractory inclusions abundance, and the presence of igneous rims around
chondrules, among other features. As previous author Greenwood et al. (2003);
Greenwood et al. (2004, 2010) and Devouard et al. (2006) have suggested, there
are some connections between CV and CK chondrites. CKs are also the most
oxidized extraterrestrial rocks found so far, owing to their low abundance in
Ni and Fe and their high content of fayalite and magnetite (Geiger & Bischoff,
1995). CV3-an Meteorite Hills 01017 (MET 01017) is possibly a reduced
chondrite (Busemann et al., 2007). CV3 MET 00430 and CV3 MET 01074 are highly
oxidized Bali-like type (CV3OxB) (Brearley & Wagner, 2014; Jogo et al., 2018).
CV3 Allende is an oxidized Allende-like type (CV3OxA) (Bland et al., 2000).
CV3 Miller Range 07002 (MIL 07002) is possibly oxidized and intermediate
between CVOxA and CVOxB (Isa et al., 2012). CV3 Allan Hills 84028 (ALH 84028)
is also an oxidized Allende-like type (Bland et al., 2000) (Table 1).
Table 2: Spectral features of the spectrum of the meteorites studied here. The
estimated error for each value is in the last digit.
Meteorites Specific reflectance bands Band centers Peak width LAR 04318
Olivine 1350 0.67 Magnetite 975 0.67 Iron oxide 475 3.62 Plagioclase felspar
1470 1.53 PCA 82500 Oilivine 1405 3.48 Magnetite 1025 2.33 Iron oxide 460 1.28
Plagioclase felspar 1485 2.97 ALH 85002 Magnetite 1050 3.33 Olivine 1445 0.73
Plagioclase felspar 1365 0.82 Iron oxide 460 0.79 LAR 12265 thick Oilivine
1395 0.793 Magnetite 1025 0.58 Iron oxide 465 5.21 LAR 12265 thin Oilivine
1315 2.41 Magnetite 1010 1.05 Iron oxide 465 4.32 ALH 84028 Oilivine 1445 0.98
Low-Ca pyroxene 1014 2.46 Iron oxide 450 0.59 Plagioclase felspar 1365 0.72
Allende Oilivine 1410 1.65 Low-Ca pyroxene 990 1.55 Iron oxide 450 1.56
Plagioclase felspar 1365 0.89 Mill 07002 Oilivine 1300 0.58 Low-Ca pyroxene
945 1.82 Iron oxide 465 2.28 Plagioclase felspar 1335 1.58 MET 01017 Oilivine
1280 2.31 Low-Ca pyroxene 915 2.10 Iron oxide 460 1.42 Plagioclase felspar
1395 1.90 MET 00430 Oilivine 1225 0.74 Low-Ca pyroxene 920 1.04 Iron oxide 570
2.03 Plagioclase felspar 1290 0.57 MET 01074 Oilivine 1310 1.57 Low-Ca
pyroxene 960 0.91 Iron oxide 465 3.89 Plagioclase felspar 1395 1.25
Table 3: Comparison between the CK spectral properties of the data in Brown
University Keck/NASA RELAB Spectrum PH-D2M-035/C1PH35, and our data, a
spectrum taken from the visible and infrared imaging spectrometer at EEBE
center of UPC.
Wavelengths (nm) Wavelengths (nm) Wavelengths (nm) Minerals (Ours) (Cloutis et
al., 2012) (RELAB) 580 650 Iron oxide (FeO) 980 950-1100 1100-1200 Magnetite
(Fe3O4) 1380 1250 1050 Olivine ((Mg,Fe)2SiO4) 940 - - Low-Ca pyroxene 1300
1250 1350 Plagioclase Feldspar 2100 2100 Fassaite
Table 4: Average spectral slope and the reflectivity of the meteorites at some
specific points. First coloumn is the name of the meteorite sample, the second
coloumn is the Average spectral slope (%/ nm) in the indicated range, the
third, forth and last coloumn are the reflectivity at designated wavelengths.
The estimated error for each value is in the last digit.
Met. Av. in (1000-1800 nm) Ref. at 600 nm Ref. at 1200 nm Ref. at 1800 nm LAR
04318 0.0016 9.90 8.00 8.90 PCA 82500 0.0004 9.05 8.68 8.80 ALH 85002 0.0062
8.19 8.00 8.41 LAR 12265 thick 0.0014 8.21 7.90 8.70 LAR 12265 thin 0.0013
8.08 7.90 8.70 ALH 84028 0.0065 9.70 10.48 10.7 Allende 0.0007 9.81 10.70
11.00 Mill 07002 0.0016 9.90 9.65 9.90 MET 01017 0.0001 9.75 10.75 11.5 MET
00430 0.0019 9.90 9.95 10.50 MET 01074 0.0006 9.85 9.75 10.90
The importance of collisional gardening of the CK parent asteroid was proposed
because of different features noticed in their matrices (Rubin & Ma, 2017).
Matrix-rich regions in the CK chondrites formed by comminuted and ground
materials, mostly micron-sized angular silicate grains that are pressed and
crushed chondrules, demonstrate the degree of collisional processing in these
samples (Rubin & Ma, 2017). Back-scattered electron (BSE) images of ALH 85002
exemplify the internal fractures usually contained in their rock-forming
silicates and the subsequent comminution of the materials. As consequence of
these processes secondary minerals were formed, acting as opaques that change
the spectral reflectance behavior (Fig 6). On the other hand, the primary
mineralogy of CVs seem to be better preserved than the CKs, so seems plausible
that they suffered a minor extent of collisional processing. For example, thin
sections of CV3oxA Allende (Norton, 2002) reveal little evidence of crushing.
Although many reduced CV3 chondrites show impact signs (Scott et al., 1992),
they have not been extensively crushed (Kracher et al., 1985).
### 4.3 Comparing laboratory spectra of CCs with remote asteroidal
reflectance spectra
As a result of the reflectance affinity and the chemical evidence found by
(Wasson, Isa & Rubin, 2013), we found plausible that CV and CK chondrites were
associated with a common parent asteroid that experienced splitting and
differentiated evolution by consequence of separated orbital evolution.
Greenwood et al. (2010) and Cloutis et al. (2012) suggested that CVs and CKs
may have a common parent body, Eos asteroid family should be its most likely
source. It is also consistent with the suggestion that the 221 Eos asteroid
collisional family proposed to be associated with CV meteorites (Greenwood et
al., 2010), could be a possible source of CK chondrites since they share a a
blue-sloped features in the NIR region (800-2500 nm) specially beyond
$\sim$1500 nm (Cloutis et al., 2012). Then, collisionally processed fragments
of 221 Eos family could be the source of high petrologic chondrites.
Figure 6: Back-scattered electron (BSE) image of regions of CK4 chondrite ALH
85002. It is a nice example of well preserved CK consisting of well compacted
silicate-rich chondrules, sulfides and accessory minerals. The dominant
minerals and their respective tonality are: olivine – light gray;
orthopyroxene – medium gray; plagioclase – dark gray; sulfide and magnetite –
white; fractures and pores being black.
We have compared our mean reflectance spectra with the Cg asteroidal
reflectance class of the Bus-DeMeo Taxonomy Classification (DeMeo et al.,
2009). It is important to remark that Mothé-Diniz & Carvano (2005) and Mothé-
Diniz et al. (2008) compared spectra of 221 Eos asteroid members with the
spectra of different CC groups. They previously realized in that work that
many members of that asteroid family are consistent with CK3, CK4 and CK5
chondrites in the NIR region, but differ in the visible region (Salisbury et
al., 1975). 221 Eos and its family members are classified as K asteroids in
the Bus-DeMeo taxonomy (DeMeo et al., 2009) (See Fig 11 in the appendix) . We
used a Cg class spectrum for comparison with the spectra of CK chondrites in
the range of 400-1800 nm (Fig 7).
Figure 7: CK reflectance spectra compared with reflectivity of Cg-type
asteroids in the UV-NIR range. The Cg spectrum is normalized and the
multiplied with a reflectance value in order to bring it on the same scale.
Moreover, the recent simulated space weathering experiments on CV3 meteorite
Allende by Gillis-Davis et al. (2017) showed that the weathered meteorite
shows a different weathering trend for the continuum slope between 450-550 nm.
The absorption band in 900-1400 nm region in CV3 meteorites resembles the same
region in Ryugu although it is not well-defined there (De León et al., 2018).
The absorption bands in the range of 1050 to 1250 nm in ureilites corresponds
to olivine, so we infer that the same bands in CVs and CKs are also associated
with olivine (Cloutis et al., 2010; Cloutis et al., 2012; Le Corre et al.,
2017).
Our results show that Cg spectral type asteroids could match the spectra of CK
chondrites according to what was found between 500 and 800 nm (Fig 7). In
general, several specific features in an asteroid reflectance spectrum display
the effect of aqueous alteration in the asteroid surface (Barucci et al.,
2005). As we combined our spectra with the Bus-DeMeo Taxonomy Classification
tool, it is realized that the overall shape of most CK spectra seems to be
similar to Cg-type asteroids (DeMeo et al., 2009).
Recent analytical work on the CV and CK magnetite composition, found
differences in Cr isotopic abundances (Dunn et al., 2016; Yin et al., 2017).
Nevertheless, the parent bodies could be very similar, because those findings
on minor elements cannot account for significant differences in their
reflectance spectroscopic characteristics. Our working hypothesis suggesting
both CV and CK groups could be the result of a differentiated outcome from
separate bodies belonging to a collisional family could explain those subtile
differences. In addition, such scenario could be consistent with the presence
of two CV7 chondrites listed in the Meteoritical Bulletin. The presence of
such metamorphosed CVs could suggest two separate metamorphic sequences, but
they could be rare impact melts and not type-7 after all. Then, it seems that
more analytical data is needed to demonstrate that CV and CKs are not related
as we propose.
### 4.4 Eos family comparisons
In order to demonstrate that the CV and CK groups could be a good match for
the Eos family we have compared three asteroids of that family: 221 Eos, 661
Cloelia and 742 Edisona with our meteorite spectra (Clark et al., 2009). Fig.
8 shows the spectral comparison between CKs and the three asteroids, while the
CVs are compared in Fig. 9. The spectral slope of the asteroids match well
these exhibited by the CV and CKs. In addition, there are some common
noticeable features. The spectra of 221 Eos and 661 Cloelia exhibit two
olivine bands at 1050 and 1450 nm that also noticeable in our CK spectra, with
exception of the anomalous LAR 04318. Also the minor band associated with
plagioclase feldspar at 1370 nm is also a common feature between the three
asteroids and our CKs.
In the NIR the reflectance spectrum of 221 Eos has resemblance with the flat
behavior of ALH 85002, while such flat behavior is more extreme for asteroid
742 Edisona that exhibits a NIR spectrum resembling that of the shock-darkened
PCA 82500. Concerning the CV reflectance spectra, they are having a similar
slope, but the olivine features are not so marked as these exhibited by the
three asteroid spectra. Morate et al. (2018) found a wide diversity of near-
infrared colours for 328 members of this family which highlights the
compositional variation among them.
Figure 8: CKs reflectance spectra compared with reflectivity of A) 221 Eos, B)
661 Cloelia and C) 742 Edisona in the range between 900 nm to 1900 nm. Blue
ones are the spectra of ALH 85002, LAR 04318, PCA 82500, LAR 12265 thick, LAR
12265 thin which are shown in the previous plots. Figure 9: CVs reflectance
spectra compared with reflectivity of A) 221 Eos, B) 661 Cloelia and C) 742
Edisona in the range between 900 nm to 1900 nm. Blue ones are the spectra of
ALH 84028, MIL 07002, Allende, MET 00430, MET 01017, which are shown in the
previous plots.
## 5 Conclusions
We have tested a working hypothesis for the formation of the parent bodies of
CV and CK chondrites. The CKs could have formed from CVs after impacts and
high temperatures, and these processes made them aqueously altered and
annealed (Wasson, Isa & Rubin, 2013). Such a working scenario implies an
evolutionary processing of CKs from CV materials and suggests that meteorite
collections should have specimens exhibiting gradational differences with
significant consequences in their reflectance spectra. Such scenario is
consistent with our current study of CV and CK reflectance spectra. Then, from
the study of CV and CK reflectance spectra we reach the following conclusions:
1. 1.
We found a significant similitude between the reflectance spectra of CV-CK
chondrites and asteroids belonging to the Cg spectral class. Specific
diversity could be consequence of thermal heating due to different degree of
collisional processing.
2. 2.
A common behavior for CK chondrite reflectance spectra is found. We realize
that with increasing metamorphic grade, the reflectance decreases producing a
deeper 1000 nm region absorption feature. But in general, higher petrographic
degree is consistent with higher reflectivity, mainly in the visible region.
The band depth of olivine in CKs increases while the thermal metamorphism
increases: the CK3 petrographic grades of meteorites display shallower band
depths, while the CK5 spectra exhibit the deepest band depths.
3. 3.
The correlation between CV and CK reflectance spectra, together with the
chemical similitude claimed in previous studies, suggest that both groups
could have originated from a common parent body that was broken apart a long
time ago. In this evolutionary scenario, different asteroid fragments could
have been dynamically separated by the action of non-gravitational forces. As
a consequence of differentiated collisional evolution, each asteroid ended
with different degrees of space weathering, aqueous alteration and thermal
metamorphism.
4. 4.
Collisional processing is also clearly affecting these meteorites. As
consequence of shock, the main silicates are crushed and fragmented, producing
shock-induced minerals and opaques that remain in the minerals matrixes. The
main consequence is that the overall reflectance decreases and the spectra
change from red slope to a more neutral behavior in the NIR region.
5. 5.
If our evolutionary scenario is correct, secondary minerals could be formed as
a natural consequence of the collisional processing and aqueous alteration of
their parent asteroids. A natural increasing in the opaque minerals in the
matrices of these meteorites could have direct influence on the progressive
darkening found in the spectra of CV-CK chondrites.
## Acknowledgements
This research has been funded by the research project (PGC2018-097374-B-I00,
P.I.: JMT-R), funded by FEDER/Ministerio de Ciencia e Innovación – Agencia
Estatal de Investigación. ST is hired in the framework of that research
project. This study was done in the frame of a PhD. on Physics at the
Autonomous University of Barcelona (UAB). JL is a Serra Húnter Fellow and is
grateful to ICREA Academia program and GC 2017 SGR 128. US Antarctic meteorite
samples are recovered by the Antarctic Search for Meteorites (ANSMET) program
which has been funded by NSF and NASA, and characterized and curated by the
Department of Mineral Sciences of the Smithsonian Institution and
Astromaterials Acquisition and Curation Office at NASA Johnson Space Center.
The Institute of Space Sciences (CSIC) is international repository of these
Antarctic samples. We thank all these institutions for providing the Antarctic
meteorites studied here. This research utilizes spectra acquired by with the
NASA RELAB facility at Brown University.
## Data availability
Spectral data in this paper are subjected to one year embargo from the
publication date of the article to allow the completion of the research
project and conclude the meteorite spectral database. Once the embargo expires
the data will be available in a repository upon reasonable request.
## References
* Adams & Goullaud (1978) Adams J. B., Goullaud L., 1978, in Lunar and Planetary Science Conference Proceedings. pp 2901–2909
* Barucci et al. (2005) Barucci M. A., et al., 2005, Astronomy & Astrophysics, 430, 313
* Barucci et al. (2020) Barucci M., et al., 2020, Astronomy & Astrophysics, 637, L4
* Bauer (1979) Bauer J. F., 1979, in Lunar and Planetary Science Conference Proceedings. pp 2573–2596
* Beck et al. (2014) Beck P., Garenne A., Quirico E., Bonal L., Montes-Hernandez G., Moynier F., Schmitt B., 2014, Icarus, 229, 263
* Beitz et al. (2016) Beitz E., Blum J., Parisi M. G., Trigo-Rodriguez J., 2016, The Astrophysical Journal, 824, 12
* Belskaya et al. (2010) Belskaya I., Fornasier S., Krugly Y. N., Shevchenko V., Gaftonyuk N., Barucci M. A., Fulchignoni M., Gil-Hutton R., 2010, Astronomy & Astrophysics, 515, A29
* Binzel et al. (2010) Binzel R. P., et al., 2010, Nature, 463, 331
* Binzel et al. (2015) Binzel R. P., Reddy V., Dunn T., 2015, Asteroids IV, , P. Michel et al. (eds), Arizona StateUniv., Tucson, US, 1, 243
* Bland et al. (2000) Bland P., Hoffman E., Krot A., Berry F., 2000, Meteoritics and Planetary Science Supplement, 35, A28
* Blum et al. (2006) Blum J., Schräpler R., Davidsson B. J., Trigo-Rodríguez J. M., 2006, The Astrophysical Journal, 652, 1768
* Brearley (1991) Brearley A., 1991, in Lunar and Planetary Science Conference.
* Brearley & Jones (1998) Brearley A., Jones R., 1998, Reviews in Mineralogy
* Brearley & Wagner (2014) Brearley A., Wagner A., 2014, in 77th Annual Meeting of the Meteoritical Society.
* Brunetto et al. (2015) Brunetto R., Loeffler M. J., Nesvornỳ D., Sasaki S., Strazzulla G., 2015, Asteroids iv, pp 597–616
* Busemann et al. (2007) Busemann H., Alexander M. O., Nittler L. R., 2007, Meteoritics & Planetary Science, 42, 1387
* Chapman et al. (1975) Chapman C. R., Morrison D., Zellner B., 1975, Icarus, 25, 104
* Chaumard & Devouard (2016) Chaumard N., Devouard B., 2016, Meteoritics & Planetary Science, 51, 547
* Chaumard et al. (2014) Chaumard N., Devouard B., Bouvier A., Wadhwa M., 2014, Meteoritics & Planetary Science, 49, 419
* Clark et al. (2009) Clark B. E., Ockert-Bell M. E., Cloutis E. A., Nesvorny D., Mothé-Diniz T., Bus S. J., 2009, Icarus, 202, 119
* Clayton & Mayeda (1999) Clayton R. N., Mayeda T. K., 1999, Geochimica et Cosmochimica Acta, 63, 2089
* Cloutis et al. (1986) Cloutis E. A., Gaffey M. J., Jackowski T. L., Reed K. L., 1986, Journal of Geophysical Research: Solid Earth, 91, 11641
* Cloutis et al. (2010) Cloutis E. A., Hardersen P. S., Bish D. L., Bailey D. T., Gaffey M. J., Craig M. A., 2010, Meteoritics & Planetary Science, 45, 304
* Cloutis et al. (2011) Cloutis E., Hiroi T., Gaffey M., Alexander C. O., Mann P., 2011, Icarus, 212, 180
* Cloutis et al. (2012) Cloutis E., Hudon P., Hiroi T., Gaffey M., 2012, Icarus, 221, 911
* Colonna et al. (2019) Colonna G., Capitelli M., Laricchiuta A., 2019, Hypersonic Meteoroid Entry Physics, by G. Colonna, M. Capitelli and A. Laricchiuta. ISBN: 978-0-7503-1666-8. IOP ebooks. Bristol, UK: IOP Publishing, 2019
* De León et al. (2018) De León J., et al., 2018, Icarus, 313, 25
* DeMeo et al. (2009) DeMeo F. E., Binzel R. P., Slivan S. M., Bus S. J., 2009, Icarus, 202, 160
* Devouard et al. (2006) Devouard B., Ferriere L., Zanda-Hewins B., Messaoudi M., 2006, Meteorit. Planet. Sci, 41, A203
* Dunn et al. (2016) Dunn T. L., Gross J., Ivanova M. A., Runyon S. E., Bruck A. M., 2016, Meteoritics & Planetary Science, 51, 1701
* Gaffey et al. (2002) Gaffey M., Cloutis E., Kelley M., Reed K., Bottke W., Cellino A., Paolicchi P., Binzel R., 2002, Asteroids III, Univ. Arizona Press Tucson, AZ, 183-204
* Geiger & Bischoff (1995) Geiger T., Bischoff A., 1995, Planetary and Space Science, 43, 485
* Gillis-Davis et al. (2017) Gillis-Davis J. J., Lucey P. G., Bradley J. P., Ishii H. A., Kaluna H. M., Misra A., Connolly Jr H. C., 2017, Icarus, 286, 1
* Greenwood et al. (2003) Greenwood R., Kearsley A., Franchi I., 2003, 66th Annual Meteoritical Society Meeting, Munster, Germany
* Greenwood et al. (2004) Greenwood R., Franchi I., Kearsley A., Alard O., 2004, 35th Lunar and Planetary Science Conference, Houston, Texas, USA
* Greenwood et al. (2010) Greenwood R., Franchi I., Kearsley A., Alard O., 2010, Geochimica et Cosmochimica Acta, 74, 1684
* Hamilton et al. (2019) Hamilton V., et al., 2019, Nature Astronomy, 3, 332
* Harris et al. (2020) Harris C. R., et al., 2020, Nature, 585, 357–362
* Hashiguchi et al. (2008) Hashiguchi M., Tomeoka K., Ohnishi I., 2008, 43
* Hendrix & Vilas (2006) Hendrix A. R., Vilas F., 2006, The Astronomical Journal, 132, 1396
* Hiroi et al. (1993) Hiroi T., Pieters C. M., Zolensky M. E., Lipschutz M. E., 1993, Science, 261, 1016
* Huber et al. (2006) Huber H., Rubin A. E., Kallemeyn G. W., Wasson J. T., 2006, Geochimica et Cosmochimica Acta, 70, 4019
* Hunt & Ashley (1979) Hunt G. R., Ashley R. P., 1979, Economic Geology, 74, 1613
* Hunter (2007) Hunter J. D., 2007, Computing in Science Engineering, 9, 90
* Isa et al. (2012) Isa J., Rubin A., Wasson J., 2012, in Lunar and Planetary Science Conference.
* Jarosewich (2006) Jarosewich E., 2006, Meteoritics & Planetary Science, 41, 1381
* Jogo et al. (2018) Jogo K., Ito M., Nakamura T., Kobayashi S., Lee J. I., 2018, Earth, Planets and Space, 70, 37
* Kallemeyn et al. (1991) Kallemeyn G. W., Rubin A. E., Wasson J. T., 1991, Geochimica et Cosmochimica Acta, 55, 881
* King & Ridley (1987) King T. V., Ridley W. I., 1987, Journal of Geophysical Research: Solid Earth, 92, 11457
* Kitazato et al. (2019) Kitazato K., et al., 2019, Science, 364, 272
* Kracher et al. (1985) Kracher A., Keil K., Kallemeyn G., Wasson J., Clayton R., Huss G., 1985, Journal of Geophysical Research: Solid Earth, 90, 123
* Lauretta et al. (2017) Lauretta D., et al., 2017, Space Science Reviews, 212, 925
* Lazzarin et al. (2004) Lazzarin M., Marchi S., Magrin S., Barbieri C., 2004, L25
* Le Corre et al. (2017) Le Corre L., et al., 2017, Monthly Notices of the Royal Astronomical Society, 475, 614
* Marsset et al. (2020) Marsset M., et al., 2020, Nature Astronomy, pp 1–8
* Morate et al. (2018) Morate D., Licandro J., Popescu M., de León J., 2018, Astronomy & Astrophysics, 617, A72
* Morris et al. (1985) Morris R. V., Lauer Jr H. V., Lawson C. A., Gibson Jr E. K., Nace G. A., Stewart C., 1985, Journal of Geophysical Research: Solid Earth, 90, 3126
* Mothé-Diniz & Carvano (2005) Mothé-Diniz T., Carvano J., 2005, Astronomy & Astrophysics, 442, 727
* Mothé-Diniz et al. (2008) Mothé-Diniz T., Carvano J., Bus S., Duffard R., Burbine T., 2008, Icarus, 195, 277
* Moyano-Cambero et al. (2016) Moyano-Cambero C. E., Trigo-Rodr$\acute{\iota}$guez J. M., Llorca J., Fornasier S., Barucci M. A., Rimola A., 2016, Meteoritics & Planetary Science, 51, 1795
* Moyano-Cambero et al. (2017) Moyano-Cambero C. E., et al., 2017, The Astrophysical Journal, 835, 157
* Noguchi (1993) Noguchi T., 1993, Antarctic Meteorite Research, 6, 204
* Norton (2002) Norton O., 2002, The Observatory, 122, 297
* Rizos et al. (2021) Rizos J., et al., 2021, Icarus, 364, 114467
* Rubin (2004) Rubin A. E., 2004, Geochimica et Cosmochimica Acta, 68, 673
* Rubin (2012) Rubin A. E., 2012, Geochimica et Cosmochimica Acta, 90, 181
* Rubin & Ma (2017) Rubin A. E., Ma C., 2017, Chemie der Erde-Geochemistry, 77, 325
* Rubin et al. (2007) Rubin A. E., Trigo-Rodríguez J. M., Huber H., Wasson J. T., 2007, Geochimica et Cosmochimica Acta, 71, 2361
* Salisbury et al. (1975) Salisbury J. W., Hunt G. R., Lenhoff C. J., 1975, Modern Geology, 5, 115
* Scott et al. (1992) Scott E. R., Keil K., Stoeffler D., 1992, Geochimica et Cosmochimica Acta, 56, 4281
* Tanbakouei et al. (2019) Tanbakouei S., Trigo-Rodríguez J. M., Sort J., Michel P., Blum J., Nakamura T., Williams I., 2019, Astronomy & Astrophysics, 629, A119
* Tanbakouei et al. (2020) Tanbakouei S., Trigo-Rodriguez J. M., Williams I., Llorca J., et al., 2020, arXiv preprint arXiv:2007.06212, In Press
* Tang et al. (2003) Tang J., Myers M., Bosnick K. A., Brus L. E., 2003, The Journal of Physical Chemistry B, 107, 7501
* Trigo-Rodríguez (2015) Trigo-Rodríguez J. M., 2015, Planetary Materials. EMU Notes in Mineralogy, 15, 67
* Trigo-Rodriguez & Blum (2009) Trigo-Rodriguez J. M., Blum J., 2009, Planetary and Space Science, 57, 243
* Trigo-Rodriguez et al. (2006) Trigo-Rodriguez J. M., Rubin A. E., Wasson J. T., 2006, Geochimica et Cosmochimica Acta, 70, 1271
* Trigo-Rodriguez et al. (2014) Trigo-Rodriguez J. M., et al., 2014, Monthly Notices of the Royal Astronomical Society, 437, 227
* Trigo-Rodríguez et al. (2015) Trigo-Rodríguez J. M., et al., 2015, Monthly Notices of the Royal Astronomical Society, 449, 2119
* Trigo-Rodríguez et al. (2019) Trigo-Rodríguez J. M., Rimola A., Tanbakouei S., Soto V. C., Lee M., 2019, Space Science Reviews, 215, 18
* Urzaiz et al. (2015) Urzaiz M., Trigo-Rodriguez J., Mestres N., 2015, in Lunar and Planetary Science Conference. p. 1785
* Van Rossum & Drake (2009) Van Rossum G., Drake F. L., 2009, Python 3 Reference Manual. CreateSpace, Scotts Valley, CA
* Van Rossum & Drake Jr (1995) Van Rossum G., Drake Jr F. L., 1995, Python tutorial. Centrum voor Wiskunde en Informatica Amsterdam, The Netherlands
* Vernazza et al. (2011) Vernazza P., et al., 2011, Icarus, 216, 650
* Virtanen et al. (2020) Virtanen P., et al., 2020, Nature Methods, 17, 261
* Wasson et al. (2013) Wasson J. T., Isa J., Rubin A. E., 2013, Geochimica et Cosmochimica Acta, 108, 45
* Wes McKinney (2010) Wes McKinney 2010, in Stéfan van der Walt Jarrod Millman eds, Proceedings of the 9th Python in Science Conference. pp 56 – 61
* Yin et al. (2017) Yin Q.-Z., Sanborn M., Ziegler K., 2017, in Lunar and Planetary Science Conference.
## Appendix A Complementary figures
Figure 10: Barium sulphate ($BaSO_{4}$) standard baseline, used in the
correction applied to calibrate the detector (Moyano-Cambero et al., 2016).
Figure 11: Spectral comparisons of CK chondrites with other averaged asteroid
spectral classes ruled out during the investigation. A)C ateroid classes, B) B
asteroid classess, C)K asteroid classes and D)L asteroid classes
.
## Appendix B Python Code
Van Rossum & Drake (2009); Van Rossum & Drake Jr (1995)
import pandas as pd
import matplotlib.pyplot as plt
from scipy.signal import (find$\\_$peaks), peak$\\_$widths
import numpy as np
Virtanen et al. (2020); Harris et al. (2020); Hunter (2007); Wes McKinney
(2010)
# get max peaks
peaksMax, $\\_$= find$\\_$peaks(CK4$\\_$LAR$\\_$04318, distance=70)
# get min peaks
peaksMin,$\\_$= find$\\_$ peaks(-CK4$\\_$LAR$\\_$04318, distance=70)
# get max peak width
widths, h$\\_$eval, left$\\_$ips, right$\\_$ips =
peak$\\_$widths(-CK4$\\_$LAR$\\_$04318, peaksMax)
# get min peak width
widths, h$\\_$eval, left$\\_$ips, right$\\_$ips =
peak$\\_$widths(-CK4$\\_$LAR$\\_$04318, peaksMin)
print("Widths of each min peak: ", widths)
—————————————————————————————————
| arxiv-papers | 2021-07-27T04:21:21 | 2024-09-04T03:07:20.487383 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Safoura Tanbakouei, Josep M. Trigo-Rodriguez, J.Llorca,\n C.E.Moyano-Cambero, I.P.Williams, Andrew S. Rivkin",
"submitter": "Safoura Tanbakouei",
"url": "https://arxiv.org/abs/2107.12590"
} |
2107.12591 | ## Combining Probabilistic Logic and Deep Learning for Self-Supervised
Learning
Hoifung Poon, Microsoft Research, Redmond WA, USA
Hai Wang, JD Finance America Corporation, Mountain View CA, USA
Hunter Lang, MIT CSAIL, Cambridge MA, USA
Deep learning has proven effective for various application tasks, but its
applicability is limited by the reliance on annotated examples. Self-
supervised learning has emerged as a promising direction to alleviate the
supervision bottleneck, but existing work focuses on leveraging co-occurrences
in unlabeled data for task-agnostic representation learning, as exemplified by
masked language model pretraining. In this chapter, we explore task-specific
self-supervision, which leverages domain knowledge to automatically annotate
noisy training examples for end applications, either by introducing labeling
functions for annotating individual instances, or by imposing constraints over
interdependent label decisions. We first present deep probabilistic logic
(DPL), which offers a unifying framework for task-specific self-supervision by
composing probabilistic logic with deep learning. DPL represents unknown
labels as latent variables and incorporates diverse self-supervision using
probabilistic logic to train a deep neural network end-to-end using
variational EM. Next, we present self-supervised self-supervision (S4), which
adds to DPL the capability to learn new self-supervision automatically.
Starting from an initial seed self-supervision, S4 iteratively uses the deep
neural network to propose new self supervision. These are either added
directly (a form of structured self-training) or verified by a human expert
(as in feature-based active learning). Experiments on real-world applications
such as biomedical machine reading and various text classification tasks show
that task-specific self-supervision can effectively leverage domain expertise
and often match the accuracy of supervised methods with a tiny fraction of
human effort.
### 1.1 Introduction
Figure 1.1: Deep Probabilistic Logic: A general framework for combining task-
specific self-supervision strategies by composing probabilistic logic with
deep learning. Learning amounts to maximizing conditional likelihood of
virtual evidence given input by summing up latent label decisions.
Machine learning has made great strides in enhancing model sophistication and
learning efficacy, as exemplified by recent advances in deep learning [1].
However, contemporary supervised learning techniques require a large amount of
labeled data, which is expensive and time-consuming to produce. This problem
is particularly acute in specialized domains like biomedicine, where
crowdsourcing is difficult to apply. Self-supervised learning has emerged as a
promising paradigm to overcome the annotation bottleneck by automatically
generating noisy training examples from unlabeled data. However, existing work
predominantly focuses on task-agnostic representation learning by modeling co-
occurrences in unlabeled data, as exemplified in masked language model
pretraining [2]. While successful, it still requires manual annotation of
task-specific labeled examples to fine-tune pretrained models for end
applications.
In this chapter, we explore task-specific self-supervised learning, which can
directly generate training examples for end applications. The key insight is
to introduce a general framework that can best leverage human expert bandwidth
by accepting and leveraging alternative forms of supervision. For example,
with relatively small effort, domain experts can produce labeling functions
[3, 4] and joint inference constraints [5, 6, 7, 8]. Additionally, there are
ample available resources such as ontologies and knowledge bases that can be
leveraged to automatically annotate training examples in unlabeled data [9,
10]. Using such self-specified supervision templates, we can automatically
produce training examples at scale from unlabeled data.
A central challenge in leveraging such diverse forms of self-supervision is
that they are inherently noisy and may be contradictory with each other. We
present deep probabilistic logic (DPL), which provides a unifying framework
for task-specific self-supervision by composing probabilistic logic with deep
learning [11]. DPL models label decisions as latent variables, represents
prior knowledge on their relations using Markov logic (weighted first-order
logical formulas) [12], and alternates between learning a deep neural network
for the end task and refining uncertain formula weights for self-supervision,
using variational EM. Probabilistic logic offers a principled way to combine
noisy and inconsistent self-supervision. Feedback from deep learning helps
resolve noise and inconsistency in the initial self-supervision. Experiments
on biomedical machine reading show that distant supervision, data programming,
and joint inference can be seamlessly combined in DPL to substantially improve
machine reading accuracy, without requiring any manually labeled examples.
Figure 1.2: Self-Supervised Self-Supervision (S4): S4 builds on deep
probabilistic logic and uses probabilistic logic to represent self-supervision
for learning a deep neural network for the end prediction task. Starting from
pre-specified self-supervision, S4 interleaves structure learning and active
learning steps to introduce new self-supervision for training the neural
network and refining the graphical model parameters. Self-supervision factors
from initialization, structure learning, and active learning are shown in
blue, red, and black, respectively.
DPL still requires human experts to manually specify self-supervision. We next
present Self-Supervised Self-Supervision (S4), which is a general framework
for learning to add new self-supervision, by extending DPL with structure
learning and active learning capabilities (see Figure 1.2) [13]. S4 first runs
DPL using the pre-specified seed self-supervision (represented as a Markov
logic network), then iteratively proposes new self-supervision (weighted
logical formula) using the trained deep neural network, and determines whether
to add it directly to the self-supervision Markov logic network or ask a human
expert to vet it. The former can be viewed as structured self-training, which
generalizes self-training [14] by adding not only individual labels but also
arbitrary probabilistic factors over them. The latter subsumes feature-based
active learning [15] with arbitrary features expressible using probabilistic
logic. By combining the two in a unified framework, S4 can leverage both
paradigms for generating new self-supervision and subsume many related
approaches as special cases. Using transformer-based models [16] for the deep
neural network in DPL, we explore various self-supervision proposal mechanisms
based on neural attention and label entropy. Our method can learn to propose
both unary potential factors over individual labels and joint-inference
factors over multiple labels. Experiments on various text classification tasks
show that S4 can substantially improve over the seed self-supervision by
proposing new self-supervision, often matching the accuracy of fully
supervised systems with a fraction of human effort.
We first review related work in self-supervised learning and combining
probabilistic logic with deep learning. We then present deep probabilistic
logic and self-supervised self-supervision in details. We conclude by
discussing several exciting future directions. We focus on natural language
processing (NLP) applications in this chapter, but our methods are potentially
applicable to other domains and tasks.
### 1.2 Task-Specific Self-Supervision
Techniques to compensate for the lack of direct supervision come in many names
and forms [10, 3, 17, 18, 11]. Self-supervision has emerged as an encompassing
paradigm that views these as instances of using self-specified templates to
generate noisy labeled examples on unlabeled data. The name self-supervision
is closely related to self-training [14], which bootstraps from a supervised
classifier, uses it to annotate unlabeled instances, and iteratively adds
confident labels to retrain the classifier. Task-agnostic self-supervision
generalizes word embedding and language modeling by learning to predict self-
specified masked tokens, as exemplified by recent pretraining methods such as
BERT [2]. In this chapter, we focus on task-specific self-supervision and use
pretrained models as a building block for task-specific learning. Below, we
review three popular forms of task-specific self-supervision: distant
supervision, data programming, and joint inference.
##### Distant supervision
This paradigm was first introduced for binary relation extraction [9, 10]. In
its simplest form, distant supervision generates a positive example if an
entity pair with a known relation co-occurs in a sentence, and samples
negative examples from co-occurring entity pairs not known to have the given
relation. It has recently been extended to cross-sentence relation extraction
[19, 20]. In principle, one simply looks beyond single sentences for co-
occurring entity pairs. However, this can introduce many false positives and
prior work used a small sliding window and filtering (minimal-span) to
mitigate training noise. Even so, accuracy is relatively low. Both [19] and
[20] used ontology-based string matching for entity linking, which also incurs
many false positives, as entity mentions can be highly ambiguous (e.g., PDF
and AAAS are gene names). Distant supervision for entity linking is relatively
underexplored, and prior work generally focuses on Freebase entities, where
links to the corresponding Wikipedia articles are available for learning [21].
##### Data Programming
Instead of annotated examples, domain experts are asked to produce labeling
functions, each of which assigns a label to an instance if the input satisfies
certain conditions, often specified by simple rules [22]. This paradigm is
useful for semantic tasks, as high-precision text-based rules are often easy
to come by. However, there is no guarantee on broad coverage, and labeling
functions are still noisy and may contradict with each other. The common
denoising strategy assumes that labeling functions make random mistakes, and
focuses on estimating their accuracy and correlation [3, 17, 23]. A more
sophisticated strategy also models instance-level labels and uses instance
embedding to estimate instance-level weight for each labeling function [24].
##### Joint Inference
Distant supervision and data programming focus on infusing task-specific self-
supervision on individual labels. Additionally, there is rich linguistic and
domain knowledge that does not specify values for individual labels, but
imposes constraints on their joint distribution. For example, if two mentions
are coreferent, they should agree on entity properties [6]. There is a rich
literature on joint inference for NLP applications. Notable methodologies
include constraint-driven learning [5], general expectation [7], posterior
regularization [8], and probabilistic logic [6]. Constraints can be imposed on
relational instances or on model expectations. Learning and inference are
often tailor-made for each approach, including beam search, primal-dual
optimization, weighted satisfiability solvers, etc. Recently, joint inference
has also been used in denoising distant supervision. Instead of labeling all
co-occurrences of an entity pair with a known relation as positive examples,
one only assumes that at least one instance is positive [25, 26].
Existing self-supervision paradigms are typically special cases of deep
probabilistic logic (DPL). E.g., data programming admit only self-supervision
for individual instances (labeling functions or their correlations). Anchor
learning [27] is an earlier form of data programming that, while more
restricted, allows for stronger theoretical learning guarantees. Prototype
learning is an even earlier special case with labeling functions provided by
“prototypes” [28, 29]. Using Markov logic to model self-supervision, DPL can
incorporate arbitrary prior beliefs on both individual labels and their
interdependencies, thereby unleashing the full power of joint inference [30,
31, 32, 33] to amplify and propagate self-supervision signals.
Self-supervised self-supervision (S4) further extends DPL with structure
learning capability. Most structure learning techniques are developed for the
supervised setting, where structure search is guided by labeled examples [34,
35]. Moreover, traditional relational learning induces deterministic rules and
is susceptible to noise and uncertainty. Bootstrapping learning is one of the
earliest and simplest self-supervision methods with some rule-learning
capability, by alternating between inducing characteristic contextual patterns
and classifying instances [36, 37]. The pattern classes are limited and only
applicable to special problems (e.g., “A such as B” to find $\tt ISA$
relations). Most importantly, they lack a coherent probabilistic formulation
and may suffer catastrophic semantic drift due to ambiguous patterns (e.g.,
“cookie” as food or compute use). [38] and [39] designed a more sophisticated
rule induction approach, but their method uses deterministic rules and may be
sensitive to noise and ambiguity. Recently, Snuba [40] extends the data
programming framework by automatically adding new labeling functions, but like
prior data programming methods, their self-supervision framework is limited to
modeling prior beliefs on individual instances. Their method also requires
access to a small number of labeled examples to score new labeling functions.
Another significant advance in S4 is by extending DPL with the capability to
conduct structured active learning, where human experts are asked to verify
arbitrary virtual evidences, rather than a label decision. Note that by
admitting joint inference factors, this is more general than prior use of
feature-based active learning, which focuses on per-instance features [15]. As
our experiments show, interleaving structured self-training learning and
structured active learning results in substantial gains, and provides the best
use of precious human bandwidth. [41] previously considered active structure
learning in the context of Bayesian networks. Anchor learning [27] can also
suggest new self-supervision for human review. Darwin [42] incorporates active
learning for verifying proposed rules, but it doesn’t conduct structure
learning, and like Snuba and other data programming methods, it only models
individual instances.
### 1.3 Combining Probabilistic Logic with Deep Learning
Probabilistic logic combines logic’s expressive power with the capability of
graphical models to handle uncertainty. A representative example is Markov
logic [12], which defines a probability distribution using weighted first-
order logical formulas as templates for a Markov model. Given random variables
$X$ for a problem domain, Markov logic uses a set of weighted first-order
logical formulas $(w_{i},f_{i}):i$ to define a joint probability distribution
$P(X)\propto\exp\sum_{i}\leavevmode\nobreak\ w_{i}\cdot f_{i}(X)$.
Intuitively, the weight $w_{i}$ correlates with how likely formula $f_{i}$
holds true. A logical constraint is a special case when $w_{i}$ is set to
$\infty$ (or a sufficiently large number). Probabilistic logic has been
applied to incorporating joint inference and other task-specific self-
supervision for various NLP tasks [43, 6, 44], but its expressive power comes
at a price: learning and inference are generally intractable, and end-to-end
modeling often requires heavy approximation [45].
Recently, there has been increasing interest in combining probabilistic logic
with deep learning, thereby harnessing probabilistic logic’s capability in
representing and reasoning with knowledge, as well as leveraging deep
learning’s strength in distilling complex patterns from high-dimension data.
Most existing work focuses on incorporating probabilistic logic in inference,
typically by replacing discrete logical predicates with neural representation
and jointly learning global probabilistic logic parametrization and local
neural networks, as exemplified by differentiable proving [46] and DeepProbLog
[47]. By contrast, we leverage probabilistic logic to provide self-supervision
for deep learning. These two approaches are complementary and can be combined,
i.e., by using probabilistic logic to infuse prior knowledge for both learning
and inference, as explored in recent work on knowledge graph embedding [48].
Deep generative models also combine deep learning with probabilistic models,
but focus on uncovering latent factors to support generative modeling and
semi-supervised learning [49, 50]. Knowledge infusion is limited to
introducing structures among latent variables (e.g., Markov chain) [51]. Deep
probabilistic programming provides a flexible interface for exploring such
composition [52]. In deep probabilistic logic and self-supervised self-
supervision, we instead combine a discriminative neural network predictor with
a generative self-supervision model based on Markov logic, and can fully
leverage their respective capabilities to advance co-learning [53, 54]. Deep
neural networks also provide a powerful feature-induction engine to support
structure learning and active learning.
### 1.4 Deep Probabilistic Logic: A Unifying Framework for Self-Supervision
In this section, we introduce deep probabilistic logic (DPL) as a unifying
framework for task-specific self-supervision. Label decisions are modeled as
latent variables. Self-supervision is represented as generalized virtual
evidence, and learning maximizes the conditional likelihood of virtual
evidence given input. The use of probabilistic logic is limited to modeling
self-supervision, leaving end-to-end modeling to the deep neural network for
end prediction. This alleviates the computational challenges in using
probabilistic logic end-to-end, while leveraging the strength of deep learning
in distilling complex patterns from high-dimension data.
Infusing knowledge in neural network training is a long-standing challenge in
deep learning [55]. [56, 57] first used logical rules to help train a
convolutional neural network for sentiment analysis. DPL draws inspiration
from their approach, but is more general and theoretically well-founded. [56,
57] focused on supervised learning and the logical rules were introduced to
augment labeled examples via posterior regularization [8]. DPL can incorporate
both direct and indirect supervision, including posterior regularization and
other forms of self-supervision. Like DPL, [57] also refined uncertain weights
of logical rules, but they did it in a heuristic way by appealing to symmetry
with standard posterior regularization. We provide a novel problem formulation
using generalized virtual evidence, which shows that their heuristic is a
special case of variational EM and opens up opportunities for other
optimization strategies.
We first review the idea of virtual evidence and show how it can be
generalized to represent any form of self-supervision. We then formulate the
learning objective and show how it can be optimized using variational EM.
#### 1.4.1 Deep Probabilistic Logic
Given a prediction task, let $\mathcal{X}$ denote the set of possible inputs
and $\mathcal{Y}$ the set of possible outputs. The goal is to train a
prediction module $\Psi(x,y)$ that scores output $y$ given input $x$. We
assume that $\Psi(x,y)$ defines the conditional probability $P(y|x)$ using a
deep neural network with a softmax layer at the top. Let
$X=(X_{1},\cdots,X_{N})$ denote a sequence of inputs and
$Y=(Y_{1},\cdots,Y_{N})$ the corresponding outputs. We consider the setting
where $Y$ are unobserved, and $\Psi(x,y)$ is learned using task-specific self-
supervision.
##### Virtual evidence
Pearl [58] first introduced the notion of virtual evidence, which has been
used to incorporate label preference in semi-supervised learning [59, 60, 61]
and grounded learning [62]. Suppose we have a prior belief on the value of
$y$. It can be represented by introducing a binary variable $v$ as a dependent
of $y$ such that $P(v=1|y=l)$ is proportional to the prior belief of $y=l$.
$v=1$ is thus an observed evidence that imposes soft constraints over $y$.
Direct supervision (i.e., observing the true label) for $y$ is a special case
when the belief is concentrated on a specific value $y=l^{*}$ (i.e.,
$P(v=1|y=l)=0$ for any $l\neq l^{*}$). The virtual evidence $v$ can be viewed
as a reified variable for a potential function $\Phi(y)\propto P(v=1|y)$. This
enables us to generalize virtual evidence to arbitrary potential functions
$\Phi(X,Y)$. In the rest of the paper, we will simply refer to the potential
functions as virtual evidences, without introducing the reified variables
explicitly.
##### DPL
Let $K=(\Phi_{1},\cdots,\Phi_{V})$ be a set of virtual evidence derived from
prior knowledge. DPL comprises of a supervision module over K and a prediction
module over all input-output pairs (Figure 1.1), and defines a probability
distribution:
$P(K,Y|X)\propto\prod_{v}\leavevmode\nobreak\
\Phi_{v}(X,Y)\cdot\prod_{i}\leavevmode\nobreak\ \Psi(X_{i},Y_{i})$
Without loss of generality, we assume that virtual evidences are log-linear
factors, which can be compactly represented by weighted first-order logical
formulas [12]. Namely, $\Phi_{v}(X,Y)=\exp(w_{v}\cdot f_{v}(X,Y))$, where
$f_{v}(X,Y)$ is a binary feature represented by a first-order logical formula.
A hard constraint is the special case when $w_{v}=\infty$ (in practice, it
suffices to set it to a large number, e.g., 10). In prior use of virtual
evidence, $w_{v}$’s are generally pre-determined from prior knowledge.
However, this may be suboptimal. Therefore, we consider a general Bayesian
learning setting where each $w_{v}$ is drawn from a pre-specified prior
distribution $w_{v}\sim P(w_{v}|\alpha_{v})$. Fixed $w_{v}$ amounts to the
special case when the prior is concentrated on the preset value. For uncertain
$w_{v}$’s, we can compute their maximum a posteriori (MAP) estimates and/or
quantify the uncertainty.
##### Distant supervision
Virtual evidence for distant supervision is similar to that for direct
supervision. For example, for relation extraction, distant supervision from a
knowledge base of known relations will set
$f_{KB}(X_{i},Y_{i})=\mathbb{I}[\text{\tt In-KB}(X_{i},r)\land Y_{i}=r]$,
where $\text{\tt In-KB}(X_{i},r)$ is true iff the entity tuple in $X_{i}$ is
known to have relation $r$ in the KB.
##### Data programming
Virtual evidence for data programming is similar to that for distant
supervision: $f_{L}(X_{i},Y_{i})=\mathbb{I}[L(X_{i})=Y_{i}]$, where $L(X_{i})$
is a labeling function provided by domain experts. Labeling functions are
usually high-precision rules, but errors are still common, and different
functions may assign conflicting labels to an instance. Existing denoising
strategies either assume that each function makes random errors independently,
and resolves the conflicts by weighted votes [22], or attempts to learn and
account for the dependencies between labeling functions [63]. In DPL, the
former can be done by simply treating error probabilities as uncertain
parameters and inferring them during learning, and the latter can be done with
structure learning over the virtual evidences.
##### Joint inference
Constraints on instances or model expectations can be imposed by introducing
the corresponding virtual evidence [8] (Proposition 2.1). The weights can be
set heuristically [5, 64, 6] or iteratively via primal-dual methods [8]. In
addition to instance-level constraints, DPL can incorporate arbitrary high-
order soft and hard constraints that capture the interdependencies among
multiple instances. For example, identical mentions in proximity probably
refer to the same entity, which is useful for resolving ambiguous mentions by
leveraging their unambiguous coreferences (e.g., an acronym in apposition of
the full name). This can be represented by the virtual evidence $f_{\tt
Joint}(X_{i},Y_{i},X_{j},Y_{j})=\mathbb{I}[{\tt Coref}(X_{i},X_{j})\land
Y_{i}=Y_{j}]$, where ${\tt Coref}(X_{i},X_{j})$ is true iff $X_{i}$ and
$X_{j}$ are coreferences. Similarly, the common denoising strategy for distant
supervision replaces the mention-level constraints with type-level constraints
[25]. Suppose that $X_{E}\subset X$ contains all $X_{i}$’s with co-occurring
entity tuple $E$. The new constraints simply impose that, for each $E$ with
known relation $r\in KB$, $Y_{i}=r$ for at least one $X_{i}\in X_{E}$. This
can be represented by a high-order factor on $(X_{i},Y_{i}:X_{i}\in X_{E})$.
Input: Virtual evidences $K=\Phi_{1:V}$, deep neural network $\Psi$, inputs
$X=(X_{1},\cdots,X_{N})$, unobserved outputs $Y=(Y_{1},\cdots,Y_{N})$.
Output: Learned prediction module $\Psi^{*}$
Initialize: $\Phi^{0}\sim\text{priors}$, $\Psi^{0}\sim\text{uniform}$. for
_$t=1:T$_ do
$\displaystyle\qquad\qquad q^{t}(Y)\leftarrow
P(Y|\Phi^{t-1},\Psi^{t-1},X)\text{ (approximately)}$
$\displaystyle\qquad\qquad\Phi^{t}\leftarrow\arg\min_{\Phi}\leavevmode\nobreak\
D_{KL}(q^{t}(Y)\leavevmode\nobreak\ ||\leavevmode\nobreak\
\prod_{v}\leavevmode\nobreak\ \Phi_{v}(X,Y))$
$\displaystyle\qquad\qquad\Psi^{t}\leftarrow\arg\min_{\Psi}\leavevmode\nobreak\
D_{KL}(q^{t}(Y)\leavevmode\nobreak\ ||\leavevmode\nobreak\
\prod_{i}\leavevmode\nobreak\ \Psi(X_{i},Y_{i}))$
end for
return $\Psi^{*}=\Psi^{T}$.
Algorithm 1 DPL Learning
##### Parameter learning
Learning in DPL maximizes the conditional likelihood of virtual evidences
$P(K|X)$. We could directly optimize this objective by summing out the latent
variable $Y$ to compute the gradient and run backpropagation. Instead, in this
work we opted for a modular approach using (variational) EM, since both the E-
and M-steps reduce to standard inference and learning problems, and because
summing out $Y$ is often computationally intractable when using joint
inference. See Algorithm 1.
In the E-step, we compute an approximation $q(Y)$ for $P(Y|K,X)$. Exact
inference is generally intractable, but there is a plethora of approximate
inference methods that can efficiently produce an estimate for $P(Y|K,X)$. In
this work we chose to use loopy belief propagation (BP) [65]. For each virtual
evidence factor $f$, BP computes a “pseudo-marginal” $q_{f}(Y)$, which is an
estimate of $\mathbb{E}_{P(Y|K,X)}[f(X,Y)]$. In particular, BP also computes
estimates $q_{BP}(Y_{i})\approx\mathbb{E}_{P(Y|K,X)}[Y_{i}]$, the posterior
marginal for each instance’s label variable. We set
$q(Y)=\prod_{i}q_{BP}(Y_{i})$, the product of approximate marginals returned
by BP. While this is not theoretically principled (e.g., mean-field iteration
may compute a better factored approximation $q(Y)$), BP provides a good
balance of speed and flexibility in dealing with complex, higher-order
factors.
Note that inference with _high-order factors_ of large size (i.e., factors
involving many label variables $Y_{i}$) can still be challenging with BP.
However, there is a rich body of literature for handling such structured
factors in a principled way. For example, in our biomedical machine reading
application, we alter the BP message passing schedule so that each at-least-
one factor (for denoising distant supervision; see next subsection) will
compute messages to its variables jointly by renormalizing their current
marginal probabilities with noisy-or [66], which is a soft version of dual
decomposition [67].
In the M-step, we treat the approximation $q(Y)$ as giving probabilistic label
assignments to $Y$, and use those assignments to optimize $\Phi$ and $\Psi$
via standard supervised learning. The M-step naturally decouples into two
separate optimization tasks, one for the supervision module $\Phi$ and one for
the prediction module $\Psi$. For the prediction module (represented by a deep
neural network), the optimization task $\arg\min_{\Psi}\leavevmode\nobreak\
D_{KL}(q^{t}(Y)\leavevmode\nobreak\ ||\leavevmode\nobreak\
\prod_{i}\leavevmode\nobreak\ \Psi(X_{i},Y_{i}))$ reduces to standard deep
learning with cross-entropy loss, where the label distribution over $Y$ is
given by our current estimate $q^{t}(Y_{i})$ for the marginal
$\mathbb{E}_{P(Y|K,X)}[Y_{i}]$. That is, we train the deep network $\Psi$ to
minimize the cross-entropy
$-\frac{1}{N}\sum_{i}\sum_{y}q^{t}(Y_{i}=y)\log\Psi(X_{i},y)$.
For the supervision module $\Phi$, the optimization task
$\arg\min_{\Phi}\leavevmode\nobreak\ D_{KL}(q^{t}(Y)\leavevmode\nobreak\
||\leavevmode\nobreak\ \prod_{v}\leavevmode\nobreak\ \Phi_{v}(X,Y))$ similarly
reduces to standard parameter learning for log-linear models (i.e., learning
all $w_{v}$’s that are not fixed). Given the estimate for $P(Y|K,X)$ produced
in the E-step, this is a convex optimization problem with a unique (under
certain conditions) global optimum. Here, we simply use gradient descent, with
the partial derivative for $w_{v}$ being
$\mathbb{E}_{\Phi(Y,X)}\leavevmode\nobreak\
[f_{v}(X,Y)]-\mathbb{E}_{q(Y)}\leavevmode\nobreak\ [f_{v}(X,Y)]$. For a tied
weight, the partial derivative will sum over all features that originate from
the same template. The second expectation is easy to compute given $q(Y)$
estimated in the E-step. The first expectation, on the other hand, requires
probabilistic inference in the graphical model _excluding_ the prediction
module $\Psi$. But this can again be computed using belief propagation,
similar to the E-step, except that the messages are limited to factors within
the supervision module (i.e., messages from $\Psi$ are no longer included).
Convergence is usually fast, upon which BP returns an approximation to
$\mathbb{E}_{\Phi(Y,X)}\leavevmode\nobreak\ [f_{v}(X,Y)]$.
As in the E-step, there are some nuances in the M-step when the BP
approximation is not exact. [68] contains a more formal discussion of
parameter learning with approximate inference methods. For a more
theoretically principled approach, one could use tree-reweighted belief
propagation in the M-step and mean-field iteration in the E-step. However, we
find that our approach is easy to implement and work reasonably well in
practice. As aforementioned, the parameter learning problem for the
supervision module is much simpler than end-to-end learning with probabilistic
logic, as it focuses on refining uncertain weights for task-specific self-
supervision, rather than learning complex input patterns for label prediction
(handled in deep learning).
Figure 1.3: Example of DPL combining various task-specific self-supervision
using probabilistic logic.
##### Example
Figure 1.3 shows a toy example on how DPL combines various task-specific self-
supervision for predicting drug-gene interaction (e.g., gefitinib can be used
to treat tumors with EGFR mutations). Self-supervision is modeled by
probabilistic logic, which defines a joint probability distribution over
latent labeling decisions for drug-gene mention pairs in unlabeled text. Here,
distant supervision prefers classifying mention pairs of known relations,
whereas the data programming formula opposes classifying instances resembling
citations, and the joint inference formula ensures that at least one mention
pair of a known relation is classified as positive. Formula weight signifies
the confidence in the self-supervision, and can be refined iteratively along
with the prediction module.
##### Handling label imbalance
One challenge for distant supervision is that negative examples are often much
more numerous. A common strategy is to subsample negative examples to attain a
balanced dataset. In preliminary experiments, we found that this was often
suboptimal, as many informative negative examples were excluded from training.
Instead, we restored the balance by up-weighting positive examples. In DPL, an
additional challenge is that the labels are probabilistic and change over
iterations. In this paper, we simply used hard EM, with binary labels set
using 0.5 as the probability threshold, and the up-weighting coefficient
recalculated after each E-step.
Figure 1.4: Example of cross-sentence relation extraction for precision cancer
treatment.
#### 1.4.2 Biomedical Machine Reading
There is a long-standing interest in biomedical machine reading (e.g., [69,
70]), but prior studies focused on supervised approaches. The advent of big
biomedical data creates additional urgency for developing scalable approaches
that can generalize to new reading tasks. For example, genome sequencing cost
has been dropping faster than Moore’s Law, yet oncologists can only evaluate
tumor sequences for a tiny fraction of patients, due to the bottleneck in
assimilating relevant knowledge from publications. Recently, [20] formulated
precision oncology machine reading as cross-sentence relation extraction
(Figure 1.4) and developed the state-of-the-art system using distant
supervision. While promising, their results still leave much room to improve.
Moreover, they used heuristics to heavily filter entity candidates, with
significant recall loss.
In this section, we use cross-sentence relation extraction as a case study for
combining task-specific self-supervision using deep probabilistic logic (DPL).
First, we show that DPL can substantially improve machine reading accuracy in
a head-to-head comparison with [20], using the same entity linking method.
Next, we apply DPL to entity linking itself and attain similar improvement.
Finally, we consider further improving the recall by removing the entity
filter. By applying DPL to joint entity linking and relation extraction, we
more than doubled the recall in relation extraction while attaining comparable
precision as [20] with heavy entity filtering.
##### Evaluation
Comparing task-specific self-supervision methods is challenging as there is
often no annotated test set for evaluating precision and recall. In such
cases, we resort to the standard strategy used in prior work by reporting
sample precision (estimated proportion of correct system extractions) and
absolute recall (estimated number of correct system extractions). Absolute
recall is proportional to recall and can be used to compare different systems
(modulo estimation errors).
##### Datasets
We used the same unlabeled text as [20], which consists of about one million
full text articles in PubMed Central (PMC)111www.ncbi.nlm.nih.gov/pmc.
Tokenization, part-of-speech tagging, and syntactic parsing were conducted
using SPLAT [71], and Stanford dependencies [72] were obtained using Stanford
CoreNLP [73]. For entity ontologies, we used DrugBank222www.drugbank.ca and
Human Gene Ontology (HUGO)333www.genenames.org. DrugBank contains 8257 drugs;
we used the subset of 599 cancer drugs. HUGO contains 37661 genes. For
knowledge bases, we used the Gene Drug Knowledge Database (GDKD) [74] and the
Clinical Interpretations of Variants In Cancer
(CIVIC)444civic.genome.wustl.edu. Together, they contain 231 drug-gene-
mutation triples, with 76 drugs, 35 genes and 123 mutations.
| Distant Supervision: GDKD, CIVIC
---
Data Programming (Entity)
Mention matches entity name exactly.
Mention not a stop word.
Mention not following figure designation.
Mention’s POS tags indicate it is a noun.
Data Programming (Relation)
Less than 30% of words are numbers in each sentence.
No more than three consecutive numbers.
No more than two “et al”.
No more than three tokens start with uppercase.
No more than three special characters.
No more than three keywords indicative of table or figure.
Entity mentions do not overlap.
Joint Inference: Relation holds in at least one instance.
(a) Relation Extraction
| Distant Supervision: HGNC
---
Data Programming
No verbs in POS tags.
Mention not a common word.
Mention contains more than two characters or one word.
More than 30% of characters are upper case.
Mention contains both upper and lower case characters.
Mention contains both character and digit.
Mention contains more than six characters.
Dependency label from mention to parent indicative of direct object.
Joint Inference
Identical mentions nearby probably refer to the same entity.
Appositive mentions probably refer to the same entity.
Nearby mentions that match synonyms of same entity probably refer to the given
entity.
(b) Entity Linking
Table 1.1: DPL combines three types of task-specific self-supervision for
relation extraction and entity linking
#### 1.4.3 Cross-sentence relation extraction
Let $e_{1},\cdots,e_{m}$ be entity mentions in text $T$. Relation extraction
can be formulated as classifying whether a relation $R$ holds for
$e_{1},\cdots,e_{m}$ in $T$. To enable a head-to-head comparison, we used the
same cross-sentence setting as [20], where $T$ spans up to three consecutive
sentences and $R$ represents the ternary interaction over drugs, genes, and
mutations (whether the drug is relevant for treating tumors with the given
gene mutation).
##### Entity linking
In this subsection, we used the entity linker from Literome [75] to identify
drug, gene, and mutation mentions, as in [20]. This entity linker first
identifies candidate mentions by matching entity names or synonyms in domain
ontologies, then applies heuristics to filter candidates. The heuristics are
designed to enhance precision, at the expense of recall. For example, one
heuristics would filter candidates of length less than four, which eliminates
key cancer genes such as ER or AKT.
##### Prediction module
We used the same graph LSTM as in [20] to enable head-to-head comparison on
self-supervision. Briefly, a graph LSTM generalizes a linear-chain LSTM by
incorporating arbitrary long-ranged dependencies, such as syntactic
dependencies, discourse relations, coreference, and connections between roots
of adjacent sentences. A word might have precedents other than the prior word,
and its LSTM unit is expanded to include a forget gate for each precedent. See
[20] for details.
##### Supervision module
We used DPL to combine three types of task-specific self-supervision for
cross-sentence relation extraction (Table 1.1 (a)). For distant supervision,
we used GDKD and CIVIC as in [20]. For data programming, we introduced
labeling functions that aim to correct entity and relation errors. Finally, we
incorporated joint inference among all co-occurring instances of an entity
tuple with the known relation by imposing the at-least-one constraint (i.e.,
the relation holds for at least one of the instances). For development, we
sampled 250 positive extractions from DPL using only distant supervision [20]
and excluded them from future training and evaluation.
| System | Prec. | Abs. Rec. | Unique
---|---|---|---
Peng 2017 | 0.64 | 6768 | 2738
DPL + $\tt EMB$ | 0.74 | 8478 | 4821
DPL | 0.73 | 7666 | 4144
$-$ $\tt DS$ | 0.29 | 7555 | 4912
$-$ $\tt DP$ | 0.67 | 4826 | 2629
$-$ $\tt DP$ $\tt(ENTITY)$ | 0.70 | 7638 | 4074
$-$ $\tt JI$ | 0.72 | 7418 | 4011
(a)
| Pred. Mod. | Prec. | Abs. Rec. | Unique
---|---|---|---
BiLSTM | 0.60 | 6243 | 3427
Graph LSTM | 0.73 | 7666 | 4144
(b)
Table 1.2: Comparison of sample precision and absolute recall in test
extraction on PMC. (a) Ablation study on self-supervision (DS: distant
supervision, DP: data programming, JI: joint inference). DPL + $\tt EMB$ is
our system using PubMed-trained word embedding, whereas DPL uses original
Wikipedia-trained word embedding in [20]. (b) Comparison of prediction model,
with same set of self-supervision and Wikipedia-trained word embedding.
##### Experiment results
We compared DPL with the state-of-the-art system of [20]. We also conducted
ablation study to evaluate the impact of self-supervision strategies. For a
fair comparison, we used the same probability threshold in all cases (an
instance is classified as positive if normalized probability score is at least
0.5). For each system, sample precision was estimated by sampling 100 positive
extractions and manually determining the proportion of correct extractions by
an author knowledgeable about this domain. Absolute recall is estimated by
multiplying sample precision with the number of positive extractions. Table
1.2 (a) shows the results. DPL substantially outperformed [20], improving
sample precision by ten absolute points and raising absolute recall by 25%.
Combining self-supervision is key to this performance gain, as evident from
the ablation results. While distant supervision remained the most potent
source of task-specific self-supervision, data programming and joint inference
each contributed significantly. Replacing out-of-domain (Wikipedia) word
embedding with in-domain (PubMed) word embedding [76] also led to a small
gain. [20] only compared graph LSTM and linear-chain LSTM in automatic
evaluation, where distant-supervision labels were treated as ground truth.
They found significant but relatively small gains by graph LSTM. We conducted
additional manual evaluation comparing the two in DPL. Surprisingly, we found
large performance difference, with graph LSTM outperforming linear-chain LSTM
by 13 absolute points in precision and raising absolute recall by over 20%
(Table 1.2 (b)). This suggests that [20] might have underestimated performance
gain using automatic evaluation.
#### 1.4.4 Entity linking
Let $m$ be a mention in text and $e$ be an entity in an ontology. The goal of
entity linking is to predict $\tt Link(m,e)$, which is true iff $m$ refers to
$e$, for every candidate mention-entity pair $m,e$. We focus on genes in this
paper, as they are particularly noisy.
##### Prediction module
We used BiLSTM with attention over the ten-word windows before and after a
mention. The embedding layer is initialized by word2vec embedding trained on
PubMed text [76]. The word embedding dimension was 200. We used 5 epochs for
training, with Adam as the optimizer. We set learning rate to 0.001, and batch
size to 64.
##### Supervision module
As in relation extraction, we combined three types of self-supervision using
DPL (Table 1.1 (b)). For distant supervision, we obtained all mention-gene
candidates by matching PMC text against the HUGO lexicon. We then sampled a
subset of 200,000 candidate instances as positive examples. We sampled a
similar number of noun phrases as negative examples. For data programming, we
introduced labeling functions that used mention characteristics (longer names
are less ambiguous) or syntactic context (genes are more likely to be direct
objects and nouns). For joint inference, we leverage linguistic phenomena
related to coreference (identical, appositive, or synonymous mentions nearby
are likely coreferent).
| System | Acc. | F1 | Prec. | Rec.
---|---|---|---|---
String Match | 0.18 | 0.31 | 0.18 | 1.00
DS | 0.64 | 0.71 | 0.62 | 0.83
DS + DP | 0.66 | 0.71 | 0.62 | 0.83
DS + DP + JI | 0.70 | 0.76 | 0.68 | 0.86
(a)
| | F1 | Precision | Recall
---|---|---|---
GNormPlus | 0.78 | 0.74 | 0.81
DPL | 0.74 | 0.68 | 0.80
(b)
Table 1.3: (a) Comparison of gene entity linking results on a balanced test
set. The string-matching baseline has low precision. By combining various
types of task-specific self-supervision, DPL substantially improved precision
while retaining reasonably high recall. (b) Comparison of gene entity linking
results on BioCreative II test set. GNormPlus is the state-of-the-art system
trained on thousands of labeled examples. DPL used only task-specific self-
supervision.
##### Experiment results
For evaluation, we annotated a larger set of sample gene-mention candidates
and then subsampled a balanced test set of 550 instances (half are true gene
mentions, half not). These instances were excluded from training and
development. Table 1.3 (a) compares system performance on this test set. The
string-matching baseline has a very low precision, as gene mentions are highly
ambiguous, which explains why [20] resorted to heavy filtering. By combining
various task-specific self-supervision, DPL improved precision by over 50
absolute points, while retaining a reasonably high recall (86%). All self-
supervision contributed significantly, as the ablation tests show. We also
evaluated DPL on BioCreative II, a shared task on gene entity linking [69]. We
compared DPL with GNormPlus [77], the state-of-the-art supervised system
trained on thousands of labeled examples in BioCreative II training set.
Despite using zero manually labeled examples, DPL attained comparable F1 and
recall (Table 1.3 (b)). The difference is mainly in precision, which indicates
opportunities for more task-specific self-supervision.
#### 1.4.5 Joint entity and relation extraction
An important use case for machine reading is to improve knowledge curation
efficiency by offering extraction results as candidates for curators to vet.
The key to practical adoption is attaining high recall with reasonable
precision [20]. The entity filter used in [20] is not ideal in this aspect, as
it substantially reduced recall. In this subsection, we consider replacing the
entity filter by the DPL entity linker. See Table 1.4 (a). Specifically, we
added one labeling function to check if the entity linker returns a normalized
probability score above $p_{\tt TRN}$ for gene mentions, and filtered test
instances if the gene mention score is lower than $p_{\tt TST}$. We set
$p_{\tt TRN}=0.6$ and $p_{\tt TST}=0.3$ from preliminary experiments. The
labeling function discouraged learning from noisy mentions, and the test-time
filter skips an instance if the gene is likely wrong. Not surprisingly,
without entity filtering, [20] suffered large precision loss. All DPL versions
substantially improved accuracy, with significantly more gains using the DPL
entity linker.
| System | Prec | Abs. Rec. | Unique
---|---|---|---
Peng 2017 | 0.31 | 11481 | 5447
DPL (RE) | 0.52 | 17891 | 8534
$+$ EL (TRN) | 0.55 | 21881 | 11047
$+$ EL (TRN/TST) | 0.61 | 20378 | 10291
(a)
| Gene | Drug | Mut. | Gene-Mut. | Relation
---|---|---|---|---
27% | 4% | 20% | 45% | 24%
(b)
Table 1.4: (a) Comparison of sample precision and absolute recall (all
instances and unique entity tuples) when all gene mention candidates are
considered. [20] used distant supervision only. RE: DPL relation extraction.
EL: using DPL entity linking in RE training (TRN) and/or test (TST). (b) Error
analysis for DPL relation extraction. Figure 1.5: Example of relation-
extraction errors corrected by DPL with additional task-specific self-
supervision.
#### 1.4.6 Discussion
##### Scalability
DPL is efficient to train, taking around 3.5 hours for relation extraction and
2.5 hours for entity linking in our PubMed-scale experiments, with 25 CPU
cores (for probabilistic logic) and one GPU (for LSTM). For relation
extraction, the graphical model of probabilistic logic contains around 7,000
variables and 70,000 factors. At test time, it is just an LSTM, which
predicted each instance in less than a second. In general, DPL learning scales
linearly in the number of training instances. For distant supervision and data
programming, DPL scales linearly in the number of known facts and labeling
functions. As discussed before, joint inference with high-order factors is
more challenging, but can be efficiently approximated. For inference in
probabilistic logic, we found that loopy belief propagation worked reasonably
well, converging after 2-4 iterations. Overall, we ran variational EM for
three iterations, using ten epochs of deep learning in each M-step. We found
these worked well in preliminary experiments and used the same setting in all
final experiments.
##### Accuracy
To understand more about DPL’s performance gain over distant supervision, we
manually inspected some relation-extraction errors fixed by DPL after training
with additional self-supervision. Figure 1.5 shows two such examples. While
some data programming functions were introduced to prevent errors stemming
from citations or flattened tables, none were directly applicable to these
examples. This shows that DPL can generalize beyond the original self-
supervision.
While the results are promising, there is still much to improve. Table 1.4 (b)
shows estimated precision errors for relation extraction by DPL. (Some
instances have multiple errors.) Entity linking can incorporate more task-
specific self-supervision. Joint entity linking and relation extraction can be
improved by feeding back extraction results to linking. Improvement is also
sorely needed in classifying mutations and gene-mutation associations. The
prediction module can also be improved, e.g., by adding attention to graph
LSTM. DPL offers a flexible framework for exploring all these directions.
### 1.5 Self-Supervised Self-Supervision
Input: Seed virtual evidences $I$, deep neural network $\Psi$, inputs
$X=(X_{1},\ldots,X_{N})$, unobserved outputs $Y=(Y_{1},\ldots,Y_{N})$, human
query budget $T$.
Output: Learned prediction module $\Psi$ and virtual evidences
$K=\\{(f_{v}(X,Y),w_{v}):v\\}$.
Initialize: $K=I$; $Q=\emptyset$; $i=0$. for _$i=1\ldots M$_ do
while _Structured Self-Training not converged_ do
$\Psi,K\leftarrow\mbox{{DPL-Learn}}(K,\Psi,X,Y)$
$v=\texttt{PropSST}(K,\Psi,X,Y)$;
$K\leftarrow K\cup v$;
end while
if _$|Q| <T$_ then
$v=\mbox{{PropFAL}}(K,\Psi,X,Y,Q);Q\leftarrow Q\cup v$;
if $\mbox{{Human-Accept}}(v)$ then $K\leftarrow K\cup v$
end if
end for
Algorithm 2 Self-Supervised Self-Supervision (S4)
In this section, we present the Self-Supervised Self-Supervision (S4)
framework, which extends deep probabilistic logic (DPL) with the capability to
learn new self-supervision. Let $\mathcal{V}=\\{(f_{v},w_{v},\alpha_{v}):v\\}$
be the set of all candidate virtual evidences, where $f_{v}(X,Y)$ is a first-
order logical formula, $w_{v}$ is the weight, and $\alpha_{v}$ is the weight
prior (for non-fixed $w_{v}$). Let $K$ be the set of virtual evidences
maintained by the algorithm, initialized by the seed $I$. The key idea of S4
is to interleave structure learning and active learning to iteratively propose
new virtual evidence $v\in\mathcal{V}$ to augment $K$ (Figure 1.2).
Specifically, S4 can be viewed as conducting structure learning in the factor
graph that specifies the virtual evidence. Structure learning has been studied
intensively in the graphical model literature [34]. It is also known as
feature selection or feature induction in general machine learning literature
[78]. Here, we are introducing structured factors for self-supervision, rather
than as feature templates to be used during training. Another key difference
from standard structure learning is the deep neural network, which provides an
alternative view from the virtual evidence space and enables multi-view
learning in DPL. The neural network can also help identify candidate virtual
evidences, e.g., via neural attention. Self-training is a special case where
candidate virtual evidences are individual label assignments (i.e.,
$f_{v}=I[y_{v}=l_{v}]$). S4 can thus be viewed as conducting structured self-
training (SST) by admitting arbitrary Markov logic formulas as virtual
evidence.
In data programming and other prior self-supervision methods, human experts
need to pre-specify all self-supervision upfront. While it is easy to generate
a small seed by identifying the most salient self-supervision, this effort can
quickly become tedious and more challenging as the experts are required to
enumerate the less salient templates. On the other hand, given a candidate,
it’s generally much easier for experts to validate it. This suggests that for
the best utilization of human bandwidth, we should focus on leveraging them to
produce the initial self-supervision and verify candidate self-supervision.
Consequently, in addition to structured self-training (SST), S4 incorporates
feature-based active learning (FAL) (i.e., active learning of self-
supervision). When SST converges, S4 will switch to the active learning mode
by proposing a candidate virtual evidence for human verification (i.e.,
labeling a feature rather than an instance in standard active learning).
Intuitively, in FAL we are proposing virtual evidences for which the labels of
the corresponding instances are still uncertain. If the human expert can
provide definitive supervision on the label, the information gain will be
large. By contrast, in SST, we favor virtual evidences with skewed posterior
label assignments for their corresponding instances, as they can potentially
amplify the signal.
Algorithm 2 describes the S4 algorithm. S4 first conducts DPL using the
initial self-supervision $I$, then interleaves structured self-training (SST)
with feature-based active learning (FAL). SST steps are repeated until there
is little change in the probabilistic labels ($<1\%$ in our experiments). DPL
learning updates the deep neural network and the graphical model parameters
with warm start (i.e., the parameters are initialized with the previous
parameters). All proposed queries are stored and won’t be proposed again. The
total amount of human effort consists of generating the seed $I$ and
validating $T$ queries.
S4 is a general algorithmic framework that can combine various strategies for
designing $\mathcal{V}$, $\tt PropSST$, and $\tt PropFAL$. In standard
structure learning, $\tt PropSST$ would attempt to maximize the learning
objective (e.g., conditional likelihood of seed virtual evidences) by
iteratively conducting greedy structure changes. However, this is very
expensive to compute, since it requires a full DPL run just to score each
candidate. Instead, we take inspiration from the feature-induction and
relational learning literature and use heuristic approximations that are much
faster to evaluate. In the most general setting, $\mathcal{V}$ contains all
possible potential functions. In practice, we can restrict it to obtain a good
trade-off between expressiveness and computation for the problem domain.
Interestingly, as we will see in the experiment section, even with relatively
simple classes of self-supervision, S4 can dramatically improve over DPL
through structure learning and active learning. We use text classification
from natural language processing (NLP) as a running example to illustrate how
to apply S4 in practice. Here, the input $X_{i}=(t_{1},\ldots,t_{s_{i}})$ is a
sequence of tokens and the output $Y_{i}$ is the classification label (e.g.,
$\tt pos$ or $\tt neg$ in sentiment analysis).
#### 1.5.1 Candidate Self-Supervision
For $\mathcal{V}$, the simplest choice is to use tokens. Namely,
$f_{t,l}(X_{i},Y_{i})=\mathbb{I}[t\in X_{i}\land Y_{i}=l]$. For simplicity, we
can use a fixed weight and prior for all initial virtual evidence, i.e.,
$\mathcal{V}=\\{(f_{t,l},w,\alpha):t,l\\}$. Take sentiment analysis as an
example. $X_{i}$ may represent a movie review and $Y_{i}\in\\{0,1\\}$ the
sentiment. A virtual evidence for self-supervision may stipulate that if the
review contains the word “good”, the sentiment is more likely to be positive.
This can be represented by the formula
$f_{\text{good},1}(X_{i},Y_{i})=\mathbb{I}[\text{``good''}\in X_{i}\wedge
Y_{i}=1]$ with a positive weight. A more advanced choice for $\mathcal{V}$ may
include high-order joint-inference factors, such as
$f_{ij}(Y_{i},Y_{j})=\mathbb{I}[Y_{i}=Y_{j}]$. If we add this factor for
similar pairs $X_{i},X_{j}$, it stipulates that instances with similar input
are likely to share the same label. Here we define similar pairs with a
function ${\tt Sim}(X_{i},X_{j})$ between $X_{i}$ and $X_{j}$, such as the
cosine similarity between the sentence (or document) embeddings of $X_{i}$ and
$X_{j}$, based on the current deep neural network. Note that this is different
from graph-based semi-supervised learning or other kernel-based methods in
that the similarity metric is not pre-specified and fixed, but rather evolving
along with the neural network for the end task.
#### 1.5.2 Structured Self-Training ($\tt PropSST$)
From DPL learning, we obtain the current marginal estimate of the latent label
variables $q_{i}(Y_{i})$, which we would treat as probabilistic labels in
assessing candidate virtual evidence. There are many sensible strategies for
proposing candidates in structured self-training (i.e., $\tt PropSST$). For
token-based self-supervision, a common technique from the feature-selection
literature is to choose a token highly correlated with a label. For example,
we can choose the token $t$ that occurs much more frequently in instances for
a given label $l$ than others using our noisy label estimates. We find that
this often leads to very noisy proposals and semantic drift. A simple
refinement is to restrict our scoring to instances containing some initial
self-supervised tokens. However, this still has the drawback that a word may
occur more often in instances of a class for reasons other than contributing
to the label classification. We therefore consider a more sophisticated
strategy based on neural attention. Namely, we will credit occurrences using
the normalized attention weight for the given token in each instance.
Formally, let $A_{\Psi}(X_{i},j)$ represent the normalized attention weight
the neural network $\Psi$ assigns to the $j$-th token in $X_{i}$ for the final
classification. We define average weighted attention for token $t$ and label
$l$ as ${\tt
Attn}(t,l)=\frac{1}{C_{t}}\sum_{i,j:X_{i,j}=t}\leavevmode\nobreak\
q_{i}(Y_{i}=l)\cdot A_{\Psi}(X_{i},j)$, where $C_{t}$ is the number of
occurrences of $t$ in $X$. Then $\tt PropSST$ would simply score token-based
self-supervision $f_{t,l}$ using relative average weighted attention:
$S_{\text{token}}(t,l)={\tt Attn}(t,l)-\sum_{l^{\prime}\neq l}{\tt
Attn}(t,l^{\prime})$. In each iteration, $\tt PropSST$ picks the top scoring
$f_{t,l}$ that has not been proposed yet as the new virtual evidence to add to
$K$.
We also consider an entropy-based score function that works for arbitrary
input-based features. It treats the prediction module $\Psi$ as a black box,
and only uses the posterior label assignments $q_{i}(Y_{i})$. Consider
candidate virtual evidence $f_{b,l}(X_{i},Y_{i})=\mathbb{I}[b(X_{i})\wedge
Y_{i}=l]$, where $b$ is a binary function over input $X_{i}$. This clearly
generalizes token-based virtual evidence. Define ${\tt
Ent}(b)=H\left(\frac{1}{C_{b}}\sum_{i:b(X_{i})=1}q_{i}(Y_{i})\right)$, where
$H$ is the Shannon entropy and $C_{b}$ is the number of instances for which
the feature $b$ holds true. This function represents the entropy of the
average posterior among all instances with $b(X_{i})=1$. $\tt PropSST$ will
then use $S_{\text{entropy}}(b)=1/{\tt Ent}(b)$ to choose the $b^{*}$ with the
lowest average entropy and then pick label $l^{*}$ with the highest average
posterior probability for $b^{*}$. In our experiments, this performs similarly
to attention-based scores.
For joint-inference self-supervision, we consider the similarity-based factors
defined earlier, and leave the exploration of more complex factors to future
work. To distinguish task-specific similarity from pretrained similarity, we
use the difference between the similarity computed using the current fine-
tuned BERT model and that using the pretrained one. Formally, let ${\tt
Sim}_{\text{pretrained}}(X_{i},X_{j})$ be the cosine similarity between the
embeddings of $X_{i}$ and $X_{j}$ generated by the pretrained BERT model, and
${\tt Sim}_{\Psi}(X_{i},X_{j})$ be that between the embeddings using the
current learned network $\Psi$. $\tt PropSST$ would score the joint-inference
factor using the relative similarity and choose the top scoring pairs to add
to self-supervision: $S_{\text{joint}}(X_{i},X_{j})={\tt
Sim}_{\Psi}(X_{i},X_{j})-{\tt Sim}_{\text{pretrained}}(X_{i},X_{j})$.
#### 1.5.3 Feature-Based Active Learning ($\tt PropFAL$)
For active learning, a common strategy is to pick the instance with highest
entropy in the label distribution based on the current marginal estimate. In
feature-based active learning, we can similarly pick the feature $b$ with the
highest average entropy ${\tt Ent}(b)$. Note that this is opposite to how we
use the entropy-based score function in $\tt PropSST$, where we choose the
feature with the lowest average entropy. In $\tt PropFAL$, we will identify
$b^{*}=\operatorname*{arg\,max}({\tt Ent}(b))$, present
$f_{b^{*},l}(X,Y)=\mathbb{I}[b^{*}(X)\land Y=l]$ for all possible labels $l$,
and ask the human expert to choose a label $l^{*}$ to accept or reject them
all.
#### 1.5.4 Experiments
We use the natural language processing (NLP) task of text classification to
explore the potential for S4 to improve over DPL using structure learning and
active learning. We used three standard text classification datasets: IMDb
[79], Stanford Sentiment Treebank [80], and Yahoo! Answers [81]. IMDb contains
movie reviews with polarity labels (positive/negative). There are 25,000
training instances with equal numbers of positive and negative labels, and the
same numbers for test. Stanford Sentiment Treebank (StanSent) also contains
movie reviews, but was annotated with five labels ranging from very negative
to very positive. We used the binarized version of StanSent, which collapses
the polarized categories and discards the neutral sentences. It contains 6,920
training instances and 1,821 test instances, with roughly equal split.
Overall, the StanSent reviews are shorter than IMDb’s, and they often exhibit
more challenging linguistic phenomena (e.g., nested negations or sarcasm). The
Yahoo dataset contains 1.4 million training questions and 60,000 test
questions from Yahoo! Answers; these are equally split into 10 classes.
In all our experiments with S4, we withheld gold labels from the system, used
the training instances as unlabeled data, and evaluated on the test set. We
reported test accuracy, as all of the datasets are class-balanced. For our
neural network prediction module $\Psi(X_{i},Y_{i})$, we used the standard
BERT-base model pretrained using Wikipedia [2], along with a global-context
attention layer as in [82], which we also used for attention-based scoring. We
truncated the input text to 512 tokens, the maximum allowed by the standard
BERT model. All of our baselines (except supervised bag-of-words) use the same
BERT model. For all virtual evidences, we used initial weight $w=2.2$ (the
log-odds of 90% probability) and used an $\alpha$ corresponding to an L2
penalty of $5\times 10^{-8}$ on $w$. Our results are not sensitive to these
values. In all experiments, we use the Adam optimizer with an initial learning
rate tuned over $[0.1,0.01,0.001]$. The optimizer’s history is reset after
each EM iteration to remove old gradient information. We always performed 3 EM
iterations and trained $\Psi$ for 5 epochs per iteration. For the global-
context attention layer, we used a context dimension of 5. The model is warm-
started across EM iterations (in DPL), but _not_ across the outer iterations
in S4 (the for loop). In all experiments, we used the Adam optimizer with an
initial learning rate tuned over $[0.1,0.01,0.001]$. The optimizer’s history
is reset after each EM iteration to remove old gradient information.
For virtual evidence, we focus on token-based unary factors and similarity-
based joint factors, as discussed in the previous section, and leave the
exploration of more complex factors to future work. Even with these factors,
our self-supervised $\Psi$ models often nearly match the accuracy of the best
supervised models. We also compare with Snorkel, a popular self-supervision
system [3]. We use the latest Snorkel version [63], which models correlations
among same-instance factors. Snorkel cannot incorporate joint-inference
factors across different instances. In all of our Snorkel baselines, we
separately tuned the initial learning rate over the same set, and trained the
deep neural network for the same number of total epochs that DPL uses to
ensure a fair comparison.
To simulate human supervision for unary factors, we trained a unigram model
using the training data with L1 regularization and selected the 100 tokens
with the highest weights for each class as the oracle self-supervision. By
default, we used the top tokens for each class in the initial self-supervision
$I$. We also experimented with using random tokens from the oracle in $I$ to
simulate lower-quality initial supervision and to quantify the variance of S4.
For the set of oracle joint factors, we fine-tuned the standard BERT model on
the training set, used the $\tt CLS$ embedding BERT produces to compute input
similarity, and picked the 100 input pairs whose similarity changed the most
between the fine-tuned model and the initial model.
| Algorithm | Sup. size $|I|$ | Test acc (%)
---|---|---
BoW | 25k | 87.1
DNN | 25k | 91.0
Self-training | 100 | 69.9
1k | 88.5
Snorkel | 6 | 76.6
DPL | 6 | 80.7
S4-SST | 6 | 85.5
S4 ($T=20$) | 6 | 85.6
Snorkel | 20 | 82.4
DPL | 20 | 78.9
S4-SST | 20 | 86.4
S4 ($T=20$) | 20 | 86.9
Snorkel | 40 | 84.6
DPL | 40 | 85.2
S4-SST | 40 | 86.6
S4 ($T=20$) | 40 | 86.8
(a) IMDb
| Algorithm | Sup. size $|I|$ | Test acc (%)
---|---|---
BoW | 6.9k | 78.9
DNN | 6.9k | 90.9
Self-training | 50 | 78.0
100 | 81.8
Snorkel | 6 | 63.5
DPL | 6 | 57.2
S4-SST | 6 | 73.0
S4-SST + J | 6 | 76.2
S4 + J ($T=20$) | 6 | 81.4
Snorkel | 20 | 73.0
DPL | 20 | 72.4
S4-SST | 20 | 83.3
S4-SST + J | 20 | 85.1
S4 + J ($T=20$) | 20 | 84.4
Snorkel | 40 | 73.6
DPL | 40 | 77.0
S4-SST | 40 | 84.9
S4-SST + J | 40 | 86.3
S4 + J $(T=20)$ | 40 | 85.4
(b) Stanford
Table 1.5: System comparison on IMDb and Stanford.
We first investigate whether structure learning can help in S4 by running
without feature-based active learning. We set the query budget $T=0$ in
Algorithm 2. Because we only take structured self-training steps when $T=0$,
we denote this version of S4 as S4-SST. Table 1.5 (a) shows the results on
IMDb. With just six self-supervised tokens (three per class), S4-SST already
attained 86% test accuracy, which outperforms self-training with 100 labeled
examples by 16 absolute points, and is only slightly worse than self-training
with 1000 labeled examples or supervised training with 25,000 labeled
examples. By conducting structure learning, S4-SST substantially outperformed
DPL, gaining about 5 absolute points in accuracy (a 25% relative reduction in
error), and also outperformed the Snorkel baseline by 8.9 points.
Interestingly, with more self-supervision at 20 tokens, DPL’s performance
drops slightly, which might stem from more noise in the initial self-
supervision. By contrast, S4-SST capitalized on the larger seed self-
supervision and attained steady improvement. Even with substantially more
self-supervision at 40 tokens, S4-SST still attained similar accuracy gain,
demonstrating the power in structure learning. On average across different
initial amounts of supervision $|I|$, S4-SST outperforms DPL by 5.6 points and
Snorkel by 5.3 points. Next, we consider the full S4 algorithm with a budget
of up to $T=20$ human queries (S4 ($T=20$)). Overall, by automatically
generating self-supervision from structure learning, S4-SST already attained
very high accuracy on this dataset. However, active learning can still produce
some additional gain. The only randomness in Table 1.5 is the initialization
of the deep network $\Psi$, with negligible effect.
---
(a)
---
(b)
---
(c)
| Init. pos. | Init. neg. | New pos. | New neg.
---|---|---|---
refreshing | lacks | superb | terrible
moving | waste | lovely | horrible
caught | bland | touching | negative
magic | stink | charming | boring
captures | 1 | delightful | 2
(d)
Figure 1.6: S4-SST learning in IMDb. (a) S4-SST learning curves with various
numbers of initial self-supervised tokens. (b) comparison between the learning
curves of S4-SST with just six self-supervised tokens and self-training with
an order of magnitude more direct supervision (100/200 labeled examples). (c)
multiple runs of S4-SST with 20 _random_ oracle self-supervised tokens (rather
than the top oracle tokens). (d) pre-specified self-supervised tokens and
proposed tokens in the first few iterations.
Figure 1.6 (a) shows how S4-SST iterations improve the test accuracy of the
learned neural network with different amounts of initial virtual evidence. Not
surprisingly, with more initial self-supervision, the gain is less pronounced,
but still significant. Figure 1.6 (b) compares the learning curves of S4-SST
with those of self-training. Remarkably, with just _six_ self-supervised
tokens, S4-SST not only attained substantial gain over the iterations, but
also easily outperformed self-training despite the latter using an order of
magnitude more label information (up to 200 labeled examples). This shows that
S4 is much more effective in leveraging bounded human effort for supervision.
Figure 1.6 (c) shows 10 runs of S4-SST when it was initialized with 20
_random_ oracle tokens (10 per class), rather than the _top_ 20 tokens from
the oracle. As expected, DPL’s initial performance is worse than with the top
oracle tokens. However, over the iterations, S4-SST was able to recover even
from particularly poor initial state, gaining up to 20 absolute accuracy
points over DPL in the process. The final accuracy of S4-SST is 85.2 $\pm$
0.9, compared to 71.5 $\pm$ 6.5 for DPL and 72.9 $\pm$ 6.7 for Snorkel, a mean
improvement of more than 12 absolute accuracy points over both baselines.
S4-SST’s gains over DPL and Snorkel are statistically significant using a
paired $t$-test (samples are paired when the algorithms have the same initial
factors $I$) with $p=0.01$. This indicates that S4-SST is robust to noise in
the initial self-supervision. Figure 1.6 (d) shows the initial self-supervised
tokens and the ones learned by S4-SST in the first few iterations. We can see
that S4-SST is able to learn highly relevant self-supervision tokens.
S4 has similar gains over DPL, Snorkel, and self-training on the Stanford
dataset. See Table 1.5 (b). The Stanford dataset is much more challenging and
for a long while, it was hard to exceed 80% test accuracy [80]. Interestingly,
S4-SST was able to surpass this milestone using just 20 initial self-
supervision tokens. As in IMDb, the only randomness is in the initialization
of $\Psi$, which is negligible.
For IMDb, as can be seen above, even with simple token-based self-supervision,
S4-SST already performed extremely well. So we focused our investigation of
joint-inference factors on the more challenging Stanford dataset (S4-SST + J).
While S4-SST already performed very well with token-based self-supervision, by
incorporating joint-inference factors, it could still gain up to 3 absolute
accuracy points. An example learned joint-inference factor is between the
sentence pair: This is no “Waterboy!” and “It manages to accomplish what few
sequels can—it equals the original and in some ways even better”. Note that
Waterboy is widely considered a bad movie, hence the first sentence expresses
a positive sentiment, just like the second. It is remarkable that S4 can
automatically induce such factors with complex and subtle semantics from small
initial self-supervision.
The Stanford results also demonstrated that active learning could play a
bigger role in more challenging scenarios. With limited initial self-
supervision ($|I|=6$), the full S4 system (S4+J (T=20)) gained 8 absolute
points over S4-SST and 5 absolute points over S4-SST+J. With sufficient
initial self-supervision and joint-inference, however, active learning was
actually slightly detrimental ($|I|=20,40$).
| | $|I|=6$ | $|I|=10$ | $|I|=20$ | $|I|=40$
---|---|---|---|---
$T=5$ | 79.0 | 83.8 | 84.0 | 85.9
$T=10$ | 79.5 | 83.7 | 85.0 | 86.0
$T=20$ | 82.7 | 84.5 | 85.8 | 86.4
(a) IMDb
| | $|I|=6$ | $|I|=10$ | $|I|=20$ | $|I|=40$
---|---|---|---|---
$T=5$ | 71.4 | 77.5 | 82.5 | 83.9
$T=10$ | 72.3 | 77.4 | 82.5 | 83.7
$T=20$ | 77.1 | 80.8 | 83.4 | 84.0
(b) Stanford
Table 1.6: S4-FAL test results (no SST steps)
Finally, we evaluate S4-FAL, which conducts active learning but not structure
learning. See Table 1.6. As expected, performance improved with larger initial
self-supervision ($I$) and human query budget ($T$). Active learning helps the
most when initial self-supervision is limited. Compared to S4 with structure
learning, however, active learning alone is less effective. For example,
without requiring any human queries, S4-SST outperformed S4-FAL on both IMDB
and Stanford even when the latter was allowed up to $T=20$ human queries.
$|I|$ | Entropy-based | Attention-based
---|---|---
6 | 82.1 | 85.5
20 | 84.9 | 86.4
40 | 85.5 | 86.6
(a)
$|I|$ | Entropy-based | Attention-based
---|---|---
6 | 77.2 | 73.0
20 | 85.1 | 83.3
40 | 85.7 | 84.9
(b)
Table 1.7: Entropy-based scoring ($S_{\text{entropy}}$) perform comparably as
attention-based scoring ($S_{\text{token}}$).
Algorithm | Sup. size | Test acc (%)
---|---|---
BoW | 140k | 71.2
DNN | 140k | 79.8
Self-training | 50 | 38.4
Snorkel | 50 | 37.2
DPL | 50 | 41.8
S4-SST | 50 | 49.1
Self-training | 100 | 38.2
Snorkel | 100 | 36.5
DPL | 100 | 41.7
S4-SST | 100 | 52.3
Table 1.8: Comparison of test accuracy on Yahoo! Answers.
Table 1.7 compares S4-SST test accuracy using entropy-based scoring
($S_{\text{entropy}}$) and attention-based scoring ($S_{\text{token}}$).
Entropy-based scoring slightly outperforms attention-based scoring on Stanford
Sentiment and slightly trails on IMDb. Overall, the two perform comparably but
entropy-based scoring is more generally applicable.
S4-SST obtains similarly substantial gains on Yahoo using token-based factors
and attention scoring. See Table 1.8. We focused our experiments on a fixed
10% of the training set due to its very large size (1.4 million examples).
There are 10 classes, so initial self-supervision size of 50 (100) represents
5 (10) initial tokens per class (for S4, DPL, and Snorkel), or 5 (10) labeled
examples per class (for self-training). Compared to binary sentiment analysis
in IMDb and Stanford, Yahoo represents a much more challenging dataset, with
ten classes and larger input text for each instance. The linguistic phenomena
are much more diverse, and therefore neither Snorkel or DPL performed much
better than self-training, as token-based self-supervision confers not much
more information than a labeled example. However, S4-SST is still able to
attain substantial improvement over the initial self-supervision. E.g., with
initial supervision size of 100, S4-SST gained about 11 absolute accuracy
points over DPL, and 16 absolute points over Snorkel. Additionally, S4-SST is
able to better utilize the new factors than Snorkel. If we run Snorkel using
the same initial factors as S4-SST and also add the new factors proposed by
S4-SST in each iteration, the accuracy improved from 36.5 to 44.2, but still
trailed S4-SST (52.3) by 8 absolute points. Interestingly, both DPL and
Snorkel perform better on Yahoo with _fewer_ initial factors, at 5 per class,
suggesting they are sensitive to noise in the less reliable initial self-
supervision. By contrast, S4-SST is more noise-tolerant and benefits from
additional initial supervision.
### 1.6 Conclusions
In this chapter, we present deep probabilistic logic (DPL) as a unifying
framework for task-specific self-supervised learning, by composing
probabilistic logic with deep learning. We further present self-supervised
self-supervision (S4), which extends DPL with structure learning and active
learning capabilities. Experiments on biomedical machine reading and text
classification tasks show that DPL enables effective combination of disparate
task-specific self-supervision strategies, while S4 can further improve
application performance by proposing additional self-supervision. Overall,
this enables the most effective use of human expert bandwidth by focusing on
identifying the most salient self-supervision for initialization and verifying
proposed self-supervision. While we focus on NLP tasks in this chapter, our
methods are general and can potentially be applied to other domains. Future
directions include: combining DPL with deep generative models and
probabilistic programming methods; further investigation in combining
structure learning and active learning in S4; exploring alternative
optimization strategies and more sophisticated self-supervision classes and
proposal algorithms; applications to other domains.
## References
* [1] LeCun Y, Bengio Y, Hinton G. Deep learning. Nature. 2015;521(7553):436–444.
* [2] Devlin J, Chang MW, Lee K, et al. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:181004805. 2018;.
* [3] Ratner AJ, De Sa CM, Wu S, et al. Data programming: Creating large training sets, quickly. In: Advances in neural information processing systems; 2016. p. 3567–3575.
* [4] Bach SH, He B, Ratner A, et al. Learning the structure of generative models without labeled data. In: International Conference on Machine Learning; 2017. p. 273–282.
* [5] Chang MW, Ratinov L, Roth D. Guiding semi-supervision with constraint-driven learning. In: Proceedings of the 45th annual meeting of the association of computational linguistics; 2007. p. 280–287.
* [6] Poon H, Domingos P. Joint unsupervised coreference resolution with markov logic. In: Proceedings of the conference on empirical methods in natural language processing; Association for Computational Linguistics; 2008. p. 650–659.
* [7] Druck G, Mann G, McCallum A. Learning from labeled features using generalized expectation criteria. In: Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval; ACM; 2008\. p. 595–602.
* [8] Ganchev K, Gillenwater J, Taskar B, et al. Posterior regularization for structured latent variable models. Journal of Machine Learning Research. 2010;11(Jul):2001–2049.
* [9] Craven M, Kumlien J. Constructing biological knowledge bases by extracting information from text sources. In: Proceedings of the Seventh International Conference on Intelligent Systems for Molecular Biology; 1999.
* [10] Mintz M, Bills S, Snow R, et al. Distant supervision for relation extraction without labeled data. In: Proceedings of the Joint Conference of the Forty-Seventh Annual Meeting of the Association for Computational Linguistics and the Fourth International Joint Conference on Natural Language Processing; 2009\.
* [11] Wang H, Poon H. Deep probabilistic logic: A unifying framework for indirect supervision. In: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing; 2018. p. 1891–1902.
* [12] Richardson M, Domingos P. Markov logic networks. Machine learning. 2006;62(1-2):107–136.
* [13] Lang H, Poon H. Self-supervised self-supervision by combining deep learning and probabilistic logic. In: Proceedings of the Thirty Fifth Annual Meeting of the Association for the Advancement of Artificial Intelligence; 2021.
* [14] McClosky D, Charniak E, Johnson M. Effective self-training for parsing. In: Proceedings of the main conference on human language technology conference of the North American Chapter of the Association of Computational Linguistics; Association for Computational Linguistics; 2006. p. 152–159.
* [15] Druck G, Settles B, McCallum A. Active learning by labeling features. In: Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1-Volume 1; Association for Computational Linguistics; 2009\. p. 81–90.
* [16] Vaswani A, Shazeer N, Parmar N, et al. Attention is all you need. In: Advances in neural information processing systems; 2017. p. 5998–6008.
* [17] Bach SH, He B, Ratner A, et al. Learning the structure of generative models without labeled data. In: Proceedings of the 34th International Conference on Machine Learning-Volume 70; 2017. p. 273–282.
* [18] Roth D. Incidental supervision: Moving beyond supervised learning. In: Thirty-First AAAI Conference on Artificial Intelligence; 2017.
* [19] Quirk C, Poon H. Distant supervision for relation extraction beyond the sentence boundary. In: Proceedings of the Fifteenth Conference on European chapter of the Association for Computational Linguistics; 2017.
* [20] Peng N, Poon H, Quirk C, et al. Cross-sentence n-ary relation extraction with graph lstms. Transactions of the Association for Computational Linguistics. 2017;5:101–115.
* [21] Huang H, Heck L, Ji H. Leveraging deep neural networks and knowledge graphs for entity disambiguation. arXiv preprint arXiv:150407678. 2015;.
* [22] Ratner AJ, De Sa CM, Wu S, et al. Data programming: Creating large training sets, quickly. In: Advances in Neural Information Processing Systems; 2016. p. 3567–3575.
* [23] Varma P, He BD, Bajaj P, et al. Inferring generative model structure with static analysis. In: Advances in neural information processing systems; 2017. p. 240–250.
* [24] Liu L, Ren X, Zhu Q, et al. Heterogeneous supervision for relation extraction: A representation learning approach. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing; 2017. p. 46–56.
* [25] Hoffmann R, Zhang C, Ling X, et al. Knowledge-based weak supervision for information extraction of overlapping relations. In: Proceedings of the Forty-Ninth Annual Meeting of the Association for Computational Linguistics; 2011\.
* [26] Lin Y, Shen S, Liu Z, et al. Neural relation extraction with selective attention over instances. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics; Vol. 1; 2016. p. 2124–2133.
* [27] Halpern Y, Horng S, Choi Y, et al. Electronic medical record phenotyping using the anchor and learn framework. Journal of the American Medical Informatics Association. 2016;23(4):731–740.
* [28] Haghighi A, Klein D. Prototype-driven learning for sequence models. In: Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics; Association for Computational Linguistics; 2006. p. 320–327.
* [29] Poon H. Grounded unsupervised semantic parsing. In: Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers); 2013. p. 933–943.
* [30] Chang MW, Ratinov L, Roth D. Guiding semi-supervision with constraint-driven learning. In: Proceedings of the 45th annual meeting of the association of computational linguistics; 2007. p. 280–287.
* [31] Druck G, Mann G, McCallum A. Learning from labeled features using generalized expectation criteria. In: Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval; 2008. p. 595–602.
* [32] Poon H, Domingos P. Joint unsupervised coreference resolution with markov logic. In: Proceedings of the 2008 conference on empirical methods in natural language processing; 2008. p. 650–659.
* [33] Ganchev K, Graça J, Gillenwater J, et al. Posterior regularization for structured latent variable models. Journal of Machine Learning Research. 2010;11(67):2001–2049.
* [34] Friedman N, Koller D. Being bayesian about network structure. a bayesian approach to structure discovery in bayesian networks. Machine learning. 2003;50(1-2):95–125.
* [35] Kok S, Domingos P. Learning the structure of markov logic networks. In: Proceedings of the 22nd international conference on Machine learning; 2005. p. 441–448.
* [36] Hearst MA. Automatic acquisition of hyponyms from large text corpora. In: Proceedings of the 14th conference on Computational linguistics-Volume 2; Association for Computational Linguistics; 1992. p. 539–545.
* [37] Carlson A, Betteridge J, Kisiel B, et al. Toward an architecture for never-ending language learning. In: Twenty-Fourth AAAI Conference on Artificial Intelligence; 2010.
* [38] Yarowsky D. Unsupervised word sense disambiguation rivaling supervised methods. In: 33rd annual meeting of the association for computational linguistics; 1995\. p. 189–196.
* [39] Collins M, Singer Y. Unsupervised models for named entity classification. In: 1999 Joint SIGDAT Conference on Empirical Methods in Natural Language Processing and Very Large Corpora; 1999.
* [40] Varma P, Ré C. Snuba: automating weak supervision to label training data. Proceedings of the VLDB Endowment. 2018;12(3):223–236.
* [41] Tong S, Koller D. Active learning for structure in bayesian networks. In: International joint conference on artificial intelligence; Vol. 17; Citeseer; 2001\. p. 863–869.
* [42] Galhotra S, Golshan B, Tan WC. Adaptive rule discovery for labeling text data. arXiv preprint arXiv:200506133. 2020;.
* [43] Poon H, Domingos P. Joint inference in information extraction. In: AAAI; Vol. 7; 2007. p. 913–918.
* [44] Poon H, Vanderwende L. Joint inference for knowledge extraction from biomedical literature. In: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics; Association for Computational Linguistics; 2010. p. 813–821.
* [45] Kimmig A, Bach S, Broecheler M, et al. A short introduction to probabilistic soft logic. In: Proceedings of the NIPS Workshop on Probabilistic Programming: Foundations and Applications; 2012. p. 1–4.
* [46] Rocktäschel T, Riedel S. End-to-end differentiable proving. Advances in Neural Information Processing Systems. 2017;30.
* [47] Manhaeve R, Dumancic S, Kimmig A, et al. Deepproblog: Neural probabilistic logic programming. Advances in Neural Information Processing Systems. 2018;31:3753–3760.
* [48] Qu M, Tang J. Probabilistic logic neural networks for reasoning. In: NeurIPS; 2019\.
* [49] Kingma DP, Welling M. Auto-encoding variational bayes. arXiv preprint arXiv:13126114. 2013;.
* [50] Kingma DP, Mohamed S, Rezende DJ, et al. Semi-supervised learning with deep generative models. In: Advances in Neural Information Processing Systems; 2014\. p. 3581–3589.
* [51] Johnson M, Duvenaud DK, Wiltschko A, et al. Composing graphical models with neural networks for structured representations and fast inference. In: Advances in neural information processing systems; 2016. p. 2946–2954.
* [52] Tran D, Hoffman MD, Saurous RA, et al. Deep probabilistic programming. arXiv preprint arXiv:170103757. 2017;.
* [53] Blum A, Mitchell T. Combining labeled and unlabeled data with co-training. In: Proceedings of the eleventh annual conference on Computational learning theory; 1998. p. 92–100.
* [54] Grechkin M, Poon H, Howe B. Ezlearn: Exploiting organic supervision in large-scale data annotation. arXiv preprint arXiv:170908600. 2017;.
* [55] Towell GG, Shavlik JW. Knowledge-based artificial neural networks. Artificial intelligence. 1994;70(1-2):119–165.
* [56] Hu Z, Ma X, Liu Z, et al. Harnessing deep neural networks with logic rules. In: Proceedings of the 2016 Conference on Association for Computational Linguistics; 2016.
* [57] Hu Z, Yang Z, Salakhutdinov R, et al. Deep neural networks with massive learned knowledge. In: Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing; 2016. p. 1670–1679.
* [58] Pearl J. Probabilistic reasoning in intelligent systems: networks of plausible inference. Elsevier; 2014.
* [59] Reynolds SM, Bilmes JA. Part-of-speech tagging using virtual evidence and negative training. In: Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing; Association for Computational Linguistics; 2005. p. 459–466.
* [60] Subramanya A, Bilmes J. Virtual evidence for training speech recognizers using partially labeled data. In: The Conference of the North American Chapter of the Association for Computational Linguistics; Association for Computational Linguistics; 2007. p. 165–168.
* [61] Li X. On the use of virtual evidence in conditional random fields. In: Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 3-Volume 3; Association for Computational Linguistics; 2009\. p. 1289–1297.
* [62] Parikh AP, Poon H, Toutanova K. Grounded semantic parsing for complex knowledge extraction. In: Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics; 2015. p. 756–766.
* [63] Ratner A, Hancock B, Dunnmon J, et al. Training complex models with multi-task weak supervision. In: Proceedings of the AAAI Conference on Artificial Intelligence; Vol. 33; 2019. p. 4763–4771.
* [64] Mann GS, McCallum A. Generalized expectation criteria for semi-supervised learning of conditional random fields. Proceedings of ACL-08: HLT. 2008;:870–878.
* [65] Murphy KP, Weiss Y, Jordan MI. Loopy belief propagation for approximate inference: An empirical study. In: Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence; Morgan Kaufmann Publishers Inc.; 1999\. p. 467–475.
* [66] Keith K, Handler A, Pinkham M, et al. Identifying civilians killed by police with distantly supervised entity-event extraction. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing; 2017. p. 1547–1557.
* [67] CarøE CC, Schultz R. Dual decomposition in stochastic integer programming. Operations Research Letters. 1999;24(1-2):37–45.
* [68] Domke J. Learning graphical model parameters with approximate marginal inference. IEEE transactions on pattern analysis and machine intelligence. 2013;35(10):2454–2467.
* [69] Morgan AA, Lu Z, Wang X, et al. Overview of biocreative ii gene normalization. Genome biology. 2008;9(2):S3.
* [70] Kim JD, Ohta T, Pyysalo S, et al. Overview of bionlp’09 shared task on event extraction. In: Proceedings of the Workshop on Current Trends in Biomedical Natural Language Processing: Shared Task; Association for Computational Linguistics; 2009. p. 1–9.
* [71] Quirk C, Choudhury P, Gao J, et al. MSR SPLAT, a language analysis toolkit. In: Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics:Demonstration Session; 2012.
* [72] de Marneffe MC, MacCartney B, Manning CD. Generating typed dependency parses from phrase structure parses. In: Proceedings of the Fifth International Conference on Language Resources and Evaluation; 2006.
* [73] Manning CD, Surdeanu M, Bauer J, et al. The Stanford CoreNLP natural language processing toolkit. In: Proceedings of the Fifty-Second Annual Meeting of the Association for Computational Linguistics: System Demonstrations; 2014.
* [74] Dienstmann R, Jang IS, Bot B, et al. Database of genomic biomarkers for cancer drugs and clinical targetability in solid tumors. Cancer Discovery. 2015;5.
* [75] Poon H, Quirk C, DeZiel C, et al. Literome: PubMed-scale genomic knowledge base in the cloud. Bioinformatics. 2014;30(19).
* [76] Pyysalo S, Ginter F, Moen H, et al. Distributional semantics resources for biomedical text processing. In: Proceedings of LBM 2013; 2013. p. 39–44. Available from: http://lbm2013.biopathway.org/lbm2013proceedings.pdf.
* [77] Wei CH, Kao HY, Lu Z. Gnormplus: an integrative approach for tagging genes, gene families, and protein domains. BioMed research international. 2015;2015.
* [78] Hall MA. Correlation-based feature selection for machine learning. 1999;.
* [79] Maas AL, Daly RE, Pham PT, et al. Learning word vectors for sentiment analysis. In: Proceedings of the 49th annual meeting of the association for computational linguistics: Human language technologies-volume 1; Association for Computational Linguistics; 2011. p. 142–150.
* [80] Socher R, Perelygin A, Wu J, et al. Recursive deep models for semantic compositionality over a sentiment treebank. In: Proceedings of the 2013 conference on empirical methods in natural language processing; 2013. p. 1631–1642.
* [81] Zhang X, Zhao J, LeCun Y. Character-level convolutional networks for text classification. In: Advances in neural information processing systems; 2015. p. 649–657.
* [82] Yang Z, Yang D, Dyer C, et al. Hierarchical attention networks for document classification. In: Proceedings of the 2016 conference of the North American chapter of the association for computational linguistics: human language technologies; 2016. p. 1480–1489.
| arxiv-papers | 2021-07-27T04:25:56 | 2024-09-04T03:07:20.502883 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Hoifung Poon, Hai Wang, Hunter Lang",
"submitter": "Hai Wang",
"url": "https://arxiv.org/abs/2107.12591"
} |
2107.12592 | # Detection of cybersecurity attacks through analysis of web browsing
activities using principal component analysis
Insha Ullah, Kerrie Mengersen, Rob J Hyndman, and James McGree Insha Ullah was
a research associate in the Science and Engineering Faculty, Queensland
University of Technology, QLD, Australia, 4000.
E-mail: [email protected] Kerrie Mengersen and James McGree are with the
Queensland University of Technology, Australia. Rob J Hyndman is with Monash
University, Australia.
###### Abstract
Organizations such as government departments and financial institutions
provide online service facilities accessible via an increasing number of
internet connected devices which make their operational environment vulnerable
to cyber attacks. Consequently, there is a need to have mechanisms in place to
detect cyber security attacks in a timely manner. A variety of Network
Intrusion Detection Systems (NIDS) have been proposed and can be categorized
into signature-based NIDS and anomaly-based NIDS. The signature-based NIDS,
which identify the misuse through scanning the activity signature against the
list of known attack activities, are criticized for their inability to
identify new attacks (never-before-seen attacks). Among anomaly-based NIDS,
which declare a connection anomalous if it expresses deviation from a trained
model, the unsupervised learning algorithms circumvent this issue since they
have the ability to identify new attacks. In this study, we use an
unsupervised learning algorithm based on principal component analysis to
detect cyber attacks. In the training phase, our approach has the advantage of
also identifying outliers in the training dataset. In the monitoring phase,
our approach first identifies the affected dimensions and then calculates an
anomaly score by aggregating across only those components that are affected by
the anomalies. We explore the performance of the algorithm via simulations and
through two applications, namely to the UNSW-NB15 dataset recently released by
the Australian Centre for Cyber Security and to the well-known KDD’99 dataset.
The algorithm is scalable to large datasets in both training and monitoring
phases, and the results from both the simulated and real datasets show that
the method has promise in detecting suspicious network activities.
###### Index Terms:
Intrusion detection, Cyber security, Singular value decomposition, Principal
component analysis, Unsupervised algorithm.
## 1 Introduction
The vulnerability of government departments and industries to cyber attacks is
rising due to the increased usage and reliance on network-connected platforms
and internet-connected devices. As such, there is a need to not only have
secure cyber systems but also have mechanisms in place to detect cyber
security attacks in a timely manner. The analysis of automatically generated
logs from network and system devices can provide deep insight into the current
state of security of computer systems. In addition, effective threat
intelligence can be performed which can proactively predict several possible
attack vectors relevant to government departments. However, there are
particular challenges in dealing with such data, including the sheer volume of
events of web browsing activity. Thus, computationally efficient approaches
are needed for handling and analyzing such data.
Network intrusion detection, as a particular form of anomaly detection, is an
active area of research. Many Network Intrusion Detection Systems (NIDS) are
designed to protect against malicious activities on the network [e.g. see 1,
2, 3, for references]. These systems can be classified into two main
categories [4]: signature-based NIDS (also known as misuse-based NIDS) and
anomaly-based NIDS [5, 6]. In signature-based NIDS, misuse is identified by
scanning the activities’ signatures against a database of known malicious
activities signatures. Many companies (such as Splunk111https://www.splunk.com
and Sumo Logic222https://www.sumologic.com) and open source packages (such as
ElasticSearch333https://www.elastic.co/ and
Graylog444https://www.graylog.org/) provide log analysis services based on
static signature matching. Although the signature-based NIDS have seen high
accuracies and low false alarm rates against the known type of attacks, they
lack the ability to identify new attacks due to the incomplete list of known
malicious activities. Another shortcoming of the signature-based NIDS is that
the attackers need to make only a slight modification to their signature to
avoid them [7]. On the other hand, in an anomaly-based NIDS a profile of
normal activities is built using machine learning algorithms and future
activities are scanned against the normal profile.
A variety of supervised and unsupervised statistical machine learning
algorithms have been proposed for intrusion detection. In general, the
supervised learning (classification) algorithms are known to have superior
performance compared with the unsupervised (clustering) algorithms in terms of
classification accuracy. However, their requirement of having a pre-labelled
training dataset is often unavailable in many applications. For example, large
networks can easily produce hundreds of gigabytes in logs each day. A large
training dataset may be required to learn the normal behavior of such a large
system. Further, the normal activities patterns may change over time, which
may require retraining of the previously fitted model periodically. In such
cases, it may not always be feasible to label each instance of a network
activities dataset as normal or malicious since it requires human involvement
to review and classify training data, and this requirement does not scale to
large data sets. Further, some anomalies may be unknown or at least unseen in
the training dataset.
Consequently, unsupervised learning methods seem more appealing for monitoring
network activities since they do not require a pre-labelled training dataset.
However, they do require a clean dataset (free of attacks) if the monitoring
objective is to uncover both known and new types of attacks but we note that
this is generally easy to acquire [8]. Precisely, an unsupervised anomaly-
based NIDS works in two phases: training and monitoring. In the training
phase, a model or an algorithm is used to learn the normal behavior of a
system using a ‘normal’ activity dataset. In the monitoring phase, the learned
model is used to evaluate the behavior of the future network traffic. A
behavior that is inconsistent with the trained model triggers an alert such
that the activity can be further investigated. If the investigation leads to a
declaration of the identified anomaly as normal activity, this activity should
be included in the normal profile and the model is re-trained for future
scanning. Unsupervised anomaly-based NIDS have the ability to identify what is
referred to as zero-day or never-before-seen attacks [9]. Note also that in
some applications the objective may be to detect only new attacks, in which
case the training dataset is allowed to contain the known types of attacks.
A variety of unsupervised learning algorithms have already been adapted for
intrusion detection. However, some of these are computationally intensive and
require large computer memory to operate in practice [e.g. see 10, 11].
Dimension reduction approaches such as principal component analysis (PCA) have
also been proposed [12, 13]. These are appealing because they are
statistically coherent, computationally faster and scalable. However, PCA-
based NIDS have been criticized by [8] for several reasons. First, these NIDS
are sensitive to the choice of the number of principal components that capture
the normal activities patterns. Often ad hoc approaches are used to make this
choice. Second, the effectiveness of PCA is sensitive to the level of
aggregation of the traffic measurements. Third, the presence of unusual
observations in the normal activities data that are used for training purpose
makes the NIDS less effective. Fourth, correctly identifying which flow
triggered the anomaly detector is an inherently challenging problem.
Most of the PCA-based NIDS developed so far share disadvantages highlighted by
[8]. For example, [14] and [15] have used the proportion of variance captured
and the scree-plot method, respectively, to choose the number of components.
These ad hoc procedures to select the number of PCs render the PCA less
effective, since it is likely to miss the components that describe the anomaly
if they are among the minor components (last PCs that explain less variance
and are often dropped from the analysis). To address the third issue; that is,
the existence of unusual observations in the normal activities data, [16] have
used PCA based on robust estimators; however, the selection of the number of
components is still an unsolved problem in their study.
A large number of variables could be recorded to describe the behavior of the
network traffic [17]. It could be that an anomaly is different from normal
activities patterns with respect to fewer variables and the other variables
are irrelevant. This is assumed by [18], for example, and is the usual
assumption of variable selection methods. It may also be that a set of
variables that distinguishes one kind of anomaly from normal activities
behavior differs from the set that are useful in identifying another kind of
anomaly. PCA seeks to derive new variables called principal components (PCs)
as linear combinations of the input variables such that a few of the new
variables account for the maximum variability among the input variables. If
the data are similarly scaled, the magnitude of the coefficients (also
referred to as loadings) in a PC reflect relative importance of the respective
input variables in describing the variation ascribed to that PC and the signs
of the coefficients specify positive or negative correlation between the input
variables. Typically each input variable has a non-zero coefficient across all
PCs even if the variables are just a random noise. However, in practice it is
common that majority of the component loadings are close to zero [19] and are
of less practical significance. A variable that makes an anomaly detectable in
a large number of observations is important and a PC that has a large loading
for this important variable needs to be taken into account when calculating
scores for anomaly detection. It is also likely that this important variable
has high correlation with all other variables that too are useful in
identifying the same anomaly, hence are likely to have larger loadings for the
same PCs.
In this paper we propose to use PCA to more effectively detect unusual web
browsing activities and attempt to address the issues raised by [8]. In the
training phase we fit the PCA model using the normal activities dataset and
find the bootstrap distribution of the standard deviations of the standardized
PCs. These bootstrap distributions are useful in identifying the important PCs
and also helps in locating large influential observations if there are any in
the training set of data. In the monitoring phase, we take into account fewer
important components to calculate anomaly scores for future connections. The
scores of anomalous activities based on only important components are expected
to deviate substantially from the scores obtained for normal connections and
hence should be useful in identifying intrusions. For illustration we consider
the performance of this approach in a simulation study and through application
to two publicly available datasets including UNSW-NB15 dataset recently
released by the Australian Centre for Cyber Security. Our method is
straightforward to understand, computationally efficient to implement and
empirical evaluation on several real-world datasets suggests that it is more
effective in detecting abnormal activities when compared to existing methods.
## 2 Principal component analysis
PCA is traditionally used as a dimension reduction technique since it tends to
capture as much variation as possible in a few components and is a useful tool
to visualize high-dimensional data in a manageable low-dimensional space [20,
21, 22]. It uses an orthogonal transformation to transform a set of $p$
(possibly correlated) observed variables into another set of $p$ uncorrelated
variables. The new derived set of variables are the $p$ principal components
(PCs). Each PC is a linear combination of the originally observed variables
such that the first PC stands for the axis along which the observed data
exhibit the highest variance, the second PC stands for the axis that is
orthogonal to the first PC and along which the observed data exhibit the
second highest variance, the third PC stands for the axis that is orthogonal
to the first two PCs and along which the observed data exhibit the third
highest variance, and so on. Similarly, the $p$th PC (the last one) stands for
the axis that is orthogonal to the remaining $p-1$ PCs and along which the
observed data exhibit the least variance. In this way, the $p$ orthogonal
dimensions of variability that exist in the data are captured in $p$ PCs and
the proportion of variability that each PC accounts for accumulates to the
total variation in the data. It is often the case that the first $q$ ($q\ll
p$) PCs retain interpretable patterns in the observed data and the rest
contain variation mainly due to noise [20].
More formally, let $y_{ij}$ denote a real-valued observation made of the $j$th
variable on the $i$th subject, where $i=1,\ldots,n$ and $j=1,\ldots,p$. Assume
that the $n$ observations are arranged in $n$ rows of a $n\times p$ matrix
${Y}$ with columns corresponding to $p$ variables or features. We standardize
columns of matrix $Y$ to have zero mean and unit standard deviation, and store
the resultant values in a matrix $X$, that is, the elements $x_{ij}$ of $X$
are obtained by $x_{ij}=(y_{ij}-\bar{y}_{j})/{s_{j}}$, where $\bar{y}_{j}$ and
$s_{j}$ are the mean and standard deviation of the $j$th column of matrix $Y$,
respectively. The PCA can be performed by singular value decomposition (SVD)
of $X$, that is, the $n\times p$ matrix is decomposed as
$X=U\Gamma V^{T},$ (1)
where $U$ is $n\times p$ matrix with orthonormal columns, $\Gamma$ is a
$p\times p$ diagonal matrix containing non-negative singular values and $V$ is
a $p\times p$ matrix with orthonormal columns. Denote the sample correlation
matrix of $X$ by $R$, which can be expressed as
$R=\frac{1}{n-1}X^{T}X=V\Lambda V^{T},$ (2)
where $\Lambda=1/(n-1)\Gamma^{2}$ is a $p\times p$ diagonal matrix containing
$p$ eigenvalues $\boldsymbol{\lambda}=(\lambda_{1},\ldots,\lambda_{p})^{T}$ on
the diagonal in decreasing order of magnitude. It follows that the $p$ columns
of matrix $V$ contain the eigenvectors of $R$ and hence are the desired axes
of variation. The derived set of $p$ transformed variables (the PCs) are
obtained by
$Z=XV.$
It is important to note that the matrix $U$ above contains standardized PCs in
columns and is a scaled version of $Z$, which is provided additionally in (1).
To see this, multiply (1) on the right by $V$ as follows
$XV=U\Gamma$
or
$Z=U\Gamma.$
In practice, the first $q$ major components are of greater interest since they
account for most of the variation in the data and the dimension of $Z$ is thus
reduced from $p$ to $q$, that is
$\tilde{Z}=X\tilde{V},$
where $\tilde{V}$ is a $p\times q$ matrix that contains the first $q$ columns
of $V$ and $\tilde{Z}$ contains the first $q$ PCs. A lower rank approximation
of $X$ can be obtained by
$\tilde{X}=\tilde{Z}\tilde{V}^{T},$ (3)
which is the best approximation of $X$ in the least-square-sense by a matrix
of rank $q$ [23].
If $X$ has a multivariate normal distribution, then the statistic
$t_{i}=\sum_{j=1}^{q}\frac{z_{ij}^{2}}{\lambda_{j}}=(n-1)\sum_{j=1}^{q}u_{ij}^{2},$
(4)
follows a chi-square distribution with $q$ degrees of freedom that is
$t_{i}\sim\chi^{2}_{q}$ distribution [12, 23], where $z_{ij}$ and $u_{ij}$ are
the elements of $Z$ and $U$. Determining a suitable value of $q$ is a model
selection problem and a poor model choice may result in an incomplete
representation of the data. A suitable choice is made through domain knowledge
or using data exploration together with some available heuristic options [24,
23].
### 2.1 Intrusion detection system based on PCA
As mentioned above, an unsupervised NIDS operates in two phases: the training
phase and the monitoring phase. In the training phase, the normal activities
patterns are learned through fitting a model to the recorded clean dataset
(referred to as training set of data). Precisely, assume that $p$ features are
measured for each of the $n$ normal activities connections. Let $y_{ij}$ be
the recorded observation of the $i$th normal activity connection made on the
$j$th feature contained in a $n\times p$ training data matrix ${Y}$. The
columns of the matrix $Y$ are standardized to have zero mean and unit standard
deviation, and the standardized training dataset is stored in a matrix $X$,
that is, the elements of $X$ are obtained by
$x_{ij}=(y_{ij}-\bar{y}_{j})/{s_{j}}$, where $\bar{y}_{j}$ and $s_{j}$ are the
mean and standard deviation of the $j$th column of matrix $Y$, respectively. A
PCA model given in (1) is fitted to the data in $X$.
In the monitoring phase, a newly observed set of network traffic connections
(referred to as test set of data) is checked with the normal activities model
learned in the training phase and an anomaly warning is triggered if any of
the new connections shows deviation from the trained model.
More formally, let $Y^{f}$ be an $m\times p$ matrix of newly observed set of
connections. To obtain $X^{f}$, we adjust each element $y^{f}_{ij}$ of the
matrix $Y^{f}$ by first subtracting the mean of the $j$th column of the normal
activities dataset $Y$ and then divide by the standard deviation of the $j$th
column of normal activities dataset $Y$ that is
$x^{f}_{ij}=(y^{f}_{ij}-\bar{y}_{j})/s_{j}$. [12] develop an intrusion
detection system based on the statistic $t_{i}$ in (4). They propose to
monitor two statistics: one based on principal components (first few
components that account for most of the variation in the data) and another
based on minor components (last few components). To obtain a threshold for
monitoring future data, they rely on the empirical distribution of $t_{i}$
(they have not mentioned any specific estimation method) since the assumption
of multivariate normality is often violated in network connections data. Since
different kinds of attacks might create shifts (anomalies) along different
eigenvectors, the disadvantage of this approach is that it might miss signals
along the eigenvectors that are disregarded. [14] proposed to monitor the
error induced by the approximate reconstruction of the actual connection using
the expression in (3) instead of monitoring two statistics; that is, they
monitor
$\varepsilon=||X^{f}-\tilde{X}^{f}||^{2},$
where $\tilde{X}^{f}=X^{f}\tilde{V}\tilde{V}^{T}$ and $\tilde{V}$ is based on
the normal activities dataset obtained in (1). We will refer to the method of
[12] as PCC and that of [14] as WBPCA for the rest of this paper. [14] have
shown numerically that WBPCA has a slightly better performance than PCC in
terms of detection rate and false discovery rate. The downside of WBPCA is
that it only takes into account the principal components and ignores the minor
components completely; therefore, their monitoring models are likely to be
less sensitive to the attacks that affect only the minor components and
anomalies that are rare events.
It is possible that a particular type of attack creates a shift along the
directions of fewer eigenvectors (possibly a mix of some principal and some
minor components) and there is negligible or no change along the other
dimensions. This is because each PC is a linear combination of the $p$
observed variables and it is common in practice that a particular PC has
larger coefficients for some of the $p$ observed variables while the
coefficients for the remainder of the observed variable are close to zero. Now
if an anomalous connection differs to the normal activity connections with
respect to only one feature (say F) and only one particular PC (say PCF) has a
large coefficient for F (the coefficient for the remainder of the observed
variables may or may not be large), the shift caused by this anomalous
connection will be expressed only along PCF. In this case, if $t_{i}$ is based
on only the PCF, the anomaly will be more likely to be detected, compared to
if $t_{i}$ is based on the rest of the components. Further, the first few PCs
that account for most of the variation in the data are noisier and the
possibility is that the perturbations caused by anomalies might be less
pronounced along these PCs, compared to the PCs that account for less
variation in the data. In order to make the system more sensitive to such
anomalies, it is important to take into account the most affected dimensions
rather than choosing some of the principal or minor components which (if not
affected) will add noise and may actually obscure the anomalies.
We propose a similar system to PCC that is based on PCA but unlike the above
mentioned approaches we take into account the dimensions that may be most
affected by anomalies or attacks. To proceed, re-write the expression in (1)
as
$XV\Gamma^{-1}=U.$ (5)
Since the columns of $U$ are orthonormal, we have
$(n-1)\textrm{cov}(XV\Gamma^{-1})=(n-1)\textrm{cov}(U)=I,$ (6)
where $I$ is an identity matrix. If $X$ and $X^{f}$ are generated by the same
model then the same relationship in (6) holds for $X^{f}$, that is,
$(n-1)\textrm{cov}(X^{f}V\Gamma^{-1})=(n-1)\textrm{cov}(U^{f})=I.$
On the other hand, if $X^{f}$ is generated by a different model then all or
some of the diagonal elements of $(n-1)\textrm{cov}(X^{f}V\Gamma^{-1})$ will
be larger than unity. It is possible that some of the diagonal elements of
$(n-1)\textrm{cov}(X^{f}V\Gamma^{-1})$ are less affected or not affected at
all. In this situation, it is more sensible to evaluate the standard
deviations of the columns of $\sqrt{n-1}U^{f}$, say $s_{j}^{u}$ (the diagonal
elements of $(n-1)\textrm{cov}(X^{f}V\Gamma^{-1})$), and consider those
dimensions for which the corresponding $s_{j}^{u}$’s deviate from unity.
In our monitoring system, we exploit the above fact and consider only those
components that are affected by the anomalies, thereby making the system more
sensitive to the deviations from the normal activities model. Let $r_{j}^{u}$
be the standard deviation of the $j$th column of $\sqrt{n-1}U$. To account for
sampling variation in each $s_{j}^{u}$, we use a threshold
$\delta_{j}^{(1-\alpha)}$ obtained as the $(1-\alpha)$th quantile of the
bootstrap distribution of $r_{j}^{u}$. The $j$th component is considered
affected if $s_{j}^{u}$ exceeds $\delta_{j}^{(1-\alpha)}$ and is thus
considered towards the final score $t_{i}^{f}$ of the newly observed data. To
identify the anomalous connection, we use another threshold
$\theta^{(1-\alpha)}$ obtained as the $(1-\alpha)$th quantile of
$\chi^{2}_{q}$, where $q$ is the number of $s_{j}^{u}$ that exceed
$\delta_{j}^{(1-\alpha)}$. Our system is then based on the anomaly affected
components.
We call this proposal AAD and formalize it in the following algorithm:
1. 1.
Obtain $X$ by standardizing the normal activities dataset $Y$ that is
$x_{ij}=(y_{ij}-\bar{y}_{j})/{s_{j}}$.
2. 2.
Estimate $V$ and $\Lambda$ based on $X$ using singular value decomposition.
3. 3.
Obtain $\delta_{j}^{(1-\alpha)}$ based on the bootstrap distribution of
$r_{j}^{u}$.
4. 4.
Obtain $U^{f}$ using the newly observed dataset that is
$U^{f}=X^{f}V\Gamma^{-1}$, where $x^{f}_{ij}=(y^{f}_{ij}-\bar{y}_{j})/s_{j}$.
5. 5.
Calculate $s_{j}^{u}$’s, the standard deviations of the columns of
$\sqrt{n-1}U^{f}$. In the absence of intrusion, we expect all $s_{j}^{u}$’s to
be unity. If $s_{j}^{u}>\delta_{j}^{(1-\alpha)}$ for any $j$, then declare the
possible presence of anomalous connections in $Y^{f}$.
6. 6.
To identify the anomalous connections, calculate $t_{i}^{f}$ using the
expression in (4) that is $t_{i}^{f}=(n-1)\sum_{j=1}^{q}(u_{ij}^{f})^{2}$,
where the sum is performed over the $q$ affected columns of $U^{f}$.
7. 7.
For the $i$th connection, if $t_{i}^{f}>\theta^{(1-\alpha)}$, where
$\theta^{(1-\alpha)}$ is the $(1-\alpha)$th quantile of $\chi^{2}_{q}$, then
declare it anomalous.
It is important to reiterate here that AAD relies on the assumption of
multivariate normality for its threshold $\theta_{\alpha}$. As noted above,
this assumption is often violated in network data and may render AAD
unreliable. One solution is to consider the bootstrap distribution of $t_{i}$
which requires upfront knowledge of the components whose $s_{j}^{u}$ exceeds
$\delta^{(1-\alpha)}$. In our use of AAD, we rely on the bootstrap
distribution of $\theta^{(1-\alpha)}$ unless otherwise stated. Making
available a computationally cumbersome bootstrap distribution of $t_{i}$ in
real time — after knowing the important components that need to be evaluated —
may impede the real time detection in large-scale networks. In such
situations, one could use the empirical distribution of $t_{i}$ as this is
computationally faster to evaluate.
Another possibility is to use
$t_{i}^{fw}=(n-1)\sum_{j=1}^{q}w_{j}u_{ij}^{2},$ (7)
where $w_{j}=s_{j}^{u}$. In the absence of any intrusion or anomaly, we have
$s_{j}^{u}=r_{j}^{u}=1$; therefore, both $t_{i}$ and $t_{i}^{f}$ follow the
same distribution. However, some of the $s_{j}^{u}$’s will be larger than
unity in the presence of unusual connections in $X^{f}$. Giving more
importance to the components that are affected by weighting them with
corresponding $s_{j}^{u}$’s will make the anomalies more pronounced and will
result in a shift in $t_{i}^{fw}$ relative to $t_{i}$ for all anomalous
connections in $X^{f}$. In the rest of this paper, we refer to a detection
system based on (7) as WAAD and describe it via the following algorithm:
1. 1.
Obtain $X$ by standardizing the normal activities dataset $Y$ that is
$x_{ij}=(y_{ij}-\bar{y}_{j})/{s_{j}}$.
2. 2.
Estimate $V$ and $\Lambda$ based on $X$ using singular value decomposition.
3. 3.
Obtain $U^{f}$ using the future activities dataset that is
$U^{f}=X^{f}V\Gamma^{-1}$, where $x^{f}_{ij}=(y^{f}_{ij}-\bar{y}_{j})/s_{j}$.
4. 4.
Calculate $s_{j}^{u}$’s, the standard deviations of the columns of
$\sqrt{n-1}U^{f}$. In the absence of intrusion, we expect all $s_{j}^{u}$’s to
be unity. If $s_{j}^{u}>\delta_{j}^{(1-\alpha)}$ for any $j$, then declare the
possible presence of anomalous connections in $Y^{f}$.
5. 5.
To identify the anomalous connections, calculate $t_{i}^{fw}$ using the
expression in (7) that is
$t_{i}^{fw}=(n-1)\sum_{j=1}^{p}w_{j}(u_{ij}^{f})^{2}$.
6. 6.
For the $i$th connection, if $t_{i}^{fw}>\theta^{(1-\alpha)}$, where
$\theta^{(1-\alpha)}$ is the $(1-\alpha)$th quantile of the bootstrap
distribution of $t_{i}^{w}=(n-1)\sum_{j=1}^{q}w_{j}(u_{ij})^{2}$, then declare
it anomalous.
Like AAD, WAAD requires the bootstrap distribution of $t_{i}^{w}$, which in
turn requires the upfront knowledge of the $s_{j}^{u}$. The WAAD also consider
the unaffected components (although with lower weights) in the calculation of
$t_{i}^{w}$ and $t_{i}^{fw}$, which makes it noisier; therefore, it may not be
as effective in identifying anomalies as the AAD.
## 3 Simulation study
The goal of this section is to numerically evaluate the performance of our
proposed methods for detecting anomalies. We also demonstrated the
effectiveness of the proposed methods in comparison to the WBPCA while
considering a number of factors that might be affecting the performance of the
methods. In the presence of true mean $\mu$ and covariance $\Sigma$, we
included a Mahalanobis distance approach [18] based on $\mu$ and $\Sigma$ as a
gold standard. The squared Mahalanobis distance between a sample $x_{i}^{f}$
and $\mu$ given a true covariance matrix $\Sigma$ is given by
$D_{i}^{2}=(x_{i}^{f}-\mu)\Sigma^{-1}(x_{i}^{f}-\mu)^{T}.$
In the absence of anomalous observations and under the assumption of normality
and independence of observations, the quantity $D^{2}$ follows an exact chi-
square distribution with $p$ degrees of freedom; that is,
$D_{i}^{2}\sim\chi^{2}_{(p)}$ [25]. In the rest of the paper we will refer to
this approach as TRUE.
We generated a clean dataset $Y$ of size $n$ from a $p$-dimensional
multivariate normal distribution with mean vector $\mu$ and a covariance
matrix $\Sigma$. For the clean dataset, without loss of generality, we set
$\mu=0$ and considered $\Sigma=\Sigma_{\rho}$ having a first-order
autoregressive correlation structure, AR(1); that is, the elements of
$\Sigma_{\rho}$ are given by
$\sigma_{ij}=\rho^{|i-j|}~{}~{}~{}~{}\textrm{for}~{}~{}1\leq i,j\leq p,$
where $\rho\in[0,1)$ is a parameter that determines $\Sigma$. A smaller value
of $\rho$ shifts variance towards minor components. For example, $\Sigma_{0}$
equals an identity matrix in which case the variance is uniformly distributed
over $p$ components. On the other hand, a larger value of $\rho$ shifts more
variance towards the principal components in which case the first few
eigenvalues will explain most of the variation.
To generate a set of anomalous observations, we followed the simulation setup
provided in [26], which allows a shift along a set of chosen eigenvectors. We
chose a smaller set of observations from $n$ normal observations and made them
anomalous by adding a constant of size $\eta=c\sqrt{\lambda_{j}}$, where
$c\in\\{1,2,3\\}$, along a few chosen eigenvectors from $V$. This set of
anomalous observations was then used to contaminate another set of $m$ normal
observations $Y^{f}$ randomly chosen from training dataset. For example, an
observation $y_{i}^{f}$ was anomalous if it was reconstructed after a shift is
created along some of the $v_{j}$’s (the columns of $V$) by adding a constant
$\eta$ to the corresponding $z_{ij}$ (the $ij$th element of $Z$).
We used the AAD and WAAD as detailed in Section 2.1 in comparison to WBPCA and
TRUE to detect and identify the $m$ anomalous observations. For WBPCA, we
calculated the eigenvalues of correlation matrix and retained components using
“eigenvalue greater than one rule”. We used the Receiver Operating
Characteristic (ROC) curve, a plot of the true positive rate against the false
positive rate, as a metric to evaluate the performance of the methods [8].
$\begin{array}[]{c}\includegraphics[scale={0.15},angle={270}]{Fig1a.pdf}\includegraphics[scale={0.15},angle={270}]{Fig1b.pdf}\\\
\includegraphics[scale={0.15},angle={270}]{Fig1c.pdf}\end{array}$
Figure 1: ROC curves. A sample of size $n=10,000$ is drawn from a
$30$-dimensional normal distribution with $\mu=0$ and $\Sigma_{0.9}$ to train
a PCA model. A set of 100 anomalous observations are created to contaminate
another set of $m=5000$ normal observations by adding a constant of size
$\eta=c\sqrt{\lambda_{j}}$: (a) $c=1$, (b) $c=2$ and (c) $c=3$, to shift them
along a random set of three distinct eigenvectors. The results are averaged
over 1000 independent experiments. In each experiment the set of three
eigenvectors along which the shifts are created is allowed to vary.
$\begin{array}[]{c}\includegraphics[scale={0.15},angle={270}]{Fig2a.pdf}\includegraphics[scale={0.15},angle={270}]{Fig2b.pdf}\\\
\includegraphics[scale={0.15},angle={270}]{Fig2c.pdf}\end{array}$
Figure 2: ROC curves. A sample of size $n=10,000$ is drawn from a
$30$-dimensional normal distribution with $\mu=0$ and $\Sigma_{0.9}$ to train
PCA model. A set of 100 anomalous observations are created to contaminate
another set of $m=5000$ normal observations by adding a constant of size
$\eta=c\sqrt{\lambda_{j}}$: (a) $c=1$, (b) $c=2$ and (c) $c=3$, to shift them
along the last three eigenvectors. The results are averaged over 1000
independent experiments.
$\begin{array}[]{c}\includegraphics[scale={0.15},angle={270}]{Fig3a.pdf}\includegraphics[scale={0.15},angle={270}]{Fig3b.pdf}\\\
\includegraphics[scale={0.15},angle={270}]{Fig3c.pdf}\end{array}$
Figure 3: ROC curves. A sample of size $n=10,000$ is drawn from a
$30$-dimensional normal distribution with $\mu=0$ and $\Sigma_{0.9}$ to train
PCA model.A set of 100 anomalous observations are created to contaminate
another set of $m=5000$ normal observations by adding a constant of size
$\eta=c\sqrt{\lambda_{j}}$: (a) $c=1$, (b) $c=2$ and (c) $c=3$, to shift them
along the first three eigenvectors. The results are averaged over 1000
independent experiments.
For the experiments, the results of which are shown here, we set $p=30$,
$\rho=0.9$, and created anomalous observations by choosing 100 normal
observations at random and shifted them along three chosen eigenvectors. We
then contaminated $m=4900+100=5000$ observations chosen randomly from
$n=10,000$ normal observations with the 100 anomalous observations. The
average ROC curves for 1000 independent experiments are presented in Figures
1, 2 and 3. The three eigenvectors along which the shifts were created were
randomly selected in each of the 1000 independent experiments (see results in
Figure 1), were fixed to the last three eigenvectors (see results in Figure 2)
and were fixed to the first three eigenvectors (see results in Figure 3).
Overall, the detection rate increased with increasing size of the shift and
the results clearly indicated the superior performance of AAD in terms of
achieving higher detection rate with much lower false alarm rate. Further, AAD
performed consistently well regardless of the dimension of the created shift.
Its performance was even better than the TRUE. The reason is that the
Mahalanobis distance also aggregates across all variables including irrelevant
variables, hence masking the outlying effect. Similar to AAD, the performance
of WAAD was also consistent across the three simulation scenarios; however, it
was still polluted by the aggregated noise in $t_{i}^{fw}$ due to the
unaffected dimensions.
The effectiveness of WBPCA varied depending on the chosen dimension along
which the shift was created. The WBPCA detection rate was lower if the shift
was along the principal components (see Figure 3). However, its performance
improved when the shift was created along the minor components (see Figure 2).
This is because most of the error variation lies along the dominant
eigenvectors when $\rho$ is close to one which makes it difficult to detect
anomalous observations.
## 4 Real data analysis
In this section, we demonstrate the performance of our proposed methods and
those from the literature through the analysis of two real network datasets,
namely the UNSW-NB15 dataset and KDD’99 dataset.
### 4.1 UNSW-NB15 dataset
A real UNSW-NB15 dataset was recently released by the Australian Centre for
Cyber Security. The dataset is described in [27] and analyzed (using a variety
of methods) in [28] and [29]. It is publicly available for research
purposes555https://www.unsw.adfa.edu.au/unsw-canberra-
cyber/cybersecurity/ADFA-NB15-Datasets/. This dataset has 49 features and a
total of 2,540,044 connection records including a variety of attacks. The 49
features also include 12 features that are derived from the rest of 35
directly measured features and the two attributes that represent class labels.
We do not use the 12 derived features and also exclude seven nominal features
(Source IP address, Destination IP address, Source port number, Destination
port number, transaction protocol, service and state). All the records are
labelled as normal records or attacks using the IXIA PerfectStorm
tool666https://www.ixiacom.com/products/perfectstorm that contains the
signatures of naive attacks and is continuously updated from a CVE
site777https://cve.mitre.org/. The attacks are further categorized into their
types: Fuzzers, Analysis, Backdoors, DoS, Exploits, Generic, Reconnaissance,
Shellcode, Worms [see 27, for the description of each type of attack]. Some of
the above mentioned nominal variables could be included in the analysis in the
form of binary indicator variables since they have a small number of
categories in the available data (transaction protocol has 135 categories,
service has 16 categories and state 13 categories). However, the number of
categories may vary in practical applications.
As mentioned earlier, the key requirement of an unsupervised NIDS is the
availability of a normal activities dataset. In the UNSW-NB15 dataset, the
abnormal traffic is introduced synthetically at particular time points, so we
have a large portion of the data that is not affected by the abnormal traffic
(i.e. observations 186,789 to 1,087,248, which we will refer to as clean
data). We used the observations from 300,001 to 900,000 of the clean data to
train the PCA model and to estimate $\delta_{j}^{(1-\alpha)}$. The data
observed before 300,001 and after 900,000 are used as a test set of data.
We used 5,000 bootstrap samples of size 10,000 to construct the distributions
of $r_{j}^{u}$’s (see Figure 4). The bootstrap distributions of $r_{j}^{u}$’s
were expected to be centered at one. At this point it is important to notice
that the network connections data are usually skewed which may make the
bootstrap distributions of $r_{j}^{u}$’s slightly off from the expected center
of one. However, misplacement of the entire distribution of $r_{j}^{u}$ is an
indication of the presence of outliers in the data. The presence of large
outliers in the training data has the potential to make a NIDS less sensitive.
We noticed peculiarities in the distributions of some of the $r_{j}^{u}$’s,
particularly the distributions of $r_{8}^{u}$, $r_{9}^{u}$ and $r_{20}^{u}$
were far-off from the expected center. This indicated the presence of some
unusually large observations of the variables in the training data that were
loading heavily on PC-8, PC-9 and PC-20. The PC-8 had loadings of 0.91 and
0.19, respectively, for ‘source bits per second’ and ‘destination bits per
second’, PC-9 had loadings of 0.21 and 0.97, respectively for ‘source bits per
second’ and ‘record total duration’ (loading for all other variable were less
than 0.1) and the PC-20 had a large loading of -0.70 and 0.71, respectively,
for ‘source jitter’ and ‘destination jitter’. By further inspection we found
six unusually large values of the ‘record total duration’, 39 unusually large
values of the ‘source bits per second’, 3 unusually large values of the
‘destination bits per second’, and 31 unusually large values of the ‘source
jitter’. Most of the 31 connections that had unusually large values for the
‘source jitter’ had also unusual values for the ‘destination jitter’. The
removal of these 79 unusual observations considerably alleviated the
peculiarities in the distributions of $r_{j}^{u}$ (see Figure 5).
(a)
Figure 4: Plot of the values of $r_{j}^{u}$’s obtained using 5000 bootstrap
samples of size 10000 from the training set of the UNSW-NB15 dataset. The
horizontal gray line indicates the expected value of $r_{j}^{u}$ in the
absence of anomalous activities. (a)
Figure 5: Plot of the values of $r_{j}^{u}$’s obtained using 5000 bootstrap
samples of size 10000 from the training set of the UNSW-NB15 dataset after
removal of 79 unusual connections. The horizontal gray line indicates the
expected value of $r_{j}^{u}$ in the absence of anomalous activities. (a)
Figure 6: Plot of $s_{j}^{u}$’s for UNSW-NB15 dataset. The whole UNSW-NB15
dataset was examined at once.
$\begin{array}[]{c}\includegraphics[scale={0.250}]{Fig4.png}\includegraphics[scale={0.250}]{Fig5.png}\\\
\includegraphics[scale={0.250}]{Fig6.png}\includegraphics[scale={0.250}]{Fig7.png}\end{array}$
Figure 7: Plots of the score statistic $t_{i}^{f}$ for the UNSW-NB15 dataset:
(a) AAD, (b) AAD based on the four most affected dimensions (see Figure 6),
(c) WAAD and (d) WBPCA. The horizontal green line indicates the threshold
value $\theta_{\alpha=0.0001}$. The training dataset is shaded in light-blue.
(a) Figure 8: ROC curves for all categories of attacks in UNSW-NB15 dataset.
$\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotncUNSWall.png}\includegraphics[scale={0.250}]{barplotwhichcUNSWall.png}\\\
\includegraphics[scale={0.250}]{rocUNSWall.png}\end{array}$
Figure 9: Plots of the UNSW-NB15 dataset. A random sample of size 9900 from
training dataset is contaminated with 100 attack connections randomly chosen
from all categories of attacks. In (a) is the distribution of the number of
components found relevant, in (b) are the components found effected and in (c)
are the average ROC curves. The experiment is repeated 1000 times.
$\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotncUNSWDoS.png}\includegraphics[scale={0.250}]{barplotwhichcUNSWDoS.png}\\\
\includegraphics[scale={0.250}]{rocUNSWDoS.png}\end{array}$
Figure 10: Plots of the UNSW-NB15 dataset. A random sample of size 9900 from
training dataset is contaminated with 100 attack connections randomly chosen
from ‘DoS’ attacks. In (a) is the distribution of the number of components
found relevant, in (b) are the components found effected and in (c) are the
average ROC curves. The experiment is repeated 1000 times.
$\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotncUNSWFuzzers.png}\includegraphics[scale={0.250}]{barplotwhichcUNSWFuzzers.png}\\\
\includegraphics[scale={0.250}]{rocUNSWFuzzers.png}\end{array}$
Figure 11: Plots of the UNSW-NB15 dataset. A random sample of size 9900 from
training dataset is contaminated with 100 attack connections randomly chosen
from ‘Fuzzers’ attacks. In (a) is the distribution of the number of components
found relevant, in (b) are the components found effected and in (c) are the
average ROC curves. The experiment is repeated 1000 times.
$\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotncUNSWGeneric.png}\includegraphics[scale={0.250}]{barplotwhichcUNSWGeneric.png}\\\
\includegraphics[scale={0.250}]{rocUNSWGeneric.png}\end{array}$
Figure 12: Plots of the UNSW-NB15 dataset. A random sample of size 9900 from
training dataset is contaminated with 100 attack connections randomly chosen
from ‘Generic’ attacks. In (a) is the distribution of the number of components
found relevant, in (b) are the components found effected and in (c) are the
average ROC curves. The experiment is repeated 1000 times.
We used the AAD, WAAD and WBPCA as detailed in Section 2.1 to try to detect
and identify the attack connections. For the WBPCA, we calculated the
eigenvalues using the correlation scale and retained components using the
Kaiser’s rule also referred to as “eigenvalue greater than one rule” [30]. We
projected the entire test data onto the eigenspace obtained using the training
data and found that some of the $s_{j}^{u}$’s are strongly affected (for
example, see the largest four $s_{j}^{u}$’s with indices 6, 11, 21, 26 in
Figure 6). The plots for the score statistic $t_{i}^{f}$ based on the methods
AAD, WAAD and WBPCA are portrayed in Figure 7. To see the patterns in the test
set of data in comparison to the training set of data, we also plot our
training data together with the test set of data, where the training set of
the data is shaded in light-blue in each plot of the figure. Overall, the
methods are able to detect and identify attacks equally well (AAD, WAAD and
WBPCA detect and identify, respectively, 99.836%, 99.876% and 99.830% of the
anomalous connections). Figure 7 reveals that the normal activities
observations of the test data observed during the attack periods also exhibit
some peculiar patterns that indicate anomalous connections (in that the
corresponding $t_{i}^{f}$ exceeds the threshold $\theta^{(1-.0001)}$). The
normal activities data observed during attack periods also show some anomalous
block-like patterns that cannot be seen in the period when clean data were
observed. The false alarm rate is high for all methods due to these anomalous
patterns of normal activities data happening during the attack periods (see
Figure 7 and Figure 8). Although no concrete conclusion could be drawn, it
could be that the normal activities are disturbed by the attacks or that some
anomalous connections are mislabeled as normal. We also calculated the score
statistic $t_{i}^{f}$ based on the four most affected dimensions (see the
largest $s_{j}^{u}$’s with indices 6, 11, 21, and 26 in Figure 6) and plot the
results in Figure 7(b). Considering only these four components in the final
score $t_{i}^{f}$ was almost as good in terms of detection and identification
of anomalous connections and other anomalous patterns, since it further pushed
the block like anomalous structures across the threshold of normal activities
data.
Often the attacks do not happen all at once, in which case it may be more
natural to try to detect and identify a smaller number of anomalous
connections in a large batch of normal connections. We therefore contaminated
a large sample of size 9900 randomly drawn from the training data with 100
connections randomly drawn from the set of anomalous connections
($m=9900+100$) and used all three methods (AAD, WAAD and WBPCA) to detect and
identify the 100 attack connections. We repeated the experiment 1000 times and
show the results in Figure 9. The results indicated that 22 components out of
26 were affected by the anomalies (see Figure 9 (a)) and they were not
necessarily only among the first few components (see Figure 9 (b)). Taking
only the affected components into account made the NIDS slightly more
effective both in terms of detection rate and false positive rate (see Figure
9 (c)). We also repeated the experiments separately for each type of attack
and show the results for ‘DoS’, ‘Fuzzers’ and ‘Generic’ attacks ,
respectively, in Figures 10, 11 and 12. The performance of the proposed
methods was found to be superior in detecting individual types of attacks.
Note that that most of the attacks affected the same components both in
combination and separately, which may be due to similar patterns across
different types of attacks as exhibited in Figure 7.
### 4.2 KDD’99 dataset
The KDD’99 dataset888http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
is perhaps the most well-known and wildly used reference network dataset for
the evaluation of NIDS [31]. It was released by MIT Lincoln Lab for a 1998
DARPA evaluation program that was aimed to survey and evaluate research in
intrusion detection.
The training dataset consists of 4,898,431 connections, which was prepared
from 4 gigabytes of compressed raw tcpdump data of 7 weeks of network traffic
by [32]. It contains 972,781 normal connections and 3,925,650 anomalous
connections. The anomalous connections are due to 23 types of attacks listed
in Table I and each of which falls into one of 4 categories: denial-of-
service, unauthorized access from a remote machine, unauthorized access to
local superuser privileges by a local unprivileged user, and surveillance and
probing [17]. Some of these 23 types of attacks are rare; for example, ‘spy’
happens two times and ‘perl’ happens three times in the whole dataset. Others
happen frequently in the dataset; for example, there are 2,807,886 ‘smurf’
connections.
!tb Attack type Frequency back 2203 buffer_overflow 30 ftp_write 8
guess_passwd 53 imap. 12 ipsweep 12481 land. 21 loadmodule 9 multihop 7
neptune 1072017 nmap 2316 normal 972781 perl 3 phf 4 pod 264 portsweep 10413
rootkit 10 satan 15892 smurf 2807886 spy 2 teardrop 979 warezclient 1020
warezmaster 20
TABLE I: Attack types in KDD’99 dataset.
Similarly, around two million connection records were obtained separately from
the two weeks of test data. However, following [14], we used only the training
set and drop the original test data completely.
The dataset has 41 features excluding the one that represents class labels
[17]. Among these 41 features, 34 are numeric and 7 are nominal. We include
only 23 numeric features in our experiments and exclude all nominal features
and 11 numeric features (‘wrong_fragment’, ‘urgent’, ‘hot’,
‘num_failed_logins’, ‘num_compromised’, ‘root_shell’, ‘su_attempted’,
‘num_root’ and ‘num_file_creations’) since these feature have a small number
of non-zero values in the training set of data (the values for
‘wrong_fragment’ and ‘num_outbound_cmds’ are zero for all connections).
We used $n=972,781$ normal connections data for training the PCA model. As in
the previous application, we constructed the distributions of $r_{j}^{u}$’s
based on 5,000 bootstrap samples of size 10,000 (see Figure 13). The
distributions of some of the $r_{j}^{u}$’s were centered away from one (see
the box-plots for $r_{6}^{u}$, $r_{7}^{u}$ and $r_{11}^{u}$), indicating the
possible presence of some unusual observations of the variables that have
large coefficients for PC-6, PC-7 and PC-11. The PC-6, PC-7 and PC-11 all had
large coefficients for ‘src_bytes’ and ‘dst_bytes’ (PC-6 had loadings of -0.51
and -0.58, PC-7 had loadings of -0.46 and -0.39, and PC-11 had loadings of
-0.70 and 0.70, respectively for ‘src_bytes’ and ‘dst_bytes’. Further
inspection revealed eight unusually large values of the ‘src_bytes’ and eight
unusually large values of the ‘dst_bytes’. The removal of these 16 unusual
observations re-centered the distributions of $r_{6}^{u}$, $r_{7}^{u}$ and
$r_{11}^{u}$ closer to one (see Figure 14).
(a)
Figure 13: Plot of the values of $r_{j}^{u}$’s obtained using 5000 bootstrap
samples of size 10000 from the training set of the KDD’99 dataset. The
horizontal gray line indicates the expected value of $r_{j}^{u}$ in the
absence of anomalous activities. (a)
Figure 14: Plot of the values of $r_{j}^{u}$’s obtained using 5000 bootstrap
samples of size 10000 from the training set of the KDD’99 dataset after
removal of eight unusual observations. The horizontal gray line indicates the
expected value of $r_{j}^{u}$ in the absence of anomalous activities.
$\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotms.png}\includegraphics[scale={0.250}]{barplotall.png}\\\
\includegraphics[scale={0.250}]{kdd99roc.png}\end{array}$
Figure 15: Plots of the KDD’99 dataset. A random sample of size 9900 from
normal activities dataset is contaminated with 100 attack connections randomly
chosen from all categories of attacks. In (a) is the distribution of the
number of components found relevant, in (b) are the components found effected
and in (c) are the average ROC curves. The experiment is repeated 1000 times.
$\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotmssmurf.png}\includegraphics[scale={0.250}]{barplotsmurf.png}\\\
\includegraphics[scale={0.250}]{kdd99rocsmurf.png}\end{array}$
Figure 16: Plots of the KDD’99 dataset. A random sample of size 9900 from
normal activities dataset is contaminated with 100 attack connections randomly
chosen from ‘smurf’ attacks. In (a) is the distribution of the number of
components found relevant, in (b) are the components found effected and in (c)
are the average ROC curves. The experiment is repeated 1000 times.
$\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotmsneptune.png}\includegraphics[scale={0.250}]{barplotneptune.png}\\\
\includegraphics[scale={0.250}]{kdd99rocneptune.png}\end{array}$
Figure 17: Plots of the KDD’99 dataset. A random sample of size 9900 from
normal activities dataset is contaminated with 100 attack connections randomly
chosen from ‘neptune’ attacks. In (a) is the distribution of the number of
components found relevant, in (b) are the components found effected and in (c)
are the average ROC curves. The experiment is repeated 1000 times.
$\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotmssatan.png}\includegraphics[scale={0.250}]{barplotsatan.png}\\\
\includegraphics[scale={0.250}]{kdd99rocsatan.png}\end{array}$
Figure 18: Plots of the KDD’99 dataset. A random sample of size 9900 from
normal activities dataset is contaminated with 100 attack connections randomly
chosen from ‘satan’ attacks. In (a) is the distribution of the number of
components found relevant, in (b) are the components found effected and in (c)
are the average ROC curves. The experiment is repeated 1000 times.
$\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotmsrare.png}\includegraphics[scale={0.250}]{barplotrare.png}\\\
\includegraphics[scale={0.250}]{kdd99rocrare.png}\end{array}$
Figure 19: Plots of the KDD’99 dataset. A random sample of size 9900 from
normal activities dataset is contaminated with 100 attack connections randomly
chosen from all less frequent attacks. In (a) is the distribution of the
number of components found relevant, in (b) are the components found effected
and in (c) are the average ROC curves. The experiment is repeated 1000 times.
For the test data, we contaminated a large sample of size 9900 randomly drawn
from normal activities data with 100 anomalous connections randomly drawn from
the set of anomalous connections ($m=9900+100$) and used the AAD, WAAD and
WBPCA to detect and identify the 100 attack connections. We repeated the
experiment 1000 times and show the results in Figure 15. The results indicated
that there were indeed a few components out of 32 that were affected by the
anomalies and they were not necessarily only among the first few components
(see Figure 15 (a) and (b)). Taking only the affected components into account
made the NIDS much more effective both in terms of detection rate and false
positive rate (see Figure 15 (c)). We also repeated the experiments separately
for the three most frequent attacks, namely ‘smurf’, ‘neptune’ and ‘satan’,
and show the results, respectively, in Figures 16, 17 and 18. The performance
of the proposed methods was found to be superior in detecting individual type
of attacks.
As mentioned earlier, some of the attacks were rare and the probability for
them to be included in a random sample of sized 100 was negligible. Therefore,
we repeated the experiment with all attacks which occurred less than 1,000
times. The results are presented in Figure 19. The number of affected
components was less stable due to the mixture of varieties of rare attacks
each of which altered a varying number of components (see Figure 19 (a) and
(b)) compared to the case when individual type of attacks were confronted. The
detection rate was low and comparable for all methods. This indicates that the
proposed methods AAD and WAAD perform similarly to WBPCA when varieties of
attacks are introduced at the same time and improve the detection rate when
normal connections are contaminated with a single type of attack at a time.
## 5 Discussion and conclusion
The use of PCA for network anomaly detection has been criticized due to its
limited effectiveness in detecting and identifying anomalous activities [8].
One reason for this is that the anomaly scores are calculated by aggregation
across the major principal components (the first few components that explain
most of the variation in the data), which often includes components that are
relatively unaffected by the anomalies, or the alterations caused by anomalies
along these components are less pronounced because of greater variation along
these components. Moreover, the existing methods exclude some of the minor
components from the aggregation that could be more strongly affected, or the
alterations caused by anomalies along these components are more pronounced
because of lower variation along these components. In this paper, we highlight
this shortcoming of previous studies and propose to calculate scores by
aggregating across only those components that are affected by the anomalies or
give more weight to the components that are more affected.
To support our findings, we have conducted a simulation study which showed
that the identification rate could be considerably increased if the scores
were aggregated only across affected components while leaving out the
unaffected components. Anomaly identification was higher when the most
affected components were weighted more highly. Through the analysis of real
datasets we showed that the attacks created shifts only along the direction of
a few components (a mix of principal and minor components) and that most of
the components are relatively unaffected, so when excluded from the
calculation of anomaly scores, the detection rate improves.
Although, our simulation study is limited to the multivariate normal
distribution, the applications to real data indicated that that the proposed
methods can perform well even if the data is non-normal. However, further
simulations—simulations from heavy-tailed and skewed distributions—would
strengthen this assertion.
## References
* [1] M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network anomaly detection: methods, systems and tools,” _IEEE communications surveys & tutorials_, vol. 16, no. 1, pp. 303–336, 2014.
* [2] A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” _IEEE Communications Surveys & Tutorials_, vol. 18, no. 2, pp. 1153–1176, 2016.
* [3] D. Sahoo, C. Liu, and S. C. Hoi, “Malicious url detection using machine learning: A survey,” _arXiv preprint arXiv:1701.07179_ , 2017.
* [4] M.-L. Shyu, K. Sarinnapakorn, I. Kuruppu-Appuhamilage, S.-C. Chen, L. Chang, and T. Goldring, “Handling nominal features in anomaly intrusion detection problems,” in _15th International Workshop on Research Issues in Data Engineering: Stream Data Mining and Applications. RIDE-SDMA 2005._ IEEE, 2005, pp. 55–62.
* [5] P. Garcia-Teodoro, J. Diaz-Verdejo, G. Maciá-Fernández, and E. Vázquez, “Anomaly-based network intrusion detection: Techniques, systems and challenges,” _computers & security_, vol. 28, no. 1-2, pp. 18–28, 2009.
* [6] H. Om and T. Hazra, “Statistical techniques in anomaly intrusion detection system,” _International Journal of Advances in Engineering & Technology_, vol. 5, no. 1, pp. 387–398, 2012.
* [7] P. Prakash, M. Kumar, R. R. Kompella, and M. Gupta, “Phishnet: predictive blacklisting to detect phishing attacks,” in _INFOCOM 2010: Proceedings of the IEEE Conference on Computer Communications_. Citeseer, 2010, pp. 1–5.
* [8] H. Ringberg, A. Soule, J. Rexford, and C. Diot, “Sensitivity of pca for traffic anomaly detection,” _ACM Sigmetrics Performance Evaluation Review_ , vol. 35, no. 1, pp. 109–120, 2007.
* [9] R. Perdisci, G. Gu, and W. Lee, “Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems,” in _Sixth International Conference on Data Mining, 2006 (ICDM 2006)._ IEEE, 2006, pp. 488–498.
* [10] Z. Muda, W. Yassin, M. Sulaiman, and N. Udzir, “Intrusion detection based on k-means clustering and naïve bayes classification,” in _7th International Conference on Information Technology in Asia CITA 2011_. IEEE, 2011, pp. 1–6.
* [11] S.-J. Horng, M.-Y. Su, Y.-H. Chen, T.-W. Kao, R.-J. Chen, J.-L. Lai, and C. D. Perkasa, “A novel intrusion detection system based on hierarchical clustering and support vector machines,” _Expert systems with Applications_ , vol. 38, no. 1, pp. 306–313, 2011.
* [12] M.-L. Shyu, S.-C. Chen, K. Sarinnapakorn, and L. Chang, “A novel anomaly detection scheme based on principal component classifier,” Miami University Department of Electrical and Computer Engineering, Tech. Rep., 2003.
* [13] A. Lakhina, M. Crovella, and C. Diot, “Characterization of network-wide anomalies in traffic flows,” in _Proceedings of the 4th ACM SIGCOMM conference on Internet measurement_. ACM, 2004, pp. 201–206.
* [14] W. Wang and R. Battiti, “Identifying intrusions in computer networks with principal component analysis,” in _The First International Conference on Availability, Reliability and Security (ARES 2006)_. IEEE, 2006, pp. 270–279.
* [15] C. Callegari, L. Gazzarrini, S. Giordano, M. Pagano, and T. Pepe, “A novel PCA-based network anomaly detection,” in _IEEE International Conference on Communications (ICC)_. IEEE, 2011, pp. 1–5.
* [16] R. Kwitt and U. Hofmann, “Unsupervised anomaly detection in network traffic by means of robust PCA,” in _International Multi-Conference on Computing in the Global Information Technology, 2007 (ICCGI 2007)._ IEEE, 2007, pp. 37–41.
* [17] W. Lee and S. J. Stolfo, “A framework for constructing features and models for intrusion detection systems,” _ACM transactions on Information and system security TiSSEC_ , vol. 3, no. 4, pp. 227–261, 2000.
* [18] M. Koeman, J. Engel, J. Jansen, and L. Buydens, “Critical comparison of methods for fault diagnosis in metabolomics data,” _Scientific reports_ , vol. 9, no. 1, p. 1123, 2019.
* [19] H. Zou, T. Hastie, and R. Tibshirani, “Sparse principal component analysis,” _Journal of computational and graphical statistics_ , vol. 15, no. 2, pp. 265–286, 2006.
* [20] I. Jolliffe, _Principal component analysis_ , 3rd ed. Springer Series in Statistics. New York: Springer Verlag, 2002\.
* [21] O. Alter, P. O. Brown, and D. Botstein, “Singular value decomposition for genome-wide expression data processing and modeling,” _Proceedings of the National Academy of Sciences_ , vol. 97, no. 18, pp. 10 101–10 106, 2000\.
* [22] E. J. McTavish, J. E. Decker, R. D. Schnabel, J. F. Taylor, and D. M. Hillis, “New world cattle show ancestry from multiple independent domestication events,” _Proceedings of the National Academy of Sciences_ , vol. 110, no. 15, pp. E1398–E1406, 2013.
* [23] G. Saporta and N. Niang, “Principal component analysis: application to statistical process control,” _Data analysis_ , pp. 1–23, 2009.
* [24] S. Valle, W. Li, and S. J. Qin, “Selection of the number of principal components: the variance of the reconstruction error criterion with a comparison to other methods,” _Industrial & Engineering Chemistry Research_, vol. 38, no. 11, pp. 4389–4401, 1999.
* [25] R. A. Johnson, D. W. Wichern _et al._ , _Applied multivariate statistical analysis_. Prentice hall Upper Saddle River, NJ, 2002, vol. 5, no. 8.
* [26] D. I. Warton, “Penalized normal likelihood and ridge regularization of correlation and covariance matrices,” _Journal of the American Statistical Association_ , vol. 103, no. 481, pp. 340–349, 2008.
* [27] N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set),” in _Military Communications and Information Systems Conference MilCIS, 2015_. IEEE, 2015, pp. 1–6.
* [28] ——, “The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set,” _Information Security Journal: A Global Perspective_ , vol. 25, no. 1-3, pp. 18–31, 2016.
* [29] N. Moustafa, J. Slay, and G. Creech, “Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks,” _IEEE Transactions on Big Data_ , 2017.
* [30] H. F. Kaiser, “The application of electronic computers to factor analysis,” _Educational and psychological measurement_ , vol. 20, no. 1, pp. 141–151, 1960.
* [31] M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in _IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA 2009)._ IEEE, 2009, pp. 1–6.
* [32] S. J. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, “Cost-based modeling for fraud and intrusion detection: Results from the jam project,” in _Proceedings of the DARPA Information Survivability Conference & Exposition_, 2000, pp. 130–144.
| arxiv-papers | 2021-07-27T04:38:46 | 2024-09-04T03:07:20.520532 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Insha Ullah, Kerrie Mengersen, Rob J Hyndman and James McGree",
"submitter": "Insha Ullah Dr",
"url": "https://arxiv.org/abs/2107.12592"
} |
2107.12593 | # PoBO: A Polynomial Bounding Method for Chance-Constrained Yield-Aware
Optimization of Photonic ICs
Zichang He and Zheng Zhang, Member, IEEE This work was partly supported by NSF
grants #1763699 and #1846476. Zichang He and Zheng Zhang are with Department
of Electrical and Computer Engineering, University of California, Santa
Barbara, CA 93106, USA (e-mails: [email protected]; [email protected]).
###### Abstract
Conventional yield optimization algorithms try to maximize the success rate of
a circuit under process variations. These methods often obtain a high yield
but reach a design performance that is far from the optimal value. This paper
investigates an alternative yield-aware optimization for photonic ICs: we will
optimize the circuit design performance while ensuring a high yield
requirement. This problem was recently formulated as a chance-constrained
optimization, and the chance constraint was converted to a stronger constraint
with statistical moments. Such a conversion reduces the feasible set and
sometimes leads to an over-conservative design. To address this fundamental
challenge, this paper proposes a carefully designed polynomial function,
called optimal polynomial kinship function, to bound the chance constraint
more accurately. We modify existing kinship functions via relaxing the
independence and convexity requirements, which fits our more general
uncertainty modeling and tightens the bounding functions. The proposed method
enables a global optimum search for the design variables via polynomial
optimization. We validate this method with a synthetic function and two
photonic IC design benchmarks, showing that our method can obtain better
design performance while meeting a pre-specified yield requirement. Many other
advanced problems of yield-aware optimization and more general safety-critical
design/control can be solved based on this work in the future.
###### Index Terms:
Photonic design automation; yield-aware optimization; chance constrained
programming; uncertainty quantification; process variation.
## I Introduction
The increasing process variations have resulted in significant performance
degradation and yield loss in semiconductor chip design and fabrications [1,
2]. Compared with electronic ICs, photonic ICs are more sensitive to process
variations (e.g., geometric uncertainties) due to their large device
dimensions compared with the small wavelength. Therefore, yield modeling and
optimization for photonic ICs is highly desired [3, 4].
The yield optimization and yield-aware robust design have been investigated in
the electronic design automation community for a long time and have been paid
increasing attention in the photonic design automation [5, 6, 7, 8]. Typical
yield-aware design techniques include geometric approaches [9], geostatistics-
motivated performance modeling [10], yield-aware Pareto surface [11], yield-
driven iterative robust design [12], computational intelligence assisted
approaches [13], corner-based method [14], Bayesian yield optimization [15]
and so forth. Yield estimation is the key component in a yield
optimizer.Advanced yield estimators can be generally classified as Monte-
Carlo-based [16, 17] and non-Monte-Carlo-based [18, 19, 20] methods. Among the
non-Monte-Carlo ones, surrogate modeling aims to approximate some circuit
behaviors under variations to speed up the sampling and simulation process
[21, 22, 23]. Typical surrogate models include posynomial models [24], linear
quadratic models [25], support vector machine [26, 27], Gaussian process [28,
29], sparse polynomial [30], generalized polynomial chaos expansions [31, 32],
and some variants [33]. Focusing on generalized polynomial chaos expansion,
advanced techniques have also been developed to handle high-dimensional [34,
35, 36, 37, 38], mixed-integer [39] or non-Gaussian correlated [40] process
variations. The polynomial chaos expansion based modeling and optimization has
been widely used in both electronics [41, 42, 43] and photonic IC design [44,
45, 46, 47].
While most existing yield optimization approaches try to maximize the yield of
a circuit, the obtained design performance (e.g., signal gain, power
dissipation) may be far from the achievable optimal solution. Recently, an
alternative approach was proposed in [48] to achieve both excellent yield and
design performance. Instead of simply maximizing the yield, the work [48]
optimizes a design performance metric while enforcing a high yield
requirement. Specifically, the yield requirement is formulated as some chance
constraints [49], which are further transformed to tractable constraints of
the first and second statistical moments. The chance constrained modeling
itself has been widely used in many engineering fields [50, 51, 52]. The
moment bounding method offers a provably sufficient condition of the chance
constraint. However, the bounding gap may be too large in many applications
[53]. The resulting overly-reduced feasible region may lead to an over-
conservative design.
Paper contributions. This paper proposes a novel Polynomial Bounding method
for chance-constrained yield-aware Optimization (PoBO) under truncated non-
Gaussian correlated variations. Leveraging the recent uncertainty
quantification techniques [40, 48], PoBO employs and modifies the idea of
kinship functions [54] to approximate the original chance constraints with a
better polynomial bounding method. PoBO provides a less conservative design
than moment-based bounding methods [48] while ensuring a pre-specified yield
requirement. The specific contributions of this paper include:
* •
A better bounding method of the chance constraints via optimal polynomial
kinship functions. Compared with existing work in the control community [54],
we avoid the assumption of the independence among random variables and the
convexity of kinship functions. The relaxation allows more general non-
Gaussian correlated uncertainty modeling and tightens the bounding functions.
Within a family of polynomial functions, the optimal polynomial kinship
functions can be efficiently solved via semidefinite programming. Our bounding
method preserves the polynomial formulation of the provided surrogate models.
It enables the advanced polynomial optimization solvers, which provide a
sequence of convex relaxations via semidefinite optimization and searches for
the global design.
* •
Numerical implementation of the PoBO framework. Based on available uncertainty
quantification solvers, we implement PoBO efficiently based on some pre-
calculated optimal polynomial kinship functions and quadrature samples and
weights without requiring any additional circuit simulations.
* •
Validations on a synthetic function and two photonic IC design examples. Our
method offers better design performance while meeting the pre-specified yield
requirements. This method requires a small number of circuit simulations due
to its compatibility with recent data-efficient uncertainty quantification
methods [36, 40].
While this work focuses on the fundamental theory, algorithms and their
validation on small-size photonic circuits, the proposed method can be
combined with sparse or low-rank surrogate modeling methods [34, 36] to handle
large-scale design cases with much more design variables and process
variations.
## II Background
This section reviews chance-constrained yield-aware optimization and its
implementation via moment bounding [48].
### II-A Chance-Constrained Yield-Aware Optimization
We denote the design variables by
$\mathbf{x}=[x_{1},x_{2},\ldots,x_{d_{1}}]^{T}\in\mathbf{X}$, and the process
variations by random parameters
$\boldsymbol{{\xi}}=[\xi_{1},\xi_{2},\ldots,\xi_{d_{2}}]^{T}\in\mathbf{\Xi}$.
Let $\\{y_{i}(\mathbf{x},\boldsymbol{{\xi}})\\}_{i=1}^{n}$ denote $n$
performance metrics that are considered in yield estimation,
$\\{u_{i}\\}_{i=1}^{n}$ denote their corresponding upper bounds specifying the
design requirements. An indicator function is defined as
$I(\mathbf{x},\boldsymbol{{\xi}})=\begin{cases}1,&y_{i}(\mathbf{x},\boldsymbol{{\xi}})\leq
u_{i},\forall i=[n];\\\ 0,&\text{otherwise}.\end{cases}$ (1)
Here $[n]=\\{1,2,\cdots,n\\}$. The yield at a certain design choice
$\mathbf{x}$ is defined as
$Y(\mathbf{x})=\mathbb{P}_{\boldsymbol{{\xi}}}(\mathbf{y}(\mathbf{x},\boldsymbol{{\xi}})\leq\mathbf{u})=\mathbb{E}_{\boldsymbol{{\xi}}}[I(\mathbf{x},\boldsymbol{{\xi}})].$
(2)
In conventional yield optimization, one often tries to achieve the best
possible yield. This often requires losing remarkable design performance
$f(\mathbf{x},\boldsymbol{{\xi}})$ in order to achieve a high yield.
Simply maximizing the yield may lead to an over-conservative design. As an
example shown in Fig. 1, one may lose lots of performance (from $2.2$ to
$1.4$) while just getting marginal yield improvement from $99\%$ to $100\%$.
Figure 1: The trade-off between yield and an objective design performance for
the example from V-A. Simply maximizing the yield can lead to over-
conservative performance.
In order to avoid an over-conservative design, a chance-constrained
optimization was proposed in [48]:
$\displaystyle\max_{\mathbf{x}\in\mathbf{X}}\quad$
$\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[f(\mathbf{x},\boldsymbol{{\xi}})]$
(3a) $\displaystyle\mathop{\mathrm{s.t.}}\quad$
$\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}(y_{i}(\mathbf{x,}\boldsymbol{{\xi}})\leq
u_{i})\geq 1-\epsilon_{i},\forall i=[n].$ (3b)
where $f(\mathbf{x},\boldsymbol{{\xi}})$ is the performance metric that we aim
to optimize, and $\epsilon_{i}\in[0,1]$ is a risk level to control the
probability of meeting each design constraint. Instead of simply maximizing
the yield, the chance-constrained optimization tries to achieve a good balance
between yield and performance: one can optimize the performance
$f(\mathbf{x},\boldsymbol{{\xi}})$ while ensuring a high yield. The circuit
yield can be controlled by $\epsilon_{i}$: reducing $\epsilon_{i}$ ensures a
lower failure rate and thus a higher yield.
The chance-constrained optimization (3) is generally hard to solve. Firstly,
the feasible set produced by the chance constraints is often non-convex and
hard to estimate. Secondly, it is also expensive to estimate the design
objective function $f(\mathbf{x},\boldsymbol{{\xi}})$ and design constraint
function $y_{i}(\mathbf{x},\boldsymbol{{\xi}})$ due to the lack of analytical
expressions. Fortunately, a moment bounding method was combined with
uncertainty quantification techniques in [48] to make the problem tractable.
### II-B Moment Bounding Method for (3)
Employing the Chebyshev-Cantelli inequality, one can ensure the chance
constraint via a moment bounding technique [55, 48]. Specifically, with the
first and second-order statistical moments of the constraint function, one can
convert the probabilistic constraint in (3) to a deterministic one:
$\displaystyle\max_{\mathbf{x}\in\mathbf{X}}$
$\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[{f}(\mathbf{x},\boldsymbol{{\xi}})]$
(4) $\displaystyle\mathop{\mathrm{s.t.}}$
$\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[{y}_{i}(\mathbf{x},\boldsymbol{{\xi}})]+\gamma_{\epsilon_{i}}\sqrt{\text{Var}_{\boldsymbol{{\xi}}}[{y}_{i}(\mathbf{x},\boldsymbol{{\xi}})]}\leq
u_{i},\forall i\in[n],$
where constant
$\gamma_{\epsilon_{i}}=\sqrt{\frac{1-\epsilon_{i}}{\epsilon_{i}}}$. When the
objective and constraint functions are described by certain surrogate models
such as generalized polynomial chaos [32, 40], one can easily extract their
mean and variances. This can greatly simplify the problem and reduce the
computational cost, as shown by the yield-aware optimization of photonic IC in
[48].
The moment constraint in (4) is a sufficient but unnecessary condition of the
original chance constraint in (3). Therefore, any feasible solution of (4)
should satisfy the probability constraint of (3). However, the feasible set
produced by a moment bounding can be much smaller than exact one [53]. This
usually leads to an over-conservative design solution. When the risk level is
very small, the moment bounding method may even produce an empty feasible set,
leading to an unsolvable problem (see Section V).
Figure 2: The feasible set of an original chance constraint, moment bounding
(the cross region of two orange lines), and the proposed polynomial bounding.
## III Proposed Polynomial Bounding Method
To avoid the possible over-conservative bounding of the moment methods [48],
we propose to bound the chance constraint via a more accurate polynomial
method. Fig. 2 plots the feasible regions obtained by different bounding
methods for the synthetic example in Sec. V-A. For the same chance
constraints, the moment bounding method produces a feasible set that is much
smaller than the exact one, whereas our polynomial bounding method generates a
better approximation of the feasible set. Due to the more accurate
approximation of the feasible set, our proposed polynomial bounding method can
provide a less conservative design in yield-aware optimization.
Now we describe how to generate the polynomial bounds via kinship functions.
### III-A Kinship Function
The kinship function was first proposed to construct a convex approximation of
an indicator function in [54]. We generalize the concepts of [54] with two
relaxations:
* •
We do not require the convexity of a kinship function.
* •
We do not require the random variables $\boldsymbol{{\xi}}$ to be mutually
independent. Instead, we assume that they are truncated non-Gaussian
correlated.
We slightly modify the definition of a kinship function.
###### Definition 1 (Kinship function).
A kinship function $\kappa(z):[-1,\infty)\rightarrow\mathbb{R}$ is a function
that satisfies the following constraints:
* •
$\kappa(z)=1$ when $z=0$;
* •
$\kappa(z)\geq 0$ for any $z\in[-1,+\infty)$;
* •
$\kappa(z_{1})\geq\kappa(z_{2})$ for any $z_{1}\geq z_{2}$ in the range
$[-1,\infty)$.
Based on kinship functions, the following theorem offers an upper bound for
any probability of constraint violations.
###### Theorem 1 (Risk integral [54]).
Let $\kappa(\cdot)$ be a kinship function,
$g(\mathbf{x},\boldsymbol{{\xi}})\geq-1$, and $V_{\kappa}(\mathbf{x})$ be a
risk integral quantity:
$V_{\kappa}(\mathbf{x})\coloneqq\int\limits_{\mathbf{\Xi}}\kappa[g(\mathbf{x},\boldsymbol{{\xi}})]\mu(\boldsymbol{{\xi}})d\boldsymbol{{\xi}},$
(5)
then we have
$\mathbb{P}\\{\boldsymbol{{\xi}}\in\mathbf{\Xi}:g(\mathbf{x},\boldsymbol{{\xi}})>0\\}\leq
V_{\kappa}(\mathbf{x})$.
###### Proof.
According to Definition 1, $\kappa[g(\mathbf{x},\boldsymbol{{\xi}})]$ is
nonnegative in $[-1,\infty)$ and greater than 1 if
$g(\mathbf{x},\boldsymbol{{\xi}})\geq 0$. Therefore, for any probability
measure $\mu(\boldsymbol{{\xi}})$ on $\mathbf{\Xi}$, we have:
$\displaystyle V_{\kappa}(\mathbf{x})$
$\displaystyle\geq\int\limits_{\\{\boldsymbol{{\xi}}\in\mathbf{\Xi},g(\mathbf{x},\boldsymbol{{\xi}})>0\\}}\kappa[g(\mathbf{x},\boldsymbol{{\xi}})]\mu(\boldsymbol{{\xi}})d\boldsymbol{{\xi}}$
(6a)
$\displaystyle\geq\int\limits_{\\{\boldsymbol{{\xi}}\in\mathbf{\Xi}:g(\mathbf{x},\boldsymbol{{\xi}})>0\\}}\mu(\boldsymbol{{\xi}})d\boldsymbol{{\xi}}=\mathbb{P}\\{\boldsymbol{{\xi}}\in\mathbf{\Xi},g(\mathbf{x},\boldsymbol{{\xi}})>0\\}.$
(6b)
∎
There exist many possible choices of kinship functions. Next, we will show how
to pick some polynomial kinship functions. We consider the polynomial function
family because it is compatible with existing surrogate modeling techniques
[32, 36, 34] to facilitate yield-aware optimization.
Figure 3: Different kinship functions. Black curve: an indicator function.
### III-B Optimal Polynomial Kinship Function
An optimal kinship function is defined as a kinship function that minimizes
its integral over $[-1,0]$ [54]:
$\kappa^{\star}(\cdot)\coloneqq\mathop{\mathrm{argmin}}\limits_{\kappa(\cdot)\in{\cal
K}}\int_{-1}^{0}\kappa(z)dz.$ (7)
Here ${\cal K}$ is the set of all possible kinship functions that satisfy the
constraints in Definition 1. Let $z=g(\mathbf{x},\boldsymbol{{\xi}})$, then
the above definition can be understood as minimizing the gap between the left-
and right-hand sides of (6a).
Now we consider choosing a kinship function from a family of order-$\rho$
polynomials ${\cal
K}_{\rho}\coloneqq\\{\kappa(z)|\kappa(z)=\sum_{i=0}^{\rho}\zeta_{i}z^{i}\\}$.
The optimal polynomial kinship function, denoted as $\kappa_{\rho}(\cdot)$,
can be constructed by solving the following optimization problem:
$\begin{array}[]{cc}\min\limits_{\zeta_{0},\ldots,\zeta_{\rho}}&\int\limits_{-1}^{0}\kappa_{\rho}(z)dz\\\
\mathop{\mathrm{s.t.}}&\kappa_{\rho}(z)=\zeta_{0}+\zeta_{1}z+\cdots+\zeta_{\rho}z^{\rho}\in{\cal
K}_{\rho},\\\ &\kappa_{\rho}(0)=1,\;\kappa_{\rho}(-1)=0,\\\
&\kappa_{\rho}^{\prime}(z)\geq 0,\;\forall z\geq-1.\end{array}$ (8)
The optimization problem can be reformulated as semidefinite programming and
the details are provided in Appendix A. The obtained optimal polynomial
kinship function $\kappa_{\rho}(\cdot)$ with different orders are visualized
in Fig. 3. Since we relax the convexity requirement, given the same polynomial
order, the proposed polynomial function is a tighter approximation to the
indicator function than a convex one [54] for $z\in[-1,0]$.
Based on the obtained optimal polynomial kinship function
$\kappa_{\rho}(\cdot)$, we bound the original chance constraint (3b) by
enforcing the upper bound of the failure probability below $\epsilon_{i}$:
$\mathbb{P}_{\boldsymbol{{\xi}}}(y_{i}(\mathbf{x,}\boldsymbol{{\xi}})>u_{i})\leq\\\
\int\limits_{\mathbf{\Xi}}\kappa_{\rho}(y_{i}(\mathbf{x},\boldsymbol{{\xi}})-u_{i})\mu(\boldsymbol{{\xi}})d\boldsymbol{{\xi}}\leq\epsilon_{i}.$
(9)
The order of $\kappa_{\rho}(\cdot)$ controls the upper bound of violation
probability. When $\rho$ is small, the bounding gap in (6a) is large. As
$\rho\rightarrow\infty$, the polynomial bounding leads to a worst-case robust
design optimization according to Theorem 3 in [54]. This is equivalent to
setting a risk level $\epsilon_{i}=0$, which leads to an extremely over-
conservative design. Fortunately, this is not a trouble in practice since we
do not use a very high-order polynomial due to the computational issues. In
practice, there exists an optimal order $\rho^{\star}$ for bounding the
violation probability most accurately. The optimal $\rho^{\star}$ is unknown
a-priori, but heuristically we find that setting $\rho\in[5,10]$ usually
offers an excellent bound.
The proposed bounding method can be extended to deal with joint chance
constraints by constructing a multivariate polynomial kinship function. We
plan to report the results in a future paper.
## IV The PoBO Framework
Based on the proposed polynomial bounding for chance constraints, we further
present the novel PoBO method to achieve less conservative yield-aware
optimization.
### IV-A Workflow of PoBO
Our PoBO framework has two weak assumptions on the design and random
variables:
* •
The design variable $\mathbf{x}$ is box-bounded, i.e.,
$\mathbf{x}\in\mathbf{X}=[a,b]^{d_{1}}$. This is normally the case in circuit
optimization.
* •
The process variations $\boldsymbol{{\xi}}$ are truncated and non-Gaussian
correlated with a joint probability density function
$\mu(\boldsymbol{{\xi}})$.
The 2nd assumption is not strong at all. Many practical process variations are
correlated and not guaranteed to be Gaussian. Additionally, the values of
almost all practical geometric or material parameters are bounded, although
some simplified unbounded distributions (e.g., Gaussian distributions) were
used in previous literature for the ease of implementation.
The overall flow of PoBO is summarized below.
* •
Step 1: Surrogate modeling. We use the recent uncertainty quantification
solver [40] to construct polynomial surrogate models for the objective and
constraint functions, i.e.,
$f(\mathbf{x},\boldsymbol{{\xi}})\approx\hat{f}(\mathbf{x},\boldsymbol{{\xi}})$
and
$y_{i}(\mathbf{x},\boldsymbol{{\xi}})\approx\hat{y}_{i}(\mathbf{x},\boldsymbol{{\xi}}),\forall
i=[n]$.
* •
Step 2: Bounding the chance constraints via the proposed optimal polynomial
kinship functions. This transforms a chance-constrained probabilistic
optimization problem to a tractable deterministic one with a high-quality
solution.
* •
Step 3: Design optimization. We use a polynomial optimization solver, e.g.,
the semidefinite programming [56], to obtain a globally optimal solution.
The PoBO framework reformulates the original chance-constrained optimization
(3) to the following optimization:
$\displaystyle\max_{\mathbf{x}\in\mathbf{X}}\quad$
$\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[\hat{f}(\mathbf{x},\boldsymbol{{\xi}})]$
(10a) $\displaystyle\mathop{\mathrm{s.t.}}\quad$ $\displaystyle
V_{\kappa}^{(i)}(\mathbf{x})=\int\limits_{\mathbf{\Xi}}\kappa_{\rho}(\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}}))\mu(\boldsymbol{{\xi}})d\boldsymbol{{\xi}}\leq\epsilon_{i},\;\forall
i\in[n].$ (10b)
Here
$\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})\coloneqq\hat{y}_{i}(\mathbf{x},\boldsymbol{{\xi}})-u_{i}$,
$\hat{f}(\mathbf{x},\boldsymbol{{\xi}})$ and
$\hat{y}_{i}(\mathbf{x},\boldsymbol{{\xi}})$ are the polynomial surrogate
models of $f(\mathbf{x},\boldsymbol{{\xi}})$ and
$y_{i}(\mathbf{x},\boldsymbol{{\xi}})$, respectively.
In the following subsections, we will describe the implementation details of
this PoBO framework.
### IV-B Building Surrogate Models
We employ the advanced stochastic collocation method with non-Gaussian
correlated uncertainty [40, 48] in Step 1. This method approximates a smooth
stochastic function as the linear combination of some orthogonal and
normalized polynomial basis functions:
$f(\mathbf{x},\boldsymbol{{\xi}})\approx\hat{f}(\mathbf{x},\boldsymbol{{\xi}})=\sum_{\lvert\boldsymbol{\alpha}\rvert+\lvert\boldsymbol{\beta}\rvert=0}^{p}c_{\boldsymbol{\alpha},\boldsymbol{\beta}}\mathbf{\Phi}_{\boldsymbol{\alpha}}(\mathbf{x})\mathbf{\Psi}_{\boldsymbol{\beta}}(\boldsymbol{{\xi}}).$
(11)
Here $\boldsymbol{\alpha}$ and $\boldsymbol{\beta}$ are two index vectors,
$\mathbf{\Phi}_{\boldsymbol{\alpha}}(\mathbf{x})$ and
$\mathbf{\Psi}_{\boldsymbol{\beta}}(\boldsymbol{{\xi}})$ are two series of
orthogonal polynomial basis functions, and $p$ upper bounds the total order of
the product of two basis functions. The corresponding coefficients
$c_{\boldsymbol{\alpha},\boldsymbol{\beta}}$ are calculated via a projection
method using some optimization-based quadrature samples and weights of
$\mathbf{x}$ and $\boldsymbol{{\xi}}$ [40]. When the parameter dimensionality
is not high, this method only needs a small number of simulation samples to
produce a highly accurate surrogate model with a provable error bound.
### IV-C Scaling the Yield Metrics
${\upsilon}_{i}(\mathbf{x},\boldsymbol{{\xi}})$
To bound the failure probability
$\mathbb{P}\\{\boldsymbol{{\xi}}\in\mathbf{\Xi}:\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})>0\\}$
via the optimal kinship function,
$\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})$ must be in the range
$[-1,\infty)$ according to Definition 1. Once
$\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})$ is lower bounded, we can always
scale it to meet this requirement.
Since $\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})$ is a polynomial function
in our problem setting, and both $\mathbf{x}$ and $\boldsymbol{{\xi}}$ are
assumed bounded, we can compute the minimum value
${\upsilon_{i}^{-}}\coloneqq{\min\limits_{\mathbf{x}\in\mathbf{X},\boldsymbol{{\xi}}\in\mathbf{\Xi}}\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})}$.
Then we change the lower bound of
$\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})$ to -1 as follows:
$\begin{matrix}\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})\longleftarrow-\frac{1}{\upsilon_{i}^{-}}\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}}),\;\forall
i\in[n].\end{matrix}$ (12)
The scaling factor $-\frac{1}{\upsilon_{i}^{-}}$ is positive as long as the
problem (10) is solvable. This is because the existence of
$\mathbf{x}\in\mathbf{X}$ and $\boldsymbol{{\xi}}\in\mathbf{\Xi}$ such that
$\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})<0$ is the necessary condition to
satisfy the yield constraint. We can easily avoid $\upsilon_{i}^{-}=0$ by
adding a sufficiently small perturbation.
### IV-D Calculating Risk Integral $V_{\kappa}^{(i)}(\mathbf{x})$
Figure 4: An example of optimized quadrature rule for a two-dimensional
truncated Gaussian mixture model with two components. The color bar of the
right figure represents the weights of all samples. The shown quadrature rule
satisfies the exact integration up to order 6.
In order to upper bound the probability of violating a design constraint, we
need to calculate the integration in (10b). This can be a challenging task for
a truncated non-Gaussian correlated random vector $\boldsymbol{{\xi}}$ since
classical numerical quadrature rules [57, 58] do not work for non-Gaussian
correlated variables. Fortunately, we can reuse the quadrature rule of
$\boldsymbol{{\xi}}$ as the by-product of building the surrogate models in
Sec. IV-B. Specifically, the quadrature points and weights
$\\{\boldsymbol{{\xi}}_{l},w_{l}\\}_{l=1}^{M}$ compute the exact integration
up to order $2q$, obtained by solving the following optimization problem [40]:
$\min_{\boldsymbol{{\xi}}_{l},w_{l}\geq
0}\;\sum_{\lvert\boldsymbol{\beta}\rvert=0}^{2q}{\left(\mathbb{E}_{\boldsymbol{{\xi}}}\left[\mathbf{\Psi}_{\boldsymbol{\beta}}(\boldsymbol{{\xi}})\right]-\sum_{l=1}^{M}\mathbf{\Psi}_{\boldsymbol{\beta}}(\boldsymbol{{\xi}}_{l})w_{l}\right)}^{2}.$
(13)
An example of the solved quadrature is shown in Fig. 4. The detailed accuracy
analysis and the bound of $M$ are provided in [40], which is omitted here.
1:Box-bounded design variable $\mathbf{x}\in\mathbf{X}$, truncated non-
Gaussian correlated variations $\boldsymbol{{\xi}}\in\mathbf{\Xi}$, risk
levels $\mathbf{\epsilon}$
2:Optimized design $\mathbf{x}^{\star}$
3:Formulate the chance-constrained problem (3).
4:Obtain surrogate models for the design objective function
$f(\mathbf{x},\boldsymbol{{\xi}})\approx\hat{f}(\mathbf{x},\boldsymbol{{\xi}})$
and constraint functions
$y_{i}(\mathbf{x},\boldsymbol{{\xi}})\approx\hat{y}_{i}(\mathbf{x},\boldsymbol{{\xi}}),\forall
i\in[n]$.
5:Scale the yield metrics ${\upsilon_{i}}(\mathbf{x},\boldsymbol{{\xi}})$ via
Eq. (12).
6:Compute the optimal polynomial kinship function $\kappa_{\rho}(\cdot)$ via
(8).
7:Calculate risk integral $V_{\kappa}^{(i)}(\mathbf{x})$ via the quadrature
rule obtained from (13).
8:Seek the optimal design of problem (14) via a global polynomial optimization
solver.
Algorithm 1 Flow of the proposed PoBO.
Theoretically, we need a quadrature rule to exactly calculate the integration
up to order $p\rho$ in (10b). The exact quadrature rule can be computed
offline via solving (13) with $q=\lceil\frac{\rho p}{2}\rceil$. In practice, a
low-order quadrature rule, like $q=p$, often offers sufficient numerical
accuracy. Therefore, we can directly use the quadrature rule used when
building surrogate model (11) to calculate the risk integral
$V_{\kappa}^{(i)}(\mathbf{x})$. Since the quadrature points will not be
simulated, it does not introduce any additional computational burdens. Based
on the quadrature rule, problem (10) can be converted to the following
deterministic constrained polynomial optimization (14):
$\displaystyle\max_{\mathbf{x}\in\mathbf{X}}$
$\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[\hat{f}(\mathbf{x},\boldsymbol{{\xi}})]$
(14) $\displaystyle\mathop{\mathrm{s.t.}}$
$\displaystyle\sum_{l=1}^{M}w_{l}\kappa_{\rho}(\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}}_{l}))\leq\epsilon_{i},\quad\forall
i\in[n].$
Note that the expectation value in the objective function can be easily
obtained since $\hat{f}(\mathbf{x},\boldsymbol{{\xi}})$ is a generalized
polynomial-chaos expansion [32, 40].
### IV-E Algorithm Summary
We summarize PoBO in Alg. 1. Below are some remarks:
* •
In line 4 of Alg. 1, the optimal polynomial kinship functions (8) can be
computed offline.
* •
In line 5 of Alg. 1, the optimization-based quadrature rule in [40] can be
used to calculate the risk integral without any additional simulations. The
quadrature rule can be computed offline as well.
* •
This method enables a global polynomial optimization solver to obtain the
optimal design of (14).
Since a high polynomial order can increase the computational burden, the
current PoBO framework becomes inefficient for high-dimensional design
problems. This challenge may be overcome in the future by using other
nonlinear optimization solvers, or a better polynomial optimization solver
(e.g. a sparse polynomial solver) that can exploit the sparse structure of the
polynomial surrogate.
## V Numerical Results
In this section, we validate the proposed PoBO framework via the synthetic
example and two realistic photonic IC examples from [48]. The polynomial
optimization is solved via GloptiPoly 3 [56], which is a global optimization
solver based on hierarchical semidefinite programming. Our codes are
implemented in MATLAB and run on a computer with a 2.3 GHz CPU and 16 GB
memory.
TABLE I: Optimization Results for Synthetic Function
Risk level $\epsilon$ Method Objective $\Delta_{1}$ (%) $\Delta_{2}$ (%) Yield
(%) 0.01 Moment [48] N/A* N/A* N/A* N/A* Proposed 1.14 1.01 0.99 99.98 0.05
Moment [48] 1.88 5.25 5.26 99.98 Proposed 2.11 5.21 3.97 98.76 0.1 Moment [48]
2.19 10.47 10.98 99.36 Proposed 2.26 10.67 7.98 97.08 * The algorithm fails
with no feasible solution.
Figure 5: The schematic of a third-order Mach-Zehnder interferometer. Figure
6: The transmission curves of the MZI. The grey lines show the performance
uncertainties. The orange and blue curves show the transmission rates at the
drop and through ports, respectively. The mean values of the bandwidth,
crosstalk, and attenuation are denoted as BW, XT, and $\alpha$, respectively.
(a) The initial design: $\mathbf{x}$=[150, 150, 150]; (b) Design after
Bayesian yield optimization [15]: $\mathbf{x}$=[286.63, 170.59, 299.3]; (c)
Design with the moment-bounding yield-aware optimization [48]:
$\mathbf{x}$=[300, 149.67, 300]; (d) Design with the proposed PoBO method:
$\mathbf{x}$=[300, 112.15, 300]. TABLE II: Optimization Results for MZI
Benchmark
Risk level $\epsilon$ | Method | Simulation # | $\mathbb{E}_{\boldsymbol{{\xi}}}[\text{BW}]$ (GHz) | $\Delta_{1}$ (%) | $\Delta_{2}$ (%) | Yield (%)
---|---|---|---|---|---|---
0.05 | Moment [48] | 35 | 184.53 | 5.26 | 5.26 | 100
Proposed | 35 | 190.99 | 5.26 | 5.26 | 100
0.07 | Moment [48] | 35 | 187.02 | 7.53 | 7.53 | 100
Proposed | 35 | 192.10 | 7.53 | 7.2 | 99.7
0.1 | Moment [48] | 35 | 189.35 | 11.11 | 11.11 | 100
Proposed | 35 | 193.28 | 11.11 | 4.22 | 93.8
N/A* | BYO [15] | 2020 | 182.82 | N/A* | N/A* | 100
* *
No risk level is defined for BYO method. Correspondingly, no gap $\Delta$ is
defined.
Figure 7: The probability density function of the optimized bandwidth of the
MZI by Bayesian yield optimization [15], moment bounding [48] and the proposed
PoBO (with $\epsilon=0.1$).
Baseline Methods. We choose the moment-bounding chance-constraint optimization
[48] as the baseline for comparison. On the photonic IC benchmarks, we further
compare our with the Bayesian yield optimization (BYO) method [15], a recent
state-of-the-art yield optimization approach.
Gap of chance constraints. We modify the indicator function (1) to define an
indicator function ${I_{i}}(\mathbf{x},\boldsymbol{{\xi}})$ for each
individual design constraint in yield definition:
${{I_{i}}(\mathbf{x},\boldsymbol{{\xi}})=\begin{cases}1,&\hat{y}_{i}(\mathbf{x},\boldsymbol{{\xi}})\leq
u_{i};\\\ 0,&\text{otherwise}\end{cases},\forall i=[n].}$
With $N$ random samples, the individual success rate for each design
constraint is evaluated as
${Y_{i}}(\mathbf{x})=\begin{matrix}\sum_{j=1}^{N}{I_{i}}(\mathbf{x},\boldsymbol{{\xi}}_{j})/N.\end{matrix}$
The gap for the $i$-th chance constraint is the relative difference between
$Y_{i}$ and the pre-specified success rate $1-\epsilon_{i}$:
$\Delta_{i}=\frac{{Y_{i}}(\mathbf{x})-(1-\epsilon_{i})}{1-\epsilon_{i}},\;\forall
i=[n].$ (15)
The chance-constrained optimization can always provide a solution to ensure
the yield requirement controlled by $\epsilon_{i}$’s if a feasible solution
exists. Therefore, $\Delta_{i}$ is always non-negative. Notice that we do not
attempt to achieve the highest yield. Instead, our goal is to avoid over-
conservative design while ensuring the pre-specified yield requirement.
Therefore, given a certain risk level, we prefer a smaller gap $\Delta_{i}$
and a less conservative design solution with better objective performance.
### V-A Synthetic Function
We first consider a synthetic function with design variables
$\mathbf{x}\in\mathbf{X}={[-1,1]}^{2}$ and random parameters
$\boldsymbol{{\xi}}$ following a truncated Gaussian mixture model.
Specifically, we assume
$\mu(\boldsymbol{{\xi}})=\frac{1}{2}\mathcal{TN}(\bar{\boldsymbol{\mu}}_{1},\mathbf{\Sigma}_{1},\mathbf{a}_{1},\mathbf{b}_{1})+\frac{1}{2}\mathcal{TN}(\bar{\boldsymbol{\mu}}_{2},\mathbf{\Sigma}_{2},\mathbf{a}_{2},\mathbf{b}_{2})$,
with
$\bar{\boldsymbol{\mu}}_{1}=-\bar{\boldsymbol{\mu}}_{2}={[0.1,-0.1]}^{T}$,
$\mathbf{\Sigma}_{1}=\mathbf{\Sigma}_{2}=10^{-2}\begin{bmatrix}1&-0.75\\\
-0.75&1\end{bmatrix}$, $\mathbf{a}_{1}=-{[0.2,0.4]}^{T}$,
$\mathbf{a}_{2}=-{[0.4,0.2]}^{T}$, $\mathbf{b}_{1}={[0.4,0.2]}^{T}$ and
$\mathbf{b}_{2}={[0.2,0.4]}^{T}$. Here
$\mathcal{TN}(\bar{\boldsymbol{\mu}},\mathbf{\Sigma},\mathbf{a},\mathbf{b})$
denotes a distribution that is a normal distribution with mean
$\bar{\boldsymbol{\mu}}$ and variance $\mathbf{\Sigma}$ in the box
$[\mathbf{a},\mathbf{b}]$.
We consider the following chance-constrained optimization:
$\displaystyle\max_{\mathbf{x}\in\mathbf{X}}$
$\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[3(x_{1}+\xi_{1})-(x_{2}+\xi_{2}))]$
(16) $\displaystyle\mathop{\mathrm{s.t.}}$
$\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}({(x_{1}+\xi_{1})}^{2}+(x_{2}+\xi_{2})\leq
1)\geq 1-\epsilon_{1},$
$\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}({(x_{1}+\xi_{1})}^{2}-(x_{2}+\xi_{2})\leq
1)\geq 1-\epsilon_{2},$
where the two risk levels are set to be equal
$\epsilon_{1}=\epsilon_{2}=\epsilon$.
We use 2nd-order polynomials to approximate the three analytical functions and
bound the chance constraint with an order-10 optimal polynomial kinship
function. As shown in Table I, compared with the moment method [48], the
proposed PoBO method produces a better objective value and smaller gaps for
chance constraints while meeting the pre-specified yield requirement. Clearly,
a smaller $\epsilon_{i}$ produces a higher yield. The moment bounding method
fails to work when $\epsilon=0.01$ while our PoBO can still solve this
problem.
Figure 8: The schematic of a microring add-drop filter. Figure 9: The
probability density function of the optimized bandwidth of the microring
filter by Bayesian yield optimization [15], moment bounding [48] and the
proposed PoBO (with $\epsilon=0.1$).
### V-B Mach-Zehnder Interferometer
We consider a third-order Mach-Zehnder interferometer (MZI) which consists of
three port coupling and two arms, as shown in Fig. 5. The coupling
coefficients $\tau$ between the MZ arms play an important role in the design,
whose relationship with the the gap $g$ (nm) is $\tau=\exp(-\frac{g}{260})$.
The gap variables $\mathbf{x}=[g_{1},g_{2},g_{3}]$ have the design space of
$\mathbf{X}={[100,300]}^{3}$. Their corresponding process variations
$\boldsymbol{{\xi}}$ follows a truncated Gaussian mixture distribution (see
Appendix B). We aim to maximize the expected 3-dB bandwidth (BW, in GHz) with
probability constraints on the crosstalk (XT, in dB) and the attenuation
($\alpha$, in dB) of the peak transmission. Therefore, the yield-aware chance-
constrained design is formulated as
$\displaystyle\max_{\mathbf{x}\in\mathbf{X}}$
$\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[\text{BW}(\mathbf{x},\boldsymbol{{\xi}})]$
(17) $\displaystyle\mathop{\mathrm{s.t.}}$
$\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}(\text{XT}(\mathbf{x},\boldsymbol{{\xi}})\leq\text{XT}_{0})\geq
1-\epsilon_{1},$
$\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}(\alpha(\mathbf{x},\boldsymbol{{\xi}})\leq\alpha_{0})\geq
1-\epsilon_{2}.$
The two risk levels are set to be equal $\epsilon_{1}=\epsilon_{2}=\epsilon$.
The thresholds of the crosstalk ($\text{XT}_{0}$) and the attenuation
($\alpha_{0}$) are -4 dB and 1.6 dB respectively.
We build three 2nd-order polynomial surrogate models for BW, XT, and $\alpha$,
respectively. We further bound the probabilistic yield constraints via an
order-5 optimal polynomial kinship function. The optimized results and
comparisons are listed in Table II. It shows that at the same risk level, the
proposed PoBO method can achieve larger bandwidth while meeting the yield
requirements and having smaller gaps for the chance constraints. The
simulation samples are the ones used for building surrogate models. The
proposed PoBO requires the same number of simulations as the moment bounding
method [48], and both of them require much fewer simulation samples than the
Bayesian yield optimization due to the efficient surrogate modeling. Fig. 6
compares the frequency response before and after the yield-aware optimization
with $\epsilon=0.1$. Our PoBO method has a higher expected bandwidth compared
with the Bayesian yield optimization, the moment bounding method, and the
initial design. Fig. 7 further shows the probability density of the optimized
bandwidth by different models. It clearly shows that our proposed method
produces the highest bandwidth while meeting the yield requirement.
### V-C Microring Add-Drop Filter
We further consider the design of an optical add-drop filter consisting of
three identical silicon microrings coupled in series, as shown in Fig. 8. The
design variables are the coupling coefficients
$\mathbf{x}=[K_{1},K_{2},K_{3},K_{4}]$ that are to be optimized within the
interval of $\mathbf{X}={[0.3,0.6]}^{4}$. The process variations
$\boldsymbol{{\xi}}$ are described by a truncated Gaussian mixture model (see
Appendix B). The design problem is to maximize the expected 3-dB bandwidth
(BW, in GHz) with constraints on the extinction ratio (RE, in dB) of the
transmission at the drop port and the roughness ($\sigma_{\text{pass}}$, in
dB) of the passband that takes its standard deviation, formulated as:
$\displaystyle\max_{\mathbf{x}\in\mathbf{X}}$
$\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[\text{BW}(\mathbf{x},\boldsymbol{{\xi}})]$
(18) $\displaystyle\mathop{\mathrm{s.t.}}$
$\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}(\text{RE}(\mathbf{x},\boldsymbol{{\xi}})\geq\text{RE}_{0})\geq
1-\epsilon_{1},$
$\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}(\sigma_{\text{pass}}(\mathbf{x},\boldsymbol{{\xi}})\leq\sigma_{0})\geq
1-\epsilon_{2}.$
The two risk levels are set to be equal $\epsilon_{1}=\epsilon_{2}=\epsilon$.
The thresholds of the extinction ratio ($\text{RE}_{0}$) and the roughness of
the passband ($\sigma_{0}$) are 20 dB and 0.65 dB respectively.
Figure 10: The transmission curves of the microring add-drop filter. The grey
lines show the performance uncertainties. The orange and blue curves show the
transmission rates at the drop and through ports, respectively. The mean
values of the extinction ratio, bandwidth, and roughness are denoted as RE,
BW, and $\sigma_{\text{pass}}$, respectively. (a) The initial design:
$\mathbf{x}$=[0.45, 0.45, 0.45, 0.45]; (b) Design after Bayesian yield
optimization [15]: $\mathbf{x}$=[0.5758, 0.3718, 0.3720, 0.5746]; (c) Design
with the moment-bounding yield-aware optimization [48]: $\mathbf{x}$=[0.6,
0.3751, 0.3642 0.6]; (d) Design with the proposed PoBO optimization:
$\mathbf{x}$=[0.6, 0.3971, 0.3642, 0.6]. TABLE III: Optimization Results for
Microring Add-drop Filter benchmark
Risk level $\epsilon$ | Method | Simulation # | $\mathbb{E}_{\boldsymbol{{\xi}}}[\text{BW}]$ (GHz) | $\Delta_{1}$ (%) | $\Delta_{2}$ (%) | Yield (%)
---|---|---|---|---|---|---
0.05 | Moment [48] | 65 | N/A* | N/A* | N/A* | N/A*
Proposed | 65 | 116.85 | 5.26 | 4.84 | 99.6
0.07 | Moment [48] | 65 | 112.64 | 7.53 | 7.42 | 99.9
Proposed | 65 | 120.05 | 7.53 | 6.67 | 99.2
0.1 | Moment [48] | 65 | 118.47 | 11.11 | 10.78 | 99.7
Proposed | 65 | 123.05 | 11.11 | 8.33 | 97.5
N/A | BYO [15] | 2020 | 117.42 | N/A | N/A | 95.1
* *
The algorithm fails with no feasible solution.
Similarly, we build three 2nd-order polynomial surrogate models for BW, RE,
and $\sigma_{\text{pass}}$ and bound the chance constraints via an order-5
optimal polynomial kinship function. The optimized results and comparisons are
shown in Table III. The moment bounding [48] fails when $\epsilon=0.05$ since
no feasible solution is found under its over-conservative bounding. At all
risk levels, the proposed method can achieve larger bandwidth while meeting
the yield requirements and having smaller gaps for the chance constraints. As
shown in Fig. 9, the proposed PoBO has a higher expected bandwidth compared to
Bayesian yield optimization, existing yield-aware chance-constraint
optimization via moment bounding [48]. Fig. 10 shows the frequency response
before and after the yield-aware optimization with $\epsilon=0.1$. All the
reported design problems can be solved within a few minutes on a regular
laptop computer.
## VI Conclusion and Future Work
This paper has proposed a novel Polynomial Bounding method for chance-
constrained yield-aware Optimization (PoBO) of photonic ICs with truncated
non-Gaussian correlated uncertainties. In PoBO, we first construct surrogate
models with a few simulation samples for the interested quantities based on
available uncertainty quantification solvers. To avoid over-conservative
design, we have proposed an optimal polynomial kinship function to tightly
bound the chance constraints. This bounding method can be efficiently
implemented without additional simulations. It also preserves the polynomial
form and enables seeking a globally optimal design. The proposed PoBO is
verified with a synthetic function, a Mach-Zehnder interferometer, and a
microring add-drop filter. In all experiments, the proposed PoBO has achieved
the yield requirements, produced tighter bounds on the chance constraints than
the state-of-the-art moment bounding method, and led to better design
objective performances with a few simulation samples. On the two photonic IC
examples, the proposed method has also reduced the simulation samples by
$58\times$ compared with Bayesian yield optimization.
The theoretical and numerical results of this work have laid the foundation of
many future topics. Possible extensions of this work include, but are not
limited to: (1) improved algorithms to handle many design parameters and
process variation, (2) formulations and algorithms to handle joint chance
constraint for yield descriptions, (3) PoBO with non-polynomial surrogates.
The proposed framework is very generic, and it can also be employed in other
applications beyond EDA, including probabilistic control of energy systems,
safety-critical control of autonomous systems, and so forth.
## Appendix A Solution to Optimal Polynomial Kinship (8)
Given a $\rho$-order optimal kinship function $\kappa_{\rho}(\cdot)$, we
introduce two positive semidefinite matrices
$\mathbf{Y}_{1}\in\mathbb{R}^{(n_{1}+1)\times(n_{1}+1)}$ and
$\mathbf{Y}_{2}\in\mathbb{R}^{(n_{2}+1)\times(n_{2}+1)}$ with
$n_{1}=\lfloor(\rho-1)/2\rfloor$ and $n_{2}=\lfloor(\rho-2)/2\rfloor$. We
further define two series of Hankel matrices
$\mathbf{H}_{1,m}\in\mathbb{R}^{(n_{1}+1)\times(n_{1}+1)}$ and
$\mathbf{H}_{2,m}\in\mathbb{R}^{(n_{2}+1)\times(n_{2}+1)}$ as
$\mathbf{H}_{k,m}\left(i,j\right)=\begin{cases}1,&i+j=m+1\\\
0,&\text{otherwise}\end{cases},k=1,2.$ (19)
Based on the sum-of-square representation of a nonnegative univariate
polynomial, we can reformulate (8) as a finite dimensional semidefinite
programming (20), which can be handled by many efficient solvers and toolboxes
[59]. The detailed proof will be similar to the Corollary 1 of [54], where the
difference is the order of nonnegative polynomial.
$\centering\begin{array}[]{c}\min_{{\zeta_{0}},\ldots,{\zeta_{\rho}},{\mathbf{Y}_{1}},{\mathbf{Y}_{2}}}\;\sum_{i=0}^{\rho}\frac{(-1)^{i}}{i+1}\zeta_{i}\\\
\mathop{\mathrm{s.t.}}\;\zeta_{0}=1,\\\
\sum_{i=0}^{\rho}(-1)^{i}\zeta_{i}=0,\\\
\text{Tr}(\mathbf{Y}_{1}\mathbf{H}_{1,m})+\text{Tr}(\mathbf{Y}_{2}\mathbf{H}_{2,m})=\\\
\sum_{i=m+1}^{\rho}\frac{i!(-1)^{i-m-1}}{k!(i-m-1)!}\zeta_{i},m=0,1,\ldots,\rho-2,\\\
\mathbf{Y}_{k}\succeq 0,\;k=1,2.\end{array}\@add@centering$ (20)
## Appendix B Details about benchmark setup
In the MZI benchmark (Sec. V-B), the process variations on the coupling
coefficients are described by a truncated Gaussian mixture model with two
components:
$\mu(\mathbf{\xi})=\frac{1}{2}\mathcal{TN}_{1}(\bar{\boldsymbol{\mu}}_{1},\mathbf{\Sigma}_{1},\mathbf{a}_{1},\mathbf{b}_{1})+\frac{1}{2}\mathcal{TN}_{2}(\bar{\boldsymbol{\mu}}_{2},\mathbf{\Sigma}_{2},\mathbf{a}_{2},\mathbf{b}_{2}),$
(21)
where $\bar{\boldsymbol{\mu}}_{1}=-\bar{\boldsymbol{\mu}}_{2}={[3,3,3]}^{T}$,
$\mathbf{\Sigma}_{1}=\mathbf{\Sigma}_{2}=3^{2}\begin{bmatrix}1&0.4&0.1\\\
0.4&1&0.4\\\
0.1&0.4&1\end{bmatrix},\mathbf{a}_{1}=-\mathbf{b}_{2}={[-6,-6,-6]}^{T},\mathbf{a}_{2}=-\mathbf{b}_{1}={[-12,-12,-12]}^{T}.$
In the microring benchmark (Sec. V-C), the process variations on the coupling
coefficients are described the same as Eq. (21) with different parameters
$\bar{\boldsymbol{\mu}}_{1}=-\bar{\boldsymbol{\mu}}_{2}={[0.03,0.03,0.03,0.03]}^{T}$,
$\mathbf{\Sigma}_{1}=\mathbf{\Sigma}_{2}=0.03^{2}\begin{bmatrix}1&0.4&0.1&0.4\\\
0.4&1&0.4&0.1\\\ 0.1&0.4&1&0.4\\\
0.4&0.1&0.4&1\end{bmatrix},\mathbf{a}_{1}=-\mathbf{b}_{2}={[-0.06,-0.06,-0.06,-0.06]}^{T},\mathbf{a}_{2}=-\mathbf{b}_{1}={[-0.12,-0.12,-0.12,-0.12]}^{T}.$
## References
* [1] G. Gielen, P. De Wit, E. Maricau, J. Loeckx, J. Martin-Martinez, B. Kaczer, G. Groeseneken, R. Rodriguez, and M. Nafria, “Emerging yield and reliability challenges in nanometer CMOS technologies,” in _Proc. Design, Autom. Test Eur. Conf. Exhibit._ , 2008, pp. 1322–1327.
* [2] X. Chen, M. Mohamed, Z. Li, L. Shang, and A. R. Mickelson, “Process variation in silicon photonic devices,” _Appl. Opt._ , vol. 52, no. 31, pp. 7638–7647, 2013.
* [3] T. Lipka, J. Müller, and H. K. Trieu, “Systematic nonuniformity analysis of amorphous silicon-on-insulator photonic microring resonators,” _J. Light. Technol._ , vol. 34, no. 13, pp. 3163–3170, 2016.
* [4] W. Bogaerts, Y. Xing, and U. Khan, “Layout-aware variability analysis, yield prediction, and optimization in photonic integrated circuits,” _IEEE J. Sel. Top. Quantum Electron._ , vol. 25, no. 5, pp. 1–13, 2019.
* [5] K. J. Antreich, H. E. Graeb, and C. U. Wieser, “Circuit analysis and optimization driven by worst-case distances,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 13, no. 1, pp. 57–71, 1994\.
* [6] F. Gong, Y. Shi, H. Yu, and L. He, “Variability-aware parametric yield estimation for analog/mixed-signal circuits: Concepts, algorithms, and challenges,” _IEEE Des. Test_ , vol. 31, no. 4, pp. 6–15, 2014.
* [7] Z. Lu, J. Jhoja, J. Klein, X. Wang, A. Liu, J. Flueckiger, J. Pond, and L. Chrostowski, “Performance prediction for silicon photonics integrated circuits with layout-dependent correlated manufacturing variability,” _Opt. Express_ , vol. 25, no. 9, pp. 9712–9733, 2017.
* [8] J. Pond, J. Klein, J. Flückiger, X. Wang, Z. Lu, J. Jhoja, and L. Chrostowski, “Predicting the yield of photonic integrated circuits using statistical compact modeling,” in _Integrated Optics: Physics and Simulations III_ , vol. 10242, 2017, p. 102420S.
* [9] Y. Xu, K.-L. Hsiung, X. Li, L. T. Pileggi, and S. P. Boyd, “Regular analog/RF integrated circuits design using optimization with recourse including ellipsoidal uncertainty,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 28, no. 5, pp. 623–637, 2009.
* [10] G. Yu and P. Li, “Yield-aware analog integrated circuit optimization using geostatistics motivated performance modeling,” in _Proc. Intl. Conf. Computer Aided Design_ , 2007, pp. 464–469.
* [11] S. K. Tiwary, P. K. Tiwary, and R. A. Rutenbar, “Generation of yield-aware Pareto surfaces for hierarchical circuit design space exploration,” in _Proc. Design Autom. Conf_ , 2006, pp. 31–36.
* [12] Y. Li and V. Stojanovic, “Yield-driven iterative robust circuit optimization algorithm,” in _Proc. Design Autom. Conf_ , 2009, pp. 599–604.
* [13] B. Liu, F. V. Fernández, and G. G. Gielen, “Efficient and accurate statistical analog yield optimization and variation-aware circuit sizing based on computational intelligence techniques,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 30, no. 6, pp. 793–805, 2011\.
* [14] M. Barros, J. Guilherme, and N. Horta, “Analog circuits optimization based on evolutionary computation techniques,” _Integration_ , vol. 43, no. 1, pp. 136–155, 2010.
* [15] M. Wang, F. Yang, C. Yan, X. Zeng, and X. Hu, “Efficient Bayesian yield optimization approach for analog and SRAM circuits,” in _Proc. Design Autom. Conf_ , 2017, pp. 1–6.
* [16] A. Singhee, S. Singhal, and R. A. Rutenbar, “Practical, fast Monte Carlo statistical static timing analysis: Why and how,” in _Proc. Intl. Conf. Computer Aided Design_ , 2008, pp. 190–195.
* [17] A. Papoulis and H. Saunders, _Probability, random variables and stochastic processes_. McGraw-Hill, 2001.
* [18] C. Gu and J. Roychowdhury, “An efficient, fully nonlinear, variability-aware non-Monte-Carlo yield estimation procedure with applications to SRAM cells and ring oscillators,” in _Proc. Asia South Pac. Design Autom. Conf._ , 2008, pp. 754–761.
* [19] F. Gong, X. Liu, H. Yu, S. X. Tan, J. Ren, and L. He, “A fast non-Monte-Carlo yield analysis and optimization by stochastic orthogonal polynomials,” _ACM Trans. Des. Autom. Electron. Syst._ , vol. 17, no. 1, pp. 1–23, 2012.
* [20] Z. Gao and R. Rohrer, “Efficient non-Monte-Carlo yield estimation,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , pp. 1–1, 2021\.
* [21] X. Shi, H. Yan, Q. Huang, J. Zhang, L. Shi, and L. He, “Meta-model based high-dimensional yield analysis using low-rank tensor approximation,” in _Proc. Design Autom. Conf_ , 2019, pp. 1–6.
* [22] J. Yao, Z. Ye, and Y. Wang, “An efficient SRAM yield analysis and optimization method with adaptive online surrogate modeling,” _IEEE Trans. Very Large Scale Integr. (VLSI) Syst._ , vol. 23, no. 7, pp. 1245–1253, 2014.
* [23] X. Li, J. Le, P. Gopalakrishnan, and L. T. Pileggi, “Asymptotic probability extraction for nonnormal performance distributions,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 26, no. 1, pp. 16–37, 2006\.
* [24] X. Li, P. Gopalakrishnan, Y. Xu, and T. Pileggi, “Robust analog/RF circuit design with projection-based posynomial modeling,” in _Proc. Intl. Conf. Computer Aided Design_ , 2004, pp. 855–862.
* [25] X. Li, Y. Zhan, and L. T. Pileggi, “Quadratic statistical $max$ approximation for parametric yield estimation of analog/rf integrated circuits,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 27, no. 5, pp. 831–843, 2008.
* [26] A. Ciccazzo, G. Di Pillo, and V. Latorre, “A SVM surrogate model-based method for parametric yield optimization,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 35, no. 7, pp. 1224–1228, 2015.
* [27] H. Ma, E.-P. Li, A. C. Cangellaris, and X. Chen, “Support vector regression-based active subspace (SVR-AS) modeling of high-speed links for fast and accurate sensitivity analysis,” _IEEE Access_ , vol. 8, pp. 74 339–74 348, 2020.
* [28] A. C. Sanabria-Borbón, S. Soto-Aguilar, J. J. Estrada-López, D. Allaire, and E. Sánchez-Sinencio, “Gaussian-process-based surrogate for optimization-aided and process-variations-aware analog circuit design,” _Electronics_ , vol. 9, no. 4, p. 685, 2020.
* [29] M. Wang, W. Lv, F. Yang, C. Yan, W. Cai, D. Zhou, and X. Zeng, “Efficient yield optimization for analog and SRAM circuits via Gaussian process regression and adaptive yield estimation,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 37, no. 10, pp. 1929–1942, 2017.
* [30] Y. Wang, M. Orshansky, and C. Caramanis, “Enabling efficient analog synthesis by coupling sparse regression and polynomial optimization,” in _Proc. Design Autom. Conf_ , 2014, pp. 1–6.
* [31] D. Xiu and G. E. Karniadakis, “Modeling uncertainty in flow simulations via generalized polynomial chaos,” _J. Comput. Phys._ , vol. 187, no. 1, pp. 137–167, 2003.
* [32] Z. Zhang, T. A. El-Moselhy, I. M. Elfadel, and L. Daniel, “Stochastic testing method for transistor-level uncertainty quantification based on generalized polynomial chaos,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 32, no. 10, pp. 1533–1545, 2013.
* [33] R. Trinchero and F. G. Canavero, “Combining LS-SVM and GP regression for the uncertainty quantification of the EMI of power converters affected by several uncertain parameters,” _IEEE Trans. Electromagn. Compat._ , vol. 62, no. 5, pp. 1755–1762, 2020.
* [34] X. Li, “Finding deterministic solution from underdetermined equation: large-scale performance variability modeling of analog/RF circuits,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 29, no. 11, pp. 1661–1668, 2010.
* [35] Z. Zhang, X. Yang, I. V. Oseledets, G. E. Karniadakis, and L. Daniel, “Enabling high-dimensional hierarchical uncertainty quantification by ANOVA and tensor-train decomposition,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 34, no. 1, pp. 63–76, 2014.
* [36] Z. Zhang, T.-W. Weng, and L. Daniel, “Big-data tensor recovery for high-dimensional uncertainty quantification of process variations,” _IEEE Trans. Compon. Packag. Manuf. Technol._ , vol. 7, no. 5, pp. 687–697, 2016.
* [37] Z. He and Z. Zhang, “High-dimensional uncertainty quantification via active and rank-adaptive tensor regression,” in _Proc. Electr. Perform. Electron. Packag. Syst._ , 2020, pp. 1–3.
* [38] Z. He and Z. Zhang, “High-dimensional uncertainty quantification via tensor regression with rank determination and adaptive sampling,” _accepted by IEEE Trans. Compon. Packag. Manuf. Technol., doi: 10.1109/TCPMT.2021.3093432_ , 2021.
* [39] Z. He, W. Cui, C. Cui, T. Sherwood, and Z. Zhang, “Efficient uncertainty modeling for system design via mixed integer programming,” in _Proc. Intl. Conf. Computer Aided Design_ , 2019, pp. 1–8.
* [40] C. Cui and Z. Zhang, “Stochastic collocation with non-Gaussian correlated process variations: Theory, algorithms, and applications,” _IEEE Trans. Compon. Packag. Manuf. Technol._ , vol. 9, no. 7, pp. 1362–1375, 2018.
* [41] P. Manfredi, D. V. Ginste, D. De Zutter, and F. G. Canavero, “Stochastic modeling of nonlinear circuits via SPICE-compatible spectral equivalents,” _IEEE Trans. Circuits Syst. I, Reg. Papers_ , vol. 61, no. 7, pp. 2057–2065, 2014.
* [42] M. Ahadi and S. Roy, “Sparse linear regression (SPLINER) approach for efficient multidimensional uncertainty quantification of high-speed circuits,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 35, no. 10, pp. 1640–1652, 2016.
* [43] A. Kaintura, T. Dhaene, and D. Spina, “Review of polynomial chaos-based methods for uncertainty quantification in modern integrated circuits,” _Electronics_ , vol. 7, no. 3, p. 30, 2018.
* [44] A. Waqas, P. Manfredi, and D. Melati, “Performance variability analysis of photonic circuits with many correlated parameters,” _J. Light. Technol._ , 2021.
* [45] A. Waqas, D. Melati, P. Manfredi, and A. Melloni, “Stochastic process design kits for photonic circuits based on polynomial chaos augmented macro-modelling,” _Opt. Express_ , vol. 26, no. 5, pp. 5894–5907, 2018.
* [46] T.-W. Weng, Z. Zhang, Z. Su, Y. Marzouk, A. Melloni, and L. Daniel, “Uncertainty quantification of silicon photonic devices with correlated and non-Gaussian random parameters,” _Opt. Express_ , vol. 23, no. 4, pp. 4242–4254, 2015.
* [47] T.-W. Weng, D. Melati, A. Melloni, and L. Daniel, “Stochastic simulation and robust design optimization of integrated photonic filters,” _Nanophotonics_ , vol. 6, no. 1, pp. 299–308, 2017.
* [48] C. Cui, K. Liu, and Z. Zhang, “Chance-constrained and yield-aware optimization of photonic ICs with non-Gaussian correlated process variations,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , 2020.
* [49] A. Shapiro, D. Dentcheva, and A. Ruszczyński, _Lectures on stochastic programming: modeling and theory_. SIAM, 2014.
* [50] A. Mesbah, S. Streif, R. Findeisen, and R. D. Braatz, “Stochastic nonlinear model predictive control with probabilistic constraints,” in _Proc. Am. Control Conf._ , 2014, pp. 2413–2419.
* [51] M. P. Vitus, Z. Zhou, and C. J. Tomlin, “Stochastic control with uncertain parameters via chance constrained control,” _IEEE Trans. Autom. Control_ , vol. 61, no. 10, pp. 2892–2905, 2015.
* [52] Z. Wang, C. Shen, F. Liu, X. Wu, C.-C. Liu, and F. Gao, “Chance-constrained economic dispatch with non-Gaussian correlated wind power uncertainty,” _IEEE Trans. Power Syst._ , vol. 32, no. 6, pp. 4880–4893, 2017.
* [53] B. P. Van Parys, P. J. Goulart, and D. Kuhn, “Generalized Gauss inequalities via semidefinite programming,” _Math. Program._ , vol. 156, no. 1-2, pp. 271–302, 2016.
* [54] C. Feng, F. Dabbene, and C. M. Lagoa, “A kinship function approach to robust and probabilistic optimization under polynomial uncertainty,” _IEEE Trans. Autom. Control_ , vol. 56, no. 7, pp. 1509–1523, 2010.
* [55] G. C. Calafiore and L. El Ghaoui, “On distributionally robust chance-constrained linear programs,” _J. Optim. Theory Appl._ , vol. 130, no. 1, pp. 1–22, 2006.
* [56] D. Henrion, J.-B. Lasserre, and J. Löfberg, “Gloptipoly 3: moments, optimization and semidefinite programming,” _Optim. Methods Softw._ , vol. 24, no. 4-5, pp. 761–779, 2009.
* [57] G. H. Golub and J. H. Welsch, “Calculation of Gauss quadrature rules,” _Math. Comp._ , vol. 23, no. 106, pp. 221–230, 1969.
* [58] T. Gerstner and M. Griebel, “Numerical integration using sparse grids,” _Numer. Algorithms_ , vol. 18, no. 3, pp. 209–232, 1998.
* [59] J. Lofberg, “YALMIP : a toolbox for modeling and optimization in MATLAB,” in _Proc. Intl. Conf. Robot. Autom._ , 2004, pp. 284–289.
| arxiv-papers | 2021-07-27T04:42:41 | 2024-09-04T03:07:20.535696 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Zichang He, Zheng Zhang",
"submitter": "Zichang He",
"url": "https://arxiv.org/abs/2107.12593"
} |
2107.12600 | # PiSLTRc: Position-informed Sign Language Transformer with Content-aware
Convolution
Pan Xie, Mengyi Zhao, Xiaohui Hu Pan Xie and Mengyi Zhao are with the School
of Automation Science and Electrical Engineering, Beihang University, Beijing
100191, China (e-mail: [email protected], [email protected]).Xiaohui Hu is
with the Science and Technology on Integrated Information System Laboratory,
Institute of Software, Chinese Academy of Sciences, Beijing 100191, China
(e-mail: [email protected])
###### Abstract
Since the superiority of Transformer in learning long-term dependency, the
sign language Transformer model achieves remarkable progress in Sign Language
Recognition (SLR) and Translation (SLT). However, there are several issues
with the Transformer that prevent it from better sign language understanding.
The first issue is that the self-attention mechanism learns sign video
representation in a frame-wise manner, neglecting the temporal semantic
structure of sign gestures. Secondly, the attention mechanism with absolute
position encoding is direction and distance unaware, thus limiting its
ability. To address these issues, we propose a new model architecture, namely
PiSLTRc, with two distinctive characteristics: (i) content-aware and position-
aware convolution layers. Specifically, we explicitly select relevant features
using a novel content-aware neighborhood gathering method. Then we aggregate
these features with position-informed temporal convolution layers, thus
generating robust neighborhood-enhanced sign representation. (ii) injecting
the relative position information to the attention mechanism in the encoder,
decoder, and even encoder-decoder cross attention. Compared with the vanilla
Transformer model, our model performs consistently better on three large-scale
sign language benchmarks: PHOENIX-2014, PHOENIX-2014-T and CSL. Furthermore,
extensive experiments demonstrate that the proposed method achieves state-of-
the-art performance on translation quality with $+1.6$ BLEU improvements.
###### Index Terms:
sign language recognition, sign language translation, content-aware
neighborhood gathering, position-informed convolution, relative position
encoding.
## I Introduction
Sign language (SL) is a native language of people with disabled hearing. As a
visual language, it consists of various hand gestures, movements, facial
expressions, transitions, etc. Sign Language Recognition (SLR) and Translation
(SLT) aim at converting the video-based sign languages into sign gloss
sequences and spoken language sentences, respectively. Most previous works in
this field focus on continuous SLR with the gloss supervision [1, 2, 3, 4, 5,
6, 7, 8, 9, 10, 11, 12, 13], few attempts have been made for SLT [14, 15, 16,
17]. The main difference is that gloss labels are in the same order with sign
gestures, and thus the gloss annotations significantly ease the syntactic
alignment under the SLR methods. However, the word ordering rules in natural
language are distinct from their counterparts in video-based sign languages
[18]. Moreover, sign videos are composed of continuous sign gestures
represented by sub-video clips without explicit boundaries. Therefore,
directly learning the mapping between frame-wise signs and natural language
words is challenging.
To achieve better translation performance, a promising research line is to
perform joint sign language recognition and translation model, which
recognizing glosses and translating natural language sentences simultaneously
[14, 15]. By doing so, learning with the glosses supervision can better
understand sign videos and bring significant benefits to sign language
translation. Along this line, Camgzet et al. [15] proposes a joint model, Sign
Language Transformer (SLTR), which is based on vanilla Transformer [19]. They
learn recognition and translation simultaneously and achieve state-of-the-art
results due to the Transformer’s advantage in sequence modeling tasks.
However, there are still some inherent flaws that limit the capabilities of
the Transformer model when solving the SLR and SLT tasks:
* (a)
The self-attention mechanism aggregates temporal sign visual features in a
frame-wise manner. This mechanism neglects the temporal structure of sign
gestures represented by sub-videos, leading to substantial ambiguity in
recognition and translation.
* (b)
The attention mechanism is permutation-insensitive. Thus position encoding is
essential to inject position information for sequence learning, e.g., sign
video learning and sentence learning. However, the absolute position encoding
used in vanilla Sign Language Transformer (SLTR) [15] is demonstrated distance
and direction unaware [20, 21], thus limit its ability for better performance.
To remedy this first shortcoming (a), an intuitive idea is to gather
neighboring temporal features to enhance the frame-wise sign representation.
However, it is difficult to determine the boundaries of a sign gesture and
select the surrounding neighbors precisely. In this paper, we propose a
Content-aware and Position-aware Temporal Convolution (CPTcn) to learn robust
sign representations. We first propose a content-aware neighborhood gathering
method to adaptively select the surrounding neighbors. Specifically, we
leverage the local consistency of sign gestures. That is to say, adjacent
frames that belong to a sign gesture share similar semantics. Accordingly, we
dynamically select neighboring features based on the similarities. Then we
aggregate the selected features with temporal convolution layers. However,
temporal convolution with a limited receptive field is insufficient to capture
the position information of the features in the selected region [22]. To
alleviate the drawback, we inject position awareness into convolution layers
with Relative Position Encoding (RPE). By aggregating with neighboring similar
features, our CPTcn module obtains discriminative sign representations, thus
improving the recognition and translation results.
To solve the second issue (b), we inject relative position information into
the learning of sign videos and target sentences. Furthermore, we consider the
relative position between sign frames and target words. To the best of our
knowledge, we are the first trying to model the position relationship between
source sequence and target sequence in sequence-to-sequence architectures.
There are several existing methods to endow the self-attention mechanism with
relative position information [20, 23, 24, 25, 26]. In this paper, we adopt
the Disentangled Relative Position Encoding (DRPE) [24] in our video-based
sign language learning, target sentence learning, and their mapping learning.
Note that, different from RPE mentioned above, DRPE contains the correlations
between relative position and sign features, which is proven effective to
bring improvements [24, 27]. With the distance and direction awareness
learning from DRPE, our improved Transformer model learns better feature
representations, thus gaining significant improvements.
We call our approach PiSLTRc for ”Position-informed Sign Language TRansformer
with content-aware convolution”. The overview of our model can be seen in
Figure 1. The main technical contributions of our work are summarized as
follows:
* 1)
We propose a content-aware and position-aware CPTcn module to learn
neighborhood-enhanced sign features. Specifically, We first introduce a novel
neighborhood gathering method based on the semantic similarities. Then we
aggregate the selected features with position-informed temporal convolution
layers.
* 2)
We endow the Transformer model with relative position information. Compared
with absolute position encoding, relative position encoding performs better
for sign video and natural sentence learning. Furthermore, we are the first to
consider the relative position relationship between sign frames and target
words.
* 3)
Equipped with the proposed two techniques, our model achieves state-of-the-art
performance in translation accuracy on the largest public dataset RWTH-
PHOENIX-Weather 2014T. Also, we obtain significant improvements in recognition
accuracy compared with other RGB-based models on both PHOENIX-2014 and
PHOENIX-2014-T dataset.
The remainder of this paper is organized as follows. Section II reviews
related works in sign language and position encoding. Section III introduces
the architecture of our proposed PiSLTRc model. Section IV provides
implementation details on our model, presents a quantitative analysis that
provides some intuition as to why our proposed techniques work, and finally
presents the experimental results compared with several baseline models.
Figure 1: The overview of our sign language Transformer model equipped with
Content-aware and Position-aware Temporal Convolution (CPTcn) and Disentangled
Relative Position Encoding (DRPE).
## II Related Work
### II-A Sign Language Recognition
Most previous sign language works focus on continuous sign language
recognition (cSLR), which is a weakly supervised sequence labeling problem
[2]. cSLR aims at transcribing video-based sign language into gloss sequence.
With the released of larger-scale cSLR datasets [28], numerous researches
burst out implementing sign language recognition tasks in an end-to-end manner
[1, 2, 3, 6, 4, 5, 7, 8, 9, 10, 11, 12, 13]. The gloss annotations are in same
order with sign language, this monotonic relationship significantly ease the
syntactic alignment with the cSLR methods. However, the relationship between
gloss sequences and the spoken natural language is non-monotonic. Thus it is
infeasible to realize SLT with cSLR methods. Fortunately, the knowledge
learned by cSLR can be transferred to SLT models and facilitate their
performance.
### II-B Sign Language Translation
Sign language Translation (SLT) is much more challenging because the alignment
learning of frame-wise sign gestures and natural language words is difficult.
Camgz et al. [14] first introduce an end-to-end SLT model that uses
Convolution Neural Networks (CNNs) backbone to capture spatial feature and
utilizes attention-based encoder-decoder model [29] to learn the mapping of
sign videos and natural language sentences. Based on this work, Camgz et al.
[15] replace the sequence-to-sequence structure with Transformer architecture
[19] which is the state-to-the-art model in Neural Machine Translation (NMT)
area. Furthermore, they jointly learn the sign language recognition and
translation with a shared Transformer encoder and demonstrate that joint
training provides significant benefits. Our work is built upon their joint
sign language Transformer model, where we improve the Transformer with our
proposed CPTcn module and endow the Transformer model with relative position
information.
### II-C Position Encoding in Convolution
Temporal convolution neural network is a common method to model sequential
information [30, 31, 32, 33]. Convolution layer is demonstrated implicitly to
learn absolute position information from the commonly used padding operation
[22]. However, it is insufficient to learn powerful representations that
encode sequential information, especially with the limited receptive field.
Explicitly encoding absolute position information is shown effective to learn
image features [22]. Upon their hypothesis, we apply relative position
encoding (RPE) to the temporal convolution layers, aiming to model the
positional correlations between the current feature and its surrounding
neighbors.
### II-D Position Encoding in Self-attention
Transformer entirely relies on the attention mechanism, which does not
explicitly model the position information. To remedy the drawback, the
sinusoidal absolute position encoding [19] and learnable absolute position
encoding [34] are proposed to endow their model with position information.
Afterward, relative position encoding is proposed to model long sequence [27]
and provides the model with relation awareness [21, 20]. In our work, we reuse
the disentangled position encoding [24] to exploit the distance and direction
awareness with relative position encoding. Moreover, we also explore the
position relationship between sign video and target sentence. Note that,
different from RPE in convolution, DRPE in attention mechanism considers the
relationship between content and position feature, which is demonstrated
effective in previous works [27, 24]. Our experiments indicated that the
relative position information is vital for sequence-to-sequence mapping
learning.
Figure 2: Vanilla self-attention and self-attention equipped with Content-
aware and Position-aware Temporal Convolution (CPTcn). Where neighborhood
gathering denotes selecting adjacent relevant features in a contiguous local
region, TCNs denote stacked temporal convolution layers.
## III Method
### III-A Preliminaries and Model Overview
Figure 1 illustrates the overall architecture of our proposed model, which
jointly learns to recognize and translate sign videos into gloss annotations
and spoken language sentences. In the following subsections, we will first
revisit the sign language Transformer structure and then give detailed
descriptions about our proposed two methods: content-aware and position-aware
temporal convolution (CPTcn), and self-attention with disentangled relative
position encoding (DRPE).
### III-B Joint Sign Language Transformer Structure
Given a series of video frames, the vanilla sign language Transformer (SLTR)
model firstly adopts a CNN backbone to extract frame-wise spatial features and
uses a word embedding to transfer one-hot natural language words into dense
vectors. Then a Transformer-based encoder-decoder model is utilized to learn
SLR and SLT simultaneously. For SLR, the encoder output learned temporal sign
features. A Connectionist Temporal Classification (CTC) [35] loss is applied
to learn the mapping of gloss annotations and sign features. For SLT, the
decoder output decomposes sequence level conditional probabilities in an
autoregressive manner and then calculates the cross-entropy loss for each
word. Meanwhile, the learning of SLR and SLT share the Transformer encoder.
Vanilla Transformer is a sequence-to-sequence structure, which consists of
several Transformer blocks. Each block contains a multi-head self-attention
and a fully feed-forward network. Given a feature sequence $F\in R^{M\times
d}$ with $M$ frames, taking single-head attention as an example, the standard
self-attention can be formulated as:
$\displaystyle Q=FW_{\\_}q,K=FW_{\\_}k,V=FW_{\\_}v,$ (1) $\displaystyle
S=QK^{T},$
$\displaystyle\text{Attn}(Q,K,V)=\textup{softmax}(\dfrac{S}{\sqrt{d}})V,$
$\displaystyle
a_{\\_}{ij}=\dfrac{exp(s_{\\_}{ij}/\sqrt{d})}{\sum_{\\_}{j^{\prime}}exp(s_{\\_}{ij^{\prime}}/\sqrt{d})}$
where $W_{\\_}q,W_{\\_}k,W_{\\_}v\in R^{d\times d}$ represents projection
matrices. $S\in R^{M\times M}$ represents the similarity computed by query
$Q\in R^{M\times d}$ and key $K\in R^{M\times d}$. $a_{\\_}{ij}$ represent the
normalized attention weights respectively.
Our work concentrates on improving the self-attention mechanism to understand
sign video and target sentences better. To focus on our main contributions, we
omit the detailed architecture and refer readers to [19] for reference.
### III-C Content-aware and Position-aware Temporal Convolution
As shown in Figure 2, we propose content-aware and position-aware temporal
convolution (CPTcn) to learn local temporal semantics, aiming at obtaining
more discriminative sign representations. In this section, we first introduce
a content-aware neighborhood gathering method, which adaptively selects
surrounding neighbors. Secondly, we elaborate on the detail of endowing the
temporal convolution with relative position information, which models the
relationship between surrounding features and the current feature. Finally, we
incorporate the proposed CPTcn module with the self-attention mechanism.
Figure 3: Our proposed content-aware neighborhood gathering method, compared
with the centered neighborhood gathering method.
#### III-C1 Content-aware neighborhood gathering Method
In sign videos, we observe that each sign gesture usually lasts about
0.5$\sim$0.6 seconds ($\sim$16 frames). However, the vanilla Sign Language
Transformer (SLTR) model aggregates sign features in a frame-wise manner, thus
neglecting the local temporal structure of sign gestures. Unlike their work,
we develop a content-aware neighborhood gathering method to adaptively select
the relevant surrounding features, which are around a specific feature and in
a contiguous region. Shown as Figure 3, we obtain the clip-level feature with
neighboring features via three steps:
1). Given the sequential representations
$F=\\{f_{\\_}1,f_{\\_}2,...,f_{\\_}M\\}$ from the CNN backbone model, we apply
outer tensor product to get a similarity matrix $s\in R^{M\times M}$:
$\displaystyle s=\frac{FF^{T}}{\sqrt{d}}$ (2)
where the diagonal elements in $s$ represent similarities towards the features
themselves.
2). To ensure neighbors are going to be selected instead of the far-away ones,
we only consider a range $[t-l,t+l]$ for a specific feature
$f_{\\_}t\in{R^{d}}$ to keep local semantic consistency. Then we replace the
similarity scores with -inf outside this range and at the current feature.
Mathematically, the selecting criterion for $f_{\\_}t$ becomes as:
$\displaystyle
s_{\\_}{t,j}=\begin{cases}s_{\\_}{t,j},&\text{$j\in[\max(0,t-l),t)$ \&
$(t,\min(t+l,M)]$}\\\ -inf,&\text{others}\end{cases}$ (3)
where $l$ represents the maximum distance among the considering features from
the current feature. Then we apply the softmax function to obtain the masked
distribution $d^{t}\in R^{M}$ in the local region around the current feature
$f_{\\_}t$:
$d_{\\_}{t}=\text{softmax}(s_{\\_}{t})$ (4)
Note that the weight at the current feature is zero, thus the summation of the
weights before and after the current feature is 1.
3). It is hard to determine the size and boundaries of the local region.
Fortunately, the normalized distribution of similarities obtained in Equation
4 indicates the location of similar neighbors. Therefore, we use the weights
of the normalized distribution before and after the current feature to
adaptively determine the size of the selected region. Respectively, we define
the size before and after the current feature with $l_{\\_}{-}$ and
$l_{\\_}{+}$:
$\displaystyle l_{\\_}{-}=\gamma\sum d_{\\_}{t,j}\cdot l$
$\displaystyle,\quad\text{$\max(0,t-l)\leq j<t$}$ (5) $\displaystyle
l_{\\_}{+}=\gamma\sum d_{\\_}{t,j}\cdot l$
$\displaystyle,\quad\text{$t<j\leq\min(t+l,M)$}$ $\displaystyle
l_{\\_}r=l_{\\_}{-}$ $\displaystyle+l_{\\_}{+}=\gamma\cdot l$
where $\gamma$ is a hyperparameter to control the size of selected region, and
the size of the region is $l_{\\_}r$. We define the final selected contiguous
region as $LSR_{\\_}t$ (Locally Similar Region) for a specific feature
${f_{\\_}t}$:
$\displaystyle\text{LSR}_{\\_}t=\\{f_{\\_}{t-l_{\\_}{-}},..,f_{\\_}t,...,f_{\\_}{t+l_{\\_}{+}}\\}$
(6)
Finally, we adaptively obtain the clip-level features which are in a
contiguous local region:
$\displaystyle f_{\\_}{t}^{r}=\mathcal{F}_{\\_}{CNG}(f_{\\_}t,LSR_{\\_}t)$ (7)
where $\mathcal{F}_{\\_}{CNG}$ denotes the content-aware neighborhood
gathering method, and $f_{\\_}t^{r}\in R^{l_{\\_}r\times d}$ denotes the
current feature $f_{\\_}t$ with its $l_{\\_}r$ surrounding neighbors. The
clip-level features with temporal surrounding neighbors can be computed using
Algorithm 1.
Algorithm 1 Content-aware neighborhood gathering Method.
1:Frame-wise spatial feature $F\in R^{M\times d}$ from CNN backbone;
2:Clip-level features $F^{r}\in R^{M\times l_{\\_}r\times d}$;
3:$s=\frac{1}{\sqrt{d}}ff^{T}$;
4:$s=\text{localmask}(s,l-1,-\text{inf})$;
5:$s=\text{diagonalmask}(s,-\text{inf})$;
6:$a=\text{softmax}(s,\text{dim}=-1)$;
7:$F^{r}=[]$
8:for $t=0,...,M-1$ do
9: $l_{\\_}{-}=sum(a[max(0,t-l):t])*l*\gamma$
10: $l_{\\_}{+}=sum(a[t,t+1:min(t+l,M)])*l*\gamma$
11: $\text{inds}=[t-l_{\\_}{-},..,t,..,t+l_{\\_}{+}]$
12: $\text{neighbors}=\text{indexselect}(f_{\\_}{t},\text{inds})$
13: $F^{r}\text{ append neighbors}$
14:end for
15:$\text{concatenate}(F^{r},\text{dim}=0)$
16:return $F^{r}$;
#### III-C2 Position-aware Temporal Convolution
Temporal convolution is a common method to aggregate sequential features.
However, convolution layers with a limited receptive field are insufficient to
capture the position information [22], which is important for sign gesture
understanding. More specifically, the recognition of sign language is
sensitive to the frame order. Absolute position encoding used in previous
methods [15, 16] is a promising approach to encode position information.
However, it is demonstrated direction- and distance-unaware [21]. Inspired by
recent work on language modelling [25], we infuse relative position
information to the clip-level feature. We first compute the relative position
matrix $R\in R^{M\times l_{\\_}r}$ between the frame-wise feature and the
current feature:
$\displaystyle R_{\\_}{t,p}=p-t,\quad\text{$t\in[0,M-1]$,
$p\in(t-l_{\\_}{-},t+l_{\\_}{+}]$}.$ (8)
Then we represent the relative position indices in learnable embedding space,
and obtain the position embeddings $\Phi_{\\_}{rpe}\in R^{M\times
l_{\\_}r\times d}$. Adding $\Phi_{\\_}{rpe}$ to clip-level features $F^{r}$,
resulting in position-informed clip-level representation:
$\displaystyle\hat{F^{r}}=F^{r}+\Phi_{\\_}{rpe}.$ (9)
Lastly, we aggregate the clip-level features with position information to
compressed features $F_{\\_}{ag}\in R^{M\times d}$, and apply a residual
function:
$\displaystyle
F_{\\_}{ag}=\text{MaxPool}(\text{Relu}(\text{LN}(\text{Conv1d}(\hat{F^{r}}))))+F$
(10)
where LN represents the Layer Normalization [36]. Conv1d(·) performs a 1-D
convolution filter on time dimension with Relu(·) activation function. As
shown in Figure 2, we use two layers of such a network, which is omitted here
for readability.
#### III-C3 Self-attention with CPTcn
Similar to the vanilla Transformer model, we feed the aggregated feature
$F_{\\_}{ag}$ to the self-attention mechanism. Note that, as shown in Figure
2, we only set $K=V=F_{\\_}{ag}$, and keep $Q$ as original frame-wise
representation $F$. The reason for this design is to maintain the difference
within adjacent features in $Q$. Experimental result demonstrates that this
network design performs better than $Q=K=V=F_{\\_}{ag}$.
### III-D Self-Attention with DRPE
As shown in Figure 1, we further inject relative position information into the
attention mechanism for sign video learning, target sentence learning, and
mapping learning between them. Most existing approaches for endowing the
attention mechanism relative position information are based on pairwise
distance [20]. They have been explored in machine translation [20], music
generation [37] and language modelling [23, 24]. Here, we propose a
disentangled relative position encoding (DRPE) [24].
Different from RPE used in Section III-C2, DRPE considers the correlations
between relative positions and content features, which are proven that
improving the performance [24, 27]. Specifically, we separate the content
features and relative position encoding to compute attention weights. The
first line of projection in Equation 1 is reparameterized as:
$\displaystyle
Q_{\\_}f=FW_{\\_}{q,c},K_{\\_}f=FW_{\\_}{k,c},V_{\\_}f=FW_{\\_}{v,c}$ (11)
$\displaystyle Q_{\\_}p=PW_{\\_}{q,p},K_{\\_}p=PW_{\\_}{k,p}$
where $F\in R^{M\times d}$ represent the content feature.
$Q_{\\_}f,K_{\\_}f,V_{\\_}f\in R^{M\times d}$ represent query, key and value
content vectors which are obtained with projection matrices
$W_{\\_}{q,c},W_{\\_}{k,c},W_{\\_}{v,c}\in R^{d\times d}$. $P\in
R^{2\mathcal{L}\times d}$ represents created learned relative position
embedding, where $\mathcal{L}$ is the max relative distance.
$Q_{\\_}p,K_{\\_}p\in R^{2\mathcal{L}\times d}$ represent the projected
position embedding with projection matrices $W_{\\_}{q,p},W_{\\_}{k,p}\in
R^{d\times d}$, respectively.
Following this, we generate the attention weights with the relative position
bias. The calculation of pairwise content-content is in the same way as
standard self-attention, thereby generating the content-based content vector.
While the calculation of pairwise content-position is different from standard
self-attention. We first create a relative position distance matrix
$R^{rel}\in R^{M\times M}$, and then generate the position-based content
vectors. The $2\sim 4$ lines of computing attention weights in Equation 1 are
reparameterized as:
$\displaystyle s_{\\_}{i,j}^{rel}=$
$\displaystyle\\{Q_{\\_}{f,i},{\color[rgb]{0,0,1}Q_{\\_}pR^{rel}_{\\_}{i-j}}\\}\times\\{K_{\\_}{f,j},{\color[rgb]{0,0,1}K_{\\_}pR^{rel}_{\\_}{j-i}}\\}^{T}$
(12) $\displaystyle=$
$\displaystyle\begin{matrix}\underbrace{Q_{\\_}{f,i}K_{\\_}{f,j}^{T}}\\\
\textit{c2c}\end{matrix}+\begin{matrix}\underbrace{Q_{\\_}{f,i}{\color[rgb]{0,0,1}{K_{\\_}p}^{T}{R^{rel}_{\\_}{j-i}}^{T}}}\\\
\textit{c2p}\end{matrix}+\begin{matrix}\underbrace{{\color[rgb]{0,0,1}Q_{\\_}pR^{rel}_{\\_}{i-j}}K_{\\_}{f,j}^{T}}\\\
\textit{p2c}\end{matrix}+$
$\displaystyle\begin{matrix}\underbrace{{\color[rgb]{0,0,1}Q_{\\_}pR^{rel}_{\\_}{i-j}{K_{\\_}p}^{T}{R^{rel}_{\\_}{j-i}}^{T}}}\\\
\textit{p2p}\end{matrix}$ $\displaystyle\textup{Attn}($ $\displaystyle
Q_{\\_}f,K_{\\_}f,V_{\\_}f,{\color[rgb]{0,0,1}Q_{\\_}pR^{rel}_{\\_}{q-k}},{\color[rgb]{0,0,1}K_{\\_}pR^{rel}_{\\_}{k-q}})=\textup{softmax}(\dfrac{S^{rel}}{\sqrt{4d}})V_{\\_}f,$
$\displaystyle a_{\\_}{ij}=$
$\displaystyle\dfrac{exp(s^{rel}_{\\_}{ij}/\sqrt{4d})}{\sum_{\\_}{j^{\prime}}exp(s^{rel}_{\\_}{ij^{\prime}}/\sqrt{4d})}$
where $S^{rel}\in R^{M\times M}$ represents the unnormalized attention score
matrix and $s^{rel}_{\\_}{ij}$ represents the score computed by query at
position $i$ and key at the position $j$. $R^{rel}_{\\_}{q-k}\in R^{M\times
M}$ represents the relative distance matrix computed by the positions of query
and key. $R^{rel}_{\\_}{i-j}$ lies in the $(i,j)$-th of $R^{rel}_{\\_}{q-k}$,
and represents the relative distance between $i$-th query and $j$-th key.
$R^{rel}_{\\_}{k-q}\in R^{M\times M}$ and $R^{rel}_{\\_}{j-i}$ are computed in
similar ways. Note that $R^{rel}_{\\_}{i-j}$ and $R^{rel}_{\\_}{j-i}$ are
opposite numbers thus providing our model with directional information.
Moreover, in the first line of the above equation, the first item $c2c$
represents content-to-content which is the content-based content vectors. The
second and third item $c2p$ and $p2c$ represent content-to-position and
position-to-content respectively, which are relative position based content
vectors. $p2p$ represents position-to-position which is omitted in vanilla
DRPE [24]. However, in our experiments, we find that $p2p$ bring improvements
to our performance in both recognition and translation. Therefore, we keep
this item of position-to-position. In Section IV-C3, we analyze the impact of
different item in the first line of Equation 12.
Preceding this, in the last two lines, we apply softmax function and scaling
factor $\frac{1}{\sqrt{4d}}$ to get normalized scaled attention weights.
Totally, there are two differences between the DRPE method applied in our
architecture and DeBERTa [24]. The first is that we consider the position-to-
position information, which is omitted in DeBERTa. Experimental results in
Table V show the effectiveness of this item. The second difference is that
DRPE is used in text-only in DeBERTa for language modeling. However, in our
proposed model, as seen in Figure 1, we apply the relative position method in
text-only target sentence learning, image-only sign video learning, and even
the cross-modal video sequence and target sentence interaction. Experimental
results in Table IV show the effectiveness of our improvements. Note that we
are the first to consider the relative position relationship between sign
frames and target words.
In summary, equipping with the CPTcn module and DRPE in self-attention layers,
the heart module in the Transformer model, we finally arrive at our proposed
PiSLTRc model.
## IV Experiments
### IV-A Dataset and Metrics
We evaluate our method on three datasets, including PHOENIX-2014 [28],
PHOENIX-2014-T [14] and Chinese Sign Language (CSL)[38].
PHOENIX-2014 is a publicly available German Sign Language dataset, which is
the most popular benchmark for continuous SLR. The corpus was recorded from
broadcast news about weather. It contains videos of 9 different signers with a
vocabulary size of 1295. The split of videos for Train, Dev, and Test is 5672,
540, and 629, respectively.
PHOENIX-2014-T is the benchmark dataset of sign language recognition and
translation. It is an extension of the PHOENIX14 dataset [28]. Parallel sign
language videos, gloss annotations, and spoken language translations are
available in PHOENIX14T, which makes it feasible to learn SLR and SLT tasks
jointly. The corpus is curated from a public television broadcast in Germany,
where all signers wear dark clothes and perform sign language in front of a
clean background. Specifically, the corpus contains 7096 training samples
(with 1066 different sign glosses in gloss annotations and 2887 words in
German spoken language translations), 519 validation samples, and 642 test
samples.
CSL is a Chinese Sign Language dataset, which is also a widely used benchmark
for continuous SLR. These videos were recorded in a laboratory environment,
using a Microsoft Kinect camera with a resolution of 1280 × 720 and a frame
rate of 30 FPS. In this corpus, there are 100 sentences, and each sentence is
signed five times by 50 signers (in total 2,500 videos). As no official split
is provided, we split the dataset by ourselves. We give 20,000 and 5,000
samples to the training set and testing set, respectively. When splitting the
dataset, we ensure that the sentences in the training and testing sets are the
same, but the signers are different.
We evaluate our model on the performance of SLR and SLT as following [14]:
Sign2gloss aims to transcribe sign language videos to sign glosses. It is
evaluated using word error rate (WER), which is a widely used metric for cSLR:
$\displaystyle\text{WER}=\dfrac{\\#\text{substitution}+\\#\text{deletion}+\\#\text{insertion}}{\\#\text{words
in reference}}$ (13)
Sign2text aims to directly translate sign language videos to spoken language
translation without intermediary representation. It is evaluated using BLEU
[39] which is widely used for machine translation.
Sign2(gloss+text) aims to jointly learn continuous SLR and SLT simultaneously.
This approach is currently state-of-the-art in the performance of SLT since
the training of cSLR brings benefits for sign video understanding, thus
improving the performance of translation.
### IV-B Implementation and Evaluation Details
#### IV-B1 Network Details
Like Camgz et al. [15], we extract frame-wise spatial sign features with CNN
backbone from CNN-LSTM-HMM [2]. Then we apply the improved Transformer network
to learn SLR and SLT simultaneously. Its setting used in our experiments is
based on Camgz et al. [15]. Specifically, we use 512 hidden units, 8 heads, 6
layers, and 0.1 dropout rate.
In our proposed CPTcn model, the size of the select contiguous local similar
region $l_{\\_}r$ is set to be 16 (about 0.5-0.6 seconds), which is the
average time needed for completing a gloss. We analyze the impact of the size
in Section IV-C1.
The setting of two temporal convolution layers is F3-S1-P0-F3-S1-P0, where F,
S, P denote the kernel filter size, stride, and padding size, respectively.
The analysis of different modules of the position-informed convolution is
concluded in Section IV-C2.
In the self-attention and cross-attention mechanism, we apply DRPE to inject
relative position information. We set the max relative distance $\mathcal{L}$
to be 32 in our experiments. The analysis of the DRPE is conduct in Section
IV-C3.
Besides, we train the SLR and SLT simultaneously. Thus we set $\lambda_{\\_}R$
and $\lambda_{\\_}T$ as the weight of recognition loss and translation loss.
#### IV-B2 Training
We use the Adam optimizer [40] to optimize our model. We adopt the warmup
schedule for learning rate that increases the learning rate from 0 to 6.8e-4
within the first 4000 warmup steps and gradually decay it with respect to the
inverse square root of training steps. We train the model on 1 NVIDIA TITAN
RTX GPU, and use 5 checkpoints averaging for the final results.
#### IV-B3 Decoding
During inference, we adopt CTC beam search decoder with a beam size of 5 for
SLR decoding. Meanwhile, we also utilize the beam search with the width of 5
for SLT decoding, and we apply a length penalty [41] with $\alpha$ values
ranging from 0 to 2.
### IV-C Ablation Study
TABLE I: Evaluation of different neighborhood gathering method on
PHOENIX-2014-T. ”NG” is the abbreviation of neighborhood gathering.
NG method | SLR(WER) | SLT(BLEU-4)
---|---|---
DEV | TEST | DEV | TEST
w/o NG | 24.23 | 24.92 | 20.54 | 20.80
Centered NG ($l_{\\_}r=16$) | 23.64 | 24.17 | 20.73 | 21.23
Sparse NG ($l_{\\_}r=16$) | 23.06 | 23.52 | 21.83 | 22.08
Content-aware NG ($l_{\\_}r=16$) | 22.23 | 23.01 | 23.17 | 23.40
TABLE II: Evaluation of the size of the selected local similar region on
PHOENIX-2014-T.
Size of LSR | SLR(WER) | SLT(BLEU-4)
---|---|---
DEV | TEST | DEV | TEST
$l_{\\_}r=8$ | 22.85 | 23.85 | 22.30 | 22.99
$l_{\\_}r=12$ | 22.52 | 23.62 | 22.31 | 23.51
$l_{\\_}r=16$ | 22.23 | 23.01 | 23.17 | 23.40
$l_{\\_}r=20$ | 23.02 | 23.74 | 22.85 | 22.86
#### IV-C1 Analysis of content-aware neighborhood gathering method
In our proposed CPTcn module, we introduce a content-aware neighborhood
gathering method to select the relevant surrounding neighbors dynamically.
Three potential concerns with using this method are: 1) How many improvements
does the content-aware method bring? 2) Must be the selected features
contiguous in position? 3) What is the appropriate size of the selected
region?
In Table I, we compared three methods to verify the first two questions: the
essential of whether the selected region is content-aware and contiguous. For
notation, w/o NG means no neighborhood gathering method. Centered NG means
directly to select k features centered around the current feature. Sparse NG
means dynamically selecting k features with the highest similarity, which may
be discontinuous in position. Content-aware NG means to select k contiguous
features adaptively based on similarity using our proposed content-aware
segmentation method. We can see those neighborhood gathering methods
effectively improve the performance. Sparse NG substantially outperforms
Centered NG. This gap suggests that the content-aware method is critical for
feature selecting. Moreover, Content-aware NG performs better than other
methods. This indicates that our content-aware contiguous feature aggregation
is more suitable for capturing sign gesture representation.
In Table II, we explore the appropriate size of the select local similar
region (LSR). The performance of our model performs best when the size of LSR
is 16. This is consistent with the finding that the 16-frame (about 0.5-0.6
seconds) is the average time needed for completing a gloss. Besides, by
gathering the larger width regions (for example, 20 frames), we observed
slight performance degradation. This is because 20 frames (about 1 second)
usually contain more than one gesture and thus lower the performance.
TABLE III: Evaluation of different model in CPTcn module on PHOENIX-2014-T.
”PE” denotes position encoding. ”APE” denotes absolute position encoding.
module in CPTcn | SLR (WER) | SLT (BLEU-4)
---|---|---
DEV | TEST | DEV | TEST
w/o PE | 23.44 | 24.03 | 21.15 | 21.47
w/ APE | 22.89 | 23.47 | 21.89 | 22.18
w/ RPE | 22.23 | 23.01 | 23.17 | 23.40
w/o Redisual | 24.19 | 25.31 | 20.78 | 20.36
w/o LN | 23.01 | 23.72 | 21.99 | 21.57
CPTcn | 22.23 | 23.01 | 23.17 | 23.40
#### IV-C2 Analysis of position-aware Temporal Convolution
In the first two lines in Table III, we study the relative position encoding
in the CPTcn module. Experimental results show that position information is
crucial for aggregating the sequential features. Furthermore, compared with
absolute position encoding (APE), relative position encoding (RPE) bring
improvements with $+1.22$ BLEU scores and $-0.46\%$ WER score on the test
dataset. The result supports the conjecture of Yan et. al. [21] that RPE
provides direction and distance awareness for sequence modeling compared with
APE method.
Moreover, we explore the network design of the temporal feature aggregator
method in the $3\sim 4$ lines in Table III. Experiments show that residual
connection is essential. And Layer normalization is effective for sequential
feature modeling.
Figure 4: Qualitative recognition results of our proposed modules from Dev set
(D: delete, I: insert, S: substitute).
#### IV-C3 Analysis of DRPE in self-attention
We further conduct comparative experiments to analyze the effectiveness of
disentangle relative position encoding (DRPE) in the attention mechanism. As
shown in Figure 1, we replace absolute position encoding (APE) with DRPE in
three places: encoder self-attention, decoder self-attention, and encoder-
decoder cross attention. For notation, in Table IV, ”Enc-SA” means self-
attention in the encoder module. ”Dec-SA” means self-attention in the decoder
module. ”Enc-Dec-CA” means cross attention between encoder and decoder. In the
$1\sim 4$ lines of Table IV, we can see that the DRPE method used in the
encoder and decoder all brings significant improvements. This further
demonstrates that relative position encoding provides the direction and
distance awareness for sequence representation learning. In addition, we find
that the performance of DRPE used only in the encoder is better than that of
DRPE used only in the decoder. This phenomenon suggests that direction and
distance information are more critical for sign video learning than sentence
representation learning.
TABLE IV: Analysis of DRPE in encoder self-attention and decoder self-
attention.”SA” is the abbreviation of self-attention. ”CA” means the cross-
attention of encoder-decoder.
Method | SLR (WER) | SLT (BLEU-4)
---|---|---
DEV | TEST | DEV | TEST
w/ APE | 25.36 | 25.27 | 20.12 | 20.39
Enc-SA w/ DRPE | 22.89 | 23.76 | 22.35 | 22.47
Dec-SA w/ DRPE | 23.29 | 23.84 | 21.89 | 21.27
Enc-SA & Dec-SA w/ DRPE | 22.54 | 22.89 | 22.78 | 22.90
Enc-Dec-CA w/ DRPE | 23.74 | 23.93 | 21.59 | 21.41
All w/ DRPE | 22.23 | 23.01 | 23.17 | 23.40
TABLE V: Analysis of different item in DRPE. ”c2c” denotes content-to-content,
”c2p” denotes content-to-position, ”p2c” denotes position-to-content, and
”p2p” denotes position-to-position.
Item in DRPE | SLR (WER) | SLT (BLEU-4)
---|---|---
DEV | TEST | DEV | TEST
c2c only | 25.79 | 25.85 | 20.03 | 20.18
\+ c2p & p2c | 22.57 | 23.26 | 22.84 | 22.79
\+ p2p | 22.23 | 23.01 | 23.17 | 23.40
As we move to the fourth line in Table IV, the results show that DRPE in
encoder-decoder attention also increases the performance. This phenomenon
shows that even if the order of the word in the natural language is
inconsistent with the sign language gloss, the relative position information
still benefits their mapping learning.
Different from DRPE used in DeBERTa [24], we further explore the effectiveness
of different items mentioned in Equation 12 in our task. Experimental results
are shown in Table V, the correlations between content and position feature
bring significant improvement. Moreover, the position-to-position item also
benefits our model. This result is consistent with the conclusion in Ke et al.
[26]. Accordingly, we adopt these four items in our disentangled relative
position encoding.
TABLE VI: Qualitative results with different methods on SLT task.
GT: | in der nacht sinken die temperaturen auf vierzehn bis sieben grad .
---|---
| (at night the temperatures drop to fourteen to seven degrees .)
SLTR: | heute nacht werte zwischen sieben und sieben grad .
| (tonight values between seven and seven degrees .)
PiSLTRc: | heute nacht kühlt es ab auf vierzehn bis sieben grad .
| (tonight it’s cooling down to fourteen to seven degrees .)
GT: | an der saar heute nacht milde sechzehn an der elbe teilweise nur acht grad .
| (on the saar tonight a mild sixteen on the elbe sometimes only eight degrees
.)
SLTR: | südlich der donau morgen nur zwölf am oberrhein bis zu acht grad .
| (south of the danube tomorrow only twelve on the upper rhine up to eight
degrees .)
PiSLTRc: | am oberrhein heute nacht bis zwölf am niederrhein nur kühle acht grad .
| (on the upper rhine tonight until twelve on the lower rhine only a cool
eight degrees .)
GT: | am tag von schleswig holstein bis nach vorpommern und zunächst auch in brandenburg gebietsweise länger andauernder regen .
| (In the south, denser clouds sometimes appear, otherwise it is partly clear
or only slightly cloudy .)
SLTR: | am mittwoch in schleswig holstein nicht viel regen .
| (not much rain on wednesday in schleswig holstein .)
PiSLTRc: | am donnerstag erreicht uns dann morgen den ganzen tag über brandenburg bis zum teil dauerregen .
| (on thursday we will reach us tomorrow the whole day over brandenburg until
partly constant rain.)
GT: | im süden gibt es zu beginn der nacht noch wolken die hier und da auch noch ein paar tropfen fallen lassen sonst ist es meist klar oder nur locker bewölkt .
| (In the south there are still clouds at the beginning of the night that drop
a few drops here and there, otherwise it is mostly clear or only slightly
cloudy .)
SLTR: | im süden tauchen im süden teilweise dichtere wolken auf sonst ist es verbreitet klar .
| (in the south there are sometimes denser clouds in the south otherwise it is
widely clear .)
PiSLTRc: | im süden tauchen auch mal dichtere wolken auf sonst ist es gebietsweise klar oder nur locker bewölkt .
| (In the south, denser clouds sometimes appear, otherwise it is partly clear
or only slightly cloudy .)
TABLE VII: The evaluation results on sign2gloss task on PHOENIX-2014-T
dataset.
sign2gloss | DEV | TEST
---|---|---
Model | del/ins | WER | del/ins | WER
DNF [6] | 5.9/3.0 | 22.7 | 6.8/2.9 | 23.4
CNN+LSTM+HMM [2] | - | 24.5 | - | 26.5
SLTR-R [15] | - | 24.9 | - | 24.6
FCN [10] | 6.5/3.2 | 22.9 | 5.8/4.7 | 23.7
STMC (RGB) [12] | - | 25.0 | - | -
PiSLTRc-R (ours) | 4.9/4.2 | 21.8 | 5.1/4.4 | 22.9
TABLE VIII: The evaluation results on sign2gloss task on PHOENIX-2014 dataset.
sign2gloss | DEV | TEST
---|---|---
Model | del/ins | WER | del/ins | WER
DeepHand [1] | 16.3/4.6 | 47.1 | 15.2/4.6 | 45.1
DeepSign [42] | 12.6/5.1 | 38.3 | 11.1/5.7 | 38.8
SubUNets [11] | 14.6/4.0 | 40.8 | 14.3/4.0 | 40.7
Staged-Opt [3] | 13.7/7.3 | 39.4 | 12.2/7.5 | 38.7
Re-Sign [43] | - | 27.1 | - | 26.8
DNF [6] | 7.8/3.5 | 23.8 | 7.8/3.4 | 24.4
CNN-LSTM-HMM [2] | - | 26.0 | - | 26.0
FCN [10] | - | 23.7 | - | 23.9
STMC (RGB) [12] | - | 25.0 | - | -
SBD-RL [44] | 9.9/5.6 | 28.6 | 8.9/5.1 | 28.6
SLTR-R(our implementation) | 8.9/4.2 | 24.5 | 9.0/4.3 | 24.6
PiSLTRc-R (ours) | 8.1/3.4 | 23.4 | 7.6/3.3 | 23.2
#### IV-C4 Qualitative Analysis on SLR
In Figure 4, we show two examples with different methods on the SLR task.
Equipped with proposed approaches, our PiSLTRc model learns accurate sign
gesture recognition and thus achieving significant improvements. Furthermore,
we find that the model trained based on CTC loss function tends to predict
”peak” on the continuous gestures. And our proposed CPTcn model is adequate to
alleviate this situation. As shown in Figure 4, the recognition of adjacent
frames in a contiguous region is more precise.
#### IV-C5 Qualitative Analysis on SLT
In Table VI, we show several examples with different models on the SLT task.
Compared with the vanilla SLTR model [15], our proposed PiSLTRc produces
target sentences with higher quality and accuracy.
Comparing the translation results of the first example as illustrated in Table
VI, we see that ”vierzehn (fourteen)” is mistranslated as ”sieben (seven)” in
SLRT model. However, it is correctly translated in our PiSLTRc model. As we
move to the second example in this table, we see that ”heute nacht (tonight)”
is mistranslated as ”morgen (tomorrow)” in SLRT model, and it is correctly in
our PiSLTRc model. To sum up, specific numbers and named entities are
challenging since there is no grammatical context to distinguish one from
another. However, in these two examples, we see that our model translates
specific numbers and named entities more precisely. This demonstrates that our
proposed model has a stronger ability to understand sign videos.
When we move to the third and fourth example in the Table VI, we see that our
model generate complete sentence with less under-translation. For example, in
the third example, ”gebietsweise länger andauernder regen (rain lasting longer
in some areas)” is under-translated in SLTR model, while it is correctly
translated as ”bis zum teil dauerregen (partly constant rain)” in our PiSLTRc
model.
In summary, our proposed model performs better than the previous SLTR model
when facing the specifical numbers and name entities, which are challenging to
translate since there is no grammatical context to distinguish one from
another. Moreover, the sentences produced follow standard grammar.
Nevertheless, it may be improved on the translation quality of the long
sentences in the future.
#### IV-C6 Limitation
We leverage neighboring similar features to enhance sign representation. The
selected features are in a fixed-size region. This is not consistent with the
characteristics of sign language. That is to say, the number of frames
corresponding to different sign gestures is dynamic.
TABLE IX: The evaluation results on sign2text task on on Phoenix2014T dataset.
sign2text | DEV | TEST
---|---|---
Model | ROUGE | BLEU-1 | BLEU-2 | BLEU-3 | BLEU-4 | ROUGE | BLEU-1 | BLEU-2 | BLEU-3 | BLEU-4
RNN-based[14] | 31.80 | 31.87 | 19.11 | 13.16 | 9.94 | 31.80 | 32.24 | 19.03 | 12.83 | 9.58
TSPnet [16] | - | - | - | - | - | 34.96 | 36.10 | 23.12 | 16.88 | 13.41
SLTR-T [15] | - | 45.54 | 32.60 | 25.30 | 20.69 | - | 45.34 | 32.31 | 24.83 | 20.17
Multi-channel [17] | 44.59 | - | - | - | 19.51 | 43.57 | - | - | - | 18.51
PiSLTRc-T (ours) | 47.89 | 46.51 | 33.78 | 26.78 | 21.48 | 48.13 | 46.22 | 33.56 | 26.04 | 21.29
TABLE X: The evaluation results on sign2(gloss+text) task on on Phoenix2014T
dataset.
sign2(gloss+text) | DEV | TEST
---|---|---
Model | WER | ROUGE | BLEU-1 | BLEU-2 | BLEU-3 | BLEU-4 | WER | ROUGE | BLEU-1 | BLEU-2 | BLEU-3 | BLEU-4
RNN-based[14] | - | 44.14 | 42.88 | 30.30 | 23.02 | 18.40 | - | 43.80 | 43.29 | 30.39 | 22.82 | 18.13
SLTR [15] | 24.61 | - | 46.56 | 34.03 | 26.83 | 22.12 | 24.49 | - | 47.20 | 34.46 | 26.75 | 21.80
Multi-channel [17] | - | - | - | - | - | 22.38 | - | - | - | - | - | 21.32
STMC(RGB-based) [45] | - | 44.30 | 44.06 | 32.69 | 25.45 | 20.74 | - | 44.70 | 45.08 | 33.80 | 26.44 | 21.55
PiSLTRc (ours) | 22.23 | 49.87 | 47.37 | 35.41 | 28.09 | 23.17 | 23.01 | 49.72 | 48.50 | 35.97 | 28.37 | 23.40
TABLE XI: The evaluation results on sign2gloss task on CSL dataset.
sign2gloss | WER
---|---
S2VT [46] | 25.0
LS-HAN [38] | 17.3
HLSTM-attn [47] | 10.2
CTF [48] | 11.2
DenseTCN [49] | 14.3
SF-Net [50] | 3.8
FCN [10] | 3.0
SLTR-R(our implementation) | 3.7
PiSLTRc-R (ours) | 2.8
### IV-D Comparison Against Baselines
In this section, we compare several state-of-the-art models to demonstrate the
effectiveness of our work. Similar to Camgz et al. [15], we elaborate the
comparison between our proposed model and baseline models in the three tasks:
sign2gloss, sign2text, and sign2(gloss+text).
#### IV-D1 sign2gloss
We evaluate this task in three datasets: PHOENIX-2014-T, PHOENIX-2014 and CSL.
In Table VII, we compare our model with several methods for the sign2gloss
task on PHOENIX-2014-T dataset. DNF [6] adopt iterative optimization
approaches to tackle the weakly supervised problem. They first train an end-
to-end recognition model for alignment proposal, and then use the alignment
proposal to tune the feature extractor. CNN-LSTM-HMM [2] embeds powerful CNN-
LSTM models in multi-stream HMMs and combines them with intermediate
synchronization constraints among multiple streams. Vanilla SLTR-R [15] uses
the backbone pretrained with CNN-LSTM-HMM setup and then employes a two-
layered transformer encoder model. FCN [10] is built upon an end-to-end fully
convolutional neural network for cSLR. Furthermore, they introduce a Gloss
Feature Enhancement (GFE) to enhance the frame-wise representation, where GFE
is trained to provide a set of alignment proposals for the frame feature
extractor. STMC (RGB) [12] proposes a spatial-temporal multi-cue network to
learn the video-based sequence. For a fair comparison, we only selected the
RGB-based model of STMC without leveraging the additional information of hand,
face, and body pose. PiSLTRc-R is our model which is trained when the weight
of translation loss $\lambda_{\\_}T$ is set zero. Similar to vanilla SLTR-R,
our work extracts feature from the CNN-LSTM-HMM backbone. As shown in this
table, our proposed PiSLTRc-R surpasses the vanilla SLTR model by $12\%$ and
$7\%$ on Dev and Test datasets, respectively. Furthermore, in the RGB-based
models, we achieve state-of-the-art performance on the sign2gloss task.
In Table VIII we also evaluate our PiSLTRc-R model on the PHOENIX-2014
dataset. Compared with existed baseline models, our proposed model achieves
comparable results. Note that the vanilla SLTR-R does not report the
experimental results on the PHOENIX-2014 dataset. We implement it by
ourselves. Compared with SLTR-R, our PiSLTRc-R model gains $4\%$ and $5\%$
improvements on Dev and Test datasets, respectively.
In Table XI we conduct experiments on CSL dataset. We see that our proposed
PiSLTRc-R model achieves state-of-the-art performance. Compared with the
SLTR-R model, our PiSLTRc-R model gains $24\%$ improvements on the Test
datasets (5,000 examples split by ourselves), respectively.
#### IV-D2 sign2text
In Table IX, we compare our approach with several sign2text methods on
PHOENIX-2014-T dataset. The RNN-based model [14] adopt full frame features
from Re-sign. TSPnet [16] utilizes I3D [51] to extract the spatial features,
and further finetune I3D on two WSLR datasets [52, 53]. Multi-channel [17]
allows both the inter and intra contextual relationship between different
asynchronous channels to be modelled within the transformer network itself.
PiSLTRc-T is our model that training with the weight of recognition loss
$\lambda_{\\_}R$ being zero. Like in sign2gloss, SLTR-T and our PiSLTRc-T
model utilize the pretrained feature from CNN-LSTM-HMM. Experimental results
show that our proposed model achieves state-of-the-art performance and
surpasses the vanilla SLTR-T model by $3.8\%$ and $5.6\%$ BLEU-4 scores.
#### IV-D3 sign2(gloss+text)
In Table X, we compare our model on sign2(gloss+text) task. In this task, we
jointly learn sign language recognition and translation simultaneously.
Namely, $\lambda_{\\_}R$ and $\lambda_{\\_}T$ are set as non-zero. Note that
different settings will obtain different results. Weighing up the performance
on recognition and translation in our experiments, we set
$\lambda_{\\_}R=\lambda_{\\_}T=1.0$. Compared with vanilla SLTR, our model
gains significant improvements on both two tasks. Experiments demonstrate that
our proposed techniques bring significant improvements for recognition and
translation quality based on the sign language Transformer model.
## V Conclusion
In this paper, we indicate two drawbacks of the sign language Transformer
(SLTR) model for sign language recognition and translation. The first
shortcoming is that self-attention aggregates sign visual features in a frame-
wise manner, thus neglecting the temporal semantic structure of sign gestures.
To overcome this problem, we propose a CPTcn module to generate neighborhood-
enhanced sign features by leveraging the temporal semantic consistency of sign
gestures. Specifically, we introduce a novel content-aware neighborhood
gathering method to select relevant features dynamically. And then, we apply
position-informed temporal convolution layers to aggregate them.
The second disadvantage is the absolute position encoding used in the vanilla
SLTR model. It is demonstrated unable to capture the direction and distance
information, which are critical for sign video understanding and sentence
learning. Therefore, we inject relative position information to SLTR model
with disentangled relative position encoding (DRPE) method. Extensive
experiments on two large-scale sign language datasets demonstrate the
effectiveness of our PiSLTRc framework.
## References
* [1] O. Koller, H. Ney, and R. Bowden, “Deep hand: How to train a cnn on 1 million hand images when your data is continuous and weakly labelled,” _2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 3793–3802, 2016.
* [2] O. Koller, N. C. Camgoz, H. Ney, and R. Bowden, “Weakly supervised learning with multi-stream cnn-lstm-hmms to discover sequential parallelism in sign language videos,” _IEEE Transactions on Pattern Analysis and Machine Intelligence_ , vol. 42, pp. 2306–2320, 2020.
* [3] R. Cui, H. Liu, and C. Zhang, “Recurrent convolutional neural networks for continuous sign language recognition by staged optimization,” _2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 1610–1618, 2017.
* [4] J. Pu, W. Zhou, and H. Li, “Dilated convolutional network with iterative optimization for continuous sign language recognition,” in _International Joint Conferences on Artificial Intelligence Organization (IJCAI)_ , 2018, pp. 885–891.
* [5] H. Wang, X. Chai, and X. Chen, “A novel sign language recognition framework using hierarchical grassmann covariance matrix,” _IEEE Transactions on Multimedia_ , vol. 21, pp. 2806–2814, 2019.
* [6] R. Cui, H. Liu, and C. Zhang, “A deep neural framework for continuous sign language recognition by iterative training,” _IEEE Transactions on Multimedia_ , vol. 21, pp. 1880–1891, 2019.
* [7] J. Pu, W. Zhou, and H. Li, “Iterative alignment network for continuous sign language recognition,” _2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 4160–4169, 2019.
* [8] J. Pu, W. Zhou, H. Hu, and H. Li, “Boosting continuous sign language recognition via cross modality augmentation,” _Proceedings of the 28th ACM International Conference on Multimedia_ , 2020.
* [9] H. Hu, W. Zhou, J. Pu, and H. Li, “Global-local enhancement network for nmfs-aware sign language recognition,” _ArXiv_ , vol. abs/2008.10428, 2020\.
* [10] K. L. Cheng, Z. Yang, Q. Chen, and Y.-W. Tai, “Fully convolutional networks for continuous sign language recognition,” in _European Conference on Computer Vision (ECCV)_. Springer, 2020, pp. 697–714.
* [11] N. C. Camgöz, S. Hadfield, O. Koller, and R. Bowden, “Subunets: End-to-end hand shape and continuous sign language recognition,” _2017 IEEE International Conference on Computer Vision (ICCV)_ , pp. 3075–3084, 2017.
* [12] H. Zhou, W. Zhou, Y. Zhou, and H. Li, “Spatial-temporal multi-cue network for continuous sign language recognition,” in _Proceedings of the AAAI Conference on Artificial Intelligence (AAAI)_ , vol. 34, no. 07, 2020, pp. 13 009–13 016.
* [13] J. Huang, W. Zhou, H. Li, and W. Li, “Attention-based 3d-cnns for large-vocabulary sign language recognition,” _IEEE Transactions on Circuits and Systems for Video Technology_ , vol. 29, no. 9, pp. 2822–2832, 2019\.
* [14] N. C. Camgöz, S. Hadfield, O. Koller, H. Ney, and R. Bowden, “Neural sign language translation,” _2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 7784–7793, 2018.
* [15] N. C. Camgöz, O. Koller, S. Hadfield, and R. Bowden, “Sign language transformers: Joint end-to-end sign language recognition and translation,” _2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 10 020–10 030, 2020.
* [16] D. Li, C. Xu, X. Yu, K. Zhang, B. Swift, H. Suominen, and H. Li, “Tspnet: Hierarchical feature learning via temporal semantic pyramid for sign language translation,” in _Annual Conference on Neural Information Processing Systems (NeurIPS)_ , 2020.
* [17] N. C. Camgoz, O. Koller, S. Hadfield, and R. Bowden, “Multi-channel transformers for multi-articulatory sign language translation,” in _European Conference on Computer Vision (ECCV)_. Springer, 2020, pp. 301–319.
* [18] R. Pfau, M. Salzmann, and M. Steinbach, “The syntax of sign language agreement: Common ingredients, but unusual recipe,” _Glossa_ , vol. 3, pp. 1–46, 2018.
* [19] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, L. Kaiser, and I. Polosukhin, “Attention is all you need,” in _Annual Conference on Neural Information Processing Systems (NeurIPS)_ , 2017, pp. 5998–6008.
* [20] P. Shaw, J. Uszkoreit, and A. Vaswani, “Self-attention with relative position representations,” in _2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, (NAACL-HLT)_ , 2018, pp. 464–468.
* [21] H. Yan, B. Deng, X. Li, and X. Qiu, “Tener: Adapting transformer encoder for named entity recognition,” _ArXiv_ , vol. abs/1911.04474, 2019.
* [22] M. A. Islam, S. Jia, and N. D. B. Bruce, “How much position information do convolutional neural networks encode?” in _International Conference on Learning Representations (ICLR)_ , 2020.
* [23] Z. Dai, Z. Yang, Y. Yang, J. Carbonell, Q. V. Le, and R. Salakhutdinov, “Transformer-xl: Attentive language models beyond a fixed-length context,” in _Proceedings of the 57th Conference of the Association for Computational Linguistics (ACL)_ , 2019.
* [24] P. He, X. Liu, J. Gao, and W. Chen, “Deberta: Decoding-enhanced bert with disentangled attention,” in _International Conference on Learning Representations (ICLR)_ , 2021.
* [25] C. Raffel, N. Shazeer, A. Roberts, K. Lee, S. Narang, M. Matena, Y. Zhou, W. Li, and P. J. Liu, “Exploring the limits of transfer learning with a unified text-to-text transformer,” _J. Mach. Learn. Res._ , vol. 21, pp. 140:1–140:67, 2020.
* [26] G. Ke, D. He, and T. Liu, “Rethinking positional encoding in language pre-training,” in _International Conference on Learning Representations (ICLR)_ , 2021.
* [27] Z. Yang, Z. Dai, Y. Yang, J. Carbonell, R. Salakhutdinov, and Q. V. Le, “Xlnet: Generalized autoregressive pretraining for language understanding,” in _Annual Conference on Neural Information Processing Systems (NeurIPS)_ , 2019.
* [28] J. Forster, C. Schmidt, O. Koller, M. Bellgardt, and H. Ney, “Extensions of the sign language recognition and translation corpus rwth-phoenix-weather,” in _Proceedings of the Ninth International Conference on Language Resources and Evaluation, (LREC)_ , 2014.
* [29] T. Luong, H. Pham, and C. D. Manning, “Effective approaches to attention-based neural machine translation,” in _Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing (EMNLP)_ , 2015.
* [30] B. Martinez, P. Ma, S. Petridis, and M. Pantic, “Lipreading using temporal convolutional networks,” in _2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_ , 2020, pp. 6319–6323.
* [31] Z. Xia, X. Hong, X. Gao, X. Feng, and G. Zhao, “Spatiotemporal recurrent convolutional networks for recognizing spontaneous micro-expressions,” _IEEE Transactions on Multimedia_ , vol. 22, no. 3, pp. 626–640, 2020.
* [32] D. Guo, W. Li, and X. Fang, “Fully convolutional network for multiscale temporal action proposals,” _IEEE Transactions on Multimedia_ , vol. 20, no. 12, pp. 3428–3438, 2018.
* [33] S. Zhang, S. Zhang, T. Huang, and W. Gao, “Speech emotion recognition using deep convolutional neural network and discriminant temporal pyramid matching,” _IEEE Transactions on Multimedia_ , vol. 20, no. 6, pp. 1576–1590, 2018.
* [34] J. Devlin, M.-W. Chang, K. Lee, and K. Toutanova, “Bert: Pre-training of deep bidirectional transformers for language understanding,” in _2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, (NAACL-HLT)_ , 2019.
* [35] A. Graves, S. Fernández, F. Gomez, and J. Schmidhuber, “Connectionist temporal classification: labelling unsegmented sequence data with recurrent neural networks,” in _Machine Learning, Proceedings of the Twenty-Third International Conference, (ICML)_ , 2006.
* [36] J. Ba, J. Kiros, and G. E. Hinton, “Layer normalization,” _ArXiv_ , vol. abs/1607.06450, 2016.
* [37] C.-Z. A. Huang, A. Vaswani, J. Uszkoreit, I. Simon, C. Hawthorne, N. Shazeer, A. M. Dai, M. Hoffman, M. Dinculescu, and D. Eck, “Music transformer: Generating music with long-term structure,” in _International Conference on Learning Representations (ICLR)_ , 2019.
* [38] J. Huang, W. Zhou, Q. Zhang, H. Li, and W. Li, “Video-based sign language recognition without temporal segmentation,” in _Proceedings of the AAAI Conference on Artificial Intelligence (AAAI)_ , 2018.
* [39] K. Papineni, S. Roukos, T. Ward, and W.-J. Zhu, “Bleu: a method for automatic evaluation of machine translation,” in _Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL)_ , 2002.
* [40] D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” _CoRR_ , vol. abs/1412.6980, 2015.
* [41] Y. Wu, M. Schuster, Z. Chen, Q. V. Le, M. Norouzi, W. Macherey, M. Krikun, Y. Cao, Q. Gao, K. Macherey, J. Klingner, A. Shah, M. Johnson, X. Liu, L. Kaiser, S. Gouws, Y. Kato, T. Kudo, H. Kazawa, K. Stevens, G. Kurian, N. Patil, W. Wang, C. Young, J. Smith, J. Riesa, A. Rudnick, O. Vinyals, G. S. Corrado, M. Hughes, and J. Dean, “Google’s neural machine translation system: Bridging the gap between human and machine translation,” _ArXiv_ , vol. abs/1609.08144, 2016.
* [42] O. Koller, S. Zargaran, H. Ney, and R. Bowden, “Deep sign: Hybrid cnn-hmm for continuous sign language recognition,” in _Proceedings of the British Machine Vision Conference (BMVC)_ , 2016.
* [43] O. Koller, S. Zargaran, and H. Ney, “Re-sign: Re-aligned end-to-end sequence modelling with deep recurrent cnn-hmms,” _2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 3416–3424, 2017.
* [44] C. Wei, J. Zhao, W. gang Zhou, and H. Li, “Semantic boundary detection with reinforcement learning for continuous sign language recognition,” _IEEE Transactions on Circuits and Systems for Video Technology_ , vol. 31, pp. 1138–1149, 2021.
* [45] H. Zhou, W. Zhou, Y. Zhou, and H. Li, “Spatial-temporal multi-cue network for sign language recognition and translation,” _IEEE Transactions on Multimedia_ , pp. 1–1, 2021.
* [46] S. Venugopalan, M. Rohrbach, J. Donahue, R. Mooney, T. Darrell, and K. Saenko, “Sequence to sequence – video to text,” _2015 IEEE International Conference on Computer Vision (ICCV)_ , pp. 4534–4542, 2015.
* [47] D. Guo, W. Zhou, H. Li, and M. Wang, “Hierarchical lstm for sign language translation,” in _Proceedings of the AAAI Conference on Artificial Intelligence (AAAI)_ , 2018.
* [48] S. Wang, D. Guo, W. gang Zhou, Z. Zha, and M. Wang, “Connectionist temporal fusion for sign language translation,” _Proceedings of the 26th ACM international conference on Multimedia (ACM MM)_ , 2018.
* [49] D. Guo, S. Wang, Q. Tian, and M. Wang, “Dense temporal convolution network for sign language translation,” in _International Joint Conferences on Artificial Intelligence Organization (IJCAI)_ , 2019.
* [50] Z. Yang, Z. Shi, X. Shen, and Y.-W. Tai, “Sf-net: Structured feature network for continuous sign language recognition,” _ArXiv_ , vol. abs/1908.01341, 2019.
* [51] J. Carreira and A. Zisserman, “Quo vadis, action recognition? a new model and the kinetics dataset,” _2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 4724–4733, 2017.
* [52] D. Li, C. Rodriguez-Opazo, X. Yu, and H. Li, “Word-level deep sign language recognition from video: A new large-scale dataset and methods comparison,” _2020 IEEE Winter Conference on Applications of Computer Vision (WACV)_ , pp. 1448–1458, 2020.
* [53] H. R. V. Joze and O. Koller, “Ms-asl: A large-scale data set and benchmark for understanding american sign language,” in _Proceedings of the British Machine Vision Conference (BMVC)_ , 2019.
| arxiv-papers | 2021-07-27T05:01:27 | 2024-09-04T03:07:20.560895 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Pan Xie and Mengyi Zhao and Xiaohui Hu",
"submitter": "Pan Xie",
"url": "https://arxiv.org/abs/2107.12600"
} |
2107.12601 | # Microphone Array Generalization for Multichannel
Narrowband Deep Speech Enhancement
###### Abstract
This paper addresses the problem of microphone array generalization for deep-
learning-based end-to-end multichannel speech enhancement. We aim to train a
unique deep neural network (DNN) potentially performing well on unseen
microphone arrays. The microphone array geometry shapes the network’s
parameters when training on a fixed microphone array, and thus restricts the
generalization of the trained network to another microphone array. To resolve
this problem, a single network is trained using data recorded by various
microphone arrays of different geometries. We design three variants of our
recently proposed narrowband network to cope with the agnostic number of
microphones. Overall, the goal is to make the network learn the universal
information for speech enhancement that is available for any array geometry,
rather than learn the one-array-dedicated characteristics. The experiments on
both simulated and real room impulse responses (RIR) demonstrate the excellent
across-array generalization capability of the proposed networks, in the sense
that their performance measures are very close to, or even exceed the network
trained with test arrays. Moreover, they notably outperform various
beamforming methods and other advanced deep-learning-based methods.
Index Terms: Multichannel speech enhancement, microphone array generalization,
deep learning
## 1 Introduction
Microphone arrays are extensively applied in intelligent speech communication
systems. Multichannel speech enhancement, owing to its additional spatial
information, is widely studied in recent years and tends to have superior
performance relative to monaural speech enhancement. Beamforming [1] is a
classic multichannel speech enhancement model preserving the desired signal
from the target direction and suppressing signals from other directions.
Different in the manners of utilizing spatial information, recent studies on
multichannel speech enhancement DNNs can be divided into two categories: i)
monaural deep masking or mapping [2] followed by beamforming [3],[4]; ii)
directly learning spatial information by inputting multichannel signals or
cross-channel features into the network, and performing end-to-end speech
enhancement. Methods in the first class have become the most popular front-
ends for automatic speech recognition (ASR) [5]. In addition, they are free
from the microphone array generalization problem, since both monaural speech
enhancement DNN and beamforming can be flexibly applied on any array
configurations. Especially, [6] and [7] further strengthen the array
generalization capability by exhaustively employing each microphone in an
array as a reference microphone. However, these approaches solely focus on
learning monaural speech T-F information channel by channel with DNNs and the
performance strongly depends on the estimation accuracy of beamforming
parameters. We thus believe that simultaneously exploiting the spatial and
monaural information with DNN could further improve the estimation of speech
on target direction, as is done in the end-to-end time-domain methods [8, 9]
and T-F domain methods [10, 11]. Neural beamforming takes the multichannel
signals as input and explicitly performs as a beamformer [12, 13, 14] and
sometimes it is trained to leverage the spatial cues, such as interaural
phase/level difference in [15, 16, 17]. These methods apparently have the
microphone array generalization problem which, however, have not been
considered in their original papers. Very recently, the FaSNet [18] integrated
with a transform-average-concatenate (TAC) [19] was proposed to process
signals with varying number of microphones, where the TAC module together with
cross-correlation functions between channels were employed to learn the
spatial information. In [20], a self-attention network is used to exploit the
spatial information with a varying number of microphones. Both these two
methods, i.e. [19] and [20], alternate the temporal processing layers and
spatial processing layers, which is arguably problematic for learning some
temporal-spatial-combined information, such as the directional continuity of
speakers and the spatial diffuseness of noise.
Figure 1: Diagram of the basic NBDF and proposed three variants of NBDF
network architectures.
In this work, we propose a new speech enhancement network being able to work
with any microphone arrays. The importance of microphone array generalization
is two-fold. First, the spatial correlations of multichannel signals are
array-dependent. Previously, the training and test data are always recorded
with the same microphone array. However, recording a large dataset with a new
microphone array is time and budget-consuming. Second, DNN models with great
microphone array generalization capability are favorable in Cloud applications
and robot group intelligence, where recording end-devices are different. Our
proposed networks, once trained, are able to enhance multichannel signals
without requiring any prior knowledge of microphone arrays.
In our previous works [21, 22], a narrow band deep filtering (NBDF) method was
proposed, which inputs the frequency-wise multichannel signals to a long
short-term memory (LSTM) network, and predicts the clean speech at the
corresponding frequency. NBDF has achieved excellent speech enhancement
performance in terms of both human perception and ASR, thus it is used as the
baseline network in this paper. We propose three variants of NBDF in this work
to account for the varying number of microphones, namely channel-padding NBDF
(CP-NBDF), channel-convolutional NBDF (CC-NBDF), and pair-wise NBDF (PW-NBDF).
A large number of virtual microphone arrays with simulated RIRs are used for
training. Multichannel signals are generated by convolving RIRs with single-
channel speech clips. By using the toolkit presented in [23] and [24],
multichannel spatially diffuse babble, white and spatially correlated wind
noise are generated respecting geometries of those arrays. The multichannel
speech enhancement network normally recovers the monaural clean speech of a
reference channel. We propose a simple and effective network training scheme
to allow the users to specify a reference channel for their own microphone
array during test. Besides, a magnitude augmentation scheme is proposed to
account for the fact that different microphone arrays could have different
configurations in terms of recording volume or frequency response. Overall,
combining all of these, the network is trained to learn the universal
information for speech enhancement that is available in any microphone array.
Experiments demonstrate that our proposed networks have excellent
generalization capability to various unseen simulated and real arrays.
Moreover, they achieve better speech enhancement performance than various
beamforming methods and the advanced FaSNet-TAC method [19].
## 2 System description
### 2.1 Signal model and narrow band deep filtering recap
The multichannel microphone signal $X$ is the mixture of multichannel clean
speech $S$ and noise $N$ represented in the short-time Fourier transform
(STFT) domain.
$X_{m}(k,t)=S_{m}(k,t)+N_{m}(k,t).$ (1)
where $m\in[1,M],k\in[1,K],t\in[1,T]$ are the microphone, frequency and time
indices, respectively. $T$ and $K$ are the total number of frames and
frequency-bins. $M$ denotes the number of microphones. This work focuses on
studying speech enhancement on different microphone arrays to predict the
speech $S_{r}(k,t)$ of one selected reference channel, thence the
reverberation is not suppressed even if presenting in $\hat{S}_{r}(k,t)$.
NBDF (Fig.1 (a)) is a DNN processing multichannel speech frequency-wisely.
Uncoupling the inter-frequency dependency from full-band signal makes the
network focus on learning the narrow-band spatial and temporal information to
recognize speech components on each T-F unit. Besides, by solely exploiting
narrowband information, the NBDF network generalizes well to new speakers and
new noise scenarios with unseen spectral patterns, which naturally matches
with our objective, such as the Cloud applications. NBDF network is composed
of two stacked Bi-directional LSTM (BLSTM) layers and one fully connected (FC)
layer with sigmoid activation before the output, shown in Fig. 1 (a).
Different frequencies of one signal are independently processed by the
network. The frequency-wise input $\mathbf{X}\in\mathbb{R}^{T\times 2M}$, is
the concatenation of multichannel real and imaginary parts of STFT
coefficients channel by channel. The target, i.e. monaural magnitude ratio
mask (MRM) sequence $\in\mathbb{R}^{T\times 1}$, is the ratio of magnitudes
between clean speech and noisy mixture at the reference channel. During
inference, the predicted MRM is multiplied with the noisy mixture of the
reference channel to restore the magnitude of clean speech. The phase of the
recovered signal remains the same as the noisy mixture. Each input sample is
normalized by dividing the mean of the STFT magnitude of all frames at the
reference channel. We take the mean square error of MRM as the training loss.
The enhanced reverberant reference channel signal $\hat{s_{r}}(t)$ is finally
obtained with inverse STFT.
### 2.2 Inner microphone array generalization
To achieve the cross-array generalization, it’s necessary to first resolve the
inner-array generalization, namely the generalization problem for one constant
microphone array. This includes two aspects: i) the reference channel
selection mechanism. During test, different reference channels can be used
with the already-trained network. The optimal reference channel can be
selected by the human users based on their prior knowledge or by an automatic
selection algorithm [25]. The network then predicts the clean speech of the
selected reference channel; ii) the network’s immunity to the microphone
permutation. The rationale is that the spatial information should be conveyed
by the correlation between microphones rather than by a certain recording
permutation of the microphone array. These two aspects are also very important
when the network is tested on an unseen microphone array, as its reference
channel and permutation are completely irrelevant to the training arrays. A
network trained with a constant reference channel and a fixed permutation,
will overfit to such setup and hardly generalizes to others.
We propose a novel training scheme to account for the addressed aspects.
Regarding reference channel, a trivial way is to encode the reference channel
selection as a one-hot vector and input it to the network along with the
signals. This one-hot vector will specify the reference channel index during
test. We simplify this scheme by using a constant one-hot vector that always
specifies the first channel as the reference channel and shift it to the first
channel, namely the first two elements in $\mathbf{X}$. The constant one-hot
vector can be omitted in this way. Rest channels are shuffled (independently
for each sample) to make the network trained with various permutations. As a
consequence, the network is able to recognize the reference channel (always
the first input channel) in the basic NBDF network, CC-NBDF, and CP-NBDF and
to be invariant to the permutation.
### 2.3 Three variants of NBDF
The most straightforward way to make the NBDF network adapt to microphone
arrays with varying number of microphones is to set an upper bound for the
number of microphones, say $M^{\prime}$ (preset eight in this paper) in
channel-padding NBDF (shown in Fig. 1 (b)). The network is trained on various
arrays with maximum $M^{\prime}$ microphones. When $M<M^{\prime}$, the $M$
channels are first organized using the training scheme in Section 2.2 and the
last $M^{\prime}-M$ channels are padded with zeros. It always learns the
global spatial information as in basic NBDF. This mechanism partially solves
the varying number of microphones problem, since it can not process more than
$M^{\prime}$ channels.
In channel-convolutional NBDF, as is done in [10], the inter-channel
information can be locally learned by time-distributed convolutional neural
networks (CNN)s, and correspondingly the channel-dimension can be ablated with
multilayer CNNs. We proposed a channel convolutional NBDF network, as shown in
Fig. 1 (c). The input, $\mathbf{X}\in\mathbb{R}^{T\times M\times 2}$, is
convolved by the first CNN layer to fixed $N$ feature maps and then is
transferred to $M-2$ consecutive shared CNN layers. Channel convolutional
module is followed by a basic NBDF model. For the dual-channel case, only the
first CNN layer functions. All channels of input are organized with the above
training scheme. Comparing to the basic NBDF network which learns global
spatial information, the CC-NBDF uses CNNs to recursively learn the
accumulated local inter-channel information, which may lack some global
channel dependencies.
In pair-wise NBDF shown in Fig. 1 (d), each microphone pair is composed of the
reference microphone and one of the other microphones:
$\mathbf{X}_{1,m}\in\mathbb{R}^{T\times 4},\ m\in[2,M]$, where $1$ in
subscript means the first channel is reference channel. The input sequence
$\mathbf{X}\in\mathbb{R}^{T\times 2M}$ is uncoupled as $M-1$ dual-channel
narrowband sequences which are parallelly input to the shared LSTM, i.e. BLSTM
1 in Fig. 1 (d). This works for any array with a different number of
microphones and free from the permutation problem owing to pair-wise mapping.
The $M-1$ outputs of this LSTM layer are averaged and then sent to BLSTM 2 and
FC layer same as the basic NBDF network. Similar to channel convolutional
NBDF, it learns inter-channel correlation pair-wisely but differently learns
the global channel relation from the mean-pooled feature. The good point is
that all microphone pairs are formed with the reference channel, which
provides sufficient information for mask estimation at the reference channel.
### 2.4 Magnitude augmentation
Each microphone has its own characteristics such as its unique frequency
response, recording volume, and noise floor. It is reflected by the different
magnitude levels while recording the same signal. To take this effect into
account, during training, we multiply STFT magnitude for each microphone at
each frequency with a randomly chosen factor. This data augmentation technique
largely increases the data diversity in terms of the relative magnitudes
between microphones and may improve the generalization capability while
testing unseen array.
Table 1: Speech enhancement results on a constant array (SIMU 6-CH LA). SNR is in the range of [-5,0] dB. Model | PESQ | STOI (%) | SDR (dB)
---|---|---|---
Unprocessed | 1.68 | 63.9 | -2.4
Constant-reference-permutation | 2.67 | 78.2 | 10.6
Constant-permutation | 2.64 | 77.3 | 10.5
Proposed training scheme | 2.62 | 76.5 | 10.3
Table 2: Speech enhancement results of microphone array generalization. SNR is uniformly distributed in the range of [-5,0] dB. | PESQ / STOI (%) / SDR (dB) | Model size | 2-CH | 4-CH CA | 4-CH LA | 6-CH CA | 6-CH LA
---|---|---|---|---|---|---|---
| Unprocessed | - | 1.70 | 62.4 | -2.4 | 1.70 | 61.5 | -2.5 | 1.69 | 63.1 | -2.3 | 1.70 | 61.6 | -2.5 | 1.70 | 63.0 | -2.3
| BeamformIt [26] | - | 1.81 | 63.0 | -1.1 | 1.72 | 59.5 | -2.7 | 1.87 | 63.2 | -0.5 | 1.78 | 60.9 | -1.6 | 1.88 | 62.8 | -0.3
| Oracle MVDR | - | 1.83 | 64.7 | -0.5 | 1.84 | 64.9 | -0.5 | 1.93 | 68.3 | 1.1 | 1.94 | 66.7 | 0.5 | 1.97 | 69.1 | 1.5
| FaSNet-TAC [19] | 2.75M | 2.36 | 73.5 | 10.0 | 2.43 | 74.0 | 10.1 | 2.40 | 75.3 | 10.5 | 2.47 | 74.7 | 10.4 | 2.43 | 75.7 | 10.6
| CP-NBDF (prop.) | 1.21M | 2.53 | 72.8 | 9.5 | 2.72 | 75.2 | 9.9 | 2.62 | 74.9 | 10.1 | 2.75 | 75.7 | 10.0 | 2.64 | 75.1 | 10.1
SIMU | CC-NBDF (prop.) | 1.33M | 2.51 | 72.1 | 9.4 | 2.70 | 74.6 | 9.8 | 2.60 | 74.4 | 10.1 | 2.74 | 75.1 | 9.9 | 2.64 | 74.8 | 10.1
| PW-NBDF (prop.) | 1.19M | 2.49 | 73.0 | 9.2 | 2.73 | 76.1 | 10.0 | 2.61 | 75.8 | 10.0 | 2.79 | 76.9 | 10.2 | 2.67 | 76.6 | 10.2
| PW-NBDF with MA (prop.) | 1.19M | 2.56 | 73.1 | 9.8 | 2.77 | 76.1 | 10.2 | 2.66 | 75.8 | 10.4 | 2.82 | 77.0 | 10.3 | 2.71 | 76.6 | 10.5
| One-array-dedicated | 1.20M | 2.58 | 73.6 | 10.0 | 2.69 | 76.0 | 9.0 | 2.63 | 76.0 | 10.2 | 2.77 | 76.4 | 10.1 | 2.65 | 75.8 | 10.2
| Microphone-number-dedicated | 1.20M | 2.52 | 72.8 | 9.7 | 2.75 | 76.0 | 10.1 | 2.62 | 75.1 | 10.3 | 2.78 | 76.3 | 10.1 | 2.66 | 75.8 | 10.2
| Unprocessed | - | 1.67 | 63.4 | -2.9 | 1.70 | 64.3 | -2.4 | 1.67 | 68.4 | -2.3 | 1.67 | 62.7 | -3.1 | 1.66 | 68.0 | -2.4
| BeamformIt [26] | - | 1.73 | 64.3 | -1.4 | 1.72 | 63.9 | -1.7 | 1.80 | 70.5 | -0.7 | 1.75 | 63.6 | -1.8 | 1.80 | 70.4 | -0.9
| Oracle MVDR | - | 1.84 | 69.9 | 0.4 | 1.88 | 72.7 | 0.5 | 2.09 | 84.2 | 3.0 | 2.02 | 77.4 | 1.8 | 2.16 | 85.1 | 2.9
| FaSNet-TAC [19] | 2.75M | 2.28 | 74.7 | 10.0 | 2.40 | 76.7 | 10.7 | 2.39 | 81.5 | 10.9 | 2.38 | 76.3 | 10.6 | 2.40 | 81.5 | 10.9
| CP-NBDF (prop.) | 1.22M | 2.45 | 73.4 | 9.3 | 2.67 | 78.4 | 10.3 | 2.61 | 82.5 | 10.3 | 2.65 | 77.9 | 9.9 | 2.61 | 82.4 | 10.1
REAL | CC-NBDF (prop.) | 1.33M | 2.43 | 73.4 | 9.2 | 2.65 | 78.0 | 10.3 | 2.58 | 82.0 | 10.3 | 2.64 | 77.3 | 9.9 | 2.59 | 81.7 | 10.2
| PW-NBDF (prop.) | 1.19M | 2.42 | 74.9 | 9.0 | 2.68 | 79.2 | 10.3 | 2.62 | 83.4 | 10.3 | 2.70 | 79.1 | 10.1 | 2.66 | 83.6 | 10.4
| PW-NBDF with MA (prop.) | 1.19M | 2.50 | 75.1 | 9.7 | 2.72 | 79.3 | 10.6 | 2.67 | 83.5 | 10.7 | 2.73 | 79.2 | 10.3 | 2.70 | 83.7 | 10.6
| One-array-dedicated | 1.20M | 2.56 | 76.7 | 10.1 | 2.68 | 80.0 | 10.7 | 2.89 | 86.9 | 11.1 | 2.73 | 80.2 | 10.2 | 2.83 | 86.1 | 11.0
| Microphone-number-dedicated | 1.20M | 2.43 | 74.6 | 9.4 | 2.70 | 79.4 | 10.5 | 2.65 | 83.8 | 10.5 | 2.69 | 78.7 | 10.1 | 2.65 | 83.1 | 10.2
## 3 Experiment and evaluation
### 3.1 Experimental setup
To collect a large amount of data from different microphone arrays, we use
virtual microphone arrays with simulated RIRs and simulated multichannel noise
in this work. We totally plant 116 virtual microphone arrays with different
sizes, geometry and numbers of microphones. For training, 114 virtual arrays
are used with microphone numbers in the range of [2, 8] in different (linear,
circular, circular with center microphone, nonuniform linear, ad-hoc) shapes.
For each shape, there are five different diameters in the range of [0.15, 0.5]
m. RIRs are simulated with different room setups using the toolkit [27] for
each of these arrays. Three virtual rooms are created and each virtual array
is randomly positioned at 1m height. The azimuth, the source-array distance
and reverberation time (RT60) are randomly chosen in ranges of
[$0^{\circ},360^{\circ}$), (0.5, 4.5) m and [0.14, 1] s. As for test, the
microphone linear array (LA) presented in [28] and the circular array (CA)
provided in the _REVERB challenge_ [29] with real-measured RIRs are used. For
LA, the spacing of eight microphones is [4,4,4,8,4,4,4] cm, and the RIRs are
measured with two source-array distances, 13 azimuths and three RT60 setups
(0.16, 0.36, 0.61) s. For CA, eight microphones form a circle with a diameter
of 20 cm, and the RIRs are measured with two source-array distances, two
azimuths and three RT60 setups (0.25 s, 0.68 s, 0.73 s) s. Besides the real
arrays, we also test the rest two virtual arrays, which have exactly the same
geometry as the two real arrays, respectively. The RIRs for the virtual
microphones are simulated with RT60 randomly chosen from a range of [0.25,
0.75] s. To have a varying number of microphones, 2-, 4-, 6-ch sub-arrays
(excluded in training) are extracted from each SIMU and REAL original 8-ch
array, which then generates five types of sub-arrays: 2-CH (from both LA and
CA) arrays, 4-CH CA, 4-CH LA, 6-CH partial CA and 6-CH LA.
We create 12000, 2000 and 1200 (600 per sub-array) multichannel noisy
reverberant speech for training, validation and test, respectively. Clean
utterances from TIMIT [30] are convolved with multichannel RIRs. Multichannel
spatially diffuse noise is generated by using [23] with babble or white noise
clips and wind noise from [24]. Multichannel speech (containing only one
single source) and diffuse noise are mixed with a signal-to-noise ratio (SNR)
randomly chosen from the range of [-5, 10] dB for training while from [-5, 0]
dB for test. STFT is performed with 512 samples-long (32 ms) hamming window
and a hop size of 256-samples. Adam is used for optimization with a learning
rate of 0.001. Magnitude augmentation (MA) in Section 2.4 is applied for PW-
NBDF with multiplication factors randomly chosen from [0.75, 1.33]. Three
objective evaluation metrics are adopted: i) perceptual evaluation speech
quality (PESQ) [31]; ii) short-time objective intelligibility (STOI) [32];
iii) signal-to-distortion ratio (SDR) [33].
Three baseline methods are compared. FaSNet with
TAC111https://github.com/yluo42/TAC [19] is trained with the same data as for
the proposed network. The scale invariant-SNR (SI-SNR) is taken as the
training loss. BeamformIt [26] and Oracle MVDR are compared as well where the
Oracle MVDR beamformer estimates the steering vector and noise covariance
matrix using the clean (reverberant) speech and pure noise of the test signal,
respectively.
### 3.2 Results and discussion
First, we evaluate the performance while taking the training scheme presented
in Section 2.2 for a constant array (the simulated 6-CH LA for test in this
experiment). Two setups are tested as benchmarks: i) Six NBDF models trained
with fixed permutation by alternately setting different channels as the
reference. The evaluation metrics of six models are averaged. This setup,
referred to as constant-reference-permutation, uses the same reference channel
and channel permutation for training and test, which is supposed to achieve
the best performance in the same framework but lack inner-array
generalization. ii) The randomly selected reference channel placed at the
first place while the rest are in a constant permutation. The constant-
permutation setup allows to alter the reference channel during test, but other
microphones follow the same permutation with training. We remind that the
proposed training scheme allows altering both the reference channel and the
permutation during test. In Table 1, the performance slightly decreases from
constant-reference-permutation benchmark to constant-permutation benchmark,
then further to the proposed scheme, which demonstrates that the proposed
scheme is able to largely increase the flexibility of multichannel speech
enhancement model on a fixed array with a tiny loss of performance.
To evaluate the cross array generalization capability, two other benchmark
models are tested: I) the basic NBDF network is independently trained for each
test microphone sub-array using the proposed training scheme, namely one-
array-dedicated. II) Different basic NBDF networks are trained using arrays
for each group of arrays with the same number of microphones in training sets,
three networks for 2-CH, 4-CH and 6-CH groups respectively. This is referred
to as microphone-number-dedicated. This setup allows to work on an unseen
array with the same microphone number as the corresponding network. The
results are shown in Table 2. Our proposed methods have comparable results on
SIMU data, in the sense that their performances are close to, even exceed the
one-array-dedicated model especially for PW-NBDF. On REAL data, similar
behaviors to SIMU data are observed, which demonstrates that the model trained
with virtual microphone arrays and simulated RIRs can generalize to real
microphone arrays. Furthermore, by integrating MA, PW-NBDF is consistently
improved, which shows the effectiveness of this data augmentation technique.
The better performance of PW-NBDF relative to CP-NBDF, probably reveals that
global spatial correlation can be somehow represented by dual-channel
correlation in the NBDF framework. To achieve good performance however, the
inter channel correlation has to be effectively learned, as PW-NBDF with
shared LSTM outperforms CC-NBDF with shared CNNs.
Better performance scores are achieved by both FaSNet-TAC and all of the
proposed networks compared to BeamformIt and Oracle MVDR, as shown in Table 2.
This demonstrates that learning spatial information with DNNs compared to
hand-crafted beamforming techniques is indeed more efficient, for noise
reduction, especially in reverberant and low-SNR environments. Compared to
FaSNet-TAC, our proposed _PW-NBDF with MA_ with less than half of the model
size, and achieves notably better PESQ and STOI scores and comparable SDR
scores (despite the FaSNet-TAC’s training loss, i.e. SI-SNR, is extremely
similar to SDR). This performance superiority is possibly due to the fact that
the proposed network simultaneously learns the temporal-spatial information,
which is important for modeling the directional continuity of speakers and the
spatial diffuseness of noise.
## 4 Conclusion
This paper systematically studies the microphone array generalization problem
with respect to reference channel, microphone permutation, array geometry, and
magnitude variation between microphones. We have proposed a network training
scheme, three narrowband network architectures, and a magnitude augmentation
technique, which overall achieves a simple yet effective multichannel speech
enhancement network with excellent microphone array generalization
performance. Moreover, the proposed network achieves better speech enhancement
performance than the oracle beamforming technique and the advanced FaSNet-TAC
method. One shortcoming of this work is that the simulated multichannel noise
used in the experiments is ideally diffuse. However, the real-recorded
multichannel noise has much more complex spatial characteristics, it could be
an arbitrary combination of partially diffuse, directional, and spatially-
uncorrelated noise. This issue will be studied in future work.
## References
* [1] E. Hänsler and G. Schmidt, _Acoustic echo and noise control: a practical approach_. John Wiley & Sons, 2005, vol. 40.
* [2] D. Wang and J. Chen, “Supervised speech separation based on deep learning: An overview,” _IEEE/ACM Transactions on Audio, Speech, and Language Processing_ , vol. 26, no. 10, pp. 1702–1726, 2018.
* [3] J. Heymann, L. Drude, and R. Haeb-Umbach, “Neural network based spectral mask estimation for acoustic beamforming,” in _2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2016, pp. 196–200.
* [4] T. Higuchi, N. Ito, T. Yoshioka, and T. Nakatani, “Robust mvdr beamforming using time-frequency masks for online/offline asr in noise,” in _2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2016, pp. 5210–5214.
* [5] T. Ochiai, S. Watanabe, T. Hori, and J. R. Hershey, “Multichannel end-to-end speech recognition,” in _Proceedings of the 34 th International Conference on Machine Learning, Sydney, Australia_ , 2017.
* [6] Z.-Q. Wang, P. Wang, and D. Wang, “Complex spectral mapping for single-and multi-channel speech enhancement and robust asr,” _IEEE/ACM Transactions on Audio, Speech, and Language Processing_ , vol. 28, pp. 1778–1787, 2020.
* [7] Z.-Q. Wang and D. Wang, “Multi-microphone complex spectral mapping for speech dereverberation,” in _2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2020, pp. 486–490.
* [8] N. Tawara, T. Kobayashi, and T. Ogawa, “Multi-channel speech enhancement using time-domain convolutional denoising autoencoder.” in _INTERSPEECH_ , 2019, pp. 86–90.
* [9] C.-L. Liu, S.-W. Fu, Y.-J. Li, J.-W. Huang, H.-M. Wang, and Y. Tsao, “Multichannel speech enhancement by raw waveform-mapping using fully convolutional networks,” _IEEE/ACM Transactions on Audio, Speech, and Language Processing_ , vol. 28, pp. 1888–1900, 2020.
* [10] S. Chakrabarty and E. A. Habets, “Time–frequency masking based online multi-channel speech enhancement with convolutional recurrent neural networks,” _IEEE Journal of Selected Topics in Signal Processing_ , vol. 13, no. 4, pp. 787–799, 2019.
* [11] Y. Masuyama, M. Togami, and T. Komatsu, “Consistency-aware multi-channel speech enhancement using deep neural networks,” in _2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2020, pp. 821–825.
* [12] X. Xiao, S. Watanabe, H. Erdogan, L. Lu, J. Hershey, M. L. Seltzer, G. Chen, Y. Zhang, M. Mandel, and D. Yu, “Deep beamforming networks for multi-channel speech recognition,” in _2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2016, pp. 5745–5749.
* [13] B. Tolooshams, R. Giri, A. H. Song, U. Isik, and A. Krishnaswamy, “Channel-attention dense u-net for multichannel speech enhancement,” in _2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2020, pp. 836–840.
* [14] Z. Meng, S. Watanabe, J. R. Hershey, and H. Erdogan, “Deep long short-term memory adaptive beamforming networks for multichannel robust speech recognition,” in _2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2017, pp. 271–275.
* [15] X. Zhang and D. Wang, “Deep learning based binaural speech separation in reverberant environments,” _IEEE/ACM transactions on audio, speech, and language processing_ , vol. 25, no. 5, pp. 1075–1084, 2017.
* [16] Z.-Q. Wang and D. Wang, “All-neural multi-channel speech enhancement.” in _INTERSPEECH_ , 2018, pp. 3234–3238.
* [17] N. Shankar, G. S. Bhat, and I. M. Panahi, “Efficient two-microphone speech enhancement using basic recurrent neural network cell for hearing and hearing aids,” _The Journal of the Acoustical Society of America_ , vol. 148, no. 1, pp. 389–400, 2020.
* [18] Y. Luo, C. Han, N. Mesgarani, E. Ceolini, and S.-C. Liu, “Fasnet: Low-latency adaptive beamforming for multi-microphone audio processing,” in _2019 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU)_. IEEE, 2019, pp. 260–267.
* [19] Y. Luo, Z. Chen, N. Mesgarani, and T. Yoshioka, “End-to-end microphone permutation and number invariant multi-channel speech separation,” in _ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2020, pp. 6394–6398.
* [20] D. Wang, Z. Chen, and T. Yoshioka, “Neural Speech Separation Using Spatially Distributed Microphones,” in _Proc. Interspeech 2020_ , 2020, pp. 339–343. [Online]. Available: http://dx.doi.org/10.21437/Interspeech.2020-1089
* [21] X. Li and R. Horaud, “Multichannel speech enhancement based on time-frequency masking using subband long short-term memory,” in _2019 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics (WASPAA)_. IEEE, 2019, pp. 298–302.
* [22] X. Li and R. Horaud, “Narrow-band deep filtering for multichannel speech enhancement,” _arXiv preprint arXiv:1911.10791_ , 2019.
* [23] E. A. Habets, I. Cohen, and S. Gannot, “Generating nonstationary multisensor signals under a spatial coherence constraint,” _The Journal of the Acoustical Society of America_ , vol. 124, no. 5, pp. 2911–2917, 2008.
* [24] D. Mirabilii and E. A. Habets, “Simulating multi-channel wind noise based on the corcos model,” in _2018 16th International Workshop on Acoustic Signal Enhancement (IWAENC)_. IEEE, 2018, pp. 560–564.
* [25] H. Erdogan, J. R. Hershey, S. Watanabe, M. I. Mandel, and J. Le Roux, “Improved mvdr beamforming using single-channel mask prediction networks.” in _Interspeech_ , 2016, pp. 1981–1985.
* [26] X. Anguera, C. Wooters, and J. Hernando, “Acoustic beamforming for speaker diarization of meetings,” _IEEE Transactions on Audio, Speech, and Language Processing_ , vol. 15, no. 7, pp. 2011–2021, September 2007.
* [27] E. A. Habets, “Room impulse response generator,” _Technische Universiteit Eindhoven, Tech. Rep_ , vol. 2, no. 2.4, p. 1, 2006.
* [28] E. Hadad, F. Heese, P. Vary, and S. Gannot, “Multichannel audio database in various acoustic environments,” in _2014 14th International Workshop on Acoustic Signal Enhancement (IWAENC)_. IEEE, 2014, pp. 313–317.
* [29] K. Kinoshita, M. Delcroix, S. Gannot, E. A. Habets, R. Haeb-Umbach, W. Kellermann, V. Leutnant, R. Maas, T. Nakatani, B. Raj _et al._ , “A summary of the reverb challenge: state-of-the-art and remaining challenges in reverberant speech processing research,” _EURASIP Journal on Advances in Signal Processing_ , vol. 2016, no. 1, p. 7, 2016.
* [30] J. S. Garofolo, L. F. Lamel, W. M. Fisher, J. G. Fiscus, D. S. Pallett, and N. L. Dahlgren, “Darpa timit acoustic phonetic continuous speech corpus cdrom,” 1993.
* [31] A. W. Rix, J. G. Beerends, M. P. Hollier, and A. P. Hekstra, “Perceptual evaluation of speech quality (pesq)-a new method for speech quality assessment of telephone networks and codecs,” in _2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No. 01CH37221)_ , vol. 2. IEEE, 2001, pp. 749–752.
* [32] C. H. Taal, R. C. Hendriks, R. Heusdens, and J. Jensen, “A short-time objective intelligibility measure for time-frequency weighted noisy speech,” in _2010 IEEE International Conference on Acoustics, Speech and Signal Processing_ , 2010, pp. 4214–4217.
* [33] E. Vincent, R. Gribonval, and C. Fevotte, “Performance measurement in blind audio source separation,” _IEEE Transactions on Audio, Speech, and Language Processing_ , vol. 14, no. 4, pp. 1462–1469, 2006.
| arxiv-papers | 2021-07-27T05:03:18 | 2024-09-04T03:07:20.576040 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Siyuan Zhang and Xiaofei Li",
"submitter": "Siyuan Zhang",
"url": "https://arxiv.org/abs/2107.12601"
} |
2107.12602 | # Moving efficiently through a crowd: a nature inspired traffic rule
Danny Raj M [email protected] Department of chemical engineering, Indian
Institute of Science Bangalore, India Kumaran V [email protected]
Department of chemical engineering, Indian Institute of Science Bangalore,
India
###### Abstract
In this article, we propose a traffic rule inspired from nature, that
facilitates an elite agent to move efficiently through a crowd of inert
agents. When an object swims in a fluid medium or an intruder is forced
through granular matter, characteristic flow-fields are created around them.
We show that if inert agents, made small movements based on a traffic rule
derived from these characteristic flow-fields, they efficiently reorganize and
transport enough space for the elite to pass through. The traffic rule used in
the article is a dipole-field which satisfactorily captures the features of
the flow-fields around a moving intruder. We study the effectiveness of this
dipole traffic rule using numerical simulations in a 2D periodic domain, where
one self-propelled elite agent tries to move through a crowd of inert agents
that prefer to stay in a state of rest. Simulations are carried out for a wide
range of strengths of the traffic rule and packing density of the crowd. We
characterize and analyze four regions in the parameter space—free-flow, motion
due to cooperation, frozen and collective drift regions—and discuss the
consequence of the traffic rule in light of the collective behavior observed.
We believe that the proposed method can be of use in a swarm of robots working
in constrained environments.
###### pacs:
## I Introduction
As population increases, so does the average number of vehicles on roads. This
leads to large commuting times, traffic jams, unsafe driving conditions etc.
that makes traveling on road quite frustrating. In densely populated
countries, where the throughput of traffic is high, lane-flow is often not
enforced: in order to use up the extra space available on the roads. This is
particularly the case in most roads in India where the traffic is dense and
heterogeneous (consisting of two, three, four wheeler and sometimes even long
trucks). In these dense-traffic flows, it is not uncommon for emergency
vehicles like ambulances, rushing to a hospital with a patient, or a fire-
rescue mobile speeding towards an accident zone, to be slowed down
considerably or even get stuck in the traffic. Delays in reaching the spot,
could mean life or death in cases depending on the severity of the need of the
emergency service. Roadway-infrastructures that are in place in developing
countries are not ambulance friendly, resulting in a bottle-neck for the
health servicesR (2014); Menezes (2016); Sharma (2016); Service (2017).
Nevertheless, a skilled ambulance driver tries to maneuver through the crowd,
while the vehicles around the ambulance try to make small movements to make
enough space for the ambulance to move through. From the perspective of
traffic management, one might ask: how should the vehicles coordinate and move
to maximize the mobility of the ambulance? A common solution that drivers
resort to under such circumstances is to create an empty lane in front of the
ambulance, wide enough to allow it to pass through. This is done with the
vehicles moving to the sides or away from the ambulance. However, this is
possible only for the case where the density of the traffic is small enough
for the vehicles to make space for an extra lane. When densities are high,
ambulances often remain stuck, waiting for the traffic to be released at a
nearby junctionSundar _et al._ (2015) (a behaviour which is also observed in
experiments with pedestrians who anticipate and respond to an intruderNicolas
_et al._ (2019)). How then should vehicles move under dense traffic
conditions? Is there a traffic rule that the vehicles can follow to make small
coordinated movements such that the re-arrangement creates enough space for
the ambulance to pass through? Here, a traffic rule, refers to the movement
strategy that a vehicle can follow; typically a function of the state of the
surrounding traffic and the state of the vehicle with priority.
#### Motion in crowded environments:
In search of a traffic rule that maximizes the mobility of the ambulance
(elite agent), we turn to the several known natural and artificial systems
where we find motion in crowded environments. Swimmers move through a fluid by
displacing the fluid around them van Houwelingen _et al._ (2019); the
size/mass of the swimmer (even a micro-swimmer) is several orders of magnitude
greater than the molecules of the fluid that are displacedSpagnolie and Lauga
(2012). An example with similar features, where the sizes are comparable, can
be found in the field of granular physicsCandelier and Dauchot (2010); Kolb
_et al._ (2014). A solid intruder is driven at a constant force or velocity,
through a granular medium that is either at rest or under steady vibration.
Grains are displaced locally around the intruder and the resultant dynamics
leads to fluctuations in the velocity of the intruder or the force required to
maintain the same velocity. This constitutes the field of active micro-
rheology where the local structure of the medium is characterized from the
measured fluctuations. In addition, when the intruder used, has a structural
asymmetry like in a tapered rod (fore-aft), the intruder motion in a vibrated
granular bed is spontaneous due to the difference in rate of collisions
between the front and the rearKumar _et al._ (2014). Motion of these rods are
mediated via consistent re-arrangement of grains around the rod as it passes
through. When many rods are used, the grain re-arrangement around each of the
rods can result in long range interactions between other rods, that can give
rise to flocking.
Intruder motion through granular medium results in strong re-arrangements of
the inert grains around the intruder. With increasing density, intruder-motion
undergoes a fluidization transition from smooth to intermittent motion before
finally exhibiting jamming. Another interesting example of motion through a
crowded environment is the experiments of Tennenbaum et al Tennenbaum _et
al._ (2016), where they study the rheology of a suspension of fire ants. These
ants under low stress can interlock with its neighbors to exhibit a solid like
behavior and then open-up under the application of a high loading to behave
more fluid-like, exhibiting a non-Newtonian behavior. When a heavy object is
placed on top of a suspension of army ants packed in a column, they start to
open up their inter-lock and facilitate the motion of the heavy object through
the dense suspension. One would notice that the motion of ants are in such a
way that they move away from the front of the object while continuously
filling up its wake. These ants exhibit motion to allow the passage of the
heavy object.
#### Grains and traffic
: There are many differences between grains and vehicles that one should have
in mind before attempting to transfer ideas from granular physics to traffic
dynamics. Vehicles have a heading direction: movement is along the direction
in which the vehicle has oriented or its reverse; vehicles turn to change its
direction. Grains, on the other hand, do not have such a heading and they flow
or move in the direction where the force acts. Also, typical traffic scenarios
exhibit non-reciprocity in the inter-agent force: when B approaches A from
behind, only B is expected to slow down without any change in the behavior in
AHelbing (2004). That is, the forces between two nearby agents A and B are not
equal and opposite $(\mathbf{F}_{A-B}\neq\mathbf{F}_{B-A})$. Since, grains do
not have this heading direction which is necessary to define what the front
and back of an agent is, we do not consider this feature in the model
presented in this article.
The solution to the problem of moving through a crowd is non-obvious even for
the case where the agents move like grains. In addition to being a simpler
starting point, it bears relevance to a system where the agents are capable of
movement in all directions, operated in a constrained environment (like
drones). Hence, in the remainder of the article, we focus our attention to
agents that do not have an orientation and investigate the problem of
identifying and evaluating the traffic rule that an inert crowd of agents can
follow to facilitate large movement of an elite agent.
## II Model
### II.1 Deriving a nature-inspired traffic rule
In granular physics (and other complex flows too), one can characterize the
micro-structure of the granular medium and its response to local stress, by
observing the motion of an intruder through the medium Squires and Brady
(2005); KHAIR and BRADY (2006); Wilson _et al._ (2009); Wilson and Poon
(2011); Reichhardt and Reichhardt (2015); Zia (2018). By posing a problem
where we search for a traffic rule that maximizes the mobility of the intruder
or elite (objective), we are in fact solving an inverse problem where our
interest is in determining the optimal microrheology of the crowd. An intruder
driven through a granular medium generates a characteristic flow of grains
around it, which can be visualized by averaging the particle velocities over
time. It is a flow-field with a source-sink like feature due to the emptying
of grains from the frontal region of the intruder while simultaneously filling
its rear end (fig 6b in ref Candelier and Dauchot (2010)). A simple functional
expression that can capture the trend qualitatively is a dipole field, let’s
call this $U$. Note that the velocity fields observed in real granular flow
scenarios do not necessarily have a $1/r^{2}$ dependence or a fore-aft
symmetric decay.
Figure 1: Dipole field ($U(\mathbf{r}_{j})$ as in Eq 1), plotted around the
elite agent and the directions of the force and the resultant motion of the
inert agents according to the dipole traffic rule, when
$\mathbf{v}_{e}<\mathbf{v}_{0}$. The arrows here represent the direction and
not the magnitude (which scales as $\frac{1}{r^{2}}$, where $r$ is the
distance of the inert from the elite). The vector displacement w.r.t. the
elite, $\mathbf{r}_{j}$, is marked for a single inert agent.
#### Traffic rule:
One can define a traffic rule based on this dipole field: i) imagine this
fictitious field $U$ to be around the elite agent (e), ii) inert agents (j)
respond to this field through a force on them proportional to $U$ evaluated at
the position of the inert. $U$ is given as in Eq 1 (corresponding to two-
dimensional flows) where, $\mathbf{v}_{0}$ is the desired velocity of the
elite agent whose instantaneous velocity is $\mathbf{v}_{e}$, $\mathbf{r}_{j}$
is the position vector of the inert with respect to the elite and
$r=\|\mathbf{r}_{j}\|$ (as illustrated in figure 1).
$\displaystyle\mathbf{U}(\mathbf{r}_{j})=\frac{(\mathbf{v}_{e}-\mathbf{v}_{0})}{r^{2}}.\Bigg{[}\boldsymbol{\delta_{ij}}-2\frac{\mathbf{\mathbf{r}}_{j}\otimes\mathbf{\mathbf{r}}_{j}}{r^{2}}\Bigg{]}$
(1) $\displaystyle\text{where, }\mathbf{r}_{j}=\mathbf{x}_{j}-\mathbf{x}_{e}$
Note that when the elite agent travels at the desired velocity, the strength
of the dipole field drops to zero. This way, the motion of the inert is
induced by the traffic rule only when the elite is unable to move in its
desired velocity, thereby minimizing the need for the motion of inert whenever
possible. From the perspective of an optimization formulation, this choice of
implementation of the dipole traffic rule, implicitly encodes for two
objectives simultaneously: maximising the mobility of the elite agent at
minimal or no movement of the inert agents.
### II.2 Particle based model
Agents in traffic flows can be modeled in a way similar to grains in granular
flows. A discrete particle approach to granular matter, involves modeling
grains as particles with finite size, defined by the positions and velocities
of their center of masses. Their positions are updated based on the
instantaneous velocities, which evolve based on Newton’s second law of motion.
Hence to solve this problem, a complete knowledge of the different forces on
the grain is necessary: external, inter-particle, particle-boundary, etc. All
the forces experienced by grains have a physical origin that include friction,
inertia, gravity, incompressibility etc. While agents in traffic flow exhibit
some of these characteristics like inertia, impenetrability etc., their motion
is primarily behavioral in nature—where agent tries to move with a velocity it
desires or avoids collision with neighbors etc. This behavioral maneuvering
can be explained with what are called, social forcesHelbing and Molnár (1995).
We model agents as finite sized, circular particles (with radius $R$) moving
on a 2D plane under the influence of social forces. Eq 2 shows how the
position of an agent $\mathbf{x}_{j}$ is updated based on the knowledge of its
velocity $\mathbf{v}_{j}$. Eq 3 is the Newton’s second law with the social
forces for the agents. Agents experience three different types of forces in
our model. i) restitution force that always attempts to bring the agent to its
desired state of rest or motion ii) collision-avoidance force that prevents
collision between agents and the iii) dipole force inspired from nature, which
induces or coordinates the motion of inert around the elite.
$\frac{d\mathbf{x}_{j}}{dt}=\mathbf{v}_{j}$ (2)
$m_{i}\frac{d\mathbf{v}_{i}}{dt}=-m_{i}\frac{\mathbf{v}_{i}}{\tau}+\sum_{\forall
j\neq i}\mathbf{F}_{ij}^{r}+K\mathbf{U}_{i}$ (3a)
$m_{e}\frac{d\mathbf{v}_{e}}{dt}=m_{e}\frac{\mathbf{v}_{0}-\mathbf{v}_{e}}{\tau}+\sum_{\forall
j\neq e}\mathbf{F}_{ej}^{r}$ (3b)
$\displaystyle\mathbf{F}_{ij}^{r}=\begin{cases}-\gamma_{r}(\mathbf{d}_{ij}-2R)^{-(B+1)}\hat{\mathbf{d}}_{ij}&|\mathbf{d}_{ij}|<l_{cr},\mathbf{\dot{d}}_{ij}>0\\\
0&\mbox{otherwise}\end{cases}$ (3c) $\displaystyle\text{where,
}\mathbf{d}_{ij}=\mathbf{x}_{i}-\mathbf{x}_{j}\text{ and
}\mathbf{\dot{d}}_{ij}=\mathbf{v}_{i}\cdot\mathbf{d}_{ji}+\mathbf{v}_{j}\cdot\mathbf{d}_{ij}$
The first terms in the R.H.S. of Eq 3a and 3b , are the restitution social
force for the inert and elite respectively, similar to that used in refHelbing
_et al._ (2000a, b). In the absence of all other forces, the inert agents will
stop moving while an elite agent will move with a velocity $\mathbf{v}_{0}$,
in $\mathcal{O}(\tau)$ seconds. The motivation of the agents to move in
certain directions with a preferred speed, is what makes the system of agents
active; energy is pumped into the system through this term. The second term is
the inter-agent interaction force, that brings in the agent’s reaction to a
nearby neighbor, to avoid collision. The third term (only seen in Eq 3a)),
incorporates the effect of the traffic rule explained in section II.1. The
dipole field is conceptualized as a force, $\mathbf{F}_{dipole}=K\mathbf{U}$,
where $K$ is the strength of the dipole force ($K=0$ represents the case with
no traffic rule). The motion of the elite agent is modeled in a similar
fashion, as shown in Eq 3b. The only differences are the desired velocity
$\mathbf{v}_{0}$ instead of the state of rest and the absence of the traffic
rule. In the swarm robotics community, the approach to modeling collective
behavior discussed here, is termed as physicomimetics Spears _et al._ (2005).
Agents avoid collisions with other agents by responding to their approach.
$\mathbf{F}_{ij}^{r}$ characterizes the force between agents $i\text{ and }j$
when they are in close proximity and approaching each other. The nature of the
force as defined in Eq 3c does not allow the circular agents (with area $2\pi
R^{2}$) to overlap: force $\to\infty$ when $|\mathbf{d}_{ij}|\to 2R$. The
dependence of the magnitude of force on the distance between agents
$|\mathbf{d}_{ij}|$ is defined by the parameter $B$. If the value of $B$ is
very high, the interaction between agents tends to become hard-sphere, like in
a granular medium. However, in traffic flow scenarios, one would expect the
agents to respond to approaching agents in advance and slow down to prevent a
collision (due to the behavioral origin of the social force). To model such a
behavior, one has to choose a smaller value for $B$, but care should be taken
to eliminate long range correlations that may arise. Hence, we employ $B=2$ in
our simulations (similar to Helbing _et al._ (2000b)), and use a cut-off
length $l_{cr}=3R$, to make an agent interact only with its immediate
neighbors.
In addition to proximity, we consider this force only when agents approach
each other, i.e. $\mathbf{\dot{{d}}}>0$. As a result, agents moving with the
same velocity will not experience a force even if they are in close proximity,
allowing them to have a heterogeneous density field in a crowded system. If
the interaction had been purely repulsive and not dependent on whether or not
the agents approached each other, then the interaction would have attempted to
smooth-out the density variations in the system. This feature in the
interaction is common in real dense traffic, where agents respond to neighbors
only when they approach. An agent decelerates slowly when the approaching
agents are far away, a faster response when they are in close proximity and no
response when not approaching. When the agents are crowded, in a slowly
drifting jammed state, they do not try to move away from each other, but only
move in desired direction while avoiding collisions.
## III Results and Discussion
Figure 2: The density–dipole-field strength ($K-\rho$) parameter space can be
divided into four regions: I – free flow, II – motion with traffic rule, III –
frozen and IV – collective drift. Thick lines – total mobility and thin lines
– only due to collective drift.
To test the effectiveness of the dipole traffic rule, simulations are carried
out for a range of packing densities $\rho\in(0.2,0.85)$ and dipole strengths
$K\in[0,50]$, in a 2D periodic domain (unit cell width and length, $W\times
L$), consisting of $150$ agents which include $1$ elite agent (other system
sizes are also attempted to make sure that there is no loss of generality).
Two types of initial configurations of agents are used in our simulations; a
regular triangular and a disordered random packing (obtained from Specht
(2018)). Unless specified, the results shown in the article are for the case
of regular initial arrangements. The initial configurations are subject to
fluctuating forces with collision avoidance to perturb the agents from any
symmetric arrangements. The resultant assembly of agents then serves as the
initial condition for the simulations with the traffic rule. The desired
direction and speed of the elite agent are set as $-x$ direction and unity
respectively, as shown in Eq 4.
$\mathbf{v}_{0}=\mathbf{e}_{-x}$ (4)
The parameters, relaxation time scale $\tau$ and the mass $m_{i}\text{ and
}m_{e}$ of the agents, are chosen to be unity without loss of generality. The
dynamics of the traffic problem depends on the parameter $\gamma_{r}$ which is
the strength of the inter-agent interaction. However, the qualitative features
of the results presented in the article are expected to remain unchanged.
Based on the dynamics of traffic flow, we identify four regions in the
parameter space, highlighted in figure 2 (see ESI for video).
1. 1.
A free-flow region corresponding to low packing densities, where motion of the
elite is possible even in the absence of the dipole force (hashed region,
marked as I),
2. 2.
Motion under cooperation region where the dipole traffic rule is essential for
movement of the elite (region II),
3. 3.
Frozen region where motion of the elite is insignificant (thick solid lines
mark the different contours of mobility, in region III) and
4. 4.
Collective drift region (IV) where the local frozen micro structure determines
the flow direction and speed of drift of the entire assembly (thin solid lines
mark the mobility due to drifting, which is found in some parts of region II
as well).
In what follows, we analyze the movement of the elite in these four different
regions in the parameter space. We compute the mobility of the elite, and
probe into the movement of the inert agents in light of the collective
phenomena exhibited.
### III.1 Free flow regime
When packing densities are less than approximately $0.5$, the elite agent
forces its way through the inert crowd even in the absence of the dipole
traffic rule. As the elite travels through the crowd, it encounters inert
agents that behave as obstacles to the motion of the elite, thereby reducing
its mobility $\mathcal{M}$, defined as the time-averaged velocity of the elite
agent in the principle direction of motion (see, Eq 5).
$\mathcal{M}=\frac{\int_{0}^{T}{\mathbf{v}_{e}\cdot\mathbf{e}_{-x}dt}}{T}\\\ $
(5)
The mobility $\mathcal{M}$ quantifies the net-movement in the direction of
$\mathbf{v}_{0}$, averaged over time. In addition to slowing down, interaction
with the inert results in drifting $\mathcal{D}$ along the direction
perpendicular to the principle direction of motion. We define $\mathcal{D}$ as
the average absolute velocity in that direction as shown in Eq 6.
$\mathcal{D}=\frac{\int_{0}^{T}{|\mathbf{v}_{e}\cdot\mathbf{e}_{y}|dt}}{T}$
(6)
The drift $\mathcal{D}$ quantifies the average excursions of the elite in a
direction transverse to that of the intended one ($\mathbf{e}_{\pm y}$). When
the elite agent travels in the direction of $\mathbf{v}_{0}$, at all time,
$\mathcal{D}$ takes a value of $0$ and $\mathcal{M}$ takes the value of $1$.
Figure 3: Mobility characteristics in the free-flow region. (a) - Mobility
$\mathcal{M}$ as a function of $K$ for different values of the density; (b) -
Drift $\mathcal{D}$ as a function of $K$ for different values of the density;
(c) - Normalized drift and mobility $\bar{\zeta}$ as a function of K for
different values of density, collapses onto a single curve
In the presence of the traffic rule, the inert agents move around the elite,
resulting in a reduction in the interactions between the elite and the inert
agents and thereby reducing the resistance. As a result, with increasing $K$,
mobility increases (with $\mathcal{M}|_{K\to\infty}\to 1$, see figure 3 (a)).
However, drifting exhibits a non-monotonic behaviour with $K$. We find that
$\mathcal{D}$ initially increases and then it decreases with $K$ as
$\mathcal{D}|_{K\to\infty}\to 0$ (see figure 3(b)). This is because, in the
absence of any traffic rule $(K=0)$, motion of the elite in the principle
direction is strongly reduced due to head-on collisions with the neighbouring
inert agents, which subsequently reduces the total movement in the
perpendicular direction. However, the ratio of drift to mobility
($\mathcal{D}/\mathcal{M}$), is found to be monotonically decreasing. We
observe the normalized mobility and drift-mobility ratio, $\bar{\mathcal{M}}$
and $\bar{(\frac{\mathcal{D}}{\mathcal{M}})}$ computed as in Eq 7, to be
invariant to packing density, depending only on $K$ as,
$\big{[}1-\exp\big{(}{-aK^{b}\big{)}}\big{]}$ (where $a,b=0.5$) in the free-
flow regime.
$\displaystyle\bar{\zeta}(K)=\frac{\zeta(\rho,K)-\zeta(\rho,0)}{{\zeta(\rho,\infty)}-\zeta(\rho,0)}$
(7) $\displaystyle\text{where, }\zeta=\frac{\mathcal{D}}{\mathcal{M}}\text{ or
}\mathcal{M}\text{ and }\rho\lesssim 0.5$
Figure 4: Crowd-characteristics at high densities, where motion is possible
only with the dipole traffic rule. (a)- $q_{6}$ order parameter for the
neighbors around the elite agent as a function of time for $K={0,12}$ of
$\rho=0.73$. We observe fluctuations in the order parameter when the traffic
rule is in place; (b)- Time-averaged $q_{6}$ order parameter as a function of
distance from the elite $(r_{ej})$ for $K={0,12}$ of $\rho=0.73$, shows
melting of the assembly close to the elite; (c)- Local crowd configuration
around the elite for the case without any traffic rule; (d)- Dynamically
evolving local crowd configuration around the elite as the dipole traffic rule
coordinates the re-arrangement of the inert agents to facilitate the motion of
the elite.
### III.2 Frozen vs motion with traffic rule
As the density of packing is increased $(>0.5)$, the motion of the elite agent
is strongly constrained and the system eventually becomes frozen (which
corresponds to $\mathcal{M}\leq 0.075$). When completely frozen and in the
absence of the traffic rule, the entire system consisting of both the elite
and the inert, drifts with a velocity $\mathbf{v}_{i}=\mathbf{v}_{0}/N$, and
with a corresponding $\mathcal{M}=1/N$ due to the forcing of the elite agent.
The arrangement of the agents around the elite becomes compact and triangular.
One could evaluate the $q_{6}$ order parameter, defined as
$\big{\langle}\sum_{k\in\eta_{j}}\exp(-6\theta_{jk}\rm{i})\big{\rangle}_{j}$,
where $\eta_{j}$ consists of the $6$ nearest neighbours of the agent $j$. When
the arrangement around an agent is triangular (close packed), the order
parameter takes the value of unity. When the assembly is frozen, the
corresponding $q_{6}$ averaged over all the agents, becomes $\approx 1$.
Presence of the dipole traffic rule, does not guarantee motion of the elite as
the system may still be frozen. As the strength $K$ of the dipole force is
increased, the inert agents around the elite begin to make enough movements,
to give rise to the motion of the elite.
If one were to compute the $q_{6}$ order parameter for the inert agents, just
around the elite agent, it is quite evident that the crystallized agents melt,
to make the motion of the elite agent possible as seen in figure 4a. We
observe periodic oscillations in the $q_{6}$ parameter as the elite moves
through the inert crowd, when the dipole rule is turned on. In contrast, when
the traffic rule is not in place, the $q_{6}$ parameter rises to a value close
to unity and stays unchanged. We also observe that the melting is local. A
time-averaged $q_{6}$ order parameter, plotted as a function of distance from
the elite $r_{ej}$ (see, figure 4b) shows, a reduced $(\langle
q_{6}\rangle_{t})$ near the elite which increases monotonically to higher
values far away from the elite in the presence of the traffic rule. This
suggests that the change in configuration of the agents that facilitates
motion of the elite is primarily local in nature.
To understand how the changes in local configuration facilitates the motion of
the elite, we examine the position and motion of the immediate neighbours of
the elite agent at various time points, as the elite cruises through the inert
crowd. Figure 4c, shows the compact triangular arrangement of the inert around
the elite when the assembly is frozen. Without the traffic rule, the elite
tries to move forward and very soon results in tight arrangements that
restricts any further motion (i and ii in figure 4a, c). On the other hand
(see figure 4d), when the dipole traffic rule is switched on, the agents
initially form a compact configuration which arises as a result of the forward
motion of the elite through the crowd. Once this motion is no longer possible,
due to the local compaction of the assembly, the inert agents begin to slide
around the elite (due to the traffic rule). This gives rise to more of the
inert agents in the rear of the elite than its front, breaking the fore-aft
symmetry and resulting in a smaller value of $q_{6}$ parameter (see
configurations 1 to 3 in figure 4a, d). As the inert moves around the elite,
it opens up space in front of the elite and introduces new neighbours for the
elite to interact with changing the immediate configuration around it. Once
sufficient space is created, the elite agent quickly moves to the new
configuration (4-5 transition in figure 4a, d) to result in another compacted
local arrangement and the process continues. One should note that several
other re-arrangement events as the elite moves, and periods of drifting can
make the configuration change much more complicated. However, the series of
steps described in figure 4d conveys the major events that occur during the
motion of elite in the presence of a traffic rule at high densities.
Figure 5: Micro-structure of the frozen assembly (top panels) and the
corresponding drift direction (lower panels) as observed in the numerical
simulations and that which is calculated based on Eq 9c using varying amounts
of information of the micro-structure (agents within $C_{1},C_{2},C_{3}$, all
$N$ agents and including their images).
### III.3 Collective drift
At very high packing densities, when the assembly of agents is frozen, the
only motion expected is a slow drift, where the elite agent pushes the all the
agents with a velocity $\|\mathbf{v}_{k}\|=\frac{\|\mathbf{v}_{0}\|}{N}$; this
is indeed observed when $K$ is small. However, interestingly at high values of
$K$, we observe a more significant drift (in the direction $\mathbf{e}_{-x}$,
for regularly packed initial configurations) where the
$\|\mathbf{v}_{k}\|\gg\frac{\|\mathbf{v}_{0}\|}{N}$. If the drifting observed
is due to the dipole traffic rule, then the features of drifting, namely the
magnitude and direction of the drift velocity, should be a function of the
local packing, or the frozen microstructure. Here, the microstructure of the
frozen assembly refers to the relative displacement of the inert agents around
the elite: $\mathbf{r}_{j}$ (as defined in Eq 1). Simulations with a randomly
packed assembly of agents (initial configuration), reveals that the direction
can be arbitrary and dependent on the arrangement of the inert agents around
the elite. When the density of packing is such that the system exhibits
intermittent dynamics, we observe drifting to occur during the periods when
the elite is caged and every time the cage breaks and the elite moves to a new
one, there is major restructuring of the inert agents around the elite which
results in the emergence of a new drift direction every time (see ESI for
video).
To understand the relation between the steady state drift velocity
$\mathbf{v}_{s}$ and the microstructure of the frozen assembly, we can go back
to the governing equations Eq 3a and 3b. Assuming steady state and
frozen-‘ness’ of the assembly—which means that the the direction of the drift
is a constant and there is no change in the microstructure—one can derive a
relation between $\mathbf{v}_{s}$ and $\mathbf{I}_{ij}$.
$\mathbf{I}_{ij}=\boldsymbol{\delta_{ij}}-2\frac{\mathbf{\mathbf{r}}_{j}\otimes\mathbf{\mathbf{r}}_{j}}{r^{2}}$
(8)
Here the tensor $\mathbf{I}_{ij}$, is purely a function of the frozen
microstructure $\mathbf{r}_{j}$, and quantifies the contributions of the local
arrangement on the dipole traffic rule (Eq 8 is same as the term within the
square brackets in Eq 1). When the assembly is frozen, the structure of the
assembly remains unchanged. Hence, we can neglect the force between agents
(collision avoidance) and sum all the forces up as shown in Eq 9a, where
$\mathbf{v}_{i}$ becomes the drift velocity $\mathbf{v}_{s}$ (note: in our
study we have assumed $m_{e}=m_{i}=1$). Substituting Eq 1 in 9a, gives rise to
Eq 9b. With further simplification one can arrive at Eq 9c which shows the
relation between the frozen crowd-microstructure and the drift velocity.
$\sum_{\forall j\neq
e}\Big{(}K\mathbf{U}_{j}-\frac{\mathbf{v}_{s}}{\tau}\Big{)}+\frac{\mathbf{v}_{0}-\mathbf{v}_{s}}{\tau}=0$
(9a)
$\sum_{\forall j\neq
e}\Big{(}K(\mathbf{v}_{s}-\mathbf{v}_{0})\mathbf{I}_{ij}-\frac{\mathbf{v}_{s}}{\tau}\Big{)}+\frac{\mathbf{v}_{0}-\mathbf{v}_{s}}{\tau}=0$
(9b)
$\mathbf{v}_{s}=\mathbf{v}_{0}\cdot\Big{(}K\tau\sum_{\forall j\neq
e}\mathbf{I}_{ij}-\delta_{ij}\Big{)}\Big{(}K\tau\sum_{\forall j\neq
e}\mathbf{I}_{ij}-N\delta_{ij}\Big{)}^{-1}$ (9c)
When the strength of the traffic rule is very high, $K\to\infty$,
$K\tau\sum_{\forall j\neq e}\mathbf{I}_{ij}\gg N\delta_{ij}>\delta_{ij}$,
which results in $\mathbf{v}_{s}=\mathbf{v}_{0}$. Even if the elite is not
able to make a way through the crowd, the elite can achieve its desired
direction and speed through collective drift. It is interesting to find that
the effect of local microstructure becomes irrelevant for very large $K$ and
desired motion $\mathbf{v}_{0}$ of the elite is forced on every agent in the
system. Similarly, when $K\to 0$, we recover the motion of a frozen crowd with
just the elite agent propelling $\mathbf{v}_{s}=\frac{\mathbf{v}_{0}}{N}$.
For intermediate values of $K$, where the effect of microstructure is
important, it is interesting to ask how much of this microstructure, around
the elite, actually contributes to the drifting direction and magnitude. To
answer this question, we analyze the $r$ and $\theta$ dependence of the dipole
force. Let’s begin with the $r$-dependence. Agents far away experience only a
smaller magnitude of force $\sim\frac{1}{r^{2}}$. However, the number of
agents at a distance $l$ from the elite has an $r^{2}$ dependence. Hence the
total force would be $r^{2}\times\frac{1}{r^{2}}=\mathcal{O}(1)$. This
suggests that drifting depends on the microstructure of the entire assembly.
Turning to the $\theta$-dependence, for the form of the dipole force used (Eq
1), the integral around the elite at a distance $l$ from it, is zero
$\big{(}\int_{\theta}\mathbf{U}_{\mathbf{r}_{j}=l}d\theta=0\big{)}$. However,
because of the granularity of the agent assembly around the elite (since inert
agents are comparable in size to the elite), and the absence of symmetry (due
to the perturbations given to the initial conditions), the $\theta$ positions
around the elite are not well represented. As a result, the integral does not
vanish $(=0)$ giving rise to a non-zero value for sum of dipole forces.
However, as $l$ increases, agents positions become less granular and the
integral may take smaller values. This is sensitively dependent on how the
agents are frozen around the elite. Only when the distance is much larger than
the length scale in the system $l\gg R$, the integral might vanish. This large
$l$, would correspond to a system size $\gg(10\times N)$, much greater than
that considered in this work.
To understand the effect of microstructure further, we turn to numerical
simulations. Once the agent-assembly is frozen, for high densities, one can
compute the $I_{ij}$ for each agent in the frozen assembly, and estimate the
drift velocity $\mathbf{v}_{s}$ from Eq 9c. Instead of using all the
information of the inert-agent positions, we compute the $\mathbf{v}_{s}$ from
partial information of the microstructure, with only agents around the elite,
say $r=C_{k}$. The different distances $C_{k}$ considered are $C_{1}=3R$,
$C_{2}=6R$, $C_{3}=\frac{1}{2}W$ and $C_{k}>L$ corresponding to the entire
microstructure. In addition, we also consider the effect of the images of the
elite for $C_{k}>L$. Figure 5 shows the drift velocity of the assembly
observed in simulation and that which is computed from both the partial and
complete knowledge of the frozen microstructure. The three configurations
presented are exemplary of the drifting frozen assemblies observed in our
simulations. We see that $\mathbf{v}_{s}$ computed from the microstructure
information withing $C_{1}$ seldom predicts the correct direction or the
magnitude.
Clearly as $C_{k}$ increases, the predictions become better. Deviations from
the observed drifting, even for large values of $C_{k}$, can be attributed to
the departure from the assumptions made to perform these calculations: steady-
state and frozen-ness of the assembly. It is interesting to note the large
variation in the observed drifting even among the select few examples in
figure 5. When comparing figures 5 (a) and (b) (regular packed initial
configurations), we observe an overall collective drift in the direction that
the elite desires to move in. However, we observe that speeds of drifting
differ by a factor of $2$. On the other hand, when one begins with a
disordered assembly where the heterogeneity in the density of packing and the
corresponding variation in the microstructure is high, both the direction and
magnitude can be very different (as in figure 5 (c)). One should note that it
is impossible to predict the direction of drifting from only a visual
observation of the assembly of the inert crowd.
The 2D periodicity of the domain allows the agents to drift in any direction.
If the assembly was 1D periodic (say in $\mathbf{e}_{\pm x}$, parallel to the
desired direction of the elite), bound by walls in the perpendicular direction
($W\mathbf{e}_{\pm y}$), drifting would have been constrained to
$\mathbf{e}_{\pm x}$ directions. This is because the walls, by definition, are
immovable and hence are capable of absorbing forces in the $\mathbf{e}_{y}$
direction.
### III.4 Mobility of the elite
The mobility of the elite agent computed from Eq 5 includes both, i) the
motion of the elite due to re-arrangement of the inert agents
$\mathcal{M}_{e}$, and ii) the drifting of the entire assembly when frozen,
$\mathcal{M}_{d}$, both in the presence and absence of the traffic rule. To
compute $\mathcal{M}_{d}$, we analyze the variations in the total area of the
first Voronoi neighbors of the elite agent. The time-stamps $t_{d}$
corresponding to drifting of the assembly are identified (corresponding to
negligible or no variations in the Voronoi areas) and the quantity
$\langle\mathbf{v}_{e}\cdot\mathbf{e}_{x}\rangle\Big{|}_{t\in t_{d}}$ is
evaluated at $t_{d}$, to determine the mobility $\mathcal{M}_{d}$.
Previously in figure 2, where the four distinct regions are marked, we show
two sets of contours: the thick lines belong to $\mathcal{M}$, the total
mobility and the thin ones are $\mathcal{M}_{d}$ that are only due to
collective drifting. Any mobility of the elite in region IV is only due to
$\mathcal{M}_{d}$, whereas in high-K part of region II, mobility is due to
both $\mathcal{M}_{d}$ and $\mathcal{M}_{e}$. Hence, one can subtract the
contribution of $\mathcal{M}_{d}$ from the total mobility $\mathcal{M}$, to
compute $\mathcal{M}_{e}$. Figure 6, shows the contours of $\mathcal{M}_{e}$.
At a certain crowd-density $\rho_{0}$, in the absence of the traffic rule
$K=0$, the elite agent would have a corresponding mobility
$\mathcal{M}_{e}=\mathcal{M}_{0}$. If the density of the crowd were to
increase, so will the dipole strength $K$ required to maintain the same
mobility $\mathcal{M}_{0}$. However, the crowd cannot be packed to a density
greater than the maximum $\rho_{m}=\frac{\pi}{2\sqrt{(3)}}$.,which also means
that close to this value of packing density no amount of dipole force can
facilitate motion of the elite. Hence, we expect $K$ to diverge at $\rho_{m}$,
i.e., $\rho\to\rho_{m}$, $K_{c}\to\infty$. This can be captured nicely by the
functional form relating $K_{c}\text{ to }\rho$ as shown in Eq 10.
$K_{c}=\frac{\alpha}{(\rho_{m}-\rho)^{\beta}}$ (10)
For very small values of $\mathcal{M}_{0}\to 0$, the mobility curves start to
get dense and can be sufficiently explained by Eq 10 with $\beta$ as high as
$\simeq 4$ and $\alpha$ is $\mathcal{O}(10^{-2})$ (the fit is shown as a thick
dotted line in figure 6).
Figure 6: Contours of the mobility of the elite agent, $\mathcal{M}_{e}$
without any contributions from drifting. The dotted line corresponds to the
fit ($\alpha=0.01$ and $\beta=4$) as in Eq 10. Figure 7: Representative
trajectories of the inert agents in the crowd.
### III.5 Trajectories of the inert
While the primary objective of the traffic rule is to maximise the movement of
the elite agent through the crowd, the secondary objective is to achieve the
primary at minimum movement of the inert. Hence, it is important to understand
how the inert move around the elite to achieve the elite’s mobility. We
explore the trajectories formed by the inert agent as the elite moves past
them and classify them broadly into five different types.
#### Non-intersecting:
When there is no traffic rule in place, the elite pushes the inert away as it
tries to move through the crowd (at low packing densities). This results in
trajectories as shown in figure 7a.
#### Intersecting:
In the presence of a traffic rule, inert agents respond to the elite agent
differently depending on their relative position with respect to elite. An
agent in front of the elite is pushed away, while that in its rear position is
pulled towards it. Hence, as an elite agent passes by, an inert moves away and
then towards the elite, giving rise to trajectories that intersect, like the
one seen in figure 7b. Multiple crossings observed in the figure is due to
multiple encounters with the elite (as a result of the 2D periodic domain).
#### Coiled:
When the inert agents are slightly away from the elite in the transverse
direction, they exhibit coiled trajectories as shown in figure 7c which
results in very minimal displacement to make space for the elite to pass by.
#### Trapped agents:
In a small range of densities $\sim(0.42,0.55)$ and $K>20$ we observe trapping
of inert agents in the sink part of the dipole field of the elite. When
densities are lower, the effect of the traffic rule is also low because the
elite’s velocity is close to $\mathbf{v}_{0}$ (see Eq 1). However, as the
density increases, $\mathbf{v}_{e}$ reduces and consequently, the traffic rule
strength becomes higher and affects the motion of agents in the neighborhood
significantly—with the inert attracted to the sink and repelled from the
source. Inert agents get trapped in the rear end of the elite and follow it as
it moves through the crowd. As the density is increased further, the inert
experiences more collisions with other inert agents in the crowd which
dislodges the inert from the elite’s tail. This phenomenon leads to the
formation of long trajectories like the ones shown in figure 7d. From the
perspective of the secondary objective of the traffic problem, trapping should
be avoided.
#### Collective drifting:
When the system as a whole exhibits drifting due to the traffic rule (section
III.3), we observe all agents to move in a similar manner. Figure 7e, shows
how all the inert agents have similar trajectories during drifting. Slight
differences could be due to minor re-arrangements that occur while the frozen
assembly drifts. Collective drifting fails to fulfil the secondary objective
of minimising the movement of the inert. But one should note that in the
absence of any drifting, the assembly is frozen and does not fulfil the
primary objective of the problem which is to facilitate the motion of the
elite.
## IV Conclusions
As we slowly enter the age of autonomous vehicles, there is a need to deal
with the challenges associated with decentralized-control. Control algorithms
in vehicles should not just be designed to avoid collisions, but also react to
a time of emergency, like the one described in the introduction of the
article—ambulance rushing to the hospital—where there is a need to facilitate
motion of the vehicle with priority. Identifying the optimal control strategy
for the above problem or any other traffic problem for that matter, can be a
very hard problem to solve, since we are dealing with many agents. Hence,
swarm engineering has always reached out to bio-inspired methods for answers.
The work presented in this article, is an example of a nature-inspired method
to the solution of a complex-traffic problem. The traffic rule presented in
this article circumvents the use of an optimization approach to scheduling the
movement of the inert agents around the elite. However, it implicitly encodes
two important objectives that are relevant for the traffic problem: increasing
the movement of the elite agent with only minimal movement of the inert
agents.
#### Summary:
We study the problem of movement of an elite agent with priority through an
otherwise inert crowd. Taking advantage of the similarities in granular and
traffic flows, we propose a solution from the knowledge of the flow fields of
grains around an active intruder. We derive a traffic rule that the inert
agents can follow and make small movements to allow the passage of the elite
agent. The inert agents respond to an imaginary dipole field around the elite
and rearrange accordingly to create enough space for the elite to move. We
find that depending on the packing density of the crowd and the strength of
the dipole field, the parameter space can be divided into different regions
with characteristic flows. We show that the motion of the elite with the
traffic rule is more efficient than without it. As density increases, the
motion of the elite is via the local melting of the crystallized assembly. At
even higher densities, where melting is not observed, motion can be due to a
collective drifting mechanism, which depends on the local configuration of the
inert around the elite.
#### Can the rule be used in real Indian traffic scenario?:
The traffic rule facilitates the inert agents to move around the elite
creating space in front of it and occupy the space already formed at the
elite’s wake as it propels forward. It is interesting to note that in real
lane-less flows, when an ambulance tries to make its way through a crowd,
vehicles in the front of it begin to form denser arrangements, while those at
the back readily occupy the empty space in the ambulance’s wake, without
giving any opportunity for the transport of the available space from the back
to the front of the elite agent—much like the case with no traffic rule in our
simulations. This is because, in real vehicular traffic, the maneuver that the
inert have to follow according to the traffic rule discussed in this article,
is close to impossible to achieve for human drivers under normal conditions.
However, it could be a possibility when the entire crowd is in motion, where
the inert can simply slow down and drift sideways to occupy the space behind
the elite. When the agents are autonomous and self-driving, it may be possible
to implement this traffic rule.
#### Other problems in swarm robotics:
The above idea can be extended to other interesting problems in robotics,
namely the movement of a drone or a swarm of them, through an array of
obstacles. The problem here, is to figure out the optimal flight path that
results in efficient movement of the drones. If a dipole field is assumed to
be centered around a perceived obstacle, it will help in guiding the motion of
drones around it. In the case of multiple obstacles, a simple superposition of
all the fields can essentially provide a possible safe path for the drones. It
would be interesting to see how this rule would fare, in a virtual environment
in the presence of collision avoidance measures and then eventually test these
nature-inspired rules on real swarm robots.
###### Acknowledgements.
DRM would like to thank DST INSPIRE faculty award for the funding.
## References
* R (2014) S. R. R, “When city traffic halts ambulances,” (2014).
* Menezes (2016) N. Menezes, “That elusive key to opening up gridlock for ambulances,” (2016).
* Sharma (2016) M. Sharma, “City plights: Stuck between life and death on Delhi’s roads,” (2016).
* Service (2017) N. E. Service, “Three ambulances get stuck in Bengaluru traffic,” (2017).
* Sundar _et al._ (2015) R. Sundar, S. Hebbar, and V. Golla, IEEE Sensors Journal 15, 1109 (2015).
* Nicolas _et al._ (2019) A. Nicolas, M. Kuperman, S. Ibañez, S. Bouzat, and C. Appert-Rolland, Scientific Reports 9, 1 (2019).
* van Houwelingen _et al._ (2019) J. van Houwelingen, R. P. Kunnen, W. van de Water, A. P. Holten, G. J. F. van Heijst, and H. J. Clercx, Sports Engineering 22, 1 (2019).
* Spagnolie and Lauga (2012) S. E. Spagnolie and E. Lauga, Journal of Fluid Mechanics 700, 105 (2012), arXiv:1211.6996 .
* Candelier and Dauchot (2010) R. Candelier and O. Dauchot, Physical Review E - Statistical, Nonlinear, and Soft Matter Physics 81, 1 (2010), arXiv:0909.4628 .
* Kolb _et al._ (2014) E. Kolb, P. Cixous, and J. C. Charmet, Granular Matter 16, 223 (2014).
* Kumar _et al._ (2014) N. Kumar, H. Soni, S. Ramaswamy, and A. K. Sood, Nature Communications 5, 1 (2014).
* Tennenbaum _et al._ (2016) M. Tennenbaum, Z. Liu, D. Hu, and A. Fernandez-Nieves, Nature Materials 15, 54 (2016).
* Helbing (2004) D. Helbing, Computational Materials Science 30, 180 (2004).
* Squires and Brady (2005) T. M. Squires and J. F. Brady, Physics of Fluids 17, 1 (2005).
* KHAIR and BRADY (2006) A. S. KHAIR and J. F. BRADY, Journal of Fluid Mechanics 557, 73 (2006).
* Wilson _et al._ (2009) L. G. Wilson, A. W. Harrison, A. B. Schofield, J. Arlt, and W. C. Poon, Journal of Physical Chemistry B 113, 3806 (2009).
* Wilson and Poon (2011) L. G. Wilson and W. C. Poon, Physical Chemistry Chemical Physics 13, 10617 (2011).
* Reichhardt and Reichhardt (2015) C. Reichhardt and C. J. Reichhardt, Physical Review E - Statistical, Nonlinear, and Soft Matter Physics 91, 1 (2015), arXiv:1409.1586 .
* Zia (2018) R. N. Zia, Annual Review of Fluid Mechanics 50, 371 (2018).
* Helbing and Molnár (1995) D. Helbing and P. Molnár, Physical Review E 51, 4282 (1995), arXiv:9805244 [cond-mat] .
* Helbing _et al._ (2000a) D. Helbing, I. Farkas, and T. Vicsek, Nature 407, 487 (2000a), arXiv:0009448 [cond-mat] .
* Helbing _et al._ (2000b) D. Helbing, I. J. Farkas, and T. Vicsek, Physical Review Letters 84, 1240 (2000b).
* Spears _et al._ (2005) W. M. Spears, D. F. Spears, R. Heil, W. Kerr, and S. Hettiarachchi, in _Swarm Robotics_ , edited by E. $\backslash$cSahin and W. M. Spears (Springer Berlin Heidelberg, Berlin, Heidelberg, 2005) pp. 84–97.
* Specht (2018) E. c. Specht, “Packomania: [section 1] Packings of equal and unequal circles in fixed-sized containers with maximum packing density,” (2018).
| arxiv-papers | 2021-07-27T05:04:43 | 2024-09-04T03:07:20.587745 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Danny Raj M and Kumaran V",
"submitter": "Danny Raj Masila",
"url": "https://arxiv.org/abs/2107.12602"
} |
2107.12603 | 11institutetext: Deakin University
# Federated Learning Meets Natural Language Processing: A Survey
Ming Liu Stella Ho Mengqi Wang Longxiang Gao Yuan Jin He Zhang
###### Abstract
Federated Learning aims to learn machine learning models from multiple
decentralized edge devices (e.g. mobiles) or servers without sacrificing local
data privacy. Recent Natural Language Processing techniques rely on deep
learning and large pre-trained language models. However, both big deep neural
and language models are trained with huge amounts of data which often lies on
the server side. Since text data is widely originated from end users, in this
work, we look into recent NLP models and techniques which use federated
learning as the learning framework. Our survey discusses major challenges in
federated natural language processing, including the algorithm challenges,
system challenges as well as the privacy issues. We also provide a critical
review of the existing Federated NLP evaluation methods and tools. Finally, we
highlight the current research gaps and future directions.
###### Keywords:
Federated Learning Natural Language Processing Language Modelling Privacy.
## 1 Introduction
Modern machine learning algorithms rely on big amounts of data, especially
when training deep neural models from high dimensional data such as text and
image. Most data naturally come from end users, which are distributed and
separated by different end devices. It is necessary to learn well performed
machine learning models while preserving users’ privacy. Federated learning
(FL) has become a new machine learning paradigm to train a model across
multiple decentralized edge devices or servers holding local data samples
without exchanging them. The term federated learning was first proposed in
2016 by [40]: ”We term our approach Federated Learning, since the learning
task is solved by a loose federation of participating devices (which we refer
to as clients) which are coordinated by a central server.” In the real world
scenario, organizations such as different hospitals hold confidential data,
while these hospitals would like to train a disease classification model for
common use, it is hard to ask them to upload their own data to the cloud. Even
within the same hospital, different departments often save patients’
information locally. Another example is human beings create lots of text data
by their smartphones, these data are building blocks for now-days big language
models. However, it is shown that most language models suffer from ethic
problems, since they may leak users’ personal information in an unexpected
way.
Recent efforts in federated learning have been devoted to interdisciplinary
areas: not only machine learning is required, but also techniques from
distributed optimization, statistics, cybersecurity, communication, systems,
cryptography and many more. Meanwhile, the data ranges from structured to
unstructured format, which is not limited to tabulars, time series and images.
Among most federated learning studies, Google has led the use of federated
learning in Natural Language Processing through Gboard mobile keyboard, Pixel
phones and Android Messages. While Google has launched several applications on
langauge modeling tasks, Apple is using FL for wake-up word detection in Siri,
doc.ai is developing cross-device FL solutions for biomedical research, and
Snips has introduced cross-device FL for hotword detection.
In this paper, we take a survey on the existing FL algorithms for Natural
Language Processing (NLP). Starting from language modeling, we will review
current federated learning algorithms on various NLP tasks: classification,
recommendation, speech recognition and health text mining and others . We
organize the survey as follows: in Section 2, basic federated learning
concepts, frameworks, optimization toward non-IID data, privacy are discussed.
Section 3 reviews federated learning in NLP. Section 4 discusses the common
evaluation aspects and tools. Section 5 highlights current research challenges
and some future directions. Section 6 gives the conclusion.
## 2 Federated learning
In this section, we first review basics of federated learning, including the
problem setup, non-iid data distribution, frameworks, optimization algorithms
and privacy preservation. Then, we extend federated learning to other
distributed machine learning paradigms and discuss their difference.
#### Problem formulation
In this wrok, we consider the following distributed optimization process:
$\min_{\textbf{w}}\\{\mathcal{L}(\textbf{w})=\sum_{k=1}^{N}p_{k}\mathcal{L}_{k}(\textbf{w})\\}$,
where $N$ is the total number of user devices, $p_{k}$ is the weight of the
$k$-th device such that $p_{k}\geq 0$ and $\sum_{k=1}^{N}p_{k}=1$. Suppose the
$k$-th device has the amount of $n_{k}$ training data:
$\textbf{x}_{k}=(x_{k,1},x_{k,2},...,x_{k,n_{k}})$. The local training
objective $\mathcal{L}_{k}(.)$is defined by:
$\mathcal{L}_{k}(\textbf{w})=\frac{1}{n_{k}}\sum_{j=1}^{n_{k}}l(\textbf{w};x_{k,j})$,
where $l(.;.)$ is a user-specified loss function.
#### Non-IID data and Learning Strategies
Typical centralized supervised learning algorithms have the IID assumption,
i.e., the training and test data is independently identically distributed. In
decentralized settings like federated learning, non-IID poses a challenge
because the different data distribution result in significant skewness across
devices or locations. Non-IID data among devices/locations encompass many
different forms. There can be skewed distribution of features (probability
$\mathcal{P}(x)$), labels (probability $\mathcal{P}(y)$), or the relationship
between features and labels (e.g., varying $\mathcal{P}(y|x)$ or
$\mathcal{P}(x|y)$) among devices/locations. Previous reviews categorized this
this as horizontal, vertical and hybrid data partitions in Federated Learning.
In this review, we focus on skewed distribution of labels, i.e.,
$\mathcal{P}_{P_{i}}(y)\not=\mathcal{P}_{P_{j}}(y)$ for different data
partitions $P_{i}$ and $P_{j}$.
Previous study has shown DNN models with batch normalization suffer from Non-
IID data [25], the accuracy of FL reduces significantly by up to 55% for
neural networks trained for highly skewed non-IID data [69], where each clinet
device trains only on a single class of data.
Common techiniques to deal with non-IID include:
* •
data augmentation: create a common dataset which can be shared globally, the
dataset can come from a publicly available proxy data source [69], or perhaps
a distillation of the raw data following [61].
* •
schedule client participation during training : FedFMC, FedCD, cluster similar
devices / multi-center/ hirarchical clustering of local updates, FedPD, adapts
the communication frequency of decentralized learning algorithms to the (skew-
induced) accuracy loss between data partitions [25]
* •
greater number of models, but more communication cost:
* •
ensemble: similar to scheduling
* •
regularization on the server, e.g. FedAwS, server imposes a geo- metric
regularizer after each round to encourage classes to be spreadout in the
embedding space
* •
personalized FL/ continual local training, based on MAML
#### Optimization
While a variety of studies have made assumptions for the per-client
optimization functions in the IID setting, we review basic convergence results
for $H$-smooth convex functions under the assumption that the variance of the
stochastic gradients is bounded by $\sigma^{2}$. Given the following notations
in a standard FL setting: $N$ is the total number of clients, $M$ is the
number of participated clients per round, $T$ is the total number of
communication rounds, $K$ is the local SGD steps per round. Federated
averaging can conducted in either of the following two settings: one is to
keep $x$ fixed in local updates during each round and compute a total of $KM$
gradients at the current $x$, in order to run accelerated minibatch SGD, the
convergence rate is then upper bounded by
$O(\frac{H}{T^{2}}+\frac{\mu}{\sqrt{TKM}})$. The other is to ignore all but 1
of the M active clients, which allows sequential SGD to run for $KT$ steps,
this approach has an upper bound of
$O(\frac{H}{(TK)^{2}}+\frac{\mu}{\sqrt{TK}})$. As in the non-IID settings, key
assumptions are given for inter-client gradient, local functions on each
client and other participation constraints. A detailed discussion of different
convergence rates for non-IID setting can be found in [30].
#### Frameworks
There are three basic frameworks for FL: centralized, decentralized and
heterogeneous. In the centralized federated learning setting, a central server
is used to orchestrate the different steps of the algorithms and coordinate
all the participating nodes during the learning process. The server is
responsible for the nodes selection at the beginning of the training process
and for the aggregation of the received model updates. Since all the selected
nodes have to send updates to a single entity, the server may become a
bottleneck of the system. Most NLP applications like keyboard word prediction
is using the cetralized setting. In the decentralized federated learning
setting, the nodes are able to coordinate themselves to obtain the global
model. This setup prevents single point failures as the model updates are
exchanged only between interconnected nodes without the orchestration of the
central server. Nevertheless, the specific network topology may affect the
performances of the learning process. Most blockchain-based federated learning
falls into the decentralized setting. An increasing number of application
domains involve a large set of heterogeneous clients, e.g., mobile phones and
IoT devices. Most of the existing Federated learning strategies assume that
local models share the same global model architecture. Recently, a new
federated learning framework named HeteroFL was developed to address
heterogeneous clients equipped with very different computation and
communication capabilities. The HeteroFL technique can enable the training of
heterogeneous local models with dynamically-varying computation complexities
while still producing a single global inference model.
#### Privacy
In most FL settings, privacy preservation is conducted to make sure users’
information is not leaked during the learning process. Physically, local data
is not allowed to leave end users’ devises. However, it is still possible to
reconstruct the original data by taking the model weights or gradients.
Therefore, we consider privacy preservstion on three aspects in FL: users’
personal information, local data and machine learning models. Take the smart
phone keyboard next word prediction as an example, users personal information
refers to facts about their location, name, sex as well as hidden information
like keyboard typing pattern. Local data then concludes the messages, photos
and videos in their phones, while a machine learning model could be the a
language model which predicts the next word given some preceding words. Users’
personal information is often correlated with the local data, e.g., a person’s
age can be inferred with his/her chat messages.
Common techniques for privacy preservation of user data includes: differential
privacy [10], secure Multi-Party Computation [15], homomorphic encryption [43]
and trusted execution environments [11]. Verifiability enables parties to
prove that they have executed their parts of a computation faithfully.
Techniques for verifiability include both zero knowledge proofs (ZKPs) [13]
and trusted execution environments (TEEs) [11]. As for model attack,
adversarial learning techniques can be leveraged in FL setting,
## 3 Federated learning in NLP
### 3.1 Language modeling
A language model (LM) refers to a model that provides probabilities of word
sequences through an unsupervised distribution estimation. As an essential
component for NLP systems, LM is utilised in a variety of NLP tasks, i.e.,
machine translation, text classification, relation extraction, question-
answering, etc. In FL, most LMs are deployed on a virtual mobile keyboard,
i.e., the Google Keyboard (Gboard). Thereby, recent literature are mostly
produced by authors from Google, LLC. Recent works on language modelling in
Federated NLP mainly target on solving a word-level LM problem in mobile
industry. That is mobile keyboard suggestion, which is a well representative
of federated NLP applications. To improve mobile keyboard suggestions,
federated NLP models aim to be more reliable and resilient. Existing models
offer quality improvements in typing or even expression (e.g., emoji) domains,
such as next-world predictions, emoji predictions, query suggestions, etc.
Considering the characteristics of mobile devices, a decentralized computation
approach is constrained by computation resource and low-latency requirement. A
mobile device has limited RAM and CPU budgets, while we expect keyboards to
provide a quick and visible response of an input event within 20 milliseconds.
Thereby, the model deployed in client sides should perform fast inference.
Most works [67, 20, 47, 5, 29, 52, 58] consider variants of LSTMs [24] as the
client model. Given the limited computation budget on each device, we expect
the parameter space of a neural language model to be as small as possible
without degrading model performance. CIFG [17] is a promising candidate to
diminish LM’s complexity and inference-time latency. It employs a single gate
to harness both the input and recurrent cell self-connections. In such a way,
the amount of parameters is downsized by 25 $\%$ [17]. [20] leverages CIFG for
next word predictions, and simplifies the CIFG model by removing peephole
connections. To further optimise the model in size and training time, they
ties input embedding and CIFG output projection matrices. [47] applies a
pretrained CIFG network as an emoji prediction model. In particular, the
pretraining process involves all layers, excluding the output projection
layer, using a language learning task. To enhance performance, the authors
enable embedding sharing between inputs and outputs. The pretraining of LM
exhibits fast convergence for the emoji model. [5] employs a character-level
RNN [63], targeting on out-of-vocabulary(OOV) learning tasks, under FL
settings. Specifically, they use CIFG with peephole connections and a
projection layer. The projection layer diminishes the dimension of output and
accelerates the training. They use multi-layer LSTMs to enhance the
representation power of the model, which learns the probability of word
occurrence. GRU [8] is another simpler variant of the LSTM. [29] leverage GRU
as the neural language model for mobile keyboard next-word predictions.
Similar to CIFG, it reduces the model complexity on parameter spaces without
hurting the model performance. To downsize the amount of trainable parameters,
they also apply tied embedding in the embedding layer and output layer by
share of the weights and biases.
[67] proposes another LM for keyboard query suggestions to reduce the burden
of training LSTMs. Specifically, they train a LSTM model on the server for
generating suggestion candidates, while merely federated training a triggering
model, that decides the occurrence of the candidates. The triggering model
uses logistic regression to infer the probability of a user click,
significantly lessening the computation budgets in comparison of RNN models.
[6] also states the direct use of RNN is not the proper means to decode due to
its large parameters size, which further causes slow inference. Hereby, they
propose to leverage a n-gram LM that derived from a federated RNN for
decoding. In particular, they overcome large memory footprints problem and
enhance model performance by introducing an approximation algorithm based on
SampleApprox [57]. It approximates RNN models into n-gram models. Still, they
use CIFG and group-LSTM (GLSTM) [32] for approximation. While, GPT2 [46] is
one of the state-of-the-art transformer-based LMs with 1.5 billion parameters.
Considering its performance on centralized language modeling tasks, [52] uses
GPT2 as LM. They propose a dimensionality reduction algorithm to downsize the
dimension of GPT2 word embedding to desired values (100 and 300).
For federated optimization, existing federated optimization algorithms differ
in client model aggregation on the server-side. In federated language
modeling, most existing works [67, 20, 6, 47, 5, 52, 58] use FedAvg as the
federated optimization algorithm. Another optimization strategy, called
FedAtt, has also shown its feasibility and validity in language models [29].
In FedAvg, gradients, that computed locally over a large population of
clients, are aggregated by the server to build a novel global model. Every
client is trained by locally stored data and computes the average gradient
with the current global model via one or more steps of SGD. Then, it
communicates model updates with the server. The server performs the weighted
aggregation of the client updates to build a novel global model. Client
updates are immediately abandoned on the sever once the accumulation is
completed. [20] trains the global model from scratch in the server, using
FedAvg. Specifically, the initial global model has either been randomly
initialized or pretrained on proxy data. However, it increases the federated
training rounds on clients. Thereby, it leads to a high communication and
computation costs in FL. They also use SGD as the server-sided optimizer for
training. They found Adam and AdaGrad provide no beneficial improvement on
convergence. [52] introduces a novel federated training approach, called
central pre-training with federated fine-tuning. To address the drawback in
[20], the server pretrains a model with centralized and public data as the
global model at the initial time. Each clients then obtains the pretrained
weights as the initial weights, and later trained on local data in a federated
fashion. But the improvement is limited to large network, i.e., GPT2. They
also propose a pretrained word embedding layer for federated training, which
only enhance accuracy for the large word embedding network (i.e., GPT2).
Whereas, with the combination of pretraining models, it harms the performance.
They leverage Adam as the optimizer for training. [5] uses momentum and
adaptive L2-norm clipping on each client’s gradient in FedAvg, leading to a
faster convergence. The authors argue momentum and adaptive clipping performed
on gradients improves the robustness of model convergence and performance.
[58] also uses clipping for regularization in FedAvg by setting the upper
bound of user updating to constrain each client contribution (i.e., clipping).
In addition, [47] founds using momentum with Nesterov accelerated gradients
significantly outperforms using SGD as server optimizer, in terms of
convergence rate and model performance. [6] applies Nesterov momentum as both
the local and the server optimizer.
[29] first introduces the attention mechanism into federated aggregation of
client models. This optimization algorithm is referred as Attentive Federated
Aggregation (FedAtt). It is a layer-wise soft attention mechanism applied on
the trained parameters of the NN model. Intuitively, the federated
optimization algorithm learns to optimize the global model by providing a good
generalization on each client model for a quick local adaptation. Hereby, it
reduces local training rounds and saves the computation budgets, further
accelerating the learning process. The generalization in FedAtt is decided by
the similarity between each client and the server, and the relative importance
of each client. For a good generalization, they minimise the weighted summed
distance of each client model and the global model on parameters spaces. They
introduce attentive weights as the weights of the client models. Particularly,
the attentive weight of each client model is a non-parametric attention score
derived from each layer of NN. Differ from pre-trained FedAvg, FedAtt finds a
well-generalized global model on each federated training round by iteratively
updating parameters. Consequently, it further lessens the federated
communication budgets. For local training, the client-sided optimizer is
momentum. While, for global parameters updates, they uses SGD.
The existing works on federated language modeling mainly contribute on
optimizing model aggregation process, but not focusing on privacy preserving
approach. Adding privacy preserving techniques into federated optimization
process is seen as a bonus, rather than an essential means of privacy
guarantees. In Federated LMs, the commonly used privacy preserving technique
is differential privacy (DP) [9]. A DP algorithm is expected to characterize
the underlying probability distribution without compromising personally
identifiable data. In general, it injects calibrated noise into the aggregated
data while not affecting the outcomes. Most DP approaches are used for user-
level privacy guarantees. In FL, we define user-level DP as a privacy
guarantees, to preserve the trained models with or without the presence of any
one client’s data. DP usually serves on the client sides before model
aggregation [62]. [29] integrates a randomized mechanism in FedAtt
optimization by introducing a white noise with the mean of 0 and the standard
deviation $\sigma$. They also introduce a magnitude coefficient
$\beta\in(0,1]$ to govern the effect of the randomization in FL. However, the
level of its DP guarantees is unrevealed. Hereby, it fails to show the trade-
off between data utility and privacy protection for its privacy-preserving
countermeasure implementation. [58] incorporates the Gaussian mechanism in
FedAvg to cope with the user-based heterogeneity of data in language models.
In particular, it perform DP guarantees by adding Gaussian noise with a noise
multiplier of 1, after clipping. They argue a high level of DP guarantees
exhibits a notable reduction in unintended memorization, caused by
heterogeneity of training data.
### 3.2 Classification
Text Classification is procedure of identifying the pre-defined Text
Classification is the procedure of identifying the pre-defined category for
varied-length of text [1]. It can be extended to many NLP applications
including sentiment analysis, question answering and topic labeling .
Traditional text classification tasks can be deconstructed into four steps:
text preprocessing, dimension reduction, classification and evaluation. Though
the deep learning models have achieved state-of-the-art results in text
classification [41], uploading or sharing text data to improve model
performance is not always feasible due to different privacy requirements of
clients. For example, financial institutions that wish to train a chatbot for
their clients cannot be allowed to upload all text data from the client-side
to their central server due to strict privacy protection statements. Then
applying the federated learning paradigm is an approach to solve the dilemma
due to its advances in privacy preservation and collaborative training. In
which, the central server can train a powerful model collaboratively with
different local labeled data at client devices without uploading the raw data
considering increasing privacy concerns in public.
However, there are several challenges for applying federated learning to text
classification tasks in NLP. One is to design proper aggregating algorithms to
handle the gradients or weights uploaded by different client models.
Traditional federated learning can be considered as a special paradigm of
distributed learning, thus aggregating algorithms, such as FedAvg [40], FedAtt
[29] has been proposed to generalize the model on the central server.
Considering the unevenly distributed data at different client devices and
different amounts of data at the different local datasets. [71] has attempted
the text classification using the standard FedAvg algorithm to update the
model parameter with local trained models. It uses different local datasets to
pre-train the word embeddings, and then concatenate all word embeddings. After
filtering the widths and feature maps from the concatenated word embeddings,
the max-over-time pooling was used to aggregate the features, thus getting
vectors with the same length. Finally, they use softmax activation on the
fully connected layer, it will translate the vectors to the final sentence
classification results (categories). Later, scientists from the Machine
learning area brought in new approaches of uploading and aggregating, for
example, using Knowledge distillation [23]. [22] however use fine-tuning
instead of FedAvg to update parameters. [36] average the logits outputs from
the last layer of the model instead of directly take the average of model
parameters. It then uses knowledge distillation to learn the knowledge from
the client devices instead of traditional.
In addition, model compression has been introduced to federated text
classification tasks due to the dilemma of computation restraints on the
client-side. They attempted to reduce the model size on the client-side to
enable the real application of federated learning. The computation restriction
on the client devices limits the application of traditional FL. For example,
4-layer BERT or 6-layer BERT is still too large for mobile devices such as
smartphones. The scholars then focus to perform the model compression while
still following the federated learning paradigm. The knowledge distillation
then has been applied to transfer local model information while keeping the
model size small at the local devices in [48]. It utilises knowledge
distillation instead of model parameter fusion to update parameters. The soft-
label predictions on a public distillation dataset are sent to the central
model to be distilled. Thus, the central model can learn the local knowledge
on client devices through distilling the logits of different client models
without sharing or uploading the local model parameters and gradients.
To ensure the privacy preservation of FL while keeping the communication, the
encryption of data is one of the top priority considerations in applying
federated learning in NLP. Encryption on communication between edge-device and
central server is a standard approach in federated learning to preserve
privacy for end-users on edge devices. [71] adds encryption on client-central
server communication using differential privacy. It used the approach [60]
proposed the attack-adaptive aggregation which prevent the attack at the
central server aggregation module.
To overcome the communication dilemma of FL, one-shot or few-shot federated
learning was proposed to allow the central server can successfully train the
central model with only one or a few rounds of communication under poor
communication scenarios. However, the shared data restriction of federated
learning is still left to be solved. Considering the trend of higher
restriction of data sharing and uploading, it will be harder to get a
sufficient size of data shared to both central servers and client servers. In
this way, the knowledge distillation cannot be used to solve the model
compression problem in federated learning. [70] reduced the communication of
previous federated learning by utilising the soft labels dataset distillation
mentioned in [18] and [54]. It thus successfully extend the soft-labeling
methods to two new techniques: soft-reset and random masking, and then
successfully using the dataset distillation [61] to realise the one-round
communication federated learning for text classification tasks. Each client in
[70] distils their local dataset to a much smaller synthetic one, and then
only uploads the small-sized synthetic dataset to the server. Thus, no
gradients or weights is transmitting from the client model to the central
server model. The distilled dataset can be as small as one data sample per
category, in this way the communication in federated learning can be reduced
to as low as one round.
### 3.3 Speech Recognition
Speech recognition is the task of recognising speech within audio and
converting it into text. Voice assistants such as Amazon Alexa or Apple Siri
use on-device processing to detect wake-up words (e.g. ”Hey Siri”), which is a
typical usage for speech recognition on smartphones. Only when the wake-up
words are detected, further processing like information retrieval or question
answering will be running on the cloud. Methods for speech recognition include
dynamic time wraping [42], Hidden Markov Models [45] and modern end-to-end
deep neural models [16]. More recently, wav2vec [3] masks the speech input in
the latent space and solves a contrastive task defined over a quantization of
the latent representations which are jointly learned, this method demonstrates
the feasibility of speech recognition with limited amounts of labeled data.
On device wake-up word detectors face two main challenges: First, it should
run with minimal memory footprint and computational cost. Second, the wake
word detector should behave consistently in any usage setting, and show
robustness to background noise. [68] performed neural network architecture
evaluation and exploration for running keyword spotting on resource-
constrained microcontrollers, they showed that it is possible to optimize
these neural network architectures to fit within the memory and compute
constraints of microcontrollers without sacrificing accuracy. [34]
investigated the use of federated learning on crowdsourced speech data to
learn a resource-constrained wake word detector. They showed that a revisited
Federated Averaging algorithm with per-coordinate averaging based on Adam in
place of standard global averaging allows the training to reach a target
stopping criterion of 95% recall per 5 FAH within 100 communication rounds on
their crowdsourced dataset for an associated upstream communication costs per
client of 8MB. They also open sourced the Hey Snips wake word dataset
111http:// research.snips.ai/datasets/keyword-spotting. [65] proposed a
decentralized feature extraction approach in federated learning to address
privacy-preservation issues for speech recognition, which is built upon a
quantum convolutional neural network (QCNN) composed of a quantum circuit
encoder for feature extraction, and a recurrent neural network (RNN) based
end-to-end acoustic model (AM). The proposed decentralized framework takes
advantage of the quantum learning progress to secure models and to avoid
privacy leakage attacks. [19] introduced a framework for speech recognition by
which the degree of non-IID-ness can be varied, consequently illustrating a
trade-off between model quality and the computational cost of federated
training. They also showed that hyperparameter optimization and appropriate
use of variational noise are sufficient to compensate for the quality impact
of non-IID distributions, while decreasing the cost.
### 3.4 Sequence Tagging
Sequence tagging, e.g. POS tagging, Named Entity Recognition, plays an
important role in both natural language understanding and information
extraction. Statistical models like Hidden Markov Model and Conditional Random
Fields were heavily used, modern approaches rely on deep representations from
Recurrent Neural Net, Convolution Neural Net or transformer like
architectures. A few recent works focus on biomedical Named Entity Recognition
in the federated setting. [39] pretrained and fine tuned BERT models for NER
tasks in a federated manner using clinical texts, their results suggested that
conducting pretraining and fine tuning in a federated manner using data from
different silos resulted in reduced performance compared with training on
centralized data. This loss of performance is mainly due to separation of data
as ”federated communication loss” . Given the limit of data access, the
experiments were conducted with clinical notes from a single healthcare system
to simulate different silos. [14] proposed a FedNER method for medical NER,
they decomposed the medical NER model in each platform into a shared module
and a private module. The private module was updated in each platform using
the local data to model the platform-specific characteristics. The shared
module was used to capture the shareable knowledge among different platforms,
and was updated in a server based on the aggregated gradients from multiple
platforms. The private module consists of two top layers in our medical NER
model, i.e, Bi-LSTM and CRF, which aim to learn platform-specific context
representations and label decoding strategies. The private module was only
trained with local data and exchange neither its parameters nor gradients. The
shared module consisted of the other bottom layers in our NER model, such as
the word-level CNN and all types of embedding. Different from the private
module, the shared one mainly aims to capture the semantic information in
texts. [56] introduced a privacy preserving medical relation extraction model
based on federated learning, they leveraged a strategy based on knowledge
distillation. Such a strategy uses the uploaded predictions of ensemble local
models to train the central model without requiring uploading local
parameters.
### 3.5 Recommendation
Recommendation systems are heavily data-driven. Typical recommendation models
use collaborative filtering methods [55], in which past user item interactions
are sufficient to detect similar users and/or similar items and make
predictions based on these estimated proximities. Collaborative filtering
algorithms can be further divided into two sub-categories that are generally
called memory based and model based approaches. Memory based approaches
directly works with values of recorded interactions, assuming no model, and
are essentially based on nearest neighbours search (for example, find the
closest users from a user of interest and suggest the most popular items among
these neighbours). Model based approaches assume an underlying “generative”
model that explains the user-item interactions and try to discover it in order
to make new predictions. Unlike collaborative methods that only rely on the
user-item interactions, content based approaches [44] use additional
information about users and/or items. If we consider the example of a movies
recommendation system, this additional information can be, for example, the
age, the sex, the job or any other personal information for users as well as
the category, the main actors, the duration or other characteristics for the
movies (items).
Given different partitions of users and items, federated recommendation models
can be horizontal, vertical or transfered. In horizontal federated
recommendation systems, items are shared but users belong to different
parties. A typical work is Federated Collaborative Filter (FCF) [2] proposed
to use a central server to keep the item latent factor matrix, while the user
latent factors are stored locally on each device. In the training time, the
server distributes the item latent factor to each party, the participants
update their user latent factor by local rating matrix data and send the item
latent factor updates back to the server for aggregation. To avoid the inter
trust problem, [21] introduced a fully decentralized setting where
participants have full access to the item latent factor and communicate with
each other to update the model. Moreover, meta learning has been used for
personalized federated recommendation. [12] designed a meta learner to learn
generalized model parameters for each participant, then each participant’s
recommendation is regarded as a personalized task where a support set is used
to generate the recommendation model and the gradient is computed on a query
set. [28] introduced another fedrated meta learning algorithm for
recommendation, in which separate support and query sets are not necessary.
Their approach performs relatively well within less amount of training
episodes. Besides, [35] proposed DiFacto, which is a distributed factorization
method and addressed the efficiency problem when it comes to large scale user
item matrices. In comparison, vertical federated systems have been designed
for feature distributed learning problem where participants hold different
feature sets. [26] proposed an asynchronous stochastic gradient descent
algorithm. Each party could use an arbitrary model to map its local features
to a local prediction. Then local predictions from different parties are
aggregated into a final output using linear and nonlinear transformations. The
training procedure of each party is allowed to be at various iterations up to
a bounded delay. This approach does not share any raw data and local models.
Therefore, it has fewer privacy risks. Besides, for a higher level of privacy,
it can easily incorporate the DP technique. Similar to horizontal FedRec,
there are also works that further utilize cryptography techniques. [7]
presented a secure gradient-tree boosting algorithm. This algorithm adopts HE
methods to provide lossless performance as well as preserving privacy. And
[51] proposed a secure linear regression algorithm. MPC protocols are designed
using garbled circuits to obtain a highly scalable solution. Parties of
vertical FedRec could also be two recommenders with different item sets. For
instance, a movie RecSys and a book RecSys have a large user overlapping but
different items to recommend. It is assumed that users share a similar taste
in movies with books. With FedRec, the two parties want to train better
recommendation algorithms together in a secure and privacy-preserving way.
[50] proposed a secure, distributed item-based CF method. It jointly improves
the effect of several RecSys, which offer different subsets of items to the
same underlying population of users. Both the predicted ratings of items and
their predicted rankings could be computed without compromising privacy nor
predictions’ accuracy. We refer readers to [66] for more detailed discussion
for federated recommendation systems.
### 3.6 Health Text Mining
Federated learning has emerged as an important framework for health text
mining, due to the privacy concern among different hospitals and medical
organizations. Besides, most health data exhibits systemic bias towards some
specific groups or patterns, e.g. hospitals, diseases and communities. Again,
this non-IID issue raises big challenges when applying federated learning into
heath text mining tasks. There have been some tasks that were studied in
federated learning setting in healthcare, including patient similarity
learning [33], patient representation learning and phenotyping [31, 38],
predictive or classification modeling [4, 27, 49], biomedical named entity
recognition.
Specifically, [38] designed a two-stage federated approach for medical record
classification. In the first stage, they pre-trained a patient representation
model by training an neural network to predict ICD and CPT codes from the text
of the notes. In the second stage, a phenotyping machine learning model was
trained in a federated manner using clinical notes that are distributed across
multiple sites for the target phenotype. In this stage, the notes mapped to
fixed-length representations from stage one are used as input features and
whether the patient has a certain disease is used as a label with one of the
three classes: presence, absence or questionable. [37] proposed a simple
federated architecture for early detection of Type-2 diabetes. After comparing
the proposed federated learning model against the centralised approach, they
showed that the federated learning model ensures significant privacy over
centralised learning model whereas compromising accuracy for a subtle extend.
To cope with the imbalanced and non-IID distribution inherent in user’s
monitoring data, [64] designed a generative convolutional autoencoder (GCAE),
which aims to achieve accurate and personalized health monitoring by refining
the model with a generated class-balanced dataset from user’s personal data.
It is noticed that GCAE is lightweight to transfer between the cloud and
edges, which is useful to reduce the communication cost of federated learning
in FedHome. [53] described a federated approach on a brain age prediction
model on structural MRI scans distributed across multiple sites with diverse
amounts of data and subject (age) distributions. In these heterogeneous
environments, a Semi-Synchronous protocol provides faster convergence.
### 3.7 Other NLP Tasks
More recently, FedNLP provided a research-oriented benchmarking framework for
advancing federated learning (FL) in natural language processing (NLP). It
uses FedML repository as the git submodule. In other words, FedNLP only
focuses on adavanced models and dataset, while FedML supports various
federated optimizers (e.g., FedAvg) and platforms (Distributed Computing,
IoT/Mobile, Standalone). A text generation example can also be found in
TensorFlow Tutorial
222https://colab.research.google.com/github/tensorflow/federated/blob/master/docs/tutorials
/federated_learning_for_text_generation.ipynb#scrollTo=iPFgLeZIsZ3Q. So far,
we have not found any work on other generation works on Machine Translation
and Summatization.
## 4 Benchmarks
### 4.1 Evaluation Aspects
#### Model Evaluation
In principle, FL based NLP models should not only be evaluated against
traditional performance metrics (such as model accuracy), but also the change
of model performance with different system and data settings. Various systems
settings consider the number of nodes, the weight of the nodes, the quality of
the nodes. While the data setting focus on different data distribution caused
by either label bias or feature bias.
#### Communication Evaluation
There is no doubt that the communication rounds of nodes play an important
role in the performance of the model. Due to the uncertainty of the federated
network, communication is huge resource consumption. There is always a natural
trade off between computation and communication among the nodes and server.
#### Privacy Evaluation
The goal of privacy metrics is to measure the degree of privacy enjoyed by
users in a system and the amount of protection offered by privacy-enhancing
technologies. [59] discussed a selection of over eighty privacy metrics and
introduce categorizations based on the aspect of privacy they measure, their
required inputs, and the type of data that needs protection. In general,
privacy metrics can be classified with four common characteristics: adversary
models, data sources, inputs and output meatures.
#### User Response Evaluation
Apart from the above automatic evaluation methods, on-line FL-based NLP models
also consider the response from users, e.g. FL language models take next word
click rate as an important metric, FL recommendation systems would not only
like to keep old customers but also attract new customers.
### 4.2 Tools
There are a few tools for common federated learning, including PySyft
333https://github.com/OpenMined/PySyft, TFF
444https://www.tensorflow.org/federated, FATE
555https://github.com/FederatedAI/FATE, Tensor/IO 666https://doc-
ai.github.io/tensorio/, FedML 777https://github.com/FedML-AI/FedML and FedNLP
888https://github.com/FedML-AI/FedNLP. PySyft decouples private data from
model training using federated learning, DP and MPC within PyTorch. With TFF,
TensorFlow provides users with a flexible and open framework through which
they can simulate distributed computing locally. FATE support the Federated AI
ecosystem, where a secure computing protocol is implemented based on
homomorphic encryption and MPC. Tensor/IO is a lightweight crossplatform
library for on-device machine learning, bringing the power of TensorFlow and
TensorFlow Lite to iOS, Android, and React native applications.
## 5 Challenges and Future Directions
### 5.1 Algorithm-Level
#### Big language models
Since the paradigm pre-training + fine tuning has dominated most NLP tasks,
pre-trained language models such as BERT and GPT are useful and transferable
to develop downstream tasks. Often times the larger the pre-trained language
model is, the more likely it will be for downstream model performance.
However, in the FL setting, it is not possible to allocate large size language
models like GPT-3 on the participants. Technique like knowledge distillation
could be useful, it remains unknown whether downsized language can maintain
the performance.
#### Non-iid Data distributions
Real world data from different participants is always non-iid, the challenge
is how to learn from high quality data and labels. Given a fixed annotation
budget, active learning may be leveraged to not only select significant data
points, but also actively choose worthwhile participants. Furthermore, weakly
supervised learning and meta learning algorithms may also be used to use more
unlabeled data from different participants.
#### Personalization
Personalized FL can be viewed as an intermediate paradigm between the server-
based FL paradigm that produces a global model and the local model training
paradigm. The challenge is to strike a careful balance between local task-
specific knowledge and shared knowledge useful for the generalization
properties of FL models. For most deep NLP models, techniques like early
shaping, sample weighing and transfer learning can be explored.
### 5.2 System-Level
#### Spatial Adaptability
This refers to the ability of the FL system to handle variations across client
data sets as a result of (i) the addition of new clients, and/or (ii) dropouts
and stragglers. These are practical issues prevalent in complex edge computing
environments, where there is significant variability in hardware capabilities
in terms of computation, memory, power and network connectivity
#### Computation Communication Trade-off
Frequent and large scale deployment of updates, monitoring, and debugging for
FL NLP models is challenging. The trade-off between local and global update
frequency, as well as the communication frequency can be explored.
#### Privacy concern
Even though FL assumes the data never leave the device, it is still possible
to reconstruct the original data by taking the model weights or gradients.
Privacy preservation on three aspects in FL can be explored: users’ personal
information, local data and machine learning models.
## 6 Conclusion
In this paper, we review common NLP tasks in the FL setting, including
language modeling, text classification, speech recognition, sequence tagging,
recommendation, health text mining and other tasks. In general, the
performance federated NLP models still lie behind that of centralized ones.
Also, large scale pre-trained language models and advanced privacy
preservation techniques have not widely been used in the FL based NLP, which
could be the potentials for future research. We point out both algorithm and
system level challenges for FL based NLP models. In the future, we will
further evaluate representative NLP models (e.g. transformers) in the FL
environment and give more comparable insights on real world applications.
## References
* [1] Aggarwal, C.C., Zhai, C.: A survey of text classification algorithms. In: Mining text data, pp. 163–222. Springer (2012)
* [2] Ammad-Ud-Din, M., Ivannikova, E., Khan, S.A., Oyomno, W., Fu, Q., Tan, K.E., Flanagan, A.: Federated collaborative filtering for privacy-preserving personalized recommendation system. arXiv preprint arXiv:1901.09888 (2019)
* [3] Baevski, A., Zhou, H., Mohamed, A., Auli, M.: wav2vec 2.0: A framework for self-supervised learning of speech representations. arXiv preprint arXiv:2006.11477 (2020)
* [4] Brisimi, T.S., Chen, R., Mela, T., Olshevsky, A., Paschalidis, I.C., Shi, W.: Federated learning of predictive models from federated electronic health records. International journal of medical informatics 112, 59–67 (2018)
* [5] Chen, M., Mathews, R., Ouyang, T., Beaufays, F.: Federated learning of out-of-vocabulary words. ArXiv abs/1903.10635 (2019)
* [6] Chen, M., Suresh, A.T., Mathews, R., Wong, A., Allauzen, C., Beaufays, F., Riley, M.: Federated learning of n-gram language models. In: Proceedings of the 23rd Conference on Computational Natural Language Learning (CoNLL). pp. 121–130. Association for Computational Linguistics, Hong Kong, China (Nov 2019). https://doi.org/10.18653/v1/K19-1012, https://www.aclweb.org/anthology/K19-1012
* [7] Cheng, K., Fan, T., Jin, Y., Liu, Y., Chen, T., Yang, Q.: Secureboost: A lossless federated learning framework. arXiv preprint arXiv:1901.08755 (2019)
* [8] Cho, K., Merrienboer, B.V., Gulcehre, C., Ba Hdanau, D., Bougares, F., Schwenk, H., Bengio, Y.: Learning phrase representations using rnn encoder-decoder for statistical machine translation. Computer Science (2014)
* [9] Dwork, C., Mcsherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Proceedings of the Third conference on Theory of Cryptography (2006)
* [10] Dwork, C.: Differential privacy: A survey of results. In: International conference on theory and applications of models of computation. pp. 1–19. Springer (2008)
* [11] Ekberg, J.E., Kostiainen, K., Asokan, N.: Trusted execution environments on mobile devices. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. pp. 1497–1498 (2013)
* [12] Fallah, A., Mokhtari, A., Ozdaglar, A.: Personalized federated learning: A meta-learning approach. arXiv preprint arXiv:2002.07948 (2020)
* [13] Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. Journal of cryptology 1(2), 77–94 (1988)
* [14] Ge, S., Wu, F., Wu, C., Qi, T., Huang, Y., Xie, X.: Fedner: Privacy-preserving medical named entity recognition with federated learning. arXiv e-prints pp. arXiv–2003 (2020)
* [15] Goldreich, O.: Secure multi-party computation. Manuscript. Preliminary version 78 (1998)
* [16] Graves, A., Jaitly, N.: Towards end-to-end speech recognition with recurrent neural networks. In: International conference on machine learning. pp. 1764–1772. PMLR (2014)
* [17] Greff, K., Srivastava, R., Koutník, J., Steunebrink, B., Schmidhuber, J.: Lstm: A search space odyssey. IEEE Transactions on Neural Networks and Learning Systems 28, 2222–2232 (2017)
* [18] Guha, N., Talwalkar, A., Smith, V.: One-shot federated learning. arXiv preprint arXiv:1902.11175 (2019)
* [19] Guliani, D., Beaufays, F., Motta, G.: Training speech recognition models with federated learning: A quality/cost framework. arXiv preprint arXiv:2010.15965 (2020)
* [20] Hard, A., Rao, K., Mathews, R., Beaufays, F., Augenstein, S., Eichner, H., Kiddon, C., Ramage, D.: Federated learning for mobile keyboard prediction. ArXiv abs/1811.03604 (2018)
* [21] Hegedűs, I., Danner, G., Jelasity, M.: Decentralized recommendation based on matrix factorization: a comparison of gossip and federated learning. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases. pp. 317–332. Springer (2019)
* [22] Hilmkil, A., Callh, S., Barbieri, M., Sütfeld, L.R., Zec, E.L., Mogren, O.: Scaling federated learning for fine-tuning of large language models. arXiv preprint arXiv:2102.00875 (2021)
* [23] Hinton, G., Vinyals, O., Dean, J.: Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 (2015)
* [24] Hochreiter, Sepp, Schmidhuber, Jurgen: Long short-term memory. Neural Computation (1997)
* [25] Hsieh, K., Phanishayee, A., Mutlu, O., Gibbons, P.: The non-iid data quagmire of decentralized machine learning. In: International Conference on Machine Learning. pp. 4387–4398. PMLR (2020)
* [26] Hu, Y., Niu, D., Yang, J., Zhou, S.: Fdml: A collaborative machine learning framework for distributed features. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. pp. 2232–2240 (2019)
* [27] Huang, L., Shea, A.L., Qian, H., Masurkar, A., Deng, H., Liu, D.: Patient clustering improves efficiency of federated machine learning to predict mortality and hospital stay time using distributed electronic medical records. Journal of biomedical informatics 99, 103291 (2019)
* [28] Jalalirad, A., Scavuzzo, M., Capota, C., Sprague, M.: A simple and efficient federated recommender system. In: Proceedings of the 6th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies. pp. 53–58 (2019)
* [29] Ji, S., Pan, S., Long, G., Li, X., Jiang, J., Huang, Z.: Learning private neural language modeling with attentive aggregation. 2019 International Joint Conference on Neural Networks (IJCNN) pp. 1–8 (2019)
* [30] Kairouz, P., McMahan, H.B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A.N., Bonawitz, K., Charles, Z., Cormode, G., Cummings, R., et al.: Advances and open problems in federated learning. arXiv preprint arXiv:1912.04977 (2019)
* [31] Kim, Y., Sun, J., Yu, H., Jiang, X.: Federated tensor factorization for computational phenotyping. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp. 887–895 (2017)
* [32] Kuchaiev, O., Ginsburg, B.: Factorization tricks for lstm networks (2017)
* [33] Lee, J., Sun, J., Wang, F., Wang, S., Jun, C.H., Jiang, X.: Privacy-preserving patient similarity learning in a federated environment: development and analysis. JMIR medical informatics 6(2), e20 (2018)
* [34] Leroy, D., Coucke, A., Lavril, T., Gisselbrecht, T., Dureau, J.: Federated learning for keyword spotting. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). pp. 6341–6345. IEEE (2019)
* [35] Li, M., Liu, Z., Smola, A.J., Wang, Y.X.: Difacto: Distributed factorization machines. In: Proceedings of the Ninth ACM International Conference on Web Search and Data Mining. pp. 377–386 (2016)
* [36] Lin, T., Kong, L., Stich, S.U., Jaggi, M.: Ensemble distillation for robust model fusion in federated learning (2021)
* [37] Lincy, M., Kowshalya, A.M.: Early detection of type-2 diabetes using federated learning (2020)
* [38] Liu, D., Dligach, D., Miller, T.: Two-stage federated phenotyping and patient representation learning. arXiv preprint arXiv:1908.05596 (2019)
* [39] Liu, D., Miller, T.: Federated pretraining and fine tuning of bert using clinical notes from multiple silos. arXiv preprint arXiv:2002.08562 (2020)
* [40] McMahan, H.B., Moore, E., Ramage, D., y Arcas, B.A.: Federated learning of deep networks using model averaging. CoRR abs/1602.05629 (2016), http://arxiv.org/abs/1602.05629
* [41] Minaee, S., Kalchbrenner, N., Cambria, E., Nikzad, N., Chenaghlu, M., Gao, J.: Deep learning–based text classification: A comprehensive review. ACM Computing Surveys (CSUR) 54(3), 1–40 (2021)
* [42] Müller, M.: Dynamic time warping. Information retrieval for music and motion pp. 69–84 (2007)
* [43] Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM workshop on Cloud computing security workshop. pp. 113–124 (2011)
* [44] Pazzani, M.J., Billsus, D.: Content-based recommendation systems. In: The adaptive web, pp. 325–341. Springer (2007)
* [45] Rabiner, L., Juang, B.: An introduction to hidden markov models. ieee assp magazine 3(1), 4–16 (1986)
* [46] Radford, A.: Language models are unsupervised multitask learners
* [47] Ramaswamy, S.I., Mathews, R., Rao, K., Beaufays, F.: Federated learning for emoji prediction in a mobile keyboard. ArXiv abs/1906.04329 (2019)
* [48] Sattler, F., Marban, A., Rischke, R., Samek, W.: Communication-efficient federated distillation. arXiv preprint arXiv:2012.00632 (2020)
* [49] Sharma, P., Shamout, F.E., Clifton, D.A.: Preserving patient privacy while training a predictive model of in-hospital mortality. arXiv preprint arXiv:1912.00354 (2019)
* [50] Shmueli, E., Tassa, T.: Secure multi-party protocols for item-based collaborative filtering. In: Proceedings of the eleventh ACM conference on recommender systems. pp. 89–97 (2017)
* [51] Slavkovic, A.B., Nardi, Y., Tibbits, M.M.: ” secure” logistic regression of horizontally and vertically partitioned distributed databases. In: Seventh IEEE International Conference on Data Mining Workshops (ICDMW 2007). pp. 723–728. IEEE (2007)
* [52] Stremmel, J., Singh, A.: Pretraining federated text models for next word prediction. ArXiv abs/2005.04828 (2020)
* [53] Stripelis, D., Ambite, J.L., Lam, P., Thompson, P.: Scaling neuroscience research using federated learning. arXiv preprint arXiv:2102.08440 (2021)
* [54] Sucholutsky, I., Schonlau, M.: Soft-label dataset distillation and text dataset distillation. arXiv preprint arXiv:1910.02551 (2019)
* [55] Suganeshwari, G., Ibrahim, S.S.: A survey on collaborative filtering based recommendation system. In: Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC–16’). pp. 503–518. Springer (2016)
* [56] Sui, D., Chen, Y., Zhao, J., Jia, Y., Xie, Y., Sun, W.: Feded: Federated learning via ensemble distillation for medical relation extraction. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP). pp. 2118–2128 (2020)
* [57] Suresh, A.T., Roark, B., Riley, M., Schogol, V.: Approximating probabilistic models as weighted finite automata. ArXiv abs/1905.08701 (2019)
* [58] Thakkar, O., Ramaswamy, S.I., Mathews, R., Beaufays, F.: Understanding unintended memorization in federated learning. ArXiv abs/2006.07490 (2020)
* [59] Wagner, I., Eckhoff, D.: Technical privacy metrics: a systematic survey. ACM Computing Surveys (CSUR) 51(3), 1–38 (2018)
* [60] Wan, C.P., Chen, Q.: Robust federated learning with attack-adaptive aggregation. arXiv preprint arXiv:2102.05257 (2021)
* [61] Wang, T., Zhu, J.Y., Torralba, A., Efros, A.A.: Dataset distillation. arXiv preprint arXiv:1811.10959 (2018)
* [62] Wei, K., Li, J., Ding, M., Ma, C., Yang, H.H., Farhad, F., Jin, S., Quek, T., Poor, H.: Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Information Forensics and Security 15, 3454–3469 (2020)
* [63] Williams, R.J., Zipser, D.: A learning algorithm for continually running fully recurrent neural networks. Neural Computation 1(2) (1998)
* [64] Wu, Q., Chen, X., Zhou, Z., Zhang, J.: Fedhome: Cloud-edge based personalized federated learning for in-home health monitoring. IEEE Transactions on Mobile Computing (2020)
* [65] Yang, C.H.H., Qi, J., Chen, S.Y.C., Chen, P.Y., Siniscalchi, S.M., Ma, X., Lee, C.H.: Decentralizing feature extraction with quantum convolutional neural network for automatic speech recognition. arXiv preprint arXiv:2010.13309 (2020)
* [66] Yang, L., Tan, B., Zheng, V.W., Chen, K., Yang, Q.: Federated recommendation systems. In: Federated Learning, pp. 225–239. Springer (2020)
* [67] Yang, T., Andrew, G., Eichner, H., Sun, H., Li, W., Kong, N., Ramage, D., Beaufays, F.: Applied federated learning: Improving google keyboard query suggestions. ArXiv abs/1812.02903 (2018)
* [68] Zhang, Y., Suda, N., Lai, L., Chandra, V.: Hello edge: Keyword spotting on microcontrollers. arXiv preprint arXiv:1711.07128 (2017)
* [69] Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., Chandra, V.: Federated learning with non-iid data. arXiv preprint arXiv:1806.00582 (2018)
* [70] Zhou, Y., Pu, G., Ma, X., Li, X., Wu, D.: Distilled one-shot federated learning (2020)
* [71] Zhu, X., Wang, J., Hong, Z., Xiao, J.: Empirical studies of institutional federated learning for natural language processing. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: Findings. pp. 625–634 (2020)
| arxiv-papers | 2021-07-27T05:07:48 | 2024-09-04T03:07:20.603540 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Ming Liu, Stella Ho, Mengqi Wang, Longxiang Gao, Yuan Jin, He Zhang",
"submitter": "Ming Liu Dr",
"url": "https://arxiv.org/abs/2107.12603"
} |
2107.12604 | # Image Scene Graph Generation (SGG) Benchmark
Xiaotian Han Microsoft Cloud + AI Jianwei Yang Microsoft Research at
Redmond Houdong Hu Microsoft Cloud + AI Lei Zhang Jianfeng Gao Microsoft
Research at Redmond Pengchuan Zhang Microsoft Research at Redmond
###### Abstract
There is a surge of interest in image scene graph generation (object,
attribute and relationship detection) due to the need of building fine-grained
image understanding models that go beyond object detection. Due to the lack of
a good benchmark, the reported results of different scene graph generation
models are not directly comparable, impeding the research progress. We have
developed a much-needed scene graph generation benchmark based on the
maskrcnn-benchmark[13] and several popular models. This paper presents main
features of our benchmark and a comprehensive ablation study of scene graph
generation models using the Visual Genome[11] and OpenImages Visual
relationship detection[10] datasets. Our codebase is made publicly available
at https://github.com/microsoft/scene_graph_benchmark.
## 1 Introduction
Understanding a visual scene goes beyond recognizing individual objects in
isolation. Visual attributes of an object and relationships between objects
also constitute rich semantic information about the scene. Scene Graph
Generation (SGG) [18] is a task to detect objects, their attributes and
relationships using scene graphs [11], a visually-grounded graphical structure
of an image. SGG has proven useful for building more visually-grounded and
compositional models for other computer vision and vision-language tasks, like
image/text retrieval [9, 17], image captioning [4, 20, 6], visual question
answering [3, 5], action recognition [7], image generation [8, 14], and 3D
scene understanding [2].
Code base | Supported datasets | Supported methods | Last commit time (Pytorch version) | Attribute detection | OD/SGG decouple-able
---|---|---|---|---|---
Neural Motif [21] | VG | IMP,NM | 11/07/2018 (0.3) | No | No
RelDN [22] | VG, OI | NM,GRCNN,RelDN | 08/19/2019 (1.0) | No | Yes
GRCNN [19] | VG | IMP,MSDN,GRCNN | 03/31/2020 (1.0) | No | No
SGG-Pytorch [15] | VG | IMP,NM,VCTree [16] | 12/13/2020 (1.2) | Yes | No
SG Benchmark (ours) | VG, OI | IMP,MSDN,NM,GRCNN,RelDN | 06/07/2021 (1.7) | Yes | Yes
Table 1: Comparison of different open-sourced code bases for scene graph
generation (SGG). Our code base supports two datasets (Visual Genome (VG) and
Open Images (OI)) and five popular SGG methods. It is maintained regularly
with up-to-date Pytorch support. It supports both attribute and relationship
detection, and its object detection module (OD) and SGG module are decouple-
able, which enables user to use customized OD models/results.
There are several open-sourced code bases and models for SGG, see, e.g., [21,
19, 22, 15]. However, none of the existing code bases satisfies the following
five criteria that from our perspective are important for easy use: (1)
Support both Visual Genome (VG) and Open Images (OI) datasets, where VG is a
popular academic testbed and OI is a large-scale public benchmark; (2) Support
various popular methods, especially RelDN [22] that we found is very effective
in improving SGG performance; (3) Under continuous maintenance and up-to-date
Pytorch support; (4) Support attribute detection, which is crucial in vision-
language downstream tasks [1, 23]; and (5) Make the object detection (OD)
module and the SGG module decouple-able, allowing users to use their
customized detection models and results. Our SGG Benchmark code base, built on
top of maskrcnn-benchmark [13], satisfies all these five criteria and has
several other useful features. We compare ours with existing SGG code bases in
Table 1 and list main features of our code base as below.
* •
Provide a generic SGG dataset class that supports both VG and OI datasets and
is easily adaptable to customized SGG datasets. We have integrated evaluation
metrics from official Open Images relationship detection challenge for
OpenImages Visual relationship detection[10], and implemented widely used
Visual Genome relationship detection Recall calculation for scene graph
generation on the Visual Genome[11].
* •
Support multiple popular scene graph generation algorithms. We have integrated
five widely used scene graph generation algorithms into our framework,
including iterated message passing (IMP) [18], multi-level scene detection
networks (MSDN) [12], graph R-CNN (GRCNN) [19], neural motif (NM) [21] and
RelDN [22].
* •
Modular design with decouple-able object detection and SGG modules. We have
decomposed SGG framework into three components: object detection, attribute
classification and relationship detection. One can easily replace or insert
new components. Our framework decouples object detection and relationship
detection so that one can do relationship detection with bounding boxes and
labels from any object detector.
* •
Fast and portable dataset format. Our code base uses Tab Separated Values
(TSV) data format, which is portable and flexible for data manipulations. We
have also developed tools to visualize this data format directly. We will
release the visualization tool later.
* •
Large models with state of the art performance. We have trained large models
with ResNeXt-152 backbone for both object detection and scene graph
generation. Our large models achieve state of the art performance on both Open
Images relationship detection and Visual Genome scene graph generation.
* •
Image feature extraction for downstream vision-language tasks. We provide a
easy-to-use pipeline to extract object and relation features from our
pretrained models. The features exacted from our large models, when used as
the input of downstream vision-language models, achieve SOTA performance on
seven major vision-language tasks [23].
Besides presenting major improvements in our code base (Section 2) and
benchmarking results on VG and OI datasets (Section 3), we report a
comprehensive ablation study of current models’ capability in Section 4. We
study the frequency prior in relationship detection and found that the SOTA
models are only slightly better than the frequency prior baseline. We also
ablate the error of SGG models into different sources, including object
detection error, relation proposal error and relation classification error. We
hope the study can provide insights to build better SGG models.
## 2 Major improvements in SGG methods.
In our code base, we have re-implemented five widely used SGG algorithms, i.e,
IMP [18], MSDN [12], GRCNN [19], NM [21] and RelDN [22], with two major
improvements as described below.
Figure 1: Illustration of coupled and decoupled SGG model architecture.
### 2.1 Decouple object and relationship detection
Most existing SGG models use a two-stage model architecture (object detection
first and then relationship prediction), e.g., [18, 12, 19, 21], where the
relationship detection module extracts relation features from the same
backbone of the object detection module, as shown in Figure 1 Left. The object
detector (the yellow part) is pre-trained with the object detection task. To
train the relationship detection module (the green part), one either (1)
trains only the parameters in the relationship detection module, resulting in
sub-optimal relationship detection performance, or (2) trains the full network
with both object and relationship detection losses in a multi-task learning
fashion, typically resulting in OD performance drop compared to the pre-
trained object detector. This tightly coupled model architecture also makes
SGG models difficult to make use of off-the-shelf object detectors, such as
calling a Cloud service for object detection.
To resolve these issues, our code base supports both the coupled and decoupled
SGG model architecture. As shown in Figure 1 Right, the decoupled model
introduces a separate relation backbone for relationship detection, which
enables users to use their customized detection models/results. In our current
implementation, we use [13] as our object detector, but the decoupled model
can receive detection results from any object detectors. In Table 5, we show
that this decoupled model architecture outperforms the coupled counterpart.
The extra computational and memory cost from the relation backbone is minor,
because the major cost of an SGG model is from its relation head.
### 2.2 No refinement of object detection results
It is a common practice in training SGG models that the relationship detection
module also learns to output refined object detection results, which either
only refines the object classification (labels and confidences), e.g., [18,
12, 19], or refines both object classification and box regression, e.g., [21].
This refinement introduces extra OD parameters and an OD loss in the
relationship detection module. The hope is that by jointly training OD and
relationship detection, the OD performance can be improved. However, we found
that it is not the case. The refined OD results are typically worse than the
pre-trained OD results. As shown in Table 6, the worse and constantly-changing
OD results also make it more difficult to train the relationship module,
resulting in worse relationship detection performance. Therefore, we do not
refine the object detection results in the relationship module.
## 3 SGG Benchmarks on VG and OI
### 3.1 Datasets and evaluation metrics
Our code base provides a generic SGG dataset class that supports both VG and
OI datasets. It is easily adaptable to customized SGG datasets, too. We listed
the main features of these two datasets and their evaluation metrics as below.
Visual Genome Scene Graph Generation. The Visual Genome dataset for Scene
Graph Generation, introduced by IMP [18], contains 150 object and 50 relation
categories. We follow their train/val splits. The evaluation codes are adopted
from IMP [18] and NM [21]. The evaluation metrics are based on Recalls of
three settings: (1) predicate classification (predcls): given a ground truth
set of object boxes and labels, predict edge labels, (2) scene graph
classification (sgcls): given ground truth boxes, predict box labels and edge
labels and (3) scene graph detection (sgdet): predict boxes, box labels and
edge labels.
Open Images Visual Relationship Detection. We follow Open Images Challenge
2018 Visual Relationship Detection Track. We use official recommended
validation subset to split the data. The train and val sets contains 53,953
and 3,234 images respectively. There are 9 different relationships, 57
different object classes and 5 different attributes. We adopt the evaluation
code from Open Images Visual Relationship Detection Challenge 2018 official
evaluation. The metrics are based on detection average precision/recall.
Following RelDN, we scale each predicate category by their relative ratios in
the val set, which we refer to as the weighted mAP (wmAP), to solve extreme
predicate class imbalance problem. The final evaluation score is calculated as
$Score=0.2*recall@50+0.4*wmAP(Triplet)+0.4*wmAP(Phrase)$.
### 3.2 SGG methods and frequency baselines
We benchmark five scene graph generation methods, including iterative message
passing (IMP) [18], multi-level scene detection networks (MSDN) [12], graph
R-CNN (GRCNN) [19], Neural Motif [21] and RelDN [22].
Since object labels are highly predictive of relationship labels, we
additionally include two simple yet strong frequency baselines (first proposed
in [21]) built from training set statistics. The first, “Freq”, gives the most
likely relation type given the object and subject labels, based on training
set statistics. The second, “Freq+Overlap”, additionally requires that the two
boxes have overlap in order for the pair to count as a valid relation.
### 3.3 Benchmarking Results
We present benchmarking results on Open Images Visual Relationship Detection
in Table 2. The object detection model is a ResNeXt152-FPN detector trained on
OpenImagesVRD dataset. Its performance is 76.11 [email protected] over 57 object classes
used in relation detection. The RelDN performs the best. The “Freq+Overlap”
baseline performs very competitively, better or as good as all methods except
RelDN. Thanks to the large and strong ResNeXt152 backbone, our new RelDN
result sets a new SOTA performance on this OI VRD task.
Model | Score | Recall@50 | wmAP(Triplet) | mAP(Triplet) | wmAP(Phrase) | mAP(Phrase) | Triplet proposal recall | Phrase proposal recall
---|---|---|---|---|---|---|---|---
Neural Motif | 39.48 | 72.54 | 29.35 | 29.26 | 33.10 | 35.02 | 73.64 | 78.70
MSDN | 39.64 | 71.76 | 30.40 | 36.76 | 32.81 | 40.89 | 72.54 | 75.85
IMP | 40.01 | 71.81 | 30.88 | 45.97 | 33.25 | 50.42 | 72.81 | 76.04
Freq+Overlap | 40.12 | 72.63 | 30.18 | 31.82 | 33.81 | 37.08 | 74.81 | 78.26
GRCNN | 43.54 | 74.17 | 34.73 | 39.56 | 37.04 | 43.63 | 74.11 | 77.32
RelDN | 51.08 | 75.40 | 40.85 | 44.24 | 49.16 | 50.60 | 78.74 | 90.39
Table 2: Open Images Scene Graph Detection results on val set. All models
share the same object detector, which is an ResNeXt152-FPN detector trained on
57 object classes used in this dataset. All models are inferenced in
unconstrained mode (each subject and object pair can have at most 2
predicates).
We present benchmarking results on Visual Genome in Table 3. The object
detection model is a ResNet50-FPN detector trained on Visucal Genome. Its
performance is 28.15 [email protected] over 150 object classes. RelDN is still the best
performer. All the other methods achieve similar performance as the
“Freq+Overlap” baseline.
Model | sgdet@20 | sgdet@50 | sgdet@100 | sgcls@20 | sgcls@50 | sgcls@100 | predcls@20 | predcls@50 | predcls@100
---|---|---|---|---|---|---|---|---|---
Neural Motif | 21.8 | 30.1 | 33.8 | 30.2 | 35.1 | 36.5 | 52.1 | 61.2 | 63.2
Freq+Overlap | 21.6 | 29.0 | 34.0 | 31.9 | 35.7 | 36.6 | 53.4 | 60.5 | 62.1
IMP | 21.7 | 29.3 | 34.5 | 29.2 | 33.9 | 35.3 | 48.8 | 57.6 | 59.9
MSDN | 22.4 | 30.0 | 35.3 | 29.7 | 34.4 | 35.9 | 51.2 | 59.6 | 61.6
GRCNN | 22.9 | 30.1 | 34.8 | 30.5 | 34.9 | 36.2 | 52.1 | 59.9 | 61.8
RelDN | 24.0 | 32.4 | 37.8 | 31.9 | 35.7 | 36.6 | 54.0 | 60.9 | 62.5
Table 3: Visual Genome Scene Graph Detection results on val set. All models
share the same object detector, which is a ResNet50-FPN detector. All models
are evaluated in constrained mode (each subject and object pair can only have
1 predicate).
## 4 Ablation Experiments
In order to justify our two major changes to existing SGG methods and
understand the limitation of these methods, we perform the following ablation
study on the OI VRD task.
Coupled vs decoupled SGG model architecture. As mentioned in Section 2.1, our
code base supports both the coupled and decoupled model architecture. In Table
5, we show that the decoupled arch outperforms the coupled arch. Table 5 also
shows that the coupled arch with full model trained by both object and
relation detection losses performs the worst. This indicates that the
relationship detection task is not helping object detection, but instead
making its performance worse.
OD | Relation | score | Recall@50 | wmAP(Triplet) | mAP(Triplet) | wmAP(Phrase) | mAP(Phrase) | Triplet proposal recall | Phrase proposal recall
---|---|---|---|---|---|---|---|---|---
predicted objects | “Freq+Overlap” | 40.12 | 72.63 | 30.18 | 29.35 | 33.81 | 34.05 | 77.10 | 89.92
predicted objects | model relation | 46.96 | 74.42 | 38.78 | 41.38 | 41.41 | 44.68 | 77.51 | 89.98
gt objects | “Freq+Overlap” | 78.94 | 93.38 | 77.87 | 73.89 | 72.81 | 68.67 | 93.87 | 94.73
gt objects | model relation | 86.41 | 93.29 | 86.46 | 85.36 | 82.93 | 81.76 | 93.84 | 97.32
gt objects | gt pairs + “Freq+Overlap” | 95.58 | 99.89 | 97.21 | 84.72 | 91.80 | 79.66 | 100 | 100
gt objects | gt pairs + predicted relation | 94.21 | 99.86 | 95.22 | 84.67 | 90.38 | 80.43 | 100 | 100
Table 4: We use the pre-trained RelDN model from [22] for this ablation study. The mAP of object detector (ResNeXt101-FPN) is 71.33. When using predicted bounding box, the bbox pair recall (regardless of predicate) are 86.94(Triplet) and 95.17(Phrase). Model | Recall@50
---|---
Coupled, only Rel_head is trained | 74.31
Coupled, full model is trained | 66.47
Decoupled | 75.40
Table 5: Comparison of coupled and decoupled models. All these experiments are conducted on OI VRD Dataset with ResNeXt152-FPN as backbone and RelDN as relation head. Model | refined | not refined
---|---|---
IMP | 69.90 | 71.43
MSDN | 68.08 | 71.36
Neural Motif | 71.46 | 72.68
Table 6: Comparison of using object label predicted by relation head (refined
object detection) and label predicted by pre-trained object detector. All
models are trained on OI VRD dataset with ResNeXt152-FPN backbone and the
reported numbers are Recall@50.
Should OD be refined or not? In Table 6, we show that it is more desirable to
directly use the pre-trained OD results in the relationship detection module,
instead of further refining them.
Ablate SGG error into different sources. In Table 4, we ablate SGG errors into
three sources: errors from object detection (predicted objects vs ground-truth
objects), errors from relation proposal (model’s proposed pairs vs ground-
truth pairs), and errors from relation classification. We use two models for
this experiment: the pre-trained RelDN model (ResNeXt101-FPN) from [22] and
the “Freq+Overlap” baseline. We can see that the majority of SGG error comes
from the object detection, because the score jumps from 40.96 to 86.41 by
replacing the predicted objects with the ground-truth objects. The relation
proposal is the second major source of SGG error source, because the score
jumps from 86.41 to 94.21 by further replacing the proposed pairs with the
ground-truth pairs. Finally, the classification error contributes to the gap
from 94.21 to 100. Table 4 also shows that the “Freq+Overlap” baseline is even
better than the RelDN model in terms of relation classification, but worse in
terms of relation proposals.
The barrier of frequency/language prior. As discussed in the last paragraph,
the models’ relation classification capability is almost the same as the
”Freq+Overlap” baseline on OI VRD. Since VG task has more predicate classes
(50) compared with OI VRD (10), it would be more difficult for the
”Freq+Overlap” baseline. Therefore, we use models trained on VG task to
further study if SGG methods only learned the frequency prior from training
data. In Table 7, we first compute every method’s relation classification
accuracy (the diagonal part) and their pair-wise perfect ensemble accuracy
(the lower-diagonal part). As the diagonal shows, all the methods has nearly
the same and are slightly worse than the ”Freq+Overlap” baseline. However, all
the methods are to some degree different from the ”Freq+Overlap” baseline
because the pair-wise ensemble models (the last row) are clearly better than
those single models (the diagonal). To further quantify the similarity of two
SGG models (including the ”Freq+Overlap” baseline), We calculated their pair-
wise similarity based on models’ predictions in Table 8. From these results,
we can see the model predictions similarity range from 70.89% to 84.17%. From
these results, we conclude that the difference in terms of relation
classification capability between learned SGG models and the ”Freq+Overlap”
baseline are very small. To further improve SGG performance, new SGG methods
should learn more visual signals different from the frequency prior.
Model | IMP | MSDN | Neural Motif | GRCNN | RelDN | Freq+Overlap
---|---|---|---|---|---|---
IMP | 63.85 | | | | |
MSDN | 69.85 | 64.82 | | | |
Neural Motif | 67.71 | 70.27 | 65.21 | | |
GRCNN | 70.61 | 68.51 | 70.57 | 64.80 | |
RelDN | 71.14 | 70.03 | 70.67 | 69.99 | 66.12 |
Freq+Overlap | 70.38 | 69.36 | 69.69 | 69.76 | 69.03 | 66.23
Table 7: Visual Genome models predicate predictions pair-wise ensemble
accuracy ($\frac{TP+TN}{TP+TN+FP+FN}$). We assume a perfect ensemble setting
where the ensemble model is correct as long as there is a correct prediction
in the ensemble.
Model | IMP | MSDN | Neural Motif | GRCNN | RelDN | Freq+Overlap
---|---|---|---|---|---|---
IMP | 100 | | | | |
MSDN | 73.83 | 100 | | | |
Neural Motif | 84.17 | 74.53 | 100 | | |
GRCNN | 71.06 | 80.12 | 73.59 | 100 | |
RelDN | 70.89 | 75.98 | 75.15 | 76.86 | 100 |
Freq+Overlap | 74.49 | 79.17 | 80.30 | 78.21 | 83.56 | 100
Table 8: Visual Genome model predictions similarity comparison under force
relation mode. The similarity is defined as $\frac{\text{\\# matched
triplets}}{\text{\\# total unique triplets}}$, triplet is defined as
$(subj\\_instance,predicate,obj\\_instance)$.
## 5 Feature Extraction Pipelines
Our SGG benchmark supports feature extraction for downstream computer vision
and vision-language tasks. Given an image, we can extract both object-level
features and relation-level features.
Object-level features are extracted from the object detector. Each bounding
box has a feature vector. Relation-level features are extracted from the scene
graph detector. Each relation pair has a feature vector.
## References
* [1] P. Anderson, X. He, C. Buehler, D. Teney, M. Johnson, S. Gould, and L. Zhang. Bottom-up and top-down attention for image captioning and visual question answering. In CVPR, 2018.
* [2] I. Armeni, Z.-Y. He, J. Gwak, A. R. Zamir, M. Fischer, J. Malik, and S. Savarese. 3d scene graph: A structure for unified semantics, 3d space, and camera. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pages 5664–5673, 2019.
* [3] H. Ben-Younes, R. Cadene, N. Thome, and M. Cord. Block: Bilinear superdiagonal fusion for visual question answering and visual relationship detection. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 33, pages 8102–8109, 2019.
* [4] L. Gao, B. Wang, and W. Wang. Image captioning with scene-graph based semantic concepts. In Proceedings of the 2018 10th International Conference on Machine Learning and Computing, pages 225–229, 2018.
* [5] S. Ghosh, G. Burachas, A. Ray, and A. Ziskind. Generating natural language explanations for visual question answering using scene graphs and visual attention. arXiv preprint arXiv:1902.05715, 2019.
* [6] J. Gu, S. Joty, J. Cai, H. Zhao, X. Yang, and G. Wang. Unpaired image captioning via scene graph alignments. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pages 10323–10332, 2019.
* [7] J. Ji, R. Krishna, L. Fei-Fei, and J. C. Niebles. Action genome: Actions as composition of spatio-temporal scene graphs, 2019.
* [8] J. Johnson, A. Gupta, and L. Fei-Fei. Image generation from scene graphs. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 1219–1228, 2018.
* [9] J. Johnson, R. Krishna, M. Stark, L.-J. Li, D. Shamma, M. Bernstein, and L. Fei-Fei. Image retrieval using scene graphs. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2015.
* [10] I. Krasin, T. Duerig, N. Alldrin, V. Ferrari, S. Abu-El-Haija, A. Kuznetsova, H. Rom, J. Uijlings, S. Popov, S. Kamali, M. Malloci, J. Pont-Tuset, A. Veit, S. Belongie, V. Gomes, A. Gupta, C. Sun, G. Chechik, D. Cai, Z. Feng, D. Narayanan, and K. Murphy. Openimages: A public dataset for large-scale multi-label and multi-class image classification. Dataset available from https://storage.googleapis.com/openimages/web/index.html, 2017.
* [11] R. Krishna, Y. Zhu, O. Groth, J. Johnson, K. Hata, J. Kravitz, S. Chen, Y. Kalantidis, L.-J. Li, D. A. Shamma, M. Bernstein, and L. Fei-Fei. Visual genome: Connecting language and vision using crowdsourced dense image annotations. 2016\.
* [12] Y. Li, W. Ouyang, B. Zhou, K. Wang, and X. Wang. Scene graph generation from objects, phrases and region captions. 2017 IEEE International Conference on Computer Vision (ICCV), Oct 2017.
* [13] F. Massa and R. Girshick. maskrcnn-benchmark: Fast, modular reference implementation of Instance Segmentation and Object Detection algorithms in PyTorch. https://github.com/facebookresearch/maskrcnn-benchmark, 2018. Accessed: [Insert date here].
* [14] T. Sylvain, P. Zhang, Y. Bengio, R. D. Hjelm, and S. Sharma. Object-centric image generation from layouts, 2020.
* [15] K. Tang. A scene graph generation codebase in pytorch, 2020. https://github.com/KaihuaTang/Scene-Graph-Benchmark.pytorch.
* [16] K. Tang, H. Zhang, B. Wu, W. Luo, and W. Liu. Learning to compose dynamic tree structures for visual contexts. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 6619–6628, 2019.
* [17] S. Wang, R. Wang, Z. Yao, S. Shan, and X. Chen. Cross-modal scene graph matching for relationship-aware image-text retrieval. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, pages 1508–1517, 2020.
* [18] D. Xu, Y. Zhu, C. B. Choy, and L. Fei-Fei. Scene graph generation by iterative message passing. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Jul 2017.
* [19] J. Yang, J. Lu, S. Lee, D. Batra, and D. Parikh. Graph r-cnn for scene graph generation. Lecture Notes in Computer Science, page 690–706, 2018.
* [20] X. Yang, K. Tang, H. Zhang, and J. Cai. Auto-encoding scene graphs for image captioning. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 10685–10694, 2019.
* [21] R. Zellers, M. Yatskar, S. Thomson, and Y. Choi. Neural motifs: Scene graph parsing with global context. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Jun 2018.
* [22] J. Zhang, K. J. Shih, A. Elgammal, A. Tao, and B. Catanzaro. Graphical contrastive losses for scene graph parsing, 2019.
* [23] P. Zhang, X. Li, X. Hu, J. Yang, L. Zhang, L. Wang, Y. Choi, and J. Gao. Vinvl: Making visual representations matter in vision-language models. arXiv preprint arXiv:2101.00529, 2021.
| arxiv-papers | 2021-07-27T05:10:09 | 2024-09-04T03:07:20.618666 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Xiaotian Han, Jianwei Yang, Houdong Hu, Lei Zhang, Jianfeng Gao,\n Pengchuan Zhang",
"submitter": "Xiaotian Han",
"url": "https://arxiv.org/abs/2107.12604"
} |
2107.12605 | ††thanks: [email protected]††thanks: [email protected]††thanks: [email protected]
# Similar Scale-invariant Behaviors between Soft Gamma-ray Repeaters and An
Extreme Epoch from FRB 121102
Jun-Jie Wei Purple Mountain Observatory, Chinese Academy of Sciences, Nanjing
210023, China School of Astronomy and Space Sciences, University of Science
and Technology of China, Hefei 230026, China Xue-Feng Wu Purple Mountain
Observatory, Chinese Academy of Sciences, Nanjing 210023, China School of
Astronomy and Space Sciences, University of Science and Technology of China,
Hefei 230026, China Zi-Gao Dai School of Astronomy and Space Sciences,
University of Science and Technology of China, Hefei 230026, China School of
Astronomy and Space Science, Nanjing University, Nanjing 210023, China Fa-Yin
Wang School of Astronomy and Space Science, Nanjing University, Nanjing
210023, China Pei Wang CAS Key Laboratory of FAST, NAOC, Chinese Academy of
Sciences, Beijing 100101, China Di Li CAS Key Laboratory of FAST, NAOC,
Chinese Academy of Sciences, Beijing 100101, China University of Chinese
Academy of Sciences, Beijing 100049, China NAOC-UKZN Computational
Astrophysics Centre, University of KwaZulu-Natal, Durban 4000, South Africa
Bing Zhang Department of Physics and Astronomy, University of Nevada, Las
Vegas, Las Vegas, NV 89154, USA
###### Abstract
In this work, we study the statistical properties of soft gamma-/hard X-ray
bursts from the soft gamma-ray repeater (SGR) 1806–20 and SGR J1935+2154 and
of radio bursts from the repeating fast radio burst (FRB) 121102. For SGRs, we
show that the probability density functions for the differences of fluences,
fluxes, and durations at different times have fat tails with a $q$-Gaussian
form. The $q$ values in the $q$-Gaussian distributions are approximately
steady and independent of the temporal interval scale adopted, implying a
scale-invariant structure of SGRs. These features indicate that SGR bursts may
be governed by a self-organizing criticality (SOC) process. The recent
discovery of a Galactic FRB associated with a hard X-ray burst from the
Galactic magnetar SGR J1935+2154 has established the magnetar origin of at
least some FRBs. Very recently, 1652 independent bursts from the repeating FRB
121102 have been detected by the Five-hundred-meter Aperture Spherical radio
Telescope (FAST). Here we also investigate the scale-invariant structure of
FRB 121102 based on the latest observation of FAST, and show that FRB 121102
and SGRs share similar statistical properties. Scale invariance in both FRB
121102 and SGRs can be well explained within the same physical framework of
fractal-diffusive SOC systems.
Magnetars, Soft gamma-ray repeaters, Radio transient sources, Radio bursts
## I Introduction
Self-organized criticality (SOC) Bak et al. (1987); Aschwanden et al. (2016)
has been found in dynamical behaviors of astrophysics systems. We here examine
two types of transient phenomena, namely, soft gamma-ray repeaters (SGRs) and
fast radio bursts (FRBs), which have been shown to be associated with each
other in at least one case (Zhang, 2020).
Magnetars are highly magnetized neutron stars that exhibit dramatic
variability over a broad range of timescales Duncan and Thompson (1992);
Kouveliotou et al. (1998) (see also Kaspi and Beloborodov (2017) for a
review). Many magnetars were first observed as SGRs, i.e., sources of repeated
bursts of soft gamma-/hard X-rays, with typical durations of $\sim 0.1-1$ s
and peak luminosities of $\sim 10^{39}-10^{41}$ erg $\rm s^{-1}$. Three
several-minute-long giant flares with peak luminosities up to $\sim
10^{44}-10^{47}$ erg $\rm s^{-1}$ have also been observed from three different
SGRs (Hurley et al., 1999; Palmer et al., 2005). Both bursts and flares are
believed to be powered by the dissipation and decay of the ultrastrong
magnetic fields, either through neutron star crustquakes (Thompson and Duncan,
1995) or magnetic reconnection (Lyutikov, 2003).
Several works have found that the energy distribution of SGR bursts can be
well fitted by a power-law function Cheng et al. (1996); Göǧüş et al. (1999,
2000); Cheng et al. (2020). Power-law size distributions of extreme events can
be explained by SOC systems. The SOC subsystems will self-organize, owing to
some driving force, to a critical state, at which a small local disturbance
can produce an avalanche-like chain reaction of any size within the system
(Bak et al., 1987). The fundamental property of all SOC systems have in common
is the emergence of scale-free power-law size distributions (Aschwanden, 2011,
2012, 2015; Wang and Dai, 2013). SGRs, sharing statistical properties in terms
of the distributions of energy and waiting time with earthquakes, have been
regarded as SOC systems (Cheng et al., 1996). The earthquake-like behavior
also suggests that the energies of SGRs originate from starquakes of magnetars
(Duncan and Thompson, 1992; Thompson and Duncan, 1995).
Besides the power-law size distribution, another hallmark of SOC systems is
the scale invariance of the avalanche size differences (Caruso et al., 2007;
Wang et al., 2015). Caruso et al. Caruso et al. (2007) showed that the
probability density functions (PDFs) for the earthquake energy differences at
different times have fat tails with a $q$-Gaussian form, which could be well
explained by introducing a small-world topology on the Olami-Feder-Christensen
(OFC) model (Olami et al., 1992). In physics, the OFC model is one of the most
popular models displaying SOC. The $q$-Gaussian distribution was then
suggested as an important character for describing the presence of criticality
(Caruso et al., 2007). Moreover, the form of the PDF does not depend on the
time interval adopted for the earthquake energy difference, i.e., the $q$
values in $q$-Gaussian distributions keep nearly constant for different scale
intervals, which indicates that there is a scale-invariant structure in the
energy differences of earthquakes (Caruso et al., 2007; Wang et al., 2015).
Subsequently, Chang et al. Chang et al. (2017) studied 384 X-ray bursts
observed in three active episodes of SGR J1550–5418 and found that this SGR
shows similar scale-invariant behaviors with earthquakes, i.e., the PDFs of
the differences of fluences, peak fluxes, and durations exhibit a common
$q$-Gaussian distribution at different scale intervals, supporting the idea
that SGRs are powered by crustquakes of magnetars.
FRBs are intense millisecond-duration bursts of radio waves occurring in the
universe (Lorimer et al., 2007; Petroff et al., 2019; Cordes and Chatterjee,
2019). So far, more than 600 FRBs have been reported, and over two dozens of
them have been seen to repeat Spitler et al. (2016); CHIME/FRB Collaboration
et al. (2019). Although rapid developments have been made in the FRB research
field, the physical origin of FRBs remains mysterious (Platts et al., 2019;
Zhang, 2020; Xiao et al., 2021). Magnetars have been proposed as the likely
engine to power repeating FRBs (Popov and Postnov, 2010; Katz, 2016; Metzger
et al., 2017; Wang and Yu, 2017; Beloborodov, 2017; Kumar et al., 2017; Yang
and Zhang, 2018; Cheng et al., 2020; Wang et al., 2020). On 2020 April 28, one
FRB-like event was independently detected by the Canadian Hydrogen Intensity
Mapping Experiment (CHIME/FRB Collaboration et al., 2020) and the Survey for
Transient Astronomical Radio Emission 2 (Bochenek et al., 2020) in association
with a hard X-ray burst from the Galactic magnetar SGR J1935+2154 during its
active phase (Li et al., 2021a; Ridnaia et al., 2021; Tavani et al., 2021).
This discovery strongly supports that magnetar engines can produce at least
some extragalactic FRBs.
Recently, by analyzing 93 bursts from the repeating FRB 121102 by the
observation of the Green Bank Telescope at 4–8 GHz (Zhang et al., 2018), Lin &
Sang Lin and Sang (2020) found that FRB 121102 has the property of scale
invariance similar to that of SGR J1550–5418. During an extreme episode of
bursts, FRB 121102 produced 1652 detectable events within a time-span of 62
days (Li et al., 2021b). The peak burst rate reached 117 hr-1. Such a range of
cadence facilitate further investigation into the SOC structures of this
source. Another key feature of this burst set from FRB 121102 is the bimodal
energy distribution of the burst rate.
Among the 16 known SGRs (12 confirmed and 4 candidates) Olausen and Kaspi
(2014), SGR J1550–5418 is the only source to date that has been used to
investigate the scale-invariant property (Chang et al., 2017). So it is
interesting to know whether other SGRs (e.g., SGR 1806–20 and SGR J1935+2154)
share the same property. The magnetar research group at Sabancı University
presented their systematic temporal and broad-band spectral analysis of over
1,500 bursts from SGR J1550–5418, SGR 1900+14, and SGR 1806–20 observed with
the Rossi X-ray Timing Explorer (RXTE) Kırmızıbayrak et al. (2017). In these
public data, SGR 1806–20 has the largest burst sample (924 bursts), which will
be used in our following analysis. Additionally, since SGR J1935+2154 is the
first source that has been reported to power a Galactic FRB (CHIME/FRB
Collaboration et al., 2020; Bochenek et al., 2020), we will also investigate
the physical connection between SGR J1935+2154 and repeating FRBs.
In this paper, we investigate the scale-invariant behaviors of SGR 1806–20,
SGR J1935+2154, and FRB 121102. For SGRs, the PDFs of the differences of
fluences (or total counts), peak fluxes (or peak counts), and durations at
different time scales are shown in Section II. These PDFs can be well fitted
by a $q$-Gaussian function, and the functional form does not depend on the
scale interval adopted. In Section III, we compare the PDFs between SGRs and
repeating FRB 121102. The evidence that may shed light on the bimodal burst
energy distribution of FRB 121102 is discussed in Section IV. Lastly, a brief
summary and discussion are given in Section V.
## II Scale-invariance in SGRs
### II.1 Data
The magnetar research group at Sabancı University has constructed an online
database of magnetar bursts detected by the RXTE between 1996 and 2011, which
can be visited at http://magnetars.sabanciuniv.edu. This database contains 924
bursts from SGR 1806–20, representing the largest sample for a single
observation. The trigger time, total counts, peak counts, and duration of each
burst are available in the database.
For SGR J1935+2154, the bursts observed by the Gamma-ray Burst Monitor onboard
the Fermi satellite during the source’s six active episodes from 2014 to 2020
are used (Lin et al., 2020a, b). The number of bursts is 260. The available
information for each burst include trigger time, fluence, and duration, but
not peak flux.
Note that the adopted durations of all bursts from both SGR 1806–20 and SGR
J1935+2154 were determined by Bayesian block algorithm. We estimate the
waiting time between two adjacent bursts through $\Delta t=t_{i+1}-t_{i}$,
where $t_{i+1}$ and $t_{i}$ are the trigger times of the $(i+1)$-th and $i$-th
bursts, respectively. As both SGR 1806–20 and SGR J1935+2154 consist of
several isolated epochs, we discard the waiting time between the last burst of
a certain epoch and the first burst of the next epoch.
Table 1: The mean values of $q$ in the $q$-Gaussian distribution for earthquakes, SGRs, and FRB 121102 Phenomena | Energy range (erg) | Number | $q$-fluence (energy) | $q$-flux | $q$-duration | References
---|---|---|---|---|---|---
earthquakes | | 400,000 | $1.75\pm 0.15$ | – | – | Caruso et al. (2007)
SGR J1550–5418 | | 384 | $2.41\pm 0.29$ | $2.40\pm 0.30$ | $2.06\pm 0.23$ | Chang et al. (2017)
SGR 1806–20 | | 924 | $2.72\pm 0.05$ | $2.65\pm 0.05$ | $2.48\pm 0.05$ | This work
SGR J1935+2154 | | 260 | $2.78\pm 0.12$ | – | $2.28\pm 0.15$ | This work
FRB 121102 | Overall bursts | 1652 | $2.51\pm 0.03$ | $2.50\pm 0.03$ | $1.42\pm 0.04$ | This work
| with $4\times 10^{36}<E<8\times 10^{39}$ | | | | |
FRB 121102 | Low-energy bursts | 1253 | $1.63\pm 0.09$ | $1.81\pm 0.05$ | $1.39\pm 0.06$ | This work
| with $4\times 10^{36}<E\leq 2\times 10^{38}$ | | | | |
| High-energy bursts | 399 | $2.21\pm 0.10$ | $2.34\pm 0.09$ | $1.50\pm 0.16$ | This work
| with $2\times 10^{38}<E<8\times 10^{39}$ | | | | |
Figure 1: Scale-invariant structure of SGR 1806–20. PDFs of the differences of
total counts (upper-left panel), peak counts (upper-right panel), and
durations (lower-left panel) for $n=1$ (red diamonds), $n=50$ (green circles),
and $n=100$ (blue triangles), and the best-fitting $q$-Gaussian distributions
(solid lines). Lower-right panel: the best-fitting $q$ values in the
$q$-Gaussian distribution as a function of $n$.
Figure 2: Scale-invariant structure of SGR J1935+2154. PDFs of the differences
of fluences (left panel) and durations (middle panel) for $n=1$ (red
diamonds), $n=50$ (green circles), and $n=100$ (blue triangles), and the best-
fitting $q$-Gaussian distributions (solid lines). Right panel: the best-
fitting $q$ values in the $q$-Gaussian distribution as a function of $n$.
### II.2 PDFs of the Avalanche Size Differences
We are now in position to use the data of SGR 1806–20 and SGR J1935+2154 to
investigate the PDFs of the avalanche size differences. The difference between
two avalanche sizes is given by
$X_{n}=S_{i+n}-S_{i}\;,$ (1)
where $S_{i}$ is the size (fluence, peak flux, duration, or waiting time) of
the $i$-th burst in temporal order and $n$ (an integer) is the temporal
interval scale. In practice, $X_{n}$ is normalized to
$x_{n}=\frac{X_{n}}{\sigma_{X_{n}}}\;,$ (2)
where $\sigma_{X_{n}}$ is the standard deviation of $X_{n}$. We are interest
in the statistical distribution of $x_{n}$.
Figure 1 shows the statistical results of SGR 1806–20. In this plot, we
display the PDFs of the differences of total counts (upper-left panel), peak
counts (upper-right panel), and durations (lower-left panel) for $n=1$
(diamonds), $n=50$ (circles), and $n=100$ (triangles). Following Chang et al.
(2017), the data are binned based on the Freedman-Diaconis rule (Freedman and
Diaconis, 1981). One can see from Figure 1 that these PDFs $P(x_{n})$ have a
sharp peak and fat tails, which are different from Gaussian behaviors. The
sharp peak means that small size differences are most likely to happen, while
the fat tails suggest that there are rare but relatively large size
differences. The large fluctuations presented in the tails are caused by the
incompleteness given from the lack sampling of small magnitude events at the
global scale (Caruso et al., 2007). Additionally, the data points in Figure 1
are almost independent of the temporal interval scale $n$ adopted for the
avalanche size difference, indicating a common form of $P(x_{n})$. Here we use
the Tsallis $q$-Gaussian function (Tsallis, 1988; Tsallis et al., 1998)
$f(x_{n})=\alpha\left[1-\left(1-q\right)x_{n}^{2}/\beta\right]^{\frac{1}{1-q}}$
(3)
to fit $P(x_{n})$, where $\alpha$, $\beta$, and $q$ are free parameters. When
$q\rightarrow 1$, the $q$-Gaussian distribution reduces to the Gaussian
distribution with mean zero and standard deviation $\sigma=\sqrt{\beta/2}$.
Thus, $q\neq 1$ denotes a departure from Gaussian statistics.
The best-fitting parameters ($\alpha$, $\beta$, and $q$) are obtained by
minimizing the $\chi^{2}$ statistics,
$\chi^{2}=\sum_{i}\frac{\left[f(x_{n,i})-P(x_{n,i})\right]^{2}}{\sigma_{P,i}^{2}}\;,$
(4)
where $\sigma_{P,i}=\sqrt{N_{{\rm bin},i}}/N_{\rm tot}$ is the uncertainty of
the data point,111For clarity, the uncertainties of the data points are not
presented in the figure. with $N_{{\rm bin},i}$ is the event number in the
$i$-th bin and $N_{\rm tot}$ is the total number of $x_{n}$. We use the python
implementation, emcee (Foreman-Mackey et al., 2013), to apply the Markov Chain
Monte Carlo method to derive the best-fitting values and their corresponding
uncertainties for these parameters. In Figure 1, the red, green, and blue
smooth curves correspond to the best-fitting results for $n=1$, $n=50$, and
$n=100$, respectively. We may see that the PDFs of the differences of total
counts, peak counts, and durations are well fitted by the $q$-Gaussian
function, and that the three curves in each panel overlap almost completely.
However, the PDF of the waiting time differences can not be well fitted by
$q$-Gaussian (see also Ref. Chang et al. (2017)), so we do not exhibit it in
the figure. The waiting time shows different behaviors, which may be due to
the discontinuous observations of the telescope.
Furthermore, we compute the PDFs of the differences of total counts, peak
counts, and durations at different scale intervals $1\leq n\leq 100$, and fit
the PDFs with the $q$-Gaussian function. In the lower-right panel of Figure 1,
we plot the best-fitting $q$ values as a function of $n$. We find that the $q$
values are approximately invariant for different scale intervals $n$. The
property of the independence of $q$ values on $n$ is referred to as scale
invariance. The mean values of $q$ for total counts, peak counts, and duration
are $2.72\pm 0.05$, $2.65\pm 0.05$, and $2.48\pm 0.05$, respectively, which
are summarized in Table 1. Here the uncertainty denotes the standard deviation
of $q$. Interestingly, the $q$ values we find here are close to the values
derived from SGR J1550–5418 (Chang et al., 2017), which indicates that there
is a common scale-invariant property in SGRs.
Similar results can be obtained for the data of SGR J1935+2154, see Figure 2.
The $q$ values for this data also keep approximately steady for different
scale intervals $n$. The mean values of $q$ for fluence and duration are
$2.78\pm 0.12$ and $2.28\pm 0.14$, respectively. As shown in Table 1, these
values are well consistent with those of SGR J1550–5418 (Chang et al., 2017)
and SGR 1806–20, supporting a common scale-invariant structure of SGRs again.
## III Comparison with FRB 121102
Owing to the association between FRB 200428 and an X-ray burst from the
Galactic magnetar SGR J1935+2154 (CHIME/FRB Collaboration et al., 2020;
Bochenek et al., 2020; Li et al., 2021a; Ridnaia et al., 2021; Tavani et al.,
2021), it is natural to consider whether radio bursts of repeating FRBs have a
similar scale-invariant behavior. In this section, we compare the PDFs between
SGRs and repeating FRBs.
Recently, Li et al. Li et al. (2021b) reported the detection of 1652
independent bursts in 59.5 hours spanning 62 days using the Five-hundred-meter
Aperture Spherical radio Telescope (FAST) Nan et al. (2011); Li et al. (2018)
at 1.05-1.45 GHz. Such a uniform sample prevent complex selection effects,
which can be introduced by different instruments and different frequency bands
used in observations. Here we focus on the PDFs for the differences of
energies, fluxes, and durations at different time scales. For a fixed $n$, we
fit the PDF with the $q$-Gaussian function and extract the best-fitting $q$
value. Then we vary $n$ and derive the $q$ values as a function of $n$.
Figure 3: Scale-invariant structure of FRB 121102. PDFs of the differences of
energies (upper-left panel), fluxes (upper-right panel) and durations (lower-
left panel) for $n=1$ (red diamonds), $n=50$ (green circles), and $n=100$
(blue triangles), and the best-fitting $q$-Gaussian distributions (solid
lines). Lower-right panel: the best-fitting $q$ values in the $q$-Gaussian
distribution as a function of $n$.
Figure 3 exhibits some examples of the fits for the sample of FRB 121102. In
this figure, we show the PDFs of the differences of energies (upper-left
panel), fluxes (upper-right panel), and durations (lower-left panel) for $n=1$
(diamonds), $n=50$ (circles), and $n=100$ (triangles). The solid curves stand
for the best-fitting results. One can see that the PDFs can be well fitted by
the $q$-Gaussian function, in good agreement with the results of Lin and Sang
(2020). Similar to the scenario of SGRs, we also find that the $q$-Gaussian
function gives a poor fit to the PDF of the FRB waiting time differences,
which is then not shown in the figure (see also Ref. Lin and Sang (2020)). To
better represent the scale-invariant property in FRB 121102, in the lower-
right panel of Figure 3 we plot the best-fitting $q$ values as a function of
the temporal interval scale $n$. We confirm that the $q$ values are almost
stable and independent of $n$. This implies that there are similar scale-
invariant properties among earthquakes, SGRs, and FRBs. We also list the
average $q$ values of energy ($2.51\pm 0.03$), flux ($2.50\pm 0.03$), and
duration ($1.42\pm 0.04$) for FRB 121102 in Table 1. We emphasize that the
$q$-Gaussian distribution is a generalization of the standard Gaussian
distribution and it reduces to a Gaussian distribution when $q\rightarrow 1$.
Since the average $q$ value of duration is relatively small (closing to $1$),
the peak of the PDF in the lower-left panel of Figure 3 is no longer very
sharp as other PDFs.
## IV Evidence of a bimodal burst energy distribution of FRB 121102
The burst energy distribution of FRB 121102 can be adequately described as
bimodal (Li et al., 2021b). At the low energy end ($\sim E<2\times 10^{38}$
erg), a log-normal function can describe the distribution reasonably well.
While the distribution at the high energy end ($\sim E>2\times 10^{38}$ erg)
can be well fitted by a generalized Cauchy function. It is interesting to
investigate whether low-energy bursts and high-energy bursts of FRB 121102
have a similar scale-invariant behavior.
We divide the overall 1652 bursts into two components, i.e., 1253 low-energy
bursts with $E\leq 2\times 10^{38}$ erg and 399 high-energy bursts with
$E>2\times 10^{38}$ erg. Then the scale-invariant structure of the two
components are investigated, respectively. As shown in Table 1, the average
$q$ values of energy, peak flux, and duration for the low-energy component are
$q_{E}=1.63\pm 0.09$, $q_{P}=1.81\pm 0.05$, and $q_{T}=1.39\pm 0.06$. The
average $q$ values for the high-energy component are $q_{E}=2.21\pm 0.10$,
$q_{P}=2.34\pm 0.09$, and $q_{T}=1.50\pm 0.16$. Interestingly, the average $q$
value obtained from the PDFs of the energy differences of low-energy bursts is
compatible, within the standard deviations, to that one found from earthquakes
($q=1.75\pm 0.15$) Caruso et al. (2007). Consistent with theoretical models of
FRBs based on magnetar Popov and Postnov (2010); Lyubarsky (2014); Beloborodov
(2017); Metzger et al. (2019), the earthquake-like behavior here may indicate
that the low-energy bursts of FRB 121102 could originate from starquakes of a
magnetar. More interestingly, the average $q$ values of energy, peak flux, and
duration for the high-energy component of FRB 121102 are roughly consistent
with those of SGRs. We next show that these $q$ values can be well understood
within the same statistical framework of a SOC system.
For a fractal-diffusive avalanche model, quantitative values for the size
distributions of SOC parameters (length scales $L$, durations $T$, peak fluxes
$P$, and fluences or energies $E$) are derived from first principles, using
the scale-free probability conjecture, $N(L)dL\propto L^{-S}dL$, for three
Euclidean dimensions $S=1$, 2, and 3. The analytical model predicts the
indices of size distributions for $E$, $T$, and $P$ as (Aschwanden, 2012,
2014)
$\displaystyle\alpha_{E}$ $\displaystyle=$ $\displaystyle 1+(S-1)/(D_{S}+2)$
$\displaystyle\alpha_{T}$ $\displaystyle=$ $\displaystyle(1+S)/2\;,$ (5)
$\displaystyle\alpha_{P}$ $\displaystyle=$ $\displaystyle 2-1/S$
where $D_{S}\approx(1+S)/2$ is the mean fractal dimension. As mentioned above,
Caruso et al. Caruso et al. (2007) presented an analysis method to explain SOC
behavior in the limited number of earthquakes by making use of the return
distributions (i.e., distributions of the avalanche size differences at
different times). They obtained the first strong evidence that the return
distributions appear to have the shape of $q$-Gaussians, standard
distributions arising naturally in nonextensive statistical mechanics
(Tsallis, 1988; Tsallis et al., 1998). Under the assumption that there is no
correlation between the sizes of two events, an exact relation between the
index $\alpha$ of the avalanche size distribution and the $q$ values of the
appropriate $q$-Gaussian has been obtained as (Caruso et al., 2007; Celikoglu
et al., 2010)
$q=\frac{\alpha+2}{\alpha}\;,$ (6)
which is important because it makes the $q$ parameter determined a priori from
one of the well-known indices of the system.
In the framework of the fractal-diffusive SOC model, we obtain the theoretical
$q$ values, i.e., $q_{E}\approx 2.33$, $q_{P}\approx 2.20$, and $q_{T}=2.0$,
according to Equations (IV) and (6) by taking the three-dimensional Euclidean
space $S=3$. The observed $q$ values of SGR J1550–5418, SGR 1806–20, and SGR
J1935+2154 at $1\sigma$ confidence level are in the range of $q_{E}\approx
2.12-2.9$, $q_{P}\approx 2.37-2.70$, and $q_{T}\approx 1.83-2.53$, which agree
well with the predictions of the fractal-diffusive SOC model. We also note
that the derived $q_{E}$ and $q_{P}$ of the high-energy component of FRB
121102 ($q_{E}=2.21\pm 0.10$ and $q_{P}=2.34\pm 0.09$) are in good agreement
with the predictions of the fractal-diffusive SOC model, and the derived
$q_{T}$ ($1.50\pm 0.16$) is also roughly consistent with the model prediction
at $3.1\sigma$ confidence level. Therefore, SGRs and high-energy bursts of FRB
121102 share similar scale-invariant behavior, suggesting that they can be
explained within the same statistical framework of fractal-diffusive SOC
systems with the spatial dimension $S=3$.
The observed durations of the repeating bursts of FRB 121102 are directly used
for the analysis of scale invariance. As is well known, the observed pulse
duration of FRB is generally broadened by the instrumental and astrophysical
sources (Cordes and McLaughlin, 2003). The instrumental pulse broadening
includes the sampling time-scale and the intrachannel dispersion smearing. The
temporal resolution can not be better than the sampling time-scale, which
broadens the pulse. The smearing is caused by intrachannel dispersion. The
astrophysical pulse broadening is the scattering process of the radio emission
in inhomogeneous plasma. Therefore, the observed duration does not directly
represent the intrinsic duration. The intrinsic durations of the repeating
bursts, in principle, should be used for our purpose. In practice, it is
difficult to separate the intrinsic duration from the broadening components.
But note that the distribution of the observed duration differences at
different time intervals is studied in this work. Pulse broadening caused by
smearing and scattering can be approximately deducted from subtracting two
observed durations. That is, the difference between two observed durations can
be approximated as the difference between two intrinsic ones.
## V Summary and Discussion
Previous studies have shown that the PDFs for the earthquake energy
differences at different time intervals have fat tails with a $q$-Gaussian
shape (Caruso et al., 2007; Wang et al., 2015). Another remarkable feature is
that the $q$ values in the $q$-Gaussian distributions are approximately equal
and independent of the temporal interval scale adopted, indicating a scale-
invariant structure in the energy differences of earthquakes. These
statistical features can be well explained within a dissipative SOC scenario
taking into account long-range interactions (Caruso et al., 2007). That is,
scale invariance is an important character representing the system approaching
to a critical state. Recently, Chang et al. Chang et al. (2017) found that SGR
J1550–5418 has the property of scale invariance similar to that of
earthquakes. However, it is unclear whether other SGRs share the same scale-
invariant structure as SGR J1550–5418 and earthquakes.
In this work, we present statistics of soft gamma-/hard X-ray bursts from SGR
1806–20 and SGR J1935+2154. We find that the two SGRs share earthquake-like
behaviors in terms of the PDFs of the fluence differences, consistent with the
results of Chang et al. (2017). The PDFs of the fluence differences can be
well fitted by a $q$-Gaussian function and the $q$ values keep nearly constant
for different scale intervals. The earthquake-like behaviors support that
there is a common scale-invariant structure in SGRs and that systems
responsible for SGR bursts are in an SOC state. Moreover, we show that the
burst fluxes and durations of the SGRs share similar scale-invariant behaviors
with fluences, i.e., the PDFs of the differences of fluxes and durations at
different time intervals also well follow $q$-Gaussian distributions.
Given the association between an FRB-like event and an X-ray burst from the
Galactic magnetar SGR J1935+2154, we also investigate the scale-invariant
structure of the repeating FRB 121102. For FRB 121102, we show that the PDFs
of the differences of energies, fluxes, and durations also exhibit
$q$-Gaussian distributions, with steady $q$ values independent of the time
scale. These properties are very similar to those of earthquakes and SGRs, and
thus all can be attributed to a SOC process. Due to the fact that the burst
energy distribution of FRB 121102 is bimodal, we also investigate the scale-
invariant behaviors of low-energy bursts and high-energy bursts of FRB 121102.
We find that the $q_{E}$, $q_{P}$, and $q_{T}$ values of low-energy bursts are
different from those of high-energy bursts, which indicate that the low-energy
component and the high-energy component may have different physical origins.
Interestingly, the average $q$ value obtained from the PDFs of the energy
differences of low-energy bursts is close to the $q$ value found from
earthquakes. This implies that there may be some similarities between the
energy origins of low-energy bursts of FRB 121102 and earthquakes. More
interestingly, the average $q$ values of energy, peak flux, and duration for
the high-energy component of FRB 121102 are roughly consistent with those of
SGRs. These $q$ values can be well explained within the same statistical
framework of fractal-diffusive SOC systems with the spatial dimension $S=3$.
In the future, much more repeating bursts of FRBs will be detected. The
physical connection between repeating FRBs and SGRs can be further
investigated.
###### Acknowledgements.
This work is partially supported by the National Natural Science Foundation of
China (grant Nos. 11988101, 11725314, U1831122, 12041306, U1831207), the Youth
Innovation Promotion Association (2017366), the Key Research Program of
Frontier Sciences (grant No. ZDBS-LY-7014) of Chinese Academy of Sciences, and
the Major Science and Technology Project of Qinghai Province (2019-ZJ-A10).
ZGD was supported by the National Key Research and Development Program of
China (grant No. 2017YFA0402600), the National SKA Program of China (grant No.
2020SKA0120300), and the National Natural Science Foundation of China (grant
No. 11833003).
## References
* Bak et al. (1987) P. Bak, C. Tang, and K. Wiesenfeld, Phys. Rev. Lett. 59, 381 (1987).
* Aschwanden et al. (2016) M. J. Aschwanden, N. B. Crosby, M. Dimitropoulou, M. K. Georgoulis, S. Hergarten, J. McAteer, A. V. Milovanov, S. Mineshige, L. Morales, N. Nishizuka, et al., Space Sci. Rev. 198, 47 (2016), eprint 1403.6528.
* Zhang (2020) B. Zhang, Nature (London) 587, 45 (2020), eprint 2011.03500.
* Duncan and Thompson (1992) R. C. Duncan and C. Thompson, Astrophys. J. Lett. 392, L9 (1992).
* Kouveliotou et al. (1998) C. Kouveliotou, S. Dieters, T. Strohmayer, J. van Paradijs, G. J. Fishman, C. A. Meegan, K. Hurley, J. Kommers, I. Smith, D. Frail, et al., Nature (London) 393, 235 (1998).
* Kaspi and Beloborodov (2017) V. M. Kaspi and A. M. Beloborodov, Ann. Rev. Astron. Astrophys. 55, 261 (2017), eprint 1703.00068.
* Hurley et al. (1999) K. Hurley, T. Cline, E. Mazets, S. Barthelmy, P. Butterworth, F. Marshall, D. Palmer, R. Aptekar, S. Golenetskii, V. Il’Inskii, et al., Nature (London) 397, 41 (1999), eprint astro-ph/9811443.
* Palmer et al. (2005) D. M. Palmer, S. Barthelmy, N. Gehrels, R. M. Kippen, T. Cayton, C. Kouveliotou, D. Eichler, R. A. M. J. Wijers, P. M. Woods, J. Granot, et al., Nature (London) 434, 1107 (2005), eprint astro-ph/0503030.
* Thompson and Duncan (1995) C. Thompson and R. C. Duncan, Mon. Not. R. Astron. Soc. 275, 255 (1995).
* Lyutikov (2003) M. Lyutikov, Mon. Not. R. Astron. Soc. 346, 540 (2003), eprint astro-ph/0303384.
* Cheng et al. (1996) B. Cheng, R. I. Epstein, R. A. Guyer, and A. C. Young, Nature (London) 382, 518 (1996).
* Göǧüş et al. (1999) E. Göǧüş, P. M. Woods, C. Kouveliotou, J. van Paradijs, M. S. Briggs, R. C. Duncan, and C. Thompson, Astrophys. J. Lett. 526, L93 (1999), eprint astro-ph/9910062.
* Göǧüş et al. (2000) E. Göǧüş, P. M. Woods, C. Kouveliotou, J. van Paradijs, M. S. Briggs, R. C. Duncan, and C. Thompson, Astrophys. J. Lett. 532, L121 (2000), eprint astro-ph/0002181.
* Cheng et al. (2020) Y. Cheng, G. Q. Zhang, and F. Y. Wang, Mon. Not. R. Astron. Soc. 491, 1498 (2020), eprint 1910.14201.
* Aschwanden (2011) M. J. Aschwanden, _Self-Organized Criticality in Astrophysics_ (2011).
* Aschwanden (2012) M. J. Aschwanden, Astron. & Astrophys. 539, A2 (2012), eprint 1112.4859.
* Aschwanden (2015) M. J. Aschwanden, Astrophys. J. 814, 19 (2015), eprint 1510.01987.
* Wang and Dai (2013) F. Y. Wang and Z. G. Dai, Nature Physics 9, 465 (2013), eprint 1308.1253.
* Caruso et al. (2007) F. Caruso, A. Pluchino, V. Latora, S. Vinciguerra, and A. Rapisarda, Phys. Rev. E 75, 055101 (2007), eprint cond-mat/0606118.
* Wang et al. (2015) P. Wang, Z. Chang, H. Wang, and H. Lu, European Physical Journal B 88, 206 (2015).
* Olami et al. (1992) Z. Olami, H. J. S. Feder, and K. Christensen, Phys. Rev. Lett. 68, 1244 (1992).
* Chang et al. (2017) Z. Chang, H.-N. Lin, Y. Sang, and P. Wang, Chinese Physics C 41, 065104 (2017), eprint 1702.05842.
* Lorimer et al. (2007) D. R. Lorimer, M. Bailes, M. A. McLaughlin, D. J. Narkevic, and F. Crawford, Science 318, 777 (2007), eprint 0709.4301.
* Petroff et al. (2019) E. Petroff, J. W. T. Hessels, and D. R. Lorimer, Astron. Astrophys. Rev. 27, 4 (2019), eprint 1904.07947.
* Cordes and Chatterjee (2019) J. M. Cordes and S. Chatterjee, Ann. Rev. Astron. Astrophys. 57, 417 (2019), eprint 1906.05878.
* Spitler et al. (2016) L. G. Spitler, P. Scholz, J. W. T. Hessels, S. Bogdanov, A. Brazier, F. Camilo, S. Chatterjee, J. M. Cordes, F. Crawford, J. Deneva, et al., Nature (London) 531, 202 (2016), eprint 1603.00581.
* CHIME/FRB Collaboration et al. (2019) CHIME/FRB Collaboration, B. C. Andersen, K. Bandura, M. Bhardwaj, P. Boubel, M. M. Boyce, P. J. Boyle, C. Brar, T. Cassanelli, P. Chawla, et al., Astrophys. J. Lett. 885, L24 (2019), eprint 1908.03507.
* Platts et al. (2019) E. Platts, A. Weltman, A. Walters, S. P. Tendulkar, J. E. B. Gordin, and S. Kandhai, Physics Reports 821, 1 (2019), eprint 1810.05836.
* Xiao et al. (2021) D. Xiao, F. Wang, and Z. Dai, Science China Physics, Mechanics, and Astronomy 64, 249501 (2021), eprint 2101.04907.
* Popov and Postnov (2010) S. B. Popov and K. A. Postnov, in _Evolution of Cosmic Objects through their Physical Activity_ , edited by H. A. Harutyunian, A. M. Mickaelian, and Y. Terzian (2010), pp. 129–132, eprint 0710.2006.
* Katz (2016) J. I. Katz, Astrophys. J. 826, 226 (2016), eprint 1512.04503.
* Metzger et al. (2017) B. D. Metzger, E. Berger, and B. Margalit, Astrophys. J. 841, 14 (2017), eprint 1701.02370.
* Wang and Yu (2017) F. Y. Wang and H. Yu, JCAP 2017, 023 (2017), eprint 1604.08676.
* Beloborodov (2017) A. M. Beloborodov, Astrophys. J. Lett. 843, L26 (2017), eprint 1702.08644.
* Kumar et al. (2017) P. Kumar, W. Lu, and M. Bhattacharya, Mon. Not. R. Astron. Soc. 468, 2726 (2017), eprint 1703.06139.
* Yang and Zhang (2018) Y.-P. Yang and B. Zhang, Astrophys. J. 868, 31 (2018), eprint 1712.02702.
* Wang et al. (2020) F. Y. Wang, Y. Y. Wang, Y.-P. Yang, Y. W. Yu, Z. Y. Zuo, and Z. G. Dai, Astrophys. J. 891, 72 (2020), eprint 2002.03507.
* CHIME/FRB Collaboration et al. (2020) CHIME/FRB Collaboration, B. C. Andersen, K. M. Bandura, M. Bhardwaj, A. Bij, M. M. Boyce, P. J. Boyle, C. Brar, T. Cassanelli, P. Chawla, et al., Nature (London) 587, 54 (2020), eprint 2005.10324.
* Bochenek et al. (2020) C. D. Bochenek, V. Ravi, K. V. Belov, G. Hallinan, J. Kocz, S. R. Kulkarni, and D. L. McKenna, Nature (London) 587, 59 (2020), eprint 2005.10828.
* Li et al. (2021a) C. K. Li, L. Lin, S. L. Xiong, M. Y. Ge, X. B. Li, T. P. Li, F. J. Lu, S. N. Zhang, Y. L. Tuo, Y. Nang, et al., Nature Astronomy 5, 378 (2021a), eprint 2005.11071.
* Ridnaia et al. (2021) A. Ridnaia, D. Svinkin, D. Frederiks, A. Bykov, S. Popov, R. Aptekar, S. Golenetskii, A. Lysenko, A. Tsvetkova, M. Ulanov, et al., Nature Astronomy 5, 372 (2021), eprint 2005.11178.
* Tavani et al. (2021) M. Tavani, C. Casentini, A. Ursi, F. Verrecchia, A. Addis, L. A. Antonelli, A. Argan, G. Barbiellini, L. Baroncelli, G. Bernardi, et al., Nature Astronomy 5, 401 (2021), eprint 2005.12164.
* Zhang et al. (2018) Y. G. Zhang, V. Gajjar, G. Foster, A. Siemion, J. Cordes, C. Law, and Y. Wang, Astrophys. J. 866, 149 (2018), eprint 1809.03043.
* Lin and Sang (2020) H.-N. Lin and Y. Sang, Mon. Not. R. Astron. Soc. 491, 2156 (2020), eprint 1912.01191.
* Li et al. (2021b) D. Li, P. Wang, W. W. Zhu, B. Zhang, X. X. Zhang, R. Duan, Y. K. Zhang, Y. Feng, N. Y. Tang, S. Chatterjee, et al., arXiv e-prints arXiv:2107.08205 (2021b), eprint 2107.08205.
* Olausen and Kaspi (2014) S. A. Olausen and V. M. Kaspi, Astrophys. J. Suppl. Ser. 212, 6 (2014), eprint 1309.4167.
* Kırmızıbayrak et al. (2017) D. Kırmızıbayrak, S. Şaşmaz Muş, Y. Kaneko, and E. Göğüş, Astrophys. J. Suppl. Ser. 232, 17 (2017), eprint 1708.08067.
* Lin et al. (2020a) L. Lin, E. Göğüş, O. J. Roberts, C. Kouveliotou, Y. Kaneko, A. J. van der Horst, and G. Younes, Astrophys. J. 893, 156 (2020a), eprint 2003.10582.
* Lin et al. (2020b) L. Lin, E. Göğüş, O. J. Roberts, M. G. Baring, C. Kouveliotou, Y. Kaneko, A. J. van der Horst, and G. Younes, Astrophys. J. Lett. 902, L43 (2020b), eprint 2010.02767.
* Freedman and Diaconis (1981) D. Freedman and P. Diaconis, Probability Theory and Related Fields 57, 453 (1981).
* Tsallis (1988) C. Tsallis, Journal of Statistical Physics 52, 479 (1988).
* Tsallis et al. (1998) C. Tsallis, R. Mendes, and A. R. Plastino, Physica A Statistical Mechanics and its Applications 261, 534 (1998).
* Foreman-Mackey et al. (2013) D. Foreman-Mackey, D. W. Hogg, D. Lang, and J. Goodman, Pub. Astro. Soc. Pacific 125, 306 (2013), eprint 1202.3665.
* Nan et al. (2011) R. Nan, D. Li, C. Jin, Q. Wang, L. Zhu, W. Zhu, H. Zhang, Y. Yue, and L. Qian, International Journal of Modern Physics D 20, 989 (2011), eprint 1105.3794.
* Li et al. (2018) D. Li, P. Wang, L. Qian, M. Krco, P. Jiang, Y. Yue, C. Jin, Y. Zhu, Z. Pan, R. Nan, et al., IEEE Microwave Magazine 19, 112 (2018), eprint 1802.03709.
* Lyubarsky (2014) Y. Lyubarsky, Mon. Not. R. Astron. Soc. 442, L9 (2014), eprint 1401.6674.
* Metzger et al. (2019) B. D. Metzger, B. Margalit, and L. Sironi, Mon. Not. R. Astron. Soc. 485, 4091 (2019), eprint 1902.01866.
* Aschwanden (2014) M. J. Aschwanden, Astrophys. J. 782, 54 (2014), eprint 1310.4191.
* Celikoglu et al. (2010) A. Celikoglu, U. Tirnakli, and S. M. D. Queirós, Phys. Rev. E 82, 021124 (2010), eprint 1003.0361.
* Cordes and McLaughlin (2003) J. M. Cordes and M. A. McLaughlin, Astrophys. J. 596, 1142 (2003), eprint astro-ph/0304364.
| arxiv-papers | 2021-07-27T05:15:37 | 2024-09-04T03:07:20.630844 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Jun-Jie Wei, Xue-Feng Wu, Zi-Gao Dai, Fa-Yin Wang, Pei Wang, Di Li,\n Bing Zhang",
"submitter": "Jun-Jie Wei Dr.",
"url": "https://arxiv.org/abs/2107.12605"
} |
2107.12608 | # Variational theory for the resonant $T$-curvature equation
Cheikh Birahim NDIAYE
Department of Mathematics Howard University
Annex 3, Graduate School of Arts and Sciences, # 217
DC 20059 Washington, USA
11footnotetext: E-mail addresses: [email protected]
The author was partially supported by NSF grant DMS–2000164.
Abstract
We study the resonant prescribed $T$-curvature problem on a compact
$4$-dimensional Riemannian manifold with boundary. We derive sharp energy and
gradient estimates of the associated Euler-Lagrange functional to characterize
the critical points at infinity of the associated variational problem under a
non-degeneracy on a naturally associated Hamiltonian function. Using this, we
derive a Morse type lemma around the critical points at infinity. Using the
Morse lemma at infinity, we prove new existence results of Morse theoretical
type. Combining the Morse lemma at infinity and the Liouville version of the
Barycenter technique of Bahri-Coron[13] developed in [46], we prove new
existence results under a topological hypothesis on the boundary of the
underlying manifold, and the entry and exit sets at infinity.
Key Words: $T$-curvature, $Q$-curvature, Morse Theory, Critical points at
infinity, Barycenter Technique.
AMS subject classification: 53C21, 35C60, 58J60, 55N10.
## 1 Introduction and statement of the results
On a four-dimensional compact Riemannian manifolds with boundary
$(\overline{M},g)$, there exists a fourth-order operator $P_{g}$ called
Paneitz operator discovered by Paneitz[49] and an associated curvature
quantity $Q_{g}$ called $Q$-curvature introduced by Branson-Oersted[14]. The
Paneitz operator $P_{g}$ and the $Q$-curvature $Q_{g}$ are defined in terms of
the Ricci tensor $Ric_{g}$ and the scalar curvature $R_{g}$ of
$(\overline{M},g)$ by
$P^{4}_{g}=\Delta_{g}^{2}-div_{g}\left((\frac{2}{3}R_{g}g-2Ric_{g})\nabla_{g}\right);\;\;\;\;\;\;\;Q_{g}=-\frac{1}{12}(\Delta_{g}R_{g}-R_{g}^{2}+3|Ric_{g}|^{2}),$
where $div_{g}$ is the divergence and $\nabla_{g}$ is the covariant derivative
of with respect to $g$.
On the other hand, Chang-Qing[23] have discovered an operator $P^{3}_{g}$
which is associated to the boundary $\partial M$ of $\overline{M}$ and a
curvature quantity $T_{g}$ naturally associated to $P^{3}_{g}$. They are
defined by the formulas
$P^{3}_{g}=\frac{1}{2}\frac{\partial{\Delta_{g}}}{\partial
n_{g}}+\Delta_{\hat{g}}\frac{\partial}{\partial
n_{g}}-2H_{g}\Delta_{\hat{g}}+L_{g}(\nabla_{\hat{g}},\nabla_{\hat{g}})+\nabla_{\hat{g}}H_{g}.\nabla_{\hat{g}}+(F_{g}-\frac{R_{g}}{3})\frac{\partial}{\partial
n_{g}}.$ $T_{g}=-\frac{1}{12}\frac{\partial R_{g}}{\partial
n_{g}}+\frac{1}{2}R_{g}H_{g}-<G_{g},L_{g}>+3H_{g}^{3}-\frac{1}{3}tr_{g}(L_{g}^{3})-\Delta_{\hat{g}}H_{g},$
where $\hat{g}$ is the metric induced by $g$ on $\partial M$,
$\frac{\partial}{\partial n_{g}}$ is the inward Neuman operator on $\partial
M$ with respect to $g$, $L_{g}$ is the second fundamental form of $\partial M$
with respect to $g$, $H_{g}$ is the mean curvature of $\partial M$ with
respect to $g$, $R^{k}_{g,ijl}$ is the Riemann curvature tensor of
$(\overline{M},g)$, $R_{g,ijkl}=g_{mi}R^{m}_{g,jkl}$ ($g_{ij}$ are the entries
of the metric $g$), $F_{g}=R^{a}_{g,nan}$ (with $n$ denoting the index
corresponding to the normal direction in local coordinates) and
$<G_{g},L_{g}>=\hat{g}^{ac}\hat{g}^{bd}R_{g,anbn}L_{g,cd}$. Moreover, the
notation $L_{g}(\nabla_{\hat{g}},\nabla_{\hat{g}})$, means
$L_{g}(\nabla_{\hat{g}},\nabla_{\hat{g}})(u)=\nabla_{\hat{g}}^{a}(L_{g,ab}\nabla_{\hat{g}}^{b}u)$.
We point out that in all those notations above $i,j,k,l=1,\cdots 4$ and
$a,b,c,d=1,\cdots 3$, and Einstein summation convention is used for repeated
indices.
As the Laplace-Beltrami operator and the Neumann operator are conformally
covariant, we have that $P^{4}_{g}$ is conformally covariant of bidegree
$(0,4)$ and $P^{3}_{g}$ of bidegree $(0,3)$. Furthermore, as they govern the
transformation laws of the Gauss curvature and the geodesic curvature on
compact surfaces with boundary, the couple $(P^{4}_{g},P^{3}_{g})$ does the
same for $(Q_{g},T_{g})$ on a compact four-dimensional Riemannian manifold
with boundary $(\overline{M},g)$. In fact, under a conformal change of metric
$g_{u}=e^{2u}g$, we have
(1) $\left\\{\begin{split}P^{4}_{g_{u}}=e^{-4u}P^{4}_{g},\\\
P^{3}_{g_{u}}=e^{-3u}P^{3}_{g},\end{split}\right.\qquad\mbox{and}\qquad\left\\{\begin{split}P^{4}_{g}u+2Q_{g}=2Q_{g_{u}}e^{4u}\;\;\text{in
}\;\;M,\\\ P^{3}_{g}u+T_{g}=T_{g_{u}}e^{3u}\;\;\text{on}\;\;\partial
M.\end{split}\right.$
Apart from this analogy, we have also an extension of the Gauss-Bonnet
identity $\eqref{eq:gbc}$ which is known as the Gauss-Bonnet-Chern formula
(2) $\int_{M}(Q_{g}+\frac{|W_{g}|^{2}}{8})dV_{g}+\oint_{\partial
M}(T_{g}+Z_{g})dS_{g}=4\pi^{2}\chi(\overline{M})$
where $W_{g}$ denote the Weyl tensor of $(\overline{M},g)$ and $Z_{g}$ is
given by the following formula
$Z_{g}=R_{g}H_{g}-3H_{g}Ric_{g,nn}+\hat{g}^{ac}\hat{g}^{bd}R_{g,anbn}L_{g,cd}-\hat{g}^{ac}\hat{g}^{bd}R_{g,acbc}L_{g,cd}+6H_{g}^{3}-3H_{g}|L_{g}|^{2}+tr_{g}(L_{g}^{3}),$
with $tr_{g}$ denoting the trace with respect to the metric induced on
$\partial M$ by $g$ (namely $\hat{g}$) and $\chi(\overline{M})$ the Euler-
Poincaré characteristic of $\overline{M}$. Concerning the quantity $Z_{g}$, we
have that it vanishes when the boundary is totally geodesic and
$\oint_{\partial M}Z_{g}dV_{g}$ is always conformally invariant, see [23].
Thus, setting
(3)
$\kappa_{(P^{4},P^{3})}:=\kappa_{(P^{4},P^{3})}[g]:=\int_{M}Q_{g}dV_{g}+\oint_{\partial
M}T_{g}dS_{g}$
we have that thanks to $\eqref{eq:gbc}$, and to the fact that
$|W_{g}|^{2}dV_{g}$ is pointwise conformally invariant,
$\kappa_{(P^{4},P^{3})}$ is a conformal invariant (which justifies the
notation used above). We remark that $4\pi^{2}$ is the the total integral of
the $(Q,T)$-curvature of the standard four-dimensional Euclidean unit ball
$\mathbb{B}^{4}.$
As was asked in [2], a natural question is whether every compact four-
dimensional Riemannian manifold with boundary $(\overline{M},g)$ carries a
conformal metric $g_{u}$ for which the corresponding $Q$-curvature $Q_{g_{u}}$
is zero, the corresponding $T$-curvature $T_{g_{u}}$ is a prescribed function
and such that $(\overline{M},g_{u})$ has minimal boundary. Thanks to
$\eqref{eq:law}$, this problem is equivalent to finding a smooth solution to
the following BVP:
$\left\\{\begin{split}P^{4}_{g}u+2Q_{g}&=0\;\;&\text{in}\;\;M,\\\
P^{3}_{g}u+T_{g}&=Ke^{3u}\;\;&\text{on}\;\;\partial M,\\\ -\frac{\partial
u}{\partial n_{g}}+H_{g}u&=0\;\;&\text{on}\;\;\partial M.\end{split}\right.$
where $K:\partial M\longrightarrow\mathbb{R}_{+}$ is a positive smooth
function on $\partial M$.
Since we are interested to find a metric in the conformal class of $g$, then
we can assume that $H_{g}=0$, since this can be always obtained through a
conformal transformation of the background metric. Thus, we are lead to solve
the following BVP with Neumann homogeneous boundary condition:
(4) $\left\\{\begin{split}P^{4}_{g}u+2Q_{g}&=0\;\;&\text{in}\;\;M,\\\
P^{3}_{g}u+T_{g}&=Ke^{3u}\;\;&\text{on}\;\;\partial M,\\\ \frac{\partial
u}{\partial n_{g}}&=0\;\;&\text{on}\;\;\partial M.\end{split}\right.$
Defining $\mathcal{H}_{\frac{\partial}{\partial n}}$ as
$\mathcal{H}_{\frac{\partial}{\partial n}}=\Big{\\{}u\in
W^{2,2}(M):\;\;\;\frac{\partial u}{\partial
n_{g}}=0\;\;\;\text{on}\;\;\partial M\Big{\\}},$
where $W^{2,2}(M)$ denotes the space of functions on $M$ which are square
integrable together with their first and second derivatives, and
$\mathbb{P}^{4,3}_{g}(u,v)=\left<P^{4}u,u\right>_{L^{2}(M)}+2\left<P^{3}_{g}u,u\right>_{L^{2}(\partial
M)},\;\;\;\;u,v\in\mathcal{H}_{\frac{\partial}{\partial n}},$
we have integration by part implies
(5)
$\begin{split}\mathbb{P}^{4,3}_{g}(u,v)=\int_{M}\left(\Delta_{g}u\Delta_{g}v+\frac{2}{3}R_{g}\nabla_{g}u\cdot\nabla_{g}v\right)dV_{g}-2\int_{M}Ric_{g}(\nabla_{g}u,\nabla_{g}v)dV_{g}\\\
-2\oint_{\partial
M}L_{g}(\nabla_{\hat{g}}u,\nabla_{\hat{g}}v)dS_{g},\;\;\;u,v\in\mathcal{H}_{\frac{\partial}{\partial
n}}\end{split}$
and is clearly a bilinear form on $\mathcal{H}_{\frac{\partial}{\partial n}}$.
We set
(6) $\ker\mathbb{P}^{4,3}_{g}:=\\{u\in\mathcal{H}_{\frac{\partial}{\partial
n}}:\;\;\;\mathbb{P}^{4,3}_{g}(u,v)=0,\;\;\forall
v\in\mathcal{H}_{\frac{\partial}{\partial n}}\\}$
On the other hand, standard regularity theory implies that smooth solutions to
(4) can be found by looking at critical points of the geometric functional
$\begin{split}\mathcal{E}_{g}(u)=\mathbb{P}^{4,3}_{g}(u,u)+4\int_{M}Q_{g}udV_{g}+4\oint_{\partial
M}T_{g}udS_{g}-\frac{4}{3}\kappa_{(P^{4},P^{3})}\log\oint_{\partial
M}Ke^{3u}dS_{g},\;\;\;u\in\mathcal{H}_{\frac{\partial}{\partial
n}}.\end{split}$
As a Liouville type problem, the analytic features of equation (4) and of the
associated Euler-Lagrange functional $\mathcal{E}_{g}$ depend strongly on the
conformal invariant $\kappa_{(P^{4},P^{3})}$ . Indeed, depending on whether
$\kappa_{(P^{4},P^{3})}$ is a positive integer multiple of $4\pi^{2}$ or not,
the noncompactness of equation (4) and the way of finding critical points of
$\mathcal{E}_{g}$ changes drastically. As far as existence questions are
concerned, we have that problem (4) has been solved in a work of Chang-
Qing[24] under the assumption that
$\ker\;\mathbb{P}^{4,3}_{g}\simeq\mathbb{R}$ , $\mathbb{P}^{4,3}_{g}$ is non-
negative and $\kappa_{(P^{4},\;P^{3})}<4\pi^{2}$. In [44], we show existence
of solutions for (4) under the assumption
$\ker\mathbb{P}^{4,3}_{g}\simeq\mathbb{R}$ and $\kappa_{(P^{4},\;P^{3})}\notin
4\pi^{2}\mathbb{N}^{*}$.
As a Liouviile type problem, the assumption
$\ker\mathbb{P}^{4,3}_{g}\simeq\mathbb{R}$ and $\kappa_{(P^{4},P^{3})}\notin
4\pi^{2}\mathbb{N}^{*}$ will be referred to as nonresonant case. This
terminology is motivated by the fact that in that situation the set of
solutions to some perturbations of equation (7) (including it) is compact.
Naturally, we call resonant case when
$\ker\mathbb{P}^{4,3}_{g}\simeq\mathbb{R}$ and $\kappa_{(P^{4},\;P^{3})}\in
4\pi^{2}\mathbb{N}^{*}$. With these terminologies, we have that the works of
Chang-Qing[24] and our work in [44] answer affirmatively the question raised
above in the nonresonant case. However, for the resonant case, there are no
known existence results to the best of our knowledge.
In this work, beside existence results for (4), we are interested in a
complete variational theory for the boundary value problem (4) in the resonant
case, namely when $\ker\mathbb{P}^{4,3}_{g}\simeq\mathbb{R}$ and
$\kappa_{(P^{4},P^{3})}=4\pi^{2}k$ for some $k\in\mathbb{N}^{*}$. To present
the main results of the paper, we need to set first some notation and make
some definitions. We define the Hamiltonian function (at infinity)
$\mathcal{F}_{K}:(\partial M)^{k}\setminus F_{k}(\partial
M)\longrightarrow\mathbb{R}$ by
$\mathcal{F}_{K}((a_{1},\cdots,a_{k})):=\sum_{i=1}^{k}\left(H(a_{i},a_{i})+\sum_{j=1,\;j\neq
i}^{k}G(a_{i},\;a_{j})+\frac{2}{3}\log(K(a_{i}))\right)$
where where $F_{k}(\partial M)$ denotes the fat Diagonal of $(\partial
M)^{k}$, namely
$F_{k}(\partial M):=\\{A:=(a_{1},\cdots,a_{k})\in(\partial
M)^{k}:\;\;\text{there exists}\;\;i\neq j\;\,\text{with}\;\,a_{i}=a_{j}\\},$
$G$ is the Green’s function defined by (45) , and $H$ is its regular defined
as in (47). Furthermore, we define
(7) $Crit(\mathcal{F}_{K}):=\\{A\in(\partial M)^{k}\setminus F_{k}(\partial
M),\;\;A\;\;\;\text{critical point of}\;\;\mathcal{F}_{K}\\}.$
Moreover, for $A=(a_{1},\cdots,a_{k})\in(\partial M)^{k}\setminus
F_{k}(\partial M)$, and $i=1\cdots k$, we set
(8) $\mathcal{F}^{A}_{i}(x):=e^{3(H(a_{i},x)+\sum_{j+1,\;j\neq
i}^{k}G(a_{j},x))+\frac{1}{3}\log(K(x))},$
and define
(9)
$\mathcal{L}_{K}(A):=-\sum_{i=1}^{k}(\mathcal{F}^{A}_{i})^{\frac{1}{2}}L_{\hat{g}}((\mathcal{F}^{A}_{i})^{\frac{1}{6}})(a_{i}),$
where
$L_{\hat{g}}:=-\Delta_{\hat{g}}+\frac{1}{8}R_{\hat{g}}$
is the conformal Laplacian associated to $\hat{g}$. We also set
(10) $\mathcal{F}_{\infty}:=\\{A\in
Crit(\mathcal{F}_{K}):\>\;\mathcal{L}_{K}(A)<0\\},$ (11)
$i_{\infty}(A):=4k-1-Morse(A,\;\mathcal{F}_{K}),$
and define
(12) $m_{i}^{k}:=card\\{A\in
Crit(\mathcal{F}_{K}):\;i_{\infty}(A)=i\\},\;\;i=0,\cdots,4k-1,$
where $Morse(\mathcal{F}_{K},A)$ denotes the Morse index of $\mathcal{F}_{K}$
at $A$. We point out that for $k\geq 2$, $m_{i}^{k}=0$ for $0\leq i\leq k-2$.
For $k\geq 2$, we use the notation $B_{k-1}(\partial M)$ to denote the set of
formal barycenters of order $k-1$ of $\partial M$, namely
(13) $B_{k-1}(\partial
M):=\\{\sum_{i=1}^{k-1}\alpha_{i}\delta_{a_{i}},\;\;a_{i}\in\partial
M,\;\;\alpha_{i}\geq 0,i=1,\cdots,k-1,\;\,\sum_{i=1}^{k-1}\alpha_{i}=1\\}.$
Furthermore, we define
(14) $c^{k-1}_{p}=dim\;H_{p}(B_{k-1}(\partial M)),\;\;p=1,\cdots 4k-5,$
where $H_{p}(B_{k-1}(\partial M)$ denotes the $p$-th homology group of
$B_{k-1}(\partial M)$ with $\mathbb{Z}_{2}$ coefficients. Finally, we say
(15) $(ND)\;\;\;\text{holds if }\;\;\mathcal{F}_{K}\;\text{is a Morse function
and for every}\;\;A\in Crit(\mathcal{F}_{K}),\;\;\mathcal{L}_{K}(A)\neq 0.$
Now, we are ready to state our existence results of Morse theoretical type
starting with the critical case, namely when $k=1$.
###### Theorem 1.1.
Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with
boundary $\partial M$ and interior $M$ such that $H_{g}=0$,
$\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$ and
$\kappa_{(P^{4},\;P^{3})}=4\pi^{2}$. Assuming that $K$ is a smooth positive
function on $\partial M$ such that $(ND)$ holds and the system
(16) $\begin{cases}m^{1}_{0}=1+x_{0},\\\
m^{1}_{i}=x_{i}+x_{i-1},\;&i=1,\cdots,3,\\\ 0=x_{3}\\\ x_{i}\geq
0,\;\;&i=0,\cdots,3\end{cases}$
has no solutions, then $K$ is the $T$-curvature of a Riemannian metric on
$\overline{M}$ conformally related to $g$ with zero $Q$-curvature in $M$ and
zero mean curvature on $\partial M$.
The system (16) not having a solution traduces the violation of a strong Morse
type inequalities (SMTI) for the critical points at infinity of
$\mathcal{E}_{g}$. Since (SMTI) imply Poincare-Hopf type formulas, then we
have Theorem 1.1 implies the following Poincare-Hopf index type result.
###### Corollary 1.2.
Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with
boundary $\partial M$ and interior $M$ such that $H_{g}=0$,
$\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$ and
$\kappa_{(P^{4},\;P^{3})}=4\pi^{2}$. Assuming that $K$ is a smooth positive
function on $\partial M$ such that $(ND)$ holds and
(17) $\sum_{A\in\mathcal{F}_{\infty}}(-1)^{i_{\infty}(A)}\neq 1,$
then $K$ is the $T$-curvature of a Riemannian metric on $\overline{M}$
conformally related to $g$ with zero $Q$-curvature in $M$ and zero mean
curvature on $\partial M$
The formula (17) says that the Euler number of the space of variations is
different from the total contribution of the the true critical points at
infinity and is of global character. Localizing the arguments of Corollary 1.2
in the case of the presence of a jump in the Morse index of the critical
points of the Hamiltonian function $\mathcal{F}_{K}$, we have the following
extension of Corollary 1.2.
###### Theorem 1.3.
Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with
boundary $\partial M$ and interior $M$ such that $H_{g}=0$,
$\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$ and
$\kappa_{(P^{4},\;P^{3})}=4\pi^{2}$ and $K$ be a smooth positive function on
$\partial M$ satisfying the non degeneracy condition $(ND)$. Assuming that
there exists a positive integer $1\leq l\leq 3$ such that
$\begin{split}\sum_{A\in\mathcal{F}_{\infty},\;i_{\infty}(A)\leq
l-1}&(-1)^{i_{\infty}(A)}\neq 1\\\ &\text{and}\\\ \forall
A\in\mathcal{F}_{\infty},\;\;&\quad i_{\infty}(A)\neq l,\end{split}$
then $K$ is the $T$-curvature of a Riemannian metric on $\overline{M}$
conformally related to $g$ with zero $Q$-curvature in $M$ and zero mean
curvature on $\partial M$.
In the supercritical case, i.e $k\geq 2$, the Euler-Lagrange functional
$\mathcal{E}_{g}$ is not bounded from below, and taking into account the
topological contribution of very large negative sublevels of
$\mathcal{E}_{g}$, we have the following analogue of Theorem 1.1.
###### Theorem 1.4.
Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with
boundary $\partial M$ and interior $M$ such that $H_{g}=0$,
$\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$, and
$\kappa_{(P^{4},P^{3})}=4k\pi^{2}$ with $k\geq 2$. Assuming that $K$ is a
smooth positive function on $\partial M$ such that $(ND)$ holds and the
following system
(18) $\begin{cases}0=x_{0},\\\ m^{k}_{1}=x_{1},\\\
m_{i}^{k}=c^{k-1}_{i-1}+x_{i}+k_{i-1},\;&i=2,\cdots,4k-4,\\\
m_{i}^{k}=x_{i}+x_{i-1},\;&i=4k-3,\cdots,4k-1,\\\ 0=x_{4k-1},\\\ x_{i}\geq
0,\;\;&i=0,\cdots,4k-1,\end{cases}$
has no solutions, then $\;K$ is the $T$-curvature of a Riemannian metric on
$\overline{M}$ conformally related to $g$ with zero $Q$-curvature in $M$ and
zero mean curvature on $\partial M$.
###### Remark 1.5.
The presence of the number $c^{k-1}_{i-1}=dimH_{i-1}(B_{i-1}(\partial M))$ in
(18) account for the contribution of the topology of very negative sublevels
of $\mathcal{E}_{g}$. The relation between the topology of very negative
sublevels of the Euler-Lagrange functional of Liouville type problems and the
space of formal barycenters was first observed by Djadli-Malchiodi[29].
As in the critical case, we have that Theorem 1.4 implies the following
Poincaré-Hopf index type criterion for existence.
###### Corollary 1.6.
Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with
boundary $\partial M$ and interior $M$ such that $H_{g}=0$,
$\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$, and
$\kappa_{(P^{4},P^{3})}=4k\pi^{2}$ with $k\geq 2$. Assuming that $K$ is a
smooth positive function on $\partial M$ such that $(ND)$ holds and
(19)
$\sum_{A\in\mathcal{F}_{\infty}}(-1)^{i_{\infty}(A)}\neq\frac{1}{(k-1)!}\Pi_{i=1}^{k-1}(i-\chi(\partial
M)),$
then $K$ is the $T$-curvature of a Riemannian metric on $\overline{M}$
conformally related to $g$ with zero $Q$-curvature in $M$ and zero mean
curvature on $\partial M$.
As in the critical case, we have that a localization of the arguments of
Corollary 1.6 implies the following jumping index type result.
###### Theorem 1.7.
Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with
boundary $\partial M$ and interior $M$ such that $H_{g}=0$,
$\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$, $\kappa_{(P^{4},P^{3})}=4k\pi^{2}$
with $k\geq 2$, and let $K$ be a smooth positive function on $\partial M$
satisfying the non degeneracy condition (ND). Assuming that there exists a
positive integer $1\leq l\leq 4k-1$ and $A^{l}\in\mathcal{F}_{\infty}$ with
$i_{\infty}(A^{l})\leq l-1$ such that
$\begin{split}\sum_{A\in\mathcal{F}_{\infty},\;i_{\infty}(A)\leq
l-1}(-1)^{i_{\infty}(A)}&\neq\frac{1}{(k-1)!}\Pi_{j=1}^{k-1}(j-\chi(\partial
M))\\\ &\text{and}\\\ \forall A\in\mathcal{F}_{\infty},\;\;&\qquad
i_{\infty}(A)\neq l,\end{split}$
then $K$ is the $T$-curvature of a Riemannian metric on $\overline{M}$
conformally related to $g$ with zero $Q$-curvature in $M$ and zero mean
curvature on $\partial M$.
The Morse theoretical results stated above depend only the Morse Lemma at
infinity around true critical points at infinity (see Lemma 3.24) which
justify the condition $\mathcal{L}_{K}<0$ in the definition of
$\mathcal{F}_{\infty}$. However, our existence result of algebraic topological
type are based on the Morse lemma at infinity around all critical points at
infinity. Thus, to state our existence result of algebraic topological type,
we need first to introduce the neighborhood of potential critical points at
infinity of $\mathcal{E}_{g}$. In order to do that, we first fix $\nu$ to be a
positive and small real number, $\Lambda$ to be a large positive constant, and
$R$ to be a large positive constant too. Next, for $\epsilon$ small and
positive, and $\Theta\geq 0$, we denote by $V(k,\epsilon,\Theta)$ the
$(k,\epsilon,\Theta)$-neighborhood of potential critical points at infinity,
namely
(20)
$\begin{split}&V(k,\epsilon,\Theta):=\\{u\in\mathcal{H}_{\frac{\partial}{\partial
n}}:\exists\;a_{1},\cdots,a_{k}\in\partial
M,\alpha_{1},\cdots,\alpha_{k}>0,\;\;\lambda_{1},\cdots,\lambda_{k}>0,\beta_{1},\cdots,\beta_{\bar{k}}\in\mathbb{R},\\\
&\;\;||u-\overline{u}_{(Q,T)}-\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}-\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})||_{\mathbb{P}^{4,3}}<\epsilon,\;\;\sum_{i=1}^{k}\alpha_{i}=k\;\;\;\alpha_{i}\geq
1-\nu,\\\
&\;\lambda_{i}\geq\frac{1}{\epsilon},i=1,\cdots,k,\;\;\frac{2}{\Lambda}\leq\frac{\lambda_{i}}{\lambda_{j}}\leq\frac{\Lambda}{2},i,j=1,\cdots,k,\;|\beta_{r}|\leq\Theta,\;r=1,\cdots,\bar{k},\\\
&\;\;\text{and}\;\;\lambda_{i}d_{\hat{g}}(a_{i},a_{j})\geq
4\overline{C}R\;\;\text{for}\;i\neq j\\},\end{split}$
where $\overline{C}$ is as in (39), the $\varphi_{a_{i},\lambda_{i}}$’s are as
in (43), $\bar{k}$ is as in (29), the $v_{r}$’s are defined as in (30), the
$\overline{(v_{r})}_{(Q,t)}$’s are as in (27), and
$||\cdot||_{\mathbb{P}^{4,3}}$ is defined as in (33).
As observed by Chen-Lin [26] for Liouville type problems, the minimization at
infinity of Bahri-Coron [13] for Yamabe type problems has the following
analogue for our problem. For $\Theta\geq 0$, there exists
$\epsilon_{0}=\epsilon_{0}(\Theta)$ small and positive such that
$\forall\;0<\epsilon\leq\epsilon_{0}$, we have
(21) $\forall u\in V(k,\epsilon,\Theta),\text{the minimization problem }\\\
\min_{B_{\epsilon}^{\Theta}}||u-\overline{u}_{(Q,T)}-\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}-\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})||_{\mathbb{P}^{4,3}}$
has a unique solution, up to permutations, where $B_{\epsilon}^{\Theta}$ is
defined as follows
(22)
$\begin{split}B_{\epsilon}^{\Theta}:=&\\{(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in\mathbb{R}^{k}_{+}\times(\partial
M)^{k}\times\mathbb{R}_{+}^{k}\times\mathbb{R}^{\bar{k}}:\sum_{i=1}^{k}\alpha_{i}=k,\;\alpha_{i}\geq
1-\nu,\;\lambda_{i}\geq\frac{1}{\epsilon},i=1,\cdots,k,\\\
&\;|\beta_{r}|\leq\Theta,r=1,\cdots,\bar{k},\;\lambda_{i}d_{\hat{g}}(a_{i},a_{j})\geq
4\overline{C}R,i\neq j,i,j=1,\cdots,k\\}.\end{split}$
The selection map $s_{k}$ is defined by
$s_{k}:V(k,\epsilon,\Theta)\longrightarrow(\partial M)^{k}/\sigma_{k}$ as
follows
(23) $s_{k}(u):=A,\;\;u\in
V(k,\epsilon,\Theta),\;\,\text{and}\,\;A\;\;\text{is given
by}\;\,\eqref{eq:mini},$
We denote the critical points at infinity of $\mathcal{E}_{g}$ by $z^{\infty}$
and use the notation $M_{\infty}(z^{\infty})$ for their Morse indices at
infinity, $W_{u}(z^{\infty})$ for their unstable manifolds and
$W_{s}(z^{\infty})$ for their stable manifolds, where $z$ is the corresponding
critical point of $\mathcal{F}_{K}$. Furthermore, we denote by $x^{\infty}$
the ”true” ones, namely $\mathcal{L}_{K}(x)<0$ and the $y^{\infty}$ the
”false” ones, namely $\mathcal{L}_{K}(y)>0$. Moreover, we define $S$ to be the
following invariant set
(24) $S:=\cup_{M_{\infty}(z_{1}^{\infty}),\;M_{\infty}(z_{2}^{\infty})\geq
4k-4+\bar{k}}\;W_{u}(z_{1}^{\infty})\cap W_{s}(z_{2}^{\infty}).$
We also define $S^{\infty}$ to be the part of $S$ at infinity, namely
(25)
$S^{\infty}:=\cup_{M_{\infty}(z_{1}^{\infty}),\;M_{\infty}(z_{2}^{\infty})\geq
4k-4+\bar{k}}\;W_{u}^{\infty}(z_{1}^{\infty})\cap W_{s}(z_{2}^{\infty}),$
where $W_{u}^{–\infty}(z_{1}^{\infty})$ denotes the restriction of
$W_{u}(z_{1}^{\infty})$ at infinity. Furthermore, we denote by
$S^{\infty}_{-}$ the exit set from $S^{\infty}$ starting from a false critical
point at infinity $y^{\infty}$.
Similarly, we denote by $S^{\infty}_{+}$ the entry set to $S^{\infty}$ after
having exited $S^{\infty}$ through a set contained in $S^{\infty}_{-}$ and
entering into $S^{\infty}$ through a true critical point at infinity
$x^{\infty}$. Finally to state the result of algebraic topological type
resulting from the Liouville version of the Barycenter technique of Bahri-
Coron developed in [46], we need the existence of
(26) $0\neq O^{*}_{\partial M}\in H^{3}(\partial M).$
Indeed, we prove:
###### Theorem 1.8.
Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with
boundary $\partial M$ and interior $M$ such that $H_{g}=0$,
$\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$, and
$\kappa_{(P^{4},P^{3})}=4k\pi^{2}$ with $k\geq 2$. Assuming that $K$ is a
smooth positive function on $\partial M$ such that $(ND)$ holds and either
there is no $x^{\infty}$ with $M_{\infty}(x^{\infty})=4k-4+\bar{k}$ or
$s_{k}^{*}(O^{*}_{\partial M})\neq 0$ in $H^{3}(S^{\infty})$ and
$s_{k}^{*}(O^{*}_{M})=0$ in $H^{3}(S_{+}^{\infty}\cup S_{-}^{\infty})$, then
$K$ is the $T$-curvature of a Riemannian metric conformally related to $g$
with zero $Q$-curvature in $M$ and zero mean curvature on $\partial M$.
As in [46], Theorem 1.8 implies the following collorary.
###### Corollary 1.9.
Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with
boundary $\partial M$ and interior $M$ such that
$\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$ and
$\kappa_{(P^{4},P^{3})}=4k\pi^{2}$ with $k\geq 2$. Assuming that $K$ is a
smooth positive function on $\partial M$ such that $(ND)$ holds and that every
critical point $x$ of $\mathcal{F}_{K}$ of Morse index $0$ or $1$ satisfies
$\mathcal{L}_{K}(x)<0$, then $K$ is the $T$-curvature of a Riemannian metric
conformally related to $g$ with zero $Q$-curvature in $M$ and zero mean
curvature $\partial M$.
.
## 2 Notation and preliminaries
In the following, for a Riemmanian metric $\bar{g}$ on $\partial M$ and
$p\in\partial M$ , we will use the notation $B^{\bar{g}}_{p}(r)$ to denote the
geodesic ball with respect to $\bar{g}$ of radius $r$ and center $p$. We also
denote by $d_{\bar{g}}(x,y)$ the geodesic distance with respect to $\bar{g}$
between two points $x$ and $y$ of $\partial M$, $exp_{x}^{\bar{g}}$ the
exponential map with respect to $\bar{g}$ at $x\in\partial M$.
$inj_{\bar{g}}(\partial M)$ stands for the injectivity radius of $(\partial
M,\bar{g})$, $dV_{\bar{g}}$ denotes the Riemannian measure associated to the
metric $\bar{g}$. Furthermore, we recall that $\nabla_{\bar{g}}$,
$\Delta_{\bar{g}}$, $R_{\bar{g}}$ will denote respectively the covariant
derivative, the Laplace-Beltrami operator, the scalar curvature and Ricci
curvature with respect to $\bar{g}$. For simplicity, we will use the notation
$B_{p}(r)$ to denote $B^{g}_{p}(r)$, namely $B_{p}(r)=B^{\hat{g}}_{p}(r)$.
$(\partial M)^{2}$ stands for the cartesian product $\partial M\times\partial
M$, while $Diag(\partial M)$ is the diagonal of $(\partial M)^{2}$.
Similarly, for a Riemmanian metric $\tilde{g}$ on $\overline{M}$ , we will use
the notation $B^{\tilde{g},+}_{p}(r)$ to denote the half geodesic ball with
respect to $\tilde{g}$ of radius $r$ and center $p\in\partial M$. We also
denote by $d_{\tilde{g}}(x,y)$ the geodesic distance with respect to
$\tilde{g}$ between two points $x$ and $y$ of $\overline{M}$,
$exp_{x}^{\tilde{g}}$ the exponential map with respect to $\tilde{g}$ at
$x\in\partial M$. $inj_{\tilde{g}}(\overline{M})$ stands for the injectivity
radius of $(\overline{M},g)$, $dV_{\tilde{g}}$ denotes the Riemannian measure
associated to the metric $g$, and $dS_{\tilde{g}}$ the Riemannian measure
associated to $\hat{\tilde{g}}:=\tilde{g}|_{\partial M}$, namely
$dS_{\tilde{g}}=dV_{\hat{\tilde{g}}}$. Furthermore, we recall that
$\nabla_{\tilde{g}}$, $\Delta_{\tilde{g}}$, $R_{\tilde{g}}$ will denote
respectively the covariant derivative, the Laplace-Beltrami operator, the
scalar curvature and Ricci curvature with respect to $g$. For simplicity, we
will use the notation $B^{+}_{p}(r)$ to denote $B^{g,+}_{p}(r)$, namely
$B_{p}^{+}(r)=B^{g,+}_{p}(r)$, $p\in\partial M$
For $1\leq p\leq\infty$ and $k\in\mathbb{N}$, $\theta\in]0,1[$, $L^{p}(M)$,
$W^{k,p}(M)$, $C^{k}(\overline{M})$, and $C^{k,\theta}(\overline{M})$ stand
respectively for the standard Lebesgue space, Sobolev space, $k$-continuously
differentiable space and $k$-continuously differential space of Hölder
exponent $\beta$, all with respect $g$. Similarly, $1\leq p\leq\infty$ and
$k\in\mathbb{N}$, $\theta\in]0,1[$, $L^{p}(\partial M)$, $W^{k,p}(\partial
M)$, $C^{k}(\partial M)$, and $C^{k,\theta}(\partial M)$ stand respectively
for the standard Lebesgue space, Sobolev space, $k$-continuously
differentiable space and $k$-continuously differential space of Hölder
exponent $\beta$, all with respect $\hat{g}$.
Given a function $u\in L^{1}(M)\cap L^{1}(\partial M)$, $\bar{u}_{\partial M}$
and $\overline{u}_{(Q,T)}$ are defined by
$\bar{u}_{\partial M}=\frac{\oint_{\partial M}u(x)dS_{g}}{Vol_{g}(\partial
M)},$
with $Vol_{g}(\partial M)=\oint_{\partial M}dS_{g}$ and
(27)
$\overline{u}_{(Q,T)}=\frac{1}{4k\pi^{2}}\left(\int_{M}Q_{g}udV_{g}+\oint_{\partial
M}T_{g}udS_{g}\right).$
Given a generic Riemannian metric $\bar{g}$ on $\partial M$ and a function
$F(x,y)$ defined on a open subset of $(\partial M)^{2}$ which is symmetric and
with $F(\cdot,\cdot)\in C^{2}$ with respect to $\bar{g}$, we define
$\frac{\partial F(a,a)}{\partial a}:=\frac{\partial F(x,a)}{\partial
x}|_{x=a}=\frac{\partial F(a,y)}{\partial y}|_{y=a}=$, and
$\Delta_{\bar{g}}F(a_{1},a_{2}):=\Delta_{\bar{g},x}F(x,a_{2})|_{x=a_{1}}=\Delta_{\bar{g},y}F(a_{2},y)|_{y=a_{1}}.$
For $\epsilon>0$ and small, $\lambda\in\mathbb{R}_{+}$,
$\lambda\geq\frac{1}{\epsilon}$, and $a\in\partial M$,
$O_{\lambda,\epsilon}(1)$ stands for quantities bounded uniformly in
$\lambda$, and $\epsilon$, and $O_{a,\epsilon}(1)$ stands for quantities
bounded uniformly in $a$ and $\epsilon$. For $l\in\mathbb{N}^{*}$, $O_{l}(1)$
stands for quantities bounded uniformly in $l$ and $o_{l}(1)$ stands for
quantities which tends to $0$ as $l\rightarrow+\infty$. For $\epsilon$
positive and small, $a\in\partial M$ and $\lambda\in\mathbb{R}_{+}$ large,
$\lambda\geq\frac{1}{\epsilon}$, $O_{a,\lambda,\epsilon}(1)$ stands for
quantities bounded uniformly in $a$, $\lambda$, and $\epsilon$. For $\epsilon$
positive and small, $p\in\mathbb{N}^{*}$,
$\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{p})\in(\mathbb{R}_{+})^{p}$,
$\lambda_{i}\geq\frac{1}{\epsilon}$ for $i=1,\cdots,p$, and
$A:=(a_{1},\cdots,a_{p})\in M^{p}$ (where $(\mathbb{R}_{+})^{p}$ and
$(\partial M)^{p}$ denotes respectively the cartesian product of $p$ copies of
$\mathbb{R}_{+}$ and $\partial M$), $O_{A,\bar{\lambda},\epsilon}(1)$ stands
for quantities bounded uniformly in $A$, $\bar{\lambda}$, and $\epsilon$.
Similarly for $\epsilon$ positive and small, $p\in\mathbb{N}^{*}$,
$\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{p})\in(\mathbb{R}_{+})^{p}$,
$\lambda_{i}\geq\frac{1}{\epsilon}$ for $i=1,\cdots,p$,
$\bar{\alpha}:=(\alpha_{1},\cdots,\alpha_{p})\in\mathbb{R}^{p}$, $\alpha_{i}$
close to $1$ for $i=1,\cdots,p$, and $A:=(a_{1},\cdots,a_{p})\in(\partial
M)^{p}$ (where $\mathbb{R}^{p}$ denotes the cartesian product of $p$ copies of
$\mathbb{R}$, $O_{\bar{\alpha},A,\bar{\lambda},\epsilon}(1)$ will mean
quantities bounded from above and below independent of $\bar{\alpha}$, $A$,
$\bar{\lambda}$, and $\epsilon$. For $x\in\mathbb{R}$, we will use the
notation $O(x)$ to mean $|x|O(1)$ where $O(1)$ will be specified in all the
contexts where it is used. Large positive constants are usually denoted by $C$
and the value of $C$ is allowed to vary from formula to formula and also
within the same line. Similarly small positive constants are also denoted by
$c$ and their value may varies from formula to formula and also within the
same line.
We say $\mu\in\mathbb{R}$ is an eigenvalue of the $P_{g}^{4}$ to $P^{3}_{g}$
operator on $\mathcal{H}_{\frac{\partial}{\partial n}}$ if there exists $0\neq
v\in W^{2,2}(M)$ such that
(28) $\left\\{\begin{split}P^{4}_{g}v&=0\;\;&\text{in}\;\;M,\\\
P^{3}_{g}v&=\mu v\;\;&\text{on}\;\;\partial M,\\\ \frac{\partial v}{\partial
n_{g}}&=0\;\;&\text{on}\;\;\partial M.\end{split}\right.$
By abuse of notation, we call $v$ in (28) an eigenfunction associated to
$\mu$. We call $\bar{k}$ the number of negative eigenvalues (counted with
multiplicity) of the $P_{g}^{4}$ to $P^{3}_{g}$ operator on
$\mathcal{H}_{\frac{\partial}{\partial n}}$. We point out that $\bar{k}$ can
be zero, but it is always finite. If $\bar{k}\geq 1$, then we will denote by
$E_{-}\subset\mathcal{H}_{\frac{\partial}{\partial n}}$ the direct sum of the
eigenspaces corresponding to the negative eigenvalues of the $P_{g}^{4}$ to
$P^{3}_{g}$ operator on $\mathcal{H}_{\frac{\partial}{\partial n}}$ . The
dimension of $E_{-}$ is of course $\bar{k}$, i.e
(29) $\bar{k}=\dim E_{-}.$
On the other hand, we have the existence of a basis of eigenfunctions
$v_{1},\cdots,v_{\bar{k}}$ of $E_{-}$ satisfying
(30) $\left\\{\begin{split}P^{4}_{g}v_{r}&=0\;\;&\text{in}\;\;M,\\\
P^{3}_{g}v_{r}&=\mu_{r}v_{r}\;\;&\text{on}\;\;\partial M,\\\ \frac{\partial
v_{r}}{\partial n_{g}}&=0\;\;&\text{on}\;\;\partial M.\end{split}\right.$ (31)
$\mu_{1}\leq\mu_{2}\leq\cdots\leq\mu_{\bar{k}}<0<\mu_{\bar{k}+1}\leq\cdots,$
where $\mu_{r}$’s are the eigenvalues of the operator $P_{g}^{4}$ to
$P^{3}_{g}$ on $\mathcal{H}_{\frac{\partial}{\partial n}}$ counted with
multiplicity. We define $\mathbb{P}^{4,3}_{g,+}$ by
(32)
$\mathbb{P}^{4,3}_{g,+}(u,v)=\mathbb{P}^{4,3}_{g}(u,v)-2\sum_{r=1}^{\bar{k}}\mu_{r}\left(\oint_{\partial
M}uv_{r}dS_{g}\right)\left(\oint_{\partial M}vv_{r}dS_{g}\right).$
$\mathbb{P}^{4,3}_{g,+}$ is obtained by just reversing the sign of the
negative eigenvalue of $\mathbb{P}^{4,3}_{g}$. We set also
(33)
$||u||_{\mathbb{P}^{4,3}}:=\sqrt{\mathbb{P}^{4,3}_{g,+}(u,u)},\;\;\;\text{and}\;\;\;\left<u,v\right>_{\mathbb{P}^{4,3}}=P^{4,3}_{g,+}(u,v),$
where $\mathbb{P}^{4,3}_{g,+}$ is defined as in (32). We can choose
$v_{1},\cdots,v_{\bar{k}}$ so that they constitute a
$\left<\cdot,\cdot\right>_{\mathbb{P}^{4,3}}$-orthonormal basis fo $E_{-}$. We
denote by $\nabla^{\mathbb{P}^{4,3}}$ the gradient with respect to
$\left<\cdot,\cdot\right>_{\mathbb{P}^{4,3}}$.
For $t>0$, we define the following perturbed functional
(34)
$(\mathcal{E}_{g})_{t}(u):=\mathbb{P}^{4,3}(u,u)+4t\int_{M}Q_{g}udV_{g}+4t\oint_{\partial
M}T_{g}udS_{g}-\frac{4}{3}t\kappa_{(P^{4},P^{3})}\log\oint_{M}Ke^{3u}dS_{g},\;\;u\in\mathcal{H}_{\frac{\partial}{\partial
n}}.$
$\bar{B}^{\bar{k}}_{r}$ will stand for the closed ball of center $0$ and
radius $r$ in $\mathbb{R}^{\bar{k}}$. $\mathbb{S}^{\bar{k}-1}$ will denote the
boundary of $\bar{B}^{\bar{k}}_{1}$. Given a set $X$, we define
$\widetilde{X\times\bar{B}^{\bar{k}}_{1}}$ to be the cartesian product
$X\times\bar{B}^{\bar{k}}_{1}$ where the tilde means that $X\times\partial
B^{\bar{k}}_{1}$ is identified with $\partial B_{1}^{\bar{k}}$.
In the sequel also, $(\mathcal{E}_{g})^{c}$ with $c\in\mathbb{R}$ will stand
for $(\mathcal{E}_{g})^{c}:=\\{u\in\mathcal{H}_{\frac{\partial}{\partial
n}}:\;\;\mathcal{E}_{g}(u)\leq c\\}$. For $X$ a topological space, $H_{*}(X)$
will denote the singular homology of $X$, $H^{*}(X)$ for the cohomology, and
$\chi(X)$ the Euler characteristic of $X$, all with $\mathbb{Z}_{2}$
coefficients.
As above, in the general case, namely $\bar{k}\geq 0$, for $\epsilon$ small
and positive,
$\bar{\beta}:=(\beta_{1},\cdots,\beta_{\bar{k}})\in\mathbb{R}^{\bar{k}}$ with
$\beta_{i}$ close to $0$, $i=1,\cdots,\bar{k}$) (where $\mathbb{R}^{\bar{k}}$
is the empty set when $\bar{k}=0$),
$\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{p})\in(\mathbb{R}_{+})^{p}$,
$\lambda_{i}\geq\frac{1}{\epsilon}$ for $i=1,\cdots,p$,
$\bar{\alpha}:=(\alpha_{1},\cdots,\alpha_{p})\in\mathbb{R}^{p}$, $\alpha_{i}$
close to $1$ for $i=1,\cdots,p$, and $A:=(a_{1},\cdots,a_{p})\in(\partial
M)^{p}$, $p\in\mathbb{N}^{*}$, $w\in\mathcal{H}_{\frac{\partial}{\partial n}}$
with $||w||_{\mathbb{P}^{4,3}}$ small,
$O_{\bar{\alpha},A,\bar{\lambda},\bar{\beta},\epsilon}(1)$ will stand
quantities bounded independent of $\bar{\alpha}$, $A$, $\bar{\lambda}$,
$\bar{\beta}$, and $\epsilon$, and
$O_{\bar{\alpha},A,\bar{\lambda},\bar{\beta},w,\epsilon}(1)$ will stand
quantities bounded independent of $\bar{\alpha}$, $A$, $\bar{\lambda}$,
$\bar{\beta}$, $w$ and $\epsilon$.
For point $b\in\mathbb{R}^{3}$ and $\lambda$ a positive real number, we define
$\delta_{b,\lambda}$ by
(35)
$\delta_{b,\lambda}(y):=\log\left(\frac{2\lambda}{1+\lambda^{2}|y-b|^{2}}\right),\;\;\;\;\;\;y\in\mathbb{R}^{3}.$
The functions $\delta_{b,\lambda}$ verify the following equation
(36)
$(-\Delta_{\mathbb{R}^{3}})^{\frac{3}{2}}\delta_{b,\lambda}=2e^{3\delta_{b,\lambda}}\;\;\;\text{in}\;\;\;\mathbb{R}^{3}.$
Using the existence of conformal Fermi coordinates, we have that, for
$a\in\partial M$ there exists a function $u_{a}\in C^{\infty}(\overline{M})$
such that
(37)
$g_{a}=e^{2u_{a}}g\;\;\text{verifies}\;\;detg_{a}(x)=1+O(d_{g_{a}}(x,a)^{m})\;\;\text{for}\;\;\;x\in
B^{g_{a},+}_{a}(\varrho_{a}).$
with $0<\varrho_{a}<\frac{inj_{g_{a}}(\overline{M})}{10}$. Moreover, we can
take the families of functions $u_{a}$, $g_{a}$ and $\varrho_{a}$ such that
(38) $\text{the maps}\;\;\;a\longrightarrow
u_{a},\;g_{a}\;\;\text{are}\;\;C^{1}\;\;\;\text{and}\;\;\;\;\varrho_{a}\geq\varrho_{0}>0,$
for some small positive $\varrho_{0}$ satisfying
$\varrho_{0}<\inf\\{\frac{inj_{g}(M)}{10},\frac{inj_{\hat{g}}(\partial
M)}{10}\\}$, and
(39)
$\begin{split}&||u_{a}||_{C^{4}(\overline{M})}=O_{a}(1),\;\;\frac{1}{\overline{C}^{2}}g\leq
g_{a}\leq\overline{C}^{2}g,\\\
\;&u_{a}(x)=O_{a}(d^{2}_{\hat{g}_{a}}(a,x))=O_{a}(d_{\hat{g}}^{2}(a,x))\;\;\text{for}\;\;x\in\;\;B_{a}^{\hat{g}_{a}}(\varrho_{0})\supset
B_{a}(\frac{\varrho_{0}}{2\overline{C}}),\;\;\text{and}\\\
&u_{a}(a)=0,\;\;\;R_{\hat{g}_{a}}(a)=0,\;\;\;\frac{\partial u_{a}}{\partial
n_{g}}(a)=0,\end{split}$
for some large positive constant $\overline{C}$ independent of $a$. For
$a\in\partial M$, and $r>0$, we set
(40)
$exp_{a}^{a}:=exp_{a}^{\hat{g}_{a}}\;\;\;\;\text{and}\;\;\;B_{a}^{a}(r):=B_{a}^{\hat{g}_{a}}(r).$
Now, for $0<\varrho<\min\\{\frac{inj_{g}(\partial
M)}{4},\frac{\varrho_{0}}{4}\\}$ where $\varrho_{0}$ is as in (38), we define
a smooth cut-off function satisfying the following properties:
(41) $\begin{cases}\chi_{\varrho}(t)=t\;\;&\text{ for }\;\;t\in[0,\varrho],\\\
\chi_{\varrho}(t)=2\varrho\;\;&\text{ for }\;\;t\geq 2\varrho,\\\
\chi_{\varrho}(t)\in[\varrho,2\varrho]\;\;\;&\text{ for
}\;\;t\in[\varrho,2\varrho].\end{cases}$
Using the cut-off function $\chi_{\varrho}$, we define for $a\in\partial M$
and $\lambda\in\mathbb{R}_{+}$ the function $\hat{\delta}_{a,\lambda}$ as
follows
(42)
$\hat{\delta}_{a,\lambda}(x):=\log\left(\frac{2\lambda}{1+\lambda^{2}\chi_{\varrho}^{2}(d_{\hat{g}_{a}}(x,a))}\right).$
For every $a\in\partial M$ and $\lambda\in\mathbb{R}_{+}$, we define
$\varphi_{a,\lambda}$ to be the unique the solution of
(43)
$\begin{cases}P^{4}_{g}\varphi_{a,\lambda}+\frac{2}{k}Q_{g}=0\;\;\;\text{in}\;\;\;M,\\\
P_{g}^{3}\varphi_{a,\lambda}\,+\,\frac{1}{k}T_{g}\,=4\pi^{2}\,\frac{e^{3(\hat{\delta}_{a,\lambda}\,+\,u_{a})}}{\oint_{M}e^{3(\hat{\delta}_{a,\lambda}\,+\,u_{a})}dS_{g}}\;\;\mbox{
in }\;\;\partial M,\\\ \frac{\partial\varphi_{a,\lambda}}{n}=0,\\\
(\phi_{a,\lambda})_{(Q,T)}=0.\end{cases}$
Next, let $S(a,x)$ ; $(a,x)\in\partial M\times\overline{M}$ be defined by
(44)
$\begin{cases}P_{g}^{4}S(a,\cdot)+\frac{2}{k}Q_{g}(\cdot)=0\;\;\text{in}\;\;M,\\\
P^{3}_{g}S(a,\cdot)+\frac{1}{k}T_{g}(\cdot)=4\pi^{2}\delta_{a}(\cdot),\;\;\text{on}\;\;\partial
M,\\\ \frac{\partial S(a,\cdot)}{\partial n}=0\;\;\;\text{on}\;\;\partial
M,\\\ \int_{M}S(a,x)Q_{g}(x)dV_{g}(x)=0.\end{cases}$
Then
(45) $G(a,\cdot)=S(a,\cdot)|_{\partial M}.$
is a Green’s function of the $P^{4}_{g}+\frac{2}{k}Q_{g}(\cdot)$ to
$P^{3}_{g}+\frac{1}{k}T_{g}(\cdot)$ operator on
$\mathcal{H}_{\frac{\partial}{\partial n}}$. Thus, we have the integral
representation: $\forall u\in\mathcal{H}_{\frac{\partial}{\partial n}}$ such
that $P^{4}_{g}u+\frac{2}{k}Q_{g}=0$,
(46) $u(x)-\overline{u}_{(Q,T)}=\frac{1}{4\pi^{2}}\oint_{\partial
M}G(x,y)P_{g}^{3}u(y),\;\;\;x\in\partial M.$
Moreover, $G$ decomposes as follows
(47)
$G(a,x)=\log\left(\frac{1}{\chi_{\varrho}^{2}(d_{{\hat{g}}_{a}}(a,x))}\right)+H(a,x),$
where $H$ is the regular par of $G$. Furthermore, we have
(48) $G\in C^{\infty}((\partial M)^{2}-Diag(\partial
M)),\;\;\;\;\text{and}\;\;\;H\in C^{3,\beta}((\partial
M)^{2})\;\;\;\forall\beta\in(0,1).$
B symmetry of $H$, we have
(49) $\frac{\partial\mathcal{F}(a_{1},\cdots,a_{k})}{\partial
a_{i}}=\frac{2}{3}\frac{\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})}{\mathcal{F}^{A}_{i}(a_{i})},\;\;\;i=1,\cdots,k.$
Next, setting
(50)
$l_{K}(A):=\sum_{i=1}^{k}\left(\frac{\Delta_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})}{(\mathcal{F}^{A}_{i}(a_{i}))^{\frac{1}{3}}}-\frac{3}{4}R_{\hat{g}}(a_{i})(\mathcal{F}^{A}_{i}(a_{i}))^{\frac{2}{3}}\right),$
we have
(51) $l_{K}(A)=6\mathcal{L}_{K}(A),\;\;\forall A\in Crit(\mathcal{F}_{K}).$
For $k\geq 2$, we denote by $B_{k}(\partial M)$ the set of formal barycenters
of $\partial M$ of order $k$, namely
(52) $B_{k}(\partial
M):=\\{\sum_{i=1}^{k}\alpha_{i}\delta_{a_{i}},a_{i}\in\partial
M,\alpha_{i}\geq 0,i=1,\cdots,k,\;\,\sum_{i=1}^{k}\alpha_{i}=k\\},$
Finally, we set
(53) $A_{k,\bar{k}}:=\widetilde{B_{k}(\partial
M)\times\bar{B}^{\bar{k}}_{1}},$
and
(54) $A_{k-1,\bar{k}}:=\widetilde{B_{k-1}(\partial
M)\times\bar{B}^{\bar{k}}_{1}}.$
## 3 Blow-up analysis and critical points at infinity
This section deals with the blowup analysis of sequences of vanishing
viscosity solutions of the type
(55)
$\left\\{\begin{split}P^{4}_{g}u_{l}+2t_{l}Q_{g}&=0\;\;&\text{in}\;\;M,\\\
P^{3}_{g}u_{l}+t_{l}T_{g}&=t_{l}Ke^{3u}\;\;&\text{on}\;\;\partial M,\\\
\frac{\partial u_{l}}{\partial n_{g}}&=0\;\;&\text{on}\;\;\partial
M.\end{split}\right.$
with $t_{l}\rightarrow 1$ under the assumption
$\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$ and
$\kappa_{(P^{4},P^{3})}=4k\pi^{2}$ with $k\geq 1$ and their use to
characterize the critical points at infinity of $\mathcal{E}_{g}$.
### 3.1 Blow-up analysis
The local behaviour of blowing up sequences of solutions of (55) is
understood. In fact, in [44], we prove the following lemma.
###### Lemma 3.1.
Assuming that $(u_{l})$ is a blowing up sequence of solutions to (55), then up
to a subsequence, there exists $k$ converging sequence of points
$(x_{i,l})_{l\in\mathbb{N}},x_{i,l}\in\partial M$ with limits
$x_{i}\in\partial M$, $i=1,\cdots,k$, $k$ sequences
$(\mu_{i,l})_{l\in\mathbb{N}}\;\;i=1,\cdots,k$ of positive real numbers
converging to $0$ such that the following hold:
a)
$\frac{d_{\hat{g}}(x_{i,l},x_{j,l})}{\mu_{i,l}}\longrightarrow+\infty\;\;\;\;i\neq
j\;\;i,j=1,\cdots,k\;\;\;\;\;and\;\;\;\;t_{l}K(x_{i,l})\mu_{i.l}^{3}e^{3u_{l}(x_{i,l})}e^{-3\log
2}=2.$
b)
$v_{i,l}(x)=u_{l}(exp^{g}_{x_{i,l}}(\mu_{i,l}x))-u_{l}(x_{i,l})+\log
2\longrightarrow V_{0}(x)\;\;\;\;in\;\;\;C^{4}_{loc}(\mathbb{R}^{4}_{+}),$
$V_{0}|_{\mathbb{R}^{3}}(x):=\log\left(\frac{2}{1+|x|^{2}}\right).$
c)
$\text{There exists}\;\;C>0\;\;\text{such
that}\;\;\inf_{i=1,\cdots,k}d_{\hat{g}}(x_{i,l},x)^{3}e^{3u_{l}(x)}\leq
C\;\;\;\;\forall x\in\partial M,\;\;\forall l\in\mathbb{N}.$
d)
$\begin{split}t_{l}Ke^{3u_{l}}dS_{g}\rightarrow
4\pi^{2}\sum_{i=1}^{k}\delta_{x_{i}}\;\;\;\text{in the sense of
measure},\;\;\;\text{and}\\\ \lim_{l\rightarrow+\infty}\oint_{\partial
M}t_{l}Ke^{3u_{l}}dS_{g}=4\pi^{2}k.\end{split}$
e)
$u_{l}-\overline{(u_{l})}_{Q,T}\rightarrow\sum_{i=1}^{k}G(x_{i},\cdot)\;\;\;\text{in}\;\;\;C^{3}_{loc}(\partial
M-\\{x_{1},\cdots,x_{k}\\}),\;\;\;\;\overline{(u_{l})}_{Q,T}\rightarrow-\infty.$
As a Liouville type problem, the following Harnack type inequality is
sufficient to get the global description of blowing up sequences of solutions
needed to describe the critical points at infinity of $\mathcal{E}_{g}$.
###### Proposition 3.2.
Assuming that $u_{l}$ is a blowing up sequence of solutions to (55), then
Lemma 3.1 holds, and keeping the notations in Lemma 3.1, we have that the
points $x_{i,l}$ are uniformly isolated, namely there exists
$0<\eta_{k}<\frac{\varrho_{0}}{10}$ (where $\varrho_{0}$ is as in (38)) such
that for $l$ large eneough, there holds
(56) $d_{\hat{g}}(x_{i,l},x_{j,l})\geq 4\overline{C}\eta_{k},\;\;\;\forall
i\neq j=1,\cdots,k.$
Moreover, the scaling parameters $\lambda_{i,l}:=\mu_{i,l}^{-1}$ are
comparable, namely there exists a large positive constant $\Lambda_{0}$ such
that
(57)
$\Lambda_{0}^{-1}\lambda_{j,l}\leq\lambda_{i,l}\leq\Lambda_{0}\lambda_{j,l},\;\;\forall\;i,j$
Furthermore, we have that the following estimate around the blow up points
holds
(58)
$u_{l}(y)+\frac{1}{3}\log\frac{t_{t}K_{l}(x_{i,l})}{2}=\log\frac{2\lambda_{i,l}}{1+\lambda_{i,l}^{2}(d_{\hat{g}_{x_{i,l}}}(y,x_{i,l}))^{2}}+O(d_{\hat{g}}(y,x_{i,l})),\;\;\;\;\forall\;y\in\;B^{\hat{g}}_{x_{i,l}}(\eta).$
To prove Proposition 3.2, as it is standard for Louiville type problems, one
starts with the uniform isolation of blowing-up points. Indeed, we have
###### Lemma 3.3.
Assuming that $(u_{l})_{l\in\mathbb{N}}$ is a bubbling sequence of solutions
to BVP (55), then keeping the notations in Lemma 3.1, we have that the points
$x_{i,l}$ are uniformly isolated, namely there exists
$0<\eta_{k}<\frac{\varrho_{0}}{10}$ (where $\varrho_{0}$ is as in (38)) such
that for $l$ large eneough, there holds
(59) $d_{\hat{g}}(x_{i,l},x_{j,l})\geq 4\overline{C}\eta_{k},\;\;\;\forall
i\neq j=1,\cdots,k.$
Proof. The proof use the integral method of Step 4 in [42] and hence we will
be skectchy in many arguments. As in [42], we first fix
$\frac{1}{3}<\nu<\frac{2}{3}$, and for $i=1,\cdots,k$, we set
$\bar{u}_{i,l}(r)=Vol_{\hat{g}}(\partial B_{x_{i}}(r))^{-1}\int_{\partial
B_{x_{i}}(r)}u_{l}(x)d\sigma_{\hat{g}}(x),\;\;\;\forall\;0\leq
r<inj_{\hat{g}}(\partial M),$
and
$\psi_{i,l}(r)=r^{4\nu}exp(4\bar{u}_{i,l}(r)),\;\;\;\forall\;0\leq
r<inj_{g}(\partial M).$
Furthermore, as in [42], we define $r_{i,l}$ as follows
(60) $r_{i,l}:=\sup\\{R_{\nu}\mu_{i,l}\leq
r\leq\frac{R_{i,l}}{2}\;\;\text{such
that}\;\;\psi_{i,l}^{{}^{\prime}}(r)<0\;\;\text{in}\;[R_{\nu}\mu_{i,l},r[\\};$
where $R_{i,l}:=\min_{j\neq i}d_{\hat{g}}(x_{i,l},x_{j,l})$. Thus, by
continuity and the definition of $r_{i,l}$, we have that
(61) $\psi_{i,l}^{{}^{\prime}}(r_{i,l})=0$
Now, as in [42], to prove (59), it suffices to show that $r_{i,l}$ is bounded
below by a positive constant in dependent of $l$. Thus, we assume by
contradiction that (up to a subsequence) $r_{i,l}\rightarrow 0$ as
$l\rightarrow+\infty$ and look for a contradiction. In order to do that, we
use the integral representation formula (46) and argue as in Step 4 of [42] to
derive the following estimate
$\psi^{{}^{\prime}}_{i,l}(r_{i,l})\leq(r_{i,l})^{3\nu-1}exp(\bar{u}_{i,l}(r_{i,l}))\left(3\nu-2C+o_{l}(1)+O_{l}(r_{i,l})\right).$
with $C>1$. So from $\frac{1}{3}<\nu<\frac{2}{3}$, $C>1$ and
$r_{i,l}\longrightarrow 0$ as $l\rightarrow+\infty$, we deduce that for $l$
large enough, there holds
(62) $\psi_{i,l}^{{}^{\prime}}(r_{i,l})<0.$
Thus, (61) and (62) lead to a contradiction, thereby concluding the proof of
(59). Hence, the proof of the Lemma is complete.
The next step to derive Proposition 3.2 is to establish its weak $O(1)$
-version.
###### Lemma 3.4.
Assuming that $(u_{l})_{l\in\mathbb{N}}$ is a bubbling sequence of solutions
to BVP (55), then keeping the notations in Lemma 3.1 and Lemma 3.3, we have
that for $l$ large enough, there holds
(63)
$u_{l}(x)+\frac{1}{3}\log\frac{t_{l}K(x_{i})}{2}=\log\frac{2\lambda_{i,l}}{1+\lambda_{i,l}^{2}(d_{\hat{g}_{x_{i}}}(x,x_{i}))^{2}}+O(1),\;\;\;\;\forall\;x\in\;B^{x_{i}}_{x_{i}}(\eta_{k}),$
up to choosing $\eta_{k}$ smaller than in Lemma 3.3.
###### Remark 3.5.
We point out that the comparability of the scaling parameters
$\lambda_{i,l}$’s follows directly from Lemma 3.4.
Proof. We are going to use the method of [47], hence we will be sketchy in
many arguments. Like in [47], thanks to Lemma 3.3, we will focus only on one
blow-up point and called it $x\in\partial M$. Thus, we are in the situation
where there exists a sequence $x_{l}\in\partial M$ such that $x_{l}\rightarrow
x$ with $x_{l}$ local maximum point for $u_{l}$ on $\partial M$ and
$u_{l}(x_{l})\rightarrow+\infty$. Now, we recall $g_{x}=e^{2u_{x}}g$ and
choose $\eta_{1}$ such that $20\eta_{1}<\min\\{inj_{g}(\partial
M),\varrho_{0},\varrho_{k},d\\}$ with $4d\leq r_{i,l}$ where $r_{i,l}$ is as
in the proof of Lemma 3.3. Next, we let $\hat{w}_{x}$ be the unique solution
of the following boundary value problem
(64)
$\left\\{\begin{split}P^{4}_{g_{x}}\hat{w}_{x}&=P^{4}_{\hat{g}}u_{x}\;\;&\text{in}\;\;M,\\\
P^{3}_{g_{x}}\hat{w}_{x}&=P^{3}_{\hat{g}}u_{x}\;\;&\text{on}\;\;\partial M,\\\
\frac{\partial\hat{w}_{x}}{\partial n_{g_{x}}}&=0\;\;&\text{on}\;\;\partial
M,\\\ \overline{\hat{w}}_{(Q,T)}&=0.\end{split}\right.$
Using standard elliptic regularity theory and (39), we derive
(65)
$\hat{w}(y)=O(d_{g}(y,x))\;\;\;\text{in}\;\;\;\;B_{x}^{g_{x},+}(2\eta_{1}).$
On the other hand, using the conformal covariance properties of the Paneitz
operator and of the Chang-Qing one, see (1), we have that
$\hat{u}_{l}:=u_{l}-\hat{w}_{x}$ satisfies
$\left\\{\begin{split}P^{4}_{g_{x}}\hat{u}_{l}+2\hat{Q}_{l}&=0\;\;&\text{in}\;\;M,\\\
P^{3}_{g_{x}}\hat{u}_{l}+\hat{T}_{l}&=t_{l}Ke^{3\hat{u}_{l}}\;\;&\text{on}\;\;\partial
M,\\\ \frac{\partial\hat{u}_{l}}{\partial
n_{g_{x}}}&=0\;\;&\text{on}\;\;\partial M.\end{split}\right.$
with
$\hat{Q}_{l}=t_{l}e^{-4\hat{w}}Q_{g}+\frac{1}{2}P^{4}_{\hat{g}}\hat{w}\;\;\;\text{and}\;\;\;\hat{T}_{l}=t_{l}e^{-3\hat{w}}T_{g}+P^{3}_{\hat{g}}\hat{w}.$
Next, as in [47], we are going to establish the classical sup+inf-estimate for
$\hat{u}_{l}$ , since thanks (65) all terms coming from $\hat{w}_{x}$ can be
absorbed on the right hand side of (63). Now, we are going to rescale the
functions $\hat{u}_{l}$ around the points $x$. In order to do that, we define
$\varphi_{l}:B^{\mathbb{R}^{3}}_{0}(2\eta_{1}\mu_{l}^{-1})\longrightarrow
B^{\hat{g}_{x}}_{x}(2\eta_{1})$ by the formula $\varphi_{l}(z):=\mu_{l}z$ and
$\mu_{l}$ is the corresponding scaling parameter given by Lemma 3.1.
Furthermore, as in [47], we define the following rescaling of $\hat{u}_{l}$
$v_{l}:=\hat{u_{l}}\circ\varphi_{l}+\log\mu_{l}+\frac{1}{3}\log\frac{t_{l}K(x)}{2}.$
Using the Green’s representation formula for and the method of the method of
[47], we get
(66)
$v_{l}(z)+2\log|z|=O(1),\;\;\text{for}\;\;z\in\bar{B}^{\mathbb{R}^{3}}_{0}(\frac{\eta_{1}}{\mu_{l}})-B^{\mathbb{R}^{3}}_{0}(-\log\mu_{l}).$
Now, we are going to show that the estimate (66) holds also in
$\bar{B}^{\mathbb{R}^{3}}_{0}(-\log\mu_{l})$. To do so, we use Lemma 3.1and
the same arguments as in [47] to deduce
(67)
$v_{l}(z)+2\log|z|=O(1),\;\;\text{for}\;\;\;z\in\bar{B}^{\mathbb{R}^{3}}_{0}(-\log\mu_{l}).$
Now, combining (66) and (67), we obtain
(68)
$v_{l}(z)+2\log|z|=O(1),\;\;\text{for}\;\;\;z\in\bar{B}^{\mathbb{R}^{3}}_{0}(\frac{\eta_{1}}{\mu_{l}}).$
Thus scaling back, namely using $y=\mu_{l}z$ and the definition of $v_{l}$, we
obtain the desired $O(1)$-estimate. Hence the proof of the Lemma is complete.
Proof of formula (58) of Proposition 3.2
We are going to use the method of [47], hence we will be sketchy in many
arguments. Now, let $V_{0}$ be the unique solution of the following
conformally invariant integral equation
$V_{0}(z)=\frac{1}{2\pi^{2}}\int_{\mathbb{R}^{3}}\log\frac{|y|}{|z-y|}e^{3V_{0}(y)}dy+\log
2,\;\;\;V_{0}(0)=\log 2,\nabla V_{0}(0)=0.$
Next, we set $w_{l}(z)=v_{l}(z)-V_{0}(z)$ for $z\in
B^{\mathbb{R}^{3}}_{0}(\eta_{1}\mu_{l}^{-1})$, and use Lemma 3.4 to infer that
(69) $|w_{l}|\leq
C\;\;\;\,\text{in}\;\;\;\;B^{\mathbb{R}^{3}}_{0}(\eta_{1}\mu_{l}^{-1})$
On the other hand, it is easy to see that to achieve our goal, it is
sufficient to show
(70) $|w_{l}|\leq
C\mu_{l}|z|\,\,\,\,\text{in}\,\,\,\,B^{\mathbb{R}^{3}}_{0}(\eta_{1}\mu_{l}^{-1}).$
To show (70), we first set
$\Lambda_{l}:=\max_{z\in\Omega_{l}}\frac{|w_{l}(z)|}{\mu_{l}(1+|z|)}$
with
$\Omega_{l}=\overline{B}^{\mathbb{R}^{3}}_{0}(\eta_{1}\mu_{l}^{-1})$
We remark that to show (70), it is equivalent to prove that $\Lambda_{l}$ is
bounded. Now, let us suppose that $\Lambda_{l}\rightarrow+\infty$ as
$l\rightarrow+\infty$, and look for a contradiction. To do so, we will use the
method of [47]. For this, we first choose a sequence of points
$z_{l}\in\Omega_{l}$ such that
$\Lambda_{l}=\frac{|w_{l}(z_{l})|}{\mu_{l}(1+|z_{l}|)}$. Next, up to a
subsequence, we have that either $z_{l}\rightarrow z^{*}$ as
$l\rightarrow+\infty$ (with $z^{*}\in\mathbb{R}^{3}$) or
$|z_{l}|\rightarrow+\infty$ as $l\rightarrow+\infty$. Now, we make the
following definition
$\bar{w}_{l}(z):=\frac{w_{l}(z)}{\Lambda_{l}\mu_{l}(1+|z_{l}|)},$
and have
(71) $|\bar{w}_{l}(z)|\leq\left(\frac{1+|z|}{1+|z_{l}|}\right),$
and
(72) $|\bar{w}_{l}(z_{l})|=1.$
Now, we consider the case where the points $z_{l}$ escape to infinity.
Case 1 : $|z_{l}|\rightarrow+\infty$
In this case, using the integral representation (46) with respect to $g_{x}$
and the method of [47], we obtain
$\bar{w}_{l}(z_{l})=\frac{1}{2\pi^{2}}\int_{\Omega_{l}}\log\frac{|\xi|}{|z_{l}-\xi|}\left(\frac{O(1)(1+|\xi|)^{-5}}{(1+|z_{l}|)}+\frac{O(1)(1+|\xi|)^{-5}}{\Lambda_{l}(1+|z_{l}|)}\right)d\xi+o(1).$
Now, using the fact that $|z_{l}|\rightarrow+\infty$ as $l\rightarrow+\infty$,
one can easily check that
$\bar{w}_{l}(z_{l})=\frac{1}{2\pi^{2}}\int_{\Omega_{l}}\log\frac{|\xi|}{|z_{l}-\xi|}\left(\frac{O(1)(1+|\xi|)^{-5}}{(1+|z_{l}|)}+\frac{O(1)(1+|\xi|)^{-5}}{\Lambda_{l}(1+|z_{l}|)}\right)d\xi=o(1).$
Hence, we reach a contradiction to (72).
Now, we are going to show that, when the points $z_{l}\rightarrow z^{*}$ as
$l\rightarrow+\infty$, we reach a contradiction as well.
Case 2: $z_{l}\rightarrow z^{*}$
In this case, using the assumption $z_{l}\longrightarrow z^{*}$, the Green’s
representation formula, and the method of [47], we obtain that up to a
subsequence
(73) $\bar{w}_{l}\rightarrow
w\;\;\;\text{in}\;\;C^{1}_{loc}(\mathbb{R}^{3})\;\;\;\text{as}\;\;\;l\rightarrow+\infty,\;\;\>\
$
and
(74)
$\begin{split}\bar{w}_{l}(z)=\frac{1}{2\pi^{2}}\int_{\Omega_{l}}\log\frac{|\xi|}{|z-\xi|}\frac{K\circ\varphi_{l}(\xi)}{K\circ\varphi_{l}(0)}e^{3\vartheta_{l}(\xi)}\bar{w}(\xi)d\xi+\frac{1}{\Lambda_{l}\mu_{l}(1+|z_{l}|)2\pi^{2}}\int_{\Omega_{l}}\log\frac{|\xi|}{|z-\xi|}O(\mu_{l}(1+|\xi|)^{-5})d\xi\\\
+\frac{O(1)+O(|z|)}{\Lambda_{l}(1+|z_{l}|)},\end{split}$
where $e^{3\theta_{l}}:=\int_{0}^{1}e^{3(sv_{l}+(1-s)V_{0})}ds$. Thus,
appealing to (73) and (74), we infer that $w$ satisfies
(75)
$w(z)=\frac{1}{2\pi^{2}}\int_{\mathbb{R}^{3}}\log\frac{|\xi|}{|z-\xi|}e^{3V_{0}(\xi)}w(\xi)d\xi$
Now, using (71), we have that $w$ satisfies the following asymptotics
(76) $|w(z)|\leq C(1+|z|).$
On the other hand, from the definition of $v_{l}$, it is easy to see that
(77) $w(0)=0,\;\;\;\text{and}\;\;\;\;\nabla w(0)=0.$
So, using (75)-(77), and observing that Lemma 3.7 in [47] holds for dimension
$3$, , we obtain
$w=0.$
However, from (72), we infer that $w$ satisfies also
(78) $|w(z^{*})|=1$
So we reach a contradiction in the second case also. Hence the proof of the
lemma is complete.
Because of the lack of understanding of the blowing PS-sequences for Louiville
type problems, the role of the PS-sequences can be replaced by the vanishing
viscosity solutions of the type of (55) via the following Bahri-Lucia’s
deformation lemma.
###### Lemma 3.6.
Assuming that $a,\;b\in\mathbb{R}$ such that $a<b$ and there is no critical
values of $\mathcal{E}_{g}$ in $[a,b]$, then there are two possibilities
1) Either
$(\mathcal{E}_{g})^{a}\;\text{is a deformation retract
of}\;\;(\mathcal{E}_{g})^{b}.$
2) Or there exists a sequence $t_{l}\rightarrow 1$ as $l\rightarrow+\infty$
and a sequence of critical point $u_{l}$ of $(\mathcal{E}_{g})_{t_{l}}$
verifying $a\leq\mathcal{E}_{g}(u_{l})\leq b$ for all $l\in\mathbb{N}^{*}$,
where $(\mathcal{E}_{g})_{t_{l}}$ is as in (34) with $t$ replaced by $t_{l}$.
On the other hand, setting
(79)
$\begin{split}V_{R}(k,\epsilon,\eta):=\\{u\in\mathcal{H}_{\frac{\partial}{\partial
n}}:\;\;\exists a_{1},\cdots,a_{k}\in\partial
M,\;\;\lambda_{1},\cdots,\lambda_{k}>0,\;\;||u-\overline{u}_{Q,T}-\sum_{i=1}^{k}\varphi_{a_{i},\lambda_{i}}||_{\mathbb{P}^{4,3}}=\\\
O\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}}\right)\;\;\;\lambda_{i}\geq\frac{1}{\epsilon},\;\;\frac{2}{\Lambda}\leq\frac{\lambda_{i}}{\lambda_{j}}\leq\frac{\Lambda}{2},\;\;\text{and}\;\;d_{\hat{g}}(a_{i},a_{j})\geq
4\overline{C}\eta\;\;\text{for}\;i\neq j\\},\end{split}$
where $\overline{C}$ is as in (39), $L$ as in (20), ,
$O(1):=O_{A,\bar{\lambda},u,\epsilon}(1)$ meaning bounded uniformly in
$\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$, $A:=(a_{1},\cdots,a_{k})$,
$u$, $\epsilon$, we have as in [47] that Proposition 3.2 implies the following
one.
###### Lemma 3.7.
Let $\epsilon$ and $\eta$ be small positive real numbers with
$0<2\eta<\varrho$ where $\varrho$ is as in (41). Assuming that $u_{l}$ is a
sequence of blowing up critical point of $(\mathcal{E}_{g})_{t_{l}}$ with
$\overline{(u_{l})}_{Q,T}=0,l\in\mathbb{N}$ and $t_{l}\rightarrow 1$ as
$l\rightarrow+\infty$ , then there exists $l_{\epsilon,\eta}$ a large positive
integer such that for every $l\geq l_{\epsilon,\eta}$, we have $u_{l}\in
V_{R}(k,\epsilon,\eta)$, and for the definition of $V_{R}(k,\epsilon,\eta)$,
see (79).
Finally, as in [47], we have that Lemma 3.6 and Lemma 3.7 implies the
following one.
###### Lemma 3.8.
Assuming that $\epsilon$ and $\eta$ are small positive real numbers with
$0<2\eta<\varrho$, then for $a,b\in\mathbb{R}$ such that $a<b$, we have that
if there is no critical values of $\mathcal{E}_{g}$ in $[a,b]$, then there are
two possibilities
1) Either
$(\mathcal{E}_{g})^{a}\;\text{is a deformation retract
of}\;\;(\mathcal{E}_{g})^{b}.$
2) Or there exists a sequence $t_{l}\rightarrow 1$ as $l\rightarrow+\infty$
and a sequence of critical point $u_{l}$ of $(\mathcal{E}_{g})_{t_{l}}$ (for
its definition see (34)) verifying $a\leq\mathcal{E}_{g}(u_{l})\leq b$ for all
$l\in\mathbb{N}^{*}$ and $l_{\epsilon,\eta}$ a large positive integer such
that $u_{l}\in V_{R}(k,\epsilon,\eta)$ for all $l\geq l_{\epsilon,\eta}$, and
for the definition of $V_{R}(k,\epsilon,\eta)$, see (79).
### 3.2 Energy and gradient estimates at infinity
In this subsection, we present energy and gradient estimates needed to
characterize the critical points at infinity of $\mathcal{E}_{g}$. We start
with a parametrization of infinity. Indeed, as a Liouville type problem, we
have that for $\eta$ a small positive real number with $0<2\eta<\varrho$,
there exists $\epsilon_{0}=\epsilon_{0}(\eta)>0$ such that
$\forall\;0<\epsilon\leq\epsilon_{0}$, we have
(80) $\forall u\in V_{R}(k,\epsilon,\eta),\\\ \text{the minimization problem
}\min_{B_{\epsilon,\eta}}||u-\overline{u}_{Q,T}-\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}-\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{Q,T})||_{\mathbb{P}^{4,3}}$
has a unique solution, up to permutations, where $B_{\epsilon,\eta}$ is
defined as follows
(81)
$\begin{split}{B_{\epsilon,\eta}:=\\{(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in\mathbb{R}^{k}\times(\partial
M)^{k}\times(0,+\infty)^{k}\times\mathbb{R}^{\bar{k}}}:|\alpha_{i}-1|\leq\epsilon,\lambda_{i}\geq\frac{1}{\epsilon},i=1,\cdots,k,\\\
d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}\eta,i\neq j,|\beta_{r}|\leq
R,r=1,\cdots,\bar{k}\\}.\end{split}$
Moreover, using the solution of (80), we have that every $u\in
V_{R}(k,\epsilon,\eta)$ can be written as
(82)
$u-\overline{u}_{Q,T}=\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{Q,T})+w,$
where $w$ verifies the following orthogonality conditions
(83)
$\begin{split}\overline{w}_{Q,T}=\left\langle\varphi_{a_{i},\lambda_{i}},w\right\rangle_{\mathbb{P}^{4,3}}=\left\langle\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial\lambda_{i}},w\right\rangle_{\mathbb{P}^{4,3}}=\left\langle\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial
a_{i}},w\right\rangle_{\mathbb{P}^{4,3}}=\left\langle
v_{r},w\right\rangle_{\mathbb{P}^{4,3}}=0,i=1,\cdots,k,\\\
r=1,\cdots,\bar{k}\end{split}$
and the estimate
(84)
$||w||_{\mathbb{P}^{4,3}}=O\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}}\right),$
where here
$O\left(1\right):=O_{\bar{\alpha},A,\bar{\lambda},\bar{\beta},w,\epsilon}\left(1\right)$.
Furthermore, the concentration points $a_{i}$, the masses $\alpha_{i}$, the
concentrating parameters $\lambda_{i}$ and the negativity parameter
$\beta_{r}$ in (82) verify also
(85) $\begin{split}d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}\eta,\;i\neq
j=1,\cdots,k,\frac{1}{\Lambda}\leq\frac{\lambda_{i}}{\lambda_{j}}\leq\Lambda\;\;i,j=1,\cdots,k,\;\;\lambda_{i}\geq\frac{1}{\epsilon},\;\;\text{and}\\\
\;\;\;\sum_{r=1}^{\bar{k}}|\beta_{r}|+\sum_{i=1}^{k}|\alpha_{i}-1|\sqrt{\log\lambda_{i}}=O\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}}\right)\end{split}$
with still $O\left(1\right)$ as in (84).
Because of the translation invariant property of $\mathcal{E}_{g}$ and the
parametrization (82), to derive energy estimate in $V_{R}(k,\epsilon,\eta)$ we
start with the following lemma.
###### Lemma 3.9.
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where
$\epsilon_{0}$ is as in (80), then for $a_{i}\in M$ concentration points,
$\alpha_{i}$ masses, $\lambda_{i}$ concentration parameters ($i=1,\cdots,k$),
and $\beta_{r}$ negativity parameters ($r=1,\cdots,\bar{k}$) satisfying (85),
we have
$\begin{split}&\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=^{1}}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{Q,T})\right)=C^{k}_{0}-8\pi^{2}\mathcal{F}_{K}(a_{1},\dots,a_{k})+2\sum_{r=1}^{\bar{k}}\mu_{r}\beta_{r}^{2}\\\
&+\sum_{i=1}^{k}(\alpha_{i}-1)^{2}\left[16\pi^{2}\log\lambda_{i}+8\pi^{2}H(a_{i},a_{i})+C^{k}_{1}\right]\\\
&+8\pi^{2}\sum_{i=1}^{k}(\alpha_{i}-1)\left[\sum_{r=1}^{\bar{k}}2\beta_{r}(v_{r}-\overline{(v_{r})}_{Q,T})(a_{i})+\sum_{j=1,j\neq
i}^{k}(\alpha_{j}-1)G(a_{i},a_{j})\right]\\\
&-\frac{c^{1}8\pi^{2}}{9}\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}\left(\frac{\Delta_{\hat{g}_{a_{i}}}\mathcal{F}^{A}_{i}(a_{i})}{\mathcal{F}^{A}_{i}(a_{i})}-\frac{3}{4}R_{\hat{g}}(a_{i})\right)\\\
&+\frac{c^{1}8\pi^{2}}{9}\sum_{i=1}^{k}\frac{\tilde{\tau}_{i}}{\lambda_{i}^{2}}\left(\frac{\Delta_{\hat{g}_{a_{i}}}\mathcal{F}^{A}_{i}(a_{i})}{\mathcal{F}^{A}_{i}(a_{i})}-\frac{3}{4}R_{\hat{g}}(a_{i})\right)\\\
&+\frac{16\pi^{2}}{3}\sum_{i=1}^{k}\log(1-\tilde{\tau}_{i})+O\left(\sum_{i=1}^{k}|\alpha_{i}-1|^{3}+\sum_{r=1}^{\bar{k}}|\beta_{r}|^{3}+\sum_{i=1}^{k}\frac{1}{\lambda^{3}_{i}}\right),\end{split}$
where $O\left(1\right)$ means here
$O_{\bar{\alpha},A,\bar{\lambda},\bar{\beta},\epsilon}\left(1\right)$ with
$\bar{\alpha}=(\alpha_{1},\cdots,\alpha_{k})$, $A:=(a_{1},\cdots,a_{k})$,
$\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$,
$\bar{\beta}:=(\beta_{1},\cdots,\beta_{\bar{k}})$ and for $i=1,\cdots,k$,
$\tilde{\tau}_{i}:=1-\frac{k\tilde{\gamma}_{i}}{\Gamma},\;\;\;\;\Gamma:=\sum_{i=1}^{k}\tilde{\gamma}_{i},\;\;\;\tilde{\gamma}_{i}:=\tilde{c}_{i}\lambda_{i}^{6\alpha_{i}-3}\mathcal{F}^{A}_{i}(a_{i})\mathcal{G}_{i}(a_{i}),$
with
$\tilde{c}_{i}:=\int_{\mathbb{R}^{3}}\frac{1}{(1+|y|^{2})^{3\alpha_{i}}}dy$
$\begin{split}\mathcal{G}_{i}(a_{i}):=e^{3((\alpha_{i}-1)H(a_{i},a_{i})+\sum_{j=1,j\neq
i}^{k}(\alpha_{j}-1)G(a_{j},a_{i}))}e^{\frac{3}{2}\sum_{j=1,j\neq
i}^{k}\frac{\alpha_{j}}{\lambda_{j}^{2}}\Delta_{g_{a_{j}}}G(a_{j},a_{i})}e^{\frac{3}{2}\frac{\alpha_{i}}{\lambda_{i}^{2}}\Delta_{g_{a_{i}}}H(a_{i},a_{i})}\\\
\times e^{3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}(a_{i})},\end{split}$
$C_{0}^{k}$ is a real number depending only on $k$, $C_{1}^{k}$ is a real
number and $c^{1}$ is a positive real number and for the meaning of
$O_{\bar{\alpha},A,\bar{\lambda},\bar{\beta},\epsilon}\left(1\right)$.
Proof. The proof is the same as the one Lemma 4.1 in [1] replacing Lemma 10.1-
Lemma 10.4 in [1] by Lemma 5.1-Lemma 5.4.
Concerning the gradient estimates of $\mathcal{E}_{g}$ in
$V_{R}(k,\epsilon,\eta)$, we have in the directions of the scaling parameters
:
###### Lemma 3.10.
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), and $\epsilon\leq\epsilon_{0}$ where
$\epsilon_{0}$ is as in (80), then for $a_{i}\in\partial M$ concentration
points, $\alpha_{i}$ masses , $\lambda_{i}$ concentration parameters
($i=1,\cdots,k$) and $\beta_{r}$ negativity parameters ($r=1,\cdots,\bar{k}$)
satisfying (85), we have that for every $r=1,\cdots,k$, there holds
$\begin{split}&\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{Q,T})\right),\lambda_{j}\frac{\partial\varphi_{a_{j},\lambda_{j}}}{\partial\lambda_{j}}\right\rangle_{\mathbb{P}^{4,3}}=16\pi^{2}\alpha_{j}\tau_{j}\\\
&-\frac{c^{2}8\pi^{2}}{3\lambda_{j}^{2}}\left(\frac{\Delta_{\hat{g}_{a_{j}}}\mathcal{F}^{A}_{j}(a_{j})}{\mathcal{F}^{A}_{j}(a_{j})}-\frac{3}{4}R_{\hat{g}}(a_{j})\right)-\frac{16\pi^{2}}{\lambda_{j}^{2}}\tau_{j}\Delta_{\hat{g}_{a_{j}}}H(a_{j},a_{j})\\\
&-\frac{16\pi^{2}}{\lambda_{j}^{2}}\sum_{i=1,i\neq
j}^{k}\tau_{i}\Delta_{\hat{g}_{a_{j}}}G(a_{j},a_{i})+\frac{c^{2}8\pi^{2}}{\lambda_{j}^{2}}\tau_{j}\left(\frac{\Delta_{\hat{g}_{a_{j}}}\mathcal{F}^{A}_{j}(a_{j})}{\mathcal{F}^{A}_{j}(a_{j})}-\frac{3}{4}R_{\hat{g}}(a_{j})\right)\\\
&+O\left(\sum_{i=1}^{k}|\alpha_{i}-1|^{2}+\sum_{r=1}^{\bar{k}}|\beta_{r}|^{3}+\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{3}}\right),\end{split}$
where $A:=(a_{1},\cdots,a_{k})$, $O\left(1\right)$ is as in Lemma 3.9, $c^{2}$
is a positive real number, and for $i=1,\cdots,k$,
$\tau_{i}:=1-\frac{k\tilde{\gamma}_{i}}{D},\;\;\;\;\;D:=\oint_{\partial
M}K(x)e^{3(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}(x)+\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}(x))}dS_{g}(x),$
with $\tilde{\gamma}_{i}$ as in Lemma 3.9.
Proof. The proof is the same as the one Lemma 5.1 in [1] replacing Lemma 10.1-
Lemma 10.4 in [1] by Lemma 5.1-Lemma 5.4.
As in [1], Lemma 3.10 implies the following corollary.
###### Corollary 3.11.
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where
$\epsilon_{0}$ is as in (80), then for $a_{i}\in\partial M$ concentration
points, $\alpha_{i}$ masses, $\lambda_{i}$ concentration parameters
($i=1,\cdots,k$), and $\beta_{r}$ negativity parameters ($r=1,\cdots,\bar{k}$)
satisfying (85), we have
$\begin{split}&\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right),\sum_{i=1}^{k}\frac{\lambda_{i}}{\alpha_{i}}\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial\lambda_{i}}\right\rangle_{\mathbb{P}^{4,3}}=\\\
&\sum_{i=1}^{k}\frac{c^{3}8\pi^{2}}{\lambda_{i}^{2}}\left(\frac{\Delta_{\hat{g}_{a_{i}}}\mathcal{F}^{A}_{i}(a_{i})}{\mathcal{F}^{A}_{i}(a_{i})}-\frac{3}{4}R_{\hat{g}}(a_{i})\right)\\\
&+O\left(\sum_{i=1}^{k}|\alpha_{i}-1|^{2}+\sum_{r=1}^{\bar{k}}|\beta_{r}|^{3}+\sum^{k}_{i=1}\tau^{3}_{i}+\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{3}}\right),\end{split}$
where $A:=(a_{1},\cdots,a_{k})$, $O\left(1\right)$ as as in Lemma 3.9, $c^{3}$
is a positive real number, and for $i=1,\cdots,k$, $\tau_{i}$ is as in Lemma
3.10.
Proof. The proof uses the strategy of the proof of Corollary 5.2 in [1]
replacing Lemma 5.1 in [1] by its counterpart Lemma 3.10.
For the gradient estimate in the directions of mass concentrations, we have:
###### Lemma 3.12.
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where
$\epsilon_{0}$ is as in (80), then for $a_{i}\in\partial M$ concentration
points, $\alpha_{i}$ masses, $\lambda_{i}$ concentration parameters
($i=1,\cdots,k$), and $\beta_{r}$ negativity parameters ($r=1,\cdots,\bar{k}$)
satisfying (85), we have that for every $j=1,\cdots,k$, there holds
$\begin{split}&\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right),\varphi_{a_{j},\lambda_{j}}\right\rangle_{\mathbb{P}^{4,3}}=\\\
&\left(2\log\lambda_{j}+H(a_{j},a_{j})-C_{2}\right)\frac{1}{\alpha_{j}}\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right),\lambda_{j}\frac{\partial\varphi_{a_{j},\lambda_{j}}}{\partial\lambda_{j}}\right\rangle_{\mathbb{P}^{4,3}}\\\
&+\sum_{i=1,i\neq
j}^{k}G(a_{j},a_{i})\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right),\lambda_{i}\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial\lambda_{i}}\right\rangle_{\mathbb{P}^{4,3}}\\\
&+32\pi^{2}(\alpha_{j}-1)\log\lambda_{j}+O\left(\log\lambda_{j}\left(\sum_{i=1}^{k}\frac{|\alpha_{i}-1|}{\log\lambda_{i}}+(\sum_{r=1}^{\bar{k}}|\beta_{r}|)(\sum_{i=1}^{k}\frac{1}{\log\lambda_{i}})+\sum_{i=1}^{k}\frac{1}{\lambda^{2}_{i}}\right)\right),\end{split}$
where $O\left(1\right)$ as as in Lemma 3.9 and $C_{2}$ is a real number.
Proof. It follows from the same arguments as in Lemma 5.3 in [1].
Concerning the gradient estimate in the directions of points of
concentrations, we have:
###### Lemma 3.13.
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where
$\epsilon_{0}$ is as in (80), then for $a_{i}\in\partial M$ concentration
points, $\alpha_{i}$ masses, $\lambda_{i}$ concentration parameters
($i=1,\cdots,k$), and $\beta_{r}$ negativity parameters ($r=1,\cdots,\bar{k}$)
satisfying (85), we have that for every $j=1,\cdots,k$, there holds
$\begin{split}\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right),\frac{1}{\lambda_{j}}\frac{\partial\varphi_{a_{j},\lambda_{j}}}{\partial
a_{j}}\right\rangle_{\mathbb{P}^{4,3}}&=-\frac{c^{2}32\pi^{2}}{\lambda_{j}}\frac{\nabla_{\hat{g}}\mathcal{F}_{j}^{A}(a_{j})}{\mathcal{F}_{j}^{A}(a_{j})}\\\
&+O\left(\sum_{i=1}^{k}|\alpha_{i}-1|^{2}\right)\\\
&+O\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}+\sum_{r=1}^{\bar{k}}|\beta_{r}|^{2}+\sum_{i=1}^{k}\tau_{i}^{2}\right),\end{split}$
where $A:=(a_{1},\cdots,a_{k})$, $O(1)$ is as in Lemma 3.9, $c^{2}$ is as in
Lemma 3.10 and for $i=1,\cdots,k$, $\tau_{i}$ is as in Lemma 3.10.
Proof. The proof is the same as the one of Lemma 5.4 in [1].
Concerning the gradient estimate in the directions of the negativity
parameters, we have:
###### Lemma 3.14.
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where
$\epsilon_{0}$ is as in (80), then for $a_{i}\in\partial M$ concentration
points, $\alpha_{i}$ masses, $\lambda_{i}$ concentration parameters
($i=1,\cdots,k$), ad $\beta_{r}$ negativity parameters ($r=1,\cdots,\bar{k}$)
satisfying (85), we have that for every $l=1,\cdots,\bar{k}$, there holds
$\begin{split}\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right),v_{l}-\overline{(v_{l})}_{Q,T}\right\rangle_{\mathbb{P}^{4,3}}=&4\mu_{l}\beta_{l}+O\left(\sum_{i=1}^{k}|\alpha_{i}-1|+\sum_{i=1}^{k}|\tau_{i}|\right)\\\
&+O\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}\right),\end{split}$
where $O(1)\;$ is as in Lemma 3.9 and for $i=1,\cdots,k$, $\tau_{i}$ is as in
Lemma 3.10
Proof. It follows from the same arguments as in the proof of Lemma 5.5 in [1].
### 3.3 Finite-dimensional reduction
In this subsection, we complete the energy estimate of $\mathcal{E}_{g}$ on
$V_{R}(k,\epsilon,\eta)$ via Lyapunov finite dimensional type reduction and
second variation arguments. First of all, we have:
###### Proposition 3.15.
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where
$\epsilon_{0}$ is as in (80) and
$u=\overline{u}_{Q,T}+\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+w\in
V_{R}(k,\epsilon,\eta)$ with $w$, the concentration points $a_{i}$, the masses
$\alpha_{i}$, the concentrating parameters $\lambda_{i}$ ($i=1,\cdots,k$), and
the negativity parameters $\beta_{r}$ ($r=1,\cdots,\bar{k}$) verifying
(83)-(85), then we have
(86)
$\mathcal{E}_{g}(u)=\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right)-f(w)+Q(w)+o(||w||_{\mathbb{P}^{4,3}}^{2}),$
where
(87) $f(w):=16\pi^{2}\frac{\oint_{\partial
M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}wdS_{g}}{\oint_{\partial
M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}dS_{g}},$
and
(88) $Q(w):=||w||_{\mathbb{P}^{4,3}}^{2}-24\pi^{2}\frac{\oint_{\partial
M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}w^{2}dS_{g}}{\oint_{\partial
M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}dS_{g}}.$
Moreover, setting
(89)
$\begin{split}E_{a_{i},\lambda_{i}}:=\\{w\in\mathcal{H}_{\frac{\partial}{\partial
n}}:\;\;\langle\varphi_{a_{i},\lambda_{i}},w\rangle_{\mathbb{P}^{4,3}}=\langle\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial\lambda_{i}},w\rangle_{\mathbb{P}^{4,3}}=\langle\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial
a_{i}},w\rangle_{\mathbb{P}^{4,3}}=0,\\\ \,\overline{w}_{(Q,T)}=\langle
v_{r},w\rangle_{\mathbb{P}^{4,3}}=0,\;r=1,\cdots,\bar{k},\,\;\text{and}\;\;||w||_{\mathbb{P}^{4,3}}=O\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}}\right)\\},\end{split}$
and
(90)
$A:=(a_{1},\cdots,a_{k}),\;\;\bar{\lambda}=(\lambda_{1},\cdots,\lambda_{k}),\;\;E_{A,\bar{\lambda}}:=\cap_{i=1}^{k}E_{a_{i},\lambda_{i}},$
we have that, the quadratic form $Q$ is positive definite in
$E_{A,\bar{\lambda}}$. Furthermore, the linear part $f$ verifies that, for
every $w\in E_{A,\bar{\lambda}}$, there holds
(91)
$f(w)=O\left[||w||_{\mathbb{P}^{4,3}}\left(\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|\log\lambda_{i}+\sum_{r=1}^{\bar{k}}|\beta_{r}|+\sum_{i=1}^{k}\frac{\log\lambda_{i}}{\lambda_{i}^{2}}\right)\right].$
where here $o(1)=o_{\bar{\alpha},A,\bar{\beta},\bar{\lambda},w,\epsilon}(1)$
and
$O\left(1\right):=O_{\bar{\alpha},A,\bar{\beta},\bar{\lambda},w,\epsilon}\left(1\right)$.
As in [1], to prove Proposition 3.15, we will need the following three coming
lemmas. We start with the following one:
###### Lemma 3.16.
Assuming the assumptions of Proposition 3.15 and $\gamma\in(0,1)$ small, then
for every $q\geq 1$, there holds the following estimates
(92) $\oint_{\partial
M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}|w|^{q}=O\left(||w||_{\mathbb{P}^{4,3}}^{q}(\sum_{i=1}^{k}\lambda_{i}^{3+\gamma})\right),$
(93) $\oint_{\partial
M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\hat{\delta}_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}|w|^{q}=O\left(||w||_{\mathbb{P}^{4,3}}^{q}(\sum_{i=1}^{k}\lambda_{i}^{\gamma})\right),$
(94) $\oint_{\partial
M}e^{3\hat{\delta}_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}d_{\hat{g}_{a_{i}}}(a_{i},\cdot)|w|^{q}=O\left(||w||_{\mathbb{P}^{4,3}}^{q}\frac{1}{\lambda_{i}^{1-\gamma}}\right),\;\;i=1,\cdots,k,$
(95) $\oint_{\partial
M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}e^{3\theta_{w}w}|w|^{q}=O\left(||w||_{\mathbb{P}^{4,3}}^{q}(\sum_{i=1}^{k}\lambda_{i}^{3+\gamma})\right),$
where $\theta_{w}\in[0,1]$, and
(96) $\oint_{\partial
M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}\left(e^{3w}-1-3w-\frac{9}{2}w^{2}\right)dV_{g}=o\left(||w||_{\mathbb{P}^{4,3}}^{2}(\sum_{i=1}^{k}\lambda_{i}^{3})\right).$
where here $o(1)$ and $O\left(1\right)$ are as in Proposition 3.15.
Proof. The proof is the same as the one of Lemma 6.2 in [1] replacing Lemma
10.1 by its counterpart Lemma 5.1.
Still as in [1], the second lemma that we need for the proof of Proposition
3.15 read as follows:
###### Lemma 3.17.
Assuming the assumptions of Proposition 3.15, then there holds the following
estimate
(97) $\begin{split}&\frac{\oint_{\partial
M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}wdS_{g}}{\oint_{\partial
M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}dS_{g}}=\\\
&O\left(||w||_{\mathbb{P}^{4,3}}\left(\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|\log\lambda_{i}+\sum_{r=1}^{\bar{k}}|\beta_{r}|+\sum_{i=1}^{k}\frac{\log\lambda_{i}}{\lambda_{i}^{2}}\right)\right).\end{split}$
Proof. If follows from the same arguments as in the proof of Lemma 6.3 in [1]
replacing Lemma 10.1 by its counterpart Lemma 5.1.
Finally, as in [1], the third and last lemma that we need for the proof of
Proposition 3.15 is the following one.
###### Lemma 3.18.
Assuming the assumptions of Proposition 3.15, then for every $i=1,\cdots,k$,
there holds
(98) $\tau_{i}=O\left(\sum_{j=1}^{k}\frac{1}{\lambda_{j}}\right).$
Proof. The proof is the same as the one Lemma 6.4 in [1] replacing Lemma 5.1
by Lemma 3.10.
Proof of Proposition 3.15
It follows from the same arguments as in the proof of Lemma 6.1 in [1]
replacing Lemma 6.2-Lemma 6.4 in [1] by Lemma 3.16-lemma 3.18 and Lemma 10.1
in [1] by Lemma 5.1. Furthermore, Lemma 10.6 and Lemma 10.7 in [1] are
replaced by Lemma 5.9 and Lemma 5.10.
Now, as in [1], we have that Proposition 3.15 implies the following direct
corollaries.
###### Corollary 3.19.
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), $0<\epsilon\leq\epsilon_{0}$ where
$\epsilon_{0}$ is as in (80) and
$u:=\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})$
with the concentration points $a_{i}$, the masses $\alpha_{i}$, the
concentrating parameters $\lambda_{i}$ ($i=1,\cdots,k$) and the negativity
parameters $\beta_{r}$ ($r=1,\cdots,\bar{k}$) satisfying (85), then there
exists a unique $\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in
E_{A,\bar{\lambda}}$ such that
(99)
$\mathcal{E}_{g}\left(u+\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\right)=\min_{w\in
E_{A,\bar{\lambda}},u+w\in V_{R}(k,\epsilon,\eta)}\mathcal{E}_{g}(u+w),$
where $\bar{\alpha}:=(\alpha_{1},\cdots,\alpha_{k})$,
$A:=(a_{1},\cdots,a_{k})$, $\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$
and $\bar{\beta}:=(\beta_{1},\cdots,\beta_{k})$.
Furthermore,
$(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\longrightarrow\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in
C^{1}$ and satisfies the following estimate
(100)
$\frac{1}{C}||\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})||_{\mathbb{P}^{4,3}}^{2}\leq|f\left(\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\right)|\leq
C||\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})||_{\mathbb{P}^{4,3}}^{2},$
for some large positive constant $C$ independent of $\bar{\alpha}$, $A$,
$\bar{\lambda}$, and $\bar{\beta}$, hence
(101)
$||\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})||_{\mathbb{P}^{4,3}}=O\left(\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|\log\lambda_{i}+\sum_{r=1}^{\bar{k}}|\beta_{r}|+\sum_{i=1}^{k}\frac{\log\lambda_{i}}{\lambda_{i}^{2}}\right).$
###### Corollary 3.20.
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), $0<\epsilon\leq\epsilon_{0}$ where
$\epsilon_{0}$ is as in (80), and
$u_{0}:=\sum_{i=1}^{k}\alpha_{i}^{0}\varphi_{a_{i}^{0},\lambda_{i}^{0}}+\sum_{r=1}^{\bar{k}}\beta_{r}^{0}(v_{r}-\overline{(v_{r})}_{(Q,T)})$
with the concentration points $a_{i}^{0}$, the masses $\alpha_{i}^{0}$, the
concentrating parameters $\lambda_{i}^{0}$ ($i=1,\cdots,k$) and the negativity
parameters $\beta_{r}^{0}$ ($r=1,\cdots,\bar{k}$) satisfying (85), then there
exists an open neighborhood $U$ of
$(\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0})$ (with
$\bar{\alpha}^{0}:=(\alpha^{0}_{1},\cdots,\alpha^{0}_{k})$,
$A^{0}:=(a_{1}^{0},\cdots,a^{0}_{k})$,
$\bar{\lambda}:=(\lambda_{1}^{0},\cdots,\lambda_{k}^{0})$ and
$\bar{\beta}^{0}:=(\beta_{1}^{0},\cdots,\beta_{\bar{k}}^{0})$) such that for
every $(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in U$ with
$\bar{\alpha}:=(\alpha_{1},\cdots,\alpha_{k})$, $A:=(a_{1},\cdots,a_{k})$,
$\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$,
$\bar{\beta}:=(\beta_{1},\cdots,\beta_{\bar{k}})$, and the $a_{i}$, the
$\alpha_{i}$, the $\lambda_{i}$ ($i=1,\cdots,k$) and the $\beta_{r}$
($r=1,\cdots,\bar{k}$) satisfying (85), and $w$ satisfying (85) with
$\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+w\in
V_{R}(k,\epsilon,\eta)$, we have the existence of a change of variable
(102) $w\longrightarrow V$
from a neighborhood of $\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ to
a neighborhood of $0$ such that
(103)
$\begin{split}&\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+w\right)=\\\
&\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\right)\\\
&+\frac{1}{2}\partial^{2}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}^{0}\varphi_{a_{i}^{0},\lambda_{i}^{0}}+\sum_{r=1}^{\bar{k}}\beta_{r}^{0}(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}(\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0})\right)(V,V),\end{split}$
Thus, as in [1], with this new variable, it is easy to see that in
$V_{R}(k,\epsilon,\eta)$ we have a splitting of the variables
$(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ and $V$, namely that one can
decrease the Euler-Lagrange functional $\mathcal{E}_{g}$ in the variable $V$
without touching the variable $(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ by
considering just the flow
(104) $\frac{dV}{dt}=-V.$
So, as in [1], and for the same reasons, to develop a Morse theory for
$\mathcal{E}_{g}$ is equivalent to do one for the functional
(105)
$\bar{\mathcal{E}_{g}}(\bar{\alpha},A,\bar{\lambda},\bar{\beta}):=\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\right),$
where $\bar{\alpha}=(\alpha_{1},\cdots,\alpha_{k})$, $A=(a_{1},\cdots,a_{k})$,
$\bar{\lambda}=(\lambda_{1},\cdots,\lambda_{k})$ and
$\bar{\beta}=\beta_{1},\cdots,\beta_{\bar{k}}$ with the concentration points
$a_{i}$, the masses $\alpha_{i}$, the concentrating parameters $\lambda_{i}$
($i=1,\cdots,k$) and the negativity parameters $\beta_{r}$
($r=1,\cdots,\bar{k}$) satisfying (85), and
$\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ is as in Corollary 3.19.
Finally, we have the following energy estimate of $\mathcal{E}_{g}$ on
$V_{R}(k,\epsilon,\eta)$ .
###### Lemma 3.21.
Under the assumptions of Proposition 3.15, $\forall
u=\overline{u}_{(Q,T)}+\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+w\in
V_{R}(k,\epsilon,\eta)$, we have
$\begin{split}&\mathcal{E}_{g}(u)=\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=^{1}}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+w\right)=C^{k}_{0}-8\pi^{2}\mathcal{F}_{K}(a_{1},\dots,a_{k})+2\sum_{r=1}^{\bar{k}}\mu_{r}\beta_{r}^{2}\\\
&+\sum_{i=1}^{k}(\alpha_{i}-1)^{2}\left[16\pi^{2}\log\lambda_{i}+8\pi^{2}H(a_{i},a_{i})+C^{k}_{1}\right]-\frac{c^{1}8\pi^{2}}{9}\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}\left(\frac{\Delta_{\hat{g}_{a_{i}}}\mathcal{F}^{A}_{i}(a_{i})}{\mathcal{F}^{A}_{i}(a_{i})}-\frac{3}{4}R_{\hat{g}}(a_{i})\right)\\\
&+\frac{1}{2}\partial^{2}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}^{0}\varphi_{a_{i}^{0},\lambda_{i}^{0}}+\sum_{r=1}^{\bar{k}}\beta_{r}^{0}(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}(\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0})\right)(V,V)\\\
&+8\pi^{2}\sum_{i=1}^{k}(\alpha_{i}-1)\left[\sum_{r=1}^{\bar{k}}2\beta_{r}\left(v_{r}-\overline{(v_{r})}_{(Q,T)}\right)(a_{i})-\sum_{j=1,j\neq
i}^{k}(\alpha_{j}-1)G(a_{i},a_{j})\right]\\\
&+\frac{c^{1}8\pi^{2}}{9}\sum_{i=1}^{k}\frac{\tilde{\tau}_{i}}{\lambda_{i}^{2}}\left(\frac{\Delta_{\hat{g}_{a_{i}}}\mathcal{F}^{A}_{i}(a_{i})}{\mathcal{F}^{A}_{i}(a_{i})}-\frac{3}{4}R_{\hat{g}}(a_{i})\right)\\\
&+\frac{16\pi^{2}}{3}\sum_{i=1}^{k}\log(1-\tilde{\tau}_{i})+O\left(\sum_{i=1}^{k}|\alpha_{i}-1|^{3}+\sum_{r=1}^{\bar{k}}|\beta_{r}|^{3}+\sum_{i=1}^{k}\frac{1}{\lambda^{3}_{i}}+||\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})||^{2}_{\mathbb{P}^{4,3}}\right),\end{split}$
where $O\left(1\right)$ means here
$O_{\bar{\alpha},A,\bar{\lambda},\bar{\beta},\epsilon}\left(1\right)$ with
$\bar{\alpha}=(\alpha_{1},\cdots,\alpha_{k})$, $A:=(a_{1},\cdots,a_{k})$,
$\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$,
$\bar{\beta}:=(\beta_{1},\cdots,\beta_{\bar{k}})$ and for $i=1,\cdots,k$,
$\tilde{\tau}_{i}$ is as in Lemma 3.9. where
$\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ is as in Corollary 3.19.
Proof. It follows directly from Lemma 3.9, formula (103) and Proposition 3.15.
### 3.4 Morse lemma at infinity
In this subsection, we derive a Morse Lemma at infinity for $\mathcal{E}_{g}$.
As in [1], in order to do that, we first construct a pseudo-gradient for
$\bar{\mathcal{E}_{g}}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$, where
$\bar{\mathcal{E}_{g}}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ is defined
as in (105) exploiting the gradient estimates derived previously. Indeed, we
have:
###### Proposition 3.22.
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where
$\epsilon_{0}$ is as in (80), then there exists a pseudogradient
$\mathcal{W}_{g}$ of
$\bar{\mathcal{E}_{g}}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ such that
1) For every
$u:=\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\in
V_{R}(k,\epsilon,\eta)$ with the concentration points $a_{i}$, the masses
$\alpha_{i}$, the concentrating parameters $\lambda_{i}$ ($i=1,\cdots,k$) and
the negativity parameters $\beta_{r}$ ($r=1,\cdots,\bar{k}$) satisfying (85),
there holds
(106)
$\large\left\langle-\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}(u),\;\mathcal{W}_{g}\large\right\rangle_{\mathbb{P}^{4,3}}\geq
c\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}+\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|+\sum_{i=1}^{k}|\tau_{i}|+\sum_{r=1}^{\bar{k}}|\beta_{r}|)\right),$
and for every
$u:=\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}\lambda(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in
V_{R}(k,\epsilon,\eta)$ with the concentration points $a_{i}$, the masses
$\alpha_{i}$, the concentrating parameters $\lambda_{i}$ ($i=1,\cdots,k$) and
the negativity parameters $\beta_{r}$ ($r=1,\cdots,\bar{k}$) satisfying (85),
and $\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ is as in (99), there
holds
(107)
$\left\langle-\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}(u+\bar{w}),\;\mathcal{W}_{g}+\frac{\partial\bar{w}}{\partial(\bar{\alpha},A,\bar{\lambda},\bar{\beta})}\right\rangle_{{}_{\mathbb{P}^{4,3}}}\geq
c\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}+\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|+\sum_{i=1}^{k}|\tau_{i}|+\sum_{r=1}^{\bar{k}}|\beta_{r}|\right),$
where $c$ is a small positive constant independent of
$A:=(a_{1},\cdots,a_{k})$, $\bar{\alpha}=(\alpha_{1},\cdots,\alpha_{k})$,
$\bar{\lambda}=(\lambda_{1},\cdots,\lambda_{k})$,
$\bar{\beta}=(\beta_{1},\cdots,\beta_{\bar{k}})$ and $\epsilon$.
2) $\mathcal{W}_{g}$ is a $||\cdot||_{\mathbb{P}^{4,3}}$-bounded vector field
and is compactifying outside the region where $A$ is very close to a critical
point $B$ of $\mathcal{F}_{K}$ satisfying $\mathcal{L}_{K}(B)<0$.
Proof. It follows from the same arguments as in the proof of Proposition 8.1
in [1] replacing formulas (52)-(54), Lemma 5.1, Corollary 5.2 and Lemma
5.3-Lemma 5.5 in [1] with (49)-(51), Lemma 3.10, Corollary 3.11 and Lemma
3.12-Lemma 3.14. Furthermore, Lemma 4.1, Lemma 7.1, and Lemma 10.5 in [1] are
replaced by Lemma 3.9, Lemma 3.15 and Lemma 5.5
Now, as in [1], we have that Proposition 3.22 implies the following
characterization of the critical points at infinity of $\mathcal{E}_{g}$.
###### Corollary 3.23.
1) The critical points at infinity of $\mathcal{E}_{g}$ correspond to the
”configurations” $\alpha_{i}=1$, $\lambda_{i}=+\infty$, $\tau_{i}=0$
$i=1,\cdots,k$, $\beta_{r}=0$, $r=1,\cdots,\bar{k}$, $A$ is a critical point
of $\mathcal{F}_{K}$ and $V=0$, and we denote them by $z^{\infty}$ with $z$
being the corresponding critical point of $\mathcal{F}_{K}$ .
2) The “true” critical points at infinity of $\mathcal{E}_{g}$ are the
$z^{\infty}$ satisfying $\mathcal{L}_{K}(z)<0$ and we denote them by
$x^{\infty}$ with $x$ being the corresponding critical point of
$\mathcal{F}_{K}$.
3) The “false” critical points at infinity of $\mathcal{E}_{g}$ are the
$z^{\infty}$ satisfying $\mathcal{L}_{K}(z)>0$ and we denote them by
$y^{\infty}$ with $y$ being the corresponding critical point of
$\mathcal{F}_{K}$.
4) The $\mathcal{E}_{g}$-energy of a critical point at infinity $z^{\infty}$
denoted by $\mathcal{J}_{g}(z^{\infty})$ is given by
(108)
$\mathcal{J}_{g}(z^{\infty})=C_{0}^{k}-8\pi^{2}\mathcal{F}_{K}(z_{1},\dots,z_{k})$
where $z=(z_{1},\cdots,z_{k})$ and $C_{0}^{k}$ is as in Lemma 3.9.
Proof. Point 1)- Point 3) follow from (51), Lemma 3.8, the discussions right
after (103), and Proposition 3.22, while Point 4) follows from Point 1)
combined with (101) and Lemma 3.21.
Finally, we are going to conclude this subsection by establishing an analogue
of the classical Morse lemma for both “true” and “false” critical points at
infinity. In order to do that, we first remark that, as in [1], the arguments
of Proposition 3.22 implies that $V_{-}:=\\{u\in
V_{R}(k,\epsilon,\eta):\;l_{K}(A)<0,\;\forall
r\in\\{1,\cdots,\bar{k}\\}\,\,\;\,|\beta_{r}|\leq
2\tilde{C}_{0}\left(\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|+\sum_{i=1}^{k}|\tau_{i}|+\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}\right),\;\;\forall\;i\in\\{1,\cdots,k\\}\;\,\;|\tau_{i}|\leq
2\frac{\hat{C}_{0}}{\lambda_{i}^{2}},\;\;\text{and}\;\;\;\forall
i\in\\{1,\cdots,k\\}\;\;\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}\leq
4\frac{C_{0}}{\lambda_{i}^{2}}\;\\}$ and $V_{+}:=\\{u\in
V_{R}(k,\epsilon,\eta):l_{K}(A)>0,\forall
r\in\\{1,\cdots,\bar{k}\\}\,\,\;\,|\beta_{r}|\leq
2\tilde{C}_{0}\left(\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|+\sum_{i=1}^{k}|\tau_{i}|+\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}\right),\\\
\;\;\forall\;i\in\\{1,\cdots,k\\}\;\,\;|\tau_{i}|\leq
2\frac{\hat{C}_{0}}{\lambda_{i}^{2}},\;\;\text{and}\;\;\;\forall
i\in\\{1,\cdots,k\\}\;\;\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}\leq
4\frac{C_{0}}{\lambda_{i}^{2}}\;\\}$ (where $\tilde{C}_{0}$, $\hat{C}_{0}$ and
$C_{0}$ are large positive constants) are respectively a neighborhood of the
“true” and “false” critical points at infinity of the variational problem.
Hence, as in [1], (101), Corollary3.20, Lemma 3.21 and classical Morse lemma
imply the following Morse type lemma for a “true” critical point at infinity.
###### Lemma 3.24.
(Morse lemma at infinity near a “true” one)
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), $0<\epsilon\leq\epsilon_{0}$ where
$\epsilon_{0}$ is as in (80) and
$u_{0}:=\sum_{i=1}^{k}\alpha_{i}^{0}\varphi_{a_{i}^{0},\lambda_{i}^{0}}+\sum_{r=1}^{\bar{k}}\beta_{r}^{0}(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}((\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0}))\in
V_{-}(k,\epsilon,\eta)$ (where
$\bar{\alpha}^{0}:=(\alpha^{0}_{1},\cdots,\alpha^{0}_{k})$,
$A^{0}:=(a_{1}^{0},\cdots,a^{0}_{k})$,
$\bar{\lambda}:=(\lambda_{1}^{0},\cdots,\lambda_{k}^{0})$ and
$\bar{\beta}^{0}:=(a_{1}^{0},\cdots,\beta_{\bar{k}}^{0})$) with the
concentration points $a_{i}^{0}$, the masses $\alpha_{i}^{0}$, the
concentrating parameters $\lambda_{i}^{0}$ ($i=1,\cdots,k$) and the negativity
parameters $\beta_{r}^{0}$ ($r=1,\cdots,\bar{k}$) satisfying (85) and
furthermore $A^{0}\in Crit(\mathcal{F}_{K})$, then there exists an open
neighborhood $U$ of
$(\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0})$ such that for
every $(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in U$ with
$\bar{\alpha}:=(\alpha_{1},\cdots,\alpha_{k})$, $A:=(a_{1},\cdots,a_{k})$,
$\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$,
$\bar{\beta}:=(\beta_{1},\cdots,\beta_{\bar{k}})$, and the $a_{i}$, the
$\alpha_{i}$, the $\lambda_{i}$ ($i=1,\cdots,k$) and the $\beta_{r}$
($r=1,\cdots,\bar{k}$) satisfying (85), and $w$ satisfying (85) with
$u=\overline{u}_{(Q,T)}\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+w\in
V_{-}(k,\epsilon,\eta)$, we have the existence of a change of variable
(109) $\begin{split}&\alpha_{i}\longrightarrow s_{i},i=1,\cdots,k,\\\
&A\longrightarrow\tilde{A}=(\tilde{A}_{-},\tilde{A}_{+})\\\
&\lambda_{1}\longrightarrow\theta_{1},\\\
&\tau_{i}\longrightarrow\theta_{i},i=2,\cdots,k,\\\
&\beta_{r}\longrightarrow\tilde{\beta}_{r}\\\
&V\longrightarrow\tilde{V},\end{split}$
such that
(110)
$\mathcal{E}_{g}(u)=\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}\left(v_{r}-\overline{(v_{r})}_{(Q,T)}\right)+w\right)=-|\tilde{A}_{-}|^{2}+|\tilde{A}_{+}|^{2}+\sum_{i=1}^{k}s_{i}^{2}-\sum_{r=1}^{\bar{k}}\tilde{\beta}_{r}^{2}+\theta_{1}^{2}-\sum_{i=2}^{k}\theta_{i}^{2}+||\tilde{V}||^{2}$
where $\tilde{A}=(\tilde{A}_{-},\;\tilde{A}_{+})$ is the Morse variable of the
map $\mathcal{J}_{g}:(\partial M)^{k}\setminus F((\partial
M)^{k})\longrightarrow\mathbb{R}$ which is defined by the right hand side of
(108). Hence a “true“critical point at infinity $x^{\infty}$ of
$\mathcal{E}_{g}$ has Morse index at infinity
$\mathcal{M}_{\infty}(x^{\infty})=i_{\infty}(x)+\bar{k}$.
Similarly, and for the same reasons as above, we have the following analogue
of the classical Morse lemma for a ”false“ critical point at infinity.
###### Lemma 3.25.
(Morse lemma at infinity near a “false” one)
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), $0<\epsilon\leq\epsilon_{0}$ where
$\epsilon_{0}$ is as in (80) and
$u_{0}:=\sum_{i=1}^{k}\alpha_{i}^{0}\varphi_{a_{i}^{0},\lambda_{i}^{0}}+\sum_{r=1}^{\bar{k}}\beta_{r}^{0}(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}((\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0}))\in
V_{+}(k,\epsilon,\eta)$ (where
$\bar{\alpha}^{0}:=(\alpha^{0}_{1},\cdots,\alpha^{0}_{k})$,
$A^{0}:=(a_{1}^{0},\cdots,a^{0}_{k})$,
$\bar{\lambda}:=(\lambda_{1}^{0},\cdots,\lambda_{k}^{0})$ and
$\bar{\beta}^{0}:=(a_{1}^{0},\cdots,\beta_{\bar{k}}^{0})$) with the
concentration points $a_{i}^{0}$, the masses $\alpha_{i}^{0}$, the
concentrating parameters $\lambda_{i}^{0}$ ($i=1,\cdots,k$) and the negativity
parameters $\beta_{r}^{0}$ ($r=1,\cdots,\bar{k}$) satisfying (85) and
furthermore $A^{0}\in Crit(\mathcal{F}_{K})$, then there exists an open
neighborhood $U$ of
$(\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0})$ such that for
every $(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in U$ with
$\bar{\alpha}:=(\alpha_{1},\cdots,\alpha_{k})$, $A:=(a_{1},\cdots,a_{k})$,
$\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$,
$\bar{\beta}:=(\beta_{1},\cdots,\beta_{\bar{k}})$, and the $a_{i}$, the
$\alpha_{i}$, the $\lambda_{i}$ ($i=1,\cdots,k$) and the $\beta_{r}$
($r=1,\cdots,\bar{k}$) satisfying (85), and $w$ satisfying (85) with
$u=\overline{u}_{(Q,T)}+\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{Q^{n}})+w\in
V_{+}(k,\epsilon,\eta)$, we have the existence of a change of variable
(111) $\begin{split}&\alpha_{i}\longrightarrow s_{i},i=1,\cdots,k,\\\
&A\longrightarrow\tilde{A}=(\tilde{A}_{-},\tilde{A}_{+})\\\
&\lambda_{1}\longrightarrow\theta_{1},\\\
&\tau_{i}\longrightarrow\theta_{i},i=2,\cdots,k,\\\
&\beta_{r}\longrightarrow\tilde{\beta}_{r}\\\
&V\longrightarrow\tilde{V},\end{split}$
such that
(112)
$\mathcal{E}_{g}(u)=\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{m}}\beta_{r}\left(v_{r}-\overline{(v_{r})}_{(Q,T)}\right)+w\right)=-|\tilde{A}_{-}|^{2}+|\tilde{A}_{+}|^{2}+\sum_{i=1}^{k}s_{i}^{2}-\sum_{r=1}^{\bar{k}}\tilde{\beta}_{r}^{2}-\sum_{i=1}^{k}\theta_{i}^{2}+||\tilde{V}||^{2},$
where $\tilde{A}=(\tilde{A}_{-},\tilde{A}_{+})$ is the Morse variable of the
map $\mathcal{J}_{g}:(\partial M)^{k}\setminus F((\partial
M)^{k})\longrightarrow\mathbb{R}$ which is defined by the right hand side of
(108). Hence a “false“critical point at infinity $y^{\infty}$ of
$\mathcal{E}_{g}$ has Morse index at infinity
$M_{\infty}(y^{\infty})=i_{\infty}(y)+1+\bar{k}$.
## 4 Proof of existence theorems
In this section, we show how the Morse lemma at infinity implies the main
existence results via strong Morse type inequalities or Barycenter technique
of Bahri-Coron.
### 4.1 Topology of vey high and negative sublevels of $\mathcal{E}_{g}$
We study the topology of very high sublevels of $\mathcal{E}_{g}$ and its
every negative ones. We start with the very high sublevels of
$\mathcal{E}_{g}$ and first derive the following Lemma.
###### Lemma 4.1.
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), then there exists
$\hat{C}_{0}^{k}:=\hat{C}^{k}_{0}(\eta)$ such that for every
$0<\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80), there holds
$V(k,\epsilon,\eta)\subset(\mathcal{E}_{g})^{\hat{C}_{0}^{k}}-(\mathcal{E}_{g})^{-\hat{C}_{0}^{k}}.$
Proof. It follows directly from (82)-(85), Proposition 3.15, Lemma 3.18, and
Lemma 3.21.
Next, combining Proposition 3.7 and the latter lemma, we have the following
corollary.
###### Corollary 4.2.
There exists a large positive constant $\hat{C}_{1}^{k}$ such that
$Crit(\mathcal{E}_{g})\subset(\mathcal{E}_{g})^{\hat{C}_{1}^{k}}-(\mathcal{E}_{g})^{-\hat{C}_{1}^{k}}.$
Proof. It follows, via a contradiction argument, from the the fact that
$\mathcal{E}_{g}$ is invariant by translation by constants, Proposition 3.7,
and Lemma 4.1.
Now, we are ready to characterize the topology of very high sublevels of
$\mathcal{E}_{g}$. Indeed, as in [1] and for the same reasons, we have that
Lemma 3.8, Lemma 4.1 and Corollary 4.2 imply the following one which describes
the topology of very high sublevels of the Euler-Lagrange functional
$\mathcal{E}_{g}$.
###### Lemma 4.3.
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), then there exists a large positive constant
$L^{k}:=L^{k}(\eta)$ with $L^{k}>2\max\\{\hat{C}_{0}^{k},\hat{C}_{1}^{k}\\}$
such that for every $L\geq L^{k}$, we have that $(\mathcal{E}_{g})^{L}$ is a
deformation retract of $\mathcal{H}_{\frac{\partial}{\partial n}}$, and hence
it has the homology of a point, where $\hat{C}^{k}_{0}$ is as in Lemma 4.1 and
$\hat{C}^{k}_{1}$ is as in Lemma 4.2.
Next, we turn to the study of the topology of very negative sublevels of
$\mathcal{E}_{g}$ when $k\geq 2$ or $\bar{k}\geq 1$. Indeed, as in [1] and for
the same reasons, we have that the well-know topology of very negative
sublevels in the nonresont case (see [44]), Proposition 3.7, Lemma 4.1 and
Corollary 4.2 imply the following lemma which gives the homotopy type of the
very negative sublevels of the Euler-Lagrange functional $\mathcal{E}_{g}$.
###### Lemma 4.4.
Assuming that $k\geq 2$ or $\bar{k}\geq 1$, and $\eta$ is a small positive
real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), then there
exists a large positive constant $L_{k,\bar{k}}:=L_{k,\bar{k}}(\eta)$ with
$L_{k,\bar{k}}>2\max\\{\hat{C}_{0}^{k},\hat{C}_{1}^{k}\\}$ such that for every
$L\geq L_{k,\bar{k}}$, we have that $(\mathcal{E}_{g})^{-L}$ has the same
homotopy type as $B_{k-1}(\partial M)$ if $k\geq 2$ and $\bar{k}=0$, as
$A_{k-1,\bar{k}}$ if $k\geq 2$ and $\bar{k}\geq 1$ and as $S^{\bar{k}-1}$ if
$k=1$ and $\bar{k}\geq 1$, where $\hat{C}^{k}_{0}$ is as in Lemma 4.1 and
$\hat{C}^{k}_{1}$ as in Lemma 4.2 .
However, as in [46], to prove Theorem 1.8, we need a further information about
the topology of very negative sublevels of $\mathcal{E}_{g}$. In order to
derive that, we first make some definitions. For $p\in\mathbb{N}^{*}$ and
$\lambda>0$, we define
$f_{p}(\lambda):B_{p}(\partial
M)\longrightarrow\mathcal{H}_{\frac{\partial}{\partial n}}$
as follows
(113)
$f_{p}(\lambda)(\sum_{i=1}^{p}\alpha_{i}\delta_{a_{i}}):=\sum_{i=1}^{p}\alpha_{i}\varphi_{a_{i},\lambda},\;\;\;\;\sigma=\sum_{i=1}^{p}\alpha_{i}\delta_{a_{i}}\in
B_{p}(\partial M),$
with the $\varphi_{a_{i},\lambda}$’s defined by (43). Furthermore, when
$\bar{k}\geq 1$, for $\Theta>0$, we define
(114)
$\Psi_{p,\bar{k}}(\lambda,\Theta):A_{p,\bar{k}}\longrightarrow\mathcal{H}_{\frac{\partial}{\partial
n}}$
as follows
(115)
$\Psi_{p,\bar{k}}(\lambda,\theta)(\sigma,s):=\begin{cases}\varphi_{s}+f_{p}(\lambda)(\sigma)\;\;\;&\text{for}\;\;|s|\leq\frac{1}{4},\;\;\;\sigma\in
B_{p}(\partial M),\\\
\varphi_{s}+f_{p}(2\lambda-1+4(1-\lambda)|s|)(\sigma)\;\;\;&\text{for}\;\;\frac{1}{4}\leq|s|\leq\frac{1}{2},\;\;\;\sigma\in
B_{p}(\partial M),\\\
\varphi_{s}+2(1-f_{p}(1)(\sigma))|s|+2f_{p}(1)-1\;\;\;&\text{for}\;\;\;|s|\geq\frac{1}{2},\;\;\;\sigma\in
B_{p}(\partial M),\end{cases}$
where $\varphi_{s}$ is defined by the following formula
(116)
$\varphi_{s}=\Theta\sum_{r=1}^{\bar{k}}s_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)}),$
with $s=(s_{1},\cdots,s_{\bar{k}})$. As in [46], concerning the
$f_{p}(\lambda)$’s, we have the following estimates.
###### Lemma 4.5.
Assuming that $p\in\mathbb{N}^{*}$, then we have
1) If $p<k$, then for every $L>0$, there exists $\lambda^{L}_{p}>0$ such that
for all $\lambda\geq\lambda^{L}_{p}$, we have
$f_{p}(\lambda)(B_{p}(\partial M))\subset(\mathcal{E}_{g})^{-L}.$
2) If $p=k$, then there exist $\hat{C}_{k}>0$ and $\lambda_{k}>0$ such that
for all $\lambda\geq\lambda_{k}$, we have
$f_{k}(\lambda)(B_{k}(\partial M))\subset(\mathcal{E}_{g})^{\hat{C}_{k}}.$
3) There exists $\hat{C}^{k}>0$ such that up to taking $\;\epsilon_{0}$
smaller, where $\epsilon_{0}$ is given by (80), we have that for every
$0<\epsilon\leq\epsilon_{0}$, there holds
$V(k,\epsilon)\subset(\mathcal{E}_{g})^{\hat{C}^{k}}.$
Proof. It follows from the same arguments as in the proof of Lemma 3.1 in [46]
by using Lemma 5.1, Lemma 5.3 and Lemma 5.6-Lemma 5.8.
Still, as in [46], we have the following estimates for the
$\Psi_{p}(\lambda,\Theta)$’s when $\bar{k}\geq 1$.
###### Lemma 4.6.
Assuming that $p\in\mathbb{N}^{*}$, then we have
1) If $1\leq p<k$, then for every $L>0$, there exists
$\lambda^{L}_{p,\bar{k}}>0$ and $\Theta_{p,\bar{k}}^{L}>0$ such that for all
$\lambda\geq\lambda^{L}_{p,\bar{k}}$, we have
$\Psi_{p,\bar{k}}(\lambda,\Theta_{p,\bar{k}}^{L})(A_{p,\bar{k}})\subset(\mathcal{E}_{g})^{-L}.$
2) If $p=k$ and $\Theta>0$, then there exists $C_{k,\bar{k}}^{\Theta}>0$,
$\lambda_{k,\bar{k}}^{\Theta}>0$, such that for every
$\lambda\geq\lambda^{\Theta}_{k,\bar{k}}$, we have
$\Psi_{k,\bar{k}}(\lambda,\Theta)(A_{k,\bar{k}})\subset(\mathcal{E}_{g})^{C_{k,\bar{k}}^{\Theta}}.$
3) If $\Theta>0$ , then there exists $C^{k,\bar{k}}_{\Theta}>0$ such that up
to taking $\epsilon_{0}$ smaller, where $\epsilon_{0}$ is given by (80), we
have that for every $0<\epsilon\leq\epsilon_{0}$, there holds
$V(k,\epsilon,\Theta)\subset(\mathcal{E}_{g})^{C^{k,\bar{k}}_{\Theta}}.$
Proof. It follows from the same arguments as in the proof of Lemma 4.1 in [46]
by using Lemma 4.5.
On the other hand, as in [46], Lemma 4.4 and Lemma 4.5 imply the following
one:
###### Lemma 4.7.
Assuming that $k\geq 2$, $\bar{k}=0$, and $L\geq L_{k.0}$, then there exists
$\lambda^{L}_{k-1}$ such that for all ;$\lambda\geq\lambda^{L}_{k-1}$, we have
$f_{k-1}(\lambda):B_{k-1}(\partial M)\longrightarrow(\mathcal{E}_{g})^{-L}$
is well defined and induces an isomorphism in homology.
Furthermore, still as in [46], we have also that Lemma 4.4 and Lemma 4.5 imply
the following one:
###### Lemma 4.8.
Assuming that $k\geq 2$, $\bar{k}\geq 1$, $L\geq L_{k,,\bar{k}}$, then there
exists $\lambda^{L}_{k-1,\bar{k}}>0$ and $\Theta_{k-1,\bar{k}}^{L}>0$ such
that for all $\lambda\geq\lambda^{L}_{k-1,\bar{k}}$, we have
$\Psi_{k-1,\bar{k}}(\lambda,\Theta_{k-1,\bar{k}}^{L}):A_{k-1,\bar{k}}\longrightarrow(\mathcal{E}_{g})^{-L}$
is well defined and induces an isomorphism in homology.
### 4.2 Morse theoretical type results
Proof of Theorem 1.1-Theorem 1.7
The proof is the same as the one of Theorem 1.1-Theorem 1.6 in [1] by using
Lemma 3.8, Proposition 3.22, Corollary 3.23, Lemma 3.24, Lemma 4.1, Corollary
4.2, Lemma 4.3, and Lemma 4.4 combined with the works of Bahri-Rabinowitz[12],
Karell-Karoui[34] and Malchiodi[39].
### 4.3 Algebraic topological type results
In order to carry the algebraic topological argument for existence, as in
[46], we need the following lemma.
###### Lemma 4.9.
Assuming that $(ND)$ holds, $s_{k}^{*}(O^{*}_{\partial M})\neq 0$ in
$H^{3}(S^{\infty})$ and $s_{k}^{*}(O^{*}_{\partial M})=0$ in
$H^{3}(S_{+}^{\infty}\cup S_{-}^{\infty})$, then there exists
$0\neq\tilde{O}^{*}_{\partial M}\in H^{3}(S)$ such that
$i^{*}(\tilde{O}^{*}_{\partial M})=s_{k}^{*}(O^{*}_{\partial M}),$
where $i:S^{\infty}\longrightarrow S$ is the canonical injection.
Proof. It follows from the same arguments as in the proof of Lemma 3.6 in [46]
by using the analysis of Section 3.
Proof of Theorem 1.8
The proof is the same as the one Theorem in [46] by using the algebraic
topological tools (52)-(54), characterization of the critical points at
infinity of $\mathcal{E}_{g}$ established in Section 3, and Lemma 4.9.
## 5 Appendix
###### Lemma 5.1.
Assuming that $\epsilon$ is positive and small, $a\in\partial M$ and
$\lambda\geq\frac{1}{\epsilon}$, then
1)
$\varphi_{a,\lambda}(\cdot)=\hat{\delta}_{a,\lambda}(\cdot)+\log\frac{\lambda}{2}+H(a,\cdot)+\frac{1}{2\lambda^{2}}\Delta_{\hat{g}_{a}}H(a,\cdot)+O\left(\frac{1}{\lambda^{3}}\right)\;\;\;\text{on}\;\;\;\partial
M$
2)
$\lambda\frac{\partial\varphi_{a,\lambda}(\cdot)}{\partial\lambda}=\frac{2}{1+\lambda^{2}\chi_{\varrho}^{2}(d_{\hat{g}_{a}}(a,\cdot))}-\frac{1}{\lambda^{2}}\Delta_{\hat{g}_{a}}H(a,\cdot)+O\left(\frac{1}{\lambda^{3}}\right)\;\;\;\text{on}\;\;\;\partial
M,$
3)
$\frac{1}{\lambda}\frac{\partial\varphi_{a,\lambda}(\cdot)}{\partial
a}=\frac{\chi_{\varrho}(d_{\hat{g}_{a}}(a,\cdot))\chi_{\varrho}^{{}^{\prime}}((d_{\hat{g}_{a}}(a,\cdot))}{d_{\hat{g}_{a}}(a,\cdot)}\frac{2\lambda
exp_{a}^{-1}(\cdot)}{1+\lambda^{2}\chi_{\varrho}^{2}(d_{\hat{g}_{a}}(a,\cdot))}+\frac{1}{\lambda}\frac{\partial
H(a,\cdot)}{\partial
a}+O\left(\frac{1}{\lambda^{3}}\right);\;\;\text{on}\;\;\;\partial M,$
where $O(1)$ means $O_{a,\lambda,\epsilon}(1)$ and for it meaning see Section
2.
###### Lemma 5.2.
Assuming that $\epsilon$ is small and d positive, $a\in M$,
$\lambda\geq\frac{1}{\epsilon}$, and $0<2\eta<\varrho$ with $\varrho$ as in
(41), then there holds
$\varphi_{a,\lambda}(\cdot)=G(a,\cdot)+\frac{1}{2\lambda^{2}}\Delta_{\hat{g}_{a}}G(a,\cdot)+O\left(\frac{1}{\lambda^{3}}\right)\;\;\text{on}\;\;\;\partial
M\setminus B^{a}_{a}(\eta),$
$\lambda\frac{\partial\varphi_{a,\lambda}(\cdot)}{\partial\lambda}=-\frac{1}{\lambda^{2}}\Delta_{\hat{g}_{a}}G_{(}a,\cdot)+O\left(\frac{1}{\lambda^{3}}\right)\;\;\text{on}\;\;\;\partial
M\setminus B^{a}_{a}(\eta),$
and
$\frac{1}{\lambda}\frac{\partial\varphi_{a,\lambda}(\cdot)}{\partial
a}=\frac{1}{\lambda}\frac{\partial G(a,\cdot)}{\partial
a}+O\left(\frac{1}{\lambda^{3}}\right)\;\;\text{on}\;\;\;\partial M\setminus
B^{a}_{a}(\eta),$
where $O(1)$ means $O_{a,\lambda,\epsilon}(1)$ and for it meaning see Section
2.
###### Lemma 5.3.
Assuming that $\epsilon$ is small and positive, $a\in\partial M$ and
$\lambda\geq\frac{1}{\epsilon}$, then there holds
$\mathbb{P}_{g}^{4,3}\left(\varphi_{a,\lambda},\;\varphi_{a,\lambda}\right)=16\pi^{2}\log\lambda-8\pi^{2}C_{0}+8\pi^{2}H(a,a)+\frac{8\pi^{2}}{\lambda^{2}}\Delta_{\hat{g}_{a}}H(a,a)+O\left(\frac{1}{\lambda^{3}}\right),$
$\mathbb{P}_{g}^{4,3}\left(\varphi_{a,\lambda},\;\lambda\frac{\varphi_{a,\lambda}}{\partial\lambda}\right)=8\pi^{2}-\frac{8\pi^{2}}{\lambda^{2}}\Delta_{\hat{g}_{a}}H(a,a)+O\left(\frac{1}{\lambda^{3}}\right),$
$\mathbb{P}_{g}^{4,3}\left(\varphi_{a,\lambda},\;\frac{1}{\lambda}\frac{\varphi_{a,\lambda}}{\partial
a}\right)=\frac{8\pi^{2}}{\lambda}\frac{\partial H(a,a)}{\partial
a}+O\left(\frac{1}{\lambda^{3}}\right),$
where $C_{0}$ is a positive constant depending only on $n$, $O(1)$ means
$O_{a,\lambda,\epsilon}(1)$ and for its meaning see Section 2.
###### Lemma 5.4.
Assuming that $\epsilon$ is small and positive $a_{i},a_{j}\in\partial M$,
$d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}\eta$, $0<2\eta<\varrho$,
$\frac{1}{\Lambda}\leq\frac{\lambda_{i}}{\lambda_{j}}\leq\Lambda$, and
$\lambda_{i},\lambda_{j}\geq\frac{1}{\epsilon}$, $\overline{C}$ as in (39),
and $\varrho$ as in (41), then there hold
$\begin{split}\mathbb{P}_{g}^{4,3}\left(\varphi_{a_{i},\lambda_{i}},\;\varphi_{a_{j},\lambda_{j}}\right)=&8\pi^{2}G(a_{j},a_{i})+\frac{4\pi^{2}}{\lambda_{i}^{2}}\Delta_{\hat{g}_{a_{i}}}G(a_{i},a_{j})+\frac{4\pi^{2}}{\lambda_{j}^{2}}\Delta_{\hat{g}_{a_{j}}}G(a_{j},a_{i})\\\
&+O\left(\frac{1}{\lambda^{3}_{i}}+\frac{1}{\lambda_{j}^{3}}\right),\end{split}$
$\mathbb{P}_{g}^{4,3}\left(\varphi_{a_{i},\lambda_{i}},\;\lambda_{j}\frac{\partial\varphi_{a_{j},\lambda_{j}}}{\partial\lambda_{j}}\right)=-\frac{8\pi^{2}}{\lambda_{j}^{2}}\Delta_{\hat{g}_{a_{j}}}G(a_{j},a_{i})+O\left(\frac{1}{\lambda^{3}_{j}}\right),$
and
$\mathbb{P}_{g}^{4,3}\left(\varphi_{a_{i},\lambda_{i}},\;\frac{1}{\lambda_{j}}\frac{\partial\varphi_{a_{j},\lambda_{j}}}{\partial
a_{j}}\right)=\frac{8\pi^{2}}{\lambda_{j}}\frac{\partial
G(a_{j},a_{i})}{\partial a_{j}}+O\left(\frac{1}{\lambda^{3}_{j}}\right),$
where $O(1)$ means here $O_{A,\bar{\lambda},\epsilon}(1)$ with
$A=(a_{i},a_{j})$ and $\bar{\lambda}=(\lambda_{i},\lambda_{j})$ and for the
meaning of $O_{A,\bar{\lambda},\epsilon}(1)$, see Section 2.
###### Lemma 5.5.
Assuming that $\epsilon>0$ is very small, we have that for $a\in\partial M$,
$\lambda\geq\frac{1}{\epsilon}$, there holds
(117)
$||\lambda\frac{\partial\varphi_{a,\lambda}}{\partial\lambda}||_{\mathbb{P}^{4,3}}=\tilde{O}(1),$
(118) $||\frac{1}{\lambda}\frac{\partial\varphi_{a,\lambda}}{\partial
a}||_{\mathbb{P}^{4,3}}=\tilde{O}(1),$
and
(119)
$||\frac{1}{\sqrt{\log\lambda}}\varphi_{a,\lambda}||_{\mathbb{P}^{4,3}}=\tilde{O}(1),$
where here $\tilde{O}(1)$ means bounded by positive constants form below and
above independent of $\epsilon$, $a$, and $\lambda$.
###### Lemma 5.6.
1) If $\epsilon$ is small and positive, $a\in\partial M$,
$p\in\mathbb{N}^{*}$, and $\lambda\geq\frac{1}{\epsilon}$ , then there holds
(120) $C^{-1}\lambda^{6p-3}\leq\oint_{\partial
M}e^{3p\varphi_{a,\lambda}}dS_{g}\leq C\lambda^{6p-3},$
where $C$ is independent of $a$, $\lambda$, and $\epsilon$.
2) If $\epsilon$ is positive and small, $a_{i},a_{j}\in\partial M$,
$\lambda\geq\frac{1}{\epsilon}$ and $\lambda d_{\hat{g}}(a_{i},a_{j})\geq
4\overline{C}R$, then we have
(121)
$\mathbb{P}_{g}^{4,3}(\varphi_{a_{i},\lambda},\;\varphi_{a_{j},\lambda})\,\leq\,8\pi^{2}G(a_{i},a_{j})\,+\,O(1),$
where $O(1)$ means here $O_{A,\lambda,\epsilon}(1)$ with $A=(a_{i},a_{j})$,
and for the meaning of $O_{A,\lambda,\epsilon}(1)$, see Section 2. 3) If
$\epsilon$ is positive and small, $a_{i},a_{j}\in\partial M$,
$\lambda_{i},\lambda_{j}\geq\frac{1}{\epsilon}$,
$\frac{1}{\Lambda}\leq\frac{\Lambda_{i}}{\lambda_{j}}\leq\Lambda$ and
$\lambda_{i}d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}R$, then we have
(122)
$\mathbb{P}_{g}^{4,3}(\varphi_{a_{i},\lambda},\;\varphi_{a_{j},\lambda})\,\leq\,8\pi^{2}G(a_{i},a_{j})\,+\,O(1),$
where $O(1)$ means here $O_{A,\bar{\lambda},\epsilon}(1)$ with
$A=(a_{i},a_{j})$ and $\bar{\lambda}=(\lambda_{i},\lambda_{j})$ and for the
meaning of $O_{A,\bar{\lambda},\epsilon}(1)$, see Section 2.
###### Lemma 5.7.
Let $p\in\mathbb{N}^{*}$, $\hat{R}$ be a large positive constant, $\epsilon$
be a small positive number, $\alpha_{i}\geq 0$, $i=1,\cdots,p$,
$\sum_{i=1}^{p}\alpha_{i}=k$, $\lambda\geq\frac{1}{\epsilon}$ and
$u=\sum_{i=1}^{p}\alpha_{i}\varphi_{a_{i},\lambda}$. Assuming that there exist
two positive integer $i,j\in\\{1,\cdots,p\\}$ with $i\neq j$ such that
$\lambda d_{\hat{g}}(a_{i},a_{j})\leq\frac{\hat{R}}{4\overline{C}}$, where
$\overline{C}$ is as in (39), then we have
(123) $\mathcal{E}_{g}(u)\,\leq\mathcal{E}_{g}(v)\,+\,O(\log\hat{R}),$
with
$v:=\sum_{k\leq p,k\neq
i,j}\alpha_{k}\varphi_{a_{k},\lambda}\,+(\alpha_{i}+\alpha_{j})\varphi_{a_{i},\lambda}.$
where here $O(1)$ stand for $O_{{\bar{\alpha}},A,\lambda,\epsilon}(1)$, with
${\bar{\alpha}}=(\alpha_{1},\cdots,\alpha_{p})$ and $A=(a_{1},\cdots,a_{p})$,
and for the meaning of $O_{{\bar{\alpha}},A,\lambda,\epsilon}(1)$, we refer
the reader to Section 2.
###### Lemma 5.8.
1) If $\epsilon$ is positive and small, $a_{i},a_{j}\in\partial M$,
$\lambda\geq\frac{1}{\epsilon}$ and $\lambda d_{\hat{g}}(a_{i},a_{j})\geq
4\overline{C}R$, then
$\varphi_{a_{j},\lambda}(\cdot)=G(a_{j},\cdot)+O(1)\;\;\;\text{in}\;\;B^{a_{i}}_{a_{i}}(\frac{R}{\lambda}),$
where here $O(1)$ means here $O_{A,\lambda,\epsilon}(1)$, with
$A=(a_{i},a_{j})$, and for the meaning of $O_{A,\lambda,\epsilon}(1)$, see
Section 2.
2) If $\epsilon$ is positive and small, $a_{i},a_{j}\in\partial M$,
$\lambda_{i},\lambda_{j}\geq\frac{1}{\epsilon}$,
$\frac{1}{\Lambda}\leq\frac{\Lambda_{i}}{\lambda_{j}}\leq\Lambda$, and
$\lambda_{i}d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}R$, then
$\varphi_{a_{j},\lambda_{j}}(\cdot)=G(a_{j},\cdot)+O(1)\;\;\;\text{in}\;\;B^{a_{i}}_{a_{i}}(\frac{R}{\lambda_{i}}),$
where here $O(1)$ means here $O_{A,\bar{\lambda},\epsilon}(1)$, with
$A=(a_{i},a_{j})$, $\bar{\lambda}=(\lambda_{i},\lambda_{j})$ and for the
meaning of $O_{A,\lambda,\epsilon}(1)$, see Section 2.
###### Lemma 5.9.
There exists $\Gamma_{0}$ and $\tilde{\Lambda}_{0}$ two large positive
constant such that for every $a\in\partial M$,
$\lambda\geq\tilde{\Lambda}_{0}$, and $w\in
F_{a,\lambda}:=\\{w\in\mathcal{H}_{\frac{\partial}{\partial
n}},\overline{w}_{(Q,T)}=\left\langle\varphi_{a,\lambda},w\right\rangle_{\mathbb{P}^{4,3}}=\left\langle
v_{r},w\right\rangle_{\mathbb{P}^{4,3}}=0,\;r=1\cdots,\bar{k}\\}$, we have
(124) $\oint_{\partial
M}e^{3\hat{\delta}_{a,\lambda}}w^{2}dV_{g_{a}}\leq\Gamma_{0}||w||^{2}_{\mathbb{P}^{4,3}}.$
###### Lemma 5.10.
Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$
where $\varrho$ is as in (41), then there exists a small positive constant
$c_{0}:=c_{0}(\eta)$ and $\Lambda_{0}:=\Lambda_{0}(\eta)$ such that for every
$a_{i}\in\partial M$ concentrations points with $d_{\hat{g}}(a_{i},a_{j})\geq
4\overline{C}\eta$ where $\bar{C}$ is as in (39), for every $\lambda_{i}>0$
concentrations parameters satisfying $\lambda_{i}\geq\Lambda_{0}$, with
$i=1,\cdots,k$, and for every $w\in
E_{A,\bar{\lambda}}^{*}=\cap_{i=1}^{k}E^{*}_{a_{i},\lambda_{i}}$ with
$A:=(a_{1},\cdots,a_{k}$), $\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$
and $E^{*}_{a_{i},\lambda_{i}}=\\{w\in\mathcal{H}_{\frac{\partial}{\partial
n}}:\;\;\left\langle\varphi_{a_{i},\lambda_{i}},w\right\rangle_{\mathbb{P}^{4,3}}=\left\langle\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial\lambda_{i}},w\right\rangle_{\mathbb{P}^{4,3}}=\left\langle\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial
a_{i}},w\right\rangle_{\mathbb{P}^{4,3}}=\overline{w}_{(Q,T)}=\left\langle
v_{r},w\right\rangle_{\mathbb{P}^{4,3}}=0,\;r=1\cdots,\bar{k}=0\\}$, there
holds
(125) $||w||^{2}_{\mathbb{P}^{4,3}}-6\sum_{i=1}^{k}\oint_{\partial
M}e^{3\hat{\delta}_{a_{i},\lambda_{i}}}w^{2}dS_{g_{a_{i}}}\geq
c_{0}||w||^{2}_{\mathbb{P}^{4,3}}.$
## References
* [1] Ahmedou M., Ndiaye C. B Morse theory and the resonant $Q$-curvature problem, Preprint: arxiv:.1409.7919.
* [2] Ahmedou, M., Kallel S., Ndiaye, C. B., The resonant boundary Q-curvature problem and boundary-weighted barycenters. Preprint: arXiv:1604.03745.
* [3] Aubin T., Some nonlinear problems in Riemannian geometry, Springer Monographs in Mathematics, Springer-Verlag, Berlin 1998.
* [4] Aubin T, Bahri A., Methods of algebraic topology for the problem of prescribed scalar curvature. J. Math. Pures Appl. (9) 76 (1997), no. 6, 525-549.
* [5] Aubin T., Bahri A., A topological hypothesis for the problem of prescribed scalar curvature. J. Math. Pures Appl. (9) 76 (1997), no. 10, 843-850.
* [6] Bahri A., Critical points at infinity in some variational problems, Research Notes in Mathematics, 182, Longman-Pitman, London, 1989.
* [7] Bahri A., Un problème variationel sans compacité dans la géométrie de contact, Comptes Rendus Mathématique Académie des Sciences, Paris, Série I 299 (1984) 754-760.
* [8] Bahri A., Pseudo-orbits of Contact Forms, Pitman Research Notes in Mathematics Series, 173. Longman Scientific & Technical, Harlow, 1988.
* [9] Bahri A., An invariant for Yamabe-type flows with applications to scalar-curvature problems in high dimension. A celebration of John F. Nash, Jr. Duke Math. J. 81 (1996), no. 2, 323-466.
* [10] Bahri A., Brezis H., Equations elliptiques non linéaires sur des variétés avec exposant de Sobolev critique. C. R. Acad. Sci. Paris Sér. I Math. 307 (1988), no. 11, 573–576.
* [11] Bahri A., Coron J.M., On a nonlinear elliptic equation involving the critical Sobolev exponent: the effect of the topology of the domain, Comm. Pure Appl. Math. 41-3 (1988), 253-294.
* [12] Bahri A., and Rabinowitz P., Periodic solutions of Hamiltonian systems of $3$-body, Ann. Inst. Poincaré, Anal. non linéaire 8(1991), 561-649.
* [13] Bahri, A., Coron, J.M., On a nonlinear elliptic equation involving the critical Sobolev exponent: the effect of the topology of the domain, Comm. Pure Appl. Math. 41-3 (1988),-294.
* [14] Branson T.P., Oersted., Explicit functional determinants in four dimensions, Proc. Amer. Math. Soc 113-3(1991), 669-682.
* [15] Bredon G.E., Topology and geometry, Graduate Texts in Mathematics, 139, 1997. cand., 57-2 (1995), 293-345.
* [16] Brendle S., Curvature flows on surfaces with boundary, Math. Ann. 324 (2002), no. 3, 491-519.
* [17] Brendle S., A family of curvature flows on surfaces with boundary, Math. Z. 241, 829-869 (2002).
* [18] Brendle S., A generalization of the Yamabe flow for manifolds with boundary. Asian J. Math. 6 (2002), no. 4, 625–644.
* [19] Brendle S., Convergence of the Yamabe flow for arbitrary initial energy, J. Diff. Geom. 69 (2005),217-278.
* [20] Brendle S., Chen S. Z., An existence theorem for the Yamabe problem on manifolds with boundary. J. Eur. Math. Soc. (JEMS) 16 (2014), no. 5, 991-1016.
* [21] Catino G., Ndiaye C. B., Integral pinching results for manifolds with boundary, Ann. Sc. Norm. Super. Pisa Cl. Sci. 9 (2010), 785-813.
* [22] Chang S.Y.A., Qing J.,., Yang P.C.,Compactification of a class of conformally flat $4$-manifold, Invent. Math. 142-1(2000), 65-93.
* [23] Chang S.Y.A., Qing J.,The Zeta Functional Determinants on manifolds with boundary 1. The Formula, Journal of Functional Analysis 147, 327-362 (1997)
* [24] Chang S.Y.A., Qing J.,The Zeta Functional Determinants on manifolds with boundary II. Extremal Metrics and Compactness of Isospectral Set, Journal of Functional Analysis 147, 363-399 (1997)
* [25] Chang S.Y.A., Qing J.,., Yang P.C.,On the Chern-Gauss-Bonnet integral for conformal metrics on ${\bf R}^{4}$, Duke Math. J.03-3(2000),523-544.
* [26] Chen C. C., Lin C. S, Topological degree for a mean field equation on Riemann surfaces, Comm. Pure, Appl. Math, 56-12 (2003), 1667-1727.
* [27] Chen, S.S., Conformal deformation on manifolds with boundary, Geom. Funct. Anal. 19 (2009), no. 4, 1029–1064.
* [28] Dold A., Algebraic topology, Lectures on algebraic topology. Reprint of the 1972 edition. Classics in Mathematics. Springer-Verlag, Berlin, 1995. xii+377 pp. ISBN: 3-540-58660-1 55-02 (01A75).
* [29] Djadli Z., Malchiodi A., Existence of conformal metrics with constant $Q$-curvature, Ann. of Math. (2) 168 (2008), no. 3, 813–858.
* [30] Druet O., Robert F., Bubbling phenomena for fourth-order four-dimensional PDEs with exponential growth, Proc. Amer. Math. Soc 134(2006) no. 3, 897-908.
* [31] Escobar J.F., The Yamabe problem on manifolds with boundary, Journal Differential Geometry 35 (1992) no.1, 21-84.
* [32] Gilbar D., Trudinger N., Elliptic Partial Differential Equations of Second Order, 2nd edition, Springr-Verlag, 1983.
* [33] Günther M., Conformal normal coordinates, Ann. Global. Anal. Geom. 11 (1993), 173-184.
* [34] Kallel S., Karoui R., Symmetric joins and weighted barycenters, Advanced Nonlinear Studies, 11(2011), 117–143.
* [35] Lee J., Parker T., The Yamabe problem, Bull. A.M.S. 17 (1987),37-81.
* [36] Lin C. S., Wei J., Sharp estimates for bubbling solutions of a fourth order mean field equation, Ann. Sc. Norm. Super. Pisa Cl. Sci. (5) 6 (2007), no. 4, 599-630.
* [37] Lucia M., A deformation lemma with an application to a mean field equation. Topol. Methods Nonlinear Anal. 30 (2007), no. 1, 113–138.
* [38] Lucia M., Orák J., A minimax theorem in the presence of unbounded Palais-Smale sequences, Israel J. Math. 172 (2009).
* [39] Malchiodi A., Morse theory and a scalar field equation on compact surfaces, Adv. Diff. Eq., 13 (2008), 1109-1129.
* [40] Malchiodi A., Compactness of solutions to some geometric fourth-order equations, J. Reine Angew. Math. 594 (2006), 137–174.
* [41] Marques F. C., Existence results for the Yamabe problem on manifolds with boundary, Indiana Univ. Math. J. (2005), 1599-1620.
* [42] Ndiaye C. B., Constant $Q$-curvature metrics in arbitrary dimension, J. Funct. Anal. 251 (2007), no. 1, 1–58. 53.
* [43] Ndiaye C.B., Conformal metrics with constant $Q$-curvature for manifolds with boundary, Comm. Anal. Geom. 16 (2008), no. 5, 1049–1124.
* [44] Ndiaye C.B., Constant $T$-curvature conformal metric on 4-manifolds with boundary, Pacific J. Math. 240 (2009), no. 1, 151-184.
* [45] Ndiaye C. B., $Q$-curvature flow on manifolds with boundary, Math. Z. 269 (2011), 83-114. .
* [46] Ndiaye C. B., Algebraic topological methods for the supercritical Q-curvature problem. Adv. Math, 277, 277, pp 56–99, 2015.
* [47] Ndiaye C. B., Topological methods for the resonant Q-curvature problem in arbitrary even dimension, Journal of Geometry and Physics, Volume 140, June 2019, Pages 178-213.
* [48] Ndiaye C. B., Xiao J, An upper bound of the total $Q$-curvature and its isoperimetric deficit for higher-dimensional conformal Euclidean metrics, Calc. Var. Partial Differential Equations, 38, no. 1-2, 1–27, 2010.
* [49] Paneitz S., A quartic conformally covariant differential operator for arbitrary pseudo-Riemannian manifolds, preprint, 1983.
* [50] Osgood B., Phillips R., Sarnak P., Extremal of determinants of Laplacians. J. Funct. Anal, 80, 148-211 (1988).
* [51] Weinstein G., Zhang L., The profile of bubbling solutions of a class of fourth order geometric equations on 4-manifolds, J. Funct. Anal. 257 (2009), no. 12, 3895–3929
| arxiv-papers | 2021-07-27T05:23:40 | 2024-09-04T03:07:20.644387 | {
"license": "Creative Commons - Attribution Share-Alike - https://creativecommons.org/licenses/by-sa/4.0/",
"authors": "Cheikh Birahim Ndiaye",
"submitter": "Cheikh Birahim Ndiaye",
"url": "https://arxiv.org/abs/2107.12608"
} |
2107.12611 | # Balancing Asymmetric Dark Matter with Baryon Asymmetry by Sphaleron
Transitions***Presented at the 1st Electronic Conference on Universe, 22–28
February 2021; Available online: https://ecu2021.sciforum.net/.
Arnab Chaudhuria†††e-mail: [email protected], Maxim Yu.
Khlopovb‡‡‡e-mail: [email protected],
a Novosibirsk State University
Pirogova ul., 2, 630090 Novosibirsk, Russia
b Institute of Physics, Southern Federal University
Stachki 194 Rostov on Don 344090, Russia
and Université de Paris, CNRS, Astroparticule et Cosmologie, F-75013 Paris,
France
and National Research Nuclear University "MEPHI", Moscow 115409, Russia
###### Abstract
The effect of the electroweak sphaleron transition in balance between baryon
excess and and the excess of stable quarks of 4th generation is studied in
this paper. Considering the non-violation of $SU(2)$ symmetry and the
conservation of electroweak and new charges and quantum numbers of the new
family, it makes possible sphaleron transitions between baryons, leptons and
4th family of leptons and quarks. In this paper, we have tried to established
a possible definite relationship between the value and sign of the 4th family
excess relative to baryon asymmetry. If $U$-type quarks are the lightest
quarks of the 4th family and sphaleron transitions provide excessive $\bar{U}$
antiquarks, asymmetric dark matter in the form of dark atom bound state of
($\bar{U}\bar{U}\bar{U}$) with primordial He nuclei is balanced with baryon
asymmetry.
## 1 Introduction
SPHALERON (or electroweak sphaleron) [1] and [2] is a static (time-
independent) solution to the electroweak field equations of the Standard Model
of the particle physics. It is involved in certain hypothetical processes that
violate baryon and lepton numbers. Such process cannot be represented by
perturbative methods (like Feynman Diagrams) and hence termed as non
perturbative.
It is possible for a sphaleron to convert baryons into antileptons and
antibaryons to leptons and thus violate the baryon number. If the density of
the sphaleron at some point high enough, they could wipe out any net excess of
baryons or anti-baryons. Sphalerons are also associated with saddle points. It
can be interpreted as the peak energy configuration. It is shown in [3, 4]
that because of this anomaly transition between vacua are associated with a
violation of Baryon (and lepton) numbers.
Even though a baryon excess can be created at the time of electroweak symmetry
breaking, it is preserved if the process happened through first order phase
transition. In second order phase transition, sphalerons can wipe out the
entire asymmetry created but in first order, only the asymmetry created in the
unbroken phase is wiped out.
The cosmological dark matter may contain dark atoms, in which new stable
charged particles are bound by ordinary Coulomb interaction, see [5, 6, 7, 8,
9]. Many models can exists in which heave $-2$ charged stable species are
predicted:
1\. AC-leptons, predicted in the extension of standard model, based on the
approach of almost-commutative geometry, see [10, Author2(year), 11, 12].
2\. Technileptons and anti-technibaryons in the framework of walking
technicolor models (WTC), see [13, 14, 15, 16, 17, 18].
3\. and, finally, stable ”heavy quark clusters” ($\bar{U}\bar{U}\bar{U}$)
formed by anti-U quark of 4th generation, see [19, 20, 21].
All these models also predict corresponding +2 charge particles. If these
positively charged particles remain free in the early Universe, they can
recombine with ordinary electrons in anomalous helium, which is strongly
constrained in the terrestrial matter. Therefore cosmological scenario should
provide a mechanism, which suppresses anomalous helium. There are two ways
this can be done:
1\. The abundance of anomalous helium in the Galaxy may be significant, but in
the terrestrial matter there exists a recombination mechanism suppressing this
abundance below experimental upper limits. The existence of a new strict U(1)
gauge symmetry, causing new Coulomb like long range interaction between
charged dark matter particles, is crucial for this mechanism. Therefore the
existence of dark radiation in the form of hidden photons is inevitable in
this approach.
2\. Free positively charged particles are already suppressed in the early
Universe and the abundance of anomalous helium in the Galaxy is negligible.
Dark matter production and the detailed study of sphaleron transition due to
walking technicolor model has already been conducted, see [17].
In this paper, we consider 4th generation of particle family with a stable
quark and neutrino family and study the sphaleron transition during
electroweak phase transition. We consider the simplest model which is charge
neutral and all the particles are stable. We also consider the simplest second
order phase tranistion. Other complicated process such as annihilation of
unstable particles and first order phase tranistion are beyond the scope of
this paper.
## 2 Calculations and Discussions
The main scope of our current activity is to deduce the relationship between
baryon excess and excess of stable fermions of 4th family. We can take for
definiteness that 4th neutrino and U-quark of 4th family are stable and
establish the relationship between their excess and excess of baryons and
leptons by sphaleron transitions. The aim is to find conditions at which
observed baryon excess corresponds to such an excess of $\bar{U}$ that
explains observed dark matter by $(\bar{U}\bar{U}\bar{U})He$ atoms.
Three elementary particle frames are established and we are interested in the
frame of a heavy quark and a heavy neutrino (neutrino with half the mass of Z
boson). A Dark matter model can be proposed which can arise from this model if
the baryon asymmetric universe with normal baryon also contains stable
antiquarks $\bar{U}$ of 4th generation.
Owing to the $\bar{{U}}$ excess only $-2$ charge or neutral hadrons are
present in the universe and ${}^{4}He$ after it is formed in Big Bang
nucleosynthesis completely screens $Q^{--}$ charged hadrons in composite
$[^{4}HeQ^{--}]$ “atoms”. These neutral primordial nuclear interacting objects
saturate the modern DM density and play an important role of the non-trivial
form of the strongly interacting dark matter.
In the given scenario with electric charge $q=2/3$, the direct experimental
lower limit for stable $U$-type quark is $m_{U}>220$ GeV. The stronger lower
limit can be estimated as $m_{U}g_{\star\epsilon}1$ TeV from search for
R-hadrons, which have similar features as single $U$ ($\bar{U}$) hadrons. Due
to the large chromo-Coulomb binding energy bound states for both particles and
antiparticles are formed (both doublets and triplets). Even though accelerator
physics excludes the formation of these bound states but they can be formed in
the early universe and strongly influence the evolution of the 4th generation
hadrons.
In the early universe an antibaryon asymmetry for the 4th generation of quarks
can be generated so that it might form a certain fraction of dark matter. It
might correspond to the modern dark matter density.
If $\epsilon(<1)$ is the fraction of dark matter then from observational data
we have $\Omega_{B}+\epsilon(1+\Omega_{DM})\approx 0.3$ which leads to
$\epsilon\approx(0.3-\Omega_{B})/\Omega_{DM}$. Introducing entropy density $s$
such that $r_{b}=n_{B}/s$ and $r_{\bar{U}}=n_{\bar{U}}/s$ it is obtained that
$r_{b}\sim 8*10^{-11}$ and $r_{\bar{U}}$ corresponds to the ${\bar{U}}$ excess
and is a function of $\epsilon$.
A new point to note: If new stable species belong to non-trivial
representation of electroweak $SU(2)$ group, sphaleron transition at high
temperature can provide a relationship between baryon asymmetry and excess of
‘-2 charged’ stable species.
If 4th family follows from string phenomenology, we have new charge associated
with 4th family fermions (which follows from rank 6 of E6 group, embedding
symmetry of the Standard model with rank 4) and this charge F should be used
instead of technibaryon number TB and technilepton number L’. In principle
there should be evidently only one conserved number F for the 4th family,
however, it may be easier to have analogy with WTC and assume two numbers FB
(for 4th quark) and L’ for (4th neutrino). Detailed calculations of WTC have
been done in [11, 17] and most of the terminology are kept same as the above
mentioned papers.
At some energy scale higher than the electroweak one, we assume the existence
of a mechanism leading to a 4th asymmetry in the Universe. Given that the 4th
and baryon number have a very similar nature such an asymmetry is very
plausible and can have a common origin.
The asymmetry generated by 4th generation above electroweak phase transition
can be destroyed by quantum anomalies. However, baryon, lepton and 4th number
are not conserved even though their differences are conserved. This fact
allows for a nonzero asymmetry to survive. The processes leading to such a
violation are termed “sphaleron” processes and at the present time are
negligible. However these processes were active during the time the Universe
had a temperature above or at the scale of the electroweak symmetry breaking.
At some points when as the Universe expands and its temperature falls the
quantum number violation ceases the effect. The relation among the particles
emerging from the process (SM + 4th generation):
$3(\mu_{u_{L}}+\mu_{d_{L}})+\mu+\mu_{U_{L}}+\mu_{D_{L}}+\mu_{L^{\prime}}=0$
(1)
$\mu$ is chemical potential summed over all standard model leptons and
$\mu_{L^{\prime}}$ is the new generation leptons (and neutrinos).
$\mu_{U_{L}}$ and $\mu_{D_{L}}$ are the chemical potential for the 4th
generation quarks. For detailed calculations and breakdown of each parameter,
see [17]. The number density follows, for fermions and bosons, respectively,
the general expression:
$n=g_{*}T^{3}\frac{\mu}{T}f(\frac{m}{T})$ (2)
and
$n=g_{*}T^{3}\frac{\mu}{T}g(\frac{m}{T})$ (3)
where $f$ and $g$ are hyperbolic functions and $g_{*}$ is the effective
degrees of freedom. They are given by:
$f(z)=\frac{1}{4\pi^{2}}\int_{0}^{\infty}x^{2}cosh^{-2}\left(\frac{1}{2}\sqrt{z^{2}+x^{2}}\right)dx$
(4)
and
$g(z)=\frac{1}{4\pi^{2}}\int_{0}^{\infty}x^{2}sinh^{-2}\left(\frac{1}{2}\sqrt{z^{2}+x^{2}}\right)dx$
(5)
The Baryon number density is defined as the following:
$B=\frac{n_{B}-n_{\bar{B}}}{gT^{2}/6}$ (6)
This normalization is used thorough out and since in the end the ratio is of
interest, this normalization cancels out.
Defining the parameter $\sigma$, respectively, for fermions and bosons:
$\sigma=6f\frac{m}{T^{*}}$ (7)
and
$\sigma=6g\frac{m}{T^{*}}$ (8)
where $T^{*}$ is the phase transition temperature and is given by the
following expression:
$T^{*}=\frac{2M_{W}(T^{*})}{\alpha_{W}ln(M_{pl}/T^{*})}B(\frac{\lambda}{\alpha_{W}})$
(9)
where $M_{W}$ is the mass of W-boson, $M_{pl}$ is the Planck mass and
$\lambda$ is the self-coupling. The function $B$ is derived from experiment
and takes the value from 1.5 to 2.7.
The new generation charge is calculated to be:
$FB=\frac{2}{3}(\sigma_{U_{L}}\mu_{U_{L}}+\sigma_{U_{L}}\mu_{D_{L}}+\sigma_{D_{L}}\mu_{D_{L}}).$
(10)
where $FB$ corresponds to the anti-U ($\bar{U}$) excess.
The standard model baryonic charge and leptonic charges are given by the
following expression:
$B=\left[(2+\sigma_{t})(\mu_{uL}+\mu_{uR})+3(\mu_{dL}+\mu_{dR})\right]$ (11)
and
$L=4\mu+6\mu_{W}$ (12)
where in Equation (11) the factor 3 of the down-type quarks is the number of
families. For the new lepton family, originating from 4th generation, we have:
$L^{\prime}=2(\sigma_{\nu^{\prime}}+\sigma_{U_{L}})\mu_{\nu^{\prime}L}+2\sigma_{U_{L}}\mu_{W}+(\sigma_{\nu^{\prime}}-\sigma_{U_{L}})\mu_{0}$
(13)
where $\nu^{\prime}$ is the new family of neutrinos originating from the
extension of standard model and $\mu_{0}$ is the chemical potential from the
Higgs sector in standard model.
In a second order phase transition we expect the violating processes to
persist below the phase transition and the equilibrium conditions are imposed
after the phase transition. If the phase diagram as function of temperature
and density of the 4th generation would be known a specific order of the
electroweak phase transition would be used. The ratio of the number densities
of 4th generation to the baryons is determined by:
$\frac{\Omega_{FB}}{\Omega_{B}}=\frac{3}{2}\frac{FB}{B}\frac{m_{FB}}{m_{p}}$
(14)
For second order phase transition, the electrical neutrality and zero chemical
potential of the Higgs. The ratio of the number density of number density of
the 4th generation to the baryon number density can be expressed as a function
of $L/B$ and $L^{\prime}/B$. In the limiting case, we get:
$-\frac{FB}{B}=\frac{\sigma_{U_{L}}}{3(18+\sigma_{\nu^{\prime}})}\left[(17+\sigma_{\nu^{\prime}})+\frac{(21+\sigma_{\nu^{\prime}})}{3}\frac{L}{B}+\frac{2}{3}\frac{9+5\sigma_{\nu^{\prime}}}{\sigma_{\nu^{\prime}}}\frac{L^{\prime}}{B}\right].$
(15)
Hence a possible relationship between the baryon excess and the excess of
$\bar{U}$ has been established in the framework of second order electroweak
phase transition.
## 3 Conclusions
It is clear from Equation (15) that a definite relationship between the value
and sign of 4th generation family excess relative to the baryon asymmetry due
to electroweak phase transition and possible sphaleron production has been
established. Dark matter candidates in the form of bounded dark atom can
emerge from this model due to the excess of $\bar{U}$ within primordial He
nuclei. We have considered only the lightest and most stable particles and
also took into account only the second order phase transition. The situation
can change more drastically if unstable particle and first order phase
transition were taken into account but those scenarios are beyond the scope of
this paper.
## 4 Author Contribution
Article by A.C. and M.K. The authors contributed equally to this work. All
authors have read and agreed to the published version of the manuscript.
## 5 Funding
The work of A.C. is funded by RSF Grant 19-42-02004. The research by M.K. was
financially supported by Southern Federal University, 2020 Project
VnGr/2020-03-IF.
## 6 Conflict of Interest
There has been no conflict of interest among the authors of this paper.
## References
* [1] Manton, N.S. Topology in the Weinberg-Salam Theory. Phys. Rev. D 2019, 28, 1983. [CrossRef]
* [2] Klinkhamer, F.R.; Manton, N.S. A saddle-point solution in the Weinberg-Salam theory. Phys. Rev. D 1984, 30, 2212–2220. [CrossRef]
* [3] Hooft, G.T. Symmetry breaking through bell-jackiw anomalies. Phys. Rev. Lett. 1976, 37, 8–11. [CrossRef]
* [4] Hooft, G.T. Computation of the quantum effects due to a four-dimensional pseudoparticle. Phys. Rev. D 1976, _14_ , 3432–3450. [CrossRef]
* [5] Khlopov, M.Y.; Mayorov, A.G.; Soldatov, E.Y. Puzzles of Dark Matter in the Light of Dark Atoms. J. Phys. Conf. Ser. 2011, 309, 012013. [CrossRef]
* [6] Khlopov, M.Y.; Mayorov, A.G.; Soldatov, E.Y. Probes for constituents of composite dark matter. Bled Work. Phys. 2010, 11, 73.
* [7] Khlopov, M.Y. Physics of dark matter in the light of dark atoms. Mod. Phys. Lett. A 2011, 26, 2823. [CrossRef]
* [8] Khlopov, M.Y. Fundamental particle structure in the cosmological dark matter. Int. J. Mod. Phys. A 2013, 28, 1330042. [CrossRef]
* [9] Belostky, K.M.; Khlopov, M.Y.; Shibaev, K.I. Probes for 4th generation constituents of dark atoms in Higgs boson studies at the LHC. Gravit. Cosmol. 2012, 18, 127. [CrossRef]
* [10] Fargion, D.; Khlopov, M.; Stephan, C.A. Dark matter with invisible light from heavy double charged leptons of almost-commutative geometry? Class. Quantum Grav. 2006, 23, 7305.
* [Author2(year)] Connes, A. Noncommutative Geometry; Academic Press: London, UK; San Diego, CA, USA, 1994.
* [11] Khlopov, M.Y.; Kouvaris, C. Strong interactive massive particles from a strong coupled theory. Phys. Rev. D 2008, 77, 065002. [CrossRef]
* [12] Sannino, F.; Tuominen, K. Orientifold theory dynamics and symmetry breaking. Phys. Rev. D 2005, 71, 051901. [CrossRef]
* [13] Hong, D.K.; Hsu, S.D.H.; Sannino, F. Composite Higgs from higher representations. Phys. Lett. B 2004, 597, 89. [CrossRef]
* [14] Dietrich, D.D.; Sannino, F.; Tuominen, K. Light composite Higgs boson from higher representations versus electroweak precision measurements: Predictions for CERN LHC. Phys. Rev. D 2005, 72, 055001. [CrossRef]
* [15] Dietrich, D.D.; Sannino, F.; Tuominen, K. Light composite Higgs and precision electroweak measurements on the Z resonance: An update. Phys. Rev. D 2006, 73, 037701. [CrossRef]
* [16] Gudnason, S.B.; Kouvaris, C.; Sannino, F. Towards working technicolor: Effective theories and dark matter. Phys. Rev. D 2006, 73, 115003. [CrossRef]
* [17] Gudnason, S.B.; Kouvaris, C.; Sannino, F. Dark matter from new technicolor theories. Phys. Rev. D 2006 74, 095008. [CrossRef]
* [18] Belotsky, K.M.; Khlopov, M.Y.; Shibaev, K.I. Stable quarks of the 4th family? In The Physics of Quarks: New Research. Horizons in World Physics; Watson, N.L., Grant, T.M., Eds.; NOVA Publishers: Hauppauge, NY, USA, 2009; Volume 265, pp. 19–47.
* [19] Khlopov, M.Y. Composite dark matter from the fourth generation. JETP Lett. 2006, 83, 1. [CrossRef]
* [20] Belotsky, K.M.; Khlopov, M.Y.; Shibaev, K.I. Stable matter of 4th generation: Hidden in the Universe and close to detection? _arXiv_ 2006, arXiv:astro-ph/0602261.
* [21] Belotsky, K.M.; Khlopov, M.Y.; Shibaev, K.I. Composite Dark Matter and its Charged Constituents. Gravitat. Cosmol. 2006, 12, 1–7. [CrossRef]
| arxiv-papers | 2021-07-27T05:47:56 | 2024-09-04T03:07:20.668928 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Arnab Chaudhuri and Maxim Yu. Khlopov",
"submitter": "Arnab Chaudhuri",
"url": "https://arxiv.org/abs/2107.12611"
} |
2107.12613 |
Iterative Reed–Muller Decoding
Marvin Geiselhart^*, Ahmed Elkelesh^*, Moustafa Ebada^*, Sebastian Cammerer^† and Stephan ten Brink^* An extended version of this paper is available [1].
^*Institute of Telecommunications, Pfaffenwaldring 47, University of Stuttgart, 70569 Stuttgart, Germany
^†NVIDIA, Fasanenstraße 81, 10623 Berlin, Germany
ECCerror-correcting code
HDDhard decision decoding
SDDsoft decision decoding
MLmaximum likelihood
GPUgraphical processing unit
BPbelief propagation
BPLbelief propagation list
LDPClow-density parity-check
HDPChigh density parity check
BERbit error rate
BPSKbinary phase shift keying
AWGNadditive white Gaussian noise
MSEmean squared error
LLRLog-likelihood ratio
LUTlook-up table
MAPmaximum a posteriori
NEnormalized error
BLERblock error rate
PEprocessing elements
SCLsuccessive cancellation list
SCsuccessive cancellation
SCANsoft cancellation
BI-DMCBinary Input Discrete Memoryless Channel
CRCcyclic redundancy check
CA-SCLCRC-aided successive cancellation list
BECBinary Erasure Channel
BSCBinary Symmetric Channel
PSCLpartitioned successive cancellation list
3GPP3rd Generation Partnership Project
eMBBenhanced Mobile Broadband
PCCparity-check concatenated
CA-polar codesCRC-aided polar codes
CNcheck node
VNvariable node
GenAlgGenetic Algorithm
AIArtificial Intelligence
MCMonte Carlo
CSIChannel State Information
PSCLpartitioned successive cancellation list
OSDordered statistic decoding
MWPC-BPminimum-weight parity-check BP
FFGForney-style factor graph
MBBPmultiple-bases belief propagation
NBPneural belief propagation
URLLCultra-reliable low-latency communications
DMCdiscrete memoryless channel
MSBmost significant bit
LSBleast significant bit
RPArecursive projection-aggregation
SGDstochastic gradient descent
Reed–Muller (RM) codes are known for their good ML performance in the short block-length regime. Despite being one of the oldest classes of channel codes, finding a low complexity soft-input decoding scheme is still an open problem. In this work, we present a belief propagation (BP) decoding architecture for RM codes based on their rich automorphism group. The decoding algorithm can be seen as a generalization of multiple-bases belief propagation (MBBP) using polar BP as constituent decoders. We provide extensive error-rate performance simulations and compare our results to existing decoding schemes. We report a near-ML performance for the RM(3,7)-code (e.g., $0.05$ dB away from the ML bound at BLER of $10^{-4}$) at a competitive computational cost.
To the best of our knowledge, our proposed decoder achieves the best performance of all iterative RM decoders presented thus far.
§ INTRODUCTION
The current trend of URLLC applications has urged the need for efficient short length coding schemes in combination with the availability of efficient decoders.
Besides many other coding schemes, this has lead to the revival of one of the oldest error-correcting codes, namely RM codes [2, 3]
– potentially also due to some existent similarities between RM codes and the newly developed family of polar codes [4, 5].
On the one hand, RM codes, as an example of algebraic codes, are known to be capacity-achieving over the BEC for a given rate [6, 7]. Moreover, and practically even more relevant, they enjoy an impressive error-rate performance under ML decoding, which also holds in the short length regime.
To this extent, several decoding algorithms have been developed in the course of RM decoding. On the other hand, to the best of our knowledge, there is still a lack of practical decoders that are characterized by near-ML performance and feasible decoding complexity/latency.
Block diagram of automorphism ensemble decoding. We focus on the case where $ M $ constituent BP decoders are used.
The usage of SC and SCL as constituent decoders is presented in the extended version of this paper [1].
RM decoders can be grouped into two main categories, iterative and non-iterative decoders which we will shortly revisit in the following.
In the literature, the best known decoder for RM codes over an AWGN channel is Dumer’s recursive list decoding algorithm [8], which is now known under the name SCL decoding [9], and a variant using permutations.
Recently, a RPA decoding algorithm for RM codes was proposed in [10], which can be viewed as a weighted BP decoder over a redundant factor graph [11], making use of the symmetry of the RM codes (i.e., its large automorphism group).
RM codes under RPA decoding were shown to outperform the error-rate performance of CRC-aided polar codes under SCL decoding.
A more general usage of the rich automorphism group of RM codes to aid the decoding process is reported in [5], along with the decoding of RM codes using a redundant parity-check matrix proposed earlier in [12].
In this work, for the sake of comparison, we consider the following iterative decoders: multiple-bases belief propagationMBBP (MBBP) decoding [13], minimum weight parity-check belief propagationMWPC-BP (MWPC-BP) decoding [14], neural belief propagationNBP (NBP) decoding [15], pruned neural belief propagation (pruned-NBP) decoding [16].
The inherent parallel nature of iterative decoders allows high throughput implementations.
Besides, their SISO nature makes them suitable for iterative detection and decoding.
In this paper, we propose a new iterative decoding scheme, extending and generalizing some of the previously mentioned decoding algorithms.
To the best of our knowledge, our proposed decoding algorithm achieves the best practical iterative decoding performance of the RM(3,7)-code presented thus far ($0.05$ dB away from the ML bound at BLER of $10^{-4}$).
Fig. <ref> shows an abstract view of our proposed decoding algorithm.
§ PRELIMINARIES
§.§ Reed–Muller Codes
We interpret each message of an RM($ r $,$ m $) code as a multi-linear polynomial $ u(\zv) $ in $ m $ binary variables $ z_j $ (with $j\in\{0,\cdots,m-1\}$) and maximum degree $ r $, over the finite field $ \FF_2 $. To obtain the codeword $ \xv $, the message polynomial is evaluated at all points in the space $ \FF_2^m $, resulting in $ N = 2^m $ codeword bits [2, 3].
§.§ Automorphism Group
The automorphism group (or permutation group) $ \operatorname{Aut}(\mathcal{C}) $ of a code $ \mathcal{C} $ is the set of permutations $ \pi $ of the codeword bit indices that map $ \mathcal{C} $ onto itself, i.e.
\begin{equation}
\pi(\xv) \in \mathcal{C} \quad \forall \xv \in \mathcal{C} \quad \forall \pi \in \operatorname{Aut}(\mathcal{C}),
\end{equation}
where $ \pi(\xv) $ results in the vector $ \xv' $ with $ x_i' = x_{\pi(i)} $. In other words, every codeword is mapped to another (not necessarily different) codeword of the same code.
The automorphism group of RM codes is well known as the general affine group GA($ m $) over the field $ \FF_2 $[17].[In this paper, we only consider the field $ \FF_2 $ and hence, we omit the size of the field in the notation, i.e., we write GA($ m $) instead of GA($ m,2 $).] GA($ m $) is the group of all affine bijections over $ \FF_2^m $, i.e., pairs $ (\Am, \bv) $ defining the mapping $ \zv' = \Am \zv + \bv $, with a non-singular matrix $ \Am \in \FF_2^{m\times m}$ and an arbitrary vector $ \bv \in \FF_2^{m\times 1} $. The vectors $ \zv$, $\zv' \in \FF_2^{m\times 1} $ are the binary representations of the code bit positions $ i $ and $ \pi(i) $, respectively, i.e., $ i = \sum_{j=0}^{m-1}{z_j \cdot 2^j} $. An important subgroup of GA($ m $) is the set of stage-shuffle permutations $ \Pi(m) $, corresponding to the special case where $ \Am $ is a permutation matrix and $ \bv=\zerov $.
§.§ Iterative RM Decoding
In this section, we briefly revise the different iterative decoding techniques which can be used for RM codes.
§.§.§ Naïve Belief Propagation Decoding
BP decoding can be performed over the Tanner graph of a code's parity-check matrix. However, for high-density parity-check codes like RM codes, the performance of this decoder is usually poor due to the numerous short cycles in the graph.
§.§.§ Belief Propagation Decoding over Forney-style Factor Graph
Rather than on a Tanner graph, BP decoding can also be performed over a FFG, constructed from check and variable nodes of degree three [18]. Fig. <ref> shows the FFG of the RM(1,3)-code.
As the frozen nodes always contribute the same LLR (i.e., a priori LLR of $ +\infty $) to the equations, the FFG can be reduced as shown on the right in Fig. <ref>, by removing edges of constant value. This potentially reduces the number of performed arithmetic operations per iteration while preserving the same performance [18]. In this work, whenever the BP decoding is used over the FFG, we use the reduced version.
Forney-style factor graph (FFG) of the RM(1,3)-code (left) and the reduced FFG (right). Note that the dashed lines indicate variables to be computed only in the right-to-left message update.
§.§.§ Minimum Weight Parity-Check Belief Propagation Decoding
Minimum weight parity-check belief propagationMWPC-BP (MWPC-BP) decoding introduced in [14] is based on the concept of iterative decoding over an overcomplete parity-check matrix. An online algorithm tailored to the noisy received sequence $ \yv $ is used to construct the overcomplete parity-check matrix only based on minimum weight parity-checks.
§.§.§ Neural Belief Propagation Decoding
Neural belief propagationNBP (NBP) decoding as introduced in [15] treats the unrolled Tanner graph of the code as a neural network (NN), while assigning trainable weights to all of its edges leading to a soft Tanner graph. These trainable weights are optimized via SGD methods.
§.§.§ Pruned Neural Belief Propagation Decoding
Pruned neural belief propagation (pruned-NBP) decoding [16] combines the idea of MWPC-BP together with NBP. To get started, a redundant parity-check matrix containing (all or some of) the minimum weight parity-checks is constructed. During the offline training phase, all edges connected to a check node are assigned a single trainable weight and the least contributing check nodes are pruned (i.e., removed) from the graph. The authors of [16] refer to this decoder as $ D_1 $. An enhanced version, decoder $ D_3 $, is the result of assigning trainable weights per edge at the expense of larger memory requirements to save all weights per edges. Furthermore, a pruned NBP decoder without any weights is introduced as $ D_2 $, however with the expense of a significant degradation in error-rate performance.
§ AUTOMORPHISM ENSEMBLE DECODING
Ensemble decoding uses multiple constituent decoders (i.e., a decoder ensemble of size $ M $) to generate a set of codeword estimates and selects one of these codewords, using a predefined metric, as the decoder output. Typically, a least-squares metric is used, as this corresponds to the ML decision for the AWGN channel. Hence, this method is also called ML-in-the-list. This can be formulated as
\begin{equation} \label{eq:mlinthelist}
\hat{\xv} = \argmin_{\hat{\xv}_j, j \in \LP 1, \dots, M\RP} \left\Vert \hat{\xv}_j - \yv \right\Vert^2 = \argmax_{\hat{\xv}_j, j \in \LP 1, \dots, M\RP} \sum_{i=0}^{N-1} \hat{x}_{j,i} \cdot y_i,
\end{equation}
where $ \hat{x}_{j,i} \in \LP \pm 1 \RP$, $\hat{\xv}_j$ is the estimated codeword from decoder $j$ for the received vector $ \yv $ and $\hat{\xv}$ is the final codeword estimate of the ensemble.
MBBP is a well-known example for ensemble decoding that uses $ M $ BP decoders, each based on a different random parity-check matrix [13]. Another instance of ensemble decoding is BPL decoding of polar codes, where the stages of the FFG are randomly permuted for each constituent decoder [19].
In this work, we propose automorphism ensemble BP decoding (Aut-$M$-BP) for RM codes. The main idea is to make use of the already existent polar BP decoder. Furthermore, we use the RM code symmetry in the decoding algorithm itself, as permuting a valid RM codeword with a permutation from the code's automorphism group results in another valid RM codeword.
An abstract view of our proposed Aut-$M$-BP decoding algorithm is shown in Fig. <ref>.
The input to the decoder is the received noisy codeword $\yv$.
We randomly sample $M$ different permutations from the RM automorphism group, where each permutation is denoted by $\pi_j$, with $j$ being the decoder index and $j \in \{1,2,\cdots,M\}$.
The $\yv$-vector is interleaved (i.e., permuted) with the $M$ different permutations $\pi_j$ leading to $M$ permuted noisy codewords $\yv'_j$, where $j \in \{1,2,\cdots,M\}$.
Now we decode every $\yv'_j$-vector independently using BP, whose output is the interleaved estimated codeword $\hat{\xv}'_j$.
A de-interleaving phase is applied to all $M$ interleaved estimated codewords $\hat{\xv}'_j$ and, thus, we have $M$ codeword estimates $\hat{\xv}_j$. Let $ \operatorname{BP}(\cdot) $ denote the BP decoding function that maps $ \yv'_j $ to $ \hat{\xv}_j' $. Then we can write the interleaved decoding as
\begin{equation}\label{eq:aut_dec}
\hat{\xv}_j = \pi^{-1}_j\left(\operatorname{BP}\left(\pi_j(\yv)\right)\right).
\end{equation}
Similar to MBBP and BPL decoding, our proposed decoding algorithm uses the ML-in-the-list picking rule according to Eq. (<ref>) to choose the most likely codeword from the list to get the final decoder output $\hat{\xv}$.
As the decoders are linear, their decoding behavior is only dependent on the noise induced by the channel, and not the choice of the transmitted codeword. Therefore, decoding using automorphisms according to Eq. (<ref>) corresponds to permuting the noise. It is reasonable to conclude that suboptimal (i.e., not ML) decoders may react differently to noise realizations in different permutations, which is exactly the property that automorphism ensemble decoding seeks to exploit.
Our proposed algorithm can be therefore seen as a natural generalization of the BPL decoder [19]: We still use $M$ parallel independent BP decoders. However, we use a more general set of permutations. It was shown in [20] that the stage-shuffling of the FFG is equivalent to a bit-interleaving operation while keeping the factor graph unchanged; these permutations correspond to the automorphism subgroup $ \Pi(m) $. In contrast, we use permutations from the whole RM code automorphism group $ \operatorname{GA}(m) $ (rather than only $\Pi(m)$, which is used in BPL decoding as proposed in [19]).
It is worth mentioning that the usage of a BP decoder as a constituent decoder has some similarities when compared to automorphism group decoding of BCH and Golay codes for the BEC [21] and for the AWGN channel [22].
Automorphism group decoding is based on permuting the received sequence exploiting automorphisms of the code while applying an iterative message passing algorithm.
BLER comparison between non SGD-optimized iterative decoders, recursive list decoding and our proposed Aut-BP decoding scheme for the RM(3,7)-code over the BI-AWGN channel.
§ RESULTS
Regarding practical applications, both error-rate performance and the computational complexity of the decoding scheme have to be considered. We compare the described decoding schemes for the RM(3,7)-code with $ N=128 $ and $ k=64 $. In the following, we specify the parameters of some of the compared decoders for reproducibility:
* MWPC-BP utilizes 5% of the minimum-weight parity-checks, as reported in [14].
* MBBP operates over $ M=60 $ randomly generated parity-check matrices with 6 iterations each.
* Neural-BP uses all 94488 minimum-weight parity-checks over 6 iterations.
* The pruned neural-BP employs on average 3% of the minimum-weight parity-checks over a total of 6 iterations. We consider the three variants of this decoder as introduced in [16], with tied weights ($ D_1 $), no weights ($ D_2 $) and free weights ($ D_3 $).
* For our proposed Aut-BP, we show results for both $ M=8 $ and $ M=32 $ randomly chosen permutations from the full automorphism group. Here, up to $ N_\mathrm{it,max} = 200 $ iterations are performed with, however, an early stopping condition (i.e., when $ \hat{\xv}=\hat{\uv}\Gm $) employed to reduce the average total number of iterations. Furthermore, the FFG have been reduced from 1792 to 1334 box-plus and addition operations per full iteration by removing operations with constant results, as presented in Section <ref>.
§.§ Error-Rate Performance
BLER comparison between SGD-optimized (NN-based) iterative decoders and Aut-BP for the RM(3,7)-code over the BI-AWGN channel. All neural-BP decoders use $ N_\mathrm{it} = 6 $ iterations.
In Fig. <ref> and Fig. <ref>, we showcase the error-rate performance of the described decoding schemes for the RM(3,7)-code over the AWGN channel using BPSK mapping. Furthermore, we show the ML performance of the code as provided by [23]. As no data beyond an SNR of 3.5 dB is available, the ML performance is estimated using order-4 OSD.
Fig. <ref> compares the non-SGD-optimized iterative decoders with Aut-BP and ML. One can observe that the naïve BP decoding suffers from a very poor performance for RM codes, compared to BP decoding over FFG. Moreover, using multiple $ \Hm $-matrices in MBBP leads to a significant enhancement in performance. All of the previous methods are outperformed by both Aut-8-BP and MWPC-BP, with similar performance. However, in the high SNR regime, Aut-8-BP beats MWPC-BP by 0.2 dB. Aut-32-BP even closes the gap to ML to less than 0.05 dB at a BLER of $ 10^{-4} $.
We further observe the gains of sampling from $ \operatorname{GA}(m) $ in Aut-BP compared to $ \Pi(m) $, as used in BPL decoding. We can see that for all ensemble sizes $ M $, sampling from $ \operatorname{GA}(m) $ consistently outperforms $ \Pi(m) $ by up to 0.3 dB. This confirms the sub-optimality of restricting the automorphisms to a small subgroup. Moreover, Aut-32-BP can even outperform SCL [9] with list size $L=32$ (i.e., SCL-32) and its permutation variant DS-32 [8] in the high SNR regime.
Fig. <ref> compares the SGD-optimized (NN-based) decoders with Aut-BP and ML. Here, the neural-BP decoder is much closer to the ML bound, and the pruned variant with free weights $ D_3 $ outperforms NBP, which uses all overcomplete parity-checks. The pruned NBP $ D_2 $ decoder without weights suffers from a significant performance degradation. Over the whole SNR range, $ D_1 $ and $ D_3 $ are outperformed by Aut-32-BP. Furthermore, it can be seen that using only $ M=8 $ parallel BP decoders (i.e., Aut-8-BP) results in a small performance degradation of less than 0.2 dB over the whole SNR range, offering an attractive trade-off for lower complexity. Simulation results for the RM(4,8)-code are presented in [1].
§.§ Iterative Decoding Complexity
Complexity comparison of different iterative decoders using basic operations weighted according to Table <ref> (e.g., weight for multiplication = 3) to reach a target BLER of $ 10^{-4} $; RM(3,7)-code; BI-AWGN channel.
For the RM(3,7)-code, we compare the complexity of the iterative decoding algorithms with error-rate performance close to ML by counting the number of computing operations required to decode one RM codeword. The first column of Table <ref> gives the list of the operations we use.[Note that these operations differ from the ETSI basic operations, as we are more interested in hardware than in software implementations.] Furthermore, as non-trivial multiplication is significantly more complex than the other considered operations, we introduce a weighting factor for multiplication $ w_\mathrm{mul}=3 $ (equivalent to the number of full-adders in a 4+1 bit fixed-point implementation) to make the comparison more fair. For all decoders, we assume that the box-plus operation is implemented as
\begin{align}
L_1 \boxplus L_2 &= \sgn(L_1) \cdot \sgn(L_2) \cdot \min(|L_1|,|L_2|) \nonumber \\
&\quad+ f_{+}(|L_1+L_2|) - f_{+}(|L_1-L_2|),
\end{align}
where $ f_{+}(|x|) = \log\LB1+\exp(-|x|)\RB$ is a correction term that can be well-approximated by a short LUT. Furthermore, CN are assumed to be efficiently implemented using the box-minus operator as
\begin{equation}
L_{j\to i} = \bigboxplus_{i' \neq i} L_{i'\to j} = \LB \bigboxplus_{i'} L_{i'\to j} \RB \boxminus L_{i\to j},
\end{equation}
with $ L_1 \boxminus L_2 = \sgn(L_2) \cdot L_1 + f_{-}(|L_1+L_2|) - f_{-}(|L_1-L_2|) $ and $ f_{-}(|x|) = \log(1-\exp(-|x|)) $ which is again implemented as a LUT as proposed in [24]. The remaining columns of Table <ref> list the number of operations of each type required for the basic building blocks of the described iterative decoding algorithms, namely box-plus evaluations, CN and VN updates, the ML-in-the-list decision and the stopping condition that is used in BPL decoding. Neural-BP, the pruned neural-BP and MWPC-BP decoding use non-trivial multiplications with the corresponding weights before the VN evaluations.
Basic operations and their usage in iterative decoding. aFor BP with weights (MWPC-BP, NBP, D1, D3).
Operation Weight 2-input $ \boxplus $ CN (deg. $ D $) VN (deg. $ D $) ML out of $ M $ FFG BP Stopping
$ \sgn(x)\cdot\sgn(y)$ 1 1 $ D-1 $ 0 0 $ m \cdot N/2 + 2N-1 $
$ \sgn(x)\cdot y$ 1 1 $ 2D-1 $ 0 $ MN $ 0
$ \min(|x|,|y|) $ 1 1 $ D-1 $ 0 0 0
$ \max(x,y) $ 1 0 0 0 $ M-1 $ 0
$ f_{\pm}(|x|) $ (LUT) 1 2 $ 4D-2 $ 0 0 0
$ x+y $, $ x-y $ 1 4 $ 8D-4 $ $ 2D $ $ M(N-1) $ 0
$ x\cdot y $ 3 0 0 [$ D+1 $]a 0 0
Weighted total - 9 $ 16D-9 $ $ 2D $ [$ +3D+3 $]a $ 2MN-1 $ $ m \cdot N/2 + 2N-1 $
Fig. <ref> shows the total number of weighted operations to decode one codeword of the RM(3,7)-code. We can see that out of all methods, neural-BP using the full overcomplete $ \Hm $-matrix has the highest complexity. The corresponding pruned decoders $ D_1 $ and $ D_3 $ result in approximately 3% of that complexity. MWPC-BP is computationally more expensive, as it uses more parity-check equations and more iterations are required to achieve a good error-rate performance. It has to be noted, however, that we only list the complexity of iterative decoding, not of (adaptively) obtaining the parity-check equations. Hence, the overall complexity of MWPC-BP is higher than the presented number. MBBP has roughly half the complexity of MWPC-BP, while Aut-32-BP without stopping condition has twice the complexity of MWPC-BP. However, when a ($ \Gm $-matrix-based) stopping condition is used, the average number of iterations of Aut-BP is significantly reduced. To illustrate this, we measure the average required number of iterations until convergence for both $ M=8 $ and $ M=32 $ with respect to the SNR of the AWGN channel, while $ N_\mathrm{it,max} = 200$. At an SNR of 3.65 dB, corresponding to the BLER of $ 10^{-4} $, each decoder of the Aut-32-BP ensemble requires an average of 4.55 iterations, making Aut-BP the least complex decoder of the compared algorithms (see Fig. <ref>), without losing any error-rate performance. Aut-8-BP requires an SNR of 3.84 dB to reach this BLER performance, however, reducing the complexity again by a factor of 4, using only 3.96 iterations on average. Note that even though the ML-in-the-list decision can be only made after all constituent decoders are terminated, terminated decoders can already start decoding the next received vector (e.g., in a super-scalar implementation).
It is also worth noting here that the approaches proposed in [16] can also profit from early stopping. However, the effect is less significant since the majority of check node evaluations are performed in the first two iterations.
Moreover, the regular structure of the FFG may result in more preferable implementations of Aut-BP compared to the random memory access patterns observed in conventional iterative decoders.
§ CONCLUSION
In this work, we propose an automorphism-based iterative decoding algorithm for RM codes.
We present near-ML error-rate performance for the RM(3,7)-code operating only $0.05$ dB away from the ML bound at BLER of $10^{-4}$.
Furthermore, we report a decoder complexity comparison for the RM(3,7)-code from an operation level perspective.
To the best of our knowledge, our proposed iterative Aut-BP decoders using the RM code automorphism group as permutations are the best iterative decoders reported in literature thus far in terms of error-rate performance.
[1]
M. Geiselhart, A. Elkelesh, M. Ebada, S. Cammerer, and S. ten Brink,
“Automorphism Ensemble Decoding of Reed–Muller Codes,” IEEE Trans.
Commun., 2021.
[2]
D. E. Muller, “Application of Boolean Algebra to Switching Circuit Design
and to Error Detection,” Transactions of the I.R.E. Professional
Group on Electronic Computers, vol. EC-3, no. 3, pp. 6–12, 1954.
[3]
I. Reed, “A class of multiple-error-correcting codes and the decoding
scheme,” Transactions of the IRE Professional Group on Information
Theory, vol. 4, no. 4, pp. 38–49, Sep. 1954.
[4]
E. Arıkan, “Channel Polarization: A Method for Constructing
Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels,”
IEEE Trans. Inf. Theory, vol. 55, no. 7, pp. 3051–3073, Jul. 2009.
[5]
N. Stolte, “Rekursive Codes mit der Plotkin-Konstruktion und ihre
Decodierung,” Ph.D. dissertation, Technische Universität Darmstadt,
Jan. 2002. [Online]. Available:
[6]
E. Abbe, A. Shpilka, and A. Wigderson, “Reed–Muller Codes for Random
Erasures and Errors,” IEEE Trans. Inf. Theory, vol. 61, no. 10, pp.
5229–5252, 2015.
[7]
S. Kudekar, S. Kumar, M. Mondelli, H. D. Pfister, E. Şaşoǧlu, and
R. Urbanke, “Reed–Muller Codes Achieve Capacity on Erasure Channels,”
IEEE Trans. Inf. Theory, vol. 63, no. 7, pp. 4298–4316, 2017.
[8]
I. Dumer and K. Shabunov, “Soft-Decision Decoding of Reed-Muller Codes:
Recursive Lists,” IEEE Trans. Inf. Theory, vol. 52, no. 3, pp.
1260–1266, Mar. 2006.
[9]
I. Tal and A. Vardy, “List Decoding of Polar Codes,” IEEE Trans. Inf.
Theory, vol. 61, no. 5, pp. 2213–2226, May 2015.
[10]
M. Ye and E. Abbe, “Recursive projection-aggregation decoding of
Reed-Muller codes,” IEEE Trans. Inf. Theory, pp. 1–1, 2020.
[11]
M. Lian, C. Häger, and H. D. Pfister, “Decoding Reed–Muller Codes Using
Redundant Code Constraints,” in IEEE Inter. Symp. Inf. Theory
(ISIT), Jun. 2020.
[12]
M. Bossert and F. Hergert, “Hard- and Soft-Decision Decoding Beyond the
Half Minimum Distance—An Algorithm for Linear Codes,” IEEE Trans.
Inf. Theory, vol. 32, no. 5, pp. 709–714, 1986.
[13]
T. Hehn, J. B. Huber, S. Laendner, and O. Milenkovic, “Multiple-Bases
Belief-Propagation for Decoding of Short Block Codes,” in IEEE Inter.
Symp. Inf. Theory (ISIT), Jun. 2007, pp. 311–315.
[14]
E. Santi, C. Häger, and H. D. Pfister, “Decoding Reed-Muller Codes
Using Minimum-Weight Parity Checks,” in IEEE Inter. Symp. Inf. Theory
(ISIT), Jun. 2018, pp. 1296–1300.
[15]
E. Nachmani, E. Marciano, L. Lugosch, W. J. Gross, D. Burshtein, and
Y. Be’ery, “Deep Learning Methods for Improved Decoding of Linear
Codes,” IEEE J. Sel. Topics Sig. Process., vol. 12, no. 1, pp.
119–131, Feb. 2018.
[16]
A. Buchberger, C. Häger, H. D. Pfister, L. Schmalen, and A. G. i Amat,
“Pruning Neural Belief Propagation Decoders,” in IEEE Inter. Symp.
Inf. Theory (ISIT), Jun. 2020.
[17]
F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting
Codes, ser. North-Holland Mathematical Library.1em plus 0.5em minus
0.4emNorth-Holland Pub. Co., 1977, no. 16.
[18]
G. D. Forney, “Codes on Graphs: Normal Realizations,” IEEE Trans.
Inf. Theory, vol. 47, no. 2, pp. 520–548, Feb. 2001.
[19]
A. Elkelesh, M. Ebada, S. Cammerer, and S. ten Brink, “Belief Propagation
List Decoding of Polar Codes,” IEEE Commun. Lett., vol. 22, no. 8,
pp. 1536–1539, Aug. 2018.
[20]
N. Doan, S. A. Hashemi, M. Mondelli, and W. J. Gross, “On the
Decoding of Polar Codes on Permuted Factor Graphs,” in IEEE Global
Commun. Conf. (GLOBECOM), Dec. 2018.
[21]
T. Hehn, O. Milenkovic, S. Laendner, and J. B. Huber, “Permutation
Decoding and the Stopping Redundancy Hierarchy of Cyclic and Extended Cyclic
Codes,” IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5308–5331,
[22]
I. Dimnik and Y. Be'ery, “Improved Random Redundant Iterative HDPC
Decoding,” IEEE Trans. Commun., vol. 57, no. 7, pp. 1982–1985, Jul.
[23]
M. Helmling, S. Scholl, F. Gensheimer, T. Dietz, K. Kraft, S. Ruzika, and
N. Wehn, “Database of Channel Codes and ML Simulation Results,”
<www.uni-kl.de/channel-codes>, 2019.
[24]
T. Clevorn and P. Vary, “The box-minus operator and its application to
low-complexity belief propagation decoding,” in IEEE 61st Veh.
Technol. Conf., vol. 1, May 2005, pp. 687–691.
| arxiv-papers | 2021-07-27T05:56:31 | 2024-09-04T03:07:20.678508 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Marvin Geiselhart, Ahmed Elkelesh, Moustafa Ebada, Sebastian Cammerer\n and Stephan ten Brink",
"submitter": "Marvin Geiselhart",
"url": "https://arxiv.org/abs/2107.12613"
} |
2107.12616 | # Observation of ballistic upstream modes at fractional quantum Hall edges of
graphene
Ravi Kumar1111equally contributed Saurabh Kumar Srivastav1222equally
contributed Christian Spånslätt2,3,4 K. Watanabe5 T. Taniguchi5 Yuval Gefen6
Alexander D. Mirlin3,4,7,8 and Anindya [email protected]
Department of Physics, Indian Institute of Science, Bangalore, 560012, India.
Department of Microtechnology and Nanoscience (MC2),Chalmers University of
Technology, S-412 96 Göteborg, Sweden.
Institute for Quantum Materials and Technologies, Karlsruhe Institute of
Technology, 76021 Karlsruhe, Germany.
Institut für Theorie der Kondensierten Materie, Karlsruhe Institute of
Technology, 76128 Karlsruhe, Germany.
National Institute of Material Science, 1-1 Namiki, Tsukuba 305-0044, Japan.
Department of Condensed Matter Physics, Weizmann Institute of Science, Rehovot
76100, Israel.
Petersburg Nuclear Physics Institute, 188300 St. Petersburg, Russia.
L. D. Landau Institute for Theoretical Physics RAS, 119334 Moscow, Russia.
The structure of edge modes at the boundary of quantum Hall (QH) phases forms
the basis for understanding low energy transport properties. In particular,
the presence of “upstream” modes, moving against the direction of charge
current flow, is critical for the emergence of renormalized modes with exotic
quantum statistics. Detection of excess noise at the edge is a smoking gun for
the presence of upstream modes. Here we report on noise measurements at the
edges of fractional QH (FQH) phases realized in dual graphite-gated bilayer
graphene devices. A noiseless dc current is injected at one of the edge
contacts, and the noise generated at contacts at $L=4\,\mu$m or $10\,\mu$m
away along the upstream direction is studied. For integer and particle-like
FQH states, no detectable noise is measured. By contrast, for “hole-conjugate”
FQH states, we detect a strong noise proportional to the injected current,
unambiguously proving the existence of upstream modes. The noise magnitude
remaining independent of length together with a remarkable agreement with our
theoretical analysis demonstrates the ballistic nature of upstream energy
transport, quite distinct from the diffusive propagation reported earlier in
GaAs-based systems. Our investigation opens the door to the study of upstream
transport in more complex geometries and in edges of non-Abelian phases in
graphene.
Introduction: Transport in integer quantum Hall (QH) states occurs through
one-dimensional edge modes located at the edge of the sample with downstream
chirality dictated by the magnetic field (Fig. 1a). This is also true for
particle-like fractional quantum Hall (FQH) states [1, 2]. By contrast, so
called “hole-conjugate” FQH states ($i+1/2<\nu<i+1$ with filling factor $\nu$
and $i$=0,1,2,..) are expected to host counter-propagating chiral edge modes
moving respectively along the downstream and upstream directions. A
paradigmatic example is the $\nu=2/3$ bulk state. MacDonald and Johnson [3, 4]
proposed that the edge supports two counter-propagating modes: a downstream
mode, $\nu=1$, and an upstream $\nu=1/3$ mode (Fig. 1b). The existence of
upstream modes is of fundamental importance and crucially affects transport
properties including electrical and thermal transport [5, 6], noise, and
particle interferometry [7, 8].
There has been an extensive effort over recent years to detect experimentally
upstream modes and their properties in GaAs/AlGaAs quantum well based 2DEG.
Two questions then come to mind. The first is whether the upstream modes can
be detected by measuring the electrical conductance. Indeed, for the hole-
conjugate $\nu=2/3$ state, and for distances much smaller than the charge
equilibration length, the two-terminal electric conductance $G$ is expected
[9] to be $4/3\frac{e^{2}}{h}$ (instead of $2/3\frac{e^{2}}{h}$), confirming
the counter propagating character of edge modes. This value was indeed
measured, but only on engineered edges at interfaces between two FQH states
[10]. In experiments on a conventional edge (the boundary of a $\nu=2/3$ FQH
state), $G=2/3\frac{e^{2}}{h}$ is found to be robust and essentially equal to
the filling factor $\nu=2/3$, implying that charge propagates only downstream
direction; one cannot tell anything about the presence or absence of upstream
modes [9, 11, 12]. The second question is whether the upstream mode can be
detected by measuring the thermal conductance. Thermal transport on an edge
may be qualitatively different from charge transport [9, 11]. Even if charge
propagates only downstream, energy may propagate upstream. Measurements of
thermal conductance $G_{Q}$ at $\nu=2/3$ and related fillings yielded results
fully consistent with the theory expected from hole-conjugated character of
these states with upstream modes [13, 14, 15, 16]. Still, measurements of
$G_{Q}$ do not prove unambiguously the existence of upstream modes. Ideally,
for $\nu=2/3$, hole-conjugate state with counter-propagating 1 and 1/3 modes
is favored by particle-hole symmetry, which is however only approximate in any
realistic situation. Note, however, that an edge with two co-propagating
$\nu=1/3$ modes is a fully legitimate candidate [2, 1] too. Such a model would
be consistent not only with measured electrical conductance
$G=2/3\frac{e^{2}}{h}$ but also with the thermal conductance measurements
reported in Ref. [15]. On a broader scope, several alternative approaches
attempting to establish the presence of upstream current of heat at edges of a
variety of FQH states in GaAs/AlGaAs structures were employed in Refs. [17,
18, 19, 20, 21]. Those studies used structures involving quantum point
contacts or quantum dots. It is also worth noting that candidates to the non-
Abelian $\nu=5/2$ state possess different number of upstream modes, and
intensive current efforts aim at understanding which of them is actually
realized in experiment [14, 22, 23, 24, 25, 26, 27].
Figure 1: Edge profile, Device schematic, Hot spot, Noise spot, and QH
response. (a) and (b) show the density profile at the edge of a sample with
co-propagating and counter-propagating edge structures for $\nu=2$ and for
hole-conjugate $\nu=2/3$ states, respectively. x is a coordinate across the
edge. Downstream modes are red, while upstream modes are black. (c) Schematic
of device and measurement setup, where the device is set into $\nu=2/3$ FQH
state. A noiseless dc current is injected at contact C and terminates into
cold ground (CG) contact D. The upstream mode carry the heat from the hot spot
near the contact C and create the noise spot at the contact B, which is
measured at a frequency of $\sim$770 kHz using a LCR resonance circuit
followed by amplifier chain and spectrum analyzer. (d) Transverse Hall
resistance ($R_{xy}$) and longitudinal resistance ($R_{xx}$) of the device-1
at $10$ T.
The emergence of the two-dimensional graphene platform opened up a new era in
the study of FQH physics [28, 29], with different Landau level structure (as
compared with traditional GaAs heterostructures), new fractions, and enriched
family of quantum-Hall states due to an interplay of spin, orbital, and valley
degrees of freedom [30, 31, 32, 33, 34, 35]. Furthermore, graphene features an
unprecedented sharp confining potential and is thus expected to exhibit bulk-
edge correspondence without additional complex edge reconstruction [36, 37].
Also, in view of the sharp edge, one expects strong interaction between the
edge modes in graphene, which may give access to regimes that are difficult to
reach in GaAs structures. Remarkably, for graphene or graphene-based hybrid
structures, no direct evidence for the presence of upstream modes has so far
been reported. Here, we, for the first time, report a smoking gun signature of
upstream modes for hole-conjugate FQH states in graphene and identify their
nature, employing noise spectroscopy, which is a purely electrical tool. The
essence of our approach is as follows [38]. When a bias is applied to a FQH
edge segment, the Joule heat is dissipated at the “hot spots” as shown in Fig.
1c. In the presence of upstream modes, heat is transported upstream to the so-
called noise spot (Fig. 1c), where the heat partitions the charge current and
thereby generates noise.
We have carried out electrical conductance together with noise measurements at
integer QH states, electron-like state $\nu=1/3$ and hole-conjugate states
$\nu=2/3$ and $\nu=3/5$, realized in a dual graphite-gated hexagonal-boron-
nitride (hBN)-encapsulated high-mobility bilayer graphene (BLG) devices in a
cryo-free dilution fridge at base temperature of $\sim 20$ mK (electron
temperature $\sim 28$ mK). For $\nu=1/3$ state and integer QH states, we do
not detect any excess noise along the upstream direction. This is expected,
because the corresponding edge states do not host upstream modes. By contrast,
for $\nu=2/3$ and $\nu=3/5$ FQH states, a finite noise is detected which
increases with increasing injected current. At the same time, the averaged
current in upstream direction is zero. Thus, noise detection unambiguously
demonstrates that upstream modes exist for the hole-conjugate FQH states in
graphene and only carry heat energy. Moreover, the magnitude of the noise
remains constant for two different lengths $L=10\,\mu$m and $4\,\mu$m between
the current injecting contact and noise detection point in the same device.
Moreover, our experimentally measured noise magnitude matches remarkably well
with our theoretical analysis. This conclusively demonstrates the ballistic
nature of upstream modes, implying the absence of thermal equilibration on the
length scales employed in the experiment.
Figure 2: Noise data (a) and (b) show the noise detection scheme of the
device-1 while the current is injected at contact C and contact A,
respectively. (c) Differential bias response of $\nu=2/3$ state, where a 100
pA AC signal on top of the DC bias current is injected at contact C and the
voltages are measured at contact C ($V_{C}$) and B ($V_{B}$) using Lock-In
amplifier. (d) Noise measured along the upstream direction for longer length
($10\,\mu$m) as shown in Fig. 2a for $\nu=1$ (brown circles), $\nu=1/3$ (olive
circles) and $\nu=2/3$ (blue circles). The magenta open circles are the
measured noise along the upstream direction for shorter length ($4\,\mu$m) by
reversing the magnetic field (opposite chirality), and injecting current at
contact A and measured noise at contact B (see SM,S4). The solid black line is
the theoretically calculated noise. (e) Noise measured along the downstream
direction for $\nu=2/3$ for the scheme shown in Fig. 2b.
Experiment: We turn now to a more detailed exposition of our results from two
devices. The device schematic and noise measurement set-up is shown in Fig.
1c. The device fabrication details are mentioned in the method section and
Supplementary Material (SM, S1). First, we perform electrical conductance
measurements at a fixed magnetic field of $10$ T using standard lock-in
amplifier. The electron density is tuned by the back graphite gate, keeping
the top graphite gate fixed at zero voltage. The measured transverse Hall
resistance ($R_{xy}$) and longitudinal resistance ($R_{xx}$) of device-1 are
shown in Fig. 1d for $\nu\leq 1$. Clear plateaus in $R_{xy}$ are developed for
$\nu=1$, $\nu=2/3$, and $\nu=1/3$, accompanied with zeroes in $R_{xx}$ at the
same gate voltage. Similarly, for $\nu=1$, $\nu=2/3$, $\nu=3/5$ and $\nu=1/3$
for device-2, see SM (S7). Next, we perform noise measurements at $\nu=2/3$,
$\nu=1/3$, and integer QH states for two different lengths $L=10\,\mu$m and
$4\,\mu$m of device-1. The Measurement scheme for $L=10\,\mu$m is shown in
Fig. 2a, where the device is set into $\nu=2/3$ QH state with $d$ and $u$
representing counter-propagating downstream and upstream eigenmodes. The
measurement scheme for shorter length $L=4\,\mu$m is obtained in the same
device by changing the chirality (see SM, S4). Before the noise measurements,
we perform two crucial checks: bias-dependent response of the $\nu=2/3$ FQH
state and chirality of charge transport. For this, a 100 pA AC signal is
injected on top of the DC bias current at contact C, keeping contact D at
ground, and the AC voltage at contacts C and B is measured. The voltage at
contact C, shown as $V_{C}$ in Fig. 2c, remains flat as a function of the DC
bias current, which means the conductance of the $\nu=2/3$ state does not
change with the bias current. This kind of response, implying that there is no
transport through the bulk (via states above the bulk gap), is a prerequisite
check for the noise measurements. This is in full consistency with the value
of the gap of $\nu=2/3$ at 10 T, which is around 5 K as determined from the
activation plot of $R_{xx}$ (see SM, S6), i.e., well above our largest bias
voltage. Further, no detectable voltage is measured at contact B (shown as
$V_{B}$ in Fig. 2c), which demonstrates that the charge propagates downstream
only. Similar results are obtained for the shorter length ($4\,\mu$m) (see SM,
S4). Thus, if our $\nu=2/3$ edge hosts counter-propagating modes (which is
demonstrated below), the charge equilibration length is much smaller than the
size of our device.
To unambiguously demonstrate the existence of upstream mode, a noiseless dc
current is injected at contact C, and noise $S_{I}$ is measured at contact B
along the upstream direction. For the noise measurement, a LCR resonant
circuit with resonance frequency of $\sim$770 kHz is utilized together with an
amplifier chain and a spectrum analyzer (see methods and SM(S1)) [39, 40, 41,
42]. In the absence of an upstream mode, the energy cannot flow from the hot
spot near C to the noise spot near B, see Fig. 2a, so that no noise is
expected. This is precisely what is observed for $\nu=1$ and $\nu=1/3$ states,
see Fig. 2d. At the same time, it is shown in Fig. 2d that for the $\nu=2/3$
state there is a strong noise which increases almost linearly with current.
This is quite striking as at contact B the time-averaged current is zero. This
clearly demonstrates that the $\nu=2/3$ edge hosts an upstream mode that leads
to an upstream propagation of energy, even though the charge propagates
downstream only. The mechanism of the noise generation is as follows [38]. The
heat propagating upstream from the hot spot near C reaches the noise spot near
B, inducing there creation of particle-hole pairs propagating in opposite
directions. If the particle (or hole) is absorbed at contact B, while the hole
(or, respectively, particle) flows downstream, there will be a voltage
fluctuation at B detected by our noise measurement scheme. Similarly, the
noise along the upstream direction is detected for $\nu=2/3$ and $\nu=3/5$ of
device-2 as shown in SM(S7).
To verify that the heat propagates from the hot spot to the noise spot
entirely via the edge, we have measured the noise in an alternative
configuration. In this setting, a noiseless dc current is injected at contact
A, while the contact C is electrically floating as shown in Fig. 2b. In this
situation, in order to induce the noise, the heat would have to propagate
upstream from the hot spot near D to the noise spot near B. However, this path
is “cut” by the metallic contact C held at the base temperature. Thus, the
only way for the heat to propagate is via the bulk. As shown in Fig. 2e, no
detectable noise is measured at contact B, which rules out any sizeable bulk
conduction of heat in our device.
Figure 3: Temperature dependence of the noise. (a) Noise along the upstream
direction at $\nu=2/3$ for different bath temperatures. (b) Noise value at
$I_{S}=1$ nA plotted against temperature for $4\,\mu$m (red circles) and
$10\,\mu$m (blue circles) lengths.
To inspect the length dependence of the noise, we have also studied it for
$L=4\,\mu$m of the same device-1 (see SM, S4). The data are shown in Fig. 2d.
It can be seen that the noise amplitude is nearly identical for $L=10\,\mu$m
and $4\,\mu$m. This is striking since it shows that the heat propagates
upstream ballistically and without losses along the $\nu=2/3$ edge, from the
hot spot to the noise spot. There are two distinct mechanisms that could
suppress the heat propagation and thus the noise: (i) thermal equilibration
between the counter-propagating modes [9, 11, 43, 38] and (ii) dissipation of
energy from the edge to other degrees of freedom, including phonons, photons,
and Coulomb-coupled localized states [44, 45, 46]. Our results show that none
of these mechanisms is operative at $T\sim 20$ mK on the length scale of
$L=10\,\mu$m. The absence of thermal equilibration on the edge is in a
striking contrast with the very efficient electric equilibration emphasized
above.
Up to now, all the data were at $T\sim 20$ mK. Now, we explore the effect of
temperature. Figure 3a shows the evolution of the $\nu=2/3$ noise at
$L=4\,\mu$m with increasing $T$. In Fig. 3b we display the temperature
dependence of the noise for $L=4\,\mu$m and $L=10\,\mu$m at $1nA$ current. It
is seen that the noise remains constant and equal for both lengths up to
$T=50$ mK. For higher temperature, the noise decays with $T$, and the decay is
substantially faster for the larger $L$. This decay can be attributed to one
of two mechanisms mentioned above: thermal equilibration within the edge
(which would imply a crossover from ballistic to diffusive regime of heat
flow) or loss of heat to the bulk. Further work is needed to understand which
of them is dominant.
Our experiments thus clearly indicate that at low temperatures, $T\leq 50$ mK,
the upstream heat transport is ballistic and lossless. To support this
conclusion, we have calculated theoretically the expected noise $S_{I}$ on the
$\nu=2/3$ edge in this regime. The theory extends that of Refs. [43, 38] to
the ballistic (rather than diffusive) regime of heat transport corresponding
to vanishing thermal equilibration. In this regime, the backscattering of heat
takes place only at interfaces with the contact regions [9, 16]. We assumed
the bias voltage $V=(3h/2e^{2})I_{SD}$ to be much larger than $T$, which is
well fulfilled for our typical current $I_{SD}\sim 1nA$. The result (see
method section and SM (S9) for detail)
$S_{I}=0.146\,eI_{SD}$ (1)
is shown in Fig. 2d and is an excellent agreement with the experimental data,
thus giving a further strong support to our interpretation of the experiment.
Discussion: Our measurements of noise present an unambiguous demonstration of
the presence of an upstream mode in $\nu=2/3$ and $\nu=3/5$ FQH edges in
graphene. This mode is responsible for the upstream heat transport that is at
the heart of the noise generation mechanism. Remarkably, the noise is
temperature-independent for $T\leq 50$ mK and remains the same for $L=4\,\mu$m
and $L=10\,\mu$m, demonstrating the ballistic and lossless character of heat
transport. The ballistic heat transport implies the absence of thermal
equilibration on the edge, in contrast to full charge equilibration revealed
by electric conductance measurements. This is entirely consistent with the
data of Ref. [15] on thermal conductance in graphene. There, a dramatic
difference between the charge and heat equilibration lengths was explained by
the vicinity of a system to a strong-interaction fixed point, where the bare
modes of the $\nu=2/3$ edge are renormalized into a charge and a neutral mode.
Very recently, absence of thermal equilibration (notwithstanding very
efficient electric equilibration) was also reported for GaAs samples [16].
## References
* [1] Beenakker, C. Edge channels for the fractional quantum hall effect. _Physical review letters_ 64, 216 (1990).
* [2] Wen, X.-G. Chiral luttinger liquid and the edge excitations in the fractional quantum hall states. _Physical Review B_ 41, 12838 (1990).
* [3] MacDonald, A. H. Edge states in the fractional-quantum-hall-effect regime. _Phys. Rev. Lett._ 64, 220–223 (1990).
* [4] Johnson, M. & MacDonald, A. Composite edges in the $\nu$= 2/3 fractional quantum hall effect. _Physical Review Letters_ 67, 2060 (1991).
* [5] Altimiras, C. _et al._ Chargeless heat transport in the fractional quantum hall regime. _Physical review letters_ 109, 026803 (2012).
* [6] Jezouin, S. _et al._ Quantum limit of heat flow across a single electronic channel. _Science_ 342, 601–604 (2013).
* [7] Ji, Y. _et al._ An electronic mach–zehnder interferometer. _Nature_ 422, 415–418 (2003).
* [8] Nakamura, J. _et al._ Aharonov–bohm interference of fractional quantum hall edge modes. _Nature Physics_ 15, 563–569 (2019).
* [9] Protopopov, I., Gefen, Y. & Mirlin, A. Transport in a disordered $\nu$= 2/ 3 fractional quantum hall junction. _Annals of Physics_ 385, 287–327 (2017).
* [10] Cohen, Y. _et al._ Synthesizing a $\nu$=2/3 fractional quantum hall effect edge state from counter-propagating $\nu$=1 and $\nu$=1/3 states. _Nature Communications_ 10, 1920 (2019).
* [11] Nosiglia, C., Park, J., Rosenow, B. & Gefen, Y. Incoherent transport on the $\nu$= 2/3 quantum hall edge. _Physical Review B_ 98, 115408 (2018).
* [12] Spånslätt, C., Gefen, Y., Gornyi, I. & Polyakov, D. Contacts, equilibration, and interactions in fractional quantum hall edge transport. _arXiv preprint arXiv:2105.04013_ (2021).
* [13] Banerjee, M. _et al._ Observed quantization of anyonic heat flow. _Nature_ 545, 75–79 (2017).
* [14] Banerjee, M. _et al._ Observation of half-integer thermal hall conductance. _Nature_ 559, 205–210 (2018).
* [15] Srivastav, S. K. _et al._ Vanishing thermal equilibration for hole-conjugate fractional quantum hall states in graphene. _Physical Review Letters_ 126, 216803 (2021).
* [16] Melcer, R. A. _et al._ Absent thermal equilibration on fractional quantum hall edges over macroscopic scale. _arXiv preprint arXiv:2106.12486_ (2021).
* [17] Bid, A. _et al._ Observation of neutral modes in the fractional quantum hall regime. _Nature_ 466, 585–590 (2010).
* [18] Dolev, M. _et al._ Characterizing neutral modes of fractional states in the second landau level. _Phys. Rev. Lett._ 107, 036805 (2011).
* [19] Gross, Y., Dolev, M., Heiblum, M., Umansky, V. & Mahalu, D. Upstream neutral modes in the fractional quantum hall effect regime: Heat waves or coherent dipoles. _Phys. Rev. Lett._ 108, 226801 (2012).
* [20] Venkatachalam, V., Hart, S., Pfeiffer, L., West, K. & Yacoby, A. Local thermometry of neutral modes on the quantum hall edge. _Nature Physics_ 8, 676–681 (2012).
* [21] Gurman, I., Sabo, R., Heiblum, M., Umansky, V. & Mahalu, D. Extracting net current from an upstream neutral mode in the fractional quantum hall regime. _Nature Communications_ 3, 1289 (2012).
* [22] Ma, K. K. & Feldman, D. Partial equilibration of integer and fractional edge channels in the thermal quantum hall effect. _Physical Review B_ 99, 085309 (2019).
* [23] Asasi, H. & Mulligan, M. Partial equilibration of anti-pfaffian edge modes at $\nu$= 5/2. _Physical Review B_ 102, 205104 (2020).
* [24] Simon, S. H. & Rosenow, B. Partial equilibration of the anti-pfaffian edge due to majorana disorder. _Physical review letters_ 124, 126801 (2020).
* [25] Park, J., Spånslätt, C., Gefen, Y. & Mirlin, A. D. Noise on the non-abelian $\nu$= 5/2 fractional quantum hall edge. _Physical review letters_ 125, 157702 (2020).
* [26] Dutta, B. _et al._ Novel method distinguishing between competing topological orders. _arXiv preprint arXiv:2101.01419_ (2021).
* [27] Yutushui, M., Stern, A. & Mross, D. F. Identifying the $\nu$= 5/2 topological order through charge transport measurements. _arXiv preprint arXiv:2106.07667_ (2021).
* [28] Li, J. _et al._ Even-denominator fractional quantum hall states in bilayer graphene. _Science_ 358, 648–652 (2017).
* [29] Kim, Y. _et al._ Even denominator fractional quantum hall states in higher landau levels of graphene. _Nature Physics_ 15, 154–158 (2019).
* [30] Yang, K., Sarma, S. D. & MacDonald, A. Collective modes and skyrmion excitations in graphene s u (4) quantum hall ferromagnets. _Physical Review B_ 74, 075423 (2006).
* [31] Sodemann, I. & MacDonald, A. H. Broken su (4) symmetry and the fractional quantum hall effect in graphene. _Physical review letters_ 112, 126804 (2014).
* [32] Kharitonov, M. Phase diagram for the $\nu$= 0 quantum hall state in monolayer graphene. _Physical Review B_ 85, 155439 (2012).
* [33] Weitz, R. T., Allen, M., Feldman, B., Martin, J. & Yacoby, A. Broken-symmetry states in doubly gated suspended bilayer graphene. _Science_ 330, 812–816 (2010).
* [34] Young, A. F. _et al._ Spin and valley quantum hall ferromagnetism in graphene. _Nature Physics_ 8, 550–556 (2012).
* [35] Kumar, C., Srivastav, S. K. & Das, A. Equilibration of quantum hall edges in symmetry-broken bilayer graphene. _Physical Review B_ 98, 155421 (2018).
* [36] Li, G., Luican-Mayer, A., Abanin, D., Levitov, L. & Andrei, E. Y. Evolution of landau levels into edge states in graphene. _Nature communications_ 4, 1–7 (2013).
* [37] Hu, Z.-X., Bhatt, R. N., Wan, X. & Yang, K. Realizing universal edge properties in graphene fractional quantum hall liquids. _Physical review letters_ 107, 236806 (2011).
* [38] Spånslätt, C., Park, J., Gefen, Y. & Mirlin, A. D. Topological classification of shot noise on fractional quantum hall edges. _Physical review letters_ 123, 137701 (2019).
* [39] Srivastav, S. K. _et al._ Universal quantized thermal conductance in graphene. _Science advances_ 5, eaaw5798 (2019).
* [40] Sahu, M. R. _et al._ Enhanced shot noise at bilayer graphene–superconductor junction. _Physical Review B_ 100, 235414 (2019).
* [41] Paul, A. K. _et al._ Interplay of filling fraction and coherence in symmetry broken graphene pn junction. _Communications Physics_ 3, 1–7 (2020).
* [42] Sahu, M. R. _et al._ Quantized conductance with non-zero shot noise as a signature of andreev edge state. _arXiv preprint arXiv:2105.13070_ (2021).
* [43] Park, J., Mirlin, A. D., Rosenow, B. & Gefen, Y. Noise on complex quantum hall edges: Chiral anomaly and heat diffusion. _Phys. Rev. B_ 99, 161302 (2019).
* [44] Schmidt, D., Schoelkopf, R. & Cleland, A. Photon-mediated thermal relaxation of electrons in nanostructures. _Physical review letters_ 93, 045901 (2004).
* [45] Gutman, D. B. _et al._ Energy transport in the anderson insulator. _Phys. Rev. B_ 93, 245427 (2016).
* [46] Rosenblatt, A. _et al._ Energy relaxation in edge modes in the quantum hall effect. _Physical Review Letters_ 125, 256803 (2020).
* [47] Purdie, D. _et al._ Cleaning interfaces in layered materials heterostructures. _Nature communications_ 9, 1–12 (2018).
* [48] Pizzocchero, F. _et al._ The hot pick-up technique for batch assembly of van der waals heterostructures. _Nature communications_ 7, 1–10 (2016).
* [49] Kim, Y., Herlinger, P., Taniguchi, T., Watanabe, K. & Smet, J. H. Reliable postprocessing improvement of van der waals heterostructures. _ACS nano_ 13, 14182–14190 (2019).
* [50] Kane, C., Fisher, M. P. & Polchinski, J. Randomness at the edge: Theory of quantum hall transport at filling $\nu$= 2/3. _Physical review letters_ 72, 4129 (1994).
## 1 Methods
### 1.1 Device fabrication and measurement scheme:
For making encapsulated devices, we used standard dry transfer pick-up
technique [47, 48]. Fabrication of these heterostructures involved mechanical
exfoliation of hBN and graphite crystals on oxidized silicon wafer using the
widely used scotch-tape technique. BLG and graphite flakes were exfoliated
from natural graphite crystals. Suitable flakes were identified under the
optical microscope. The thickness of top and bottom graphite were $\sim 5\,$nm
and $\sim 20\,$nm, respectively, and the thickness of of the top and bottom
hBN flakes were of the order of $\sim 20\,$nm. The smaller distance between
graphite gate and BLG layer ($\sim 20\,$nm thick bottom hBN) was similar range
to the magnetic length scale of our experiment at $10$T, implying a sharp
confining potential at the physical edge of BLG. Details of the fabrication
procedure are in SM(S1). The BLG channel area of the stack was microscopically
ironed using an AFM (atomic force microscopy) tip in contact mode [49], to
remove any atomic level strain or ripples or small bubbles from the channel
area, which can arise due to stacking process. After this, for making contacts
we used electron beam lithography (EBL). After EBL, reactive ion etching
(mixture of CHF3 and O2 gas) was used to define the edge contact. Then,
thermal deposition of Cr/Pd/Au (4/12/60 nm) was done in a evaporator chamber
having base pressure of $\sim$ $1-2\times 10^{-7}$ mbar. The optical image of
the two measured devices are shown in SM(S1). The schematic of the device and
measurement set-up are shown in Fig. 1(c). All the measurements are done in a
cryo-free dilution refrigerator having base temperature of $\sim 20$mK. The
electrical conductance was measured using standard Lock-in technique. For
$R_{xy}$, an ac current is injected at contact C (Fig. 1c), contact A is kept
at ground, and we measure the potential difference across the contacts D and
B. For $R_{xx}$, we inject current at C, contact D is kept at ground, and we
measure the potential difference across the contacts A and B. The resistance
value of $R_{xy}$ for $\nu=2/3$ is $\approx 39k\Omega=(3/2)h/e^{2}$, implying
full charge equilibration among the counter-propagating eigenmodes. Under no
charge equilibration, one would get very different value of the resistance
according to Landauer-Buttiker formalism, see SM(S8) for detail. The noise is
measured employing noise thermometry based on LCR resonant circuit at
resonance frequency of $\sim 770$kHz and amplified by home made preamplifier
at 4K followed by room temperature amplifier, and finally measured by a
spectrum analyzer. The details of the noise measurement technique is mentioned
in the SM(S1).
### 1.2 Theoretical calculation of noise:
We assume the regime of strong charge equilibration along the edge segment,
i.e., $L\gg l^{C}_{\rm eq}$, where $l^{C}_{\rm eq}$ is the charge
equilibration length. Then, the dc noise $S$ generated due to inter-mode
tunneling along this segment is given by
$\displaystyle S$ $\displaystyle=\frac{2e^{2}}{hl^{C}_{\rm
eq}}\frac{\nu_{-}}{\nu_{+}}(\nu_{+}-\nu_{-})\int_{0}^{L}dx\;\Lambda(x)e^{-\frac{2x}{l^{C}_{\rm
eq}}}.$
Here, $h$ is the Planck constant, and $\nu_{+}$ and $\nu_{-}$ are the total
filling factors associated with the downstream and upstream edge modes,
respectively, with the bulk filling factor $\nu=\nu_{+}-\nu_{-}$. The
exponential factor in the integral is a result of chiral charge transport,
$\nu_{+}\neq\nu_{-}$, and implies that the dominant noise contribution comes
from the noise spot—a region of size $\sim l^{C}_{\rm eq}$ near the contact
that is located on the upstream side of the segment (the voltage probe where
the noise is measured).
The noise kernel $\Lambda(x)$ is calculated by assuming a thermally non-
equilibrated regime. In this case, $\Lambda$ becomes $x$-independent within
the edge segment, so that the $x$-integral is straightforwardly calculated,
yielding for the $\nu=2/3$ edge the noise
$\displaystyle S_{2/3}=\frac{2e^{2}}{9h}\Lambda(V,\Delta)\,,$
where the dependence of $\Lambda$ on the bias voltage $V$ and the interaction
between edge modes (parameter $\Delta$) is noted. We take $\Delta\approx 1$,
which corresponds to the strong-interaction fixed point [50], at which the
heat equilibration length is much larger than the charge equilibration length
[15], as observed experimentally. To determine the dependence of $\Lambda$ on
the voltage, we first calculate effective temperatures of the downstream and
upstream modes on the edge. They are found from the system of energy balance
equations that include the Joule heating at the hot spot as well as a partial
reflection of heat at interfaces between the interacting segment of the edge
and the contact region. The contacts are modelled in terms of non-interacting
1 and 1/3 modes (see SM,S9). For $\Delta=1$, the corresponding reflection
coefficient is $\mathcal{R}=1/3$. The resulting temperatures of the modes are
$\displaystyle k_{B}T_{+}=0.13eV\,,\qquad\qquad k_{B}T_{-}=0.23eV\,.$
The noise kernel $\Lambda$ is now calculated by using the Green’s function
formalism for the chiral Luttinger liquid and the Keldysh technique.
Expressing the result in terms of the bias current $I_{SD}=(2e^{2}/3h)V$, we
come to the final result given by Eq. (1) of the manuscript. An analogous
calculation for $\nu=3/5$ edge yields $S_{I}=0.138\,eI_{SD}$, which is in a
very good agreement with experiment too (see SM,S9).
## 2 Acknowledgements
C.S., Y.G., and A.D.M. acknowledge support by DFG Grants MI 658/10-1 and MI
658/10-2, and by the German-Israeli Foundation Grant No. I-1505-303.10/2019.
Y.G. acknowledges support by the Helmholtz International Fellow Award, and by
DFG RO 2247/11-1, and CRC 183 (project C01), and the Minerva Foundation. C.S.
further acknowledges funding from the Excellence Initiative Nano at Chalmers
University of Technology. K.W. and T.T. acknowledge support from the Elemental
Strategy Initiative conducted by the MEXT, Japan and the CREST (JPMJCR15F3),
JST. A.D. thanks the Department of Science and Technology (DST), India for
financial support (DSTO-2051) and acknowledges the Swarnajayanti Fellowship of
the DST/SJF/PSA-03/2018-19. R.K. and S.K.S acknowledge Inspire fellowship, DST
and Prime Minister’s Research Fellowship (PMRF), Ministry of Education (MOE),
for financial support, respectively.
## 3 Author contributions
R.K. and S.K.S. contributed to device fabrication, data acquisition and
analysis. A.D. contributed in conceiving the idea and designing the
experiment, data interpretation and analysis. K.W and T.T synthesized the hBN
single crystals. C.S., A.D.M. and Y.G. contributed in development of theory,
data interpretation, and all the authors contributed in writing the
manuscript.
See pages - of Suplementary_Information.pdf
| arxiv-papers | 2021-07-27T06:09:52 | 2024-09-04T03:07:20.690367 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Ravi Kumar, Saurabh Kumar Srivastav, Christian Sp{\\aa}nsl\\\"att, K.\n Watanabe, T. Taniguchi, Yuval Gefen, Alexander D. Mirlin, and Anindya Das",
"submitter": "Ravi Kumar",
"url": "https://arxiv.org/abs/2107.12616"
} |
2107.12617 | # VIPose: Real-time Visual-Inertial 6D Object Pose Tracking
Rundong Ge and Giuseppe Loianno The authors are with the New York University,
Tandon School of Engineering, Brooklyn, NY 11201, USA. email: {rundong.ge,
loiannog}@nyu.edu.This work was supported by Qualcomm Research, the Technology
Innovation Institute, Nokia, NYU Wireless, and the young researchers program
”Rita Levi di Montalcini” 2017 grant PGR17W9W4N.
###### Abstract
Estimating the 6D pose of objects is beneficial for robotics tasks such as
transportation, autonomous navigation, manipulation as well as in scenarios
beyond robotics like virtual and augmented reality. With respect to single
image pose estimation, pose tracking takes into account the temporal
information across multiple frames to overcome possible detection
inconsistencies and to improve the pose estimation efficiency. In this work,
we introduce a novel Deep Neural Network (DNN) called VIPose, that combines
inertial and camera data to address the object pose tracking problem in real-
time. The key contribution is the design of a novel DNN architecture which
fuses visual and inertial features to predict the objects’ relative 6D pose
between consecutive image frames. The overall 6D pose is then estimated by
consecutively combining relative poses. Our approach shows remarkable pose
estimation results for heavily occluded objects that are well known to be very
challenging to handle by existing state-of-the-art solutions. The
effectiveness of the proposed approach is validated on a new dataset called
VIYCB with RGB image, IMU data, and accurate 6D pose annotations created by
employing an automated labeling technique. The approach presents accuracy
performances comparable to state-of-the-art techniques, but with the
additional benefit of being real-time.
## I Introduction
Tracking the 6D pose of objects from RGB image sequences, (i.e., estimating 3D
translation and rotation of objects with respect to the camera in each frame),
is an important task in various robotics applications. This can boost robots’
navigation performances in various outdoor and indoor settings to solve
complex tasks such as inspection, mapping, and search and rescue. It can also
be used in object manipulation tasks for planning and grasping, aerial
cinematography to track moving targets as well as in scenarios beyond robotics
such as Virtual Reality (VR) and Augmented Reality (AR).
Estimating the 6D pose of objects from a single RGB image has been extensively
studied. Traditional methods match objects’ keypoints across images and 3D
object models [1, 2, 3]. Recently deep learning-based methods have
significantly improved the accuracy and robustness of pose estimation [4, 5,
6, 7, 8, 9, 10, 11]. Several single image pose estimation methods are real-
time ($30$ Hz) whereas the accuracy is limited [5, 11]. Furthermore, these
methods ignore the temporal and spatial information across consecutive image
frames and strictly focus on single-view pose estimation. This may lead to
inconsistent pose estimations across consecutive frames.
Figure 1: Visual-Inertial 6D object pose tracking (top). Speed-accuracy
benchmark on our VIYCB dataset with respect to state-of-the-art solutions
(bottom).
Recent RGB-based 6D object pose tracking methods achieved good tracking
performances [9, 12]. However, these methods are not robust to severe
occlusions, which enforce the re-initialization of the pose tracking process
each time this event occurs. Re-initialization is usually performed by an
accurate 6D pose estimation method, which is computationally expensive.
Therefore, the speed of these approaches is quite limited and prevents their
application in real-time scenarios.
To overcome the aforementioned drawbacks, we propose a novel DNN architecture,
which combines Inertial Measurement Unit (IMU) data with camera images. The
IMU has been widely used in the robotics field for localization and
navigation. Recent research [13, 14] show that IMU data can be processed by a
trained DNN to predict the velocity, which can be leveraged to resolve the
camera localization problem. Therefore, the IMU sensor can provide useful
information on the camera motion. In our case, we exploit this information to
achieve accurate object pose tracking even under severe occlusions. In
addition, the joint learning process on images and IMU data leads to an
efficient representation that enables robust real-time pose tracking.
Figure 2: Pose Tracking Workflow. At time t, the camera provides the image
observation $I_{t}$. The 3D model of the object and the pose estimation of
last time $\bm{\xi}_{t-1}$ are used to render $I_{t-1}^{R}$. $I_{t}$ and
$I_{t-1}^{R}$ are both cropped by an enlarged bounding box (illustrated in
Fig. 3) and resized to half of original resolution. The IMU buffer provides
the recent $K$ IMU measurements. The pre-processed image pair and the IMU
sequence are fed into the VIPose network to predict the relative pose
$\Delta\bm{\xi}_{t}$ which is combined with $\bm{\xi}_{t-1}$ to obtain the
object pose estimation $\bm{\xi}_{t}$ at this frame.
This work presents multiple contributions. First, we propose the first object
pose tracking method that fuses camera and IMU data to address the challenge
of pose tracking of objects in complex scenes that include objects’
occlusions. Second, our approach speeds up the pose tracking problem by
leveraging IMU data and inferring the overall pose by propagating and
combining relative pose estimation across consecutive frames. Finally, we
experimentally validate our approach on collected dataset including RGB images
and IMU data that is generally not available in existing datasets. To overcome
the well-known difficult task of generating 6D pose annotations, an automated
labeling technique is also introduced to collect enough training and testing
data thus significantly reducing manually labeling effort. Experimental
results show that the proposed approach achieves a comparable result with
respect to existing state-of-the-art solutions, while running significantly
faster and achieving real-time performance (i.e $50.2$ Hz).
The paper is organized as follows. In Section II, we review related work on 6D
pose estimation and tracking, as well as learning techniques for localization
based on IMU data. Section III introduces the proposed tracking pipeline and
the VIPose network. Section IV presents extensive experimental results on our
VIYCB dataset. Section V concludes the work and presents future directions.
## II Related Work
6D Pose Estimation: Traditionally, the 6D pose of an object in a single image
is estimated with template matching methods, where feature points in an image
are matched with the corresponding 3D model feature points. The 6D object pose
can then be estimated by solving 2D-3D correspondences of these local features
using the PnP algorithm [1]. Recently, deep learning-based methods have surged
in popularity. SSD-6D [4] extends the SSD object detector to 6D pose
estimation by adding a viewpoint classification branch. [5] adopts the YOLO
network to detect 3D bounding box corners of objects in images and recover the
6D pose by again solving a PnP problem. PoseCNN [8] proposes an end-to-end
framework to perform semantic segmentation and predict 3D rotation and
translation. Conversely, DeepIM [9] adopts the FlowNetSimple network [15] to
refine the estimation of single image 6D pose detection methods by iteratively
predicting the relative pose from the rendered previous pose to the current
image observation until the iterative pose increment is small enough.
Generally, adopting 6D pose estimation methods to estimate 6D pose for each
frame in videos ignores temporal information which can be useful to improve
the speed and accuracy of the pose estimation process without performing
estimation at each frame.
6D Pose Tracking: Our work is closely related to recent advances in RGB-based
6D object pose tracking. PWP3D [16] proposes to track the object pose by
optimizing the projected contour of the 3D model of the object. [17] further
improves [16] with a novel optimization scheme and GPU parallelization. Then
[18] proposes to improve pose tracking using a temporally local color
histogram. Recently, [19] adopts a deep neural network to predict the pose
difference between consecutive frames. PoseRBPF [12] proposes a Rao-
Blackwellized particle filter approach for 6D pose tracking, which decouples
3D rotation and 3D translation and takes the uncertainty and object symmetry
into account, achieving state-of-the-art performances on the YCB Video
Dataset. DeepIM [9] can be extended to perform pose tracking by predicting the
relative transformation between two consecutive frames. However, these methods
are still not robust to severe occlusions and re-initialization is required
when the tracking is lost. [20] proposes a novel network for 6D pose tracking
on RGB-D data. It disentangles feature encoding to reduce the domain gap in
simulation and reality and only uses synthetic data for training. This method
performs well on RGB-D data whereas in our work we focus on the more
challenging scenarios where only RGB images are available without the depth
information.
Data-driven IMU Localization: Traditionally, IMU data can be processed by some
filter-based approach for localization. In recent years, deep learning methods
have been applied to regress localization information directly from IMU data.
VINet [21] proposes the first end-to-end system for visual-inertial odometry,
which adopts an LSTM [22] network to process IMU input across image frames and
a FlowNet network to process image pairs. The visual-inertial fusion is
obtained by concatenating the IMU and visual feature vectors. IONet [23]
proposes an LSTM network to predict relative displacement in 2D and
concatenates the predictions to infer the position relying only on the IMU
input. RoNIN [13] rotates the IMU data into a gravity-aligned frame and
predicts the average 2D velocity over a sequence of IMU data employing a 1D
ResNet network. TLIO [14] adopts 1D ResNet network as well, but to regress 3D
displacements and corresponding uncertainties with a tightly-coupled Extended
Kalman Filter framework for state estimation. Our work closely relates to the
aforementioned works on IMU data using 1D ResNet, but we focus on object pose
and tracking problems and not on camera localization.
## III Approach
The goal of the pose tracking problem is to estimate the 6D pose of the object
with respect to the camera frame $\bm{\xi}_{t}\in SE(3)$ at time
$t,\leavevmode\nobreak\ t\in\\{1,2,\cdots,N\\}$ given
* •
A 3D CAD model of the object
* •
The initial pose of the object $\bm{\xi}_{0}\in SE(3)$ which can be obtained
by any 6D pose estimation methods
* •
A sequence of RGB images $I_{j},\leavevmode\nobreak\ j\in\\{0,1,\cdots,N\\}$
* •
A sequence of IMU data $G_{k},\leavevmode\nobreak\ k\in\\{0,1,\cdots,M\\}$,
where $G_{k}$ is a $6$ dimension vector consisting of the acceleration and
angular velocity measurements along the three Cartesian axes of the IMU frame
In this section, we first provide a general overview of the pose tracking
workflow that includes a pre-processing stage of raw image and IMU input prior
to their use by the VIPose DNN. We describe afterward our novel VIPose DNN
that infers the relative pose between consecutive frames by combining two
consecutive images and a sequence of IMU data. The final object pose is then
obtained by combining the relative transformations across consecutive frames.
### III-A Pose Tracking Workflow
The pose workflow of our pipeline at time $t$ is illustrated in Fig. 2. The
camera provides the image observation $I_{t}$ and the IMU gives the
acceleration and angular velocity. The image pre-processing is achieved in
three main steps: rendering, cropping, and resizing and it is followed by an
IMU pre-processing step.
#### III-A1 Rendering
First, we render an RGB image $I_{t-1}^{R}$ as the reference image of the last
frame using the 3D model of the object and the estimated 6D pose of the last
frame $\bm{\xi}_{t-1}$ to provide the target object to track. The rendering
process extracts the object information from the cluttered scene. It is
performed by placing the 3D model of the object at the center of a scene with
a black background and projecting an RGB image at the viewpoint defined by the
pose $\bm{\xi}_{t-1}$, as illustrated in Fig. 3.
#### III-A2 Cropping
Due to the small object size in the raw image, it can be difficult to extract
useful features for matching across frames. Inspired by [9], we address this
issue by using an enlarged bounding box (white box) as illustrated in Fig. 3
to crop both the rendered image $I_{t-1}^{R}$ and the image observation
$I_{t}$. To obtain such bounding box, we first estimate the size of the object
in the rendered image using the 2D projection of the $8$ corners of the
corresponding 3D object model $p_{i},\leavevmode\nobreak\ i\in{1,2,\cdots,8}$
as depicted with yellow points in Fig. 3
$\displaystyle x_{\text{size }}$
$\displaystyle=\max_{i}\left(p_{{i}_{x}}\right)-\min_{i}\left(p_{{i}_{x}}\right)$
$\displaystyle y_{\text{size }}$
$\displaystyle=\max_{i}\left(p_{{i}_{y}}\right)-\min_{i}\left(p_{{i}_{y}}\right)$
The enlarged bounding box is centered at the 2D projection of the center of
the 3D model (depicted with the green point in Fig. 3) and keep the same
aspect ratio of the input image. The height $h$ and width $w$ of the enlarged
bounding box are obtained as
$\displaystyle h$ $\displaystyle=\lambda\cdot\max\left(x_{\text{size
}}/r,y_{\text{size }}\right)$ $\displaystyle w$
$\displaystyle=\lambda\cdot\max\left(x_{\text{size }},y_{\text{size }}\cdot
r\right)$
where $r$ is the aspect ratio of the original image and $\lambda$ denotes the
expand ratio to ensure the box contains the object in both the rendered image
and the new image.
Figure 3: Visualization of Rendering and Cropping. The object is rendered
using the 3D model of the object and estimated 6D pose. The 2D projection of
the center and the 8 corners of the 3D model are illustrated as a green point
and yellow points, respectively. The red box defines the size of the rendered
object $x_{size}$ and $y_{size}$. The white box represents the enlarged
bounding box which is centered at the green point with width $w$ and height
$h$.
#### III-A3 Resizing
Subsequently, we resize the cropped image pair to obtain more details. The
cropped image pair is resized to a fixed resolution which is half of the
original image size to reduce computation in the network. At the training
stage, this enables a larger batch size for faster convergence of the training
process. At the testing stage, this significantly reduces the running time of
the system without compromising the accuracy. The resized image pair is used
as the visual input to the network.
Figure 4: VIPose Network Architecture. The blue blocks represent the FlowNetC-
based visual branch that produces the visual feature. The green block
represents the 1D ResNet-based inertial branch that produces the inertial
feature. The visual and inertial feature are fused by concatenating two
feature vectors and provide a multi-modal feature for relative pose
estimation. The orange blocks represent the output branch that directly
regresses the relative pose between the two consecutive frames.
#### III-A4 IMU pre-processing
After the image pair is pre-processed, we pre-process the IMU data as the
inertial input to the network. An IMU buffer is designed as a queue that
stores the most recent $K$ IMU measurements. The choice of $K$ can vary
according to the frequency of the IMU input and the speed of the camera for
different applications. When the new image observation arrives, the overall
data in the IMU buffer is employed as input to the network and is represented
by a $K\times 6$ tensor. The IMU sequence is rotated to a heading-agnostic
coordinate frame from the IMU frame using ground-truth orientation directly
from the device similar to [13]. The heading-agnostic coordinate frame is
defined as a coordinate frame whose Z-axis is aligned with gravity and is
consistent through the sequence.
The pre-processed image pair and IMU sequence are fed into the VIPose network
to predict the relative object pose $\Delta\bm{\xi}_{t}\in SE(3)$ between the
images $I_{t-1}^{R}$ and $I_{t}$. Then the 6D pose of the object in current
image $\bm{\xi}_{t}$ is obtained as
$\bm{\xi}_{t}=\Delta\bm{\xi}_{t}\otimes\bm{\xi}_{t-1}$, where $\otimes$ is
matrix multiplication operation. The tracking process is repeated until the 6D
pose of the last image is obtained.
In general, at time $t$, it is helpful to use the rendered image $I_{t-1}^{R}$
instead of the image observation $I_{t-1}$ as the reference image of the last
frame for pose tracking. To further clarify this aspect, if the estimated
object pose $\bm{\xi}_{t-1}$ is inaccurate, there is a mismatch between the
object pose $\bm{\xi}_{t-1}$ and the corresponding object observation in the
image $I_{t-1}$ since the pose $\bm{\xi}_{t-1}$ is affected by estimation
drift. Conversely, the rendered image $I_{t-1}^{R}$ is a completely new image
generated using the estimated object pose $\bm{\xi}_{t-1}$ and it does not
suffer from the aforementioned observation issue. Therefore, estimating the
relative pose between $I_{t-1}^{R}$ and $I_{t}$ is agnostic to the pose drift
and contributes to reducing the global object pose estimation drift.
### III-B VIPose Network
The proposed network architecture is illustrated in Fig. 4. The network
consists of a visual branch that takes as input the processed image pair
$I_{t-1}^{R}$ and $I_{t}$, an inertial branch that extracts features from the
IMU sequence, and an output branch that predicts the relative pose
$\Delta\bm{\xi}_{t}$.
The visual branch (the blue block in Fig. 4), is based on FlowNet-C network
[15] to extract visual features from the input image pair and we only adopt
the convolutional layers of the original FlowNet-C network. The network is
pre-trained to predict the optical flow between a pair of images. The
representation of optical flow is considered useful for relative pose
estimation as proved in [9]. The first $3$ convolution layers extract low-
level features from the two input images separately and produce two feature
maps for the correlation layer that is responsible to compute the patch-wise
similarity and therefore find the correspondence between the image pair. Then
the last $6$ convolutional layers extract high-level features and reduce the
size of the feature map. The feature map output of the last convolution layer
is flattened to the visual feature vector for later feature fusion.
The inertial branch (the green block in Fig. 4) instead adopts the 1D version
of the standard ResNet-18 network [24] and takes as input the IMU sequence,
which is the $K\times 6$ tensor from the IMU buffer as previously specified.
Inspired by [13], we employ a 1D ResNet which is pre-trained to predict the
average 2D velocity given a sequence of IMU inputs. This has shown to have
better performances with respect to other network architectures including LSTM
[22] and Temporal Convolution Network [25]. The inertial branch initializes
with pre-trained weights from [13]. Similarly, the output of the last 1D
Convolution layer is flattened to the inertial feature vector.
The visual feature and inertial feature are fused by concatenating the two
feature vectors, which provide a multi-modal feature for regressing the
relative transformation. The inertial feature provides useful information on
camera motion for inferring the relative pose when the visual information of
the target object is limited like for severe occlusions cases.
The output branch (the orange block in Fig. 4) is a multi-layer perceptron
that takes as input the fused feature vector and outputs the relative pose
between the two frames. It contains two fully-connected layers with $256$
dimensions, followed by two separate fully-connected layers for predicting the
rotation and translation, respectively. The representation of the relative
pose is crucial to the performance of the network. We adopt the se(3)
representation in [20], where
$\mathbf{v}=\left[\mathbf{t},\mathbf{w}\right]^{\top}\in se(3)$, such that its
pseudo-exponential mapping lies in $SE(3)$
$\Delta\bm{\bm{\xi}}=\text{pseudo-
exp}(\mathbf{v})=\left[\begin{array}[]{ll}\mathbf{R}&\mathbf{t}\\\
\mathbf{0}^{\top}&1\end{array}\right]\in SE(3),$ (1)
where
$\mathbf{R}=\mathbf{I}_{3\times
3}+\frac{\left[\mathbf{w}\right]_{\times}}{|\mathbf{w}|}\sin(|\mathbf{w}|)+\frac{\left[\mathbf{w}\right]_{\times}^{2}}{|\mathbf{w}|^{2}}\left(1-\cos\left(|\mathbf{w}|\right)\right),$
and $[\mathbf{w}]_{\times}$ is the skew-symmetric matrix. The last two output
layers are used to directly regress $\mathbf{w}$ and $\mathbf{t}$ and the
prediction is then used to compute the relative pose $\Delta\bm{\xi}$. The
network is trained end-to-end considering the following $L_{2}$ loss
$\mathcal{L}=\lambda_{1}\cdot\left\|\mathbf{w}-\mathbf{w}_{gt}\right\|_{2}+\lambda_{2}\cdot\left\|\mathbf{t}-\mathbf{t}_{gt}\right\|_{2},$
(2)
where $\lambda_{1},\lambda_{2}$ is the loss weight for rotation and
translation, and $w_{gt},t_{gt}$ denote the ground-truth relative pose.
## IV Experimental Results
In this section, we first introduce the VIYCB dataset and the automatic
labeling technique. We describe afterward the training procedure and
implementation details. We present the evaluation metrics and result on the
VIYCB dataset lastly.
### IV-A Dataset
Figure 5: Left is the 5 YCB objects used in our dataset. Right is the
quadrotor with the camera and IMU (hardware synchronized) for collecting the
raw data. The grey markers on the objects and the quadrotor are used by the
Vicon motion capture system for localization.
To train and validate our method, we collect a video dataset named VIYCB
dataset with RGB images, IMU data, and accurate 6D pose annotations. The
dataset collection is conducted in the new indoor testbed $10\times 5\times
4\leavevmode\nobreak\ $\mathrm{m}^{3}$$ at the ARPL lab at New York
University. Fig. 5 shows the objects and the quadrotor equipped with a
Qualcomm® SnapdragonTM board [26] that we employed to collect the dataset. We
use this device because the IMU and camera sensors are hardware synchronized.
The objects in our experiment are $5$ of the YCB objects [27] which are widely
accessible and cover different colors, shapes, scales, and object symmetries.
We adopt an automatic labeling technique leveraging a Vicon111www.vicon.com
motion capture system to obtain the 6D pose annotation of all objects in each
frame and save the effort of manually annotating the 6D pose of the objects.
The Vicon system outputs the position and orientation of the objects and the
camera in the Vicon world frame at $100\leavevmode\nobreak\
$\mathrm{H}\mathrm{z}$$. The ground-truth 6D pose annotation is then obtained
by transforming the 6D pose of the objects in the world frame to the camera
frame. For each video, the 5 objects are placed closely in different
arrangements which creates severe occlusions and even complete occlusions. The
data is collected by moving around the objects with a handheld quadrotor. The
RGB images ($480\times 640$ resolution) are recorded at around $25$ Hz,
whereas the IMU sensor data is collected at $200$ Hz. The IMU orientation of
the quadrotor is also recorded at $200$ Hz, similar to [13]. Generally, $8533$
images are used in training and $3142$ keyframes are used for evaluation.
| PoseRBPF 50 | PoseRBPF 100 | DeepIM | VIPose (Ours)
---|---|---|---|---
Objects | ADD | ADD-S | ADD | ADD-S | ADD | ADD-S | ADD | ADD-S
003_cracker_box | 65.99 | 82.39 | 66.85 | 83.10 | 77.48 | 87.62 | 75.66 | 86.84
004_sugar_box | 62.29 | 81.04 | 63.19 | 82.05 | 78.92 | 88.22 | 74.46 | 86.27
005_tomato_soup_can | 55.10 | 78.64 | 56.36 | 80.04 | 76.22 | 87.07 | 71.54 | 82.79
006_mustard_bottle | 56.93 | 76.02 | 57.55 | 78.09 | 75.23 | 85.89 | 70.87 | 82.12
051_large_clamp | 44.42 | 66.18 | 45.22 | 67.60 | 62.37 | 79.51 | 59.68 | 78.07
ALL | 56.95 | 76.85 | 57.83 | 78.20 | 74.04 | 85.66 | 70.44 | 83.22
Speed (fps) | 21.9 | 12.3 | 8.7 | 50.2
Re-init (times) | 25 | 22 | 18 | 9
Table I: Result on VIYCB dataset. ADD and ADD-S are short for AUC (Area Under
Curve) of ADD and ADD-S. Figure 6: Qualitative Result of VIPose. The first row
and the second row illustrate pose tracking of two objects, 003_cracker_box
and 004_sugar_box, under severe occlusions. The target object is rendered in
the scene using the estimated 6D pose of our method. This demonstrates the
robustness of the proposed approach on handling the occlusion challenge.
### IV-B Architecture Implementation Details
For network training, we adopt a two-step training strategy. We first train
the visual branch only. Subsequently, we jointly train the visual, the
inertial, and the output branches.
The visual branch takes a pre-processed image pair as input, which contains a
real image $I_{t}$ and a rendered image $I_{t-1}^{R}$. The training data
consists of image pairs from collected data and synthetic data. For an image
$I_{t}$ and corresponding ground-truth pose $\bm{\xi}_{t}$ in collected data,
an image pair is generated by rendering a image $I_{t-1}^{R}$ with the ground-
truth pose of the last frame $\bm{\xi}_{t-1}$, cropping both $I_{t-1}^{R}$ and
$I_{t}$ with the enlarged bounding box introduced in Section III, and resizing
the cropped image pair to $240\times 320$. In addition, we can generate
synthetic image pairs to build a more diverse training dataset that covers a
wider range of relative pose distributions. Instead of using ground-truth pose
of last frame $\bm{\xi}_{t-1}$, we randomly sample a relative pose
$\Delta\bm{\xi}_{t}^{*}$ and compute the object pose in the last frame
$\bm{\xi}_{t-1}^{*}$ which is used to render $I_{t-1}^{R*}$. The image pair
$I_{t-1}^{R*}$ and $I_{t}$ are then cropped and resized as described above.
The sampled relative pose $\Delta\bm{\xi}_{t}^{*}$ consists of a rotation part
and a translation part. The rotation is obtained considering three Euler
angles sampled from a Gaussian distribution
$\mathcal{N}\sim\left(0,10^{2}\right)$. For the translation part, each of the
three components is sampled as well from a Gaussian distribution
$\mathcal{N}\sim\left(0,0.02^{2}\right)$. We only train the visual branch and
we leverage a pseudo output branch to train the visual branch to adapt the
change in the the dimension of the first fully-connected layer of the output
branch. Each training batch consists of image pairs from both collected data
($1/8$) and synthetic data ($7/8$) and the batch size is set to 64. The visual
branch and the pseudo output branch are trained using an SGD optimizer for
$30$ epochs with an initial learning rate of $0.001$. A cosine annealing
scheduler reduces the learning rate after each epoch, to $0.0001$ at the end.
Subsequently, we jointly train the visual branch, the inertial branch, and the
output branch. The training data in this step is only the image pairs from
collected data with corresponding IMU sequence due to the absence of IMU
sequence in the synthetic data. The length of the IMU buffer $K$ is set to
$200$ for both training and testing, which means it contains all IMU data
within the last second. The ground-truth orientation is used to rotate the IMU
data to the heading-agnostic coordinate frame from the IMU frame in both
training and testing following [13]. The pseudo output branch is replaced with
a new output branch with randomly initialized weights and bias. The network is
trained using an SGD optimizer for another $20$ epochs with an initial
learning rate of $0.0001$ for both the visual and the inertial branch and
$0.001$ for the output branch. Similarly, a cosine annealing scheduler reduces
the learning rate after each epoch, to $0.00001$ and $0.0001$ at the end,
respectively.
To avoid the over-fitting issue during training, we adopt data augmentation
strategies including random HSV shift, Gaussian noise, and Gaussian blur on
the real image $I_{t}$ in each image pair in both training steps. The expand
ratio $\lambda$ is fixed to $1.4$ in the cropping step. The loss weight
$\lambda_{1}$ and $\lambda_{2}$ is always set to $1$. A seperate model is
trained for each object. The rendering process is implemented in OpenGL. All
network training and testing are performed on an NVIDIA RTX 2080 Ti GPU.
### IV-C Evaluation
For pose estimation evaluation, We adopt the ADD [3] and ADD-S [8] metrics
ADD
$\displaystyle=\frac{1}{m}\sum_{\mathbf{x}\in\mathcal{M}}\left\|(\mathbf{R}\mathbf{x}+\mathbf{T})-(\tilde{\mathbf{R}}\mathbf{x}+\tilde{\mathbf{T}})\right\|,$
ADD-S
$\displaystyle=\frac{1}{m}\sum_{\mathbf{x}_{1}\in\mathcal{M}}\min_{\mathbf{x}_{2}\in\mathcal{M}}\left\|\left(\mathbf{R}\mathbf{x}_{1}+\mathbf{T}\right)-\left(\tilde{\mathbf{R}}\mathbf{x}_{2}+\tilde{\mathbf{T}}\right)\right\|,$
where $\mathcal{M}$ represents the points of the 3D object model, $m$ denotes
the number of the points $\mathcal{M}$, $(\mathbf{R},\mathbf{T})$ and
$(\tilde{\mathbf{R}},\tilde{\mathbf{T}})$ denote the rotation and translation
of ground-truth pose and estimated pose, respectively. The ADD metric computes
the average distance between the transformed 3D points using ground-truth pose
and estimated pose, respectively. The ADD-S metric is specifically designed
for symmetric objects where the average distance is computed by closest point
distance. The estimated pose is considered correct when the result of ADD or
ADD-S is smaller than a given threshold. We compute the AUC (Area Under Curve)
of ADD and ADD-S results where the threshold varies for the average distance
and the maximum threshold is set to $10$ cm.
### IV-D Results on VIYCB Dataset
Table I shows the pose tracking results on the VIYCB dataset. The proposed
approach is compared with other state-of-the-art RGB-based object pose
tracking methods including DeepIM [9] and PoseRBPF [12]. All compared methods
use the ground-truth pose for initialization at start. VIPose and DeepIM are
re-initialized with ground-truth pose when the average relative pose
prediction in the last $10$ frames is larger than a threshold, specifically
its rotation greater than $10$ degrees or its translation greater than $1$ cm.
PoseRBPF with $50$ particles and $100$ particles are evaluated for comparison.
PoseRBPF utilizes the ground-truth pose to initialize its detection center and
motion prior. It is re-initialized when the target object is heavily occluded,
which is detected when the maximum similarity between the feature embedding
and the codebooks among all particles is lower than a pre-defined threshold
($0.6$ in the presented case). Since the objects in our dataset are the subset
of the YCB video dataset, we use the pretrained models of DeepIM and PoseRBPF
to perform pose tracking on our VIYCB dataset for evaluation.
In the experiment, for each object, we run each method to track the 6D pose of
the object in all testing videos and we evaluate the aforementioned metrics on
the keyframes. We also compare the speed of these methods using their average
computation time for each frame. To evaluate the robustness of these methods,
we compare the frequency of re-initialization operations in all testing videos
and average it for each object class since most re-initialization operations
are caused by heavy occlusions.
Results in Table I show that the proposed method performs consistently better
than PoseRBPF with $50$ particles and $100$ particles on all $5$ objects in
terms of accuracy and speed. The accuracy of VIPose is comparable to the
DeepIM approach, while our approach is substantially faster and runs at $50.2$
Hz compared to $8.7$ Hz of DeepIM. This indicates that VIPose is more suitable
for real-time applications. The speed-accuracy trade-off is presented in Fig.
1.
In terms of robustness to occlusions, VIPose only requires re-initialization
every $349$ frames when the target object is completely occluded. PoseRBPF
with $50$ and $100$ particles requires re-initialization more frequently for
every $126$ frames and $143$ frames, whereas DeepIM on average every $174$
frames. This indicates that the proposed method is more robust to occlusion
than previous methods and proves the effectiveness of the inertial feature in
the pose tracking task.
## V Conclusion
In this work, we proposed the first real-time RGB-based 6D pose tracking
approach called VIPose DNN that combines inertial and camera information The
results show that our method has comparable performance with respect to
existing approaches while being real-time and robust to heavy occlusions.
Furthermore, it provides remarkable pose estimation results for heavily
occluded objects.
Future works will consider how to extend this network to the multi-objects
pose tracking task. Moreover, we would also like to investigate the use of
adaptive feature fusion to better combine inertial and camera information in
different scenarios to increase pose tracking accuracy and robustness to
different testing scenarios without sacrificing the real-time capabilities of
our approach.
## References
* [1] A. Collet, M. Martinez, and S. S. Srinivasa, “The moped framework: Object recognition and pose estimation for manipulation,” _The international journal of robotics research_ , vol. 30, no. 10, pp. 1284–1306, 2011.
* [2] S. Hinterstoisser, C. Cagniart, S. Ilic, P. Sturm, N. Navab, P. Fua, and V. Lepetit, “Gradient response maps for real-time detection of textureless objects,” _IEEE transactions on pattern analysis and machine intelligence_ , vol. 34, no. 5, pp. 876–888, 2011.
* [3] S. Hinterstoisser, V. Lepetit, S. Ilic, S. Holzer, G. Bradski, K. Konolige, and N. Navab, “Model based training, detection and pose estimation of texture-less 3d objects in heavily cluttered scenes,” in _Asian conference on computer vision_. Springer, 2012, pp. 548–562.
* [4] W. Kehl, F. Manhardt, F. Tombari, S. Ilic, and N. Navab, “Ssd-6d: Making rgb-based 3d detection and 6d pose estimation great again,” in _Proceedings of the IEEE international conference on computer vision_ , 2017, pp. 1521–1529.
* [5] B. Tekin, S. N. Sinha, and P. Fua, “Real-time seamless single shot 6d object pose prediction,” in _Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition_ , 2018, pp. 292–301.
* [6] A. Zeng, K.-T. Yu, S. Song, D. Suo, E. Walker, A. Rodriguez, and J. Xiao, “Multi-view self-supervised deep learning for 6d pose estimation in the amazon picking challenge,” in _2017 IEEE international conference on robotics and automation (ICRA)_. IEEE, 2017, pp. 1386–1383.
* [7] G. Pavlakos, X. Zhou, A. Chan, K. G. Derpanis, and K. Daniilidis, “6-dof object pose from semantic keypoints,” in _2017 IEEE international conference on robotics and automation (ICRA)_. IEEE, 2017, pp. 2011–2018.
* [8] Y. Xiang, T. Schmidt, V. Narayanan, and D. Fox, “Posecnn: A convolutional neural network for 6d object pose estimation in cluttered scenes,” 2018.
* [9] Y. Li, G. Wang, X. Ji, Y. Xiang, and D. Fox, “Deepim: Deep iterative matching for 6d pose estimation,” _International Journal of Computer Vision_ , vol. 128, no. 3, pp. 657–678, 2020.
* [10] S. Peng, Y. Liu, Q. Huang, X. Zhou, and H. Bao, “Pvnet: Pixel-wise voting network for 6dof pose estimation,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_ , 2019, pp. 4561–4570.
* [11] Z. Li, G. Wang, and X. Ji, “Cdpn: Coordinates-based disentangled pose network for real-time rgb-based 6-dof object pose estimation,” in _Proceedings of the IEEE/CVF International Conference on Computer Vision_ , 2019, pp. 7678–7687.
* [12] X. Deng, A. Mousavian, Y. Xiang, F. Xia, T. Bretl, and D. Fox, “Poserbpf: A rao-blackwellized particle filter for 6d object pose tracking,” _IEEE Transactions on Robotics (T-RO)_ , 2021.
* [13] S. Herath, H. Yan, and Y. Furukawa, “Ronin: Robust neural inertial navigation in the wild: Benchmark, evaluations, & new methods,” in _2020 IEEE International Conference on Robotics and Automation (ICRA)_. IEEE, 2020, pp. 3146–3152.
* [14] W. Liu, D. Caruso, E. Ilg, J. Dong, A. I. Mourikis, K. Daniilidis, V. Kumar, and J. Engel, “Tlio: Tight learned inertial odometry,” _IEEE Robotics and Automation Letters_ , vol. 5, no. 4, pp. 5653–5660, 2020.
* [15] A. Dosovitskiy, P. Fischer, E. Ilg, P. Hausser, C. Hazirbas, V. Golkov, P. Van Der Smagt, D. Cremers, and T. Brox, “Flownet: Learning optical flow with convolutional networks,” in _Proceedings of the IEEE international conference on computer vision_ , 2015, pp. 2758–2766.
* [16] V. A. Prisacariu and I. D. Reid, “Pwp3d: Real-time segmentation and tracking of 3d objects,” _International journal of computer vision_ , vol. 98, no. 3, pp. 335–354, 2012.
* [17] H. Tjaden, U. Schwanecke, and E. Schömer, “Real-time monocular segmentation and pose tracking of multiple objects,” in _European conference on computer vision_. Springer, 2016, pp. 423–438.
* [18] H. Tjaden, U. Schwanecke, and E. Schomer, “Real-time monocular pose estimation of 3d objects using temporally consistent local color histograms,” in _Proceedings of the IEEE International Conference on Computer Vision_ , 2017, pp. 124–132.
* [19] F. Manhardt, W. Kehl, N. Navab, and F. Tombari, “Deep model-based 6d pose refinement in rgb,” in _Proceedings of the European Conference on Computer Vision (ECCV)_ , 2018, pp. 800–815.
* [20] B. Wen, C. Mitash, B. Ren, and K. Bekris, “se (3)-tracknet: Data-driven 6d pose tracking by calibrating image residuals in synthetic domains,” in _IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)_ , 2020.
* [21] R. Clark, S. Wang, H. Wen, A. Markham, and N. Trigoni, “Vinet: Visual-inertial odometry as a sequence-to-sequence learning problem,” in _Proceedings of the AAAI Conference on Artificial Intelligence_ , vol. 31, no. 1, 2017.
* [22] S. Hochreiter and J. Schmidhuber, “Long short-term memory,” _Neural computation_ , vol. 9, no. 8, pp. 1735–1780, 1997.
* [23] C. Chen, X. Lu, A. Markham, and N. Trigoni, “Ionet: Learning to cure the curse of drift in inertial odometry,” in _Proceedings of the AAAI Conference on Artificial Intelligence_ , vol. 32, no. 1, 2018.
* [24] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in _Proceedings of the IEEE conference on computer vision and pattern recognition_ , 2016, pp. 770–778.
* [25] S. Bai, J. Z. Kolter, and V. Koltun, “An empirical evaluation of generic convolutional and recurrent networks for sequence modeling,” _arXiv preprint arXiv:1803.01271_ , 2018.
* [26] G. Loianno, C. Brunner, G. McGrath, and V. Kumar, “Estimation, control, and planning for aggressive flight with a small quadrotor with a single camera and imu,” _IEEE Robotics and Automation Letters_ , vol. 2, no. 2, pp. 404–411, April 2017.
* [27] B. Calli, A. Singh, A. Walsman, S. Srinivasa, P. Abbeel, and A. M. Dollar, “The ycb object and model set: Towards common benchmarks for manipulation research,” in _2015 international conference on advanced robotics (ICAR)_. IEEE, 2015, pp. 510–517.
| arxiv-papers | 2021-07-27T06:10:23 | 2024-09-04T03:07:20.702099 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Rundong Ge, Giuseppe Loianno",
"submitter": "Rundong Ge",
"url": "https://arxiv.org/abs/2107.12617"
} |
2107.12623 | # Anomalous distribution of particles in the presence of a fluctuating
magnetic field
Shrabani Mondal Department of Chemistry, University of Massachusetts Boston,
Boston, MA 02125 L. R. Rahul Biswas Department of Chemistry, Visva-Bharati,
Santiniketan, India, 731235 Bidhan Chandra Bag bidhanchandra.bag@visva-
bharati.ac.in Department of Chemistry, Visva-Bharati, Santiniketan, India,
731235
###### Abstract
It seems to us that a stochastic system must be a nonlinear one to observe the
phenomenon, noise induced transition. But in the present paper, we have
demonstrated that the phenomenon may be observed even in a linear stochastic
process where both deterministic and stochastic parts are linear functions of
the relevant phase space variables. The shape of the stationary distribution
of particles (which are confined in a harmonic potential) may change on
increasing the strength of the applied fluctuating magnetic field. The
probability density may vary non monotonically with an increase in the
coordinate of a Brownian particle. Thus the distribution of particles may
deviate strongly from the Boltzmann one and it is a unique signature of the
fluctuating magnetic field. Then we are motivated strongly to study the
distribution of particles in a nonlinear stochastic system where the Brownian
particles are confined in a bi-stable potential energy field in the presence
of the fluctuating magnetic field. With a relatively large strength of the
fluctuating field, the distribution of particles may be a strange one where
many islands may appear which are not expected from the given potential energy
field. It may offer an explanation to describe the phenomenon, the reduction
of the current in a semiconductor in the presence of a time dependent magnetic
field.
###### pacs:
05.40.Jc,05.20.-y,89.70.Cf
## I Introduction
Our common believe is that noise is a phenomenon which induces disorder. But
there are situations where it plays a constructive role such as stochastic
resonance [1, 2, 3, 4], coherence resonance [5], resonant activation [1, 6, 7,
8, 9, 10], Brownian ratchets [11, 12, 13, 14, 15], aggregation of Brownian
particles [16, 17, 18, 19], noise-induced pattern formation [20, 21, 22],
noise induced transitions [23, 24, 25, 26, 27, 28, 29], noise induced non
equilibrium phase transitions [30, 31, 32, 33, 34], synchronization [35, 36]
etc. In the present paper we address an issue related to the noise-induced
transition. It has been considered in may contexts [23, 24, 25, 26, 27, 28,
29, 37, 38]. A noise-induced transition occurs if the stationary probability
distribution (SPD) of the state variable is changed qualitatively as the noise
intensity exceeds a critical value. The genetic model [24] and Hongler’s model
[25] are relevant examples demonstrating this phenomenon. The relevant
Langevin equation of motion for this kind of noise induced transition may be
read as [26]
$\dot{x}=f(x)+g_{1}(x)\zeta_{1}+g_{2}(x)\zeta_{2}$ (1)
where $x$ corresponds to the coordinate of a Brownian particle which is driven
by two noises, $\zeta_{1}$ and $\zeta_{2}$, respectively. In Refs. [26, 27],
it has been shown that for a simple case where $g_{2}(x)=1$ and $g_{1}(x)$ is
nonlinear function, $g_{1}(x)=b\frac{x^{4}}{1+x^{4}},b>0$ then the correlation
between the two white noises may induce transition for $f(x)=-ax,a>0$ or
$f(x)=-ax^{3}$. The multiplicative noise induces position dependent diffusion
as well as drift terms. The potential energy function due to $f(x)$ may modify
at the steady state with additional fixed point(s) by virtue of the
multiplicative noise. Thus the multiplicative noise may induce transition in a
non linear system [28]. Further modification of the potential energy, as well
as the transition, may happen due to the cross correlation induced drift term
[26, 27]. Thus for $g_{1}(x)=g_{2}(x)=1$, noise induced transition is not
possible. It is apparent in the above examples that the multiplicative noise
term (with the nonlinear function of coordinate) as well as modification of
the potential energy function having new fixed point(s) is a necessary
condition for the noise induced transition. But the multiplicative noise (with
a linear function of coordinate) may induce transition in the nonlinear system
without introducing new fixed points in the effective potential energy
function at the steady state [29]. This transition is controlled by diffusion.
Thus the necessary and sufficient condition to have the noise induced
transition seems to us that the total system (deterministic plus stochastic)
must be a nonlinear one [23, 24, 25, 26, 27, 28, 29, 37, 38]. A similar
conclusion may be drawn for another related phenomenon, noise induced non
equilibrium phase transition [30, 31, 32, 33, 34]. Then one may be surprised
to know that the present study demonstrates the noise induced transition for
the case where the total system is a line one. The stationary distribution of
particles in the harmonic force field is a uni-modal one at relatively low
strength of a fluctuating magnetic field (FMF). On further increase in the
strength of the field, an island may appear (having center at the origin)
which is surrounded by a shallow well. It is evident from the cross section
(having tri-modal) of the particle distribution in two dimension space. The
cross section becomes bi-modal at a relatively large strength of the field. At
this condition, the island disappears. Keeping in mind the strange behavior of
the particle distribution in a linear stochastic process we have studied a
stochastic non linear system where a Brownian particle is confined in a bi-
stable potential energy field in the presence of a fluctuating magnetic field.
At low strength of the FMF the distribution of particles in space is Boltzmann
type corresponding to the bi-stable potential energy field. On further
increase in the strength of the field, an island may appear having a center at
the unstable fixed point. It may be extended having $S$-shape (such that it
avoids the stable fixed points) as the strength grows. At the same time, two
more additional islands may appear which are located diagonally opposite to
the $S$-shape island. This strange pattern may be more complex at the
relatively large strength of the fluctuating magnetic field.
Before leaving this section we would mention that in recent past the magnetic
field has been considered in different contexts such as barrier crossing
dynamics [10, 39, 40, 41, 42, 43, 44, 45, 46], non Markovian dynamics of a
Brwonian particle in the presence of a magnetic field [44, 10, 46, 47, 48, 49,
50, 51], stochastic thermodynamics [52, 53], nonlinear dynamics [54] and
others [55, 58, 59, 60]. The present study may be helpful to understand as
well as control the conductivity of electrolytic materials. In the recent
past, the study on ion conducting electrolytic materials is a very important
area in physics and chemistry being driven by an ever-increasing demand for
portable electronic devices. The materials have potential applications in a
diverse range of all-solid-state devices, such as rechargeable lithium
batteries, flexible electrochromic displays, and smart windows [61, 62, 63].
The properties of the electrolytes are tuned by varying chemical composition
to a large extent and hence are adapted to the specific needs [64, 65]. High
ionic conductivity is needed for optimizing the glassy electrolytes in various
applications. It would be very interesting if one can tune the ionic
conductivity according to specific need by a physical method. One may
investigate the issue in the presence of the Lorentz force. Although a time
independent magnetic field can not activate the particle to cross the barrier
it may modulate the frequency of the dynamics. It is to be noted here that a
time dependent magnetic field may introduce an induced electric field to
activate the particle. Another way is the direct application of an electric
field which may be helpful in the case when a very high rate of barrier
crossing is necessary. In the very recent Refs. [39, 40, 41, 42, 43, 44, 45,
10, 46] it has been shown that the conductivity of an electrolytic material
can be tuned by an applied magnetic field. Electron tunneling in quantum wire
in the presence of a magnetic field has been studied in Ref. [39]. Tunneling
ionization of impurity centers in semiconductors was investigated [40] in the
presence of a magnetic field. The effect of a magnetic field on the electron
transport of GaAs quantum wire was studied very recently [41] in the presence
of an electric field. Based on the magneto-tunneling spectroscopy a
noninvasive and nondestructive probe has been used to produce two-dimensional
spatial images of the probability density of an electron confined in a self-
assembled semiconductor quantum dot [42]. The technique exploits the effect of
the classical Lorentz force on the motion of a tunneling electron. In this
experiment extremum behavior is observed in the variation of the tunneling
current with the magnetic field strength. A similar kind of behavior also has
been reported in Refs. [43, 45] in the variation of the barrier crossing rate
constant as a function of the strength of the time independent magnetic field
(TIMF). This optimum behavior has been observed at a low damping regime [43,
45]. However, in Refs. [44, 46] it has been shown that one may tune the
barrier crossing rate by virtue of fluctuating magnetic field. It is to be
noted here that the current in the semiconductor may become small for a given
amplitude of the oscillating magnetic field. This observation has been
explained based on the phenomenon, dynamical localization. This phenomenon has
been of growing interest [66] because of its very relevance in the response of
the electron transport in mesoscopic systems to external fields [67]. In this
context, the present study may be a very relevant one. Based on it one can
account for the reduction of the current in the semiconductor. The formation
of islands may reduce the conductivity of electrolytes in the presence of a
time dependent magnetic field.
The outline of the paper is as follows: In Sec. II we have presented the
model. The distribution of charged particles in space for a linear system is
demonstrated in Sec.III. In the next section, we have demonstrated the
distribution of charged particles in space for a non linear system. The paper
is concluded in Sec. IV.
## II The model
In the present study, we have considered that a Brownian particle experiences
a fluctuating magnetic field (B) along $z$-direction, i.e.,
$\textbf{B}=(0,0,B(t))$. $B(t)$ can be expressed as
$B(t)=B_{0}+B_{f}(t)\;\;.$ (2)
Here $B_{f}(t)$ is the fluctuating part of the $B(t)$. It may be due to the
fluctuation of the current in the electrical magnet. Then the Langevin
equations of motion with this field can be written as [10, 46, 68]
$m\dot{u_{x}}=-\frac{\partial V(x,y)}{\partial
x}-\gamma_{0}mu_{x}+(\Omega_{0}+\eta(t))mu_{y}+\frac{\dot{\eta}my}{2}+f_{x}(t)$
(3)
and
$m\dot{u_{y}}=-\frac{\partial
V(x,y)}{y}-\gamma_{0}mu_{y}-(\Omega_{0}+\eta(t))mu_{x}-\frac{\dot{\eta}mx}{2}+f_{y}(t)$
(4)
The above equations are corresponding to the motion in the $x-y$ plane. Here
$u_{x}$ and $u_{y}$ are the components of velocity of the Brownian particle
with mass, $m$. $-\frac{\partial V(x,y)}{x}$ and $-\frac{\partial V(x,y)}{y}$
in the above equations are the components of conservative force field which is
derived from the potential energy, $V(x,y)$. $\gamma_{0}$ measures the
strength of damping force due to thermal bath. The components of random force
which is originated from the thermal bath are given by $f_{x}$ and $f_{y}$
corresponding to the motion along $x$ and $y$ directions, respectively. These
are white Gaussian thermal noises, i.e.,
$\langle f_{x}(t)\rangle=\langle f_{y}(t)\rangle=0$ (5)
and
$\displaystyle\langle f_{x}(t)f_{x}(t^{\prime})\rangle=\langle
f_{y}(t)f_{y}(t^{\prime})\rangle=2m\gamma_{0}k_{B}T\delta(t-t^{\prime})\;\;.$
(6)
Here $k_{B}$ is the Boltzmann’s constant and $T$ is the temperature of the
thermal bath. We now consider force from the magnetic field. $\Omega_{0}$ and
$\eta(t)$ which are associated with the magnetic force correspond to the
constant and random parts of the cyclotron frequency ($\Omega$, i.e,
$\Omega=\Omega_{0}+\eta\;\;,$ (7)
where
$\Omega_{0}=\frac{qB_{0}}{m}$ (8)
and
$\eta(t)=\frac{qB_{f}(t)}{m}\;\;.$ (9)
However, $\dot{\eta}$ in the force terms is due to the induced electric field,
and it is the time derivative of $\eta(t)$. To avoid any confusion, we would
mention here that the effect of the magnetic field due to the induced electric
field may be insignificant compared to the applied magnetic field. A detailed
discussion regarding this one may find in Ref. [68]. However, the time
evolution of the fluctuating magnetic field is assumed to be as
$\dot{\eta}=-\frac{\eta}{\tau}+\frac{\sqrt{D}}{\tau}\zeta(t)\;\;.$ (10)
$D$, in the above equation, measures the strength of the fluctuating magnetic
field and $\tau$ is the correlation time. $\zeta(t)$ in Eq. (10) corresponds
to a white Gaussian noise having variance two. The two-time correlation
function of the fluctuating field is given by
$\langle\eta(t)\eta(t^{\prime})\rangle=\frac{D}{\tau}e^{\frac{-|t-t^{\prime}|}{\tau}}\;\;,$
(11)
Thus $\eta(t)$ is the Ornstein-Uhlenbeck noise. In general it has been
considered in the literature [4, 7, 8, 9, 10, 19, 29, 35, 36, 46, 48, 69, 70]
to capture the essential feature of non-Markovian dynamics. We now consider
the motion for the different choices for the potential energy function. In the
following sections, we will explore the choices.
## III Noise induced transition in a linear stochastic system: a unique
signature of the fluctuating magnetic field
In this section, we consider that the Brownian motion is confined in the two
dimensional harmonic potentials with the angular frequency $\omega$ and it can
be read as
$V(x,y)=\omega^{2}m(x^{2}+y^{2})/2\;\;\;.$ (12)
Using Eqs. (10-12) into the Eqs. (3-4) we have
$\dot{u_{x}}=-\omega^{2}x-\gamma_{0}u_{x}+(\Omega_{0}+\eta(t))u_{y}-\frac{\eta
y}{2\tau}+\frac{\sqrt{D}y}{2\tau}\zeta(t)+f_{x}(t)$ (13)
and
$\dot{u_{y}}=-\omega^{2}y-\gamma_{0}u_{y}-(\Omega_{0}+\eta(t))u_{x}+\frac{\eta
x}{2\tau}+\frac{\sqrt{D}x}{2\tau}\zeta(t)+f_{y}(t)\;\;\;.$ (14)
In the Eqs.(13-14) we have used $m=1$. We will follow this in the rest of the
part also. However, the fluctuating magnetic field induces an unusual type
multiplicative noise. It is multiplied by velocity and coordinate,
respectively. In the usual multiplicative noise driven process [26, 27, 28,
29], the noise is multiplied with the coordinate along which the Brownian
particle experiences a random force. However, the above equations can be
decoupled following Ref. [10] as follows
$\displaystyle\dot{u_{x}}$ $\displaystyle=$
$\displaystyle-c^{\prime}(t)x-\gamma^{\prime}(t)u_{x}+(\Omega_{0}+\Omega_{f}(t))[\frac{d}{dt}(e^{-Kt}\alpha_{1}(t))-\Omega_{0}\frac{d}{dt}(L^{-1}u_{x})$
(15) $\displaystyle-$
$\displaystyle\Omega_{f}(t)\frac{d}{dt}(L^{-1}u_{x})-(L^{-1}u_{x})\frac{d}{dt}\Omega_{f}(t)-\frac{\dot{\eta}(t)}{2m}\frac{d}{dt}(L^{-1}x)-\frac{(L^{-1}x)}{2m}\frac{d}{dt}\dot{\eta}(t)$
$\displaystyle+$
$\displaystyle\frac{d}{dt}(\frac{L^{-1}f_{y}(t)}{m})]+\frac{\dot{\eta}}{2m}[e^{-Kt}\alpha_{1}(t)-\Omega_{0}L^{-1}u_{x}-\Omega_{f}(t)L^{-1}u_{x}$
$\displaystyle-$
$\displaystyle\frac{\dot{\eta}}{2m}L^{-1}x+\frac{L^{-1}f_{y}(t)}{m}]+\frac{f_{x}(t)}{m}$
and
$\displaystyle\dot{u_{y}}$ $\displaystyle=$
$\displaystyle-c^{\prime}(t)y-\gamma^{\prime}(t)u_{y}-(\Omega_{0}+\Omega_{f}(t))[\frac{d}{dt}(e^{-Kt}\alpha_{1}(t))+\Omega_{0}\frac{d}{dt}(L^{-1}u_{y})$
(16) $\displaystyle+$
$\displaystyle\Omega_{f}(t)\frac{d}{dt}(L^{-1}u_{y})+(L^{-1}u_{y})\frac{d}{dt}\Omega_{f}(t)+\frac{\dot{\eta}(t)}{2m}\frac{d}{dt}(L^{-1}y)+\frac{(L^{-1}y)}{2m}\frac{d}{dt}\dot{\eta}(t)$
$\displaystyle+$
$\displaystyle\frac{d}{dt}(\frac{L^{-1}f_{x}(t)}{m})]-\frac{\dot{\eta}}{2m}[e^{-Kt}\alpha_{1}(t)+\Omega_{0}L^{-1}u_{y}+\Omega_{f}(t)L^{-1}u_{y}$
$\displaystyle+$
$\displaystyle\frac{\dot{\eta}}{2m}L^{-1}y+\frac{L^{-1}f_{x}(t)}{m}]+\frac{f_{y}(t)}{m}$
where $e^{-Kt}\alpha_{1}(t)$ [10] is the solution of the Eq.(13) at the limit,
$\eta(t)=0$, $f_{y}(t)=0$, $D=0$ and $\Omega_{0}=0.0$. The other quantities
are defined as
$L=\frac{d^{2}}{dt^{2}}+\gamma_{0}\frac{d}{dt}+\omega^{2}\;\;\;,$ (17)
$K=\frac{\gamma_{0}}{2}\;\;\;\;\;,$ (18)
with
$c^{\prime}(t)=\omega^{2}+\frac{\dot{\eta}}{4m^{2}}L^{-1}\dot{\eta}+\frac{(\Omega_{0}+\Omega_{f}(t))}{2m}\frac{d}{dt}(L^{-1}\dot{\eta})\;\;\;,$
(19)
and
$\displaystyle\gamma^{\prime}(t)=\gamma_{0}+\frac{\dot{\eta}}{2m}L^{-1}\Omega_{f}(t)+(\Omega_{0}+\Omega_{f}(t))[\frac{d}{dt}(L^{-1}\Omega_{f}(t))+(L^{-1}\Omega_{f}(t))\frac{d}{dt}+\frac{L^{-1}\dot{\eta}(t)}{2m}]\;\;\;.$
(20)
Figure 1: Demonstration of distribution of charged particles in space for a
linear system for the parameter set, $\omega^{2}=2,\Omega_{0}=7.0$,
$\tau=0.2,\gamma=0.1$ and $k_{B}T=0.025$. (a) Plot of reduce distribution
function ($P(x,y)$ vs coordinate for $D=0.04$. (b) Its cross section along
$x=0$. (c) Plot of reduce distribution function ($P(x,y)$ vs coordinate for
$D=0.057$(d) Its cross section along $x=0$. (e) Plot of reduce distribution
function ($P(x,y)$ vs coordinate $D=0.0575$ (f) Its cross section along $x=0$.
(Units are arbitrary)
It is difficult to solve both the coupled and the decoupled equations even for
the linear system. It is also difficult to write the Fokker-Planck equation in
the phase space. Therefore we are restricted to study the present problem
numerically. We have solved the Eqs.(13-14) using the Heun’s method [71]. It
is a stochastic version of the Euler method which reduces to the second order
Runge-Kutta method in the absence of noise. Details as well reliability of the
method are described in Refs. [46], and [10], respectively. Based on this
method we have calculated stationary reduced distribution function, $P(x,y)$
for different cases and demonstrated in Fig.1. It shows that with an increase
in strength of the fluctuating magnetic field the probability distribution
function may be folded in space even (as shown in panel (c)) for the linear
system. The cross section at $x=0$ of the distribution of particles in space
is plotted in panel (d) which explicitly demonstrates the non monotonic change
in the distribution of particles in space. The panel (e) is also an
interesting one where the distribution function is exhibited at a relatively
large strength of the fluctuating magnetic field. Here a shallow basin with a
minimum at the origin appears which is surrounded by an island. This is
explicit in panel (f) which is the cross section of the panel (e) at $x=0$. Of
course one may expect a transition from panel (c) to (e) on further increase
in strength of the fluctuating magnetic field. If the noise strength is
appreciable large then the distribution function seems to be not a smooth and
continuous one which may correspond to a composed of bound and unbound
motions. However, to check whether the panels like (c) and (e) are the unique
signatures of the fluctuating field or not we consider dynamics with the
following equations of motion,
$\dot{u_{x}}=-\omega^{2}x-\gamma_{0}u_{x}+\eta y+f_{x}(t)$ (21)
and
$\dot{u_{y}}=-\omega^{2}y-\gamma_{0}u_{y}+\eta x+f_{y}(t)\;\;\;.$ (22)
Figure 2: (a) Demonstration of distribution of particles for the linear system
with equations of motion (21-22) in space for the parameter set,
$\omega^{2}=2.0$, $\tau=0.2,\gamma=0.1$, $D=0.1$ and $k_{B}T=0.1$. (b)
Demonstration of distribution of particles for the linear system with equation
of motion (23) in space for the same parameter set. (Units are arbitrary)
For this dynamics the distribution of particle in space has been shown in
panel (a) of Fig.2. It shows that the probability of finding the Brownian
particle decreases monotonically with an increase in distance from the origin.
We now consider another case with the following equation of motion
$\dot{u_{x}}=-\omega^{2}x-\gamma_{0}u_{x}+\eta x+f_{x}(t)$ (23)
The probability of particle for this case also decreases monotonically with an
increase in distance from the origin as shown in panel (b) of Fig.2. Thus
Fig.1 and Fig.2 clearly suggest that the non monotonic change of distribution
of charged particles in space for the linear stochastic system is a unique
signature of the fluctuating magnetic field.
### III.1 Understanding about the non monotonic change of distribution of
particles in a harmonic potential well
Panels (c) and (e) in Fig.1 clearly imply that the distribution of particles
at stationary steady state in the presence of a fluctuating magnetic field may
be drastically different from the Boltzmann type. To understand this one may
invoke a recent Ref.[29]. Here, the relevant equation of motion is
$\dot{x}=f(x)+x\eta(t))/\gamma+f_{x}(t)\;\;\;.$ (24)
The stationary distribution function for this system can be read as [29]
$\rho(x)=N\phi(x)\exp[-\frac{V_{x}(x)}{D_{T}}]\;\;\;,$ (25)
where
$\phi(x)=\frac{A(x)^{2}}{(Dx^{2}+D_{T})}\;\;\;,$ (26)
and
$V_{x}(x)=-\int_{0}^{x}\frac{(f(x^{\prime})A(x^{\prime})+Dx^{\prime})A(x^{\prime})-A^{\prime}(x^{\prime})(Dq^{\prime
2}+D_{T})}{A(q^{\prime})(\frac{Dq^{\prime 2}}{D_{T}}+1)}dq^{\prime}\;\;\;.$
(27)
with
$A(x)=1-\tau[f^{\prime}(x)-f(x)/x]\;\;.$ (28)
$f(x)=-\frac{1}{\gamma}\frac{dV(x)}{dx}\;\;.$ (29)
and
$D_{T}=k_{B}T/\gamma\;\;.$ (30)
$\phi(x)$ and $V_{x}(x)$ are interpreted in Ref. [29] as the inverse of
position dependent diffusion coefficient and the re-normalized potential
energy function, respectively. Making use of the equation,
$\frac{d\rho(x)}{dx}=0$ which defines the location of the extrema of
$\rho(x)$, in the form
$A^{\prime}(x)[Dx^{2}+D_{T}]-xDA(x)+f(x)A(x)^{2}=0\;\;.$ (31)
where $A^{\prime}(x)=\frac{dA(x)}{dx}$. Similarly one may define the location
of the extrema of the re-normalized potential energy field, $V_{x}(x)$, in the
form
$A(x)[Dx+f(x)A(x)]-A^{\prime}(x)[Dx^{2}+D_{T}]=0\;\;.$ (32)
Now one may check easily that for a harmonic potential energy field,
$V(x)=\omega^{2}x^{2}/2$, $\rho(x)$ is a uni modal one with a maximum at $x=0$
and the re-normalized potential energy field (RNPEF) mimics $V(x)$. Thus in
the presence of a harmonic force field, the multiplicative noise which is a
linear function of coordinate can not introduce an additional fixed point into
the RNPEF. Since the noise induced drift term is a linear one, it may modulate
the harmonic frequency of the renormalized potential energy field but can not
create a new fixed point. For further check one may consider a bi stable
potential energy field, $V(x)=ax^{4}-bx^{2}$. $a,b$ are constants which
determine the location of the extrema of the field. Then from Eqs.(31-32) we
have
$128\frac{a^{3}\tau^{2}}{\gamma^{2}}x^{7}+32\frac{a\tau}{\gamma}(a-2\frac{ab\tau}{\gamma})x^{5}++2a(a-8\frac{b\tau}{\gamma}+6\tau
D)x^{3}+(8a\tau D_{T}-b+D)x=0\;\;.$ (33)
and
$128\frac{a^{3}\tau^{2}}{\gamma^{2}}x^{7}+32\frac{a\tau}{\gamma}(a-2\frac{ab\tau}{\gamma})x^{5}++2a(a-8\frac{b\tau}{\gamma}+4\tau
D)x^{3}+(8a\tau D_{T}-b)x=0\;\;.$ (34)
Figure 3: (a) Plot of the reduced distribution function ($\rho(x)$) vs
coordinate for the parameter set $a=0.25$; $b=0.5$; and (1)
$k_{B}T=0.01,\gamma=1.0,D=2.5,\tau=10.0$ (2)
$k_{B}T=0.01,\gamma=0.5,D=2.5,\tau=1.5$. (3)
$k_{B}T=0.01,\gamma=1.0,D=2.5,\tau=1.0$ (4)
$k_{B}T=0.01,\gamma=1.0,D=1.0,\tau=1.0$ (5)
$k_{B}T=0.01,\gamma=1.0,D=2.5,\tau=1.5$ (6)
$k_{B}T=0.1,\gamma=1.0,D=2.5,\tau=1.5$. (b) Plot of $\rho$ vs coordinate
corresponding to panel (a). (c,d) Plot of the renormalized potential energy
function $(V_{x}(x))$ vs coordinate corresponding to panel (a). (Units are
arbitrary)
$x=0$ is a common root for both cases. It is difficult to determine other
roots of the above equations. Then to make the presentation self-sufficient we
demonstrate the distribution function and the related quantities in Fig.3.
Thus five real roots may be possible corresponding to locations of extrema of
the distribution function for a given parameter set. But for the same
parameter set three extrema appear for the re-normalized potential energy
field as like as $V(x)$. Thus again it is proved that the multiplicative noise
which is a linear function of coordinate can not introduce additional fixed
points into the RNPEF. It is to be noted here that the locations of extrema
which are near by to the origin for the distribution function have no
correspondence with the renormalized potential energy field. In other words,
the locations of extrema which are far away from the origin of the
distribution function have correspondence with the RNPEF. These can be read
approximately from Eqs.(33-34) as
$x_{\pm}\simeq\pm\sqrt{\frac{b}{2a}-\frac{\gamma}{4a\tau}}\;\;.$ (35)
Thus the noise induced transition is controlled by the position dependent
diffusion. The unexpected maximum at the origin for the distribution function
may be due to the very weak diffusion at this region. The apparent unstable
motion in between stable and unstable fixed points of the potential energy
field is a balance like situation where the force from the potential energy
favors to find the particle but the position dependent diffusion opposes it.
Then from the above discussion, it is apparent that the fluctuating magnetic
field induced transition in a linear stochastic system seems to be due to an
implicit dynamics. Since the terms in equations of motion with multiplicative
noises are linear function of phase space variables then the drift terms which
are introduced by these can not create new fixed points in the re-normalized
potential energy field. It may be irrespective of the nature of the
multiplicative noises. For further details one may go through Ref. [29].
Another point is to be noted here that if the magnetic field is a time
independent one ($\eta(t)=0$) then the stationary distribution of particles is
a Boltzmann one[52, 43, 44] i.e.
$\rho(x,y,u_{x},u_{y})=Ne^{-\frac{E}{k_{B}T}}$. Here $N$ is the normalization
constant and
$E(=\frac{mu_{x}^{2}+mu_{y}^{2}+mu_{x}^{2}+m\omega^{2}(x^{2}+y^{2})}{2})$
corresponds to the total mechanical energy. $E$ is a constant of motion in the
absence of the thermal bath and the time dependent magnetic field since the
magnetic force due to the time independent magnetic field does not work. If
this system is coupled with the thermal bath then the stationary state is an
equilibrium one with Boltzmann distribution function. We now consider the
other case. Based on the equation of motion (13-14) in the absence of thermal
bath the rate of change of energy ($E$) of the system with time can be read as
$\dot{E}=\frac{\dot{\eta}m}{2}(y\dot{x}-x\dot{y})$ (36)
Thus the energy of this system is not a constant of motion due to the induced
electric field. Therefore on coupling this system with the thermal bath, the
stationary state may be a steady state one with the non Boltzmann type
distribution function. In other words, the random force due to the fluctuating
magnetic field is not related to the damping strength and therefore the
stationary state must be a steady state one. As a signature of that the
stationary distribution function may depend on the strength of both the time
independent and the dependent parts of the magnetic field. The effect of the
time dependent part is already explicitly shown in Fig.1.
We are now in a position to explore the relevant implicit dynamics (if any).
Fig.2 implies that the time independent part of the applied magnetic field has
an important role for the manifestation of the unique signature. Then we
demonstrate the fate of panels (c) and (e) in Fig.1 at a relatively low value
of $\Omega_{0}$ in Fig.4. On the other hand, If the strength of the time
independent magnetic field is appreciable large then the distribution function
seems to be not a smooth and continuous one as happens in the case of
fluctuating magnetic field. However, to know the probable reason which is
related to the present context we consider the following equations of motion
$\dot{u}_{x}=-\omega^{2}x+\Omega_{0}u_{y}$ (37)
and
$\dot{u}_{y}=-\omega^{2}y-\Omega_{0}u_{x}\;\;\;.$ (38)
The above coupled equations of motion can be solved using the transformation,
$\xi=x+iy$[56, 57]. Then we have
$\ddot{\xi}=-\omega^{2}\xi-2\beta\dot{\xi}\;\;\;,$ (39)
where $\beta=i\Omega_{0}/2$. This leads to have the solution of the above
equation as
$\xi(t)=\xi(0)e^{-\beta t}cos(\sqrt{\omega^{2}-\beta^{2}}t)\;\;\;.$ (40)
Decomposing it time dependence of $x(t)$ and $y(t)$ can be read as
$\displaystyle x(t)$ $\displaystyle=$
$\displaystyle\frac{x(0)}{2}[cos(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}+\Omega_{0}/2)t+cos(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}-\Omega_{0}/2)t]$
(41) $\displaystyle+$
$\displaystyle\frac{y(0)}{2}[sin(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}+\Omega_{0}/2)t-sin(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}-\Omega_{0}/2)t]\;\;\;$
and
$\displaystyle y(t)$ $\displaystyle=$
$\displaystyle\frac{y(0)}{2}[cos(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}+\Omega_{0}/2)t+cos(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}-\Omega_{0}/2)t]$
(42) $\displaystyle-$
$\displaystyle\frac{x(0)}{2}[sin(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}+\Omega_{0}/2)t-sin(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}-\Omega_{0})/2)t]\;\;\;.$
Figure 4: Demonstration of distribution of charged particles in space for a
linear system for the parameter set, $\tau=0.2,\gamma=0.1$ and $k_{B}T=0.025$.
(a, b) Plot of reduce distribution function ($P(x,y)$ vs coordinate for
$\omega^{2}=2$. (c,d) Plot of reduce distribution function ($P(x,y)$ vs
coordinate for $\Omega_{0}=7.0$. (Units are arbitrary)
Now one can check easily that the above relations reduce to the expected
results i.e., the simple harmonic motion at the limit $\Omega_{0}=0.0$. But in
the presence of a magnetic field $x(t)$ as well as $y(t)$ are composed of two
vibrational modes with angular frequencies,
$\omega_{1}=\sqrt{\omega^{2}+\Omega_{0}^{2}/4}+\Omega_{0}/2$ and
$\omega_{2}=\sqrt{\omega^{2}+\Omega_{0}^{2}/4}-\Omega_{0}/2$ respectively.
Thus if the field strength is sufficiently large such that the harmonic force
seems to be very weak then the high frequency mode approaches a cyclotron
motion and the other one may behave as like a free particle one. Both the
modes may be important to appear the noise induced transition in a linear
stochastic system. The low frequency mode makes the induced electric field
significant at relatively large strength of the fluctuating magnetic field.
Then the motion at steady state seems to be like cyclotron one as implied by
the high frequency mode. It might be apparent in panel (e) of Fig.1. In other
words, if the fluctuating magnetic as well as induced electric fields are weak
then the stationary distribution of particles may be close to the equilibrium
one with a maximum at the origin (as shown in panel (a) of Fig.1)
corresponding to a stable fixed point. An interim situation may be like panel
(c) in the same figure. This explanation implies that at relatively low
strength of the time independent magnetic field or high frequency of the
harmonic oscillator, the distribution of particles may be like the Boltzmann
type. Thus Fig.4 might be the justification of the explanation. At the same
time one may not expect the noise induced transition for dynamics which are
described by Eqs. (21-22) and (23), respectively. Thus the noise induced
transition in a linear stochastic system may be a unique signature of the
magnetic field.
Figure 5: Demonstration of distribution of charged particles in space for a
linear system for the parameter set, $\omega^{2}=2,\Omega_{0}=7.0$ and
$k_{B}T=0.025$. (a,b) Plot of reduce distribution function ($P(x,y)$ vs
coordinate for $\tau=0.2$. (c,d) Plot of reduce distribution function
($P(x,y)$ vs coordinate for $\gamma=0.1$. (Units are arbitrary)
### III.2 Effect of the damping strength and the correlation time on the
distribution of particles
Since the stationary state in the presence of a fluctuating magnetic field is
a steady state one then the distribution of particles may depend on the
damping strength and the correlation time of the fluctuating magnetic field.
The fate of the panels (c) and (e) in Fig.1 at a relatively higher damping
strength or correlation time has been demonstrated in Fig.5. It implies that
if the energy dissipation dominates over the work done by the induced electric
field then the cyclotron like motion may not sustain at the steady state and
the distribution may be closed to an equilibrium one. A similar situation may
appear even for a low damping strength provided the variance of the
fluctuating magnetic field becomes small at a relatively large correlation of
the noise. Thus Fig.5 corroborates the explanation as given in the previous
subsection.
Figure 6: Demonstration of distribution of charged particles in space for a
linear system for the parameter set, $\tau=0.2,\gamma=0.1,\omega^{2}=2$ and
$\Omega_{0}=7.0$. (Units are arbitrary)
### III.3 Effect of temperature on the distribution of particles
In Fig.6 we have demonstrated how the distribution of particles may depend on
the temperature in the presence of a fluctuating magnetic field. At relatively
low temperature, panels (c) and (e) in Fig.1 may be like panels (a) and (b) in
Fig.6, respectively. Then it is apparent that under this circumstance the
induced electric field may not be significant to survive cyclotron like motion
at steady state and the distribution of particles may be close to Boltzmann
type. A similar situation may appear as shown in panels (c) and (d) of Fig.6
even at relatively high temperature provided the fluctuating magnetic field is
very weak. Thus the magnetic field plays an important role in the noise
induced transition in a linear stochastic system.
Figure 7: Demonstration of distribution of charged particles in space for the
non linear system for the parameter set, $a=0.25,b=0.5$,
$\tau=0.2,\gamma=0.1,\omega^{2}=2$, $k_{B}T=0.025$ and $\Omega_{0}=7.0$.
(Units are arbitrary) Figure 8: Demonstration of distribution of charged
particles in space for the linear system for the parameter set,
$a=0.25,b=0.5$, $\tau=0.2,\omega^{2}=2,D=0.04$, $k_{B}T=0.025$ and
$\gamma=0.1$. (Units are arbitrary)
## IV Fluctuating magnetic field induced islands formation in a non linear
system
The noise induced transition in a linear stochastic system strongly motivate
us to consider a nonlinear system such as the Brownian motion in two
dimensional bi-stable potential energy field. The potential energy field is
given by
$V(x,y)=ax^{4}-bx^{2}+\omega^{2}y^{2}/2\;\;\;,$ (43)
Then the equation for the $x$ component of the motion can be read as
$\dot{u_{x}}=-4ax^{3}+2bx-\gamma u_{x}+(\Omega_{0}+\eta(t))u_{y}-\frac{\eta
y}{2\tau}+\frac{\sqrt{D}y}{2\tau}\zeta(t)+f_{x}(t)\;\;\;.$ (44)
Solving the above equation along with Eqs.(10, 14) we have determined the
reduced distribution functions, $P(x,y)$ at the stationary state and plotted
in Fig.7. Panel (a) in this figure shows that the distribution of particles in
space is closed to the Boltzmann like if the strength of the time dependent
magnetic field is relatively very weak. At this condition the system is near
to the equilibrium condition $(\eta(t)=0)$. However, panel (b) is an
interesting which shows that on further increase in strength of the field, a
maximum may appear at the unstable fixed point ($x=0$, $y=0$). It has a
similarity with the curves (3, 5, and 6) in panel (a) of Fig.3. Thus panel (a)
in Fig.7 is an example of diffusion controlled noise induced transition. On
further increase in strength of the fluctuating field the distribution of
particles may become more complex as shown in other panels of Fig.7. It is to
be noted that one may find a similar kind of distribution of particles (as
shown in Fig.8) on changing the strength of the time independent magnetic
field in the presence of fluctuating field at a given strength. From these
figures, one may notice the following points. First, islands may be formed
nearby the fixed points. The probability at the stable fixed points may be
less compared to the lands as like as the harmonic oscillator. Second, the
shape of the islands may be different for the non linear system. It is
apparent in panels (c, d, e, and f) of Fig.7 and panel (b, c, d, e, f, and g)
of Fig.8 that time dependent magnetic field induced symmetry reduction may be
significant for the nonlinear system. The equations of motion are not remain
in variant for changing the phase space variables $x,y,u_{x},u_{y}$ and $\eta$
to $-x,-y,-u_{x},-u_{y}$ and $-\eta$. Another reason may be the interplay
among the cyclotron like motions around the stable and unstable fixed points,
respectively. This is apparent in Figs. 7 and 8 through the nature of
transition among the different kind of distribution functions.
Figure 9: Demonstration of distribution of charged particles in space for the
linear system for the parameter set, $a=0.25,b=0.5$, $\omega^{2}=2$, $D=0.04$
and $\Omega=7.0$. (a, b, c) $gamma=0.1$ (d, e, f) $\tau=0.2$. (Units are
arbitrary)
We now consider the influence of the correlation time of the fluctuating
magnetic field on the distribution of charged particles in space. In this
context, we demonstrate the distribution function for different $\tau$ in
panels (a), (b), and (c) of Fig.9. It shows that new islands are formed with a
decrease in the correlation time. The variance of the fluctuating magnetic
field is enhanced for the decrease of $\tau$ and as a result of that the
induced electric field becomes more significant to introduce new islands as
explained above. Thus these panels are consistent with Fig.7. Similarly, the
noise induced transition may depend on the damping strength as shown in panels
(d), (e), and (f) of Fig.9. Here it is apparent that the effectiveness of the
induced electric field may be more significant (for a given strength of the
fluctuating magnetic field) as the energy dissipation becomes weak. Another
important point is to be noted here that even for a small change in
correlation time of the fluctuating magnetic field or damping strength new
islands may be formed. It may be around the unstable fixed point or near the
stable fixed point. These observations imply that the change in the structure
of the distribution is not due to modification of the potential energy field.
In other words, the noise induced is due to the interplay between the
potential energy field and the cyclotron like motion.
## V Conclusion
We have studied the distribution of particles in space in the presence of a
fluctuating magnetic field. The field introduces an unusual type of
multiplicative noise terms which are linear functions of coordinate and
velocity, respectively. The dynamics with these terms offers a versatile
structure of the distribution function. Our investigation includes the
following major points.
(i) In the presence of a harmonic force field, the distribution function may
be folded around the origin with either a maximum or minimum at the origin at
relatively high strength of both time dependent and independent fields. These
sharp contrast behaviors of a linear stochastic system are due to unique
signature of the fluctuating magnetic field.
(ii) If the potential energy field is a non linear one then new islands like
regions are formed in the distribution of charged particles in space with an
increase in the strength of the fluctuating magnetic field. The land may be
formed near the stable fixed points instead of folding of the distribution
function in space around the stable fixed points as happens in the linear
system.
(iii) At the relatively large strength of the fluctuating field, the
distribution of particles may be a strange one where many islands may appear
which are not expected from the given potential energy field. It may offer an
explanation to describe the phenomenon, the reduction of the current in a
semiconductor in the presence of a time dependent magnetic field.
(iv) The reduction of the symmetry of the system due to time dependent
magnetic field may be significant for the nonlinear system.
(v) The structure of the distribution function may depend strongly on damping
strength and the correlation time of fluctuating magnetic field. Then it is
apparent that the change of the shape of the distribution function is not due
to the modification of the potential energy function with new fixed points.
(vi) If the strength of the fluctuating magnetic field is appreciable large
then the shape of the distribution may depend on the temperature.
Acknowledgment
L.R.R.B. acknowledges financial support from DST-INSPIRE from the Department
of Science and Technology, Government of India.
## References
* [1] L. Gammaitoni, P. Hänggi, P. Jung, and F. Marchesoni, Rev. Mod. Phys. 70, 223 (1998).
* [2] T. Wellens, V. Shatokhin, and A. Buchleitner, Rep. Prog. Phys. 67, 45 (2003).
* [3] S. Rajasekar and M. A. F. Sanjuan, Nonlinear Resonances, Springer Series in Synergetics (Springer, Cham, 2016).
* [4] S. Mondal, J. Das, B. C. Bag, and F. Marchesoni, Phys. Rev. E 98, 012120 (2018).
* [5] A. S. Pikovksy and J. Kurths, Phys. Rev. Lett. 78, 775 (1997).
* [6] C. R. Doering and J. C. Gadoua, Phys. Rev. Lett. 69, 2318 (1992).
* [7] P. Majee, G. Goswami, and B. C. Bag, Chem. Phys. Lett. 416, 256 (2005).
* [8] B. C. Bag and C. -K. Hu, Phys. Rev. E 73, 061107 (2006); B. C. Bag and C. -K. Hu, Phys. Rev. E 75, 042101 (2007).
* [9] S. Ray, D. Mondal, and B. C. Bag, J. Chem. Phys. 140, 204105 (2014).
* [10] S. Mondal, S. Das, A. Baura, and B. C. Bag, J. Chem. Phys. 141, 224101 (2014).
* [11] F. Marchesoni, Phys. Lett. A 237, 126 (1998).
* [12] P. Reimann, Phys. Rep. 361, 57 (2002).
* [13] G. Goswami, P. Majee, P. K. Ghosh, and B. C. Bag, Physica A 375, 429 (2007).
* [14] B. C. Bag and C. -K. Hu, J. Stat. Mech. (2009) P02003.
* [15] D. Cubero and F. Renzoni, Brownian Ratchets: From Statistical Physics to Bio and Nanomotors (Cambridge University Press, Cambridge, 2016).
* [16] F. Cecconi, G. Gonnella, and G. P. Saracco, Phys. Rev. E 75, 031111 (2007).
* [17] P. K. Ghosh, M. K. Sen, and B. C. Bag, Phys. Rev. E 78, 051103 (2008).
* [18] M. K. Sen, S. Ray, A. Baura, and B. C. Bag, Chem. Phys. Lett. 559, 117 (2013).
* [19] S. Mondal, M. K. Sen, A. Baura, and B. C. Bag, Physica A 445, 128 (2016).
* [20] J. M. R. Parrondo, C. Van den Broeck, J. Buceta, and F. J. dela Rubia, Physica A 224, 153 (1996).
* [21] S. S. Riaz, S. Dutta, S. Kar, and D. S. Ray, Eur. Phys. J. B 47, 255 (2005).
* [22] D. Das and D. S. Ray, Phys. Rev. E 87, 062924 (2013).
* [23] W. Horsthemke and R. Lefever, Noise-Induced Transitions: Theory and Applications in Physics, Chemistry, and Biology, Springer Series in Synergetics, Vol. 15 (Springer, Berlin, 1984).
* [24] L. Arnold, W. Horsthemke, and R. Lefever, Z. Phys. B 29, 367 (1978).
* [25] M. -O. Hongler, Helv. Phys. Acta 52, 280 (1979).
* [26] S. I. Denisov, A. N. Vitrenko, and W. Horsthemke, Phys. Rev. E 68, 046132 (2003).
* [27] A. N. Vitrenko, arXiv:1612.03442v1
* [28] P. Landa and A. Zaikin, Phys. Rev. E 54, 3535 (1996).
* [29] S. Mondal and B. C. Bag, Phys. Rev. E 91 042145 (2015).
* [30] J. Smythe, F. Moss, and P. V. E. McClintock, Phys. Rev. Lett, 51, 1062 (1983).
* [31] C. Van den Broeck, J. M. R. Parrondo, and R. Toral, Phys. Rev. Lett, 73, 3395 (1995).
* [32] A. A. Zaikin, J. Garcıá-Ojalvo, and L. Schimansky-Geier, Phys. Rev. E 60, R6275 (1999).
* [33] P. S. Landa, A. A. Zaikin, V. G. Ushakov, and J. Kurths, Phys. Rev. E 61, 4809 (2000).
* [34] A. I. Olemskoi, D. O. Kharchenko, and I. A. Knyaz, Phys. Rev. E 71, 041101 (2005).
* [35] B. C. Bag, K. G. Petrosyan, and C. -K. Hu, Phys. Rev. E 76, 056210 (2007).
* [36] S. Ray, M. K. Sen, A. Baura, and B. C. Bag, Eur. Phys. J. B 85, 306 (2012).
* [37] V. V. Semenov, A. B. Neiman, T. E. Vadivasova and V. S. Anishchenko, Phys. Rev. E 93, 052210 (2016).
* [38] V. V. Semenov, Phys. Rev. E 95, 052205 (2017).
* [39] K. Amemiya, J. Phys. Soc. Jpn. 72, 135 (2003).
* [40] A. S. Moskalenkoa, S. D. Ganicheva, V. I. Pereĺ, and I.N. Yassievicha, Physica B 273-274, 1007 (1999); V. I. Pereĺ and I.N. Yassievich, JETP Letts. 68, 804 (1998); A. S. Moskalenko, V. I. Pereĺ, and I. N. Yassievich, JETP 90, 217 (2000).
* [41] N. Telang and S. Bandyopadhyay, Appl. Phys. Letts. 66, 1623 (1995).
* [42] E. E. Vdovin, A. Levin, A. Patanè, L. Eaves, P. C. Main, Y.N. Khanin, Y.V.Dubrovskii, M. Henini and G. Hill, Science 290, 122 (2000).
* [43] A. Baura, M. K. Sen, and B. C. Bag, Phys. Chem. Chem. Phys. 13, 9445 (2011).
* [44] A. Baura, M. K. Sen, and B. C. Bag, Chem. Phys. 417, 30 (2013).
* [45] A. Baura, S. Ray, and B. C. Bag, J. Chem. Phys. 138, 44110 (2013).
* [46] S. Mondal, A. Baura, S. Das, and B. C. Bag, Physica A 502, 58 (2018).
* [47] F. N. C. Paraan, M. P. Solon, and J. P. Esguerra, Phys. Rev. E 77, 022101 (2008).
* [48] A. Baura, M. K. Sen, and B. C. Bag, Eur. Phys. J. B 75, 267 (2010); A. Baura, S. Ray, M. K. Sen, and B. C. Bag, J. Appl. Phys. 113, 124905 (2013).
* [49] J. C. Hidalgo-Gonzalez, J. I. Jiménez-Aquino, and M. Romero-Bastida, Physica A 462, 1128 (2016).
* [50] J. Das, S. Mondal, and B. C. Bag, J. Chem. Phys. 147, 164102 (2017); J. Das and B. C. Bag, Phys. Rev. E 103, 046101 (2021); J. Das, M. Biswas, and B. C. Bag, arXiv:2011.09771.
* [51] J. C. Hidalgo-Gonzalez and J. I. Jimenez-Aquino, Phys.Rev. E 100, 062102 (2019).
* [52] A. Baura, M. K. Sen, and B. C. Bag, Phys. Rev. E 82, 041102 (2010).
* [53] P. S. Pal, S. Rana, A. Saha, and A. M. Jayannavar, Phys. Rev. E 90, 022143 (2014).
* [54] S. Ray, A. Baura, and B. C. Bag, Chaos 23, 043121 (2013).
* [55] M. L. Mittal, Y. S. Prahalad, and D. G. Thirtha, J. Phys. A: Math. Gen. 13, 1095 (1980); A. M. Jayannavar and M. Sahoo, Phys. Rev. E 75, 032102 (2007); D. Roy and N. Kumar, Phys. Rev. E 78, 052102 (2008).
* [56] J. I. Jiménez-Aquino and R. M. Velasco and F. J. Uribe, Phys. Rev. E 77, 051105 (2008).
* [57] L. D. Landau and E. M. Lifshitz, The Classical Theory of Fields (Third Revised English Edition, Pergamon Press Ltd., Oxford, 1971).
* [58] S. E. Savelév and F. Marchesoni, Phys. Rev. E 90, 062117 (2014).
* [59] T. Chen, X. B. Wang and T. Yu, Phys. Rev. E 90, 022101 (2014); S. Ray, M. Rano, and B. C. Bag, J. Chem. Phys. 142, 154122 (2015).
* [60] A. K. Ram and B. Dasgupta, Physics of Plasmas 17, 122104 (2010 ); V. Gelfreich, V. Rom-Kedar, K. Shah, and D. Turaev, Phys. Rev. Letts. 106, 074101 (2011).
* [61] B. (ed.) Scrosati, Applications of Electroactive Polymers (Chapman & Hall, London, 1993).
* [62] P. G. Bruce, Solid State Electrochemistry (Cambridge Univ. Press, Cambridge, 1995); F. M. Gray, Polymer Electrolytes (RSC Materials Monographs, The Royal Society of Chemistry, Cambridge, 1997).
* [63] J. -M. Tarascon and M. Armand, Nature 414, 359 (2001).
* [64] C. A. Angell, C. Liu, and E. Sanchez, Nature (London) 137, 362 (1993).
* [65] A. M. Christie, S. J. Lilley, E. Staunton, Y. G. Andreev, and P. G. Bruce, Nature (London) 433, 50 (2005).
* [66] F. Grossmann, T. Dittrich, P. Jung, and P. Hänggi, Phys. Rev. Lett. 67, 516 (1991); S. Q. Duan, Z. G.Wang, B. Y. Wu, and X. G. Zhao, Phys. Lett. A 320, 63 (2003); S. Q. Duan and X. G. Zhao, Phys. Rev. B 69, 035305 (2004); C. E. Creffield and G. Platero, ibid. 69, 165312 (2004); Y. W. Xie, S. Q. Duan, and X. G. Zhao, Phys. Lett. A 369, 230 (2007).
* [67] S. Kohler, J. Lehamann, and P. Hänggi, Phys. Rep. 406, 379 (2005); G. Platero and R. Aguado, ibid. 395, 1 (2004); T. Fujisawa and S. Tarucha, Superlattices Microstruct. 21, 247 (1997); W. G. van der Wiel, S. De Franceschi, J. M. Elzerman, T. Fujisawa, S. Tarucha, and L. P. Kouwenhoven, Rev. Mod. Phys. 75, 1 (2003).
* [68] S. Mondal, M. Biswas, and B. C. Bag, arXiv:2101.00861.
* [69] P. Hänggi, F. Marchesoni and P. Grigolini, Z. Phys. B 56, 333 (1984).
* [70] S. Okuyama and D. W. Oxtoby, J. Chem. Phys. 84, 5830 (1986); B. C. Bag, J. Chem. Phys., 119, 4988 (2003); A. Baura, M. K. Sen, G. Goswami, and B. C. Bag, J. Chem. Phys. 134, 044126 (2011); S. Ray and B. C. Bag, Phys. Rev. E 90, 032103 (2014); S. Ray and B. C. Bag, Phys. Rev. E 92, 052121 (2015).
* [71] R. Toral, Eds. P. Garrido and J. Marro Computational Physics, Lecture Notes in Physics vol 448 (Springer-Verlag, Berlin,1995).
| arxiv-papers | 2021-07-27T06:43:32 | 2024-09-04T03:07:20.715368 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Shrabani Mondal, L. R. Rahul Biswas, Mousumi Biswas, and Bidhan\n Chandra Bag",
"submitter": "Shrabani Mondal",
"url": "https://arxiv.org/abs/2107.12623"
} |
2107.12624 | # Three characterizations of strict coherence on infinite-valued events
Tommaso Flaminio IIIA - CSIC
Campus de la Universidad Autònoma de Barcelona s/n, 08193 Bellaterra, Spain
[email protected]
###### Abstract.
This paper builds on a recent article co-authored by the present author, H.
Hosni and F. Montagna. It is meant to contribute to the logical foundations of
probability theory on many-valued events and, specifically, to a deeper
understanding of the notion of strict coherence. In particular, we will make
use of geometrical, measure-theoretical and logical methods to provide three
characterizations of strict coherence on formulas of infinite-valued
Łukasiewicz logic.
Keywords. De Finetti’s coherence; strict coherence; faithful states; MV-
algebras; Łukasiewicz logic.
## 1\. Introduction and motivation.
In a collection of seminal contributions starting with [5] and culminating in
[6], de Finetti grounded subjective probability theory on an ideal betting
game between two players, a bookmaker and a gambler, who wager money on the
occurrence of certain events $e_{1},\ldots,e_{k}$. For each event $e_{i}$,
gambler’s payoffs are $1$ in case $e_{i}$ occurs, and $0$ otherwise. The
probability of an event $e_{i}$ is defined, by de Finetti, as the fair selling
price fixed by the bookmaker for it.
Conforming to a standard notation, bookmaker’s prices for the events
$e_{1},\ldots,e_{k}$ will be referred to as betting odds and an assignment
$\beta:\\{e_{1},\ldots,e_{k}\\}\to[0,1]$ of betting odds
$\beta(e_{i})=\beta_{i}$ will be called a book.
De Finetti had no particular inclination towards identifying events in a
precise logical ground [9]. However, in order for his main result to be stated
in precise mathematical terms, they will be understood, for the moment, as
elements of a finitely generated free boolean algebra and hence coded by
boolean formulas. Now, de Finetti’s result reads as follows: let us fix
finitely many events $e_{1},\ldots,e_{k}$ and a book $\beta$ on them. A
gambler must choose stakes $\sigma_{1},\ldots,\sigma_{k}\in\mathbb{R}$, one
for each event, and pay to the bookmaker the amount $\sigma_{i}\cdot\beta_{i}$
for each $e_{i}$. When a (classical propositional) valuation $w$ determines
$e_{i}$, the gambler gains $\sigma_{i}$ if $w(e_{i})=1$ and $0$ otherwise. The
book $\beta$ is said to be coherent if there is no choice of stakes
$\sigma_{1},\ldots,\sigma_{k}\in\mathbb{R}$ such that for every valuation $w$
() $\sum_{i=1}^{k}\sigma_{i}\cdot\beta_{i}-\sum_{i=1}^{k}\sigma_{i}\cdot
w(e_{i})=\sum_{i=1}^{k}\sigma_{i}(\beta_{i}-w(e_{i}))<0.$
The left hand side of () captures the bookmaker’s payoff, or balance, relative
to the book $\beta$ under the valuation $w$.
Note that a stake $\sigma_{i}$ may be negative. Following tradition, money
transfers are so oriented that “positive” means “gambler-to-bookmaker”.
Therefore, if $\sigma_{i}<0$, the bookmaker is forced to swap his role with
the gambler: he has to pay $-\sigma_{i}\cdot\beta(e_{i})$ to the gambler in
hopes of winning $-\sigma_{i}$ in case $e_{i}$ occurs.
De Finetti’s Dutch-Book theorem characterizes coherent books as follows: a
book $\beta$ on events $e_{1},\ldots,e_{k}$ pertaining to a boolean algebra
${\bf A}$ is coherent iff it extends to a finitely additive probability $P$ of
${\bf A}$, [5].
Along with the assumptions which regulate de Finetti’s coherence criterion,
condition () above effectively forces the bookmaker to set _fair prices_ for
gambling on events $e_{1},\ldots,e_{k}$. In other words, upon regarding each
event $e_{i}$ as a $\\{0,1\\}$-valued random variable, de Finetti’s Dutch-Book
theorem amounts to saying that coherent assessments are those with null
expectation. For, if the bookmaker publishes a book with positive expectation
(for him) a logically infallible gambler will choose negative stakes and
inflict a sure loss on him, that is to say, a sure financial loss whatever the
outcome of events.
Although coherence guards the bookmaker against the possibility of sure loss,
at the same time it may bar him from making a profit. To illustrate the idea,
consider an event $e$ which is neither noncontradictory nor sure and the
coherent book $\beta(e)=0$. If the gambler bets $1$ on $e$, then her balance
is as follows: she pays $1\cdot 0=0$ and gets back $0$ if $w(e)=0$ and $1$ if
$w(e)=1$. Hence, the bookmaker never wins and possibly loses.
This rather odd feature of coherence was questioned in the mid 1950’s first by
Shimony [32] and then by Kemeny [16]. These authors studied a refinement of de
Finetti’s coherence that nowadays goes under the name of strict coherence (see
[11]). Intuitively, a choice of prices is strictly coherent if every
possibility of loss, for the bookmaker, is paired by a possibility of gain.
Precisely, a book $\beta$ is strictly coherent if, for each choice of stakes
$\sigma_{1},\ldots,\sigma_{k}\in\mathbb{R}$, the existence of a valuation $w$
such that $\sum_{i=1}^{k}\sigma_{i}(\beta_{i}-w(e_{i}))<0$ implies the
existence of another one $w^{\prime}$ for which
$\sum_{i=1}^{k}\sigma_{i}(\beta_{i}-w^{\prime}(e_{i}))>0$.
Interest in the condition of strict coherence was prompted by Carnap’s
analysis of what he called “regular” probability functions in [1] (see also
[31, Chapter 10]) and which we will term as Carnap probabilities. Those
functions arise from the axiomatization of finitely additive probabilities by
strengthening the usual normalization axiom in the right-to-left direction:
$1$ (respectively, $0$) is assigned only to tautologies (respectively,
contradictions). In other words, a probability function $P$ is Carnap, if it
is normalized, finitely additive and it satisfies $P(e)\neq 0$ for every
noncontradictory event $e$. In [11] the authors characterized strictly
coherent books on boolean events in terms of their extendability to Carnap
probabilities111Carnap probabilities are the same as Carnap-regular
probabilities of [11]. In the present paper we adopt this simplified notation
in order to avoid any misleading interpretation of the adjective “regular”
which has indeed different meanings if referred to probability functions or to
Borel measures which will be discussed in Section 4..
Several authors proposed generalizations of de Finetti’s coherence criterion
and his Dutch-Book theorem to events not pertaining to boolean logic. Paris in
[30] extended the classical Dutch-Book theorem to several non-classical
propositional logics including the modal logics K, T, S4, S5 and certain
paraconsistent logics as well. In [34], Weatherson considered the case of
events pertaining to intuitionistic logic and in [26], Mundici extended de
Finetti’s criterion to the case of infinite-valued Łukasiewicz logic and MV-
algebras [3, 27].
In the MV-algebraic realm valuations are $[0,1]$-valued and hence they
correspond to homomorphisms into the standard MV-algebra defined on the unit
interval $[0,1]$. De Finetti’s coherence criterion immediately translates to
the MV-setting with no extra conditions and the main result of [26] (see also
[19]) is a de Finetti-like theorem which characterizes coherent books on
Łukasiewicz events as those which are extendible to states, i.e.,
$[0,1]$-valued normalized and finitely additive maps of an MV-algebra.
From the perspective of reasoning about uncertainty, the interest in
Łukasiewicz events is twofold: on the one hand these events capture properties
of the world which are better described as gradual rather than yes-or-no; on
the other hand, they also mimic bounded random variables. Indeed, any
Łukasiewicz event $e$ may be regarded as a $[0,1]$-valued continuous function
$f_{e}$ on a compact Hausdorff space (see [3, Theorem 9.1.5] and Section 2)
and any state of $e$ coincides with the expected value of $f_{e}$ ([17, 29],
[10, Remark 2.8] and Section 4). Therefore, up to renormalization, Mundici’s
generalization of de Finetti’s theorem [26, Theorem 2.1] implies the Dutch-
Book theorem for books on bounded continuous random variables.
For events pertaining to the restricted class of finite-dimensional MV-
algebras, in [11, Theorem 6.4] the authors proved a de Finetti-like theorem
for strictly coherent books in terms of their extendability to faithful
states, i.e., states which satisfy $s(a)\neq 0$ for all $a\neq 0$.
Nevertheless, extending [11, Theorem 6.4] to more general classes of MV-
algebras is delicate because, as a consequence of seminal results by Mundici
[25, Proposition 3.2], Kelley [15], and Gaifman [13], an MV-algebra may not
have a faithful state.
In this paper we will investigate strictly coherent books on Łukasiewicz
events, i.e., elements of a finitely generated free MV-algebra. Our results
sensibly extend the results of [11]. In particular, we will provide three
characterizations of strict coherence by adopting geometrical, measure-
theoretical and logical methods. In more details:
Geometrical approach: the functional representation of $n$-generated free MV-
algebras in terms of $n$-variable, piecewise-linear continuous functions (see
[3, Theorem 9.1.5] and [23]) implies that the set of all coherent books on a
finite set $\Phi$ of Łukasiewicz events forms a convex polyhedron
$\mathscr{D}_{\Phi}$ of $\mathbb{R}^{k}$. The main result of Section 3 shows
that strictly coherent books on $\Phi$ form a subset of $\mathbb{R}^{k}$ which
coincides with the relative interior of $\mathscr{D}_{\Phi}$.
Measure-theoretical approach: faithful states are the MV-algebraic analog of
Carnap probabilities on a boolean algebra. In Section 4 we will first give an
integral representation theorem for faithful states on finitely generated free
MV-algebras and then we will characterize strictly coherent books on
Łukasiewicz events as those which extend to a faithful state.
Logical approach: the relation among free MV-algebras, rational polyhedra and
deducibility in propositional Łukasiewicz logic, will enable us to
characterize the notions of coherence and strict coherence within
propositional Łukasiewicz logic (see Section 5). In our opinion this result is
interesting because it shows that propositional Łukasiewicz logic is capable
to capture foundational aspects of probability theory on infinite-valued
events.
In the next section we will introduce necessary preliminaries about MV-
algebras and rational polyhedra.
## 2\. Preliminaries.
The algebraic framework of this paper is that of MV-algebras (see [3, 27]),
i.e., the Lindenbaum algebras of Łukasiewicz infinite-valued logic [3,
Definition 4.3.1]. A typical example of an MV-algebra is the standard algebra
$[0,1]_{MV}=([0,1],\oplus,\neg,0)$ where $x\oplus y=\min\\{1,x+y\\}$ and $\neg
x=1-x$. Further operations, together with their standard interpretation, are
defined in $[0,1]_{MV}$ as follows: $x\odot y=\neg(\neg x\oplus\neg
y)=\max\\{0,x+y-1\\}$, $x\to y=\neg x\oplus y=\min\\{1,1-x+y\\}$, $x\wedge
y=x\odot(x\to y)=\min\\{x,y\\}$, $x\vee y=\neg(\neg x\wedge\neg
y)=\max\\{x,y\\}$, $1=\neg 0$. This structure generates the class of MV-
algebras both as a variety and as quasi-variety [2].
Another relevant example of an MV-algebra is given by the free $n$-generated
MV-algebra ${\bf F}_{n}$. By a standard universal algebraic argument, ${\bf
F}_{n}$ is the MV-algebra of functions $f:[0,1]^{n}\to[0,1]$ generated by the
projection maps [3, Proposition 3.1.4] and whose operations
$\odot,\oplus,\to,\wedge,\vee$ and $\neg$ are defined via the pointwise
application of those in $[0,1]_{MV}$. By McNaughton theorem, up to
isomorphism, ${\bf F}_{n}$ coincides with the MV-algebra of $n$-variable
McNaughton functions: maps from $[0,1]^{n}$ to $[0,1]$ which are continuous,
piecewise linear, with finitely many pieces, and such that each piece has
integer coefficients (cf. [3, Theorem 9.1.5] and [23]). For each $f\in{\bf
F}_{n}$, the oneset of $f$ is $\\{x\in[0,1]^{n}\mid f(x)=1\\}$ and the zeroset
of $f$ is $\\{x\in[0,1]^{n}\mid f(x)=0\\}$.
The free $n$-generated MV-algebra is, up to isomorphism, the Lindenbaum
algebra of Łukasiewicz logic $\L$ in a language with $n$ propositional
variables and $[0,1]$-valuations of $\L$ are exactly the homomorphisms of
${\bf F}_{n}$ to $[0,1]_{MV}$. Furthermore, every $x\in[0,1]^{n}$ determines
the homomorphism $h_{x}:f\in{\bf F}_{n}\mapsto f(x)\in[0,1]_{MV}$.
###### Proposition 2.1 ([26, Lemma 3.1]).
For each finite $n$, homomorphisms of ${\bf F}_{n}$ to $[0,1]_{MV}$,
$[0,1]$-valued valuations of Łukasiewicz logic on $n$ variables and points of
the $n$-cube $[0,1]^{n}$ are in one-one correspondence.
For every closed subset $C$ of $[0,1]^{n}$, let $I_{C}$ be the subset of ${\bf
F}_{n}$ of those functions whose zeroset contains $C$. Then, $I_{C}$ is an
ideal of ${\bf F}_{n}$ and the quotient ${\bf F}_{n}/I_{C}$ is the MV-algebra
whose universe coincides with the set given by the restrictions to $C$ of the
functions of ${\bf F}_{n}$ (see [3, Proposition 3.4.5]). In particular, when
$C$ has $k$ elements, the quotient MV-algebra ${\bf F}_{n}/I_{C}$ is
isomorphic to the product algebra $[0,1]_{MV}^{k}$, [4]. The finite powers of
$[0,1]_{MV}$ — called locally weakly finite MV-algebras in [4]— are called, in
this paper, finite-dimensional.
### 2.1. Rational polyhedra, regular complexes and McNaughton functions.
In this section we will prepare the necessary results concerning rational and
regular complexes (see [8]) and their relation with finitely generated free
MV-algebras. We invite the reader to consult [18, 27, 28] for background.
Let $k=1,2,\ldots$. By a (rational) convex polyhedron (or (rational) polytope)
of $\mathbb{R}^{k}$ we mean the convex hull of finitely many points of
$\mathbb{R}^{k}$ ($\mathbb{Q}^{k}$ respectively); a (rational) polyhedron is a
finite union of (rational) convex polyhedra. Given any polytope $\mathscr{P}$,
we respectively denote by $\mathsf{ext}\;\mathscr{P}$,
$\mathsf{ri}\;\mathscr{P}$, $\mathsf{rb}\;\mathscr{P}$ the set of its extremal
points, its relative interior and its relative boundary. Since each polytope
$\mathscr{P}$ is closed,
$\mathscr{P}=\mathsf{ri}\;\mathscr{P}\cup\mathsf{rb}\;\mathscr{P}$. Further,
for all vectors $x,y\in\mathbb{R}^{k}$, we denote $x\cdot y$ their scalar
product and by $|x|$ the norm of $x$.
###### Lemma 2.2.
For each polytope $\mathscr{P}$ of $\mathbb{R}^{k}$, the following conditions
hold:
1. (1)
For every $e\in\mathsf{rb}\;\mathscr{P}$, there exists
$\sigma\in\mathbb{R}^{k}$ such that, for all $\gamma\in\mathscr{P}$,
$\sigma\cdot e\leq\sigma\cdot\gamma$;
2. (2)
Let $\beta\in\mathsf{ri}\;\mathscr{P}$. Then, there exists
$\sigma\in\mathbb{R}^{k}$ such that the sets
$\mathscr{P}_{\sigma}^{+}=\\{\gamma\in\mathscr{P}\mid\gamma\cdot\sigma<\beta\cdot\sigma\\}$
and
$\mathscr{P}_{\sigma}^{-}=\\{\gamma\in\mathscr{P}\mid\gamma\cdot\sigma>\beta\cdot\sigma\\}$
are nonempty;
3. (3)
Let $\beta\in\mathsf{ri}\;\mathscr{P}$. Then there exist
$\sigma\in\mathbb{R}^{k}$, $e_{1},e_{2}\in\mathsf{ext}\;\mathscr{P}$ such that
$e_{1}\in\mathscr{P}_{\sigma}^{+}$ and $e_{2}\in\mathscr{P}_{\sigma}^{-}$;
4. (4)
$\gamma\in\mathsf{ri}\;\mathscr{P}$ iff there exists a map
$\lambda:\mathsf{ext}\;\mathscr{P}\to[0,1]$ such that
$\sum_{e\in\mathsf{ext}\;\mathscr{P}}\lambda(e)=1$, $\lambda(e)>0$ for all
$e\in\mathsf{ext}\;\mathscr{P}$ and
$\gamma=\sum_{e\in\mathsf{ext}\;\mathscr{P}}\lambda(e)\cdot e$.
Before proving the lemma, recall that any hyperplane $H$ of $\mathbb{R}^{k}$
separates the space in two half spaces denoted $H^{+}$ and $H^{-}$. The above
claims (2) and (3) state that, if $\beta$ is a point in the relative interior
of a polytope $\mathscr{P}$, then there exists a hyperplane $H$ passing
through $\beta$ such that, respectively: both $H^{+}\cap\mathscr{P}$ and
$H^{-}\cap\mathscr{P}$ are nonempty; each $H^{+}\cap\mathscr{P}$ and
$H^{-}\cap\mathscr{P}$ contains an extremal point of $\mathscr{P}$.
###### Proof.
(1) is the well-known supporting hyperplane theorem, see [22, Theorem 14].
(2) Let $\beta\in\mathsf{ri}\;\mathscr{P}$. Let $\Sigma$ be a sphere of radius
$r$ and centered at $\beta$ and contained in $\mathsf{ri}\;\mathscr{P}$. The
existence of $\Sigma$ is ensured by definition of relative interior [8,
Chapter I, Definition 1.8]. Let $\sigma$ be a vector of origin $\beta$.
Suppose $\sigma$ is not orthogonal to the affine hull of $\mathscr{P}$ and
also $0<|\sigma|<r$. Trivially,
$(\sigma-\beta)\cdot\sigma<\beta\cdot\sigma<(\sigma+\beta)\cdot\sigma$. Upon
noting that $\sigma-\beta,\sigma+\beta\in\Sigma$, our claim is settled.
(3) By way of contradiction, assume that for no
$e\in\mathsf{ext}\;\mathscr{P}$, $e\cdot\sigma<\beta\cdot\sigma$.
Equivalently, for all $e\in\mathsf{ext}\;\mathscr{P}$,
() $e\cdot\sigma\geq\beta\cdot\sigma.$
Since $\mathscr{P}^{+}$ is nonempty, in view of (2), let
$\tau\in\mathscr{P}\cap\mathscr{P}^{+}$, i.e.,
() $\tau\cdot\sigma<\beta\cdot\sigma.$
If $\tau\in\mathsf{ext}\;\mathscr{P}$ the claim is settled. Assume that
$\tau\not\in\mathsf{ext}\;\mathscr{P}=\\{e_{1},\ldots,e_{l}\\}$. Then there
are $\lambda_{1},\ldots,\lambda_{l}\in[0,1]$ such that $\sum_{i}\lambda_{i}=1$
and $\tau=\sum_{i}\lambda_{i}\cdot e_{i}$. From () it follows that
$e_{i}\cdot\sigma\geq\beta\cdot\sigma$, and hence
$\sum\lambda_{i}e_{i}\cdot\sigma\geq\beta\cdot\sigma$, that is,
$\tau\cdot\sigma\geq\beta\geq\sigma$, which contradicts ().
(4) See [11, Lemma 6.1 (1)]. ∎
Let $k=1,2,\ldots$ and let $x=\langle n_{1}/d_{1},\ldots,n_{k}/d_{k}\rangle$
be a rational vector in $\mathbb{R}^{k}$ with $n_{i}$ and $d_{i}$ relatively
prime for all $i=1,\ldots,k$. Denote by ${\rm den}(x)$ the least common
multiple of $d_{1},\ldots,d_{k}$. The homogeneous correspondent of $x$ is the
vector
$\left\langle\frac{n_{1}}{d_{1}}\cdot{\rm
den}(x),\ldots,\frac{n_{k}}{d_{k}}\cdot{\rm den}(x),{\rm
den}(x)\right\rangle\in\mathbb{Z}^{k+1}.$
Let $k=1,2,\ldots$ and $m=0,1,\ldots,k$. A rational $m$-simplex
$\mathsf{co}(x_{1},\ldots,x_{m})\subseteq\mathbb{R}^{k}$ is said to be regular
if the set of the homogeneous correspondents of $x_{1},\ldots,x_{m}$ is part
of a basis of the abelian group $\mathbb{Z}^{m+1}$ [8, Chapter V, Definition
1.10]. A regular complex $\Delta$ is a simplicial complex all of whose
simplexes are regular222Recall that a simplicial complex $\Delta$ is a
nonempty finite set of simplexes such that: the face of each simplex in
$\Delta$ belongs to $\Delta$ and for each pair of simplexes
$T_{1},T_{2}\in\Delta$ their intersection is either empty, or it coincides
with a common face of $T_{1}$ and $T_{2}$.. Unless otherwise specified, all
regular simplexes in this paper are over the $n$-cube $[0,1]^{n}$ (i.e., their
faces constitute a unimodular triangulations of $[0,1]^{n}$, in the
terminology of [26]). Thus, we will say that $\Delta$ is a regular complex of
$[0,1]^{n}$ without danger of confusion. From the regularity of $\Delta$ it
follows that $\Delta$ is rational. We will denote by $V(\Delta)$ the finite
set of rational vertices of $\Delta$, i.e., the union of the set of the
vertices of the simplexes in $\Delta$.
Let $\Phi$ be a finite subset of the free $n$-generated MV-algebra ${\bf
F}_{n}$. Up to isomorphism, we can (and we will, throughout this paper) think
of $\Phi$ as a finite set of $n$-variable McNaughton functions. Further, if
not otherwise specified, we will assume that $\Phi$ has $k$ elements, denoted
$f_{1},\ldots,f_{k}$. Following [26, §3], for any $\Phi$, there exists a
regular complex $\Delta$ of $[0,1]^{n}$ which linearizes $\Phi$ in the sense
that each $f_{i}$ is linear over each simplex of $\Delta$.
###### Example 2.3.
Let us fix $n=2$ and consider $\Phi=\\{x,y,x\oplus y\\}$. Consider the regular
complexes $\Delta_{1}$ and $\Delta_{2}$ of Figure 1 and whose vertices are
$v^{1}_{1}=\langle 0,0\rangle$, $v^{1}_{2}=\langle 0,1\rangle$,
$v^{1}_{3}=\langle 1,0\rangle$, $v^{1}_{4}=\langle 1,1\rangle$,
$v^{1}_{5}=\langle 1/2,1/2\rangle$ for $\Delta_{1}$ and $v^{2}_{1}=\langle
0,0\rangle$, $v^{2}_{2}=\langle 0,1\rangle$, $v^{2}_{3}=\langle 1,0\rangle$,
$v^{2}_{4}=\langle 1,1\rangle$, $v^{2}_{5}=\langle 1/2,1/2\rangle$,
$v_{6}^{2}=\langle 1/3,1/3\rangle$, $v_{7}^{2}=\langle 1/2,0\rangle$,
$v_{8}^{2}=\langle 0,1/2\rangle$ for $\Delta_{2}$. Then $\Delta_{1}$ is union
of four maximal simplexes, while $\Delta_{2}$ is union of eight simplexes, see
Figure 1
Both $\Delta_{1}$ and $\Delta_{2}$ linearize $\Phi$. Indeed, for each regular
simplex $T$ of $\Delta_{1}$ and each simplex $T^{\prime}$ of $\Delta_{2}$, the
restriction of each function $f\in\Phi$ to $T$ and $T^{\prime}$ is linear.
$v_{1}^{1}$$v_{3}^{1}$$v_{4}^{1}$$v_{2}^{1}$$v_{5}^{1}$
$v_{1}^{2}$$v_{3}^{2}$$v_{4}^{2}$$v_{2}^{2}$$v_{5}^{2}$$v_{6}^{2}$$v_{7}^{2}$$v_{8}^{2}$
Figure 1. The two regular complexes $\Delta_{1}$ (on the left) and
$\Delta_{2}$ (on the right) of the square $[0,1]^{2}$. Every function $x,y$
and $x\oplus y$ is linear over each simplex of $\Delta_{1}$ and $\Delta_{2}$.
$\Box$
Let $\Delta$ be a regular complex of $[0,1]^{n}$, and let $v_{i}$ be one of
its vertices. The normalized Schauder hat at $v_{i}$ (over $\Delta$) is the
uniquely determined continuous function $\hat{h}_{i}:[0,1]^{n}\to[0,1]$ which
is linear over each simplex of $\Delta$ and which attains the value $1$ at
$v_{i}$ and $0$ at all other vertices of $\Delta$. The regularity of $\Delta$
ensures that each linear piece of each $\hat{h}_{i}$ has integer coefficients
and hence $\hat{h}_{i}\in{\bf F}_{n}$. By definition of normalized Schauder
hat, $\Delta$ linearizes each $\hat{h}_{i}$. Further, the following result
holds:
###### Lemma 2.4.
Let $\Phi$ be a finite subset of ${\bf F}_{n}$, let $\Delta$ be a regular
complex linearizing $\Phi$ and let $v_{1},\ldots,v_{t}$ be the vertices of
$\Delta$. Then:
1. (1)
For each $i\neq j$, $\hat{h}_{i}\odot\hat{h}_{j}=0$;
2. (2)
$\bigoplus_{i=1}^{t}\hat{h}_{i}=1$;
3. (3)
For each $f\in\Phi$, $f=\bigoplus_{i=1}^{t}f(v_{t})\cdot\hat{h}_{t}$;
4. (4)
Let $v_{i_{1}},\ldots,v_{i_{l}}\in V(\Delta)$, and let
$\mathscr{P}=\mathsf{co}(v_{i_{1}},\ldots,v_{i_{l}})$. Then the function
$p=\bigoplus_{v_{j}\in\Delta\cap\mathscr{P}}\hat{h}_{j}$ is a McNaughton
function whose oneset is $\mathscr{P}$.
###### Proof.
(1) (2) and (3) have been proved in [26, Lemma 3.4 (ii), (iii), (iv) and (v)].
Let next prove (4). First of all,
$p=\bigoplus_{v\in\Delta\cap\mathscr{P}}\hat{h}_{v}$ is a McNaughton function
by definition. Further, for every vertex $v\in\Delta\cap\mathscr{P}$, $p(v)=1$
by definition of normalized Schauder hat. If $x\in\mathscr{P}\setminus
V(\Delta)$, let $\Sigma$ be a simplex of $\Delta$ which contains $x$. The
claim follows, since each $\hat{h}_{j}$ is linear on $\Sigma$. ∎
## 3\. A geometric characterization of strict coherence.
By Proposition 2.1, if $\Phi=\\{f_{1},\ldots,f_{k}\\}$ is a finite subset of
${\bf F}_{n}$ and $\beta$ a book on $\Phi$, we can rephrase the definitions of
coherence and strict coherence for $\beta$ as follows:
1. (1)
$\beta$ is coherent if for every $\sigma\in\mathbb{R}^{k}$, there exists
$x\in[0,1]^{n}$ such that $\sigma\cdot\langle
f_{1}(x),\ldots,f_{k}(x)\rangle\geq 0$.
2. (2)
$\beta$ is strictly coherent if for every $\sigma\in\mathbb{R}^{k}$, the
existence of $x\in[0,1]^{n}$ such that $\sigma\cdot\langle
f_{1}(x),\ldots,f_{k}(x)\rangle<0$, implies the existence of another
$x^{\prime}\in[0,1]^{n}$ such that $\sigma\cdot\langle
f_{1}(x^{\prime}),\ldots,f_{k}(x^{\prime})\rangle>0$.
Notice that a book $\beta$ is coherent and not strictly coherent iff for any
vector $\sigma\in\mathbb{R}^{k}$, one has that for all $x\in[0,1]^{n}$,
$\sigma\cdot\langle f_{1}(x),\ldots,f_{k}(x)\rangle\leq 0$ and for some
$x^{\prime}\in[0,1]^{n}$, $\sigma\cdot\langle
f_{1}(x^{\prime}),\ldots,f_{k}(x^{\prime})\rangle=0$.
Throughout we will adopt the following notation:
$\mathscr{D}_{\Phi}=\\{\beta:\Phi\to[0,1]\mid\beta\mbox{ is coherent}\\}.$
For any $X\subseteq[0,1]^{n}$, $\mathscr{C}_{\Phi}(X)$ will denote the
topological closure of the convex hull of all points of $\mathbb{R}^{k}$ of
the form $\langle f_{1}(x),\ldots,f_{k}(x)\rangle$ for $\varphi_{i}\in\Phi$
and $x\in X$. In symbols,
$\mathscr{C}_{\Phi}(X)=\mathsf{cl}\;\mathsf{co}\\{\langle
f_{1}(x),\ldots,f_{k}(x)\rangle\mid\varphi_{i}\in\Phi,x\in X\\}.$
Whenever $X$ is finite, $\mathscr{C}_{\Phi}(X)=\mathsf{co}\\{\langle
f_{1}(x),\ldots,f_{k}(x)\rangle\mid\varphi_{i}\in\Phi,x\in X\\}$, which is a
convex polytope. For the sake of readability, we will write
$\mathscr{C}_{\Phi}$ instead of $\mathscr{C}_{\Phi}([0,1]^{n})$.
For every finite $\Phi$, Mundici’s extension of de Finetti’s theorem to
Łukasiewicz logic (see [26, Theorem 2.1]) shows that
$\mathscr{D}_{\Phi}=\mathscr{C}_{\Phi}$.
###### Lemma 3.1.
[26, Corollary 5.4] For any book $\beta:\Phi\to[0,1]$ the following conditions
are equivalent:
1. (1)
$\beta$ is coherent;
2. (2)
There exists a finite $X\subset[0,1]^{n}$ such that, for each $f_{i}\in\Phi$,
$\beta(f_{i})\in\mathscr{C}_{\Phi}(X)$;
3. (3)
There exists a finite $X\subset[0,1]^{n}$ with $|X|\leq n+1$ such that, for
each $f_{i}\in\Phi$, $\beta(f_{i})\in\mathscr{C}_{\Phi}(X)$;
4. (4)
For each regular complex $\Delta$ of $[0,1]^{n}$ linearizing $\Phi$,
$\beta(f_{i})\in\mathscr{C}_{\Phi}(V(\Delta))$.
The next corollary is an immediate consequence of Lemma 3.1.
###### Corollary 3.2.
Let $\Phi$ be a finite set of Łukasiewicz formulas. Then, for every regular
complex $\Delta$ which linearizes $\Phi$,
$\mathscr{D}_{\Phi}=\mathscr{C}_{\Phi}(V(\Delta)).$
Thus, the coherence of a book $\beta$ on $\Phi$ does not depend on the
particular regular complex $\Delta$ chosen to linearize $\Phi$. Moreover,
since for each $\Delta$, $V(\Delta)$ is finite,
$\mathscr{C}_{\Phi}(V(\Delta))$ is a polytope coinciding with
$\mathscr{D}_{\Phi}$. Therefore, by the Krein-Milman theorem [8, Theorem 1.2],
$\mathscr{C}_{\Phi}(V(\Delta))$ is the convex hull of the set of extremal
points of $\mathscr{D}_{\Phi}$, i.e., for every $\Delta$,
$\mathscr{C}_{\Phi}(V(\Delta))=\mathsf{co}\;\mathsf{ext}\;\mathscr{D}_{\Phi}.$
The following example clarifies the claim made in Corollary 3.2.
###### Example 3.3.
Let $\Phi=\\{x,y,x\oplus y\\}$ together with the regular complexes
$\Delta_{1}$ and $\Delta_{2}$ of Example 2.3.
Each of the five vertices $v^{1}_{i}$ of $\Delta_{1}$ determines a point
$p_{i}=\langle
f_{1}(v^{1}_{i}),f_{2}(v^{1}_{i}),f_{3}(v^{1}_{i})\rangle\in\mathbb{R}^{3}$
(where $f_{1}(x,y)=x,f_{2}(x,y)=y$ and $f_{3}(x,y)=x\oplus y$) and
$\mathscr{D}_{\Phi}=\mathscr{C}_{\Phi}(\\{v^{1}_{1},\ldots,v^{1}_{5}\\})=\mathsf{co}(\\{p_{1},\ldots,p_{5}\\}).$
In particular: $p_{1}=\langle 0,0,0\rangle$, $p_{2}=\langle 0,1,1\rangle$,
$p_{3}=\langle 1,0,1\rangle$, $p_{4}=\langle 1,1,1\rangle$ and $p_{5}=\langle
1/2,1/2,1\rangle$.
Similarly, for $\Delta_{2}$,
$\mathscr{D}_{\Phi}=\mathscr{C}_{\Phi}(\\{v^{2}_{1},\ldots,v^{2}_{8}\\})=\mathsf{co}(\\{q_{1},\ldots,q_{8}\\}),$
where: $q_{1}=p_{1}=\langle 0,0,0\rangle$, $q_{2}=p_{2}=\langle 0,1,1\rangle$,
$q_{3}=p_{3}=\langle 1,0,1\rangle$, $q_{4}=p_{4}=\langle 1,1,1\rangle$,
$q_{5}=p_{5}=\langle 1/2,1/2,1\rangle$, $q_{6}=\langle 1/3,1/3,2/3\rangle$,
$q_{7}=\langle 1/2,0,1/2\rangle$ and $q_{8}=\langle 0,1/2,1/2\rangle$.
$p_{1}$$p_{3}$$p_{4}$$p_{2}$$p_{5}$$p_{5}$$q_{6}$$q_{7}$$q_{8}$
$p_{1}$$p_{3}$$p_{4}$$p_{2}$$p_{5}$$q_{6}$$q_{7}$$q_{8}$
Figure 2. The convex polytope $\mathscr{D}_{\Phi}$ (in two perspectives) for
$\Phi=\\{x,y,x\oplus y\\}$, and its extremal points $p_{1},p_{2},p_{3}$ and
$p_{4}$.
Since both $\Delta_{1}$ and $\Delta_{2}$ linearize $\Phi$,
$\mathscr{D}_{\Phi}=\mathscr{C}_{\Phi}(V(\Delta_{1}))=\mathscr{C}_{\Phi}(V(\Delta_{2}))$
(see Figure 2) and
$\mathsf{ext}\;\mathscr{C}_{\Phi}(V(\Delta_{1}))=\mathsf{ext}\;\mathscr{C}_{\Phi}(V(\Delta_{2}))=\mathsf{ext}\;\mathscr{D}_{\Phi}=\\{p_{1},p_{2},p_{3},p_{4}\\}.$
$\Box$
Let us write:
$\mathscr{K}_{\Phi}=\\{\beta:\Phi\to[0,1]\mid\beta\mbox{ is strictly
coherent}\\}.$
The following theorem, which is the main result of this section, provides us
with a geometric characterization of strict coherence for books on formulas of
Łukasiewicz logic.
###### Theorem 3.4.
Let $\Phi$ be a finite subset of ${\bf F}_{n}$. Then
$\mathscr{K}_{\Phi}=\mathsf{ri}\;\mathscr{D}_{\Phi}.$
###### Proof.
Since $\mathscr{D}_{\Phi}=\mathscr{C}_{\Phi}$, we will prove the equivalent
claim: $\mathscr{K}_{\Phi}=\mathsf{ri}\;\mathscr{C}_{\Phi}$.
Trivially, $\mathscr{K}_{\Phi}\subseteq\mathscr{C}_{\Phi}$. Let us show that
$\mathscr{K}_{\Phi}\subseteq\mathsf{ri}\;\mathscr{C}_{\Phi}$. Since
$\mathscr{C}_{\Phi}$ is closed,
$\mathscr{C}_{\Phi}=\mathsf{ri}\;\mathscr{C}_{\Phi}\cup\mathsf{rb}\;\mathscr{C}_{\Phi}$
and
$\mathsf{ri}\;\mathscr{C}_{\Phi}\cap\mathsf{rb}\;\mathscr{C}_{\Phi}=\emptyset$.
Assume (absurdum hypothesis) that
$\beta\in\mathscr{K}_{\Phi}\cap\mathsf{rb}\;\mathscr{C}_{\Phi}$. By Lemma 2.2
(1) there exists $\sigma\in\mathbb{R}^{k}$ such that for all
$\gamma\in\mathscr{C}_{\Phi}$,
$\sigma\cdot\beta\leq\sigma\cdot\gamma.$
Thus, for all $x\in[0,1]^{n}$,
$\sigma\cdot\beta\leq\sigma\cdot\langle f_{1}(x),\ldots,f_{k}(x)\rangle\leq
0.$
Therefore, $\beta$ is coherent but not strictly coherent. This contradicts our
hypothesis. Thus,
$\mathscr{K}_{\Phi}\subseteq\mathsf{ri}\;\mathscr{C}_{\Phi}$.
In order to prove the converse inclusion, assume that
$\beta\in\mathsf{ri}\;\mathscr{C}_{\Phi}$ and let $\sigma\in\mathbb{R}^{k}$
satisfy Lemma 2.2 (2). Then
$(\mathscr{C}_{\Phi})_{\sigma}^{+}=\\{\gamma\in\mathscr{C}_{\Phi}\mid\gamma\cdot\sigma<\beta\cdot\sigma\\}$
and
$(\mathscr{C}_{\Phi})_{\sigma}^{-}=\\{\gamma\in\mathscr{C}_{\Phi}\mid\gamma\cdot\sigma>\beta\cdot\sigma\\},$
are nonempty.
Moreover, by Lemma 2.2 (3), both $(\mathscr{C}_{\Phi})_{\sigma}^{+}$ and
$(\mathscr{C}_{\Phi})_{\sigma}^{-}$ contain an extremal point of
$\mathscr{C}_{\Phi}$. Therefore, there are $x,x^{\prime}\in[0,1]^{n}$ such
that $\langle f_{1}(x),\ldots,f_{k}(x)\rangle\cdot\sigma<\beta\cdot\sigma$ and
$\langle
f_{1}(x^{\prime}),\ldots,f_{k}(x^{\prime})\rangle\cdot\sigma>\beta\cdot\sigma$,
that is, $\beta$ is strictly coherent. ∎
###### Corollary 3.5.
Let $\Phi$ and $\beta$ be as above. Then the following conditions are
equivalent:
1. (1)
$\beta$ is strictly coherent;
2. (2)
For each regular complex $\Delta$ which linearizes $\Phi$, there is
$\lambda:V(\Delta)\to[0,1]$ such that $\sum_{v_{i}\in
V(\Delta)}\lambda(v_{i})=1$, for all $v_{i}\in V(\Delta)$, $\lambda(v_{i})>0$
and $\beta(f_{j})=\sum_{v_{i}\in V(\Delta)}\lambda(v_{i})\cdot f_{j}(v_{i})$;
3. (3)
There exists a map $\lambda:\mathsf{ext}\;\mathscr{D}_{\Phi}\to[0,1]$ such
that $\sum_{e\in\mathsf{ext}\;\mathscr{D}_{\Phi}}\lambda(e)=1$, for all
$e\in\mathsf{ext}\;\mathscr{D}_{\Phi}$, $\lambda(e)>0$ and
$\beta(\varphi_{i})=\sum_{e\in\mathsf{ext}\;\mathscr{D}_{\Phi}}\lambda(e)\cdot
f_{i}(e)$.
Further, the set $\mathscr{K}_{\Phi}^{\mathbb{Q}}$ of rational-valued strictly
coherent books on $\Phi$ is decidable.
###### Proof.
The equivalence between (1), (2) and (3) follows from Theorem 3.4, Corollary
3.2 and Lemma 2.2 (4). To conclude the proof we will prove the decidability of
the set $\mathscr{K}_{\Phi}^{\mathbb{Q}}$. To this purpose, given $\Phi$, the
problem of determining a regular complex $\Delta$ which linearizes all
McNaughton functions $f_{i}\in\Phi$, is computable by a Turing machine (see
[26, Theorem 7.1, Claim 3]). Therefore, by (2),
$\mathscr{K}_{\Phi}^{\mathbb{Q}}$ is decidable iff the following bounded mixed
integer programming problem (see [14]) with unknowns $\lambda(v_{i})$ for all
$v_{i}\in V(\Delta)$, has a solution in $[0,1]\cap\mathbb{Q}$:
$(S_{\mathscr{K}_{\Phi}})=\left\\{\begin{array}[]{l}\lambda(v_{i})>0,\\\
\sum_{v_{i}}\lambda(v_{i})=1,\\\ \sum_{v_{i}}\lambda(v_{i})\cdot
f_{\varphi}(v_{i})=\beta(\varphi).\end{array}\right.$
Thus the decidability of $\mathscr{K}_{\Phi}^{\mathbb{Q}}$ follows from [14,
Proposition 2].
∎
## 4\. Strict coherence, infinite-valued events and faithful states.
Generalizing de Finetti’s theorem, a book on Łukasiewicz events is coherent
iff it can be extended to a state in the sense of the following definition.
###### Definition 4.1 ([25]).
A state of an MV-algebra ${\bf A}$ is a map $s:A\to[0,1]$ satisfying the
following conditions:
* $(s1)$
Normalization: $s(1)=1$,
* $(s2)$
Additivity: $s(a\oplus b)=s(a)+s(b)$, for all $a,b\in A$ such that $a\odot
b=0$.
A state $s$ is said to be faithful if $s(a)\neq 0$ for all $a\neq 0$.
Kroupa and Panti independently proved that for every state $s$ of an MV-
algebra ${\bf A}$ there exists a unique regular Borel, and hence
$\sigma$-additive, probability measure $\mu_{s}$ on the space of maximal
ideals with the hull-kernel topology of ${\bf A}$ such that $s$ is the
integral with respect to $\mu_{s}$ (see [17], [29] and [27, §10]). In
particular, for $n$-generated free MV-algebras, the Kroupa-Panti theorem shows
that for every state $s$ of ${\bf F}_{n}$ there exists a unique regular Borel
probability measure $\mu_{s}$ on $[0,1]^{n}$ such that for each $f\in{\bf
F}_{n}$,
() $s(f)=\int_{[0,1]^{n}}f\;{\rm d}\mu_{s}.$
The correspondence between states of ${\bf F}_{n}$ and regular Borel
probability measures on $[0,1]^{n}$ is one-one.
The next result, which to the best of our knowledge is new, represents
faithful states of ${\bf F}_{n}$ in a similar manner. Following [33], we say
that a regular Borel measure $\mu$ of $[0,1]^{n}$ is strictly positive if for
every nonempty open $O\subseteq[0,1]^{n}$, $\mu(O)>0$.
###### Proposition 4.2.
For any state $s$ of ${\bf F}_{n}$ the following conditions are equivalent:
1. (1)
$s$ is a faithful state;
2. (2)
There exists a unique strictly positive, regular probability Borel measure
$\mu_{s}$ such that for every $f\in{\bf F}_{n}$,
$s(f)=\int_{[0,1]^{n}}f\;{\rm d}\mu_{s}.$
The correspondence between faithful states of ${\bf F}_{n}$ and strictly
positive, regular probability Borel measures of $[0,1]^{n}$ is one-one.
###### Proof.
For every state $s$ of ${\bf F}_{n}$, let $\mu_{s}$ be the unique regular
probability Borel measure of $[0,1]^{n}$ such that for every $f\in{\bf
F}_{n}$, $s(f)=\int_{[0,1]^{n}}f\;{\rm d}\mu_{s}$ as in the Kroupa-Panti
theorem.
$(1)\Rightarrow(2)$. Assume that $O$ is a nonempty open set in the product
topology of $[0,1]^{n}$, and $\mu_{s}(O)=0$. Let $K_{O}$ be any nonempty
compact subset of $O$ and assume, without loss of generality, that $K_{O}$ is
a rational polyhedron. By [27, Corollary 2.10], there exists $f\in{\bf F}_{n}$
such that $K_{O}$ is the oneset of $f$. Since $K_{O}$ is contained in $O$, by
[18, Lemma 2.2 (i)] there exists $n\in\mathbb{N}$ such that, for all
$x\in[0,1]^{n}$, the $n$-fold $\odot$-product $f^{n}=f\odot\ldots\odot f$,
satisfies $f^{n}(x)=1$ if $x\in K_{O}$ and $f^{n}(x)=0$ for all $x\not\in O$.
Therefore, $f^{n}\neq 0$ and $s(f^{n})=\int_{[0,1]^{n}}f^{n}\;{\rm
d}\mu_{s}=0$ whence $s$ is not faithful.
$(2)\Rightarrow(1)$. Assume that $s$ is not faithful and in particular, let
$f\in{\bf F}_{n}$ be such that $f\neq 0$ and $s(f)=0$. Since $f$ is continuous
and not constantly $0$, its support ${\rm supp}(f)=\\{x\in[0,1]^{n}\mid
f(x)>0\\}$ is nonempty and open. Thus,
$0=s(f)=\int_{[0,1]^{n}}f\;{\rm d}\mu_{s}=\int_{{\rm supp}(f)}f\;{\rm
d}\mu_{s},$
whence $\mu_{s}({\rm supp}(f))=0$. ∎
###### Remark 4.3.
From Proposition 4.2 it follows that if ${\bf A}={\bf F}_{n}/I_{C}$ is a
finite-dimensional MV-algebra, there is a one-one correspondence between
faithful states of ${\bf A}$, strictly positive distributions on the points
$c_{1},\ldots,c_{t}$ of $C$, and points in the relative interior of the
simplex
$\Sigma_{\Delta}=\left\\{\langle\lambda_{1},\ldots,\lambda_{t}\rangle\in\mathbb{R}^{t}\mid\sum_{i=1}^{t}\lambda_{i}=1\right\\}$
(see [11, Remark 6.3]). Every finitely generated free boolean algebra ${\bf
A}$ is, in particular, a finite-dimensional MV-algebra and every faithful
state $s$ of ${\bf A}$ is a Carnap probability (recall Section 1). Therefore,
Proposition 4.2 specializes on boolean events as follows: for every
$n=1,2,\ldots$, a finitely additive probability $P$ of the $n$-generated free
boolean algebra ${\bf A}$ is Carnap iff there exists a unique strictly
positive distribution $\mu_{P}$ on $\\{0,1\\}^{n}$ such that for every $f\in
A$, $P(f)=\sum_{x\in\\{0,1\\}^{n}}\mu_{P}(x)\cdot f(x).$
In [11], the authors characterized strictly coherent books on finite subsets
of a finite-dimensional MV-algebra ${\bf A}$ (recall Section 2) as those books
that can be extended to a faithful state of ${\bf A}$. In this section, we
will provide two measure-theoretical characterizations of strict coherence for
books on ${\bf F}_{n}$. The first one (Theorem 4.6) involves states satisfying
a local version of faithfulness which depends both on $\Phi$ and on the fixed
regular complex linearizing its functions; the second one (Theorem 4.8) is
given in terms of faithful states of ${\bf F}_{n}$.
###### Definition 4.4.
Let $\Phi$ be a finite subset of ${\bf F}_{n}$ and let $\Delta$ be a regular
complex which linearizes $\Phi$. Then $s$ is said to be $\Delta$-faithful
provided that $s(\hat{h}_{v})>0$ for all $v\in V(\Delta)$.
The next lemma collects some useful properties of states and $\Delta$-faithful
states.
###### Lemma 4.5.
For each regular complex $\Delta$ of $[0,1]^{n}$ with vertices
$V(\Delta)=\\{v_{1},\ldots,v_{t}\\}$, the following conditions hold:
1. (1)
For each map $\lambda:V(\Delta)\to[0,1]$ such that $\sum_{v\in
V(\Delta)}\lambda(v)=1$, the map $s_{\lambda}:{\bf F}_{n}\to[0,1]$ defined as
() $s_{\lambda}(f)=\sum_{v\in V(\Delta)}f(v)\cdot\lambda(v).$
is a state of ${\bf F}_{n}$.
2. (2)
The set of $\Delta$-faithful states of ${\bf F}_{n}$ is in one-one
correspondence with the set of faithful states of ${\bf F}_{n}/I_{V(\Delta)}$
and hence is in one-one correspondence with the relative interior of the
simplex
$\Sigma_{\Delta}=\left\\{\langle\lambda_{1},\ldots,\lambda_{t}\rangle\in\mathbb{R}^{t}\mid\sum_{i=1}^{t}\lambda_{i}=1\right\\}.$
###### Proof.
(1). Every state of ${\bf F}_{n}$ belongs to the closure of the convex hull of
the homomorphisms of ${\bf F}_{n}$ to $[0,1]_{MV}$ (see [25, Theorem 2.5] and
[12, Theorem 4.1.1]). Thus the claim follows immediately from Proposition 2.1
(2). The claim easily follows from Proposition 4.2, Remark 4.3 and the
definition of $\Delta$-faithfulness. ∎
The next theorem yields a characterization of strictly coherent books in terms
of $\Delta$-faithful states.
###### Theorem 4.6.
Let $\Phi$ be a finite subset of ${\bf F}_{n}$ and let $\beta$ be a book on
$\Phi$. Then the following conditions are equivalent:
1. (1)
$\beta$ is strictly coherent;
2. (2)
There exists a regular complex $\Delta$ which linearizes $\Phi$ and a
$\Delta$-faithful state $s$ which extends $\beta$;
3. (3)
For every regular complex $\Delta$ which linearizes $\Phi$, there exists a
$\Delta$-faithful state $s$ of ${\bf F}_{n}$ which extends $\beta$.
###### Proof.
$(1)\Rightarrow(3)$. Let $\beta$ be strictly coherent. From Corollary 3.5 (3),
for every regular complex $\Delta$ linearizing $\Phi$, there exists a map
$\lambda:V(\Delta)\to[0,1]$ such that $\sum_{v\in V(\Delta)}\lambda(v)=1$,
$\lambda(v)>0$ for all $v\in V(\Delta)$ and for every $f_{j}\in\Phi$,
() $\beta(f_{j})=\sum_{v\in V(\Delta)}f_{j}(v)\cdot\lambda(v).$
Let $s_{\lambda}$ be the state of ${\bf F}_{n}$ defined in ().
First of all notice that, directly from () and (), $s_{\lambda}$ extends
$\beta$. Furthermore, for every vertex $v\in V(\Delta)$, the normalized
Schauder hat $\hat{h}_{v}$ takes value $1$ on $v$ and $0$ on any
$v^{\prime}\neq v$. Thus, $s_{\lambda}(\hat{h}_{v})=\sum_{v^{\prime}\in
V(\Delta)}\hat{h}_{v}(v^{\prime})\cdot\lambda(v^{\prime})=\lambda(v)$ and
hence $s_{\lambda}(\hat{h}_{v})>0$. Therefore $s_{\lambda}$ is a
$\Delta$-faithful state of ${\bf F}_{n}$ which extends $\beta$.
$(3)\Rightarrow(1)$. Now assume that (3) holds and define
$\lambda:V(\Delta)\to[0,1]$ by
$\lambda(v)=s(\hat{h}_{v}).$
From Lemma 2.4,
$\sum_{v\in V(\Delta)}\lambda(v)=\sum_{v\in
V(\Delta)}s(\hat{h}_{v})=s\left(\bigoplus_{v\in
V(\Delta)}\hat{h}_{v}\right)=s(1)=1.$
Since $s$ is $\Delta$-faithful, $\lambda(v)>0$ for each $v\in V(\Delta)$.
Further, for all $f_{i}\in\Phi$, $\beta(f_{i})=s(f_{i})=\sum_{v\in
V(\Delta)}\lambda_{v}\cdot f_{i}(v)$. Thus, $\beta$ is strictly coherent by
Corollary 3.5 ($(2)\Rightarrow(1)$).
Finally, $(3)\Rightarrow(2)$ is trivial and $(2)\Rightarrow(3)$ follows from
$(1)\Leftrightarrow(3)$ above, Corollary 3.2 and Theorem 3.4 ∎
Lemma 4.5 (2) shows that for each regular complex $\Delta$ which linearizes
$\Phi$, $\Delta$-faithful states of ${\bf F}_{n}$ are in one-one
correspondence with faithful states of ${\bf F}_{n}/I_{V(\Delta)}$. In
particular, for every $\Delta$-faithful state $s$ of ${\bf F}_{n}$, let
$s_{\Delta}$ be the unique faithful state of ${\bf F}_{n}/I_{V(\Delta)}$ such
that: for every $f\in{\bf F}_{n}$, let $f_{\Delta}$ to be the restriction of
$f$ to $V(\Delta)$ and
$s_{\Delta}(f_{\Delta})=\sum_{v\in V(\Delta)}s(\hat{h}_{v})\cdot
f_{\Delta}(v).$
Thus, if $f\in\Phi$, $s_{\Delta}(f_{\Delta})=s(f)$. We then have:
###### Corollary 4.7.
Let $\Phi$ be a finite subset of ${\bf F}_{n}$ and let $\beta$ be a book on
$\Phi$. Then the following conditions are equivalent:
1. (1)
$\beta$ is strictly coherent;
2. (2)
There exists a regular complex $\Delta$ which linearizes $\Phi$ and a faithful
state $s_{\Delta}$ of ${\bf F}_{n}/I_{V(\Delta)}$ such that, for all
$f\in\Phi$, $\beta(f)=s_{\Delta}(f_{\Delta})$;
3. (3)
For every regular complex $\Delta$ which linearizes $\Phi$, there exists a
faithful state $s_{\Delta}$ of ${\bf F}_{n}/I_{V(\Delta)}$ such that, for all
$f\in\Phi$, $\beta(f)=s_{\Delta}(f_{\Delta})$.
The following construction is used in the next result which characterizes
strictly coherent books in terms of faithful states: let $\beta$ be a strictly
coherent book on a finite subset $\Phi$ of ${\bf F}_{n}$, fix an enumeration
$g_{1},g_{2},\ldots$ of ${\bf F}_{n}\setminus\\{\Phi,0,1\\}$ and consider the
following inductive construction:
* ($S_{1}$)
Put $\Phi_{1}=\Phi\cup\\{g_{1}\\}$. Each regular complex $\Delta_{1}$
linearizing $\Phi_{1}$ also linearizes $\Phi$. Since $\beta$ is strictly
coherent, Theorem 4.6 yields a $\Delta_{1}$-faithful state $s_{1}$ which
extends $\beta$. It follows that the extended book
$\beta_{1}=\beta\cup\\{g_{1}\mapsto s_{1}(g_{1})\\}$ is strictly coherent
because $s_{1}$ extends it. Further, $0<s_{1}(g_{1})<1$.
* ($S_{2}$)
Consider $\Phi_{2}=\Phi_{1}\cup\\{g_{2}\\}$ and fix $\Delta_{2}$ that
linearizes $\Phi_{2}$ and a $\Delta_{2}$-faithful state $s_{2}$ which extends
$\beta_{1}$. Again, $0<s_{2}(g_{2})<1$ and
$\beta_{2}=\beta_{1}\cup\\{g_{2}\mapsto s_{2}(g_{2})\\}$ is strictly coherent
by Theorem 4.6. Further, $s_{2}(e)=s_{1}(e)$ for all $e\in\Phi_{1}$.
* ($S_{i+1}$)
At step $i+1$, arguing by induction, construct a regular complex
$\Delta_{i+1}$ which linearizes
$\Phi_{i}\cup\\{g_{i+1}\\}=\Phi\cup\\{g_{1},\ldots,g_{i+1}\\}$, a state
$s_{i+1}$ of ${\bf F}_{n}$ which is $\Delta_{i+1}$-faithful and a strictly
coherent book $\beta_{i+1}=\beta_{i}\cup\\{g_{i+1}\mapsto
s_{i+1}(g_{i+1})\\}$.
For each $n$, the state $s_{n}$ agrees with $s_{n-1}$ over $\Phi_{n-1}$. Thus,
for all $n_{0}$ and for all $n>n_{0}$, $s_{n}(g_{n_{0}})$ always attains the
same value. In particular, for all $n,m\in\mathbb{N}$, $s_{n}(f)=s_{m}(f)$ for
all $f\in\Phi$.
###### Theorem 4.8.
Let $\Phi$ be a finite subset of ${\bf F}_{n}$ and let $\beta$ be a book on
$\Phi$. Then the following conditions are equivalent:
1. (1)
$\beta$ is strictly coherent;
2. (2)
$\beta$ extends to a faithful state of ${\bf F}_{n}$.
###### Proof.
The direction $(2)\Rightarrow(1)$ is trivial. Thus, let $\beta$ be strictly
coherent and fix an enumeration $g_{1},g_{2},\ldots$ of ${\bf
F}_{n}\setminus\\{\Phi,0,1\\}$. The construction above determines subsets
$\Phi=\Phi_{0}\subseteq\Phi_{1}\subseteq\Phi_{2}\subseteq\ldots$ of ${\bf
F}_{n}$ and a sequence $\\{s_{i}\\}_{i\geq 1}$ of states of ${\bf F}_{n}$ such
that:
* (i)
Each $s_{i}$ is a $\Delta_{i}$-faithful state of ${\bf F}_{n}$;
* (ii)
For all $n>m$, $s_{m}(e)=s_{n}(e)$ for all $e\in\Phi_{m}$.
By construction of the $\Phi_{i}$’s, for every $f\in{\bf F}_{n}$ there exists
an $m\geq 0$ such that $f\in\Phi_{m}$ and hence, by (ii), $s_{m}(f)=s_{n}(f)$
for all $n>m$. Therefore, $\\{s_{i}(f)\\}_{i\geq 0}$ is a Cauchy sequence.
This gives that $\\{s_{i}\\}_{i\geq 0}$ is pointwise convergent. Define
$s:{\bf F}_{n}\to[0,1]$ as follows: for each $f\in{\bf F}_{n}$,
$s(f)=\lim_{i\to\infty}s_{i}(f).$
Let us prove that $s$ is a state. Clearly $s(1)=1$. If $a\oplus b=0$ then, for
all $i\geq 0$, $s_{i}(a\oplus b)=s_{i}(a)+s_{i}(b)$ and by the continuity of
$+$, $s(a\oplus b)=\lim_{i\to\infty}s_{i}(a\oplus
b)=\lim_{i\to\infty}s_{i}(a)+s_{i}(b)=\lim_{i\to\infty}s_{i}(a)+\lim_{i\to\infty}s_{i}(b)=s(a)+s(b)$.
By construction, $s$ extends $\beta$ since so does each $s_{n}$. There remains
to be proved that $s$ is faithful. We will provide two proofs of this fact.
(Proof 1). By [11, Theorem 5.2] $s$ is faithful iff for each finite subset
$\Psi$ of ${\bf F}_{n}$ the restriction of $s$ to $\Psi$ is strictly coherent.
Recalling the above construction, let $i_{0}$ be the minimum index such that
$\Psi\subseteq\Phi_{i_{0}}$. Thus, the restriction of $s$ to $\Psi$ coincides
with the restriction of $s_{i_{0}}$ to $\Psi$ and the restriction of
$s_{i_{0}}$ to $\Phi_{i_{0}}$ is strictly coherent. The claim immediately
follows because strict coherence is preserved for books contained in a
strictly coherent one.
(Proof 2). Let $1>f>0$. If $f\in\Phi$ there is nothing to prove. Conversely,
assume that $f=g_{i}$ for some $i$. Therefore, for all $j\geq i$,
$s_{j}(f)=\alpha>0$. Thus, $s(f)=\lim_{i\to\infty}s_{i}(f)=\alpha>0$ and the
claim is settled. ∎
## 5\. Coherence, strict coherence and provability in Łukasiewicz logic.
Propositional Łukasiewicz logic ($\L$ in symbols) is the logical calculus
having MV-algebras as its equivalent algebraic semantics. Formulas of
Łukasiewicz logic will be denoted by lower case Greek letter and $\L(m)$ will
stand for the set of formulas in a language with $m$ propositional variables.
A complete axiomatization of $\L$ can be found in [3, Definition 4.3.1]. A
formula $\varphi$ is said to be a theorem, in symbols $\vdash\varphi$, if
$\varphi$ can be deduced from the axioms of $\L$ and by its unique rule of
modus ponens. A theory $\Theta$ is a deductively closed set of formulas. A
theory $\Theta$ of $\L(m)$ is said to be finitely axiomatizable if for some
(necessarily satisfiable) formula $\theta\in\L(m)$, $\Theta$ is the smallest
theory of $\L(m)$ which contains $\theta$.
By Proposition 2.1, valuations of the Łukasiewicz language $\L(m)$ are in one-
one correspondence with homomorphisms of ${\bf F}_{m}$ to $[0,1]_{MV}$ as well
as with points of the $m$-cube $[0,1]^{m}$. Thus, a formula $\varphi\in\L(m)$
is a tautology if $h(\varphi)=1$ for all homomorphisms $h:{\bf
F}_{m}\to[0,1]_{MV}$ iff the oneset of $f_{\varphi}$ coincides with
$[0,1]^{m}$, where $f_{\varphi}$ is the unique McNaughton function determined
by $\varphi$ [24].
For every $\mathscr{X}\subseteq[0,1]^{m}$ and theory $\Theta$ we write
${\rm Th}(\mathscr{X})=\\{\psi\in\L(m)\mid(\forall
x\in\mathscr{X})\;f_{\psi}(x)=1\\}$
and
${\rm
Mod}(\Theta)=\\{x\in[0,1]^{m}\mid(\forall\psi\in\Theta)\;f_{\psi}(x)=1\\}.$
Given two (not necessarily finitely axiomatizable) theories $\Theta_{1}$ and
$\Theta_{2}$, we write $\Theta_{1}\models\Theta_{2}$, if ${\rm
Mod}(\Theta_{1})\subseteq{\rm Mod}(\Theta_{2})$.
Following [27, Definition 3.9], two rational polyhedra $\mathscr{P}$ and
$\mathscr{Q}$ of $[0,1]^{m}$ are said to be $\mathbb{Z}$-homeomorphic (in
symbols, $\mathscr{P}\cong_{\mathbb{Z}}\mathscr{Q}$) if there exists a
homeomorphism $\eta:\mathscr{P}\to\mathscr{Q}$ such that both $\eta$ and
$\eta^{-1}$, as maps from $\mathbb{R}^{m}\to\mathbb{R}^{m}$ are
$\mathbb{Z}$-maps, i.e., $\eta$ and $\eta^{-1}$ are piecewise linear with
integer coefficients.
###### Lemma 5.1 ([27, Theorem 3.20]).
For every $m=1,2,\ldots$, the pair $({\rm Th},{\rm Mod})$ establishes a Galois
connection between rational polyhedra of $[0,1]^{m}$ and finitely
axiomatizable theories of $\L(m)$. In particular:
1. (1)
For every finitely axiomatizable theory $\Theta$ of $\L(m)$, there exists a
unique rational polyhedron $\mathscr{P}_{\Theta}$ of $[0,1]^{m}$ such that
${\rm Mod}({\rm Th}(\Theta))\cong_{\mathbb{Z}}\mathscr{P}_{\Theta}$.
2. (2)
For each rational polyhedron $\mathscr{P}$ of $[0,1]^{m}$ there exists a
unique finitely axiomatizable theory $\Theta_{\mathscr{P}}$ such that ${\rm
Mod}({\rm Th}(\Theta_{\mathscr{P}}))\cong_{\mathbb{Z}}\mathscr{P}$.
3. (3)
For $\mathscr{P}_{1}$ and $\mathscr{P}_{2}$ rational polyhedra,
$\mathscr{P}_{1}\subseteq\mathscr{P}_{2}$ iff ${\rm
Mod}(\Theta_{\mathscr{P}_{1}})\subseteq{\rm Mod}(\Theta_{\mathscr{P}_{2}})$
iff $\Theta_{\mathscr{P}_{1}}\models\Theta_{\mathscr{P}_{2}}$.
In the rest of this section we will adopt the notation used in Lemma 5.1 above
with the following exception: if $x\in([0,1]\cap\mathbb{Q})^{m}$, we denote by
$\Theta_{x}$ the finitely axiomatizable theory $\Theta_{\\{x\\}}$.
Let $\Phi$ be a subset of ${\bf F}_{n}$ of finite cardinality $k$ and let
$\beta$ be a rational-valued book on $\Phi$. As noted at the beginning of
Section 3, $\\{\beta\\}$, $\mathscr{C}_{\Phi}$ and
$\mathsf{rb}\;\mathscr{C}_{\Phi}$ are rational polyhedra of $[0,1]^{k}$. By
Lemma 5.1, $\Theta_{\beta}$, $\Theta_{\mathscr{C}_{\Phi}}$ and
$\Theta_{(\mathsf{rb}\;\mathscr{C}_{\Phi})}$ are finitely axiomatizable.
The following lemma provides a first characterization of coherence and strict
coherence in terms of deducibility.
###### Lemma 5.2.
Let $\Phi$ be a finite subset of ${\bf F}_{n}$ and let $\beta$ be a rational-
valued book on $\Phi$. Thus the following conditions hold:
1. (1)
$\beta$ is coherent iff $\Theta_{\beta}\models\Theta_{\mathscr{C}_{\Phi}}$.
2. (2)
$\beta$ is strictly coherent iff
$\Theta_{\beta}\models\Theta_{\mathscr{C}_{\Phi}}$ and
$\Theta_{\beta}\not\models\Theta_{(\mathsf{rb}\;\mathscr{C}_{\Phi})}$.
###### Proof.
(1) follows from [26, Theorem 2.1], Lemma 5.1 and the definition of $\models$.
Indeed, $\beta$ is coherent iff $\beta\in\mathscr{C}_{\Phi}$ iff
$\\{\beta\\}\subseteq\mathscr{C}_{\Phi}$.
As for (2), Theorem 3.4 shows that $\beta$ is strictly coherent iff
$\beta\in\mathsf{ri}\mathscr{C}_{\Phi}=\mathscr{C}_{\Phi}\setminus\mathsf{rb}\;\mathscr{C}_{\Theta}$
iff $\beta\in\mathscr{C}_{\Phi}$ and
$\beta\not\in\mathsf{rb}\;\mathscr{C}_{\Theta}$ iff
$\Theta_{\beta}\models\Theta_{\mathscr{C}_{\Phi}}$ (by (1) above) and
$\\{\beta\\}\not\subseteq\mathsf{rb}\;\mathscr{C}_{\Theta}$. By Lemma 5.1 (3)
this condition is equivalent to
$\Theta_{\beta}\not\models\Theta_{(\mathsf{rb}\;\mathscr{C}_{\Phi})}$. ∎
To characterize coherence and strict coherence in terms of provability in
Łukasiewicz logic, we prepare.
###### Proposition 5.3.
There exists an effective procedure $\Pi$ to compute, for each rational
polytope $\mathscr{P}$ of $[0,1]^{k}$, a formula $\Pi_{\mathscr{P}}$ which
axiomatizes $\Theta_{\mathscr{P}}$.
###### Proof.
First, compute a regular complex $\Delta$ supporting $\mathscr{P}$ (see [7,
Chapter 6.2.2. and Theorem 6.5]). Notice that,
$\mathsf{ext}\;\mathscr{P}\subseteq V(\Delta)$ and let
$\hat{h}_{1},\ldots,\hat{h}_{q}$ be the normalized Schauder hats at the
vertices $v_{1},\ldots,v_{q}$ of $\Delta$. For $j=1,\ldots,q$ let $\Pi_{j}$ be
the Łukasiewicz formulas computed from $\hat{h}_{j}$ (see [24]). Let further,
$\Pi_{\mathscr{P}}=\bigoplus_{j=1}^{q}\Pi_{j}.$
Since each $\hat{h}_{j}$ is a member of $\L(k)$, $\Pi_{\mathscr{P}}$ belongs
to $\L(k)$. There remains to be proved that $\Pi_{\mathscr{P}}$ axiomatizes
$\Theta_{\mathscr{P}}$. To this purpose, let us prove that
$x\in\mathscr{P}$ iff $h_{x}(\Pi_{\mathscr{P}})=1$.
As a matter of fact, by Lemma 2.4 (3) the oneset of the McNaughton function
$\Pi_{\mathscr{P}}$ is $\mathscr{P}$. Thus the claim is settled. ∎
###### Corollary 5.4.
There exists an effective procedure $\Pi$ which computes, for each
$\Phi=\\{f_{1},\ldots,f_{k}\\}\subseteq{\bf F}_{n}$ and for each
$\beta\in[0,1]^{k}$, formulas $\Pi_{\Phi}$, $\Pi_{(\mathsf{rb}\;\Phi)}$ and
$\Pi_{\beta}$ of $\L(k)$ which respectively axiomatize
$\Theta_{\mathscr{C}_{\Phi}}$, $\Theta_{(\mathsf{rb}\;\mathscr{C}_{\Phi})}$
and $\Theta_{\beta}$.
###### Proof.
As the reader will recall from Section 3, $\mathscr{C}_{\Phi}$ is a polytope.
Thus, $\mathscr{C}_{\Phi}$, $\\{\beta\\}$ are rational polytopes of
$[0,1]^{k}$, whence $\Pi_{\Phi}$ and $\Pi_{\beta}$ are computed as in
Proposition 5.3.
As for $\Pi_{(\mathsf{rb}\;\Phi)}$, $\mathsf{rb}\;\mathscr{C}_{\Phi}$ is not
convex. However, it can be realized as the finite union of the faces
$F_{1},\ldots,F_{l}$ of $\mathscr{C}_{\Phi}$. Each face $F_{i}$ is a rational
polytope, whence Proposition 5.3 yields Łukasiewicz formulas
$\Pi_{1},\ldots,\Pi_{l}$ such that $x\in F_{i}$ iff $h_{x}(\Pi_{i})=1$. Thus,
let
$\Pi_{(\mathsf{rb}\;\Phi)}=\bigvee_{i=1}^{l}\Pi_{i}.$
Finally, $x\in\mathsf{rb}\;\mathscr{C}_{\Phi}$ iff exists $i=1,\ldots,n$ such
that $x\in F_{i}$ iff $h_{x}(F_{i})=1$ iff
$h_{x}(\Pi_{(\mathsf{rb}\;\Phi)})=1$. ∎
In the light of the above corollary, we may write $\Pi_{\Phi}$,
$\Pi_{(\mathsf{rb}\;\Phi)}$ and $\Pi_{\beta}$ without danger of confusion. In
the following characterization, for every Łukasiewicz formula $\psi$, we write
$\psi^{n}$ for $\psi\odot\ldots\odot\psi$ ($n$-times).
###### Theorem 5.5.
Let $\Phi$ be a finite set of ${\bf F}_{n}$ and let $\beta$ be a book on
$\Phi$. Then the following conditions hold:
1. (1)
$\beta$ is coherent iff there exists a non-zero $n\in\mathbb{N}$ such that
$\vdash(\Pi_{\beta})^{n}\to\Pi_{\Phi}$.
2. (2)
$\beta$ is strictly coherent iff there exists a non-zero $n\in\mathbb{N}$ such
that $\vdash(\Pi_{\beta})^{n}\to\Pi_{\Phi}$ and for all non-zero
$n\in\mathbb{N}$, $\not\vdash(\Pi_{\beta})^{n}\to\Pi_{(\mathsf{rb}\;\Phi)}$.
###### Proof.
Both claims follow from Lemma 5.2, Corollary 5.4, the completeness theorem of
Łukasiewicz calculus and Łukasiewicz deduction theorem stating that
$\varphi\vdash\psi$ iff there exists a non-zero $n\in\mathbb{N}$ such that
$\vdash\varphi^{n}\to\psi$ (see [3, §4]). We will prove (1) since the proof of
(2) is essentially the same.
By Lemma 5.2, $\beta$ is coherent iff
$\Theta_{\beta}\models\Theta_{\mathscr{C}_{\Phi}}$ iff (from Lemma 5.4)
$\Pi_{\beta}\models\Pi_{\Phi}$. The completeness theorem of Łukasiewicz
calculus shows that $\Pi_{\beta}\models\Pi_{\Phi}$ iff
$\Pi_{\beta}\vdash\Pi_{\Phi}$ iff $\vdash(\Pi_{\beta})^{n}\to\Pi_{\Phi}$ for
some $n>0$. ∎
## 6\. Conclusion
In this paper we have presented geometrical, measure-theoretical and logical
characterizations for the strict coherence of books on Łukasiewicz infinite-
valued events. Our first result shows that, for any finite subset $\Phi$ of a
finitely generated free MV-algebra ${\bf A}$, the set of all strictly coherent
books on $\Phi$ coincides with the relative interior of the polytope of all
coherent ones; the second characterization is a de Finetti-like theorem: a
book on $\Phi$ is strictly coherent if and only if it extends to a faithful
state of ${\bf A}$. Finally, our last theorem gives a characterization of
coherence and strict coherence in terms of the provability relation of
propositional Łukasiewicz logic.
We believe that this last result is interesting both from the logical and
philosophical perspective as it may shed a light on an intuitive reading of
propositional Łukasiewicz logic. Specifically, it is of particular interest to
put forward a comparison between the role of Łukasiewicz logic prompted by
Theorem 5.5 in theories of uncertain reasoning and the semantics proposed in
[20]. There, the author, investigating the problem of artificial precision in
theories of vagueness based on real numbers as degrees of truth, presents
Łukasiewicz logic as a suitable formal system to handle vague predicates333The
author wishes to thank Eduardo Barrio for pointing out this to him..
In our future work we will mainly focus on extending the results of this paper
to more general algebraic structures. Particularly promising seems to be the
class of finitely presented MV-algebras (see [21] and [27, Theorem 6.3]).
Further, we will address the problem of determining an NP-algorithm to check
strict coherence for Łukasiewicz events. The solution of this problem would
immediately yield that for each finite set $\Phi$ of Łukasiewicz events,
$\mathscr{K}_{\Phi}^{\mathbb{Q}}$ is NP-complete (see [11, §7]).
Acknowledgement. The author is grateful to the two referees for their careful
reading and valuable comments. He is also much indebted to Lluis Godo, Hykel
Hosni and Daniele Mundici for several conversations on the subject of this
paper. The author acknowledges partial support by the Spanish Ramón y Cajal
research program RYC-2016-19799; the Spanish FEDER/MINECO project TIN2015-
71799-C2-1-P and the SYSMICS project (EU H2020-MSCA-RISE-2015, Project
689176).
## References
* [1] R. Carnap, The Logical Foundations of Probability, University of Chicago Press, Chicago, 1950.
* [2] C.C. Chang, Algebraic analysis of many-valued logics. Trans. Amer. Math. Soc. 88, 467–490, 1958.
* [3] R. Cignoli, I. M. L. D’Ottaviano, D. Mundici, Algebraic Foundations of Many-valued Reasoning, Trends in Logic Vol 8, Kluwer, Dordrecht, 2000.
* [4] R. Cignoli, V. Marra, Stone duality for real-valued multisets. Forum Mathematicum 24(6): 1317–1331, 2012.
* [5] B. de Finetti, Sul significato soggettivo della probabilità, Fundamenta Mathematicae 17: 298–329, 1931. Translated into English as “On the subjective meaning of probability”, in: Paola Monari and Daniela Cocchi (Eds.), Probabilità e Induzione, Clueb, Bologna, pp. 291–321, 1993.
* [6] B. de Finetti, Theory of Probability, Vol.1, Wiley, New York, 1974.
* [7] F. P. Desiderata, M. I. Shamos, Computational Geometry – An Introduction. Springer-Verlag, Berlin Heidelberg, New York, 1985
* [8] G. Ewald, Combinatorial Convexity and Algebraic Geometry. Springer-Verlag New York, 1996.
* [9] T. Flaminio, L. Godo, H. Hosni, On the logical structure of de Finetti’s notion of event. Journal of Applied Logic 12(3): 279–30, 2014.
* [10] T. Flaminio, H. Hosni, S. Lapenta, Convex MV-algebras: Many-valued logics meet decision theory. Studia Logica 106(5): 913–945, 2018.
* [11] T. Flaminio, H. Hosni, F. Montagna, Strict Coherence on Many-Valued Events. The Journal of Symbolic Logic 83(1): 55–69, 2018.
* [12] T. Flaminio, T. Kroupa, States of MV-algebras. Chapter XVII of Handbook of Mathematical Fuzzy Logic - volume 3, C. Fermüller, P. Cintula and C. Noguera (Eds.), Studies in Logic, Mathematical Logic and Foundations, vol. 58, College Publications, London, 2015.
* [13] H. Gaifman, Concerning measures on Boolean algebras. Pacific Journal of Mathematics 14(1): 61–73, 1964.
* [14] R. Hähnle, Many-valued logic and mixed integer programming. Annals of Mathematics and Artificial Intelligence 12(3-4): 231–263, 1994.
* [15] J. L. Kelley, Measures on Boolean Algebras. Pacific Journal of Mathematics 9(4): 1165–1177, 1959.
* [16] J. G. Kemeny, Fair bets and inductive probabilities. The Journal of Symbolic Logic 20(3): 263–273, 1955.
* [17] T. Kroupa, Every state on semisimple MV-algebra is integral. Fuzzy Sets and Systems 157 (20): 2771–2787, 2006.
* [18] T. Kroupa, States in Łukasiewicz logic corresponds to probabilities of rational polyhedra. International Journal of Approximate Reasoning 53: 435–446, 2012.
* [19] J. Kühr, D. Mundici, De Finetti theorem and Borel states in $[0,1]$-valued algebraic logic. International Journal of Approximate Reasoning 46 (3): 605–616, 2007.
* [20] V. Marra, The Problem of Artificial Precision in Theories of Vagueness: A Note on the Rôle of Maximal Consistency. Erkenntnis 79(5): 1015–1026, 2014.
* [21] V. Marra, L. Spada, Duality, projectivity and unification in Łukasiewicz logic and MV-algebras. Annals of Pure and Applied logic 164(3): 192–210, 2013.
* [22] P. McMullen, G. C. Shephard, Convex Polytopes and the Upper Bound Conjecture, London Mathematical Society Lecture Note Series 3, Cambridge University Press, London-New York, 1971.
* [23] R. McNaughton, A Theorem about Infinite-valued Sentential Logic. The Journal of Symbolic Logic 16: 1–13, 1951.
* [24] D. Mundici, A constructive proof of McNaughton’s theorem in infinite-valued logic. The Journal of Symbolic Logic 58(2): 596–602, 1994.
* [25] D. Mundici, Averaging the truth-value in Łukasiewicz logic. Studia Logica 55(1): 113–127, 1995.
* [26] D. Mundici, Bookmaking over infinite-valued events. International Journal of Approximate Reasoning 43(3): 223–240, 2006.
* [27] D. Mundici, Advanced Łukasiewicz calculus and MV-algebras. Trends in Logic 35, Springer, 2011.
* [28] D. Mundici, Finite axiomatizability in Łukasiewicz logic. Annals of Pure and Applied Logic 162: 1035–1047, 2011.
* [29] G. Panti, Invariant measures on free MV-algebras. Communications in Algebra 36(8): 2849–2861, 2009.
* [30] J. Paris, A note on the Dutch Book method. Proceedings of the Second International Symposium on Imprecise Probabilities and their Applications (G. De Cooman, T. Fine, and T. Seidenfeld, editors), ISIPTA 2001, Shaker Publishing Company, Ithaca, NY, USA, pp. 301–306, 2001.
* [31] J. B. Paris, A. Vencovska, Pure Inductive Logic, Cambridge University Press, Cambridge, UK, 2015.
* [32] A. Shimony, Coherence and the axioms of confirmation. The Journal of Symbolic Logic 20(1): 1–28, 1955.
* [33] S. Todorcevic, Topics in Topology. Lecture notes in mathematics, Springer, 1997.
* [34] B. Weatherson, From Classical to Intuitionistic Probability. Notre Dame Journal of Formal Logic 44(2): 111–123, 2003.
| arxiv-papers | 2021-07-27T06:47:08 | 2024-09-04T03:07:20.729055 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Tommaso Flaminio",
"submitter": "Tommaso Flaminio",
"url": "https://arxiv.org/abs/2107.12624"
} |
2107.12626 | # Unsupervised Deep Anomaly Detection for
Multi-Sensor Time-Series Signals
Yuxin Zhang, Yiqiang Chen, Jindong Wang, and Zhiwen Pan, Y. Zhang is with
Global Energy Interconnection Development and Cooperation Organization,
Xicheng District, Beijing, China, and Beijing Key Laboratory of Mobile
Computing and Pervasive Device, Institute of Computing Technology, Chinese
Academy of Sciences and University of Chinese Academy of Sciences, Beijing,
China. E-mail: [email protected]. Y. Chen and Z. Pan are with Beijing Key
Laboratory of Mobile Computing and Pervasive Device, Institute of Computing
Technology, Chinese Academy of Sciences and University of Chinese Academy of
Sciences, Beijing, China. Y. Chen is also with Peng cheng Laboratory (PCL).
E-mail: {yqchen, pzw}@ict.ac.cn (Corresponding author: Yiqiang Chen). J. Wang
is with Microsoft Research Asia, Beijing, China, also correspondence. E-mail:
[email protected]. Manuscript received April 19, 2005; revised August
26, 2015.
###### Abstract
Nowadays, multi-sensor technologies are applied in many fields, e.g., Health
Care (HC), Human Activity Recognition (HAR), and Industrial Control System
(ICS). These sensors can generate a substantial amount of multivariate time-
series data. Unsupervised anomaly detection on multi-sensor time-series data
has been proven critical in machine learning researches. The key challenge is
to discover generalized normal patterns by capturing spatial-temporal
correlation in multi-sensor data. Beyond this challenge, the noisy data is
often intertwined with the training data, which is likely to mislead the model
by making it hard to distinguish between the normal, abnormal, and noisy data.
Few of previous researches can jointly address these two challenges. In this
paper, we propose a novel deep learning-based anomaly detection algorithm
called Deep Convolutional Autoencoding Memory network (CAE-M). We first build
a Deep Convolutional Autoencoder to characterize spatial dependence of multi-
sensor data with a Maximum Mean Discrepancy (MMD) to better distinguish
between the noisy, normal, and abnormal data. Then, we construct a Memory
Network consisting of linear (Autoregressive Model) and non-linear predictions
(Bidirectional LSTM with Attention) to capture temporal dependence from time-
series data. Finally, CAE-M jointly optimizes these two subnetworks. We
empirically compare the proposed approach with several state-of-the-art
anomaly detection methods on HAR and HC datasets. Experimental results
demonstrate that our proposed model outperforms these existing methods.
###### Index Terms:
Unsupervised anomaly detection, Multi-sensor time series, Convolutional
autoencoder, Attention based BiLSTM.
## 1 Introduction
Anomaly detection has been one of the core research areas in machine learning
for decades, with wide applications such as cyber-intrusion detection [1],
medical care [2], sensor networks [3], video anomaly detection [4] and so on.
Anomaly detection seems to be a simple two-category classification, i.e., we
can learn to classify the normal or abnormal data. However, it is also faced
with the following challenges. First, training data is highly imbalanced since
the anomalies are often extremely rare in a dataset compared to the normal
instances. Standard classifiers try to maximize accuracy in classification, so
it often falls into the trap of overlapping problem, which means that the
model classifies the overlapping region as belonging to the majority class
while assuming the minority class as noise. Second, there is no easy way for
users to manually label each training data, especially the anomalies. In many
cases, it is prohibitively hard to represent all types of anomalous behaviors.
Due to above challenges, there is a growing trend to use unsupervised learning
approaches for anomaly detection compared with semi-supervised and supervised
learning approaches since unsupervised methods can handle the imbalanced and
unlabeled data in a more principled way [5, 6, 7, 8, 9].
Nowadays, the prevalence of sensors in machine learning and pervasive
computing research areas such as Health Care (HC) [10, 11] and Human Activity
Recognition (HAR) [12, 13] generate a substantial amount of multivariate time-
series data. These learning algorithms based on multi-sensor time-series
signals give priority to dealing with spatial-temporal correlation of multi-
sensor data. Many approaches for spatial-temporal dependency amongst multiple
sensors [14, 15, 16] have been studied. It seems intuitive to apply previous
unsupervised anomaly detection methods on multi-sensor time-series data.
Unfortunately, there are still several challenges.
First, anomaly detection in spatial-temporal domain becomes more complicated
due to the temporal component in time-series data. Conventional anomaly
detection techniques such as PCA [17], k-means [18], OCSVM [19] and
Autoencoder [20] are unable to deal with multivariate time-series signals
since they cannot simultaneously capture the spatial and temporal
dependencies. Second, these reconstruction-based models such as Convolutional
AutoEncoders (CAEs) [21] and Denoising AutoEncoders (DAEs) [22] are usually
used for anomaly detection. It is generally assumed that the compression of
anomalous samples is different from that on normal samples, and the
reconstruction error becomes higher for these anomalous samples. In reality,
being influenced by the high complexity of model and the noise of data, the
reconstruction error for the abnormal input could also be fit so well by the
training model [23, 24]. That is, the model is robust to noise and anomalies.
Third, in order to reduce the dimensionality of multi-sensor data and detect
anomalies, two-step approaches are widely adopted. As for the drawback of some
works [25, 26], the joint performance of two baseline models can easily get
stuck in local optima, since two models are trained separately.
In order to solve the above three challenges, this paper presents a novel
unsupervised deep learning based anomaly detection approach for multi-sensor
time-series data called Deep Convolutional Autoencoding Memory network
(CAE-M). The CAE-M network composes of two main sub-networks: characterization
network and memory network. Specifically, we employ deep convolutional
autoencoder as feature extraction module, with attention-based Bidirectional
LSTMs and Autoregressive model as forecasting module. By simultaneously
minimizing reconstruction error and prediction error, the CAE-M model can be
jointly optimized. During the training phase, the CAE-M model is trained to
explicitly describe the normal pattern of multi-sensor time-series data.
During the detection phase, the CAE-M model calculate the compound objective
function for each captured testing data. Through combining these errors as a
composite anomaly score, a fine-grained anomaly detection decision can be
made. To summarize, the main contributions of this paper are four-fold:
1) The proposed composite model is designed to characterize complex spatial-
temporal patterns by concurrently performing the reconstruction and prediction
analysis. In reconstruction analysis, we build Deep Convolutional Autoencoder
to fuse and extract low-dimensional spatial features from multi-sensor
signals. In prediction analysis, we build Attention-based Bidirectional LSTM
to capture complex temporal dependencies. Moreover, we incorporate Auto-
regressive linear model in parallel to improve the robust and adapt for
different use cases and domains.
2) To reduce the influence of noisy data, we improve Deep Convolutional
Autoencoder with a Maximum Mean Discrepancy (MMD) penalty. MMD is used to
encourage the distribution of the low-dimensional representation to
approximate some target distribution. It aims to make the distribution of
noisy data close to the distribution of normal training data, thereby reducing
the risk of overfitting. Experiments demonstrate that it is effective to
enhance the robustness and generalization ability of our method.
3) The CAE-M is an end-to-end learning model that two sub-networks can co-
optimize by a compound objective function with weight coefficients. This
single-stage approach can not only streamline the learning procedure for
anomaly detection, but also avoid the model getting stuck in local minimum
through joint optimization.
4) Experiments on three multi-sensor time-series datasets demonstrate that
CAE-M model has superior performance over state-of-the-art techniques. In
order to further verify the effect of our proposed model, fine-grained
analysis, effectiveness evaluation, parameter sensitivity analysis and
convergence analysis show that all the components of CAE-M together leads to
the robust performance on all datasets.
The rest of the paper is organized as follows. Section 2 provides an overview
of existing methods for anomaly detection. Our proposed methodology and
detailed framework is described in Section 3. Performance evaluation and
analysis of experiment is followed in Section 4. Finally, Section 5 concludes
the paper and sketches directions for possible future work.
## 2 Related Work
Anomaly detection has been studied for decades. Based on whether the labels
are used in the training process, they are grouped into supervised, semi-
supervised and unsupervised anomaly detection. Our main focus is the
unsupervised setting. In this section, we demonstrate various types of
existing approaches for unsupervised anomaly detection, which can be
categorized into traditional anomaly detection and deep anomaly detection.
### 2.1 Traditional anomaly detection
Conventional methods can be divided into three categories. 1) Reconstruction-
based methods are proposed to represent and reconstruct accurately normal data
by a model, for example, PCA [17], Kernel PCA [27, 28] and Robust PCA [29].
Specifically, RPCA is used to identify a low rank representation including
random noise and outliers by using a convex relaxation of the rank operator;
2) Clustering analysis is used for anomaly detection, such as Gaussian Mixture
Models (GMM) [30], k-means [18] and Kernel Density Estimator (KDE) [31]. They
cluster different data samples and find anomalies via a predefined outlierness
score; 3) the methods of one-class learning model are also widely used for
anomaly detection. For instance, One-Class Support Vector Machine (OCSVM) [19]
and Support Vector Data Description (SVDD) [32] seek to learn a discriminative
hypersphere surrounding the normal samples and then classify new data as
normal or abnormal.
It is notable that these conventional methods for anomaly detection are
designed for static data. To capture the temporal dependencies appropriately,
Autoregression (AR) [33], Autoregressive Moving Average (ARMA) [34] and
Autoregressive Integrated Moving Average (ARIMA) model [35] are widely used.
These models represent time series that are generated by passing the input
through a linear or nonlinear filter which produces the output at any time
using the previous output values. Once we have the forecast, we can use it to
detect anomalies and compare with groundtruth. Nevertheless, AR model and its
variants are rarely used in multi-sensor multivariate time series due to their
high computational cost.
### 2.2 Deep anomaly detection
In deep learning-based anomaly detection, the reconstruction models,
forecasting models as well as composite models will be discussed.
#### 2.2.1 Reconstruction models
The reconstruction model focuses on reducing the expected reconstruction error
by different methods. For instance, Autoencoders [20] are often utilized for
anomaly detection by learning to reconstruct a given input. The model is
trained exclusively on normal data. Once it is not able to reconstruct the
input with equal quality compared to the reconstruction of normal data, the
input sequence is treated as anomalous data. LSTM Encoder-Decoder model [36]
is proposed to learn temporal representation of the input time series by LSTM
networks and use reconstruction error to detect anomalies. Despite its
effectiveness, LSTM does not take spatial correlation into consideration.
Convolutional Autoencoders (CAEs) [21] are an important method of video
anomaly detection, which are able of capturing the 2D image structure since
the weights are shared among all locations in the input image. Furthermore,
since Convolutional long short-term memory (ConvLSTM) can model spatial-
temporal correlations by using convolutional layers instead of fully connected
layers, some researchers [15, 37] add ConvLSTM layers to autoencoder, which
better encodes the change of appearance for normal data.
Variational Autoenocders (VAEs) are a special form of autoencoder that models
the relationship between two random variables, latent variable $z$ and visible
variable $x$. A prior for $z$ is usually multivariate unit Gaussian
$\mathcal{N}(0,I)$. For anomaly detection, authors [38] define the
reconstruction probability that is the average probability of the original
data generating from the distribution. Data points with high reconstruction
probability is classified as anomalies, vice versa. Others like Denoising
AutoEncoders (DAEs) [22], Deep Belief Networks (DBNs) [39] and Robust Deep
Autoencoder (RDA) [40] have also been reported good performance for anomaly
detection.
#### 2.2.2 Forecasting models
The forecasting model can also be used for anomaly detection. It aims to
predict one or more continuous values, e.g. forecasting the current output
values $x_{t}$ for the past $p$ values $[x_{t-p},...,x_{t-2},x_{t-1}]$. RNN
and LSTM is the standard model for sequence prediction. In the work [41, 42],
authors perform anomaly detection by using RNN-based forecasting models to
predict values for the next time period and minimize the mean squared error
(MSE) between predicted and future values. Recently, there have also been
attempted to perform anomaly detection using other feed-forward networks. For
instance, Shalyga et al. [43] develop Neural Network (NN) based forecasting
approach to early anomaly detection. Kravchik and Shabtai [44] apply different
variants of convolutional and recurrent networks to perform forecasting model.
And the results show that 1D convolutional networks obtain the best accuracy
for anomaly detection in industrial control systems. In another work [45], Lai
et al. propose a forecasting model, which uses CNN and RNN, namely LSTNet, to
extract short-term local dependency pattern and long-term pattern for
multivariate time series, and incorporates Linear SVR model in the LSTNet
model. Besides, other efforts have been performed in [46] using GAN-based
anomaly detection. The model adopts U-Net as generator to predict next frame
in video and leverages the adversarial training to discriminate whether the
prediction is real or fake, thus abnormal events can be easily identified by
comparing the prediction and ground truth.
#### 2.2.3 Composite models
Besides single model, composite model for unsupervised anomaly detection has
gained a lot attention recently. Zong et al. [23] utilize a deep autoencoder
to generate a low-dimensional representation and reconstruction error, which
is further fed into a Gaussian Mixture Model to model density distribution of
multi-dimensional feature. However, they cannot consider the spatial-temporal
dependency for multivariate time series data. Different from this work, the
Composite LSTM model [47] uses single encoder LSTM and multiple decoder LSTMs
to perform different tasks such as reconstructing the input sequence and
predicting the future sequence. In [48], the authors use ConvLSTM model as a
unit within the composite LSTM model following a branch for reconstruction and
another for prediction. This type of composite model is currently used to
extract features from video data for the tasks of action recognition.
Similarly, authors in [49] propose Spatial-Temporal AutoEncoder (STAE) for
video anomaly detection, which utilizes 3D convolutional architecture to
capture the spatial-temporal changes. The architecture of the network is an
encoder followed by two branches of decoder for reconstructing past sequence
and predicting future sequence respectively.
As mentioned above, unsupervised anomaly detection techniques have still many
deficiencies. For traditional anomaly detection, it is hard to learn
representations of spatial-temporal patterns in multi-sensor time-series
signals. For a reconstruction model, a single task could make the model suffer
from the tendency to store information only about the inputs that are
memorized by the AE. And for the forecasting model, this task could suffer
from only storing the last few values that are most important for predicting
the future [47, 48]. Hence, their performance will be limited since model only
learn trivial representations. For composite model, these researchers design
their models for different purposes. Zong et al. [23] could solve problem that
the model is robust to noise and anomalies through performing density
estimation in a low-dimensional space. Zhao et al. [49] could consider the
spatial-temporal dependency through 3D convolutional reconstructing and
forecasting architectures. However, few studies could address these issues
simultaneously.
Different from these works, our research makes the following contributions: 1)
The proposed model is designed to characterize complex spatial-temporal
dependencies, thus discovering generalized pattern of multi-sensor data; 2)
Adding a Maximum Mean Discrepancy (MMD) penalty could avoid the model
generalizing so well for noisy data and anomalies; 3) Combining Attention-
based Bidirectional LSTM (BiLSTM) and traditional Auto-regressive linear model
could boost the model’s performance from different time scale; 4) The
composite baseline model is generated based on end-to-end training which means
all the components within the model are jointly trained with compound
objective function.
Besides, some learning algorithms based on time-series data have been studied
for decades. [50] propose Unsupervised Salient Subsequence Learning to extract
subsequence as new representations of the time series data. Due to the
internally sequential relationship, many neural network-based models can be
applied to time series in an unsupervised learning manner. For example, some
1D-CNN models [51, 52] have been proposed to solve time series tasks with a
very simple structure and the sota performance. Moreover, the multiple time
series signal usually has some kinds of co-relations, [53] propose a method to
learn the relation graph on multiple time series. Some anomaly detection based
on multiple time series applications are available for wastewater treatment
[54], for ICU [55], and for sensors [56].
Figure 1: The overview of the proposed CAE-M model.
## 3 The Proposed Method
### 3.1 Notation
In a multi-sensor time series anomaly detection problem, we are given a
dataset generated by $n$ sensors ($n>1$). Without loss of generality, we
assume each sensor generates $m$ signals (e.g., an accelerometer often
generates 3-axis signals). Denote $\mathcal{S}$ the signal set, we have
$N=|\mathcal{S}|=nm$ signals in total. For each signal $x_{i}\in\mathcal{S}$,
$x_{i}\in\mathbb{R}^{t_{i}\times 1}$, where $t_{i}$ denotes the length of
signal $x_{i}$. Note that even each sensor signal may have different length,
we are often interested in their intersections, i.e., all sensors are having
the same length $T$, i.e., $X=(x_{1},\cdots,x_{N})^{T}\in\mathbb{R}^{N\times
T}$ denotes an input sample containing all sensors.
###### Definition 1 (Unsupervised anomaly detection).
It is non-trivial to formally define an anomaly. In this paper, we are
interested in detecting anomalies in a classification problem. Let
$\mathcal{Y}=\\{1,2,\cdots,K\\}$ be the classification label set, and $K$ the
total number of classes, then the dataset
$\mathcal{D}=(X_{i},y_{i})^{N}_{i=1}$. Eventually, our goal is to detect
whether an input sample $X_{a}$ belongs to one of the $K$ predefined classes
with a high confidence. If not, then we call $X_{a}$ an anomaly. Note that in
this paper, we are dealing with an unsupervised anomaly detection problem,
where the labels are unseen during training, which is more obviously
challenging.
### 3.2 Overview
There are some existing works [19, 21, 25] attempting to resolve the
unsupervised anomaly detection problem. Unfortunately, they may face several
critical challenges. First, conventional anomaly detection techniques such as
PCA [17], k-means [18] and OCSVM [19] are unable to capture the temporal
dependencies appropriately because they cannot deliver temporal memory states.
Second, since the normal samples might contain noise and anomalies, using deep
anomaly detection approaches such as standard Autoencoders [21, 20] is likely
to affect the generalization capability. Third, the multi-stage approaches,
i.e., feature extraction and predictive model building are separated [25, 26],
can easily get stuck in local optima.
In this paper, we present a novel approach called Convolutional Autoencoding
Memory network (CAE-M) to tackle the above challenges. Figure 1 gives an
overview of the proposed method. In a nutshell, CAE-M is built upon a
convolutional autoencoder, which is then fed into a predictive network.
Concretely, we encode the spatial information in multi-sensor time-series
signals into the low-dimensional representation via Deep Convolutional
Autoencoder (CAE). In order to reduce the effect of noisy data, some existing
works have tried to add Memory module [24] or Gaussian Mixture Model (GMM)
[23]. In our proposed method, we simplify these modules into penalty item,
which called Maximum Mean Discrepancy (MMD) penalty. Adding a MMD term can
encourage the distribution of training data to approximate the same
distribution such as Gaussian distribution, thus reducing the risk of
overfitting caused by noise and anomalies in training data [23]. And then we
feed the representation and reconstruction error to the subsequent prediction
network based on Bidirectional LSTM (Bi-LSTM) with Attention mechanism and
Auto-regressive model (AR) which could predict future feature values by
modeling the temporal information. Through the composite model, the spatial-
temporal dependencies of multi-sensor time-series signals can be captured.
Finally, we propose a compound objective function with weight coefficients to
guide end-to-end training. For normal data, the reconstructed value generated
by data coding is similar to the original input sequence and the predicted
value is similar to the future value of time series, while the reconstructed
value and the predicted value generated by abnormal data change greatly.
Therefore, in inference process, we can detect anomalies precisely by
computing the loss function in composite model.
### 3.3 Characterization Network
In the characterization network, we perform representative learning by fusing
multivariate signals in multiple sensors. The low-dimensional representation
contains two components: (1) the features which are abstracted from the
multivariate signals; (2) the reconstruction error over the distance metrics
such as Euclidean distance and Minkowski distance. To avoid the autoencoder
generalizing so well for abnormal inputs, optimization function combines
reconstruction loss by measuring how close the reconstructed input is to the
original input and the regularization term by measuring the similarity between
the two distributions (i.e., the distribution of low-dimensional features and
Gaussian distribution).
#### 3.3.1 Deep feature extraction
We employ a deep convolutional autoencoder to learn the low-dimensional
features. Specifically, given $N$ time series with length $T$, we pack into a
matrix $x\in\mathbb{R}^{N\times T}$ with multi-sensor time-series data. The
matrix is then fed to deep convolutional autoencoder (CAE). The CAE model is
composed of two parts, an encoder and a decoder as in Eq. (1) and Eq. (2).
Assuming that $x^{\prime}$ denotes the reconstruction of the same shape as
$x$, the model is to compute low-dimensional representation $z_{f}$, as
follows:
$\displaystyle z_{f}=Encode(x),$ (1) $\displaystyle x^{\prime}=Decode(z_{f}).$
(2)
The encoder in Eq. (1) maps an input matrix $x$ to a hidden representation
$z_{f}$ by many convolutional and pooling layers. Each convolutional layer
will be followed by a max-pooling layer to reduce the dimensions of the
layers. A max-pooling layer pools features by taking the maximum value for
each patch of the feature maps and produce the output feature map with reduced
size according to the size of pooling kernel.
The decoder in Eq. (2) maps the hidden representation $z_{f}$ back to the
original input space as a reconstruction. In particular, a decoding operation
needs to convert from a narrow representation to a wide reconstructed matrix,
therefore the transposed convolution layers are used to increase the width and
height of the layers. They work almost exactly the same as convolutional
layers, but in reverse.
The difference between the original input vector $x$ and the reconstruction
$x^{\prime}$ is called the reconstruction error $z_{r}$. The error typically
used in the autoencoder is Mean Squared Error (MSE), which measures how close
the reconstructed input $x^{\prime}$ is to the original input $x$, as follows
in Eq. (3).
$L_{MSE}=\lVert x-x^{\prime}\lVert^{2}_{2},$ (3)
where $\lVert\cdot\lVert^{2}_{2}$ is the $\textit{l}_{2}$-norm.
#### 3.3.2 Handling noisy data
To reduce the influence of noisy data, we need to observe the changes in low-
dimensional features and the changes of distribution over the samples in a
more granular way, thus distinguishing between normal and abnormal data
obviously.
Inspired by [23], in order to avoid the autoencoder generalizing so well for
noisy data and abnormal data, we hope to detect ”lurking” anomalies that
reside in low-density areas in the reduced low-dimensional space. Our proposed
method is conceptually similar to Gaussian Mixture Model (GMM) as target
distributions. The loss function is complemented by MMD as a regularization
term that encourages the distribution of the low-dimensional representation to
be similar to a target distribution. It aims to make the distribution of noisy
data close to the distribution of normal training data, thereby reducing the
risk of overfitting. Specifically, Maximum Mean Discrepancy (MMD) [57] is a
distance-measure between the samples of the distributions. Given the latent
representation $z_{a}=\\{z_{f}^{(1)},...,z_{f}^{(h)}\\}\in\mathbb{R}^{h\times
d}$, where $d$ is a latent space (usually $d<N\times T$) and $h$ denotes all
of the time steps at one iteration. For CAE with MMD penalty, the Gaussian
distribution $P_{z}$ in reproduction kernel Hilbert space $\mathcal{H}$ is
chosen as the target distribution. We compute the Kernel MMD as the follows:
$\displaystyle
L_{MMD}(Z,P_{z})=||\frac{1}{h}\sum_{i=1}^{h}\phi(z_{f}^{(i)})-\frac{1}{h}\sum_{i=1}^{h}\phi(z^{(i)})||^{2}_{\mathcal{H}}.$
(4)
Here we have the distribution $Z$ of the low-dimensional representation
$z_{f}^{(i)}$ and the target distribution $z^{(i)}\sim P_{z}$ over a set
$\mathcal{X}$. The MMD is defined by a feature map
$\phi:\mathcal{X}\rightarrow\mathcal{H}$ where $\mathcal{H}$ is a reproducing
kernel Hilbert space (RKHS).
During the training process, we could apply the kernel trick to compute the
MMD. And it turns out that many kernels, including the Gaussian kernel, lead
to the MMD being zero if and only the distributions are identical. Letting
$k(x,y)=\left\langle\phi(x),\phi(y)\right\rangle_{\mathcal{H}}$, we yield an
alternative characterization of the MMD as follows:
$\displaystyle L_{MMD}(Z,P_{z})=$ $\displaystyle||\frac{1}{h^{2}}\sum_{i\neq
j}k(z_{f}^{(i)},z_{f}^{(j)})+\frac{1}{h^{2}}\sum_{i\neq j}k(z^{(i)},z^{(j)})$
(5)
$\displaystyle-\frac{2}{h^{2}}\sum_{i,j}k(z_{f}^{(i)},z^{(j)})||_{\mathcal{H}}.$
Here the kernel is defined as $k(u,v)=exp(-\frac{||u-v||^{2}}{2\sigma^{2}})$.
The latent representation with Gaussian distribution $P_{z}$ is performed by
sampling from $P_{z}$ and approximating by averaging the kernel
$k(\cdot,\cdot)$ evaluated at all pairs of samples.
Note that we usually do batch training for neural network training. It means
that the model is trained using a subsample of data at one iteration. In this
work, we need to compute the MMD over a set of $\mathcal{X}$ at one iteration,
where the number of $\mathcal{X}$ is equal to $batchsize\times timestep$. That
is, the latent representation is denoted as
$z_{a}=\\{z_{f}^{(1)},...,z_{f}^{(l)}\\}\in\mathbb{R}^{l\times d}$, where
$l=batchsize\times h$.
### 3.4 Memory Network
To simultaneously capture the spatial and temporal dependencies, our proposed
model is designed to characterize complex spatial-temporal patterns by
concurrently performing the reconstruction analysis and prediction analysis.
Considering the importance of temporal component in time series, we propose
non-linear prediction and linear prediction to detect anomalies by comparing
the future prediction and the next value appearance in the feature space.
The characterization network generates feature representations, which include
reconstruction error and reduced low-dimensional features learned by the CAE
at $h$ time steps. Denote input features as $z_{h}$ for $h=1,...,H$:
$\displaystyle z_{h}=[z_{f},z_{r}]_{h},\ h\in[1,H].$ (6)
Our goal is to predict the current value $z_{h}$ for the past values
$[z_{1},z_{2},...,z_{h-1}]$. The memory network combines non-linear function
based predictor and linear function based predictor to tackle temporal
dependency problem.
#### 3.4.1 Non-linear prediction
Non-linear predictor function has different types such as Recurrent neural
networks (RNNs), Long Short-Term Memory (LSTM)[58] and Gated Recurrent Unit
(GRU) [59]. Original RNNs fall short of learning long-term dependencies. In
this work, we adopt a Bidirectional LSTM with attention mechanism [60] which
could consider the whole/local context while calculating the relevant hidden
states. Specifically, the Bidirectional LSTM (BiLSTM) runs the input in two
ways, one LSTM from past to future and one LSTM from future to past. Different
from unidirectional, the two hidden states combined are able in any point in
time to preserve information from both past and future. A BiLSTM unit consists
of four components: input gate $i_{h}$, forget gate $f_{h}$, output gate
$o_{h}$ and cell activation vector $c_{h}$. The hidden state $y_{h}$ given
input $z_{h}$ is computed as follows:
$i_{h}=\sigma(W_{zi}z_{h}+W_{yi}y_{h-1}+W_{ci}c_{h-1}+b_{i}),$ (7)
$f_{h}=\sigma(W_{zf}z_{h}+W_{yf}y_{h-1}+W_{cf}c_{h-1}+b_{f}),$ (8)
$o_{h}=\sigma(W_{zo}z_{h}+W_{yo}y_{h-1}+W_{co}c_{h-1}+b_{o}),$ (9)
$\widetilde{c_{h}}=tanh(W_{zc}z_{h}+W_{yc}h_{h-1}+W_{cc}c_{h-1}+b_{c}),$ (10)
$c_{h}=f_{h}\otimes c_{h-1}+i_{h}\otimes\widetilde{c_{h}},$ (11)
$y_{h}=o_{h}\otimes tanh(c_{h}),$ (12) $\hat{y}_{h}=[y^{1}_{h};y^{2}_{h}],$
(13)
where $i_{h}$, $f_{h}$, $o_{h}$, $c_{h}$ represent the value of $i,f,o,c$ at
the moment $h$ respectively, $W$ and $b$ denote the weight matrix and bias
vector, $\sigma(\cdot)$ and $tanh(\cdot)$ are activation function, the
operator $\otimes$ denotes element-wise multiplication, the current cell state
$c_{h}$ consists of two components, namely previous memory $c_{h-1}$ and
modulated new memory $\widetilde{c_{h}}$, the output $\hat{y}_{h}$ combines
the forward $y^{1}_{h}$ and backward $y^{2}_{h}$ pass outputs. Note that the
merge mode by which outputs of the forward and backward are combined has
different types, e.g. sum, multiply, concatenate, average. In this work, we
use the mode “sum” to obtain the output $\hat{y}_{h}$.
Attention mechanism for processing sequential data that could focus on the
features of the keywords to reduce the impact of non-key temporal context.
Hence, we adopt temporal attention mechanism to produce a weight vector and
merge raw features from each time step into a segment-level feature vector, by
multiplying the weight vector. The work process of attention mechanism is
following detailed.
$M_{h}=tanh(W_{h}\hat{y}_{h}+b_{h}),$ (14) $E_{h}=\sigma(W_{a}M_{h}+b_{a}),$
(15) $A_{h}=softmax(E_{h}),$ (16) $Y_{h}=\sum_{h}A_{h}\ast\hat{y}_{h}.$ (17)
Here $W$ and $b$ are represented as the weight and bias. A weighted sum of the
$\hat{y}_{h}$ based on the weight $A_{h}$ is computed as the context
representation $Y_{h}$. The context representation is considered as the
predicted value of $z_{h}$ for temporal features $[z_{1},z_{2},...,z_{h-1}]$.
#### 3.4.2 Linear prediction
Autoregressive (AR) model is a regression model that uses the dependencies
between an observation and a number if lagged observations. Non-linear
Recurrent Networks are theoretically more expressive and powerful than AR
models. In fact, AR models also yield good results in forecasting short term
modeling. In specific real datasets, such infinite-horizon memory isn’t always
effective. Therefore, we incorporate AR model in parallel to the non-linear
memory network part.
The AR model is formulated as follows:
$\displaystyle\hat{z}_{h}=c\sum_{i=1}^{h-1}w_{h-i}+\sum_{i=1}^{h-1}w_{h-i}*z_{h-i},$
(18)
where $w_{1},...,w_{h-1}$ are the weights of the AR model, $c$ is a constant,
$\hat{z}_{h}$ represents the predicted value for past temporal value
$[z_{1},z_{2},...,z_{h-1}]$. We implement this model using Dense layer of
network to combine the weights and data.
In the output layer, the prediction error is obtained by computing the
difference between the output of predictor model and true value ${z_{h}}$. The
final prediction error integrates the output of non-linear prediction model
and linear prediction model. The following equation is written as:
$\displaystyle
L_{predict}=\sum_{h\in\Omega_{batch}}(\underbrace{||Y_{h}-z_{h}||^{2}_{F}}_{\text{Attention-
based
BiLSTM}}+\underbrace{||\hat{z}_{h}-z_{h}||^{2}_{F}}_{\text{Autoregressive}}),$
(19)
where $\Omega_{batch}$ is a subsample of training data, $||\cdot||_{F}$ is the
Frobenius norm.
### 3.5 Joint optimization
As for multi-step approach, it can easily get stuck in local optima, since
models are trained separately. Therefore, we propose an end-to-end hybrid
model by minimizing compound objective function.
The CAE-M objective has four components, MSE (reconstruction error) term, MMD
(regularization) term, prediction error (non-linear forecasting task) term and
prediction error (linear forecasting task) term. Given $X$ samples
$\\{x_{1},x_{2},...,x_{D}\\},x_{i}\in\mathbb{R}^{N\times T}$, the objective
function is constructed as:
$\begin{split}J(\theta)&=L_{MSE}+\lambda_{1}\cdot L_{MMD}+\lambda_{2}\cdot
L_{lp}+\lambda_{3}\cdot L_{np}\\\
&=\frac{1}{M}\sum_{i=1}^{M}L(x_{i},x^{\prime}_{i})+\lambda_{1}L_{MMD}(Z,P_{Z})\\\
&+\frac{1}{M}\sum_{i=1}^{M}[\lambda_{2}||Y_{h}^{(i)}-z_{h}^{(i)}||^{2}_{F}+\lambda_{3}||\hat{z}_{h}^{(i)}-z_{h}^{(i)}||^{2}_{F}],\end{split}$
(20)
where $M$ is batch size used for training, $h$ is current time step,
$\lambda_{1}$,$\lambda_{2}$ and $\lambda_{3}$ are the meta parameters
controlling the importance of the loss function.
Restating our goals more formally, we would like to:
* •
Minimize the reconstruction error in the characterization network, that is,
minimize the error in reconstructing $x^{\prime}$ from $x$ at all time step
$h$. We need to compute the average error at each time step of sample. The
purpose is to obtain better low-dimensional representation for multi-sensor
data.
* •
Minimize the MMD loss that encourages the distribution $Z$ of the low-
dimensional representation to be similar to a target distribution $P_{z}$. It
can make anomalies deviate from normal data in the reduced dimensions.
* •
Minimize the prediction error by integrating non-linear predictor and linear
predictor. We split the set $\\{z_{1},z_{2},...,z_{h}\\}$ obtained by
characterization network into the current value $z_{h}$ and the past values
$[z_{1},z_{2},...,z_{h-1}]$. And then the predicted values $Y_{h}$ and
$\hat{z}_{h}$ are obtained by minimizing prediction errors. The purpose is to
accurately express the information of the next temporal slice using different
predictor, thus updating low-dimensional feature and reconstruction error.
* •
$\lambda_{1}$, $\lambda_{2}$ and $\lambda_{3}$ are the meta parameters in
CAE-M. In practice, $\lambda_{1}=e-04$, $\lambda_{2}=0.5$, and
$\lambda_{3}=0.5$ usually achieve desirable results. Here MMD is complemented
as a regularization term. The parameter selection is performed in Section
4.8.1.
TABLE I: The detailed statistics of three datasets Dataset | Domain | Instances | Dimensions | Classes | Permissions
---|---|---|---|---|---
PAMAP2 [61] | Activity Recognition | 1,140,000 | 27 | 18 | Public
CAP [62] | Sleep Stage Detection | 921,700,000 | 21 | 8 | Public
Mental Fatigue Dataset [2] | Fatigue Detection | 1,458,648 | 4 | 2 | Private
### 3.6 Inference
Given samples as training dataset
${X=\\{x_{1},x_{2},...,x_{D}\\}},x_{i}\in\mathbb{R}^{N\times T}$, we are able
to compute the corresponding decision threshold ($\operatorname{THR}$):
$\operatorname{THR}=\frac{1}{D}\sum_{i=1}^{D}\operatorname{Err}(x_{i})+\sqrt{\frac{1}{D}\sum_{i=1}^{D}{(\operatorname{Err}(x_{i})-\mu)^{2}}},$
(21)
where we denote $\mathrm{Err}(x_{i})$ as the sum of loss function for $x_{i}$,
and $\mu$ is the average value of $\mathrm{Err}(x_{i})$ for $i=1,...,D$. The
setting is similar to the normal training distribution
$\mathcal{N}(\mu,\sigma)$ following with 1 standard deviation $\sigma$ of the
mean $\mu$.
In inference process, the decision rule is that if
$\mathrm{Err}(x_{i})>\mathrm{THR}$, the testing sample in a sequence can be
predicted to be “abnormal”, otherwise “normal”.
Algorithm 1 Training and Inference procedure of CAE-M
Training process
0: Normal Dataset $X=\\{x_{1},x_{2},...,x_{D}\\}$, time steps $h$, batch size
$M$ and hyperparameters $\lambda_{1},\lambda_{2},\lambda_{3}$.
0: Anomaly decision threshold THR and model parameter $w$.
1: Transform each sample $x\in\mathbb{R}^{N\times T}$ into
$x\in\mathbb{R}^{h\times N\times t}$ in the time axis;
2: Randomly initialize parameter $w$;
3: while not converge do
4: Calculate low-dimensional representation $z_{f}$ and reconstruction error
$z_{r}$ at each time step; // Eq. (1) (3)
5: Calculate MMD between $z_{a}$ and Gaussian distribution $P_{z}$; // Eq. (5)
6: Combine $z_{f}$ and $z_{r}$ into $z_{h}=[z_{f},z_{r}]_{h}$ for each sample;
// Eq. (6)
7: Predict the current value $z_{h}$ for the past values
$[z_{1},z_{2},...,z_{h-1}]$ by Attention-based BiLSTM and AR model; // Eq.
(7-18)
8: Update $w$ by minimizing the compound objective function; // Eq. (20)
9: end while
10: Calculate the decision threshold THR by the training samples; // Eq.(21)
11: return Optimal $w$ and THR.
Inference process
0: Normal and Anomalous dataset $X=\\{x_{1},x_{2},...,$ $x_{D}\\}$, threshold
THR, model parameter $w$, hyperparameters $\lambda_{1}$, $\lambda_{2}$ and
$\lambda_{3}$.
0: Label of all $x_{i}$.
1: for all $x_{i}$ do
2: Calculate the loss $Err(x_{i})=f(x_{i};w)$; //$f(\cdot)$ denotes CAE-M
3: if $Err(x_{i})>$ THR then
4: $x_{i}$ = “anomaly”;
5: else
6: $x_{i}$ = “normal”;
7: end if
8: end for
9: return Label of all $x_{i}$.
The complete training and inference procedure of CAE-M is shown in Algorithm
1.
## 4 Experiments
In this section, we conduct extensive experiments to evaluate the performance
of our proposed CAE-M approach for anomaly detection on several real-world
datasets.
### 4.1 Datasets
We adopt two large publicly-available datasets and a private dataset: PAMAP2,
CAP and Mental fatigue dataset. These datasets are exploiting multi-sensor
time series for activity recognition, sleep state detection, and mental
fatigue detection, respectively. Therefore, they are ideal testbeds for
evaluating anomaly detection algorithms.
PAMAP2 [61] dataset is a mobile dataset with respect to actions or activities
from UCI repository, containing data of 18 different physical activities
performed by 9 subjects wearing 3 inertial measurement units, e.g.
accelerator, gyroscope and magnetometer. There are 18 activity categories in
total. For experiments, we treat these classes with relatively smaller samples
as the anomaly classes (including running, ascending stairs, descending stairs
and rope jumping), while the rest categories are combined to form the normal
classes.
CAP Sleep Database [62], which stands for the Cyclic Alternating Pattern (CAP)
database, is a clinical dataset from PhysioNet repository. It is characterized
by periodic physiological signals occurring during wake, S1-S4 sleep stages
and REM sleep. The waveforms include at least 3 EEG channels, 2 EOG channels,
EMG signal, respiration signal and EKG signal. There are 16 healthy subjects
and 92 patients in the database. The pathological recordings include the
patients diagnosed with bruxism, insomnia, narcolepsy, nocturnal frontal lobe
epilepsy, periodic leg movements, REM behavior disorder and sleep-disordered
breathing. In this task, we extracted 7 valid channels of all the channels
like ROC-LOC, C4-P4, C4-A1, F4-C4, P4-O2, ECG1-ECG2, EMG1-EMG2 etc. For
detecting sleep apnea events, we chose healthy subjects as normal class and
the patients with sleep-disordered breathing as anomaly class.
Mental Fatigue Dataset [2] is a real world health-care dataset. Aiming to
detect mental fatigue in the healthy group, we collected the physiological
signals (e.g., GSR, HR, R-R intervals and skin temperature) using wearable
device. There are 6 healthy young subjects participated in the mental fatigue
experiments. In this task, non-fatigue data samples are labeled as normal
class and fatigue data samples are labeled as anomaly class. Fatigue data
accounts for a fifth of the total.
The detailed information of the datasets is shown in TABLE I.
### 4.2 Baseline Methods
In order to extensively evaluate the performance of the proposed CAE-M
approach, we compare it with several traditional and deep anomaly detection
methods:
(1) KPCA (Kernel principal component analysis) [28], which is a non-linear
extension of PCA commonly used for anomaly detection. (2) ABOD (Angle-based
outlier detection) [63], which is a probabilistic model that well suited for
high dimensional data. (3) OCSVM (One-class support vector machine) [64],
which is the one-class learning method that classifies new data as similar or
different to the training set. (4) HMM (Hidden Markov Model) [65] is a finite
set of states, each of which is associated with a probability distribution. In
a particular state an observation can be generated, according to the
associated probability distribution. (5) CNN-LSTM [66], which is a forecasting
model composed of convolutional and LSTM networks. It can obtain the forecast
by estimating the current data, and detect anomalies on comparing the
forecasting value with actuals. (6) LSTM-AE (LSTM based autoencoder) [36],
which is an unsupervised detection technique used in time series that can
induce a representation by learning an approximation of the identity function
of data. (7) ConvLSTM-COMPOSITE [48], which utilizes a composite structure
that is able to encoder the input, reconstruct it, and predict its near
future. To simplify the name, “ConvLSTM-COMP” denotes ConvLSTM-COMPOSITE. We
choose the “conditional” version to build a single model called ConvLSTM-AE by
removing the forecasting decoder. (8) UODA (Unsupervised sequential outlier
detection with deep architecture) [67], which utilizes autoencoders to capture
the intrinsic difference between normal and abnormal samples, and then
integrates the model to RNNs that perform fine-tuning to update the parameters
in DAE. (9) MSCRED (Multi-scale convolutional recurrent encoder-decoder) [15],
which is a reconstruction-based anomaly detection and diagnosis method.
TABLE II: The mean precision, recall and F1 score of baselines and our proposed method, * p-value = 0.0077. Method | PAMAP2 | CAP dataset | Fatigue dataset
---|---|---|---
mPre | mRec | mF1 | mPre | mRec | mF1 | mPre | mRec | mF1
KPCA | 0.7236 | 0.6579 | 0.6892 | 0.7603 | 0.5847 | 0.6611 | 0.5341 | 0.5014 | 0.5173
ABOD | 0.8653 | 0.9022 | 0.8834 | 0.7867 | 0.6365 | 0.7037 | 0.6679 | 0.6145 | 0.6401
OCSVM | 0.7600 | 0.7204 | 0.7397 | 0.9267 | 0.9259 | 0.9263 | 0.5605 | 0.5710 | 0.5290
HMM | 0.6950 | 0.6553 | 0.6745 | 0.8238 | 0.8078 | 0.8157 | 0.6066 | 0.6076 | 0.6071
CNN-LSTM | 0.6680 | 0.5392 | 0.5968 | 0.6159 | 0.5217 | 0.5649 | 0.5780 | 0.5042 | 0.5386
LSTM-AE | 0.8619 | 0.7997 | 0.8296 | 0.7147 | 0.6253 | 0.6671 | 0.7140 | 0.6820 | 0.6870
UODA | 0.8957 | 0.8513 | 0.8730 | 0.7557 | 0.5124 | 0.6107 | 0.8280 | 0.7770 | 0.8017
MSCRED | 0.6997 | 0.7301 | 0.7146 | 0.6410 | 0.5784 | 0.6081 | 0.8016 | 0.6802 | 0.7359
ConvLSTM-AE | 0.7359 | 0.7361 | 0.7360 | 0.8150 | 0.8194 | 0.8172 | 0.9010 | 0.9346 | 0.9175
ConvLSTM-COMP | 0.8844 | 0.8842 | 0.8843 | 0.8367 | 0.8377 | 0.8372 | 0.9373 | 0.9316 | 0.9344
CAE-M (Ours) | 0.9608 | 0.9670 | 0.9639 | 0.9939 | 0.9952 | 0.9961 | 0.9962 | 0.9959 | 0.9960
Improvement | 7.64% | 6.48% | 7.96% | 6.72% | 6.93% | 6.98% | 5.89% | 6.13% | 6.16%
### 4.3 Implementation details
For traditional anomaly detection, we scale the sequential data into segments
and extract the features from each segment. In PAMAP2 dataset, multiple
sensors are worn on three different position (wrist, chest, ankle). Hence, we
extract 324 features including time and frequency domain features. In CAP
Sleep dataset, we first pass through the Hanning window low pass filter for
removing the high frequency components of signals. And then we extract 91
features for EEG, EMG and ECG signals [68, 69, 70]; In Mental Fatigue dataset,
we preprocess physiological signals by interpolation and filtering algorithm.
Then we extract 23 features for Galvanic Skin Response (GSR), Heart Rate (HR),
R-R intervals and skin temperature sensors [2].
For Deep Anomaly Detection (DAD) method, we filter multi-sensor signals and
then pack these signals into matrix as input to construct the deep model.
We reimplement these methods based on open-source
repositories111https://pyod.readthedocs.io/en/stable/,
https://github.com/7fantasysz/MSCRED or our own implementations. For KPCA, we
employ Gaussian kernel with a bandwidth of 600, 500, 0.5, respectively for
PAMAP2, CAP, and Mental Fatigue datasets. For ABOD, we use $k$ nearest
neighbors to approximate the complexity reduction. For an observation, the
variance of its weighted cosine scores to all neighbors could be viewed as the
abnormal score. For OCSVM, we adopt PCA for OCSVM as a dimension reduction
tool and employ the Gaussian kernel with a bandwidth of 0.1. For HMM, we build
a Markov model after extracting features and calculate the anomaly probability
from the state sequence generated by the model. For CNN-LSTM, we define a CNN-
LSTM model in Keras by first defining 2D convolutional network as comprised of
Conv2D and MaxPooling2D layers ordered into a stack of the required depth,
wrapping them in a TimeDistributed layer and then defining the LSTM and output
layers. For LSTM-AE, we use single-layer LSTM on both encoder and decoder in
the task. For ConvLSTM-COMPOSITE, we choose ”conditional” version and adapt
this technique to anomaly detection in multivariate time series. Here we also
build a single model called ConvLSTM-AE by removing forecasting decoder. For
UODA, we reimplement this algorithm by customizing the number of layers and
hyper-parameters. For MSCRED, we first construct multi-scale matrices for
multi-sensor data, and then fed it into MSCRED model and evaluate the
performance.
For our own CAE-M, we use library Hyperopt [71] to select the best hyper-
parameters (i.e., time window, the number of neurons, learning rate,
activation function, optimization criteria and iterations). The
characterization network runs with $Conv2D$ $\rightarrow$ $Maxpooling$
$\rightarrow$ $Conv2D$ $\rightarrow$ $Maxpooling$ $\rightarrow$
$Conv2DTranspose$ $\rightarrow$ $Conv2DTranspose$ $\rightarrow$
$Conv2DTranspose$, i.e., Conv1-Conv5 with 32 kernels of size 4 $\times$ 4, 64
kernels of size 4 $\times$ 4, 64 kernels of size 4 $\times$ 4, 32 kernels of
size 4 $\times$ 4, 1 kernels of size 4 $\times$ 4, and Maxpooling with size 2
$\times$ 2\. We use Rectified Linear Unit (ReLU) as the activation function of
convolutional layers. The memory network contains non-linear prediction and
linear prediction, where the non-linear network runs with $BiLSTM(512)$
$\rightarrow$ $Attention(h-1)$ $\rightarrow$ $Dropout(0.2)$ $\rightarrow$
$FC(1000,linear)$, and the linear network runs with $FC(1000,linear)$. The
CAE-M model is trained in an end-to-end fashion using Keras [72]. The
optimization algorithm is Adam and the batch size is set as 32. And we set
parameters of compound objective function $\lambda_{1}=e-04$,
$\lambda_{2}=0.5$ and $\lambda_{3}=0.5$. The time step $h$ usually gives
desirable results as $h=5$ or $h=10$.
Note that in addition to the complete CAE-M approach, we further evaluate its
several variants as baselines to justify the effectiveness of each component:
* •
CAE-Mw/oPre. The CAE-M model removes the linear and non-linear prediction.
That is, this variant only adopts the characterization network with
reconstruction loss and MMD loss. (i.e.,
$\lambda_{1}=e-04,\lambda_{2}=0,\lambda_{3}=0$)
* •
CAE-Mw/oRec+MMD. The CAE-M model removes the reconstruction error and MMD.
Different from CNN-LSTM model, the characterization network is still performed
as the deep convolutional autoencoder. We put the latent representation
without reconstruction error into the memory network. (i.e.,
$\lambda_{1}=0,\lambda_{2}=0.5,\lambda_{3}=0.5$)
* •
CAE-Mw/oATTENTION. The CAE-M model without Attention component is implemented.
(i.e., $\lambda_{1}=e-04,\lambda_{2}=0.5,\lambda_{3}=0.5$)
* •
CAE-Mw/oAR. The CAE-M model without AR component is implemented. (i.e.,
$\lambda_{1}=e-04,\lambda_{2}=0.5,\lambda_{3}=0$)
* •
CAE-Mw/oMMD. The CAE-M model without MMD component is implemented. (i.e.,
$\lambda_{1}=0,\lambda_{2}=0.5,\lambda_{3}=0.5$)
Note that anomaly detection problems are often with highly-imbalanced classes,
hence accuracy is not suitable as the evaluation metric. In order to
thoroughly evaluate the performance of our proposed method, we follow existing
works [23, 73, 15] to adopt the mean precision, recall, and F1 score as the
evaluation metrics. The mean precision means the average precision of normal
and abnormal class. The same pattern goes for mean recall, F1 score.
In the experiments, the train-validation-test sets are split by following
existing works [15, 67]. Concretely speaking, for each dataset, we split
normal samples into training, validation, and test with the ratio of $5:1:4$,
where the training and validation set only contain normal samples and have no
overlapping with testing set. The anomalous samples are only used in the
testing set. The model selection criterion, i.e., hyperparameters, used for
tuning is the validation error on the validation set.
TABLE III: Detection performance in different sleep stages of baselines and our proposed method, *p-value = 0.0074. Method | WAKE | S1 | S2 | S3 | S4 | REM
---|---|---|---|---|---|---
mPre | mRec | mF1 | mPre | mRec | mF1 | mPre | mRec | mF1 | mPre | mRec | mF1 | mPre | mRec | mF1 | mPre | mRec | mF1
KPCA | 0.9162 | 0.8213 | 0.8662 | 0.8267 | 0.7598 | 0.7918 | 0.9257 | 0.9353 | 0.9305 | 0.9039 | 0.8689 | 0.8861 | 0.9402 | 0.9604 | 0.9502 | 0.9536 | 0.9614 | 0.9575
ABOD | 0.9872 | 0.8686 | 0.9242 | 0.9347 | 0.5522 | 0.6942 | 0.9389 | 0.6550 | 0.7716 | 0.8489 | 0.6184 | 0.7155 | 0.6749 | 0.6448 | 0.6595 | 0.5915 | 0.5909 | 0.5912
OCSVM | 0.9784 | 0.9492 | 0.9636 | 0.9655 | 0.9504 | 0.9579 | 0.9395 | 0.9448 | 0.9421 | 0.9714 | 0.9499 | 0.9605 | 0.8701 | 0.9488 | 0.9077 | 0.9784 | 0.9492 | 0.9636
HMM | 0.8417 | 0.8406 | 0.8411 | 0.8790 | 0.8856 | 0.8823 | 0.8967 | 0.8887 | 0.8927 | 0.6880 | 0.6747 | 0.6813 | 0.7279 | 0.7286 | 0.7282 | 0.8024 | 0.8649 | 0.8325
LSTM-AE | 0.6990 | 0.7178 | 0.7082 | 0.6517 | 0.6492 | 0.6504 | 0.7430 | 0.7331 | 0.7380 | 0.7689 | 0.7828 | 0.7758 | 0.7274 | 0.7569 | 0.7418 | 0.6590 | 0.6887 | 0.6735
UODA | 0.6159 | 0.6326 | 0.6241 | 0.6762 | 0.6762 | 0.6762 | 0.7290 | 0.5223 | 0.6086 | 0.5716 | 0.5766 | 0.5741 | 0.6626 | 0.8498 | 0.6807 | 0.5626 | 0.6116 | 0.5861
ConvLSTM- COMP | 0.9889 | 0.9772 | 0.9830 | 0.9755 | 0.9850 | 0.9864 | 0.9250 | 0.9127 | 0.9188 | 0.9401 | 0.9041 | 0.9217 | 0.8647 | 0.8866 | 0.9023 | 0.9675 | 0.9949 | 0.9810
CAE-M | 0.9974 | 0.9949 | 0.9961 | 0.9958 | 0.9950 | ß0.9954 | 0.9950 | 0.9950 | 0.9950 | 0.9294 | 0.8842 | 0.9063 | 0.9842 | 0.9950 | 0.9895 | 0.9681 | 0.9950 | 0.9813
### 4.4 Results and Analysis
As shown in TABLE II, we compare our proposed method with traditional and deep
anomaly detection methods using the mean precision, recall and F1 score. We
can see that our method outperforms most of the existing methods, which
demonstrates the effectiveness of our method. From TABLE II, we can observe
the following results.
For the PAMAP2 dataset, the CAE-M achieves the highest precision and recall
compared by 10 popular methods. Traditional methods perform differently on
PAMAP2 dataset since they are limited by the feature extraction and feature
selection methods. In deep learning method, CNN-LSTM has a lowest F1 score.
This means that more constraints such as data preprocessing method and anomaly
evaluation strategy need to be added for prediction-based anomaly detection.
For LSTM-AE, MSCRED and ConvLSTM-AE, they both are reconstruction-based
anomaly detection methods. Their performance is limited by the “noisy data”
problem, resulting in reconstruction error for the abnormal input could be fit
so well. For UODA, it performs reasonably well on the PAMAP2 dataset, but it
is not end-to-end training, which is needed by pre-training denoising
autoencoder (DAEs) and deep recurrent networks (RNNs), and then fine-tuning
the UODA model composing of the DAE and RNN. For ConvLSTM-COMPOSITE model, it
performs better than other baseline models. The model consists of a single
encoder, two decoders of reconstruction branch and prediction branch. In fact,
since its efficiency is influenced by reconstruction error and prediction
error respectively, its performance could be limited by one of encoder-decoder
models.
For the CAP dataset, most of methods show a low F1 score. As CAP dataset
contains different sleep stages of subjects, some methods are limited by high
complexity of data. For OCSVM and HMM, they achieve better performance because
of dimensionality reduction from 36 dimensions of PAMAP2 dataset to 7
dimensions. For MSCRED, due to batch size =1 for the training model in the
open source code, the loss function couldn’t converge during training model
and the training speed is slow. Our proposed method achieves about 7%
improvement at F1 score, compared with the existing methods.
For Fatigue dataset, it is difficult to label fatigue and non-fatigue data
manually. Therefore, it may be a lot of noise or misclassification patterns in
the data, so that most of methods fail to solve this problem. For UODA, MSCRED
and ConvLSTM, they have ability to overcome noise and misclassification of
training data. Our proposed method also solves this problem successfully and
achieves at least 6% improvement at F1 score.
Besides, in order to indicate significant differences from our proposed method
and other baselines, we use Wilcoxon signed rank test[74] to analyze these
results in TABLE II. We compute average p-value of CAE-M compared with other
baselines. A p-value = 0.0077 indicates that the performance of our proposed
method differs from other methods. This p-value is also computed in TABLE III.
### 4.5 Fine-grained Analysis
In addition to the anomaly detection of different classes on each dataset, we
conduct a fine-grained analysis to evaluate the performance of each method
within each class. Considering intra-class diversity, we conduct a group of
experiments to detect anomalies in different sleep stages. In fact, these
physiological signals in different sleep stages have significant differences.
We choose 4 traditional methods and 3 deep methods with good performance in
global domain as comparison methods. As shown in TABLE III, we can observe
that our architecture is most robust across same experiment settings. Several
observations from these results are worth highlighting. For ABOD, the testing
performance is unstable in local domain, which the highest F1 score is 0.92 in
WAKE and the lowest F1 score is 0.59 in REM. For KPCA and ConvLSTM-COMPOSITE,
the testing performance in local domain far exceeds the performance in global
domain. This demonstrates that the two model can achieve better performance
when intra-class data have similar distribution or regular pattern. For other
methods, the testing performance is consistent in local and global domain. For
our proposed method, the best testing performance can be achieved no matter in
local domain or global domain. This study clearly justifies the superior
representational capacity of our architecture to solve intra-class diversity.
### 4.6 Effectiveness Evaluation
TABLE IV: The evaluation results on LOSO cross validation approach, including the best, the worst and the mean F1 score of 8 subjects. Method | Worst mF1 | Best mF1 | Mean mF1
---|---|---|---
ABOD | 0.6093 | 0.8507 | 0.7706
ConvLSTM-COMP | 0.7033 | 0.9224 | 0.8493
UODA | 0.5938 | 0.9336 | 0.7984
CAE-M | 0.8009 | 0.9433 | 0.8616
#### 4.6.1 Leave One Subject Out
In this section, we measure the generalization ability of models using Leave
One Subject Out (LOSO). The fact is that when training and testing datasets
contain the same subject, the model is likely to know more about the current
subject which may be biased towards a new one. Therefore, LOSO could help to
evaluate the generalization ability. We choose the PAMAP2 dataset to conduct
subject-independent experiments which contain 8 subjects. As can be seen in
Figure 2(a), we evaluate our proposed method and three methods with relatively
high F1 score. By examining the results, one can easily notice that deep
learning-based methods obtain better performance than traditional methods.
However, complex models such as deep neural networks are prone to overfitting
because of their flexibility in memorizing the idiosyncratic patterns in the
training set, instead of generalizing to unseen data.
(a) Leave One Subject Out Evaluation
(b) Ablation Study
Figure 2: Effectiveness evaluation using LOSO method and ablation study.
TABLE IV shows the best, the worst and average performance among 8 subjects.
We can observe that UODA and ConvLSTM-COMPOSITE model perform well in some
specific subjects, but they fail to reduce the effects of overfitting to each
test subject, even drop to 0.70 and 0.59 for some subjects. Compared to these
methods, CAE-M can generalize well on testing subjects it hasn’t appeared
before, which reach the average F1 score of 0.86. Besides, we perform an
analysis of variance on repeated measures within subject 1 (corresponding to
numbers in Figure 2(a)). As shown in TABLE V, we observe that CAE-M remains a
more stable performance on repeated measurements. In summary, the above
demonstrates that our model can be motivated to improve the generalization
ability.
TABLE V: The repeated measures analysis of variance on LOSO cross validation approach of one subject. Method | mPre | mRec | mF1
---|---|---|---
ABOD | 0.6240$\pm$0.000 | 0.5946$\pm$0.000 | 0.6090$\pm$0.000
ConvLSTM-COMP | 0.8953$\pm$0.029 | 0.8081$\pm$0.038 | 0.8488$\pm$0.019
UODA | 0.8155$\pm$0.063 | 0.7464$\pm$0.027 | 0.7782$\pm$0.031
CAE-M | 0.9437$\pm$0.024 | 0.8191$\pm$0.003 | 0.8770$\pm$0.012
#### 4.6.2 Ablation Study
TABLE VI: The mean precision, recall and F1 score from variants. ID | Method | PAMAP2 | CAP dataset | Fatigue dataset
---|---|---|---|---
mPre | mRec | mF1 | mPre | mRec | mF1 | mPre | mRec | mF1
1 | CAE-M${}_{\textit{w/o Pre}}$ | 0.8103 | 0.8023 | 0.8063 | 0.8299 | 0.8101 | 0.8199 | 0.6005 | 0.6096 | 0.6050
2 | CAE-M${}_{\textit{w/o Rec+MMD}}$ | 0.5693 | 0.5440 | 0.5563 | 0.8896 | 0.7784 | 0.8303 | 0.7050 | 0.6814 | 0.6930
3 | CAE-M${}_{\textit{w/o ATTENTION}}$ | 0.9151 | 0.9276 | 0.9213 | 0.9251 | 0.9291 | 0.9271 | 0.9605 | 0.9551 | 0.9578
4 | CAE-M${}_{\textit{w/o AR}}$ | 0.9060 | 0.8691 | 0.8872 | 0.9634 | 0.9381 | 0.9506 | 0.9046 | 0.9048 | 0.9047
5 | CAE-M${}_{\textit{w/o MMD}}$ | 0.9437 | 0.9550 | 0.9493 | 0.9293 | 0.9213 | 0.9253 | 0.9407 | 0.9288 | 0.9347
6 | CAE-M | 0.9608 | 0.9670 | 0.9639 | 0.9939 | 0.9952 | 0.9961 | 0.9962 | 0.9959 | 0.9960
The proposed CAE-M approach consists of several components such as CAE, MMD,
Attention mechanism, BiLSTM and Auto-regressive. To demonstrate the
effectiveness of each component, we conduct ablation studies in this section.
The ablation study is shown in Figure 2(b). These ID numbers represent CAE-M
without non-linear and linear prediction, CAE-M without reconstruction error
and MMD, CAE-M without attention module, CAE-M without AR, CAE-M without MMD
and CAE-M, respectively. The experimental results indicate that for the
removal of different component above, there is corresponding performance drop
at F1 score. We can observe that CAE-M model without prediction or
reconstruction error achieves a low F1 score relatively. This demonstrates
that our composite model is effective and necessary for anomaly detection in
multi-sensor time-series data. Compared to original CAE-M model, removing the
AR component (in CAE-M${}_{\textit{w/o AR}}$) from the full model causes
significant performance drops on most of the datasets. This shows the critical
role of the AR component in general. Moreover, attention and MMD components
can also cause big performance rises on all the datasets. More details are
shown in TABLE VI. Here, these ID numbers are corresponding to numbers in
Figure 2(b).
### 4.7 Robustness to Noisy Data
(a) mF1 (b) mPre (c) mRec
Figure 3: Robustness to noisy data.
In real-world applications, the collection of multi-sensor time-series data
can be easily polluted with noise due to changes in the environment or the
data collection devices. The noisy data bring critical challenges to the
unsupervised anomaly detection methods. In this section, we evaluate the
robustness of different methods to noisy data. We manually control the noisy
data ratio in the training data. We inject Gaussian noise ($\mu$=0,
$\sigma$=0.3) in a random selection of samples with a ratio varying between 1%
to 30%. We compare the performance of three methods on PAMAP2 dataset: UODA,
ConvLSTM-COMPOSITE, and CAE-M in Figure 3. These methods have good stability
in the above experiments. As the noise increases, the performance of all
methods decreases. For CAE-M, the F1 score, precision and recall have no
significant decline. Among them, our model remains significantly superior to
others, demonstrating its robustness to noisy data.
### 4.8 Further Analysis
#### 4.8.1 Parameter Sensitivity Analysis
In this section, we evaluate the parameter sensitivity of CAE-M model. It is
worth noting that CAE-M achieves the best performance by adjusting weight
coefficient of compound objective function. We apply control variate reduction
technique [75] to empirically evaluate the sensitivity of parameter
$\lambda_{1},\lambda_{2},\lambda_{3}$ with a wide range. The results are shown
in Figure 4. As the value of MMD loss is greater than others, we select its
weight coefficient within e-04 $\sim$ e-07 and other weight coefficients
within [0.1, 0.5, 1, 5, 10, 50]. We adjust one of $\lambda$ while fixing the
other respective $\lambda$ to keep the optimal value ($\lambda_{1}=e-04$,
$\lambda_{2}=0.5$, and $\lambda_{3}=0.5$). When weight coefficient is
increased, we observe that F1 score tends to decline. The optimal parameter is
$\lambda_{1}=e-04$, $\lambda_{2}=0.5$, and $\lambda_{3}=0.5$. It can be seen
that the performance of CAE-M stays robust within a wide range of parameter
choice.
(a) MMD loss (b) Bi-LSTM loss (c) Autoregressive loss
Figure 4: Parameter sensitivity analysis of the proposed CAE-M approach.
(a) PAMAP2 dataset (b) CAP dataset (c) Fatigue dataset
Figure 5: Convergence analysis of the proposed CAE-M approach on different
datasets.
#### 4.8.2 Convergence Analysis
Since CAE-M involves several components, it is natural to ask whether and how
quickly it can converge. In this section, we analyze the convergence to answer
this question. We extensively show the results of each component on three
datasets in Figure 5. These results demonstrate that even if the proposed
CAE-M approach involves several components, it could reach a steady
performance within fewer than 40 iterations. Therefore, in real applications,
CAE-M can be applied more easily with a fast and steady convergence
performance.
## 5 Conclusion and Future Work
In this paper, we introduced a Deep Convolutional Autoencoding Memory network
named CAE-M to detect anomalies. The CAE-M model uses a composite framework to
model generalized pattern of normal data by capturing spatial-temporal
correlation in multi-sensor time-series data. We first build Deep
Convolutional Autoencoder with a Maximum Mean Discrepancy (MMD) penalty to
characterize multi-sensor time-series signals and reduce the risk of
overfitting caused by noise and anomalies in training data. To better
represent temporal dependency of sequential data, we use non-linear
Bidirectional LSTM with Attention and linear Auto-regressive model for
prediction. Extensive empirical studies on HAR and HC datasets demonstrate
that CAE-M performs better than other baseline methods.
In the future work, we will focus on the point-based fine-grained anomaly
detection approach and further improve our method for multi-sensor data by
designing proper sparse operations.
## Acknowledgment
This work was supported by Key-Area Research and Development Program of
Guangdong Province (No.2019B010109001), Science and Technology Service Network
Initiative, Chinese Academy of Sciences (No. KFJ-STS-QYZD-2021-11-001), and
Natural Science Foundation of China (No.61972383, No.61902377, No.61902379).
## References
* [1] R. Chalapathy and S. Chawla, “Deep learning for anomaly detection: A survey,” _arXiv preprint arXiv:1901.03407_ , 2019.
* [2] Y. Zhang, Y. Chen, and Z. Pan, “A deep temporal model for mental fatigue detection,” in _2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)_. IEEE, 2018, pp. 1879–1884.
* [3] J. E. Ball, D. T. Anderson, and C. S. Chan, “Comprehensive survey of deep learning in remote sensing: theories, tools, and challenges for the community,” _Journal of Applied Remote Sensing_ , vol. 11, no. 4, p. 042609, 2017.
* [4] B. Kiran, D. Thomas, and R. Parakkal, “An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos,” _Journal of Imaging_ , vol. 4, no. 2, p. 36, 2018.
* [5] A. Ramchandran and A. K. Sangaiah, “Unsupervised anomaly detection for high dimensional data—an exploratory analysis,” in _Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications_. Elsevier, 2018, pp. 233–251.
* [6] G. Pang, C. Shen, L. Cao, and A. V. D. Hengel, “Deep learning for anomaly detection: A review,” _ACM Computing Surveys (CSUR)_ , vol. 54, no. 2, pp. 1–38, 2021.
* [7] L. Ruff, J. R. Kauffmann, R. A. Vandermeulen, G. Montavon, W. Samek, M. Kloft, T. G. Dietterich, and K. Müller, “A unifying review of deep and shallow anomaly detection,” 2020.
* [8] Y. Zhang, Y. Chen, and C. Gao, “Deep unsupervised multi-modal fusion network for detecting driver distraction,” _Neurocomputing_ , vol. 421, pp. 26–38, 2021.
* [9] Y. Chen, J. Wang, M. Huang, and H. Yu, “Cross-position activity recognition with stratified transfer learning,” _Pervasive and Mobile Computing_ , vol. 57, pp. 1–13, 2019.
* [10] Y. Chen, X. Qin, J. Wang, C. Yu, and W. Gao, “Fedhealth: A federated transfer learning framework for wearable healthcare,” _IEEE Intelligent Systems_ , vol. 35, no. 4, pp. 83–93, 2020.
* [11] J. Wang, V. W. Zheng, Y. Chen, and M. Huang, “Deep transfer learning for cross-domain activity recognition,” in _proceedings of the 3rd International Conference on Crowd Science and Engineering_ , 2018, pp. 1–8.
* [12] J. Wang, Y. Chen, S. Hao, X. Peng, and L. Hu, “Deep learning for sensor-based activity recognition: A survey,” _Pattern Recognition Letters_ , vol. 119, pp. 3–11, 2019.
* [13] J. Wang, Y. Chen, L. Hu, X. Peng, and S. Y. Philip, “Stratified transfer learning for cross-domain activity recognition,” in _2018 IEEE International Conference on Pervasive Computing and Communications (PerCom)_. IEEE, 2018, pp. 1–10.
* [14] D. Li, D. Chen, B. Jin, L. Shi, J. Goh, and S.-K. Ng, “Mad-gan: Multivariate anomaly detection for time series data with generative adversarial networks,” in _International Conference on Artificial Neural Networks_. Springer, 2019, pp. 703–716.
* [15] C. Zhang, D. Song, Y. Chen, X. Feng, C. Lumezanu, W. Cheng, J. Ni, B. Zong, H. Chen, and N. V. Chawla, “A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data,” in _Proceedings of the AAAI Conference on Artificial Intelligence_ , vol. 33, 2019, pp. 1409–1416.
* [16] V. Patraucean, A. Handa, and R. Cipolla, “Spatio-temporal video autoencoder with differentiable memory,” _arXiv preprint arXiv:1511.06309_ , 2015.
* [17] R. Paffenroth, P. Du Toit, R. Nong, L. Scharf, A. P. Jayasumana, and V. Bandara, “Space-time signal processing for distributed pattern detection in sensor networks,” _IEEE Journal of Selected Topics in Signal Processing_ , vol. 7, no. 1, pp. 38–49, 2013.
* [18] L. J. Latecki, A. Lazarevic, and D. Pokrajac, “Outlier detection with kernel density functions,” in _International Workshop on Machine Learning and Data Mining in Pattern Recognition_. Springer, 2007, pp. 61–75.
* [19] B. Schölkopf, J. C. Platt, J. Shawe-Taylor, A. J. Smola, and R. C. Williamson, “Estimating the support of a high-dimensional distribution,” _Neural computation_ , vol. 13, no. 7, pp. 1443–1471, 2001.
* [20] M. Sakurada and T. Yairi, “Anomaly detection using autoencoders with nonlinear dimensionality reduction,” in _Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis_. ACM, 2014, p. 4.
* [21] M. Hasan, J. Choi, J. Neumann, A. K. Roy-Chowdhury, and L. S. Davis, “Learning temporal regularity in video sequences,” in _Proceedings of the IEEE conference on computer vision and pattern recognition_ , 2016, pp. 733–742.
* [22] P. Vincent, H. Larochelle, Y. Bengio, and P.-A. Manzagol, “Extracting and composing robust features with denoising autoencoders,” in _Proceedings of the 25th international conference on Machine learning_. ACM, 2008, pp. 1096–1103.
* [23] B. Zong, Q. Song, M. R. Min, W. Cheng, C. Lumezanu, D. Cho, and H. Chen, “Deep autoencoding gaussian mixture model for unsupervised anomaly detection,” 2018\.
* [24] D. Gong, L. Liu, V. Le, B. Saha, M. R. Mansour, S. Venkatesh, and A. v. d. Hengel, “Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection,” _arXiv preprint arXiv:1904.02639_ , 2019.
* [25] D. Li, D. Chen, J. Goh, and S.-k. Ng, “Anomaly detection with generative adversarial networks for multivariate time series,” _arXiv preprint arXiv:1809.04758_ , 2018.
* [26] R. Aliakbarisani, A. Ghasemi, and S. F. Wu, “A data-driven metric learning-based scheme for unsupervised network anomaly detection,” _Computers & Electrical Engineering_, vol. 73, pp. 71–83, 2019.
* [27] B. Schölkopf, A. Smola, and K.-R. Müller, “Nonlinear component analysis as a kernel eigenvalue problem,” _Neural computation_ , vol. 10, no. 5, pp. 1299–1319, 1998.
* [28] H. Hoffmann, “Kernel pca for novelty detection,” _Pattern recognition_ , vol. 40, no. 3, pp. 863–874, 2007.
* [29] R. Paffenroth, K. Kay, and L. Servi, “Robust pca for anomaly detection in cyber networks,” _arXiv preprint arXiv:1801.01571_ , 2018.
* [30] R. Laxhammar, G. Falkman, and E. Sviestins, “Anomaly detection in sea traffic-a comparison of the gaussian mixture model and the kernel density estimator,” in _2009 12th International Conference on Information Fusion_. IEEE, 2009, pp. 756–763.
* [31] J. Kim and C. D. Scott, “Robust kernel density estimation,” _Journal of Machine Learning Research_ , vol. 13, no. Sep, pp. 2529–2565, 2012.
* [32] D. M. Tax and R. P. Duin, “Support vector data description,” _Machine learning_ , vol. 54, no. 1, pp. 45–66, 2004.
* [33] N. Günnemann, S. Günnemann, and C. Faloutsos, “Robust multivariate autoregression for anomaly detection in dynamic product ratings,” in _Proceedings of the 23rd international conference on World wide web_. ACM, 2014, pp. 361–372.
* [34] J. D. Hamilton, _Time series analysis_. Princeton university press Princeton, NJ, 1994, vol. 2.
* [35] H. Z. Moayedi and M. Masnadi-Shirazi, “Arima model for network traffic prediction and anomaly detection,” in _2008 International Symposium on Information Technology_ , vol. 4. IEEE, 2008, pp. 1–6.
* [36] P. Malhotra, A. Ramakrishnan, G. Anand, L. Vig, P. Agarwal, and G. Shroff, “Lstm-based encoder-decoder for multi-sensor anomaly detection,” _arXiv preprint arXiv:1607.00148_ , 2016.
* [37] W. Luo, W. Liu, and S. Gao, “Remembering history with convolutional lstm for anomaly detection,” in _2017 IEEE International Conference on Multimedia and Expo (ICME)_. IEEE, 2017, pp. 439–444.
* [38] J. An and S. Cho, “Variational autoencoder based anomaly detection using reconstruction probability,” _Special Lecture on IE_ , vol. 2, no. 1, 2015\.
* [39] D. Wulsin, J. Blanco, R. Mani, and B. Litt, “Semi-supervised anomaly detection for eeg waveforms using deep belief nets,” in _2010 Ninth International Conference on Machine Learning and Applications_. IEEE, 2010, pp. 436–441.
* [40] C. Zhou and R. C. Paffenroth, “Anomaly detection with robust deep autoencoders,” in _Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining_. ACM, 2017, pp. 665–674.
* [41] P. Filonov, F. Kitashov, and A. Lavrentyev, “Rnn-based early cyber-attack detection for the tennessee eastman process,” _arXiv preprint arXiv:1709.02232_ , 2017.
* [42] T. Ergen, A. H. Mirza, and S. S. Kozat, “Unsupervised and semi-supervised anomaly detection with lstm neural networks,” _arXiv preprint arXiv:1710.09207_ , 2017.
* [43] D. Shalyga, P. Filonov, and A. Lavrentyev, “Anomaly detection for water treatment system based on neural network with automatic architecture optimization,” _arXiv preprint arXiv:1807.07282_ , 2018.
* [44] M. Kravchik and A. Shabtai, “Detecting cyber attacks in industrial control systems using convolutional neural networks,” in _Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy_. ACM, 2018, pp. 72–83.
* [45] G. Lai, W.-C. Chang, Y. Yang, and H. Liu, “Modeling long-and short-term temporal patterns with deep neural networks,” in _The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval_. ACM, 2018, pp. 95–104.
* [46] W. Liu, W. Luo, D. Lian, and S. Gao, “Future frame prediction for anomaly detection–a new baseline,” in _Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition_ , 2018, pp. 6536–6545.
* [47] N. Srivastava, E. Mansimov, and R. Salakhudinov, “Unsupervised learning of video representations using lstms,” in _International conference on machine learning_ , 2015, pp. 843–852.
* [48] J. R. Medel and A. Savakis, “Anomaly detection in video using predictive convolutional long short-term memory networks,” _arXiv preprint arXiv:1612.00390_ , 2016.
* [49] Y. Zhao, B. Deng, C. Shen, Y. Liu, H. Lu, and X.-S. Hua, “Spatio-temporal autoencoder for video anomaly detection,” in _Proceedings of the 25th ACM international conference on Multimedia_. ACM, 2017, pp. 1933–1941.
* [50] Q. Zhang, J. Wu, P. Zhang, G. Long, and C. Zhang, “Salient subsequence learning for time series clustering,” _IEEE transactions on pattern analysis and machine intelligence_ , vol. 41, no. 9, pp. 2193–2207, 2018.
* [51] H. I. Fawaz, B. Lucas, G. Forestier, C. Pelletier, D. F. Schmidt, J. Weber, G. I. Webb, L. Idoumghar, P.-A. Muller, and F. Petitjean, “Inceptiontime: Finding alexnet for time series classification,” _Data Mining and Knowledge Discovery_ , vol. 34, no. 6, pp. 1936–1962, 2020.
* [52] W. Tang, G. Long, L. Liu, T. Zhou, J. Jiang, and M. Blumenstein, “Rethinking 1d-cnn for time series classification: A stronger baseline,” _arXiv preprint arXiv:2002.10061_ , 2020.
* [53] Z. Wu, S. Pan, G. Long, J. Jiang, X. Chang, and C. Zhang, “Connecting the dots: Multivariate time series forecasting with graph neural networks,” in _Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining_, 2020, pp. 753–763.
* [54] B. Jun, “Fault detection using dynamic time warping (dtw) algorithm and discriminant analysis for swine wastewater treatment,” _Journal of hazardous materials_ , vol. 185, no. 1, pp. 262–268, 2011.
* [55] W. Chen, S. Wang, G. Long, L. Yao, Q. Z. Sheng, and X. Li, “Dynamic illness severity prediction via multi-task rnns for intensive care unit,” in _2018 IEEE International Conference on Data Mining (ICDM)_. IEEE, 2018, pp. 917–922.
* [56] X. Zhang, L. Yao, C. Huang, S. Wang, M. Tan, G. Long, and C. Wang, “Multi-modality sensor data classification with selective attention,” _arXiv preprint arXiv:1804.05493_ , 2018.
* [57] A. Smola, A. Gretton, L. Song, and B. Schölkopf, “A hilbert space embedding for distributions,” in _International Conference on Algorithmic Learning Theory_. Springer, 2007, pp. 13–31.
* [58] K. Greff, R. K. Srivastava, J. Koutník, B. R. Steunebrink, and J. Schmidhuber, “Lstm: A search space odyssey,” _IEEE transactions on neural networks and learning systems_ , vol. 28, no. 10, pp. 2222–2232, 2017.
* [59] J. Chung, C. Gulcehre, K. Cho, and Y. Bengio, “Empirical evaluation of gated recurrent neural networks on sequence modeling,” _arXiv preprint arXiv:1412.3555_ , 2014.
* [60] G. Liu and J. Guo, “Bidirectional lstm with attention mechanism and convolutional layer for text classification,” _Neurocomputing_ , vol. 337, pp. 325–338, 2019.
* [61] A. Reiss and D. Stricker, “Introducing a new benchmarked dataset for activity monitoring,” in _2012 16th International Symposium on Wearable Computers_. IEEE, 2012, pp. 108–109.
* [62] M. G. Terzano, L. Parrino, A. Smerieri, R. Chervin, S. Chokroverty, C. Guilleminault, M. Hirshkowitz, M. Mahowald, H. Moldofsky, A. Rosa _et al._ , “Atlas, rules, and recording techniques for the scoring of cyclic alternating pattern (cap) in human sleep,” _Sleep medicine_ , vol. 3, no. 2, pp. 187–199, 2002.
* [63] H.-P. Kriegel, M. Schubert, and A. Zimek, “Angle-based outlier detection in high-dimensional data,” in _Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining_. ACM, 2008, pp. 444–452.
* [64] J. Ma and S. Perkins, “Time-series novelty detection using one-class support vector machines,” in _Proceedings of the International Joint Conference on Neural Networks, 2003._ , vol. 3. IEEE, 2003, pp. 1741–1745.
* [65] S. S. Joshi and V. V. Phoha, “Investigating hidden markov models capabilities in anomaly detection,” in _Proceedings of the 43rd annual Southeast regional conference-Volume 1_. ACM, 2005, pp. 98–103.
* [66] J. Donahue, L. Anne Hendricks, S. Guadarrama, M. Rohrbach, S. Venugopalan, K. Saenko, and T. Darrell, “Long-term recurrent convolutional networks for visual recognition and description,” in _Proceedings of the IEEE conference on computer vision and pattern recognition_ , 2015, pp. 2625–2634.
* [67] W. Lu, Y. Cheng, C. Xiao, S. Chang, S. Huang, B. Liang, and T. Huang, “Unsupervised sequential outlier detection with deep architectures,” _IEEE transactions on image processing_ , vol. 26, no. 9, pp. 4321–4330, 2017\.
* [68] D. P. Subha, P. K. Joseph, R. Acharya, and C. M. Lim, “Eeg signal analysis: a survey,” _Journal of medical systems_ , vol. 34, no. 2, pp. 195–212, 2010\.
* [69] A. Phinyomark, C. Limsakul, and P. Phukpattaranont, “A novel feature extraction for robust emg pattern recognition,” _arXiv preprint arXiv:0912.3973_ , 2009.
* [70] M. K. Gautama and V. K. Giri, “An overview of feature extraction techniques of ecg,” _American-Eurasian Journal of Scientific Research_ , vol. 12, no. 1, pp. 54–60, 2017.
* [71] J. Bergstra, D. Yamins, and D. D. Cox, “Hyperopt: A python library for optimizing the hyperparameters of machine learning algorithms,” in _Proceedings of the 12th Python in science conference_. Citeseer, 2013, pp. 13–20.
* [72] N. Ketkar, “Introduction to keras,” in _Deep learning with Python_. Springer, 2017, pp. 97–111.
* [73] Y. Guo, W. Liao, Q. Wang, L. Yu, T. Ji, and P. Li, “Multidimensional time series anomaly detection: A gru-based gaussian mixture variational autoencoder approach,” in _Asian Conference on Machine Learning_ , 2018, pp. 97–112.
* [74] D. Rey and M. Neuhäuser, “Wilcoxon-signed-rank test,” _Springer Berlin Heidelberg_.
* [75] S. Kucherenko, B. Delpuech, B. Iooss, and S. Tarantola, “Application of the control variate technique to estimation of total sensitivity indices,” _Reliability Engineering & System Safety_, vol. 134, pp. 251–259, 2015\.
| arxiv-papers | 2021-07-27T06:48:20 | 2024-09-04T03:07:20.745130 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Yuxin Zhang, Yiqiang Chen, Jindong Wang, Zhiwen Pan",
"submitter": "Jindong Wang",
"url": "https://arxiv.org/abs/2107.12626"
} |
2107.12628 | # Energy-Based Open-World Uncertainty Modeling
for Confidence Calibration
Yezhen Wang1 Bo Li111footnotemark: 1 Tong Che211footnotemark: 1 Kaiyang Zhou3
Ziwei Liu3 Dongsheng Li1
1Microsoft Research Asia 2MILA 3S-Lab, Nanyang Technological University Equal
contribution. Ordered by dice rolling. Correspondence to
[email protected].
###### Abstract
Confidence calibration is of great importance to the reliability of decisions
made by machine learning systems. However, discriminative classifiers based on
deep neural networks are often criticized for producing overconfident
predictions that fail to reflect the true correctness likelihood of
classification accuracy. We argue that such an inability to model uncertainty
is mainly caused by the closed-world nature in softmax: a model trained by the
cross-entropy loss will be forced to classify input into one of $K$ pre-
defined categories with high probability. To address this problem, we for the
first time propose a novel $K$+1-way softmax formulation, which incorporates
the modeling of open-world uncertainty as the extra dimension. To unify the
learning of the original $K$-way classification task and the extra dimension
that models uncertainty, we 1) propose a novel energy-based objective
function, and moreover, 2) theoretically prove that optimizing such an
objective essentially forces the extra dimension to capture the marginal data
distribution. Extensive experiments show that our approach, Energy-based Open-
World Softmax (EOW-Softmax), is superior to existing state-of-the-art methods
in improving confidence calibration.
## 1 Introduction
Given the considerable success achieved so far by deep neural networks (DNNs),
one might be wondering if DNN-based systems can be readily deployed to solve
real-world problems. On the one hand, DNNs can achieve high accuracy if
trained with large-scale datasets [15]. But on the other hand, contemporary
DNNs are often criticized for producing overconfident predictions [14], which
fail to represent the true correctness likelihood of accuracy. This has raised
concerns over safety and reliability for using machine learning systems in
real-world scenarios. Having a confidence-calibrated system is critical. For
instance, in healthcare applications, the intelligence system should produce
low-confidence predictions when it is uncertain about the input—say they
differ significantly from the training data—so the decision-making process can
be transferred to human doctors for more accurate diagnosis and safer
handling. Research on confidence calibration for DNNs has received increasing
attention in recent years [14, 27, 19, 23, 27]. Since most classifiers are
based on softmax, a common practice to improve calibration is to insert a
temperature scaling parameter to the softmax function and adjust it in a
validation set [14]. Besides, methods like Smoothing labels [36, 28], which
essentially combines the one-hot ground-truth vector with a uniform
distribution, has also been shown effective in improving calibration.
Figure 1: Comparison between (a) the conventional softmax and (b) our proposed
Energy-based Open-World softmax (EOW-Softmax). Our new formulation introduces
an extra dimension to model uncertainty, which is supposed to produce high
scores when the input deviates from the training data distribution. In this
way, the original $K$ classification scores can be well calibrated.
However, most existing confidence calibration methods have overlooked the
underlying problem that causes neural network classifiers to generate
overconfident predictions, i.e. the inability to model _uncertainty_ in output
probabilities. We argue that the culprit for causing such a problem is the
closed-world nature in softmax [2, 34]. This is easy to understand: during
training the model is asked to classify input into one of $K$ pre-defined
categories with high probability (due to the cross-entropy loss), and as such,
the model has no choice but to assign one of the $K$ categories to any unseen
data, likely with high probability as well.
A potential countermeasure is to adopt a $K+1$-way formulation where the new
category can represent uncertainty about the input data. In this way, the $K$
classification scores might be better regularized, and hence better
calibrated. However, learning such a classifier is challenging as we do not
have access to those data with the $K+1$-th label, thus lacking supervision to
teach the network when to give low/high confidence. Furthermore, designing the
extra dimension is a non-trivial task as it is directly linked to the
formulation of the learning objective. It is also unclear how such a dimension
should be constructed, e.g., to design it as another logit produced by the
same network or an independent branch that regresses to uncertainty.
In this paper, we propose _Energy-based Open-World Softmax_ (EOW-Softmax), a
novel approach that introduces a $K+1$-way softmax based on energy functions
[25]. Specifically, the neural network classifier is designed to produce $K+1$
logits, where the first $K$ dimensions encode the scores for the original
$K$-way classification task, while the extra dimension aims to model open-
world uncertainty. See Figure 1 for a comparison between a model based on the
conventional softmax and that based on our EOW-Softmax. Besides, we resort to
an energy-based $K+1$-way classification objective function to unify the
learning of the $K$-way classification task and the uncertainty modeling.
Further more, we theoretically justify that optimizing the proposed objective
function essentially forces the summation of original $K$ softmax scores
($K+1$ scores in total) to be directly proportional to the marginal density
$p(x)$, hence explaining why our EOW-Softmax helps calibrate a model’s
confidence estimates.
The contributions of this paper are summarized as follows. 1) First, we
overcome the closed-world softmax problem by transforming the conventional
$K$-way softmax to a novel $K+1$-way formulation, where the extra dimension is
designed to model open-world uncertainty. 2) Second, a novel energy-based
objective function is developed to unify the learning of the original $K$-way
classification task and the uncertainty modeling. 3) A theoretical proof is
further provided to explain why our learning objective can help the network
capture uncertainty. 4) Finally, we conduct extensive experiments on standard
benchmark datasets to demonstrate that our method can lead to a better
calibrated model compared with other state-of-the-arts.
## 2 Related Works
Confidence Calibration With the emergence of deep learning technologies and
their wide successes, concerns over whether they are reliable to be deployed
in practice have also arisen. This is because researchers have found that
contemporary deep neural networks (DNNs) often produce overconfident
predictions [14], even on input images that are totally unrecognizable to
humans [32]. Many approaches for improving confidence calibration have been
developed. A widely used method is temperature scaling [14, 27, 19], which
inserts a scaling parameter to the softmax formulation (called ‘temperature’)
and adjusts it in a validation set with a goal to ‘soften’ the softmax
probabilities. Regularization methods, such as label smoothing [36] and Mixup
[37], have also been demonstrated effective in improving calibration. In
particular, label smoothing modifies the ground-truth labels by fusing them
with a uniform distribution, essentially forcing neural networks to produce
‘more flattened’ probabilities; whereas Mixup is a data augmentation method
that randomly mixes two instances at both the image and label space, with a
byproduct effect of improving calibration. Bayesian methods have also been
explored for calibration. For instance, Monte Carlo Dropout [7] applies
dropout in both training and testing; Deep Ensembles [23] uses as prediction
the output averaged over an ensemble of models. Adding adversarial
perturbations to the input has been found effective in smoothing the output
probabilities [23, 27]. In [26], a GAN model [11] is trained to generate out-
of-distribution (OOD) data and the classifier is encouraged to produce low-
confidence probabilities on these data. Such an idea has also been
investigated in [16] where adversarial perturbations are utilized to
synthesize OOD data. In [12], a Joint Energy-based Model (JEM) is proposed to
improve calibration by learning the joint distribution based on energy
functions [25]. A recent work [38] suggests that calibrating confidence across
multiple domains is beneficial to OOD generalization [42]. Studies on why
neural networks produce overconfident predictions have also been covered in
the literature. In [16], the authors suggest that ReLU neural networks are
essentially piecewise linear functions, thus explaining why OOD data can
easily cause softmax classifiers to generate highly confident output. In [30],
the authors identify that data variance and model curvature cause most
generative models to assign high density to OOD data. The authors in [34]
point out that the overconfidence issue is related to the closed-world
assumption in softmax, and design a distance-based one-vs-all (OvA) classifier
as the countermeasure.
Two works related to ours are JEM [12] and the OvA classifier [34]. Compared
with JEM, our approach is much easier to train because we only need to
optimize a _single_ classification objective to achieve both discriminative
classifier learning and generative modeling (see Sec. 3.3), while JEM has to
simultaneously optimize two separate objectives. Moreover, JEM has ignored the
closed-world softmax issue, which is addressed in this work with an augmented
softmax. Compared with the OvA classifier, our approach is significantly
different: we endow the classifier with the ability to model open-world
uncertainty, which is attributed to the extra dimension in softmax learned via
a novel energy-based objective function to capture the marginal data
distribution; in contrast, the OvA classifier converts the $K$-way
classification problem into multiple binary classification problems.
Energy-Based Models (EBMs) have been widely used in the area of generative
modeling [41, 8, 1, 4]. The basic idea in EBMs is to learn dependencies
between variables (e.g., images and labels) represented using energy
functions; and to assign low energies to correct configurations while give
high energies to incorrect ones [25]. However, training EBMs, especially on
high-dimensional data like images, has been notoriously hard due to sampling
issues [21, 13]. A widely used sampler is Stochastic Gradient Langevin
Dynamics (SGLD) [39], which injects noises to the parameter update and anneals
the stepsize during the course of training. Following prior work [33, 6, 12],
we also leverage SGLD to optimize our energy-based objective function.
Figure 2: Model architecture of our approach _EOW-Softmax_. The extra
dimension introduced in the augmented softmax (dashed) is learned using an
energy-based function to model open-world uncertainty, such that it can assign
high uncertainty scores to abnormal input far away from the training data
distribution, which in turn lower the classifier’s confidence on the original
$K$-way classification task. Note that the sampling in SGLD is performed on
the latent (feature) space rather than the input (image) space.
## 3 Methodology
According to [34], we argue that the culprit for causing the overconfidence
problem in most neural network classifiers’ output is the closed-world nature
in softmax. As a result, a model trained by the cross-entropy loss has to pick
one of $K$ pre-defined categories with high confidence. To overcome this
problem, we propose _Energy-based Open-World Softmax_ , or EOW-Softmax, to
regularize the $K$-way classification scores in such a way that allows their
confidence to be calibrated. The main idea in EOW-Softmax is to re-formulate
the original $K$-way classification task as a novel $K$+1-way classification
problem, where the extra dimension is designed to model _open-world
uncertainty_. To learn such a $K$+1-way classifier in an end-to-end manner, we
propose a novel energy-based objective function, which essentially forces the
extra dimension to be negatively correlated to the marginal data distribution.
In this way, the $K$ classification scores are automatically calibrated to be
less confident over input fallen beyond the training data distribution. See
Figure 2 for an overview of our model architecture. The rest of this section
are organized as follows. In Sec. 3.1, we provide a brief background on
energy-based models (EBMs), which are required by our approach to construct
the objective function. In Sec. 3.2, we discuss in detail the design of EOW-
Softmax. Sec. 3.3 gives a theoretical insight on why EOW-Softmax can help
calibrate a model’s confidence estimates.
### 3.1 A Brief Background on EBMs
The main building block in EBMs is an energy function
$E_{\theta}:\mathbb{R}^{D}\to\mathbb{R}$ (parameterized by $\theta$), which
aims to map a $D$-dimensional datapoint to a scalar.111When the input is an
image, $D$ can be understood as the length of the flattened tensor. The
learning is designed in such a way that $E_{\theta}$ can assign low energies
to observed configurations of variables while give high energies to unobserved
ones [25]. With $E_{\theta}$, any probability density $p(x)$ for
$x\in\mathbb{R}^{D}$ in an EBM can be written as
$p_{\theta}(x)=\frac{\exp(-E_{\theta}(x))}{Z(\theta)},$ (1)
where $Z(\theta)=\int_{x}\exp(-E_{\theta}(x))$ denotes the normalizing
constant, also known as the partition function. An EBM can be represented by
using any function as long as the function can generate a single scalar given
some input $x$. In this work, we assume $E_{\theta}$ is represented by a deep
neural network. People usually adopt gradient estimation to optimize an EBMs
[21, 13] and sample data from it by Markov Chain Monte Carlo (MCMC) methods
[9, 10, 18, 39].
### 3.2 Energy-Based Open-World Softmax
Open-World Softmax As discussed before, conventional softmax-based classifiers
lack the ability to model open-world uncertainty. To address this problem, we
design a neural network classifier to output probabilities on $K+1$ categories
(see Figure 2), with the $K$+1-th score representing open-world
uncertainty—the network should be able to produce high uncertainty scores to
abnormal input, which in turn can lower the confidence on the original $K$
categories’ prediction. Let $f_{\theta}:\mathbb{R}^{D}\to\mathbb{R}^{K+1}$ be
our neural network model (excluding the softmax layer), which produces $K+1$
logits, and $f_{\theta}(x)[i]$ the $i$-th logit given input $x$, with
$i\in\\{1,...,K,K+1\\}$. The output probabilities can then be obtained by
passing these $K+1$ logits to a softmax normalization layer, i.e.
$h_{\theta}(x)[i]=\frac{\exp(f_{\theta}(x)[i])}{\sum_{j=1}^{K+1}\exp(f_{\theta}(x)[j])},$
(2)
where $h_{\theta}$ is the combination of the neural network $f_{\theta}$ and
the softmax normalization layer.
Energy-Based Learning Objective Now the question is how to design a learning
objective that allows $h_{\theta}(x)[K+1]$ to encode uncertainty? Our idea
here is to associate the score of $h_{\theta}(x)[K+1]$ to the marginal data
distribution. Intuitively, when the input comes from within the training data
distribution $p(x)$, the model is supposed to be confident in its decision,
and therefore, $h_{\theta}(x)[K+1]$ should be low (conversely,
$\sum_{i=1}^{K}h_{\theta}(x)[i]$ should be high). If the input deviates from
the training data distribution, the model should become uncertain about
whether its decision is correct. In this case, $h_{\theta}(x)[K+1]$ should be
high to indicate a higher level of uncertainty, which naturally forces
$\sum_{i=1}^{K}h_{\theta}(x)[i]$ to stay low (due to the softmax
normalization). However, directly training $h_{\theta}(x)[K+1]$ to capture the
marginal distribution $p(x)$ (i.e. generative modeling) is difficult [30].
Instead, we propose a novel learning objective with the help of EBMs [25].
First, we define our energy function as
$E_{\theta}(x)=\log h_{\theta}(x)[K+1].$ (3)
Then, our energy-based objective function is defined as
$\min\limits_{\theta}\mathbb{E}_{p(x)}\bigg{[}-\log
h_{\theta}(x)[y]\bigg{]}+\lambda\mathbb{E}_{p_{\bar{\theta}}(x)}\bigg{[}-\log
h_{\theta}(x)[K+1]\bigg{]},$ (4)
where $\lambda>0$ is a hyper-parameter; the first term is the maximum log-
likelihood objective for the $K$-way classification task using the ground-
truth label $y$; the second term can also be seen as maximum log-likelihood
objective—for recognizing data sampled from $p_{\bar{\theta}}(x)$. Note that
$p_{\bar{\theta}}(x)$ denotes the model distribution with frozen parameters of
$p_{\theta}(x)$ of current iteration ($p_{\bar{\theta}}(x)$ will always be the
same as $p_{\theta}(x)$ but without the gradient calculation of $\theta$ since
parameter $\theta$ is frozen here and $\bar{\theta}$ should be regarded as a
constant in each updates). We will show later in Sec. 3.3 that optimizing Eq.
(4) can actually lead the summation of rest $K$ softmax scores of original
classes to be directly proportional to the marginal density $p(x)$, which in
turn can make the $K+1$-th softmax score be negatively correlated to $p(x)$.
SGLD-Based Optimization We approximate the expectation in the second term in
Eq. (4) using a sampler based on Stochastic Gradient Langevin Dynamics (SGLD)
[39]. Specifically, the SGLD sampling process follows
$z_{t+1}=z_{t}-\frac{\alpha}{2}\frac{\partial E_{\theta}(z_{t})}{\partial
z_{t}}+\sqrt{\alpha}\epsilon,\quad\epsilon\sim\mathcal{N}(0,I),$ (5)
where $t$ denotes the SGLD iteration, $\alpha$ the step-size, and $\epsilon$ a
random noise sampled from a normal distribution. In practice, $\alpha$ is
usually fixed as a constant.
Most SGLD-based methods draw samples from the image space. This forces the
information to flow through the entire neural network, which is
computationally expensive. Inspired by [4], we choose to draw samples from the
latent space (see Figure 2). Therefore, $z$ in Eq. (5) represents features
rather than an image. Such a design significantly accelerates the training
since the information only goes partially through the network model, which
allows much deeper architectures such as ResNet-101 [15] to fit into limited
resources. Moreover, the latent space is typically smoother than the image
space [3], which facilitates the estimate of gradients.
### 3.3 Theoretical Insight
In order to prove that our objective can force $h_{\theta}(x)[K+1]$ to be
negatively correlated with $p(x)$, i.e. representing uncertainty, we tend to
show that in theory, optimizing our objective in Eq. (4) is equivalent to
minimize the KL divergence between $p(x)$ and another EBM-modeled distribution
$q_{\theta}(x)$222It is worth noting that this $q_{\theta}(x)$ is not the
modeled EBMs $p_{\theta}(x)$ in Sec. 3.2., where $q_{\theta}(x)$ is defined by
energy function
$E^{\prime}_{\theta}(x)=-\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i].$ (6)
To this end, we introduce an extra objective
$\min\limits_{\theta}\mathbb{E}_{p(x)}\bigg{[}-\log
h_{\theta}(x)[y]\bigg{]}+\mathbb{E}_{q_{\bar{\theta}}(x)}\bigg{[}\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]\bigg{]},$
(7)
Similar to Eq. (4), here $\bar{\theta}$ means the parameters are frozen. We
will show that optimizing Eq. (4) essentially optimize Eq. (7) and optimizing
Eq. (7) is an equivalent of $\min D_{KL}(p(x)||q_{\theta}(x))$ in following
Proposition 1 and Theorem 1, respectively.
###### Proposition 1.
Given two EBMs $p_{\bar{\theta}}(x)$ and $q_{\bar{\theta}}(x)$ with energy
functions defined in Eqs. (3) and (6) respectively, the optimization of Eq.
(4) is actually equivalent to optimize a combination of one $K$-way
classification objective and Eq. (7) with some suitable coefficient $\mu$.
###### Proof.
Since the first optimization term in Eq. (7) is identical with Eq. (4) as well
as the objective of maximum log-likelihood of $K$-way classification problems,
we only need to consider the second terms in both equations and prove that
they are equivalent to each other. Specifically, for the gradient of the
second term of Eq. (7), we have333The equality between Eqs. (9) and (10) holds
because
$q_{\bar{\theta}}(x)=q_{\theta}(x)=\frac{\sum\limits_{i=1}^{K}h_{\theta}(x)[i]}{Z^{\prime}(\theta)}$
and
$\frac{\partial}{\partial\theta}\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]=\frac{\frac{\partial}{\partial\theta}\sum\limits_{i=1}^{K}h_{\theta}(x)[i]}{\sum\limits_{i=1}^{K}h_{\theta}(x)[i]}$.
$\displaystyle\frac{\partial}{\partial\theta}\
\mathbb{E}_{q_{\bar{\theta}}(x)}\Big{[}\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]\Big{]}$
(8) $\displaystyle=\ $
$\displaystyle\int_{x}q_{\bar{\theta}}(x)\frac{\partial}{\partial\theta}\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]$
(9) $\displaystyle=\ $
$\displaystyle\int_{x}\frac{\sum\limits_{i=1}^{K}h_{\theta}(x)[i]}{Z^{\prime}(\theta)}\cdot\frac{\frac{\partial}{\partial\theta}\sum\limits_{i=1}^{K}h_{\theta}(x)[i]}{\sum\limits_{i=1}^{K}h_{\theta}(x)[i]}$
(10) $\displaystyle=\ $
$\displaystyle\frac{1}{Z^{\prime}(\theta)}\int_{x}\frac{\partial}{\partial\theta}\sum\limits_{i=1}^{K}h_{\theta}(x)[i]$
(11) $\displaystyle=\ $
$\displaystyle-\frac{1}{Z^{\prime}(\theta)}\int_{x}\frac{\partial}{\partial\theta}h_{\theta}(x)[K+1]$
(12) $\displaystyle=\ $
$\displaystyle-\frac{Z(\theta)}{Z^{\prime}(\theta)}\int_{x}\frac{h_{\theta}(x)[K+1]}{Z(\theta)}\cdot\frac{\frac{\partial}{\partial\theta}h_{\theta}(x)[K+1]}{h_{\theta}(x)[K+1]}$
(13) $\displaystyle=\ $
$\displaystyle-\frac{Z(\theta)}{Z^{\prime}(\theta)}\int_{x}p_{\bar{\theta}}(x)\frac{\partial}{\partial\theta}\log
h_{\theta}(x)[K+1],$ (14)
where $Z^{\prime}(\theta)$ and $Z(\theta)$ represents the partition functions
of $q_{\theta}(x)$ and $p_{\theta}(x)$ respectively. If we use $\mu$ to denote
$\frac{Z(\theta)}{Z^{\prime}(\theta)}$, we can restate the Eq. (14) as
$\mu\frac{\partial}{\partial\theta}\mathbb{E}_{p_{\bar{\theta}}(x)}\bigg{[}-\log
h_{\theta}(x)[K+1]\bigg{]},$
which is exactly the gradient of Eq. (4)’s second term. As a result, the
objective of Eq. (4) and of Eq. (7) are same under a suitable coefficient
$\mu$ in each iteration. Further more, remembering that the first term of Eq.
(4) is an equivalent of the objective of maximum log-likelihood of $K$-way
classification problems, we consequently conclude that optimizing our
objective of Eq. (4) essentially optimize Eq. (7) and a $K$-way classification
objective. ∎
According to Proposition 1, we know that our learning objective of Eq. (4) can
optimize the discriminative $K$-way classification objective and the
generative modeling objective in a unified discriminative objective, which has
never been explored in existing confidence calibration work.
Moreover, if we can further prove that optimizing Eq. (7) is de facto an
equivalent of minimizing the KL-divergence between $p(x)$ and the distribution
$q_{\theta}(x)$, then our objective of Eq. (4) could minimize this KL-
divergence either due to Proposition 1. To prove that, we need to recur to
Lemma 1 based on [21], which shows how to efficiently compute the gradient of
the KL divergence between the real distribution and an approximated
distribution modeled via EBMs.
###### Lemma 1.
Given a training dataset with data $\\{x\\}$ sampled from distribution $r(x)$,
and an energy model distribution $r_{\phi}(x)$ parameterized by $\phi$ and
associated to an energy function $E_{\phi}(x)$, the objective of minimizing
$D_{KL}(r(x)||r_{\phi}(x))$ can be optimized by descending the following
gradient w.r.t $\phi$,
$\mathop{\mathbb{E}}\limits_{x^{+}\sim r(x)}\Bigg{[}\frac{\partial
E_{\phi}(x^{+})}{\partial\phi}\Bigg{]}-\mathop{\mathbb{E}}\limits_{x^{-}\sim
r_{\phi}(x)}\Bigg{[}\frac{\partial E_{\phi}(x^{-})}{\partial\phi}\Bigg{]}.$
(15)
The proof can refer [21]. By descending the gradient in Eq. (15), the first
term decreases the energy of samples $x^{+}$ drawn from the data distribution,
while the second term increases the energy of samples $x^{-}$ drawn from the
energy model distribution. Based on Lemma 1, we can introduce following
theorem followed by a proof.
###### Theorem 1.
Let $p(x)$ denote the training data distribution, and $q_{\theta}(x)$ the
energy model distribution represented by the energy function
$E^{\prime}_{\theta}(x)$ defined in Eq. (6), we can achieve minimization of
$D_{KL}(p(x)||q_{\theta}(x))$ by optimizing Eq. (7).
###### Proof.
According to Lemma 1, the KL divergence between $p(x)$ and $q_{\theta}(x)$ can
be optimized by descending the gradient in Eq. (15). We can replace the need
of computing expectation over the parameterized density $q_{\theta}(x)$ in Eq.
(15) by fixing the parameters $\theta$, denoted by $q_{\bar{\theta}}(x)$
444only the numerical value of Eq. (15) matters in optimization process.. As
such, Eq. (15) is converted to
$\mathbb{E}_{p(x)}\Bigg{[}\frac{\partial
E^{\prime}_{\theta}(x)}{\partial\theta}\Bigg{]}-\mathbb{E}_{q_{\bar{\theta}}(x)}\Bigg{[}\frac{\partial
E^{\prime}_{\theta}(x)}{\partial\theta}\Bigg{]}.$ (16)
Now we can optimize $D_{KL}(p(x)||q_{\theta}(x))$ via an objective
$\mathbb{E}_{p(x)}\Big{[}E^{\prime}_{\theta}(x)\Big{]}-\mathbb{E}_{q_{\bar{\theta}}(x)}\Big{[}E^{\prime}_{\theta}(x)\Big{]}$
which holds a numerically same gradient with regard to $\theta$ as Eqs. (16)
and (15). Then we have555the inequality holds because of the fact $\forall
y\leq K,\ \ \sum\limits_{i=1}^{K}h_{\theta}(x)[i]\geq h_{\theta}(x)[y].$
$\displaystyle\mathbb{E}_{p(x)}\Bigg{[}E^{\prime}_{\theta}(x)\Bigg{]}-\mathbb{E}_{q_{\bar{\theta}}(x)}\Bigg{[}E^{\prime}_{\theta}(x)\Bigg{]}$
(17) $\displaystyle=$
$\displaystyle\mathbb{E}_{p(x)}\Bigg{[}-\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]\Bigg{]}+\mathbb{E}_{q_{\bar{\theta}}(x)}\Bigg{[}\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]\Bigg{]}$
$\displaystyle\leq$ $\displaystyle\mathbb{E}_{p(x)}\Bigg{[}-\log
h_{\theta}(x)[y]\Bigg{]}+\mathbb{E}_{q_{\bar{\theta}}(x)}\Bigg{[}\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]\Bigg{]}.$
Therefore, Eq. (7) is an upper bound of an equivalent variant of the KL-
divergence between $p(x)$ and $q_{\theta}(x)$. ∎
Combing Proposition 1 and Theorem 1, we can conclude that our objective of Eq.
(4) can minimize $D_{KL}(p(x)||q_{\theta}(x))$. Therefore, once our objective
converged, we obtain $p(x)\simeq
q_{\theta}(x)=\frac{\exp(-E^{\prime}_{\theta}(x))}{Z^{\prime}(\theta)}\propto\sum\limits_{i=1}^{K}h_{\theta}(x)[i]$,
which result in the summation of $K$ softmax scores of original classes to be
directly proportional to the marginal density $p(x)$ and in turn make the
$K+1$-th softmax score be negatively correlated to $p(x)$.
Table 1: Comparison between our approach EOW-Softmax and nine baselines on
four benchmark datasets. It is clear that our approach generally leads to a
better calibrated model than the baselines (lower ECE & NLL), while
maintaining the accuracy. $\uparrow$: the higher the better. $\downarrow$: the
lower the better.
Method | MNIST (MLP) | CIFAR10 (VGG11) | CIFAR100 (ResNet50) | Tiny-ImageNet (ResNet50)
---|---|---|---|---
Acc% $\uparrow$ | ECE% $\downarrow$ | NLL $\downarrow$ | Acc% $\uparrow$ | ECE% $\downarrow$ | NLL $\downarrow$ | Acc% $\uparrow$ | ECE% $\downarrow$ | NLL $\downarrow$ | Acc% $\uparrow$ | ECE% $\downarrow$ | NLL $\downarrow$
Vanilla Training | 98.32 | 1.73 | 0.29 | 90.48 | 6.30 | 0.43 | 71.57 | 19.1 | 1.58 | 46.71 | 25.2 | 2.95
TrustScore [20] | 98.32 | 2.14 | 0.26 | 90.48 | 5.30 | 0.40 | 71.57 | 10.9 | 1.43 | 46.71 | 19.2 | 2.75
MC-Dropout [7] | 98.32 | 1.71 | 0.34 | 90.48 | 3.90 | 0.47 | 71.57 | 9.70 | 1.48 | 46.72 | 17.4 | 3.17
Label Smoothing [36] | 98.77 | 1.68 | 0.30 | 90.71 | 2.70 | 0.38 | 71.92 | 3.30 | 1.39 | 47.19 | 5.60 | 2.93
Mixup [37] | 98.83 | 1.74 | 0.24 | 90.59 | 3.30 | 0.37 | 71.85 | 2.90 | 1.44 | 46.89 | 6.80 | 2.66
JEM [12] | 97.23 | 1.56 | 0.21 | 90.36 | 3.30 | 0.34 | 70.28 | 2.46 | 1.31 | 45.97 | 5.42 | 2.47
OvA DM [34] | 96.67 | 1.78 | 0.27 | 89.56 | 3.55 | 0.37 | 70.11 | 3.58 | 1.40 | 45.55 | 4.22 | 2.50
Temperature Scaling [14] | 95.14 | 1.32 | 0.17 | 89.83 | 3.10 | 0.33 | 69.84 | 2.50 | 1.23 | 45.03 | 4.80 | 2.59
DBLE [40] | 98.69 | 0.97 | 0.12 | 90.92 | 1.50 | 0.29 | 71.03 | 1.10 | 1.09 | 46.45 | 3.60 | 2.38
EOW-Softmax (_ours_) | 98.91 | 0.88 | 0.15 | 90.24 | 1.57 | 0.25 | 71.33 | 1.08 | 1.03 | 46.97 | 3.45 | 2.22
Figure 3: Results on CIFAR-100-C. Each bar represents the mean ECE on 19
different corruptions, with the vertical line segment denoting the standard
deviation. In general, EOW-Softmax achieves the lowest ECE under five
different corruption levels.
## 4 Experiments
### 4.1 Experimental Setup
Settings We adopt three settings to evaluate our approach. 1) _Confidence
Calibration_ : This aims to evaluate the effectiveness of a method in
improving confidence calibration. Following [40], we use four datasets: MNIST
[24] (MLP), CIFAR-10 [22] (VGG11 [35]), CIFAR-100 [22] (ResNet50 [15]), and
Tiny-ImageNet [5] (ResNet50). Network architectures used for these datasets
are indicated in the parentheses. 2) _OOD Detection_ : A ResNet50 classifier
is trained on CIFAR-100 and tested on the combination of CIFAR-100’s test
split and an OOD dataset, i.e. CIFAR-10 and SVHN [31]. The goal for the
classifier is to assign low confidence to as many OOD samples as possible. The
accuracy is computed on predictions with confidence higher than a threshold.
3) _Robustness under Corruption_ : A classifier is trained on CIFAR-100. Its
calibration performance is evaluated on CIFAR-100-C [17], where the images are
perturbed by 19 different corruptions with five intensity levels.
Baselines We compare our approach with nine baseline methods: MC-Dropout [7],
Temperature Scaling [14], Mixup [37], Label Smoothing [36], TrustScore [20],
JEM [12], DBLE [40], and OvA DM [34].
Evaluation Metrics Following prior work [14], we use two metrics to assess how
well the confidence in a model’s predictions is calibrated, namely Expected
Calibration Error (ECE) [29] and Negative Log-Likelihood (NLL). The lower the
ECE/NLL, the better the calibration performance. Below we explain in detail
how these two metrics are calculated. ECE approximates the expectation of the
difference between accuracy and confidence (i.e. the likelihood on the
predicted label $\hat{y}$), which can reflect how well the prediction
confidence aligns with the true accuracy. Specifically, the confidence
estimates made on all test samples are partitioned into $L$ equally spaced
bins (following [14, 40, 34], $L=15$), and the difference between the average
confidence and accuracy within each bin $I_{l}$ is calculated,
$\displaystyle\text{ECE}=\sum\limits_{l=1}^{L}\frac{1}{N}|\sum\limits_{x\in
I_{l}}p(\hat{y}|x)-\sum\limits_{x\in I_{l}}1(\hat{y}=y)|,$ (18)
where $N$ denotes the total number of samples in the test set. NLL computes
the average negative log-likelihood on all test samples,
$\displaystyle\text{NLL}=-\frac{1}{N}\sum\limits_{m=1}^{N}\log
p(\hat{y}_{m}|x_{m}).$ (19)
Implementation Details We use the SGD optimizer with the learning rate of
1e-4, the momentum of 0.9, and the weight decay of 5e-4. The batch size is set
to 64. The number of epochs is 200. The learning rate is decayed by 0.1 at the
100-th and 150-th epoch, respectively. For SGLD, we use a constant step size
of 2 and a standard deviation of 1e-3 (see Eq (5)). The number of updates in
each SGLD round is set to 100. To ensure that the results are convincing, we
run each experiment 5 times with different random seeds and average their
results.
### 4.2 Main Results
Confidence Calibration We first evaluate the calibration performance on four
standard datasets, namely MNIST, CIFAR-10/100 and Tiny-ImageNet. The results
are shown in Table 1. In general, our approach EOW-Softmax obtains the best
overall calibration performance on most datasets. Comparing with Vanilla
Training, we observe that our EOW-Softmax achieves a similar test accuracy,
while significantly improves the calibration performance in terms of ECE,
especially on the three challenging datasets with natural
images—6.30%$\to$1.57% on CIFAR-10, 19.1%$\to$1.08% on CIFAR-100, and
25.2%$\to$3.45% on Tiny-ImageNet. These results strongly suggest that our
energy-based open-world uncertainty modeling has great potential for real-
world applications as it shows a good balance between test accuracy and
calibration performance. JEM and OvA DM are two related methods to ours. JEM
is based on joint distribution modeling while OvA DM transforms the
conventional softmax classifier to a distance-based one-vs-all classifier. The
comparison with these two methods shows that our approach is clearly better in
all metrics, which advocates our design of the $K$+1-way softmax for modeling
open-world uncertainty. Compared with the top-performing baselines, i.e.
Temperature Scaling and DBLE, our EOW-Softmax is highly competitive—it obtains
the best ECE on all datasets except CIFAR-10 where the performance is only
slightly worse than DBLE. Among these three methods, EOW-Softmax performs the
best in maintaining the original test accuracy, whereas Temperature Scaling
has to sacrifice the test accuracy in exchange for improvement on ECE. This is
because for fair comparison (all methods only have access to the training
set), Temperature Scaling has to separate a validation set out from the
original training set for tuning its scaling parameter, which reduces the
amount of training data.
Table 2: Test accuracy on the combination of in-distribution and OOD test set using ResNet50 trained on CIFAR-100. OOD dataset | Method | Probability threshold
---|---|---
0 | .25 | .5 | .75
CIFAR10 | Vanilla Training | 37.24 | 42.31 | 47.67 | 58.90
JEM [12] | 42.55 | 46.88 | 0.53 | 63.21
OvA DM [34] | 39.78 | 48.54 | 54.31 | 65.20
EOW-Softmax | 37.65 | 50.11 | 57.32 | 69.00
SVHN | Vanilla Training | 20.24 | 21.33 | 24.38 | 26.90
JEM [12] | 19.87 | 22.57 | 26.22 | 30.75
OvA DM [34] | 20.08 | 23.99 | 26.08 | 30.32
EOW-Softmax | 20.21 | 25.58 | 28.13 | 32.68
OOD Detection We follow [34] to simulate real-world scenarios by training a
classifier on CIFAR-100 and testing on the combination of CIFAR-100’s test set
and an OOD dataset (CIFAR-10/SVHN). The classifier is required to assign low
confidence to OOD samples such that their predictions can be rejected by a
pre-defined threshold. The results are reported in Table 2 where we compare
our approach with JEM and OvA DM (as these two methods are most related to
ours), as well as the vanilla training method. The probability threshold is
linearly increased from 0 to 0.75. Only predictions with confidence higher
than this threshold are kept. From the results, we observe that EOW-Softmax
outperforms all baselines with clear margins in different thresholds (except
0). This indicates that a classifier trained with EOW-Softmax suffers much
less from the overconfidence problem than the competitors, and is thus safer
to be deployed in practical applications.
Robustness under Corruption We also evaluate our approach on corrupted images,
i.e. CIFAR-100-C, and compare with JEM and OVA DM. Specifically, there are
five different intensities of corruption as defined in [17], each with 19
different corruption types. Under each intensity level of corruption, we test
a model’s ECE on images of all corruption types, and report their average
result and the standard deviation. The comparison is illustrated in Figure 3.
Overall, EOW-Softmax performs favorably against JEM and OVA DM, as well as the
vanilla training baseline. Though both EOW-Softmax and JEM are based on energy
models for generative modeling, JEM clearly has a larger variation in
performance among different corruption types. This is because JEM is more
difficult to train—it optimizes the log-likelihood of distribution
independently from the classifier learning. In contrast, the ‘generative
modeling’ in EOW-Softmax is seamlessly integrated into the $K$+1-way
classification task, which has a better training stability.
### 4.3 Ablation study
Hyper-parameter Recall that $\lambda$ in Eq. (4) balances between the standard
$K$-way classification loss and the energy-based loss for uncertainty
modeling. We experiment with different values (1, 0.1, and 0.01) on
CIFAR-10/100 to see the impact of this hyper-parameter. The results in Table 3
show that $\lambda=0.1$ leads to the best calibration performance (lowest ECE
values) on both datasets.
Where to Apply the SGLD Sampling? In our approach, SGLD sampling is applied to
the latent feature space rather than the pixel space as in most EBMs. To
justify this design, we experiment on CIFAR-100 with different variants of our
approach where the SGLD sampling is applied to different positions, including
the pixel space, stage-1, stage-2, and stage-3 (in the neural network). In
addition to the test accuracy and the ECE, we also report the training speed
(second per iteration) measured using a Tesla K80 GPU. Table 3 shows that
applying the SGLD sampling to the pixel space incurs huge computation
overhead, while shifting the sampling to the latent space significantly
improves the training speed without sacrificing the calibration performance.
Table 3: Ablation study on the impact of $\lambda$ in Eq. (4). Model | $\lambda$ | CIFAR10
---|---|---
Acc% $\uparrow$ | ECE% $\downarrow$ | NLL $\downarrow$
VGG11 | 1 | 89.81 | 2.11 | 0.28
0.1 | 90.24 | 1.57 | 0.25
0.01 | 90.11 | 3.37 | 0.36
Model | $\lambda$ | CIFAR100
Acc% $\uparrow$ | ECE% $\downarrow$ | NLL $\downarrow$
ResNet50 | 1 | 70.26 | 1.33 | 1.24
0.1 | 71.33 | 1.08 | 1.03
0.01 | 71.51 | 2.31 | 1.31
Table 4: Ablation on where to apply the SGLD sampling. Position | Acc% $\uparrow$ | ECE% $\downarrow$ | Second/Iter $\downarrow$
---|---|---|---
Pixel space | 73.94 | 1.89 | 25.15
Feature stage 1 | 73.21 | 2.09 | 10.31
Feature stage 2 | 73.48 | 1.73 | 5.21
Feature stage 3 | 73.05 | 2.17 | 2.37
## 5 Conclusion
This paper has addressed the closed-world problem in softmax that causes
neural network classifiers to produce overconfident predictions by introducing
an energy-based objective to model the open-world uncertainty.
Acknowledgement. This study is supported by NTU NAP and Microsoft Research Lab
Asia, and under the RIE2020 Industry Alignment Fund – Industry Collaboration
Projects (IAF-ICP) Funding Initiative, as well as cash and in-kind
contribution from the industry partner(s).
## References
* [1] Michael Arbel, Liang Zhou, and Arthur Gretton. Generalized energy based models. In ICLR, 2021.
* [2] Abhijit Bendale and Terrance E Boult. Towards open set deep networks. In CVPR, 2016.
* [3] Yoshua Bengio, Grégoire Mesnil, Yann N. Dauphin, and Salah Rifai. Better mixing via deep representations. CoRR, abs/1207.4404, 2012.
* [4] Tong Che, Ruixiang Zhang, Jascha Sohl-Dickstein, Hugo Larochelle, Liam Paull, Yuan Cao, and Yoshua Bengio. Your gan is secretly an energy-based model and you should use discriminator driven latent sampling. arXiv preprint arXiv:2003.06060, 2020.
* [5] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet: A large-scale hierarchical image database. In 2009 IEEE conference on computer vision and pattern recognition, pages 248–255. Ieee, 2009.
* [6] Yilun Du and Igor Mordatch. Implicit generation and modeling with energy based models. In NeurIPS, 2019.
* [7] Yarin Gal and Zoubin Ghahramani. Dropout as a bayesian approximation: Representing model uncertainty in deep learning. In international conference on machine learning, pages 1050–1059, 2016.
* [8] Ruiqi Gao, Yang Song, Ben Poole, Ying Nian Wu, and Diederik P Kingma. Learning energy-based models by diffusion recovery likelihood. In ICLR, 2021.
* [9] Charles J Geyer. Markov chain monte carlo maximum likelihood. 1991\.
* [10] Charles J Geyer. Practical markov chain monte carlo. Statistical science, pages 473–483, 1992.
* [11] Ian J Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial networks. In NeurIPS, 2014.
* [12] Will Grathwohl, Kuan-Chieh Wang, Jörn-Henrik Jacobsen, David Duvenaud, Mohammad Norouzi, and Kevin Swersky. Your classifier is secretly an energy based model and you should treat it like one. arXiv preprint arXiv:1912.03263, 2019.
* [13] Will Sussman Grathwohl, Jacob Jin Kelly, Milad Hashemi, Mohammad Norouzi, Kevin Swersky, and David Duvenaud. No {mcmc} for me: Amortized sampling for fast and stable training of energy-based models. In ICLR, 2021.
* [14] Chuan Guo, Geoff Pleiss, Yu Sun, and Kilian Q Weinberger. On calibration of modern neural networks. In ICML, 2017.
* [15] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In CVPR, 2016.
* [16] Matthias Hein, Maksym Andriushchenko, and Julian Bitterwolf. Why relu networks yield high-confidence predictions far away from the training data and how to mitigate the problem. In CVPR, 2019.
* [17] Dan Hendrycks and Thomas Dietterich. Benchmarking neural network robustness to common corruptions and perturbations. Proceedings of the International Conference on Learning Representations, 2019.
* [18] Geoffrey E Hinton. Training products of experts by minimizing contrastive divergence. Neural computation, 14(8):1771–1800, 2002.
* [19] Yen-Chang Hsu, Yilin Shen, Hongxia Jin, and Zsolt Kira. Generalized odin: Detecting out-of-distribution image without learning from out-of-distribution data. In CVPR, 2020.
* [20] Heinrich Jiang, Been Kim, Melody Guan, and Maya Gupta. To trust or not to trust a classifier. In Advances in Neural Information Processing Systems, volume 31, 2018.
* [21] Taesup Kim and Yoshua Bengio. Deep directed generative models with energy-based probability estimation. In ICLR-W, 2016.
* [22] Alex Krizhevsky, Geoffrey Hinton, et al. Learning multiple layers of features from tiny images. 2009\.
* [23] Balaji Lakshminarayanan, Alexander Pritzel, and Charles Blundell. Simple and scalable predictive uncertainty estimation using deep ensembles. In NeurIPS, 2017.
* [24] Yann LeCun, Léon Bottou, Yoshua Bengio, Patrick Haffner, et al. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11):2278–2324, 1998.
* [25] Yann LeCun, Sumit Chopra, Raia Hadsell, M Ranzato, and F Huang. A tutorial on energy-based learning. Predicting structured data, 1(0), 2006.
* [26] Kimin Lee, Honglak Lee, Kibok Lee, and Jinwoo Shin. Training confidence-calibrated classifiers for detecting out-of-distribution samples. In ICLR, 2018.
* [27] Shiyu Liang, Yixuan Li, and Rayadurgam Srikant. Enhancing the reliability of out-of-distribution image detection in neural networks. In ICLR, 2018.
* [28] Rafael Müller, Simon Kornblith, and Geoffrey Hinton. When does label smoothing help? In NeurIPS, 2019.
* [29] Mahdi Pakdaman Naeini, Gregory Cooper, and Milos Hauskrecht. Obtaining well calibrated probabilities using bayesian binning. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 29, 2015.
* [30] Eric Nalisnick, Akihiro Matsukawa, Yee Whye Teh, Dilan Gorur, and Balaji Lakshminarayanan. Do deep generative models know what they don’t know? In ICLR, 2019.
* [31] Yuval Netzer, Tao Wang, Adam Coates, Alessandro Bissacco, Bo Wu, and Andrew Y Ng. Reading digits in natural images with unsupervised feature learning. In NeurIPS-W, 2011.
* [32] Anh Mai Nguyen, Jason Yosinski, and Jeff Clune. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. CoRR, abs/1412.1897, 2014.
* [33] Erik Nijkamp, Mitch Hill, Song-Chun Zhu, and Ying Nian Wu. Learning non-convergent non-persistent short-run mcmc toward energy-based model. arXiv preprint arXiv:1904.09770, 2019.
* [34] Shreyas Padhy, Zachary Nado, Jie Ren, Jeremiah Liu, Jasper Snoek, and Balaji Lakshminarayanan. Revisiting one-vs-all classifiers for predictive uncertainty and out-of-distribution detection in neural networks. arXiv preprint arXiv:2007.05134, 2020.
* [35] Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014.
* [36] Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jon Shlens, and Zbigniew Wojna. Rethinking the inception architecture for computer vision. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 2818–2826, 2016.
* [37] Sunil Thulasidasan, Gopinath Chennupati, Jeff Bilmes, Tanmoy Bhattacharya, and Sarah Michalak. On mixup training: Improved calibration and predictive uncertainty for deep neural networks. arXiv preprint arXiv:1905.11001, 2019.
* [38] Yoav Wald, Amir Feder, Daniel Greenfeld, and Uri Shalit. On calibration and out-of-domain generalization. arXiv preprint arXiv:2102.10395, 2021.
* [39] Max Welling and Yee W Teh. Bayesian learning via stochastic gradient langevin dynamics. In ICML, 2011.
* [40] Chen Xing, Sercan Arik, Zizhao Zhang, and Tomas Pfister. Distance-based learning from errors for confidence calibration. In ICLR, 2020.
* [41] Junbo Zhao, Michael Mathieu, and Yann LeCun. Energy-based generative adversarial network. In ICLR, 2017.
* [42] Kaiyang Zhou, Ziwei Liu, Yu Qiao, Tao Xiang, and Chen Change Loy. Domain generalization in vision: A survey. arXiv preprint arXiv:2103.02503, 2021.
| arxiv-papers | 2021-07-27T06:52:06 | 2024-09-04T03:07:20.761913 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Yezhen Wang, Bo Li, Tong Che, Kaiyang Zhou, Ziwei Liu, Dongsheng Li",
"submitter": "Bo Li",
"url": "https://arxiv.org/abs/2107.12628"
} |
2107.12630 | # Low-Complexity Improved-Throughput Generalised Spatial Modulation: Bit-to-
Symbol Mapping, Detection and Performance Analysis
Jiancheng An, Chao Xu, _Senior Member, IEEE_ , Yusha Liu, Lu Gan, and Lajos
Hanzo, _Fellow, IEEE_ This work was supported in part by the China Scholarship
Council. The work of L. Hanzo was supported in part by the Engineering and
Physical Sciences Research Council projects EP/Noo4558/1, EP/PO34284/1, and
COALESCE, in part by the Royal Society’s Global Challenges Research Fund
Grant, and in part by the European Research Council’s Advanced Fellow Grant
QuantCom.J. An and L. Gan are with the School of Information and Communication
Engineering, University of Electronic Science and Technology of China,
Chengdu, Sichuan 611731, China. (E-mail: jiancheng$\\[email protected];
[email protected]).C. Xu, Y. Liu and L. Hanzo are with the School of
Electronics and Computer Science, University of Southampton, SO17 1BJ, UK.
(E-mail: [email protected]; [email protected]; [email protected]).
###### Abstract
Low-complexity improved-throughput generalised spatial modulation (LCIT-GSM)
is proposed. More explicitly, in GSM, extra information bits are conveyed
implicitly by activating a fixed number $N_{a}$ out of $N_{t}$ transmit
antennas (TAs) at a time. As a result, GSM has the advantage of a reduced
number of radio-frequency (RF) chains and reduced inter-antenna interference
(IAI) at the cost of a lower throughput than its multiplexing-oriented full-RF
based counterparts. Variable-${N_{a}}$ GSM mitigates this throughput reduction
by incorporating all possible TA activation patterns associated with a
variable value $N_{a}$ ranging from $1$ to $N_{t}$ during a single channel-
use, which maximises the throughput of GSM but suffers a high complexity of
the mapping book design and demodulation. In order to mitigate the complexity,
_first of all_ , we propose two efficient schemes for mapping the information
bits to the TA activation patterns, which can be readily scaled to massive
MIMO setups. _Secondly_ , in the absence of IAI, we derive a pair of low-
complexity near-optimal detectors, one of them has a reduced search scope,
while the other benefits from a decoupled single-stream based signal detection
algorithm. _Finally_ , the performance of the proposed LCIT-GSM system is
characterised by the error probability upper bound (UB). Our Monte Carlo based
simulation results confirm the improved error performance of our proposed
scheme, despite its reduced signal detection complexity.
###### Index Terms:
Generalised spatial modulation, low-complexity improved-throughput generalised
spatial modulation, maximum likelihood detection, bitwise spatial mapping,
MIMO, antenna selection.
## I Introduction
Spatial modulation (SM), constitutes a promising technique for the next-
generation multiple-input multiple-output (MIMO) system, which has attracted
substantial research interests [1, 2, 3]. The SM scheme strikes a flexible
trade-off between conventional MIMO techniques including Alamouti’s space-time
block code (STBC), and vertical Bell Laboratories layered space-time (V-BLAST)
system [4, 5, 6], which aim for retaining a diversity gain and a multiplexing
gain, respectively. More explicitly, for the SM scheme, the indices of the
transmit antenna (TA) are exploited as an extra dimension for transmitting
information besides the conventional amplitude-phase shift keying (APSK) such
as phase-shift keying (PSK) and quadrature amplitude modulation (QAM) [7, 3,
8]. Owing to the fact that only a single TA is activated in SM-MIMO at any
time instant, the inter-channel interference (ICI) and the inter-antenna
interference (IAI) of conventional MIMO techniques are mitigated, which
results in the simplified transceiver design and a reduced signal detection
complexity [2, 3]. Specifically, the MIMO power consumption is effectively
reduced by the SM philosophy, where only a single power amplifier is required
[9, 10, 11]. As a further advance, the SM scheme can be flexibly configured
for challenging communication scenarios, such as that of the downlink MIMO
systems having a rank-deficient channel matrix [8].
Inspired by the aforementioned advantages, the space shift keying (SSK)
concept was introduced in [12, 13] as a low-complexity implementation of SM,
where only the TA indices convey information. As a further advance, the
principle of SM has also been extended to the time domain, resulting in the
space-time shift keying (STSK) [14, 15, 16, 17], to the frequency domain
yielding the space-frequency shift keying (SFSK) [18] and to the time-
frequency domain creating the space-time-frequency shift keying (STFSK) [19,
20] to exploit all three degrees of freedom. As a result, the generalised
concept of index modulation (IM), has gained widespread interest in both
academia and industry [21, 22, 23, 24]. Furthermore, in [25, 26] and [27], the
IM philosophy was also extended to indoor optical wireless communication and
molecular communication, where visible light and molecules are the medium of
information transmission, respectively. Besides, both the analytical studies,
numerical simulations, as well as real-world experiments have verified that
SM-MIMOs have the inherent potential of outperforming many state-of-art MIMO
schemes, provided that a sufficiently high number of TAs is available at the
transmitter [28, 29].
TABLE I: The contribution of the proposed LCIT-GSM scheme compared with other
GSM schemes.
Contributions | LCIT-GSM | [30] | [31] | [32] | [33] | [34] | [35] | [27] | [36] | [37] | [38]
---|---|---|---|---|---|---|---|---|---|---|---
Flexibility in the number of TAs | ✓ | ✓ | $\times$ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓
Multiple active TAs | ✓ | ✓ | $\times$ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓
Multiple streams∗ | $\times$ | ✓ | $\times$ | ✓ | ✓ | ✓ | ✓ | $\times$ | $\times$ | ✓ | $\times$
Variable number of active TAs | ✓ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | ✓ | ✓ | $\times$ | ✓
Bitwise spatial mapping | ✓ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | ✓ | $\times$ | $\times$ | $\times$
Joint spatial and classic symbol alphabet | ✓ | ✓ | ✓ | $\times$ | ✓ | $\times$ | ✓ | $\times$ | $\times$ | ✓ | $\times$
Low-complexity detectors | ✓ | ✓ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | ✓ | $\times$
Improved upper bound | ✓ | $\times$ | ✓ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$
* •
[30]-2018: Single-RF and twin-RF SM for an arbitrary number of TAs;
* •
[31]-2016: Joint spatial and classic symbol alphabet for SM;
* •
[32]-2017: GSM aided mm-wave MIMO;
* •
[33]-2016: Diagonal precoding aided GSM;
* •
[34]-2019: Generalized quadrature spatial modulation;
* •
[35]-2019: Generic signal shaping methods for the multiple-stream GSM;
* •
[27]-2015: Depleted molecule shift keying;
* •
[36]-2015: Variable active antenna SM;
* •
[37]-2012: GSM with multiple active TAs;
* •
[38]-2017: Variable-$N_{a}$ GSM.
∗The LCIT-GSM scheme considered in this paper is a single-stream GSM scheme
that improves the throughput by using more TA activation patterns in the
spatial domain while inherits the advantage of IAI-free. We note that the
LCIT-GSM scheme can also be combined with V-BLAST to improve throughput to a
greater extent, which, however, results in a variable-length code with serious
error propagation.
In order to improve the throughput of single-RF SM and SSK schemes,
generalised spatial modulation (GSM) was proposed in [39, 40], which activates
several TAs simultaneously. Furthermore, conventional full-RF diversity- and
multiplexing-oriented MIMO schemes have been combined with GSM [41, 37, 42,
43]. Specifically, in [41], the space-time block coding-spatial modulation
(STBC-SM) concept was proposed, where GSM was combined with STBC in order to
achieve a beneficial diversity gain at the cost of using a reduced number of
RF chains. Similarly, a novel multiplexing-oriented GSM scheme was proposed in
[37, 42, 43] that combines V-BLAST and GSM, where multiple TAs are activated
simultaneously in order to transmit independently modulated symbols. This
scheme imposed a reduced IAI compared to the full-RF V-BLAST scheme. Recently,
a new transmission scheme termed as generalised quadrature spatial modulation
(GQSM) was proposed in [34], which extends the GSM constellation to the in-
phase and quadrature dimensions [44]. The QSM mapping of [44] has then been
further improved in [45, 46, 47, 48] by increasing the system’s throughput
and/or reducing the bit error probability (BEP). However, all the
aforementioned GSM schemes – including the STBC-SM, SM+V-BLAST and GQSM –
always employ a fixed number $N_{a}$ of TAs, which inevitably results in the
well-known throughput limitation of the family of GSM schemes. In order to
eliminate this throughput limitation, the variable-$N_{a}$ GSM (VGSM) concept
was proposed for increasing the spatial constellation size by employing a
variable number $N_{a}$ of activated TAs [36, 49, 50].
Figure 1: “Spider diagram" comparing several space-time transmission schemes.
The hierarchy structure models ordered MIMO schemes in each category. From the
outer to the inner, the gain of the corresponding term becomes smaller for a
selected direction. Taking the throughput as an example, V-BLAST has the
highest throughput, followed by GSM+V-BLAST, GSM, GSM+STBC, SM and STBC.
Against this background, we propose a low-complexity improved-throughput
generalised spatial modulation (LCIT-GSM) scheme, which is inspired by the
novel bit-to-symbol mapping scheme of [27] in the context of molecular
communication. In order to reflect on these issues, first of all, the trade-
offs between the aforementioned state-of-the-art MIMO schemes are visualised
by the spider diagram of Fig. 1. The rationale of Fig. 1 is that considering
the throughput as an example, V-BLAST achieves the highest throughput,
followed by GSM+V-BLAST, GSM, GSM+STBC and STBC. Therefore, there are five
rings in Fig. 1, which represent the ordered position of the five main MIMO
families in each category. As summarised in Fig. 1, owing to its fixed number
of activated TAs, the GSM schemes generally suffer from a throughput loss.
Furthermore, the features of the new LCIT-GSM scheme using the improved
bitwise spatial mapping design of [27] are compared to the existing GSM
schemes in Table I, where the specific terminologies of the systems referenced
are listed below Table I for the readers’ convenience. More explicitly, the
contributions of the paper are as follows:
Figure 2: Schematic of the LCIT-GSM system model, where the number of
activated TAs is a variable that carries source information.
* •
First of all, a LCIT-GSM scheme is proposed for improving the throughput by
activating a variable number $N_{a}$ of activated TAs, while reducing the
complexity of the mapping design. More specifically, we introduce three
spatial mapping arrangements that incorporate all the legitimate TA activation
patterns. The first two of them are motivated by the so-called depleted
molecule shift keying (MoSK) scheme of [27]. In order to accommodate the
special case of all-zeros in the bitstream that may result in no TA being
activated and hence no modulated symbols being transmitted, we conceive
specifically designed mapping arrangements for both SM and the classic APSK
modulation. This is in contrast to the MoSK regime of [27], where the all-zero
state of the nano-transmitter is directly exploited to convey information bits
in the context of SSK-based molecular communication. Furthermore, a look-up
table (LUT) based spatial mapping scheme similar to [36, 49] is also included
in order to demonstrate the advantages of the proposed low-complexity
detectors.
* •
Secondly, in the absence of IAI in the LCIT-GSM mapping, we propose a pair of
low-complexity detectors based on the classical maximum likelihood detector
(MLD). Explicitly, a two-step near-maximum likelihood detector (TMLD) is
derived, which substantially reduces the size of the legitimate set to be
searched. Furthermore, a decoupling based maximum likelihood detector (DMLD)
is conceived for decoupling a two-dimensional joint search into a pair of one-
dimensional single-stream based searches, while maintaining the optimal
detection performance.
* •
Thirdly, based on the prior work of _Haas et al._ [51], we derive a tighter
performance upper bound (UB) for the proposed LCIT-GSM system. Explicitly, the
improved performance bound is composed of three parts, which respectively
reflect the impacts of the LCIT-GSM scheme’s signal constellation diagram,
spatial constellation diagram and their interactions. Finally, our Monte Carlo
based simulation results confirm the improved spectral efficiency (SE),
reduced signal detection complexity and the improved BEP performance of our
proposed LCIT-GSM scheme compared to conventional GSM scheme [39] and VGSM
scheme [36, 49].
The rest of this paper is structured as follows. Section II presents the
improved LCIT-GSM system model and spatial mapping schemes. Following this,
our detection algorithms are conceived in Section III. Section IV analyses the
theoretical BEP and computational complexity of the LCIT-GSM system, while the
BEP performance of our LCIT-GSM systems is presented in Section V. Finally,
our conclusions are offered in Section VI.
_Notation:_ We use upper (lower) bold face letters to indicate matrices
(column vectors). ${\left(\cdot\right)^{T}}$, ${\left(\cdot\right)^{H}}$ and
${\left(\cdot\right)^{*}}$ represent the transpose, Hermitian transpose and
conjugate, respectively. $E\left\\{\cdot\right\\}$ stands for the expected
value. $\left\|\cdot\right\|$ is the Frobenius norm of a complex vector.
$\otimes$ represents the Kronecker product. We denote the $N\times N$ identity
matrix as ${{\bf{I}}_{N}}$. ${\bf{0}}$ and ${\bf{1}}$ denote an all-zero
vector and an all-one vector, respectively, with appropriate dimensions.
Furthermore, $\left\lfloor\cdot\right\rfloor$ and
$\left\lfloor\cdot\right\rceil$ represent the floor and rounding operation,
respectively. The $\log\left(\cdot\right)$ functions are base-2 by default.
$C_{n}^{k}$ denotes the number of combinations of taking $k$ out of $n$.
${{\mathcal{M}}_{\gamma}}\left(t\right)=E\left\\{{\exp\left({-\gamma
t}\right)}\right\\}$ is the moment generating function (MGF) of the random
variable $\gamma$.
$Q\left(x\right)=\frac{1}{\sqrt{2\pi}}{\int}_{x}^{+\infty}exp\left(\frac{-{t}^{2}}{2}\right)dt$
is the Q-function. $\angle\left(z\right)$ denotes the phase angle of a complex
number $z$. $\Re\left(z\right)$ and $\Im\left(z\right)$ denote the real and
imaginary part of a complex number $z$, respectively.
## II System Model
### II-A LCIT-GSM Transmission
The LCIT-GSM system model is depicted in Fig. 2. The incoming data bits are
first grouped into $m={m_{s}}+{m_{a}}$ bits. Following this, the grouped block
of bits ${{\bf{b}}^{T}}$ is split into $m_{s}$ spatial bits ${\bf{b}}_{s}^{T}$
and $m_{a}$ APSK modulated symbol bits ${\bf{b}}_{a}^{T}$, i.e.,
${{\bf{b}}^{T}}=\left[{\left.{{\bf{b}}_{s}^{T}}\right|{\bf{b}}_{a}^{T}}\right]$.
The first $m_{s}$ spatial bits are assigned to select the TA activation
pattern following the spatial mapping procedures, which will be detailed in
Section II-B. We note that only a reduced number of TAs are activated at any
time. The remaining $m_{a}$ bits are modulated using APSK, such as $M$-PSK or
$M$-QAM, where the modulation order is given by $M={2^{{m_{a}}}}$.
In contrast to the classic GSM, which activates a fixed number of TAs at each
slot, the number of activated TAs in the LCIT-GSM scheme is variable [36, 49].
This constitutes the most distinguished benefit of the LCIT-GSM design, where
the maximum throughput is pursued by utilizing all legitimate TA activation
patterns. The total number $N_{m}$ of all legitimate TA activation patterns is
given by:
${N_{m}}=\mathop{C_{{N_{t}}}^{0}}\limits_{----}+C_{{N_{t}}}^{1}+C_{{N_{t}}}^{2}+\cdots+C_{{N_{t}}}^{{N_{t}}}=2^{N_{t}},$
(1)
where the underlined $C_{{N_{t}}}^{0}$ corresponds to the spatial bit sequence
having all zeros.
Figure 3: The number $m_{s}$ of spatial bits versus the number $N_{t}$ of TAs
for SM, GSM, and LCIT-GSM, where we have a fixed number ${N_{a}}=2$ of
activated TAs for GSM.
However, it should be noted that the spatial bitstream with all zeros in LCIT-
GSM, i.e., ${\bf{b}}_{s}^{T}={\bf{0}}$ cannot transmit an APSK symbol carrying
$m_{a}$ bits, hence it must be avoided. This problem will be addressed in
Section II-B. If the case corresponding to ${\bf{b}}_{s}^{T}={\bf{0}}$ is
eliminated, only $\left({{N_{m}}-1}\right)$ TA activation patterns remain
legitimate. Bearing in mind that the number of TA activation patterns that
convey $m_{s}$ source bits must be a power of two, the maximum value of
${m_{s}}$ becomes111We note that $m_{s}$ is increased beyond the limit of (2)
by the first of our spatial mapping schemes proposed in Section II-B, namely
in DTAA-R, where we have $m_{s}=\log\left(2^{N_{t}}\right)=N_{t}$. The absence
of the all-zero activation pattern is compensated by the transformation of the
signal constellation, which ensures maintaining the maximum transmission rate
combined with the low complexity of the direct bit-to-antenna mapping scheme.
In this subsection, we assume that $\left({{N_{t}}-1}\right)$ spatial bits are
conveyed.
${m_{s}}=\left\lfloor{\log\left({{N_{m}}-1}\right)}\right\rfloor=\left\lfloor{\log\left({2^{N_{t}}-1}\right)}\right\rfloor={N_{t}}-1.$
(2)
In summary, the total number of source bits conveyed by the LCIT-GSM design is
given by
$m={m_{a}}+{m_{s}}=\log M+{N_{t}}-1,$ (3)
which is evidently higher than that of GSM given by $\log M+\left\lfloor\log
C_{{N_{t}}}^{{N_{a}}}\right\rfloor$, where $N_{a}$ is the number of RF chains.
Fig. 3 compares the number $m_{s}$ of spatial bits versus the number $N_{t}$
of TAs, for using GSM and LCIT-GSM, where the case of SM is portrayed as a
special case of GSM associated with ${N_{a}}=1$. It can be seen that when
$m_{s}=4$ spatial bits are transmitted, $N_{t}=4$ is needed for LCIT-GSM. For
the same throughput, the GSM scheme would require an increased value of
$N_{t}=6$, while the SM scheme requires a further increased value of
$N_{t}=16$, as demonstrated by Fig. 3.
_Remark 1:_ We note that, first of all, the number of spatial bits in LCIT-GSM
increases with the number of RF chains. By contrast, in GSM, the number of
spatial bits decreases when $N_{a}$ is increased beyond
$\left\lfloor\frac{N_{t}}{2}\right\rfloor$ [39]. Although we directly
introduce LCIT-GSM as having $N_{t}$ RF chains, hence exhibiting the maximum
throughput improvement, it must be mentioned that our system is also eminently
suitable for a limited number of RF chains. Secondly, we note that the same
APSK symbol is transmitted by all activated TAs in order to retain the IAI-
free feature. Finally, similar to the GSM scheme’s combination with STBC and
V-BLAST [52, 43], the proposed LCIT-GSM can also be combined with the classic
MIMO schemes for the sake of striking further trade-offs between throughput,
complexity and diversity, which is left for future work.
In the LCIT-GSM system, the transmit signal is modelled by a ${N_{t}}\times 1$
column vector $\bf{x}$, which is transmitted over an ${N_{t}}\times{N_{r}}$
MIMO Rayleigh flat fading wireless channel,
${\bf{H}}=[{{{\bf{h}}_{1}}}\quad{{{\bf{h}}_{2}}}\quad\cdots\quad{{{\bf{h}}_{{N_{t}}}}}]$,
where ${{\bf{h}}_{k^{\prime}}}$ is the $k^{\prime}$-th column of $\bf{H}$ that
represents the channel vector of the link spanning from the $k^{\prime}$-th TA
to all of $N_{r}$ receive antennas (RAs). The entries of ${\bf{H}}$ are
generated by complex independent and identically distributed (i.i.d.) Gaussian
random variables having zero-mean and unit-variance.
Figure 4: (a) DTAA-R mapping scheme: The $i$-th spatial bit controls the
on/off state of the $i$-th TA, where $1\leq i\leq 3$. For the special case of
’000’, all the three TAs are activated, while the $M$-PSK/QAM symbol is
rotated according to (7) or (8); (b) DTAA-D mapping scheme: The $i$-th spatial
bit controls the on/off state of the $i$-th TA, where $1\leq i\leq 3$. The
4-th TA is only activated when the spatial bitstream of ’000’ is encountered;
(c) LUT mapping scheme: The combination book selects the active TAs based on
the current spatial bitstream, which uses a mapping design similar to the VGSM
of [36, 49].
Finally, the signal ${\bf{y}}$ received at any symbol instant is given by
${\bf{y}}={\bf{Hx}}+{\bf{n}}={{\bf{h}}_{{{\mathcal{S}}_{k}}}}s+{\bf{n}},$ (4)
where $s\in M$-APSK is the modulated $M$-PSK/QAM symbol222We note that in the
first of the proposed bit-to-symbol mapping schemes detailed in Section II-B,
namely in DTAA-R, $s$ represents the rotated PSK/QAM symbol when the all-zero
spatial bitstream is encountered., while $\mathcal{S}_{k}$ is the $k$-th TA
activation combination associated with
$k\in\left\\{{1,2,\cdots,{2^{N_{t}-1}}}\right\\}$. The mapping mechanism of
$\left\\{{{\mathcal{S}_{1}},{\mathcal{S}_{2}},\cdots,{\mathcal{S}_{{2^{N_{t}-1}}}}}\right\\}$
will be detailed in Section II-B. Furthermore, the channel vector can be
expressed as
${{\bf{h}}_{{\mathcal{S}_{k}}}}=\sum\limits_{k\in{\mathcal{S}_{k}}}{{{\bf{h}}_{k}}},$
(5)
which is the summation of all channel vectors corresponding to the $k$-th TA
activation patterns. Moreover, ${\bf{n}}$ in (4) is an AWGN vector associated
with zero-mean and variance of $\sigma_{n}^{2}$ in each dimension at the
receiver.
### II-B LCIT-GSM spatial mapping scheme
In this subsection, we will introduce three spatial mapping arrangements for
LCIT-GSM systems, which are: _1)_ direct TA activation relying on
constellation rotation (DTAA-R), _2)_ direct TA activation relying on a
dedicated TA (DTAA-D) and _3)_ LUT-based spatial mapping (LUT). More
specifically, DTAA-R and DTAA-D are the improved schemes of the bitwise
activation scheme of the MoSK [27], while LUT uses the same mapping design as
VGSM of [36, 49], which we include in order to share the low-complexity
detectors proposed in Section III.
1) DTAA-R: The motivation of the DTAA-R scheme is to establish a direct
mapping between the spatial bits and the TA activation pattern, which does not
require a large LUT. The simplest way of implementing this is to assign each
spatial bit to independently control the on/off state of the TAs, as portrayed
in Fig. 4 (a). Explicitly, the spatial bit-pattern ‘101’ activates the upper-
and lower-most TAs and the ‘0’ bit in the fourth position of the box is BPSK-
modulated onto both active TAs. The TA in the middle is deactivated. However,
as mentioned before, when all spatial bits of $b_{s}$ are zeros, no TAs are
activated to transmit the classic $M$-PSK/QAM symbol, which constitutes a
challenge in our DTAA-R design. In order to solve this problem, we propose the
following revised DTAA-R mapping rule:
$\left\\{{\begin{array}[]{*{20}{l}}{{{\bf{b}}_{s}}^{T}\neq{\bf{0}}\Leftrightarrow{\bf{x}}={\bf{b}}_{s}\times
s}\\\ {{{\bf{b}}_{s}}^{T}={\bf{0}}\Leftrightarrow{\bf{x}}={\bf{1}}\times
T\left(s\right)},\end{array}}\right.$ (6)
where ${\bf{1}}$ is a ${N_{t}}\times 1$ column vector of ones. In this way,
all TAs are activated, when the spatial bits are all zeros. Moreover, owing to
the fact that the TA activation pattern corresponding to
$\mathbf{b}_{s}^{T}=\mathbf{0}$ becomes exactly the same as in the case of
$\mathbf{b}_{s}^{T}=\mathbf{1}$, we propose to apply a transformation
$T\left(\cdot\right)$ to the APSK constellation.
More explicitly, for an $M$-PSK symbol, a simple phase rotation is applied to
the APSK symbol, when all the TAs are activated for
$\mathbf{b}_{s}^{T}=\mathbf{0}$, which can be expressed as:
$T_{PSK}\left(s\right)={e^{j\frac{\pi}{M}}}\cdot s.$ (7)
TABLE II: LCIT-GSM mapping table for DTAA-R, DTAA-D, LUT, respectively, where
$\left({\cdot,\cdot}\right)$ indicates the indices of the active TAs, while
$N_{t}=\left\\{3,4\right\\}$, $m_{s}=3$ and $m_{a}=1$ are assumed∗.
Input Bits | DTAA-R with ${N_{t}}=3$ | DTAA-D with ${N_{t}}=4$ | LUT with ${N_{t}}=4$
---|---|---|---
TA Activation Pattern | Symbol | TA Activation Pattern | Symbol | TA Activation Pattern | Symbol
0000 | (1,2,3) | _i_ | (4) | -1 | (1) | -1
0001 | (1,2,3) | _-i_ | (4) | 1 | (1) | 1
0010 | (3) | -1 | (3) | -1 | (2) | -1
0011 | (3) | 1 | (3) | 1 | (2) | 1
0100 | (2) | -1 | (2) | -1 | (3) | -1
0101 | (2) | 1 | (2) | 1 | (3) | 1
0110 | (2,3) | -1 | (2,3) | -1 | (4) | -1
0111 | (2,3) | 1 | (2,3) | 1 | (4) | 1
1000 | (1) | -1 | (1) | -1 | (1,2) | -1
1001 | (1) | 1 | (1) | 1 | (1,2) | 1
1010 | (1,3) | -1 | (1,3) | -1 | (3,4) | -1
1011 | (1,3) | 1 | (1,3) | 1 | (3,4) | 1
1100 | (1,2) | -1 | (1,2) | -1 | (1,3) | -1
1101 | (1,2) | 1 | (1,2) | 1 | (1,3) | 1
1110 | (1,2,3) | -1 | (1,2,3) | -1 | (2,4) | -1
1111 | (1,2,3) | 1 | (1,2,3) | 1 | (2,4) | 1
∗Although we use a table here to describe the three mapping schemes, it is
worth noting that the proposed mapping schemes of DTAA-R and DTAA-D can be
readily extended to large-scale antenna arrays, which is challenging for LUT
with the same design as [36, 49].
By contrast, when $M$-QAM is employed instead of $M$-PSK, the phase rotation
of (7) no longer maximises the distance in the constellation. Instead, we
propose the following transformation:
${T_{QAM}}\left(s\right)={e^{j\frac{\pi}{{{M_{n}}}}}}\cdot s,$ (8)
where
${M_{n}}=\max\left\\{{count\left({\left|{{s_{i}}}\right|=\left|\chi\right|}\right)}\right\\}$
for $i\in[1,M]$, while $count\left(\cdot\right)$ represents the number of
occurrences of the event in parentheses, with $\left|\chi\right|$ representing
the set of magnitudes of all QAM constellation points. For example, when the
normalised 16QAM constellation is adopted, we have
$\left|\chi\right|=\left\\{\frac{1}{\sqrt{5}},1,\frac{3}{\sqrt{5}}\right\\}$,
yielding $a_{1}=count\left(\left|s_{i}\right|=\frac{1}{\sqrt{5}}\right)=4$,
$a_{2}=count\left(\left|s_{i}\right|=1\right)=8$ and
$a_{3}=count\left(\left|s_{i}\right|=\frac{3}{\sqrt{5}}\right)=4$. Therefore,
${M_{n}}=8$ is obtained according to (8). Following the same philosophy, we
have ${M_{n}}=12$ for 64QAM.
We note that although the special case of the all-zero spatial bitstream is
used for activating all TAs, other legitimate TA activation patterns that
contain at least one activated TA can also be readily chosen for the special
case in (6), provided that the modulated symbol for the chosen pattern is
rotated according to (7) and (8).
Again, the DTAA-R scheme is exemplified in Fig. 4 (a), where we have
${N_{t}}=3$ TAs and BPSK modulation. More explicitly, let us revisit Fig. 4
(a) a bit more formally, where the first $m_{s}=3$ bits are mapped to the TA
activation pattern, while the remaining $m_{a}=1$ bit modulates a BPSK symbol.
The full set of TA activation patterns is summarised in Table II. For example,
the bit sequence of $\mathbf{b}^{T}=[1\quad 0\quad 1\quad|0]$ results in the
TA activation pattern of $\left(1,3\right)$ and the BPSK symbol of $-1$, as
seen in Table II, which results in the transmitted signal vector of
$\mathbf{x}=[-1\quad 0\quad-1]^{T}$. Moreover, when the special case of the
all-zero spatial bitstream is encounted, the bit sequence of
$\mathbf{b}^{T}=[0\quad 0\quad 0\quad|1]$ is mapped to the TA activation
pattern of $\left(1,2,3\right)$ and to the rotated BPSK symbol $-i$, as shown
in Table II, which leads to the transmitted signal vector of
$\mathbf{x}=[-i\quad-i\quad-i]^{T}$ in Fig. 4 (a).
2) DTAA-D: Instead of applying a phase rotation to the APSK constellation, in
this section, we propose the DTAA-D mapping method, which assigns a dedicated
TA to be uniquely turned on only for the all-zero spatial bitstream. As a
result, the on/off states of the $\left(N_{t}-1\right)$ TAs are decided by the
$\left(N_{t}-1\right)$ non-all-zero spatial bits of Fig. 4 (b) and of Table II
without any ambiguity, hence eliminating the dependence of the DTAA-R scheme
on the constellation rotation of (7) and (8). More explicitly, the DTAA-D
mapping rule is defined by
$\left\\{{\begin{array}[]{*{20}{l}}{{{\bf{b}}_{s}^{T}}\neq{\bf{0}}\Leftrightarrow{\bf{x}}={{\left[{\begin{array}[]{*{20}{c}}{{\bf{b}}_{s}^{T}}&0\end{array}}\right]}^{T}}\times
s}\\\
{{{\bf{b}}_{s}^{T}}={\bf{0}}\Leftrightarrow{\bf{x}}={{\left[{\begin{array}[]{*{20}{c}}{{{\bf{0}}_{\left({{N_{t}}-1}\right)\times
1}^{T}}}&1\end{array}}\right]}^{T}}\times s}.\end{array}}\right.$ (9)
Therefore, the last TA of Fig. 4 (b) is activated for the special case of
${\bf{b}}_{s}^{T}={\bf{0}}$.
Again, the DTAA-D arrangement is exemplified in Fig. 4 (b), where the incoming
data bits are also divided into two parts: a spatial bit sequence
${{\bf{b}}_{s}^{T}}$ and a data bit sequence ${{\bf{b}}_{a}^{T}}$. We note
that ${N_{t}}=4$, $m_{s}=3$, and $m_{a}=1$ are assumed in Fig. 4 (b), and the
corresponding TA activation patterns are also summarised in Table II.
Specifically, based on Fig. 4 (b) and Table II, the information bit sequence
of ${\bf{b}}^{T}=[1\quad 0\quad 1\quad|0]$ is transmitted as
${\bf{x}}={[{-1}\quad 0\quad{-1}\quad 0]^{T}}$. However, based on (9), the bit
sequence of ${\bf{b}}^{T}=[0\quad 0\quad 0\quad|1]$ is mapped to
$\mathbf{x}=[0\quad 0\quad 0\quad 1]^{T}$, as seen in Table II, which avoids
the constellation rotation of $-i$ seen in the DTAA-R example. We will
demonstrate in Section V that as the benefit of eliminating the DTAA-R
scheme’s constellation rotation, the pairwise error probability is increased
by the DTAA-D scheme. Nonetheless, we note that this arrangement does not
compromise the LCIT-GSM throughput, since a total of $\left(N_{t}-1\right)$
spatial bits are transmitted by $N_{t}$ TAs, which is in line with (2).
3) LUT333We note that LUT uses the same mapping design as the VGSM of [36,
49], and we include it here in order to share the low complexity detectors
proposed in Section III.: The DTAA-D arrangement is capable of achieving the
full LCIT-GSM throughput without any constellation rotation, but
unfortunately, the distance between the legitimate TA activation patterns has
not been maximised. More explicitly, according to (1), there are a total of
$\left(2^{N_{t}}-1\right)$ legitimate TA activation patterns, where the case
of deactivating all TAs is eliminated. However, it can be seen in (2) that
only $2^{N_{t}-1}$ TA activation patterns are needed. Against this background,
the LUT arrangement is introduced to further optimize the DTAA-D scheme’s
spatial constellation, but suffer from the high complexity of the mapping
design [36, 49].
Specifically, for the case of $N_{t}=4$, there are a total of $2^{N_{t}}-1=15$
possible TA activation patterns, which is constituted by $C_{4}^{1}=4$,
$C_{4}^{2}=6$, $C_{4}^{3}=4$ and $C_{4}^{4}=1$ according to (1). Nonetheless,
only $2^{N_{t}-1}=8$ TA activation patterns are needed. Therefore, the first
rule of LUT is to prioritize the TA activation patterns with smaller number
$N_{a}$ of activated TAs. For example, the TA activation patterns that only
activate a single TA out of $N_{t}=4$ result in the transmitted signal vectors
of
$\mathbf{x}^{T}=\left\\{\left[s,0,0,0\right],\left[0,s,0,0\right],\left[0,0,s,0\right],\left[0,0,0,s\right]\right\\}$,
where the TA activation pattern always differs in the maximum possible number
of 4 positions. Following this, for the TA activation patterns associated with
the same $N_{a}$, the pairs that have the highest possible number of different
activated TA positions are chosen. For example, after admitting the
$C_{4}^{1}=4$ combinations associated with a single activated TA, we still
need $2^{N_{t}-1}-C_{4}^{1}=4$ patterns out of the $C_{4}^{2}=6$ combinations
associated with $N_{a}=2$ activated TAs. Hence, the TA activation pattern
pairs of $\left(1,2\right)$ and $\left(3,4\right)$ are chosen, which always
differ in the maximum possible number of 4 positions. Similarly, the pair of
$\left(1,3\right)$ and $\left(2,4\right)$ are subsequently chosen. Although
$\left(1,2\right)$ and $\left(1,3\right)$ now only differ in 3 activated TA
positions, we have ensured that the maximally separated pairs are used.
In summary, the LUT arrangement is exemplified in Fig. 4 (c) for the case of
$N_{t}=4$, $m_{t}=3$ and $m_{a}=1$, where the list of TA activation patterns
is also presented in Table II. The LUT mapping may be represented by
${{\bf{b}}_{s}^{T}}\Leftrightarrow{\bf{x}}=\mathrm{U}\left({{{\bf{b}}_{s}}}\right)\times
s,$ (10)
where $\mathrm{U}\left(\cdot\right)$ returns a column vector having entries of
$0$ or $1$, and the above LUT mapping rules ensure that the binary vectors
$\left\\{\mathrm{U}\left(\mathbf{b}_{s}\right)\right\\}_{\forall\mathbf{b}_{s}}$
have the maximum possible Hamming distance.
## III Signal Detection
In this section, we proceed to devise low-complexity signal detectors for the
LCIT-GSM receiver. We first consider the optimal MLD in Section III-A,
followed by a pair of reduced-complexity detectors in Sections III-B and
III-C, respectively.
### III-A Maximum Likelihood Detection
From the detector’s perspective, let us represent the tentative transmitted
signal vector as ${{\bf{x}}_{k,l}}$, where the subscript $k$ denotes the
$k$-th TA activation pattern444Note that the subscript $k$ represents the
$k$-th TA activation pattern, not the $k$-th TA in SM. The number of active
TAs is variable and determined by the $k$-th TA activation pattern., while the
subscript $l$ denotes the $l$-th $M$-PSK/QAM symbol. We assume that perfect
channel knowledge is available for the receiver. As a result, the MLD finds
the estimate of $\bf{x}$ by performing a full search over all legitimate
indices $k$ and $l$ formulated as [53]:
$\begin{split}\left[{\hat{k}_{MLD},\hat{l}_{MLD}}\right]&=\mathop{\arg\max}\limits_{k,l}{p_{\bf{y}}}\left({\left.{\bf{y}}\right|{{\bf{x}}_{k,l}},{\bf{H}}}\right)\\\
&=\mathop{\arg\min}\limits_{k,l}{\left\|{{\bf{y}}-{\bf{H}}{{\bf{x}}_{k,l}}}\right\|^{2}}\\\
&=\mathop{\arg\min}\limits_{k,l}\left\|\mathbf{y}-\mathbf{g}_{k}s_{l}\right\|^{2},\end{split}$
(11)
where the probability density function (PDF) of ${\bf{y}}$ conditioned on
${{{\bf{x}}_{k,l}}}$ and ${\bf{H}}$ is given by:
${p_{\bf{y}}}\left({\left.{\bf{y}}\right|{{\bf{x}}_{k,l}},{\bf{H}}}\right)=\frac{1}{{{{\left({\pi\sigma_{n}^{2}}\right)}^{{N_{r}}}}}}\exp\left({-\frac{{{{\left\|{{\bf{y}}-{\bf{H}}{{\bf{x}}_{k,l}}}\right\|}^{2}}}}{{\sigma_{n}^{2}}}}\right),$
(12)
${s_{l}}$ represents the $l$-th symbol of the constellation, and
$\mathbf{g}_{k}$ is the $k$-th column of the equivalent $N\times{N_{r}}$ LCIT-
GSM channel matrix $\mathbf{G}$ from the perspective of the APSK symbol, where
we have $N={2^{{N_{t}}}}$ for DTAA-R and $N={2^{{N_{t}}-1}}$ for DTAA-D and
LUT. In summary, the equivalent channel matrix $\mathbf{G}$ is defined as
follows
$\left\\{{\begin{array}[]{*{20}{l}}\mathbf{G}_{DTAA-R}=\begin{bmatrix}\mathbf{H}\mathbf{b}_{s,1}&\cdots&\mathbf{H}\mathbf{b}_{s,N-1}&\mathbf{H}\mathbf{1}e^{j\frac{\pi}{M_{n}}}\end{bmatrix}\\\
\mathbf{G}_{DTAA-D}=\begin{bmatrix}\mathbf{H}\begin{bmatrix}\mathbf{b}_{s,1}\\\
0\par\end{bmatrix}&\cdots&\mathbf{H}\begin{bmatrix}\mathbf{b}_{s,N-1}\\\
0\par\end{bmatrix}&\mathbf{H}\begin{bmatrix}\mathbf{0}\\\
1\par\end{bmatrix}\end{bmatrix}\\\
\mathbf{G}_{LUT}=\begin{bmatrix}\mathbf{H}\mathrm{U}\left(\mathbf{b}_{s,0}\right)&\mathbf{H}\mathrm{U}\left(\mathbf{b}_{s,1}\right)&\cdots&\mathbf{H}\mathrm{U}\left(\mathbf{b}_{s,N-1}\right)\end{bmatrix},\end{array}}\right.$
(13)
where $M_{n}=M$ for $M$-PSK, and ${\bf{b}}_{s,0}=\bf{0}$ denotes the spatial
bitstream with all zeros, while ${\bf{b}}_{s,1},\cdots,{\bf{b}}_{s,N-1}$
denote the other spatial bitstreams.
As a result, it can be readily seen from (11) that the LCIT-GSM system is now
equivalent to an SM system with $N$ TAs, where all of the three mapping
arrangements of DTAA-R, DTAA-D and LUT have the same detector structure.
### III-B Two-stage near-Maximum Likelihood Detection
The MLD has to jointly search through $N$ TA activation patterns and $M$
symbols, hence its complexity order is given by
$\mathcal{O}\left({MN}\right)$, which grows exponentially both with the number
$N_{t}$ of TAs and number $m_{s}$ of modulated bits. In this section, we
conceive the low-complexity two-stage near-MLD (TMLD) scheme, which is similar
to the massive MIMO detector of [54] and to the sphere decoder of [55]. This
two-stage TMLD first detects the modulated symbol index $l$ from the reduced
search space as follows:
${\hat{l}}=\mathop{\arg\min}\limits_{l}\left\|\mathbf{y}-\mathbf{h}_{k^{\prime}}s_{l}\right\|^{2}.$
(14)
We note that the range of $k^{\prime}$ is given by
$k^{\prime}\in\left\\{{1,2,\cdots,{N_{t}}}\right\\}$, which is reduced from
$k\in\left\\{1,2,\cdots,N\right\\}$.
Then, the TMLD relaxes the range of $l$ appropriately based on the estimated
${\hat{l}}$, which means several $l$ values can be selected based on (14),
instead of a single ${\hat{l}}$, since a single one would unlikely to be the
globally optimal one. Therefore, TMLD defines the reduced candidate set of $l$
using ${\hat{l}}$ in (14) as
${\chi_{TMLD}}=\left\\{{\left.l\right|\frac{\left\|\mathbf{y}-\mathbf{h}_{k^{\prime}}s_{l}\right\|^{2}}{\left\|\mathbf{y}-\mathbf{h}_{k^{\prime}}s_{\hat{l}}\right\|^{2}}\leq
c}\right\\},$ (15)
where $c\geq 1$ is a constant that controls the size of the set
${\chi_{TMLD}}$.
Following this, the second stage of TMLD is performed based on (11) as:
$\left[{\hat{k}_{TMLD},\hat{l}_{TMLD}}\right]=\mathop{\arg\min}\limits_{k,l\in\chi_{TMLD}}\left\|\mathbf{y}-\mathbf{g}_{k}s_{l}\right\|^{2}.$
(16)
The MLD guarantees that the solution is optimal by searching through all the
elements in the available set. By contrast, TMLD searches for $k$ and $l$ in a
reduced region by relaxing the rough estimate of $l$, which is similar to the
sphere decoding philosophy of [55, 56]. When $c$ is infinite, TMLD becomes
equivalent to MLD.
### III-C Decoupling Based Maximum Likelihood Detection
In this subsection, we propose the novel decoupling based MLD (DMLD), which
firstly obtains the optimum modulation indices for all TA activation pattern
candidates and then detects the optimal TA activation pattern with the aid of
the demodulated $M$-APSK symbol. More explicitly, for each tentative TA
combination index $k$, the LCIT-GSM detection in (11) can be simplified to
$\begin{split}{\hat{l}_{k}}&=\mathop{\arg\min}\limits_{l}\left\\{{\left\|{\mathbf{g}}_{k}\right\|}^{2}{s}_{l}-2\Re\left\\{{s}_{l}^{*}{\mathbf{g}}_{k}^{H}\mathbf{y}\right\\}\right\\}\\\
&=\mathop{\arg\min}\limits_{l}\left\\{{\left|{s}_{l}-{p}_{k}\right|}^{2}-{\left|{p}_{k}\right|}^{2}\right\\}\\\
&=\mathop{\arg\min}\limits_{l}\left\\{{\left|{s}_{l}-{p}_{k}\right|}^{2}\right\\},\end{split}$
(17)
where the demodulator’s decision variable is given by
${p}_{k}=\frac{{\mathbf{g}}_{k}^{H}\mathbf{y}}{{\left\|{\mathbf{g}}_{k}\right\|}^{2}}$.
In this way, the optimum modulated symbol index $\hat{l}_{k}$ associated with
all TA activation indices may be directly obtained by demapping $p_{k}$ to the
closest constellation point, assuming that a regular APSK constellation is
used.
When $M$-PSK is employed, the demodulation of (17) may be performed by
rounding the phase of the decision variable to the nearest $M$-PSK index as
[57]555In DMLD, we estimate $s$ instead of its index, since $s$ can be
directly obtained by the rounding operation.
$\hat{s}_{k}=\exp\left\\{j\left[\frac{\pi}{2}\left\lfloor\left(\angle{p}_{k}-\phi_{0}\right)\frac{2}{\pi}\right\rceil+\phi_{0}\right]\right\\},$
(18)
where $\phi_{0}$ is the phase of the first $M$-PSK symbol associated with all-
zero bits.
Similarly, as shown in [57, 58], the QAM constellation may be decoupled into
two real-valued APSK signal sets as $s={s}_{I}+j{s}_{Q}$. Since ${s}_{I}$ and
${s}_{Q}$ are from orthogonal dimensions, we have
$\hat{l}_{k}=\underset{l}{\arg\min}\left[\left(s_{I}-\Re\left(p_{k}\right)\right)^{2}+\left(s_{Q}-\Im\left(p_{k}\right)\right)^{2}\right],$
(19)
which may be further decoupled into
$\Re\left(\hat{s}_{k}\right)=\min\left[\max\left(2\left\lfloor\frac{\alpha\Re\left(p_{k}\right)+1}{2}\right\rceil-1,-M+1\right),M-1\right],$
(20)
and
$\Im\left(\hat{s}_{k}\right)=\min\left[\max\left(2\left\lfloor\frac{\alpha\Im\left(p_{k}\right)+1}{2}\right\rceil-1,-M+1\right),M-1\right].$
(21)
We note that
$\alpha=\sqrt{\frac{\sum_{m=0}^{\frac{\sqrt{M}}{2}-1}\left(\sqrt{M}-2m-1\right)^{2}}{\frac{\sqrt{M}}{4}}}$
is the normalization factor of the QAM constellation that yields
$\hat{s}_{k}=\frac{1}{\alpha}\left[\Re\left(\hat{s}_{k}\right)+\Im\left(\hat{s}_{k}\right)\right]$
and ensures unity average symbol power [57, 58].
From (18), (20) and (21) we obtain the total number $N$ of demodulated symbols
$S_{min}=\left\\{\hat{s}_{1},\hat{s}_{2},\cdots,\hat{s}_{N}\right\\}$
associated with the $N$ hypotheses, for all $1\leq k\leq N$. Thus, we have
$\begin{split}\left[\hat{k}_{DMLD},\hat{s}_{DMLD}\right]&=\underset{k,s}{\arg\min}\left\|\mathbf{y}-\mathbf{g}_{k}s_{l}\right\|^{2}\\\
&=\underset{k}{\arg\min}\left\|\mathbf{y}-\mathbf{g}_{k}\hat{s}_{k}\right\|^{2}.\end{split}$
(22)
Once ${\hat{k}_{DMLD}}$ is estimated, we have
${\hat{s}_{DMLD}}={\hat{s}_{{{\hat{k}}_{DMLD}}}}$, which is the
${\hat{k}_{DMLD}}$-th element of $S_{min}$.
The DMLD’s complexity order does not grow with the number $M$ of modulation
levels, which constitutes the most appealing advantages of the optimal LCIT-
GSM detection, especially when employing high-order $M$-PSK/QAM schemes. More
importantly, the DMLD of (17)-(22) substantially reduces the detection
complexity without imposing any performance loss on the MLD of (11).
## IV Performance Analysis
In this section, we present analytical results for characterising the error
performance of the uncoded LCIT-GSM system, where the MLD is assumed to obtain
the optimal reference bound666We note that the theoretical performance bounds
are different for different detectors. Here we derive the ultimate theoretical
bound for the MLD.. A tight UB on the BEP is derived. Additionally, we also
analyze the computational complexity of the proposed LCIT-GSM detectors.
### IV-A Uncoded Performance
#### IV-A1 Classic Union Bound
First of all, the analytical performance of our LCIT-GSM system is evaluated
using the well-known union bounding technique. The average BEP of LCIT-GSM is
given by:
$P_{b}\leq\frac{1}{MN}\sum_{k=1}^{N}\sum_{l=1}^{M}\sum_{\tilde{k}=1}^{N}\sum_{\tilde{l}=1}^{M}N\left(\mathbf{x}_{k,l}\rightarrow\mathbf{x}_{\tilde{k},\tilde{l}}\right)P\left(\mathbf{x}_{k,l}\rightarrow\mathbf{x}_{\tilde{k},\tilde{l}}\right),$
(23)
where $\mathbf{x}_{k,l}$ indicates the symbol $s_{l}$ transmitted using the
$k$-th TA activation pattern, while
$N\left(\mathbf{x}_{k,l}\rightarrow\mathbf{x}_{\tilde{k},\tilde{l}}\right)$ is
the number of bits in error between $\mathbf{x}_{k,l}$ and
$\mathbf{x}_{\tilde{k},\tilde{l}}$, and
$P\left(\mathbf{x}_{k,l}\rightarrow\mathbf{x}_{\tilde{k},\tilde{l}}\right)$
denotes the probability of deciding on $\mathbf{x}_{\tilde{k},\tilde{l}}$,
given that $\mathbf{x}_{k,l}$ is transmitted.
Following this, the probability
$P\left(\mathbf{x}_{k,l}\rightarrow\mathbf{x}_{\tilde{k},\tilde{l}}\right)$
can be computed by using (12) as follows
$\begin{split}P\left(\mathbf{x}_{k,l}\rightarrow\mathbf{x}_{\tilde{k},\tilde{l}}\right)&=P\left(\left\|\mathbf{y}-{\bf{g}}_{k}s_{l}\right\|^{2}>\left\|\mathbf{y}-{\bf{g}}_{\tilde{k}}s_{\tilde{l}}\right\|^{2}\right)\\\
&=Q\left(\sqrt{\frac{1}{2\sigma_{n}^{2}}\left\|{\bf{g}}_{k}s_{l}-{\bf{g}}_{\tilde{k}}s_{\tilde{l}}\right\|^{2}}\right).\end{split}$
(24)
According to Eq. (14-4-15) in [59], we obtain
$\displaystyle{P_{b}}$
$\displaystyle\leq\frac{1}{{MN}}\sum\limits_{k=1}^{N}{\sum\limits_{l=1}^{M}{\sum\limits_{\tilde{k}=1}^{N}{\sum\limits_{\tilde{l}=1}^{M}{}}}}$
$\displaystyle\quad\times
N\left({{{\bf{x}}_{k,l}}\to{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)\mu_{\alpha}^{{N_{r}}}\sum\limits_{n=0}^{{N_{r}}-1}{C_{{N_{r}}-1+n}^{n}{{\left({1-{\mu_{\alpha}}}\right)}^{n}}},$
(25)
with
${\mu_{\alpha}}=\mu\left(\sigma_{\alpha}^{2}\right)=\frac{1}{2}\left({1-\sqrt{\frac{{\sigma_{\alpha}^{2}}}{{1+\sigma_{\alpha}^{2}}}}}\right),$
(26)
and
$\sigma_{\alpha}^{2}=\frac{1}{4\sigma_{n}^{2}}\left({{{\left|{{s_{l}}}\right|}^{2}}+{{\left|{{s_{\tilde{l}}}}\right|}^{2}}}\right).$
(27)
#### IV-A2 Improved Upper Bound
The theoretical UB above is derived based on the conventional SM study of
[59], which does not take into account the specific effects of the spatial
constellation and symbol constellation. To avoid these limitations, an
improved UB is proposed in [51]. In this subsection, we will derive our
improved performance bound for LCIT-GSM based on the methodology of [51]. We
firstly offer _Proposition 1_ that is conceived for the sake of improving the
UB of our LCIT-GSM system, and then we further derive a simplified UB under
Rayleigh flat fading from _Proposition 1_.
_Proposition 1:_ The average BEP of LCIT-GSM can be tightly upper bounded as
follows:
${P_{b}}\leq{P_{b,signal}}+{P_{b,spatial}}+{P_{b,joint}},$ (28)
where ${P_{b,signal}}$, ${P_{b,spatial}}$, ${P_{b,joint}}$ are defined as
$\left\\{{\begin{array}[]{*{20}{l}}{{P_{b,signal}}=\frac{{{{\log}}M}}{{{N}{{\log}}\left({M{N}}\right)}}\sum\limits_{k=1}^{{N}}{{P_{b,MOD}}\left(k\right)}}\\\
{{P_{b,spatial}}=\frac{{{{\log}}{N}}}{{M{{\log}}\left({M{N}}\right)}}\sum\limits_{l=1}^{M}{{P_{b,SSK}}\left(l\right)}}\\\
{{P_{b,joint}}=\frac{{\sum\limits_{k=1}^{{N}}{\sum\limits_{l=1}^{M}{\sum\limits_{\tilde{k}=1}^{{N}}{\sum\limits_{\tilde{l}=1}^{M}{N\left({\mathbf{x}_{k,l}\to{\mathbf{x}_{\tilde{k},\tilde{l}}},{s_{\tilde{l}}}}\right)\Upsilon\left({\mathbf{x}_{k,l},\mathbf{x}_{\tilde{k},\tilde{l}}}\right)}}}}}}{{M{N}{{\log}}\left({M{N}}\right)}}},\end{array}}\right.$
(29)
with
$\left\\{{\begin{array}[]{*{20}{l}}{{P_{b,MOD}}\left(k\right)=\frac{{\sum\limits_{l=1}^{M}{\sum\limits_{\tilde{l}=1}^{M}{\left[{N\left({{s_{l}}\to{s_{\tilde{l}}}}\right){E_{{\mathbf{g}_{k}}}}\left\\{P\left(s_{l}=s_{\tilde{l}}\right)\right\\}}\right]}}}}{{M{{\log}}\left(M\right)}}}\\\
{{P_{b,SSK}}\left(l\right)=\frac{{\sum\limits_{k=1}^{{N}}{\sum\limits_{\tilde{k}=1}^{{N}}{N\left({\mathbf{b}_{s,k}\to{\mathbf{b}_{s,\tilde{k}}}}\right){\Psi_{l}}\left({\mathbf{b}_{s,k},\mathbf{b}_{s,\tilde{k}}}\right)}}}}{{{N}{{\log}}\left({{N}}\right)}}},\end{array}}\right.$
(30)
where
$\left\\{{\begin{array}[]{*{20}{l}}{{\Psi_{l}}\left({\mathbf{b}_{s,k},\mathbf{b}_{s,\tilde{k}}}\right)=\frac{1}{\pi}\int\limits_{0}^{{\pi\mathord{\left/{\vphantom{\pi
2}}\right.\kern-1.2pt}2}}{{{\mathcal{M}}_{\gamma\left({\mathbf{b}_{s,k},\mathbf{b}_{s,\tilde{k}}}\right)}}\left({\frac{{{\left|{{s_{l}}}\right|^{2}}}}{{4\sigma_{n}^{2}{{\sin}^{2}}\theta}}}\right)d\theta}}\\\
{\Upsilon\left({\mathbf{x}_{k,l},\mathbf{x}_{\tilde{k},\tilde{l}}}\right)=\frac{1}{\pi}\int\limits_{0}^{{\pi\mathord{\left/{\vphantom{\pi
2}}\right.\kern-1.2pt}2}}{{{\mathcal{M}}_{\gamma\left({\mathbf{x}_{k,l},\mathbf{x}_{\tilde{k},\tilde{l}}}\right)}}\left({\frac{1}{{4\sigma_{n}^{2}{{\sin}^{2}}\theta}}}\right)d\theta}},\end{array}}\right.$
(31)
and
$\left\\{{\begin{array}[]{*{20}{l}}\gamma\left({\mathbf{b}_{s,k},{\mathbf{b}_{s,\tilde{k}}}}\right)=\left\|\mathbf{g}_{k}-\mathbf{g}_{\tilde{k}}\right\|^{2}\\\
\gamma\left({\mathbf{x}_{k,l},\mathbf{x}_{\tilde{k},\tilde{l}}}\right)=\left\|\mathbf{g}_{k}s_{l}-\mathbf{g}_{\tilde{k}}s_{\tilde{l}}\right\|^{2}.\end{array}}\right.$
(32)
_Proof:_ Please refer to Appendix A in [51].
As shown in (31), in order to obtain the ABEP upper bound described in (28),
we have to derive the MGFs of
$\gamma\left({\mathbf{b}_{s,k},{\mathbf{b}_{s,\tilde{k}}}}\right)$ and
$\gamma\left({\mathbf{x}_{k,l},\mathbf{x}_{\tilde{k},\tilde{l}}}\right)$.
According to [49, 60], we know that
$\begin{split}\gamma\left({{{\bf{b}}_{s,k}},{{\bf{b}}_{s,\tilde{k}}}}\right)&={\left\|{{{\bf{g}}_{k}}-{{\bf{g}}_{\tilde{k}}}}\right\|^{2}}={\left\|{{\bf{G}}\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right)}\right\|^{2}}\\\
&=\sum\limits_{n=1}^{{N_{r}}}{{{\bf{G}}_{n,:}}\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right){{\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right)}^{H}}{\bf{G}}_{n,:}^{H}}\\\
&={{{\bf{\mathord{\buildrel{\lower
3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}^{T}}\left[{{{\bf{I}}_{N}}\otimes\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right){{\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right)}^{H}}}\right]{{{\bf{\mathord{\buildrel{\lower
3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}^{*}},\end{split}$ (33)
and
$\begin{split}\gamma\left({{{\bf{x}}_{k,l}},{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)&={\left\|{{{\bf{g}}_{k}}{s_{l}}-{{\bf{g}}_{\tilde{k}}}{s_{\tilde{l}}}}\right\|^{2}}={\left\|{{\bf{G}}\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}\right\|^{2}}\\\
&=\sum\limits_{n=1}^{{N_{r}}}{{{\bf{G}}_{n,:}}\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right){{\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}^{H}}{\bf{G}}_{n,:}^{H}}\\\
&={{{\bf{\mathord{\buildrel{\lower
3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}^{T}}\left[{{{\bf{I}}_{N}}\otimes\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right){{\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}^{H}}}\right]{{{\bf{\mathord{\buildrel{\lower
3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}^{*}},\end{split}$ (34)
where ${{{\bf{G}}_{n,:}}}$ represents the $n$-th row of ${\bf{G}}$,
${{\bf{e}}_{k}}$ is the ${N_{t}}\times 1$ unit vector with only the $k$-th
entry is $1$, and ${\bf{\mathord{\buildrel{\lower
3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}=vec\left({{{\bf{G}}^{T}}}\right)$
is a ${N_{r}}N\times 1$ vector obtained by the vectorization of
${{\bf{G}}^{T}}$. In this paper, we explicitly investigate the canonical
i.i.d. Rayleigh fading scenarios. Nevertheless, the equivalent LCIT-GSM
channels are correlated. Hence, the MGFs of
$\gamma\left({\mathbf{b}_{s,k},{\mathbf{b}_{s,\tilde{k}}}}\right)$ and
$\gamma\left({\mathbf{x}_{k,l},\mathbf{x}_{\tilde{k},\tilde{l}}}\right)$ can
be derived in the same way as in [49, 60], which can be expressed as
$\displaystyle{M_{\gamma\left({{{\bf{b}}_{s,k}},{{\bf{b}}_{s,\tilde{k}}}}\right)}}\left(t\right)$
$\displaystyle=\det\left[{{{\bf{I}}_{{N_{r}}N}}+t{{\bf{C}}_{{\bf{\mathord{\buildrel{\lower
3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}\left({{{\bf{I}}_{N}}}\right.}\right.$
$\displaystyle\quad{\left.{\left.{\otimes\left({\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right){{\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right)}^{H}}}\right)}\right)}\right]^{-1}},$
(35)
and
$\displaystyle{M_{\gamma\left({{{\bf{x}}_{k,l}},{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}}\left(t\right)$
$\displaystyle=\det\left[{{{\bf{I}}_{{N_{r}}N}}+t{{\bf{C}}_{{\bf{\mathord{\buildrel{\lower
3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}\left({{{\bf{I}}_{N}}}\right.}\right.$
$\displaystyle\quad{\left.{\left.{\otimes\left({\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right){{\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}^{H}}}\right)}\right)}\right]^{-1}},$
(36)
where $\det\left({\bf{S}}\right)$ denotes the determinant of matrix
${\bf{S}}$, ${{\bf{C}}_{{\bf{\mathord{\buildrel{\lower
3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}=\frac{{\rm{1}}}{{{N_{r}}}}{{\bf{I}}_{{N_{r}}}}\otimes
E\left({{{\bf{G}}^{T}}{{\bf{G}}^{*}}}\right)$ is the covariance matrix of
${\bf{\mathord{\buildrel{\lower
3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}$, depending on the specific
spatial mapping scheme introduced in Section II-B. More specifically, the
$\left({k,\tilde{k}}\right)$ element of
${{\bf{C}}_{{{\bf{G}}^{T}}}}=\frac{1}{{{N_{r}}}}E\left({{{\bf{G}}^{T}}{{\bf{G}}^{*}}}\right)$
is equal to $1$ when the $k$-th and $\tilde{k}$-th TA activation patterns
share more than one activated TA, and $0$ for the rest.
After substituting (IV-A2) and (IV-A2) into (29) $\sim$ (31), we arrive at
$\displaystyle{P_{b,spatial}}$ $\displaystyle=\frac{1}{{\pi
MN{{\log}}\left({MN}\right)}}\sum\limits_{l=1}^{M}{\sum\limits_{k=1}^{N}{\sum\limits_{\tilde{k}=1}^{N}{N\left({{{\bf{b}}_{s,k}}\to{{\bf{b}}_{s,\tilde{k}}}}\right)}}}$
$\displaystyle\times\int\limits_{0}^{{\pi\mathord{\left/{\vphantom{\pi
2}}\right.\kern-1.2pt}2}}{\det\left[{{{\bf{I}}_{{N_{r}}N}}+\frac{{{{\left|{{s_{l}}}\right|}^{2}}}}{{4\sigma_{n}^{2}{{\sin}^{2}}\theta}}{{\bf{C}}_{{\bf{\mathord{\buildrel{\lower
3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}}\right.}$
$\displaystyle\quad\times{\left.{\left({{{\bf{I}}_{N}}\otimes\left({\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right){{\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right)}^{H}}}\right)}\right)}\right]^{-1}}d\theta$
$\displaystyle\leq\frac{1}{{2\pi
MN{{\log}}\left({MN}\right)}}\sum\limits_{l=1}^{M}{\sum\limits_{k=1}^{N}{\sum\limits_{\tilde{k}=1}^{N}{N\left({{{\bf{b}}_{s,k}}\to{{\bf{b}}_{s,\tilde{k}}}}\right)}}}$
$\displaystyle\times\det\left[{{{\bf{I}}_{{N_{r}}N}}+\frac{{{{\left|{{s_{l}}}\right|}^{2}}}}{{4\sigma_{n}^{2}}}{{\bf{C}}_{{\bf{\mathord{\buildrel{\lower
3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}}\right.$
$\displaystyle\quad\times{\left.{\left({{{\bf{I}}_{N}}\otimes\left({\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right){{\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right)}^{H}}}\right)}\right)}\right]^{-1}},$
(37)
and
$\displaystyle{P_{b,joint}}$ $\displaystyle=\frac{1}{{\pi
MN{{\log}}\left({MN}\right)}}\sum\limits_{k=1}^{N}{\sum\limits_{l=1}^{M}{\sum\limits_{\tilde{k}=1}^{N}{\sum\limits_{\tilde{l}=1}^{M}{N\left({{{\bf{x}}_{k,l}}\to{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}}}}$
$\displaystyle\times\int\limits_{0}^{{\pi\mathord{\left/{\vphantom{\pi
2}}\right.\kern-1.2pt}2}}{\det\left[{{{\bf{I}}_{{N_{r}}N}}+\frac{1}{{4\sigma_{n}^{2}{{\sin}^{2}}\theta}}{{\bf{C}}_{{\bf{\mathord{\buildrel{\lower
3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}}\right.}$
$\displaystyle\quad\times{\left.{\left({{{\bf{I}}_{N}}\otimes\left({\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right){{\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}^{H}}}\right)}\right)}\right]^{-1}}d\theta$
$\displaystyle\leq\frac{1}{{2\pi
MN{{\log}}\left({MN}\right)}}\sum\limits_{k=1}^{N}{\sum\limits_{l=1}^{M}{\sum\limits_{\tilde{k}=1}^{N}{\sum\limits_{\tilde{l}=1}^{M}{N\left({{{\bf{x}}_{k,l}}\to{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}}}}$
$\displaystyle\times\det\left[{{{\bf{I}}_{{N_{r}}N}}+\frac{1}{{4\sigma_{n}^{2}}}{{\bf{C}}_{{\bf{\mathord{\buildrel{\lower
3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}}\right.$
$\displaystyle\quad\times{\left.{\left({{{\bf{I}}_{N}}\otimes\left({\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right){{\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}^{H}}}\right)}\right)}\right]^{-1}},$
(38)
where the Chernoff bound is used for simplifying the numerical integrals [49].
On the other hand, ${P_{b,signal}}$ can also be further simplified to
${P_{b,signal}}=\frac{{{{\log}}M}}{{{{\log}}\left({MN}\right)}}P_{b,MOD}^{Rayleigh}.$
(39)
TABLE III: Contrast between three detectors for LCIT-GSM system. | BER performance | Order of complexity | Computational complexity
---|---|---|---
MLD | optimal | ${\mathcal{O}}\left({MN}\right)$ | ${\delta_{MLD}}=6M{N_{r}}N$
TMLD | sub-optimal | ${\mathcal{O}}\left({N}\right)$, for a small $c$ and $M$ | ${\delta_{TMLD}}=6M{N_{r}}{N_{t}}+6\beta M{N_{r}}N$
DMLD | optimal | ${\mathcal{O}}\left({N}\right)$ | ${\delta_{DMLD}}=\left\\{{\begin{array}[]{*{20}{l}}{\left({6{N_{r}}+10}\right)N,}&{PSK}\\\ {\left({6{N_{r}}+12}\right)N,}&{QAM}\end{array}}\right.$
For PSK and QAM constellations, $P_{b,MOD}^{Rayleigh}$ can be expressed
similarly to [61] as
$P_{b,PSK}^{Rayleigh}\simeq\frac{{2\sum\limits_{k=1}^{\max\left({{M\mathord{\left/{\vphantom{M4}}\right.\kern-1.2pt}4},1}\right)}{R\left(\frac{{{{\sin}^{2}}{\frac{{\left({2k-1}\right)\pi}}{M}}}}{2\sigma_{n}^{2}}\right)}}}{{\max\left({{{\log}}M,2}\right)}},$
(40)
and
$P_{b,QAM}^{Rayleigh}=\frac{4}{{\sqrt{M}{{\log}}M}}\sum\limits_{l=1}^{\frac{1}{2}{{\log}}M}{\sum\limits_{k=0}^{\left({1-{2^{-l}}}\right)\sqrt{M}-1}{{S_{l,k}}}},$
(41)
where
${S_{l,k}}={\left({-1}\right)^{\left\lfloor{\frac{{{2^{l-1}}k}}{{\sqrt{M}}}}\right\rfloor}}\left({{2^{l-1}}-\left\lfloor{\frac{{{2^{l-1}}k}}{{\sqrt{M}}}+\frac{1}{2}}\right\rfloor}\right)R\left({\frac{{3{{\left({2k+1}\right)}^{2}}}}{4\sigma_{n}^{2}\left(M-1\right)}}\right).$
(42)
and
$R\left(x\right)={\left({\mu\left(x\right)}\right)^{{N_{r}}}}\sum\limits_{{n_{r}}=0}^{{N_{r}}-1}{\left\\{{C_{{N_{r}}-1+{n_{r}}}^{{n_{r}}}{{\left({1-\mu\left(x\right)}\right)}^{{n_{r}}}}}\right\\}},$
(43)
The formulas in (IV-A2), (IV-A2) and (39) provide useful insights into the
performance of LCIT-GSM systems. For example, (IV-A2) shows that the bit
mapping of the PSK/QAM constellation diagram plays an important role in
${P_{b,joint}}$. In particular, while conventional bit mappings based on the
Euclidean distance of the signal constellations turn out to be optimal for
minimising ${P_{b,signal}}$, additional constraints may be imposed onto the
best choice of the signal constellation diagram and onto the related bit
mapping for minimising ${P_{b,signal}}$ and ${P_{b,joint}}$ simultaneously.
### IV-B Complexity Analysis
In this part, we compare the computational complexity of the detectors
proposed for our LCIT-GSM scheme. The detection complexity is quantified in
terms of the number of real-valued multiplications required. The complexity of
GSM in [39] is given by
${\delta_{GSM}}=6M{N_{r}}{2^{\left\lfloor{{{\log}}C_{{N_{t}}}^{{N_{a}}}}\right\rfloor}}$.
Similarly, for the proposed LCIT-GSM scheme, the detection complexity of the
full-search based MLD of (11) is given by
${\delta_{MLD}}=6M{N_{r}}N.$ (44)
When the near-optimal reduced-scope TMLD of (16) is used, the LCIT-GSM
scheme’s complexity becomes
${\delta_{TMLD}}=6M{N_{r}}{N_{t}}+6\beta M{N_{r}}N,$ (45)
where $\frac{1}{M}\leq\beta\leq 1$ is a parameter that increases with the
constant $c$ of (15). More specifically, we have $\beta=\frac{1}{M}$ for $c=1$
and $\beta\to 1$ for $c\to\infty$, respectively. We note that as $c\to\infty$,
the complexity of TMLD becomes higher than that of MLD, which is due to the
fact that, for a large $c$, TMLD does not reduce the cardinality of the symbol
constellation, but increases the complexity of the first step. However, in
practice, a small $c$ is adequate for achieving near-ML performance at a low
complexity.
When the single-stream-based DMLD of (17)-(22) is invoked, the LCIT-GSM
detection complexity encountered for a given $k$ consists of three parts: 1)
the computation of ${p_{k}}$ in (17) requires $\left({6{N_{r}}+2}\right)$
real-valued multiplications [58]; 2) $2$ and $4$ real-valued multiplications
are required for obtaining ${\hat{s}_{k}}$ in PSK and QAM, respectively; 3)
$6$ real-valued multiplications are required for performing (22). Therefore,
the LCIT-GSM detection complexity is reduced to
${\delta_{DMLD}}=\left\\{{\begin{array}[]{*{20}{l}}{\left({6{N_{r}}+10}\right)N,}&{PSK}\\\
{\left({6{N_{r}}+12}\right)N,}&{QAM}\end{array}}\right..$ (46)
The complexity comparison of the three different detectors is summarized in
Table III, where the order of complexity is defined as the number of
optimization metric evaluations [58]. The numerical complexity comparisons are
offered in Section V.
We note that as previously shown by (3), the throughput of LCIT-GSM is higher
than that of GSM. This implies that for the sake of achieving the same SE,
LCIT-GSM requires less TAs than its conventional GSM counterpart. As a result,
although the signal detection complexity of LCIT-GSM of (44)-(46) is generally
higher than that of GSM, the proposed LCIT-GSM is still advantageous in terms
of the overall energy efficiency, which may be regarded as the SE normalised
by the hardware power consumption [3, 11, 22].
## V Simulation Results
In this section, the BEP performance of LCIT-GSM systems is investigated for
different numbers of TA/RAs and using different modulation schemes. For the
sake of clarity, the parameters used for generating the results in this
section are detailed in the figures.
Figure 5: ABEP of LCIT-GSM (QPSK, $N_{t}=4$) versus $E_{m}/N_{0}$ under our
three types of spatial mapping rules, i.e., DTAA-R in (6), DTAA-D in (9) and
LUT in (10). The classic UB and improved UB are drawn with solid line and
dash-dot line, respectively. Note that LUT uses the same mapping design as
conventional VGSM of [36, 49]. Figure 6: ABEP of LCIT-GSM (16QAM, $N_{t}=4$)
versus $E_{m}/N_{0}$ under our three types of spatial mapping rules, i.e.,
DTAA-R in (6), DTAA-D in (9) and LUT in (10). The classic UB and improved UB
are drawn with solid line and dash-dot line, respectively. Note that LUT uses
the same mapping design as conventional VGSM of [36, 49].
Figs. 5 $\sim$ 8 contrast our simulations and theoretical derivations for the
LCIT-GSM system in different scenarios, where the circle, square and cross
patterns represent DTAA-R, DTAA-D, and LUT, respectively, while the dash-dot
and solid lines represent the improved performance bound and the classic union
bound, respectively. The MLD is adopted in Figs. 5 $\sim$ 8 for contrasting
its performance to the corresponding theoretical BEP bound. In Figs. 5 and 6,
the number of TAs is set to $N_{t}=4$. Although the three mapping arrangements
only exhibit modest performance differences in Figs. 5 $\sim$ 8, the DTAA-R is
shown to have a worse BEP than DTAA-D and LUT, since it transmits one more bit
using the same number of TAs. Furthermore, as evidenced by Figs. 5 $\sim$ 8,
the LUT performs the best. However, it is worth noting that compared to the
simple DTAA-R/DTAA-D mapping, the LUT has to rely on a pre-defined LUT, which
imposed a higher design complexity.
Figure 7: ABEP of LCIT-GSM (QPSK, $N_{t}=6$) versus $E_{m}/N_{0}$ under our
three types of spatial mapping rules, i.e., DTAA-R in (6), DTAA-D in (9) and
LUT in (10). The classic UB and improved UB are drawn with solid line and
dash-dot line, respectively. Note that LUT uses the same mapping design as
conventional VGSM of [36, 49]. Figure 8: ABEP of LCIT-GSM (16QAM, $N_{t}=6$)
versus $E_{m}/N_{0}$ under our three types of spatial mapping rules, i.e.,
DTAA-R in (6), DTAA-D in (9) and LUT in (10). The classic UB and improved UB
are drawn with solid line and dash-dot line, respectively. Note that LUT uses
the same mapping design as conventional VGSM of [36, 49]. Figure 9: ABEP of
LCIT-GSM (QPSK, $N_{t}=6$) versus $E_{m}/N_{0}$ for our three types of
detectors. The LUT is used to illustrate the compatibility of the proposed
low-complexity detectors with conventional VGSM of [36, 49]. Figure 10: ABEP
of LCIT-GSM (16QAM, $N_{t}=6$) versus $E_{m}/N_{0}$ for our three types of
detectors. The LUT is used to illustrate the compatibility of the proposed
low-complexity detectors with conventional VGSM of [36, 49].
Moreover, it is demonstrated by Figs. 5 $\sim$ 8 that the improved theoretical
bound is about 1.5dB tighter than the conventional bound. Figs. 7 and 8 depict
the theoretical derivation and simulation results of using ${N_{t}}=6$ and
QPSK/16QAM signalling. It can be seen in Figs. 7 and 8 that, once again, the
improved performance bound has a 1.5dB performance improvement over the
conventional performance bound. Furthermore, as the number of RAs increases,
the performance advantage of LUT over DTAA-R/DTAA-D improves, and the UB also
becomes tighter in Figs. 7 and 8, which once again verifies the reliability of
our conclusion.
Figure 11: The performance comparison between LCIT-GSM (QPSK) and GSM for
different ${N_{a}}$. The LUT-LCIT-GSM with $N_{t}=5$ is used to maintain a
overall rate of 6bpcu. Figure 12: The performance comparison between LCIT-GSM
(QPSK) and GSM for different ${N_{a}}$. The LUT-LCIT-GSM with $N_{t}=6$ is
used to maintain a overall rate of 7bpcu.
Figs. 9 and 10 compare the performance of different detectors for our LCIT-GSM
system having ${N_{t}}=6$. As discussed in Section IV-B, the TMLD exhibits a
lower detection complexity, but it also imposes a performance loss compared to
the MLD and DMLD, as confirmed by Figs. 9 and 10. We note that the constant
$c$ of (15) is set to 1.5 in Figs. 9 and 10, which may be increased for the
sake of improving the performance, but this would also result in a higher
detection complexity according to (45). Moreover, Figs. 9 and 10 show that
although TMLD performs similarly to MLD at low SNRs, the TMLD may exhibit an
error floor. The error floor will move down upon increasing ${N_{r}}$ because
the channels between different TAs tend to become more orthogonal for an
increased number of RAs. More specifically, the index of the modulated symbol
found in the first step becomes more accurate and hence supports the global
optimality of the second step of local search. Fortunately, DMLD always
maintains the same performance as MLD, which benefits from the fact that for a
regular constellation, the rounding-based detector and the exhaustive search
return the same result. The simulation results of 16QAM associated with
${N_{t}}=6$ are presented in Fig. 10, which leads to the same observations on
TMLD as Fig. 10. Moreover, by comparing the performance of QPSK and 16QAM in
Figs. 9 and 10, respectively, we can see that the performance of QPSK is
always better than that of 16QAM.
Figure 13: Complexity comparison of different detectors for LCIT-GSM with
${N_{r}}=6$, where DTAA-D and LUT are adopted.
The BEP performance comparisons between GSM and LCIT-GSM are offered in Figs.
11 and 12. In Fig. 11, the number of TAs is set to $N_{t}=5$ and QPSK is used
for LCIT-GSM. In order to maintain the overall throughput of 6bpcu, 16QAM and
8QAM are used for GSM with the fixed number of active TAs ${N_{a}}=1$ and
${N_{a}}=2$, respectively. It can be seen in Fig. 11 that LCIT-GSM outperforms
GSM for ${N_{a}}=2$ by about 2dB for different numbers of RAs of $N_{r}=3$ and
$N_{r}=7$. When GSM associated with ${N_{a}}=1$ is considered, a 4dB
performance gain can be observed in Fig. 11. In Fig. 12, our performance
comparisons between GSM and LCIT-GSM are portrayed for the case of $N_{t}=6$.
The QPSK constellation is also adopted for LCIT-GSM, while 16QAM and 8QAM are
used for GSM at ${N_{a}}=2$ and ${N_{a}}=3$, respectively, hence maintaining a
overall rate of 7bpcu. The 2dB performance gain compared to GSM using
${N_{a}}=3$ can also be observed in Fig. 12 to verify the advantage of the
proposed LCIT-GSM scheme.
Finally, in Fig. 13, the computational complexity of different detectors is
compared in terms of the number of real-valued multiplications, where we set
$c=1$ and when the DTAA-D and LUT are adopted. As seen in Section IV-B, the
complexity of MLD is prohibitive and increases exponentially with ${N_{t}}$,
while our proposed detectors achieve lower complexity for all the scenarios
considered. More specifically, the complexity of the TMLD is lower than that
of the DMLD for a small constellation, and the complexity-difference will
widen as the number of TAs increases. This is because the ratio of the DMLD’s
complexity to $N$ is higher than that of TMLD, bearing in mind that
$N={2^{{N_{t}}-1}}$ for DTAA-D and LUT. By contrast, for a moderate number of
TAs, the DMLD is more competitive in conjunction with high-order modulation,
which is due to the fact that the complexity of the DMLD does not increase
with the constellation size $M$. In summary, the proposed low-complexity
detectors strike an attractive BEP performance vs. detection complexity
tradeoff and can be applied flexibly in various scenarios. Moreover, we
emphasize that the DMLD is always optimal but it is only suitable for regular
constellations, while the TMLD is suboptimal, but it can strike a flexible BEP
performance vs. computational complexity trade-off by adjusting the constant
$c$ in (15).
## VI Conclusions
A novel LCIT-GSM scheme was proposed, which is capable of maximising the GSM
throughput without imposing IAI while reducing the system complexity of the
conventional VGSM of [36, 49]. In contrast to the conventional GSM that always
invokes a fixed number $N_{a}$ of activated TAs, the proposed LCIT-GSM
utilises all legitimate TA activation patterns, where $N_{a}$ becomes a
variable that has to be recovered by the receiver. Nonetheless, in the absence
of IAI, a low-complexity single-stream based detector may be invoked by the
LCIT-GSM receiver. Both our theoretical derivation and our numerical
simulation have confirmed that LCIT-GSM increases the overall SE
logarithmically with the number of TAs. More specifically, for the LCIT-GSM
mapping, the arrangements of DTAA-R, DTAA-D and LUT are conceived in order to
facilitate a flexible MIMO deployment with special focus on the all-zero
spatial beam stream. Furthermore, as for the LCIT-GSM signal detection, we
have developed the low-complexity TMLD and DMLD schemes, where the former
adopts the sphere decoding philosophy for the sake of striking a compelling
performance vs complexity trade-off, while the latter is capable of achieving
the ML performance at a single-stream detection complexity that does not grow
with the number of modulation levels. Furthermore, an improved theoretical UB
is derived for the proposed LCIT-GSM, which is confirmed by our Monte-Carlo-
based simulation to be about 1.5dB tighter than the existing conventional
solution. Finally, our simulation results demonstrate that the proposed LCIT-
GSM scheme achieves improved performance over the conventional GSM and lower
complexity than the VGSM. In this paper, three spatial mapping schemes are
presented for exploiting the low complexity of the bitwise TA activation. We
believe that the family of mapping schemes designed by formal optimization
methods may achieve a better BEP at the cost of a moderate design complexity,
which is left as a topic for our future research.
## References
* [1] R. Mesleh, H. Haas, C. W. Ahn, and S. Yun, “Spatial modulation-a new low complexity spectral efficiency enhancing technique,” in _Proc. 1st. Int. Conf. Commun. Netw. China_. IEEE, 2006, pp. 1–5.
* [2] R. Y. Mesleh, H. Haas, S. Sinanovic, C. W. Ahn, and S. Yun, “Spatial modulation,” _IEEE Trans. Veh. Technol._ , vol. 57, no. 4, pp. 2228–2241, 2008.
* [3] M. Di Renzo, H. Haas, A. Ghrayeb, S. Sugiura, and L. Hanzo, “Spatial modulation for generalized MIMO: Challenges, opportunities, and implementation,” _Proceedings of the IEEE_ , vol. 102, no. 1, pp. 56–103, 2013.
* [4] G. J. Foschini, “Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas,” _Bell Labs Technical J._ , vol. 1, no. 2, pp. 41–59, 1996.
* [5] V. Tarokh, H. Jafarkhani, and A. R. Calderbank, “Space-time block codes from orthogonal designs,” _IEEE Trans. Inf. Theory_ , vol. 45, no. 5, pp. 1456–1467, 1999.
* [6] L. Zheng and D. N. C. Tse, “Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels,” _IEEE Trans. Inf. Theory_ , vol. 49, no. 5, pp. 1073–1096, 2003.
* [7] M. Di Renzo, H. Haas, and P. Grant, “Spatial modulation for multiple-antenna wireless systems: A survey,” _IEEE Commun. Mag._ , vol. 49, no. 12, pp. 182–191, 2011.
* [8] P. Yang, M. Di Renzo, Y. Xiao, S. Li, and L. Hanzo, “Design guidelines for spatial modulation,” _IEEE Commun. Surveys Tuts._ , vol. 17, no. 1, pp. 6–26, 2014.
* [9] S. Sugiura and L. Hanzo, “Single-RF spatial modulation requires single-carrier transmission: Frequency-domain turbo equalization for dispersive channels,” _IEEE Trans. Veh. Technol._ , vol. 64, no. 10, pp. 4870–4875, 2014.
* [10] C. Masouros and L. Hanzo, “Constellation randomization achieves transmit diversity for single-RF spatial modulation,” _IEEE Trans. Veh. Technol._ , vol. 65, no. 10, pp. 8101–8111, 2015.
* [11] C. Xu, N. Ishikawa, R. Rajashekar, S. Sugiura, R. G. Maunder, Z. Wang, L.-L. Yang, and L. Hanzo, “Sixty years of coherent versus non-coherent tradeoffs and the road from 5G to wireless futures,” _IEEE Access_ , vol. 7, pp. 178 246–178 299, 2019.
* [12] J. Jeganathan, A. Ghrayeb, and L. Szczecinski, “Generalized space shift keying modulation for MIMO channels,” in _Proc. IEEE 19th Int. Symposium on Personal, Indoor and Mobile Radio Commun._ IEEE, 2008, pp. 1–5.
* [13] J. Jeganathan, A. Ghrayeb, L. Szczecinski, and A. Ceron, “Space shift keying modulation for MIMO channels,” _IEEE Trans. Wireless Commun._ , vol. 8, no. 7, pp. 3692–3703, 2009.
* [14] S. Sugiura, S. Chen, and L. Hanzo, “Coherent and differential space-time shift keying: A dispersion matrix approach,” _IEEE Trans. Commun._ , vol. 58, no. 11, pp. 3219–3230, 2010.
* [15] C. Xu, P. Zhang, R. Rajashekar, N. Ishikawa, S. Sugiura, Z. Wang, and L. Hanzo, ““Near-perfect” finite-cardinality generalized space-time shift keying,” _IEEE J. Sel. Areas Commun._ , vol. 37, no. 9, pp. 2146–2164, 2019\.
* [16] S. Sugiura, S. Chen, and L. Hanzo, “Generalized space-time shift keying designed for flexible diversity-, multiplexing-and complexity-tradeoffs,” _IEEE Trans. Wireless Commun._ , vol. 10, no. 4, pp. 1144–1153, 2011.
* [17] C. Xu, T. Bai, J. Zhang, R. Maunder, S. Sugiura, Z. Wang, and L. Hanzo, “Constant-envelope space-time shift keying,” _IEEE J. Sel. Topics Signal Process._ , 2019.
* [18] Z. Li and J. Zheng, “Space-frequency shift keying in rapidly time-varying MIMO OFDM channels,” in _Proc. IEEE 87th Veh. Technol. Conf. (VTC Spring)_. IEEE, 2018, pp. 1–5.
* [19] H. A. Ngo, C. Xu, S. Sugiura, and L. Hanzo, “Space-time-frequency shift keying for dispersive channels,” _IEEE Signal Process. Lett._ , vol. 18, no. 3, pp. 177–180, 2011.
* [20] H. A. Ngo and L. Hanzo, “Area spectral efficiency of soft-decision space–time–frequency shift-keying-aided slow-frequency-hopping multiple access,” _IEEE Trans. Veh. Technol._ , vol. 61, no. 3, pp. 1433–1439, 2012\.
* [21] E. Basar, “Index modulation techniques for 5G wireless networks,” _IEEE Commun. Mag._ , vol. 54, no. 7, pp. 168–175, 2016.
* [22] E. Basar, M. Wen, R. Mesleh, M. Di Renzo, Y. Xiao, and H. Haas, “Index modulation techniques for next-generation wireless networks,” _IEEE Access_ , vol. 5, pp. 16 693–16 746, 2017.
* [23] S. Lu, I. A. Hemadeh, M. El-Hajjar, and L. Hanzo, “Compressed-sensing-aided space-time frequency index modulation,” _IEEE Trans. Veh. Technol._ , vol. 67, no. 7, pp. 6259–6271, 2018.
* [24] T. Mao, Q. Wang, Z. Wang, and S. Chen, “Novel index modulation techniques: A survey,” _IEEE Commun. Surveys Tuts._ , vol. 21, no. 1, pp. 315–348, 2018\.
* [25] R. Mesleh, R. Mehmood, H. Elgala, and H. Haas, “Indoor MIMO optical wireless communication using spatial modulation,” in _Proc. IEEE Int. Conf. Commun._ IEEE, 2010, pp. 1–5.
* [26] R. Mesleh, H. Elgala, and H. Haas, “Optical spatial modulation,” _J. Opt. Comm. Netw._ , vol. 3, no. 3, pp. 234–244, 2011.
* [27] M. H. Kabir, S. R. Islam, and K. S. Kwak, “D-MoSK modulation in molecular communications,” _IEEE Trans. Nanobioscience_ , vol. 14, no. 6, pp. 680–683, 2015.
* [28] N. Serafimovski, A. Younis, R. Mesleh, P. Chambers, M. Di Renzo, C.-X. Wang, P. M. Grant, M. A. Beach, and H. Haas, “Practical implementation of spatial modulation,” _IEEE Trans. Veh. Technol._ , vol. 62, no. 9, pp. 4511–4523, 2013.
* [29] A. Younis, W. Thompson, M. Di Renzo, C.-X. Wang, M. A. Beach, H. Haas, and P. M. Grant, “Performance of spatial modulation using measured real-world channels,” in _Proc. IEEE 78th Veh. Technol. Conf. (VTC Fall)_. IEEE, 2013, pp. 1–5.
* [30] L. Xiao, Y. Xiao, L. You, P. Yang, S. Li, and L. Hanzo, “Single-RF and Twin-RF spatial modulation for an arbitrary number of transmit antennas,” _IEEE Trans. Veh. Technol._ , vol. 67, no. 7, pp. 6311–6324, 2018.
* [31] P. S. Koundinya, K. Hari, and L. Hanzo, “Joint design of the spatial and of the classic symbol alphabet improves single-RF spatial modulation,” _IEEE Access_ , vol. 4, pp. 10 246–10 257, 2016.
* [32] L. He, J. Wang, and J. Song, “Spatial modulation for more spatial multiplexing: RF-chain-limited generalized spatial modulation aided mm-wave MIMO with hybrid precoding,” _IEEE Trans. Commun._ , vol. 66, no. 3, pp. 986–998, 2017.
* [33] Z. An, J. Wang, J. Wang, and J. Song, “Mutual information and error probability analysis on generalized spatial modulation system,” _IEEE Trans. Commun._ , vol. 65, no. 3, pp. 1044–1060, 2016.
* [34] L. Xiao, P. Xiao, Y. Xiao, H. Haas, A. Mohamed, and L. Hanzo, “Compressive sensing assisted generalized quadrature spatial modulation for massive MIMO systems,” _IEEE Trans. Commun._ , 2019.
* [35] S. Guo, H. Zhang, P. Zhang, S. Dang, L. Cong, and M.-S. Alouini, “Signal shaping for generalized spatial modulation and generalized quadrature spatial modulation,” _arXiv preprint arXiv:1901.09318_ , 2019.
* [36] O. Osman, “Variable active antenna spatial modulation,” _IET Microwaves, Antennas & Propagation_, vol. 9, no. 15, pp. 1816–1824, 2015.
* [37] J. Wang, S. Jia, and J. Song, “Generalised spatial modulation system with multiple active transmit antennas and low complexity detection scheme,” _IEEE Trans. Wireless Commun._ , vol. 11, no. 4, pp. 1605–1615, 2012.
* [38] P. Liu, M. Di Renzo, and A. Springer, “Variable-${N_{u}}$ generalized spatial modulation for indoor los mmwave communication: Performance optimization and novel switching structure,” _IEEE Trans. Commun._ , vol. 65, no. 6, pp. 2625–2640, 2017.
* [39] A. Younis, N. Serafimovski, R. Mesleh, and H. Haas, “Generalised spatial modulation,” in _2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers_. IEEE, 2010, pp. 1498–1502.
* [40] J. Fu, C. Hou, W. Xiang, L. Yan, and Y. Hou, “Generalised spatial modulation with multiple active transmit antennas,” in _2010 IEEE Globecom Workshops_. IEEE, 2010, pp. 839–844.
* [41] E. Basar, U. Aygolu, E. Panayirci, and H. V. Poor, “Space-time block coded spatial modulation,” _IEEE Trans. Commun._ , vol. 59, no. 3, pp. 823–832, 2010.
* [42] T. Datta, H. S. Eshwaraiah, and A. Chockalingam, “Generalized space-and-frequency index modulation,” _IEEE Trans. Veh. Technol._ , vol. 65, no. 7, pp. 4911–4924, 2015.
* [43] L. Xiao, Y. Xiao, C. Xu, X. Lei, P. Yang, S. Li, and L. Hanzo, “Compressed-sensing assisted spatial multiplexing aided spatial modulation,” _IEEE Trans. Wireless Commun._ , vol. 17, no. 2, pp. 794–807, 2017.
* [44] R. Mesleh, S. S. Ikki, and H. M. Aggoune, “Quadrature spatial modulation,” _IEEE Trans. Veh. Technol._ , vol. 64, no. 6, pp. 2738–2742, 2014.
* [45] J. Li, M. Wen, X. Cheng, Y. Yan, S. Song, and M. H. Lee, “Generalized precoding-aided quadrature spatial modulation,” _IEEE Trans. Veh. Technol._ , vol. 66, no. 2, pp. 1881–1886, 2016.
* [46] M. Mohaisen, “Increasing the minimum euclidean distance of the complex quadrature spatial modulation,” _IET Commun._ , vol. 12, no. 7, pp. 854–860, 2018.
* [47] R. Mesleh, O. Hiari, A. Younis, and S. Alouneh, “Transmitter design and hardware considerations for different space modulation techniques,” _IEEE Trans. Wireless Commun._ , vol. 16, no. 11, pp. 7512–7522, 2017.
* [48] R. Mesleh, O. Hiari, and A. Younis, “Generalized space modulation techniques: Hardware design and considerations,” _Physical Commun._ , vol. 26, pp. 87–95, 2018.
* [49] A. Younis, “Spatial modulation: Theory to practice,” _Ph.D. dissertation_ , Instit. Digit. Commun., School Eng., Univ. Edinburgh, Edinburgh, Scotland, 2014.
* [50] R. Mesleh and A. Alhassi, _Space modulation techniques_. John Wiley & Sons, 2018.
* [51] M. Di Renzo and H. Haas, “Bit error probability of SM-MIMO over generalized fading channels,” _IEEE Trans. Veh. Technol._ , vol. 61, no. 3, pp. 1124–1144, 2012.
* [52] L. Xiao, P. Xiao, Y. Xiao, I. Hemadeh, A. Mohamed, and L. Hanzo, “Bayesian compressive sensing assisted space–time block coded quadrature spatial modulation,” _IEEE Trans. Veh. Technol._ , vol. 67, no. 10, pp. 10 044–10 048, 2018.
* [53] J. Jeganathan, A. Ghrayeb, and L. Szczecinski, “Spatial modulation: Optimal detection and performance analysis.” _IEEE Commun. Lett._ , vol. 12, no. 8, pp. 545–547, 2008.
* [54] J. Choi, J. Mo, and R. W. Heath, “Near maximum-likelihood detector and channel estimator for uplink multiuser massive MIMO systems with one-bit ADCs,” _IEEE Trans. Commun._ , vol. 64, no. 5, pp. 2005–2018, 2016.
* [55] A. Younis, S. Sinanovic, M. Di Renzo, R. Mesleh, and H. Haas, “Generalised sphere decoding for spatial modulation,” _IEEE Trans. Commun._ , vol. 61, no. 7, pp. 2805–2815, 2013.
* [56] A. Younis, M. Di Renzo, R. Mesleh, and H. Haas, “Sphere decoding for spatial modulation,” in _Proc. IEEE Int. Conf. Commun. (ICC)_. IEEE, 2011, pp. 1–6.
* [57] C. Xu, S. Sugiura, S. X. Ng, P. Zhang, L. Wang, and L. Hanzo, “Two decades of MIMO design tradeoffs and reduced-complexity MIMO detection in near-capacity systems,” _IEEE Access_ , vol. 5, pp. 18 564–18 632, 2017\.
* [58] R. Rajashekar, K. Hari, and L. Hanzo, “Reduced-complexity ML detection and capacity-optimized training for spatial modulation systems,” _IEEE Trans. Commun._ , vol. 62, no. 1, pp. 112–125, 2013.
* [59] J. G. Proakis and M. Salehi, _Digital communications_. McGraw-hill New York, 2001, vol. 4.
* [60] Y. Liu, L.-L. Yang, P. Xiao, H. Haas, and L. Hanzo, “Spatial modulated multicarrier sparse code-division multiple access,” _IEEE Trans. Wireless Commun._ , vol. 19, no. 1, pp. 610–623, 2019.
* [61] M. K. Simon and M.-S. Alouini, _Digital communication over fading channels_. John Wiley & Sons, 2005, vol. 95.
| arxiv-papers | 2021-07-27T06:55:27 | 2024-09-04T03:07:20.781086 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Jiancheng An, Chao Xu, Yusha Liu, Lu Gan, and Lajos Hanzo",
"submitter": "Jiancheng An",
"url": "https://arxiv.org/abs/2107.12630"
} |
2107.12631 | # Learning to Estimate RIS-Aided mmWave Channels
Jiguang He, Henk Wymeersch, Marco Di Renzo, and Markku Juntti J. He and M.
Juntti are with Centre for Wireless Communications, FI-90014, University of
Oulu, Finland. H. Wymeersch is with Department of Electrical Engineering,
Chalmers University of Technology, Gothenburg, Sweden. M. Di Renzo is with
Université Paris-Saclay, CNRS, CentraleSupélec, Laboratoire des Signaux et
Systèmes, 3 Rue Joliot-Curie, 91192 Gif-sur-Yvette, France.This work is
supported by Horizon 2020, European Union’s Framework Programme for Research
and Innovation, under grant agreement no. 871464 (ARIADNE). This work is also
partially supported by the Academy of Finland 6Genesis Flagship (grant
318927), as well as the H2020 RISE-6G project under grant agreement number
101017011.
###### Abstract
Inspired by the remarkable learning and prediction performance of deep neural
networks (DNNs), we apply one special type of DNN framework, known as model-
driven deep unfolding neural network, to reconfigurable intelligent surface
(RIS)-aided millimeter wave (mmWave) single-input multiple-output (SIMO)
systems. We focus on uplink cascaded channel estimation, where known and fixed
base station combining and RIS phase control matrices are considered for
collecting observations. To boost the estimation performance and reduce the
training overhead, the inherent channel sparsity of mmWave channels is
leveraged in the deep unfolding method. It is verified that the proposed deep
unfolding network architecture can outperform the least squares (LS) method
with a relatively smaller training overhead and online computational
complexity.
###### Index Terms:
Deep unfolding, reconfigurable intelligent surface, cascaded channel
estimation, deep neural network.
## I Introduction
Reconfigurable intelligent surfaces (RISs) have recently been introduced for
enhanced energy efficiency (EE), spectrum efficiency (SE), positioning
accuracy, as well as network/physical-layer security [1, 2, 3, 4]. The RIS,
either being passive, active, or a hybrid combination of the former two, is
used to smartly control the radio propagation environment, by virtue of multi-
function capabilities, e.g., reflection, refraction, diffraction, scattering,
and even absorption [5]. In the literature, the RIS is commonly used as an
intelligent reflector, which breaks the well-known law of reflection [6], to
mitigate the blockage effect and expand the connectivity range, especially for
millimeter wave (mmWave) and terahertz (THz) communications.
However, the RIS is commonly assumed to be nearly-passive. That is, no power
amplifiers and baseband processing units are available at the RIS. Besides, in
order to compensate for the additional path loss in the reflection route via
the RIS, a large number of RIS elements must be employed. These make the
channel state information (CSI) acquisition difficult to tackle in practice,
since the channel estimation (CE) can only be performed either at the base
station (BS) or at the mobile station (MS). As RIS phase control and joint
active and passive beamforming are sensitive to the CSI accuracy, the full
potential of the RIS cannot be achieved when the CE is poorly performed.
Therefore, accurate yet efficient CE methods for the two individual channels
(i.e., the MS-RIS and RIS-BS channels) or the cascaded channel are of vital
importance. In our previous works, we took advantage of the inherent channel
sparsity and rank-deficiency features of the mmWave multiple-input multiple-
output (MIMO) channels and we applied the iterative reweighted method and the
atomic norm minimization (ANM) method for estimating the channel parameters of
RIS-aided mmWave MIMO systems [7, 8]. In another recent work [9], sparse
matrix factorization and matrix completion were exploited in a sequential
manner to facilitate the CE process. These works fall into the category of
conventional model-based approaches, which suit only for a small- or medium-
sized RIS, BS, and MS.
As the number of RIS elements and BS/MS antennas continues to grow (this is an
inevitable trend at high frequency bands, e.g., mmWave and THz), more training
overhead to obtain adequate CE performance, within the channel coherence time,
via conventional model-based methods is required. Besides, the associated
computational complexity will become inevitably high. These considerations
motivate the application of data-driven or hybrid approaches for CE in RIS-
aided communications [10]. In [11], a convolutional neural network (CNN) was
considered for RIS CE in a multi-user scenario. Therein, however, each user
needs to first estimate its own channel and then map the estimate to the
corresponding ground truth channel, which naturally increases the
computational complexity. Therefore, in the present paper, we resort to a
model-driven deep unfolding approach, which has already been used in MIMO
detection and sparse signal recovery [12, 13], for estimating the cascaded
channel in RIS-aided mmWave single-input multiple-output (SIMO) systems. To
the best of the authors’ knowledge, the concept of deep unfolding has not yet
been considered for RIS CE.
Deep unfolding mimics the operation of conventional (projected) gradient
descent schemes, and it is capable of directly mapping the received pilot
signals to the cascaded channel. Its computationally intensive training
process can be executed offline and the online implementation/prediction phase
only entails low-complexity calculations, e.g., matrix multiplications and
additions, and element-wise operations. In this study, specifically, the rank-
deficiency property of the cascaded channel is explicitly considered in the
deep unfolding framework. It is verified that the deep unfolding scheme can
outperform least squares (LS) estimation in terms of normalized mean square
error (NMSE) with a smaller training overhead and a reduced online
computational complexity.
Notations: A bold lowercase letter ${\mathbf{a}}$ denotes a vector, and a bold
capital letter ${\mathbf{A}}$ denotes a matrix. $(\cdot)^{\mathsf{T}}$ and
$(\cdot)^{\mathsf{H}}$ denote the matrix or vector transpose and Hermitian
transpose, respectively. $\mathrm{diag}({\mathbf{a}})$ denotes a square
diagonal matrix with the entries of ${\mathbf{a}}$ on its diagonal,
$\mathbb{E}[\cdot]$ is the expectation operator, $\mathbf{0}$ denotes the all-
zero vector, ${\mathbf{I}}_{M}$ denotes the $M\times M$ identity matrix, and
$j=\sqrt{-1}$. $\|\cdot\|_{\mathrm{F}}$ and $\|\cdot\|_{*}$ denote the
Frobenius norm and nuclear norm of a matrix, respectively, and $\|\cdot\|_{2}$
denotes the Euclidean norm of a vector.
## II System Model
Figure 1: A typical scenario for maintaining the connectivity by deploying an
RIS in a mmWave SIMO network.
We consider a nearly-passive RIS-aided mmWave SIMO network, where the MS
communicates with the BS via the RIS, as shown in Fig. 1. The BS and RIS are
equipped with multiple antennas and with nearly-passive scattering elements,
respectively, while the MS is equipped with a single antenna. We further
assume that the direct MS-BS channel is blocked.111When the direct MS-BS
channel exists, we can estimate it by setting the RIS into an absorption mode.
Then, we can estimate the cascaded channel by subtracting the direct MS-BS
channel. The RIS-BS channel, which is denoted as
${\mathbf{H}}_{1}\in\mathbb{C}^{M\times N}$ with $M$ and $N$ being the number
of antennas and scattering elements at the BS and RIS, respectively, can be
written as
${\mathbf{H}}_{1}=\sum\limits_{i=1}^{L_{1}}g_{1,i}\boldsymbol{\alpha}(\phi_{1,i})\boldsymbol{\alpha}^{\mathsf{H}}(\theta_{1,i})={\mathbf{A}}(\boldsymbol{\phi}_{1})\mathrm{diag}({\mathbf{g}}_{1}){\mathbf{A}}^{\mathsf{H}}(\boldsymbol{\theta}_{1}),$
(1)
where $L_{1}\ll\mathrm{min}\\{M,N\\}$ is the number of channel paths,
including one line-of-sight (LoS) path (with $i=1$) and multiple non-line-of-
sight (NLoS) paths (with $i>1$), and $g_{1,i}\in\mathbb{C},$
$\theta_{1,i}\in\mathbb{R}$, and $\phi_{1,i}\in\mathbb{R}$ denote the
propagation path gain, the angle of departure (AoD), and the angle of arrival
(AoA) associated with the $i$th propagation path. The array response vector
$\boldsymbol{\alpha}(\phi_{1,i})\triangleq[1,\;\;e^{j\pi\sin(\phi_{1,i})},\ldots,e^{j(M-1)\pi\sin(\phi_{1,i})}]^{\mathsf{T}}\in\mathbb{C}^{M\times
1}$ is obtained by assuming half-wavelength inter-element spacing, and
$\boldsymbol{\alpha}(\theta_{1,i})\in\mathbb{C}^{N\times 1}$ can be formulated
in the same manner. We assume that
$g_{1,1}\sim\mathcal{CN}(0,\sigma_{\text{LoS}}^{2})$, and define the vectors
$\tilde{{\mathbf{g}}}_{1}\triangleq[g_{1,2},\ldots,g_{1,L_{1}}]^{\mathsf{T}}\sim\mathcal{CN}(\mathbf{0},\sigma_{\text{NLoS}}^{2}{\mathbf{I}}_{L_{1}-1})$,
${\mathbf{g}}_{1}\triangleq[g_{1,1},\tilde{{\mathbf{g}}}_{1}^{\mathsf{T}}]^{\mathsf{T}}$,
$\boldsymbol{\phi}_{1}\triangleq[\phi_{1,1},\ldots,\phi_{1,L_{1}}]^{\mathsf{T}}$,
$\boldsymbol{\theta}_{1}\triangleq[\theta_{1,1},\ldots,\theta_{1,L_{1}}]^{\mathsf{T}}$,
${\mathbf{A}}(\boldsymbol{\phi}_{1})\triangleq[\boldsymbol{\alpha}(\phi_{1,1}),\ldots,\boldsymbol{\alpha}(\phi_{1,L_{1}})]$,
and
${\mathbf{A}}(\boldsymbol{\theta}_{1})\triangleq[\boldsymbol{\alpha}(\theta_{1,1}),\ldots,\boldsymbol{\alpha}(\theta_{1,L_{1}})]$.
Similarly, the MS-RIS channel ${\mathbf{h}}_{2}\in\mathbb{C}^{N\times 1}$ can
be written as
${\mathbf{h}}_{2}=\sum\limits_{i=1}^{L_{2}}g_{2,i}\boldsymbol{\alpha}(\phi_{2,i})={\mathbf{A}}(\boldsymbol{\phi}_{2}){\mathbf{g}}_{2}.$
(2)
All the channel parameters in ${\mathbf{h}}_{2}$ are defined as those in
${\mathbf{H}}_{1}$. We also assume
$g_{2,1}\sim\mathcal{CN}(0,\sigma_{\text{LoS}}^{2})$,
$\tilde{{\mathbf{g}}}_{2}\triangleq[g_{2,2},\ldots,g_{2,L_{2}}]^{\mathsf{T}}\sim\mathcal{CN}(\mathbf{0},\sigma_{\text{NLoS}}^{2}{\mathbf{I}}_{L_{2}-1})$,
and define
${\mathbf{g}}_{2}\triangleq[g_{2,1},\tilde{{\mathbf{g}}}_{2}^{\mathsf{T}}]^{\mathsf{T}}$
and
${\mathbf{A}}(\boldsymbol{\phi}_{2})\triangleq[\boldsymbol{\alpha}(\phi_{2,1}),\ldots,\boldsymbol{\alpha}(\phi_{2,L_{2}})]$
with $L_{2}\ll N$.
The end-to-end uplink MS-RIS-BS channel (including the effect of the RIS) can
be written as
${\mathbf{h}}={\mathbf{H}}_{1}\boldsymbol{\Omega}{\mathbf{h}}_{2}={\mathbf{H}}_{1}\mathrm{diag}({\mathbf{h}}_{2})\boldsymbol{\omega},$
(3)
where $\boldsymbol{\Omega}=\mathrm{diag}(\boldsymbol{\omega})$ is the RIS
phase control matrix, with
$\boldsymbol{\omega}=[\omega_{1},\ldots,\omega_{N}]^{\mathsf{T}}$ and
$|\omega_{i}|=1$ for $\forall i$ [1]. It is worth noting that an RIS may be
composed of an array of amplifiers with increased power consumption and
hardware complexity [14]. In this case, the unit-modulus constraint on each
element $\omega_{i}$ can be relaxed. In the present paper, we are interested
in low-cost and low-complexity implementations of RISs, we hence focus on RISs
that can control only the phase response.
In (3), ${\mathbf{H}}_{1}\mathrm{diag}({\mathbf{h}}_{2})$ is referred to as
the cascaded channel. By knowing it, we can optimize the design of the RIS
phase control matrix and BS beamforming/combining vector. Let us define it as
${\mathbf{H}}_{c}\in\mathbb{C}^{M\times N}$, i.e.,
${\mathbf{H}}_{c}={\mathbf{H}}_{1}\mathrm{diag}({\mathbf{h}}_{2}).$ (4)
Based on the considered assumptions, we have
$\mathrm{rank}({\mathbf{H}}_{1})=L_{1}$ and
$\mathrm{rank}(\mathrm{diag}({\mathbf{h}}_{2}))=N$. Thus
$\mathrm{rank}({\mathbf{H}}_{c})\leq\mathrm{min}\\{\mathrm{rank}({\mathbf{H}}_{1}),\\\
\mathrm{rank}(\mathrm{diag}({\mathbf{h}}_{2}))\\}=L_{1}$. The inherent channel
sparsity (represented by the rank deficiency of the cascaded channel) can be
applied in order to enable an efficient yet accurate CE of (4).
## III Learning to Estimate
In this section, we first introduce the channel sounding procedure, and then
describe the optimization problem formulation for recovering the cascaded
channel by using conventional (model-based) methods. Finally, we describe the
model-driven deep unfolding method for estimating the rank-deficient cascaded
channel.
### III-A Channel Sounding
During the sounding process, pilot signals are sent from the MS to the BS via
the RIS. A different RIS phase control matrix is considered for each channel
use while the combining matrix at the BS is fixed. The received signal at
channel use $k$, for $k=1,\ldots,K$, can be written as
${\mathbf{y}}[k]={\mathbf{W}}^{\mathsf{H}}[k]{\mathbf{H}}_{1}\boldsymbol{\Omega}[k]{\mathbf{h}}_{2}s[k]+{\mathbf{W}}^{\mathsf{H}}[k]{\mathbf{n}}[k],$
(5)
where ${\mathbf{W}}[k]\in\mathbb{C}^{M\times N_{\text{W}}}$ is the combining
matrix at the BS with $N_{\text{W}}$ denoting the number of columns,222We
consider an analog combining matrix, which is a suitable choice for fulfilling
the requirements of reduced-complexity hybrid precoding architectures commonly
assumed for mmWave MIMO transceivers. When $N_{\text{W}}>N_{\text{RF}}$, with
$N_{\text{RF}}$ being the number of radio frequency (RF) chains at the BS, we
need $K\lceil N_{\text{W}}/N_{\text{RF}}\rceil$ channel uses to complete the
sounding process. Otherwise, $K$ channel uses are sufficient. $s[k]$ is the
pilot signal sent by the MS, and
${\mathbf{n}}[k]\sim\mathcal{CN}(0,\sigma^{2})$ is the additive white Gaussian
noise (AWGN) at the BS.
The received signal ${\mathbf{y}}[k]$ in (5) can be reformulated as
${\mathbf{y}}[k]={\mathbf{W}}^{\mathsf{H}}[k]{\mathbf{H}}_{c}\boldsymbol{\omega}[k]s[k]+{\mathbf{W}}^{\mathsf{H}}[k]{\mathbf{n}}[k],$
(6)
where $\boldsymbol{\Omega}[k]=\mathrm{diag}(\boldsymbol{\omega}[k])$.
Without loss of generality, we assume $s[1]=s[K]=1$ and
${\mathbf{W}}[1]={\mathbf{W}}[K]={\mathbf{W}}$. The received signals
${\mathbf{Y}}=[{\mathbf{y}}[1],\ldots,{\mathbf{y}}[K]]$ can be rewritten as
${\mathbf{Y}}={\mathbf{W}}^{\mathsf{H}}{\mathbf{H}}_{c}\bar{\boldsymbol{\Omega}}+{\mathbf{W}}^{\mathsf{H}}{\mathbf{N}},$
(7)
where
$\bar{\boldsymbol{\Omega}}=[\boldsymbol{\omega}[1],\ldots,\boldsymbol{\omega}[K]]$
and ${\mathbf{N}}=[{\mathbf{n}}[1],\ldots,{\mathbf{n}}[K]]$. An additional
vectorization step is considered for all the terms in (7), resulting in
${\mathbf{y}}=(\bar{\boldsymbol{\Omega}}^{\mathsf{T}}\otimes{\mathbf{W}}^{\mathsf{H}}){\mathbf{h}}_{c}+{\mathbf{n}},$
(8)
where
${\mathbf{y}}=\mathrm{vec}({\mathbf{Y}}),{\mathbf{h}}_{c}=\mathrm{vec}({\mathbf{H}}_{c})$,
and ${\mathbf{n}}=\mathrm{vec}({\mathbf{W}}^{\mathsf{H}}{\mathbf{N}})$. Based
on the vectorized received signal ${\mathbf{y}}$, we need to estimate the
vectorized cascaded channel ${\mathbf{h}}_{c}$. Let us define
$\boldsymbol{\Psi}=\bar{\boldsymbol{\Omega}}^{\mathsf{T}}\otimes{\mathbf{W}}^{\mathsf{H}}$.
Then, (7) can be simplified as
${\mathbf{y}}=\boldsymbol{\Psi}{\mathbf{h}}_{c}+{\mathbf{n}}$. Based on the
obtained signal model, the objective of this paper is to extract
${\mathbf{h}}_{c}$ from the noisy received signal ${\mathbf{y}}$ by assuming
that the matrix $\boldsymbol{\Psi}$ is known. This is accomplished by using
the deep unfolding method, which is detailed next.
### III-B Optimization Problem Formulation
In order to recover ${\mathbf{h}}_{c}$ from the noisy observation
${\mathbf{y}}$, we formulate the following regularized optimization problem
$\hat{{\mathbf{h}}}_{c}=\arg\min_{{\mathbf{h}}_{c}}\|{\mathbf{y}}-\boldsymbol{\Psi}{\mathbf{h}}_{c}\|_{2}^{2}+\lambda\mathrm{rank}({\mathbf{H}}_{c}),$
(9)
which takes into consideration the rank deficiency of the cascaded channel
${\mathbf{H}}_{c}$ and the impact of noise [15]. The regularization parameter
$\lambda>0$ is introduced to control the tradeoff between the data fitting and
the rank of the cascaded channel. The optimization problem in (9) can be
further reformulated as
$\hat{{\mathbf{h}}}_{c}=\arg\min_{{\mathbf{h}}_{c}}\|{\mathbf{y}}-\boldsymbol{\Psi}{\mathbf{h}}_{c}\|_{2}^{2}+\lambda\|{\mathbf{H}}_{c}\|_{*},$
(10)
which is obtained by relaxing $\mathrm{rank}({\mathbf{H}}_{c})$ with its
nuclear norm, i.e., $\|{\mathbf{H}}_{c}\|_{*}$. This is a convenient approach
because $\mathrm{rank}({\mathbf{H}}_{c})$ is a noncovex function of
${\mathbf{H}}_{c}$. In addition,
$\|{\mathbf{H}}_{c}\|_{\mathrm{F}}\leq\|{\mathbf{H}}_{c}\|_{*}\leq\sqrt{r}\|{\mathbf{H}}_{c}\|_{\mathrm{F}}$
with $r\geq 1$. Notably, when $\mathrm{rank}({\mathbf{H}}_{c})=1$ (e.g.,
${\mathbf{H}}_{1}$ has only the LoS path), we have
$\|{\mathbf{H}}_{c}\|_{*}=\|{\mathbf{H}}_{c}\|_{\mathrm{F}}$. Also, the
singular values of ${\mathbf{H}}_{c}$ have a high probability to fulfill the
following condition: $\sigma_{1}\gg\sigma_{2}>\cdots>\sigma_{L_{1}}$ with
$\sigma_{i}$ being the $i$th largest singular value of ${\mathbf{H}}_{c}$,
which results in
$\|{\mathbf{H}}_{c}\|_{*}\approx\|{\mathbf{H}}_{c}\|_{\mathrm{F}}$. Thus, we
further replace $\mathrm{rank}({\mathbf{H}}_{c})$ in (10) with
$\|{\mathbf{H}}_{c}\|_{\mathrm{F}}$, i.e., $\|{\mathbf{h}}_{c}\|_{2}$, which
yields
$\hat{{\mathbf{h}}}_{c}=\arg\min_{{\mathbf{h}}_{c}}\|{\mathbf{y}}-\boldsymbol{\Psi}{\mathbf{h}}_{c}\|_{2}^{2}+\lambda\|{\mathbf{h}}_{c}\|_{2}.$
(11)
To accurately solve this optimization problem, we need to carefully choose the
regularization parameter $\lambda$. The optimal value of $\lambda$ is,
however, difficult to obtain. As a reference, $\lambda$ is chosen equal to
$4\sigma^{2}\sqrt{\frac{MN(M+N)\log(M+N)}{N_{\text{W}}K}}$ [15].
### III-C Model-Driven Deep Unfolding
Deep unfolding is a deep neural network framework that mimics the conventional
gradient descent method. The difference lies in that deep unfolding is able to
learn from a large amount of (synthetic) data with enhanced performance and
reduced online implementation complexity and number of iterations. Typically,
this is exemplified in a reduced number of layers in the deep unfolding
network. When solving the optimization problem in (11) by using the
(conventional) gradient descent method, we iteratively update
${\mathbf{h}}_{c}^{(i)}$, with $(i)$ denoting the iteration index, as follows
${\mathbf{h}}_{c}^{(i)}={\mathbf{h}}_{c}^{(i-1)}-\beta\nabla
f({\mathbf{h}}_{c}^{(i-1)}),$ (12)
where $0<\beta<1$ is the step size and $\nabla f({\mathbf{h}}_{c}^{(i-1)})$ is
the gradient of
$f({\mathbf{h}}_{c})=\|{\mathbf{y}}-\boldsymbol{\Psi}{\mathbf{h}}_{c}\|_{2}^{2}+\lambda\|{\mathbf{h}}_{c}\|_{2}$
evaluated at ${\mathbf{h}}_{c}^{(i-1)}$, which can be expressed as
$\nabla
f({\mathbf{h}}_{c}^{(i-1)})=(\boldsymbol{\Psi}^{\mathsf{H}}\boldsymbol{\Psi}{\mathbf{h}}_{c}^{(i-1)}-\boldsymbol{\Psi}^{\mathsf{H}}{\mathbf{y}})+\lambda{\mathbf{h}}_{c}^{(i-1)}/\|{\mathbf{h}}_{c}^{(i-1)}\|_{2},$
(13)
when $\lambda$ is fixed. The initial value, i.e, ${\mathbf{h}}_{c}^{(0)}$, can
be set equal to the all-zero vector. In this case, the denominator
$\|{\mathbf{h}}_{c}^{(i-1)}\|_{2}$ in the last term of (13) needs to be
modified as $\|{\mathbf{h}}_{c}^{(i-1)}\|_{2}+\epsilon$ with $\epsilon>0$ when
$i=1$.
Substituting (13) into (12), we obtain
${\mathbf{h}}_{c}^{(i)}={\mathbf{h}}_{c}^{(i-1)}-\beta\boldsymbol{\Psi}^{\mathsf{H}}\boldsymbol{\Psi}{\mathbf{h}}_{c}^{(i-1)}+\beta\boldsymbol{\Psi}^{\mathsf{H}}{\mathbf{y}}-\beta\lambda{\mathbf{h}}_{c}^{(i-1)}/\|{\mathbf{h}}_{c}^{(i-1)}\|_{2}.$
(14)
The Gram matrix $\boldsymbol{\Psi}^{\mathsf{H}}\boldsymbol{\Psi}$, the
compressed statistics $\boldsymbol{\Psi}^{\mathsf{H}}{\mathbf{y}}$, and
${\mathbf{h}}_{c}^{(i-1)}$, are needed to apply the gradient descent
algorithm. Therefore, these three terms constitute the input variables of the
deep unfolding neural network model. To be specific, the $i$th layer of the
deep unfolding model for mimicking the gradient descent iteration in (14) is
introduced in Fig. 2. The accuracy and convergence speed of the channel
estimate in (14) highly depends on the specific choice of the step size
$\beta$ and the regularization parameter $\lambda$. In the considered deep
unfolding model, these parameters are learnable parameters that are
automatically determined during the data-driven training phase. To this end,
we introduce three generalized learnable parameters
$\delta_{1}^{(i)}\in[-1,\;0]$, $\delta_{2}^{(i)}\in[0,\;1]$, and
$\delta_{3}^{(i)}\in[-1,\;0]$, for the $i$th layer of the deep unfolding model
in Fig. 2. In (14), more specifically, $-\beta$ and $\beta$ in the second and
third term are replaced by $\delta_{1}^{(i)}$ and $\delta_{2}^{(i)}$,
respectively, and the product $-\beta\lambda/\|{\mathbf{h}}_{c}^{(i-1)}\|_{2}$
in the last term is enfolded in the learnable parameter $\delta_{3}^{(i)}$. As
shown in Fig. 2, in order to further enhance the prediction capabilities of
the deep unfolding network model, we serially concatenate the term
${\mathbf{h}}_{c}^{(i-1)}+\delta_{1}^{(i)}\boldsymbol{\Psi}^{\mathsf{H}}\boldsymbol{\Psi}{\mathbf{h}}_{c}^{(i-1)}+\delta_{2}^{(i)}\boldsymbol{\Psi}^{\mathsf{H}}{\mathbf{y}}+\delta_{3}^{(i)}{\mathbf{h}}_{c}^{(i-1)}$
with a learnable weight matrix ${\mathbf{M}}^{(i)}$, a bias vector
${\mathbf{b}}^{(i)}$, and a non-linear activation function. The complete deep
unfolding network model is illustrated in Fig. 3 and it comprises $L$ layers
from Fig. 2. In particular, the observations
$\\{\boldsymbol{\Psi}^{\mathsf{H}}\boldsymbol{\Psi},\boldsymbol{\Psi}^{\mathsf{H}}{\mathbf{y}}\\}$
are input to all the layers of the deep unfolding network model.
Figure 2: The $i$th layer of the deep unfolding network model for estimating
the cascaded channel vector. Figure 3: Complete deep unfolding network model
for channel estimation, which comprises $L$ layers from Fig. 2
## IV Numerical Results
In this section, we evaluate the performance of the proposed deep unfolding
network model against two benchmark schemes: (i) the LS estimator and (ii) the
direct solution of (10) by using the CVX toolbox. We evaluate the impact of
the training overhead, the training SNR, the number of paths, and the angular
parameter distribution. As far as the RIS phase control matrices as concerned,
their diagonal elements are set equal to the column vectors of a discrete
Fourier transform (DFT) matrix. A set of orthonormal vectors are considered
for ${\mathbf{W}}$, e.g., the normalized column vectors from a DFT matrix. It
is worth mentioning that we transform the data from the complex-valued domain
to the real-valued domain before applying the deep unfolding network model.
The channel ${\mathbf{h}}_{c}^{(0)}$ is set equal to the all-zero vector. In
the first $L-1$ layers, we use relu activation functions, while no activation
function is applied in the last layer. The loss function during the training
phase is the NMSE between the output cascaded channel vector and the ground-
truth cascaded channel vector. The Adam algorithm is used for training, whose
learning rate is $0.001$ during the first $20$ epochs and it is halved in the
remaining epochs, and the batch size is $64$. We use $1e5$ samples for
training and $1e4$ samples for testing. The rest of the parameter setup is
given in Table I.
### IV-A Impact of the Training Overhead
Fig. 4 shows the NMSE for a $1\times 16$ SIMO system (i.e., $M=16$) by using
the proposed deep unfolding approach as a function of the training overhead.
During the training phase, the SNR is $\gamma=1/\sigma^{2}=20$ dB. From Fig.
4, we see that the proposed scheme with $K=24$ channel uses for training
outperforms the LS estimator even if the latter uses a longer training phase
with $K=32$. Also, as expected, the higher the training overhead is, the lower
the NMSE of the proposed scheme is. It is worth noting that the proposed deep
unfolding method outperforms the numerical solution of (10) by using CVX. This
is attributed to the learning capability of the deep unfolded network through
the learnable parameters introduced in Fig. 2.
TABLE I: Parameter Setup. Parameter | Value
---|---
$L_{1}$ | $\\{1,2,3\\}$
$L_{2}$ | $\\{1,2,3\\}$
$\sigma_{\text{LoS}}^{2}$ | $1$
$\sigma_{\text{NLoS}}^{2}$ | $0.01$
$M$ | $16$
$N$ | $32$
$L$ | $15$
$\sin(\boldsymbol{\theta}_{1}),\sin(\boldsymbol{\phi}_{1}),\sin(\boldsymbol{\phi}_{2})$ | $\mathcal{U}[0,\;1]$
$K$ | $\\{24,28\\}$
$N_{\text{W}}$ | $8$
Figure 4: Impact of training overhead on estimating the cascaded channel for a
$1\times 16$ SIMO system with $N=32$ and $L_{1}=L_{2}=1$. Deep unfolding vs.
LS estimation and direct solution of (10).
### IV-B Impact of the Number of Paths
In this subsection, we study the impact of the number of paths, which is
increased from one to two and three. The SNR for training is $\gamma=20$ dB
and $K=28$. The corresponding NMSE is shown in Fig. 5. When the number of
paths increases, the rank of the cascaded channel increases accordingly. In
this case, Fig. 5 shows that the NMSE increases as the number of paths
increases. In other words, by keeping the training overhead fixed, the
proposed deep unfolding method benefits from the sparsity of the channel,
i.e., the number of paths is small.
Figure 5: Impact of the number of paths on estimating the cascaded channel for
a $1\times 16$ SIMO system with $N=32$.
### IV-C Impact of the Training SNR
In this subsection, we study the impact of the training SNR on the estimation
performance. Two SNR values, i.e., $\gamma=0$ dB, $\gamma=20$ dB, and an SNR
that varies in the set $\gamma\in\\{0,5,10,15,20\\}$ dB are considered. The
corresponding NMSE is shown in Fig. 6. We observe that the proposed deep
unfolding method provides the best NMSE when it is trained at a high SNR
except if the operating SNR during the test phase is too low.
Figure 6: Impact of the training SNR on estimating the cascaded channel for a
$1\times 16$ SIMO system with $N=32$.
### IV-D Impact of the Angular Parameter Distribution
In this subsection, we evaluate the impact of the angular parameter
distribution when estimating the cascaded channel. The corresponding NMSE is
shown in Fig. 7. We observe that the NMSE decreases when the range of
$\sin(\boldsymbol{\theta}_{1}),\sin(\boldsymbol{\phi}_{1}),\sin(\boldsymbol{\phi}_{2})$
decreases. In other words, the estimation accuracy of the proposed deep
unfolding method increases when the individual channels are subject to a
reduced variability.
Figure 7: Impact of the angular parameter distribution on estimating the
cascaded channel for a $1\times 16$ SIMO system with $N=32$.
## V Conclusions
In this letter, we have introduced a deep unfolding model for efficiently
estimating the end-to-end RIS channel in mmWave SIMO systems. With the aid of
simulation results, we have shown that the proposed approach can outperform
two benchmark schemes based on the LS method and a CVX-based numerical
solution of the channel estimation problem. The impact of the number of paths,
the training SNR, and the angular parameter distribution on the estimation
accuracy has been investigated. In addition, the proposed deep unfolding
network model has a low online prediction complexity, since it requires the
computation of vector matrix multiplications and additions. On the other hand,
the LS estimation methods usually require a matrix inversion.
Possible generalizations of the present work include the channel estimation
problem in RIS-aided multiuser MIMO systems, and the joint optimization of the
active and passive beamforming at the BS and at the RIS, respectively.
## References
* [1] Q. Wu and R. Zhang, “Beamforming optimization for wireless network aided by intelligent reflecting surface with discrete phase shifts,” _IEEE Trans. Commun._ , pp. 1–1, 2019.
* [2] C. Liaskos, A. Tsioliaridou, A. Pitsillides, S. Ioannidis, and I. F. Akyildiz, “Using any surface to realize a new paradigm for wireless communications,” _Communications of the ACM_ , vol. 61, pp. 30–33, 2018.
* [3] M. Di Renzo et al., “Smart radio environments empowered by reconfigurable AI meta-surfaces: an idea whose time has come,” _EURASIP J. Wireless Comm. and Networking_ , vol. 2019, p. 129, 2019.
* [4] H. Wymeersch, J. He, B. Denis, A. Clemente, and M. Juntti, “Radio localization and mapping with reconfigurable intelligent surfaces: Challenges, opportunities, and research directions,” _IEEE Veh. Technol. Mag._ , vol. 15, no. 4, pp. 52–61, 2020.
* [5] M. Di Renzo et al., “Smart radio environments empowered by reconfigurable intelligent surfaces: How it works, state of research, and the road ahead,” _IEEE J. Sel. Areas Commun._ , vol. 38, no. 11, pp. 2450–2525, 2020.
* [6] E. Basar et al., “Wireless communications through reconfigurable intelligent surfaces,” _IEEE Access_ , vol. 7, pp. 116 753–116 773, 2019\.
* [7] J. He, M. Leinonen, H. Wymeersch, and M. Juntti, “Channel estimation for RIS-aided mmWave MIMO channels,” in _proc. IEEE Global Communications Conference_ , 2020, pp. 1–6.
* [8] J. He, H. Wymeersch, and M. Juntti, “Channel estimation for RIS-aided mmWave MIMO systems via atomic norm minimization,” _IEEE Trans. Wireless Commun._ , pp. 1–1, 2021.
* [9] Z. He and X. Yuan, “Cascaded channel estimation for large intelligent metasurface assisted massive MIMO,” _IEEE Wireless Commun. Lett._ , vol. 9, no. 2, pp. 210–214, Feb 2020.
* [10] A. Zappone, M. Di Renzo, and M. Debbah, “Wireless networks design in the era of deep learning: Model-based, AI-based, or both?” _IEEE Trans. Commun._ , vol. 67, no. 10, pp. 7331–7376, 2019.
* [11] A. M. Elbir, A. Papazafeiropoulos, P. Kourtessis, and S. Chatzinotas, “Deep channel learning for large intelligent surfaces aided mm-wave massive MIMO systems,” _IEEE Wireless Commun. Lett._ , vol. 9, no. 9, pp. 1447–1451, 2020.
* [12] N. Samuel, T. Diskin, and A. Wiesel, “Learning to detect,” _IEEE Trans. Signal Process._ , vol. 67, no. 10, pp. 2554–2564, 2019.
* [13] K. Gregor and Y. LeCun, “Learning fast approximations of sparse coding,” in _proc. international conference on machine learning_ , 2010, pp. 399–406.
* [14] N. Landsberg and E. Socher, “A low-power 28-nm CMOS FD-SOI reflection amplifier for an active F-band reflectarray,” _IEEE Transactions on Microwave Theory and Techniques_ , vol. 65, no. 10, pp. 3910–3921, 2017.
* [15] Y. Chen and Y. Chi, “Harnessing structures in big data via guaranteed low-rank matrix estimation: Recent theory and fast algorithms via convex and nonconvex optimization,” _IEEE Signal Process. Mag._ , vol. 35, no. 4, pp. 14–31, 2018.
| arxiv-papers | 2021-07-27T06:57:56 | 2024-09-04T03:07:20.797251 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Jiguang He and Henk Wymeersch and Marco Di Renzo and Markku Juntti",
"submitter": "Jiguang He",
"url": "https://arxiv.org/abs/2107.12631"
} |
2107.12636 | # Exploring Sequence Feature Alignment for Domain Adaptive Detection
Transformers
Wen Wang1, Yang Cao1,2, Jing Zhang3, Fengxiang He4, Zheng-Jun Zha1 and
Yonggang Wen5, Dacheng Tao4 1 University of Science and Technology of China
2 Institute of Artificial Intelligence, Hefei Comprehensive National Science
Center
3 The University of Sydney, 4 JD Explore Academy, China, 5 Nanyang
Technological University [email protected], forrest, [email protected],
[email protected], hefengxiang, [email protected], [email protected]
(2021)
###### Abstract.
Detection transformers have recently shown promising object detection results
and attracted increasing attention. However, how to develop effective domain
adaptation techniques to improve its cross-domain performance remains
unexplored and unclear. In this paper, we delve into this topic and
empirically find that direct feature distribution alignment on the CNN
backbone only brings limited improvements, as it does not guarantee domain-
invariant sequence features in the transformer for prediction. To address this
issue, we propose a novel Sequence Feature Alignment (SFA) method that is
specially designed for the adaptation of detection transformers. Technically,
SFA consists of a domain query-based feature alignment (DQFA) module and a
token-wise feature alignment (TDA) module. In DQFA, a novel domain query is
used to aggregate and align global context from the token sequence of both
domains. DQFA reduces the domain discrepancy in global feature representations
and object relations when deploying in the transformer encoder and decoder,
respectively. Meanwhile, TDA aligns token features in the sequence from both
domains, which reduces the domain gaps in local and instance-level feature
representations in the transformer encoder and decoder, respectively. Besides,
a novel bipartite matching consistency loss is proposed to enhance the feature
discriminability for robust object detection. Experiments on three challenging
benchmarks show that SFA outperforms state-of-the-art domain adaptive object
detection methods. Code has been made available at:
https://github.com/encounter1997/SFA.
Object Detection, Detection Transformer, Domain Adaptation, Feature Alignment,
Matching Consistency
This work was done during Wen Wang’s internship at JD Explore Academy.
Corresponding Author: Yang Cao, Jing Zhang
††journalyear: 2021††copyright: acmcopyright††conference: Proceedings of the
29th ACM International Conference on Multimedia; October 20–24, 2021; Virtual
Event, China††booktitle: Proceedings of the 29th ACM International Conference
on Multimedia (MM ’21), October 20–24, 2021, Virtual Event, China††price:
15.00††doi: 10.1145/3474085.3475317††isbn: 978-1-4503-8651-7/21/10††ccs:
Theory of computation Machine learning theory††ccs: Computing methodologies
Computer vision problems
## 1\. Introduction
Figure 1. (a) Performance comparison between feature distribution alignment
applied on the CNN backbone and transformer (denoted as DA-CNN and DA-Seq,
respectively). Both methods are built on the Deformable DETR (Zhu et al.,
2020) with a ResNet-50 backbone and evaluated on the Cityscapes (Cordts et
al., 2016) to Foggy Cityscapes (Sakaridis et al., 2018) scenario. (b) T-SNE
visualization of features extracted by DA-CNN. While the CNN features are
well-align, the sequence feature extracted by transformer encoder and decoder
can be easily separated by domain.
pipeline
Object Detection is one of the fundamental tasks in computer vision and is an
essential and prepositive step for multimedia applications like captioning
(Zha et al., 2019; Zhang et al., 2020), visual grounding (Liu et al., 2019),
texture analysis (Zhai et al., 2019, 2020), person re-identification / person
search (Zheng et al., 2020a, 2021, b), etc.. Tremendous progress has been made
by CNN-based object detection methods in the last decade, e.g., Faster RCNN
(Ren et al., 2016), SSD (Liu et al., 2016) and FCOS (Tian et al., 2019).
However, they rely on heuristics like non-maximum suppression (NMS), and are
not fully end-to-end. Recently, detection transformers, e.g., DETR (Carion et
al., 2020) and Deformable DETR (Zhu et al., 2020), have attracted increasing
attention due to their merits of fully end-to-end pipeline and promising
performance. While effective, all these methods rely heavily on the labeled
training data, and suffer significant performance drops when the test data and
training data are sampled from different distributions, due to domain shifts.
To tackle this problem, unsupervised domain adaptive object detection (DAOD)
(Chen et al., 2018) attempts to train an object detector on the labeled source
domain that can be generalized to the unlabeled target domain. Existing DAOD
methods (Chen et al., 2018; Kim et al., 2019a; Hsu et al., 2020) have achieved
significant progress in improving the cross-domain performance for specific
object detection models, such as based on Faster RCNN, SSD, and FCOS. With the
recent surge of detection transformers, it is natural to ask, can we empower
them with such a capability to perform accurate object detection in cross-
domain scenarios?
A vanilla idea to solve this problem is to apply adversarial feature
distribution alignment (Ganin et al., 2016) on features extracted by the CNN
backbone (He and Zhang, 2019; Saito et al., 2019). As shown in Figure 1 (a),
direct feature alignment on the CNN backbone (denoted as DA-CNN) does improve
the detection transformer’s cross-domain performance, yet the improvement is
limited. We argue that this is because the feature distribution alignment on
the CNN backbone does not guarantee domain-invariant sequence features in the
subsequent transformer, which are directly utilized for prediction. In Figure
1 (b), we visualize the distribution of features extracted by DA-CNN. While
the source and target features extracted by the CNN backbone are well-aligned,
the sequence features extracted by the transformer encoder can be separated by
domain. Moreover, as the network goes deeper, the distribution gaps in the
decoder feature become even more significant. As a result, the detection
transformer obtains inferior performance based on the shifted sequence
features.
To tackle this problem, we propose a novel sequence feature alignment (SFA)
method that is specially designed for the domain adaptation of detection
transformers. SFA consists of a domain query-based feature alignment (DQFA)
module and a token-wise feature alignment (TDA) module upon the transformer
structure. Specifically, the DQFA utilizes a novel domain query to aggregate
global context from the sequence for feature alignment. When applied to the
transformer encoder and decoder, DQFA alleviates the domain gaps on global-
level and object relations, respectively. Meanwhile, the TDA focus on feature
alignment of each token in the sequence, it effectively closes domain gaps at
local- and instance-level when applied to the encoder and decoder,
respectively. Besides, a novel bipartite matching consistency loss is proposed
to regularize the detection transformer and improve its discriminability for
robust object detection. Experiments on three challenging benchmarks show that
SFA significantly improves detection transformers’ cross-domain performance
and outperforms existing DAOD methods built on various object detectors. The
main contribution of this paper can be summarized as follows:
* •
We dedicate to improving detection transformers’ cross-domain performance,
which is still unexplored and unclear. Empirically, we observe that direct
feature distribution alignment on the CNN backbone only brings limited
improvements, as it does not guarantee domain-invariant sequence features in
the transformer for prediction.
* •
We propose Sequence Feature Alignment (SFA) that is specially designed for
domain adaptation of detection transformers. It consists of a domain query-
based feature alignment (DQFA) module and a token-wise feature alignment (TDA)
module for aligning sequence features on a global- and local-level,
respectively. Moreover, we provide technical insight on the explicit meanings
of these modules when applied to the transformer encoder and decoder.
* •
A novel bipartite matching consistency loss is proposed to further regularize
the sequence features and improve the discriminability of the detection
transformers.
* •
Extensive experiments on three challenging domain adaptation scenarios,
including weather adaptation, synthetic to real adaptation, and scene
adaptation, verify the effectiveness of our method, where SFA outperforms
existing DAOD methods and achieves state-of-the-art (SOTA) performance.
## 2\. Related work
### 2.1. Object Detection
Object detection is one of the fundamental tasks in computer vision (Chen et
al., 2020; Zhang and Tao, 2020). Representative deep learning-based object
detectors can be roughly categorized as two-stage methods, e.g., Faster RCNN
(Ren et al., 2016), and single-stage methods, e.g., YOLO (Redmon et al., 2016)
and SSD (Liu et al., 2016). While the former ones generally show better
performance, the latter ones are faster during inference. Although significant
progress has been made, these object detectors are not fully end-to-end and
heavily rely on hand-crafted components, such as anchor box generation and
non-maximum suppression (NMS) post-processing. Recently, DETR (Carion et al.,
2020) provides a simple and clean pipeline for object detection. It views
object detection as a direct set prediction problem and explores transformer
(Vaswani et al., 2017; Ding et al., 2020; Shen et al., 2021a, b) and bipartite
matching for effective object detection. The success of DETR brought the
recent surge of detection transformers. Deformable DETR (Zhu et al., 2020)
proposes a novel deformable attention, which speeds up model training with
learnable sparse sampling and improves model performance by integrating multi-
scale features. UP-DETR (Dai et al., 2020) introduces a novel self-supervised
pre-training scheme to improve the performance of DETR with faster
convergence.
#### 2.1.1. Formulation of Detection Transformers
The detection transformer models generally consist of three parts: the CNN
backbone for base feature extraction, the transformer for sequence feature
modeling, and feed-forward network (FFN) for prediction. The CNN backbone
extracts hierarchical feature representation ${\\{f^{l}\\}}_{l=1}^{L}$ from
the input images, where $L$ is the number of feature levels and
$f^{l}\in\mathbb{R}^{H^{l}\times W^{l}\times C^{l}}$ is the $l$-th feature
map. Afterwards, the hierarchical features are flatten and embedded to form an
one-dimensional sequence $f_{e}\in\mathbb{R}^{N\times C}$, whose length is
$N=\sum_{l=1}^{L}H^{l}W^{l}$ and the dimension of feature embeddings is $C$.
The input of the transformer is denoted as ${z}_{0}$, which is $f_{e}$
augmented with explicit embeddings such as positional embedding and level
embedding (Zhu et al., 2020).
The transformer consists of an encoder and a decoder. The encoder is a stack
of $L_{enc}$ encoder layers. Each encoder layer $\text{EncLayer}_{\ell}$ takes
previous layer’s output ${z}_{\ell-1}$ and the sample position reference
${p}_{\ell}$ as input and outputs the encoded sequence feature ${z}_{\ell}$ as
follows,
(1)
${z}_{\ell}=\text{EncLayer}_{\ell}\left({z}_{\ell-1},{p}_{\ell}\right),\quad\ell=1\ldots
L_{enc}.$
Similarly, the decoder is a stack of $L_{dec}$ decoder layers. The input token
sequence in the transformer decoder is initialized as $q_{0}$, each decoder
layer $\text{DecLayer}_{\ell}$ takes the previous decoder layer’s output
${q}_{\ell-1}$, the sample position reference ${p}_{\ell}$, and the encoder
output ${z}_{L_{enc}}$ as input and outputs the decoded sequence features as
follows,
(2)
${q}_{\ell}=\text{DecLayer}_{\ell}\left({q}_{\ell-1},{p}_{\ell-1},{z}_{L_{enc}}\right),\quad\ell=1\ldots
L_{{dec}}.$
Detection transformers (Carion et al., 2020; Zhu et al., 2020) usually adopt
deep supervision (Lee et al., 2015) to facilitate model training.
Classification probability vectors and bounding boxes are predicted based on
the output of each decoder layer by the FFN, and are used to compute the
auxiliary loss on the source domain. We denote the supervised loss on the
source domain as $\mathcal{L}_{{det}}$, which is defined in (Carion et al.,
2020; Zhu et al., 2020).
### 2.2. Domain Adaptive Object Detection
Domain adaptive object detection (DAOD) has been raised very recently for
unconstrained scenes(Chen et al., 2018). DAF (Chen et al., 2018) adopts
adversarial feature alignment (Ganin et al., 2016; ZHANG et al., 2019) at both
image-level and instance-level. SWDA (Saito et al., 2019) adopts strong
alignment on local features and weak alignment on global features from the CNN
backbone. SCDA (Zhu et al., 2019) aligns region-level features across domains
via grouping instances into regions. MTOR (Cai et al., 2019) integrates object
relations into the measure of consistency cost between teacher and student
modules for adaptation. Xu et al.(Xu et al., 2020b) explore image-level
categorical regularization and categorical consistency regularization for
robust detection across domains. GPA (Xu et al., 2020a) explores graph-induced
prototype and class reweighted contrastive loss for effective feature
alignment and adaptation. While these methods are built on the seminal Faster
RCNN (Ren et al., 2016), Kim et al.(Kim et al., 2019a) propose an SSD-based
domain adaptive object detector and explore effective self-training and
adversarial background regularization for adaptation. Hsu et al.(Hsu et al.,
2020) build an adaptive object detector base on FCOS. They estimating pixel-
wise objectness and centerness and adopting center-aware feature alignment to
close the domain gaps. Although significant progress has been made, most of
these methods rely on specific model architecture, e.g., Faster RCNN, SSD, and
FCOS, therefore cannot be directly applied to detection transformers. In this
paper, we dedicate to improve detection transformers’ cross-domain
performance, which is still unexplored and unclear.
Figure 2. Diagram of our sequence feature alignment (SFA) for domain adaptive
detection transformers. Domain query-based feature alignment and token-wise
feature alignment tackles global and local domain gaps, respectively.
Moreover, a bipartite matching consistency loss is proposed to improve the
model’s discriminability. Here object queries with the same color are matched
to the same ground-truth object, while object queries with the same shape come
from the same decoder layer.
model
## 3\. Methods
This section introduces our Sequence Feature Alignment (SFA) for domain
adaptive detection transformers. In unsupervised domain adaptation, the
training data includes the labeled source images and the unlabeled target
images. Our goal is to train an object detector on the training data that can
generalize to the target domain.
As described in Section 1, feature distribution alignment on the CNN backbone
only brings limited improvements, as it does not guarantee domain-invariant
sequence features in transformer, which are directly utilized for final
prediction. To solve the problem, we explore effective distribution alignment
on the sequence features in transformer. Specifically, domain query-based
sequence feature alignment (Section 3.1) and token-wise sequence feature
alignment (Section 3.2) equipped with a hierarchical domain adaptation
strategy (Section 3.3) are proposed. Moreover, in Section 3.4, we explore
bipartite matching consistency to constrain the sequence features, which
further improve detection transformer’s discriminability on the target domain.
The overall framework of our SFA is shown in Figure 2. We use Deformable DETR
(Zhu et al., 2020) as the default detection framework, while our sequence
feature alignment can also be applied to other detection transformer methods,
e.g., DETR (Carion et al., 2020).
### 3.1. Domain Query-based Feature Alignment
To obtain domain-invariant sequence features, we first propose the domain
query-based feature alignment to align source and target features from a
global perspective. Specifically, on the encoder side, a domain query
embedding ${q}_{{d}}^{{enc}}$ is concatenated with the token sequence to form
the input ${z}_{0}$ to transformer encoder, $i.e.$,
(3)
$\displaystyle{z}_{0}=\left[{q}_{{d}}^{{enc}};{f}_{e}^{1};{f}_{e}^{2};\cdots;{f}_{e}^{{N}}\right]+{E}_{{pos}}+{E}_{{level}},$
where ${E}_{{pos}}\in\mathbb{R}^{(N+1)\times C}$ is the positional embedding,
${E}_{{level}}\in\mathbb{R}^{(N+1)\times C}$ is the feature level embedding
(Zhu et al., 2020).
In the encoding process, the domain query aggregates domain-specific features
from the whole sequence in an adaptive manner. It encodes the global context
in input images and puts more concentration on tokens with significant domain
gaps. We input this domain query into a domain discriminator $D_{{enc}_{{q}}}$
for feature alignment, $i.e.$,
(4)
$\mathcal{L}_{{enc}_{q}}^{\ell}=d\log{D}_{{enc}_{{q}}}\left({z}_{\ell}^{0}\right)+(1-d)\log\left(1-{D}_{{enc}_{{q}}}\left({z}_{\ell}^{0}\right)\right),$
where $\ell=1\ldots L_{{enc}}$ indexes layers in the encoder, $d$ is the
domain label, which values 0 for source images and 1 for target images.
Similarly, we concatenate a domain query ${q}_{{d}}^{{dec}}$ with the object
queries to obtain the input sequence to the transformer decoder:
(5)
${q}_{0}=\left[{q}_{{d}}^{{dec}};{q}^{1};{q}^{2};\cdots;{q}^{M}\right]+{E}_{{pos}}^{{}^{\prime}},\quad$
where ${E}_{{pos}}^{{}^{\prime}}\in\mathbb{R}^{\left({M}+1\right)\times C}$ is
the positional embedding and ${q}^{i}$ is the $i$-th object query in the
sequence. In the decoding process, the domain query fuses context features
from each object query in the sequence, which explicitly models the object
relations. We feed the domain query to domain discriminator
${D}_{{dec}_{{k}}}$ for feature alignment:
(6)
$\mathcal{L}_{dec_{q}}^{\ell}=d\log{D}_{{dec}_{{k}}}\left({q}_{\ell}^{0}\right)+(1-d)\log\left(1-{D}_{{dec}_{{q}}}\left({q}_{\ell}^{0}\right)\right),$
where $\ell=1\ldots L_{dec}$ indexes the layers in the transformer decoder.
##### Remarks.
Although both encoder and decoder adopt the domain query to perform sequence
feature alignment for reducing domain gaps, it should be noted that they have
different implications. Specifically, since the sequence features in the
encoder are derived from feature maps extracted by the CNN backbone, the
domain query aggregates global features that reflect scene layout in images
for alignment. While the sequence features in the decoder represent object
instances, thus the domain query encodes object relationships for adaptation.
Moreover, with the help of the attention mechanism and adversarial learning,
the domain query-based feature alignment adaptively puts more effort on
aligning features with significant domain gaps, while less effort on features
with smaller ones.
### 3.2. Token-wise Feature Alignment
The domain query-based global feature alignment can effectively close global
domain gaps in scene layout and inter-object relationships, but it struggles
to address the domain shift caused by local texture and style. To solve this
problem, we propose token-wise sequence feature alignment and apply it to both
encoder and decoder.
Specifically, each token embedding in the encoder sequence are fed into a
domain classifier ${D}_{{enc}_{{k}}}$ for adversarial feature alignment:
(7)
$\mathcal{L}_{enc_{k}}^{\ell}=-\frac{1}{N}\sum_{i=1}^{N}\left[d\log{D}_{{enc}_{{k}}}\left({z}_{\ell}^{i}\right)+(1-d)\log\left(1-{D}_{{enc}_{{k}}}\left({z}_{\ell}^{i}\right)\right)\right].$
Similarly, a domain discriminator $D_{\operatorname{dec}_{k}}$ is attached on
the decoder side to align each token embedding in the decoder sequence,
$i.e.$,
(8) $\mathcal{L}_{dec_{k}}^{\ell}=-\frac{1}{M}\sum_{i=1}^{M}\left[d\log
D_{{dec}_{k}}\left({q}_{\ell}^{i}\right)+(1-d)\log\left(1-D_{{dec}_{q}}\left({q}_{\ell}^{i}\right)\right)\right].$
##### Remarks.
Although both encoder and decoder adopt the token-wise sequence feature
alignment, it should be noted that they have different implications.
Specifically, since each token in the encoder sequence represents a local area
of the image, the token-wise sequence feature alignment here alleviates domain
gaps caused by local texture, appearance, etc.. By contrast, each token at the
decoder side represents an individual object, therefore, the token-wise
sequence feature alignment closes domain gaps at the instance level.
It should be noted that the domain query-based feature alignment cannot be
replaced by the token-wise feature alignment. Although tokens in transformer
also aggregate global features to some extent, they are generated from small
image patch (tokens in encoder sequence) or target at one specific object
instance (tokens in decoder sequence), thus they inherently have the tendency
to focus more on local content of the image (with more weight on themselves
and their close neighbors during the attention process). By contrast, domain
queries do not need to focus on local features or instances, thus can better
aggregate global context and close domain gaps related to scene layout and
inter-object relationships without bias.
### 3.3. Hierarchical Sequence Feature Alignment
To achieve a more comprehensive feature alignment, we adopt hierarchical
feature alignment to progressively align the source and target sequence
features in a shallow to deep manner. The hierarchical feature alignment on
sequences in the transformer encoder is described as:
(9)
$\mathcal{L}_{enc}=\sum_{l=1}^{L_{enc}}\left(\mathcal{L}_{enc_{k}}^{\ell}+\lambda_{enc_{q}}\mathcal{L}_{enc_{q}}^{\ell}\right),$
where $\lambda_{enc_{q}}$ is a hyperparameter to balance the query-based
alignment loss and token-based alignment loss. It is set as 0.1 in our
experiments. Similarly, the hierarchical feature alignment is applied on the
sequence features in the transformer decoder, $i.e.$,
(10)
$\mathcal{L}_{dec}=\sum_{l=1}^{L_{dec}}\left(\mathcal{L}_{dec_{k}}^{\ell}+\lambda_{dec_{q}}\mathcal{L}_{dec_{q}}^{\ell}\right),$
where $\lambda_{dec_{q}}$ is a hyperparameter similar to $\lambda_{enc_{q}}$,
and is also set as 0.1 in our experiments. For both encoder and decoder,
3-layer MLPs are adopted as the discriminators. Hierarchical feature alignment
facilitates better alignment on the sequence features.
### 3.4. Bipartite Matching Consistency
Detection transformers (Carion et al., 2020; Zhu et al., 2020) adopt deep
supervision (Lee et al., 2015) for training. Auxiliary output are generated on
each decoder layer. The auxiliary output on the $\ell$-th decoder layer is
denoted as $\hat{y}_{\ell}$, which contains predictions for $M$ object
instances. Prediction for each instance includes a class probability vector
$\hat{c}_{\ell}^{i}$ and a bounding box prediction $\hat{b}_{\ell}^{i}$. The
auxiliary output can be written as:
(11)
$\hat{y}_{\ell}=\left[\left(\hat{c}_{\ell}^{1},\hat{b}_{\ell}^{1}\right),\left(\hat{c}_{\ell}^{2},\hat{b}_{\ell}^{2}\right),\ldots,\left(\hat{c}_{\ell}^{M},\hat{b}_{\ell}^{M}\right)\right].$
Detection transformers view object detection as a set prediction problem, and
use bipartite matching to make one-to-one correspondences between the model
output and the ground-truth objects or background class $\varnothing$ in the
image (Carion et al., 2020). Since no semantic label is available on the
target domain, the object detector is prone to produce inaccurate matches
between object queries and ground-truth objects on the target domain. To
tackle this problem, we ensemble the outputs of different decoder layers and
constrain the outputs of each decoder layer to produce consistent bipartite
matching during training. The loss is defined as:
(12)
$\mathcal{L}_{{cons}}=\frac{1}{L_{{dec}}}\sum_{\ell=1}^{L_{{dec}}}\mathcal{L}_{{cons}}\left(\hat{y},\hat{y}_{\ell}\right),$
where $\hat{y}$ is the reference output obtained by averaging the predictions
of all decoder layers, $\mathcal{L}_{\text{cons }}$ is the consistency loss
that measures the bipartite matching consistency between two predictions.
Specifically, it is the combination of JS-divergence between the
classification outputs and the L1 distance between bounding box regression
outputs, $i.e.$,
(13)
$\mathcal{L}_{{cons}}\left(\hat{y}_{\ell^{\prime}},\hat{y}_{\ell}\right)=\sum_{i=1}^{M}\left[\text{JSD}\left(\hat{c}_{\ell^{\prime}}^{i}\|\hat{c}_{\ell}^{i}\right)+\lambda_{\mathrm{L}1}\left\|\hat{b}_{\ell^{\prime}}^{i}-\hat{b}_{\ell}^{i}\right\|_{1}\right],$
where $\text{JSD}(\cdot\|\cdot)$ represents JS-divergence,
$\lambda_{\mathrm{L}1}$ is a hyper-parameter to balance the two losses. In
this way, we constrain the output of different decoder layers to be consistent
and improve the detection transformer’s discriminability on the target domain.
Table 1. Results of different methods for weather adaptation, $i.e.$, Cityscapes to Foggy Cityscapes. FRCNN and DefDETR are abbreviations for Faster RCNN and Deformable DETR, respectively. Method | Detector | person | rider | car | truck | bus | train | mcycle | bicycle | mAP
---|---|---|---|---|---|---|---|---|---|---
Faster RCNN (Source) | FRCNN | 26.9 | 38.2 | 35.6 | 18.3 | 32.4 | 9.6 | 25.8 | 28.6 | 26.9
DAF (Chen et al., 2018) | FRCNN | 29.2 | 40.4 | 43.4 | 19.7 | 38.3 | 28.5 | 23.7 | 32.7 | 32.0
DivMatch (Kim et al., 2019b) | FRCNN | 31.8 | 40.5 | 51.0 | 20.9 | 41.8 | 34.3 | 26.6 | 32.4 | 34.9
SWDA (Saito et al., 2019) | FRCNN | 31.8 | 44.3 | 48.9 | 21.0 | 43.8 | 28.0 | 28.9 | 35.8 | 35.3
SCDA (Zhu et al., 2019) | FRCNN | 33.8 | 42.1 | 52.1 | 26.8 | 42.5 | 26.5 | 29.2 | 34.5 | 35.9
MTOR (Cai et al., 2019) | FRCNN | 30.6 | 41.4 | 44.0 | 21.9 | 38.6 | 40.6 | 28.3 | 35.6 | 35.1
CR-DA (Xu et al., 2020b) | FRCNN | 30.0 | 41.2 | 46.1 | 22.5 | 43.2 | 27.9 | 27.8 | 34.7 | 34.2
CR-SW (Xu et al., 2020b) | FRCNN | 34.1 | 44.3 | 53.5 | 24.4 | 44.8 | 38.1 | 26.8 | 34.9 | 37.6
GPA (Xu et al., 2020a) | FRCNN | 32.9 | 46.7 | 54.1 | 24.7 | 45.7 | 41.1 | 32.4 | 38.7 | 39.5
FCOS (Source) | FCOS | 36.9 | 36.3 | 44.1 | 18.6 | 29.3 | 8.4 | 20.3 | 31.9 | 28.2
EPM (Hsu et al., 2020) | FCOS | 44.2 | 46.6 | 58.5 | 24.8 | 45.2 | 29.1 | 28.6 | 34.6 | 39.0
Deformable DETR (Source) | DefDETR | 37.7 | 39.1 | 44.2 | 17.2 | 26.8 | 5.8 | 21.6 | 35.5 | 28.5
SFA (Ours) | DefDETR | 46.5 | 48.6 | 62.6 | 25.1 | 46.2 | 29.4 | 28.3 | 44.0 | 41.3
### 3.5. Total Loss
To summarize, the final training objective of SFA is defined as:
(14)
$\displaystyle\min_{G}\max_{D}\mathcal{L}_{{det}}(G)-\lambda_{enc}\mathcal{L}_{enc}(G,D)$
$\displaystyle-\lambda_{dec}\mathcal{L}_{dec}(G,D)$
$\displaystyle+\lambda_{con}\mathcal{L}_{{cons}}(G),$
where $G$ is the object detector and $D$ denotes the domain discriminators.
$\lambda_{dec}$, and $\lambda_{cons}$ are hyper-parameters that balance the
loss terms. The min-max loss function is implemented by gradient reverse
layers (Ganin et al., 2016).Our method is not restricted to specific detection
transformer. Instead, it is widely applicable to the family of detection
transformers, such as DETR (Carion et al., 2020) and Deformable DETR (Zhu et
al., 2020).
## 4\. Theoretical Analysis
This section theoretically analyses our method. The performance on the target
domain is decomposed into three factors: (1) the expected error on the source
domain; (2) the domain divergence between source and target; and (3) the error
of the ideal joint hypothesis shared by both domains. The domain divergence
can further be estimated via a generalization bound.
### 4.1. Domain Adaptation Analysis
According to the theory of domain adaptation by Ben-David et al. (Ben-David et
al., 2010), the expected error on the target samples, $R_{\mathcal{T}}(h)$,
can be decomposed into three terms, as shown in the following theorem:
###### Theorem 4.1.
Let $H$ be the hypothesis class. Given two domains $\mathcal{S}$ and
$\mathcal{T}$, we have
(15) $\displaystyle\begin{split}\forall h\in H,R_{\mathcal{T}}(h)&\leq
R_{\mathcal{S}}(h)+\frac{1}{2}{d_{\mathcal{H}\Delta\mathcal{H}}(\mathcal{S},\mathcal{T})}+\lambda.\\\
\end{split}$
Here, $R_{\mathcal{T}}(h)$ is the error of hypothesis $h$ on the target
domain, and $R_{\mathcal{S}}(h)$ is the corresponding error on the source
domain. ${d_{\mathcal{H}\Delta\mathcal{H}}(\mathcal{S},\mathcal{T})}$
represents the domain divergence that is associated with the feature
transferability, and $\lambda=\min_{h\in
H}\left[R_{\mathcal{S}}(h)+R_{\mathcal{T}}(h)\right]$ is the error of joint
ideal hypothesis that is associate with the feature discriminability.
In Inequality 15, $R_{\mathcal{S}}$ is easily minimized by the supervised loss
on source domain. Besides, our token-wise feature alignment minimizes the
domain divergence $d_{\mathcal{H}\Delta\mathcal{H}}(\mathcal{S},\mathcal{T})$
and improves the feature transferability. In the meantime, domain-query
feature alignment adaptively selects and aligns token features with
significant domain gaps while maintaining discriminability for features with
smaller domain shifts. Bipartite matching consistency loss ensembles
predictions made by multiple decoder layers to obtain a more accurate result.
These designs ensure the feature discriminability on the target domain and
minimize $\lambda$.
### 4.2. Generalization Analysis
Adversarial training is employed to help learn the mapping from the target
domain to the source domain. The generalizability determines the performance
of the mapping (Mohri et al., 2012; He and Tao, 2020).
Denote the generating distributions of the existing data $\mu$ and the
generating distribution of the generated data as $\nu$. Denote the empirical
counterparts of $\mu$ and $\nu$ are $\hat{\mu}_{N}$ and $\nu_{N}$, where $N$
is the size of the training sample set. Suppose adversarial training is
learning a generator $g\in\mathcal{G}$ and a discriminator $f\in\mathcal{F}$,
where $\mathcal{G}$ and $\mathcal{F}$ are both the hypothesis classes. As
described in Section 3.3, the discriminator is a three-layer MLP which is
constituted by three fully connected layers and three nonlinear operations
(nonlinearities), $(A_{1},\sigma_{1},A_{2},\sigma_{2},A_{3},\sigma_{3})$,
where $A_{i}$ is a fully connected layer, and $\sigma_{i}$ is a nonlinearity
(ReLU). Then we have the following theory.
###### Theorem 4.2 (Covering bound for the discriminator).
Suppose the spectral norm of each weight matrix is bounded:
$\|A_{i}\|_{\sigma}\leq s_{i}$. Also, suppose each weight matrix $A_{i}$ has a
reference matrix $M_{i}$, which is satisfied that
$\|A_{i}-M_{i}\|_{\sigma}\leq b_{i}$, $i=1,\ldots,3$. Then, the
$\varepsilon$-covering number satisfies that
$\displaystyle\log\mathcal{N}\left(\mathcal{F}|_{S},\varepsilon,\|\cdot\|_{2}\right)$
(16) $\displaystyle\leq$
$\displaystyle\frac{\log\left(2W^{2}\right)\|X\|_{2}^{2}}{\varepsilon^{2}}\left(\prod_{i=1}^{3}s_{i}\right)^{2}\sum_{i=1}^{3}\frac{b_{i}^{2}}{s_{i}^{2}},$
where $W$ is the largest dimension of the feature maps throughout the
algorithm.
This theorem is based on (Bartlett et al., 2017; He et al., 2020). A detailed
proof is given in the Supplementary Material. Also, Zhang et al. (Zhang et
al., 2018) suggests that the generalizability of a GAN (Goodfellow et al.,
2014; Ganin et al., 2016) is determined by the hypothesis complexity of the
discriminator. Following this insight, we employ simple discriminators to
enhance the generalizability and further enhance the domain adaptation
performance.
Table 2. Results of different methods for synthetic to real adaptation, $i.e.$, Sim10k to Cityscapes. Methods | Detector | _car_ AP
---|---|---
Faster RCNN (Source) | FRCNN | 34.6
DAF (Chen et al., 2018) | FRCNN | 41.9
DivMatch (Kim et al., 2019b) | FRCNN | 43.9
SWDA (Saito et al., 2019) | FRCNN | 44.6
SCDA (Zhu et al., 2019) | FRCNN | 45.1
MTOR (Cai et al., 2019) | FRCNN | 46.6
CR-DA (Xu et al., 2020b) | FRCNN | 43.1
CR-SW (Xu et al., 2020b) | FRCNN | 46.2
GPA (Xu et al., 2020a) | FRCNN | 47.6
FCOS (Source) | FCOS | 42.5
EPM (Hsu et al., 2020) | FCOS | 47.3
Deformable DETR (Source) | DefDETR | 47.4
SFA (Ours) | DefDETR | 52.6
## 5\. Experimental Results
In this section, we evaluate the proposed SFA on three challenging domain
adaptation scenarios. Ablation studies are performed to investigate the impact
of each component in SFA. Finally, visualization and analysis are presented
for better understanding.
Table 3. Results of different methods for scene adaptation, $i.e.$, Cityscapes to BDD100k daytime subset. Methods | Detector | person | rider | car | truck | bus | mcycle | bicycle | mAP
---|---|---|---|---|---|---|---|---|---
Faster R-CNN (Source) | FRCNN | 28.8 | 25.4 | 44.1 | 17.9 | 16.1 | 13.9 | 22.4 | 24.1
DAF (Chen et al., 2018) | FRCNN | 28.9 | 27.4 | 44.2 | 19.1 | 18.0 | 14.2 | 22.4 | 24.9
SWDA (Saito et al., 2019) | FRCNN | 29.5 | 29.9 | 44.8 | 20.2 | 20.7 | 15.2 | 23.1 | 26.2
SCDA (Zhu et al., 2019) | FRCNN | 29.3 | 29.2 | 44.4 | 20.3 | 19.6 | 14.8 | 23.2 | 25.8
CR-DA (Xu et al., 2020b) | FRCNN | 30.8 | 29.0 | 44.8 | 20.5 | 19.8 | 14.1 | 22.8 | 26.0
CR-SW (Xu et al., 2020b) | FRCNN | 32.8 | 29.3 | 45.8 | 22.7 | 20.6 | 14.9 | 25.5 | 27.4
FCOS (Tian et al., 2019) (Source) | FCOS | 38.6 | 24.8 | 54.5 | 17.2 | 16.3 | 15.0 | 18.3 | 26.4
EPM (Hsu et al., 2020) | FCOS | 39.6 | 26.8 | 55.8 | 18.8 | 19.1 | 14.5 | 20.1 | 27.8
Deformable DETR (Source) | DefDETR | 38.9 | 26.7 | 55.2 | 15.7 | 19.7 | 10.8 | 16.2 | 26.2
SFA (Ours) | DefDETR | 40.2 | 27.6 | 57.5 | 19.1 | 23.4 | 15.4 | 19.2 | 28.9
Table 4. Ablation studies on the Cityscapes to Foggy Cityscapes scenario. CNN represents feature alignment on the CNN backbone. DQ, TW, BMC, and HR represent domain query-based feature alignment, token-wise feature alignment, bipartite matching consistency, and hierarchical feature alignment, respectively. Methods | CNN | DQ | TW | BMC | HR | person | rider | car | truck | bus | train | mcycle | bicycle | mAP
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---
Deformable DETR (Source) | | | | | | 37.7 | 39.1 | 44.2 | 17.2 | 26.8 | 5.8 | 21.6 | 35.5 | 28.5
Proposed | $\checkmark$ | | | | | 43.8 | 45.6 | 55.5 | 18.2 | 38.7 | 8.4 | 28.1 | 43.3 | 35.2
| $\checkmark$ | | | | 45.1 | 46.8 | 61.3 | 21.6 | 36.6 | 9.5 | 30.6 | 40.4 | 36.5
| | $\checkmark$ | | | 45.6 | 47.6 | 60.7 | 23.6 | 41.3 | 15.5 | 26.2 | 41.1 | 37.7
| | | $\checkmark$ | | 38.0 | 39.3 | 45.6 | 16.5 | 28.4 | 6.0 | 24.5 | 37.5 | 29.5
| $\checkmark$ | $\checkmark$ | | | 45.7 | 47.6 | 61.6 | 23.7 | 43.8 | 16.4 | 28.2 | 43.3 | 38.8
| $\checkmark$ | $\checkmark$ | | $\checkmark$ | 46.0 | 46.7 | 62.4 | 24.1 | 45.6 | 22.1 | 27.6 | 43.9 | 39.8
$\checkmark$ | $\checkmark$ | $\checkmark$ | | $\checkmark$ | 46.3 | 48.2 | 62.2 | 22.1 | 43.4 | 24.3 | 29.9 | 43.1 | 39.9
SFA (Ours) | | $\checkmark$ | $\checkmark$ | $\checkmark$ | $\checkmark$ | 46.5 | 48.6 | 62.6 | 25.1 | 46.2 | 29.4 | 28.3 | 44.0 | 41.3
### 5.1. Experimental Setup
#### 5.1.1. Datasets
Four public datasets are utilized in our experiments, including Cityscapes
(Cordts et al., 2016), Foggy Cityscapes (Sakaridis et al., 2018), Sim10k
(Johnson-Roberson et al., 2017), and BDD100k (Yu et al., 2018), which are
detailed as follows.
* •
Cityscapes (Cordts et al., 2016) is collected from urban scenes, which
contains 3,475 images with pixel-level annotation. Among them, 2,975 and 500
images are used for training and evaluation, respectively. Bounding box
annotation of 8 different object categories can be obtained by taking the
tightest rectangles of object masks.
* •
Foggy Cityscapes (Sakaridis et al., 2018) is obtained by applying the fog
synthesis algorithm to Cityscapes, based on depth maps in the Cityscapes
dataset. It inherited the annotations in Cityscapes and is suitable for the
evaluation of weather adaptation.
* •
Sim10k (Johnson-Roberson et al., 2017) is generated by the Grand Theft Auto
game engine, which contains 10,000 training images with 58,701 bounding box
annotations for cars. It is suitable for the evaluation of synthetic to real
adaptation.
* •
BDD100k (Yu et al., 2018) contains 100k images, including 70k training images
and 10k validation images annotated with bounding boxes. Following (Xu et al.,
2020b), we extract the _daytime_ subset of BDD100k for the evaluation of scene
adaptation. The subset includes 36,728 training images and 5,258 validation
images.
Based on these datasets, we evaluate the proposed SFA on three domain
adaptation scenarios: (1) Weather adaptation, $i.e.$, Cityscapes to Foggy
Cityscapes, where the models are trained on cityscape and tested on foggy
cityscape; (2) Synthetic to real adaptation, $i.e.$, Sim10k to Cityscapes,
where the models are trained on Sim10k and tested on Cityscapes; and (3) Scene
Adaptation, $i.e.$, Cityscapes to the daytime subset of BDD100k, where the
models are trained on Cityscapes and tested on BDD100k daytime subset. Mean
Average Precision (mAP) with a threshold of 0.5 is adopted as the evaluation
metric, following (Chen et al., 2018).
#### 5.1.2. Implementation Details
By default, our method is built on Deformable DETR (Zhu et al., 2020).
ImageNet (Deng et al., 2009) pre-trained ResNet-50 (He et al., 2016) is
adopted as the backbone in all experiments. Following Deformable DETR, we
train the network using the Adam optimizer (Kingma and Ba, 2015) for 50
epochs. The learning rate is initialized as $2\times 10^{-4}$ and decayed by
0.1 after 40 epochs. The batch size is set as 4 in all experiments. Both
$\lambda_{enc}$ and $\lambda_{dec}$ are set as 1 for weather adaptation, and
0.01 for other domain adaptation scenarios. Similarly, $\lambda_{cons}$ is set
as 1 for weather adaptation, and 0.1 for other scenarios. All our experiments
are performed on NVIDIA Tesla V100 GPUs. To show the generality of our method,
we also provide results of our method built on DETR (Carion et al., 2020), as
shown in the Supplementary Material.
### 5.2. Comparisons with SOTA Methods
#### 5.2.1. Weather Adaptation.
The object detectors are often required to be applicable under various weather
conditions. We use the Cityscape to Foggy Cityscape scenario to evaluate the
model’s robustness to weather variations (Zhang and Tao, 2019). As shown in
Table 1, SFA significantly improves Deformable DETR’s cross-domain
performance, achieving a 12.8 absolute gain of mAP50. Moreover, it outperforms
all previous domain adaptive object detection methods.
#### 5.2.2. Synthetic to Real Adaptation.
Training an object detector on synthetic images that can generalize to real-
world images is fascinating, as it significantly reduces the labor of data
collection and annotation. To this end, we evaluate our SFA on the synthetic
to real adaptation scenario, as shown in Table 2. It can be seen that SFA
improves the source-only Deformable DETR with an over 10% relative performance
gain and outperforms all existing domain adaptive object detection methods.
#### 5.2.3. Scene Adaptation.
In real-world applications like autonomous driving, scene layouts frequently
change (Lan et al., 2020). The performance of our SFA for scene adaptation is
shown in Table 3. Following (Xu et al., 2020b), results on 7 common categories
are reported. We can see that SFA outperforms the previous state-of-the-art.
Moreover, a systematic improvement can be observed, where SFA improves
Deformable DETR on all 7 categories over the source only model.
Figure 3. Visualizations. (a) Qualitative results: From top to bottom are
results on the scenarios of Cityscapes to Foggy Cityscapes, Sim10k to
Cityscapes, and Cityscapes to BDD100k, respectively. (b) Visualization of
feature distributions using T-SNE (Van der Maaten and Hinton, 2008). The blue
circles denote the source features, while red circles represent target
features.
activation
Figure 4. Visualization of domain queries from both transformer encoder and
decoder sides, under the Cityscapes to Foggy Citysccapes scenario.
activation
### 5.3. Ablation Studies
To better understand our method, we conduct ablation studies by isolating each
component in SFA, as shown in Table 4. We have the following observations: (1)
both domain query-based feature alignment and token-wise feature alignment can
alleviate the domain gaps and improve detection transformer’s cross-domain
performance by 8.0 and 9.2 mAP, respectively; (2) domain query-based feature
alignment and token-wise feature alignment are complementary to each other.
Thereby, a combination of both brings further improvement; (3) the
hierarchical feature alignment (HFA) is effective and brings a 1.0 mAP gain.
Moreover, with HFA, the shallower sequence features near the CNN backbone is
aligned. As a result, feature alignment on the CNN backbone can be safely
removed without loss of performance; and (4) using the bipartite matching
consistency loss alone can bring a 1.0 performance gain. Moreover, it is
complementary with the alignment on sequence features, and further improves
the model performance by 1.5 mAP.
### 5.4. Visualization and Analysis
#### 5.4.1. Detection Results
In Figure 3 (a), we show some visual results by Deformable DETR and our SFA,
accompanied with the ground-truth. As can be seen, in all three scenarios, SFA
improves the detection performance. It successfully mitigates the false
positives generated by Deformanble DETR and detects challenging objects
overlooked by Deformanble DETR. Interestingly, from the first row, we can see
that SFA successfully detects the distant car that is not labeled in the
ground-truth, which further indicates its generalizability to the target
domain.
#### 5.4.2. Visualization of Feature Distribution.
We present the distribution of features extracted by the CNN backbone, the
transformer encoder, and the transformer decoder. As shown in Figure 3 (b),
both CNN and sequence features extracted by the source-only Deformable DETR
can be easily separated by domain. By contrast, our SFA learns domain-
invariant sequence features in both encoder and decoder. Interestingly, the
features in the CNN backbone are also aligned in SFA, as the shallower
sequence features near the CNN backbone can be aligned by hierarchical feature
alignment.
#### 5.4.3. Visualization of Domain Query.
The domain query-based feature alignment utilizes a novel domain query to
adaptively aggregate and align global context from the sequence feature in the
encoder or decoder. It is natural to wonder where the domain query looks at
and how much it values each sampling location. To obtain a better
understanding of the domain query-based feature alignment, we visualize the
sampling locations and attention weights for the domain query. In Figure 4
(a), it can be seen that the domain query in the encoder learns to attend to
sampling locations with obvious domain gaps, i.e., the upper part of the
target images with large scene depth dense fog. Moreover, it puts more weight
on tokens with more significant domain shifts. A similar phenomenon can be
seen on the decoder side, as shown in Figure 4(b), the domain query in the
decoder put more attention on locations with significant domain gaps. The
slight difference is that it focuses more on the foreground objects, e.g., the
cars, riders, and bicycles, as the context sequence feature in the decoder
models foreground objects.
## 6\. Conclusion
In this paper, we focus on making the promising detection transformers domain
adaptive. Based on the observation that the feature distribution alignment on
CNN backbone does not guarantee domain-invariant features in transformer for
prediction, we propose sequence feature alignment (SFA) for detection
transformers. Domain query-based feature alignment (DQFA) and token-wise
feature alignment (TDA) with explicit technical insights are adopted to close
domain gaps at global and local scales, respectively. Moreover, a novel
bipartite matching consistency loss is proposed to enhance the feature
discriminability for robust object detection. Experimental results validate
the effectiveness of our SFA. We hope our approach will serve as a solid
baseline and help ease future research on developing domain adaptive detection
transformers.
## Acknowledgement
This work is supported by National Key R&D Program of China under Grant
2020AAA0105701, National Natural Science Foundation of China (NSFC) under
Grants 61872327, 61806062, U19B2038, Major Special Science and Technology
Project of Anhui (No. 012223665049), and the University Synergy Innovation
Program of Anhui Province under Grants GXXT-2019-025.
## Appendix A More Implementation Details
### A.1. Implementation Details of DA-CNN
In Figure 1 and Table 4, we presented the results of applying adversarial
feature alignment (Ganin et al., 2016) on the CNN backbone of Deformable DETR
(denoted as DA-CNN in Figure 1). Specifically, we apply hierarchical feature
alignment on the CNN backbone, following (He and Zhang, 2019). Feature maps of
stages $C_{3}$ through $C_{5}$ in ResNet-50 (He et al., 2016), plus one more
feature map obtained via a $3\times 3$ stride $2$ convolution on the final
$C_{5}$ stage are utilized for feature alignment. The sizes of the feature
maps are reduced by the information invariant scale reduction modules (SRMs)
in (He and Zhang, 2019) before seed into the domain discriminators.
We also implemented feature alignment on the CNN backbone following SWDA
(Saito et al., 2019). Specifically, strong local feature alignment on the
feature map of stage $C_{2}$ and weak global feature alignment on the feature
map of $C_{5}$ in ResNet-50 are adopted. We obtain a similar result of 35.5
mAP compared to hierarchical feature alignment in (He and Zhang, 2019). Thus,
we only show DA-CNN implemented by hierarchical feature alignment in Figure 1,
which is conceptually cleaner.
### A.2. Structure of Domain Discriminators
As discussed in Section 4.2, simple discriminators can enhance the
generalizability and further enhance the domain adaptation performance.
Specifically, we simply adopt a 3-layer multilayer perceptron (MLP) structure,
as shown in Table 5. All four discriminators, including $D_{enc_{q}}$,
$D_{enc_{k}}$, $D_{dec_{q}}$, and $D_{dec_{k}}$, share the same structure.
Besides, $D_{enc_{q}}$ and $D_{enc_{k}}$ share the same weights. Similarly,
$D_{dec_{q}}$ and $D_{dec_{k}}$ share the weights. Domain discriminators for
encoder and decoder are shared across different feature levels.
Table 5. The architecture of the domain discriminators.
Domain Discriminators
---
Fully Connected $256\times 256$
ReLU
Fully Connected $256\times 256$
ReLU
Fully Connected $256\times 2$
Softmax
## Appendix B Detailed Theoretical Analysis
###### Proof of Theorem 4.2.
We denote the spaces of the output functions $F_{(A_{1},\ldots,A_{i-1})}$
induced by the weight matrices $A_{i},i=1,\ldots,5$ by
$\mathcal{H}_{i},i=1,\ldots,5$, respectively. Lemma A.7 in (Bartlett et al.,
2017), suggests inequality,
$\displaystyle\log\mathcal{N}(\mathcal{F}|S)$ $\displaystyle\leq$
$\displaystyle\log\left(\prod_{i=1}^{5}\sup_{\mathbf{A}_{i-1}\in\bm{\mathcal{B}}_{i-1}}\mathcal{N}_{i}\right)$
(17) $\displaystyle\leq$
$\displaystyle\sum_{i=1}^{5}\log\left(\sup_{\begin{subarray}{c}(A_{1},\ldots,A_{i-1})\\\
\forall j<i,A_{j}\in
B_{j}\end{subarray}}\mathcal{N}\left(\left\\{A_{i}F_{(A_{1},\ldots,A_{i-1})}\right\\},\varepsilon_{i},\|\cdot\|_{2}\right)\right)~{}.$
We thus get the following inequality,
(18)
$\displaystyle\log\mathcal{N}(\mathcal{F}|S)\leq\sum_{i=1}^{5}\frac{b_{i}^{2}\|F_{(A_{1},\ldots,A_{i-1})}(X)\|^{2}_{\sigma}}{\varepsilon_{i}^{2}}\log\left(2W^{2}\right)~{}.$
Meanwhile,
$\displaystyle\|F_{(A_{1},\ldots,A_{i-1})}(X)\|^{2}_{\sigma}=$
$\displaystyle\|\sigma_{i-1}(A_{i-1}F_{(A_{1},\ldots,A_{i-2})}(X))-\sigma_{i-1}(0)\|_{2}$
$\displaystyle\leq$
$\displaystyle\|\sigma_{i-1}\|\|A_{i-1}F_{(A_{1},\ldots,A_{i-2})}(X)-0\|_{2}$
$\displaystyle\leq$
$\displaystyle\rho_{i-1}\|A_{i-1}\|_{\sigma}\|F_{(A_{1},\ldots,A_{i-2})}(X)\|_{2}$
(19) $\displaystyle\leq$
$\displaystyle\rho_{i-1}s_{i-1}\|F_{(A_{1},\ldots,A_{i-2})}(X)\|_{2}.$
Therefore,
(20)
$\|F_{(A_{1},\ldots,A_{i-1})}(X)\|^{2}_{\sigma}\leq\|X\|^{2}\prod_{j=1}^{i-1}s_{i}^{2}\rho_{i}^{2}.$
Motivated by the proof given in (Bartlett et al., 2017), we suppose equations:
(21) $\displaystyle\varepsilon_{i+1}=\rho_{i}s_{i+1}\varepsilon_{i}~{},$ (22)
$\displaystyle\varepsilon_{5}=\rho_{1}\prod_{i=2}^{4}s_{i}\rho_{i}s_{5}\epsilon_{1}~{},$
(23)
$\displaystyle\varepsilon=\rho_{1}\prod_{i=2}^{5}s_{i}\rho_{i}\epsilon_{1}~{}.$
Therefore,
(24)
$\varepsilon_{i}=\frac{\rho_{i}\prod_{j=1}^{i-1}s_{j}\rho_{j}}{\prod_{j=1}^{5}s_{j}\rho_{j}}\varepsilon~{}.$
Therefore,
(25)
$\log\mathcal{N}\left(\mathcal{F}|_{S},\varepsilon,\|\cdot\|_{2}\right)\leq\frac{\log\left(2W^{2}\right)\|X\|_{2}^{2}}{\varepsilon^{2}}\left(\prod_{i=1}^{5}s_{i}\rho_{i}\right)^{2}\sum_{i=1}^{5}\frac{b_{i}^{2}}{s_{i}^{2}}~{},$
which is exactly Equation 16 of Theorem 4.2.
The proof is completed. ∎
Table 6. Sequence feature alignment built on DETR (Carion et al., 2020). DQ, TW, BMC, and HR represents domain query-based feature alignment, token-wise feature alignment, bipartite matching consistency, and hierarchical feature alignment, respectively. Methods | DQ | TW | BMC | HR | person | rider | car | truck | bus | train | mcycle | bicycle | mAP
---|---|---|---|---|---|---|---|---|---|---|---|---|---
DETR (Source) | | | | | 19.4 | 16.0 | 35.2 | 5.1 | 7.8 | 3.0 | 10.5 | 15.9 | 14.1
Proposed | $\checkmark$ | | | | 19.9 | 23.5 | 38.8 | 15.7 | 17.0 | 3.8 | 12.9 | 16.4 | 18.5
| $\checkmark$ | | | 18.3 | 24.4 | 41.8 | 14.7 | 22.4 | 5.6 | 9.3 | 17.0 | 19.2
| | $\checkmark$ | | 20.7 | 16.5 | 35.5 | 7.6 | 9.0 | 5.0 | 10.3 | 16.0 | 15.0
$\checkmark$ | $\checkmark$ | | | 20.8 | 24.5 | 42.0 | 13.0 | 20.3 | 12.9 | 12.7 | 17.7 | 20.5
$\checkmark$ | $\checkmark$ | | $\checkmark$ | 21.2 | 23.5 | 44.0 | 17.6 | 25.2 | 12.7 | 13.9 | 18.0 | 22.0
## Appendix C DETR-based SFA
To show the generalizability of our method, we also implement our Sequence
Feature alignment (SFA) based on DETR (Carion et al., 2020). We note three key
difference between the implementation of Deformable DETR-based SFA and DETR-
based SFA: (1) hierarchical CNN feature representation of 4 different levels
are token as input to the transformer in Deformable DETR, while DETR only uses
one feature map at the $C_{5}$ stage in ResNet; (2) the deformable transformer
adopts deformable attention mechanism for the self-attention in the encoder
and the cross-attention in the decoder, while DETR adopts the attention
mechanism in (Vaswani et al., 2017). Therefore, for Deformable DETR, the
sample position reference ${p}_{\ell}$ in Equation 1 and Equation 2 are
learnable sparse sample locations, while for DETR, ${p}_{\ell}$ simply
enumerates all possible locations.
### C.1. Implementation Details
We evaluate our DETR-based SFA on Cityscapes (Cordts et al., 2016) to Foggy
Cityscapes (Sakaridis et al., 2018) scenarios. ImageNet (Deng et al., 2009)
pre-trained ResNet-50 (He et al., 2016) is adopted as the backbone. Following
DETR, we train the network using the Adam optimizer (Kingma and Ba, 2015) for
300 epochs. The learning rate is initialized as $10^{-4}$ for the transformer
and $10^{-5}$ for the CNN backbone. Learning rates are decayed by a factor of
10 after 200 epochs. The batch size is set as 8 in all experiments. Both
$\lambda_{enc}$ and $\lambda_{dec}$ are set as 0.01, $\lambda_{cons}$ is set
as 0.1 for other scenarios. All our experiments are performed on NVIDIA Tesla
V100 GPUs.
### C.2. Results and Analysis
The detailed results are shown in Table 6. We observe a much worse baseline,
we believe this is due to the deficit of transformer components in processing
image feature maps. The attention modules are initialized to cast nearly
uniform attention weights to all the pixels in the feature maps at
initialization. As a result, more training data and training epochs are
required for the attention weights to be learned to focus on sparse meaningful
locations. Limited by the number of training images on the Cityscapes dataset
(2,975) and a small batch size of 8, DETR shows inferior performance.
However, as shown in Table 6, our SFA still brings a 9.1 improvement on mAP50
(a relative improvement of 64.5%) compared to the DETR baseline, which
verifies the effectiveness of our method. Moreover, ablation studies are
provided by isolating each component of SFA. From the results in Table 6, we
have the following observations: (1) Similar to the results based on
Deformable DETR, both domain query-based feature alignment and token-wise
feature alignment can alleviate the domain gaps and improve the detection
transformer’s cross-domain performance by 4.4 and 5.1 mAP, respectively; (2)
domain query-based feature alignment and token-wise feature alignment are
complementary to each other. Thereby, a combination of both brings further
improvement; (3) the hierarchical feature alignment is effective and brings a
1.5 mAP gain; and (4) using the bipartite matching consistency constraint
alone can bring a 0.9 performance gain. Moreover, it is complementary with the
feature alignment on sequence features, and further improves the model
performance by 1.2 mAP.
To summarize, our SFA is widely applicable to the detection transformer
family, e.g., DETR, Deformable DETR, and significantly improves their cross-
domain performance.
## Appendix D More ablation studies
As describe in Section 3, both domain-query based feature alignment and token-
wise feature alignment can be applied on both encoder and decoder sides. To
gain a more comprehensive understanding, we conduct detailed ablation studies
on the domain query-based feature alignment and the token-wise feature
alignment. Both feature alignment modules applied to the last encoder and
decoder layers, without hierarchical feature alignment and bipartite matching
consistency loss.
The detailed results are shown in Table 7, we have the following observations:
(1) both domain-query based feature alignment and token-wise feature alignment
alleviate the domain gaps between source and target domains, either when they
are being applied to the encoder or decoder side. Moreover, they are
complementary to each other; (2) the token-wise feature alignment generally
shows better performance compare to the domain-query based feature alignment.
We assume this is because the domain-query only samples sparse locations for
global feature alignment, while the token-wise feature alignment enumerates
all possible locations, and enjoys a relatively more comprehensive feature
alignment; (3) the feature alignment applied on the encoder side generally
performs better it applied to the decoder side. We assume this is because the
sequence in encoder side contains both foreground and background features,
while the sequence on the decoder side concentrates on modeling the foreground
objects. As a result, the feature alignment on the decoder side does not align
background feature well, will the feature alignment on the encoder side enjoys
a more comprehensive feature alignment.
Table 7. Ablation studies on domain query-based feature alignment (DQFA) and token-wise feature alignment (TWFA), without hierarchical feature alignment or bipartite matching consistency loss. Experiments are conducted on the Cityscapes to Foggy Cityscapes Scenario. $\text{DQ}_{enc}$ and $\text{DQ}_{dec}$ indicate the DQFA applied to the last encoder and decoder layers, respectively. Similarly, $\text{TW}_{enc}$ and $\text{TW}_{dec}$ indicate the TWFA applied to the last encoder and decoder layers, respectively Methods | $\text{DQ}_{enc}$ | $\text{DQ}_{dec}$ | $\text{TW}_{enc}$ | $\text{TW}_{dec}$ | person | rider | car | truck | bus | train | mcycle | bicycle | mAP
---|---|---|---|---|---|---|---|---|---|---|---|---|---
Deformable DETR | | | | | 37.7 | 39.1 | 44.2 | 17.2 | 26.8 | 5.8 | 21.6 | 35.5 | 28.5
Proposed | $\checkmark$ | | | | 44.8 | 45.9 | 56.9 | 18.7 | 37.8 | 8.5 | 23.1 | 40.3 | 34.5
| $\checkmark$ | | | 42.8 | 43.5 | 54.5 | 13.4 | 37.9 | 8.2 | 28.6 | 40.5 | 33.7
| | $\checkmark$ | | 44.6 | 48.0 | 58.7 | 24.4 | 39.6 | 9.1 | 29.2 | 43.1 | 37.1
| | | $\checkmark$ | 44.9 | 48.1 | 60.3 | 16.2 | 38.0 | 10.7 | 29.0 | 40.9 | 36.1
$\checkmark$ | $\checkmark$ | | | 45.1 | 46.8 | 61.3 | 21.6 | 36.6 | 9.5 | 30.6 | 40.4 | 36.5
| | $\checkmark$ | $\checkmark$ | 45.6 | 47.6 | 60.7 | 23.6 | 41.3 | 15.5 | 26.2 | 41.1 | 37.7
$\checkmark$ | | $\checkmark$ | | 45.6 | 48.2 | 61.0 | 23.0 | 39.8 | 16.3 | 30.1 | 41.0 | 38.1
| $\checkmark$ | | $\checkmark$ | 46.3 | 47.6 | 61.5 | 18.8 | 42.2 | 15.7 | 26.9 | 41.7 | 37.6
## Appendix E More qualitative results
More qualitative results sampled from the Cityscapes to Foggy Cityscapes,
Sim10k to Cityscapes, and Cityscapes to BDD100k adaptation are shown in Figure
5, 6 and 7, respectively. Detection results produced by the source-only
Deformable DETR and our SFA, accompanied with the corresponding ground-truth
are presented. As can be seen, in all three scenarios, SFA improves the
detection performance. It successfully mitigates the false positives generated
by Deformanble DETR and detects challenging objects overlooked by Deformanble
DETR.
Figure 5. More qualitative detection results on Cityscapes to Foggy Cityscapes
scenario.
activation
Figure 6. More qualitative detection results on Sim10k to Cityscapes scenario.
activation
Figure 7. More qualitative detection results on Cityscapes to BDD100k
scenario.
activation
## References
* (1)
* Bartlett et al. (2017) Peter L Bartlett, Dylan J Foster, and Matus J Telgarsky. 2017\. Spectrally-normalized margin bounds for neural networks. In _Proc. NIPS_. 6240–6249.
* Ben-David et al. (2010) Shai Ben-David, John Blitzer, Koby Crammer, Alex Kulesza, Fernando Pereira, and Jennifer Wortman Vaughan. 2010. A theory of learning from different domains. _Machine learning_ 79, 1 (2010), 151–175.
* Cai et al. (2019) Qi Cai, Yingwei Pan, Chong-Wah Ngo, Xinmei Tian, Lingyu Duan, and Ting Yao. 2019\. Exploring object relation in mean teacher for cross-domain detection. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 11457–11466.
* Carion et al. (2020) Nicolas Carion, Francisco Massa, Gabriel Synnaeve, Nicolas Usunier, Alexander Kirillov, and Sergey Zagoruyko. 2020. End-to-end object detection with transformers. In _European Conference on Computer Vision_. Springer, 213–229.
* Chen et al. (2018) Yuhua Chen, Wen Li, Christos Sakaridis, Dengxin Dai, and Luc Van Gool. 2018. Domain adaptive faster r-cnn for object detection in the wild. In _Proceedings of the IEEE conference on computer vision and pattern recognition_. 3339–3348.
* Chen et al. (2020) Zhe Chen, Jing Zhang, and Dacheng Tao. 2020. Recursive context routing for object detection. _International Journal of Computer Vision_ (2020), 1–19.
* Cordts et al. (2016) Marius Cordts, Mohamed Omran, Sebastian Ramos, Timo Rehfeld, Markus Enzweiler, Rodrigo Benenson, Uwe Franke, Stefan Roth, and Bernt Schiele. 2016. The cityscapes dataset for semantic urban scene understanding. In _Proceedings of the IEEE conference on computer vision and pattern recognition_. 3213–3223.
* Dai et al. (2020) Zhigang Dai, Bolun Cai, Yugeng Lin, and Junying Chen. 2020\. UP-DETR: Unsupervised Pre-training for Object Detection with Transformers. In _Proceedings of the IEEE conference on computer vision and pattern recognition_.
* Deng et al. (2009) Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009\. Imagenet: A large-scale hierarchical image database. In _2009 IEEE conference on computer vision and pattern recognition_. IEEE, 248–255.
* Ding et al. (2020) Liang Ding, Longyue Wang, and Dacheng Tao. 2020. Self-Attention with Cross-Lingual Position Representation. In _ACL_.
* Ganin et al. (2016) Yaroslav Ganin, Evgeniya Ustinova, Hana Ajakan, Pascal Germain, Hugo Larochelle, François Laviolette, Mario Marchand, and Victor Lempitsky. 2016. Domain-adversarial training of neural networks. _The journal of machine learning research_ 17, 1 (2016), 2096–2030.
* Goodfellow et al. (2014) Ian J Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014\. Generative adversarial networks. (2014).
* He et al. (2020) Fengxiang He, Tongliang Liu, and Dacheng Tao. 2020. Why resnet works? residuals generalize. _IEEE Transactions on Neural Networks and Learning Systems_ 31, 12 (2020), 5349–5362.
* He and Tao (2020) Fengxiang He and Dacheng Tao. 2020. Recent advances in deep learning theory. _arXiv preprint arXiv:2012.10931_ (2020).
* He et al. (2016) Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016\. Deep residual learning for image recognition. In _Proceedings of the IEEE conference on computer vision and pattern recognition_. 770–778.
* He and Zhang (2019) Zhenwei He and Lei Zhang. 2019. Multi-adversarial faster-rcnn for unrestricted object detection. In _Proceedings of the IEEE/CVF International Conference on Computer Vision_. 6668–6677.
* Hsu et al. (2020) Cheng-Chun Hsu, Yi-Hsuan Tsai, Yen-Yu Lin, and Ming-Hsuan Yang. 2020. Every Pixel Matters: Center-aware Feature Alignment for Domain Adaptive Object Detector. In _European Conference on Computer Vision_. Springer, 733–748.
* Johnson-Roberson et al. (2017) Matthew Johnson-Roberson, Charles Barto, Rounak Mehta, Sharath Nittur Sridhar, Karl Rosaen, and Ram Vasudevan. 2017. Driving in the Matrix: Can virtual worlds replace human-generated annotations for real world tasks?. In _2017 IEEE International Conference on Robotics and Automation (ICRA)_. IEEE, 746–753.
* Kim et al. (2019a) Seunghyeon Kim, Jaehoon Choi, Taekyung Kim, and Changick Kim. 2019a. Self-training and adversarial background regularization for unsupervised domain adaptive one-stage object detection. In _Proceedings of the IEEE/CVF International Conference on Computer Vision_. 6092–6101.
* Kim et al. (2019b) Taekyung Kim, Minki Jeong, Seunghyeon Kim, Seokeon Choi, and Changick Kim. 2019b. Diversify and match: A domain adaptive representation learning paradigm for object detection. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 12456–12465.
* Kingma and Ba (2015) Diederik P Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In _International Conference on Learning and Representations_.
* Lan et al. (2020) Meng Lan, Yipeng Zhang, Lefei Zhang, and Bo Du. 2020\. Global context based automatic road segmentation via dilated convolutional neural network. _Information Sciences_ 535 (2020), 156–171.
* Lee et al. (2015) Chen-Yu Lee, Saining Xie, Patrick Gallagher, Zhengyou Zhang, and Zhuowen Tu. 2015. Deeply-supervised nets. In _Artificial intelligence and statistics_. PMLR, 562–570.
* Liu et al. (2019) Daqing Liu, Hanwang Zhang, Feng Wu, and Zheng-Jun Zha. 2019\. Learning to assemble neural module tree networks for visual grounding. In _Proceedings of the IEEE/CVF International Conference on Computer Vision_. 4673–4682.
* Liu et al. (2016) Wei Liu, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott Reed, Cheng-Yang Fu, and Alexander C Berg. 2016. Ssd: Single shot multibox detector. In _European conference on computer vision_. Springer, 21–37.
* Mohri et al. (2012) Mehryar Mohri, Afshin Rostamizadeh, and Ameet Talwalkar. 2012\. _Foundations of machine learning_. MIT press.
* Redmon et al. (2016) Joseph Redmon, Santosh Divvala, Ross Girshick, and Ali Farhadi. 2016. You only look once: Unified, real-time object detection. In _Proceedings of the IEEE conference on computer vision and pattern recognition_. 779–788.
* Ren et al. (2016) Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun. 2016\. Faster R-CNN: towards real-time object detection with region proposal networks. _IEEE transactions on pattern analysis and machine intelligence_ 39, 6 (2016), 1137–1149.
* Saito et al. (2019) Kuniaki Saito, Yoshitaka Ushiku, Tatsuya Harada, and Kate Saenko. 2019. Strong-weak distribution alignment for adaptive object detection. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 6956–6965.
* Sakaridis et al. (2018) Christos Sakaridis, Dengxin Dai, and Luc Van Gool. 2018\. Semantic foggy scene understanding with synthetic data. _International Journal of Computer Vision_ 126, 9 (2018), 973–992.
* Shen et al. (2021a) Yongliang Shen, Xinyin Ma, Zeqi Tan, Shuai Zhang, Wen Wang, and Weiming Lu. 2021a. Locate and Label: A Two-stage Identifier for Nested Named Entity Recognition. In _ACL_.
* Shen et al. (2021b) Yongliang Shen, Xinyin Ma, Yechun Tang, and Weiming Lu. 2021b. A Trigger-Sense Memory Flow Framework for Joint Entity and Relation Extraction. In _Proceedings of the Web Conference 2021_. 1704–1715.
* Tian et al. (2019) Zhi Tian, Chunhua Shen, Hao Chen, and Tong He. 2019\. Fcos: Fully convolutional one-stage object detection. In _Proceedings of the IEEE/CVF International Conference on Computer Vision_. 9627–9636.
* Van der Maaten and Hinton (2008) Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. _Journal of machine learning research_ 9, 11 (2008).
* Vaswani et al. (2017) Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017\. Attention is All you Need. In _Conference on Neural Information Processing Systems_.
* Xu et al. (2020b) Chang-Dong Xu, Xing-Ran Zhao, Xin Jin, and Xiu-Shen Wei. 2020b. Exploring categorical regularization for domain adaptive object detection. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 11724–11733.
* Xu et al. (2020a) Minghao Xu, Hang Wang, Bingbing Ni, Qi Tian, and Wenjun Zhang. 2020a. Cross-domain detection via graph-induced prototype alignment. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 12355–12364.
* Yu et al. (2018) Fisher Yu, Wenqi Xian, Yingying Chen, Fangchen Liu, Mike Liao, Vashisht Madhavan, and Trevor Darrell. 2018. Bdd100k: A diverse driving video database with scalable annotation tooling. _arXiv preprint arXiv:1805.04687_ 2, 5 (2018), 6\.
* Zha et al. (2019) Zheng-Jun Zha, Daqing Liu, Hanwang Zhang, Yongdong Zhang, and Feng Wu. 2019. Context-aware visual policy network for fine-grained image captioning. _IEEE transactions on pattern analysis and machine intelligence_ (2019).
* Zhai et al. (2020) Wei Zhai, Yang Cao, Zheng-Jun Zha, HaiYong Xie, and Feng Wu. 2020. Deep structure-revealed network for texture recognition. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 11010–11019.
* Zhai et al. (2019) Wei Zhai, Yang Cao, Jing Zhang, and Zheng-Jun Zha. 2019\. Deep multiple-attribute-perceived network for real-world texture recognition. In _Proceedings of the IEEE/CVF International Conference on Computer Vision_. 3613–3622.
* Zhang and Tao (2019) Jing Zhang and Dacheng Tao. 2019. FAMED-Net: A fast and accurate multi-scale end-to-end dehazing network. _IEEE Transactions on Image Processing_ 29 (2019), 72–84.
* Zhang and Tao (2020) Jing Zhang and Dacheng Tao. 2020. Empowering things with intelligence: a survey of the progress, challenges, and opportunities in artificial intelligence of things. _IEEE Internet of Things Journal_ 8, 10 (2020), 7789–7817.
* Zhang et al. (2018) Pengchuan Zhang, Qiang Liu, Dengyong Zhou, Tao Xu, and Xiaodong He. 2018. On the Discrimination-Generalization Tradeoff in GANs. In _International Conference on Learning Representations_.
* ZHANG et al. (2019) Qiming ZHANG, Jing Zhang, Wei Liu, and Dacheng Tao. 2019\. Category Anchor-Guided Unsupervised Domain Adaptation for Semantic Segmentation. _Advances in Neural Information Processing Systems_ 32 (2019), 435–445.
* Zhang et al. (2020) Ziqi Zhang, Yaya Shi, Chunfeng Yuan, Bing Li, Peijin Wang, Weiming Hu, and Zheng-Jun Zha. 2020. Object relational graph with teacher-recommended learning for video captioning. In _Proceedings of the IEEE/CVF conference on computer vision and pattern recognition_. 13278–13288.
* Zheng et al. (2020a) Kecheng Zheng, Cuiling Lan, Wenjun Zeng, Zhizheng Zhang, and Zheng-Jun Zha. 2020a. Exploiting Sample Uncertainty for Domain Adaptive Person Re-Identification. _arXiv preprint arXiv:2012.08733_ (2020).
* Zheng et al. (2021) Kecheng Zheng, Wu Liu, Lingxiao He, Tao Mei, Jiebo Luo, and Zheng-Jun Zha. 2021\. Group-aware label transfer for domain adaptive person re-identification. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 5310–5319.
* Zheng et al. (2020b) Kecheng Zheng, Wu Liu, Jiawei Liu, Zheng-Jun Zha, and Tao Mei. 2020b. Hierarchical Gumbel Attention Network for Text-based Person Search. In _Proceedings of the 28th ACM International Conference on Multimedia_. 3441–3449.
* Zhu et al. (2019) Xinge Zhu, Jiangmiao Pang, Ceyuan Yang, Jianping Shi, and Dahua Lin. 2019. Adapting object detectors via selective cross-domain alignment. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 687–696.
* Zhu et al. (2020) Xizhou Zhu, Weijie Su, Lewei Lu, Bin Li, Xiaogang Wang, and Jifeng Dai. 2020\. Deformable DETR: Deformable Transformers for End-to-End Object Detection. In _International Conference on Learning and Representations_.
| arxiv-papers | 2021-07-27T07:17:12 | 2024-09-04T03:07:20.809445 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Wen Wang, Yang Cao, Jing Zhang, Fengxiang He, Zheng-Jun Zha, Yonggang\n Wen, Dacheng Tao",
"submitter": "Wen Wang",
"url": "https://arxiv.org/abs/2107.12636"
} |
2107.12648 | # Gradient Play in $n$-Cluster Games with Zero-Order Information
Tatiana Tatarenko, Jan Zimmermann, Jürgen Adamy The authors are with Control
Methods and Robotics Lab at the TU Darmstadt, Germany.
###### Abstract
We study a distributed approach for seeking a Nash equilibrium in $n$-cluster
games with strictly monotone mappings. Each player within each cluster has
access to the current value of her own smooth local cost function estimated by
a zero-order oracle at some query point. We assume the agents to be able to
communicate with their neighbors in the same cluster over some undirected
graph. The goal of the agents in the cluster is to minimize their collective
cost. This cost depends, however, on actions of agents from other clusters.
Thus, a game between the clusters is to be solved. We present a distributed
gradient play algorithm for determining a Nash equilibrium in this game. The
algorithm takes into account the communication settings and zero-order
information under consideration. We prove almost sure convergence of this
algorithm to a Nash equilibrium given appropriate estimations of the local
cost functions’ gradients.
## I Introduction
Distributed optimization and game theory provide powerful frameworks to deal
with optimization problems arising in multi-agent systems. In generic
distributed optimization problems, the cost functions of agents are
distributed across the network, meaning that each agent has only partial
information about the whole optimization problem which is to be solved. Game
theoretic problems arise in such networks when the agents do not cooperate
with each other and the cost functions of these non-cooperative agents are
coupled by the decisions of all agents in the system. The applications of game
theoretic and distributed optimization approaches include, for example,
electricity markets, power systems, flow control problems and communication
networks [11, 12, 6].
On the other hand, cooperation and competition coexists in many practical
situations, such as cloud computing, hierarchical optimization in Smart Grid,
and adversarial networks [3, 4, 8]. A body of recent work has been devoted to
analysis of non-cooperative games and distributed optimization problems in
terms of a single model called _$n$ -cluster games_ [16, 19, 17, 18, 20, 5].
In such $n$-cluster games, each cluster corresponds to a player whose goal is
to minimize her own cost function. However, the clusters in this game are not
the actual decision-makers as the optimization of the cluster’s objective is
controlled by the agents belonging to the corresponding cluster. Each of such
agents has her own local cost function, which is available only to this agent,
but depends on the joint actions of agents in all clusters. The cluster’s
objective, in turn, is the sum of the local cost functions of the agents
within the cluster. Therefore, in such models, each agent intends to find a
strategy to achieve a Nash equilibrium in the resulting $n$-cluster game,
which is a stable state that minimizes the cluster’s cost functions in
response to the actions of the agents from other clusters.
Continuous time algorithms for the distributed Nash equilibria seeking problem
in multi-cluster games were proposed in [19, 17, 18]. The paper [17] solves an
unconstrained multi-cluster game by using gradient-based algorithms, whereas
the works [18] and [19] propose a gradient-free algorithm, based on zero-order
information, for seeking Nash and generalized Nash equilibria respectively. In
discrete time domain, the work [5] presents a leader-follower based algorithm,
which can solve unconstrained multi-cluster games in linear time. The authors
in [20] extend this result to the case of leaderless architecture. Both papers
[5, 20] prove linear convergence in games with strongly monotone mappings and
first-order information, meaning that agents can calculate gradients of their
cost functions and use this information to update their states. In contrast to
that, the work [16] deals with a gradient-free approach to the cluster games.
However, the gradient estimations are constructed in such a way that only
convergence to a neighborhood of the equilibrium can be guaranteed. Moreover,
these estimations are obtained by using two query points, for which an extra
coordination between the agents is required.
Motivated by relevancy of $n$-cluster game models in many engineering
applications, we present a discrete time distributed procedure to seek Nash
equilibria in $n$-cluster games with zero-order information. We consider
settings, where agents can communicate with their direct neighbors within the
corresponding cluster over some undirected graph. However, in many practical
situations the agents do not know the functional form of their objectives and
can only access the current values of their objective functions at some query
point. Such situations arise, for example, in electricity markets with unknown
price functions [15]. In such cases, the information structure is referred to
as zero-order oracle. Our work focuses on zero-order oracle information
settings and, thus, assumes agents to have no access to the analytical form of
their cost functions and gradients. The agents instead construct their local
query points and get the corresponding cost values from the oracle. Based on
these values, the agents estimate their local gradients to be able to follow
the step in the gradient play procedure. We formulate the sufficient
conditions and provide some concrete example on how to estimate the gradients
to guarantee the almost sure convergence of the resulting algorithm to Nash
equilibria in $n$-cluster games with strictly monotone game mappings. To the
best of our knowledge, we present the first algorithm solving $n$-cluster
games with zero-order oracle and the corresponding one-point gradient
estimations.
The paper is organized as follows. In Section II we formulated the $n$-cluster
game with undirected communication topology in each cluster and zero-order
oracle information. Section III introduces the gradient play algorithm which
is based on the one-point gradient estimations. The convergence result is
presented in Section III as well. Section IV provides an example of query
points and gradient estimations which guarantee convergence of the algorithm
discussed in Section III. Section V presents some simulation results. Finally,
Section VI concludes the paper.
Notations. The set $\\{1,\ldots,n\\}$ is denoted by $[n]$. For any function
$f:K\to{\mathbb{R}}$, $K\subseteq{\mathbb{R}}^{n}$,
$\nabla_{i}f(x)=\frac{\partial f(x)}{\partial x_{i}}$ is the partial
derivative taken in respect to the $i$th coordinate of the vector variable
$x\in{\mathbb{R}}^{n}$. We consider real normed space $E$, which is the space
of real vectors, i.e. $E={\mathbb{R}}^{n}$. We use $(u,v)$ to denote the inner
product in $E$. We use $\|\cdot\|$ to denote the Euclidean norm induced by the
standard dot product in $E$. Any mapping $g:E\to E$ is said to be _strictly
monotone on $Q\subseteq E$_, if $(g(u)-g(v),u-v)>0$ for any $u,v\in Q$, where
$u\neq v$. We use ${\mathbb{B}}_{r}(p)$ to denote the ball of the radius
$r\geq 0$ and the center $p\in E$ and ${\mathbb{S}}$ to denote the unit sphere
with the center in $0\in E$. We use
${\mathcal{P}_{{\Omega}}\left\\{{v}\right\\}}$ to denote the projection of
$v\in E$ to a set ${\Omega}\subseteq E$. The mathematical expectation of a
random value $\xi$ is denoted by ${\mathbb{E}}\\{\xi\\}$. We use the big-$O$
notation, that is, the function $f(x):{\mathbb{R}}\to{\mathbb{R}}$ is
$O(g(x))$ as $x\to a$, $f(x)$ = $O(g(x))$ as $x\to a$, if $\lim_{x\to
a}\frac{|f(x)|}{|g(x)|}\leq K$ for some positive constant $K$.
## II Nash Equilibrium Seeking
### II-A Problem Formulation
We consider a non-cooperative game between $n$ clusters. Each cluster
$i\in[n]$ itself consists of $n_{i}$ agents. Let $J^{j}_{i}$ and
${\Omega}^{j}_{i}\subseteq{\mathbb{R}}$111All results below are applicable for
games with different dimensions $\\{d^{j}_{i}\\}$ of the action sets
$\\{{\Omega}^{j}_{i}\\}$. The one-dimensional case is considered for the sake
of notation simplicity. denote respectively the cost function and the feasible
action set of the agent $j$ in the cluster $i$. We denote the joint action set
of the agents in the cluster $i$ by
${\Omega}_{i}={\Omega}^{1}_{i}\times\ldots\times{\Omega}_{i}^{n_{i}}$. Each
function $J^{j}_{i}(x_{i},x_{-i})$, $i\in[n]$, depends on
$x_{i}=(x_{i}^{1},\ldots,x_{i}^{n_{i}})\in{\Omega}_{i}$, which represents the
joint action of the agents within the cluster $i$, and
$x_{-i}\in{\Omega}_{-i}={\Omega}_{1}\times\ldots\times{\Omega}_{i-1}\times{\Omega}_{i+1}\times{\Omega}_{n}$,
denoting the joint action of the agents from all clusters except for the
cluster $i$. The cooperative cost function in the cluster $i\in[n]$ is, thus,
$J_{i}(x_{i},x_{-i})=\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}J^{j}_{i}(x_{i},x_{-i})$.
We assume that the agents within each cluster can interact over an undirected
communication graph ${\mathcal{G}}_{i}([n_{i}],{\mathcal{A}}_{i})$. The set of
nodes is the set of the agents $[n_{i}]$ and the set of undirected arcs
${\mathcal{A}}_{i}$ is such that $(k,j)\in{\mathcal{A}}_{i}$ if and only if
$(j,k)\in{\mathcal{A}}_{i}$, i.e. there is a bidirectional communication link
between $k$ to $j$, over which information in form of a message can be sent
from the agent $k$ to the agent $j$ and vice versa in the cluster $i$.
However, there is _no explicit communication between the clusters_. Instead,
we consider the following _zero-order_ information structure in the system: No
agent has access to the analytical form of any cost function, including its
own. Each agent can only observe the value of its local cost function given
any joint action of all agents in the system. Formally, given a joint action
$x\in{\Omega}$, each agent $j\in[n_{i}]$, $i\in[n]$ receives the value
$J^{j}_{i}(x)$ from a zero-order oracle. Especially, no agent has or receives
any information about the gradient.
Let us denote the game between the clusters introduced above by
$\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$. We make
the following assumptions regarding the game $\Gamma$:
###### Assumption 1.
The $n$-cluster game under consideration is _strictly convex_. Namely, for all
$i\in[n]$, the set ${\Omega}_{i}$ is convex, the cost function
$J_{i}(x_{i},x_{-i})$ is continuously differentiable in $x_{i}$ for each fixed
$x_{-i}$. Moreover, the game mapping, which is defined as
$\displaystyle{\mathbf{F}}(x)\triangleq\left[\nabla_{1}J_{1}(x_{1},x_{-1}),\ldots,\nabla_{n}J_{n}(x_{n},x_{-n})\right]^{T}$
(1)
is _strictly monotone_ on ${\Omega}$.
###### Assumption 2.
Each function $\nabla_{i}J_{i}^{j}(x_{i},x_{-i})$ is Lipschitz continuous on
${\Omega}$.
###### Assumption 3.
The action sets ${\Omega}_{j}^{i}$, $j\in[n_{i}]$, $i\in[n]$, are compact.
Moreover, for each $i$ there exists a so called safety ball
${\mathbb{B}}_{r}(p)\subseteq{\Omega}_{i}$ with $r_{i}>0$ and
$p_{i}\in{\Omega}_{i}$222Existence of the safety ball is required to construct
feasible points for costs’ gradient estimations in the zero-order settings
under consideration (see [1])..
The assumptions above are standard in the literature on both game-theoretic
and zero-order optimization [1]. Finally, we make the following assumption on
the communication graph, which guarantees sufficient information ”mixing” in
the network within each cluster.
###### Assumption 4.
The underlying undirected communication graph
${\mathcal{G}}_{i}([n_{i}],{\mathcal{A}}_{i})$ is connected for all
$i=1,\ldots,n$. The associated non-negative mixing matrix
$W_{i}=[w^{i}_{kj}]\in{\mathbb{R}}^{n\times n}$ defines the weights on the
undirected arcs such that $w^{i}_{kj}>0$ if and only if
$(k,j)\in{\mathcal{A}}_{i}$ and $\sum_{k=1}^{n_{i}}w^{i}_{kj}=1$, $\forall
k\in[n_{i}]$.
One of the stable solutions in any game $\Gamma$ corresponds to a Nash
equilibrium defined below.
###### Definition 1.
A vector $x^{*}=[x_{1}^{*},x_{2}^{*},\cdots,x_{n}^{*}]^{T}\in{\Omega}$ is
called a _Nash equilibrium_ if for any $i\in[n]$ and $x_{i}\in{\Omega}_{i}$
$J_{i}(x_{i}^{*},x_{-i}^{*})\leq J_{i}(x_{i},x_{-i}^{*}).$
In this work, we are interested in _distributed seeking of a Nash equilibrium_
in any game $\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$
with the information structure described above and for which Assumptions 1-4
hold.
### II-B Existence and Uniqueness of the Nash Equilibrium
In this subsection, we demonstrate the existence of the Nash equilibrium for
$\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$ under
Assumptions 1 and 3. For this purpose we recall the results connecting Nash
equilibria and solutions of variational inequalities from [9].
###### Definition 2.
Consider a set $Q\subseteq{\mathbb{R}}^{d}$ and a mapping $g$:
$Q\to{\mathbb{R}}^{d}$. A _solution $SOL(Q,g)$ to the variational inequality
problem_ $VI(Q,g)$ is a set of vectors $q^{*}\in Q$ such that $\langle
g(q^{*}),q-q^{*}\rangle\geq 0$, for any $q\in Q$.
The following theorem is the well-known result on the connection between Nash
equilibria in games and solutions of a definite variational inequality (see
Corollary 1.4.2 in [9]).
###### Theorem 1.
Consider a non-cooperative game $\Gamma$. Suppose that the action sets of the
players $\\{{\Omega}_{i}\\}$ are closed and convex, the cost functions
$\\{J_{i}(x_{i},x_{-i})\\}$ are continuously differentiable and convex in
$x_{i}$ for every fixed $x_{-i}$ on the interior of the joint action set
${\Omega}$. Then, some vector $x^{*}\in{\Omega}$ is a Nash equilibrium in
$\Gamma$, if and only if $x^{*}\in SOL({\Omega},{\mathbf{F}})$, where
${\mathbf{F}}$ is the game mapping defined by (1).
Next, we formulate the result guaranteeing existence and uniqueness of
$SOL(Q,g)$ in the case of strictly monotone map $Q$ (see Corollary 2.2.5 and
Proposition 2.3.3 in [9]).
###### Theorem 2.
Given the $VI(Q,g)$, suppose that $Q$ is compact and the mapping $g$ is
strictly monotone. Then, the solution $SOL(Q,g)$ exists and is a singleton.
Taking into account Theorems 1 and 2, we obtain the following result.
###### Theorem 3.
Let $\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$ be a
game for which Assumptions 1 and 3 hold. Then, there exists the unique Nash
equilibrium in $\Gamma$. Moreover, the Nash equilibrium in $\Gamma$ is the
solution of $VI({\Omega},{\mathbf{F}})$, where ${\mathbf{F}}$ is the game
mapping (see (1)).
Thus, if Assumptions 1 and 3 hold, we can guarantee existence and uniqueness
of the Nash equilibrium in the game
$\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$ under
consideration and use the corresponding variational inequality in the analysis
of the optimization procedure presented below.
## III Main Results
### III-A Zero-order gradient play between clusters
To deal with the zero-order information available to the agents and local
state exchanges within the clusters, we assume each agent $j$ from the cluster
$i$ maintains a _local variable_
$\displaystyle
x^{(j)}_{i}=[x^{(j)1}_{i},\cdots,x^{(j)j-1}_{i},x^{j}_{i},x^{(j)i+1}_{i},\cdots,x^{(j)n_{i}}_{i}]^{T}\in{\Omega}_{i},$
(2)
which is her estimation of the joint action
$x_{i}=[x^{1}_{i},x^{2}_{i},\cdots,x^{n_{i}}_{i}]^{T}\in{\Omega}_{i}$ of the
agents from her cluster $i$. Here, $x^{(j)k}_{i}\in{\Omega}^{j}_{i}$ is player
$k$’s estimate of $x^{j}_{i}$ and $x^{(j)j}_{i}=x^{j}_{i}\in{\Omega}^{j}_{i}$
is the action of agent $j$ from cluster $i$. The goal of the agents within
each cluster is to update their local variables in such a way that the joint
action $x=(x_{1},\ldots,x_{n})\in{\Omega}$ with
$x_{i}=(x^{1}_{i},\ldots,x^{n_{i}}_{i})\in{\Omega}_{i}$ converges to the Nash
equilibrium in the game $\Gamma$ between the clusters as time runs. To let the
agents achieve this goal, we aim to adapt the standard projected gradient play
approach to the cluster game with the zero-order information.
At this point we assume each agent $j\in[n_{i}]$, $i\in[n]$, based on its
local estimation $x^{(j)}_{i}$, constructs a feasible query point
$\hat{x}^{(j)}_{i}\in{\Omega}_{i}$ and sends it to the oracle. As a reply from
the oracle, the agent receives the value
$J^{j}_{i}(\hat{x}^{(j)}_{i},\hat{{\tilde{x}}}_{-i})$. The vector
$\hat{{\tilde{x}}}_{-i}$ here corresponds to the point obtained by some
combination of the query vectors sent by the agents from the other clusters.
Formally,
$\displaystyle\hat{{\tilde{x}}}_{-i}=(\hat{x}^{(j_{1})}_{1},\ldots,\hat{x}^{(j_{i-1})}_{i-1},\hat{x}^{(j_{i+1})}_{i+1},\ldots,\hat{x}^{(j_{n})}_{n}),$
(3)
where $j_{k}$ denotes some agent from the cluster $k\in[n]$, $k\neq i$.
Further each agent $j\in[n_{i}]$, $i\in[n]$, uses the received value
$J^{j}_{i}(\hat{x}^{(j)}_{i},\hat{{\tilde{x}}}_{-i})$ to obtain the random
estimation $d^{j}_{i}$ of her local cost’s gradient $\nabla_{i}J^{j}_{i}$ at
the point $(x^{(j)}_{i},{\tilde{x}}_{-i})$, where
$\displaystyle{\tilde{x}}_{-i}=(x^{(j_{1})}_{1},\ldots,x^{(j_{i-1})}_{i-1},x^{(j_{i+1})}_{i+1},\ldots,x^{(j_{n})}_{n})$
(4)
corresponds to the local estimations of other agents (one for each cluster
different from $i$) based on which query points are obtained. Thus,
$d^{j}_{i}=d^{j}_{i}(J^{j}_{i}(\hat{x}^{(j)}_{i},\hat{{\tilde{x}}}_{-i}))\in{\mathbb{R}}^{n_{i}}$.
As $d^{j}_{i}$ is an estimation of
$\nabla_{i}J^{j}_{i}(x^{(j)}_{i},{\tilde{x}}_{-i})$, we represent this vector
by the following decomposition:
$\displaystyle
d^{j}_{i}=\nabla_{i}J^{j}_{i}(x^{(j)}_{i},{\tilde{x}}_{-i})+e^{j}_{i},$ (5)
where $e^{j}_{i}$ is a random vector reflecting inaccuracy of the obtained
estimation, i.e. the estimation error vector. Note that for the joint query
point $(\hat{x}^{(j)}_{i},\hat{{\tilde{x}}}_{-i})$ the oracle is free to
choose any combination $\hat{{\tilde{x}}}_{-i}$ of the local queries defined
in (3).
Now we are ready to formulate the gradient play between the clusters. Starting
with an arbitrary $x^{(j)}_{i}(0)\in{\Omega}_{i}$, each agent $j$ updates the
local estimation vector $x^{(j)}_{i}$, $j\in[n_{i}]$, $i\in[n]$, as follows:
$\displaystyle
x^{(j)}_{i}(t+1)={\mathcal{P}_{{\Omega}_{i}}\left\\{{\sum_{l=1}^{n_{i}}w^{i}_{jl}x^{(l)}_{i}(t)-\alpha_{t}d^{j}_{i}(t)}\right\\}},$
(6)
where the time-dependent parameter $\alpha_{t}>0$ corresponds to the step
size.
Let ${\mathcal{F}}_{t}$ be the $\sigma$-algebra generated by the estimations
$\\{x^{(j)}_{i}(m)\\}_{m=0}^{t}$ up to time $t$, $j\in[n_{i}]$, $i\in[n]$. Let
${\bar{x}}_{i}(t)=\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}x^{(j)}_{i}(t)$ be the
running average of the agents’ estimations vectors within the cluster $i$. The
following proposition describes the behavior of ${\bar{x}}_{i}(t)$ in the long
run.
###### Proposition 1.
Let Assumptions 3 and 4 hold and $x^{(j)}_{i}(t)$, $j\in[n_{i}]$, $i\in[n]$,
be updated according to (6). Then for all $j\in[n_{i}]$, $i\in[n]$
1. 1.
if $\lim_{t\to\infty}\alpha_{t}=0$ and
$\lim_{t\to\infty}\alpha_{t}\sqrt{{\mathbb{E}}\\{\|e^{j}_{i}(t)\|^{2}|{\mathcal{F}}_{t}\\}}=0$
almost surely, then $\lim_{t\to\infty}\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|=0$
almost surely;
2. 2.
if $\sum_{t=0}^{\infty}\alpha^{2}_{t}<\infty$ and
$\sum_{t=0}^{\infty}\alpha^{2}_{t}{{\mathbb{E}}\\{\|e^{j}_{i}(t)\|^{2}|{\mathcal{F}}_{t}\\}}<\infty$
almost surely, then
$\sum_{t=0}^{\infty}\alpha_{t}\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|<\infty$.
###### Proof.
Follows from Lemma 8 in [7]333The proof can be repeated up to (37) in [7]. The
inequality (37) and the analysis afterward stay valid in terms of the
conditional expectation ${\mathbb{E}}\\{\cdot|{\mathcal{F}}_{t}\\}$..
In view of the proposition above and to be able to analyze behavior of the
algorithm by means of the running averages ${\bar{x}}_{i}(t)$, $i\in[n]$ we
make the following assumption on the balance between the step size
$\alpha_{t}$ and the error term $e^{j}_{i}(t)$.
###### Assumption 5.
The step size $\alpha_{t}$ and the error term $e^{j}_{i}(t)$ are such that
$\displaystyle\sum_{t=0}^{\infty}\alpha_{t}=\infty,\,\sum_{t=0}^{\infty}\alpha^{2}_{t}<\infty,$
$\displaystyle\sum_{t=0}^{\infty}\alpha_{t}{\mathbb{E}}\\{\|e^{j}_{i}((t))\||{\mathcal{F}}_{t}\\}<\infty\,\mbox{
almost surely},$
$\displaystyle\sum_{t=0}^{\infty}\alpha^{2}_{t}{\mathbb{E}}\\{\|e^{j}_{i}((t))\|^{2}|{\mathcal{F}}_{t}\\}<\infty\,\mbox{
almost surely}.$
In Section IV we shed light on how the gradients can be sampled to guarantee
fulfillment of Assumption 5. With Proposition 1 in place, we are ready to
prove the main result formulated in the theorem below.
###### Theorem 4.
Let Assumptions 1-5 hold and $x^{(j)}_{i}(t)$, $j\in[n_{i}]$, $i\in[n]$, be
updated according to (6). Then the joint action
$x(t)=(x_{1}(t),\ldots,x_{n}(t))$ converges almost surely to the unique Nash
equilibrium $x^{*}$ in the
$\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$, i.e.
$\Pr\\{\lim_{t\to\infty}\|x(t)-x^{*}\|=0\\}=1$.
###### Proof.
Let $x^{*}=(x_{1}^{*},\ldots,x_{n}^{*})$ be the unique Nash equilibrium in the
game $\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$, see
Theorem 3. We proceed with estimating the distance between $x^{(j)}_{i}(t+1)$
and $x_{i}^{*}$. Let
$v^{j}_{i}(t)=\sum_{l=1}^{n_{i}}w^{i}_{jl}x^{(l)}_{i}(t)$. As
$x_{i}^{*}\in{\Omega}_{i}$, we can use the non-expansion of the projection
operator to conclude that almost surely (a.s.)444In the following discussion
the big-$O$ notation is defined under the limit $t\to\infty$ (see Notations).
$\displaystyle\|x^{(j)}_{i}(t+1)-x_{i}^{*}\|^{2}\leq\|v^{j}_{i}(t)-\alpha_{t}d^{j}_{i}(t)-x_{i}^{*}\|^{2}$
(7) $\displaystyle=\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}$ (8)
$\displaystyle\quad-2\alpha_{t}(d^{j}_{i}(t),v^{j}_{i}(t)-x_{i}^{*})+\alpha_{t}^{2}\|d^{j}_{i}(t)\|^{2}$
(9) $\displaystyle=\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}$ (10)
$\displaystyle\quad-2\alpha_{t}(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$
(11)
$\displaystyle\quad-2\alpha_{t}(e^{j}_{i}((t)),v^{j}_{i}(t)-x_{i}^{*})+O(\alpha_{t}^{2}(1+\|e^{j}_{i}(t)\|^{2}))$
(12) $\displaystyle\leq\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}$ (13)
$\displaystyle\quad-2\alpha_{t}(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$
(14)
$\displaystyle\quad+O(\alpha_{t}\|e^{j}_{i}((t))\|)+O(\alpha_{t}^{2}(1+\|e^{j}_{i}(t)\|^{2})),$
(15)
where in the last equality we used (5), which implies that a.s.
$\|d^{j}_{i}(t)\|^{2}\leq
2(\|\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t))\|^{2}+\|e^{j}_{i}(t)\|^{2})$
and, thus, $\|d^{j}_{i}(t)\|^{2}=O(1+\|e^{j}_{i}(t)\|^{2})$ a.s. (see
Assumptions 1 and 3), whereas in the last inequality we used the
Cauchy–Schwarz inequality, implying
$-(e^{j}_{i}((t)),v^{j}_{i}(t)-x_{i}^{*})\leq\|e^{j}_{i}((t))\|v^{j}_{i}(t)-x_{i}^{*}\|\,\mbox{a.s.},$
and Assumption 3 implying almost sure boundedness of
$\|v^{j}_{i}(t)-x_{i}^{*}\|$. We focus now on the terms
$\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}$ and
$-2\alpha_{t}(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$.
Due to Assumption 4, we have that a.s.
$\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}=\|\sum_{l=1}^{n_{i}}w^{i}_{jl}x^{(l)}_{i}(t)-x_{i}^{*}\|^{2}\leq\sum_{l=1}^{n_{i}}w^{i}_{jl}\|x^{(l)}_{i}(t)-x_{i}^{*}\|^{2}.$
And, as $\sum_{j=1}^{n_{i}}w^{i}_{jl}=1$, we obtain that a.s.
$\displaystyle\sum_{j=1}^{n_{i}}\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}$
$\displaystyle\leq\sum_{l=1}^{n_{i}}(\sum_{j=1}^{n_{i}}w^{i}_{jl})\|x^{(l)}_{i}(t)-x_{i}^{*}\|^{2}$
(16) $\displaystyle=\sum_{l=1}^{n_{i}}\|x^{(l)}_{i}(t)-x_{i}^{*}\|^{2}.$ (17)
Next,
$\displaystyle(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),$
$\displaystyle{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$ (18)
$\displaystyle=$
$\displaystyle(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$
(19)
$\displaystyle-(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*})$
(20)
$\displaystyle+(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*})$
(21)
$\displaystyle-(\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*})$
(22)
$\displaystyle+(\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*}),$
(23)
where $\bar{\tilde{x}}_{-i}(t)\in{\mathbb{R}}^{\sum_{k\neq i}n_{k}}$ is the
joint running average of the agents’ local variable over all clusters except
for the cluster $i$ (see more details in (4)). Thus, by applying the
Cauchy–Schwarz inequality to (18), we get
$\displaystyle-(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$
(24)
$\displaystyle\leq\|\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t))\|\|v^{j}_{i}(t)-{\bar{x}}_{i}(t)\|$
(25)
$\displaystyle\quad+\|\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t))-\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t))\|$
(26)
$\displaystyle\qquad\qquad\qquad\qquad\qquad\qquad\times\|{\bar{x}}_{i}(t)-x_{i}^{*}\|$
(27)
$\displaystyle\quad-(\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*}),\,\mbox{a.s.}.$
(28)
Taking into account almost sure boundedness of
$\|\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t))\|$ and
$\|{\bar{x}}_{i}(t)-x_{i}^{*}\|$ (see Assumptions 1 and 3) and Assumption 2,
we conclude that
$\displaystyle-(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$
(29) $\displaystyle\leq O(\|v^{j}_{i}(t)-{\bar{x}}_{i}(t)\|)$ (30)
$\displaystyle\quad+O(\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|+\|{\tilde{x}}_{-i}(t)-{\bar{x}}_{-i}(t)\|)$
(31)
$\displaystyle\quad-(\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t),{\tilde{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*}).$
(32)
Thus, we get from (7)
$\displaystyle\|x^{(j)}_{i}(t+1)-x_{i}^{*}\|^{2}\leq\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}$
(33)
$\displaystyle\quad-2\alpha_{t}(\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*})$
(34) $\displaystyle\quad+2\alpha_{t}O(\|v^{j}_{i}(t)-{\bar{x}}_{i}(t)\|)$ (35)
$\displaystyle\quad+2\alpha_{t}O(\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|+\|{\tilde{x}}_{-i}(t)-{\bar{x}}_{-i}(t)\|)$
(36)
$\displaystyle\quad+O(\alpha_{t}\|e^{j}_{i}((t))\|)+O(\alpha_{t}^{2}(1+\|e^{j}_{i}(t)\|^{2})),\,\mbox{a.s.}.$
(37)
Analogously to (16)
$\sum_{j=1}^{n_{i}}\|v^{j}_{i}(t)-{\bar{x}}_{i}(t)\|\leq\sum_{l=1}^{n_{i}}\||x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|.$
Therefore, by averaging both sides of (33) over $j=1,\ldots,n_{i}$ and taking
the conditional expectation in respect to ${\mathcal{F}}_{t}$ (below we use
the notation
${\mathbb{E}}\\{\cdot|{\mathcal{F}}_{t}\\}={\mathbb{E}}_{t}\\{\cdot\\}$), we
obtain that a.s.
$\displaystyle\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}{\mathbb{E}}_{t}\\{\|x^{(j)}_{i}(t+1)-x_{i}^{*}\|^{2}\\}\leq\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\|x^{(j)}_{i}(t)-x_{i}^{*}\|^{2}$
(38)
$\displaystyle\quad-2\alpha_{t}\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}(\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*})$
(39)
$\displaystyle\quad+O\left(\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\alpha_{t}\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|\right)$
(40)
$\displaystyle\quad+O(\alpha_{t}\|{\tilde{x}}_{-i}(t)-{\bar{x}}_{-i}(t)\|)$
(41)
$\displaystyle\quad+\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\left(O(\alpha_{t}{\mathbb{E}}_{t}\\{\|e^{j}_{i}((t))\|\\}+\alpha_{t}^{2}(1+{\mathbb{E}}_{t}\\{\|e^{j}_{i}(t)\|^{2}\\}))\right)$
(42)
$\displaystyle=\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\|x^{(j)}_{i}(t)-x_{i}^{*}\|^{2}$
(43)
$\displaystyle\quad-2\alpha_{t}(\nabla_{i}J_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*})+h_{i}(t),$
(44)
where
$\displaystyle h_{i}(t)$
$\displaystyle=O\left(\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\alpha_{t}\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|\right)$
$\displaystyle\quad+O(\alpha_{t}\|{\tilde{x}}_{-i}(t)-{\bar{x}}_{-i}(t)\|)$
$\displaystyle\quad+\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}O(\alpha_{t}{\mathbb{E}}_{t}\\{\|e^{j}_{i}((t))\|\\})$
$\displaystyle\quad+\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}O(\alpha_{t}^{2}(1+{\mathbb{E}}_{t}\\{\|e^{j}_{i}(t)\|^{2}\\})).$
By taking into account Proposition 1 2) and the definition of
${\tilde{x}}_{-i}(t)$ (see (4)), we conclude that a.s.
$\sum_{t=0}^{\infty}O\left(\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\alpha_{t}\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|\right)<\infty,$
$\sum_{t=0}^{\infty}O(\alpha_{t}\|{\tilde{x}}_{-i}(t)-{\bar{x}}_{-i}(t)\|)<\infty.$
Moreover, due to Assumption 5,
$\sum_{t=0}^{\infty}\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}O(\alpha_{t}{\mathbb{E}}_{t}\\{\|e^{j}_{i}((t))\|\\}<\infty,$
$\sum_{t=0}^{\infty}\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\alpha_{t}^{2}(1+{\mathbb{E}}_{t}\\{\|e^{j}_{i}(t)\|^{2}\\}))<\infty$
almost surely. Thus,
$\displaystyle\sum_{t=0}^{\infty}h_{i}(t)<\infty\,\mbox{a.s. for all
}i\in[n].$ (45)
Next, let us introduce the vector $u(t)=(u_{1}(t),\ldots,u_{n}(t)),$ where
$u_{i}=\left(\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\|x^{(j)}_{i}(t)-x_{i}^{*}\|^{2}\right)^{\frac{1}{2}}$.
Therefore, summing (38) over $i\in[n]$ implies
$\displaystyle{\mathbb{E}}_{t}\|u(t+1)\|^{2}\leq\|u(t)\|^{2}-2\alpha_{t}({\mathbf{F}}({\bar{x}}(t)),{\bar{x}}(t)-x^{*})$
(46) $\displaystyle\qquad\qquad\qquad\qquad\qquad+\sum_{i=1}^{n}h_{i}(t)$ (47)
$\displaystyle\leq\|v(t)\|^{2}-2\alpha_{t}({\mathbf{F}}({\bar{x}}(t))-{\mathbf{F}}(x^{*}),{\bar{x}}(t)-x^{*})$
(48) $\displaystyle\qquad\qquad\qquad\qquad\qquad+\sum_{i=1}^{n}h_{i}(t),$
(49)
where in the last inequality we used the fact that $x^{*}$ is the Nash
equilibrium in
$\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$ and, thus,
$({\mathbf{F}}(x^{*}),{\bar{x}}(t)-x^{*})\geq 0$ a.s. for all $t$ (see Theorem
1). Due to the strictly monotone mapping (see Assumption 1), which implies
$({\mathbf{F}}({\bar{x}}(t))-{\mathbf{F}}(x^{*}),{\bar{x}}(t)-x^{*})\geq 0,$
and (45), we can apply the Robbins and Siegmund result (see Theorem 5 in
Appendix) to the inequality (46). With that, we conclude that $\|u(t)\|^{2}$
converges a.s. as $t\to\infty$ and
$\sum_{t=1}^{\infty}\alpha_{t}({\mathbf{F}}({\bar{x}}(t))-{\mathbf{F}}(x^{*}),{\bar{x}}(t)-x^{*})<\infty\,\mbox{a.s.}$
Taking the inequality above and the fact that
$\sum_{t=0}^{\infty}\alpha_{t}=\infty$ into account, we conclude that
$\liminf_{t\to\infty}({\mathbf{F}}({\bar{x}}(t))-{\mathbf{F}}(x^{*}),{\bar{x}}(t)-x^{*})=0\,\mbox{a.s.},$
which together with strict monotonicity of ${\mathbf{F}}$ implies existence of
the subsequence ${\bar{x}}(t_{m})$ such that
$\lim_{m\to\infty}{\bar{x}}(t_{m})=x^{*}$ almost surely. From Proposition 1 it
follows that $\lim_{m\to\infty}x^{(j)}_{i}(t_{m})=x^{*}$ a.s. for all
$j\in[n_{i}]$, $i\in[n]$. Finally, by taking into account existence of the
finite almost sure limit of
$\|u(t)\|^{2}=\sum_{i=1}^{n}\left(\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\|x^{(j)}_{i}(t)-x_{i}^{*}\|^{2}\right)$
as $t\to\infty$, we conclude that
$\Pr\\{\lim_{t\to\infty}\|x^{(j)}_{i}(t)-x_{i}^{*}\|=0\\}=1\,\mbox{for all
}j\in[n_{i}],\,i\in[n],$
and, therefore,
$\Pr\\{\lim_{t\to\infty}\|x_{i}(t)-x_{i}^{*}\|=0\\}=1\,\mbox{for all
}i\in[n].$
## IV Gradient Estimations
In this section we present an approach to estimate the gradients of the
agents’ cost functions in such a way that Assumption 5 is fulfilled. The idea
is borrowed from the work [1] dealing with bandit learning in games. We assume
the safety ball parameters $r_{i}$ and $p_{i}$ (see Assumption 3) are known
for each agent from the cluster $i$. To obtain the estimation $d^{j}_{i}(t)$
based on the current estimation $x^{(j)}_{i}(t)$ and to follow the update in
(6), each agent $j\in[n_{i}]$ in the cluster $i$, $i\in[n]$, takes the
following steps at time $t$. The agent samples the vector $z^{j}_{i}(t)$ from
the uniform distribution on the unit sphere
${\mathbb{S}}\subset{\mathbb{R}}^{n_{i}}$. The query direction is defined by
$w^{(j)}_{i}(t)=z^{j}_{i}(t)-r_{i}^{-1}(x^{(j)}_{i}(t)-p_{i})$. Then, the
query point at which the oracle calculates the local cost function value is
$\displaystyle\hat{x}^{(j)}_{i}(t)$
$\displaystyle=x^{(j)}_{i}(t)+{\sigma}_{t}w^{(j)}_{i}(t)$ (50)
$\displaystyle=(1-{\sigma}_{t}r_{i}^{-1})x^{(j)}_{i}(t)+{\sigma}_{t}(z^{j}_{i}+r_{i}^{-1}p),$
(51)
where ${\sigma}_{t}$ is the query radius chosen such that
${\sigma}_{t}r_{i}^{-1}<1$. Note that, given $x^{(j)}_{i}(t)\in{\Omega}_{i}$,
the query point $\hat{x}^{(j)}_{i}(t)$ above is feasible, i.e.
$\hat{x}^{(j)}_{i}(t)\in{\Omega}_{i}$ (see [1] for more details). The gradient
estimation itself is obtained as follows:
$\displaystyle
d^{j}_{i}(t)=\frac{n_{i}}{{\sigma}_{t}}J^{(j)}_{i}(\hat{x}^{(j)}_{i}(t),\hat{{\tilde{x}}}_{-i}(t))\cdot
z^{j}_{i},$ (52)
where $\hat{{\tilde{x}}}_{-i}(t)$ is defined as in (3). This vector is then
used to follow the update in (6). As it has been proven in [1] (see, for
example, (4.7) in [1]), $d^{j}_{i}(t)$, as constructed above, satisfies the
following property:
$\displaystyle
d^{j}_{i}(t)=\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t))+e^{j}_{i}(t),$
(53) $\displaystyle\mbox{where
}\,{\mathbb{E}}_{t}\\{\|e^{j}_{i}(t)\|\\}=O({\sigma}_{t}),$ (54)
$\displaystyle\qquad\quad{\mathbb{E}}_{t}\\{\|e^{j}_{i}(t)\|^{2}\\}=O\left(\frac{1}{{\sigma}^{2}_{t}}\right)$
(55)
with ${\tilde{x}}_{-i}(t)$ defined as in (4). Thus, for fulfillment of
Assumption 5 the step size parameter $\alpha_{t}$ and the query radius
${\sigma}_{t}$ must be balanced as follows:
$\displaystyle\sum_{t=0}^{\infty}\alpha_{t}=\infty,\,\sum_{t=0}^{\infty}\alpha_{t}<\infty,$
$\displaystyle\sum_{t=0}^{\infty}\alpha_{t}{\sigma}_{t}<\infty,\sum_{t=0}^{\infty}\frac{\alpha^{2}_{t}}{{\sigma}_{t}^{2}}<\infty.$
One example of an appropriate choice is $\alpha_{t}=\frac{\alpha_{0}}{t^{a}}$,
${\sigma}_{t}=\frac{\sigma_{0}}{t^{b}}$ with
$\displaystyle\frac{1}{2}<a\leq 1,\,b\geq 0,$ $\displaystyle a+b>1,\,2a-2b>1.$
One possible parameter set is $a=1$, $b=\frac{1}{3}$.
###### Remark 1.
There exist other approaches to one-point gradient estimations. The most known
one corresponds to the queries sampled from the Gaussian distribution (see
[14, 2]). However, to guarantee feasibility in this case, the query points
have to be projected onto the action sets. To be able to control the deviation
term, that appears due to this projection, one needs to introduce an auxiliary
time-dependent parameter to the projection step of the main procedure (see
[13, 2]). Thus, introducing this parameter will somewhat complicate the
analysis. That is why we leave the approach based on sampling from the
Gaussian distribution beyond the scope of this paper.
## V Simulation Results
In this section, we verify our theoretical analysis with a practical
simulation in order to show that the states of the agent system converge to
the Nash equilibrium, defined in Definition 1, when using the update equation
(6) and the oracle gradient estimation of (52). As an example application, we
chose a version of the well-known Cournot game. Consider the following setup:
There are $n$ companies that compete against each other regarding the price of
some specific product. Each company $i$ owns $n_{i}$ factories that produce
said product. It is assumed that all factories produce the product with the
same quality. The cost of factory $j$ belonging to cluster $i$ for producing
the amount $x_{i}^{j}\in\mathbb{R}^{+}_{0}$ of the product is specific for
this factory and defined by
$C_{i}^{j}(x_{i}^{j})=a_{i}^{j}(x_{i}^{j})^{2}+b_{i}^{j}x_{i}^{j}+c_{i}^{j}.$
(56)
Naturally, the amount of product produced cannot be negative. Furthermore,
each company has lower and upper production limits. The former defines a lower
bound $\underline{x}_{i}^{j}$, for which production is still cost efficient,
while the latter defines a production facility dependent upper bound
$\overline{x}_{i}^{j}$.
Each company $i$ aggregates the product, produced in their $n_{i}$ factories,
and sells it. In this version of the Cournot game, it is assumed that there
exists only a single customer instance that buys all the aggregated product
from all companies. The price that the customer pays per unit of product is
dependent on the total supply by all companies and therefore defined as
follows:
$P(x)=P_{c}-\sum_{i=1}^{n}\sum_{j=1}^{n_{i}}x_{i}^{j},$ (57)
where $P_{c}$ is a constant, which is chosen such that for any decision vector
$\underline{x}\leq x\leq\overline{x}$ it holds that $P(x)>0$. With this price
definition and assuming that the production costs for the factories belonging
to the company is shared, each company $i$ aims to minimize its profit
function, therefore solving the following optimization problem:
$\min_{\underline{x}_{i}\leq
x_{i}\leq\overline{x}_{i}}\sum_{j=1}^{n_{i}}C_{i}^{j}(x_{i}^{j})-x_{i}^{j}P(x_{i},x_{-i})=\min_{\underline{x}_{i}\leq
x_{i}\leq\overline{x}_{i}}J_{i}(x_{i},x_{-i})$ (58)
It can be seen that the companies’ profits are coupled by the customer’s price
function, therefore a Nash equilibrium needs to be found, from which no
company has any incentive to deviate. Relating to the $n$-cluster games
described in this paper, the companies represent the clusters, while the
factories correspond to the agents. It can be readily confirmed that the
profit optimization problem in Equation (58) fulfils the Assumptions 1 \- 2.
| Company $i=1$ | Company $i=2$
---|---|---
$j$ | 1 | 2 | 3 | 4 | 1 | 2 | 3 | 4
$a_{i}^{j}$ | 5 | 8 | 4 | 5 | 3 | 7 | 9 | 2
$b_{i}^{j}$ | 10 | 11 | 9 | 12 | 10 | 11 | 12 | 9
$c_{i}^{j}$ | 1 | 3 | 2 | 5 | 3 | 2 | 3 | 1
$\underline{x}_{i}^{j}$ | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0
$\overline{x}_{i}^{j}$ | 20 | 20 | 20 | 20 | 10 | 10 | 10 | 10
TABLE I: Parameters of agents in Cournot-Game.
For our simulation, we choose a small setup consisting of two clusters, each
containing four agents with parameters listed in Table I and cost coefficient
$P_{c}=250$. The agents inside the cluster $i$ are connected by an undirected
communication graph $G_{i}$ that fulfils Assumption 4. Over this graph, state
information is shared inside the cluster $i$ such that an estimation of all
agent’s states $x_{i}^{(j)}$ can be performed. The agents update their own
gradient estimation according to equation (52), using the zero-order oracle
information at the query point $\hat{x}_{i}^{j}$ defined in (50). The time-
dependent, decreasing step-size $\alpha_{t}$ of the gradient update and the
query radius $\sigma_{t}$ are chosen such that Assumption 5 is satisfied.
Choosing a good set of parameters $\alpha_{0},\sigma_{0}>0$ and $a,b$ is
crucial for the convergence speed of the algorithm. Even then, due to the fact
that only zero-order information is available, convergence is slow. In Figure
1 the states, resulting from the application of the proposed algorithm to the
scenario specified above, are plotted. The dashed line marks the true Nash
Equilibrium $x^{*}$, while the two solid coloured lines distinguish between
the states of company 1, i.e. $x_{1}$, and company 2, i.e. $x_{2}$,
respectively. Because there are only four agents in each cluster, which are
connected by an almost fully connected graph, the consensus dynamic of the
agent system is almost negligible against the gradient estimation and update
dynamic. It can be seen that the algorithm converges to a satisfactory
vicinity of the Nash Equilibrium states after about $1\cdot 10^{5}$ Iterations
at which the error norm between the agent’s states and the true Nash
equilibrium $x^{*}$ measures $||x-x^{*}||_{2}$ = 0.40. While the constraints
of company 2 are not touched, the true Nash Equilibrium for two firms of the
second company lies at their maximum production limit 10.
Figure 1: Convergence of the agent’s states towards the Nash equilibrium of
the n-cluster game. Error norm after $1\times 10^{5}$ steps:
$||x-x^{*}||_{2}=0.400$.
## VI Conclusion
In this paper we presented the distributed gradient play algorithm for
strictly convex $n$-cluster games with communication setups within each
cluster and a zero-order oracle in the whole system. We prove the almost sure
convergence of this procedure to the unique Nash equilibria given an
appropriate estimations of the local agents’ gradients. The future work will
be devoted to investigation of possible modifications which should enable a
faster convergence rate.
The following is a well-known result of Robbins and Siegmund on non-negative
random variables [10].
###### Theorem 5.
Let $(\Omega,F,P)$ be a probability space and $F_{1}\subset F_{2}\subset\dots$
a sequence of sub-$\sigma$-algebras of $F$. Let $z_{t},b_{t},\xi_{t},$ and
$\zeta_{t}$ be non-negative $F_{t}$-measurable random variables satisfying
$\displaystyle{\mathbb{E}}(z_{t+1}|F_{t})\leq
z_{t}(1+b_{t})+\xi_{t}-\zeta_{t}.$
Then, almost surely $\lim_{t\to\infty}z_{t}$ exists and is finite for the case
in which
$\\{\sum_{t=1}^{\infty}b_{t}<\infty,\;\sum_{t=1}^{\infty}\xi_{t}<\infty\\}$.
Moreover, in this case, $\sum_{t=1}^{\infty}\zeta_{t}<\infty$ almost surely.
## References
* [1] M. Bravo, D. Leslie, and P. Mertikopoulos. Bandit learning in concave n-person games. In Proceedings of the 32nd International Conference on Neural Information Processing Systems, NIPS’18, page 5666–5676, Red Hook, NY, USA, 2018. Curran Associates Inc.
* [2] A.D. Flaxman, A.T. Kalai, and H.B. McMahan. Online convex optimization in the bandit setting: Gradient descent without a gradient. In Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’05, pages 385–394, USA, 2005. Society for Industrial and Applied Mathematics.
* [3] B. Gharesifard and J. Cortés. Distributed convergence to nash equilibria in two-network zero-sum games. Automatica, 49(6):1683–1692, 2013.
* [4] M. Jarrah, M. Jaradat, Y. Jararweh, M. Al-Ayyoub, and A. Bousselham. A hierarchical optimization model for energy data flow in smart grid power systems. Information Systems, 53:190–200, 2015.
* [5] M. Meng and X. Li. On the linear convergence of distributed nash equilibrium seeking for multi-cluster games under partial-decision information. arXiv preprint:2005.06923, 2020.
* [6] A. Nedić and J. Liu. Distributed optimization for control. Annual Review of Control, Robotics, and Autonomous Systems, 1(1):77–103, 2018.
* [7] A. Nedić, A. Ozdaglar, and P. A. Parrilo. Constrained consensus and optimization in multi-agent networks. IEEE Transactions on Automatic Control, 55(4):922–938, 2010.
* [8] D. Niyato, A. V. Vasilakos, and Z. Kun. Resource and revenue sharing with coalition formation of cloud providers: Game theoretic approach. In 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pages 215–224, 2011.
* [9] J.-S. Pang and F. Facchinei. Finite-dimensional variational inequalities and complementarity problems : vol. 1. Springer series in operations research. Springer, New York, Berlin, Heidelberg, 2003.
* [10] H. Robbins and D. Siegmund. A convergence theorem for non negative almost supermartingales and some applications. In Herbert Robbins Selected Papers, pages 111–135. Springer, 1985\.
* [11] W. Saad, H. Zhu, H. V. Poor, and T. Başar. Game-theoretic methods for the smart grid: An overview of microgrid systems, demand-side management, and smart grid communications. IEEE Signal Processing Magazine, 29(5):86–105, 2012.
* [12] G. Scutari, S. Barbarossa, and D. P. Palomar. Potential games: A framework for vector power control problems with coupled constraints. In 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, volume 4, pages 241–244, May 2006.
* [13] M. Kamgarpour T. Tatarenko. Bandit online learning of nash equilibria in monotone games. arXiv preprint:2009.04258, 2020.
* [14] T. Tatarenko and M. Kamgarpour. Learning nash equilibria in monotone games. In 2019 IEEE 58th Conference on Decision and Control (CDC), pages 3104–3109, 2019.
* [15] A. C. Tellidou and A. G. Bakirtzis. Agent-based analysis of capacity withholding and tacit collusion in electricity markets. IEEE Transactions on Power Systems, 22(4):1735–1742, Nov 2007.
* [16] G. Hu Y. Pang. Nash equilibrium seeking in n-coalition games via a gradient-free method. arXiv preprint:2008.12909, 2020.
* [17] M. Ye, G. Hu, and F. L. Lewis. Nash equilibrium seeking for N-coalition noncooperative games. Automatica, 95:266–272, 2018.
* [18] M. Ye, G. Hu, and S. Xu. An extremum seeking-based approach for Nash equilibrium seeking in N-cluster noncooperative games. Automatica, 114:108815, 2020.
* [19] X. Zeng, J. Chen, S. Liang, and Y. Hong. Generalized Nash equilibrium seeking strategy for distributed nonsmooth multi-cluster game. Automatica, 103:20–26, 2019.
* [20] J. Zimmermann, T. Tatarenko, V. Willert, and J. Adamy. Gradient-tracking over directed graphs for solving leaderless multi-cluster games. arXiv preprint:2102.09406, 2021.
| arxiv-papers | 2021-07-27T08:00:52 | 2024-09-04T03:07:20.830019 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Tatiana Tatarenko, Jan Zimmermann, J\\\"urgen Adamy",
"submitter": "Jan Zimmermann",
"url": "https://arxiv.org/abs/2107.12648"
} |
2107.12650 | # Joint Power and User Grouping Optimization in Cell-Free Massive MIMO Systems
Fengqian Guo, Hancheng Lu and Zhuojia Gu This work was supported by National
Science Foundation of China under Grant 61771445, 61631017, 91538203.F. Guo,
H. Lu and Z. Gu are with CAS Key Laboratory of Wireless-Optical
Communications, University of Science and Technology of China, Hefei 230027,
China. (Email: [email protected], [email protected],
[email protected]).
###### Abstract
To relieve the stress on channel estimation and decoding complexity in cell-
free massive multiple-input multiple-output (MIMO) systems, user grouping
problem is investigated in this paper, where access points (APs) based on
time-division duplex (TDD) are considered to serve users on different time
resources and the same frequency resource. In addition, when quality of
service (QoS) requirements are considered, widely-used max-min power control
is no longer applicable. We derive the minimum power constraints under diverse
QoS requirements considering user grouping. Based on the analysis, we
formulate the joint power and user grouping problem under QoS constraints,
aiming at minimizing the total transmit power. A generalized benders
decomposition (GBD) based algorithm is proposed, where the primal problem and
master problem are solved iteratively to approach the optimal solution.
Simulation results demonstrate that by user grouping, the number of users
served in cell-free MIMO systems can be as much as the number of APs without
increasing the complexity of channel estimation and decoding. Furthermore,
with the proposed user grouping strategy, the power consumption can be reduced
by 2-3 dB compared with the reference user grouping strategy, and by 7 dB
compared with the total transmit power without grouping.
###### Index Terms:
Cell-free systems, massive multiple-input multiple-output (MIMO), time-
division duplex (TDD), user grouping, generalized benders decomposition(GBD)
## I Introduction
The rapid growth of mobile traffic, especially high volume video traffic,
leads to pressing need for high throughput in mobile networks[1]. To cope with
such situation, massive multiple-input multiple-output (MIMO) emerges as a
promising technique [2, 3, 4, 5]. In massive MIMO, massive antenna arrays are
deployed to simultaneously serve many users on the same time-frequency
resource, with which high spectral efficiency is achieved. By distributing
numerous antennas in a wide area, the concept of cell-free massive MIMO [4, 6]
has been proposed recently and attracted much attention from academic and
industrial researchers. Essentially, cell free massive MIMO is an integration
of massive MIMO and distributed MIMO, which is expected to exploit benefits of
these two techniques. In cell free massive MIMO, many geographically located
access points are equipped with single or a few antennas. They serve a much
smaller number of users coherently on the same time-frequency resource,
ensuring uniformly good quality of service (QoS) for all users. Consequently,
cell boundaries are eliminated. Moreover, a central processing unit (CPU) is
introduced to coordinate data transmission at different APs through high-
capacity backhaul links connecting these APs. Compared with small-cell
systems, existing studies have shown that cell-free massive MIMO systems can
significantly improve per-user throughput. However, at the cost of much more
backhaul overheads[4].
Many research attempts have been done to improve the performance of the cell-
free massive MIMO systems. Among them, power control has been addressed, which
is globally optimized by CPU to realize uniformly good services for all users
in a wide area. The pioneer work on cell-free massive MIMO was done in [4],
where max-min power control is performed to maximize the lowest user
throughput. After that, the max-min power control problem is investigated
under various scenarios[4, 7, 8, 9]. For conjugate beamforming and zero-
forcing (ZF) precoding, low complexity power control algorithms based on the
max-min criterion were developed in [7]. In [8], a max-min power control
algorithm was proposed with consideration of transceiver hardware impairments.
The authors in [9] studied the uplink max-min signal-to-interference-plus-
noise ratio problem and obtained a globally optimum solution with an iterative
algorithm. In the downlink cell-free massive MIMO systems, power control can
be optimized to maximize the energy efficiency [10]. Furthermore, power
control has also been jointly considered with load balancing [11], backhaul
[12], fronthaul [13], etc.
There still remain some deficiencies in research on cell-free massive MIMO. In
order to implement beamforming in a hardware-friendly way or to eliminate co-
channel interference by zero-forcing precoding, in general, the number of
antennas in massive MIMO systems is assumed to be significantly larger than
the number of users [14, 15]. Similarly, in cell-free massive MIMO systems,
since each AP is assumed to be equipped with one or a few antennas, the number
of served users is much smaller than the number of APs [16, 6]. To serve more
users, much more APs should be deployed. Correspondingly, the hardware cost
and system complexity will be significantly increased [7][8]. Furthermore, to
ensure the accuracy of channel estimation, length of pilot sequence is usually
assumed no less than the number of users[10, 17]. However, the number of
samples in each coherence interval are limited. Hence, the length of data in
each coherence interval will reduce as the number of users increase.
Additionally, users have diverse QoS requirements. Requirement satisfaction is
more important for users than fairness. In this case, widely-used max-min
power control is no longer applicable.
To address these issues, in this paper, we investigate the time-division
duplex (TDD) based cell-free massive MIMO systems[13]. Users are divided into
different groups according to their assigned time-slots, then channel
estimation and decoding are applied within each group. By doing so, both pilot
overheads and system complexity can be significantly reduced. In addition, we
perform power allocation to satisfy the QoS requirements of users, instead of
max-min power control. The main contributions are described as follows.
* •
In the downlink TDD based cell-free massive MIMO systems considering user
grouping, we first introduce and analyze the main processes of uplink training
and downlink payload data transmission. Then we derive the minimum power
constraints under diverse QoS requirements after user grouping. Based on our
analytical work and the transmission process with user grouping, we formulate
the joint power allocation and user grouping problem with both conjugate and
ZF beamforming under user QoS constraints, with the goal to minimize the total
transmit power.
* •
We convert the problem into a form that can be handled by generalized benders
decomposition (GBD) method. With GBD, we first decompose the problem into the
primal problem (i.e., power allocation problem) and master problem (i.e., user
grouping problem). Particularly, the user grouping problem is relaxed and then
the relaxed problem is converted into a problem of searching for some special
negative loops in a graph composed of users.
* •
Based on the GBD method, we propose an iterative algorithm , which is feasible
for both conjugate and ZF beamforming, to approach the optimal solution to the
converted joint power allocation and user grouping problem. In each iteration,
the upper bound and lower bounds are obtained by solving the primal problem
and the master problem, respectively. The gap between these two bounds is
reduced iteratively. Therefore, the proposed iterative algorithm is provably
convergent. Furthermore, to solve the master problem within polynomial time, a
fast greedy suboptimal algorithm is proposed.
Simulation results validate the convergence and optimality of the proposed
algorithms, and demonstrate that by user grouping, the number of users served
in cell-free MIMO systems can be as much as the number of APs without
increasing the complexity of channel estimation and decoding. Furthermore,
with the proposed user grouping strategy, the power consumption can be reduced
by 2-3 dB compared with the random user grouping strategy, and by 7 dB
compared with the total transmit power without grouping.
The rest of this paper is organized as follows. In Section II, we give the
model of the downlink cell-free massive MIMO systems, and formulate the joint
optimization problem of power allocation and user grouping to minimize the
total transmit power. In Section III, we decompose the problem into a power
allocation problem and a user grouping problem. Problem analysis and solutions
are also described. In Section IV, we relax and solve the master problem based
on graph theory. The system performance is evaluated in Section V. Finally, we
give the conclusion in Section VI.
TABLE I: Main Notations Symbol | Description
---|---
$G$ | Number of groups
$N$ | Number of users
$M$ | Number of AP
$p_{mn}$ | Power control coefficient of the transmit power that AP $m$ allocated to user $n$
$q_{mn}$ | $\sqrt{p_{mn}}$
$\gamma_{n}$ | Target SINR of user $n$
$\bm{x}$ | User grouping matrix
$P_{t}$ | Total transmit power
$\beta_{mn}$ | large-scale fading between AP $m$ and user $n$
_Notations:_ Vectors and sets are denoted by bold letters. $\lceil\cdot\rceil$
denotes the ceiling function. $\mathbf{A}^{H}$ and $\mathbf{A}^{*}$ denote the
conjugate transpose and conjugate of $\mathbf{A}$, respectively.
## II Systems Model and Problem Formulation
We consider a downlink TDD based cell-free massive MIMO system where $M$
single-antenna APs and $N$ single-antenna users are randomly located in a wide
area as shown in Fig. 1. In the traditional cell-free massive MIMO system
where all users sharing all coherence intervals or time-slots as shown in Fig.
1(a). To relieve the stress on channel estimation and decoding complexity, we
divide users in groups according to their assigned time-slots. Users assigned
the same time-slot form a group. The time-slots assigned to different groups
are assumed to be orthogonal. In this paper, we assume that the number of
users is greater than the number of groups. In Fig. 1(b), users are grouped
into 3 groups and served on 3 orthogonal time-slots, respectively. Both
channel estimation and decoding are performed within the group. There are two
types of training, i.e., large-scale training and uplink training. The result
of large-scale training is assumed to be accurate. The interval between two
times of large-scale training is named as $\tau_{Lc}$, and the interval
between two times of uplink training is named as $\tau_{c}$. Each $\tau_{Lc}$
is composed of one large-scale training phase and some time-slots, and each
time-slot contains one coherence interval. In general, we assume that
$\tau_{Lc}\gg\tau_{c}$ [13].
Figure 1: Illustration of Downlink Cell-Free Massive MIMO System.
The channel between AP $m$ and user $k$ on time-slot $g$ is modeled as
$h_{gmn}=\sqrt{\beta_{mn}}\varsigma_{gmn},~{}~{}~{}1\leq m\leq M,1\leq g\leq
G,1\leq n\leq N$, where $\beta_{mn}$ and
${\varsigma}_{gmn}\sim\mathcal{C}\mathcal{N}(0,1)$ denote the large-scale
fading and small-scale fading between AP $m$ and user $n$ on time-slot $g$,
respectively. In the remainder of this paper, we assume that large-scale
fading $\beta_{mn}$ is known to all APs and users. Considering that the
channels in different time-slots do not completely independent with each
other, in this paper, the large-scale fading is assumed to remain constant
across all time-slots between two large-scale training. Some major notations
are listed in Table I.
After user grouping, cell-free massive MIMO transmission in each group within
a coherence interval consists of three phases: uplink training, uplink payload
data transmission and downlink payload data transmission as shown in Fig. 1.
In this paper, we focus on the joint optimization of user grouping and power
allocation in downlink cell-free massive MIMO system. Therefore, uplink
training phase and downlink payload data transmission phase are introduced as
follows.
### II-A Uplink Training
$\displaystyle{\mathrm{SINR}_{n}^{MRT}}=\tfrac{\mathbb{E}[|Y_{us}|^{2}]}{\sigma^{2}+\mathbb{E}[|Y_{in}|^{2}+|Y_{ce}|^{2}+|Y_{lc}|^{2}]}=\tfrac{\mathbb{E}[|Y_{us}|^{2}]}{\sigma^{2}+\mathbb{E}[|Y_{in}|^{2}]+\mathbb{E}[|Y_{ce}|^{2}]+\mathbb{E}[|Y_{lc}|^{2}]}$
(1) $\displaystyle=$
$\displaystyle\tfrac{\left({\sum\limits_{{}^{m=1}}^{M}\sqrt{p_{mn}}\sum\limits_{g=1}^{G}x_{gn}\alpha_{gmn}}\right)^{2}}{\sigma^{2}+\sum\limits_{{}_{g=1}}^{G}x_{gn}\sum\limits_{{}^{i=1}_{i\neq
n}}^{N}x_{gi}\sum\limits_{{}_{m=1}}^{M}{p_{mi}}\alpha_{gmn}\alpha_{gmi}+\sum\limits_{{}_{g=1}}^{G}x_{gn}\sum\limits_{{}_{i=1}}^{N}x_{gi}\sum\limits_{{}_{m=1}}^{M}{p_{mi}}(\beta_{mn}-\alpha_{gmn})\alpha_{gmi}+\sum\limits_{{}_{g=1}}^{G}x_{gn}\sum\limits_{{}_{m=1}}^{M}{p_{mi}}\alpha_{gmn}^{2}}=\tfrac{\left({\sum\limits_{m=1}^{M}\sqrt{p_{mn}}\sum\limits_{g=1}^{G}x_{gn}\alpha_{gmn}}\right)^{2}}{\sigma^{2}+\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}p_{mi}\beta_{mn}\alpha_{gmi}},~{}~{}~{},1\leq
n\leq N.$
Instantaneous downlink channel state information (CSI) is needed at APs for
beamforming in following downlink payload data transmission. So in the uplink
training phase of this system, each user need to send pilot sequences
simultaneously to APs for channel estimation on the same assigned time-slot.
In this paper, the length of pilot sequence in group $g$ is $\tau_{g}$, which
is the main overhead of downlink channel estimation at the users and increases
linearly with the number of users in each group. To ensure the channel
estimation accuracy, the length of pilot sequence is usually assumed no less
than the number of users[10, 17]. Note that user grouping can effectively
increase the number of symbols for data transmission. We assume that the
length of coherence interval is $\tau_{c}$ and the length of pilot sequence in
group $g$ is $\tau_{g}$.
The effect of coherent time on the performance of the proposed system mainly
includes two aspects. One is the number of symbols for data transmission in
each time-slot, and the other one is the data rate of users. In detail,
considering the case that the number of users sharing the same time-slot is
settled, the length of pilot sequence in this time-slot will be settled. Then
the longer the coherence time, the longer is the efficient time of each
channel estimation result and the length of coherence interval. The length of
coherence interval is the sum of the length of pilot sequence and the number
of symbols for data transmission in each time-slot. So the number of symbols
for data transmission in each time-slot increases with the coherence time. On
the other hand, the longer coherent time, the longer is the proportion of the
symbols for data transmission. In each group or time-slot, the length of pilot
sequences required for channel estimation increases linearly with the number
of users sharing the same time-frequency resource. Without user grouping, the
number of symbols for data transmission within a coherent interval will be
only $\tau_{c}-\sum_{g=1}^{G}\tau_{g}$. After user grouping, the number of
users in each time slot will decrease, and hence the length of pilot sequences
required for channel estimation in each coherence interval will also decrease.
The number of symbols for data transmission within a coherent interval is
$\tau_{c}-\tau_{g}$. In other words, the length of pilot sequence in each
time-slot will be reduced by user grouping. For example: In a downlink TDD
based cell-free massive MIMO system with $\tau_{c}=100$ and 50 users, the
length of pilot sequences required for channel estimation in each coherence
interval is 50, and the proportion of the symbols for data transmission in
each coherence interval is $50/100=0.5$. If we assign these users into $5$
groups, the users sharing the same coherence interval will be $10$, then the
length of pilot sequences required for channel estimation in each coherence
interval is 10, and the proportion of the symbols for data transmission in
each coherence interval will up to $(100-10)/100=0.9$, which means that more
time slots is used for downlink payload data transmission. Furthermore, the
fewer users sharing the same coherence interval, the less interference that
users will suffer and the lower decoding difficulty for the receiver.
We assume that the user grouping information (containing which group to access
and the number of users in this group) has been acquired at each user. Let
$\bm{\psi}_{gn}\in\mathbb{C}^{\tau_{g}}$ denote the pilot sequence of the user
$n$ if user $n$ is assigned into group $g$ and satisfies
$\|\bm{\psi}_{gn}\|^{2}=1$. Then with a given user grouping matrix
$\bm{x}=[x_{gn}]_{1\leq g\leq G,1\leq n\leq N}$, where $x_{gn}$ is a 0-1
variable ($x_{gn}=1$ denotes that user $n$ is assigned into group $g$ and
$x_{gn}=0$ denotes that user $n$ is not assigned into group $g$), the pilot
signal that AP $m$ receives on time-slot $g$ is $\bm{y}^{p}_{mg}=$
$\sum_{n=1}^{N}x_{gn}\bm{\psi}_{gn}\sqrt{\rho_{r}\tau_{g}}h_{gmn}+{\mathfrak{n}^{g}_{m}}$,
where $\rho_{r}$ is the power of pilot signal from users, and
${\mathfrak{n}^{g}_{m}}\sim(0,\sigma^{2})$ is the Additive White Gaussian
Noise (AWGN) received at APs. Let $\hat{h}_{gmn}$ denote the minimum mean
square error (MMSE) estimate of $h_{gmn}$. Assuming that user $n$ is assigned
into group $g$, we have $\hat{h}_{gmn}$
$=\tfrac{\mathbb{E}[(\bm{\psi}_{gn}^{H}\bm{y}^{p}_{mg})^{*}h_{gmn}]}{\mathbb{E}[|\bm{\psi}_{gn}^{H}\bm{y}^{p}_{mg}|^{2}]}\bm{\psi}_{gn}^{H}\bm{y}^{p}_{mg}=\tfrac{\sqrt{\rho_{r}\tau_{g}}h_{gmn}}{\sigma^{2}+\rho_{r}\tau_{g}\beta_{gmn}}\bm{\psi}_{gn}^{H}\bm{y}^{p}_{mg},1\leq
m\leq M,1\leq g\leq G,1\leq n\leq N.$ According to [7], its distribution is
$\hat{h}_{gmn}\sim\mathcal{C}\mathcal{N}(0,\alpha_{gmn}),~{}~{}~{}1\leq m\leq
M,1\leq g\leq G,1\leq n\leq N.$ (2)
where
$\alpha_{gmn}=\tfrac{\rho_{r}\tau_{g}\beta_{mn}^{2}}{\sigma^{2}+\rho_{r}\tau_{g}\beta_{mn}}$.
In this paper, the length of pilot signal of users in group $g$, i.e.,
$\tau_{g}$, is equal to the number of users in group $g$. Then $\alpha_{gmn}$
can be rewritten as
$\alpha_{gmn}=\tfrac{\rho_{r}\sum_{i=1}^{N}x_{gi}\beta_{mn}^{2}}{\sigma^{2}+\rho_{r}\sum_{i=1}^{N}x_{gi}\beta_{mn}},~{}~{}1\leq
m\leq M,1\leq g\leq G,1\leq n\leq N.$ (3)
Therefore, $\alpha_{gmn}$ is up to $\bm{x}$ and $\rho_{r}$ when large-scale
fading is given. In addition, the distribution of channel estimation error is
$h_{gmn}-\hat{h}_{gmn}\sim\mathcal{C}\mathcal{N}(0,\beta_{mn}-\alpha_{gmn}),~{}~{}1\leq
m\leq M,1\leq g\leq G,1\leq n\leq N.$ (4)
### II-B Downlink Payload Data Transmission
After uplink training, APs will send the results of channel estimation to CPU
as Fig.1 shows. CPU calculates power control coefficients $p_{mn}$ (AP $m$
allocated to user $n$) and sends these coefficients to each AP. We w.l.o.g.
assume that the users in group $g$ have been sorted and numbered by their
channel gains. The index of user $n$ in its group is denoted by $\kappa_{n}$.
Next we will introduce the conjugate beamforming (i.e., maximum-ratio
transmission, MRT) and the ZF beamforming for precoding. First, we define the
coefficients for beamforming as follows:
$b_{gmn}=\\!\\!\left\\{\begin{array}[]{ll}\\!\\!\\!\\!\hat{h}^{*}_{gmn}&\text{MRT}\\\
\\!\\!\\!\\![\hat{\bm{H}}_{g}^{*}(\hat{\bm{H}}_{g}^{T}\hat{\bm{H}}_{g}^{*})^{-1}]_{m\kappa_{n}},~{}\\!&\text{ZF}\end{array}\right.,$
(5)
where $\bm{H}_{g}$ denotes the $M\times\sum_{i=1}^{N}x_{gi}$ channel
coefficient matrix, $[\bm{H}_{g}]_{m\kappa_{n}}=h_{gmn}$. It should be noted
that, the real transmit power from AP $m$ to user $n$ is
$p_{mn}|b_{gmn}|^{2}$, where $b_{gmn}$ is the beamforming coefficient and
$p_{mn}$ is the power control coefficient. Although the value of $p_{mn}$ from
different APs to each user are equal, the value of $b_{gmn}$ from different
APs to each user are different. Therefore, the real transmit power from
different APs to each user, i.e., $p_{mn}|b_{gmn}|^{2}$, are different.
#### II-B1 Conjugate Beamforming
The signal transmitted from each AP on time-slot $g$ after conjugate
beamforming is given by
${t}_{gm}=\sum_{n=1}^{N}x_{gn}\sqrt{p_{mn}}{{b_{gmn}}}s_{n}$[18, 19, 20],
where $p_{mn}$ denotes power control coefficient of transmit power that AP $m$
allocated to user $n$ , $s_{n}$ represents the transmitted symbol of user $n$.
The signal received at user $n$, using MRT, is given by111Although the strict
phase-synchronization and -calibration between APs are not needed for non-
coherent receivers, the coherent joint transmission can achieve higher
spectral efficiency than non-coherent joint transmission. In the system model
of this paper, the pilot sequences is sent by users and received by APs. So
the channel estimation is only available at APs and the users only knows the
large-scale channel gain. With coherent joint transmission, the user don’t
need to distinguish the signals from different APs. Based on the above
considerations, the coherent joint transmission is adopted in this paper.
$\displaystyle{y_{n}^{MRT}}=\sum_{g=1}^{G}\sum_{m=1}^{M}x_{gn}h_{gmn}{t}_{gm}+\mathfrak{n}^{g}_{n}$
(6)
$\displaystyle=\sum_{g=1}^{G}\sum_{m=1}^{M}x_{gn}h_{gmn}\sum_{i=1}^{N}x_{gi}\sqrt{p_{mi}}{b_{gmi}}s_{i}+\mathfrak{n}^{g}_{n},~{}~{}~{}1\leq
n\leq N.$
where ${\mathfrak{n}^{g}_{m}}\sim(0,\sigma^{2})$ is the AWGN received at
users. For convenience, according to [7], we divide $y_{n}$ into five parts,
including the desired signal of user $n$ $Y_{us}$, interference from the
desired signals of the other users in the same group $Y_{in}$, the channel
estimation error $Y_{ce}$, the lack of channel knowledge at user $Y_{lc}$ and
noise $\mathfrak{n}^{g}_{n}$, and define the first four parts as follows.
$\displaystyle Y_{ce}=$
$\displaystyle\sum_{g=1}^{G}\sum_{m=1}^{M}\sum_{i=1}^{N}x_{gn}x_{gi}\sqrt{p_{mi}}(h_{gmn}-\hat{h}_{gmn}){\hat{h}_{gmi}^{*}}s_{i},$
$\displaystyle Y_{us}=$
$\displaystyle\sum_{g=1}^{G}\sum_{m=1}^{M}x_{gn}\sqrt{p_{mn}}\mathbb{E}[|\hat{h}_{gmn}|^{2}]s_{n},$
$\displaystyle Y_{lc}=$
$\displaystyle\sum_{g=1}^{G}\sum_{m=1}^{M}x_{gn}\sqrt{p_{mn}}(|\hat{h}_{gmn}|^{2}-\mathbb{E}[|\hat{h}_{gmn}|^{2}])s_{n},$
$\displaystyle Y_{in}=$ $\displaystyle
sum_{g=1}^{G}\sum_{m=1}^{M}\sum_{{}^{i=1}_{i\neq
n}}^{N}x_{gn}x_{gi}\sqrt{p_{mi}}\hat{h}_{gmn}{\hat{h}_{gmi}^{*}}s_{i}.$
Then (6) can be rewritten as
${y_{n}^{MRT}}=Y_{us}+Y_{in}+Y_{ce}+Y_{lc}+\mathfrak{n}^{g}_{n}$. As these
five parts are mutually uncorrelated, the lower bound of SINR achievable to
user $n$ is [7], where the time interval is the coherence time (a time slot),
hence the noise in this expression is one $\sigma^{2}$. It should be noted
that $\sum\limits_{g=1}^{G}x_{gn}=1$, for $\forall n$. Hence, the SINR of
users in different groups will not affect with each other.
Obviously, interference from the desired signals of the other users in the
same group will be reduced as the number of users in each group decreases, and
the complexity of decoding at the receiver will be relatively reduced. To
satisfy the user QoS requirements, the achievable SINR of each user should be
constrained by $\mathrm{SINR}_{n}^{MRT}\geq\gamma_{n},~{}~{}~{}1\leq n\leq
N,1\leq g\leq G$ where
$\gamma_{n}=2^{GR_{n}^{target}\frac{\tau_{c}}{\tau_{c}-\tau_{g}}}-1$ is the
minimal SINR in the transmit time slot of user $n$ to achieve its target data
rate $R_{n}^{target}$, and $\frac{\tau_{c}}{\tau_{c}-\tau_{g}}$ is the ratio
of the length of data in each coherence interval after grouping and that of
data in each coherence interval without grouping.
#### II-B2 Zero-Forcing Precoder
With zero-forcing precoder, the signal transmitted from each AP on time-slot
$g$ is given by ${t}_{gm}=\sum_{n=1}^{N}x_{gn}\sqrt{p_{n}}b_{gmn}s_{n}$, where
$p_{n}$ is the power allocation coefficient of user $n$ under the assumption
of $p_{mn}=p_{n}$, for $\forall m$. The signal received at user $n$, using ZF,
is given by
$y^{ZF}_{n}=\sum_{g=1}^{G}\sum_{m=1}^{M}x_{gn}h_{gmn}{t}_{gm}+\mathfrak{n}^{g}_{n},~{}~{}~{}1\leq
n\leq N.$
Since interference from the desired signals of the other users in the same
group has been eliminated by zero-forcing precoder, the lower bound of SINR
achievable to user $n$ is [21, 7, 22]
$\mathrm{SINR}_{n}^{ZF}=\tfrac{p_{n}}{\sigma^{2}+\sum_{g=1}^{G}x_{gn}\sum_{i=1}^{N}x_{gi}p_{i}\eta_{ni}}$,
where $\eta_{ni}$ is the $\kappa_{i}$-th element of the following
vector:$\bm{\eta}_{n}=diag\\{\mathbb{E}((\hat{\bm{H}}_{g}^{T}\hat{\bm{H}}_{g}^{*})^{-1}\hat{\bm{H}}_{g}^{T}\mathbb{E}(\hat{\bm{h}}_{g\kappa_{n}}^{*}\hat{\bm{h}}_{g\kappa_{n}}^{T})\hat{\bm{H}}_{g}^{*}(\hat{\bm{H}}_{g}^{T}\hat{\bm{H}}_{g}^{*})^{-1})\\}$,
where
$\hat{\bm{h}}_{g\kappa_{n}}^{T}=[\hat{{h}}_{g1n},\ldots\hat{{h}}_{gmn}\ldots\hat{{h}}_{gMn}]$,
and $\mathbb{E}(\hat{\bm{h}}_{g\kappa_{n}}^{*}\hat{\bm{h}}_{g\kappa_{n}}^{T})$
is a diagonal matrix with $(\beta_{mn}-\alpha_{gmn})$ on its m-th diagonal
element, which has been proved in [22]. The value of $\eta_{ni}$ can be
obtained using exponential smoothing as stated in [7]. Exponential smoothing
is a method to predict the future value of a variable by weighting its past
values considering the change trend of its value. In this paper, the
historical values of $\eta_{ni}$ can be obtained from previous channel
estimation results, hence we can obtain the predicted value of $\eta_{ni}$ by
weighting its historical values. We assume that the accurate and the estimated
value of the current $\eta_{ni}$ is $\eta_{ni}^{t}$ and $\eta_{ni}^{(t)}$,
respectively. and $\eta_{ni}^{t-1}$ and $\eta_{ni}^{(t-1)}$ denote the
accurate and the estimated value of the $(t-1)$-th $\eta_{ni}$. Then
$\eta_{ni}^{(t)}=w\eta_{ni}^{t-1}+(1-w)\eta_{ni}^{(t-1)}$, where $w$ is a
constant between 0 and 1.
To get a similar form of $\mathrm{SINR}_{n}^{MRT}$ in (1),
$\mathrm{SINR}_{n}^{ZF}$ can be rewritten as:
$\displaystyle\mathrm{SINR}_{n}^{ZF}=\tfrac{\left({\sum\limits_{m=1}^{M}\tfrac{1}{M}\sqrt{p_{mn}}}\right)^{2}}{\sigma^{2}+\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}\tfrac{1}{M}p_{mi}\eta_{ni}},~{}1\leq
n\leq N\Bigg{|}p_{mn}=p_{n}.$ (7)
### II-C Problem Formulation
According to (1) and (7), the values of $\mathrm{SINR}_{n}^{MRT}$ and
$\mathrm{SINR}_{n}^{ZF}$ are up to the user grouping matrix
$\bm{x}=[x_{gn}]_{1\leq g\leq G,1\leq n\leq N,}$, power allocation matrix
$\bm{p}=[p_{mn}]_{1\leq m\leq M,1\leq n\leq N}$, and large-scale fading matrix
$\bm{\beta}=[\beta_{mn}]_{1\leq m\leq M,1\leq n\leq N}$ (The value of
$\alpha_{gmn}$ is up to $\bm{x}$ if $\rho_{\tau}$ and $\bm{\beta}$ are given
as stated in subsection II-A). We try to optimize the user grouping and power
allocation strategy to minimize the total transmit power with known large-
scale fading under QoS constraints, i.e., target SINR. We formulate this joint
power allocation and user grouping problem as $\mathcal{P}1$.
$\displaystyle\mathcal{P}1:~{}\min_{\bm{x},\bm{p}}~{}~{}$ $\displaystyle
P_{t}={\sum\limits_{m=1}^{M}\sum\limits_{n=1}^{N}p_{mn}\sum\limits_{g=1}^{G}x_{gn}\varphi_{gmn}}$
(8a) s.t.
$\displaystyle\tfrac{\left({\sum\limits_{m=1}^{M}\sqrt{p_{mn}}\sum\limits_{g=1}^{G}x_{gn}\vartheta_{gmn}}\right)^{2}}{\sigma^{2}+\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}p_{mi}\upsilon_{gmni}}\geq\gamma_{n},~{}~{}~{}1\leq
n\leq N,$ (8b) $\displaystyle p_{mn}\geq 0,~{}~{}~{}~{}1\leq n\leq N,1\leq
m\leq M,$ (8c)
$\displaystyle\sum\limits_{g=1}^{G}x_{gn}=1,~{}~{}~{}x_{gn}\in\\{0,1\\},1\leq
n\leq N,$ (8d) $\displaystyle p_{mn}=p_{m^{\prime}n},~{}~{}~{}1\leq
m,M^{\prime}\leq M\Bigg{|}ZF$ (8e)
$\displaystyle\text{(\ref{0000-1+1+1}),(\ref{sec:02B04+})-(\ref{sec:02B04+++})}.$
where (8d) means that each user should be assigned into only one group, (8e)
exists when ZF beamforming is chosen. Like (5), some variables are defined as
follows:
$\varphi_{gmn}=\left\\{\begin{array}[]{ll}\alpha_{gmn}&\text{MRT}\\\
\text{$[diag\\{\mathbb{E}((\hat{\bm{H}}_{g}^{T}\hat{\bm{H}}_{g}^{*})^{-1}\hat{\bm{h}}_{[gm]}^{*}\hat{\bm{h}}_{[gm]}^{T}(\hat{\bm{H}}_{g}^{T}\hat{\bm{H}}_{g}^{*})^{-1})\\}]_{\kappa_{n}}$}&\text{ZF}\end{array}\right.$
(9)
,where $\hat{\bm{h}}_{gm}$ is the m-th row of $\hat{\bm{H}}_{g}$.
$\vartheta_{gmn}=\left\\{\begin{array}[]{ll}\alpha_{gmn}&\text{MRT}\\\
\tfrac{1}{\sqrt{M}},{}&\text{ZF}\end{array}\right.,$ (10)
$\upsilon_{gmni}=\left\\{\begin{array}[]{ll}\beta_{mn}\alpha_{gmi}&\text{MRT}\\\
\tfrac{1}{\sqrt{M}}\eta_{ni},{}&\text{ZF}\end{array}\right.,$ (11)
To solve this MINLP problem, we first define a $M\times N$ matrix
$\bm{q}$$=[q_{mn}]_{1\leq m\leq M,1\leq n\leq N}$, where
$q_{mn}=\sqrt{p_{mn}}$, and convert problem $\mathcal{P}1$ into problem
$\mathcal{P}2$:
$\displaystyle\mathcal{P}2:~{}\min_{\bm{x},\bm{q}}~{}~{}$ $\displaystyle
P_{t}={\sum\limits_{m=1}^{M}\sum\limits_{n=1}^{N}q_{mn}^{2}\sum\limits_{g=1}^{G}x_{gn}\varphi_{gmn}},$
(12a) s.t.
$\displaystyle\left({\sigma^{2}+\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}\upsilon_{gmni}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}$
$\displaystyle-$
$\displaystyle{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x_{gn}\vartheta_{gmn}}}\leq
0,~{}~{}~{}1\leq n\leq N,$ (12b) $\displaystyle q_{mn}\geq 0,~{}~{}~{}~{}1\leq
n\leq N,1\leq m\leq M,$ (12c) $\displaystyle
q_{mn}=q_{m^{\prime}n},~{}~{}~{}1\leq m,M^{\prime}\leq M\Bigg{|}ZF$ (12d)
$\displaystyle\text{(\ref{0000-1+1+1}),(\ref{sec:02B04+})-(\ref{sec:02B04+++}),
(\ref{0003d})}.$
A key motivation of this conversion is to convert constraints (8b) into convex
constraints (12b) with given user grouping matrix $\bm{x}$, which will be
introduced in the next section. Problem $\mathcal{P}2$ is still hard to solve,
we try to solve it with an iterative method based on GBD method [23, 24].
## III Problem Analysis and Solutions
We first decompose this problem into a primal problem: power allocation
problem and a master problem: user grouping problem according to GBD method
[23] [24]. Then according to the basic principle of GBD method, the MINLP
problem can be solved by solving these two problems iteratively [25]. In each
iteration, the upper bound and the lower bound of the problem can be updated,
and the gap among the upper and lower bound is shrunk [26].
### III-A Primal Problem: Power allocation problem
Power allocation problem $\mathcal{S}^{(k)}$ is given by fixing the user
grouping matrix to $\bm{x}^{(k)}$:
$\displaystyle\mathcal{S}^{(k)}:~{}\min_{\bm{q}}~{}$ $\displaystyle
P_{t}={\sum\limits_{m=1}^{M}\sum\limits_{n=1}^{N}q_{mn}^{2}\sum\limits_{g=1}^{G}x^{(k)}_{gn}\varphi^{(k)}_{gmn}}$
(13a) s.t.
$\displaystyle\left({\sigma^{2}+\sum\limits_{g=1}^{G}x^{(k)}_{gn}\sum\limits_{i=1}^{N}x^{(k)}_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}\upsilon_{gmni}^{(k)}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}$
$\displaystyle-$
$\displaystyle{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x^{(k)}_{gn}\vartheta_{gmn}^{(k)}}}\leq
0,~{}~{}1\leq n\leq N,$ (13b)
$\displaystyle\text{(\ref{0000-1+1+1}),(\ref{0003+1c}),(\ref{sec:02B04+})-(\ref{sec:02B04+++}),(\ref{0003+1d})}.$
Since the objective function (13a) is convex, the SINR constraints (13b) are
second order cone (SOC) constraints, the constraints (12c) and (12c) are
linear and the other constraints are not related to the value of $\bm{q}$,
problem $\mathcal{S}^{(k)}$ is a convex problem.
Since problem $\mathcal{S}^{(k)}$ is a convex problem, we can solve it by the
interior point method. In addition, problem $\mathcal{S}^{(k)}$ is given by
fixing the user grouping matrix to $\bm{x}^{(k)}$. Hence, there are two cases
about this problem, feasible and infeasible. These cases of problem
$\mathcal{S}^{(k)}$ are discussed as follows:
Feasible Case: We first define the partial Lagrangian function of problem
$\mathcal{S}^{(k)}$ [27]:
$\displaystyle\mathcal{L}(\bm{q},\bm{\lambda},\bm{x}^{(k)})={\sum\limits_{m=1}^{M}\sum\limits_{n=1}^{N}q_{mn}^{2}\sum\limits_{g=1}^{G}x^{(k)}_{gn}\varphi^{(k)}_{gmn}}$
(14)
$\displaystyle+\sum\limits_{n=1}^{N}\lambda_{n}\left(\left({\sigma^{2}+\sum\limits_{g=1}^{G}x^{(k)}_{gn}\sum\limits_{i=1}^{N}x^{(k)}_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}\upsilon^{(k)}_{gmni}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}\right.$
$\displaystyle-\left.{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x^{(k)}_{gn}\vartheta^{(k)}_{gmn}}}\right),$
where the Lagrangian multipliers $\bm{\lambda}=[\lambda_{mn}]_{1\leq m\leq
M,1\leq n\leq N}$ correspond to constraints (13b) and satisfy
$\lambda_{mn}\geq 0$, $1\leq m\leq M,~{}1\leq n\leq N$. The dual problem of
problem $\mathcal{S}^{(k)}$ can be obtained as stated in Lemma 1.
###### Lemma 1.
Problem $\mathcal{S}^{(k)}$ is equivalent to its dual problem
$\mathcal{D}_{S}^{(k)}$ as follows [28].
$\displaystyle\mathcal{D}_{S}^{(k)}:~{}\max_{\bm{\lambda}}~{}~{}$
$\displaystyle\inf_{\bm{q}}~{}\mathcal{L}(\bm{q},\bm{\lambda},\bm{x}^{(k)})$
(15a) s.t. $\displaystyle\lambda_{mn}\geq 0,~{}~{}~{}~{}1\leq m\leq M,~{}1\leq
n\leq N,$ (15b) (3),(12c),(12d).
###### Proof.
It is obvious that there exists a strictly feasible point for convex problem
$\mathcal{S}^{(k)}$ (feasible case), thus Slater’s condition is satisfied [29]
[30]. Hence, strong duality holds for problem $\mathcal{S}^{(k)}$ and its dual
problem [31].∎
Infeasible Case: According to Lemma 1, we can get an upper bound of problem
$\mathcal{P}2$. Then if problem $\mathcal{S}^{(k)}$ is infeasible, which means
that constraint (13b) can not be satisfied no matter how we allocate power, we
try to find the power allocation strategy that is close to constraint (13b).
By relaxing constraint (13b) with a violation variable $\phi$, we can get the
following problem $\mathcal{S}2^{(k)}$ as well as its dual problem
$\mathcal{D}_{S2}^{(k)}$ [32]. In problem $\mathcal{S}2^{(k)}$, we try to
minimize the gap between the left and right sides of (13b).
$\displaystyle\mathcal{S}2^{(k)}:~{}\min_{\bm{q},\phi}~{}$ $\displaystyle\phi$
(16a) s.t.
$\displaystyle\left({\sigma^{2}+\sum\limits_{g=1}^{G}x^{(k)}_{gn}\sum\limits_{i=1}^{N}x^{(k)}_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}\upsilon^{(k)}_{gmni}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}$
(16b) $\displaystyle-$
$\displaystyle{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x^{(k)}_{gn}\vartheta^{(k)}_{gmn}}}\leq\phi,~{}~{}1\leq
n\leq N,$ (16c) $\displaystyle\phi\geq 0,$ (16d) (3),(12c),(12d).
We define the partial Lagrangian function of $\mathcal{S}2^{(k)}$ as follows:
$\displaystyle\mathcal{L}^{\prime}(\bm{q},\bm{\nu},\bm{x}^{(k)})$
$\displaystyle=\sum\limits_{n=1}^{N}\nu_{n}\left(\left({\sigma^{2}+\sum\limits_{g=1}^{G}x^{(k)}_{gn}\sum\limits_{i=1}^{N}x^{(k)}_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}\upsilon^{(k)}_{gmni}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}\right.$
(17) $\displaystyle-$
$\displaystyle\left.{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x^{(k)}_{gn}\vartheta^{(k)}_{gmn}}}\right),$
where the Lagrangian multipliers $\bm{\nu}$ correspond to constraints
$(\ref{0018b})$ and satisfy $\nu_{mn}\geq 0$, $1\leq m\leq M,~{}1\leq n\leq
N$. Like problem $\mathcal{S}^{(k)}$, we can also get the optimal solutions
$\bm{q}^{(k)}$ and the dual solutions $\bm{\nu}^{(k)}$ by the interior point
method. In addition, Lemma 2 is obtained.
###### Lemma 2.
Problem $\mathcal{S}2^{(k)}$ is equivalent to its dual problem
$\mathcal{D}_{S2}^{(k)}$ as follows.
$\displaystyle\mathcal{D}_{S2}^{(k)}:~{}\max_{\bm{\nu}}~{}~{}$
$\displaystyle\inf_{\bm{q},\phi}\mathcal{L}^{\prime}(\bm{q},\bm{\nu},\bm{x}^{(k)})+\phi-\sum\limits_{n=1}^{N}\nu_{n}\phi$
(18a) s.t. $\displaystyle\nu_{mn}\geq 0,~{}~{}~{}~{}1\leq m\leq M,~{}1\leq
n\leq N,$ (18b) (16d), (3), (12c),(12d).
###### Proof.
Since the objective function (18a) is convex and all the constraints are
linear, problem $\mathcal{S}2^{(k)}$ is convex. In addition, for any
$\bm{q}\succ 0$ and any ${\phi}$ satisfies (16c), $\\{\bm{q},\phi\\}$ is
feasible for convex problem $\mathcal{S}2^{(k)}$, thus Slater’s condition is
satisfied. Hence, strong duality holds for problem $\mathcal{S}2^{(k)}$ and
its dual problem.∎
### III-B Master problem: User grouping problem
We write the master user grouping problem $\mathcal{M}1$ as follows:
$\displaystyle\mathcal{M}1:~{}\min_{\bm{x}}~{}~{}$
$\displaystyle\text{{f}}(\bm{x})$ s.t.
$\displaystyle\bm{x}\in\\{\bm{x}\text{${}^{(k)}$}|\text{$\mathcal{S}^{(k)}$ is
feasible}\\},~{}~{}~{}1\leq n\leq N,$ (19a)
$\displaystyle\text{(\ref{0003d})}.$
where function f($\bm{x}$) returns the optimal value of problem
$\mathcal{S}^{(k)}|_{\bm{x}^{(k)}=\bm{x}}$.
In problem $\mathcal{M}1$, (19a) is not in the explicit form. Therefore, to
apply GBD method, we convert the master problem $\mathcal{M}1$ into an
explicit form in the following lemma.
###### Lemma 3.
Problem $\mathcal{M}1$ is equivalent to the following problem $\mathcal{M}2$.
$\displaystyle\mathcal{M}2:~{}\min_{\bm{x}}~{}~{}$ $\displaystyle\xi$ s.t.
$\displaystyle\min_{\bm{q}\succeq
0}\mathcal{L}(\bm{q},\bm{\lambda},\bm{x})\leq\xi,\forall\bm{\lambda}\succeq
0,$ (20a) $\displaystyle\min_{\bm{q}\succeq
0}\mathcal{L}^{\prime}(\bm{q},\bm{\nu},\bm{x})\leq 0,\forall\bm{\nu}\succeq
0:\sum_{n=1}^{N}\nu_{n}=1,$ (20b) $\displaystyle\text{(\ref{0003d}))}.$
###### Proof.
Since the constraints (13b) are convex, according to Theorem 2.2 in [33], the
constraints (19a) are equivalent to (20b). Then according to Lemma 1, we have:
$\displaystyle\text{{f}}(\bm{x})=\max_{\bm{\lambda\succeq
0}}~{}\min_{\bm{q}\succeq 0}\mathcal{L}(\bm{q},\bm{\lambda},\bm{x}).$ (21)
Therefore, the following two problems are equivalent.
$\displaystyle\min_{\bm{x}}~{}~{}$ $\displaystyle\text{{f}}(\bm{x})$ s.t.
$\displaystyle\text{(\ref{0003d})}.$
and
$\displaystyle\min_{\bm{x}}~{}~{}$ $\displaystyle\xi$ s.t.
$\displaystyle\min_{\bm{q}\succeq
0}\mathcal{L}(\bm{q},\bm{\lambda},\bm{x})\leq\xi,\forall\bm{\lambda}\succeq
0,$ $\displaystyle\text{(\ref{0003d})}.$
Thus, the proof of Lemma 3 is concluded.∎
The constraints (20a) and (20b) are composed of an infinite number of
constraints ($\bm{q}$ is a matrix composed of continuous variables), which
makes problem $\mathcal{M}2$ hard to solve. Next we settle the Lagrangian
multipliers $\bm{\lambda}$ and $\bm{\nu}$ to make problem $\mathcal{M}2$ more
explicit by Lemma 4.
###### Lemma 4.
If $\mathcal{S}^{(k)}$ is feasible, and both its optimal solution
$\bm{q}^{(k)}$ and the dual solution $\bm{\lambda}^{(k)}$ have been obtained,
we have:
$\displaystyle\min_{\bm{q}\succeq
0}\mathcal{L}(\bm{q},\bm{\lambda}^{(k)},\bm{x})=\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x}).$
(24)
If $\mathcal{S}^{(k)}$ is infeasible, and the optimal solution $\bm{q}^{(k)}$
as well as the dual solution $\bm{\nu}^{(k)}$ of problem $\mathcal{S}2^{(k)}$
have been obtained, the following equations are equivalent.
$\displaystyle\min_{\bm{q}\succeq
0}\mathcal{L}^{\prime}(\bm{q},\bm{\nu}^{(k)},\bm{x})\leq
0:\sum_{n=1}^{N}\nu_{n}^{(k)}=1,$ (25)
and
$\displaystyle\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})\leq 0.$
(26)
###### Proof.
If $\mathcal{S}^{(k)}$ is feasible, according to (15), (24) is tenable.
If $\mathcal{S}^{(k)}$ is infeasible, according to (17), we have:
$\displaystyle\tfrac{\partial(\mathcal{L}^{\prime}(\bm{q},\bm{\nu}^{(k)},\bm{x})+\phi-\sum\limits_{n=1}^{N}\nu_{n}^{(k)}\phi}{\partial\phi}=1-\sum\limits_{n=1}^{N}\nu_{n}^{(k)}=0$
(27)
Then according to (16) and (18) we have
$\displaystyle(\bm{q}^{(k)},\phi)=$ $\displaystyle{arg\min_{\bm{q}\succeq
0,\phi\geq
0}}~{}\mathcal{L}^{\prime}(\bm{q},\bm{\nu}^{(k)},\bm{x})+\phi-\sum\limits_{n=1}^{N}\nu_{n}^{(k)}\phi$
(28) $\displaystyle=$ $\displaystyle{arg\min_{\bm{q}\succeq 0,\phi\geq
0}}~{}\mathcal{L}^{\prime}(\bm{q},\bm{\nu}^{(k)},\bm{x})+\phi(1-\sum\limits_{n=1}^{N}\nu_{n}^{(k)}),$
Combining (28) with (27), we have
$\displaystyle\bm{q}^{(k)}=$ $\displaystyle{arg\min_{\bm{q}\succeq
0}~{}\mathcal{L}^{\prime}(\bm{q},\bm{\nu}^{(k)},\bm{x})}.$ (29)
where $\sum_{n=1}^{N}\nu_{n}^{(k)}=1$. Hence, (25) and (26) are equivalent.
The proof of Lemma 4 is concluded.∎
According to Lemma 4, we can relax problem $\mathcal{M}2$ into problem
$\mathcal{M}3$ by calculating the optimal solution $\bm{q}^{(k)}$ and the dual
solution $\bm{\lambda}^{(k)}$ of feasible problem $\mathcal{S}^{(k)}$, and we
can relax problem $\mathcal{M}2$ into problem $\mathcal{M}3$ by calculating
the optimal solution $\bm{q}^{(k)}$ and the dual solution $\bm{\nu}^{(k)}$ of
problem $\mathcal{S}2^{(k)}$ when problem $\mathcal{S}^{(k)}$ is infeasible
$\displaystyle\mathcal{M}3:~{}\min_{\bm{x}}~{}~{}$ $\displaystyle\xi$ s.t.
$\displaystyle\mathcal{L}(\bm{q}^{(k_{1})},\bm{\lambda}^{(k_{1})},\bm{x})\leq\xi,~{}~{}k_{1}\in\\{k|\text{$\mathcal{S}^{(k)}$
is feasible}\\}$ (30a)
$\displaystyle\mathcal{L}^{\prime}(\bm{q}^{(k_{2})},\bm{\nu}^{(k_{2})},\bm{x})\leq
0,~{}~{}k_{2}\in\\{k|\text{$\mathcal{S}^{(k)}$ is infeasible}\\}$ (30b)
$\displaystyle\text{(\ref{0003d})}.$
Note that problem $\mathcal{M}3$ is more explicit than problem $\mathcal{M}1$.
###### Lemma 5.
The optimal value of problem $\mathcal{M}3$ is a lower bound of problem
$\mathcal{P}2$.
###### Proof.
The proof is stated in Remark 2.3 of [33] in detail.∎
Input: Variance of Channel Estimation $\bm{\alpha}$, Large-scale Fading
$\bm{\beta}$,
1
Output: Power Allocation Matrix $\bm{q}$, Grouping Matrix $\bm{x}$
2 for _$n=1\textrm{ to }N$_ do
3 $g=mod(n,G)+1$; $x_{gn}^{1}=1$
4 end for
5$k=1$;Create problem $\mathcal{M}3$ without feasi-constraint or infeasi-
constraint;
6repeat
7 Solve power allocation problem $\mathcal{S}^{(k)}$ by the interior point
method;
8 if _$\mathcal{S}^{(k)}$ is feasible._ then
9 Calculate the optimal solution $\bm{q}^{(k)}$, optimal value
$P_{t}^{(k)}={\sum\limits_{m=1}^{M}\sum\limits_{n=1}^{N}q_{mn}^{2}\sum\limits_{g=1}^{G}x^{(k)}_{gn}{\varphi_{gmn}^{(k)}}}$
and the dual solution $\bm{\lambda}^{(k)}$ of problem $\mathcal{S}^{(k)}$;
10 Add constraint $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})\leq\xi$
to the relaxed master problem $\mathcal{M}3$;
11 Update upper bound $b_{u}=P_{t}^{(k)}$;
12 else
13 Calculate the optimal solution $\bm{q}^{(k)}$,
$P_{t}^{(k)}={\sum\limits_{m=1}^{M}\sum\limits_{n=1}^{N}q_{mn}^{2}\sum\limits_{g=1}^{G}x^{(k)}_{gn}{\varphi_{gmn}^{(k)}}}$
and the dual solution $\bm{\nu}^{(k)}$ of problem $\mathcal{S}2^{(k)}$ by the
interior point method;
14 Add constraint
$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})\leq 0$ to the
relaxed master problem $\mathcal{M}3$;
15 end if
16
17 Solve the relaxed master problem $\mathcal{M}3$ to get new grouping matrix
$\bm{x}^{(k+1)}$ and its optimal value $\xi_{min}$;
18 Update lower bound $b_{l}=\xi_{min}$; $k=k+1$;
19until _$b_{u}-b_{l}\leq\delta$ or $b_{u}$ won’t change or number of
iterations exceeds N_;
Algorithm 1 GBD Based Joint Power Allocation and User Grouping Algorithm
(GPGA)
Since the upper bound and lower bound of problem $\mathcal{P}2$ can be
obtained by solving problem $\mathcal{S}^{k}$ and problem $\mathcal{M}3$,
respectively, we propose a joint power allocation and user grouping algorithm
(GPGA) based on GBD as shown in Algorithm 1. In this algorithm, steps 1-4 is
the initialization of grouping matrix $\bm{x}^{(k)}$. Then according to the
feasibility of problem $\mathcal{S}^{(k)}$ and Lemma 4, we add constraint
$\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})\leq\xi$ or
$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})\leq 0$, which we
called them feasi-constraint and infeasi-constraint, respectively, to relaxed
master problem $\mathcal{M}3$ and update the upper bound and lower bound of
problem $\mathcal{P}2$. A new user grouping matrix $\bm{x}^{(k+1)}$ is
obtained by solving problem $\mathcal{M}3$. Next, matrix $\bm{x}^{(k)}$ is
updated by matrix $\bm{x}^{(k+1)}$. Steps 6-19 is repeated until the gap
between the upper bound and lower bound of problem $\mathcal{P}2$ is less than
$\delta$, i.e., $\delta$-optimal solution.
###### Proposition 1.
Algorithm 1 is bound to stop in finite steps for any given $\delta>0$.
###### Proof.
After each iteration of 6-19 in Algorithm 1, the upper bound of problem
$\mathcal{P}2$ is nonincreasing and the lower bound of problem $\mathcal{P}2$
is nondecreasing. Therefore, the gap between the upper bound and lower bound
of problem $\mathcal{P}2$ is shrunk. Moreover, the strategic space of user
grouping matrix $\bm{x}$ is finite. Thus, Algorithm 1 is bound to stop in
finite steps for any given $\delta>0$. The proof is stated in section 2.4 of
[33] in detail.∎
In Algorithm 1, we solve power allocation problem ${\mathcal{S}^{(k)}}$ by the
interior point method, and its computational complexity is
$O\big{(}N(NM)^{3}\big{)}$[34]. If we solve the relaxed master problem
$\mathcal{M}3$ by exhaustive search algorithm, the computational complexity
will be unbearable. We introduce the way to solve the relaxed master problem
$\mathcal{M}3$ in Section IV.
## IV Relaxed Master Problem Analysis and Solutions Based on Graph Theory
In this section, we convert the relaxed master user grouping problem into a
problem of searching for some special negative loops in a graph composed of
users based on graph theory. Two algorithms to find these loops are proposed.
In order to find the way to reduce the values of
$\mathcal{L}(\bm{q}^{(k_{1})},\bm{\lambda}^{(k_{1})},\bm{x})$ and
$\mathcal{L}^{\prime}(\bm{q}^{(k_{2})},\bm{\nu}^{(k_{2})},\bm{x})$ in the
relaxed master user grouping problem $\mathcal{M}3$, we introduce three
definitions as follows:
###### Definition 1.
For $L$ users numbered by $n_{1},n_{2},\ldots,n_{L}$ in different groups, if
problem $\mathcal{S}^{(k)}$ is feasible and
$\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ can be reduced by
$n_{1}\rightarrow n_{2},\ldots,n_{L-2}\rightarrow n_{L-1}$ and putting user
$n_{L-1}$ into the group of user $n_{L}$, or if problem $\mathcal{S}^{(k)}$ is
infeasible, and $\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$ can
be reduced by $n_{1}\rightarrow n_{2},\ldots,n_{L-2}\rightarrow n_{L-1}$ and
putting user $n_{L-1}$ into the group of user $n_{L}$, these users compose a
_k-shift union_.
To explain the meaning of $n\rightarrow n^{\prime}$, we assume that with
grouping strategy $\bm{x}$, user $n$ and user $n^{\prime}$ are in group $g$
and $g^{\prime}$, respectively. That is, $x_{gn}=1$,
$x_{g^{\prime}n^{\prime}}=1$. Then $n\rightarrow n^{\prime}$ means
transferring user $n$ into group $g^{\prime}$ and removing user $n^{\prime}$
from group $g^{\prime}$, that is, $x_{gn}=0$, $x_{gn^{\prime}}=1$,
$x_{g^{\prime}n^{\prime}}=0$.
###### Definition 2.
For $L$ users numbered by $n_{1},n_{2},\ldots,n_{L}$ in different groups, if
problem $\mathcal{S}^{(k)}$ is feasible and
$\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ can be reduced by
$n_{1}\rightarrow n_{2},\ldots,n_{L}\rightarrow n_{1}$, or if problem
$\mathcal{S}^{(k)}$ is infeasible, and
$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$ can be reduced by
$n_{1}\rightarrow n_{2},\ldots,n_{L}\rightarrow n_{1}$, these users compose a
_k-exchange union_.
###### Definition 3.
For grouping strategy $\bm{x}$, if the value of $\xi$ in problem
$\mathcal{M}3$ can not be reduced by any _shift union_ or _exchange union_
with all the constraints in problem $\mathcal{M}3$ satisfied, grouping matrix
$\bm{x}$ is called _all-stable solution_.
To find the _shift union_ s and _exchange union_ s among users, we analyze the
rules that values of $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ and
$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$ change after
changing user grouping matrix $\bm{x}$. By dividing the expressions of
$\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ and
$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$, i.e.,
$(\ref{0016})$ and $(\ref{0019})$ in groups, we define two weighted
interference plus noise variables $\omega_{g}(\bm{x};\bm{q},\bm{\lambda})$ and
$\omega^{\prime}_{g}(\bm{x};\bm{q},\bm{\nu})$ as follows:
$\displaystyle\omega_{g}(\bm{x};\bm{q},\bm{\lambda})$ (31) $\displaystyle=$
$\displaystyle\sum\limits_{{j=1}}^{N}x_{gj}\lambda_{j}\left(\left({\sigma^{2}+\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}{\upsilon_{gmji}}}\right)^{\tfrac{1}{2}}\gamma_{j}^{\tfrac{1}{2}}-{{\sum\limits_{m=1}^{M}q_{mj}x_{gj}}{\vartheta_{gmj}}}\right)$
$\displaystyle\omega^{\prime}_{g}(\bm{x};\bm{q},\bm{\nu})$ (32)
$\displaystyle=$
$\displaystyle\sum\limits_{j=1}^{N}x_{gj}\nu_{j}\left(\left({\sigma^{2}+\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}{\upsilon_{gmji}}}\right)^{\tfrac{1}{2}}\gamma_{j}^{\tfrac{1}{2}}-{{\sum\limits_{m=1}^{M}q_{mj}x_{gj}{\vartheta_{gmj}}}}\right)$
Combining $(\ref{0016})$, $(\ref{0019})$, $(\ref{g001})$ and $(\ref{g002})$,
we have
$\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})=\sum\limits_{g=1}^{G}\omega_{g}(\bm{x};\bm{q},\bm{\lambda})$
and
$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})=\sum\limits_{g=1}^{G}\omega^{\prime}_{g}(\bm{x};\bm{q},\bm{\nu})$.
Next we investigate how user grouping strategy changing impacts the value of
$\omega_{g}(\bm{x};\bm{q},\bm{\lambda})$ and
$\omega^{\prime}_{g}(\bm{x};\bm{q},\bm{\nu})$.
For convenience, we assume that in grouping strategy $\bm{x}$, user $n$ is in
group $g_{n}$. Then we construct a directed graph
$G(\mathcal{N},\mathcal{E}^{(k)};\bm{x})$, where $\mathcal{N}$ is the set of
nodes composed of users and $\mathcal{E}^{(k)}$ is the set of edges existing
between two users in different groups. The adjacency matrix of graph
$G(\mathcal{N},\mathcal{E}^{(k)};\bm{x})$ is denoted by $\bm{a}^{(k)}$, and we
set that:
$a_{ij}^{(k)}=\left\\{\begin{array}[]{ll}\omega_{g_{j}}(x_{g_{j}i}=1,x_{g_{j}j}=0,\bm{x}_{-i,j}&;\bm{q}^{(k)},\bm{\lambda}^{(k)})-\omega_{g_{j}}(\bm{x};\bm{q}^{(k)},\bm{\lambda}^{(k)})\\\
&\text{if $g_{i}\neq g_{j}$, $\mathcal{S}^{(k)}$ is feasible}\\\
\omega^{\prime}_{g_{j}}(x_{g_{j}i}=1,x_{g_{j}j}=0,\bm{x}_{-i,j}&;\bm{q}^{(k)},\bm{\nu}^{(k)})-\omega^{\prime}_{g_{j}}(\bm{x};\bm{q}^{(k)},\bm{\nu}^{(k)})\\\
&\text{if $g_{i}\neq g_{j}$, $\mathcal{S}^{(k)}$ is infeasible}\\\
\infty,&\text{if $g_{i}=g_{j}$}\end{array}\right.$ (33)
where $\bm{x}_{-i,j}$ denotes the user grouping strategies of users except
users $i$ and $j$, thus $(x_{g_{j}i}=1,x_{g_{j}j}=0,\bm{x}_{-i,j})$ represents
that user $i$ is in group $g_{j}$, user $j$ is not in group $g_{j}$, and the
user grouping strategies of users except users $i$ and $j$ consistent with
$\bm{x}$. The relation between problem $\mathcal{M}3$ and graph
$G(\mathcal{N},\mathcal{E}^{(k)};\bm{x})$ can be indicated with the following
propositions.
###### Proposition 2.
For $L$ users numbered by $n_{1},n_{2},\ldots,n_{L}$ in different groups, if
problem $\mathcal{S}^{(k)}$ is feasible and
$\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ can be reduced by
$n_{1}\rightarrow n_{2},\ldots,n_{L}\rightarrow n_{1}$, these users can
compose a negative loop $n_{1}->n_{2}->\ldots->n_{L}->n_{1}$ in graph
$G(\mathcal{N},\mathcal{E}^{(k)};\bm{x})$.
###### Proof.
We assume that the user grouping matrix before and after $n_{1}\rightarrow
n_{2},\ldots,n_{L}\rightarrow n_{1}$ are $\bm{x}$ and $\bm{x}^{\prime}$. Then
the difference of $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ is
$\displaystyle\nabla_{\mathcal{L}}=$
$\displaystyle\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x}^{\prime})-\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$
(34) $\displaystyle=$
$\displaystyle\sum\limits_{n=1}^{N}\lambda_{n}^{(k)}\left(\left({\sigma^{2}+\sum\limits_{g=1}^{G}x^{\prime}_{gn}\sum\limits_{i=1}^{N}x^{\prime}_{gi}\sum\limits_{m=1}^{M}(q_{mi}^{(k)})^{2}{\upsilon^{(k)}_{gmni}}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}\right.$
$\displaystyle\left.-{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x_{gn}{\vartheta^{(k)}_{gmn}}}}\right)$
$\displaystyle-\sum\limits_{n=1}^{N}\lambda_{n}^{(k)}\left(\left({\sigma^{2}+\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}(q_{mi}^{(k)})^{2}{\upsilon^{(k)}_{gmni}}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}\right.$
$\displaystyle\left.-{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x_{gn}{\vartheta^{(k)}_{gmn}}}}\right)$
We assume that users $n_{1},n_{2},\ldots,n_{L}$ are in groups
$g_{1},g_{2},\ldots,g_{L}$, respectively, note that the value of
$\lambda_{n}^{(k)}\left(\left({\sigma^{2}+\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}(q_{mi}^{(k)})^{2}{\upsilon^{(k)}_{gmni}}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}\right.$
$-\left.{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x_{gn}{\vartheta^{(k)}_{gmn}}}}\right),~{}~{}n\notin\\{n_{1},n_{2},\ldots,n_{L}\\}$
will not change after $n_{1}\rightarrow n_{2},\ldots,n_{L}\rightarrow n_{1}$.
Then according to (34), we have:
$\displaystyle\nabla_{\mathcal{L}}=$
$\displaystyle\sum\limits_{l=1}^{L}\sum\limits_{n=1}^{N}x^{\prime}_{g_{l}n}\lambda_{n}^{(k)}\left(\left({\sigma^{2}+\sum\limits_{i=1}^{N}x^{\prime}_{g_{l}i}\sum\limits_{m=1}^{M}(q_{mi}^{(k)})^{2}{\upsilon^{(k)}_{gmni}}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}-\right.$
(35)
$\displaystyle\left.{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x_{gn}{\vartheta^{(k)}_{gmn}}}}\right)$
$\displaystyle-\sum\limits_{l=1}^{L}\sum\limits_{n=1}^{N}x_{g_{l}n}\lambda_{n}^{(k)}\left(\left({\sigma^{2}+\sum\limits_{i=1}^{N}x_{g_{l}i}\sum\limits_{m=1}^{M}(q_{mi}^{(k)})^{2}{\upsilon^{(k)}_{gmni}}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}-\right.$
$\displaystyle\left.{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x_{gn}{\vartheta^{(k)}_{gmn}}}}\right)$
$\displaystyle=$ $\displaystyle\sum\limits_{l=1}^{L}a_{lj}^{(k)}$
where $j=mod(l,L)+1$.
Then the proof of Proposition 2 is concluded.∎
###### Proposition 3.
For $L$ users numbered by $n_{1},n_{2},\ldots,n_{L}$ in different groups, if
problem $\mathcal{S}^{(k)}$ is infeasible, and
$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$ can be reduced by
$n_{1}\rightarrow n_{2},\ldots,n_{L}\rightarrow n_{1}$, these users can
compose a negative loop $n_{1}->n_{2}->\ldots->n_{L}->n_{1}$ in graph
$G(\mathcal{N},\mathcal{E}^{(k)};\bm{x})$.
###### Proof.
The proof is similar to Proposition 2.∎
According to Proposition 2 and Proposition 3, we can find the grouping
changing method to reduce the value of
$\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ or
$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$ by searching for
the negative loop with all users in different groups, we call them negative
differ-group loop. However, the number of users in each group will not change
after $n_{1}\rightarrow n_{2},\ldots,n_{L}\rightarrow n_{1}$. To find the
grouping changing method that can lead to arbitrary number of users in each
group and reduce the value of
$\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ or
$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$, we expand graph
$G(\mathcal{N},\mathcal{E}^{(k)};\bm{x})$ to
$G(\mathcal{N}^{e},\mathcal{E}^{(k)};\bm{x})$ by adding a virtual user to each
group. The virtual user added to group $g$ is numbered by $n_{g}^{v}$. We set
the achievable SINR of these virtual users to $0$, so these virtual users will
not be allocated any power.
###### Proposition 4.
If users $n_{1},n_{2},\ldots,n_{L-1},n_{L}$ compose a _shift union_ with
grouping strategy $\bm{x}$, users $n_{1},n_{2},\ldots,n_{L-1},n_{g_{L}}^{v}$
can compose an _exchange union_ with grouping strategy $\bm{x}$.
###### Proof.
Obviously, if grouping strategy $\bm{x}$ is changed to $\bm{x}^{\prime}$ after
$n_{1}\rightarrow n_{2},\ldots,n_{L-2}\rightarrow n_{L-1}$ and putting user
$n_{L-1}$ into the group of user $n_{L}$, it will also be changed to
$\bm{x}^{\prime}$ after $n_{1}\rightarrow n_{2},\ldots,n_{L-2}\rightarrow
n_{L-1},n_{L-1}\rightarrow n_{g_{L}}^{v}$. So the proof of Proposition 4 is
concluded.∎
###### Theorem 1.
For grouping strategy $\bm{x}$, if the value of $\xi$ in problem
$\mathcal{M}3$ can not be reduced by any negative differ-group loop in graph
$G(\mathcal{N}^{e},\mathcal{E}^{(k)};\bm{x})$ with all the constraints in
problem $\mathcal{M}3$ satisfied, grouping matrix $\bm{x}$ is called _all-
stable solution_.
###### Proof.
According to Proposition 2, Proposition 3 and Proposition 4, if there is a
_shift union_ or an _exchange union_ among all real users and virtual users,
there must be a negative differ-group loop in graph
$G(\mathcal{N}^{e},\mathcal{E}^{(k)};\bm{x})$. Therefore, if the value of
$\xi$ in problem $\mathcal{M}3$ can not be reduced by any negative differ-
group loop in graph $G(\mathcal{N}^{e},\mathcal{E}^{(k)};\bm{x})$ with all the
constraints in problem $\mathcal{M}3$ satisfied, the value of $\xi$ in problem
$\mathcal{M}3$ can not be reduced by any _shift union_ or _exchange union_
with all the constraints in problem $\mathcal{M}3$ satisfied, i.e., the
grouping matrix $\bm{x}$ is _all-stable solution_. ∎
Figure 2: Illustration of the directed graph with “shift union” and “exchange
union”.
In order to explain the concepts of _shift union_ and _exchange union_ more
clearly, an illustration of the directed graph composed of 8 nodes is shown in
Fig.2 with edges among users in different groups, where the real users and
virtual users are represented by solid circles and dotted circles,
respectively. The users are divided into three groups, and the users in the
same colour are grouped into the same group with initial user grouping
strategy. In this directed graph, two negative differ-group loops
$n_{1}->n_{3}->n_{5}->n_{1}$ and $n_{4}->n_{2}->n_{8}->n_{4}$ are found. Among
them, users $n_{1}$, $n_{3}$, $n_{5}$ can compose an _exchange union_ , and
users $n_{1}$, $n_{3}$, $n_{5}$ can compose a _shift union_. Then,
$\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ (if problem
$\mathcal{S}^{(k)}$ is infeasible) or
$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$ (if problem
$\mathcal{S}^{(k)}$ is infeasible) can be reduced by $n_{1}\rightarrow
n_{3},n_{3}\rightarrow n_{5},n_{5}\rightarrow n_{1}$ or $n_{4}\rightarrow
n_{2},n_{2}\rightarrow n_{8},n_{8}\rightarrow n_{4}$. It is worth noting that
the initial user grouping strategy is an _all-stable solution_ , if there are
no negative differ-group loop can be found in the initial directed graph.
Input: Relaxed Master Problem $\mathcal{M}3$, Grouping Matrix $\bm{x}^{(k)}$,
1
Output: Grouping Matrix $\bm{x}^{(k+1)}$
2 Create set of infeasible loops $\mathcal{A}=\varnothing$;
3repeat
4 Find $k_{max}=arg\max\limits_{i\leq k,\mathcal{S}^{(i)}\text{is
infeasible.}}~{}~{}\mathcal{L}^{\prime}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k)})$;
5
$maxL=\mathcal{L}^{\prime}(\bm{q}^{(k_{max})},\bm{\lambda}^{(k_{max})},\bm{x}^{(k)})$;
6 if _$maxL >0$._ then
7 Create graph
$G(\mathcal{N}^{e},\mathcal{E}^{(k_{max})};\bm{x}^{(k_{max})})$;
8 Search for negative differ-group loop $\bm{L}^{(k_{max})}\notin\mathcal{A}$
in graph $G(\mathcal{N}^{e},\mathcal{E}^{(k)};\bm{x}^{(k)})$;
9 Change grouping matrix $\bm{x}^{(k)}$ to $\bm{x}^{(k+1)}$ according to loop
$\bm{L}^{(k)}$ based on Proposition 2-3.
10 for _$i=1\textrm{ to }k-1$_ do
11
12 if _$\mathcal{S}^{(i)}$ is infeasible._ then
13
14 if _$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x}^{(k+1)})
>maxL$_ then
15
16 Add loop $\bm{L}^{(k_{max})}$ to $\mathcal{A}$; Jump to step 6;
17 end if
18
19 end if
20
21 end for
22 $\bm{x}^{(k)}$ = $\bm{x}^{(k+1)}$;$\mathcal{A}=\varnothing$;
23 end if
24
25until _$maxL <0$_;
26repeat
27
28 $\mathcal{A}=\varnothing$;
29 Find $k_{max}=arg\max\limits_{i\leq k,\mathcal{S}^{(i)}\text{is
feasible.}}~{}~{}\mathcal{L}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k)})$;
30 Create graph $G(\mathcal{N}^{e},\mathcal{E}^{(k_{max})};\bm{x}^{(k)})$;
31 Search for negative differ-group loop $\bm{L}^{(k_{max})}\notin\mathcal{A}$
in graph $G(\mathcal{N}^{e},\mathcal{E}^{(k_{max})};\bm{x}^{(k)})$;
32 Change grouping matrix $\bm{x}^{(k)}$ to $\bm{x}^{(k+1)}$ according to loop
$\bm{L}^{(k)}$ based on Proposition 2-3.
33 for _$i=1\textrm{ to }k$_ do
34
35 if _$\mathcal{S}^{(i)}$ is feasible._ then
36
37 if _$\mathcal{L}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k+1)})
>\mathcal{L}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k_{max})})$_ then
38
39 Add loop $\bm{L}^{(k_{max})}$ to $\mathcal{A}$; Jump to step 22;
40 end if
41
42 else
43
44 if _$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x}^{(k+1)}) >0$_
then
45
46 Add loop $\bm{L}^{(k_{max})}$ to $\mathcal{A}$; Jump to step 22;
47 end if
48
49 end if
50
51 end for
52
53 $\bm{x}^{(k)}=\bm{x}^{(k+1)}$;
54until _Cannot find an appropriate negative differ-group loop_ ;
Return $\bm{x}^{(k+1)}$.
Algorithm 2 Graph Theory Based Algorithm to Solve Master Problem (GBMA)
Graph theory based algorithm to solve relaxed master problem $\mathcal{M}3$ is
shown in Algorithm 2. In this algorithm, we first search for a new user
grouping matrix which satisfies all the infeasi-constraints in problem
$\mathcal{M}3$ in steps 2-17. In each iteration of steps 3-16, we change the
user grouping matrix to reduce the value of $\max\limits_{i\leq
k,\mathcal{S}^{(i)}\text{is
infeasible.}}\mathcal{L}^{\prime}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k)})$,
where $\mathcal{A}$ is the set of the loops according to which we can not
reduce the value of $\max\limits_{i\leq k,\mathcal{S}^{(i)}\text{is
infeasible.}}\mathcal{L}^{\prime}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k)})$.
Then we search for the solution of problem $\mathcal{M}3$ in steps 18-36. In
each iteration of steps 19-35, we change the user grouping matrix to reduce
the value of $\max\limits_{i\leq k,\mathcal{S}^{(i)}\text{is
feasible.}}\mathcal{L}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k)})$, where
$\mathcal{A}$ is the set of the loops according to which we can not reduce the
value of $\max\limits_{i\leq k,\mathcal{S}^{(i)}\text{is
feasible.}}\mathcal{L}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k)})$.
###### Corollary 1.
Algorithm 2 can converge to _all-stable solution_ in finite iterations.
###### Proof.
The number of nodes in the graph is limited by the numbers of users and
groups, so the number of the negative differ-group loops in the graph is
infinite. In addition, the optimal value of problem $\mathcal{M}3$ in each
iteration of Algorithm 2 will descend and the feasibility of the outputted
user grouping matrix for problem $\mathcal{M}3$ in each iteration can be
guaranteed by step 26. Therefore, Algorithm 2 will stop after finite
iterations and output a solution without negative differ-group loop, i.e.,
_all-stable solution_. ∎
Input: Group $G(\mathcal{N}^{e},\mathcal{E}^{(k_{max})};\bm{x}^{(k)})$, Set of
infeasible loops $\mathcal{A}$, Adjacency matrix $\bm{a}^{(k)}$
Output: _Negative differ-group loop_ $\bm{L}^{(k)}$
1 Create super node.
2for _$j=1\textrm{ to }(G+N)$_ do
3 $w_{n}=0$, $\mathcal{T}_{n}=\varnothing$, $n\in\mathcal{V}$;
4 end for
5
6repeat
7 for _$i=1\textrm{ to }(G+N)$_ do
8 for _$j=1\textrm{ to }(G+N)$_ do
9 if _$(w_{j} >w_{i}+a^{(k)}_{ij})\&(a^{(k)}_{kj}\neq\infty,\forall
k\in\mathcal{T}_{i}\setminus\\{j\\})$_ then
10
11 if _There is a loop $\bm{L}$ in $(\mathcal{T}_{i}\cup\\{i\\})$ and
$\bm{L}\notin\mathcal{A}$_ then
12
13 $\mathcal{T}_{j}=\mathcal{T}_{i}\cup\\{i\\}$, $w_{j}=w_{i}+a^{(k)}_{ij}$
14 end if
15
16 end if
17 if _$(w_{j} >w_{i}+a^{(k)}_{ij})\&(\exists
a^{(k)}_{kj}=\infty,k\in\mathcal{T}_{i}\setminus\\{j\\})$_ then
18 Find the shortest path $\mathcal{T}^{\prime}_{i}$ from the super node to
user $i$ with $a^{(k)}_{kj}\neq\infty,\forall
k\in\mathcal{T}^{\prime}_{i}\setminus\\{j\\}$, assume the distance of path
$\mathcal{T}^{\prime}_{i}$ is $m^{\prime}_{i}$;
19 if _$w_{j} >m^{\prime}_{i}+a^{(k)}_{ij}$_ then
20 if _There is a loop $\bm{L}$ in $(\mathcal{T}^{\prime}_{i}\cup\\{i\\})$
and $\bm{L}\notin\mathcal{A}$_ then
21 $\mathcal{T}_{j}=\mathcal{T}^{\prime}_{i}\cup\\{i\\}$,
$w_{j}=m^{\prime}_{i}+a^{(k)}_{ij}$
22 end if
23
24 end if
25
26 end if
27 if _$\|\mathcal{T}_{j}\| >G$_ then
28 Find the _negative differ-group loop_ $\bm{L}$ in $\mathcal{T}_{j}$; return
$\bm{L}$ and break;
29 end if
30
31 end for
32
33 end for
34
35until _$\mathcal{T}_{n}$ , $n\in\mathcal{V}$ do not change_;
Algorithm 3 Extended Bellman-Ford Algorithm to Search for Negative Differ-
group Loops in GBMA (EBSA)
To find these negative differ-group loops, we extend the Bellman-Ford
algorithm to Algorithm 3 [35] [36] [37], where the negative differ-group loops
in the set of infeasible loops $\mathcal{A}$ are avoided to be outputted. In
this algorithm, we first create a super node. The distance from the super node
to node $n$ is set to $w_{n}=0$, and the path from super node to node $n$,
$\mathcal{T}_{n}$, $n\in\mathcal{V}$, is initialized in steps 2-4. Then these
paths are constantly relaxed in steps 5-26. In each step of relaxing, the
users in the same group are avoided to be added to the same path from super
node to any node as step 8 and step 13 show. And the loops in $\mathcal{A}$
are avoided to form in any path $\mathcal{T}_{n}$ as step 9 and step 16 show.
Therefore, according to the principle of Bellman-Ford algorithm, if the path
from super node to any node is longer than the number of groups, there must be
a negative differ-group loop in this path [38].
To obtain an appropriate solution of problem $\mathcal{P}1$ with polynomial
time, we also design a greedy fast algorithm for the solving of problem
$\mathcal{M}3$ as shown in Algorithm 4. This searching algorithm starts from
the minimal edge in the graph. Then we iteratively search for the minimal
output edge until there exists no next output edge. In this process, the set
of loops that have been rejected in steps 5-7 of Algorithm 4 is avoided to be
outputted.
Input: Group $G(\mathcal{N}^{e},\mathcal{E}^{(k_{max})};\bm{x}^{(k)})$, Set of
infeasible loops $\mathcal{A}$, Adjacency matrix $\bm{a}^{(k)}$
Output: _Negative differ-group loop_ $\bm{L}^{(k)}$
1
2for _$t=1\textrm{ to }(N+G)$_ do
3 $\mathcal{T}=\varnothing$;
4 Find the minimal edge
$a^{(k)}_{ij}=\min\limits\\{a^{(k)}_{ij}|i,j\in\mathcal{N}^{e}\\}$;
5 $\mathcal{T}=\mathcal{T}\cup\\{i\\}\cup\\{j\\}$, $m_{t}=a^{(k)}_{ij}$;
6 if _$m_{t}+a_{ji}^{(k)} <0$&$\mathcal{T}\notin\mathcal{A}$_ then
7 $\bm{L}^{(k)}\leftarrow\mathcal{T}$; return $\bm{L}^{(k)}$.
8 end if
9
10 $a^{(k)}_{ij}=\infty$, $i=j$; for _$l=3\textrm{ to }G$_ do
11 Find the minimal output edge of node $i$ :
$a^{(k)}_{ij}=\min\limits\\{a^{(k)}_{ij}|j\notin\mathcal{T}\\}$;
12 $m_{t}=m_{t}+a^{(k)}_{ij}$, $\mathcal{T}=\mathcal{T}\cup\\{j\\}$;
13 if _$m_{t}+a_{ji}^{(k)} <0$&$\mathcal{T}\notin\mathcal{A}$_ then
14 $\bm{L}^{(k)}\leftarrow\mathcal{T}$; return $\bm{L}^{(k)}$.
15 end if
16 $i=j$;
17 end for
18
19 end for
20
Algorithm 4 Greedy Fast Algorithm to Search for Negative Differ-group Loop in
GBMA (GFSA)
_Computational Complexity Analysis:_ In GFSA, complexity of steps $10$-$15$ is
$O\big{(}G+N\big{)}$, and complexity of steps $2$-$8$ is
$O\big{(}(G+N)^{2}\big{)}$. Hence, computational complexity of GFSA is
$O\big{(}(G+N)^{3}\big{)}$. Assume that GFSA is repeated $C$ times in
Algorithm 2. Then apparently computational complexity of GBMA is
$O\big{(}C(G+N)^{3}\big{)}$. We solve power allocation problem
${\mathcal{S}^{(k)}}$ by the interior point method, and its computational
complexity is $O\big{(}N(NM)^{3}\big{)}$[34]. Then computational complexity of
the proposed fast greedy algorithm is
$O\big{(}max(N^{2}(NM)^{3},CN(G+N)^{3})\big{)}$.
## V Performance Evaluation
In this section, we evaluate the performance of the proposed two algorithms in
cell-free massive MIMO systems in terms of transmit power, interference from
the desired signals of the other users in the same group, etc. In the
simulations, APs and users are randomly placed in a 3km$\times$3km rectangular
area. We set large-scale channel gain to $128.1+37.6log_{10}$ ($d_{n}$ [km])
dB. The small-scale fading follows an i.i.d. Gaussian distribution. Some
default values in the simulations are shown in Table II [39].
TABLE II: Main Notations Parameter | Value
---|---
Number of users(N) | 200
Number of groups(G) | 5
Number of APs(M) | 200
Bandwidth(B) | 20 MHz
Noise power spectral density($N_{0}$) | -174 dBm/Hz
Power of pilot signal ($\rho_{r}$) | 200 mW
Length of pilot sequences ($\tau$) | $2\lceil N/G\rceil$
Target data rate | 0.1-1.5 Mbps
Figure 3: Performance comparison of different user grouping algorithms: a.
Average number of iterations with different numbers of users and different
$\delta$; b. Convergence of lower and upper bounds with the proposed fast
greedy user grouping algorithm(200 users and 200 APs in total).
.
### V-A Convergence Performance
To evaluate the convergence performance of the proposed fast greedy algorithm,
in Fig. 3, we show the average number of iterations (denoted by $T_{iter}$) of
steps 7-18 in Algorithm 1 with different numbers of users and different
$\delta$. We can see that $T_{iter}$ increases as number of users increases
and $\delta$ reduces. In addition, $T_{iter}<10$ even when $N=240$ and
$\delta=10^{-9}$. In Fig. 3, we show the process that the gap between the
upper bound and lower bound of problem $\mathcal{P}2$ reduces. The results
show that the proposed fast greedy algorithm converges rapidly, which
illustrate the practicability of the proposed fast greedy user grouping
algorithm. As shown in Fig. 3, the gap between the upper bound and the lower
bound shrinks as the number of iterations increases. According to the
principle of benders decomposition, the optimal user grouping and power
allocation strategy can be found if this gap $\delta$ is 0. The number of
users is finite, hence the grouping strategy profile is finite. Every time we
change the user grouping strategy, the total transmit power will not increase,
which means that a grouping strategy profile will not be selected repeatedly.
Thus we can obtain the optimal user grouping and power allocation strategy
with a small enough $\delta$ in Algorithm 1.
### V-B Impacts of pilot signal
As mentioned in section II-A, channel estimation is carried out after user
grouping in cell-free massive MIMO systems. Since the accuracy of channel
estimation will affect the performance of cell-free massive MIMO with
beamforming, we investigate the impacts of pilot signal on $\alpha$ in this
subsection. $\alpha$ is the variance of MMSE estimate of channel fading ${h}$
as stated in (2). In Fig. 4, we change the power of pilot signal $\rho_{r}$
and the length of pilot sequences $\tau_{g}$ to show its influence on $\alpha$
under the proposed user grouping algorithm, where $U_{g}$ means the of number
of users in group $g$. Considering the case of pilot reuse to observe the
effects of non-orthogonal pilots, the length of pilot signal will be less than
the number of users, i.e., $\tau_{g}<\sum_{i=1}^{N}x_{gi}$ [40]. To
investigate the effect of pilot signal with $\tau_{g}<\sum_{i=1}^{N}x_{gi}$,
in this figure, the range of $\tau_{g}$ is set to $\tfrac{1}{2}U_{g}$,
$\tfrac{1}{3}U_{g}$ and $\tfrac{1}{4}U_{g}$. We can see that in Fig. 4, as the
increase of $\rho_{r}$ and $\tau_{g}$, the mean value of $\alpha$ will also
increase, which agrees with (3). Then the channel estimation error is reduced
as stated in (4). That is to say, by adding the length of pilot sequences or
the power of the pilot signal, the accuracy of channel estimation can be
increased. By user grouping, the number of users served by each time-slot can
be reduced. Therefore, the length of pilot sequences to maintain the accuracy
of channel estimation can be reduced by user grouping.
Figure 4: Influence of $\rho_{r}$ and $\tau$ on $\alpha_{mn}$.
Figure 5: Performance comparison of different user grouping algorithms: a.
Total transmit power vs. number of APs; b. Total transmit power vs. Number of
APs; c. Total transmit power vs. Range of preset data rates (Mbps)
.
### V-C Performance comparison
In this subsection, we compare four proposed user grouping algorithms (named
“MRT-GPGA-EBSA”, “MRT-GPGA-GFSA”, “ZF-GPGA-EBSA” and “ZF-GPGA-GFSA”,
respectively) with the basic random user grouping algorithm(BCGA) and Gale-
Shapley algorithm(Gale-S) [41], where each user prefers the group where
interference is less and each group prefers to reject the access requests of
the users with the highest requirements on power. The number of users in each
group with Gale-S is equal. To evaluate interference that users suffer, we
define a mean-interference variable $I$ as follows:
$\displaystyle I=$
$\displaystyle\tfrac{1}{N}\sum_{n=1}^{N}\bigg{(}{\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}p_{mi}\beta_{mn}\alpha_{gmi}}\bigg{)}$
(36)
where
$\bigg{(}{\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}p_{mi}\beta_{mn}\alpha_{gmi}}\bigg{)}$
is the right of denominator of $\mathrm{SINR}_{n}$ in (1).
We first vary the number of users and APs to show mean-interference variable
$I$ with four different user grouping algorithms in Fig. 6 and Fig. 6,
respectively. The number of users increases from 150 to 240 with 200 APs and
five groups in total in Fig. 6, and the number of APs increases from 150 to
240 with 200 users and five groups in total in Fig. 6. We can see that mean-
interference increases with the increase of users and the reduction of APs.
The reason is that as the number of groups is given, the number of users
sharing the same time-slot will increase with the increase of users. Then the
value of
${\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}p_{mi}\beta_{mn}\alpha_{gmi}}$
in (36) will increase. In addition, as the number of APs reduces, to maintain
enough SINR in (1), the power that each AP allocates to a user will increase,
then more interference will appear according to (36). Moreover, the mean-
interference of proposed algorithms is less than the reference two. The main
reason is that, in this paper, power allocation and user grouping are jointly
optimized considering QoS constraints. To reduce the total transmit power and
satisfy QoS requirements of different users as problem $\mathcal{P}1$ shows,
the value of
${\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}p_{mi}\beta_{mn}\alpha_{gmi}}$
in (8b) is reduced. Although interference is considered in the Gale-S
strategy, the mean-interference of this strategy is high. The reason is that,
as the users with lower target data rates need lower transmit power in
general, the users with lower target data rates may be grouped into one group
with less interference and the users with higher target data rates may be
grouped into the other group. The interference among the desired signals of
users in the group with higher target data rates is very serious. Besides, it
should be noted that, due to the inherent ability of ZF beamforming to null
interference among the desired signals of users in each group, ZF beamforming
is not shown in this figure.
Figure 6: Performance comparison of different user grouping algorithms: a.
Mean-interference vs. number of users; b. Mean-interference vs. Number of APs.
It is clear that interference has great impact on power allocation. In Fig. 5
and Fig. 5, we illustrate the total transmit power of six different user
grouping algorithms with varied numbers of users and APs, respectively. The
results show that all the six curves in Fig. 5 rise as the number of users
increases and all the six curves in Fig. 5 decrease as the number of APs
increases. That is because that, as shown in Fig. 6 and Fig. 6, the mean-
interference increases with the increase of users and the reduction of APs.
Then more power is needed to maintain enough SINR. In addition, the total
transmit power of the proposed user grouping algorithms is significantly lower
than the reference two, which agrees with the results in Fig. 6 and Fig. 6.
Furthermore, with the proposed user grouping strategies, the transmit power
consumption of ZF beamforming is lower than that of MRT beamforming. This
result derives from the inherent ability of ZF beamforming to null
interference among the desired signals of different users.
Figure 7: Performance comparison under given total transmit power: a. Average
data rate(Mbps) vs. Length of coherence interval(M=250, N=240, $P_{t}$=10W);
b. Number of groups vs. Length of coherence interval(M=250, N=240,
$P_{t}$=10W). Figure 8: Distribution of users and APs in 3km $\times$ 3km
rectangular area(50 users, 50 APs and 5 groups).
Figure 9: Number of users in each group and in each range of QoS
requirements(50 Users, 50 APs and 5 Groups).
In Fig. 5, we show the total transmit power with different ranges of target
data rate. The results show that the total transmit power increases with
target data rate, and the proposed algorithms outperform the reference
algorithm. The reason is that, target $\mathrm{SINR}$ of each user, i.e.,
$\gamma_{n}$, are explicit in constraints (8b) of problem $\mathcal{P}1$.
Furthermore, in Fig. 5, the total transmit power of the downlink cell-free
massive MIMO system without user grouping (named “Non-grouping”), is compared
with that of the proposed system with user grouping. We can see that the
column without grouping is higher than the other columns. This result shows
that, after user grouping, the minimal transmit power required for satisfying
all users’ QoS requirements is reduced. An important reason is that, after
user grouping, the length of pilot sequences, i.e., $\tau_{g}$, can be reduced
without reducing the accuracy of channel estimation as shown in Fig. 4. Then
the number of symbols for data transmission within each coherent interval,
i.e., $\tau_{c}-\sum_{g=1}^{G}\tau_{g}$, can be increased.
In Fig. 7, under given total transmit power, the average data rate is
evaluated with different lengths of coherence interval and group numbers. In
Fig. 7, we vary the length of coherence interval to show the average data rate
with different beamforming methods. As the length of coherence interval
increases, the symbols for data transmission will increase, and the length of
pilot sequence is unchanged. Therefore, the average data rate will increase.
Furthermore, the average data rate of users with ZF beamforming is higher than
that of users with conjugate beamforming, the reason is that the interference
among the desired signals of different users can be cancelled by ZF
beamforming. In order to further demonstrate the advantages of user grouping
in cell-free massive MIMO systems, in Fig. 7, we show the average data rate
vary with the number of groups. We can see that the average data rate can be
improved by user grouping. In general, by beamforming among the antennas of
many APs, more gains from spatial diversity can be obtained. After user
grouping, the number of users sharing the same time-frequency resource will be
reduced, and the utilization efficiency of spatial diversity is reduced.
However, the pilot overheads will be greatly reduced by user grouping as shown
in section V.B. There is a tradeoff between the utilization efficiency of
spatial diversity and the pilot overheads. Therefore, in Fig. 7, the average
data rate will increase from $G=1$ to $G=3$, and descend when the number of
groups is greater than three.
The number of users sharing the same time-slot in cell-free massive MIMO
systems is much larger than traditional communication systems where radio
resources of different users are usually orthogonal. In general, the users
with higher QoS requirements require more transmit power from APs to guarantee
a certain SINR. More transmit power will lead to more severe interference to
the desired signals of the other users in the same group. If the users with
high QoS requirements be assigned into the same group, the interference among
the signals of users in the same group will be too serious to be eliminated
and the power consumption will be unbearable. Therefore, to alleviate the
serious interference from the desired signals of the other users in the same
group, users with high QoS requirements should be avoided to be assigned into
the same group. In Fig. 8, we show the distribution of users and APs with
different user grouping algorithms, where users and APs are represented by
dots and triangles, respectively. The number of APs is 50. There are 50 users
which are assigned into 5 groups, and the dots in the same colour represent
the users in the same group. The size of each dot reflects its QoS requirement
as shown in the legend of Fig. 8. In addition, to analyze the distribution of
users and APs in Fig. 8 more intuitively, we also show the number of users in
each group and in each range of QoS requirements in Fig. 9. The results show
that there are 5 users whose target data rates are greater than $1.5$Mbps in
group $2$ with user grouping algorithm BCGA, and there are 5 users whose
target data rates are greater than $1.5$Mbps in group $4$ with user grouping
algorithm Gale-S, which will bring serious interference from the desired
signals of the other users in the same group to the users in this group. By
contrast, users with high target data rates are separated into different
groups in the proposed algorithms. This also explains why the proposed
algorithms outperform the reference algorithm in terms of transmit power,
interference from the desired signals of the other users in the same group as
shown in Fig. 5, Fig. 5, Fig. 6 and Fig. 6. Moreover, the number of users in
each group is no more than $16$ as Fig. 9 shows. In other words, length of
pilot sequence can be effectively reduced by user grouping.
## VI Conclusion
In this paper, we study the joint optimization problem of power allocation and
user grouping to minimize the total transmit power in cell-free massive MIMO
systems. We decompose this problem into a primal problem: power allocation
problem and a master problem: user grouping problem, where the power
allocation problem is proved to be convex. We analyze and relax these two
problems by GBD method. Then an algorithm based on GBD method is proposed to
solve the joint optimization problem by iteratively solving these two problems
and reduce the gap between the upper bound and lower bound of the original
problem. Moreover, the relaxed master user grouping problem is converted into
a problem of searching for some special negative loops in a graph composed of
users based on graph theory. An algorithm extended from Bellman-Ford algorithm
as well as a fast greedy suboptimal algorithm is proposed to search for these
negative loops.
Although the complexity of channel estimation and decoding can be reduced by
user grouping, there still remain some challenges in research on cell-free
massive MIMO as the number of users increases. For instance, each AP needs to
know the transmitted symbols of all users after user grouping, so the limited
fronthaul is still one of the bottleneck in cell-free massive MIMO systems as
the number of users increases. An effective method for fronthaul reduction is
to reducing the number of APs connected with each user (AP grouping). However,
the benefit of spatial diversity will also decrease after AP grouping. To
serve more users in cell-free massive MIMO systems with limited APs and
limited fronthaul, there still remain many works to do.
## References
* [1] M. Zhang, H. Lu, F. Wu, and C. W. Chen, “NOMA-Based Scalable Video Multicast in Mobile Networks With Statistical Channels,” _IEEE Trans. Mobile Comput._ , vol. 20, no. 6, pp. 2238–2253, 2021, 10.1109/TMC.2020.2977639.
* [2] J. Zhu, D. W. K. Ng, N. Wang, R. Schober, and V. K. Bhargava, “Analysis and Design of Secure Massive MIMO Systems in the Presence of Hardware Impairments,” _IEEE Trans. on Wireless Commun._ , vol. 16, no. 3, pp. 2001–2016, Mar. 2017.
* [3] J. Zhang, L. Dai, Z. He, S. Jin, and X. Li, “Performance Analysis of Mixed-ADC Massive MIMO Systems Over Rician Fading Channels,” _IEEE J. Sel. Areas Commun._ , vol. 35, no. 6, pp. 1327–1338, June 2017.
* [4] H. Q. Ngo, A. Ashikhmin, H. Yang, E. G. Larsson, and T. L. Marzetta, “Cell-Free Massive MIMO: Uniformly great service for everyone,” _IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC_ , vol. 2015-Augus, pp. 201–205, 2015.
* [5] E. Björnson, L. Sanguinetti, J. Hoydis, and M. Debbah, “Optimal Design of Energy-Efficient Multi-User MIMO Systems: Is Massive MIMO the Answer?” _IEEE Trans. on Wireless Commun._ , vol. 14, no. 6, pp. 3059–3075, June 2015.
* [6] H. Q. Ngo, A. Ashikhmin, H. Yang, E. G. Larsson, and T. L. Marzetta, “Cell-free Massive MIMO Versus Small Cells,” _IEEE Trans. Wireless Commun._ , vol. 16, no. 3, pp. 1834–1850, 2017.
* [7] E. Nayebi, A. Ashikhmin, T. L. Marzetta, H. Yang, and B. D. Rao, “Precoding and Power Optimization in Cell-Free Massive MIMO Systems,” _IEEE Trans. Wireless Commun._ , vol. 16, no. 7, pp. 4445–4459, 2017.
* [8] J. Zhang, Y. Wei, E. Bjornson, Y. Han, and S. Jin, “Performance Analysis and Power Control of Cell-Free Massive MIMO Systems with Hardware Impairments,” _IEEE Access_ , vol. 6, pp. 55 302–55 314, 2018.
* [9] M. Bashar, K. Cumanan, A. G. Burr, M. Debbah, and H. Q. Ngo, “On the uplink Max-min SINR of Cell-free Massive MIMO Systems,” _IEEE Trans. on Wireless Commun._ , vol. 18, no. 4, pp. 2021–2036, 2019.
* [10] H. Q. Ngo, L. Tran, T. Q. Duong, M. Matthaiou, and E. G. Larsson, “On the Total Energy Efficiency of Cell-Free Massive MIMO,” _IEEE Trans. Green Commun. Netw._ , vol. 2, no. 1, pp. 25–39, Mar. 2018.
* [11] T. H. Nguyen, T. K. Nguyen, H. D. Han, and V. D. Nguyen, “Optimal Power Control and Load Balancing for Uplink Cell-Free Multi-User Massive MIMO,” _IEEE Access_ , vol. 6, pp. 14 462–14 473, 2018.
* [12] M. Bashar, K. Cumanan, A. G. Burr, H. Q. Ngo, and M. Debbah, “Cell-Free Massive MIMO with Limited Backhaul,” in _2018 IEEE International Conference on Communications (ICC)_ , May 2018, pp. 1–7.
* [13] G. Femenias and F. Riera-Palou, “Cell-Free Millimeter-Wave Massive MIMO Systems with Limited Fronthaul Capacity,” _IEEE Access_ , vol. 7, pp. 44 596–44 612, 2019.
* [14] J. C. Chen, “Low-PAPR Precoding Design for Massive Multiuser MIMO Systems via Riemannian Manifold Optimization,” _IEEE Communications Letters_ , vol. 21, no. 4, pp. 945–948, 2017.
* [15] L. Lu, G. Y. Li, A. L. Swindlehurst, A. Ashikhmin, and R. Zhang, “An Overview of Massive MIMO: Benefits and Challenges,” _IEEE Journal on Selected Topics in Signal Processing_ , vol. 8, no. 5, pp. 742–758, 2014.
* [16] Z. Chen and E. Bjornson, “Channel Hardening and Favorable Propagation in Cell-free Massive MIMO with Stochastic Geometry,” _IEEE Trans. Commun._ , vol. 66, no. 11, pp. 5205–5219, 2018.
* [17] Y. Li and G. A. A. Baduge, “NOMA-Aided Cell-Free Massive MIMO Systems,” _IEEE Wireless Communications Letters_ , vol. 1, no. 2, pp. 2–5, 2018.
* [18] M. Attarifar, A. Abbasfar, and A. Lozano, “Modified Conjugate Beamforming for Cell-Free Massive MIMO,” _IEEE Wireless Communications Letters_ , vol. 8, no. 2, pp. 616–619, Apr. 2019.
* [19] Y. Zhang, M. Zhou, X. Qiao, H. Cao, and L. Yang, “On the Performance of Cell-Free Massive MIMO With Low-Resolution ADCs,” _IEEE Access_ , vol. 7, pp. 117 968–117 977, 2019.
* [20] X. Zhang, D. Guo, K. An, Z. Ding, and B. Zhang, “Secrecy Analysis and Active Pilot Spoofing Attack Detection for Multigroup Multicasting Cell-Free Massive MIMO Systems,” _IEEE Access_ , vol. 7, pp. 57 332–57 340, 2019.
* [21] G. Femenias, N. Lassoued, and F. Riera-Palou, “Access Point Switch ON/OFF Strategies for Green Cell-Free Massive MIMO Networking,” _IEEE Access_ , vol. 8, pp. 21 788–21 803, 2020.
* [22] E. Nayebi, A. Ashikhmin, T. L. Marzetta, and H. Yang, “Cell-Free Massive MIMO systems,” _Conference Record - Asilomar Conference on Signals, Systems and Computers_ , vol. 2016-Febru, pp. 695–699, 2016.
* [23] A. Ibrahim, T. M. N. Ngatched, and O. Dobre, “Using Bender’s Decomposition for Optimal Power Control and Routing in Multihop D2D Cellular Systems,” _IEEE Trans. Wireless Commun._ , pp. 1–1, 2019.
* [24] J. Krolikowski, A. Giovanidis, and M. Di Renzo, “A Decomposition Framework for Optimal Edge-Cache Leasing,” _IEEE J. Sel. Areas Commun._ , vol. 36, no. 6, pp. 1345–1359, June 2018.
* [25] L. Xiang, D. W. K. Ng, R. Schober, and V. W. S. Wong, “Secure Video Streaming in Heterogeneous Small Cell Networks With Untrusted Cache Helpers,” _IEEE Trans. Wireless Commun._ , vol. 17, no. 4, pp. 2645–2661, Apr. 2018.
* [26] H. Zhang, S. J. Moura, Z. Hu, W. Qi, and Y. Song, “Joint PEV Charging Network and Distributed PV Generation Planning Based on Accelerated Generalized Benders Decomposition,” _IEEE Trans. Transp. Electrification_ , vol. 4, no. 3, pp. 789–803, Sep. 2018.
* [27] A. Cherukuri, E. Mallada, S. Low, and J. Cortés, “The Role of Convexity in Saddle-Point Dynamics: Lyapunov Function and Robustness,” _IEEE Trans. Autom. Control_ , vol. 63, no. 8, pp. 2449–2464, Aug. 2018.
* [28] J. Du, F. R. Yu, X. Chu, J. Feng, and G. Lu, “Computation Offloading and Resource Allocation in Vehicular Networks Based on Dual-Side Cost Minimization,” _IEEE Trans. Veh. Technol._ , vol. 68, no. 2, pp. 1079–1092, Feb. 2019.
* [29] T. Abrão, S. Yang, L. D. H. Sampaio, P. J. E. Jeszensky, and L. Hanzo, “Achieving Maximum Effective Capacity in OFDMA Networks Operating Under Statistical Delay Guarantee,” _IEEE Access_ , vol. 5, pp. 14 333–14 346, 2017.
* [30] M. Zhu and S. Martínez, “An Approximate Dual Subgradient Algorithm for Multi-Agent Non-Convex Optimization,” _IEEE Trans. Autom. Control_ , vol. 58, no. 6, pp. 1534–1539, June 2013.
* [31] X. Wang, W. Xie, and R. Duan, “Semidefinite Programming Strong Converse Bounds for Classical Capacity,” _IEEE Trans. Inform. Theory_ , vol. 64, no. 1, pp. 640–653, Jane 2018.
* [32] A. M. Geoffrion, “Generalized Benders Decomposition,” _Journal of optimization theory and applications_ , vol. 10, no. 4, pp. 237–260, 1972.
* [33] L. Angeles, “Generalized Benders Decomposition, GBD,” _SpringerReference_ , vol. 10, no. 4, 2012.
* [34] S. Boyd and L. Vandenberghe, _Convex Optimization_. Cambridge university press, 2004.
* [35] F. Guo, H. Lu, X. Jiang, M. Zhang, J. Wu, and C. W. Chen, “QoS-aware User Grouping Strategy for Downlink Multi-Cell NOMA Systems,” _IEEE Trans. Wireless Commun._ , pp. 1–1, 2021, 10.1109/TWC.2021.3088487.
* [36] V. T. Chakaravarthy, F. Checconi, P. Murali, F. Petrini, and Y. Sabharwal, “Scalable Single Source Shortest Path Algorithms for Massively Parallel Systems,” _IEEE Trans. Parallel Distrib. Syst._ , vol. 28, no. 7, pp. 2031–2045, July 2017.
* [37] L. Maccari, L. Ghiro, A. Guerrieri, A. Montresor, and R. L. Cigno, “On the distributed computation of load centrality and its application to dv routing,” in _IEEE INFOCOM 2018 - IEEE Conference on Computer Communications_ , 2018, pp. 2582–2590.
* [38] F. Busato and N. Bombieri, “An Efficient Implementation of the Bellman-Ford Algorithm for Kepler GPU Architectures,” _IEEE Trans. Parallel Distrib. Syst._ , vol. 27, no. 8, pp. 2222–2233, Aug. 2016.
* [39] X. Hu, C. Zhong, X. Chen, W. Xu, H. Lin, and Z. Zhang, “Cell-Free Massive MIMO Systems with Low Resolution ADCs,” _IEEE Trans. Commun._ , pp. 1–1, 2019.
* [40] A. Papazafeiropoulos, P. Kourtessis, M. Di Renzo, S. Chatzinotas, and J. M. Senior, “Performance Analysis of Cell-Free Massive MIMO Systems: A Stochastic Geometry Approach,” _IEEE Transactions on Vehicular Technology_ , vol. 69, no. 4, pp. 1–1, 2020.
* [41] Z. Zhao, M. Xu, Y. Li, and M. Peng, “A non-orthogonal multiple access-based multicast scheme in wireless content caching networks,” _IEEE Journal on Selected Areas in Communications_ , vol. 35, no. 12, pp. 2723–2735, 2017.
| arxiv-papers | 2021-07-27T08:02:09 | 2024-09-04T03:07:20.844245 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Fengqian Guo, Hancheng Lu and Zhuojia Gu",
"submitter": "Fengqian Guo",
"url": "https://arxiv.org/abs/2107.12650"
} |
2107.12653 | # Entangling Power of Symmetric Two-Qubit Quantum Gates
D. Morachis Galindo Departamento de Física, Centro de Nanociencias y
Nanotecnología, Universidad Nacional Autónoma de México, Apartado Postal 14,
22800 Ensenada, B.C., México Jesús A. Maytorena Departamento de Física,
Centro de Nanociencias y Nanotecnología, Universidad Nacional Autónoma de
México, Apartado Postal 14, 22800 Ensenada, B.C., México
###### Abstract
The capacity of a quantum gate to produce entangled states on a bipartite
system is quantified in terms of the entangling power. This quantity is
defined as the average of the linear entropy of entanglement of the states
produced after applying a quantum gate over the whole set of separable states.
Here we focus on symmetric two-qubit quantum gates, acting on the symmetric
two-qubit space, and calculate the entangling power in terms of the
appropriate local-invariant. A geometric description of the local equivalence
classes of gates is given in terms of the $\mathfrak{su}(3)$ Lie algebra root
vectors. These vectors define a primitive cell with hexagonal symmetry on a
plane, and through the Weyl group the minimum area on the plane containing the
whole set of locally equivalent quantum gates is identified. We give
conditions to determine when a given quantum gate produces maximally entangled
states from separable ones (perfect entanglers). We found that these gates
correspond to one fourth of the whole set of locally-distinct quantum gates.
The theory developed here is applicable to three-level systems in general,
where the non-locality of a quantum gate is related to its capacity to perform
non-rigid transformations on the Majorana constellation of a state. The
results are illustrated by an anisotropic Heisenberg model, the Lipkin-
Meshkov-Glick model, and two coupled quantized oscillators with cross-Kerr
interaction.
Geometric phase, Uhlmann, Topological, Mixed States, Spin-j Particle.
UhlmannJ dmorachisgalindo February 2021
## I Introduction
Entanglement is a purely quantum mechanical phenomenon that is essential to
achieve universal quantum computation based on interacting qubits
systemsAudrescht (2007). Quantum logic gates are the building blocks to
perform quantum algorithms, where the generation of entangled states from a
separable set of states is mandatory to achieve the desired resultsHorodecki
_et al._ (2009).
Most of the proposed quantum computer architectures are based on multi-qubit
processors. Nevertheless, there are also proposals that use higher dimensional
systems called qudits, which have the advantage of reducing the number of
physical entities required to perform calculationsMuthukrishnan and Stroud
(2000). Among these are three-level systems, called qutrits, which are the
smallest systems that may exhibit purely quantum correlations such as
contextualityJerger _et al._ (2016), and they have been used to construct
three-level quantum gatesDogra _et al._ (2018); Randall _et al._ (2018).
Qutrits may be emulated by a two-qubit system symmetric under particle
exchange. This allows us to think of many three-level transformations in terms
of operations on the symmetric two-qubit symmetric space.
Within the Majorana representation Majorana (1932); Devi _et al._ (2012),
symmetric two-qubit states appear as two points (“the stars”) on the unit
sphere. It can be shown that the distance between the two stars maps
bijectively to the concurrenceLiu and Fu (2016). States with maximally
separated stars correspond to Bell states, while states with stars at the same
position are separable. This allows to think of any transformation between
this kind of states as rigid or non-rigid motions of the associated Majorana
constellation, where the latter (former) does (does not) change the
entanglement of states. Whenever there is no place for confusion, we will
refer to a two-qubit symmetric state (space) as symmetric state (space) only.
Since many transformations on symmetric (three-level) spaces involve changing
the entanglement (distance between the Majorana stars), it is important to
quantify the capacity of quantum gates to generate it. Such a quantity is
called the entangling powerZanardi _et al._ (2000). It is defined as the
average linear entropy of the states produced by a quantum gate $\hat{V}$
acting on the manifold of all separable states. For general two-qubit gates
(TQQGs) the entangling power can be compactly written in terms of a two-qubit
gate local invariantBalakrishnan and Sankaranarayanan (2010) and sets values
to classify TQQGs as perfect entanglersRezakhani (2004); Balakrishnan and
Sankaranarayanan (2010), that is to say, a quantum gate that at least produces
a Bell state out of a separable state. Nevertheless, these expressions do not
quantify the entangling power of gates acting irreducibly on the symmetric
subspace, called symmetric quantum gates (SQGs), because they involve a
contribution from separable non-symmetric states. Here we will derive the
appropriate expression of the entangling power for SQGs and find an onset
value above which they can be classified as perfect entanglers.
As noted by Zhang et al.Zhang _et al._ (2003), distinct TQQGs can be put
together into sets whose elements differ by local transformations, called
local equivalence classes (LECs). By group theoretical methods, the authors
were able to represent all LECs of TQQGs classes on a tetrahedron, and showed
that half of its volume is occupied by perfect entanglers. Motivated by
Reference Zhang _et al._ , 2003, we develop a geometric description of the
LECs of symmetric gates. We found that these are characterized by a periodic
set of points on a plane, displaying hexagonal symmetry with lattice vectors
determined by the $\mathfrak{su}(3)$ algebra root vectors. This allows us to
identify a minimum extension where all inequivalent LECs of SQGs are located,
known as the Weyl chamber, and to show that one fourth of it is occupied by
perfect entanglers. This geometric approach as well as the entangling power
concept are relevant to study operations in general three-level systems.
This paper is organized as follows. In sections II and III we present brief
descriptions of the Majorana representation and of the Cartan decomposition of
TQQGs and how it is related to SQGs, respectively. In section IV the
appropriate local-invariant for SQGs is defined. Section V is devoted to
analyse the entangling power and use it to classify SQGs as perfect
entanglers. In section VI the developed formalism is applied to some example
models involving two interacting spinsAbliz _et al._ (2006), the three-level
Lipkin-Meshkov-Glick model from nuclear physicsLipkin _et al._ (1965), and
two coupled quantized oscillators through the cross-Kerr effect of quantum
opticsBhattacharya and Shi (2013). Section VII is devoted to conclusions.
Appendix A includes the derivation of the entangling power formula while
appendix B contains a theorem which allows to classify SQGs as perfect
entanglers.
## II Majorana stellar representation
The Majorana representation is a geometric depiction of quantum states
contained in a finite Hilbert space, which can give insight into their
entangling propertiesLiu and Fu (2016). The idea behind its construction is to
obtain a complex polynomial out of the probability amplitudes that define a
state for some fixed basis. The roots of such a polynomial can be represented
by points in the Argand diagram, and mapped into a sphere by stereographic
projectionMajorana (1932); Liu and Fu (2016). For a quantum state
$\ket{\psi}=\sum a_{k}\ket{k}$ in a $n$ dimensional Hilbert space, the
Majorana polynomial is given by
$\displaystyle\sum\limits_{k=1}^{n}$
$\displaystyle\frac{(-1)^{k}a_{k}}{\sqrt{(n-k)!k!}}z^{n-k}=0.$ (1)
The solutions $\\{z_{k}\\}$ lie on the complex plane, and their projection
onto the Riemann sphere is made by the following association
$z_{k}=\tan(\theta_{k}/2)e^{i\phi_{k}}$. Each root $z_{k}$ is called a
Majorana star, while the whole set of roots is denoted as the Majorana
constellation of the quantum state $\ket{\psi}$. In fact, any two quantum
states with the same constellation are in fact equivalent, up to a global
phase, which makes this representation a good description of their projective
space.
The $n+1$ dimensional Hilbert space has a bijection onto the space of $n$
qubits with particle permutation symmetry. This implies that symmetric-qubit
states have associated Majorana constellations. The $z_{k}$ roots define the
components of a ket state in the symmetric space, by the relation
$\displaystyle\ket{\psi}$
$\displaystyle=\frac{1}{\sqrt{n!}N_{n}}\sum\limits_{P}^{n}\ket{u_{P(1)},u_{P(2)},...,u_{P(n)}},$
(2)
where $\ket{u_{i}}$ represents the 1-qubit state $(\cos\frac{\theta_{i}}{2}\
e^{i\phi_{i}}\sin\frac{\theta_{i}}{2})^{T}$; the $P$ symbol denotes all the
possible permutations of the $\ket{u_{i}}$ states and $N_{n}$ is a
normalization coefficientLiu and Fu (2014). Thus, the Majorana constellation
serves as the mapping between an $n+1$ dimensional Hilbert space and the space
of $n$ qubit symmetric wavefunctions.
For symmetric two-qubit states, the Majorana constellation consists of two
stars. As shown in Reference Liu and Fu, 2016, their concurrence is
proportional to the square of the chordal distance between the stars. This
implies that states with zero concurrence have their Majorana stars on the
same position, or equivalently said, have degenerate stars. On the contrary,
maximally entangled states have stars occupying antipodal positions on the
sphere. For mono-partite three-level systems we may also speak of entangled
states as those whose Majorana stars are not coincident.
On the same line of thought, three-level transformations will be referred to
as entangling as long as they can produce a state with non-degenerate Majorana
stars from a state with a degenerate constellation. Fig. 1 illustrates a
separable state (degenerate constellation) which, after being acted on by a
SQG ends up as a fully entangled state (antipodal Majorana stars). Examples of
these gates in three-level systems are phase gates and the $SWAP_{12}$ and
$SWAP_{23}$, which have found applications in qutrit-based quantum
computingDogra _et al._ (2018).
Figure 1: Action of a quantum gate on a separable initial state (with
concurrence $C=0$) which ends up as a Bell state ($C=1$) on the Majorana
sphere.
## III Cartan decomposition of unitary two-qubit transformations
The whole set of transformations on the Hilbert space of two-qubits can be
classified as local and non-local. Local operations are those physical
processes that act separately only on one component of the bipartite system
and, as a consequence, do not change the entanglement properties of the state.
Local two-qubit gates can always be written as tensor product of one-qubit
operations:
$\displaystyle\hat{V}^{(12)}$
$\displaystyle=\hat{V}^{(1)}\otimes\hat{V}^{(2)},$ (3)
which belong to the $SU(2)\otimes SU(2)$ Lie group. We will restrict $\hat{V}$
to denote transformations on the two-qubit space, not necessarily symmetric.
In general, TQQGs $\in SU(4)$ that cannot be written as in (3) are called non-
local. There is a very concise way of writing every element of $SU(4)$ given
by the Cartan decomposition of the group. Namely, for every $\hat{V}\in
SU(4)$, we have the following identityKnapp (1996)
$\displaystyle\hat{V}$ $\displaystyle=\hat{K}_{1}\hat{A}\hat{K}_{2},$ (4)
$\displaystyle\hat{A}$
$\displaystyle=\exp\left[\frac{i}{2}\sum\limits_{k}c_{k}\hat{\sigma}^{(1)}_{x_{k}}\otimes\hat{\sigma}^{(2)}_{x_{k}}\right],$
(5)
The $\hat{K}$ factors belong to the $SU(2)\otimes SU(2)$ Lie group, hence they
are local. As usual, the $\hat{\sigma}_{x_{k}}$ operators denote the Pauli
matrices, with $k=1,2,3$ and $x_{k}=x,y,z$. The $\hat{A}$ factor contains the
non-local part of the quantum gates, and is given by the exponential of linear
combinations of the operators
$\hat{\sigma}^{(1)}_{x_{i}}\otimes\hat{\sigma}^{(2)}_{x_{i}}$. TQQGs that
differ only by a $\hat{K}$ factor are said to be in the same local equivalence
class. These set of operators span the Cartan subalgebra of the $SU(4)$ Lie
group, which is a maximally commuting subalgebra of $\mathfrak{su}(4)$Zhang
_et al._ (2003). It is seen that the $(c_{1},c_{2},c_{3})$ coordinates have a
period of $\pi$ each, and thus the topological structure of the local
equivalence classes is a $3$-torusZhang _et al._ (2003). The
$\boldsymbol{c}=(c_{1},c_{2},c_{3})$ point will be called geometrical point
hereafter. For a more detailed discussion of the Cartan decomposition of
$SU(4)$ and its algebra, namely the $\mathfrak{su}(4)$ Lie algebra, see
Reference Zhang _et al._ , 2003.
There is a special case of TQQGs that act irreducibly on the symmetric and
anti-symmetric two-qubit ket spaces. Therefore, if $\hat{V}^{(r)}$ is an
element of such a special set, in which $(r)$ denotes a reducible
representation, it has a matrix form
$\displaystyle\hat{V}^{(r)}$ $\displaystyle=\left(\begin{matrix}\hat{U}&0\\\
0&1\\\ \end{matrix}\right),$ (6)
where $\hat{U}\in SU(3)$ acts on any symmetric linear combination of the
computational basis; $\hat{U}$ is thus the SQG we are interested in. The last
factor acts on the anti-symmetric Bell state
$\ket{\phi^{-}}=\frac{1}{\sqrt{2}}(\ket{01}-\ket{10})$.
Since reducible gates are a subgroup of $SU(4)$, the Cartan decomposition
holds for all elements of the form (6). Also, for reducible TQQGs, the Cartan
decomposition is composed of reducible factors. To see this, first let us note
that $\hat{A}$ is reducible, as will be seen in the next section. With this,
it is readily shown that a sufficient condition for $\hat{V}$ to be reducible
is that $\hat{K}$ be reducible. To show that reducibility of $\hat{V}$ implies
the reducibility of $\hat{K}$ consider the product
$\displaystyle\left(\begin{matrix}\hat{U}&0\\\ 0&1\end{matrix}\right)$
$\displaystyle=\left(\begin{matrix}K^{(s)}_{1}&K^{\prime}_{1}\\\
K^{\prime\prime}_{1}&K^{(a)}_{1}\end{matrix}\right)\left(\begin{matrix}A^{(s)}&0\\\
0&A^{(a)}\end{matrix}\right)\left(\begin{matrix}K^{(s)}_{2}&K^{\prime}_{2}\\\
K^{\prime\prime}_{2}&K^{(a)}_{2}\end{matrix}\right).$
The upper and lower off-diagonal elements (primed and doubled-primed) are
three-dimensional column and row vectors, respectively. The $(s)$ and $(a)$
upper indices denote the $3\times 3$ matrix acting on the symmetric subspace
and the scalar acting on the anti-symmetric subspace, severally. By explicit
evaluation of the right hand side of the equation above, it is seen that
$K^{\prime}_{1}=K^{\prime}_{2}=0$ and
$K^{\prime\prime}_{1}=K^{\prime\prime}_{2}=0$, which implies that the
$\hat{K}$ factors are also reducible. The $\hat{K}$ factors for SQGs are
forcefully of the form
$e^{-i\frac{\theta}{2}\boldsymbol{\hat{n}}\cdot\boldsymbol{\hat{\sigma}}}\otimes
e^{-i\frac{\theta}{2}\boldsymbol{\hat{n}}\cdot\boldsymbol{\hat{\sigma}}}$,
with $\boldsymbol{\hat{n}}$ and $\theta$ a unit vector and a rotation angle.
It can be shown that the $\hat{K}^{(s)}$ factors belong to the $SU(2)$ group
in the spin-$1$ representationN. Jeevanjee (2015), which are seen as $SO(3)$
rotations on the Majorana sphereDogra _et al._ (2018); Liu and Fu (2016).
## IV Local invariants and equivalence classes of symmetric quantum gates
TQQGs that are equivalent up to a local gate factor (see eq.(4)) have the same
local invariants Makhlin (2002); Zhang _et al._ (2003). Local invariants for
two-qubit quantum gates are determined by the set of eigenvalues of
$\displaystyle\hat{M}$ $\displaystyle=\hat{V}^{T}_{B}\hat{V}_{B},$ (7)
where the label $B$ indicates that the gate $\hat{V}$ is expressed in the Bell
basis $B=\\{\ket{\psi^{+}},\ket{\psi^{-}},\ket{\phi^{+}},\ket{\phi^{-}}\\}$.
The transformation matrix between the Bell states and the computational basis,
ordered as $\\{\ket{00},\ket{01},\ket{10},\ket{11}\\}$, is
$\displaystyle\hat{Q}^{\dagger}$
$\displaystyle=\frac{1}{\sqrt{2}}\left(\begin{matrix}1&0&0&1\\\ 0&i&i&0\\\
i&0&0&-i\\\ 0&1&-1&0\\\ \end{matrix}\right),$ (8)
where the definition of the Bell states is evident from the matrix above; note
that the last row corresponds to the anti-symmetric one. The Lie algebra of
the local components of two-qubit quantum gate is isomorphic to the Lie
algebra of the $SO(4)$ groupZhang _et al._ (2003), through the map defined by
eq.(8). Thus, any two-qubit quantum gate in the Bell basis, whose
decomposition is given by (4), becomes
$\displaystyle\hat{V}_{B}$ $\displaystyle=\hat{O}_{1}\hat{F}\hat{O}_{2},$ (9)
where $\hat{O}_{1,2}=\hat{Q}^{\dagger}\hat{K}_{1,2}\hat{Q}\in SO(4)$, and
$\hat{F}=\hat{Q}^{\dagger}\hat{A}\hat{Q}$ which is diagonal in this basis. The
Bell states $\ket{\psi^{+}},\ket{\psi^{-}},\ket{\phi^{+}},\ket{\phi^{-}}$ are
thus eigenstates of the $\hat{A}$ matrix, with respective eigenvalues
$\displaystyle\lambda_{1}$ $\displaystyle=e^{i(c_{1}-c_{2}+c_{3})/2},$ (10a)
$\displaystyle\lambda_{2}$ $\displaystyle=e^{i(c_{1}+c_{2}-c_{3})/2},$ (10b)
$\displaystyle\lambda_{3}$ $\displaystyle=e^{i(-c_{1}+c_{2}+c_{3})/2},$ (10c)
$\displaystyle\lambda_{4}$ $\displaystyle=e^{-i(c_{1}+c_{2}+c_{3})/2}.$ (10d)
The eigenvalues of the matrix $\hat{M}$ are determined by the quantities
$(\operatorname{Tr}\,{\hat{M}})^{2}$ and
$(\operatorname{Tr}\,{\hat{M}})^{2}-\operatorname{Tr}\,\hat{M}^{2}$, which in
turn serve to define the local invariants of two qubit quantum gates, namely
$\displaystyle G_{1}$
$\displaystyle=\frac{1}{16}(\operatorname{Tr}\,\hat{M})^{2},$ (11a)
$\displaystyle G_{2}$
$\displaystyle=\frac{1}{4}[(\operatorname{Tr}\,\hat{M})^{2}-\operatorname{Tr}\,\hat{M}^{2}]\
.$ (11b)
Thus, distinct TQQGs having the same local invariants are said to be locally
equivalent.
Reducible TQQGs can be expressed as in eq.(6) and their action on the
symmetric subspace only depends on $\hat{U}$. The local invariant of the
symmetric part of the gate is determined by the eigenvalues of
$\displaystyle\hat{m}$ $\displaystyle=\hat{U}^{T}_{B}\hat{U}_{B},$ (12)
and is then independent of the $\lambda_{4}$ eigenvalue. Since we have
considered special unitary gates, this implies
$\displaystyle c_{1}+c_{2}+c_{3}=0.$ (13)
Had we regarded general unitary gates, removing the extra phase factor would
lead to the same condition above, thus all LECs can be located in the plane
defined in (13).
Figure 2: Phase plot of $\operatorname{Tr}\hat{m}$. The
$\boldsymbol{\alpha}_{1}$ and $\boldsymbol{\alpha}_{2}$ are the root vectors
of the $\mathfrak{su}(3)$ Lie algebra. Every pair of antiparallel short arrows
lies in a plane belonging to the set that generate the Weyl group. The inset
shows a subcell divided into six slices, each one corresponding to a Weyl
chamber.
The secular equation of the matrix $\hat{m}$ is given by
$\displaystyle\lambda^{3}-\operatorname{Tr}(\hat{m})\lambda^{2}-\operatorname{Tr}^{*}(\hat{m})\lambda-1$
$\displaystyle=0,$ (14)
where we have used (9) and (10) to simplify the related factor
$\operatorname{Tr}^{2}(\hat{m})-\operatorname{Tr}(\hat{m}^{2})$. Thus, for
SQGs the eigenvalues of $\hat{m}$ are determined by its trace. The argument of
$\operatorname{Tr}\hat{m}$ is plotted in Fig.2.
We define the SQG local invariant as
$\displaystyle G$
$\displaystyle=\frac{1}{9}\left[\operatorname{Tr}(\hat{m})\right]^{2}.$ (15)
The norm of $G$ can be compactly written in terms of the $(c_{1},c_{2},c_{3})$
vector as
$\displaystyle|G|$
$\displaystyle=1-\frac{4}{9}\left[\sin^{2}(c_{12})+\sin^{2}(c_{13})+\sin^{2}(c_{32})\right],$
(16)
where $c_{ij}$ is a short-hand notation for $c_{i}-c_{j}$. Thus, distinct SQGs
having the same value of $G$ are said to be locally equivalent.
The whole extension of the $O$-plane (13) has more information than is
actually needed, given the periodicity the matrix $\hat{A}$ (eq.(5)) up to
local gate factors $\hat{K}$. Consider the vectors
$\boldsymbol{\alpha}_{1}=(-\pi,0,\pi)$ and
$\boldsymbol{\alpha}_{2}=(0,\pi,-\pi)$ lying on the $O$-plane. The $\hat{A}$
matrix is obviously periodic along these directions. Also, the angle between
them is $2\pi/3$. Thus, SQGs whose geometrical point differ by a
$n\boldsymbol{\alpha}_{1}+m\boldsymbol{\alpha}_{2}$ translation
($n,m\in\mathbb{Z}$) are locally equivalent, and the whole set of local
equivalent classes can be found within the hexagonal primitive cell spanned by
$\boldsymbol{\alpha}_{1}$ and $\boldsymbol{\alpha}_{2}$, which is displayed in
Fig. 2 by the area between these vectors and the dotted lines. The vectors
$\boldsymbol{\alpha}_{1}$ and $\boldsymbol{\alpha}_{2}$ are the root vectors
of the $\mathfrak{su}(3)$ Lie algebra, and the set
$\\{\pm\boldsymbol{\alpha}_{1},\pm\boldsymbol{\alpha}_{2},\pm(\boldsymbol{\alpha}_{1}+\boldsymbol{\alpha}_{2})\\}$
(solid-arrows in Fig. 2) form the root space of the algebraHall (2015).
Consider the reflection matrix
$(\hat{\sigma}_{\boldsymbol{\hat{\beta}}})_{ij}=\delta_{ij}-2\beta_{i}\beta_{j}/\beta^{2}\
(i,j=x,y,z)$ on the plane normal to the unit vector
$\boldsymbol{\hat{\beta}}$, which is obtained from any vector lying between
two successive root vectors (dotted-line arrows). It can be checked that the
effect of $\hat{\sigma}_{\boldsymbol{\hat{\beta}}}$ is to permute and complex-
conjugate the eigenvalues of the $\hat{m}$ matrix. From Fig. 2 it is seen that
reflection on the plane normal to the vertical $\boldsymbol{\hat{\beta}}$
vectors interchanges the triangles composing the unit cell depicted there.
This means that knowledge of $\operatorname{Tr}\hat{m}$ on a subcell
determines its value on the other subcell by complex conjugation, and thus all
LECs can be located in just one subcell.
Reflection on the planes normal to the root vectors generates the Weyl group
of $\mathfrak{su}(3)$; the corresponding reflection matrices are given by
$\hat{\sigma}_{\boldsymbol{\hat{\alpha}}}$, where $\boldsymbol{\hat{\alpha}}$
is a normalized root vector. The action of this group on the $\hat{A}$ matrix
is permuting its eigenvalues, and thus leaves the character of $\hat{m}$
invariant. As in the general two-qubit caseZhang _et al._ (2003), the Weyl
group allows to define a minimum extension containing the whole set of local
equivalence classes, called the Weyl chamber Zhang _et al._ (2003); Hall
(2015). By bisecting one triangle of the primitive cell by the planes normal
to the root space we get the inset of Fig. 2. Every slice of the triangle
contains all the local-equivalence classes of SQGs up to complex conjugation
and represents a Weyl chamber. Thus, by means of the
$\hat{\sigma}_{\boldsymbol{\hat{\beta}}}$ and
$\hat{\sigma}_{\boldsymbol{\hat{\alpha}}}$ reflections, we have reduced to a
minimum the extension needed to locate all distinct LECs. We will take
advantage of this in the next section to obtain the ratio of perfect
entanglers to all the possible SQGs.
## V Entangling power of symmetric two-qubit quantum gates
### V.1 Expression and properties
Figure 3: Entangling power $ep$ of SQGs on the $O$-plane. The parallelogram
spanned by the root vectors $\boldsymbol{\alpha_{1}},\boldsymbol{\alpha_{2}}$
corresponds to the primitive cell. The smaller section defined by
$\boldsymbol{\beta_{1}},\boldsymbol{\beta_{2}}$ contains all the possible
values $ep$.
The entangling power of a quantum gate acting on a bipartite system is a
measure of the ability for these gates to create entangled states from the set
of all bipartite separable states. In the general two-qubit caseZanardi _et
al._ (2000), the entangling power of a gate $\hat{V}$ (4) is defined as the
average of the linear entropy of entanglement
$E(\ket{\psi})=1-\operatorname{Tr}(\hat{\rho}^{2}_{1})$, over the set of all
separable symmetric two-qubit states with a uniform probability,
$\displaystyle ep(\hat{A})$
$\displaystyle=\overline{E(\hat{V}\ket{\psi_{1}}\otimes\ket{\psi_{2}})},$ (17)
with the bar indicating such an average. Note that we have written $ep$ as a
function of $\hat{A}$, since local transformations do not change the
entanglement of a quantum state. The entanglement power is very informative,
given that it can be compactly expressed in terms of the two-qubit $|G_{1}|$
local-invariant and can be used as an indicator to whether a quantum gate is a
perfect entangler or notBalakrishnan and Sankaranarayanan (2010).
Nevertheless, for SQGs acting on symmetric states only, this expression of the
entangling power is not adequate since it takes into account all two-qubit
separable states, not necessarily symmetric. Hence, we need to restrict the
entangling power definition to symmetric states in order to obtain the correct
expression. Accordingly, we define the entangling power of SQGs as
$\displaystyle ep(\hat{U})$
$\displaystyle=\overline{E(\hat{U}\ket{u}\otimes\ket{u})}.$ (18)
where $\ket{u}$ is a 1-qubit state, as in the section II.
We are now going to derive an explicit formula for this expression. First of
all, let us consider a uniform distribution of initial $\ket{u,u}$ states, for
which the Majorana constellation consists of two stars in the same position.
Referring to appendix A for the details in the derivation, the entangling of
SQGs is
$\displaystyle ep(\hat{U})$ $\displaystyle=\frac{3}{10}\left(1-|G|\right),$
(19)
with $|G|$ given by expression (16). It is remarkable that the entangling
power obtained can be so compactly expressed in terms of the local invariant
$|G|$, which only depends on the trace of matrix $\hat{m}$ (12). This result
resembles that of the entangling power for general two-qubit gatesBalakrishnan
and Sankaranarayanan (2010), namely $ep=2(1-|G_{1}|)/9$.
The function $ep(c_{1},c_{2},c_{3})$ (19) presents minimum and maximum
magnitudes at the geometrical points $\boldsymbol{c}=(0,0,0)$ and
$(-\pi/3,0,\pi/3)$, which are zero and $3/10$, respectively. As Fig. 3
suggests, these extreme values are also reached in additional points
$\boldsymbol{c}$, obtained through symmetry operations which are translations
along $\boldsymbol{\beta}$ vectors and $C_{6}$ rotations about the $(1,1,1)$
axis. Note also that $ep$ is invariant under translations along this same
vector, which means that the same pattern as that shown in Fig. 3 is displayed
in planes parallel to the $O$-plane (13).
### V.2 Perfect entanglers
A TQQG $\hat{V}$ is a perfect entangler if it is capable of producing a fully
entangled state from a separable one. The condition for this is that the
convex hull of eigenvalues of the $\hat{M}$ matrix contains the origin in the
$\boldsymbol{c}$-spaceZhang _et al._ (2003). For SQGs the same condition
holds applied to the corresponding matrix $\hat{m}$. The proof of this goes
along the same lines as in the general case Zhang _et al._ (2003); in order
to make the paper more self-contained we sketch it in appendix B.
Figure 4: Convex hull of the matrix $\hat{m}$ associated to SQGs for several
entanglement capabilities. The vertices on the unitary circle are defined by
the phase of the eigenvalues of $\hat{m}$. (a) Perfect entangler with a
maximum value of $ep$. (b) Perfect entangler with a minimum value of $ep$. (c)
Not a perfect entangler. The entangling character of the gate is geometrically
determined by the location of the origin, inside (perfect) or outside (non-
perfect) of the convex hull.
Fig. 4 shows the convex hulls of eigenvalues for three distinct cases. The
eigenvalues of unitary matrices all have unit length, and thus the circle in
the figure is unitary. The vertices of the triangles are defined by the phase
of $\lambda_{i}^{2}$, which are the eigenvalues of $\hat{m}$. In (a) the
eigenvalues are separated by $2\pi/3$. This case corresponds to the maximum
value $ep=3/10$ of the entangling power, since
$\lambda^{2}_{1}+\lambda^{2}_{2}+\lambda^{2}_{3}=0$ and $|G|=0$. The case in
(b) also represents a convex hull for a perfect entangling SQG, with the
requirement that $\lambda^{2}_{i}=-\lambda^{2}_{j}$. This makes $|G|=1/9$ and,
as a consequence,the entangling power is then $4/15$. In fact, the $SWAP_{12}$
($SWAP_{23}$) gateDogra _et al._ (2018) have this value of $ep$, hence all
SQGs with the same entangling power are locally equivalent to the $SWAP_{12}$.
Since any deformation of such a convex hull such that it no longer contains
the origin makes $ep$ less than $4/15$, this values is the minimum such that
the corresponding SQGs are perfect entanglers. A SQG with this convex hull can
be built with coefficients $(0,\pi/2,\pi/2)$. Other coefficients
$(c_{1},c_{2},c_{3})$ satisfying this condition can be obtained through
symmetry transformations on the geometric point just given. The case when the
convex hull does not contain the origin is depicted in (c), the SQGs not being
perfect entanglers ($ep<4/15$).
Now that we can classify SQGs as perfect entanglers or not according the
geometrical point $\boldsymbol{c}$, we are at a position to calculate the
ratio of perfect entanglers to non-perfect entanglers. To do this we will
calculate the area on the Weyl chamber whose geometrical points correspond to
perfect entangling SQGs. Let us restrict the $(c_{1},c_{2},c_{3})$ to the Weyl
chamber, as shown on Fig. 5. Comparison with Fig. 3 indicates the following
association: $\boldsymbol{v}=\boldsymbol{\beta}_{1}+\boldsymbol{\beta}_{2}$,
$\boldsymbol{v}_{x}=(\boldsymbol{\alpha}_{1}+\boldsymbol{\alpha}_{2})/2$ and
$\boldsymbol{v}_{y}=(\boldsymbol{\alpha}_{1}-\boldsymbol{\alpha}_{2})/6$. As
before, the $\boldsymbol{\alpha}_{1}$ and $\boldsymbol{\alpha}_{2}$ root
vectors are taken as $\pi(-1,0,1)$ and $\pi(0,1,-1)$. Hence, the vectors on
Fig. 5 are $\boldsymbol{v}=\frac{\pi}{3}(-2,1,1)$,
$\boldsymbol{v}_{x}=\frac{\pi}{2}(-1,1,0)$, and
$\boldsymbol{v}_{y}=\frac{\pi}{6}(-1,-1,2)$.
Figure 5: Weyl chamber of local-equivalence classes. The blue area contains
all the perfect entanglers, and it is one fourth of the triangle.
Any geometrical point on the Weyl chamber shown in Fig. 5 can be expressed as
$\boldsymbol{c}=s_{1}\boldsymbol{v}_{x}+s_{2}\boldsymbol{v}_{y}$, where
$s_{1},s_{2}\in[0,1]$ and $s_{2}\leq s_{1}$. Upon multiplying the
$\lambda^{2}$ eigenvalues by a total phase, its convex hull gets rotated, and
does not affect whether or not it contains the origin. Thus, regarding
$c_{1}+c_{2}+c_{3}=0$ and setting $\lambda^{2}_{2}=0$ (see eqs.(10)), we have
$\displaystyle\phi_{1}$ $\displaystyle=\pi(s_{1}+s_{2}),$ (20)
$\displaystyle\phi_{3}$ $\displaystyle=\pi(s_{2}-s_{1}),$ (21)
where $\phi_{1}$ and $\phi_{3}$ are the phase angles of $\lambda^{2}_{1}$ and
$\lambda^{2}_{3}$, respectively. With this, a SQG is a perfect entangler if
and only if the following condition holds:
$\displaystyle 0\leq\phi_{1}\leq\pi\hskip 14.22636ptAND\hskip
14.22636pt-\pi\leq\phi_{3}\leq-\pi+\phi_{1},$ (22)
where all phases are equivalent modulo $2\pi$. The case $\phi_{1}>\pi$ always
yields non-perfect entanglers by the imposed conditions on $s_{1}$ and $s_{2}$
(see the discussion below). Let us analyse all sections of the Weyl chamber to
determine whether they are composed of perfect entanglers or not.
Area 1. This area is constrained to the $(s_{1},s_{2})$ coordinates: $0\leq
s_{1}<1/2$ and $0\leq s_{2}\leq s_{1}$. These inequalities imply that
$s_{1}+s_{2}<1$, hence $0\leq\phi_{1}<\pi$, leaving us in the domain of (22).
By substituting $\phi_{3}$ into the right side of (22) we get $s_{1}\geq 1/2$,
which is a contradiction given the imposed conditions on $s_{1}$ and $s_{2}$.
Thus, all geometrical points in this section of the Weyl chamber do not
correspond to perfect entanglers.
Areas 2 and 3. For these regions we have the following restriction on the
$(s_{1},s_{2})$ coordinates: $1/2<s_{1}\leq 1$ and $1-s_{1}<s_{2}\leq s_{1}$.
These imply $\phi_{1}>\pi$ and $-\pi<\phi_{3}<0$. Thus, both $\lambda^{2}_{1}$
and $\lambda^{2}_{3}$ are on the lower half of the unit circle (see Fig.4.c),
none of them at $\pi$. The convex hull does not contain the origin and the
geometrical points do not correspond to perfect entanglers.
Blue area. In this case, the $(s_{1},s_{2})$ coordinates are constrained by
the inequalities: $1/2\leq s_{1}\leq 1$ and $0\leq s_{2}\leq 1-s_{1}$. This
implies $\pi\geq\phi_{1}\geq\pi/2$ and consequently we must focus on
expression (22). Inserting eqs.(20) and (21) into the right inequality of (22)
we obtain $-1\leq s_{2}-s_{1}\leq-1+s_{1}+s_{2}$. $-1\leq s_{2}-s_{1}$ holds
trivially, while the right hand side of the last inequality implies $s_{1}\geq
1-s_{1}$, which holds since we are considering $1\geq s_{1}\geq 1/2$.
Expression (22) holds in this case and all the geometrical points contained in
the blue area correspond to perfect entanglers. This section occupies one
fourth of the Weyl chamber. For this reason, the perfect entanglers are one
fourth of the total SQGs.
It is worth noting at this point that the geometric picture of LECs of SQGs
does not trivially arises from that of TQQGs. For example, the Weyl Chamber of
TQQGs is a tetrahedron that, without loss of generality, has one vertex on the
origin $O$. One of its edges, called the $OA_{3}$ edgeZhang _et al._ (2003);
Balakrishnan and Sankaranarayanan (2009), along geometrical points of the form
$(c,c,c)$, contains a point $P$ which represents a perfect entangler.
Nevertheless, for SQGs, the convex hull on any geometrical point of the form
$(c,c,c)$ does not contain the origin, as can be seen from inspection of
eqs.(10) and, as a result, the entangling power is zero along the $OA_{3}$
edge. This fundamental difference between the geometry of LECs of SQGs and
TQQGs proves that the former is not just a trivial special case of the latter.
## VI Examples
In this section we will apply the theory developed so far to three distinct
physical models with three-dimensional Hilbert spaces. We calculate the
entangling power as a function of an independent parameter for the three
models and find conditions on them to obtain perfect entanglers. The linear
entropy on the Majorana sphere is computed, where each point on it corresponds
to a state with degenerate Majorana constellation and the color indicates the
value of the entanglement measure of the final state. We comment on some
features of the spacial distribution of entanglement on the Majorana sphere.
### VI.1 Anisotropic Heisenberg model with no cross-terms
The anisotropic Heisenberg model of two interacting spins is represented by
the HamiltonianAbliz _et al._ (2006)
$\displaystyle\hat{H}_{H}$
$\displaystyle=-\frac{1}{2}\left(I_{x}\hat{\sigma}^{(1)}_{x}\hat{\sigma}^{(2)}_{x}+I_{y}\hat{\sigma}^{(1)}_{y}\hat{\sigma}^{(2)}_{y}+I_{z}\hat{\sigma}^{(1)}_{z}\hat{\sigma}^{(2)}_{z}\right),$
(23)
where $I_{i}$ are the spin coupling constants. This Hamiltonian is composed of
the Cartan subalgebra elements of $\mathfrak{su}(4)$, and hence has a
reducible representation into symmetric and anti-symmetric subspaces. The
symmetric part of the time evolution operator is, in the Bell basis,
$\displaystyle\hat{U}_{H}$
$\displaystyle=\left(\begin{matrix}e^{i(I_{x}-I_{y}+I_{z})t/2}&0&0\\\
0&e^{i(I_{x}+I_{y}-I_{z})t/2}&0\\\
0&0&e^{i(-I_{x}+I_{y}+I_{z})t/2}\end{matrix}\right).$ (24)
From eq.(23), the $\boldsymbol{c}$ coordinate vector is $(I_{x},I_{y},I_{z})$.
The entangling power becomes
$\displaystyle ep$
$\displaystyle=\frac{2}{15}\left[\sin^{2}(I_{xy}t)+\sin^{2}(I_{yz}t)+\sin^{2}(I_{xz}t)\right],$
(25)
where $I_{ij}=I_{i}-I_{j}$. Note that for equal spin coupling constants the
entangling power is zero, which means that the isotropic Heisenberg model does
not have any entangling power on the symmetric two-qubit subspace.
Fig. 6(a) shows the entangling power as a function of $\omega t$ for the
choice of parameters $I_{y}=0,I_{x}=-I_{z}=\omega$ (left panel). The maximum
values are located at $\omega t=\pi/3,2\pi/3$, as one would expect, while the
minimum $ep$ for which the quantum gate is a perfect entangler is located at
$\omega t=\pi/2$.
The sphere on the right shows the linear entropy on the Majorana sphere; we
have chosen $\omega t=\pi/3$ in order to obtain maximum entanglement. There
are zones on which the quantum gate does not produce entanglement (red spots),
and zones where the initial states become symmetric Bell states (blue spots).
Even though it is not fully depicted here, there are exactly four low-
entanglement zones and four high-entanglement zones, which form a tetrahedron
on the sphere. As far as we have numerically checked, this tetrahedron
distribution of entanglement on the Majorana sphere is a general feature of
SQGs with maximum entangling power.
Figure 6: Left: entangling power for (a) the anisotropic Heisenberg model, (b)
the Lipkin-Meshkov-Glick model and (c) the cross-Kerr interaction. The
horizontal-dashed line indicates the lower bound for perfect entanglers
($ep=4/15$). Right: Linear entropy of the final states obtained by applying
$\hat{U}$ to the initial states with degenerate Majorana stars.
### VI.2 Lipkin-Meshkov-Glick model
The Lipkin-Meshkov-Glick model was firstly proposed to study the many body
problem in nuclear physicsLipkin _et al._ (1965), and has also been useful to
model the physics of molecular solidsGarg (1993); Campos and Hirsch (2011) and
critical phenomena in Bose-Einstein condensatesRibeiro _et al._ (2007). The
Hamiltonian describing the interaction is given by
$\displaystyle\hat{H}_{L}$
$\displaystyle=B\hat{J}_{z}+g_{1}\hat{J}^{2}_{z}-g_{2}\hat{J}^{2}_{x}.$ (26)
This Hamiltonian commutes with the total angular momentum operator
$\boldsymbol{J}^{2}$, which allows us to fix the $j$ value to unity, for which
the model belongs to the $\mathfrak{su}(3)$ Lie algebra. This model can be
written in matrix form as
$\displaystyle\hat{H}_{L}$
$\displaystyle=\left(\begin{matrix}B+g_{1}-g_{2}/2&0&-g_{2}/2\\\ 0&-g_{2}&0\\\
-g_{2}/2&0&-B+g_{1}-g_{2}/2\end{matrix}\right).$ (27)
The eigenvalues oh $\hat{H}_{L}$ are: $\lambda_{0}=-g_{2}$ and
$\lambda_{\pm}=g_{1}-g_{2}/2\pm\sqrt{B^{2}+g^{2}_{2}/4}$. The corresponding
quantum gates of this system are given by $\exp{(-i\hat{H}_{L}t)}$.
This model is a three-level system, and as such can be mapped to the symmetric
two-qubit space. The isomorphism is given by mapping the angular momentum kets
$\ket{1,1},\ket{1,0}$ and $\ket{1,-1}$ to the symmetric states
$\ket{0,0},\frac{1}{\sqrt{2}}(\ket{0,1}+\ket{1,0}),\ket{11}$, respectively.
With this, the transformation matrix from the spin-$1$ angular momentum basis
to the symmetric Bell-basis is given by
$\displaystyle\hat{T}$ $\displaystyle=\left(\begin{matrix}1&0&1\\\
0&\frac{i}{\sqrt{2}}&0\\\ i&0&-i\end{matrix}\right).$ (28)
The definition of the Bell states should be evident from the matrix above.
With this, the absolute square of the local invariant G, is given by
$\displaystyle|G_{L}|$
$\displaystyle=\frac{1}{9}[1+4G_{1}\cos(2(g_{1}+g_{2}/2)t)+4G^{2}_{1}]\ .$
(29)
where
$\displaystyle G_{1}$ $\displaystyle=1-\frac{g^{2}_{2}\sin^{2}(Rt)}{2R},$
$\displaystyle R$ $\displaystyle=\sqrt{B^{2}+g^{2}_{2}/4}.$
The entangling power is readily obtained through eq.(19).
Fig. 6(b) shows the entangling power for the choice of parameters
$-2B/7=g_{1}/2=g_{2}/4=\omega$, where $\omega$ is a fixed frequency. The
entangling power displays an oscillating behaviour where the maximum $ep$ is
reached at values of $\omega t$ closed to $\frac{\pi}{4}(n+1/2)$ for some
integer $n\geq 0$. On the right panel the linear entropy on the Majorana
sphere for $\omega t=\pi/8$ is plotted. The colors on the sphere follow the
tetrahedron-like patterns, as we have numerically checked for SQGs with
maximum entangling power.
### VI.3 Cross-Kerr Interaction
The non-linear cross-Kerr effect in quantum optics is model by the
HamiltonianBhattacharya and Shi (2013)
$\displaystyle\hat{H}_{CK}$
$\displaystyle=\omega_{a}\hat{a}^{\dagger}\hat{a}+\omega_{b}\hat{b}^{\dagger}\hat{b}+\omega_{CK}\hat{a}^{\dagger}\hat{a}\hat{b}^{\dagger}\hat{b}.$
(30)
This Hamiltonian conserves the total number of excitations
$\hat{N}=(\hat{a}^{\dagger}\hat{a}+\hat{b}^{\dagger}\hat{b})$. By transforming
the Hamiltonian via the Schwinger operators of angular momentumSakurai and
Napolitano (1994), it is easily seen that $\hat{N}/2$ equals the total angular
momentum $j$ of the resulting Hamiltonian. Let us work in the $j=1$
representation. The cross-Kerr Hamiltonian becomes
$\displaystyle\hat{H}_{CK}$
$\displaystyle=(\omega_{a}-\omega_{b})\hat{J}_{z}-g_{CK}\hat{J}^{2}_{z},$
The cross-Kerr interaction can be modeled as a Lipkin-Meshkov-Glick model
after the identification $B=\omega_{a}-\omega_{b},g_{1}=-g_{CK},g_{2}=0$. The
entangling power is then easily obtained from eqs. (29) and (19) and the
transformation matrix (28),
$\displaystyle ep_{CK}$ $\displaystyle=\frac{4}{15}\sin^{2}(g_{CK}t).$
Fig. 6(c) shows the entangling power for a choice of parameters
$B=g_{1}/2=\omega$. The entangling power has an oscillating behaviour that
never reaches the maximum possible value. The eigenvalues of the $\hat{m}$
matrix are $e^{-ig_{CK}t},e^{-ig_{CK}t},1$. There is a pair of degenerate
eigenvalues, and thus the convex hull contains the origin only when the
vertices are on antipodal positions on the unit circle, which gives the
minimum $ep$ for which $\hat{U}_{CK}$ is a perfect entangler. The linear
entropy on the Majorana sphere is depicted on the right, which is very
different from the spheres on panels (a) and (b). The antipodal high
entangling spots on the sphere with a low entangling zone between them is a
general feature of quantum gates with $ep=4/15$, as we have seen from distinct
numerical calculations, without regards on the details of the Hamiltonian.
## VII Conclusions
We have given a geometric classification of the LECs of SQGs, which turns out
to be a plane with hexagonal symmetry. There we have identified the Weyl
chamber, which is the minimum area that contains all distinct LECs. This
geometric description contrasts with the general two-qubit case, for which the
geometry is three-dimensional. The entangling power for SQGs is obtained in
terms of the local-invariant. As was done in the general two-qubit case in
reference Zhang _et al._ (2003), we give conditions for which a SQG is a
perfect entangler, and have found that the perfect entanglers are 1/4 of all
possible SQGs. Along this line, it is also found that perfect entanglers must
have $ep\geq 4/15$. It is stressed that LECs of SQGs do not arise trivially
from those of TQQGs, since there exist geometrical points corresponding to
perfect entanglers in the latter case (TQQGs) that yield gates with zero $ep$
in the former (SQGs). The theoretic framework just developed can be applied to
any three-level system, despite whether being bi-partite or not. The
entangling power then refers to the capability of quantum gates to perform
transformations that do not act as $SO(3)$ rotations on the Majorana
constellation as, for example, some phase gates, $SWAP_{12}$ and $SWAP_{23}$
gatesDogra _et al._ (2018). Finally, the theory just developed was applied to
three physical models, namely, the anisotropic Heisenberg ModelAbliz _et al._
(2006), the Lipkin-Meshkov-Glick modelLipkin _et al._ (1965) and two coupled
quantized oscillators with cross-Kerr interactionBhattacharya and Shi (2013)
and found some conditions on the Hamiltonian parameters to generate perfect
entangling SQGs. Additional examples might include solid-state systems, or
optical analogues, like assemblies of three quantum dots with few electrons
used to study coherent control of quantum statesBrandes (2005), Landau-Zener-
Stückelberg interferometryGallego-Marcos _et al._ (2016) or quantum transport
Maldonado _et al._ (2018), among other properties.
## VIII Acknowledgements
D.M.G. acknowledges financial support from CONACyT (México).
## Appendix A Derivation of the entangling power for SQGs
To derive an explicit expression for the entangling power of SQGs we first
compute $\operatorname{Tr}[\hat{\rho}^{2}_{1}]$ and then integrate it over the
unit sphere. The pure state density matrix obtained after applying a SQG
$\hat{U}$ to a symmetric two-qubit separable state $\ket{u,u}$ is given by
$\hat{U}\ket{u,u}\bra{u,u}\hat{U}^{\dagger}$. Since we are interested in this
quantity in order to calculate the entropy of entanglement, the local
contributions to the quantum gate $\hat{U}$ can be omitted, hence
$\displaystyle\hat{\rho}$
$\displaystyle=\hat{A}\ket{u,u}\bra{u,u}\hat{A}^{\dagger}.$
Now, by expressing $\ket{u,u}$ in the Bell basis through the matrix
$\hat{Q}^{\dagger}$ (8), we find
$\displaystyle\hat{Q}^{\dagger}$
$\displaystyle\ket{u,u}=\frac{1}{\sqrt{2}}\left(\begin{matrix}a&ib&-ic&0\end{matrix}\right)^{T},$
where $a=\cos\phi-i\sin\phi\cos\theta$, $b=i\sin\theta$ and
$c=-i\sin\phi+\cos\phi\cos\theta$. By transforming the $\hat{A}$ matrix to the
Bell basis too, and after some manipulations we get the density matrix
$\displaystyle\hat{\rho}$
$\displaystyle=\frac{1}{4}\left(\begin{matrix}|A|^{2}&AB^{*}&AB^{*}&AC^{*}\\\
A^{*}B&|B|^{2}&|B|^{2}&BC^{*}\\\ A^{*}B&|B|^{2}&|B|^{2}&BC^{*}\\\
A^{*}C&BC^{*}&BC^{*}&|C|^{2}\\\ \end{matrix}\right),$
where the complex coefficients in the matrix elements are
$A=\lambda_{1}a-i\lambda_{3}c$, $B=\lambda_{2}b$ and
$C=\lambda_{1}a+i\lambda_{3}c$, with the $\lambda_{i}$ factors given in eqs.
(10). After reducing this matrix on one of the subsystem, we obtain
$\displaystyle\operatorname{Tr}\hat{\rho}^{2}_{1}$
$\displaystyle=\frac{1}{16}\left[(|A|^{2}+|B|^{2})^{2}+(|B|^{2}+|C|^{2})^{2}\right.$
$\displaystyle\hskip 99.58464pt\left.+2|AB^{*}+BC^{*}|^{2}\right].$
What remains is to average this expression over all the possible symmetric
separate states (degenerate Majorana constellations), where each state is
equally likely to be obtained,
$\displaystyle\overline{\operatorname{Tr}\hat{\rho}^{2}_{1}}=\frac{1}{4\pi}\int_{\mathcal{A}}\left[\operatorname{Tr}\hat{\rho}^{2}_{1}\right]\sin\theta\,d\theta
d\phi,$
with integration performed over the surface $\mathcal{A}$ of the unit sphere.
After a long but straightforward algebra, we obtain from (18)
$\displaystyle ep$
$\displaystyle=\frac{2}{15}[\sin^{2}(c_{12})+\sin^{2}(c_{23})+\sin^{2}(c_{31})],$
which can be recast in the form (19) by using the local invariant expression
(16).
## Appendix B Condition for a perfect entangler
In order to determine the values of $ep$ for which a SQG is a perfect
entangler, we need first a theorem based on the eigenvalues of the matrix
$\hat{m}$. The proof runs very similar as that given in Reference Zhang _et
al._ , 2003 for the general two-qubit case, with the appropriate changes to
focus on the symmetric case. First, we recall the definition of a convex hull.
###### Definition 1
(Convex hull) The convex hull of $n+1$ points
$\boldsymbol{p}_{0},\boldsymbol{p}_{1},...,\boldsymbol{p}_{n}\in\mathbb{R}^{n}$
is given by the set of all vectors of the form
$\sum\limits^{n}_{i=0}\theta_{i}\boldsymbol{p}_{i}$, where $\theta_{i}$ are
non-negative real numbers satisfying $\sum\limits^{n}_{i=0}\theta_{i}=1$.
Now, we state and prove the following theorem.
###### Theorem 1
(Perfect entanglers) A symmetric two-qubit gate $\hat{U}$ is a perfect
entangler if and only if the convex hull of eigenvalues of $\hat{m}$ contains
zero.
Proof: As explained in section III, a general symmetric two-qubit gate can be
decomposed as $\hat{U}=\hat{K}^{(s)}_{1}\hat{A}^{(s)}\hat{K}^{(s)}_{2}$, where
$\hat{K}^{(s)}\in SU(2)$ in the spin-$1$ representation. Given a symmetric
separable two-qubit state $\ket{\psi_{o}}=(a\ b\ b\ c)^{T}$, it is obtained
for the concurrenceAudrescht (2007) of the state $\hat{U}\ket{\psi_{o}}$ that
$C(\hat{U}\ket{\psi_{o}})=C(\hat{A}\ket{\psi_{o}})$, and thus, for $\hat{U}$
to be a perfect entangler, $\hat{A}$ has to be a perfect entangler; we have
also used $\hat{A}\ket{\psi_{o}}=\hat{A}^{(s)}\ket{\psi_{o}}$, since
$\ket{\psi_{o}}$ is symmetric. Explicitly,
$C(\hat{A}\ket{\psi_{o}})=\overline{\bra{\psi_{o}}}\hat{A}^{T}\hat{P}\hat{A}\ket{\psi_{o}}$,
where $\hat{P}=-\hat{\sigma}_{y}\otimes\hat{\sigma}_{y}$. This expression can
be rewritten in terms of Bell states as
$C(\hat{A}\ket{\psi_{o}})=\overline{\bra{\psi_{o}}\hat{Q}})\hat{F}^{2}(\hat{Q}^{\dagger}\ket{\psi_{o}}$,
where we have used the matrix $\hat{Q}$ (8) and the result
$\hat{Q}^{T}\hat{P}\hat{Q}=\mathds{1}$; the operator $\hat{F}$ is
$\hat{Q}^{\dagger}\hat{A}\hat{Q}$. Let
$\hat{Q}^{\dagger}\ket{\psi_{o}}=\ket{\phi}$. Since $\ket{\psi_{o}}$ is a non-
entangled state, we have
$C(\ket{\psi_{o}})=\overline{\bra{\psi_{o}}}\hat{P}\ket{\psi_{o}}=\overline{\bra{\phi}}\hat{Q}^{T}\hat{P}\hat{Q}\ket{\phi}=\overline{\bra{\phi}}\mathds{1}\ket{\phi}=0$,
which implies
$\displaystyle\phi^{2}_{1}+\phi^{2}_{2}+\phi^{2}_{3}=0,$ (31)
where only three expansion coefficients appear, since $\ket{\psi_{o}}$ is a
symmetric state, and thus has no projection on the antisymmetric axis. For
$\hat{A}$ to be a perfect entangler, the concurrence of
$\hat{A}\ket{\psi_{o}}$ must equal unity, which along with the normalization
condition yields
$|\phi_{1}^{2}\lambda^{2}_{1}+\phi_{2}^{2}\lambda^{2}_{2}+\phi_{3}^{2}\lambda^{2}_{3}|=|\phi^{2}_{1}\lambda^{2}_{1}|+|\phi^{2}_{2}\lambda^{2}_{2}|+|\phi^{2}_{3}\lambda^{2}_{3}|$,
where the eigenvalues $\lambda_{i}$ are given in eq.(10). This equation holds
if and only if there exists a number $\theta\in[0,2\pi)$, such that
$\phi_{j}^{2}\lambda^{2}_{j}=|\phi_{j}|^{2}e^{i2\theta},\,j=1,2,3,4$. With the
abovementioned and eq.(31), we get
$\displaystyle\phi^{2}_{1}+\phi^{2}_{2}+\phi^{2}_{3}$
$\displaystyle=e^{i2\theta}\left(\frac{|\phi_{1}|^{2}}{\lambda^{2}_{1}}+\frac{|\phi_{2}|^{2}}{\lambda^{2}_{2}}+\frac{|\phi_{3}|^{2}}{\lambda^{2}_{3}}\right),$
$\displaystyle=e^{i2\theta}\left(|\phi_{1}|^{2}\overline{\lambda^{2}_{1}}+|\phi_{2}|^{2}\overline{\lambda^{2}_{2}}+|\phi_{3}|^{2}\overline{\lambda^{2}_{3}}\right),$
$\displaystyle=0.$
By complex conjugation of the last equality, it follows that the convex hull
of the eigenvalues of $m(\hat{U})$ contains the origin. The converse statement
can be done following Reference Zhang _et al._ , 2003.
## References
* Audrescht (2007) J. Audrescht, “Entanglement,” in _Entangled Systems_ (John Wiley & Sons, Ltd, 2007) Chap. 8, pp. 143–168.
* Horodecki _et al._ (2009) R. Horodecki, P. Horodecki, M. Horodecki, and K. Horodecki, Rev. Mod. Phys. 81, 865 (2009).
* Muthukrishnan and Stroud (2000) A. Muthukrishnan and C. R. Stroud, Phys. Rev. A 62, 052309 (2000).
* Jerger _et al._ (2016) M. Jerger, Y. Reshitnyk, M. Oppliger, A. Potočnik, M. Mondal, A. Wallraff, K. Goodenough, S. Wehner, K. Juliusson, N. K. Langford, and A. Fedorov, Nat. Commun. 7, 12930 (2016).
* Dogra _et al._ (2018) S. Dogra, K. Dorai, and Arvind, Journal of Physics B: Atomic, Molecular and Optical Physics 51, 045505 (2018).
* Randall _et al._ (2018) J. Randall, A. M. Lawrence, S. C. Webster, S. Weidt, N. V. Vitanov, and W. K. Hensinger, Phys. Rev. A 98, 043414 (2018).
* Majorana (1932) E. Majorana, Nuovo Cim 9, 43 (1932).
* Devi _et al._ (2012) A. R. U. Devi, Sudha, and A. K. Rajagopal, Quantum Information Processing 11, 685 (2012).
* Liu and Fu (2016) H. D. Liu and L. B. Fu, Phys. Rev. A 94, 022123 (2016).
* Zanardi _et al._ (2000) P. Zanardi, C. Zalka, and L. Faoro, Phys. Rev. A 62, 030301 (2000).
* Balakrishnan and Sankaranarayanan (2010) S. Balakrishnan and R. Sankaranarayanan, Phys. Rev. A 82, 034301 (2010).
* Rezakhani (2004) A. T. Rezakhani, Phys. Rev. A 70, 052313 (2004).
* Zhang _et al._ (2003) J. Zhang, J. Vala, S. Sastry, and K. B. Whaley, Phys. Rev. A 67, 042313 (2003).
* Abliz _et al._ (2006) A. Abliz, H. J. Gao, X. C. Xie, Y. S. Wu, and W. M. Liu, Phys. Rev. A 74, 052105 (2006).
* Lipkin _et al._ (1965) H. Lipkin, N. Meshkov, and A. Glick, Nuclear Physics 62, 188 (1965).
* Bhattacharya and Shi (2013) M. Bhattacharya and H. Shi, Am. J. Phys. 81, 267 (2013).
* Liu and Fu (2014) H. D. Liu and L. B. Fu, Phys. Rev. Lett. 113, 240403 (2014).
* Knapp (1996) A. W. Knapp, _Lie Groups Beyond an Introduction_ (Birkhäuser, 1996).
* N. Jeevanjee (2015) N. Jeevanjee, _An Introduction to Tensors and Group Theory for Physicists._ , 2nd ed. (Birkhäuser, 2015).
* Makhlin (2002) Y. Makhlin, Quantum Information Processing 1, 243 (2002).
* Hall (2015) B. Hall, _Lie Groups, Lie Algebras and Representations: An Elementary Introduction_ (Springer International Publishing, 2015).
* Balakrishnan and Sankaranarayanan (2009) S. Balakrishnan and R. Sankaranarayanan, Phys. Rev. A 79, 052339 (2009).
* Garg (1993) A. Garg, Europhysics Letters (EPL) 22, 205 (1993).
* Campos and Hirsch (2011) J. Campos and J. Hirsch, Rev. Mex. Fis. 57, 56 (2011).
* Ribeiro _et al._ (2007) P. Ribeiro, J. Vidal, and R. Mosseri, Phys. Rev. Lett. 99, 050402 (2007).
* Sakurai and Napolitano (1994) J. Sakurai and J. Napolitano, _Modern Quantum Mechanics_ (Addison-Wesley Publishing Company, 1994).
* Brandes (2005) T. Brandes, Physics Reports 408, 315 (2005).
* Gallego-Marcos _et al._ (2016) F. Gallego-Marcos, R. Sánchez, and G. Platero, Phys. Rev. B 93, 075424 (2016).
* Maldonado _et al._ (2018) I. Maldonado, J. Villavicencio, L. D. Contreras-Pulido, E. Cota, and J. A. Maytorena, Phys. Rev. B 97, 195310 (2018).
| arxiv-papers | 2021-07-27T08:06:32 | 2024-09-04T03:07:20.861759 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "D. Morachis and Jes\\'us A. Maytorena",
"submitter": "Diego Morachis Galindo",
"url": "https://arxiv.org/abs/2107.12653"
} |
2107.12657 | # Continual Learning with Neuron Activation Importance
Sohee Kim Seungkyu Lee
Kyunghee University, Department of Computer Engineering,
Yongin, Republic of Korea
[email protected] [email protected]
###### Abstract
Continual learning is a concept of online learning with multiple sequential
tasks. One of the critical barriers of continual learning is that a network
should learn a new task keeping the knowledge of old tasks without access to
any data of the old tasks. In this paper, we propose a neuron activation
importance-based regularization method for stable continual learning
regardless of the order of tasks. We conduct comprehensive experiments on
existing benchmark data sets to evaluate not just the stability and plasticity
of our method with improved classification accuracy also the robustness of the
performance along the changes of task order.
## 1 Introduction
Continual learning is a sequential learning scheme on multiple different
tasks. New tasks do not necessarily consist of only existing classes of
previous tasks nor statistically similar instances of existing classes. In
challenging situations, new tasks may consist of mutually disjoint classes or
existing classes with unseen types of instances in previous tasks. One of the
main challenges is learning such new tasks without catastrophic forgetting
existing knowledge of previous tasks. Researchers have proposed diverse
continual learning approaches to achieve both stability (remembering past
tasks) and plasticity (adapting to new tasks) of their deep neural networks
from sequential tasks of irregular composition of classes and varying
characteristics of training instances. Since the training of a neural network
is influenced more by recently and frequently observed data, the neural
network forgets what it has learned in prior tasks without continuing access
to them in the following tasks. A rigorous approach that maintains the
knowledge of entire tasks may solve the problem while sacrificing
computational cost, however, it is impractical with an undefined number of
tasks in real applications of continual learning. Continual learning model has
to adapt to a new task without access to some or entire classes of past tasks
while it maintains acquired knowledge from the past tasks [19]. In addition,
the continual learning model has to be evaluated with arbitrary order of tasks
since the order of tasks is not able to be fixed nor predicted in real
applications. The continual learning model is required to function
consistently regardless of the order of tasks.
Figure 1: Three different (Importance-Measurement) ways (a) WI-WM: Weight
Importance ($\Omega_{1}\sim\Omega_{l}$) by respective Weight Measurement (b)
NI-WM: Neuron Importance ($\Omega_{k}$) by Weight Measurements. The maximum
value of weight importance out of ($\Omega_{1}\sim\Omega_{l}$) is assigned to
neuron importance ($\Omega_{k}$). And then all weights connected to the neuron
get the same importance of the neuron. (c) NI-NM: Neuron Importance
($\Omega_{k}$) by Neuron Measurement, where $l$ and $\Omega$ indicate weight
index and importance of either weight or neuron respectively. The proposed
method belongs to (c) NI-NM.
(a) Task order: 1 $\rightarrow$ 2 $\rightarrow$ 3 $\rightarrow$ 4
$\rightarrow$ 5
(b) Task order: 2 $\rightarrow$ 4 $\rightarrow$ 3 $\rightarrow$ 5
$\rightarrow$ 1
Figure 2: Classification accuracy of continual learning on Split Cifar10. SI
[22], MAS [2] and UCL [1] show critical changes in their performance as the
order of tasks changes.
| Absolute Task Order
---|---
Method | T1 | T2 | T3 | T4 | T5
SI [22] | 11.9 | 5.9 | 2.4 | 1.5 | 9.48
MAS [2] | 11.4 | 5.2 | 7.0 | 3.3 | 4.5
UCL [1] | 10.2 | 3.1 | 2.0 | 5.0 | 4.7
OURS | 11.4 | 1.5 | 0.5 | 1.7 | 1.6
Table 1: Performance disparity(%) between Figure 2(a) and 2(b) on Split CIFAR
10. ”Absolute task order” represents the sequence of tasks that a model
learns. (Additional explanation is discussed in Section 3.)
There are three major categories in prior continual learning approaches; 1)
architecture modification of neural networks [21, 18, 17], 2) rehearsal using
sampled data from previous tasks [16, 3], and 3) regularization freezing
significant weights of a model calculating the importance of weights or
neurons [14, 10, 22, 15, 2, 4, 23, 1, 7, 8]. Most recent methods have tackled
the problem with fundamental regularization approaches that utilize the
weights of given networks to the fullest. The basic idea of regularization
approaches is to constrain essential weights of prior tasks not to change. In
general, they alleviate catastrophic interference with a new task by imposing
a penalty on the difference of weights between the prior tasks and the new
task. The extent of the penalty is controlled by the significance of weights
or neurons in solving a certain task using respective measurements. As Figure
1 illustrates, weight importance can be decided by three different
(Importance-Measurement) ways.
WI-WM (Weight Importance by Weight Measurement) [10, 22, 2, 15, 23] calculates
weight importance based on the measurement of the corresponding weight as
described in Figure 1a. Elastic weight consolidation (EWC) [10] estimates
parameter importance using the diagonal of the Fisher information matrix
equivalent to the second derivative of the loss. Synaptic intelligence (SI)
[22] measures the importance of weights in an online manner by calculating
each parameter’s sensitivity to the loss change while it trains a network.
When a certain parameter changes slightly during training batches but its
contribution to the loss is high (i.e., rapid change of its gradient), the
parameter is considered to be crucial and restricted not to be updated in
future tasks. Unlike SI [22], Memory aware synapses (MAS) [2] assesses the
contribution of each weight to the change of a learned function. It considers
the gradient of outputs of a model with a mean square error loss. Gradient
itself represents a change of outputs concerning the weights. Variational
Continual Learning (VCL) [15], a Bayesian neural network-based method, decides
weight importance through variational inference. Bayesian Gradient Descent
(BGD) [23] finds posterior parameters (e.g., mean and variance) assuming that
the posterior and the prior distributions are Gaussian.
To mitigate the interference across multiple tasks in continual learning,
weight importance-based approaches let each weight have its weight importance.
However, in the case of convolutional neural networks, since a convolutional
filter makes one feature map that can be regarded as one neuron, those weights
should have the same importance. Furthermore, those methods that consider the
amount of change of weights [10, 22, 2] are impossible to reinitialize weights
at each training of a new task, which possibly decreases the plasticity of the
network. (Additional explanation of weight re-initialization is discussed in
section 3.)
NI-WM (Neuron Importance by Weight Measurement) calculates neuron importance
based on the measurement of all weights. Weight importance is redefined as the
importance of its connected neuron [1]. Uncertainty-regularized Continual
Learning (UCL) [1] measures weight importance by its uncertainty indicating
the variance of weight distribution. It claims that the distribution of
essential weights for past tasks has low variance, and such stable weights
during training a task are regarded as important weights not to forget. As
illustrated in Figure 1b, it suggests neuron-based importance in neural
networks. The smallest variance value (maximum importance) among the weights
incoming to and outgoing from a corresponding neuron decides the importance of
the neuron, and then the importance of all those weights is updated as the
neuron importance.
Figure 3: Normalized Weight importance distribution of each convolution layer.
To show the proportion of the average value of weight importance among layers,
we normalize the values to sum 1. This is based on the first task of Split
CIFAR 10 (task order: 3-1-2-4-5).
NI-NM (Neuron Importance by Neuron Measurement) calculates neuron importance
based on the measurement of the corresponding neuron [8]. Weight importance is
defined as the importance of its connected neuron.
[8] exploits proximal gradient descents using a neuron importance. Its neuron
importance depends on the average activation value. Activation value itself is
a measurement of neuron importance, and weights connected to the neuron get
identical weight importance.
One critical observation in prior experimental evaluations of existing
continual learning methods is that the accuracy of each task significantly
changes when the order of tasks is changed. As discussed in [20], proposing a
continual learning method robust to the order of tasks is another critical
aspect. Therefore, performance evaluation with fixed task order does not
coincide with the fundamental aim of continual learning where no dedicated
order of tasks is given in reality. Figure 2 shows sample test results of
state-of-the-art continual learning methods compared to our proposed method.
As summarized in Table 1, classification accuracy values of prior methods
fluctuate as the order of tasks changes(from Figure 2(a) to Figure 2(b)).
In this work, we propose a regularization approach for continual learning
assigning neuron importance by the measurement of average neuron activation.
As Figure 3 describes, we balance neuron importance distribution among layers
based on the average neuron activation divided by standard deviation, which is
critical to performance consistency along the changes of task order. We assign
calculated neuron importance to all weights of incoming edges connected to the
neuron.
A Neuron with high activation to the majority of instances is defined as an
essential neuron. We freeze essential neurons by freezing the weights of all
connected incoming edges (essential weights) during the learning of a new task
so that our model remembers past tasks. We propose to evaluate the robustness
to the order of tasks in a comprehensive manner in which we evaluate the
average and standard deviation of classification accuracy with multiple sets
of randomly shuffled tasks.
Our approach remembers past tasks robustly compared to recent regularization
methods [22, 15, 2, 1]. To measure performance fluctuation along the change of
task order, we evaluate our method with numerous shuffled orders. We
quantitatively evaluate our classification performance based on a measure of
interference from past tasks on MNIST [13, 6], CIFAR10, CIFAR100 [12] and Tiny
ImageNet [5] data sets.
Key contributions of our work include 1) a simple but intuitive and effective
continual learning method introducing activation based neuron importance, 2) a
comprehensive experimental evaluation framework on existing benchmark data
sets to evaluate not just the final accuracy of continual learning also the
robustness of the accuracy along the changes of the order of tasks. Based on
the evaluation framework, existing state-of-the-art methods and the proposed
method are evaluated.
## 2 Proposed Method
### 2.1 Neuron Importance by Average Neuron Activation
The proposed method extracts neuron importance based on the average activation
value of all instances. And then the neuron importance is assigned to all
weights of incoming edges connected to the neuron. In convolutional neural
networks, activation value of a neuron corresponds to the average value of one
feature map (i.e., global average pooling value). The average activation value
of neuron corresponds to the average of global average pooling value. The
average activation values at each layer are independently calculated but are
considered together. In other words, the individual average activation values
represent the importance of each neuron of a whole model. However, encoded
features at each layer describe different aspects of an input image and, as a
result, the average activation values at each layer should not be evaluated
together. Therefore, the average activation value is not able to fully
represent the characteristics of the essential neuron. Besides, in convolution
neural networks, the absolute magnitude of average activation value (i.e., the
average of global average pooling value) varies along the location of layer:
in high-level feature maps, the portion of activated area decreases. Due to
the difference in absolute average activation values across the layers,
weights of earlier layers tend to be considered more essential as Figure 4
shows. If the average activation value is used as neuron importance, networks
will prefer to keep the weights of earlier layers.
Figure 4: Normalized Weight importance distribution of each convolution layer.
To show the proportion of the average value of weight importance among layers,
we normalize the values to sum 1. Our method relaxes the tendency to
excessively consolidate weights of earlier layers. This is based on the first
task of Split CIFAR 10 (task order: 3-1-2-4-5).
Instead, we propose to use layer-wise average activation divided by the
respective standard deviation for neuron importance measurement. Compared to
the average activation-based neuron importance [8], ours prevents earlier
layers from getting excessive importance compared to other layers, which, in
turn, prevents a network from vulnerable to changing the order of tasks in
terms of forgetting past tasks. Figure 4 shows normalized average weight
importance of each layer(total 6 layers). Prior average activation based
regularization term assigns around 57% of total importance to layer 1(57%,
12%, 10%, 6%, 8%, 8%, respectively for the 6 layers). On the other hand, our
proposed regularization loss term assigns 26% of total importance to layer 1.
Furthermore, our method avoids assigning excessive importance to certain
layer(26%, 16%, 16%, 15%, 15%, 12%).
Then, why this improves the continual learning performance regardless of task
order? In prior works, more weights of lower layers tend to be frozen in
earlier tasks that eliminate the chance of upcoming tasks to build new low-
level feature sets. Only a new task that is fortunately able to rebuild
higher-layer features based on the frozen lower layer weights from previous
tasks could survive. On the other hand, ours keeps the balance of frozen
weights in all layers securing more freedom of feature descriptions for new
tasks in both lower and higher layers. Indeed, lower layer features such as
edges are not class (task) dependent features. Therefore, excessively freezing
lower layer features is not preferable in continual learning. Even though
tasks change, a new task may find alternative low-level features that have
high similarity with them of past tasks, as discussed in [11]. In order to
encode such relation, we propose to use the average and standard deviation of
neuron activation values at each layer. Our loss function is described as
follows.
$\displaystyle
L_{t}=\tilde{L_{t}}+\alpha\sum\limits_{l}\Omega_{k}^{t}(w_{l}^{t-1}-w_{l}^{t})^{2},$
(1)
where $\tilde{L_{t}}$ is loss of current task (e.g., cross entropy loss), $t$
is task index, $l$ is weight index, and $\Omega_{k}^{t}$ indicates $k^{th}$
neuron importance. $\alpha$ is a strength parameter to control the amount of
weights consolidation. Neuron importance is defined as follows.
$\begin{gathered}\Omega^{t}_{k}=\frac{\frac{1}{N_{t}}\sum\limits_{{i=1}}^{N_{t}}{f_{k}(x^{(t)}_{i})}}{\sigma+\epsilon},\\\
\sigma=\sqrt{\frac{\sum\limits_{{i=1}}^{N_{t}}{\\{{f_{k}(x^{(t)}_{i})-\frac{1}{N_{t}}\sum\limits_{{i=1}}^{N_{t}}{f_{k}(x^{(t)}_{i})}}\\}^{2}}}{N_{t}}},\end{gathered}$
(2)
where $N_{t}$ is the number of instances, $x$ is input, $k$ is neuron index,
$f_{k}(\cdot)$ is activation value (global average value, in the case of
convolution neural network), and $i$ is instance index. We introduce
$\epsilon$ to prevent the numerator from being zero when the standard
deviation becomes zero. Proposed method considers the variation of average
activation value among instances and the differences of average activation
value among different layers. It encourages freezing more weights of later
layers than earlier layers which are more likely to describe given task-
specific features.
Our experiments(Table 2 in Section 3.2) show that prior methods tend to forget
past tasks in learning new tasks. In the prior methods, weights of later
layers are more likely to change than weights of earlier layers during
learning a new task.
In general, if the essential weights of later layers of previous tasks change,
the network forgets past tasks and hardly recovers previous task-specific
features. On the other hand, even though weights of earlier layers of previous
tasks change, there are other chances to recover general low-level features
which are shared with following new tasks. Since our method puts relatively
more constraints on the weights of task-specific features not to change than
the prior methods(Figure 3), our method forgets past tasks less showing stable
performance along the change in the order of tasks.
### 2.2 Weight Re-initialization for Better Plasticity
In continual learning, networks have to not only avoid catastrophic forgetting
but also learn new tasks. According to the extent of difference in optimal
classification feature space of different tasks, optimized feature space in
the previous task might be significantly changed with a new task. In the
learning of a new task, we can let the model start either from random weights
or from optimized weights with previous tasks. Even though the optimized
weights on previous tasks can be considered as a set of random weights for a
new task, we avoid a situation where the optimized weights for one task work
as a local optimal for another similar task that may hinder new training from
obtaining new optimal weights through weight re-initialization. The situation
can be explained with $\Omega_{k}(w_{k}^{t-1}-w_{k}^{t})^{2}$ term in the loss
function of our network. During the learning of a new task, the network is
informed of past tasks by $\Omega_{k}(w_{k}^{t-1}-w_{k}^{t})^{2}$ term which
lets the network maintain essential weights of the past tasks assigning high
$\Omega_{k}$ values. In other words, $\Omega_{k}(w_{k}^{t-1}-w_{k}^{t})^{2}$
delivers the knowledge of previous tasks. Whatever the magnitude of
$\Omega_{k}$ is, however, $\Omega_{k}(w_{k}^{t-1}-w_{k}^{t})^{2}$ term is
ignored if $w_{k}^{t-1}$ almost equals to $w_{k}{t}$ already in the initial
epoch of the training of a new task, which prevents the network from learning
a new task. This situation is alleviated by weight re-initialization that
allows the value of $\Omega_{k}(w_{k}^{t-1}-w_{k}^{t})^{2}$ to be high enough
regardless of the magnitude of $\Omega_{k}$ in the training of a new task. In
this case, still the knowledge of previous tasks will be delivered by
$\Omega_{k}$ and affect the training of a new task.
## 3 Experimental Evaluations
We perform experimental evaluations of our method compared to existing state-
of-the-art methods for continual learning on several benchmark data sets;
Split and permuted MNIST [13, 6], and incrementally learning classes of
CIFAR10, CIFAR100 [12] and Tiny ImageNet [5]. We set hyper-parameters of other
existing approaches based on the description in [1] which has tested existing
approaches with different hyper-parameters to find their best performance. We
train all different tasks with a batch size of 256 and Adam [9] using the same
learning rate (0.001). For the Split CIFAR tasks and Split Tiny ImageNet, as
aforementioned, we perform the evaluation multiple times shuffling the order
of tasks randomly to evaluate the robustness to task orders. We test with all
120, 200, and 50 random orders for Split CIFAR10, Split CIFAR10-100 and Split
Tiny ImageNet respectively. To minimize statistical fluctuations of accuracy,
each combination of task sequences is repeated three times.
Figure 5: Evaluation Metrics: DOI(Degree of Interference) and LA Accuracy of
task. T, L and n stands for task, learning step, and the number of tasks
respectively.
As described in Figure 5, we define several evaluation metrics. ”Absolute task
order” indicates the sequence of tasks that a model learns. For instance, task
1 stands for the first task that a model learns no matter which classes
comprise the task. ”Learning step-wise average accuracy(LA Accuracy)”
represents the accuracy of each learning step averaged through the whole tasks
involved. (i.e., $LA_{k}=Average(L_{k})$). ”Degree of interference(DOI)”
indicates the decreased extent of accuracy of each task after all learning
steps are conducted. It is calculated by $(T_{k},L_{k})-(T_{k},L_{n})$. When
we report the performance of randomly shuffled order experiment, we
respectively average LA accuracy and DOI of randomly shuffled ordered test.
### 3.1 MNIST
We first evaluate our algorithm on a Split MNIST benchmark. In this
experiment, two sequential classes compose each task (total 5 tasks). We use
multi-headed and multi-layer perceptrons with two hidden layers with 400 ReLU
activations. Each task has its output layer with two outputs and Softmax. We
train our network for 40 epochs with $\alpha$ = 0.0045. In Figure 6, we
compare the accuracy of each task for at every learning step (column-wise
comparison in Figure 5) and LA accuracy. MAS [2] outperforms all other
baselines reaching 99.81% while ours achieves 99.7%. However, the accuracy is
almost saturated due to the low complexity of the data.
Figure 6: Results on Split MNIST benchmark. Here, VCL indicates VCL(without
coreset)[15].
We also evaluate methods on permuted MNIST data set. Our model used in this
evaluation is MLP which consists of two hidden layers with 400 ReLUs each and
one output layer with Softmax. The network is trained for 20 epochs with
$\lambda$ = 0.005. Also, to normalize the range of activation value, ReLU is
applied to the output layer additionally when computing neuron importance
$\Omega_{k}$. Our algorithm (95.21%) outperforms MAS [2] (94.70%), EWC [10]
(82.45%) and VCL(without coreset) [15] (89.76%) and on the other hand, UCL [1]
(96.72%), SI [22] (96.39%) and BGD [23] (96.168%) show better results.
However, most results on this data set achieve almost saturated accuracy.
### 3.2 Split CIFAR10
We test our method on a Split CIFAR10 benchmark. In this experiment, two
sequential classes compose each task (total 5 tasks). Evaluation on Split
CIFAR10 data set is based on the multi-headed network with six convolution
layers and two fully connected layers where the output layer is different for
each task. We train our network for 100 epochs with $\alpha=0.7$. The order of
5 tasks that comprise CIFAR10 is randomly shuffled (total 120 random orders).
Figure 7: Average LA Accuracy and its std. of Split CIFAR10 benchmark.
| Average DOI of Absolute Task Order
---|---
Method | D1 | D2 | D3 | D4
SI [22] | 28.05(±11.7) | 20.00(±7.4) | 15.51(±8.2) | 8.68(±5.8)
MAS [2] | 33.59(±11.7) | 27.37(±11.3) | 19.15(±10.6) | 11.45(±6.7)
UCL [1] | 11.36(±5.8) | 8.56(±3.6) | 5.94(±3.0) | 3.55(±6.5)
BGD [23] | 39.06(±10.1) | 34.83(±8.5) | 29.19(±8.8) | 19.71(±2.1)
OURS | 1.44(±1.1) | 1.59(±1.2) | 1.18(±0.8) | 0.70(±0.7)
Table 2: Average DOI(Degree of interference) and its std.(%) on Split CIFAR10.
Note that proposed method forgets past tasks less regardless of the order of
tasks.
As Figure 7 describes, our method overall outperforms all other methods with
large margins. Also, the standard deviation graph shows that our algorithm is
more robust to the order of tasks.
As Table 2 shows, proposed method shows better stability in the order of tasks
and also has a low degree of forgetting. In our method, average degraded
degree of performance is lowest as $1.23\%$, whereas SI [22] is $18.06\%$, UCL
[1] is $7.35\%$, MAS [2] is $22.89\%$, and BGD [23] is $30.7\%$.
#### 3.2.1 Ablation study
To verify the effect of weight re-initialization for the learning of new
tasks, we compare performance of ours and UCL [1] with those without weight
re-initialization.
| Task Order
---|---
Method | T5 | T4 | T3 | T2 | T1
UCL [1] | 0 | -0.425 | -0.9 | 4.93 | 6.38
OURS | -1 | 15.7 | 21.44 | 18.62 | 21.44
Table 3: Performance difference(%) = (accuracy with weight re-initialization)
- (accuracy without weight re-initialization). Note that the task order is
fixed.
As Table 3 indicates, accuracy increases in both methods when weight re-
initialization is applied. It suggests that weight re-initialization
encourages better plasticity. Note that several weight importance based
methods [10, 22, 2] cannot employ weight re-initialization since they consider
the amount of weight changes in the methods.
### 3.3 Split CIFAR10-100
Figure 8: Average LA Accuracy and its std. of CIFAR10-100 benchmark.
| Average DOI of Absolute Task Order
---|---
Method | D1 | D2 | D3 | D4 | D5 | D6 | D7 | D8 | D9 | D10
SI [22] | 5.85(±0.9) | 7.37(±2.3) | 6.58(±2.1) | 5.87(±2.0) | 5.57(±1.7) | 5.09(±1.7) | 4.45(±1.5) | 3.97(±1.3) | 3.28(±1.2) | 2.17(±1.0)
MAS [2] | 9.32(±1.4) | 9.18(±2.8) | 8.19(±2.2) | 7.39(±2.1) | 6.65(±1.9) | 6.17(±1.9) | 5.30(±1.6) | 4.64(±1.4) | 3.70(±1.2) | 2.50(±1.0)
UCL [1] | 3.74(±0.4) | 1.20(±1.2) | 1.31(±1.1) | 0.98(±1.0) | 0.78(±0.9) | 0.68(±0.8) | 0.64(±0.7) | 0.59(±0.7) | 0.37(±0.5) | 0.27(±0.4)
OURS | 2.03(±0.4) | 2.08(±0.9) | 1.26(±0.9) | 0.94(±0 8) | 0.84(±0.8) | 0.77(±0.7) | 0.61(±0.7) | 0.59(±0.6) | 0.47(±0.5) | 0.24(±0.4)
Table 4: Average DOI(Degree of interference) and its std.(%) on Split
CIFAR10-100. Note that proposed method forgets past tasks less regardless of
the order of tasks.
We evaluate our method on Split CIFAR10-100 benchmark where each task has 10
consecutive classes (total 11 tasks). We use the same multi-headed setup as in
the case of Split CIFAR10. We train our network for 100 epochs with
$\alpha=0.5$. We fix task 1 as CIFAR10 due to the difference in the size of
data set between CIFAR10 and CIFAR100. The order of remaining tasks that
consist of CIFAR100 is randomly shuffled (total 200 random orders).
Our method shows better stability showing the best accuracy values in old
tasks. On the other hand, previous methods seem to prefer to be better with
recent new tasks proving that our importance based continual learning is
working appropriately. Indeed, as Figure 8 and Table 4 represent, SI [22] and
MAS [2] seem that they learn new tasks very well forgetting what they have
learned before.
(a) LA accuracy of Split Cifar10
(b) LA accuracy of Split Cifar10-100
Figure 9: The performance on Split CIFAR10 and CIFAR10-100 with doubled
channel. Accuracy increases when we use a doubled channel network. Note that
the task order is fixed.
Since all incoming weights are tied to the neuron in our method, the higher
number of weights to be consolidated during training new tasks causes lower
accuracy of final task. In practice, the decrease of plasticity in our method
can be addressed by using a larger network (e.g., the larger number of
channels). We test the performance with a network of a doubled number of
channels (256 to 512). Figure 9 shows that our network with doubled number of
channels has improved accuracy keeping its stability and better plasticity.
Table 4 shows that our method obtains lowest average degraded degree of
performance $0.98\%$ compared to SI [22], MAS [2], UCL [1] achieving $5.02\%$,
$6.3\%$, $1.06\%$ respectively. Also, the proposed method shows the lowest
standard deviation of DOI, which indicates that our method is robust to the
interference from various combinations of tasks.
Figure 10: Average LA Accuracy and its std. of Tiny ImageNet data set
| Average DOI of Absolute Task Order
---|---
Method | D1 | D2 | D3 | D4 | D5 | D6 | D7 | D8 | D9
SI [22] | 27.35(±3.7) | 29.02(±4.4) | 27.09(±4.9) | 22.67(±4.2) | 20.24(±3.7) | 18.25(±4.4) | 14.86(±3.8) | 11.70(±3.2) | 7.78(±3.0)
MAS [2] | 20.49(±4.2) | 16.32(±3.6) | 14.40(±4.1) | 11.02(±3.6) | 9.14(±3.6) | 8.27(±2.7) | 6.20(±2.3) | 5.41(±2.3) | 3.86(±1.8)
OURS | 11.47(±3.6) | 6.75(±2.8) | 5.78(±2.3) | 3.98(±1.5) | 3.16(±1.2) | 2.76(±1.5) | 2.15(±1.1) | 1.70(±0.9) | 0.98(±0.7)
Table 5: Average DOI(Degree of interference) and its std.(%) on Split Tiny
ImageNet. Note that proposed method forgets past tasks less regardless of the
order of tasks.
### 3.4 Split Tiny ImageNet
We evaluate our method on Split Tiny ImageNet data set where each task has 20
consecutive classes (total 10 tasks). We use the same multi-headed setup as in
the case of Split CIFAR10 and Split CIFAR10-100. We train our network for 100
epochs with $\alpha=0.5$. The order of tasks is randomly shuffled (total 50
random orders). Only convolution neural networks based methods are tested for
a fair comparison.
In Figure 10, our method outperforms all other methods with large margins. The
standard deviation graph shows that our method algorithm shows the least
performance disparity under the change in the order of tasks. Table 5 presents
that our method acquires lowest average degraded degree of performance among
SI [22], MAS [2] and ours, achieving $19.08\%$, $10.5\%$, and $4.3\%$
respectively. Also, ours has the lowest standard deviation of DOI. This
implies that our method is robust to the interference from various
combinations of tasks.
## 4 Conclusion
We have proposed an activation importance-based continual learning method that
consolidates important neurons of past tasks. Comprehensive evaluation has
proved that the proposed method has implemented regularization-based continual
learning achieving the fundamental aim of continual learning tasks not only
balancing between stability and plasticity but also keeping robustness of the
performance to the changes in the order of tasks.
## References
* [1] Hongjoon Ahn, Sungmin Cha, Donggyu Lee, and Taesup Moon. Uncertainty-based continual learning with adaptive regularization. In Advances in Neural Information Processing Systems, pages 4392–4402, 2019.
* [2] Rahaf Aljundi, Francesca Babiloni, Mohamed Elhoseiny, Marcus Rohrbach, and Tinne Tuytelaars. Memory aware synapses: Learning what (not) to forget. In Proceedings of the European Conference on Computer Vision (ECCV), pages 139–154, 2018.
* [3] Rahaf Aljundi, Min Lin, Baptiste Goujaud, and Yoshua Bengio. Gradient based sample selection for online continual learning. In Advances in Neural Information Processing Systems, pages 11816–11825, 2019.
* [4] Rahaf Aljundi, Marcus Rohrbach, and Tinne Tuytelaars. Selfless sequential learning. arXiv preprint arXiv:1806.05421, 2018.
* [5] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet: A large-scale hierarchical image database, 2009. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 248–255, 2020.
* [6] Ian J Goodfellow, Mehdi Mirza, Da Xiao, Aaron Courville, and Yoshua Bengio. An empirical investigation of catastrophic forgetting in gradient-based neural networks. arXiv preprint arXiv:1312.6211, 2013.
* [7] Khurram Javed and Martha White. Meta-learning representations for continual learning. In Advances in Neural Information Processing Systems, pages 1820–1830, 2019.
* [8] Sangwon Jung, Hongjoon Ahn, Sungmin Cha, and Taesup Moon. Adaptive group sparse regularization for continual learning. arXiv preprint arXiv:2003.13726, 2020.
* [9] Diederik P Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014.
* [10] James Kirkpatrick, Razvan Pascanu, Neil Rabinowitz, Joel Veness, Guillaume Desjardins, Andrei A Rusu, Kieran Milan, John Quan, Tiago Ramalho, Agnieszka Grabska-Barwinska, et al. Overcoming catastrophic forgetting in neural networks. Proceedings of the national academy of sciences, 114(13):3521–3526, 2017.
* [11] Simon Kornblith, Mohammad Norouzi, Honglak Lee, and Geoffrey Hinton. Similarity of neural network representations revisited. In International Conference on Machine Learning, pages 3519–3529. PMLR, 2019.
* [12] Alex Krizhevsky, Geoffrey Hinton, et al. Learning multiple layers of features from tiny images. 2009\.
* [13] Yann LeCun, Léon Bottou, Yoshua Bengio, and Patrick Haffner. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11):2278–2324, 1998.
* [14] Zhizhong Li and Derek Hoiem. Learning without forgetting. IEEE transactions on pattern analysis and machine intelligence, 40(12):2935–2947, 2017.
* [15] Cuong V Nguyen, Yingzhen Li, Thang D Bui, and Richard E Turner. Variational continual learning. arXiv preprint arXiv:1710.10628, 2017.
* [16] Matthew Riemer, Ignacio Cases, Robert Ajemian, Miao Liu, Irina Rish, Yuhai Tu, and Gerald Tesauro. Learning to learn without forgetting by maximizing transfer and minimizing interference. arXiv preprint arXiv:1810.11910, 2018.
* [17] Andrei A Rusu, Neil C Rabinowitz, Guillaume Desjardins, Hubert Soyer, James Kirkpatrick, Koray Kavukcuoglu, Razvan Pascanu, and Raia Hadsell. Progressive neural networks. arXiv preprint arXiv:1606.04671, 2016.
* [18] Ali Sharif Razavian, Hossein Azizpour, Josephine Sullivan, and Stefan Carlsson. Cnn features off-the-shelf: an astounding baseline for recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pages 806–813, 2014.
* [19] Sebastian Thrun. Is learning the n-th thing any easier than learning the first? In Advances in neural information processing systems, pages 640–646, 1996.
* [20] Jaehong Yoon, Saehoon Kim, Eunho Yang, and Sung Ju Hwang. Scalable and order-robust continual learning with additive parameter decomposition. arXiv preprint arXiv:1902.09432, 2019.
* [21] Jaehong Yoon, Eunho Yang, Jeongtae Lee, and Sung Ju Hwang. Lifelong learning with dynamically expandable networks. arXiv preprint arXiv:1708.01547, 2017.
* [22] Friedemann Zenke, Ben Poole, and Surya Ganguli. Continual learning through synaptic intelligence. Proceedings of machine learning research, 70:3987, 2017.
* [23] Chen Zeno, Itay Golan, Elad Hoffer, and Daniel Soudry. Task agnostic continual learning using online variational bayes. arXiv preprint arXiv:1803.10123, 2018.
| arxiv-papers | 2021-07-27T08:09:32 | 2024-09-04T03:07:20.876419 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Sohee Kim, Seungkyu Lee",
"submitter": "Sohee Kim",
"url": "https://arxiv.org/abs/2107.12657"
} |
2107.12660 | # The Pursuit and Evasion of Drones Attacking an Automated Turret ††thanks:
This work is in support of ONR-Code 30 OTA #N00014-18-9-0001. This work was
supported in part by the National Science Foundation under Grant No.
[IIS-1553063] and [IIS-1849303]. ††thanks: 1Department of Electrical and
Computer Engineering, University of Houston, Houston, TX 77204 USA
{debiediger,atbecker}@uh.edu. ††thanks: 2Bloomberg, USA [email protected].
Daniel Biediger1, Luben Popov2, and Aaron T. Becker1
###### Abstract
This paper investigates the pursuit-evasion problem of a defensive gun turret
and one or more attacking drones. The turret must “visit” each attacking drone
once, as quickly as possible, to defeat the threat. This constitutes a
Shortest Hamiltonian Path (SHP) through the drones. The investigation
considers situations with increasing fidelity, starting with a 2D kinematic
model and progressing to a 3D dynamic model. In 2D we determine the region
from which one or more drones can always reach a turret, or the region close
enough to it where they can evade the turret. This provides optimal starting
angles for $n$ drones around a turret and the maximum starting radius for one
and two drones.
We show that safety regions also exist in 3D and provide a controller so that
a drone in this region can evade the pan-tilt turret. Through simulations we
explore the maximum range $n$ drones can start and still have at least one
reach the turret, and analyze the effect of turret behavior and the drones’
number, starting configuration, and behaviors.
## I Introduction
An anti-aircraft automated gun turret versus a group of quadcopters is an
asymmetric engagement. While there are eight leading designs for a Close-In
Weapons System (CIWS) turret, each costs several million dollars and requires
a fixed mount [1]. In contrast, commercially available quadcopters are easily
deployed and each cost less than $1,000 [2]. Automated turrets are used
because the speed of engagements exceeds the reaction speed of humans [3].
This paper analyzes scenarios where the quadcopters can defeat a turret
through numbers and motion strategies.
For this paper, a _gun turret_ is a stationary defensive weapon with one or
more degrees of freedom and kinematic movement (no inertia). Initially, we
assume that the turret instantaneously kills anything aligned with the turret
gun barrel. This models a turret with a rapid rate of fire whose projectiles
move much faster than the adversary’s top speed, such as a laser turret, or a
CIWS. Fig. 1 shows a frame from our simulation between a turret and seven
attacking quadcopters.
This is a pursuit evasion problem where the turret must chase the drones by
turning to face them. For a turret with a pan-tilt mount this corresponds to a
two-dimensional state space in the pan and tilt angles. The drone evaders have
bounded velocity, thrust, inertia and turn rates. To defeat the attack, the
turret must visit, in state-space, the pan and tilt angles corresponding to
each drone.
The 2D version of this is similar to the _Lake Monster Problem_ , where an
evading rowboat in a circular lake must reach the lake shore without being
captured by a monster that cannot swim, but can run faster than the rowboat
can move [4]. For both 2D problems, the optimal strategies have a two-step
approach that depends on the relative speeds of the agents.
The turret must move through the attacking drones before any drone reaches the
turret. To survive, the drones can utilize several strategies. They can attack
with overwhelming numbers. They can move into regions where the drones can
out-pace the turret motion. They can also split and some move evasively,
forcing the turret to follow as long a path as possible, and enabling other
drones to reach the turret. Wiener proposed that random evasions are optimal
for avoiding anti-aircraft, which was recently confirmed [5]. To avoid
counter-fire, missiles are programmed with a variety of strategies [6],
including weaving trajectories [7]. This paper compares the effectiveness of
the three approaches in 2D and in 3D.
Figure 1: Simulated turret engaging quadcopter attackers.
## II 2D Turret & Drone Theory
Drone-mitigation methods use radars and cameras to detect drones. To avoid
detection, drones can use terrain to mask their approach as long as possible
before attempting to reach their target [8]. Such an approach can reduce the
effective problem from 3D to 2D. The effect of terrain masking is shown as an
inset to Fig. 2, calculated using the open source SPLAT! software for a 9m
radar tower [9]. This section identifies the maximum distance from a gun
turret where a drone(s) can first be detected and yet still reach the turret.
\begin{overpic}[width=390.25534pt]{Turret2DregionAnnote.pdf}
\scriptsize\put(66.0,72.0){$p_{0}$} \put(53.0,68.0){$p_{d}$}
\put(35.0,48.0){$p_{\perp}$} \put(42.0,42.0){$v$} \end{overpic} Figure 2:
Schematic of 2D turret, drone, and safety regions. The inset image shows how a
drone can exploit terrain masking to avoid detection and stealthily approach a
target.
In a 2D model, the turret’s orientation is $\phi$ and the turret has a maximum
rate of traverse (turning rate) of $\omega$, $|\dot{\phi}|\leq\omega$. We
assume that the turret can rotate infinitely in either direction. The mobile
opponent is a drone with position $p\in\mathbb{R}^{2}$ and has instantaneous
velocity $|\dot{p}|\leq v_{D}$, where $v_{D}\in\mathbb{R}^{+}$. To simplify
analysis, we eliminate a parameter by dividing the drone velocity by the
maximum rate of traverse: $|\dot{p}|\leq\frac{v_{D}}{\omega}=v$. For the
following proofs, we assume that the turret always moves at a top speed of 1
rad/s, so the path length of the turret is equal to the time $t$. For
simplicity, we place the turret at $[0,0]$.
A drone located at $[x,y]$ has angle $\theta=\mathrm{arctan}(x,y)$ with
respect to the $x$-axis. The minimum angle from the turret to the drone is
$\alpha=\mathrm{arctan}(\cos(\theta-\phi),\sin(\theta-\phi))$.
### II-A One mobile drone vs. a limited rate of traverse turret
Consider the diagram shown in Fig. 2. The drone initial position is $p_{0}$
and at time $t$ is located at $p_{t}=[x(t),y(t)]$. If the drone is no further
than $v$ from the turret, the drone can fly faster than the turret can rotate,
since it can easily move 1 rad/s by flying along this circle’s circumference.
We call this circle of radius $v$ the “Safety Circle”, excluding the region
where the turret is currently aimed, along the line from $[0,0]$ to
$v[\cos(\phi),\sin(\phi)]$.
If the angle from the drone to the turret is $\alpha$, the turret will take
$\alpha$ seconds to rotate to the drone’s position, in which time the drone
can move $v\alpha$ distance. Therefore, the region bounded by the radius
$\rho(\alpha)$ is also survivable:
$\displaystyle\rho(\alpha)=v(1+|\alpha|),\qquad\ \text{ for
}\alpha\in[-\pi,\pi].$ (1)
This region is outlined by brown in Fig. 2. If $\|p_{t}\|>v(|\alpha(t)|+1)$,
then the drone cannot reach the safety circle in time by flying radially
inwards. If the drone flies directly toward the origin, it will be intercepted
at $(\|p_{0}\|-v|\alpha|)\left[\cos(\theta),\sin(\theta)\right]$.
However, a larger survivable region, outlined in purple, is possible if the
drone flies at an angle instead of flying radially inwards. The angle that
maximizes this region brings the drone to the tangent of the safety circle.
The point tangent to the circle from $p_{0}$ in the direction of $\alpha$ is
$\displaystyle p_{\perp}$
$\displaystyle=v\left[\cos(\theta+\beta),\sin(\theta+\beta)\right],$ (2)
$\displaystyle\textrm{where }\beta$
$\displaystyle=\textrm{sign}(\alpha)\cos^{-1}\left(\frac{v}{\|p_{0}\|}\right).$
(3)
Here $\beta$ is calculated using the 90∘ triangle $([0,0],p_{\perp},p_{0})$.
If the drone starts further than
$\displaystyle\frac{\left\|p_{0}-p_{\perp}\right\|}{v}>\left|\alpha\right|+\left|\beta\right|,$
(4)
it cannot reach the tangent position, and is destroyed at time $t_{d}$. This
time is computed by numerically solving the following equation:
$\displaystyle t_{d}$
$\displaystyle=\left|\alpha\right|+\left|\beta\right|-\tan^{-1}\left(\frac{\left\|p_{0}-p_{\perp}\right\|-t_{d}v}{v}\right).$
(5)
The drone is destroyed at position
$\displaystyle p_{d}$
$\displaystyle=p_{0}-t_{d}v\frac{(p_{0}-p_{\perp})}{\left\|p_{0}-p_{\perp}\right\|}.$
(6)
To compute the survivable region when flying to the tangent point of the
safety circle, we parameterize the points where the drone ends tangent to the
safety circle of radius $v$. We then solve for the corresponding starting
positions:
$\displaystyle p_{0}(\gamma)=v\big{[}$
$\displaystyle\cos(\gamma+\phi)+\gamma\sin(\gamma+\phi),$ (7)
$\displaystyle\sin(\gamma+\phi)-\gamma\cos(\gamma+\phi)\big{]},$
$\displaystyle\text{for }\gamma\in[-$
$\displaystyle\gamma_{\max},\gamma_{\max}].$
The maximum angle occurs when $\tan(\gamma_{\max})=\gamma_{\max}$, at
$\gamma_{\max}\approx 4.49$ rad.
Figure 3: Comparing in 2D the shortest Hamiltonian path and greedy path
planning in 2D. 500 trials were run for each number of drones $n$. A 95%
confidence ellipse is plotted for each $n$.
### II-B Maximizing the turret travel, $n$ radially moving drones
\begin{overpic}[width=390.25534pt]{Greedy2DturretGreedy.pdf}
\put(-5.0,12.0){\rotatebox{90.0}{greedy turret}} \end{overpic}
\begin{overpic}[width=390.25534pt]{Optimal2DTurretSpacing.pdf}
\put(-5.0,2.0){\rotatebox{90.0}{both, doubling spacing}} \end{overpic}
\begin{overpic}[width=390.25534pt]{Greedy2DturretOpt.pdf}
\put(-5.0,12.0){\rotatebox{90.0}{optimal turret}}
\end{overpic}\begin{overpic}[width=390.25534pt]{TurretPathLengthGvsO.pdf}
\put(-2.0,8.0){\rotatebox{90.0}{turret path length (radians)}} \end{overpic}
Figure 4: Placing drones to maximize path length for a greedy turret results
in path lengths that approach 2$\pi$. The same placements for an optimal
turret have path lengths that approach $\pi$. Doubling spacing using (11)
causes both strategies to approach 2$\pi$.
If the drones start too far away to reach the safety circle, they can still
work to maximize the time the turret requires to destroy them. Given $n$
drones that all move radially inwards toward the turret, at what angular
positions should the $n$ drones be initially placed to force the turret to
follow the longest path? Fig. 3 indicates that the longest path is less than
$2\pi$ by comparing the resulting path for $n$ drones randomly placed on the
circumference of a circle against (1) a greedy turret that always targets the
done which requires the smallest traversal, and (2) an optimal turret that
selects targets to construct the overall shortest Hamiltonian path.
If the turret is greedy, it can be exploited by placing the $j$th drone at
angle
$\displaystyle\alpha_{j}=\left(\sum_{i=0}^{j-1}\left(\frac{1}{2}\right)^{n-1-i}\pi\right)-\epsilon$
(8)
for some small, non-zero constant $\epsilon$. This places the first drone at
$\left(\frac{1}{2}\right)^{n-1}\pi-\epsilon$ and the last drone at
$-\left(\frac{1}{2}\right)^{n-1}\pi-\epsilon$. Because the counter-clockwise
(CCW) drone is $2\epsilon$ closer, the turret initially turns CCW. The greedy
turret never turns clockwise (CW) because the intermediate drones are placed
at positions that double the distance travelled so far, but are always closer
than the CW drone. This results in a path length that is
$\displaystyle L_{\textrm{greedy turret, spacing \eqref{eq:spacingToMaxGreedy}
}}=2\pi\left(1-\left(\frac{1}{2}\right)^{n}\right)-\epsilon.$ (9)
This path performs poorly with a optimal turret, which simply turns CW first,
and then CCW, resulting in a path length of
$\displaystyle L_{\textrm{optimal turret, spacing
\eqref{eq:spacingToMaxGreedy}
}}=\pi\left(1+\left(\frac{1}{2}\right)^{n-1}\right)-\epsilon.$ (10)
The turret paths and the total path lengths are shown in Fig. 4.
Given an optimal turret, the drones should be placed symmetrically to the left
and the right of the turret, with inter-drone angular spacing that doubles for
each drone, placing the drones at $\\{\pm\alpha_{\textrm{opt}},\pm
3\alpha_{\textrm{opt}},\pm 7\alpha_{\textrm{opt}},...\\}$. If $n$ is odd, the
final drone should be placed at $\pi$.
$\displaystyle\alpha_{\textrm{opt}}=\frac{2\pi}{2^{\left\lceil\frac{n}{2}\right\rceil}+2^{\left\lfloor\frac{n}{2}\right\rfloor+1}-2}.$
(11)
The turret is then forced to move only slightly less than (9):
$\displaystyle L_{\textrm{both, doubling spacing \eqref{eq:spacingToMaxGreedy}
}}=2\pi-\alpha_{\textrm{opt}}.$ (12)
In all cases, the total total movement of the turret is bounded, no matter the
number of drones. Increasing the number of drones is not effective in the 2D
case, instead the drones should move in more effective ways.
### II-C Two mobile drones vs. a limited rate of traverse turret
Let drone 1 start at radial distance $r$ and starting angle $\alpha_{1}$ to
the turret. We would like to determine the angle $\alpha_{2}$ and distance
$\geq r$ that drone 2 should start, such that drone 2 reaches the safety
circle. What motion strategy should each drone follow to maximize $r$? The
answer is shown in Fig. 5, which plots $r_{\textrm{max}}(\alpha_{1})$ for
several strategies. First, both drones should start at the same radial
distance; starting the second drone further away increases its required time
to reach the target, and reduces its effective angular velocity relative to
the turret.
\begin{overpic}[width=433.62pt]{OptimalR2drones.pdf} \end{overpic}
\begin{overpic}[width=212.47617pt]{dronesAlpha1p0.pdf}
\put(0.0,95.0){\scriptsize A. $\alpha_{1}=1.0$}
\put(0.0,88.0){\scriptsize{\color[rgb]{217,142,32}hybrid}}
\put(75.0,93.0){\scriptsize{\color[rgb]{128,128,128}stay-alive}}
\put(80.0,88.0){\scriptsize{\color[rgb]{128,128,128}circle}}
\end{overpic}\begin{overpic}[width=212.47617pt]{dronesAlpha1p45.pdf}
\put(0.0,95.0){\scriptsize B. $\alpha_{1}=1.45$}
\put(0.0,88.0){\scriptsize{\color[rgb]{86,116,170}transition}}
\end{overpic}\begin{overpic}[width=212.47617pt]{dronesAlpha1p5.pdf}
\put(0.0,95.0){\scriptsize C. $\alpha_{1}=1.5$}
\put(0.0,88.0){\scriptsize{\color[rgb]{86,116,170}transition}}
\end{overpic}\begin{overpic}[width=212.47617pt]{dronesAlpha2p0.pdf}
\put(0.0,95.0){\scriptsize D. $\alpha_{1}=2.0$}
\put(0.0,88.0){\scriptsize{\color[rgb]{147,181,70}tangent}} \end{overpic}
Figure 5: (Top) maximum starting distance $r_{\textrm{max}}/v$ with drone 1
placed at angle $\alpha_{1}$. (Bottom) optimal paths for
$\alpha_{1}=\\{1,1.45,1.5,2\\}$ with 2 drones.
For both radially moving drones (1) and for drones that move to the tangent of
the safety circle (2), the second drone should start at $\pi+\alpha_{1}$ if
$\alpha_{1}<\pi/2$ (opposite the first drone) and $-\alpha_{1}$ otherwise. For
both, the optimal $\alpha=\pi/2$.
The maximum radius, $r_{\textrm{max}}$, for radially moving drones is
$(1+3\pi/2)v$, and for tangentially moving drones
$\displaystyle r_{\perp}=r_{\textrm{max}}(\pi/2)\approx 6.202v.$ (13)
For $\alpha_{1}\geq\pi/2$, both drones should move toward the tangent of the
safety circle, as given by (2).
However, for $0\leq\alpha_{1}\lessapprox 1.434$ there exists a hybrid solution
that outperforms the radial and tangent solutions. Note that the reachable set
for drone 1 in time $t$ is a circle of radius $vt$. Drone 1 should move to
stay alive as long as possible. This is accomplished by moving in a straight
line such that drone 1 dies where the circle of its reachable set is tangent
to the firing-line projected from the turret. This “stay alive circle” is
drawn in light grey in Fig. 5A. The drone will have moved to maximize the
angular distance that the turret must travel to pursue it. Drone 1’s death
occurs at angle $\beta$ that solves the equation
$\displaystyle\alpha_{1}=\beta-\sin^{-1}\left(\frac{1}{\frac{r_{\perp}}{\beta}+1}\right).$
(14)
Meanwhile, drone 2 starts at angle $\pi+\beta$ and moves radially inward until
drone 1 dies. When drone 1 dies, drone 2 is directly behind the turret. The
turret can then arbitrarily select to rotate in either direction to engage
drone 2. To maximize its survivability, drone 2 should now move toward the
safety-circle tangent point away from the turret’s direction of motion.
At angle $\alpha_{1}\approx 1.434$ radians, $\beta+\pi=2\pi-\alpha_{1}$, so
for $1.434\lessapprox\alpha_{1}\leq\pi/2$, the second drone cannot start
opposite of the place where the drone 1 dies. In this region, the _transition_
strategy is optimal. Here, drone 1 moves in a straight line but at an angle
intermediate between strategy (14) and the tangent meet point. The transition
strategy is shown in Fig. 5B and C. The required angle is solved numerically.
Meanwhile drone 2 starts at $-\alpha_{1}$ and moves in a straight line to the
point $\pi$ radians from drone 1’s eventual death, and then switches to moving
toward the tangent to the safety circle, as shown in Fig. 5B. The maximum
radius $\approx 6.3197v$ occurs at $\approx 1.449$ radians, with drone 1
moving at angle $\approx-2.740$ radians with respect to the turret’s initial
orientation.
## III 3D Turret & Drone Theory
In 3D there are safety regions that correspond to the 2D safety circle.
Current CIWS used by five world militaries are degree-of-freedom turrets with
a controllable pan and tilt [10, 1]. Moreover, the turret has a maximum rate
of traverse $115^{\circ}$/sec. For a drone moving with a speed of 5 m/s, this
corresponds to a safety circle of radius $\approx$ 2.5 m. For a turret whose
speed is constrained by geodesic distance, the safety region is the red sphere
in Fig. 6A, but the turret is actually limited by traverse rate in both pan
and tilt, resulting in the cylindrical safety region shown in Fig. 6B. If the
tilt angle is limited from $-25^{\circ}$ to $+85^{\circ}$, then these rotation
limits mean that drones in the blue conical regions shown in Fig. 6C are safe.
These limits are just mechanical constraints and the ranges vary among CIWS
designs [1], so our analysis will assume no joint limits. A pan-tilt robot
equipped with a gun can be modeled as a spherical robot where the final link
is a prismatic joint. The kinematics are a rotation $R_{z,\theta}R_{y,\phi}$
and a translation $T_{d}$ along the current $z$-axis. The manipulator Jacobian
is then
$\displaystyle
J(\theta,\phi,d)=\scriptsize\left[\begin{array}[]{ccc}-d\sin(\theta)\sin(\phi)&d\cos(\theta)\cos(\phi)&\cos(\theta)\sin(\phi)\\\
d\cos(\theta)\sin(\phi)&d\sin(\theta)\cos(\phi)&\sin(\theta)\sin(\phi)\\\
0&-d\sin(\phi)&\cos(\phi)\\\ \end{array}\right].$ (18)
This Jacobian has singularities whenever $\phi=\\{0,\pi\\}$ and also trivially
whenever $d$ is zero. A drone can evade the turret indefinitely when near the
turret’s singularity. This singularity could be moved, but not eliminated by
mounting the turret at a different angle, as shown in Fig. 6D.
Figure 6: Safety regions for a drone with max velocity 5 m/s and a
representative CIWS. The cone and cylinder sets extend infinitely in the axial
directions.
### III-A Increasing the number of attacking drones as a strategy
In 2D increasing the number of drones makes little difference on the
effectiveness of the attack, since the distance the turret must travel to
clear the area around it is bounded. In 3D, the drones can space out on a
manifold. If the drones all fly radially inward to attack a turret, the time
required for the turret to defeat the attack depends on the number of drones.
For radial motion, the angular distance between the drones does not change
from the perspective of the turret. Because a sphere has the largest state
space, it represents an upper limit on the path length for a number of drones.
The problem reduces to solving the shortest Hamilton path on a sphere. The SHP
is the shortest path that visits all points of interest once from a given
starting location. It is related to the Traveling Salesman Problem (TSP),
which requires the shortest closed tour through all points of interest.
Related problems with TSP on a sphere include [11], which used up to 400
points with a genetic algorithm and [12] which used up to 400 points with ant
colony optimisation. A more complete paper that compares algorithms is [13].
Making long TSP tours was presented in [14] based on the theory in [15].
The distance metric for a freely-rotating turret is the shortest angle between
two vectors. Given two drone positions with unit vectors (from the turret) of
$\vec{u}$ and $\vec{v}$, the angular distance between them is
$\cos^{-1}\left(\vec{u}\cdot\vec{v}\right)$ (19)
To understand the effect of the number of drones on the SHP, we place drones
on a sphere using two approaches: a Fibonacci spiral on a sphere [16] and
random placement with relaxation using Lloyd’s algorithm [17]. The Fibonacci
spiral places points on a sphere, using the _golden ratio_ to distribute the
points somewhat evenly. It produces a spiral pattern on the surface of the
sphere, as shown in Fig. 7. Our second approach selects uniformly distributed
points on the sphere at random. It then executes Lloyd’s algorithm, repeatedly
computing the Voronoi cells on the sphere and moving the points to the
centroids of these cells. An example of these cells is also shown in Fig. 7.
Figure 7: 200 points placed on a sphere using the Fibonacci spiral and
randomly generated and spaced with Lloyd’s algorithm. Figure 8: Nearest
neighbor and shortest Hamiltonian path distance comparison for $n$ drones
placed using the Fibonacci spiral on a sphere.
The length of the path required to engage and defeat all the drones depends on
the number of drones present. More drones means more points for the turret to
visit in state-space. As the number of points spaced evenly on a sphere
increases, the distance between the points decreases. To determine the path
length through the points we used two approaches: finding the nearest-neighbor
(NN) point at each step and using the freely available _Concord_ TSP solver
based on the work in [18]. Concorde has been used to find optimal tours though
very large problems including those on the surface of a sphere (with latitude
and longitude on Earth) in [19].
We adapted the solver to our problem by adding in an extra phantom point with
maximum-distance to and from all points, but zero-distance to and from the
starting position. This is inspired by the strategy for transforming
asymmetric-TSP problems into symmetric-TSP problems, presented in [20]. The
solver connects the phantom point to the starting position as either the first
or last stop in the tour (the remaining distances are symmetric). To find the
SHP, we discard the phantom point and select the direction through the tour
with the shortest first move.
The blue line in Fig. 8 line shows the SHP computed using the Concord TSP
solver. The green line above it shows the results for the finding the path
using the NN approach. The point sets used in both cases are generated with
the Fibonacci spiral. A best-fit line shows that the path distance increases
with the _square-root_ of the number of points, $O\left(\sqrt{n}\right)$. This
agrees with and extends the results for the distances of a TSP tour on a unit
square given by [21]. Above a small number of drones, the NN approach produces
a path that is seven to ten percent longer than the optimal path. For a real
turret with more than a few attacking drones, it is not feasible to generate
the optimal (and the computationally expensive) solution online. The NN
approach provides a fast option for selecting the next target, though it does
not find the optimal shortest path above a small number of drones. It also
follows a trend where the path length increases as the $O(\sqrt{n})$ in $n$
drones.
### III-B Simulating drones attacking a turret
(a)
(b)
Figure 9: Comparison of drone attack configurations using direct and indirect
attack strategies with different levels of turret repulsion.
Rather than move radially inward, the drones can attempt to evade the turret
by moving with a tangential component relative to the turret. This could
potentially increase the traversal distance required by the turret and prolong
the life of other drones. In order to test our 3D theories, we used a
simulation methodology based on the work in [22]. The simulation pits the
drones against a CIWS turret, with the drones attempting to crash into turret
while the turret attempts to eliminate the drones. This framework, built in
the Unity game engine, allows us to simulate drones using a dynamic model.
This model places limits on the thrust, pitch and yaw rates, top speed, and
includes inertia. It can simulate a repulsion between drones to prevent
collisions and allows the drones to flee from the turret. Fig. 10 shows the
forces acting on a drone in normal flight. The weight of the drone,
$\vec{F_{w}}$ is counteracted by the thrust $\vec{T}$. Together they sum to a
net force $\vec{F_{n}}$ acting in the desired direction of motion. The figure
shows an overlay of the velocity.
$\displaystyle\vspace{-2em}\vec{F_{n}}$ $\displaystyle=\vec{T}+\vec{F_{w}}$
(20) $\displaystyle 0$ $\displaystyle=\vec{F_{n}}+\vec{F_{d}}$
At maximum speed, the drag force $\vec{F_{d}}$ counteracts the net force and
the drone moves in the direction of $\vec{F_{n}}$. Without any other repulsive
forces, the net force $\vec{F_{n}}$ is the same as the force pulling the drone
to the goal, $\vec{F_{g}}$.
Figure 10: Forces acting on a drone.
### III-C Simulating drones directly attacking a turret with evasion
Similar to the 2D case with multiple drones, the drones in front of the turret
should move in a way that increases the distance the turret must travel. The
drones behind the turret should move as quickly as possible toward the turret.
We simulate this behavior by placing an outward repulsion from the line
extending from the gun on the turret. Drones within a $\pi/4$ cone are subject
to the repulsion.
We place the turret at the origin [0,0,0] and drone $i$ at position
$p_{i}=[x_{i},y_{i},z_{i}]$. The unit vector to the drone is $\hat{p_{i}}$ and
the unit vector in the direction that the gun turret it pointing is $\hat{g}$.
The direction of drone repulsion is then given by (21). The magnitude of this
force depends on the angle between the vectors; maximum when the angle between
the gun and drone is small and zero when the drone is outside the cone of
repulsion.
$\displaystyle\vspace{-2em}\hat{F_{r}}$
$\displaystyle=\left(\hat{g}\times\hat{p_{i}}\right)\times\hat{p_{i}}$ (21)
$\displaystyle\psi$ $\displaystyle=\arccos(\hat{g}\cdot\hat{p_{i}})$
$\displaystyle\vec{F_{r}}$
$\displaystyle=\hat{F_{r}}\left\\{\begin{array}[]{ll}1-\frac{\psi}{\pi/8}&\psi<\pi/8\\\
0&\text{else}\end{array}\right.$ (24)
The weight applied to this repulsion, $\xi$, varies in the range [0,1]. A
repulsion of zero indicates that the drones ignore the danger posed by the gun
and focus only on reaching it. A repulsion of one means that the drones flee
the turret and ignore reaching it. In between, the desired net force is a
linear combination of the force vector pointing to the goal, $\vec{F_{g}}$ and
the repulsion vector $\vec{F_{r}}$ given in (25).
$\displaystyle\vspace{-2em}\vec{F_{n}}=\left(1-\xi\right)\vec{F_{g}}+\xi\vec{F_{r}}$
(25)
We generate three drone attack configurations with successively increasing
spatial coverage: a plane, a half-cylinder, and a cylinder. The planar
formation distributes the $n$ drones in a starting rectangle along staggered
rows. The starting region is a distance $d$ in front of the turret and extends
from $-\pi/4$ to $\pi/4$ in the turret’s pan angle and $0$ to approximately
$\pi/4$ in the tilt angle. The half-cylinder places the same $n$ drones evenly
spaced in staggered rows from $-\pi/2$ to $\pi/2$ at a distance $d$ in front
of the turret. The cylinder surrounds the turret with staggered rows of drones
with radius $d$.
To compare the effectiveness of different strategies, we simulate an attack
and record its success or failure. If at least one drones reaches (and
destroys) the turret, we increase the nominal starting distance and try again.
If the drones are defeated, we decrease the starting distance and try again.
After successive iterations, we can determine the maximum starting distance
for each combination of configurations and strategies. A longer distance
reflects an attack that evades and survives for more time. As the maximum
distance increases, it is more likely that the drones could approach
undetected and complete a successful attack. Shorter distances indicate that
the attack is less effective and must start closer to the turret.
Fig. 9a shows a comparison of the drone starting distances for each of the
attack patterns. The solid black line shows that the cylinder, beyond some
initial benefit from repulsion is relatively unaffected by adding more. The
half-cylinder and plane are the most impacted by adding additional repulsion,
but the effect is negative. The results are deterministic, but depend on the
details of the repulsion and the targets picked by the turret. As the
repulsion levels increase, the drones are pushed further away from paths
toward the turret. This causes a difference in path the turret takes through
the drones.
A high repulsion tends to herd the drones away from the turret making them
less effective. The plane suffers the most from the herding effect, as the
drones at the sides of the configuration are forced out into unoccupied
regions. While this will cause the turret to pan more to reach these drones,
they are starting from a much greater radial distance and take longer to reach
the turret. The half-cylinder can benefit somewhat from the repulsion to move
into unoccupied areas. Low repulsion weights do not negatively impact the
performance, but high weights hamper the performance.
### III-D Simulating drones exploiting the 3D safety region
If a drone can position itself directly above the turret, or nearly so, it can
spiral down avoiding fire from the turret. This corresponds directly to the
safety circle in the 2D case where the turret cannot pan fast enough to
directly target the drone. We investigated the same three drone attack
configurations as before: a plane, a half-cylinder, and a cylinder. To exploit
the safety region, the drones move inward toward this cylindrical region above
the turret. They move at maximum speed in level flight until they reach the
region and then begin to spiral down. The drones attempt to avoid the front of
the turret by moving toward a goal behind the gun and below their current
position. This position is determined by (26). In the simulation, $k_{1}=4$m,
$k_{2}=5$m and the drone’s goal position is $p_{i,\text{goal}}$.
$\displaystyle
p_{i,\text{goal}}=[-k_{1}\hat{g}_{x},-k_{1}\hat{g}_{y},p_{i,z}-k_{2}]$ (26)
Fig. 9b shows a comparison of the drone starting distances for each of the
attack patterns. The solid black line shows that the cylinder benefits greatly
from additional repulsion. In comparison to the direct attack, the indirect
attack performs significantly better across all weights. The half-cylinder and
plane also benefit from the repulsion and both perform better than under
direct attack. The plots show more discontinuities in starting distance as
well. Because the spiral attack from above is so effective, if drones can
reach and enter the safety region they are more likely to defeat the turret.
If the turret selects targets in high latitudes, it can counter this threat.
In some cases the NN approach does find this path, but in other cases, the
turret does not select these drones.
## IV Conclusions and Future Work
In 2D, no arrangement of drones can force the turret to follow a path longer
than $2\pi$. In a similar way, in 3D increasing the number of drones in an
attack to $n$ provides only an $O(\sqrt{n})$ increase in survivability. While
avoiding the turret in 2D provides some benefit, the use of repulsion in our
3D simulation provided mixed results. When the drones are in direct attack,
the repulsion seems to herd the drones away from the turret more than it
increases the survivability. As a result, the overall performance decreases
with increasing repulsion. When the drones pursue indirect attack, some turret
repulsion increases the survivability of the attack. Repulsion spreads the
drones to fill in gaps or to move to empty regions in the airspace. Overall
the indirect attack plan performed better than direct attack.
In general, the indirect attack approach performs better than direct attack.
If drones can reach the safe region above a turret, they spiral down and
destroy it. If the turret tilts up and clears the drones at high latitudes,
the attackers near the horizon move in quickly to defeat the turret. To better
counter these threats, we plan to improve the turret’s target selection to
consider not just the nearest target, but also the most proximate threat to
the turret or its safety region.
## References
* [1] K. Fong, “CIWS: The last-ditch defence,” _Asian Defence Journal_ , vol. Naval Forces, July/August 2008.
* [2] R. H. Stoner, “History and technology r2d2 with attitude: The story of the phalanx close-in weapons.” [Online]. Available: http://www.navweaps.com/index_tech/tech-103.php
* [3] D. Kleinman and T. Perkins, “Modeling human performance in a time-varying anti-aircraft tracking loop,” _IEEE Transactions on Automatic Control_ , vol. 19, no. 4, pp. 297–306, 1974.
* [4] P. J. Nahin, _Chases and escapes: the mathematics of pursuit and evasion_. Princeton University Press, 2012\.
* [5] V. Kreinovieh and O. Kosheleva, “Wiener-process-type evasive aircraft actions are indeed optimal against anti-aircraft guns: Wiener’s data revisited,” _Mathematical Structures and Modeling_ , no. 2 (34), 2015.
* [6] J. Shinar, Y. Lipman, and M. Zarkh, “Mixed strategies in missile versus missile interception scenarios,” in _Proceedings of 1995 American Control Conference-ACC’95_ , vol. 6. IEEE, 1995, pp. 4116–4120.
* [7] A. Vermeulen and R. Savelsberg, “Interception of an aerodynamically stable weaving re-entry vehicle,” _International Journal of Intelligent Defence Support Systems_ , vol. 5, no. 2, pp. 127–145, 2014.
* [8] A. Robertson and G. Watson, “Drone Threats: Evolving Towards Swarms Current and Future Techniques for Detecting and Defeating Large Numbers of Rogue Drones,” Fortem Technologies, Tech. Rep., 08 2020.
* [9] “SPLAT! is an RF signal propagation, loss, and terrain analysis tool,” https://www.qsl.net/kd2bd/splat.html, accessed: 2020-10-20.
* [10] T. DiGiulian, “USA 20 mm Phalanx Close-in Weapon System (CIWS),” http://www.navweaps.com/Weapons/WNUS_Phalanx.php, accessed: 2021-03-04.
* [11] A. Uğur, S. Korukoğlu, A. Çalıskan, M. Cinsdikici, and A. Alp, “Genetic algorithm based solution for TSP on a sphere,” _Mathematical and computational applications_ , vol. 14, no. 3, pp. 219–228, 2009.
* [12] H. Eldem and E. Ülker, “The application of ant colony optimization in the solution of 3d traveling salesman problem on a sphere,” _Engineering science and technology, an international journal_ , vol. 20, no. 4, pp. 1242–1248, 2017.
* [13] X. Chen, Y. Zhou, Z. Tang, and Q. Luo, “A hybrid algorithm combining glowworm swarm optimization and complete 2-opt algorithm for spherical travelling salesman problems,” _Applied Soft Computing_ , vol. 58, pp. 104–114, 2017\.
* [14] L. A. Goddyn, “Quantizers and the worst-case euclidean traveling salesman problem,” _Journal of Combinatorial Theory, Series B_ , vol. 50, no. 1, pp. 65–81, 1990.
* [15] H. J. Karloff, “How long can a Euclidean traveling salesman tour be?” _SIAM Journal on Discrete Mathematics_ , vol. 2, no. 1, pp. 91–99, 1989.
* [16] D. P. Hardin, T. Michaels, and E. B. Saff, “A comparison of popular point configurations on s2,” _arXiv preprint arXiv:1607.04590_ , 2016.
* [17] S. Lloyd, “Least squares quantization in pcm,” _IEEE transactions on information theory_ , vol. 28, no. 2, pp. 129–137, 1982.
* [18] D. Applegate, W. Cook, S. Dash, and A. Rohe, “Solution of a min-max vehicle routing problem,” _INFORMS Journal on Computing_ , vol. 14, pp. 132–143, 05 2002.
* [19] D. L. Applegate, R. E. Bixby, V. Chvátal, W. Cook, D. G. Espinoza, M. Goycoolea, and K. Helsgaun, “Certification of an optimal tsp tour through 85,900 cities,” _Operations Research Letters_ , vol. 37, no. 1, pp. 11–15, 2009.
* [20] R. Kumar and H. Li, “On asymmetric tsp: Transformation to symmetric tsp and performance bound,” 01 2000.
* [21] K. J. Supowit, E. M. Reingold, and D. A. Plaisted, “The travelling salesman problem and minimum matching in the unit square,” _SIAM Journal on Computing_ , vol. 12, no. 1, pp. 144–156, 1983.
* [22] L. Popov, “Drone swarm simulation,” Master’s thesis, University of Houston, 2020\.
| arxiv-papers | 2021-07-27T08:16:49 | 2024-09-04T03:07:20.893172 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Daniel Biediger, Luben Popov, Aaron T. Becker",
"submitter": "Aaron Becker",
"url": "https://arxiv.org/abs/2107.12660"
} |
2107.12664 | # Adaptive Boundary Proposal Network for Arbitrary Shape Text Detection
Shi-Xue Zhang1, Xiaobin Zhu1 , Chun Yang1, Hongfa Wang3, Xu-Cheng Yin1,2,4
1School of Computer and Communication Engineering, University of Science and
Technology Beijing
2USTB-EEasyTech Joint Lab of Artificial Intelligence, 3Tencent Technology
(Shenzhen) Co. Ltd
4Institute of Artificial Intelligence, University of Science and Technology
Beijing
[email protected], {zhuxiaobin, chunyang, xuchengyin}@ustb.edu.cn,
[email protected] Corresponding author.
###### Abstract
Arbitrary shape text detection is a challenging task due to the high
complexity and variety of scene texts. In this work, we propose a novel
adaptive boundary proposal network for arbitrary shape text detection, which
can learn to directly produce accurate boundary for arbitrary shape text
without any post-processing. Our method mainly consists of a boundary proposal
model and an innovative adaptive boundary deformation model. The boundary
proposal model constructed by multi-layer dilated convolutions is adopted to
produce prior information (including classification map, distance field, and
direction field) and coarse boundary proposals. The adaptive boundary
deformation model is an encoder-decoder network, in which the encoder mainly
consists of a Graph Convolutional Network (GCN) and a Recurrent Neural Network
(RNN). It aims to perform boundary deformation in an iterative way for
obtaining text instance shape guided by prior information from the boundary
proposal model. In this way, our method can directly and efficiently generate
accurate text boundaries without complex post-processing. Extensive
experiments on publicly available datasets demonstrate the state-of-the-art
performance of our method. Code is available at the website:
https://github.com/GXYM/TextBPN.
## 1 Introduction
Scene text detection has been widely applied in various applications, such as
online education, product search, and video scene parsing. Benefiting from the
rapid development of deep learning, text detection methods [29, 11, 42, 22]
have achieved impressive performance on images in which text instances are
regular shape or aspect ratio. Recently, arbitrary shape text detection has
attracted ever-increasing interests for it can well adapt to real
applications.
Figure 1: Illustration of the boundary proposal deformation process: (a)
Boundary proposal; (b) Sampling on boundaries; (c) Extracting node feature
matrix; (d) Learning offsets of sampling vertexes via adaptive boundary
deformation model.
Although arbitrary shape text detection methods [2, 12, 41] have achieved
great improvements in recent years, there are still many issues to be
addressed due to the challenging characteristic of scene texts, including
varied shape, texture, scale, _etc_. Segmentation-based methods [37, 33, 12]
have sparked a new wave of arbitrary shape text detection that locate text
regions by a pixel-level prediction for enhancing the robustness to shape
variations. However, there are still two main problems that remain to be
explored.
One problem is that segmentation-based methods tend to fail in separating
adjacent text instances in image. To solve this problem, existing methods [19,
34, 30, 40] usually shrink annotation boundaries as kernels (_e.g_., text
kernel [34], text center region [19]) to distinguish different text instances.
For rebuilding a complete text, these methods usually need to merge the pixels
in text regions to kernels by pre-defined expansion rules or auxiliary
information (_e.g_., similarity vector [34]). However, the merging process in
[37, 33] are always performed by pixel-to-pixel, which is complex and
inefficient. The other problem is that the final detected contours of texts in
existing segmentation-based methods usually contain a lot of defects and
noises. This because the performance of existing segmentation-based methods
[4, 12, 33, 34] greatly relies on the accuracy of contour detection,
neglecting adaptively adjusting detected contours. Different from generic
object instances, text instances usually don’t have closed contours and often
contain a lot of background noisy pixels in coarse-grained boundary
annotations. These will generate unpredictable results of pixels, especially
those near boundaries, resulting in a lot of noises and defects in
segmentation results.
To tackle the above-mentioned problems, we propose a novel adaptive boundary
proposal network for arbitrary shape text detection, which can learn to
directly produce accurate boundary for arbitrary shape text without any post-
processing. Our adaptive boundary proposal network is mainly composed of a
boundary proposal model and an adaptive boundary deformation model. The
boundary proposal model is composed of multi-layer dilated convolutions, which
will predict a classification map, a distance field, and a direction field
based on shared convolutions. Inspired by RPN [25], we adopt the distance
field and pixel classification map to generate coarse boundary proposals as
shown in Fig. 1 (a). These coarse boundary proposals can roughly locate texts,
and well separate adjacent texts because they are always slimmer than their
boundary annotations in our method. To refine the coarse proposals, we adopt
an innovative adaptive boundary deformation model to perform iterative
boundary deformation for generating accurate text instance shape under the
guidance of prior information (classification map, distance field and
direction field). For fully excavating and exploiting topology and sequence
context in each boundary proposal, the adaptive boundary deformation model
adopt an encoder-decoder structure, in which the encoder mainly consists of a
GCN and a RNN (B-LSTM). Notably, the proposed method is a unified end-to-end
trainable framework with iterative optimization. Extensive experiments
demonstrate that our method achieves state-of-the-art performance on several
publicly available datasets.
In summary, the main contributions of this paper are three-fold:
* •
We propose a novel unified end-to-end trainable framework for arbitrary shape
text detection, which can directly generate accurate boundaries of arbitrary
shape texts without any post-processing.
* •
We propose an adaptive boundary deformation model which can perform iterative
boundary deformation for refining text boundary.
* •
Extensive experiments on public available datasets demonstrate the state-of-
the-art performance of our method.
Figure 2: Framework of our method. Our network mainly consists of shared
convolutions, boundary proposal model, and adaptive boundary deformation
model, which is a unified end-to-end trainable framework with iterative
optimization.
## 2 Related Work
Regression-Based Methods. Methods of this type rely on box-regression based
object detection frameworks with word-level and line-level prior knowledge
[22, 10, 13, 42, 40, 8]. Different from generic objects, texts are often
presented in irregular shapes with various aspect ratios. To deal with this
problem, RRPN [22] and Textboxes++ [10] localized text boxes by predicting the
offsets from anchors. Different from these methods localizing text regions by
implementing refinement on pre-defined anchors, EAST [42] and DDR [7] directly
regressed the offsets from boundaries or vertexes to the current point for
accurate and efficient text detection. Although regression-based methods have
achieved good performance in quadrilateral text detection, they often can’t
well adapt to arbitrary shape text detection.
CC-Based Methods. The Connected Component (CC) based methods [39, 26, 5, 2,
41] usually detect individual text parts or characters firstly, followed by a
link or group post-processing procedure for generating final texts. CRAFT [2]
detected text regions by exploring affinities between characters. TextDragon
[5] first detected the local region of the text, and then groups them by their
geometric relations. Zhang _et al_. [41] used a graph convolution neural
network (GCN) to learn and infer the linkage relationships of text components
to group text components. Although CC-based methods have a more flexible
representation that can adapt to irregular shape text well, the complex post-
processing for grouping text components to complete texts is always time-
consuming and unsatisfied.
Segmentation-Based Methods. Methods of this type [33, 37, 34, 12, 20] mainly
draw inspiration from semantic segmentation methods and detect texts by
estimating word bounding areas. To effectively distinguish adjacent text,
PSENet [33] adopted a progressive scale algorithm to gradually expand the pre-
defined kernels. In [34], Wang _et al_. proposed an efficient arbitrary shape
text detector, named Pixel Aggregation Network (PAN), which is equipped with a
low computational-cost segmentation head and learnable post-processing. DB
[12] performed an adaptive binarization process in a segmentation network,
which simplifies the post-processing and enhances the detection performance.
However, the performances of these methods are strongly affected by the
quality of segmentation accuracy.
Contour-based methods. In addition to the above methods, Contour-based methods
also have attracted many researchers [21, 35, 32, 36]. Yao _et al_. [21]
detected texts by predicting the corner of texts, and Lyu _et al_. [35]
adopted a similar architecture as SSD [16] and rebuilt text with predicted
corner points. Wang _et al_. [32] proposed an end-to-end approach toward
arbitrary shape text spotting, which proposed a boundary point detection
network to locate the text boundary in the text proposal region. ContourNet
[36] represented text region with a set of contour points, which adopted a
Local Orthogonal Texture-aware Module (LOTM) to model the local texture
information of proposal features in two orthogonal directions for generating
contour points. However, compared with segmentation-based methods, the
contour-based method has a big gap in detection performance and speed without
recognition information.
## 3 Proposed Method
### 3.1 Overview
The framework of our method is illustrated in Fig. 2. The ResNet-50 [6] is
adopted to extract features. To preserve spatial resolution and take full
advantage of multi-level information, we exploit a multi-level feature fusion
strategy (similar to FPN [14]), as shown in Fig. 3. The boundary proposal
model composed of multi-layer dilated convolutions uses the shared features
for performing text pixels classification, generating the distance field and
direction field [37]. Then, we use these information to produce coarse
boundary proposals. Each boundary proposal consists of $N$ points,
representing a possible text instance. For refining the coarse proposals, an
adaptive boundary deformation model is proposed to perform iterative boundary
deformation for obtaining the more accurate text boundaries under the guidance
of prior information (classification map, distance field, and direction
field).
Figure 3: Architecture of shared convolutions, $F_{S}$ denotes the shared
features and $F_{p}$ denotes the prior information (classification map,
distance field, and direction field).
### 3.2 Adaptive Boundary Proposal Network
Figure 4: Illustration of boundary proposal generation. Figure 5: Illustration
of ground truths for boundary proposal model, and the unit vector
$(\stackrel{{\scriptstyle\rightarrow}}{{x}},\stackrel{{\scriptstyle\rightarrow}}{{y}})$
in (e) and (f) is a vector representation of direction field in (c).
#### 3.2.1 Boundary Proposal Generation
The boundary proposal model is composed of multi-layer dilated convolutions,
include two $3\times 3$ convolution layers with different dilation rates and
one $1\times 1$ convolution layers, as shown in Fig. 2. It will use the shared
features extracted from the backbone network to generate classification map,
distance field map, and direction field map.
Similar to other text detection methods [42, 19, 41], the classification map
contains a classification confidence of each pixel (text/non-text). As in [37,
31], the direction field map ($V$) consists of a two-dimensional unit vector
($\stackrel{{\scriptstyle\rightarrow}}{{x}},\stackrel{{\scriptstyle\rightarrow}}{{y}}$),
which indicates the direction of each text pixel in boundary to its nearest
pixel on boundary (pixel-to-boundary). For each pixel $p$ inside a text
instance $T$ , we will find its nearest pixel $B_{p}$ on text boundary, as
shown in Fig. 5. Then, a two-dimensional unit vector $\mathcal{V}_{gt}(p)$
that points away from the text pixel $p$ to $B_{p}$ can be formulated as
$\mathcal{V}_{gt}(p)\;=\;\left\\{\begin{matrix}\
\overrightarrow{B_{p}p}/\left|\overrightarrow{B_{p}p}\right|,&p\in\mathbb{T}\\\
\\\ (0,0),&p\not\in\mathbb{T}\end{matrix}\right.$ (1)
where $\left|\overrightarrow{B_{p}p}\right|$ represents the distance between
$B_{p}$ and text pixel $p$, and $\mathbb{T}$ represent the total set of text
instances in an image. For the non-text area ($p\not\in\mathbb{T}$), we
represent those pixels with $(0,0)$. The unit vector $\mathcal{V}_{gt}(p)$ not
only directly encodes approximately relative location of $p$ inside $T$ and
highlights the boundary between adjacent text instances [37], but also
provides direction indication information for boundary deformation.
For boundary deformation, the relative position distance information is as
important as the direction information. In this work, the distance field map
($\mathcal{D}$) is a normalized distance map, and the normalized distance of
the text pixel $p$ to nearest pixel $B_{p}$ on text boundary is defined as
$\mathcal{D}_{gt}(p)\;=\;\left\\{\begin{matrix}\
\left|\overrightarrow{B_{p}p}\right|/L,&p\in\mathbb{T}\\\ \\\
0,&p\not\in\mathbb{T}\end{matrix}\right.$ (2)
For the non-text area ($p\not\in\mathbb{T}$), we represent the distance of
those pixels with $0$. $L$ represents the scale of text instance $T$ where the
pixel $p$ is located, and is defined as
$L=max(D_{gt}(p));\quad p\in T,$ (3)
$\mathcal{D}_{gt}(p)$ not only directly encodes the relative distance of $p$
inside $T$ and further highlights the boundary between adjacent text
instances, but also provides a relative distance information for boundary
deformation.
With the distance field map ($\mathcal{D}$), we can generate candidate
boundary proposals by using a fixed threshold ($th_{d}$) to the predicted
distance, as shown in Fig. 4 (b). However, these candidate boundary proposals
inevitably contains false detections. Hence, we calculate the average
confidence of each candidate boundary proposal according to the classification
map for removing some of them with low confidence ($th_{s}$), as shown in Fig.
4 (c) and (d).
#### 3.2.2 Adaptive Boundary Deformation
Inspired by interactive annotation of object segmentation methods [1, 15] and
instance segmentation method [23], we perform arbitrary shape text detection
by deforming a boundary proposal to a more accurate text boundary.
Specifically, we take a boundary as input based on CNN features and predict
per-vertex offsets pointing to the text boundary. In [1], the authors use a
Recurrent Neural Network to model the sequence of 2D vertices of the polygon
outlining an object. Afterwards, they propose a method [15] to treat the
location of each control point as a continuous random variable, and learn to
predict these variables via a Graph Neural Network that takes image evidence
as input. Inspired by [1, 15], DeepSnake [23] performs object segmentation by
deforming an initial contour to object boundary with circular convolution
which consists of multi-layer 1-D convolutions with $1\times N$ kernel size.
However, these methods only consider individual topology context or sequence
context, which isn’t highly satisfactory for text detection. For the unique
properties of texts, both topology context and sequence context are important
in detection.
For each boundary proposal, we will uniformly sample $N$ control points for
facilitating batch processing. As shown in Fig. 2, the sampled control points
form a closed polygon in which topology context and sequence context are co-
existing. To fully exploit the boundary topology and sequence context, we
introduce an adaptive boundary deformation model combined with GCN and RNN,
which can efficiently perform feature learning and iterative boundary
deformation for refining coarse text boundaries.
Let $cp_{i}=[x_{i},y_{i}]^{T}$ denote the location of the $i$-th control
point, and $p=\\{{p}_{0},{p}_{1},...,{p}_{N-1}\\}$ be the set of all control
points. For a boundary proposal with $N$ control points, we first construct
feature vectors for each control point. The input feature $f_{i}$ for a
control point $cp_{i}$ is a concatenation of 32-D shared features $F_{s}$
obtained by CNN backbone and 4-D prior features $F_{p}$ (_e.g_., pixels
classification, distance field and direction field). Therefore, the features
of a control point are extracted from the corresponding location in
$F:f_{i}=concat\\{F_{s}(x_{i},y_{i}),F_{p}(x_{i},y_{i})\\}$. Here,
$F_{s}(x_{i},y_{i})$ and $F_{p}(x_{i},y_{i})$ are computed by bilinear
interpolation.
After obtaining the feature matrix $X$ (size: $N\times C$) of boundary
proposal, we adopt the adaptive deformation model based on an encoder-decoder
architecture to perform efficient feature learning and iterative boundary
deformation. The encoder model is combined with GCN and RNN for feature
learning, which can fully exploit and fuse the boundary topology and sequence
context. As shown in Fig. 2, the encoder model can be formulated as
$X^{{}^{\prime}}=RNN(X)\oplus GCN(X)\oplus Conv_{1\times 1}(X)$ (4)
where “$\oplus$” refers to the concatenation operation; RNN is consisted of
one-layer B-LTSM with 128 hidden size; $Conv_{1\times 1}$ consists of one-
layer $1\times 1$ convolution layers with 128 dimensions, which form a
residual connection like RestNet [6]; GCN is consisted of four graph
convolution layers activated by ReLU, and the graph convolution layer in our
method is formulated as
$\displaystyle\mathbb{X}_{g}=ReLU((\mathbb{X}\oplus\mathbb{G}\mathbb{X})\mathbb{W}),$
(5)
$\displaystyle\mathbb{G}=\mathbb{\tilde{D}}^{-1/2}\mathbb{\tilde{A}}\mathbb{\tilde{D}}^{-1/2},$
(6)
where $\mathbb{X}\in\Re^{N\times d_{i}},\mathbb{X}_{g}\in\Re^{N\times d_{o}}$,
$d_{i}/d_{o}$ is the dimension of in/out features, and $N$ is the number of
control points; $\mathbb{G}$ is a symmetric normalized Laplacian of size
$N\times N$; $W$ is a layer-specific trainable weight matrix;
$\tilde{A}=A+I_{N}$ is an adjacency matrix of the local graph with added self-
connections; $I_{N}$ is the identity matrix and $\mathbb{\tilde{D}}$ is a
diagonal matrix with $\tilde{D}_{ii}=\sum_{j}\tilde{A}_{ij}$. We form $A$ by
connecting each control point in $p$ with its four neighbors.
The decoder in adaptive deformation model consists of three-layer $1\times 1$
convolutions with ReLU, which will learn to predict offsets between control
points and the target points. To obtain the more accurate text boundary, we
perform iterative boundary deformation, as shown in Fig. 2.
### 3.3 Optimization
In this work, the total loss $\mathcal{L}$ can be formulated as
$\mathcal{L}=\mathcal{L}_{Bp}+\dfrac{\lambda*\mathcal{L}_{Bd}}{1+e^{(i-eps)/eps}},$
(7)
where $\mathcal{L}_{Bp}$ is a loss for the boundary proposal model, and
$\mathcal{L}_{Bd}$ is a loss for the adaptive boundary deformation model;
$eps$ denotes the maximum epoch of training, and $i$ denote the $i$-th epoch
in train. In our experiments, $\lambda$ is set to 0.1. In Eq. 7,
$\mathcal{L}_{Bp}$ is computed as
$\mathcal{L}_{Bp}=\mathcal{L}_{cls}+\alpha*\mathcal{L_{D}}+\mathcal{L_{V}},$
(8)
where $\mathcal{L}_{cls}$ is a cross-entropy classification loss for pixels
classification, and $\mathcal{L_{D}}$ is a $L_{2}$ regression loss for
distance field. OHEM [27] is adopted for $\mathcal{L}_{cls}$ and
$\mathcal{L_{D}}$ in which the ratio between the negatives and positives is
set to 3:1. To balance the losses in $\mathcal{L}_{Bp}$, the weights $\alpha$
is set to 3.0. Similar to [31], $\mathcal{L_{V}}$ consists of $L_{2}$-norm
distance and angle distance for direction field $\mathcal{V}$:
$\mathcal{L_{V}}=\sum_{p\in\Omega}{w(p){\|\mathcal{V}_{p}-\hat{\mathcal{V}}_{p}\|}_{2}}+\frac{1}{\mathbb{T}}\sum_{p\in\mathbb{T}}(1-\cos(\mathcal{V}_{p},\hat{\mathcal{V}}_{p})),$
(9)
where $\Omega$ represents image domain; the weight ($w(p)=1/\sqrt{|GT_{p}|}$)
at pixel $p$ is proportional to the inverse square root of the size of ground
truth segment $GT_{p}$ containing $p$.
$\mathcal{L}_{Bd}$ is a point matching loss similar to [15]. In this work, the
prediction and ground truth control point sets have equal sized and similar
order (counter-clockwise), denoted as
$\textbf{p}=\\{p_{0},p_{1},\cdots,p_{N-1}\\}$, and
$\textbf{p}^{\prime}=\\{p^{\prime}_{0},p^{\prime}_{1},\cdots,p^{\prime}_{N-1}\\}$
($N$ is the number of points), respectively. Hence, the matching loss for p
and $\textbf{p}^{\prime}$ is defined as
$\mathcal{L}_{(\textbf{p},\textbf{p}^{\prime})}=\min_{j\in[0\cdots,N-1]}\sum_{i=0}^{N-1}{smooth_{L1}(p_{i},p^{\prime}_{(j+i)\%N})},$
(10)
Because there is usually more than one text instance in an image,
$\mathcal{L}_{Bd}$ is defined as
$\mathcal{L}_{Bd}=\frac{1}{\mathbb{T}}\sum_{p\in\mathbb{T}}\mathcal{L}_{(\textbf{p},\textbf{p}^{\prime})},$
(11)
where $\mathbb{T}$ represents all the text instances in an image, p represents
the control point set for text instance $T$ ($T\in\mathbb{T}$).
## 4 Experiments
### 4.1 Datasets
Total-Text: It consists of $1,255$ training and $300$ testing complex images,
including horizontal, multi-oriented, and curved text with polygon and word-
level annotations.
CTW-1500: It consists of $1,000$ training and $500$ testing images, and curved
text instances are annotated by polygons with 14 vertices.
MSRA-TD500: It consists of $500$ training and $200$ testing images, including
English and Chinese texts which contain multi-lingual long texts with multi-
orientations.
SynthText: It contains 800k synthetic images generated by blending natural
images with artificial text which are all word-level annotated .
ICDAR2017-MLT: It consists of $7,200$ training images, $1,800$ validation
images, and $9,000$ test images with multi-lingual ($9$ languages) texts
annotated by quadrangle.
Table 1: Ablation experiments for deformation model on Total-Text and CTW-1500. The best score is highlighted in bold. Methods | Total-Text | CTW-1500
---|---|---
Recall | Precision | F-measure | FPS | Recall | Precision | F-measure | FPS
FC | 81.56 | 90.16 | 85.65 | 9.52 | 78.32 | 85.03 | 81.54 | 11.13
RNN | 83.31 | 87.71 | 85.93 | 11.15 | 81.26 | 86.00 | 83.56 | 12.22
Circular convolution | 82.80 | 89.73 | 86.13 | 9.33 | 80.35 | 84.88 | 82.55 | 10.89
Graph convolution | 82.74 | 89.94 | 86.19 | 10.42 | 80.31 | 86.12 | 83.12 | 11.94
Adaptive deformation | 83.30 | 90.76 | 86.87 | 10.56 | 80.57 | 87.66 | 83.97 | 12.08
### 4.2 Implementation Details
In our experiments, we first pre-train our network on SynthText by one epochs,
in which images are randomly cropped and resized to $512\times 512$. In pre-
training, the Adam [9] optimizer is applied with a fixed learning rate of
$0.001$, and a mini-batch is set to 16. In fine-tuning, we randomly crop the
text region, and resize them to $640\times 640$ for training the model with
the mini-batch 12. The Adam [9] optimizer is adopted, in which the initial
learning rate is $0.001$ and decreased to $0.9$ of the original after each 50
epochs. The data augmentation includes: random rotation with an angle (sampled
by Gaussian distribution in ($-60^{\circ},60^{\circ}$)), random cropping, and
random flipping. In inference, we keep the aspect ratio of test images, then
resize and pad them into the same size for testing. The code is implemented
with PyTorch 1.7 and python 3. Training is performed on single GPU (RTX-3090),
and testing is performed on single GPU (GeForce RTX-2080) with Intel Xeon
Silver 4108 CPU @ 1.80GHz.
### 4.3 Ablation Study
In ablation experiments, we only train the model on corresponding real-world
datasets for 660 epochs without pre-training, and the other training settings
are identical with the fine-tuning process in Sec 4.2. In testing, the short
side of an image is scaled to 640, and ensure that the long side doesn’t
exceed 1,024. The threshold $th_{d}$ and $th_{s}$ are set to 0.3 and 0.8,
respectively.
Effectiveness of adaptive deformation model. To verify the effectiveness of
the adaptive deformation model, we conduct ablation experiments on Total-Text
and CTW-1500. Our deformation model consists of an encoder and a decoder. For
fair comparison, we use a lightweight full connection network (FC) structure
as decoder, and we adopt four types of encoder, _i.e_., FC with $Conv_{1\times
1}$, RNN, circular convolution, and graph convolution (GCN), for conducting
comparative experiments. As listed in Tab. 1, our adaptive deformation model
achieves the best performance compared with the other four methods on both
Total-Text and CTW-1500, which achieves improvements by $0.94\%$ in terms of
F-measure on Total-Text compared with RNN, and by $0.85\%$ in terms of
F-measure on Total-Text compared with GCN. Moreover, our adaptive deformation
model doesn’t bring obvious more consume of detection time.
Figure 6: Experimental results of control point number (N).
(a) boundary proposals
(b) iter 1
(c) iter 2
(d) iter 3
Figure 7: Visual results of different iterations. The blue contours are
boundary proposals, and the green contours are detection boundaries after
iterative deformation.
Influence of control point number ($N$). We study the influence of the control
point number ($N$) by setting the number of control point number from 12 to 32
with an interval of 4. The models are evaluated on Total-Text and CTW-1500.
From Fig. 6, we can find that the F-measures drops when $N$ is too large or
too small. Especially, too few control points will make great degradation of
performance. This is because the detection boundary often can’t correctly
cover the whole text when the control number is too small. Apparently, our
model achieves the best detection performance on both two datasets while the
number of control points is around 20. Therefore, in our experiments, the
number of control points is fixed at 20.
Table 2: Experimental results of different iterations on CTW-1500. | Iter. 1 | Iter. 2 | Iter. 3
---|---|---|---
F-measure | 82.24 | 83.33 | 83.97
Speed (fps) | 13.68 | 12.83 | 12.08
Influence of iteration number. To fully validate the influence of iteration
number, we further compare models with different inference iterations. As
listed in Tab. 2, with the increase of the number of iterations, the detection
performance is gradually improved but the inference speed of our model is
gradually dropped. When the number of iterations is from 2 to 3, the increase
of detection performance is not very obvious. Considering the balance of speed
and performance, the number of iterations is set to 3 by default in our
experiments. As shown in Fig. 7, the detection boundaries become more accurate
along with the increase of iterations.
Table 3: Ablation study for classification map (cls), distance field (dis), and direction field (dir) on Total-Text. cls | dis | dir | Recall | Precision | F-measure
---|---|---|---|---|---
$\checkmark$ | $\times$ | $\times$ | 76.96 | 83.01 | 79.87
$\checkmark$ | $\checkmark$ | $\times$ | 81.97 | 88.95 | 85.32
$\checkmark$ | $\checkmark$ | $\checkmark$ | 83.30 | 90.76 | 86.87
Influence of prior information. We conduct ablation studies on Total-Text to
verify the importance of each prior information (_e.g_., classification map,
distance field and direction field). As listed in Tab. 3, the detection
performance is unsatisfactory when only use classification map. Once distance
field and direction field are introduced, the performance is improved
significantly, and F-measure is improved by $5.45\%$ and $1.55\%$,
respectively.
Table 4: Experimental results on Total-Text for different resolution FPN. “R”, “P”, and “F” represent Recall, Precision, and F-measure, respectively. Methods | R | P | F | FPS
---|---|---|---|---
FPN-P1 (${1}/{1}$) | 83.30 | 90.76 | 86.87 | 10.56
FPN-P1 (${1}/{2}$) | 82.63 | 90.75 | 86.50 | 12.68
FPN-P2 (${1}/{4}$) | 82.99 | 89.51 | 86.13 | 15.17
Influence of different resolution FPN. We have conducted experiments without
any pre-training to explore the influence of using the different resolution
FPN-layer as the shared features. In Tab. 4, FPN-P2 (${1}/{4}$) means that we
use the FPN-P2 layer as the shared features (the resolution of FPN-P2 is
${1}/{4}$ of the original document image). From Tab. 4, we can see that FPN-P1
and FPN-P2 both achieve the state-of-the-art performance on Total-Text.
(a) Total-Text
(b) Total-Text
(c) CTW-1500
(d) CTW-1500
Figure 8: Visual experimental results. The blue contours are boundary proposals, and the green contours are final detection boundaries. Table 5: Experimental results on Total-Text. ‘Ext’ denotes that the extra pre-training data is used. ‘Syn’/ ‘MLT’ means SynthText or ICDAR2017-MLT dataset are used for pre-training, and ‘MLT+’ means there are other pre-training data besides MLT. Methods | Ext | R | P | F | FPS
---|---|---|---|---|---
TextSnake [19] | Syn | 74.5 | 82.7 | 78.4 | -
ATTR [35] | - | 76.2 | 80.9 | 78.5 | 10.0
MSR [38] | Syn | 85.2 | 73.0 | 78.6 | 4.3
CSE [18] | MLT | 79.7 | 81.4 | 80.2 | 0.42
TextDragon [5] | MLT+ | 75.7 | 85.6 | 80.3 | -
TextField [37] | Syn | 79.9 | 81.2 | 80.6 | 6.0
PSENet-1s [33] | MLT | 77.96 | 84.02 | 80.87 | 3.9
SegLink++ [28] | Syn | 80.9 | 82.1 | 81.5 | -
LOMO [40] | Syn | 79.3 | 87.6 | 83.3 | 4.4
CRAFT [2] | Syn | 79.9 | 87.6 | 83.6 | -
DB [12] | Syn | 82.5 | 87.1 | 84.7 | 32.0
PAN [34] | Syn | 81.0 | 89.3 | 85.0 | 39.6
TextPerception[24] | Syn | 81.8 | 88.8 | 85.2 | -
ContourNet [36] | - | 83.9 | 86.9 | 85.4 | 3.8
DRRG [41] | MLT | 84.93 | 86.54 | 85.73 | -
Boundary [32] | Syn | 85.0 | 88.9 | 87.0 | -
Ours | - | 83.30 | 90.76 | 86.87 | 10.56
Ours | Syn | 84.65 | 90.27 | 87.37 | 10.28
Ours | MLT | 85.19 | 90.67 | 87.85 | 10.69
### 4.4 Comparison with the state-of-the-arts
We compare our method with the previous state-of-the-art methods on Total-
Text, CTW-1500 and MSRA-TD500. In testing, the short side of the images is
scaled to 640, and the long side will be suppressed in 1,024. The threshold
$th_{d}$ for obtaining the candidate boundary proposals with distance filed is
fixed to 0.3.
Table 6: Experimental results on CTW-1500. Methods | Ext | R | P | F | FPS
---|---|---|---|---|---
TextSnake [19] | Syn | 85.3 | 67.9 | 75.6 | -
CSE [18] | MLT | 76.1 | 78.7 | 77.4 | 0.38
LOMO[40] | Syn | 76.5 | 85.7 | 80.8 | 4.4
ATRR[35] | Sy- | 80.2 | 80.1 | 80.1 | -
SegLink++ [28] | Syn | 79.8 | 82.8 | 81.3 | -
TextField [37] | Syn | 79.8 | 83.0 | 81.4 | 6.0
MSR[38] | Syn | 79.0 | 84.1 | 81.5 | 4.3
PSENet-1s [33] | MLT | 79.7 | 84.8 | 82.2 | 3.9
DB [12] | Syn | 80.2 | 86.9 | 83.4 | 22.0
CRAFT [2] | Syn | 81.1 | 86.0 | 83.5 | -
TextDragon [5] | MLT+ | 82.8 | 84.5 | 83.6 | -
PAN [34] | Syn | 81.2 | 86.4 | 83.7 | 39.8
ContourNet [36] | - | 84.1 | 83.7 | 83.9 | 4.5
DRRG [41] | MLT | 83.02 | 85.93 | 84.45 | -
TextPerception[24] | Syn | 81.9 | 87.5 | 84.6 | -
Ours | - | 80.57 | 87.66 | 83.97 | 12.08
Ours | Syn | 81.45 | 87.81 | 84.51 | 12.15
Ours | MLT | 83.60 | 86.45 | 85.00 | 12.21
Total-Text. In testing, the threshold $th_{s}$ is set to 0.825. The
quantitative results are listed in Tab. 5. From Tab. 5, we can find that our
method achieves $87.37\%$ in terms of F-measure when pre-trained on SynthText,
and $87.85\%$ in the item of F-measure when pre-trained on MLT17. Obviously,
our method significantly outperform other methods with a great margin. From
the visible results in Fig. 8 (a) and Fig. 8 (b), we can observe that our
method can precisely detect word-level irregular texts.
CTW-1500. In testing, the threshold $th_{s}$ is set to 0.8. Representative
visible results are shown in Fig. 8 (c) and (d), which indicate our method
precisely detects boundaries of long curved text with line-level. The
quantitative results are listed in Tab. 6. Compared with the previous sate-of-
the-art methods [12, 34, 36], our approach achieves promising performance of
both precision ($87.81\%$) and F-measure ($85.0\%$). Specifically, our method
greatly outperforms TextSnake [19] and DB [12] on CTW-1500 in item of
F-measure by $9.4\%$ and $1.6\%$, respectively.
Table 7: Experimental results on MSRA-TD500. Methods | R | P | F | FPS
---|---|---|---|---
SegLink [26] | 70.0 | 86.0 | 77.0 | 8.9
PixelLink [4] | 73.2 | 83.0 | 77.8 | -
TextSnake [19] | 73.9 | 83.2 | 78.3 | 1.1
TextField [37] | 75.9 | 87.4 | 81.3 | 5.2
MSR[38] | 76.7 | 87.4 | 81.7 | -
FTSN [3] | 77.1 | 87.6 | 82.0 | -
LSE[30] | 81.7 | 84.2 | 82.9 | -
CRAFT [2] | 78.2 | 88.2 | 82.9 | 8.6
MCN [17] | 79 | 88 | 83 | -
ATRR[35] | 82.1 | 85.2 | 83.6 | -
PAN [34] | 83.8 | 84.4 | 84.1 | 30.2
DB[12] | 79.2 | 91.5 | 84.9 | 32.0
DRRG [41] | 82.30 | 88.05 | 85.08 | -
Ours (Syn) | 80.68 | 85.40 | 82.97 | 12.68
Ours (MLT) | 84.54 | 86.62 | 85.57 | 12.31
MSRA-TD500. In testing, the threshold $th_{s}$ is set to 0.925. The
quantitative comparisons with other methods on this dataset is listed in Tab.
7. From Tab. 7, we can conclude that our method successfully detects long text
lines of arbitrary orientations and sizes. Notably, our method achieves
$85.57\%$ in terms of F-measure, which outperforms other sate-of-the-art
methods, such as DB [12], DRRG [41], _etc_.
## 5 Conclusion
In this paper, we propose a novel adaptive boundary proposal network for
arbitrary shape text detection, which adopt an boundary proposal model to
generate coarse boundary proposals, and then adopt an adaptive boundary
deformation model combined with GCN and RNN to perform iterative boundary
deformation to obtain the more accurate text instance shape. Extensive
experiments show that the proposed method can precisely detects the boundaries
of arbitrary shape text in challenging datasets. In future study, we are
interested in developing a real time method for text of arbitrary shapes based
on current work.
Acknowledgements. This work was supported in part by the National Key R&D
Program of China (2020AAA09701), National Natural Science Foundation of China
(62006018, 62076024).
## References
* [1] David Acuna, Huan Ling, Amlan Kar, and Sanja Fidler. Efficient interactive annotation of segmentation datasets with polygon-rnn++. In CVPR, pages 859–868, 2018.
* [2] Youngmin Baek, Bado Lee, Dongyoon Han, Sangdoo Yun, and Hwalsuk Lee. Character region awareness for text detection. In CVPR, pages 9365–9374, 2019.
* [3] Yuchen Dai, Zheng Huang, Yuting Gao, Youxuan Xu, Kai Chen, Jie Guo, and Weidong Qiu. Fused text segmentation networks for multi-oriented scene text detection. In ICPR, pages 3604–3609, 2018.
* [4] Dan Deng, Haifeng Liu, Xuelong Li, and Deng Cai. PixelLink: Detecting scene text via instance segmentation. In AAAI, pages 6773–6780, 2018.
* [5] Wei Feng, Wenhao He, Fei Yin, Xu-Yao Zhang, and Cheng-Lin Liu. Textdragon: An end-to-end framework for arbitrary shaped text spotting. In ICCV, pages 9075–9084, 2019.
* [6] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In CVPR, pages 770–778, 2016.
* [7] Wenhao He, Xu-Yao Zhang, Fei Yin, and Cheng-Lin Liu. Deep direct regression for multi-oriented scene text detection. In ICCV, pages 745–753, 2017.
* [8] Jie-Bo Hou, Xiaobin Zhu, Chang Liu, Kekai Sheng, Long-Huang Wu, Hongfa Wang, and Xu-Cheng Yin. HAM: hidden anchor mechanism for scene text detection. IEEE Trans. Image Process., 29:7904–7916, 2020.
* [9] Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. In ICLR, 2015.
* [10] Minghui Liao, Baoguang Shi, and Xiang Bai. Textboxes++: A single-shot oriented scene text detector. IEEE Trans.Image Processing, 27(8):3676–3690, 2018.
* [11] Minghui Liao, Baoguang Shi, Xiang Bai, Xinggang Wang, and Wenyu Liu. Textboxes: A fast text detector with a single deep neural network. In AAAI, pages 4161–4167, 2017.
* [12] Minghui Liao, Zhaoyi Wan, Cong Yao, Kai Chen, and Xiang Bai. Real-time scene text detection with differentiable binarization. In AAAI, pages 11474–11481, 2020.
* [13] Minghui Liao, Zhen Zhu, Baoguang Shi, Gui-Song Xia, and Xiang Bai. Rotation-sensitive regression for oriented scene text detection. In CVPR, pages 5909–5918, 2018.
* [14] Tsung-Yi Lin, Piotr Dollár, Ross B. Girshick, Kaiming He, Bharath Hariharan, and Serge J. Belongie. Feature pyramid networks for object detection. In CVPR, pages 936–944, 2017.
* [15] Huan Ling, Jun Gao, Amlan Kar, Wenzheng Chen, and Sanja Fidler. Fast interactive object annotation with curve-gcn. In CVPR, pages 5257–5266, 2019.
* [16] Wei Liu, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott E. Reed, Cheng-Yang Fu, and Alexander C. Berg. SSD: Single shot multibox detector. In ECCV, pages 21–37, 2016.
* [17] Zichuan Liu, Guosheng Lin, S.Yang, Jiashi Feng, Weisi Lin, and Wang Ling Goh. Learning markov clustering networks for scene text detection. In CVPR, pages 6936–6944, 2018.
* [18] Zichuan Liu, Guosheng Lin, Sheng Yang, Fayao Liu, Weisi Lin, and Wang Ling Goh. Towards robust curve text detection with conditional spatial expansion. In CVPR, pages 7269–7278, 2019.
* [19] Shangbang Long, Jiaqiang Ruan, Wenjie Zhang, Xin He, Wenhao Wu, and Cong Yao. Textsnake: A flexible representation for detecting text of arbitrary shapes. In ECCV, pages 19–35, 2018.
* [20] Pengyuan Lyu, Minghui Liao, Cong Yao, Wenhao Wu, and Xiang Bai. Mask TextSpotter: An end-to-end trainable neural network for spotting text with arbitrary shapes. In ECCV, pages 71–88, 2018.
* [21] Pengyuan Lyu, Cong Yao, Wenhao Wu, Shuicheng Yan, and Xiang Bai. Multi-oriented scene text detection via corner localization and region segmentation. In CVPR, pages 7553–7563, 2018.
* [22] Jianqi Ma, Weiyuan Shao, Hao Ye, Li Wang, Hong Wang, Yingbin Zheng, and Xiangyang Xue. Arbitrary-oriented scene text detection via rotation proposals. IEEE Trans. Multimedia, 20(11):3111–3122, 2018.
* [23] Sida Peng, Wen Jiang, Huaijin Pi, Xiuli Li, Hujun Bao, and Xiaowei Zhou. Deep snake for real-time instance segmentation. In CVPR, pages 8530–8539. IEEE, 2020.
* [24] Liang Qiao, Sanli Tang, Zhanzhan Cheng, Yunlu Xu, Yi Niu, Shiliang Pu, and Fei Wu. Text perceptron: Towards end-to-end arbitrary-shaped text spotting. In AAAI, pages 11899–11907, 2020.
* [25] Shaoqing Ren, Kaiming He, Ross B. Girshick, and Jian Sun. Faster R-CNN: Towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell., 39(6):1137–1149, 2017\.
* [26] Baoguang Shi, Xiang Bai, and Serge J. Belongie. Detecting oriented text in natural images by linking segments. In CVPR, pages 3482–3490, 2017.
* [27] Abhinav Shrivastava, Abhinav Gupta, and Ross B. Girshick. Training region-based object detectors with online hard example mining. In CVPR, pages 761–769, 2016.
* [28] Jun Tang, Zhibo Yang, Yongpan Wang, Qi Zheng, Yongchao Xu, and Xiang Bai. Seglink++: Detecting dense and arbitrary-shaped scene text by instance-aware component grouping. Pattern Recognition, 96, 2019.
* [29] Zhi Tian, Weilin Huang, Tong He, Pan He, and Yu Qiao. Detecting text in natural image with connectionist text proposal network. In ECCV, pages 56–72, 2016.
* [30] Zhuotao Tian, Michelle Shu, Pengyuan Lyu, Ruiyu Li, Chao Zhou, Xiaoyong Shen, and Jiaya Jia. Learning shape-aware embedding for scene text detection. In CVPR, pages 4234–4243, 2019.
* [31] Jianqiang Wan, Yang Liu, Donglai Wei, Xiang Bai, and Yongchao Xu. Super-bpd: Super boundary-to-pixel direction for fast image segmentation. In CVPR, pages 9250–9259. IEEE, 2020.
* [32] Hao Wang, Pu Lu, Hui Zhang, Mingkun Yang, Xiang Bai, Yongchao Xu, Mengchao He, Yongpan Wang, and Wenyu Liu. All you need is boundary: Toward arbitrary-shaped text spotting. In AAAI, pages 12160–12167, 2020.
* [33] Wenhai Wang, Enze Xie, Xiang Li, Wenbo Hou, Tong Lu, Gang Yu, and Shuai Shao. Shape robust text detection with progressive scale expansion network. In CVPR, pages 9336–9345, 2019.
* [34] Wenhai Wang, Enze Xie, Xiaoge Song, Yuhang Zang, Wenjia Wang, Tong Lu, Gang Yu, and Chunhua Shen. Efficient and accurate arbitrary-shaped text detection with pixel aggregation network. In ICCV, pages 8439–8448, 2019.
* [35] Xiaobing Wang, Yingying Jiang, Zhenbo Luo, Cheng-Lin Liu, Hyunsoo Choi, and Sungjin Kim. Arbitrary shape scene text detection with adaptive text region representation. In CVPR, pages 6449–6458, 2019.
* [36] Yuxin Wang, Hongtao Xie, Zheng-Jun Zha, Mengting Xing, Zilong Fu, and Yongdong Zhang. Contournet: Taking a further step toward accurate arbitrary-shaped scene text detection. In CVPR, pages 11753–11762, 2020.
* [37] Yongchao Xu, Yukang Wang, Wei Zhou, Yongpan Wang, Zhibo Yang, and Xiang Bai. Textfield: Learning a deep direction field for irregular scene text detection. IEEE Trans. Image Processing, 28(11):5566–5579, 2019.
* [38] Chuhui Xue, Shijian Lu, and Wei Zhang. MSR: multi-scale shape regression for scene text detection. In IJCAI, pages 989–995, 2019.
* [39] Xu-Cheng Yin, Wei-Yi Pei, Jun Zhang, and Hong-Wei Hao. Multi-orientation scene text detection with adaptive clustering. IEEE Trans. Pattern Anal. Mach. Intell., 37(9):1930–1937, 2015\.
* [40] Chengquan Zhang, Borong Liang, Zuming Huang, Mengyi En, Junyu Han, Errui Ding, and Xinghao Ding. Look more than once: An accurate detector for text of arbitrary shapes. In CVPR, pages 10552–10561, 2019.
* [41] Shi-Xue Zhang, Xiaobin Zhu, Jie-Bo Hou, Chang Liu, Chun Yang, Hongfa Wang, and Xu-Cheng Yin. Deep relational reasoning graph network for arbitrary shape text detection. In CVPR, pages 9699–9708, 2020.
* [42] Xinyu Zhou, C.Yao, He Wen, Yuzhi Wang, Shuchang Zhou, Weiran He, and Jiajun Liang. EAST: An efficient and accurate scene text detector. In CVPR, pages 2642–2651, 2017.
| arxiv-papers | 2021-07-27T08:25:24 | 2024-09-04T03:07:20.906384 | {
"license": "Creative Commons - Attribution Share-Alike - https://creativecommons.org/licenses/by-sa/4.0/",
"authors": "Shi-Xue Zhang, Xiaobin Zhu, Chun Yang, Hongfa Wang, Xu-Cheng Yin",
"submitter": "Shi-Xue Zhang",
"url": "https://arxiv.org/abs/2107.12664"
} |
2107.12668 | # Next-Generation Multiple Access Based on NOMA with Power Level Modulation
Xinyue Pei, Yingyang Chen, Miaowen Wen, Hua Yu,
Erdal Panayirci, and H. Vincent Poor,
X. Pei, M. Wen, and H. Yu are with the National Engineering Technology
Research Center for Mobile Ultrasonic Detection, South China University of
Technology, Guangzhou 510640, China (e-mail: [email protected];
{eemwwen, yuhua}@scut.edu.cn).Y. Chen is with Department of Electronic
Engineering, College of Information Science and Technology, Jinan University,
Guangzhou (e-mail: [email protected]).E. Panayirci is with the Department of
Electrical and Electronics Engineering, Kadir Has University, 34083 Istanbul,
Turkey (e-mail: [email protected]).H. V. Poor is with the Department of
Electrical and Computer Engineering, Princeton University, Princeton, NJ 08544
USA (e-mail: [email protected]).
###### Abstract
To cope with the explosive traffic growth of next-generation wireless
communications, it is necessary to design next-generation multiple access
techniques that can provide higher spectral efficiency as well as larger-scale
connectivity. As a promising candidate, power-domain non-orthogonal multiple
access (NOMA) has been widely studied. In conventional power-domain NOMA,
multiple users are multiplexed in the same time and frequency band by
different preset power levels, which, however, may limit the spectral
efficiency under practical finite alphabet inputs. Inspired by the concept of
spatial modulation, we propose to solve this problem by encoding extra
information bits into the power levels, and exploit different signal
constellations to help the receiver distinguish between them. To convey this
idea, termed power selection (PS)-NOMA, clearly, we consider a simple downlink
two-user NOMA system with finite input constellations. Assuming maximum-
likelihood detection, we derive closed-form approximate bit error ratio (BER)
expressions for both users. The achievable rates of both users are also
derived in closed form. Simulation results verify the analysis and show that
the proposed PS-NOMA outperforms conventional NOMA in terms of BER and
achievable rate.
###### Index Terms:
Bit error rate, next-generation multiple access (NGMA), achievable rate,
finite alphabet input, non-orthogonal multiple access (NOMA).
## I Introduction
Future wireless networks, such as beyond fifth-generation (B5G) or sixth-
generation (6G) networks, are expected to support extremely high data rates
and numerous users or nodes with various applications and services
[References]. However, the conventional orthogonal access (OMA) schemes used
in the previous wireless generations cannot meet these unprecedented demands,
limiting the improvement of the overall spectral efficiency (SE). Against the
background, non-orthogonal multiple access (NOMA) was proposed, which allows
numerous users to share the same resource (e.g., a time/frequency resource
block) and separate the users in power and code domains at the expense of
additional receiver complexity [References], [References]. In the power-domain
NOMA, users are typically multiplexed with different power levels by using
superposition coding at the transmitter and are distinguished through
successive interference cancellation (SIC) at the receiver [References],
[References]. Compared with OMA, NOMA has higher significant system throughput
and greater fairness [References]-[References]. Due to these advantages, NOMA
has been recognized as a critical technology by the third-generation
partnership project (3GPP) for future wireless networks [References].
It is worth noting that the majority of existing NOMA schemes assume Gaussian
input signals [References]-[References]. Although Gaussian inputs can
theoretically attain the channel capacity, the corresponding implementation
faces many difficulties, e.g., very large storage capacity, high computational
complexity, and extremely long decoding delay [References]. Applying the
results derived from the Gaussian inputs to the signals with finite alphabet
inputs, e.g., pulse amplitude modulation (PAM), can result in a significant
performance loss [References]. Motivated by this situation, some researchers
have considered finite alphabet inputs [References]-[References]. In
particular, the authors of [References] studied NOMA-aided two-user Gaussian
multiple access channels (MACs) with finite complex input constellations, and
the constellation-constrained capacity region of the proposed scheme was
derived. Moreover, they designed a constellation rotation (CR) scheme for
$M$-ary phase shift keying (PSK) and $M$-PAM signals. In [References], the
same authors proposed a novel power allocation scheme for the model in
[References], which can achieve similar performance as the CR scheme while
reducing the decoding complexity for quadrature amplitude modulation (QAM)
constellations. The authors of [References] developed a novel framework for a
classical two-transmitter two-receiver NOMA system over Z-channels with QAM
and max-min user fairness based on the aforementioned two studies.
Specifically, they formulated a max-min optimization problem to maximize the
smaller minimum Euclidean distance among the two resulting signal
constellations at both receivers. Similarly, in [References], the authors
considered a classical two-user MAC with NOMA and practical QAM
constellations, aiming at maximizing the minimum Euclidean distance of the
received sum constellation with a maximum likelihood (ML) detector by
controlling transmitted powers and phases of users.
On the other hand, spatial modulation (SM) has been regarded as another
promising multi-antenna technique of improving SE for next-generation wireless
networks [References]. Unlike conventional multiple-input multiple-output
(MIMO), SM selects only one activated antenna for each transmission, thus
avoiding inter-antenna interference and the requirement of multiple radio
frequency (RF) chains. Hence, SM systems can achieve reduced implementation
cost and complexity. Precisely, in SM systems, the transmitted information
consists of the index of an active antenna and a modulated symbol. Clearly,
combining NOMA with SM (termed SM-NOMA) will further improve system SE without
increasing the power consumption and implementation complexity. Therefore, SM-
NOMA has been exploited extensively in recent years, and capacity or BER
performance analysis is the focus of many works [References]-[References]. In
[References], an iterative algorithm for the spatial-domain design was
proposed to maximize the instantaneous capacity of SM-NOMA. The authors of
[References] applied SM-NOMA in wireless vehicle-to-vehicle (V2V)
environments. Moreover, they analyzed closed-form capacity expressions, and
BER performance via Monte Carlo simulations and formulated a pair of power
allocation optimization schemes for the system. In [References], the authors
studied the BER and capacity performance of a novel three-node cooperative
relaying system using SM-aided NOMA. Notably, all the above mentioned works
focused on Gaussian input, which do not apply to finite input constellations.
Few researchers have considered finite alphabet inputs in SM-NOMA systems
[References]-[References]. The authors of [References], [References] proposed
and studied the respective SM-NOMA systems from their mutual information (MI)
perspective. Since the MI lacks a closed-form formulation, they proposed a
lower bound to quantify it. In [References], an SM aided cooperative NOMA
scheme with bit allocation was studied, and its SE was analyzed. The authors
of [References] mainly investigated the fundamental applicability of SM for
multi-antenna channels and found intrinsic cooperation for constructing
energy-efficient finite-alphabet NOMA.
However, to the best of our knowledge, all works about SM-NOMA simply
considered transmitting NOMA signals in SM systems. In other words, they did
not change NOMA itself. Conversely, how can we use an SM-like idea to design a
novel NOMA scheme and improve its performance? Furthermore, will we be able to
design the transmit power to achieve effects similar to the spatial gain in
SM-NOMA? At the time of writing, no work has solved this problem. Against the
background, in this paper, we propose a novel downlink NOMA scheme using power
selection (PS) with finite-alphabet inputs, termed PS-NOMA, over Rayleigh
fading channels, which consists of one BS and two users. At the transmitter,
except for the PAM symbols intended for the users, we also design the transmit
power into the codebook, thus increasing the number of bits transmitted. The
main contributions of this paper are summarized as follows:
* •
We design a novel PS-NOMA scheme for the classical two-user downlink channel,
where the transmitter randomly chooses transmit power from the preset power
matrix. Nevertheless, PS makes both transmission and decoding different from
previous works. To this end, we design specific constellations and the ML
detector for the proposed scheme. We further discuss the influence caused by
different configurations of the power matrix and give the optimal order of the
matrix. Moreover, we calculate the best design for the power matrix based on
the minimum Euclidean distance of the constellation.
* •
The performance of PS-NOMA is theoretically analyzed in terms of BER and
achievable rate. We derive closed-form achievable rate expressions for PS-
NOMA. Since it is difficult to derive exact BER expressions, approximate
closed-form BER expressions are derived for users employing $M$-ary PAM
instead, which well match with the simulation counterparts. It is worth noting
that all derived results are restricted to specific constellations and
Rayleigh fading channels.
* •
Monte Carlo simulations are performed to verify the theoretical analysis. In
consideration of fairness, conventional NOMA without PS (termed NOMA) is used
as a benchmark. Simulation results show that PS-NOMA outperforms NOMA in terms
of BER and achievable rate.
The rest of this paper is organized as follows. Section II describes the
system model of PS-NOMA. Section III provides the achievable rate and BER
analyses. Section IV analyzes the numerical results. Finally, we conclude the
work in Section V.
_Notation_ : The probability of an event and the probability density function
(PDF) of a random variable are denoted by $\Pr(\cdot)$ and $p(\cdot)$,
respectively. $Q(\cdot)$, $\Gamma(\cdot)$, $\mathbb{E}\\{\cdot\\}$, and
$\text{Var}\\{\cdot\\}$ denote the Gaussian Q-function, gamma function,
expectation, and variance, respectively. $|\cdot|$ denotes the absolute value
of a complex scalar. $\lfloor\cdot\rfloor$ denotes the floor function.
$\mathcal{R}\\{\cdot\\}$ indicates the real part of a complex value.
Superscript $*$ stands for complex conjugates. ${\rm{I}}(\cdot)$ denotes MI,
and ${\rm H}(\cdot|\cdot)$ denotes entropy. Finally,
$x\sim\mathcal{N}_{c}(\mu_{x},\beta_{x})$ indicates that the random variable
$x$ obeys a complex Gaussian distribution with mean $\mu_{x}$ and variance
$\beta_{x}$.
## II System Model
Figure 1: System model with 2 users and $N=2$. Figure 2: Constellation
$\mathcal{S}_{C}(i)$ ($i\in\\{1,\cdots,8\\}$) of superimposed signal
transmitted with 2-PAM signals $s_{A}$ as well as $s_{B}$ and $N=2$.
### II-A Transmission Model
Before introducing PS-NOMA, let us recall the conventional downlink two-user
NOMA system first. In such a system, the base station (denoted by BS)
transmits a superimposed signal to the users. Based on the NOMA protocol, this
signal consists of the data symbols desired by both users, and the power
allocated to the symbols. In conventional NOMA systems, information is carried
out only by data symbols. However, the power allocation coefficients contained
in the superimposed signal can also be utilized to carry information by
appropriate design.
Based on this idea, we consider a downlink PS-NOMA network as illustrated in
Fig. 1, which consists of a BS, a near user (denoted by $U_{A}$), a far user
(denoted by $U_{B}$). All the nodes are equipped with a single antenna. The
channels of BS$\rightarrow U_{A}$ and BS$\rightarrow U_{B}$ are respectively
denoted by $h_{A}$ and $h_{B}$, which are assumed to follow
$\mathcal{N}_{c}(0,\beta_{A})$ and $\mathcal{N}_{c}(0,\beta_{B})$
distributions. Notably, in our system, all the nodes are assumed to be
synchronous in both time and frequency. Moreover, complete and perfect channel
state information (CSI) is assumed to be available to users. Unlike
conventional NOMA, we obtain a spectral efficiency gain by selecting a power
level (PL) at the transmitter. Similar to the SM, a PL is chosen from a set of
PLs $N$ at random where $N=2^{k}$, $k=1,2,\ldots$, so that each PL carries
$\log_{2}(N)$ bits of information in addition to the amount of information
carried by the transmitted data symbols. Noticing that $U_{A}$ is the near
user and $U_{B}$ is the far user, we have $\beta_{A}\geq\beta_{B}$, and the
power allocated to $U_{A}$ should be smaller than that assigned to $U_{B}$
according to the principle of NOMA [References]. In this manner, the transmit
power allocation coefficient matrix can be written as
$\displaystyle\textbf{P}=\left[\begin{array}[]{cc}\sqrt{p_{A}(1)},&\sqrt{1-p_{A}(1)}\\\
\sqrt{p_{A}(2)},&\sqrt{1-p_{A}(2)}\\\ \cdots&\cdots\\\
\sqrt{p_{A}(N)},&\sqrt{1-p_{A}(N)}\\\ \end{array}\right],$ (5)
where the first ($0<p_{A}(l)<0.5$, $l\in\\{1,\ldots,N\\}$) and the second
columns represent the power allocation coefficient for $U_{A}$ and $U_{B}$,
respectively, and different rows represent different PLs. To ensure the PLs
are distinguishable, we deliberately rotate each PL with a certain angle,
which is given by
$\bm{\Theta}=\text{diag}(\exp(0),\exp(j\pi/N),\cdots,\exp(j(N-1)\pi/N))$.
Therefore, the rotated power allocation coefficient matrix can be derived as
$\displaystyle\textbf{G}=\bm{\Theta}\textbf{P}=\left[\begin{array}[]{cc}\alpha_{A}(1),&\alpha_{B}(1)\\\
\alpha_{A}(2),&\alpha_{B}(2)\\\ \cdots&\cdots\\\
\alpha_{A}(N),&\alpha_{B}(N)\\\ \end{array}\right],$ (10)
where $\alpha_{A}(l)=\exp(j(l-1)\pi/N)p_{A}(l)$ and
$\alpha_{B}(l)=\exp(j(l-1)\pi/N)(1-p_{A}(l))$.
During each transmission, the BS first chooses the PL $l\in\mathcal{N}$
$(\mathcal{N}={1,2,\cdots,N})$ as the transmit power. Subsequently, it conveys
the superposition coded symbol
$\displaystyle s_{C}=\alpha_{A}(l)s_{A}+\alpha_{B}(l)s_{B}$ (11)
to $U_{A}$ and $U_{B}$ simultaneously, where $s_{A}\in\mathcal{S}_{A}$ and
$s_{B}\in\mathcal{S}_{B}$ are the data symbols intended for $U_{A}$ and
$U_{B}$, respectively. We assume that $s_{A}$ and $s_{B}$ are $M_{A}$-ary PAM
and $M_{B}$-ary PAM symbols with
$\mathbb{E}\\{|s_{A}|^{2}\\}=\mathbb{E}\\{|s_{B}|^{2}\\}=1$;
$\displaystyle\mathcal{S}_{A}=\\{\pm d_{A},\pm
3d_{A},\cdots,\pm(2M_{A}-1)d_{A}\\}$ (12)
and
$\displaystyle\mathcal{S}_{B}=\\{\pm d_{B},\pm
3d_{B},\cdots,\pm(2M_{B}-1)d_{B}\\}$ (13)
are the corresponding $M_{A}$ and $M_{B}$ points constellations, respectively,
where $d_{A}=\sqrt{3/(M_{A}^{2}-1)}$ and $d_{B}=\sqrt{3/(M_{B}^{2}-1)}$
respectively represent half of the minimum distance between two adjacent
points of the normalized $M_{A}$-PAM and $M_{B}$-PAM constellations. Let
$\mathcal{M}_{i}=\\{1,2,\cdots,M_{i}\\}$ ($i\in\\{A,B\\}$), the signal
constellation of $s_{C}$ can be expressed as
$\displaystyle\mathcal{S}_{C}=\\{s_{C}|s_{i}=\mathcal{S}_{i}(k_{i}),{\rm{PL}}=l,k_{i}\in\mathcal{M}_{i},l\in\mathcal{N},i\in\\{A,B\\}\\},$
(14)
which is an irregular $M_{A}M_{B}N$-ary constellation, as shown in Fig. 2.
Consequently, the received signals at $U_{A}$ and $U_{B}$ can be given by
$\displaystyle y_{A}=h_{A}s_{C}+n_{A}$ (15)
and
$\displaystyle y_{B}=h_{B}s_{C}+n_{B},$ (16)
respectively, where $n_{A}\sim\mathcal{N}_{c}(0,N_{0})$
($n_{B}\sim\mathcal{N}_{c}(0,N_{0})$) indicates the additive white Gaussian
noise (AWGN) at $U_{A}$ ($U_{B}$) with power spectral density $N_{0}$.
Figure 3: Constellations of $s_{B}$ with $N=2$, where $s_{B}$ is a 2-PAM
symbol, and $\mathcal{S}_{B}^{R}$ denotes the union constellation of $s_{B}$
and PL. $\mathcal{S}_{B}^{R}(1),\mathcal{S}_{B}^{R}(3):s_{B}=-1$,
$\mathcal{S}_{B}^{R}(2),\mathcal{S}_{B}^{R}(4):s_{B}=1$. Figure 4:
Constellation of 2-PAM signal $s_{A}$. Algorithm 1 Detection Algorithm
1:for $U_{A}$ do
2: Compare the received signal $y_{A}$ with the joint constellation
$\mathcal{S}_{B}^{R}$:
$\displaystyle\mathcal{S}_{B}^{R}(\hat{i})=\mathop{\arg\min\limits_{i}}|y_{A}-h_{A}\mathcal{S}_{B}^{R}(i)|^{2},$
(17) where $i\in\\{1,\cdots,NM_{B}\\}$, and $\hat{i}$ is the estimate of $i$
at $U_{A}$.
3: Determine active PL $\hat{l}$ and the transmitted signal $\hat{s}_{B}$ by
resolving $\mathcal{S}_{B}^{R}(\hat{i})$, where $\hat{s}_{B}$ and $\hat{l}$
are the estimates of $s_{B}$ and $l$ at $U_{A}$.
4: Use SIC to decode $s_{A}$, whose ML detector can be expressed as
$\displaystyle\hat{s}_{A}=\mathop{\arg\min\limits_{s_{A}}}|y_{A}-h_{A}\alpha_{B}(\hat{l})\hat{s}_{B}-h_{A}\alpha_{A}(\hat{l})s_{A}|^{2},$
(18) where $\hat{s}_{A}$ is the estimate of $s_{A}$ at $U_{A}$.
5:end for
6:for $U_{B}$ do
7: Compare the received signal $y_{B}$ with the joint constellation
$\mathcal{S}_{B}^{R}$:
$\displaystyle\mathcal{S}_{B}^{R}(\hat{i})=\mathop{\arg\min\limits_{i}}|y_{B}-h_{A}\mathcal{S}_{B}^{R}(i)|^{2},$
(19) where $i\in\\{1,\cdots,NM_{B}\\}$, and $\hat{i}$ is the estimate of $i$
at $U_{B}$.
8: Determine active PL $\hat{l}$ and the transmitted signal $\hat{s}_{B}$ by
resolving $\mathcal{S}_{B}^{R}(\hat{i})$, where $\hat{s}_{B}$ and $\hat{l}$
are the estimates of $s_{B}$ and $l$ at $U_{B}$.
9:end for
### II-B Signal Decoding
The above subsection describes the transmission model of PS-NOMA. Now we shift
our focus to the decoding process. Before the following description, we need
to first clarify which data symbol gets the information of the PL. _In this
paper, we use the information of PL to enhance the performance of $U_{B}$. In
other scenarios, it can also be used to improve the performance of $U_{A}$_.
It is assumed that both users invoke ML detectors to decode their signals. As
we know, PL is an important factor affecting the decoding procedure because it
is closely related to SIC and the decoding of data symbols. In conventional
NOMA scheme, whose PLs are fixed, the users already know the values of PLs
when decoding. While in PS-NOMA, PLs change over time and are unknown at the
users. Hence, the conventional ML detector cannot be applied directly in PS-
NOMA, and we should also decode PL at both users. Under the NOMA protocol,
$U_{A}$ first decodes $s_{B}$ and $l$; for $U_{B}$, it detects $s_{B}$ and $l$
by treating $s_{A}$ as noise. We herein use the joint constellation of $s_{B}$
and PL to help decoding. For example, in the case of $N=2$ and 2-PAM $s_{B}$
as shown in Fig. 3, a combined 4-ary constellation is formed with four points,
i.e.,
$\displaystyle\mathcal{S}_{B}^{R}(i)=\\{s_{B}=\pm
1,l=1,\,2\\},i\in\\{1,\cdots,4\\}.$ (20)
Explicitly, the information of $s_{B}$ and PL is contained in each point of
the constellation. If the received signal after equalization is close to
$\mathcal{S}_{B}^{R}(1)$, we can readily know the estimated $s_{B}=-1$ and
$l=1$. With these information, $U_{A}$ then subtracts the estimated $s_{B}$
and decodes its own signal, and this procedure can be seen as a common 2-PAM
signal decoding as shown in Fig. 4. The detailed detection algorithm for both
users are summarized in Algorithm 1.
## III Performance Analysis
In this section, we theoretically analyze the performance of the proposed PS-
NOMA scheme in terms of achievable rate and BER. Moreover, we discuss the
optimal design of $N$ and G.
### III-A Achievable Rate Analysis
For convenience, we let $\\{a,b,l\\}$ ($a\in\mathcal{M}_{A}$,
$b\in\mathcal{M}_{B}$, $l\in\mathcal{N}$) denote
$(\alpha_{A}(l)\mathcal{S}_{A}(a)+\alpha_{B}(l)\mathcal{S}_{B}(b))$. It is
considered that all PLs are activated equally likely for PS-NOMA.
#### III-A1 Achievable Rate Analysis of $U_{B}$
It follows from the chain rule that
$\displaystyle{\rm{I}}(s_{B},{\rm{PL}};y_{B})={\rm{I}}(s_{B};y_{B}|{\rm{PL}})\it+{\rm{I}}({\rm{PL}}\it;y_{B}).$
(21)
Therefore, we deal with the calculations of ${\rm{I}}(s_{B};y_{B}|{\rm{PL}})$
and ${\rm{I}}({\rm{PL}};y_{B})$ in the following. Specifically, we have
$\displaystyle{\rm{I}}(s_{B};y_{B}|{\rm{PL}})={\rm{H}}(\it
y_{B}|{\rm{PL}})-{\rm{H}}(\it y_{B}|s_{B},{\rm{PL}}),$ (22)
where
$\displaystyle{\rm{H}}(y_{B}|{\rm{PL}})=\frac{1}{N}\sum_{l=1}^{N}{\rm{H}}(y_{B}|{\rm{PL}}=l)$
(23)
and
$\displaystyle{\rm{H}}(y_{B}|s_{B},{\rm{PL}})=\frac{1}{NM_{B}}\sum_{k_{B}=1}^{M_{B}}\sum_{l=1}^{N}{\rm{H}}(y_{B}|s_{B}=\mathcal{S}_{B}(k_{B}),{\rm{PL}}=l).$
(24)
Here, ${\rm{H}}(y_{B}|{\rm{PL}}=l)$ and
${\rm{H}}(y_{B}|s_{B}=\mathcal{S}_{B}(k_{B}),{\rm{PL}}=l)$ can be respectively
given by
$\displaystyle{\rm{H}}(y_{B}|{\rm{PL}}=l)=\int
p(y_{B}|{\rm{PL}}=l)\log_{2}(p(y_{B}|{\rm{PL}}=l))dy_{B}$
$\displaystyle=-\frac{\sum_{k_{A}=1}^{M_{A}}\\!\sum_{k_{B}=1}^{M_{B}}\\!\sum_{l=1}^{N}\\!\log_{2}\left({\sum_{i_{A}=1}^{M_{A}}\\!\sum_{i_{B}=1}^{M_{B}}\\!p(y_{B}|s_{A}=\mathcal{S}_{A}(i_{A}),s_{B}=\mathcal{S}_{B}(i_{B}),{\rm{PL}}=l)}/{M_{A}M_{B}}\right)}{M_{A}M_{B}N}$
(25)
and
$\displaystyle
H(y_{B}|s_{B}\\!=\\!\mathcal{S}_{B}(k_{B}),{\rm{PL}}\\!=\\!l)\\!\\!=\\!\\!\int\\!\\!p(y_{B}|s_{B}\\!=\\!\mathcal{S}_{B}(k_{B}),\\!{\rm{PL}}\\!=\\!l)\log_{2}(p(y_{B}|s_{B}=\mathcal{S}_{B}(k_{B}),{\rm{PL}}=l))dy_{B}$
$\displaystyle=-\frac{\sum_{k_{A}=1}^{M_{A}}\sum_{k_{B}=1}^{M_{B}}\sum_{l=1}^{N}\log_{2}\left({\sum_{i_{A}=1}^{M_{A}}p(y_{B}|s_{A}=\mathcal{S}_{A}(i_{A}),s_{B}=\mathcal{S}_{B}(k_{B}),{\rm{PL}}=l)}/{M_{A}}\right)}{M_{A}M_{B}N}.$
(26)
Substituting (III-A1), (III-A1), and
$\displaystyle
p(y_{B}|s_{A}=\mathcal{S}_{A}(i_{A}),s_{B}=\mathcal{S}_{B}(i_{B}),{\rm{PL}}=l)=\frac{1}{\pi
N_{0}}\exp\left(-\frac{|y_{B}-h_{B}\\{i_{A},i_{B},l\\}|^{2}}{N_{0}}\right)$
(27)
into (22), ${\rm{I}}(s_{B};y_{B}|{\rm{PL}})$ can be given by
$\displaystyle{\rm{I}}(s_{B};y_{B}|{\rm{PL}})=\log_{2}(M_{B})-\frac{1}{M_{A}M_{B}N}$
$\displaystyle\times\sum_{k_{A}=1}^{M_{A}}\sum_{k_{B}=1}^{M_{B}}\sum_{l=1}^{N}\mathbb{E}\left\\{\log_{2}\left(\frac{\sum_{i_{A}=1}^{M_{A}}\sum_{i_{B}=1}^{M_{B}}\exp(-|h_{B}\\{k_{A},k_{B},l\\}-h_{B}\\{i_{A},i_{B},l\\}+n_{B}|^{2}/N_{0})}{\sum_{i_{A}=1}^{M_{A}}\exp(-|h_{B}\\{k_{A},k_{B},l\\}-h_{B}\\{i_{A},k_{B},l\\}+n_{B}|^{2}/N_{0})}\right)\right\\}.$
(28)
In this manner, ${\rm{I}}({\rm{PL}};y_{B})$ can also be derived as
$\displaystyle{\rm{I}}({\rm{PL}};y_{B})={\rm{H}}(y_{B})-{\rm{H}}(y_{B}|{\rm{PL}})$
$\displaystyle=\log_{2}(N)+\frac{1}{M_{A}M_{B}N}$
$\displaystyle\times\sum_{k_{A}=1}^{M_{A}}\\!\sum_{k_{B}=1}^{M_{B}}\\!\sum_{l=1}^{N}\mathbb{E}\left\\{\log_{2}\left(\frac{\sum_{i_{A}=1}^{M_{A}}\\!\sum_{i_{B}=1}^{M_{B}}\\!\exp(\\!-\\!|h_{B}\\{k_{A},k_{B},l\\}\\!\\!-\\!\\!h_{B}\\{i_{A},i_{B},l\\}\\!\\!+\\!\\!n_{B}|^{2}/N_{0})}{\sum_{i_{A}=1}^{M_{A}}\\!\sum_{i_{B}=1}^{M_{B}}\\!\sum_{ll=1}^{N}\\!\exp(\\!-\\!|h_{B}\\{k_{A},k_{B},l\\}\\!\\!-\\!\\!h_{B}\\{i_{A},i_{B},ll\\}\\!\\!+\\!\\!n_{B}|^{2}/N_{0})}\right)\right\\}.$
(29)
#### III-A2 Achievable Rate Analysis of $U_{A}$
Different from $U_{B}$, $U_{A}$ detects its own signal after removing the
interference imposed by $U_{B}$. By invoking a similar mathematical method,
the achievable rate for $U_{A}$ detecting $s_{B}$ is given by
$\displaystyle{\rm{I}}(s_{B},{\rm{PL}};y_{A})={\rm{I}}(s_{B};y_{A}|{\rm{PL}})+{\rm{I}}({\rm{PL}};y_{A}),$
(30)
where ${\rm{I}}(s_{B};y_{A}|{\rm{PL}})$ and ${\rm{I}}({\rm{PL}};y_{A})$ can be
respectively derived as
$\displaystyle{\rm{I}}(s_{B};y_{A}|{\rm{PL}})=\log_{2}(M_{B})-\frac{1}{M_{A}M_{B}N}$
$\displaystyle\times\sum_{k_{A}=1}^{M_{A}}\sum_{k_{B}=1}^{M_{B}}\sum_{l=1}^{N}\mathbb{E}\left\\{\log_{2}\left(\frac{\sum_{i_{A}=1}^{M_{A}}\sum_{i_{B}=1}^{M_{B}}\exp(-|h_{A}\\{k_{A},k_{B},l\\}-h_{A}\\{i_{A},i_{B},l\\}+n_{A}|^{2}/N_{0})}{\sum_{i_{A}=1}^{M_{A}}\exp(-|h_{A}\\{k_{A},k_{B},l\\}-h_{A}\\{i_{A},k_{B},l\\}+n_{A}|^{2}/N_{0})}\right)\right\\}$
(31)
and
$\displaystyle{\rm{I}}({\rm{PL}};y_{A})=\log_{2}(N)+\frac{1}{M_{A}M_{B}N}$
$\displaystyle\times\\!\\!\sum_{k_{A}=1}^{M_{A}}\\!\sum_{k_{B}=1}^{M_{B}}\\!\sum_{l=1}^{N}\\!\mathbb{E}\left\\{\log_{2}\left(\frac{\sum_{i_{A}=1}^{M_{A}}\\!\sum_{i_{B}=1}^{M_{B}}\\!\exp(\\!-\\!|h_{A}\\{k_{A},k_{B},l\\}\\!-\\!h_{A}\\{i_{A},i_{B},l\\}\\!+\\!n_{A}|^{2}\\!/\\!N_{0})}{\sum_{i_{A}=1}^{M_{A}}\\!\sum_{i_{B}=1}^{M_{B}}\\!\sum_{ll=1}^{N}\\!\exp(-|h_{A}\\{k_{A},k_{B},l\\}\\!-\\!h_{A}\\{i_{A},i_{B},ll\\}\\!+\\!n_{A}|^{2}\\!/\\!N_{0})}\right)\right\\}.$
(32)
With the detected PL, the achievable rate for $U_{A}$ detecting $s_{A}$, i.e.,
${\rm{I}}(s_{A};y_{A}|{\rm{PL}})$ can be derived as
$\displaystyle{\rm{I}}(s_{A};y_{A}|{\rm{PL}})=\log_{2}(M_{A})-\frac{1}{M_{A}N}$
$\displaystyle\times{\sum_{k_{A}=1}^{M_{A}}\sum_{l=1}^{N}}\mathbb{E}\left\\{\log_{2}\left(\frac{\sum_{i_{A}=1}^{M_{A}}\exp\left(|h_{A}\alpha_{A}(l)(\mathcal{S}_{A}(k_{A})-\mathcal{S}_{A}(i_{A}))+n_{A}|^{2}/N_{0}\right)}{\exp\left(-|n_{A}|^{2}/N_{0}\right)}\right)\right\\}.$
(33)
### III-B BER Analysis
In this subsection, closed-form BER expressions are derived for $U_{A}$ and
$U_{B}$ in PS-NOMA systems.
#### III-B1 BER of $U_{B}$
To obtain the BER of $U_{B}$, we should derive the symbol error ratio (SER) of
$s_{B}$ at $U_{B}$ first. Similar to [References], [References], we utilize
the conditional pairwise error probability (PEP), which indicates the
probability of detecting $s_{B}$ as $\hat{s}_{B}$ conditioned on $h_{B}$,
namely
$\displaystyle\Pr(s_{B}\to\hat{s}_{B}|h_{B})$
$\displaystyle=\Pr(|y_{B}-h_{B}\alpha_{B}(l)s_{B}|^{2}>|y_{B}-h_{B}\alpha_{B}(\hat{l})\hat{s}_{B}|^{2})$
$\displaystyle\overset{(a)}{=}\Pr(|h_{B}x_{B}|^{2}-|h_{B}\hat{x}_{B}|^{2}-2\mathcal{R}\\{y_{B}^{*}h_{B}(x_{B}-\hat{x}_{B})\\}>0)$
$\displaystyle\overset{(b)}{=}\Pr(-|h_{B}\triangle
x_{B}|^{2}-2\mathcal{R}\\{w_{B}^{*}h_{B}\triangle x_{B}\\}>0)$
$\displaystyle\overset{(c)}{=}Q\left(\sqrt{\frac{|h_{B}|^{2}(|\triangle
x_{B}|^{2}+2\mathcal{R}\\{x_{A}^{*}\triangle x_{B}\\})^{2}}{2N_{0}|\triangle
x_{B}|^{2}}}\right)$
$\displaystyle\overset{(d)}{=}Q\left(\sqrt{\frac{|h_{B}|^{2}}{2N_{0}^{\rm{equal}}}}\right),$
(34)
where we define in $(a)$ ${x}_{B}\triangleq\alpha_{B}({l}){s}_{B}$ and
$\hat{x}_{B}\triangleq\alpha_{B}(\hat{l})\hat{s}_{B}$; in $(b)$
$w_{B}=h_{B}\alpha_{A}(l)s_{A}+n_{B}=h_{B}x_{A}+n_{B}$, with
$x_{A}\triangleq\alpha_{A}({l}){s}_{A}$, and $\triangle
x_{B}=x_{B}-\hat{x}_{B}$; the detailed derivation of $(c)$ is present in
Appendix A; $(d)$ is obtained by defining equivalent noise variance as
$\displaystyle N_{0}^{\rm{equal}}\triangleq\frac{N_{0}|\triangle
x_{B}|^{2}}{(|\triangle x_{B}|^{2}+2\mathcal{R}\\{x_{A}^{*}\triangle
x_{B}\\})^{2}}.$ (35)
Since we model $h_{B}$ as a complex Gaussian random variable, $|h_{B}|^{2}$
has a PDF
$\displaystyle
p_{|h_{B}|^{2}}(x)=\frac{1}{\beta_{B}}\exp\left(-\frac{x}{\beta_{B}}\right).$
(36)
With $p_{|h_{B}|^{2}}(x)$, we can arrive at [References, Eq. (64)]
$\displaystyle\Pr(s_{B}\to\hat{s}_{B})$
$\displaystyle=\int_{0}^{+\infty}\Pr(s_{B}\to\hat{s}_{B}|h_{B})p_{|h_{B}|^{2}}(x)dx$
$\displaystyle=\int_{0}^{+\infty}Q\left(\sqrt{\frac{|h_{B}|^{2}}{2N_{0}^{\rm{equal}}}}\right)p_{|h_{B}|^{2}}(x)dx$
$\displaystyle=\frac{1}{2}\left(1-\sqrt{\frac{\beta_{B}}{4N_{0}^{\rm{\rm{equal}}}+\beta_{B}}}\right),$
(29)
which can be averaged over all the possible values of $x_{A}^{*}$ to consider
all interference scenarios. Notably, $x_{A}$ herein should keep the same PL as
$x_{B}$. Let $P_{ij,B}^{\rm{bit}}$ denote the number of error bits when symbol
$\mathcal{S}_{B}^{R}(i)$ is incorrectly detected as $\mathcal{S}_{B}^{R}(j)$.
Since $s_{B}$ and PL have $\log_{2}(NM_{B})$ bits, the BER of $s_{B}$ and PL
detections at $U_{B}$ can be approximated by
$\displaystyle P_{B}$
$\displaystyle\approx\frac{1}{NM_{B}\log_{2}(NM_{B})}\sum_{i=1}^{NM_{B}}\sum_{j\neq
i}\Pr(\mathcal{S}_{B}^{R}(i)\to\mathcal{S}_{B}^{R}(j))P_{ij,B}^{\rm{bit}}.$
(30)
#### III-B2 BER of $U_{A}$
Recall the ML detection in (17) and (18). $U_{A}$ first decodes PL as well as
$s_{B}$ and extracts $s_{B}$ from the received signal $y_{A}$ and then decodes
$s_{A}$ from the residual signal. Obviously, the overall BER can be divided
into two complementary parts, depending on whether $s_{B}$ and PL
$l\in\mathcal{N}$ are correctly detected or not. Since we have $N$ PLs, the
overall BER of $U_{A}$ can be evaluated as
$\displaystyle
P_{A}\approx(1-P_{A}^{s_{B}})\left(\frac{1}{N}\sum_{l=1}^{N}P_{\rm{bit}}^{A}(l)\right)+\frac{P_{A}^{s_{B}}}{2},$
(31)
where $P_{A}^{s_{B}}$ is the SER of $s_{B}$ at $U_{A}$, and
$P_{\rm{bit}}^{A}(l)$ denotes the BER of $M_{A}$-ary PAM demodulation over
Rayleigh fading channels with PL $l$ selected. Since it is difficult to
exactly calculate the BER when $s_{B}$ or PL is detected incorrectly at
$U_{A}$, we use the estimate ${P_{A}^{s_{B}}}/{2}$ instead. Similarly, to
derive $P_{A}^{s_{B}}$, we use the conditional PEP, which denotes the
probability of detecting $s_{B}$ as $\hat{s}_{B}$ conditioned on $h_{A}$
[References], [References]
$\displaystyle\Pr(s_{B}\to\hat{s}_{B}|h_{A})$
$\displaystyle=\Pr(|y_{A}-h_{A}\alpha_{B}(l)s_{B}|^{2}>|y_{A}-h_{A}\alpha_{B}(\hat{l})\hat{s}_{B}|^{2})$
$\displaystyle=Q\left(\sqrt{\frac{|h_{A}|^{2}(|\triangle
x_{B}|^{2}+2\mathcal{R}\\{x_{A}^{*}\triangle x_{B}\\})^{2}}{2N_{0}|\triangle
x_{B}|^{2}}}\right)$
$\displaystyle=Q\left(\sqrt{\frac{|h_{A}|^{2}}{2N_{0}^{\rm{\rm{equal}}}}}\right).$
(32)
Definitions of ${x}_{B}$, $\hat{x}_{B}$, $x_{A}$, $\triangle x_{B}$, and
$N_{0}^{\rm{equal}}$ are given in (III-B1) and (35). Having
$\displaystyle
p_{|h_{A}|^{2}}(x)=\frac{1}{\beta_{A}}\exp\left(-\frac{x}{\beta_{A}}\right),$
(33)
we can arrive at [References, Eq. (64)]
$\displaystyle\Pr(s_{B}\to\hat{s}_{B})$
$\displaystyle=\int_{0}^{+\infty}\Pr(s_{B}\to\hat{s}_{B}|h_{A})p_{|h_{A}|^{2}}(x)dx$
$\displaystyle=\frac{1}{2}\left(1-\sqrt{\frac{\beta_{A}}{4N_{0}+\beta_{A}}}\right),$
(34)
which can be averaged over all the possible values of $x_{A}^{*}$ to consider
all interference scenarios. Equally, the $x_{A}$ herein should keep the same
PL as $x_{B}$. Hence, $P_{A}^{s_{B}}$ is given by
$\displaystyle
P_{A}^{s_{B}}\approx\frac{1}{NM_{B}}\sum_{i=1}^{NM_{B}}\sum_{j\neq
i}\Pr(\mathcal{S}_{B}^{R}(i)\to\mathcal{S}_{B}^{R}(j)).$ (35)
As for the calculation of $P_{\rm{bit}}^{A}(l)$, we first derive the
conditional error probability for PL $l$ under the $m_{A}$-th bit
($m_{A}\in\\{1,\ldots,\log_{2}(M_{A})\\}$) and the conditions of receive
signal-to-noise ratio (SNR) at $U_{A}$, i.e.,
$\displaystyle\gamma_{A}=\frac{\alpha_{A}(l)^{2}|h_{A}|^{2}}{N_{0}},$ (36)
as [References]
$\displaystyle P_{\rm{bit}}^{A}(l|m_{A},\gamma_{A})=\frac{2}{M_{A}}$
$\displaystyle\times\sum_{i=0}^{(1-2^{-m_{A}})M_{A}-1}\left\\{(-1)^{\lfloor{i(2^{m_{A}}-1)}/{M_{A}}\rfloor}\left(2^{m_{A}-1}-\lfloor\frac{i(2^{m_{A}-1})}{M}+\frac{1}{2}\rfloor\right)Q\left((2i+1)d_{A}\sqrt{2\gamma_{A}}\right)\right\\}.$
(37)
By substituting the alternative representation, i.e.,
$\displaystyle
Q(x)=\frac{1}{\pi}\int_{0}^{\frac{\pi}{2}}\exp\left(-\frac{x^{2}}{2\sin^{2}\psi}\right)d\psi$
(38)
for the Gaussian Q-function in (III-B2), we can obtain
$\displaystyle P_{\rm{bit}}^{A}(l|m_{A},\gamma_{A})=$
$\displaystyle\frac{2}{M_{A}}\sum_{i=0}^{(1-2^{-m_{A}})M_{A}-1}\\{(-1)^{\lfloor\frac{i(2^{m_{A}}-1)}{M_{A}}\rfloor}$
$\displaystyle\times(2^{m_{A}-1}-\lfloor\frac{i(2^{m_{A}-1})}{M}+\frac{1}{2}\rfloor)$
$\displaystyle\times\underbrace{\frac{1}{\pi}\int_{0}^{\pi/2}\exp\left(-\frac{((2i+1)d_{A})^{2}\gamma_{A}}{\sin^{2}\psi}\right)d\psi}_{\mathcal{Q}(i|\gamma_{A})}\\}.$
(39)
By statistically averaging the equation above over the PDF of $\gamma_{A}$,
which is given by
$\displaystyle
p_{\gamma_{A}}(\gamma_{A})=\frac{N_{0}}{(\alpha_{A}(l))^{2}\beta_{A}}\exp\left(\frac{-N_{0}\gamma_{A}}{(\alpha_{A}(l))^{2}\beta_{A}}\right),$
(40)
$\mathcal{Q}(i)$ can be derived as
$\displaystyle\mathcal{Q}(i)$
$\displaystyle\\!=\\!\frac{1}{\pi}\int_{0}^{\frac{\pi}{2}}\\!\\!\int_{0}^{\infty}\\!\\!\exp\\!\\!\left(-\frac{((2i+1)d_{A})^{2}\gamma_{A}}{\sin^{2}\psi}\right)\\!\\!p_{\gamma_{A}}(\gamma_{A})d\gamma_{A}d\psi=\frac{1-\mathcal{G}(i)}{2},$
(41)
where
$\displaystyle\mathcal{G}(i)=\sqrt{\frac{(\alpha_{A}(l))^{2}\beta_{A}((2i+1)d_{A})^{2}}{N_{0}+(\alpha_{A}(l))^{2}\beta_{A}((2i+1)d_{A})^{2}}}.$
(42)
In this manner, we have
$\displaystyle P_{\rm{bit}}^{A}(l|m_{A})=$
$\displaystyle\frac{2}{M_{A}}\sum_{i=0}^{(1-2^{-m_{A}})M_{A}-1}\left\\{(-1)^{\lfloor\frac{i(2^{m_{A}}-1)}{M_{A}}\rfloor}\left(2^{m_{A}-1}-\lfloor\frac{i(2^{m_{A}-1})}{M}+\frac{1}{2}\rfloor\right)\mathcal{Q}(i)\right\\}.$
(43)
Therefore, we have
$\displaystyle
P_{\rm{bit}}^{A}(l)=\frac{1}{\log_{2}(M_{A})}\sum_{m_{A}=1}^{\log_{2}(M_{A})}P_{\rm{bit}}^{A}(l|m_{A}).$
(44)
Finally, by substituting (35) and (44) into (31), we can derive the expression
of $P_{A}$.
### III-C Optimal Constellation Analysis
Figure 5: Constellations of $s_{B}$ with $N=4$, where $s_{B}$ is a 2-PAM
symbol, and $\mathcal{S}_{B}^{R}$ denotes the union constellation of $s_{B}$
and PL.
In this subsection, we discuss the optimal design of constellation in terms of
the values of $N$ as well as G. For convenience, let $d_{B,ij}$ denote the
Euclidean distance between points $\mathcal{S}_{B}^{R}(i)$ and
$\mathcal{S}_{B}^{R}(j)$, where $i$, $j\in\\{1,\ldots,NM_{B}\\}$. According to
the geometric analysis, we can obtain the following.
###### Lemma 1.
Optimal BER performance is achieved at $N=2$.
###### Proof.
Since the cases of $N\geq 2$ all have similar derivation processes, we can
obtain pattern by analyzing a certain case. For ease of discussion, we
consider the 2-PAM signal $s_{A}$, 2-PAM signal $s_{B}$, and $N=4$ scenario as
an example. As indicated in Algorithm 1, $N$ only affects the order of
combined constellation. When $N=4$, the combined constellation is shown as
Fig. 5. Let $d_{B,i,\min}$ denotes the minimum Euclidean distance between
$\mathcal{S}_{B}^{R}(i)$ and other points. Considering the symmetry of Fig. 5,
we first take $\mathcal{S}_{B}^{R}(1)$ for instance. From Fig. 5, we can
obtain $d_{B,1,\min}$ as
$\displaystyle d_{B,1,\min}=\min\\{d_{B,12},d_{B,13},d_{B,16},d_{B,18}\\},$
(45)
where
$\displaystyle d_{B,12}=2d_{B}|\alpha_{B}(1)|,$ (46) $\displaystyle
d_{B,13}=\sqrt{|d_{B}\alpha_{B}(1)|^{2}+|d_{B}\alpha_{B}(2)|^{2}-2d_{B}^{2}|\alpha_{B}(1)\alpha_{B}(2)|\cos\left(\frac{\pi}{N}\right)},$
(47) $\displaystyle
d_{B,16}=\sqrt{|d_{B}\alpha_{B}(1)|^{2}+|d_{B}\alpha_{B}(3)|^{2}-2d_{B}^{2}|\alpha_{B}(1)\alpha_{B}(3)|\cos\left(\frac{2\pi}{N}\right)},$
(48)
and
$\displaystyle
d_{B,18}=\sqrt{|d_{B}\alpha_{B}(1)|^{2}+|d_{B}\alpha_{B}(4)|^{2}-2d_{B}^{2}|\alpha_{B}(1)\alpha_{B}(4)|\cos\left(\frac{\pi}{N}\right)},$
(49)
respectively. In the similar manner, we can derive $d_{B,2,\min}$, and so on.
Therefore, the minimum Euclidean distance of Fig. 5, can be derived as
$\displaystyle
d_{B,\min}=\min\\{d_{B,1,\min},d_{B,2,\min},d_{B,3,\min},d_{B,4,\min},d_{B,5,\min},d_{B,6,\min},d_{B,7,\min},d_{B,8,\min}\\}.$
(50)
Since we have $N\geq 2$, the angle ${\pi}/{N}$ and ${2\pi}/{N}$ are values
between 0 and $\pi$. In other words, $\cos(\pi/N)$ is monotonously increasing
with respect to $N$. Evidently, to achieve optimal BER performance, $N$ should
be equal to the minimum value, which proves Lemma 1. ∎
###### Corollary 1.
Optimal BER performance is achievable when the information of PL is only
carried out by the difference of angle.
###### Proof.
According to Lemma 1, we consider 2-PAM signal $s_{A}$, 2-PAM signal $s_{B}$,
and $N=2$ scenario in the following. Unlike the derivation of Lemma 1, here we
should also consider the BER performance of $U_{A}$. We begin with the
analysis of $s_{A}$, whose constellation is Fig. 4. In this manner, its
minimum Euclidean distance can be derived as
$\displaystyle d_{A,\min}=2d_{A}|\alpha_{A}(l)|,$ (51)
where $l\in\mathcal{N}$. Obviously, $d_{A,\min}$ is determined by the minimum
value of $|\alpha_{A}(l)|$. Therefore, if $|\alpha_{A}(l)|$ with different $l$
has a constant value, $d_{A,\min}$ will be optimal and easy to design. For
example, if we consider the case where $|\alpha_{A}(1)|=0.2$,
$|\alpha_{A}(2)|=0.1$, and the case where
$|\alpha_{A}(1)|=|\alpha_{A}(2)|=0.2$. It is clear that the latter case has
larger $d_{A,\min}$. Then we shift our focus to $s_{B}$. The combined
constellation is shown as Fig. 3, whose minimum Euclidean distance can be
written as
$\displaystyle d_{B,\min}=\min\\{d_{B,12},d_{B,34},d_{B,14},d_{B,23}\\},$ (52)
where
$\displaystyle d_{B,12}=2d_{B}|\alpha_{B}(1)|,$ (53) $\displaystyle
d_{B,34}=2d_{B}|\alpha_{B}(2)|,$ (54)
and
$\displaystyle
d_{B,14}=d_{B,23}=\sqrt{|d_{B}\alpha_{B}(1)|^{2}+|d_{B}\alpha_{B}(2)|^{2}}.$
(55)
Collating (55) with (53) and (54), it is clear that $d_{B,\min}$ is determined
by the minimum value of $|\alpha_{B}(1)|$ and $|\alpha_{B}(2)|$. In a similar
manner, larger $d_{B,\min}$ will be achieved by crafty design in the case of
$|\alpha_{B}(1)|=|\alpha_{B}(2)|$. Consequently, larger $d_{i,\min}$,
$i\in\\{A,B\\}$, will be achieved when
$|\alpha_{i}(l)|=|\alpha_{i}(l^{\prime})|$, where
$l,l^{\prime}\in\mathcal{N}$. In this scenario, the incremental bits of PS-
NOMA come from $\bm{\Theta}$, which in turn reduces the design complexity of
G. Relevant content is also discussed in Section. IV. ∎
## IV Numerical Results
In this section, we illustrate the BER and achievable rate performance of the
proposed scheme through Monte Carlo simulation and numerical results. Since
the power coefficients of PS-NOMA are randomly varying, from the fairness
perspective, we set the counterpart without PS (denoted by NOMA) as a regular
NOMA scheme. The average powers of $h_{A}$, $h_{B}$ are set to be
$\beta_{A}=10$, $\beta_{B}=1$, respectively. For brevity, we will refer to
“PS-NOMA ($M_{A}$-PAM, $M_{B}$-PAM, $N$)” as the PS-NOMA scheme where the BS
has $N$ PLs and maps the information bits for $U_{A}$ and $U_{B}$ into
$M_{A}$-PAM and $M_{B}$-PAM, respectively. Similarly, “NOMA ($M_{A}$-PAM,
$M_{B}$-PAM)” denotes the NOMA scheme with $M_{A}$-PAM and $M_{B}$-PAM signals
intended for $U_{A}$ and $U_{B}$, respectively. Besides, we take SNR=$1/N_{0}$
as the horizontal axis of the following figures.
Figure 6: BER comparison between PS-NOMA and NOMA.
Figure 7: BER comparison between PS-NOMA schemes with different PL intervals:
Case 1.
Figure 8: BER comparison between PS-NOMA schemes with different PL intervals:
Case 2.
Figure 9: BER comparison between PS-NOMA schemes with different PL intervals:
Case 3.
Figure 10: BER comparison between PS-NOMA schemes with different PL intervals:
Case 4.
### IV-A BER Performance
In this subsection, the BER performance of PS-NOMA and NOMA is compared,
assuming that $U_{A}$ and $U_{B}$ in all considered schemes employ ML
detection. Since the comparison of OMA and NOMA has been widely argued in
previous works, the BER curves of OMA counterparts are not presented.
In Fig. 6, we compare the BER performance of “PS-NOMA (2-PAM, 2-PAM, $N=2$)”
and “NOMA (2-PAM, 4-PAM)” with their theoretical BER results presented. Given
fairness, we assume that the maximum spectral efficiency for both schemes are
3 bits per second per Hertz (bps/Hz), and both schemes have the same
constellation order. According to Lemma 1 and Corollary 1, the power matrices
of “PS-NOMA (2-PAM, 2-PAM, $N=2$)” and “NOMA (2-PAM, 4-PAM)” are set by
$\displaystyle\textbf{G}=\left[\begin{array}[]{cc}\sqrt{0.2},&\sqrt{0.8}\\\
\sqrt{0.2}\exp(j\pi/2),&\sqrt{0.8}\exp(j\pi/2)\\\ \end{array}\right]$ (58)
and $\textbf{G}=[\sqrt{0.2},\sqrt{0.8}]$, respectively. It can be seen from
Fig. 6 that the theoretical curves approximately match with their simulation
counterparts. Besides, one can find that the BER performance of $U_{A}$ is
superior to that of $U_{B}$ in both PS-NOMA and NOMA, which comes from the
fact $\beta_{A}>\beta_{B}$. Although all the curves have the same
constellation order as 8, the performances of PS-NOMA are always better than
those of NOMA. This phenomenon tells us that applying PS can improve
performance without increasing constellation complexity when the amplitudes of
power allocation coefficients of the system are the same.
Figure 7, 8, 9, and 10 respectively investigate four different scenarios where
the power matrices of the compared counterparts
$\displaystyle\textbf{G}=\left[\begin{array}[]{cc}\sqrt{0.1},&\sqrt{0.9}\\\
\sqrt{0.2}\exp(j\pi/2),&\sqrt{0.8}\exp(j\pi/2)\\\ \end{array}\right]$ (61)
for case 1,
$\displaystyle\textbf{G}=\left[\begin{array}[]{cc}\sqrt{0.3},&\sqrt{0.7}\\\
\sqrt{0.4}\exp(j\pi/2),&\sqrt{0.6}\exp(j\pi/2)\\\ \end{array}\right]$ (64)
for case 2,
$\displaystyle\textbf{G}=\left[\begin{array}[]{cc}\sqrt{0.2},&\sqrt{0.8}\\\
\sqrt{0.2}\exp(j\pi/2),&\sqrt{0.8}\exp(j\pi/2)\\\ \end{array}\right]$ (67)
for case 3, and
$\displaystyle\textbf{G}=\left[\begin{array}[]{cc}\sqrt{0.1},&\sqrt{0.9}\\\
\sqrt{0.1}\exp(j\pi/2),&\sqrt{0.9}\exp(j\pi/2)\\\ \end{array}\right]$ (70)
for case 4, respectively. Besides, the power matrix of the benchmark, i.e.,
PS-NOMA (2-PAM, 2-PAM, $N=2$), equals
$\displaystyle\textbf{G}=\left[\begin{array}[]{cc}\sqrt{0.1},&\sqrt{0.9}\\\
\sqrt{0.4}\exp(j\pi/2),&\sqrt{0.6}\exp(j\pi/2)\\\ \end{array}\right].$ (73)
Here the PL interval denotes the absolute difference between the absolute
values of two adjacent rows of G. Smaller interval denotes smaller value of PL
interval than (73). Hence all the cases correspond to smaller intervals. We
first discuss the BER performance of $U_{B}$. Concretely, in cases 1, 3, and
4, the minimum Euclidean distances of $s_{B}$ are larger than those of the
benchmark according to (52). Hence they show better BER performances, while
opposite observations are found in the other cases. Furthermore, the
phenomenon that performance of case 4 is better than that of benchmark also
confirms the correctness of Corollary 1. More specifically, by comparing the
curves of $U_{A}$ in these cases, we observe that the minor power of $U_{A}$
does not decrease the BER performance of $U_{A}$. From (17) and (18), we know
that false detection of $s_{B}$ and PL may result in the wrong $s_{B}$, or
wrong PL, or wrong $s_{B}$ and PL. The first detection process (17) is related
to both $s_{B}$ and PL, and it is directly related to the correctness of (18),
so the power of $U_{B}$ has a more significant influence than $U_{A}$.
Notably, we assume that $M_{A}=M_{B}$ in this figure. Therefore this
conclusion stands. In a word, we can consistently achieve better BER
performance through designing power matrices with the same power value when
$N=2$ and the design of lower-order matrices are much simpler than higher-
order ones.
Figure 11: Achievable rate and MI performance of PS-NOMA.
Figure 12: Achievable rate comparison between PS-NOMA and NOMA.
### IV-B Achievable Rate Performance
In this subsection, we first evaluate the achievable rate and MI performance
of the proposed PS-NOMA, and then compare the achievable rate of PS-NOMA with
the NOMA counterparts.
In Fig. 11, we show the achievable rate and MI performance of PS-NOMA with
(58) and $\textbf{G}=(\sqrt{0.2},\sqrt{0.8})$, respectively. As seen from the
figure, all the curves grow steadily as the SNR increases at low-to-medium SNR
while achieving floors at high SNR. Obviously, the rates of $U_{A}$ obtained
from (III-A2), $U_{B}$ obtained from (21), and $U_{B}$ observed at $U_{A}$
obtained from (30) saturate to $\log_{2}(M_{A})$, $\log_{2}(NM_{B})$, and
$\log_{2}(NM_{B})$, respectively. On the other hand, the MI curves ${\rm
I}({\rm{PL}};y_{A})$ and ${\rm I}({\rm{PL}};y_{B})$ respectively denote the PL
gains at $U_{A}$ and $U_{B}$ and are respectively generated from (III-A2) and
(III-A1). Evidently, both curves saturate at 1 bps/Hz since the input entropy
of the power-domain is $\log_{2}(N)$. In other words, all the gains gleaned
from the power-domain are assigned to $U_{B}$. Moreover, since the channel
quality of $U_{A}$ is much better than that of $U_{B}$, the achievable rate or
MI obtained at $U_{A}$ is always higher than that at $U_{B}$, which guarantees
the success of SIC.
Subsequently, in Fig. 12, we present the curves of PS-NOMA versus NOMA with
the same system setups as Fig. 11. Compared to NOMA, PS-NOMA provides
achievable rate gains for both $U_{A}$ and $U_{B}$, and obtains the sum
achievable rate enhancement in turn. This system performance improvement is
more pronounced at low SNR, while the system gap narrows with increasing SNR.
Since PS-NOMA and NOMA have the same constellation order, at high SNR, the
achievable rate performances of them are equal. It is worth noting that the
performance improvement of $U_{A}$ is more obvious than that of $U_{B}$.
## V Conclusions
In this paper, we have proposed a novel two-user NOMA scheme using PS, in
which the ordinary PAM symbol carries the bits of users. In addition, the BS
randomly chooses a PL from the power matrix preset for each transmission to
carry more information. For PS-NOMA, approximate BER expressions have been
derived in closed form for both users over Rayleigh flat fading channels. The
rates and MI under finite input have also been developed. Computer simulations
have verified the performance analysis and shown that the proposed scheme
achieves better BER performance than conventional NOMA without increasing
constellation complexity. Moreover, we observe that the proposed PS-NOMA can
achieve better BER performance with the minimum number of PLs, which reduces
the design difficulty of the power matrix. Furthermore, if we set an equal
amplitude for each PL, the system performance will also increase. On the other
hand, the proposed scheme also shows superior achievable rate performance
compared to that of the NOMA counterpart. This work focuses only on the two-
user scenario. We leave the more-user extension for future study.
## Appendix A Proof of $(c)$
To process step $(c)$ of (III-B1), we use the method introduced in
[References]. Let $\mathcal{D}\triangleq-|h_{B}\triangle
x_{B}|^{2}-2\mathcal{R}\\{w_{B}^{*}h_{B}\triangle x_{B}\\}$. With
$w_{B}=h_{B}x_{A}+n_{B}$, $\mathcal{D}$ can be rewritten as
$\displaystyle\mathcal{D}=$ $\displaystyle-|h_{B}\triangle
x_{B}|^{2}-|h_{B}|^{2}2\mathcal{R}\\{x_{A}^{*}\triangle
x_{B}\\}-2\mathcal{R}\\{n_{B}^{*}h_{B}\triangle x_{B}\\}.$ (A.1)
Obviously, $\mathcal{D}$ is Gaussian distributed with
$\displaystyle\mathbb{E}\\{\mathcal{D}\\}=-|h_{B}\triangle
x_{B}|^{2}-|h_{B}|^{2}2\mathcal{R}\\{x_{A}^{*}\triangle x_{B}\\}$ (A.2)
and
$\displaystyle\text{Var}\\{\mathcal{D}\\}=$
$\displaystyle\text{Var}\\{n_{B}^{*}h_{B}\triangle
x_{B}\\}=2N_{0}|h_{B}\triangle x_{B}|^{2}.$ (A.3)
Therefore, we have
$\Pr(\mathcal{D}>0)=Q({-\mathbb{E}\\{\mathcal{D}\\}}/{\sqrt{\text{Var}\\{\mathcal{D}\\}}})$,
which can be easily simplified as the result of $(c)$.
## References
* [1] Ericsson, “Cellular networks for massive IoT,” Tech. Rep. Uen 284 23-3278, Jan. 2016.
* [2] L. Dai, B.Wang, Y. Yuan, S. Han, C.-L. I, and Z.Wang, “Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends,” _IEEE Commun. Mag._ , vol. 53, no. 9, pp. 74–81, Sep. 2015\.
* [3] Y. Liu, Z. Ding, M. Elkashlan, and H. V. Poor, “Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer,” _IEEE J. Sel. Areas Commun._ , vol. 34, no. 4, pp. 938-953, Apr. 2016.
* [4] J. Liberti, S. Moshavi, and P. Zablocky, “Successive interference cancellation,” U.S. Patent 8 670 418 B2, Mar. 2014.
* [5] M. Vaezi, Z. Ding, and H. V. Poor, Multiple Access Techniques for 5G Wireless Networks and Beyond. Springer International Publishing, 2019.
* [6] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users,” _IEEE Signal Process. Lett._ , vol. 21, no. 12, pp. 1501–1505, Dec. 2014.
* [7] Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, I. Chih-Lin, and H. V. Poor, “Application of non-orthogonal multiple access in LTE and 5G networks,” _IEEE Commun. Mag._ , vol. 55, no. 2, pp. 185–191, Feb. 2017.
* [8] S. M. R. Islam, N. Avazov, O. A. Dobre, and K. Kwak, “Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges,” _IEEE Commun. Surveys Tuts._ , vol. 19, no. 2, pp. 721–742, Secondquarter 2017.
* [9] “3rd generation partnership project; technical specification group radio access network; study on non-orthogonal multiple access (NOMA) for NR, release 16, (V16.0.0),” 3GPP, Sophia Antipolis, France, Rep. TR 38.812, Dec. 2018.
* [10] D. Slepian and J. K. Wolf, “A coding theorem for multiple access channels with correlated sources,” _Bell Syst. Tech. J._ , vol. 52, no. 7, pp. 1037–1076, 1973.
* [11] R. S. Cheng and S. Verdú, “Gaussian multiaccess channels with ISI: Capacity region and multiuser water-filling,” _IEEE Trans. Inf. Theory_ , vol. 39, no. 3, pp. 773–785, May 1993.
* [12] G. Caire and S. Shamai (Shitz), “On the achievable throughput of a multi-antenna Gaussian broadcast channel,” _IEEE Trans. Inf. Theory_ , vol. 49, no. 7, pp. 1691–1706, Jul. 2003.
* [13] T. M. Cover and J. A. Thomas, _Elements of Information Theory_ , 2nd ed. Hoboken, NJ, USA: Wiley, 2006.
* [14] A. Lozano, A. M. Tulino, and S. Verdú, “Optimum power allocation for parallel Gaussian channels with arbitrary input distributions,” _IEEE Trans. Inf. Theory_ , vol. 52, no. 7, pp. 3033–3051, Jul. 2006.
* [15] J. Harshan and B. S. Rajan, “On two-user Gaussian multiple access channels with finite input constellations,” _IEEE Trans. Inf. Theory_ , vol. 57, no. 3, pp. 1299–1327, Mar. 2011.
* [16] J. Harshan and B. S. Rajan, “A novel power allocation scheme for two-user GMAC with finite input constellations,” _IEEE Trans. Wireless Commun._ , vol. 12, no. 2, pp. 818–827, Feb. 2013.
* [17] Z. Dong, H. Chen, J. Zhang, and L. Huang, “On non-orthogonal multiple access with finite-alphabet inputs in Z-channels,” _IEEE J. Sel. Areas Commun._ , vol. 35, no. 12, pp. 2829–2845, Dec. 2017.
* [18] Z. Dong, H. Chen, J. Zhang, L. Huang, and B. Vucetic, “Uplink non-orthogonal multiple access with finite-alphabet inputs,” _IEEE Trans. Wireless Commun._ , vol. 17, no. 9, pp. 5743–5758, Sept. 2018.
* [19] Y. Yang and B. Jiao, “Information-guided channel-hopping for high data rate wireless communication,” _IEEE Commun. Lett._ , vol. 12, no. 4, pp. 225–227, Apr. 2008.
* [20] C. Liu, M. Ma, Y. Yang, and B. Jiao, “Optimal spatial-domain design for spatial modulation capacity maximization,” _IEEE Commun. Lett._ , vol. 20, no. 6, pp. 1092–1095, Jun. 2016.
* [21] Y. Chen, L. Wang, Y. Ai, B. Jiao, and L. Hanzo, “Performance analysis of NOMA-SM in vehicle-to-vehicle massive MIMO channels,” _IEEE J. Sel. Areas Commun._ , vol. 35, no. 12, pp. 2653–2666, Dec. 2017.
* [22] Q. Li, M. Wen, E. Basar, H. V. Poor, and F. Chen, “Spatial modulation-aided cooperative NOMA: Performance analysis and comparative study,” _IEEE J. Sel. Topics Signal Process._ , vol. 13, no. 3, pp. 715–728, Jun. 2019.
* [23] X. Wang, J. Wang, L. He, Z. Tang, and J. Song, “On the achievable spectral efficiency of spatial modulation aided downlink non-orthogonal multiple access,” _IEEE Commun. Lett._ , vol. 21, no. 9, pp. 1937–1940, Sept. 2017.
* [24] X. Wang, J. Wang, L. He, and J. Song, “Spectral efficiency analysis for downlink NOMA aided spatial modulation with finite alphabet inputs,” _IEEE Trans. Veh. Technol._ , vol. 66, no. 11, pp. 10562–10566, Nov. 2017.
* [25] L. Pan and J. Zheng, “Spatial modulation aided cooperative NOMA: Implementation and achievable rate analysis,” in _Proc. IEEE Int. Conf. Commun. (ICC)_ , Shanghai, China, May 2019, pp. 1–6.
* [26] Y. -Y. Zhang and J. -K. Zhang, “Fundamental applicability of spatial modulation: High-SNR limitation and low-SNR advantage,” _IEEE J. Sel. Areas Commun._ , vol. 37, no. 9, pp. 2165–2178, Sept. 2019.
* [27] L. Bariah, A. Al-Dweik, and S. Muhaidat, “On the performance of Non-orthogonal multiple access systems with imperfect successive interference cancellation,” in _Proc. IEEE Int. Conf. Commun. (ICC)_ , Kansas City, MO, USA, May 2018, pp. 1–6.
* [28] E. Başar, Ü. Aygölü, E. Panayırcı, and H. V. Poor, “Orthogonal frequency division multiplexing with index modulation,” _IEEE Trans. Signal Process._ , vol. 61, no. 22, pp. 5536–5549, Nov. 15, 2013
* [29] M.-S. Alouini and A. J. Goldsmith, “A unified approach for calculating error rates of linearly modulated signals over generalized fading channels,” _IEEE Trans. Commun._ , vol. 47, no. 9, pp. 1324–1334, Sept. 1999.
* [30] K. Cho and D. Yoon, “On the general BER expression of one-and two dimensional amplitude modulations,” _IEEE Trans. Commun._ , vol. 50, no. 7, pp. 1074–1080, Jul. 2002.
| arxiv-papers | 2021-07-27T08:30:19 | 2024-09-04T03:07:20.919213 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Xinyue Pei, Yingyang Chen, Miaowen Wen, Hua Yu, Erdal Panayirci, and\n H. Vincent Poor",
"submitter": "Yingyang Chen",
"url": "https://arxiv.org/abs/2107.12668"
} |
2107.12670 | # Elasticity of Single Flexible Polymer Chains in Good and Poor Solvents
Vikhyaat Ahlawat Department of Physics, Indian Institute of Science Education
and Research, Dr. Homi Bhabha Road, Pune 411 008, India Shatruhan Singh
Rajput Shivprasad Patil [email protected] Department of Physics,
Indian Institute of Science Education and Research, Dr. Homi Bhabha Road, Pune
411 008, India
###### Abstract
## Abstract
Force versus extension curves measure entropic elasticity of single polymer
chain in force spectroscopy experiments. A Worm-like Chain model is used to
describe force extension experiments with an intrinsic chain parameter called
persistence length, which is a measure of local bending flexibility. For
flexible polymers, there is a discrepancy in estimates of persistence length
in various force regimes. For instance, Atomic Force Microscopy (AFM) based
pulling experiments report anomaly low values which are also inconsistent with
magnetic tweezers experiments. To understand this, we investigate the role of
coupling between microscopic force probe and intrinsic elasticity of
polyethylene glycol chain in AFM-based experiments. We perform experiments
using oscillatory rheology by providing an external excitation of fixed
frequency to the probe. We show that a proper quantification of elastic
response measured directly by oscillatory technique deviates significantly
from conventional force-extension curves. The persistence length obtained by
fitting WLC to stiffness extension data matches well with equilibrium tweezers
experiments. In addition, for polystyrene chain in poor solvent no deviation
in elastic response is observed between oscillatory and constant velocity
pulling experiments. However, such deviation is seen for polystyrene in good
solvent. We attribute this to hydrophobic interaction between monomers of
polystyrene in water. Our results suggest that oscillatory rheology on single
polymer chains provide quantitative estimate of its elastic response. The
consistency in values of persistence length using magnetic tweezers
experiments in low force regime and the AFM experiments in high force regime
suggests that WLC is successful in describing the polymer elasticity in the
force range typically probed in AFM experiments.
## Introduction
Elasticity of single polymer chain under external force is a fundamental
problem in polymer sciencecolby . It has been studied in the context of
understanding mechanical properties of complex biological and polymeric
systemscarrillo to mechanobiology of protein titin in muscle
contractioneckels . With wide technological importance, it plays crucial role
in the field of microrheologycharles and fundamentals of protein collapse and
protein foldingzoldak . Polymer elasticity is largely entropic in nature and
it arises from changes in vast conformational space of polymer’s backbone
dihedral angles as external force is applied.
Single molecule force spectroscopy techniques such as atomic force microscopy
(AFM), optical Tweezers (OTs) and magnetic tweezers (MTs) measures elasticity
by generating force versus extension curves with piconewton force resolution
and nanometer spatial resolutionneumann . Previous studies based on single
molecule force spectroscopy have been done on synthetic polymers and
biopolymersvancso ; Cui including DNABustamante , polysaccharidesMarszalek
and proteinsLorna . At low forces($<$ 10 pN), chain extension is linear with
force(x $\sim$ f) behaving as ideal chain in theta solvent or as a real
swollen chain(x $\sim$ f2/3) in good solvent. As force is increased, extension
changes nonlinearly with force and asymptotically approaches its contour
length. This nonlinear stretching regime is described by two main classes of
entropic models that include worm-like chain (WLC)Marko and freely jointed
chain(FJC)colby models. WLC treats the polymer as a continuum structureless
chain and persistence length ($l_{p}$), a measure of local bending stiffness
of chain, is estimated as a fitting parameter. In force regime f $>$
$k_{B}T/l_{p}$, elasticity of DNAbustamante1 ; omar1 , proteinspopa ; berne
and synthetic polymer chains saleh ; saleh3 is described by WLC. Typically
these experiments were carried out with magnetic tweezers(MTs) in the force
range of 1-100 pN. In contrast to MT, AFM experiments done in high force
regime of 20-500 pN show anomaly low and unphysical values of persistence
length vancso ; walker ; zhang ; zhang2 . To justify such low values, models
such as FJC and its modifications were chosen to describe force-extension
curve radiom ; Cui ; vancso . It is expected that beyond a threshold force,
the nonlinear stretching regime will transition from continuum WLC to a
behavior dominated by discrete nature of polymer chain(FJC)rosa ; rubinstein .
However, such a transition has not been reported in AFM experiments which
covers the range of higher forcessaleh3 .
In force spectroscopy experiments, one end of the polymer is typically
anchored to a fixed surface with other end tethered to a macroscopic force
probe like AFM cantilever or a bead. To generate force-extension curves either
the end-to-end distance is controlled externally and force is measured or vice
versa. The choice of external control or a statistical ensemble reflects the
complexity of interpreting the experimental data. In a typical AFM setup,
force is measured indirectly through deflection of the cantilever as end-to-
end distance is varied at constant velocity. Such experiments correspond to an
ensemble of coupled cantilever-polymer system, wherein polymer stiffness and
cantilever probe act simultaneously in an intricate wayfranco ; kreuzer ;
staple . This convolution is likely to produce a biased molecular trajectory
in which derivative of force-extension curve is not the intrinsic stiffness of
the polymer. In MT experiments however, the force is controlled externally and
kept fixed while position of the bead is monitored. Such experiments measure
properties of an isolated polymer in equilibrium, averaging out the effect of
macroscopic probekreuzer ; staple . In literature, method such as equilibrium
Weighted Histogram Analysis Method(WHAM)franco ; kumar and othersthirumalai ;
netz have been proposed to deconvolute the apparatus effects and obtain the
intrinsic trajectory of the molecule.
Oscillatory rheology on composite mechanical system is an alternative method
which may allow deconvolutionnetz . It is based on the idea of differentiating
the dynamical linear response of a single component from the overall response
of composite system. In AFM experiments, it can be implemented on cantilever
plus polymer system by adding oscillatory perturbation to cantilever probe. In
this case, linear response of cantilever and the polymer due to small
perturbation is additive to the overall system response. Here, we show that
such additivity in linear response allows differentiation of polymer intrinsic
response from effects arising due to its coupling to cantilever probe. We
implement this by providing oscillations to AFM cantilever while the polymer
is simultaneously pulled at constant velocity. Extracting in-phase and out-of-
phase linear response to this perturbation, we propose a method to determine
the elasticity of single polymer chain. It is demonstrated that elasticity
determined from in-phase response show significant deviation from constant
velocity pulling experiments. The elastic response of synthetic flexible
polymers such as Polyethylene Glycol(PEG) and Polystyrene(PS) is extracted
from dynamic oscillatory method and analysed with WLC. For PEG in good
solvents, persistence length is large ($\sim$0.64 nm) compared to constant
velocity pulling experiments ($\sim$0.13 nm). This value is physically
reasonable and matches with equilibrium measurement carried out with MT.
In addition, the effect of solvent quality on dynamic oscillatory method is
considered. The poor solvent can significantly alter the polymer dynamics and
elasticity halperin ; radiom ; grater ; berne2 . For polymers in poor
solvents, such as PS in water, the deviation in stiffness measured using
constant velocity and oscillatory method is not observed. This is in contrast
to good solvent(8M urea) for PS where marked deviation is observed with
persistence length about three times ($\sim$0.8 nm) compared to pulling
experiments ($\sim$0.25 nm). Although, there are many organic liquids which
are typically used as good solvent for PS, we resorted to use 8M urea since it
is feasible in AFM experiments compared to volatile organic solvents.
Deviation is possibly due to additional hydrophobic forces operating for
polystyrene in water. Our results, for the first time, reconcile AFM and MT
measurements of single chain elasticity in high force regime (f $>$
$k_{B}T/l_{p}$) and confirms that WLC is largely successful in the force
regime probed using AFM. However, the results hint at using WLC with caution
for polymers in poor solvents.
## Experimental Section
Sample preparation for PEG : Monofunctionalized poly(ethylene) glycol (MeO-
PEG-SH) with a molecular weight of 10 kDa was purchased from Sigma-Aldrich
with one end functionalized with a thiol group (-SH). For measurements in
water Poly(ethylene) glycol was dissolved in deionized-water($>$16 M$\Omega$
cm) to prepare a solution with concentration of 20 $\mu$M. Similar
concentration was used to prepare a solution for PEG in 2-propanol. Thermally
evaporated gold coverslips were prepared. Gold is inert and does not react
with anything chemically but accumulates many organic contaminants due to its
high surface free energy. To clean such a gold surface we used UV ozone
treatment which is known to remove organic entities and prepare clean gold
surfaces. Before use, gold coverslips were gently rinsed with ethanol and
deionized water to remove salts. A drop of 60 $\mu$L solution of PEG in
respective solvents was deposited on gold cover-slip and incubated for 20 min
for strong attachment of thiol ended PEG group on gold surface. Thereafter,
the solution was thoroughly rinsed with respective solvents removing any
unbound PEG and other impurities. Sample was mounted in the fluid cell for
measurement in deionized(DI) water or 2-propanol.
Sample preparation for Polystyrene Polystyrene of molecular weight 192 kDa was
purchased from Sigma-Aldrich. It was dissolved and stirred in
THF$($tetrahydrofuran$)$ for 1 hour with a concentration of $0.1\mu$M. A hot
piranha solution$($4:1 mixture of concentrated sulphuric acid and hydrogen
peroxide$)$ treated glass coverslip was rinsed with ethanol and
deionized$($DI$)$ water. Thereafter, 50 $\mu$l of the solution incubated on it
for 10 min. To remove loosely adsorbed polymer, sample was rinsed thoroughly
with THF and dried for half an hour. Final sample was mounted in fluid cell
and filled with deionized(DI)water or 8M urea for measurement.
### Force measurements
The force measurements were carried out on a commercial atomic force
microscope (Model JPK Nanowizard II, Berlin, Germany). Gold coated cantilevers
from MikroMasch SPM probes were used for experiment. The spring constant of
the cantilever was calibrated using thermal fluctuation methodButt .
Cantilever was hard pressed against a clean glass coverslip and from already
calibrated z- piezo movement sensitivity in units of nm/V was determined. This
sensitivity was then used in thermal fluctuation method to calculate spring
constant. The spring constant of the cantilever used in the measurement was in
the range $0.6-0.8$ N/m with resonance frequency $\sim$ 13 KHz. Such a range
was found appropriate for both force and dynamic measurement. Force versus
extension profiles were generated following a standard procedure. Initially
the cantilever was approached to substrate with a contact setpoint of about 2
nN. Contact setpoint was maintained for 1-2 seconds allowing adsorption of
polymer strand on cantilever tip. Cantilever deflects as the attached polymer
is stretched while the cantilever was pulled with constant velocity of 150
nm/s. Both z-piezo distance and cantilever deflection detected by quadrant
photodiode are recorded. Extension in z-piezo distance is corrected for
vertical deflection and force is obtained by multiplying the deflection by
spring constant of cantilever. In force spectroscopy experiments, it is
crucial to record only single molecule events since the binding between the
tip and polymer is non-specific. To achieve this:(1) sample was prepared with
low concentration of polymer solution and rinsed several times before
measurement. This ensured that mostly individual binding events were captured
in force profile. We have discarded any multiple events from analysis and
included data which shows cantilever picking only single polymer chain. (2)
The curves were rescaled with their apparent contour length obtained by
fitting WLC model to force-extension curves(see supplementary fig 3). This is
because polymer is picked at random points along the contour and also the
polydisperse nature of polymer. If the curves superimpose well, such a
normalization procedure indicate that single molecule event was sampled (see
supplementary fig 3).(3) Statistics of such curves obtained was (N$\sim$ 50)
for each polymer in their respective solvent conditions. All these curves were
fitted to extract model parameters (data not shown). In the paper,
representative force-curves (N$\sim$ 5) are shown and normalized for fitting
procedure in respective solvents.
Figure 1: Experimental schematic shows extraction of in-phase (X) and out-of-
phase (Y) components of cantilever oscillations using lock-in amplifier with a
polymer anchored between the tip and gold substrate. Dither piezo is
sinusoidally oscillated with less than 1 KHz frequency and vertical deflection
from photodiode is fed into lock-in amplifier.
### Dynamic measurement and Analysis
Dynamic measurements were performed with hyperdrive cantilever holder(Bruker)
in which cantilever base is oscillated with a small dither piezo as shown in
the schematic of figure 1. A sinusoidal voltage was supplied to dither using
the lock-in SR830 (Stanford Research System, Sunnyvale, California) with peak-
to-peak amplitude of 1-2 nm. Off-resonance frequencies close to $1$ kHz were
exploited (resonance frequency $\sim$ 13 Hz). With sinusoidal oscillation as
the reference signal, X and Y component of amplitude from photodiode detector
were recorded using lock-in amplifier (Time constant 10 ms). Small amplitudes
are necessary for simultaneous comparison with static pulling experiment. Also
comparatively low pulling velocity (40-70 nm/s) are needed for narrow
bandwidth measurements.
Vibrations of cantilever beam need to be appropriately modelled for correct
interpretation of our dynamic measurement. Flexural vibration of a continuous
cantilever beam, can in principle, be decomposed into $n$ eigenmodes. By
parameterizing each mode with an equivalent point mass $m^{*}_{n}$, stiffness
$k^{*}_{n}$ and quality factor $Q^{*}_{n}$ frequency response (amplitude and
phase response) of each mode can be modelled with damped simple harmonic
oscillator (SHO). Continuous cantilever beam therefore can be represented as
$n$ equivalent simple harmonic oscillatorsraman1 .
Figure 2: Rheological description representing our experimental configuration.
It comprises of two voigt-kelvin element(i.e., spring and a dashpot)
corresponding to the cantilever and polymer. Two elements are acting in
parallel i.e their respective spring and dashpot effectively add with each
other.
In the past, interpretation of dynamic AFM measurement were based on
phenomenological point mass model which considers only first eigenmode ($n=1$)
to represent the vibrating cantilever. For off-resonance operation employed
here, which do not involve eigenmodes, point mass description is appropriate
but with a caveat. The oscillating motion of the base is comparable to
oscillating amplitude at the cantilever-tip. For quantitative description,
base motion need to be explicitly accounted for in the equation of motion
because AFM measures deflection or bending with respect to the base.kulik .
Also, effects of hydrodynamic loading on the lever due to motion of
surrounding fluid are included in the equation of motion. $m^{*}$ is mass that
includes an added mass due to inertial loading of fluid moved along with the
oscillating lever. $\gamma_{c}$ is viscous damping of the cantilever in the
surrounding fluid. Off-resonance operation allows for small amplitudes of
oscillation and therefore linearization of interaction force as
$F_{int}=k_{i}y-\gamma_{i}\dot{y}$ where y is instantaneous cantilever
position. $k_{i}$ and $\gamma_{i}$ are stiffness and damping of molecule.
According to the rheological descriptionpethica ; kulik (Figure 2), $k_{i}$
and $\gamma_{i}$ are added in parallel with cantilever spring constant $k_{c}$
and damping $\gamma_{c}$. This is explained (see also supplementary fig 2) and
equation of motion governing cantilever-molecule system that includes the
base-motion is
$m^{*}\frac{\partial^{2}y}{\partial t^{2}}+\gamma\frac{\partial y}{\partial
t}+ky=k_{c}A_{b}\cos\omega t$ (1)
where $m^{*}$, $\gamma=\gamma_{i}+\gamma_{c}$ and $k=k_{i}+k_{c}$ are
effective mass, damping and stiffness of molecule plus cantilever system
respectively. The term $k_{c}A_{b}\cos(\omega t)$ is base motion contribution
where $\omega$ and $A_{b}$ are drive frequency and amplitude of cantilever
dithering. Note that because of base motion, the instantaneous cantilever tip-
position $y$ is the sum of cantilever deflection with respect to the base $z$
and base displacement $A_{b}\cos(\omega t)$. Since AFM measures deflection or
bending with respect to cantilever base $z$ and not the cantilever position
$y$. Hence, transforming equation $1$ with measured $z=y-A_{b}\cos(\omega t)$
we have,
$m^{*}\frac{\partial^{2}z}{\partial t^{2}}+\gamma\frac{\partial z}{\partial
t}+kz=\underbrace{A_{b}(m^{*}\omega^{2}-k_{i})}_{A\cos\delta}\cos\omega
t+\underbrace{A_{b}(\gamma\omega)}_{-A\sin\delta}\sin\omega t\\\ $ (2)
$=A\cos\omega t+\delta$
For off-resonance operation first two terms on left hand side are
neglectedsarid . Assuming $k_{i}\ll k_{c}$ and identifying amplitude $z$ as
$X\cos\omega t+Y\sin\omega t$, we see from eq (2) that ’in phase’ component
$X=A\cos\delta$ and ’quadrature’ component $Y=A\sin\delta$ of lock-in signal
amplitude are directly proportional to elastic and viscous response of
molecule respectively. X and Y are:
$X={\frac{A_{b}}{k_{c}}}(-k_{i}+m^{*}\omega^{2})$ (3)
and
$Y={\frac{-A_{b}\omega}{k_{c}}}{(\gamma_{i}+\gamma_{c})}$ (4)
X and Y in volts are converted to angstrom using dc (static) deflection
sensitivity calibrated by the response in deep contact and it is further used
for spring constant calibration. Proper quantification of stiffness requires
accurate estimate of $A_{b}$. As expected, for deep contact with hard glass
surface lock-in amplitude $\tilde{A}={2\over{3}}L\large{dz\over{dx}}=A_{b}$
follows the motion of dither piezo and gives an indirect way of measuring
$A_{b}$. However this relation may still involve small fluid contribution
because of cantilever base motionRaman and therefore for our measurement we
employed non-destructive way of directly measuring $A_{b}$ using home built
Fabry- Perot based interferometer detection (see supplementary fig 1). This
calibration gives the same value to within 10 % as given by deep contact.
Error in measuring stiffness $k_{i}$ will primarily arise from systematic
error in amplitude $A_{b}$(supplementary). We believe that a maximum
systematic error of 20 % in $A_{b}$ will not significantly change our final
result. The same procedure as mentioned in force measurement was followed for
single molecule detection. The simultaneous dynamic measurements corresponding
to such single molecule force events were analyzed. 50 curves for PEG in water
and 40 curves for PEG in 2-propanol were analyzed. For polystyrene, 40 and 20
curves in water and 8M urea were analyzed respectively. Representative curves
are shown in the paper.
Figure 3: a) WLC fit to normalized force-extension curves measured in
2-propanol. WLC fits the force regime with persistence length $l_{p}=0.13$ nm.
b) Two-state FJC fit to normalized force extension curves measured in water.
The estimated parameter of kuhn length is $0.24$ nm. Additional best fit
parameters include(see supplementay) free energy difference between gauche and
trans conformer $\Delta G=3.1k_{B}T$ and length of gauche state
$L_{gauche}=0.23$ nm.
## Results and Discussion
### .1 Poly(ethylene)glycol
#### .1.1 Force-extension measurement
Typical force versus extension curves of polyethylene glycol PEG in 2-propanol
recorded in single molecule force spectroscopy experiments are shown in Figure
3a. It shows force versus extension curves normalized by their apparent chain
extension(see supplementary fig. 3). At a phenomenological level, these non
linear force-extension profiles are described with statistical models like
wormlike chain (WLC) or freely jointed chain (FJC). WLC treat the polymer as a
continuum chain and accounts for entropy dominated contribution to elasticity
with two adjustable fitting parameters, persistence length, $l_{p}$ and
contour length, $L$. Persistence length is the characteristic length-scale
beyond which thermal energy can bend the polymer chain. Therefore, it is a
measure of local bending stiffness of the polymer. Equation $5$ describes the
Marko-Siggia interpolation formula relating force $F$ to extension $x$ of
polymer chain which accounts for low F $<$ $k_{B}$T/$l_{p}$ and high force F
$>$ $k_{B}$T/$l_{p}$ behavior of WLC
$F={k_{B}T\over{l_{p}}}\bigg{(}{1\over{4(1-{x\over{L}})^{2}}}-{1\over{4}}+{x\over{L}}\bigg{)}$
(5)
with boltzmann constant $k_{B}$ and temperature $T$ in kelvin. Figure 3a shows
fitted WLC (eq 5) to normalized force-extension profile. The value of
persistence length estimated is $l_{p}=0.13\pm 0.02$ nm. WLC fits reasonably
well but persistence length obtained is even lower than the monomer size of
$(0.4$nm$)$. Note that models with additional free parameters (such as
extended-WLC) did not change the goodness of fit or the value of persistence
length. Measurements were also performed in deionized(DI) water as shown in
3b. PEG in aqueous medium is known to exhibit a conformational change from
gauche to trans as a function of force shown in experimentsgaub ; gaub1 and
simulationheymann . The effect of this transition is seen as linear-force
region between 100 and 300 pN in 3b, which is not present in 2-propanol. To
account for this, force-extension profiles are typically modelled with two-
state FJC modelgaub ; Cui1 (supplementary eq 1). This model combines FJC
entropic elasticity with changes in length of PEG monomers from gauche to
trans as force is applied. Figure 3b shows normalized force extension curves
fitted with two-state FJC model. The value of Kuhn length obtained is
$b_{k}=0.24$ nm which matches well with its value in 2-propanol($2l_{p}\sim
0.25$ nm) and other organic solventsCui2 . However, the Kuhn length $0.24$ nm
is about about five time less compared to $1.2$ nm(or persistence length 0.6
nm) measured in low-force magnetic tweezer measurementssaleh ; saleh2 . Note
that a prior work by Oesterhelt et.algaub chose a value of Kuhn
length(0.7-0.8 nm) as measured for PEG in hexadecane, to model PEG elasticity
with two-state FJC model in water. However, recent measurement shows that such
a large value is likely a result of excluded volume effects due to large size
of hexadecaneCui2 .
The unphysical value of $l_{p}$ seem to suggest that WLC model of entropic
elasticity is not the adequate description of AFM data, although it fits well
since persistence length is a fit parameter. It is suggested that in typical
force range of AFM experiments, WLC behavior will transition to FJC-like
behaviorrosa ; rubinstein . Based on this, a WLC-FJC interpolation model was
proposed which has features of both WLC (persistence length $l_{p}$) and FJC(
a discrete bond length $b$) rubinstein . This interpolation model was used to
analyze AFM stretching data on different polymers(see Appendix C,
ref.rubinstein ). It is observed that the value of persistence length are
similar and does not change with respect to original fitting with WLC model.
We tested such a model on our data and similarly no change in persistence
length was observed(supplementary fig 4). It suggests that choice of a
different model does not explain unreasonably low values of persistence
lengths in AFM experiments. This begs the question that why anomaly low values
of persistence length( or Kuhn length) repeatedly appear in AFM-based pulling
experiments.
Another consideration which possibly explains such anomaly is the method of
performing the conventional pulling experiments using AFM. It has been
recognized that cantilever probe couples with the polymer elasticity in an
intricate manner for constant velocity pulling experimentsfranco ; kreuzer .
This produces a biased trajectory wherein polymer is not able to sample its
intrinsic equilibrium conformations and experiment may not capture the elastic
response of the polymer chain alone. This is in contrast to magnetic tweezers
experiments wherein properties of isolated polymer in equilibrium are
measuredkreuzer . In the next section, we describe our oscillatory rheology
measurements on single polymer chain which deconvolute the effect arising due
to cantilever from the polymer’s elastic response. We discuss the principle of
deconvolution in the last section.
#### .1.2 Dynamic measurement
Figure 4: For PEG in water, simultaneously measured raw profiles of force in
constant velocity(60 nm/sec) pulling experiment (black) and also in-phase
X-signal (red) and quadrature Y signal (green) of lock-in amplifier. Figure
5: Comparison of stiffness obtained via dynamic oscillatory method for PEG
with conventional force curve derivative a) in water. Derivative of fitted
WLC(blue dash) $l_{p}=0.13$ nm obtained in constant velocity pulling
experiment simultaneous with stiffness from dynamic oscillatory method(black)
fitted with WLC derivative(red) $l_{p}=0.65$ nm. Note that green region
between 100 and 300 pN(or extension between 80 and 100 pN) is excluded while
fitting to WLC or its derivative. b) in 2-propanol. Derivative of fitted
WLC(blue dash) $l_{p}=0.13$ nm from constant velocity pulling experiment
compared with stiffness from dynamic oscillatory(black) method fitted with WLC
derivative(red) $l_{p}=0.64$ nm.
To address this, we directly measure elastic response of PEG chain using
dynamic oscillatory method along with constant velocity pulling force-
extension curve. For this, the cantilever is simultaneously oscillated while
it is pulled slowly at a constant velocity $\sim$ 60 nm/s. This velocity is
much less than pulling velocities used in the previous reportsradiom ; Cui .
Using lock-in amplifier we record the dynamic linear response at a frequency
close to 1 KHz. Figure 4 shows raw profile of X and Y signal of lock-in
amplifier measured simultaneously with force-extension curve of PEG in water.
From eq $3$, in-phase X signal is directly proportional to the elastic
response of polymer $k_{i}$ apart from a fixed contribution from cantilever’s
hydrodynamic loading. X-signal follows the feature of force-extension curve
and subtracting the fixed cantilever contribution one extracts the elastic
response of polymer. Quadrature Y signal is proportional to effective friction
of the combined polymer cantilever system. Y signal shows no difference with
and without polymer attached and remains featureless in Figure 4. In our
recent work, we have shown that the dissipation due to unfolded protein chain
of I27 is also immeasurably lowshatruhan . This is possibly due to much faster
polymer internal dynamics compared to experimental timescalesmoglich . In
Figure 5, the stiffness of the polymer extracted using the in-phase X
component data is shown along with derivative of WLC fit to force-extension
data. We chose the derivative of the fit for comparison since the derivative
of experimental data become noisy for any meaningful comparison. The
derivative of force-extension behavior(blue dash) shows marked deviation from
directly measured stiffness data(black)for PEG in water(Figure 5a). Analyzing
the stiffness data with WLC model(red) gives persistence length of
$l_{p}=0.65\pm 0.19$ nm compared to $l_{p}=0.13\pm 0.02$ nm from derivative of
force-extension curve. We excluded part of the data in the extension range of
80 to 100 nm (green) which show marked deviations while fitting both force and
stiffness data to WLC (see supplementary fig 5). As explained earlier, PEG
monomers undergo a well-known trans-trans-gauche to all-trans conformational
change in water as shown in experimentsgaub ; gaub1 and simulationheymann .
As observedgaub1 , this transition characteristically shows up as a linear
force region between 100 and 300 pN(80 and 100 nm). Deviation of stiffness
data in similar force region(80 and 100 nm) shows that our dynamic measurement
is sensitive to such conformational change. However, due to conformational
change such a fitting procedure with WLC cannot be used to extract any
meaningful estimate of persistence length. To avoid the conformational change
in water, we performed measurements in 2-propanol which is also a good solvent
for PEG. Since 2-propanol is volatile, the experiment is performed within 2
hour of injecting it into fluid cell. The effects due to conformational change
are now absent in both the dynamic stiffness in Figure 5b) as well as in
constant velocity pulling data (figure 3a). For PEG in 2-propanol, direct
measurement of stiffness through oscillatory rheology gives the persistence
length $l_{p}=0.64\pm 0.19$ nm and WLC fits well in the entire range without
having to exclude any region due to hydration effects as in Figure 5a. The
constant velocity pulling experiments yield a value persistence
length($0.13\pm 0.02$ nm). Persistence length of $0.64\pm 0.19$ nm is
consistent with low-force equilibrium measurements performed using magnetic
tweezers manipulationsaleh ; saleh2 and also other ensemble techniquescolby ;
colby2 . Dittmore et. alsaleh and Innes-gold et. alsaleh2 reported the
$l_{p}$ value of $0.55$ nm and $0.65$ nm respectively. And the neutron
scattering measurements by Smith et. alcolby2 report the $l_{p}$ for PEG as
$0.6$ nm.
In the context of extracting viscoelastic information, oscillatory
measurements have been performed on single moleculeskawakami ; kawakami2 ;
liang . In contrast to the present study, these measurements were performed
with oscillation frequencies close to cantilever resonance and have reported
dissipation for single molecule. Recent work in modelling of cantilever
dynamics in liquid, highlights the problem in interpretation of single-
molecule dissipation dataDeitler2 ; shatruhan . It points out difficulty in
making a distinction between elastic and dissipative signals especially for
frequencies close to cantilever resonance. Dynamic measurement on PEG were
also performed in water previouslyhinterdorfer . Kienberger et al.used PEG
derivatives with functional groups at the chain ends to couple the chain to
tip and the substrate and magnetic excitation scheme to oscillate the
cantilever close to resonance. The measured static pulling as well as dynamic
force-extension profiles were analyzed with the extended Worm-Like-Chain (WLC)
model, yielding a persistence length of 0.38 nm. These measurements are not
strictly off-resonance as compared to ours. The use of magnetic excitation
method, however are known to produce artefact-free measurementsraman2 . It is
noteworthy that the oscillatory measurements in their case also produce
reasonably good persistence length estimates. A detailed investigation to
compare our method to the one used by Kienberger et al. is worthwhile.
In the next section we describe our measurements on polystyrene(PS) in good
and poor solvents. This sheds light on the influence of solvents on our
dynamic measurement and ultimately understanding its effect on polymer
elasticity.
### .2 Polystyrene
In order to further examine the effect of poor solvents on dynamic oscillatory
measurements, we performed force spectroscopy measurement on polystyrene in
water. One difference between the two homopolymers is that PS has aromatic
side chains which are hydrophobic and the polymer chain collapses in poor
solvent such as water. It has been demonstrated recently that high
concentration aqueous solution of urea acts as good solvent for PS zangi ;
mondal ; england . We performed both, the constant velocity pulling and
dynamic oscillatory measurements, on PS in water and PS in 8 M urea solution
in water.
#### .2.1 Force-extension measurement
Figure 6: Normalized force-extension curves for polystyrene in water with
persistence length $l_{p}=0.23$ nm. Figure 7: Comparison of derivative of WLC
obtained from fitting to force-extension curve(blue dash), stiffness measured
with dynamic oscillatory(black) method and WLC derivative fit(red) to
stiffness. a)Polystyrene in water b)Polystyrene in 8M urea.
Figure 6 shows normalized force extension profiles fitted with WLC. Note that
we fit in the entire force regime ignoring the flat plateau region ($<$20 pN)
which results from coil-globule transition for polystyrene in waterwalker2 .
The fit gives a persistence length $l_{p}=0.23\pm 0.02$ nm consistent with
observation made earlierwalker . The steric hindrances are offered by aromatic
side group of benzene. It is 0.72 nm long and is responsible for determining
the persistence length. In this sense, the size of the monomer is about $0.72$
nm and the observed low value of persistence length has been debatedradiom .
It is expected to have a $l_{p}$ larger than $1$ nm. Low value of $0.25$ nm is
also consistently cited in ideal to good solvents like tolueneradiom ; walker2
.
#### .2.2 Dynamic measurement
We repeat our simultaneous oscillatory measurement along with force-extension
measurements on polystyrene in water. Figure 7a shows stiffness measured by
dynamic oscillatory method(black), WLC fit to it (red) and derivative of WLC
fit to the force-extension curve (blue dash). Interestingly, they coincide
with each other having no clear deviation as in case of PEG in water or
2-propanol. Persistence length obtained by fit to the dynamic stiffness data
is similar $l_{p}=0.21\pm 0.02$ nm. Similarly, in contrast to our observation
on PEG in good solvents(5), the unfolded globular proteins show same value of
persistence length in AFMLorna , MTspopa and also oscillatory
measurementsDeitler2 ; shatruhan . As in case of polystyrene, we suspect that
fitting WLC to the data yields persistence length as only an effective
parameter. However, in WLC model the strong hydrophobic effects are not
considered along with backbone entropic contributions. A need to include this
effect has already been suggested in the literaturegrater ; berne .
In order to confirm this effect, we employed our measurement scheme on
polystyrene in good solvent. High concentration of aqueous urea solution
behaves similar to a good solvent for hydrophobic polymer, as it weakens the
hydrophobic interaction which causes the polymer to collapse in waterzangi ;
mondal ; england . We carry out dynamic measurement in 8M urea as shown in
Figure 7b. It shows the comparison of dynamic and constant velocity pulling
measurements. Interestingly, we obtain a similar deviation between the
derivative of WLC fit to force-extension curves($l_{p}$=0.25 nm) and
stiffness-extension curves measured using dynamic oscillatory method ($l_{p}$
as 0.8 nm). This value of $l_{p}$ is reasonable since it is larger than
monomer size. The similarity in results between PEG and PS in good solvent is
striking. We discuss it further in the next section. We argue that the
hydrophobic interactions dominate the polymer elasticity in such a way that
stiffness from dynamic oscillatory technique and derivative of force extension
curves approach each other.
### .3 Principle of deconvolution
To qualitatively explain the deviation between derivative of force-extension
curve and oscillatory measurement we begin by noting that conventional
constant velocity pulling experiments represent a coupled cantilever-molecule
system. In AFM experiments, the extension of molecule and force on it are
measured indirectly through the deflection of cantilever probe to which the
molecule is tethered. This deflection force is determined by simultaneous
action of both cantilever and the molecule in an intricate convolution and
effect of one from the other is difficult to separatefranco ; kreuzer . To
understand this better, one makes a connection between force-extension curve
and polymer stretching thermodynamics(see supplementary information). Under
equilibrium condition, canonical partition function $Z_{system}$ of composite
cantilever plus molecule system at a given displacement $D$ of cantilever at
time t can be written asfranco ; kreuzer :
$Z_{system}(D)\sim Z_{m}*Z_{c}=e^{{-\beta F(x)}}e^{{-{\beta
k_{c}\delta^{2}}/2}}$ (6)
where $\beta$ is 1/$k_{B}T$, $x$ is end-to-end extension of molecule. $Z_{m}$
is the partition function of isolated molecule determined by its molecular
free energy F($x$) and $Z_{c}$ is cantilever partition function determined by
its stiffness $k_{c}$ and deflection $\delta$. Because deflection is
$\delta$=$D-x$, the function in eq (6) defines the mathematical convolution of
cantilever and molecule in pulling experiments. Therefore, measured quantities
such as average force determined by $Z_{system}$ are those of composite
molecule plus cantilever system(see supplementary). However, one is interested
in the properties of molecule itself determined by $Z_{m}$. One notes from
eq(6) that either at high force characterized by large deflection or the use
of stiff spring $k_{c}$, contribution of cantilever biasing potential
$k_{c}(D-x)^{2}/2$ is reduced substantially with $Z_{c}$ approaching delta
function $\delta(D-x)$kreuzer . This implies that at high forces the
derivative of force-extension curve and stiffness from the dynamic measurement
will start to coincide as seen in fig 5a, 5b and fig 7b. Similarly, for soft
spring or low force magnetic tweezer measurement done at a constant force,
partition function reduces to that for an isolated moleculekreuzer .
Therefore, effect of coupling would be maximum at intermediate forces. To see
this, it is noted that a free energy($F$) in eq(6) is determined by WLC
entropy ($-TS_{WLC}$). At an intermediate force ($\sim$ 250 pN), cantilever
potential is $\sim$ 12 kT compared with WLC entropic contribution($-TS_{WLC}$)
of about 2 kT( see supplementary information). Therefore, from eq(6),
cantilever dominantly determines the overall $Z_{system}$, producing a biased
force-extension curve. In contrast, directly measuring stiffness by externally
oscillating the cantilever, stretched polymer and the cantilever work in
parallel pathways. This means that the contribution of polymer and cantilever
to the overall system response is simply additive as seen from eq(3) and
eq(4). Therefore, oscillatory measurement allows to extract polymer intrinsic
response from its coupling to cantilever probe. For externally modulated AFM
cantilever it is known that spring for the polymer effectively adds with
cantilever to determine net force on the systempethica ; kulik (supplementary
fig 2). This observation results in parallel coupling pathway in eq (3).
In addition to conformational entropy of backbone, polymer-solvent
interactions significantly influence elasticity of extended hydrophobic
polymers like polystyrenegrater ; berne2 ; radiom ; gosline . It is well
established that hydrophobic interactions among nonpolar monomers tend to
soften the polymer, reducing its persistence length by a large factorgrater ;
berne2 . Thermodynamically, the strength of hydrophobic interactions can be
described in terms of hydrophobic solvation free energy between polymer and
solvent. Exposure of hydrophobic side chains upon extension would require
hydrophobic free energy penalty that is large and positivegosline . It is
estimated from experiments to be about six times the chain entropygrater even
for relatively large chain extension and lowers the persistence length
significantly. With bulky aromatic side chain, hydrophobic free energy per
monomer of polystyrene is estimated to be $\sim$ 20 kTabraham . Hence, from eq
(6) we see that total free energy F($F_{hydrophobic}$+$F_{WLC}$) starts to
become dominant compared to cantilever biasing in determining overall
$Z_{system}$. Therefore, the dynamic oscillatory method and the constant
velocity pulling experiments produces similar stiffness profiles for
polystyrene in water. Since WLC only accounts for entropic contributions, one
should avoid its use to analyse the data of both unfolded proteins and
hydrophobic polymers in poor solvents.
## Conclusions
We employ oscillatory rheology to get an independent yet simultaneous estimate
of elastic response in single molecule pulling experiments. This response
shows significant deviation in elasticity from conventional constant velocity
pulling experiments in good solvents. The analysis with WLC model, which
accounts for entropic nature of elasticity, results in a large and physically
acceptable value of persistence length. This value is consistent with
equilibrium magnetic tweezers measurements, which suggests that oscillatory
dynamic measurement using AFM is better suited for measurement of single
polymer chain elasticity compared to constant velocity pulling experiment. We
conclude that constant velocity pulling experiments using AFM produces a
biased molecular trajectory due to convolution of cantilever probe with
molecule’s response. In contrast, for polymer chain in poor solvent no
deviation is observed in stiffness profiles extracted from data using both
methods. We explain this by considering the contribution of additional
hydrophobic free energy and its effect on sampling the intrinsic equilibrium
configuration in poor solvents. Such considerations explain our observation
that both methods yield the same elastic response for polymer single chain in
poor solvent.
While pulling experiments were suspected to be biased in earlier works,
present study is the first to show oscillatory technique to deconvolute
apparatus effects. Although we use WLC at a phenomenological level, a
persistence length consistent with other techniques underlines its success in
high-force AFM stretching experiments. However, results hint at observing
caution for its use in describing AFM data of polymers in poor solvents.
## Supporting Information
* •
Calibration of drive amplitude of dither piezo; Error analysis; Normalization
of PEG force-extension curves; Stiffness add in parallel; two-state fjc, wlc-
fjc interpolation; Connection between force-extension curve and
thermodynamics.
## Acknowledgements
The work was supported by Wellcome Trust-DBT India Alliance fellowship to SP
(500172/Z/09/Z). Amrita Kulkarni helped in preparing samples. VA and SR would
like to acknowledge fellowship from IISER Pune.
## References
## References
* (1) Rubinstein, M.; Colby, R. H. Polymer Physics; Oxford University Press: New York, 2003.
* (2) Carrillo, J. M. Y.; MacKintosh, F. C.; Dobrynin, A. V. Nonlinear Elasticity: From Single Chain to Networks and Gels. Macromolecules 2013, 46, 3679-3692.
* (3) Eckels, E. C.; Tapia-Rojo, R.; Rivas-Pardo, J. A., Fernández JM. The work of titin protein folding as a major driver in muscle contraction. Annu. Rev. Physiol. 2018, 80, 327–351.
* (4) Schroeder, C. M. Single Polymer Dynamics for Molecular Rheology. J. Rheol. 2018, 62, 371– 403.
* (5) Žoldák, G.; Rief, M. Force as a single molecule probe of multidimensional protein energy landscapes. Curr. Opin. Struct. Biol. 2013, 23, 48– 57
* (6) Neuman, K. C.; Attila, N. Single-Molecule Force Spectroscopy: Optical Tweezers, Magnetic Tweezers and Atomic Force Microscopy. Nat. Methods 2008, 5, 491– 505.
* (7) Giannotti, M. I.; Vancso, G. J. Interrogation of Single Synthetic Polymer Chains and Polysaccharides by AFM-Based Force Spectroscopy ChemPhysChem 2007, 8, 2290.
* (8) Bao, Y.; Luo, Z.; Cui, S. Environment-Dependent Single-Chain Mechanics of Synthetic Polymers and Biomacromolecules by Atomic Force Microscopy-Based Single-Molecule Force Spectroscopy and the Implications for Advanced Polymer Materials. Chem. Soc. Rev. 2020, 49, 2799– 2827.
* (9) Bustamante, C.; Bryant, Z.; Smith, S. B. Ten years of tension: single-molecule DNA mechanics. Nature 2003, 421, 423-427.
* (10) Marszalek, P. E.; Dufrene, Y. F. Stretching single polysaccharides and proteins using atomic force microscopy. Chem. Soc. Rev. 2012, 41, 3523-3534.
* (11) Hoffmann, T.; Dougan, L. Single molecule force spectroscopy using polyproteins. Chem. Soc. Rev. 2012, 41, 4781– 4796.
* (12) Marko, J. F.; Siggia, E. D. Stretching DNA. Macromolecules 1995, 28, 8759-8770.
* (13) Bustamante, C.; Marko, J. F.; Siggia, E. D.; Smith, S. Entropic elasticity of lambda-phage DNA. Science 1994, 265, 1599– 1600.
* (14) Saleh, O. A.; McIntosh, D. B.; Pincus, P.; Ribeck, N. Nonlinear low-force elasticity of single-stranded DNA molecules. Phys. Rev. Lett. 2009, 102, 068301-1– 068301-4.
* (15) Valle-Orero, J.; Rivas-Pardo, J. A.; Popa, I. Multidomain proteins under force. Nanotechnology 2017, 28 (17) 174003.
* (16) Stirnemann, G.; Giganti, D.; Fernandez, J. M.; Berne, B. J. Elasticity, Structure, and Relaxation of Extended Proteins Under Force. Proc. Natl. Acad. Sci. 2013, 3847– 3852.
* (17) Dittmore, A.; McIntosh, D. B.; Halliday, S.; Saleh, O. A. Single-molecule elasticity measurements of the onset of excluded volume in poly (ethylene glycol). Phys. Rev. Lett. 2011, 107, 148301.
* (18) Saleh, O. A. Perspective: Single polymer mechanics across the force regimes. J. Chem. Phys. 2015, 142, 194902.
* (19) Al Maawali, S.; Bemis, J. E.; Akhremitchev, B. B.; Liu, H.; Walker, G. C. Single-Molecule AFM Study of Polystyrene Grafted at Gold Surfaces J. Adhes. 2005, 81, 999-1016.
* (20) Li, H.; Zhang, W.; Xu, W.; Zhang, X. Hydrogen Bonding Governs the Elastic Properties of Poly(vinyl alcohol) in Water: Single-Molecule Force Spectroscopic Studies of PVA by AFM Macromolecules 2000, 33, 465– 469.
* (21) Dessinges, M.-N.; Maier, B.; Zhang, Y.; Peliti, M.; Bensimon, D.; Croquette, V. Stretching Single Stranded DNA, a Model Polyelectrolyte. Phys. Rev. Lett. 2002, 89, 248102.
* (22) Milad Radiom, Plinio Maroni, and Michal Borkovec . Influence of Solvent Quality on the Force Response of Individual Poly(styrene) Polymer Chains. ACS Macro Letters 2017, 6 , 1052-1055.
* (23) Rosa, A.; Hoang, T. X.; Marenduzzo, D.; Maritan, A. Elasticity of semiflexible polymers with and without self-interactions. Macromolecules 2003, 36, 10095– 10102.
* (24) Dobrynin, A. V.; Carrillo, J.-M. Y.; Rubinstein, M. Chains Are More Flexible under Tension. Macromolecules 2010, 43 (21), 9181– 9190.
* (25) Franco, I.; Ratner, M. A.; Schatz, G. C. Single-Molecule Pulling: Phenomenology and Interpretation. Nano and Cell Mechanics; John Wiley $\&$ Sons, Ltd: Chichester, U.K., 2012; Vol. 3113, pp 359– 388.
* (26) Kreuzer, H. J.; Payne, S. H.; Livadaru, L. Stretching a macromolecule in an atomic force microscope: statistical mechanical analysis. Biophys. J.2001, 80, 2505–2514.
* (27) Staple, D. B.; Hanke, F.; Kreuzer, H. J. Comment on sub- Angstrom conformational changes of a single molecule captured by AFM variance analysis. Biophys. J. 2008, 95, 1001-1002.
* (28) Kumar, S.; Bouzida, D.; Swendsen, R. H.; Kollman, P. A.; Rosenberg, J. M. The weighted histogram analysis method for free‐energy calculations on biomolecules. I. The method. J. Comput. Chem. 1992, 13, 1011-1021.
* (29) Hinczewski, M.; Gebhardt, J. C. M.; Rief, M.; Thirumalai, D. From mechanical folding trajectories to intrinsic energy landscapes of biopolymers. Proc. Natl. Acad. Sci. U. S. A. 2013, 110 (12), 4500.
* (30) Hinczewski, M.; von Hansen, Y.; Netz, R. R. Deconvolution of Dynamic Mechanical Networks Proc. Natl. Acad. Sci. U.S.A. 2010, 107, 21493– 21498.
* (31) Halperin, A., Goldbart, P. M. Early stages of homopolymer collapse. Phys. Rev. E 2000, 61, 565-573.
* (32) Walther, K. A., Grater, F., Dougan, L., Badilla, C. L., Berne, B. J., and Fernandez, J. M. Signatures of hydrophobic collapse in extended proteins captured with force spectroscopy. Proc. Natl. Acad. Sci. U.S.A. 2007, 104, 7916– 7921.
* (33) Grater, F.; Heider, P.; Zangi, R.; Berne, B. J. Dissecting Entropic Coiling and Poor Solvent Effects in Protein Collapse. J. Am. Chem. Soc. 2008, 130, 11578– 11579.
* (34) Butt, H. J.; Jaschke, M. Calculation of thermal noise in atomic force microscopy. Nanotechnology 1995, 6, 1-7.
* (35) Melcher, J.; Hu, S.; Raman, A. Equivalent Point-Mass Models of Continuous Atomic Force Microscope Probes Appl. Phys. Lett. 2007, 91, 053101.
* (36) Kiracofe, D.; Raman, A. Quantitative Force and Dissipation Measurements in Liquids Using Piezo-Excited Atomic Force Microscopy: A Unifying Theory. Nanotechnology 2011, 22, 485502.
* (37) Pethica, J. B.; Oliver, W. C. Tip surface interactions in STM and AFM. Phy. Scr. 1987, T19, 61.
* (38) Burnham, N. A.; Gremaud, G.; Kulik, A. J.; Gallo, P.-J.; Oulevey, F. Materials’ properties measurements: choosing the optimal scanning probe microscope configuration J. Vac. Sci. Technol.B 1996, 14, 1308-1312.
* (39) Sarid, D.Scanning Force Microscopy; Oxford University Press, London, UK, 1991.
* (40) Benedetti, F.; Gazizova, Y.; Kulik, A. J.; Marszalek, P. E.; Klinov, D. V.; Dietler, G.; Sekatskii, S. K. Can Dissipative Properties of Single Molecules Be Extracted from a Force Spectroscopy Experiment? Biophys. J. 2016, 111, 1163-1172.
* (41) Oesterhelt, F.; Rief, M.; Gaub, H. E. Single Molecule Force Spectroscopy by AFM Indicates Helical Structure of Poly(ethyleneGlycol) in Water. New J. Phys. 1999, 1, 1-11.
* (42) Ott, W.; Jobst, M. A.; Bauer, M. S.; Durner, E.; Milles, L. F.; Nash, M. A.; Gaub, H. E. Elastin-Like Polypeptide Linkers for Single Molecule Force Spectroscopy. ACS Nano 2017, 11, 6346-6354.
* (43) Heymann, B.; Grubmüller, H. Elastic properties of poly (ethylene-glycol) studied by molecular dynamics stretching simulations. Chem. Phys. Lett. 1999, 303, 1.
* (44) Cai, W., Lu, S., Wei, J. and Cui, S., Single-chain polymer models incorporating the effects of side groups: an approach to general polymer models. Macromolecules 2019, 52(19), pp.7324-7330.
* (45) Luo, Z.; Zhang, B.; Qian, H. J.; Lu, Z. Y.; Cui, S. Effect of the Size of Solvent Molecules on the Single-Chain Mechanics of Poly(Ethylene Glycol): Implications on a Novel Design of a Molecular Motor. Nanoscale 2016, 8, 17820– 17827.
* (46) Möglich, A.; Joder, K.; Kiefhaber, T. End-to-end distance distributions and intrachain diffusion constants in unfolded polypeptide chains indicate intramolecular hydrogen bond formation. Proc. Natl. Acad. Sci. U.S.A. 2006, 103, 12394-12399.
* (47) Shatruhan,S. S.; Deopa, S. P. S.; Yadav, J.; Ahlawat, V.; Patil, S. The nano-scale viscoelasticity using atomic force microscopy in liquid environment. Nanotechnology 2021, 32, 085103.
* (48) Innes-Gold, S. N.; Morgan,I. L.; Saleh,O. A. Surface-induced effects in fluctuation-based measurements of single-polymer elasticity: A direct probe of the radius of gyration.J. Chem. Phys. 2018, 148(12), 123314.
* (49) Smith, G. D.; Yoon, D. Y.; Jaffe, R. L.; Colby, R. H.; Krishnamoorti, R.; Fetters, L. J. Conformations and Structures of Poly(oxyethylene) Melts from Molecular Dynamics Simulations and Small-Angle Neutron Scattering Experiments. Macromolecules 1996, 29, 3462.
* (50) Kawakami, M., Byrne, K., Khatri, B., McLeish, T. C. and Smith, D. A. Viscoelastic properties of single poly (ethylene glycol) molecules ChemPhysChem 2006, 7, 1710.
* (51) Kawakami, M.; Byrne, K.; Khatri, B.; Mcleish, T. C. B.; Radford, S. E.; Smith, D. A. Viscoelastic measurements of single molecules on a millisecond time scale by magnetically driven oscillation of an atomic force microscope cantilever Langmuir 2005, 21, 4765-4772.
* (52) Liang, X.; Nakajima, K. Investigating the Dynamic Viscoelasticity of Single Polymer Chains using Atomic Force Microscopy J. Polym. Sci. B 2019, 57, 1736–43.
* (53) Kienberger, F.; Pastushenko, V. P.; Kada, G.; Gruber, H. J.; Riener, C.; Schindler, H.; Hinterdorfer, P. Static and dynamical properties of single poly(ethylene glycol) molecules investigated by force spectroscopy Single Mol. 2000, 1, 123– 128.
* (54) Xu, X.; Raman, A. Comparative dynamics of magnetically, acoustically, and Brownian motion driven microcantilevers in liquids J. Appl. Phys. 2007, 102 (3) 034303.
* (55) Gunari, N.; Balazs, A. C.; Walker, G. C. Force-Induced Globule-Coil Transition in Single Polystyrene Chains in Water. J. Am. Chem. Soc. 2007, 129, 10046– 10047.
* (56) Zangi, R.; Zhou, R.; Berne, B. J. Ureas Action on Hydrophobic Interactions. J. Am. Chem. Soc. 2009, 131, 1535– 1541.
* (57) Mondal, J.; Halverson, D.; Li, I. T. S.; Stirnemann, G.; Walker, G. C.; Berne, B. J. How Osmolytes Influence Hydrophobic Polymer Conformations: A Unified View from Experiment and Theory Proc. Natl. Acad. Sci. U. S. A. 2015, 112, 9270– 9275.
* (58) England, J. L.; Haran, G. Role of Solvation Effects in Protein Denaturation: From Thermodynamics to Single Molecules and Back Annu. Rev. Phys. Chem. 2011, 62, 257– 277
* (59) Gosline, J. M. Hydrophobic interaction and a model for the elasticity of elastin. Biopolymers 1978, 17, 677-695.
* (60) Abraham, M. H.; Whiting, G. S.; Fuchs, R.; Chambers, E. J.Thermodynamics of Solute Transfer from Water to Hexadecane J. Chem. Soc., Perkin Trans. 1990, 2, 291-300.
| arxiv-papers | 2021-07-27T08:35:49 | 2024-09-04T03:07:20.932293 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Vikhyaat Ahlawat, Shatruhansingh Rajput, Shivprasad Patil",
"submitter": "Shivprasad Patil",
"url": "https://arxiv.org/abs/2107.12670"
} |
2107.12672 | 1136 research algorithm/technique Weiss et al.: Differentiable Direct Volume
Rendering A fully differentiable direct volume renderer is used for a)
viewpoint optimization, b) transfer function optimization, and optimization of
voxel properties using c) an absorption-only model and d) an emission-
absorption model with rgb$\alpha$ transfer functions. a), c) and d) show
intermediate results of the optimization process until convergence.
# Differentiable Direct Volume Rendering
Sebastian Weiss and Rüdiger Westermann e-mail: [email protected]:
[email protected] Technical University of Munich
###### Abstract
We present a differentiable volume rendering solution that provides
differentiability of all continuous parameters of the volume rendering
process. This differentiable renderer is used to steer the parameters towards
a setting with an optimal solution of a problem-specific objective function.
We have tailored the approach to volume rendering by enforcing a constant
memory footprint via analytic inversion of the blending functions. This makes
it independent of the number of sampling steps through the volume and
facilitates the consideration of small-scale changes. The approach forms the
basis for automatic optimizations regarding external parameters of the
rendering process and the volumetric density field itself. We demonstrate its
use for automatic viewpoint selection using differentiable entropy as
objective, and for optimizing a transfer function from rendered images of a
given volume. Optimization of per-voxel densities is addressed in two
different ways: First, we mimic inverse tomography and optimize a 3D density
field from images using an absorption model. This simplification enables
comparisons with algebraic reconstruction techniques and state-of-the-art
differentiable path tracers. Second, we introduce a novel approach for
tomographic reconstruction from images using an emission-absorption model with
post-shading via an arbitrary transfer function.
###### keywords:
Differentiable rendering, Direct Volume Rendering, Automatic Differentiation
Introduction
Differentiable direct volume rendering (DiffDVR) can serve as a basis for a
multitude of automatic optimizations regarding external parameters of the
rendering process such as the camera, the transfer function (TF), and the
integration stepsize, as well as the volumetric scalar field itself. DiffDVR
computes derivatives of the rendered pixel values with respect to these
parameters and uses these derivatives to steer the parameters towards an
optimal solution of a problem-specific objective (or loss) function. DiffDVR
is in particular required when using neural network-based learning tasks,
where derivatives need to be propagated seamlessly through the network for
training end-to-end regarding the loss function.
While a number of approaches have been proposed for differentiable surface
rendering [20], approaches focusing on differentiable rendering in the context
of volume visualization are rare. For surface rendering, one objective is on
the optimization of scene parameters like material properties, lighting
conditions, or even geometric shape, to achieve matchings of synthetic and
real images in computer vision tasks. Others have used implicit surface
representations encoded via volumetric signed distance functions to derive
analytic gradients for image-based shape reconstruction tasks [25, 44, 35].
These approaches assume opaque surfaces so that in each optimization iteration
the gradient descent is with respect to the encoding of a single fragment per
pixel. This is different from direct volume rendering applications, where the
optimization needs to consider the contributions of many samples to a pixel
color. This requires considering a large number of partial derivatives of
pixel colors with respect to parameter or material changes, and to propagate
them back into the volumetric field.
The differentiable rendering framework Mitsuba 2 [37] also provides a solution
for direct volume rendering through Monte Carlo path tracing. However, Mitsuba
directly applies so-called reverse-mode differentiation, which requires all
intermediate derivatives to be saved for backpropagation. Thus, the memory
required in direct volume rendering applications quickly exceeds the available
system memory. This limits the approach to small volumetric grids and a small
number of volume interactions that cannot faithfully optimize for small-scale
structures. A follow-up work [36] addresses this issue but limits the
differentiability to volume densities and colors.
### 0.1 Contribution
This work presents a general solution for DiffDVR: differentiable Direct
Volume Rendering using the emission-absorption model without multiple
scattering. This requires analyzing approaches for automatic differentiation
(AD) with respect to the specific requirements in direct volume rendering
(DVR). So-called forward-mode approaches are efficient if the number of
parameters is low, yet they become computationally too expensive with an
increasing number of parameters, i.e., when optimizing for per-voxel densities
in a volumetric field. The so-called reverse mode or adjoint mode records the
operations and intermediate results in a graph structure. This structure is
then traversed in reverse order during the backward pass that propagates the
changes to the sample locations. However, this requires storing $O(kn)$
intermediate results, where $n$ is the number of pixels and $k$ the number of
sample locations, and reversing the order of operations.
We show that a-priori knowledge about the operations performed in DVR can be
exploited to avoid recording the operations in reverse-mode AD. We propose a
custom computation kernel that inverts the order of operations in turn and
derives the gradients used by AD. We further present a method for recomputing
intermediate results via an analytic inversion of the light accumulation along
the view rays. By this, intermediate results do not need to be recorded and
the memory consumption of reverse-mode AD becomes proportional to $O(n)$.
As our second contribution, we discuss a number of use cases in which AD is
applied in volume rendering applications (Differentiable Direct Volume
Rendering). These use cases demonstrate the automatic optimization of external
parameters of the rendering process, i.e., the camera and the TF. Here the 3D
density field is not changed, but the optimization searches for the external
parameters that—when used to render this field—yield an optimal solution of a
problem-specific loss function. In addition, we cover problems where the
optimization is with respect to the densities. I.e., the field values are
optimized so that an image-based loss function—after rendering the optimized
field—yields an optimal solution. We consider inverse tomography by
restricting the rendering process to an absorption-only model without a TF and
optimize the densities using given images of the field. For this case, we
compare our method against algebraic reconstruction techniques [50, 49] and
Mitsuba 2 [37, 36]. Beyond that, and for the first time to our best knowledge,
we show how to incorporate TFs and an emission-absorption model into
tomographic reconstruction and deal with the resulting non-convex optimization
problem.
DiffDVR is written in C++ and CUDA, and it provides seamless interoperability
with PyTorch for a simple embedding into existing training environments with
complex, potentially network-based loss functions. The code is made publicly
available under a BSD license111https://github.com/shamanDevel/DiffDVR.
## 1 Related Work
#### Differentiable Rendering
A number of differentiable renderers have been introduced for estimating scene
parameters or even geometry from reference images, for example, under the
assumption of local illumination and smooth shading variations [26, 41, 42,
21], or via edge sampling to cope with discontinuities at visibility
boundaries [24]. Scattering parameters of homogeneous volumes have been
estimated from observed scattering pattern [12]. Recently, Nimier-David et al.
proposed Mitsuba 2 [37], a fully-differentiable physically-based Monte-Carlo
renderer. Mitsuba 2 also handles volumetric objects, yet it requires storing
intermediate results during the ray sampling process at each sampling point.
This quickly exceeds the available memory and makes the approach unfeasible
for direct volume rendering applications. Later, the authors have shown how to
avoid storing the intermediate results [36], by restricting the parameters
that can be derived to, e.g., only shading and emission. However, these
methods are tailored for path tracing with multiple scattering and rely on
Monte-Carlo integration with delta tracking. This makes them prone to noise
and leads to long computation times compared to classical DVR methods without
scattering. Our method, in contrast, does not require storing intermediate
results and can, thus, use large volumes with arbitrary many sampling steps
without resorting to a restricted parameter set. Furthermore, it does not
impose restrictions on the parameters of the volume rendering process that can
be differentiated.
#### Parameter Optimization for Volume Visualization
An interesting problem in volume visualization is the automatic optimization
of visualization parameters like the viewpoint, the TF, or the sampling
stepsize that is required to convey the relevant information in the most
efficient way. This requires at first hand an image-based loss function that
can be used to steer the optimizer toward an optimal parameter setting. To
measure a viewpoint’s quality from a rendered image, loss functions based on
image entropy [19, 51, 46, 7] or image similarity [47, 57] have been used. For
volume visualization, the relationships between image entropy and voxel
significance [5] as well as importance measures of specific features like
isosurfaces [45] have been considered. None of these methods, however,
considers the rendering process in the optimization process. Instead, views
are first generated from many viewpoints, e.g., by sampling via the Fibonacci
sphere algorithm [28], and then the best view regarding the used loss function
is determined. We envision that by considering the volume rendering process in
the optimization, more accurate and faster reconstructions can be achieved.
Another challenging problem is the automatic selection of a “meaningful” TF
for a given dataset, as the features to be displayed depend highly on the user
expectation. Early works attempted to find a good TF using clusters in
histograms of statistical image properties [15] or fitting visibility
histograms [8]. Others have focused on guiding an explorative user interaction
[59, 27], also by using neural networks [3]. For optimizing a TF based on
information measures, Ruiz et al. [43] proposed to bin voxels of similar
density and match their visibility distribution from multiple viewpoints with
a target distribution defined by local volume features. For optimization, the
authors employ a gradient-based method where the visibility derivatives for
each density bin are approximated via local linearization.
Concerning the performance of direct volume rendering, it is crucial to
determine the minimum number of data samples that are required to accurately
represent the volume. In prior works, strategies for optimal sampling in
screen-space have been proposed, for instance, based on perceptual models [4],
image saliency maps [39], entropy-based measures [56], temporal history [29],
or using neural networks [53, 54]. Other approaches adaptively change the
sampling stepsize along the view rays to reduce the number of samples in
regions that do not contribute much to the image [9, 23, 6, 32]. DiffDVR’s
capability to compute gradients with respect to the stepsize gives rise to a
gradient-based adaptation using image-based loss functions instead of
gradient-free optimizations or heuristics.
#### Neural Rendering
As an alternative to classical rendering techniques that are adapted to make
them differentiable, several works have proposed to replace the whole
rendering process with a neural network. For a general overview of neural
rendering approaches let us refer to the recent summary article by Tewari et
al. [48]. For example, RenderNet proposed by Nguyen-Phuoc et al. [34] replaces
the mesh rasterizer with a combination of convolutional and fully connected
networks. In visualization, the works by Berger et al. [3] and He et al. [16]
fall into the same line of research. The former trained a network on rendered
images and parameters of the rendering process, and use the network to predict
new renderings by using only the camera and TF parameters. The latter let a
network learn the relationships between the input parameters of a simulation
and the rendered output, and then used this network to skip the rendering
process and create images just from given input parameters.
## 2 Background
In the following, we review the fundamentals underlying DVR using an optical
emission-absorption model [30]. Then we briefly summarise the foundation of
Automatic Differentiation (AD), a method to systematically compute derivatives
for arbitrary code [2].
### 2.1 Direct Volume Rendering Integral
Let $V:\mathbb{R}^{3}\rightarrow[0,1]$ be the scalar volume of densities and
let $r:\mathbb{R}^{+}\rightarrow\mathbb{R}^{3}$ be an arc-length parameterized
ray through the volume. Let $\tau:[0,1]\rightarrow\mathbb{R}_{0}^{+}$ be the
absorption and $C:[0,1]\rightarrow\mathbb{R}_{0}^{+}$ the self-emission due to
a given density. Then, the light intensity reaching the eye is given by
$L(a,b)=\int_{a}^{b}g(V(r(t)))e^{-\int_{a}^{t}\tau(V(r(u)))\text{d}u}\text{d}t,$
(1)
were the exponential term is the transparency of the line segment from $t=a$,
the eye, to $b$, the far plane, and $g(v)=\tau(v)C(v)$ is the emission. The
transparency is one if the medium between $a$ and $b$ does not absorb any
light and approaches zero for complete absorption.
We assume that the density volume is given at the vertices $\mathbf{v}_{i}$ of
a rectangular grid, and the density values are obtained via _trilinear_
interpolation. The functions $\tau$ and $C$ define the mapping from density to
absorption and emission. We assume that both functions are discretized into
$R$ regularly spaced control points with linear interpolation in between. This
is realized on the GPU as a 1D texture map $T$ with hardware-supported linear
interpolation.
For arbitrary mappings of the density to absorption and emission, the volume
rendering integral in Equation 1 cannot be solved analytically. Instead, it is
approximated by discretizing the ray into $N$ segments over which the
absorption $\alpha_{i}$ and emission $L_{i}$ are assumed constant. We make use
of the Beer-Lambert model $\alpha_{i}=1-\exp(-\Delta t\tau(d_{i}))$, where
$d_{i}$ is the sampled volume density, to approximate a segment’s
transparency. This leads to a Riemann sum which can be computed in front-to-
back order using iterative application of alpha-blending, i.e.,
$L=L+(1-\alpha)L_{i}$, and $\alpha=\alpha+(1-\alpha)\alpha_{i}$.
### 2.2 Automatic Differentiation
The evaluation of any program for a fixed input can be expressed as a
computation graph, a directed acyclic graph where the nodes are the operations
and the edges the intermediate values. Such a computation graph can be
reformulated as a linear sequence of operations, also called a Wengert list
[55, 2],
$\displaystyle\bm{x}_{0}$ $\displaystyle=\text{const}$ (2)
$\displaystyle\bm{x}_{1}$ $\displaystyle=f_{1}(\bm{x}_{0},\bm{w}_{1})$
$\displaystyle\bm{x}_{2}$ $\displaystyle=f_{2}(\bm{x}_{1},\bm{w}_{2})$
$\displaystyle\ldots$ $\displaystyle\bm{x}_{\text{out}}$
$\displaystyle=f_{k}(\bm{x}_{k-1},\bm{w}_{k})$
where the $\bm{w}_{i}$’s $\in\mathbb{R}^{p}$ are the external parameters of
the operations of size $p$ and the $\bm{x}_{i}$’s $\in\mathbb{R}^{n}$ refer to
the state of intermediate results after the i-th operation of size $n$. The
output $\bm{x}_{\text{out}}\in\mathbb{R}^{m}$ has size $m$. Note here that in
DiffDVR, $n$ and $k$ are usually large, i.e., $n$ is in the order of the
number of pixels and $k$ in the order of the number of sampling points along
the view rays. The output $\bm{x}_{\text{out}}$ is a scalar ($m=1$), computed,
for example, as the average per-pixel loss over the image. The goal is then to
compute the derivatives
$\frac{\text{d}\bm{x}_{\text{out}}}{\text{d}\bm{w}_{i}}$. The basic idea is to
split these derivatives into simpler terms for each operation using the chain
rule. For example, assuming univariate functions and $w_{1}$ the only
parameter of interest, the chain rule yields
$x_{3}=f_{3}(f_{2}(f_{1}(w_{1})))\ \Rightarrow\
x_{3}^{\prime}=f_{3}^{\prime}(f_{2}(f_{1}(x)))\,f_{2}^{\prime}(f_{1}(x))\,f_{1}^{\prime}(x).$
(3)
There are two fundamentally different approaches to automatically evaluate the
chain rule, which depend on the order of evaluations. If the product in the
above example is evaluated left-to-right, the derivatives are propagated from
bottom to top in Equation 2. This gives rise to the adjoint- or backward-mode
differentiation (see subsection 3.3). If the product is evaluated right-to-
left, the derivatives “ripple downward” from top to bottom in Equation 2. This
corresponds to the so-called forward-mode differentiation (see subsection
3.2).
## 3 AD for Direct Volume Rendering
Now we introduce the principal procedure when using AD for DiffDVR and hint at
the task-dependent differences when applied for viewpoint optimization
(subsection 4.1), TF reconstruction (subsection 4.2) and volume reconstruction
(subsection 4.3 and subsection 4.4). We further discuss computational aspects
and memory requirements of AD in volume rendering applications and introduce
the specific modifications to make DiffDVR feasible.
### 3.1 The Direct Volume Rendering Algorithm
In direct volume rendering, the pixel color represents the accumulated
attenuated emissions at the sampling points along the view rays. In the model
of the Wengert list (see Equation 2), a function $f_{i}$ is computed for each
sample. Hence, the number of operations $k$ is proportional to the overall
number of samples along the rays. The intermediate results $\bm{x}_{i}$ are
rgb$\alpha$ images of the rendered object up to the $i$-th sample, i.e.,
$\bm{x}_{i}$ is of size $n=\text{W}*\text{H}*4$, where $W$ and $H$,
respectively, are the width and height of the screen. The last operation
$f_{k}$ in the optimization process is the evaluation of a scalar-valued loss
function. Thus, the size of the output variable is $m=1$. The parameters
$\bm{w}_{i}$ depend on the use case. For instance, in viewpoint optimization,
the optimization is for the longitude and latitude of the camera position,
i.e., $p=2$. When reconstructing a TF, the optimization is for the $R$
rgb$\alpha$ entries of the TF, i.e., $p=4R$.
The DVR algorithm with interpolation, TF mapping, and front-to-back blending
is shown in Algorithm 1. For clarity, the variables in the algorithm are named
by their function, instead of using $\bm{w}_{i}$ and $\bm{x}_{i}$ as in the
Wengert list (Equation 2). In the Wengert list model, the step size $\Delta
t$, the camera intrinsics $cam$, the TF $T$, and the volume density $V$ are
the parameters $\bm{w}_{i}$. The other intermediate variables are represented
by the states $\bm{x}_{i}$. Each function operates on a single ray but is
executed in parallel over all pixels.
Algorithm 1 Direct Volume Rendering Algorithm
1:stepsize $\Delta t$, camera $cam$, TF $T$, volume $V$
2:$u\\!v$ the pixel positions where to shoot the rays
3:$color_{i}=0$ $\triangleright$ initial foreground color
4:$x_{o},\omega=f_{\text{camera}}(u\\!v,cam)$ $\triangleright$ start $x_{o}$
and direction $\omega$ for all rays
5:for $i=0,...,N-1$ do
6: $x_{i}=x_{o}+i\Delta t\omega$ $\triangleright$ current position along the
ray
7: $d_{i}=f_{\text{interpolate}}(x_{i},V)$ $\triangleright$ Trilinear
interpolation
8: $c_{i}=f_{\text{TF}}(d_{i},T)$ $\triangleright$ TF evaluation
9: $color_{i+1}=f_{\text{blend}}(color_{i},c_{i})$ $\triangleright$ blending
of the sample
10:end for
11:$\bm{x}_{\text{out}}=f_{\text{loss}}(color_{N})$ $\triangleright$ Loss
function on the output rgb$\alpha$ image
When Algorithm 1 is executed, the operations form the computational graph. AD
considers this graph to compute the derivatives of $\bm{x}_{\text{out}}$ with
respect to the parameters $\Delta t,cam,T,\text{ and }V$, so that the changes
that should be applied to the parameters to optimize the loss function can be
computed automatically. Our implementation allows for computing derivatives
with respect to all parameters, yet due to space limitations, we restrict the
discussion to the computation of derivatives of $\bm{x}_{\text{out}}$ with
respect to the camera $cam$, the TF $T$ and the volume densities $V$. In the
following, we discuss the concrete implementations of forward and adjoint
differentiation to compute these derivatives.
### 3.2 Forward Differentiation
On the elementary level, the functions in Algorithm 1 can be expressed as a
sequence of scalar arithmetic operations like $c=f(a,b)=a*b$. In forward-mode
differentiation [33, 2], every variable is replaced by the associated _forward
variable_
$\tilde{a}=\left\langle a,\frac{\text{d}a}{\text{d}w}\right\rangle,\
\tilde{b}=\left\langle b,\frac{\text{d}b}{\text{d}w}\right\rangle,$ (4)
i.e., tuples of the original value and the derivative with respect to the
parameter $w$ that is optimized. Each function $c=f(a,b)$ is replaced by the
respective forward function
$\tilde{c}=\tilde{f}(\tilde{a},\tilde{b})=\left\langle f(a,b),\frac{\partial
f}{\partial a}\frac{\text{d}a}{\text{d}w}+\frac{\partial f}{\partial
b}\frac{\text{d}b}{\text{d}w}\right\rangle.$ (5)
Constant variables are initialized with zero,
$\tilde{x}_{\text{const}}=\langle x_{\text{const}},0\rangle$, and parameters
for which to trace the derivatives are initialized with one,
$\tilde{w}=\langle w,1\rangle$. If derivatives for multiple parameters should
be computed, the tuple of forward variables is extended.
Forward differentiation uses a custom templated datatype for the forward
variable and operator overloading. Each variable is wrapped in an instance of
this datatype, called `fvar`, which stores the derivatives with respect to up
to $p$ parameters along with their current values. ⬇ template<typename T, int
p> struct fvar { T value; T derivatives[p]; }; Next, operator overloads are
provided for all common arithmetic operations and their gradients. For
example, multiplication is implemented similar to: ⬇ template<typename T, int
p> fvar<T, p> operator*(fvar<T, p> a, fvar<T, p> b) { fvar<T, P> c; //to store
c = a*b and derivatives c.value = a.value * b.value; for (int i=0; i<p; ++i) {
//partial derivatives c.derivative[i] = a.value*b.derivative[i] +
b.value*a.derivative[i]; } return c; } The user has to write the functions in
such a way that arbitrary input types are possible, i.e., regular floats or
instances of `fvar`, via C++ templates. All intermediate variables are
declared with type `auto`. This allows the compiler to use normal arithmetic
if no gradients are propagated, but when forward variables with gradients are
passed as input, the corresponding operator overloads are chosen.
As an example (see Figure 1 for a schematics), let us assume that derivatives
should be computed with respect to a single entry in a 1D texture-based TF,
e.g., the red channel of the first texel $T_{0,\text{red}}$. When loading the
TF from memory, $T_{0,\text{red}}$ is replaced by
$\tilde{T}_{0,\text{red}}=\langle T_{0,\text{red}},1\rangle$, i.e., it is
wrapped in an instance of `fvar` with the derivative for that parameter set to
$1$. Algorithm 1 executes in the normal way until $T_{0,\text{red}}$ is
encountered in the code for the TF lookup. Now, the operator overloading
mechanism selects the forward function instead of the normal non-
differentiated function. The result is not a regular color $c_{i}$, but the
forward variable of the color $\tilde{c}_{i}$. All following functions (i.e.,
the blend and loss function) continue to propagate the derivatives. In
contrast, if derivatives should be computed with respect to the camera,
already the first operation requires tracing the derivatives with `fvar`.
It is worth noting that in the above example only the derivative of one single
texel in the TF is computed. This process needs to be repeated for each texel,
respectively each color component of each texel, by extending the array
`fvar::derivatives` to store the required number of $p$ parameters. Notably,
for input data that is high dimensional, like TFs or a 3D volumetric field,
forward differentiation becomes unfeasible. For viewpoint selection, on the
other hand, where only two parameters are optimized, forward differentiation
can be performed efficiently.
Figure 1: Schematic representation of the forward method for TF
reconstruction. Gradients are stored in the forward variables (blue), and
parameter values are propagated simultaneously.
The computational complexity of the forward method scales linearly with the
number of parameters $p$, as they have to be propagated through every
operation. However, as every forward variable directly stores the derivative
of that variable w.r.t. the parameters, gradients for an arbitrary number of
outputs $m$ can be directly realized. Furthermore, the memory requirement is
proportional to $O(np)$, as only the current state needs to be stored.
Figure 2: Schematic representation of the adjoint method for density and TF
reconstruction. Gradients in the adjoint variables (red) are propagated
backward through the algorithm. A circled $+$ indicates the summation of the
gradients over all steps and rays.
### 3.3 Adjoint Differentiation
Adjoint differentiation [31], also called the adjoint method, backward or
reverse mode differentiation, or backpropagation, evaluates the chain rule in
the inverse order than forward differentiation. For each variable
$\bm{x}_{i}$, the associated _adjoint variable_
$\hat{\bm{x}}_{i}=\frac{\partial x_{\text{out}}}{\partial\bm{x}_{i}}\ ,\
\hat{\bm{w}}_{i}=\frac{\partial x_{\text{out}}}{\partial\bm{w}_{i}},$ (6)
stores the derivative of the final output with respect to the current
variable. Tracing the derivatives starts by setting $\hat{x}_{\text{out}}=1$.
Then, the adjoint variables are tracked backward through the algorithm, called
the _backward pass_. This is equivalent to evaluating the chain rule Equation
3 from left to right, instead of right to left as in the forward method. Let
$c=f(a,b)$ be again our model function, then the adjoint variables
$\hat{a},\hat{b}$ are computed from $\hat{c}$ as
$\hat{a}=\left(\frac{\partial f}{\partial a}\right)^{T}\hat{c},\
\hat{b}=\left(\frac{\partial f}{\partial b}\right)^{T}\hat{c}.$ (7)
This process is repeated from the last operation to the first operation,
giving rise to the _adjoint code_. At the end, one arrives again at the
derivatives with respect to the parameters $\hat{\bm{w}}=\frac{\partial
x_{\text{out}}}{\partial\bm{w}}$. If a parameter is used multiple times,
either along the ray or over multiple rays, the adjoint variables are summed
up. The reverted evaluation of the DVR algorithm with the gradient propagation
from Equation 7 is sketched in Algorithm 2. A schematic visualization is shown
in Figure 2.
Because the adjoint method requires reversing the order of operation, simple
operator overloading as in the forward method is no longer applicable. Common
implementations of the adjoint method like TensorFlow [1] or PyTorch [40]
record the operations in a computation graph, which is then traversed backward
in the backward pass. As it is too costly to record every single arithmetic
operation, high-level functions like the evaluation of a single layer in
neural networks are treated as atomic, and only these are recorded. Within
such a high-level function, the order of operations is known and the adjoint
code using Equation 7 is manually derived and implemented. We follow the same
idea and treat the rendering algorithm as one unit and manually derive the
adjoint code.
Algorithm 2 Adjoint Code of the DVR Algorithm. Each line corresponds to a line
in Algorithm 1 in reverse order.
1:stepsize $\Delta t$, camera $cam$, TF $T$, volume $V$
2:the adjoint of the output $\hat{\bm{x}}_{\text{out}}$
3:all intermediate adjoint variables are initialized with $0$
4:$\hat{color}_{N}\mathrel{+}=\partial
f_{\text{loss}}(color_{N})^{T}\hat{\bm{x}}_{\text{out}}$
5:for $i=N-1,...,0$ do
6: $\hat{color}_{i},\hat{c}_{i}\mathrel{+}=\partial
f_{\text{blend}}(color_{i},c_{i})^{T}\hat{color}_{N}$
7: $\hat{d}_{i},\hat{T}\mathrel{+}=\partial
f_{\text{TF}}(d_{i},T)^{T}\hat{c}_{i}$
8: $\hat{x}_{i},\hat{V}\mathrel{+}=\partial
f_{\text{interpolate}}(x_{i},V)^{T}\hat{d}_{i}$
9: $\hat{x}_{o}\mathrel{+}=\hat{x}_{i}\ ,\ \hat{\Delta
t}\mathrel{+}=i\omega^{T}\hat{x}_{i}\ ,\ \hat{\omega}\mathrel{+}=i\Delta
t\hat{x}_{i}$
10:end for
11:$\hat{cam}\mathrel{+}=\partial
f_{\text{camera}}(u\\!v,cam)^{T}[x_{o};\omega]$
12:$\hat{color}_{0}$ is ignored
13:$\hat{\Delta t},\hat{cam},\hat{T},\hat{V}$
### 3.4 The Inversion Trick
One of the major limitations of the adjoint method is its memory consumption
because the input values for the gradient computations need to be stored. For
example, the blending operation (line 9 in Algorithm 1) is defined as follows:
Let $\alpha,C$ be the opacity and rgb-emission at the current sample, i.e.,
the components of $c_{i}$, and let $\alpha^{(i)},C^{(i)}$ be the accumulated
opacity and emission up to the current sample, i.e., the components of
$color_{i}$ in Algorithm 1. Then, the next opacity and emission is given by
front-to-back blending
$\displaystyle C^{(i+1)}$ $\displaystyle=C^{(i)}+(1-\alpha^{(i)})C$ (8)
$\displaystyle\alpha^{(i+1)}$
$\displaystyle=\alpha^{(i)}+(1-\alpha^{(i)})\alpha.$
In the following adjoint code with $\hat{\alpha}^{(i+1)},\hat{C}^{(i+1)}$ as
input it can be seen that the derivatives again require the input values.
$\displaystyle\hat{\alpha}$
$\displaystyle=(1-\alpha^{(i)})\hat{\alpha}^{(i+1)},\
\hat{C}=(C-\alpha^{(i)})\hat{C}^{(i+1)},$ (9)
$\displaystyle\hat{\alpha}^{(i)}$
$\displaystyle=(1-\alpha)\hat{\alpha}^{(i+1)}-C\cdot\hat{C}^{(i+1)},$
$\displaystyle\hat{C}^{(i)}$ $\displaystyle=\hat{C}^{(i+1)}.$
Therefore, the algorithm is first executed in its non-adjoint form, and the
intermediate colors are stored with the computation graph. This is called the
_forward pass_. During the backward pass, when the order of operations is
reversed and the derivatives are propagated (the adjoint code), the
intermediate values are reused. In DVR, intermediate values need to be stored
at every step through the volume. Thus, the memory requirement scales linearly
with the number of steps and quickly exceeds the available memory. To overcome
this limitation, we propose a method that avoids storing the intermediate
colors after each step and, thus, has a constant memory requirement.
We exploit that the blending step is invertible (see Figure 3): If
$\alpha^{(i+1)},C^{(i+1)}$ are given and the current sample is recomputed to
obtain $\alpha$ and $C$, $\alpha^{(i)},C^{(i)}$ can be reconstructed as
$\displaystyle\alpha^{(i)}$
$\displaystyle=\frac{\alpha-\alpha^{(i+1)}}{\alpha-1}$ (10) $\displaystyle
C^{(i)}$ $\displaystyle=C^{(i+1)}-(1-\alpha^{(i)})C.$
With Equation 10 and $\alpha<1$, the adjoint pass can be computed with
constant memory by re-evaluating the current sample $c_{i}$ and reconstructing
$color_{i}$ instead of storing the intermediate results. Thus, only the output
color used in the loss function needs to be stored, while all intermediate
values are recomputed on-the-fly. Note that $\alpha=1$ is not possible in
practice, since it requires the absorption stored in the TF to be at infinity.
(a) No Inversion (b) With Inversion
Figure 3: (a) To compute the current contribution $c_{i}$, intermediate
accumulated colors $\text{color}_{i}$ need to be stored for every step along
the ray. (b) The inversion trick enables to reconstruct $\text{color}_{i}$
from $\text{color}_{i+1}$. Thus, only the final color used in the loss
function needs to be stored.
(a) (b) (c)
Figure 4: Best viewpoint selection using maximization of visual entropy. The
tooth dataset (Differentiable Direct Volume Renderinga) is rendered from
different viewpoints on a surrounding sphere. (a) Color coding of loss values
for viewpoints on the northern and southern hemispheres, with isocontours
(black lines) of the loss and local gradients with respect to the longitude
and latitude of the camera position at uniformly sampled positions (black dots
with arrows). Eight optimization runs (colored paths on the surface) are
started at uniformly seeded positions and optimized in parallel. (b) The runs
converge to three clusters of local minima. The cluster with the highest
entropy ($1.72$) coincides with the best value from $256$ sampled entropies.
For the best run, the start view, as well as some intermediate views and the
final result, are shown in Differentiable Direct Volume Renderinga. (c)
Timings and memory consumption show that forward differences approximately
double the runtime, but are faster and require less memory than the adjoint
method.
In the implementation, and indicated by the circled $+$ in Figure 2, the
adjoint variables for the parameters are first accumulated per ray into local
registers (camera, stepsize, volume densities) or shared memory (TF). Then,
the variables are accumulated over all rays using global atomic functions.
This happens once all rays have been traversed (camera, stepsize, transfer
function) or on exit of the current cell (volume densities).
Because the adjoint variables carry only the derivatives of the output, but
not of the parameters, the computational complexity is largely constant in the
number of parameters. For example, in TF optimization (subsection 4.2) only
the derivative of the currently accessed texel is computed when accessed in
the adjoint code of TF sampling. This is significantly different from the
forward method, where the derivatives of all TF entries need to be propagated
in every step. On the other hand, the adjoint method considers only a single
scalar output in each backward pass, requiring multiple passes to support
multi-component outputs. This analysis and the following example applications
show that the forward method is preferable when optimizing for a low number of
parameters like the camera position, while for applications such as TF
optimization, which require the optimization of many parameters, the adjoint
method has clear performance advantages.
DiffDVR is implemented as a custom CUDA operation in PyTorch [40]. The various
components of the DVR algorithm, like the parameter to differentiate or the
type of TF, are selected via C++ template parameters. This eliminates runtime
conditionals in the computation kernel. To avoid pre-compiling all possible
combinations, the requested configuration is compiled on demand via CUDA’s
JIT-compiler NVRTC [38] and cached between runs. This differs from, e.g., the
Enoki library [18] used by the Mitsuba renderer [37], which directly generates
Parallel Thread Code (PTX) for translation into GPU binary code.
## 4 Applications
In the following, we apply both AD modes for best viewpoint selection, TF
reconstruction, and volume reconstruction. The results are analyzed both
qualitatively and quantitatively. Timings are performed on a system running
Windows 10 and CUDA 11.1 with an Intel Xeon [email protected] CPU, 64GB RAM, and an
NVIDIA RTX 2070.
### 4.1 Best Viewpoint Selection
(a)
(b)
(c)
Figure 5: Best viewpoint selection using maximization of visual entropy for
datasets jetstream ($256^{3}$), potential field of a C60 molecule ($128^{3}$),
and smoke plume ($178^{3}$). Comparison of DiffDVR with eight initializations
against random uniform sampling over the sphere of 256 views. (a) Optimization
paths over the sphere. (b) Initial view, selected view of DiffDVR, best
sampled view. (c) Visual entropy of optimization results (colored points
corresponding to (a)) vs. sampled images. Violin plot shows the distribution
of loss values when sampling the sphere uniformly. Visual entropy of the best
viewport is shown above each plot.
We assume that the camera is placed on a sphere enclosing the volume and faces
toward the object center. The camera is parameterized by longitude and
latitude. AD is used to optimize the camera parameters to determine the
viewpoint that maximized the selected cost function. As cost function, we
adopt the differentiable opacity entropy proposed by Ji et al. [19].
Let $C\in\mathbb{R}^{H\times W\times 4}$ be the output image. We employ array
notation, i.e., $C[x,y,c]$ indicates color channel $c$ (red, green, blue,
alpha) at pixel $x,y$. The entropy of a vector $\bm{x}\in\mathbb{R}^{N}$ is
defined as
$H(\bm{x})=\frac{1}{\log_{2}N}\sum_{i=1}^{N}{p_{i}\log_{2}p_{i}}\ ,\ \
p_{i}=\frac{\bm{x}_{i}}{\sum_{j=1}^{N}{\bm{x}_{j}}}.$ (11)
Then the opacity entropy is defined as $\text{OE}(C)=H(C[:,:,3]),$ where
$C[:,:,3]$ indicates the linearization of the alpha channel, and the color
information is unused.
In a first experiment, the best viewpoint is computed for a CT scan of a human
tooth of resolution $256\times 256\times 161$. Eight optimizations are started
in parallel with initial views from viewpoints at a longitude of
$\\{45^{\circ},135^{\circ},225^{\circ},315^{\circ}\\}$ and a latitude of $\pm
45^{\circ}$. In all cases, 20 iterations using gradient descent are performed.
The viewpoints selected by the optimizer are shown as paths over the sphere in
Figure 4a. The values of the cost function over the course of optimization are
given in Figure 4b. It can be seen that the eight optimization runs converge
to three distinct local minima. The best run converges to approximately the
same entropy as obtained when the best view from 256 uniformly sampled views
over the enclosing sphere is taken. Differentiable Direct Volume Renderinga
shows intermediate views and the view from the optimized viewpoint. Further
results on other datasets, i.e, a jetstream simulation ($256^{3}$), the
potential field of a C60 molecule ($128^{3}$), and a smoke plume ($178^{3}$),
confirm the dependency of the optimization process on the initial view (see
Figure 5).
Both the adjoint and the forward method compute exactly the same gradients,
except for rounding errors. As seen in Figure 4c, a single forward/backward
pass in the adjoint method requires about $9.5$ms/$14.6$ms, respectively,
giving a total of $~{}24.1$ms. For the forward method, we compare two
alternatives. First, _forward-immediate_ directly evaluates the forward
variables during the forward pass in PyTorch and stores these variables for
reuse in the backward pass. In _forward-delayed_ , the evaluation of gradients
is delayed until the backward pass, requiring to re-trace the volume. With
$21.3$ms, _forward-immediate_ is slightly faster than the adjoint method,
while _forward-delayed_ is around $30\%$ slower due to the re-trace operation.
### 4.2 Transfer Function Reconstruction
Our second use case is TF reconstruction. Reference images of a volume are
first rendered from multiple views using a target TF. Given the same volume
and an arbitrary initial TF, AD is then used to optimize the TF so that the
rendered images match the references. The target TF comprises of 256
rgb$\alpha$ entries, the target TF with $R$ entries is initialized with random
Gaussian noise. The density volume is rendered to a $512^{2}$ viewport from
eight camera positions that are uniformly distributed around the volume (the
view direction always pointing toward the volume’s center).
Figure 6: Effect of the smoothing prior (Equation 12). A small value of
$\lambda$ leads to “jagged” TFs which can accurately predict small details
like the teeth in blue but introduce low frequency color shifts resulting in
low PSNR and SSIM [52]. A large smoothing prior smooths out small details.
Let $T\in\mathbb{R}^{R,4}$ be the TF with $R$ entries containing the rgb color
and absorption, and let $\bm{x}_{i}$ be the $N$ rendered image of resolution
$W\times H$, $\bm{y}_{i}$ are the reference images. In our case, $N=8,W=H=512$
and $R$ varies. We employ an $L_{1}$ loss on the images and a smoothing prior
$L_{\text{prior}}$ on the TF, i.e.,
$\displaystyle L_{\text{total}}$ $\displaystyle=L_{1}(\bm{x})+\lambda
L_{\text{prior}}(T),$ (12) $\displaystyle L_{1}(\bm{x})$
$\displaystyle=\frac{1}{NWH}\sum_{i,x,y}{|\bm{x}_{ixy}-\bm{y}_{ixy}|}$
$\displaystyle L_{\text{prior}}(T)$
$\displaystyle=\frac{1}{4(R-1)}\sum_{c=1}^{4}\sum_{r=1}^{R-1}{(T_{c,r+1}-T_{c,r})^{2}}.$
The Adam optimizer [22] is used with a learning rate of $0.8$ for $200$
epochs. The use of $\lambda$ to control the strength of the smoothing prior is
demonstrated in Figure 6 for a human head CT scan as test dataset using
$R=64$. If $\lambda$ is too small, the reconstructed TF contains high
frequencies and introduces subtle color shifts over the whole image. If the
smoothing prior is too large, small details are lost. We found that a value of
$\lambda$ around $0.4$ leads to the best results, visually and using the
Learned Perceptual Image Patch Similarity metric (LPIPS) [58], and is thus
used in our experiments. We chose the LPIPS metric as we found that it can
accurately distinguish the perceptually best results when the peak-signal-to-
noise ratio (PSNR) and the structural similarity index (SSIM) [52] result in
similar scores. The initialization of the reconstruction and the final result
for a human head dataset are shown in Differentiable Direct Volume Renderingb.
Figure 7: Timings and loss function values for different AD modes and
resolutions of the reconstructed TF. Timings are with respect to a single
epoch.
Next, we analyze the impact of the TF resolution $R$ on reconstruction quality
and performance (see Figure 7). For TF reconstruction, the backward AD mode
significantly outperforms the forward mode. Because of the large number of
parameters, especially when increasing the resolution of the TF, the
derivatives of many parameters have to be traced in every operation when using
the forward AD mode. Furthermore, the forward variables may no longer fit into
registers and overflow into global memory. This introduces a large memory
overhead that leads to a performance decrease that is even worse than the
expected linear decrease. A naïve implementation of the adjoint method that
directly accumulates the gradients for the TF in global memory using atomics
is over $100\times$ slower than the non-adjoint forward pass (_adjoint-
immediate_). This is because of the large number of memory accesses and write
conflicts. Therefore, we employ delayed accumulation (_adjoint-delayed_). The
gradients for the TF are first accumulated in shared memory. Then, after all
threads have finished their assigned rays, the gradients are reduced in
parallel and then accumulated into global memory using atomics. As seen in
Figure 7, this is the fastest of the presented methods. The whole optimization
for $200$ epochs requires around 5 minutes including I/O. However, as only
48kB of shared memory are freely available per multiprocessor, the maximal
resolution of the TF is 96 texels. If a higher resolution is required,
_adjoint-immediate_ must be employed. At smaller values of $R$ the
reconstruction quality is decreased (see Figure 7). We found that a resolution
of $R=64$ leads to the best compromise between reconstruction performance and
computation time.
| initial | final | reference | difference (10x)
---|---|---|---|---
Thorax | [inner sep=0pt] at (0,0) ; [inner sep=0pt,fill=white] at (0,-0.35) ; | [inner sep=0pt] at (0,0) ; [inner sep=0pt,fill=white] at (0,-0.35) ; | [inner sep=0pt] at (0,0) ; [inner sep=0pt,fill=white] at (0,-0.35) ; |
Plume | [inner sep=0pt] at (0,0) ; [inner sep=0pt,fill=white] at (0,-0.4) ; | [inner sep=0pt] at (0,0) ; [inner sep=0pt,fill=white] at (0,-0.4) ; | [inner sep=0pt] at (0,0) ; [inner sep=0pt,fill=white] at (0,-0.4) ; |
Figure 8: TF reconstruction using a CT scan of a human thorax (PSNR=$42.6$dB)
and a smoke plume (PSNR=$47.8$dB, SSIM=$0.999$). The used hyperparameters are
the same as for the skull dataset. From left to right: Start configurations
for the optimizer, optimized results, ground truths, pixel differences (scaled
by a factor of $10$ for better perception) between ground truths and optimized
results.
To evaluate the capabilities of TF reconstruction to generalize to new
datasets with the same hyperparameters as described above, we run the
optimization on two new datasets, a CT scan of a human thorax and a smoke
plume, both of resolution $256^{3}$. As one can see in Figure 8, the
renderings with the reconstructed TF closely match the reference,
demonstrating stability of the optimization for other datasets.
We envision that TF optimization with respect to losses in screen space can be
used to generate “good” TFs for a dataset for which no TF is available. While
a lot of research has been conducted on measuring the image quality for
viewpoint selection, quality metrics specialized for TFs are still an open
question to the best of our knowledge. In future work, a first approach would
be to take renderings of other datasets with a TF designed by experts and
transform the “style” of that rendering to a new dataset via the style loss by
Gatys et al. [11].
### 4.3 Density Reconstruction
Figure 9: Density reconstruction using an optical absorption-only model.
Comparison between DiffDVR, algebraic reconstruction provided by the ASTRA-
toolbox [50, 49] and Mitsuba’s differentiable path tracer [36]. For each
algorithm, a single slice through the center of the reconstructed volume and a
volume rendering of this volume are shown, including per-pixel differences to
the reference images. PSNR values in column “slice” are computed over the
whole volume, in column “rendering” they are with respect to the rendered
images. Timings are given in subsection 4.3. In the difference images, blue
and red indicate under- and over-estimation, respectively.
In the following, we shed light on the use of DiffDVR for reconstructing a 3D
density field from images of this field. For pure absorption models, the
problem reduces to a linear optimization problem. This allows for comparisons
with specialized methods, such as filtered backpropagation or algebraic
reconstruction [13, 10, 17]. We compare DiffDVR to the CUDA implementation of
the SIRT algebraic reconstruction algorithm [14] provided by the ASTRA-toolbox
[50, 49]. Furthermore, we compare the results to those computed by Mitsuba 2
[36, 37], a general differentiable path tracer. Density reconstruction uses 64
uniformly sampled views on a surrounding sphere. Each image is rendered at a
resolution of $512^{2}$. The reconstructed volume has a resolution of
$256^{3}$. ASTRA and Mitsuba are used with their default optimization
settings. DiffDVR performs a stepsize of $0.2$ voxels during reconstruction.
The Adam optimizer with a batch size of 8 images and a learning rate of $0.3$
is used. To speed up convergence, we start with a volume of resolution
$32^{3}$ and double the resolution in each dimension after $10$ iterations. At
the highest resolution, the optimization is performed for $50$ iterations. The
same $L_{\text{total}}$ loss function as for TF reconstruction (see Equation
12) is used, except that the smoothing prior is computed on the reconstructed
volume densities in 3D, with $\lambda=0.5$.
Three experiments with datasets exhibiting different characteristics are
carried out. The results are shown in Figure 9. As one can see, DiffDVR
consistently outperforms algebraic reconstruction via ASTRA and density
reconstruction via the Mitsuba framework. In particular, Mitsuba suffers from
noise in the volume due to the use of stochastic path tracing. Only for the
rendering of the thorax dataset, Mitsuba shows a slightly better SSIM score
than DiffDVR. For the plume dataset, intermediate results of the optimization
process until convergence are shown in Differentiable Direct Volume
Renderingc.
Note that all compared algorithms serve different purposes. Algebraic
reconstruction methods (ASTRA) are specialized for absorption-only optical
models and support only such models. Mitsuba is tailored to Monte Carlo path
tracing with volumetric scattering, an inherently computational expensive
task. DifffDVR is specialized for direct volume rendering with an emission-
absorption model and a TF, yet emissions and a TF were disabled in the current
experiments. These differences clearly reflect in the reconstruction times.
For instance, for reconstructing the human skull dataset, ASTRA requires only
53 seconds, DiffDVR requires around 12 minutes, and Mitsuba runs for multiple
hours.
### 4.4 Color Reconstruction
Figure 10: Density optimization for a volume colored via a non-monotonic
rgb$\alpha$-TF using an emission-absorption model. (a) Rendering of the
reference volume of a human tooth and a human thorax. (b) Local minimum of the
loss function. (c) Pre-shaded color volume as initialization. (d) Final result
of the density volume optimization with TF mapping. The second row shows
slices through the volumes. Note the colored slice through the pre-shaded
color volume in (c). Figure 11: 1D example for a density optimization with a
Gaussian TF with the optimum at a density of $-1.0$. For a value $>0.4$, the
gradient faces away from the optimum.
Next, we consider an optical emission-absorption model with a TF that maps
densities to colors and opacities, as it is commonly used in DVR. To the best
of our knowledge, we are the first to support such a model in tomographic
reconstruction.
For TFs that are not a monotonic ramp, as in the absorption-only case, density
optimization becomes a non-convex problem. Therefore, the optimization can be
guided into local minima by a poor initialization. We illustrate this problem
in a simple 1D example. A single unknown density value $d_{1}$ of a 1D “voxel”
– a line segment with two values $d_{0}=-1$ and $d_{1}$ at the end points and
linear interpolation in between – should be optimized. A single Gaussian
function with zero mean and variance $0.5$ is used as TF, and the ground truth
value for $d_{1}$ is $-1$. For varying $d_{1}$, Figure 11 shows the
$L_{2}$-loss between the color obtained from $d_{1}$ and the ground truth, and
the corresponding gradients. As can be seen, for initial values of $d_{1}>0.4$
the gradient points away from the true solution. Thus, the optimization “gets
stuck” at the other side of the Gaussian, never reaching the target density of
$-1$. This issue worsens in 2D and 3D, as the optimizer needs to reconstruct a
globally consistent density field considering many local constraints. This
failure case is also shown in Figure 10b, where the tooth dataset cannot be
reconstructed faithfully due to the initialization with a poorly matching
initial field.
To overcome this shortcoming, it is crucial to start the optimization with an
initial guess that is not “too far” from the ground truth in the high-
dimensional parameter space. We account for this by proposing the following
optimization pipeline: First, a pre-shaded color volume of resolution
$256^{3}$ (Figure 10c) is reconstructed from images using the same multi-
resolution optimization as in the case of an absorption-only model. The color
volume stores the rgb-emission and scalar absorption per voxel, instead of a
scalar density value that is mapped to color via a TF. By using this color
volume, trapping into local minima with non-monotonic TFs can be avoid.
Intermediate results of the optimization process until convergence are shown
in Differentiable Direct Volume Renderingd for the tooth dataset. Then,
density values that match the reconstructed colors after applying the TF are
estimated. For each voxel, $256$ random values are sampled, converted to color
via the TF, and the best match is chosen. To avoid inconsistencies between
neighboring voxels, an additional loss term penalises differences to
neighbors. Let $(\tau_{T},C_{T})$ be the target color from the color volume
and $d$ the sampled density with mapped color $\tau(d),C(d)$, then the cost
function is
$\mathcal{C}(d)=||C_{T}-C(d)||_{2}^{2}+\alpha\log(1+|\tau_{T}-\tau(d)|)+\beta\sum_{i\in\mathcal{N}}{(d-d_{i})^{2}}.$
(13)
Here, $\alpha$ and $\beta$ are weights, and $\mathcal{N}$ loops over the
6-neighborhood of the current voxel. The logarithm accounts for the vastly
different scales of the absorption, similar to an inverse of the transparency
integral Equation 1. In the example, we set $\alpha=1/\max(\tau_{T})$ to
normalize for the maximal absorption in the color volume, and $\beta=1$. This
process is repeated until the changes between subsequent iterations fall below
a certain threshold, or a prescribed number of iterations have been performed.
Finally, the estimated density volume is used as initialization for the
optimization of the density volume from the rendered images (Figure 10d). We
employ the same loss $L_{\text{total}}$ as before with a smoothing prior of
$\lambda=20$. The total runtime for a $256^{3}$ volume is roughly 50 minutes.
Even though the proposed initialization overcomes to a certain extent the
problem of non-convexity and yields reasonable results, Figure 10 indicates
that some fine details are lost and spurious noise remains. We attribute this
to remaining ambiguities in the sampling of densities from colors that still
lead to suboptimal minima in the reconstruction. This also shows in the slice
view of Figure 10d, especially for the thorax dataset. Here, some areas that
are fully transparent due to the TF are arbitrarily mapped to a density value
of zero, while the reference has a density around 0.5 – between the peaks of
the TF – in these areas.
## 5 Conclusion
In this work, we have introduced a framework for differentiable direct volume
rendering (DiffDVR), and we have demonstrated its use in a number of different
tasks related to data visualization. We have shown that differentiability of
the direct volume rendering process with respect to the viewpoint position,
the TF, and the volume densities is feasible, and can be performed at
reasonable memory requirements and surprisingly good performance.
Our results indicate the potential of the proposed framework to automatically
determine optimal parameter combinations regarding different loss functions.
This makes DiffDVR in particular interesting in combination with neural
networks. Such networks might be used as loss functions – providing
blackboxes, which steer DiffDVR to an optimal output for training purposes,
e.g., to synthesize volume-rendered imagery for transfer learning tasks.
Furthermore, derivatives with respect to the volume from rendered images
promise the application to scene representation networks trained in screen
space instead of from points in object space. We see this as one of the most
interesting future works, spawning future research towards the development of
techniques that can convert large data to a compact representation -– a code
-– that can be permanently stored and accessed by a network-based
visualization. Besides neural networks, we imagine possible applications in
the development of lossy compression algorithms, e.g. via wavelets, where the
compression rate is not determined by losses in world space, but by the
quality of rendered images. The question we will address in the future is how
to generate such (visualization-)task-dependent codes that can be intertwined
with differentiable renderers.
## Acknowledgments
The authors wish to thank Jakob Wenzel and Merlin Nimier-David for their help
and valuable suggestions on the Mitsuba 2 framework.
## References
* [1] M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean, M. Devin, S. Ghemawat, G. Irving, M. Isard, et al. Tensorflow: A system for large-scale machine learning. In 12th $\\{$USENIX$\\}$ symposium on operating systems design and implementation ($\\{$OSDI$\\}$ 16), pp. 265–283, 2016.
* [2] M. Bartholomew-Biggs, S. Brown, B. Christianson, and L. Dixon. Automatic differentiation of algorithms. Journal of Computational and Applied Mathematics, 124(1):171–190, 2000. Numerical Analysis 2000. Vol. IV: Optimization and Nonlinear Equations. doi: 10 . 1016/S0377-0427(00)00422-2
* [3] M. Berger, J. Li, and J. A. Levine. A generative model for volume rendering. IEEE transactions on visualization and computer graphics, 25(4):1636–1650, 2018.
* [4] M. R. Bolin and G. W. Meyer. A perceptually based adaptive sampling algorithm. In Proceedings of the 25th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH ’98, p. 299–309. Association for Computing Machinery, New York, NY, USA, 1998. doi: 10 . 1145/280814 . 280924
* [5] U. D. Bordoloi and H.-W. Shen. View selection for volume rendering. In VIS 05. IEEE Visualization, 2005., pp. 487–494. IEEE, 2005.
* [6] L. Q. Campagnolo, W. Celes, and L. H. de Figueiredo. Accurate volume rendering based on adaptive numerical integration. In 2015 28th SIBGRAPI Conference on Graphics, Patterns and Images, pp. 17–24. IEEE, 2015.
* [7] M. Chen and H. Jäenicke. An information-theoretic framework for visualization. IEEE Transactions on Visualization and Computer Graphics, 16(6):1206–1215, 2010.
* [8] C. D. Correa and K.-L. Ma. Visibility histograms and visibility-driven transfer functions. IEEE Transactions on Visualization and Computer Graphics, 17(2):192–204, 2010.
* [9] J. Danskin and P. Hanrahan. Fast algorithms for volume ray tracing. In Proceedings of the 1992 Workshop on Volume Visualization, VVS ’92, p. 91–98. Association for Computing Machinery, New York, NY, USA, 1992. doi: 10 . 1145/147130 . 147155
* [10] D. Dudgeon, R. Mersereau, and R. Merser. Multidimensional digital signal processing. prentice hall. Englewood Cliffs, NJ, 19842, 1984.
* [11] L. A. Gatys, A. S. Ecker, and M. Bethge. Image style transfer using convolutional neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2414–2423, 2016.
* [12] I. Gkioulekas, S. Zhao, K. Bala, T. Zickler, and A. Levin. Inverse volume rendering with material dictionaries. ACM Transactions on Graphics (TOG), 32(6):1–13, 2013.
* [13] R. Gordon, R. Bender, and G. T. Herman. Algebraic reconstruction techniques (art) for three-dimensional electron microscopy and x-ray photography. Journal of Theoretical Biology, 29(3):471–481, 1970. doi: 10 . 1016/0022-5193(70)90109-8
* [14] J. Gregor and T. Benson. Computational analysis and improvement of sirt. IEEE Transactions on Medical Imaging, 27(7):918–924, 2008. doi: 10 . 1109/TMI . 2008 . 923696
* [15] M. Haidacher, D. Patel, S. Bruckner, A. Kanitsar, and M. E. Gröller. Volume visualization based on statistical transfer-function spaces. In 2010 IEEE Pacific Visualization Symposium (PacificVis), pp. 17–24. IEEE, 2010.
* [16] W. He, J. Wang, H. Guo, K.-C. Wang, H.-W. Shen, M. Raj, Y. S. Nashed, and T. Peterka. Insitunet: Deep image synthesis for parameter space exploration of ensemble simulations. IEEE transactions on visualization and computer graphics, 26(1):23–33, 2019.
* [17] G. T. Herman. Fundamentals of computerized tomography: image reconstruction from projections. Springer Science & Business Media, 2009.
* [18] W. Jakob. Enoki: structured vectorization and differentiation on modern processor architectures, 2019. https://github.com/mitsuba-renderer/enoki.
* [19] G. Ji and H.-W. Shen. Dynamic view selection for time-varying volumes. IEEE Transactions on Visualization and Computer Graphics, 12(5):1109–1116, 2006.
* [20] H. Kato, D. Beker, M. Morariu, T. Ando, T. Matsuoka, W. Kehl, and A. Gaidon. Differentiable rendering: A survey. arXiv preprint arXiv:2006.12057, 2020.
* [21] H. Kato, Y. Ushiku, and T. Harada. Neural 3d mesh renderer. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 3907–3916, 2018.
* [22] D. P. Kingma and J. Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014.
* [23] A. Kratz, J. Reininghaus, M. Hadwiger, and I. Hotz. Adaptive screen-space sampling for volume ray-casting. ZIB-Report, 2011.
* [24] T.-M. Li, M. Aittala, F. Durand, and J. Lehtinen. Differentiable monte carlo ray tracing through edge sampling. ACM Transactions on Graphics (TOG), 37(6):1–11, 2018.
* [25] S. Liu, S. Saito, W. Chen, and H. Li. Learning to infer implicit surfaces without 3d supervision. NeurIPS, 2019.
* [26] M. M. Loper and M. J. Black. Opendr: An approximate differentiable renderer. In European Conference on Computer Vision, pp. 154–169. Springer, 2014.
* [27] R. Maciejewski, Y. Jang, I. Woo, H. Jänicke, K. P. Gaither, and D. S. Ebert. Abstracting attribute space for transfer function exploration and design. IEEE Transactions on Visualization and Computer Graphics, 19(1):94–107, 2012.
* [28] R. Marques, C. Bouville, M. Ribardière, L. P. Santos, and K. Bouatouch. Spherical fibonacci point sets for illumination integrals. Computer Graphics Forum, 32(8):134–143, 2013. doi: 10 . 1111/cgf . 12190
* [29] J. Martschinke, S. Hartnagel, B. Keinert, K. Engel, and M. Stamminger. Adaptive temporal sampling for volumetric path tracing of medical data. Computer Graphics Forum, 38(4):67–76, 2019. doi: 10 . 1111/cgf . 13771
* [30] N. Max. Optical models for direct volume rendering. IEEE Transactions on Visualization and Computer Graphics, 1(2):99–108, 1995.
* [31] A. McNamara, A. Treuille, Z. Popović, and J. Stam. Fluid control using the adjoint method. ACM Trans. Graph., 23(3):449–456, Aug. 2004. doi: 10 . 1145/1015706 . 1015744
* [32] N. Morrical, W. Usher, I. Wald, and V. Pascucci. Efficient space skipping and adaptive sampling of unstructured volumes using hardware accelerated ray tracing. In 2019 IEEE Visualization Conference (VIS), pp. 256–260, 2019\. doi: 10 . 1109/VISUAL . 2019 . 8933539
* [33] R. D. Neidinger. Introduction to automatic differentiation and matlab object-oriented programming. SIAM review, 52(3):545–563, 2010.
* [34] T. Nguyen-Phuoc, C. Li, S. Balaban, and Y.-L. Yang. Rendernet: A deep convolutional network for differentiable rendering from 3d shapes. arXiv preprint arXiv:1806.06575, 2018.
* [35] M. Niemeyer, L. Mescheder, M. Oechsle, and A. Geiger. Differentiable volumetric rendering: Learning implicit 3d representations without 3d supervision. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2020.
* [36] M. Nimier-David, S. Speierer, B. Ruiz, and W. Jakob. Radiative backpropagation: An adjoint method for lightning-fast differentiable rendering. Transactions on Graphics (Proceedings of SIGGRAPH), 39(4), July 2020\. doi: 10 . 1145/3386569 . 3392406
* [37] M. Nimier-David, D. Vicini, T. Zeltner, and W. Jakob. Mitsuba 2: A retargetable forward and inverse renderer. ACM Trans. Graph., 38(6), Nov. 2019. doi: 10 . 1145/3355089 . 3356498
* [38] NVidia. Cuda nvrtc, 2021. https://docs.nvidia.com/cuda/nvrtc/index.html.
* [39] J. Painter and K. Sloan. Antialiased ray tracing by adaptive progressive refinement. In Proceedings of the 16th annual conference on Computer graphics and interactive techniques, pp. 281–288, 1989.
* [40] A. Paszke, S. Gross, F. Massa, A. Lerer, J. Bradbury, G. Chanan, T. Killeen, Z. Lin, N. Gimelshein, L. Antiga, A. Desmaison, A. Kopf, E. Yang, Z. DeVito, M. Raison, A. Tejani, S. Chilamkurthy, B. Steiner, L. Fang, J. Bai, and S. Chintala. Pytorch: An imperative style, high-performance deep learning library. In H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alché-Buc, E. Fox, and R. Garnett, eds., Advances in Neural Information Processing Systems 32, pp. 8024–8035. Curran Associates, Inc., 2019\.
* [41] F. Petersen, A. H. Bermano, O. Deussen, and D. Cohen-Or. Pix2vex: Image-to-geometry reconstruction using a smooth differentiable renderer. arXiv preprint arXiv:1903.11149, 2019.
* [42] H. Rhodin, N. Robertini, C. Richardt, H.-P. Seidel, and C. Theobalt. A versatile scene model with differentiable visibility applied to generative pose estimation. In Proceedings of the IEEE International Conference on Computer Vision, pp. 765–773, 2015.
* [43] M. Ruiz, A. Bardera, I. Boada, and I. Viola. Automatic transfer functions based on informational divergence. IEEE Transactions on Visualization and Computer Graphics, 17(12):1932–1941, 2011.
* [44] V. Sitzmann, M. Zollhöfer, and G. Wetzstein. Scene representation networks: Continuous 3d-structure-aware neural scene representations. NeurIPS, 2019.
* [45] S. Takahashi, I. Fujishiro, Y. Takeshima, and T. Nishita. A feature-driven approach to locating optimal viewpoints for volume visualization. In VIS 05. IEEE Visualization, 2005., pp. 495–502. IEEE, 2005.
* [46] Y. Tao, H. Lin, H. Bao, F. Dong, and G. Clapworthy. Structure-aware viewpoint selection for volume visualization. In 2009 IEEE Pacific Visualization Symposium, pp. 193–200. IEEE, 2009.
* [47] Y. Tao, Q. Wang, W. Chen, Y. Wu, and H. Lin. Similarity voting based viewpoint selection for volumes. In Computer graphics forum, vol. 35, pp. 391–400. Wiley Online Library, 2016.
* [48] A. Tewari, O. Fried, J. Thies, V. Sitzmann, S. Lombardi, K. Sunkavalli, R. Martin-Brualla, T. Simon, J. Saragih, M. Nießner, et al. State of the art on neural rendering. In Computer Graphics Forum, vol. 39, pp. 701–727. Wiley Online Library, 2020.
* [49] W. van Aarle, W. J. Palenstijn, J. Cant, E. Janssens, F. Bleichrodt, A. Dabravolski, J. D. Beenhouwer, K. J. Batenburg, and J. Sijbers. Fast and flexible x-ray tomography using the astra toolbox. Opt. Express, 24(22):25129–25147, Oct 2016. doi: 10 . 1364/OE . 24 . 025129
* [50] W. van Aarle, W. J. Palenstijn, J. De Beenhouwer, T. Altantzis, S. Bals, K. J. Batenburg, and J. Sijbers. The astra toolbox: A platform for advanced algorithm development in electron tomography. Ultramicroscopy, 157:35–47, 2015. doi: 10 . 1016/j . ultramic . 2015 . 05 . 002
* [51] P.-P. Vázquez, E. Monclús, and I. Navazo. Representative views and paths for volume models. In International Symposium on Smart Graphics, pp. 106–117. Springer, 2008.
* [52] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli. Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing, 13(4):600–612, 2004.
* [53] S. Weiss, M. Chu, N. Thuerey, and R. Westermann. Volumetric isosurface rendering with deep learning-based super-resolution. IEEE Transactions on Visualization and Computer Graphics, pp. 1–1, 2019. doi: 10 . 1109/TVCG . 2019 . 2956697
* [54] S. Weiss, M. Işık, J. Thies, and R. Westermann. Learning adaptive sampling and reconstruction for volume visualization. IEEE Transactions on Visualization and Computer Graphics, pp. 1–1, 2020. doi: 10 . 1109/TVCG . 2020 . 3039340
* [55] R. E. Wengert. A simple automatic derivative evaluation program. Communications of the ACM, 7(8):463–464, 1964.
* [56] Q. Xu, S. Bao, R. Zhang, R. Hu, and M. Sbert. Adaptive sampling for monte carlo global illumination using tsallis entropy. In International Conference on Computational and Information Science, pp. 989–994. Springer, 2005.
* [57] C. Yang, Y. Li, C. Liu, and X. Yuan. Deep learning-based viewpoint recommendation in volume visualization. Journal of Visualization, 22(5):991–1003, 2019.
* [58] R. Zhang, P. Isola, A. A. Efros, E. Shechtman, and O. Wang. The unreasonable effectiveness of deep features as a perceptual metric. In CVPR, 2018.
* [59] L. Zhou and C. Hansen. Transfer function design based on user selected samples for intuitive multivariate volume exploration. In 2013 IEEE Pacific Visualization Symposium (PacificVis), pp. 73–80. IEEE, 2013.
| arxiv-papers | 2021-07-27T08:38:20 | 2024-09-04T03:07:20.952412 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Sebastian Weiss, R\\\"udiger Westermann",
"submitter": "Sebastian Weiss",
"url": "https://arxiv.org/abs/2107.12672"
} |
2107.12679 | # MFAGAN: A Compression Framework for Memory-Efficient On-Device Super-
Resolution GAN
Wenlong Cheng#
City University of Hong Kong
Mingbo Zhao#
Donghua University
Zhiling Ye
Tencent Computer System Co., Ltd.
Shuhang Gu∗
The University of Sydney
###### Abstract
Generative adversarial networks (GANs) have promoted remarkable advances in
single-image super-resolution (SR) by recovering photo-realistic images.
However, high memory consumption of GAN-based SR (usually generators) causes
performance degradation and more energy consumption, hindering the deployment
of GAN-based SR into resource-constricted mobile devices. In this paper, we
propose a novel compression framework Multi-scale Feature Aggregation Net
based GAN (MFAGAN) for reducing the memory access cost of the generator.
First, to overcome the memory explosion of dense connections, we utilize a
memory-efficient multi-scale feature aggregation net as the generator. Second,
for faster and more stable training, our method introduces the PatchGAN
discriminator. Third, to balance the student discriminator and the compressed
generator, we distill both the generator and the discriminator. Finally, we
perform a hardware-aware neural architecture search (NAS) to find a
specialized SubGenerator for the target mobile phone. Benefiting from these
improvements, the proposed MFAGAN achieves up to 8.3$\times$ memory saving and
42.9$\times$ computation reduction, with only minor visual quality
degradation, compared with ESRGAN. Empirical studies also show $\sim$70
milliseconds latency on Qualcomm Snapdragon 865 chipset.
(a)
(b)
(c)
(d)
(e)
(f)
HR | ESRGAN | MFAGAN
---|---|---
PSNR$\uparrow$ $|$ LPIPS$\downarrow$ | 31.13 $|$ 0.0632 | 32.59 $|$ 0.0514
$\\#$FLOPs $|$ Memory | 291G $|$ 4.29G | 8.41G $|$ 0.551G
Figure 1: 4$\times$ SR results for the image ’img 009’ in Urban100. Our
proposed MFAGAN reduces the memory usage of ESRAGN by 8.3$\times$ while
preserving sharp edges and rich textures. (Zoom in for best view)
## 1 Introduction
Single image super-resolution (SR) is a fundamental low-level vision task,
which aims to reconstruct a high-resolution (HR) image from a degraded low-
resolution (LR) input. In recent years, convolutional neural networks (CNNs)
based approaches [10, 11, 31, 42, 21, 3, 41, 4] have achieved high fidelity in
terms of peak signal-to-noise ratio (PSNR) [34]. Nevertheless, these PSNR-
oriented methods tend to produce blurry output without enough high-frequency
information. More recently, an emerging direction is to resolve the ill-posed
SR problem by using generative adversarial networks (GANs) [14]. State-of-the-
art GAN-based perceptual-driven models such as SRGAN [23], ESRGAN [36] can
generate photorealistic images with more natural textures and sharper edges.
With the popularity of mobile devices, there is a growing on-device demand for
GAN-based SR applications.
However, the aforementioned GAN-based SR applications are extremely memory
intensive and energy overhead, making it impractical to deploy GAN-based SR
generators into resource-limited mobile devices. On the one hand, mobile
devices are memory-constrained. For instance, a Snapdragon 865 GPU has 2800MB
memory bandwidth, while ESRGAN would cost over 4000MB memory consumption to
process a 256 $\times$ 256 image. Furthermore, the total memory bandwidth is
shared by various on-device applications and the operating system. The peak
bandwidth consumed by a single application may only be allocated 20–40% [24]
of the total memory bandwidth. The overall performance of GAN-based SR is
bound by the limited memory bandwidth and lives under the slanted part of the
roofline [28]. On the other hand, mobile devices are energy-constrained. The
energy consumption of GAN-based SR mainly comes from memory access cost and
computation. With a 45 nm technology, the 32b coefficients in off-chip DRAM
cost 640 pJ, 128$\times$ larger than the consumption of 32b coefficients in
on-chip SRAM (3.7 pJ) [15]. The heavy memory cost of GAN-based SR severely
hinder the mobile deployment or at least creates performance degradation.
During the past few years, tremendous model compression techniques [16] have
been proposed to speed-up the inference and reduce the model parameters and
GAN compression is recently a hot topic in this research area [26, 12, 35].
For example, Aguinaldo et al. [1], and Chen et al. [7] first exploited
different knowledge distillation modalities for CycleGAN compression. Gong et
al. [13], Shu et al. [32], and Chu et al. [8] employed reinforcement learning
or co-evolutionary learning-based search to accelerate GAN. However, these
methods cannot be directly extended to compress GAN-based SR due to the
following reasons: first, the minimax training of GAN is notoriously unstable
and prone to collapse. This will greatly result in non-trivial solutions for
some complex tasks such as GAN-based SR compression; second, memory efficiency
is a critical issue when deploying the memory overhead models on the mobile
phone. However, none of above compression methods have consider this point.
Therefore, how to develop a memory efficiency and effective generator for GAN-
based SR, is an urgent problem.
In this work, in order to develop a hardware-aware on-device GAN-based SR
network, we propose a new network, namely, Multi-scale Feature Aggregation Net
based GAN (MFAGAN) for memory efficient compression. In detail, we first
propose a novel generator architecture by designing the multi-scale feature
aggregation modules (MFAMs), which is memory-efficient and of sufficient
expressive ability. Besides, we introduce the light-weight PatchGAN
discriminator to overcome artifacts and facilitate MFAGAN training. Meriting
from the above structures, we propose a two-stage compression method: we first
utilize knowledge distillation both for the generator and discriminator. This
is to balance the student generator and student discriminator for maintaining
the stabilized training of the compressed generator so that the non-trivial
solution can be achieved; we then apply NAS channel pruning method to further
reduce memory usage. Finally, we utilize the hardware-aware evolutionary
search for specializing SubGenerator on the target mobile phone.
The main contributions can be shown as follows: 1) we start from a new and
more useful point of view to design a small-size SR method by firstly
considering the memory efficiency. This is of great practice in real-world
applications; 2) we develop a new two-stage approach to achieve effective
compression, where we first distill G/D to achieve stabilized non-trivial
solution of the compressed generator and then apply NAS to reduce memory
usage; 3) Extensive experiments validate the efficiency of our method. MFAGAN
achieves up to 8.3$\times$ memory reduction, 42.9$\times$ computing efficiency
over ESRGAN with only minor loss in PSNR and Learned Perceptual Image Patch
Similarity (LPIPS) [34]. Finally, we deploy our MFAGAN on OPPO Find X2 and
demonstrate $\sim$70 milliseconds latency on Snapdragon 865 GPU.
## 2 Related Work
In this section, we review previous works about GAN-based super-resolution
networks, efficient super-resolution networks, and GAN compression techniques,
which are the most relevant to our work.
### 2.1 GAN-based Super-Resolution Networks
Recently, a bunch of SR works paid more attention to visual effects. With the
rapid development of perceptual-driven SR algorithms, Generative Adversarial
Network (GAN)-based methods often achieved state-of-the-art visual
performance. Johnson et al.[20] adopted the perceptual loss to enhance the
visual quality while Ledig et al.[23] firstly employed the adversarial loss to
generate more realistic images. Besides, Sajjadi et al.[30] explored the
texture matching loss to reduce visually unpleasant artifacts. Based on these
works, Wang et al. [36] enhanced the SRGAN by employing Residual-in-Residual
Dense Block (RRDB) and the relativistic discriminator, won the champion of
PIRM2018-SR challenge. Furthermore, the LPIPS metric was introduced to measure
the perceptual similarity. Lately, Zhang et al.[40] proposed a novel rank-
content loss to optimize the perceptual quality, which achieved state-of-the-
art results in perceptual metrics. Despite their performance boost, large GAN
generators’ growing complexity conflicts with the demands of mobile
deployments, calling for GAN compression techniques. In this paper, we focus
on memory-efficient GAN-based SR for mobile applications.
### 2.2 Efficient Super-Resolution Networks
In recent years, a series of efficient networks with parameters in the range
of 10M have been proposed for the efficient SR task [39]. We call these kinds
of networks efficient super-resolution networks. They can be approximately
divided into two classes: handcrafted architectures and model compression-
based methods. A surge of handcrafted architectures have been designed for the
efficient SR task, ranging from post-upsampling operators [11], group
convolutions [19], residual blocks [42], recursive structures [21], cascaded
architectures [3], inverse sub-pixel convolution [31], attention mechanisms
[41], to information multi-distillation block (IMDB) [18]. Besides, model
compression techniques such as knowledge distillation, channel pruning, and
binary quantization have also been used to speed up the SR networks.
Specifically, RFDN [27] applied channel pruning along with residual feature
aggregation module to improve the IMDB efficiency, which is the winner
solution of the AIM 2020 Challenge on Efficient Super-Resolution [39].
However, these methods aim to maximize PSNR between SR and HR, which tend to
generate blurry results without high-frequency details. Efficient super-
resolution networks cannot be directly used as the generator of GAN-based SR.
### 2.3 GAN Compression Techniques
In the past few years, GAN has achieved prevailing success in many generation
and translation tasks. However, the growing memory complexity and computation
cost of GANs conflict with the demands of mobile deployments. It is hard to
apply existing compression techniques, owing to the minimax training of GANs
is notoriously unstable and prone to collapse. Several methods exploited
knowledge distillation for compressing the image translation models. Aguinaldo
et al. [1] first introduced knowledge distillation for unconditional GANs
compression. Chen et al. [7] proposed to train an efficient generator by
knowledge distillation over the architectures of both the generator and the
discriminator. A few works have also attempted to incorporate neural
architecture search (NAS) [43] with GANs. Gong et al. [13] utilized
reinforcement learning to search for an efficient generator with a fixed
discriminator, limiting the algorithm to discover an optimal generator since
the balance between these two players needs to be considered. Shu et al. [32]
later replaced the reinforcement learning by co-evolutionary pruning to
accelerate CycleGAN, which relied on the cycle consistency loss. Chu et al.
[8] leveraged an elastic search tactic at both micro and macro space to solve
a multi-objective problem for SR. Combining multiple different compression
techniques, such as weight sharing, channel pruning, knowledge distillation,
and quantization, has been significantly outperformed approaches using single
compression techniques. Li et al. [26] presented a compression framework for
conditional GANs via intermediate feature distillation and automated channel
reduction in a “once-for-all” manner. Fu et al. [12] performed computational
resources constrained differential neural architecture search via the guidance
of knowledge distillation. Wang et al. [35] combined three compression
techniques: model distillation, channel pruning, and quantization, together
with the minimax objective, into one unified optimization to form an end-to-
end optimization framework.
However, most of the above methods are not customized for GAN-based SR.
Besides, they have not yet addressed the memory intensive problem. The memory
budget should still be met for efficient network structure design. Moreover,
the mutual balance of the compressed generator and discriminator needs to be
considered, which is crucial for stabilizing the GANs training process. Our
work is to solve the above problems.
## 3 Proposed Approaches
### 3.1 Network Structure
In our network, we first develop a novel generator architecture by designing
the multi-scale feature aggregation modules (MFAMs). We then introduce the
light-weight PatchGAN discriminator to overcome artifacts and facilitate
MFAGAN training. Meriting from the above structures, we then distill both
generator and discriminator to achieve non-trivial super-generator and to
apply NAS channel pruning on it. The overall proposed compression framework
architecture is depicted in Figure 2.
Figure 2: MFAGAN overview. (1) Construct the large MFAGAN (MFAGAN$\\_$L) using
the proposed Multi-Scale Feature Aggregation Network as a generator and the
introduced PatchGAN discriminator. (2) Distill both the generator and
discriminator in the MFAGAN$\\_$L. (3) Train a weight-shared SuperGenerator,
which comprises many SubGenerators of different channel numbers. (4) Perform a
hardware-aware evolutionary search to find the satisfactory SubGenerator. (5)
Fine-tune the searched SubGenerator with the previously distilled
discriminator.
### 3.2 Multi-Scale Feature Aggregation Network
For the generator, inspired by ESRGAN [36], VoVNet [25] and IMDN [18], we
design a memory-efficient Multi-Scale Feature Aggregation Network (MFANet)
shown in Figure 4. The proposed MFANet mainly contains four parts: the coarse
feature extraction part, the multi-scale feature extraction part, the feature
fusion part, and the reconstruction part. In particular, we use a $3\times 3$
convolution as the coarse feature extraction part to generate features from
the input LR image. The following is the multi-scale features extraction part,
in which three Multi-scale Feature Aggregation Modules (MFAMs) are stacked in
a chain manner to refine the extracted features gradually. Later we will
provide a detailed description of MFAM. After extracting multi-scale features
with a set of MFAMs, we further conduct global feature aggregation by a
$1\times 1$ convolution layer, which contributes to concatenate multi-scale
features of different modules and reduces computation complexity. Meanwhile, a
global skip connection is applied between different scale features so that the
features information can be fully exploited. Then, a $3\times 3$ convolution
layer is used to smooth the aggregated features. Finally, the HR images are
generated by the image reconstruction part, which only consists of a $3\times
3$ convolution and a sub-pixel operation.
(a) RFDB (b) MFAM(ours)
(c) CFAB(ours)
Figure 3: Illustration of three structures. (a) RFDB: the residual feature
distillation block. (b) MFAM: the multi-scale feature aggregation module. (c)
CFAB: the concatenative feature aggregation block in MFAM.
Modifying from the RFDN [27], as illustrated Figure 3 (a), we propose the
Multi-scale Feature Aggregation Module (MFAM), as shown in Figure 3 (b), which
is more expressive and memory-efficient than the RFDB. In RFDB, we can see
that the channel reduction is conducted by a $1\times 1$ convolution on the
left, which compresses feature channels at a fixed ratio. Although the
$1\times 1$ convolution decreases the number of parameters, it increases the
overall memory complexity. Therefore, the three $1\times 1$ convolutions are
removed, since we find that the NAS method is more efficient for channel
reduction without introducing extra computation. Moreover, we also introduce
the Concatenative Feature Aggregation Block (CFAB), as displayed in Figure 3
(c), to replace SRB in RFDB [27]. CFAB consists of five $3\times 3$
convolutions, a local feature aggregation layer, a CCA layer [18], a $1\times
1$ convolution layer, and a local skip connection. CFAB can conserve feature
representations of multiple receptive fields as well as preserve original
information. This schema provides diverse information for recovering high-
resolution details. In summary, the main goal of MFAM is to reduce memory
overhead and enhance expressive ability.
### 3.3 PatchGAN Discriminator
Besides the memory-efficient generator, the ESRGAN discriminator is replaced
with the PatchGAN discriminator [9]. We utilize a 7-layer fully convolutional
discriminator. Each convolutional layer is followed by a leaky ReLU. To avoid
unpleasant artifacts, all BN layers are removed. Compared with the original
discriminator, the PatchGAN discriminator has fewer parameters. Another
advantage is that it only models local patches instead of the whole image,
making the MFAGAN$\\_$L training faster and more stable.
Figure 4: Illustration of the overall objective.
### 3.4 Knowledge Distillation
Layer-wise knowledge from the teacher generator. Several attempts have been
made to compress GANs generator with knowledge distillation in image
translation. In this work, we match the teacher generator’s intermediate
representations, as the layer-wise knowledge distillation work in [29]. In
particular, we first train a teacher generator $G$ until convergence and then
conduct layer-wise knowledge transfer from $G$ to the student generator
$G^{\prime}$. The goal of distillation is that the feature maps of each layer
in $G^{\prime}$ should be as close as possible to those of $G$. Feature maps
of the 1st, 2nd and 3rd MFAMs of $G$ denoted as $t_{1}$, $t_{2}$ and $t_{3}$
respectively. The corresponding levels of feature maps in $G^{\prime}$ are the
outputs of the 1st, 2nd, and 3rd MFAMs, denoting as $s_{1}$, $s_{2}$, and
$s_{3}$, respectively. To address the above issue, we use the information in
$t_{1}$, $t_{2}$ and $t_{3}$ to guide the information $s_{1}$, $s_{2}$ and
$s_{3}$ during the training of $G^{\prime}$. Subsequently, a student generator
of fewer channels is trained by inheriting the low-level and high-level
information from the original heavy teacher generator.
Layer-wise knowledge from the teacher discriminator. Although we aim to
compress the generator, a discriminator stores useful knowledge of a learned
GAN to guide the training generator [7]. Using heavy discriminator, $D$
sometimes leads to severe training instability and image quality degradation
after the generator $G$ is compressed. It is necessary to distill the teacher
discriminator $D$ to assist the training of the compressed generator
$G^{\prime}$. In this work, we adopt the PatchGAN discriminator architecture
to distill layer-wise knowledge from teacher discriminator $D$ to student
discriminator $D^{\prime}$. Concretely, we extract corresponding levels of
feature maps using the outputs of every two convolution layers, denoting as
$t_{2}$, $t_{4}$, $t_{6}$, respectively. After that, we use the information in
$t_{2}$, $t_{4}$, $t_{6}$ to guide the information $s_{2}$, $s_{4}$, $s_{6}$
during training of student discriminator. We jointly optimize $G^{\prime}$ and
$D^{\prime}$ to minimize the distillation loss $L_{Distill\\_G}$ and
$L_{Distill\\_D}$.
Mode collapse frequently occurs when the generator and discriminator are
imbalanced. We adopt the layer-wise knowledge distillation on both the teacher
generator and teacher discriminator. Hence, the student generator and
discriminator are better matched. Such guidance from the teacher networks
provides stable supervision in the early training phase of compressed
networks. It is easy to implement, and mode collapse has never been
experienced with our knowledge distillation schema.
### 3.5 Objective Function
Overall objective. There are five loss functions applied to training, depicted
in Figure 4. The overall objective for our MFAGAN is the weighted sum of loss
terms, written as follows:
$\displaystyle L={\lambda_{1}}{L_{recon}}$
$\displaystyle+{\lambda_{2}}{L_{Distill\\_G}}+{\lambda_{3}}{L_{Distill\\_D}}$
(1) $\displaystyle+{\lambda_{4}}{L_{percep}}+{\lambda_{5}}{L_{G}},$
where $\lambda_{1}$, $\lambda_{2}$, $\lambda_{3}$, $\lambda_{4}$, and
$\lambda_{5}$ are the trade-off hyper-parameters to balance different
objectives.
Reconstruction loss. Here, we apply the reconstruction loss, specifically the
Mean Absolute Error (MAE) loss, to enhance the fidelity of the recovered
images. Reconstruction loss is trained to optimize the $L1$ distance between
the recovered images and ground-truths:
${L_{recon}}=\frac{1}{N}\sum\limits_{i=1}^{N}{{{\left\|{R\left({x_{i}^{lr}}\right)-x_{i}^{gt}}\right\|}_{\rm{1}}}},\vspace{-0.05in}$
(2)
where $x_{i}^{lr}$, $x_{i}^{gt}$ denote the $i$-th LR image patch and the
corresponding HR. $N$ is the total number of training samples. $R(\cdot)$
represents the super-resolved output by MFAGAN.
Layer-wise knowledge distillation loss. We introduce a layer-wise knowledge
distillation to extract the intermediate feature maps of the teacher
generator. The intermediate feature maps contain richer information and allow
the student generator to acquire low-level and high-level information from the
teacher generator. The generator distillation objective can be formalized as:
${L_{Distill\\_G}}{\rm{=}}\frac{1}{n}\sum\limits_{i=1}^{n}{{{\left\|{{G_{i}}\left({{x}}\right)-{G^{\prime}_{i}}\left({{x}}\right)}\right\|}_{2}}},\vspace{-0.05in}$
(3)
where ${G_{i}}({x})$ and ${G^{\prime}_{i}}({x})$ are the intermediate feature
maps of the $i$-th chosen layer in the teacher and student generator. Besides
the generator, the discriminator stores useful knowledge of a learned GAN-
based SR. It is useful to distill the teacher discriminator to stabilize the
compressed generator training. The discriminator distillation loss function
can be defined as:
${L_{Distill\\_D}}{\rm{=}}\frac{1}{m}\sum\limits_{i=1}^{m}{{{\left\|{{D_{i}}\left({{y}}\right)-{D^{\prime}_{i}}\left({{y}}\right)}\right\|}_{2}}},\vspace{-0.05in}$
(4)
where ${D_{i}}({y})$ and ${D^{\prime}_{i}}({y})$ are the feature maps of the
$i$-th chosen layer in the teacher and student discriminator.
Perceptual loss. In [20] Johnson et al. proposed the perceptual loss to
improve the visual effect of low-frequency features such as edges. Instead of
computing distances in image pixel space, the images are first mapped into
feature space by a pre-trained VGG19 network, denoted as $\phi$, and then
compute the Mean Square Error (MSE) on their feature maps as follows:
${L_{percep}}=\sum\limits_{i=1}{{{\left\|{{\phi}\left({\hat{y_{i}}}\right)-{\phi}\left({{y_{i}}}\right)}\right\|}_{2}}},\vspace{-0.06in}$
(5)
where $\phi({{\hat{y}}_{i}})$ and $\phi({{y}_{i}})$ represent the feature maps
of HR ground truth and the SR, respectively. All the feature maps are obtained
by the fourth convolutional layer before the fifth max-pooling layer within
the VGG19 network.
Adversarial loss. Following common practice, we apply adversarial loss [36] to
enhance the texture details of the generator generated image to make it more
realistic. Adversarial training a standard minimax optimization, and the
discriminator $D$ is trained to distinguish between real images and the output
of $G$. The adversarial loss ${{L}_{G}}$ is described as:
${L_{G}}=-\log(D(G({I^{LR}})).$ (6)
where $I^{LR}$ is the LR image, $D(G(I^{LR}))$ means the probability of the
discriminator over all training samples.
### 3.6 Hardware-aware NAS based Channel Pruning
SuperGenerator training with fine-grained channels. To address the fine-
grained channel pruning problem, we first build a SuperGenerator that
comprises all candidate SubGenerators. Concretely, we use MFANet as the
backbone to build a “once-for-al” [6] network that comprises many
SubGenerators of different channel numbers (i.e., 48, 32, 24), in which the
full-width model is the SuperGenerator. The combined search space contains
about $3^{8}=6581$ different SubGenerators, in which every SubGenerator in the
search space is a part of the SuperGenerator. In practice, the SuperGenerator
only needs to be trained for the same steps as a baseline SR model, which is
fast and low-cost. We thus use the most important channels of the
SuperGenerator to initialize the SubGenerators. All SubGenerators share the
front portion of corresponding layer weights in the SuperGenerator.
Hardware-aware evolutionary search for specialized SubGenerator. After
SuperGenerator training, we adopt the evolutionary search to find the
satisfactory SubGenerator, which satisfies the target hardware’s latency
constraints while optimizing the PSNR. We can first build a lookup table
containing the latency for all possible operators on the target hardware, then
the overall latency of a SubGenerator is predicted by summing up each
operator’s latency [37]. Therefore, we can approximate the latency of
candidate SubGenerator by querying the lookup table. The PSNR of SubGenerators
is evaluated on the validation set. Afterward, we conduct the evolutionary
search to get a specialized SubGenerator. Since SubGenerators training has
been decoupled from the architecture search, we do not need any training cost
in the search stage. This hardware-aware NAS channel pruning enables us to
design a specialized SubGenerator on the target hardware.
Finally, we can fine-tune the pruned SubGenerator with distilled discriminator
to obtain the final model.
## 4 Experimental Results
### 4.1 Experimental Setup
Datasets. Following [36], we adopt 800 HR images from the DIV2K dataset [2] as
the training set. To generate LR training patches, we down-sample the HR
images using bicubic interpolation in MATLAB. We also augment the training
data with the random crop, horizontal/vertical flips, and $90^{\circ}$
rotations.
Evaluation metrics. For evaluation, we test the compressed/searched model on
four SR benchmark datasets, namely Set5 [5], Set14 [38], B100 [33], and
Urban100 [17]. Inspired by the PIRM2018-SR Challenge [34], we introduce PSNR
and LPIPS on the Y channel of the transformed YCbCr space as the quality
evaluation metrics. To measure the computation efficiency, we compare the
widely used metrics - memory access cost, parameters, FLOPs (floating-point
operations), and inference latency. Regarding the inference latency, we use
the published codes of competitors to evaluate on a server with 4.2GHz Intel
i7 CPU, 32GB RAM, and an Nvidia V100 GPU card.
Implement details. The training process is divided into four main stages. (1)
Constructing the MFAGAN$\\_$L model. We first train an MFANet with the $L_{1}$
loss, while the learning rate is $2\times{10^{-4}}$ and 500K iterations. The
MFANet initialized generator is then trained using the loss function in Eq.(1)
with $\lambda_{1}=1$, $\lambda_{4}=1$, $\lambda_{5}=10$, the learning rate is
initialized to $1\times{10^{-4}}$ and halved at $[5k,10k]$ iterations. (2)
Layer-wise distillation on both the generator and discriminator in the
MFAGAN$\\_$L. The student generator and student discriminator is trained with
$\lambda_{1}=1$, $\lambda_{2}=0.05$, $\lambda_{3}=0.05$, $\lambda_{4}=1$,
$\lambda_{5}=10$. (3) Training the weight-shared SuperGenerator.
SuperGenerator is trained with $\lambda_{1}=1$, $\lambda_{4}=1$, the learning
rate is set to $1\times{10^{-4}}$ and halved at $[200k,400k,600k]$ iterations.
(4) Fine-tuning the searched generator with distilled discriminator about 10K
iterations. For all experiments, we use the Adam [22] optimization method with
$\beta_{1}=0.5$, $\beta_{2}=0.999$, $\epsilon={10^{-8}}$ to train all of the
models. The mini-batch size is set to 16. Our networks are implemented using
the PyTorch framework on 8 NVIDIA V100 GPUs. The entire training process takes
about 120 GPU hours.
### 4.2 Model Complexity Analysis
Figure 5: The memory access cost vs. LPIPS on Set5 (4$\times$) dataset. The
orange circles represent our proposed models. The circles’ size represents the
number of FLOPs, which are calculated on $512\times 512$ HR image.
To construct a memory-efficient SR model, the memory access cost of the
network is vital. As discussed in previous sections, the proposed MFAGAN could
significantly reduce memory consumption. Figure 5 depicts the comparisons
about LPIPS vs. memory access cost and FLOPs on Set5 4$\times$ dataset. From
Figure 5, we can observe that the MFAGAN model with 3 MFAMs exhibits
comparative or better performance and fewer memory usage than other state-of-
the-art methods SRGAN [23], EhanceNet [30], ESRGAN [36], and AGD [12]. MFAGAN
is also superior over efficient models including SRCNN [10], IMDN [18].
Compared with IMDN, our MFAGAN achieves better LPIPS with a slightly larger
model. These results demonstrate that the proposed MFAGAN can correctly
balance memory complexity and reconstruction performance.
### 4.3 Ablation Study
In this section, we conduct ablation experiments to investigate the
contributions of each component in the proposed method. The overall comparison
is illustrated in Table 1, in which each column represents a model. A detailed
discussion is provided as follows.
Table 1: Ablation study: Memory-efficient architecture combined with knowledge distillation on both ${G}$ and ${D}$, and NAS channel pruning achieves the best performance on the Set5 dataset. Options | | Baseline
---
(ESRGAN)
1st | 2nd | 3rd | 4th | 5th
generator channels | 64 | 64 | 48 | 48 | 32 | 32
discriminator channels | 64 | 48 | 32 | 48 | 48 | 32
MFAGAN$\\_$L | | $\checkmark$ | $\checkmark$ | $\checkmark$ | $\checkmark$ | $\checkmark$
| Distill $G$ and $D$
---
| $\checkmark$ | | | $\checkmark$
| Distill $G$
---
| | $\checkmark$ | |
NAS pruning | | | | $\checkmark$ | $\checkmark$
| PSNR$\uparrow$
---
LPIPS$\downarrow$
| 30.45
---
0.0572
| 30.32
---
0.0527
| 30.65
---
0.0558
| 28.56
---
0.0878
| 29.19
---
0.0672
| 30.16
---
0.0571
Memory (G) | 4.29 | 0.877 | 0.657 | 0.657 | 0.515 | 0.515
#Param. (MB) | 16.67 | 1.56 | 0.884 | 0.884 | 0.551 | 0.551
#FLOPs (G) | 291 | 23.72 | 13.45 | 13.45 | 8.41 | 8.41
Table 2: Quantitative comparison of our model with state-of-the-art perceptual-driven works on 4$\times$ SR task. In each row, red/blue represents best/second, respectively. Model | | Memory
---
(G)
| #FLOPs
---
(G)
| #Param.
---
(MB)
| Latency
---
(ms)
| Set5
---
PSNR$\uparrow$ LPIPS$\downarrow$
| Set14
---
PSNR$\uparrow$ LPIPS$\downarrow$
| B100
---
PSNR$\uparrow$ LPIPS$\downarrow$
| Urban100
---
PSNR$\uparrow$ LPIPS$\downarrow$
SRGAN | 0.7 | 36.5 | 1.55 | 80.8 | | 29.40 $|$ 0.0621
---
| 26.11 $|$ 0.1167
---
| 25.17 $|$ 0.1333
---
| $-$
---
EnhanceNet | 0.91 | 30.2 | 0.85 | 29 | | 28.56 $|$ 0.0764
---
| 25.77 $|$ 0.1295
---
| 24.93 $|$ 0.1481
---
| 23.54 $|$ 0.1307
---
ESRGAN | 4.29 | 291 | 16.67 | 169.4 | | 30.45 $|$ 0.0572
---
| 26.28 $|$ 0.1055
---
| 25.32 $|$ 0.1216
---
| 24.36 $|$ 0.1000
---
| AGD
---
0.94 | 27.1 | 0.41 | 27.7 | | 30.41 $|$ 0.0700
---
| 27.27 $|$ 0.1247
---
| 26.22 $|$ 0.1556
---
| 24.73 $|$ 0.1329
---
| MFAGAN (ours)
---
0.52 | 8.41 | 0.55 | 21.9 | | 30.16 $|$ 0.0571
---
| 26.69 $|$ 0.1133
---
| 25.33 $|$ 0.1332
---
| 24.23 $|$ 0.1132
---
Effectiveness of memory-efficient architecture. We first analyze the advantage
of MFANet based MFAGAN$\\_$L. As shown in the 1st column, MFAGAN$\\_$L has
comparative PSNR and LPIPS results with the baseline model. While achieves
4.89$\times$ memory saving and 12.26$\times$ computation reduction. With our
memory consumption and computation complexity largely reduced, the SR
performance remains relatively stable. The perceptual SR task requires the
model to be expressive enough to recover more realistic texture details. Our
proposed multi-scale feature aggregation modules (MFAMs) is capable of
aggregating multi-scale features to produce powerful feature representation.
Effectiveness of layer-wise knowledge distillation on both ${G}$ and ${D}$. We
also investigate the effects of different distillation objectives on the
MFAGAN$\\_$L. Two distillation methods are proposed, including solely layer-
wise distillation on teacher generator $G$, and knowledge distillation on both
teacher generator $G$ and teacher discriminator $D$. Results are illustrated
in the 2nd and 3rd columns of Table 1, which show that the proposed
distillation objective is useful for the MFAGAN$\\_$L compression. As shown in
the 2nd column, distilled MFAGAN$\\_$L even has better PSNR result than
MFAGAN$\\_$L, with 1.33$\times$ memory saving and 1.76$\times$ computation
reduction. While solely distillation on $G$ yields worse performance compared
with MFAGAN$\\_$L. As a teacher discriminator, $D$ stores useful information
about teacher generator $G$. It can offer strong supervision to guide the
student generator $G^{\prime}$ to learn faster and better.
Effectiveness of NAS channel pruning. We further explore the role of NAS
channel pruning. The results are shown in the 4th and 5th columns of Table 1.
Directly using NAS channel pruning to compress the MFAGAN$\\_$L generator
largely degrades the image SR performance. In contrast, knowledge distillation
+ NAS channel pruning achieves much better PSNR and LPIPS results, showing the
necessity of jointly using channel pruning and knowledge distillation.
Actually, the capacity gap between the SuperGenerator, i.e., MFAGAN-64, and
the directly searched SubGenerator, i.e., MFAGAN-32, are too huge. As a
result, the inherited weights from the SuperGenerator may be too recondite for
the SubGenerator, in which case large ratio NAS channel pruning would have
negative effects on the searched model. Applying the distilled MFAGAN-48 as
SuperGenerator allows us to find a SubGenerator, which has a smaller gap
between the SuperGenerator and hence makes learning easier. NAS channel
pruning and knowledge distillation are complementary to each other, which
guarantees MFAGAN achieve competitive results.
Effectiveness of discriminator. Finally, this section aims to evaluate the
importance of the PatchGAN discriminator. To this end, we train the
MFAGAN$\\_$L with PatchGAN discriminator and ESRGAN discriminator on DIV2K,
respectively. The convergence curves are visualized in Figure 6. We can
observe that PatchGAN discriminator achieves better results, verifying that:
(1) vanilla ESRGAN discriminator is not matched with light-weight MFANet and
has worse performance; (2) PatchGAN discriminator leads to significantly
better PSNR result and stability.
Figure 6: Ablation study of PatchGAN discriminator.
### 4.4 Comparison with State-of-the-Art Methods
Quantitative comparisons. We report the quantitative comparisons of state-of-
the-art perceptual-driven methods over the benchmark datasets in Table 2.
Compared with given methods, we can see MFAGAN achieves the best PSNR and
LPIPS performance in most datasets. This reveals the effectiveness of our
MFAM. Additionally, we also give the FLOPs, memory access cost, parameters,
and latency for all the comparison methods. Our model achieves large
compression ratios. In particular, our proposed method shows a clear advantage
of ESRGAN compression compared to the previous GAN compression mthod AGD [12].
We can reduce the memory access cost of the ESRGAN generator by 8.2$\times$,
which is 2$\times$ better compared to the previous AGD method while achieving
a much better PSNR and LPIPS. It demonstrates that MFAGAN is superior to other
perceptual-driven methods in a comprehensive performance.
Table 3: Inference latency comparison of our MFAGAN with ESRGAN on the Qualcomm Snapdragon 865 GPU on 4$\times$ SR task. Model | | Memory
---
(G)
| #FLOPs
---
(G)
| #Param.
---
(MB)
| Set5
---
PSNR$\uparrow$ LPIPS$\downarrow$
| Mobile
---
Latency
ESRGAN | 4.29 | 291 | 16.67 | | 30.45 $|$ 0.0572
---
1150
MFAGAN(ours) | 0.52 | 8.41 | 0.55 | | 30.16 $|$ 0.0571
---
70
(a) 8023 from B100 (4$\times$)
(a)
(b)
(c)
(d)
HR | DRLN | IMDN | SRGAN
---|---|---|---
(e)
(f)
(g)
(h)
EnhanceNet | ESRGAN | AGD | MFAGAN
---|---|---|---
(i) 223061 from B100 (4$\times$)
(a)
(b)
(c)
(d)
HR | DRLN | IMDN | SRGAN
---|---|---|---
(e)
(f)
(g)
(h)
EnhanceNet | ESRGAN | AGD | MFAGAN
---|---|---|---
(i) 223061 from B100 (4$\times$)
(a)
(b)
(c)
(d)
HR | DRLN | IMDN | SRGAN
---|---|---|---
(e)
(f)
(g)
(h)
EnhanceNet | ESRGAN | AGD | MFAGAN
---|---|---|---
Figure 7: 4$\times$ SR visual results for common test datasets. Our model
(MFAGAN) can produce sharp edges and rich textures compared with other state-
of-the-art methods. (Zoom in for best view)
4$\times$ Qualitative comparisons. To further illustrate the analyses above,
we show visual comparisons on scales 4$\times$ on B100 and Set14. From Figure
7, it can be observed that MFAGAN can generate sharp edges and realistic
textures without introducing unpleasant artifacts. For image “8023” and
“223061” in the B100 dataset, we can see that MFAGAN can recover the sharpness
of the edges on the objects. Besides, for challenging details in the image
“Lena” in Set14, MFAGAN can generate the correct textures of hair portion and
hat edges. In general, MFAGAN achieves comparatively visual quality with
ESRGAN and shows more realistic textures and sharper edges over IMDN and AGD.
### 4.5 Comparison of Latency on Mobile Device
Mobile inference acceleration has drawn people’s attention in recent years. At
last, we compare the inference latency of our MFAGAN with ESRGAN on Qualcomm
Snapdragon 865 GPU (on OPPO Find X2) for 4$\times$ SR images. We use the
TensorFlow Lite framework to deploy the models on the mobile phone. The
results are reported in Table 3. We can see that our mobile-friendly model can
process a $128\times 128$ input with 70 ms, while ESRGAN with comparable
performance requires a significantly longer 1150ms. Our proposed MFAGAN
achieves 16.4$\times$ measured speedup while saving memory usage by 88%. The
results show that MFAGAN is highly efficient in real-world applications. The
algorithm and hardware co-design enables us to design specialized models on
the target hardware.
## 5 Conclusion
In this work, we propose Multi-scale Feature Aggregation Net based GAN
(MFAGAN) compression framework to reduce the memory consumption of the
generator in GAN-based SR. MFAGAN leverages memory-efficient architecture,
layer-wise knowledge distillation, and hardware-aware evolutionary search to
stabilize the training and improve the memory-efficiency. Extensive
experiments show MFAGAN outperforms previous state-of-the-art methods with
aggressively reduced memory access cost and a faster inference speed without
visual quality degradation. For future works, we have plans to apply our
findings to video SR.
## References
* [1] Angeline Aguinaldo, Ping-Yeh Chiang, Alex Gain, Ameya Patil, Kolten Pearson, and Soheil Feizi. Compressing gans using knowledge distillation. arXiv preprint arXiv:1902.00159, 2019.
* [2] Eirikur Agustsson and Radu Timofte. Ntire 2017 challenge on single image super-resolution: Dataset and study. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pages 126–135, 2017.
* [3] Namhyuk Ahn, Byungkon Kang, and Kyung-Ah Sohn. Fast, accurate, and lightweight super-resolution with cascading residual network. In Proceedings of the European Conference on Computer Vision (ECCV), pages 252–268, 2018.
* [4] Saeed Anwar and Nick Barnes. Densely residual laplacian super-resolution. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2020\.
* [5] Marco Bevilacqua, Aline Roumy, Christine Guillemot, and Marie Line Alberi-Morel. Low-complexity single-image super-resolution based on nonnegative neighbor embedding. 2012\.
* [6] Han Cai, Chuang Gan, Tianzhe Wang, Zhekai Zhang, and Song Han. Once-for-all: Train one network and specialize it for efficient deployment. arXiv preprint arXiv:1908.09791, 2019.
* [7] Hanting Chen, Yunhe Wang, Han Shu, Changyuan Wen, Chunjing Xu, Boxin Shi, Chao Xu, and Chang Xu. Distilling portable generative adversarial networks for image translation. arXiv preprint arXiv:2003.03519, 2020.
* [8] Xiangxiang Chu, Bo Zhang, Hailong Ma, Ruijun Xu, Jixiang Li, and Qingyuan Li. Fast, accurate and lightweight super-resolution with neural architecture search. arXiv preprint arXiv:1901.07261, 2019.
* [9] Ugur Demir and Gozde Unal. Patch-based image inpainting with generative adversarial networks. arXiv preprint arXiv:1803.07422, 2018.
* [10] Chao Dong, Chen Change Loy, Kaiming He, and Xiaoou Tang. Learning a deep convolutional network for image super-resolution. In European conference on computer vision, pages 184–199. Springer, 2014.
* [11] Chao Dong, Chen Change Loy, and Xiaoou Tang. Accelerating the super-resolution convolutional neural network. In European conference on computer vision, pages 391–407. Springer, 2016.
* [12] Yonggan Fu, Wuyang Chen, Haotao Wang, Haoran Li, Yingyan Lin, and Zhangyang Wang. Autogan-distiller: Searching to compress generative adversarial networks. arXiv preprint arXiv:2006.08198, 2020.
* [13] Xinyu Gong, Shiyu Chang, Yifan Jiang, and Zhangyang Wang. Autogan: Neural architecture search for generative adversarial networks. In Proceedings of the IEEE International Conference on Computer Vision, pages 3224–3234, 2019.
* [14] Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In Advances in neural information processing systems, pages 2672–2680, 2014.
* [15] Song Han, Xingyu Liu, Huizi Mao, Jing Pu, Ardavan Pedram, Mark A Horowitz, and William J Dally. Eie: efficient inference engine on compressed deep neural network. ACM SIGARCH Computer Architecture News, 44(3):243–254, 2016.
* [16] Song Han, Huizi Mao, and William J Dally. Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv:1510.00149, 2015.
* [17] Jia-Bin Huang, Abhishek Singh, and Narendra Ahuja. Single image super-resolution from transformed self-exemplars. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 5197–5206, 2015.
* [18] Zheng Hui, Xinbo Gao, Yunchu Yang, and Xiumei Wang. Lightweight image super-resolution with information multi-distillation network. In Proceedings of the 27th ACM International Conference on Multimedia, pages 2024–2032, 2019.
* [19] Zheng Hui, Xiumei Wang, and Xinbo Gao. Fast and accurate single image super-resolution via information distillation network. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 723–731, 2018.
* [20] Justin Johnson, Alexandre Alahi, and Li Fei-Fei. Perceptual losses for real-time style transfer and super-resolution. In European conference on computer vision, pages 694–711. Springer, 2016.
* [21] Jiwon Kim, Jung Kwon Lee, and Kyoung Mu Lee. Deeply-recursive convolutional network for image super-resolution. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 1637–1645, 2016.
* [22] Diederik P Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014.
* [23] Christian Ledig, Lucas Theis, Ferenc Huszár, Jose Caballero, Andrew Cunningham, Alejandro Acosta, Andrew Aitken, Alykhan Tejani, Johannes Totz, Zehan Wang, et al. Photo-realistic single image super-resolution using a generative adversarial network. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 4681–4690, 2017.
* [24] Juhyun Lee, Nikolay Chirkov, Ekaterina Ignasheva, Yury Pisarchyk, Mogan Shieh, Fabio Riccardi, Raman Sarokin, Andrei Kulik, and Matthias Grundmann. On-device neural net inference with mobile gpus. arXiv preprint arXiv:1907.01989, 2019.
* [25] Youngwan Lee, Joong-won Hwang, Sangrok Lee, Yuseok Bae, and Jongyoul Park. An energy and gpu-computation efficient backbone network for real-time object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pages 0–0, 2019.
* [26] Muyang Li, Ji Lin, Yaoyao Ding, Zhijian Liu, Jun-Yan Zhu, and Song Han. Gan compression: Efficient architectures for interactive conditional gans. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 5284–5294, 2020.
* [27] Jie Liu, Jie Tang, and Gangshan Wu. Residual feature distillation network for lightweight image super-resolution. arXiv preprint arXiv:2009.11551, 2020.
* [28] André Lopes, Frederico Pratas, Leonel Sousa, and Aleksandar Ilic. Exploring gpu performance, power and energy-efficiency bounds with cache-aware roofline modeling. In 2017 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pages 259–268. IEEE, 2017.
* [29] Adriana Romero, Nicolas Ballas, Samira Ebrahimi Kahou, Antoine Chassang, Carlo Gatta, and Yoshua Bengio. Fitnets: Hints for thin deep nets. arXiv preprint arXiv:1412.6550, 2014.
* [30] Mehdi SM Sajjadi, Bernhard Scholkopf, and Michael Hirsch. Enhancenet: Single image super-resolution through automated texture synthesis. In Proceedings of the IEEE International Conference on Computer Vision, pages 4491–4500, 2017.
* [31] Wenzhe Shi, Jose Caballero, Ferenc Huszár, Johannes Totz, Andrew P Aitken, Rob Bishop, Daniel Rueckert, and Zehan Wang. Real-time single image and video super-resolution using an efficient sub-pixel convolutional neural network. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 1874–1883, 2016.
* [32] Han Shu, Yunhe Wang, Xu Jia, Kai Han, Hanting Chen, Chunjing Xu, Qi Tian, and Chang Xu. Co-evolutionary compression for unpaired image translation. In Proceedings of the IEEE International Conference on Computer Vision, pages 3235–3244, 2019.
* [33] Radu Timofte, Vincent De Smet, and Luc Van Gool. A+: Adjusted anchored neighborhood regression for fast super-resolution. In Asian conference on computer vision, pages 111–126. Springer, 2014.
* [34] Radu Timofte, Shuhang Gu, Jiqing Wu, and Luc Van Gool. Ntire 2018 challenge on single image super-resolution: Methods and results. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pages 852–863, 2018.
* [35] Haotao Wang, Shupeng Gui, Haichuan Yang, Ji Liu, and Zhangyang Wang. Gan slimming: All-in-one gan compression by a unified optimization framework. In European Conference on Computer Vision, pages 54–73. Springer, 2020.
* [36] Xintao Wang, Ke Yu, Shixiang Wu, Jinjin Gu, Yihao Liu, Chao Dong, Yu Qiao, and Chen Change Loy. Esrgan: Enhanced super-resolution generative adversarial networks. In Proceedings of the European Conference on Computer Vision (ECCV), pages 0–0, 2018.
* [37] Bichen Wu, Xiaoliang Dai, Peizhao Zhang, Yanghan Wang, Fei Sun, Yiming Wu, Yuandong Tian, Peter Vajda, Yangqing Jia, and Kurt Keutzer. Fbnet: Hardware-aware efficient convnet design via differentiable neural architecture search. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 10734–10742, 2019.
* [38] Roman Zeyde, Michael Elad, and Matan Protter. On single image scale-up using sparse-representations. In International conference on curves and surfaces, pages 711–730. Springer, 2010.
* [39] Kai Zhang, Martin Danelljan, Yawei Li, Radu Timofte, Jie Liu, Jie Tang, Gangshan Wu, Yu Zhu, Xiangyu He, Wenjie Xu, et al. Aim 2020 challenge on efficient super-resolution: Methods and results. arXiv preprint arXiv:2009.06943, 2020.
* [40] Wenlong Zhang, Yihao Liu, Chao Dong, and Yu Qiao. Ranksrgan: Generative adversarial networks with ranker for image super-resolution. In Proceedings of the IEEE International Conference on Computer Vision, pages 3096–3105, 2019.
* [41] Yulun Zhang, Kunpeng Li, Kai Li, Lichen Wang, Bineng Zhong, and Yun Fu. Image super-resolution using very deep residual channel attention networks. In Proceedings of the European Conference on Computer Vision (ECCV), pages 286–301, 2018.
* [42] Yulun Zhang, Yapeng Tian, Yu Kong, Bineng Zhong, and Yun Fu. Residual dense network for image super-resolution. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 2472–2481, 2018.
* [43] Barret Zoph and Quoc V Le. Neural architecture search with reinforcement learning. arXiv preprint arXiv:1611.01578, 2016.
| arxiv-papers | 2021-07-27T09:04:30 | 2024-09-04T03:07:20.967794 | {
"license": "Creative Commons Zero - Public Domain - https://creativecommons.org/publicdomain/zero/1.0/",
"authors": "Wenlong Cheng and Mingbo Zhao and Zhiling Ye and Shuhang Gu",
"submitter": "Mingbo Zhao",
"url": "https://arxiv.org/abs/2107.12679"
} |
2107.12680 | # Kähler-Ricci flow for deformed complex structures
Gang Tian, Liang Zhang and Xiaohua $\text{Zhu}^{*}$ School of Mathematical
Sciences & BICMR, Peking University, Beijing 100871, China.
[email protected] [email protected] [email protected]
###### Abstract.
Let $(M,J_{0})$ be a Fano manifold which admits a Kähler-Ricci soliton, we
analyze the behavior of the Kähler-Ricci flow near this soliton as we deform
the complex structure $J_{0}$. First, we will establish an inequality of
Lojasiewicz’s type for Perelman’s entropy along the Kähler-Ricci flow. Then we
prove the convergence of Kähler-Ricci flow when the complex structure
associated to the initial value lies in the kernel $Z$ or negative part of the
second variation operator of Perelman’s entropy. As applications, we solve the
Yau-Tian-Donaldson conjecture for the existence of Kähler-Ricci solitons in
the moduli space of complex structures near $J_{0}$, and we show that the
kernel $Z$ corresponds to the local moduli space of Fano manifolds which are
modified $K$-semistable. We also prove an uniqueness theorem for Kähler-Ricci
solitons.
###### Key words and phrases:
Kähler-Ricci flow, Kähler-Ricci solitons, deformation space of complex
structures
###### 2000 Mathematics Subject Classification:
Primary: 53C25; Secondary: 53C55, 58E35 58J35
* Partially supported by NSFC Grants 11771019 and BJSF Grants Z180004.
###### Contents
1. 0 Introduction
2. 1 Weighted Hodge-Laplace on $A^{p,q}(M,T^{1,0}M)$
3. 2 Kuranishi deformation theory for $\Box_{h}$-operator
4. 3 Restricted entropy $\nu(\cdot)$ and its variations
1. 3.1 Variation of Kähler metrics
2. 3.2 The first variation of $\nu(\cdot)$
3. 3.3 The second variation of $\nu(\cdot)$
5. 4 A new version of $\delta^{2}\nu$
1. 4.1 Kernel space $Z$ of $H_{1}$
2. 4.2 Index of $H_{1}$
3. 4.3 Maximality of $\lambda(\cdot)$ associated to $Z$
6. 5 Lojasiewicz inequality on the space of Kähler metrics
7. 6 Proof of Theorem 0.1
8. 7 Applications of Theorem 0.1
9. 8 Generalization of Theorem 0.1
1. 8.1 Linearly stable case
2. 8.2 Linearly semistable case
## 0\. Introduction
Let $(M,J_{0})$ be a Fano manifold which admits a Kähler-Ricci, abbreviated as
KR, soliton $\omega_{KS}\in 2\pi c_{1}(M,J_{0})$. 111We always denote a Kähler
metric $g$ by its Kähler form $\omega_{g}$. It is known that for any initial
metric $\omega_{0}\in 2\pi c_{1}(M,J_{0})$, the KR flow will evolve
$\omega_{0}$ to a KR soliton $\omega_{KS}^{\prime}$ smoothly [39, 11].
Moreover, by the uniqueness of KR solitons [35, 36],
$\omega_{KS}^{\prime}=\sigma^{*}\omega_{KS}$ for some $\sigma\in{\rm
Aut}(M,J_{0})$. Thus it is a natural question how to extend the above
convergence result to Kähler manifolds with complex structures near $J_{0}$.
The question is closely related to the existence problem of KR solitons for
the local moduli of complex structures at $J_{0}$ as well as the local moduli
space of KR solitons near $\omega_{KS}$.
When $(M,J_{0})$ admits a Kähler-Einstein (KE) metric, it has been proved that
the KR flow is always convergent to a KE metric in the $C^{\infty}$-topology
for any initial metric $\omega_{0}\in 2\pi c_{1}(M,J)$ so long as $J$ is
sufficiently close to $J_{0}$ [38, 32]. As a consequence, the Mabuchi’s
K-energy on $(M,J)$ is bounded from below [38, Lemma 7.1] (also see [41, 8]),
so all Fano manifolds $(M,J)$ near $(M,J_{0})$ are $K$-semistable. We refer
the reader to [22], [20] [24], [46, Proposition 4.17] etc. for more general
K-semistable Fano manifolds. However, for a KR soliton $(M,J_{0},\omega_{KS})$
which is not KE metric, the flow on $(M,J)$ may not always converge to a KR
soliton smoothly even if $J$ is close to $J_{0}$, as explained in [45, Remark
6.5] by using Pasquier’s example of horospherical variety which is a
degeneration of the Grassmannian manifold ${\rm Gr}_{q}(2,7)$ [26]. Thus we
are led to understanding those deformed complex structures for which the KR
flow is $C^{\infty}$-convergent to a KR soliton.
According to the deformation theory [14, 13], the local moduli of complex
structures at $(M,J_{0})$ can be parameterized by using the
C$\overset{\vee}{e}$ch cohomology class $H^{1}(M,J_{0},\Theta)$, which is the
infinitesimal deformation space of complex structures on $M$. In our case of
Fano manifolds, we introduce the $h$-harmonic space
$\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)$ associated to $H^{1}(M,J_{0},\Theta)$,
where $h$ is a Ricci potential of Kähler metric $\omega$ in $2\pi
c_{1}(M,J_{0})$ (cf. Section 1). In particular, $h$ is same as a potential
function $\theta$ of soliton vector field (VF) if $\omega=\omega_{KS}$. Then
the local deformation of Kähler metrics near $(M,J_{0},\omega)$ can be
parameterized by $\mathcal{U}_{\epsilon}=B(\epsilon)\times C^{\infty}(M)$ (cf.
Section 2), where $B(\epsilon)$ denotes a small $\epsilon$-ball in
$\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)$ centered at the origin. Thus the variation
space $\mathcal{U}$ of Kähler metrics becomes
$\mathcal{U}=\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)\times C^{\infty}(M).$
By computing the second variation of Perelman’s entropy $\lambda(\cdot)$ at
$(M,J_{0},\omega_{KS})$ via the parameter space $\mathcal{U}_{\epsilon}$, we
are able to get the following product formula of the second variation operator
(cf. Proposition 3.9),
$\delta^{2}\lambda(\omega_{KS})=H(\psi,\chi)\,=\,H_{1}(\psi)\oplus
H_{2}(\chi),~{}\forall~{}(\psi,\chi)\in\mathcal{U},$
where $H_{2}(\chi)$ is always non-positive [40]. However, the sign of operator
$H_{1}(\psi)$ is in general not definite according to Pasquier’s example
mentioned above. Thus the convergence problem of KR flow for deformed complex
structure $J_{\psi_{\tau}}$ associated to $\psi_{\tau}\in
B(\epsilon)\subset\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ $(\epsilon<<1)$ via
the Kuranishi map will depend on the sign of $H_{1}(\psi_{\tau})$.
Recall the (normalized) KR flow on a Fano manifold $(M,J)$,
(0.1) $\displaystyle\frac{\partial\widetilde{\omega}(t)}{\partial t}=-{\rm
Ric}\,(\widetilde{\omega}(t))+\widetilde{\omega}(t),~{}\widetilde{\omega}_{0}\in
2\pi c_{1}(M,J).$
By establishing an inequality of Lojasiewicz type for the entropy
$\lambda(\cdot)$ along the flow (0.1), we will prove
###### Theorem 0.1.
Let $(M,J_{0})$ be a Fano manifold which admits a KR soliton $\omega_{KS}\in
2\pi c_{1}(M,J_{0})$ with respect to a holomorphic vector field (HVF) $X$.
Then there exists a small $\epsilon$ such that for any $\tau\in B(\epsilon)$
with $\psi_{\tau}\in{\rm Ker}(H_{1})=Z$ the KR flow (0.1) converges smoothly
to a KR soliton $(M,J_{\infty},\omega_{\infty})$ for any initial metric
$\widetilde{\omega}_{0}$ in $2\pi c_{1}(M,J_{\psi_{\tau}})$. Moreover, $X$ can
be lifted to become a soliton VF of $(M,J_{\infty},\omega_{\infty})$ and
(0.2) $\displaystyle\lambda(\omega_{\infty})=\lambda(\omega_{KS}).$
Also, the convergence is of polynomial rate.
We note that $Z=\mathcal{H}^{0,1}(M,T^{1,0}M)$ in case of
$\omega_{KS}=\omega_{KE}$ [40]. Thus Theorem 0.1 generalizes the results in
[38, 32]. We also note that $\psi_{\tau}\in Z$ if and only if $X$ can be
lifted to a HVF on $(M,J_{\psi_{\tau}})$ (cf. Corollary 4.5). Moreover, as in
the case of $\omega_{KS}=\omega_{KE}$, the set of complex structures
associated to the kernel $Z$ corresponds to the local moduli space of Fano
manifolds which are modified $K$-semistable [48]. In particular, we prove the
following existence theorem of KR solitons in the deformation space of complex
structures.
###### Theorem 0.2.
Let $(M,J_{0})$ be a Fano manifold which admits a KR-soliton $\omega_{KS}\in
2\pi c_{1}(M,J_{0})$. Then there exists a small $\epsilon$ such that
$(M,J_{\psi_{\tau}})$ admits a KR soliton close to $\omega_{KS}\in 2\pi
c_{1}(M)$ in the Cheeger-Gromov topology for $\tau\in B(\epsilon)$ if and only
if the Fano manifold $(M,J_{\psi_{\tau}})$ is modified $K$-polystable.
Theorem 0.2 gives a confirmative answer to the Yau-Tian-Donaldson conjecture
for the existence of KR solitons in the deformation space of complex
structures (cf. [47, 10, 3], etc.). We also mention that Theorem 0.2 was
proved by Inoue for the equivariant deformation space of complex structures by
using the deformation theory [19] (also see Corollary 7.3 and Remark 7.4).
Inoue’s result is a generalization of Székelyhidi’s for KE metrics [33]. Our
theorem gives a more general answer for the existence of KR-solitons and
determines the soliton VFs.
By Theorem 0.1, we can also prove a uniqueness result for KR-solitons in the
closure of the orbit by diffeomorphisms, we refer the reader to Theorem 7.5.
Let us say a few of words about how to prove the Lojasiewicz inequality for
$\lambda(\cdot)$. In fact, we will first derive such an inequality for the
restricted $\nu(\cdot)$ of $\lambda(\cdot)$ on the parameter space
$\mathcal{U}_{\epsilon}$ (cf. Proposition 5.1). The advantage of $\nu(\cdot)$
is that its gradient and the second variation $\delta^{2}\nu(\cdot)$ of
$\nu(\cdot)$ are both of maps to $\mathcal{U}$ (cf. Definition 3.3, 3.8). In
particular, we get an explicit formula for the kernel of
$\delta^{2}\nu(\cdot)$ at a KR soliton (cf. (4.9) and Remark 4.6). Then by the
spectral theorem [31], we prove the Lojasiewicz inequality for the original
$\lambda(\cdot)$ (cf. Lemma 3.6, Corollary 5.4, (6.11)).222 This also answers
a question of Chen-Sun [8, Remark 5.5]. We would like to mention that such an
inequality for the space of Riemannian metrics along the Ricci flow has been
studied by Sun-Wang [32].
Theorem 0.1 will be generalized for Kähler manifolds $(M,J_{\psi_{\tau}})$
with $H_{1}(\psi_{\tau})\leq 0$ as follows.
###### Theorem 0.3.
Let $(M,J_{0})$ be a Fano manifold which admits a KR soliton $\omega_{KS}\in
2\pi c_{1}(M,J_{0})$. Suppose that
1. (1)
$(M,J_{\psi_{\tau}})$ admits a KR soliton for any $\psi_{\tau}\in
B(\epsilon)\cap Z$;
2. (2)
$H_{1}(\cdot)\leq 0,~{}{\rm on}~{}\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M).$
Then there exists a small $\epsilon$ such that for any $\tau\in B(\epsilon)$
the KR flow (0.1) converges smoothly to a KR soliton
$(M,J_{\infty},\omega_{\infty})$ for any initial metric
$\widetilde{\omega}_{0}$ in $2\pi c_{1}(M,J_{\psi_{\tau}})$. Moreover,
$\displaystyle\lambda(\omega_{\infty})=\lambda(\omega_{KS}),$
and the convergence is of polynomial rate.
The condition (1) may not be necessary in view of Theorem 0.1. In fact, we
have the following conjecture.
###### Conjecture 0.4.
Let $(M,J_{0})$ be a Fano manifold which admits a KR soliton $\omega_{KS}\in
2\pi c_{1}(M,J_{0})$. Let $A_{-}$ be the linear subspace of
$\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ associated to the negative
eigenvalues of $H_{1}$. Then there exists a small $\epsilon$ such that the
following is true:
1. (1)
For any $\tau\in B(\epsilon)$ with $\psi_{\tau}\in A_{-}\cup Z$ the KR flow
(0.1) converges smoothly to a KR soliton $(M,J_{\infty},\omega_{\infty})$ for
any initial metric $\omega_{0}$ in $2\pi c_{1}(M,J_{\psi_{\tau}})$. Moreover,
the convergence is of polynomial rate with
$\lambda(\omega_{\infty})=\lambda(\omega_{KS})$.
2. (2)
For any $\tau\in B(\epsilon)$ with
$\psi_{\tau}\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\setminus(A_{-}\cup Z)$,
the KR flow (0.1) converges to a singular KR soliton $\omega_{\infty}$ for any
initial metric $\omega_{0}$ in $2\pi c_{1}(M,J_{\psi_{\tau}})$ with
$\lambda(\omega_{\infty})$ strictly bigger than $\lambda(\omega_{KS})$.
The above conjecture means that the set of complex structures, for which the
KR flow (0.1) is stable, corresponds to the linear semistable subspace
$A_{-}\cup Z$ of $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ in the deformation
space of Fano manifolds which admit a KR-soliton. Otherwise, the flow on
$(M,J_{\psi_{\tau}})$ is unstable, but will in general converge to a singular
KR soliton $\omega_{\infty}$ with $\lambda(\omega_{\infty})$ strictly bigger
than $\lambda(\omega_{KS})$ by the Hamilton-Tian conjecture [34, 2, 7, 46].
The organization of the paper is as follows. In Section 1, we introduce the
weighted Hodge-Laplace operator $\Box_{h}$ and the $h$-harmonic space of
$\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)$ on a Fano manifold. In Section 2, we study
the Kuranishi deformation theory of complex structures associated to
$\Box_{h}$ and prove that the solution of modified Kuranishi’s equation is
divergent-free (cf. Proposition2.1)). In Section 3, we compute the first and
second variations of $\nu(\cdot)$ on $\mathcal{U}_{\epsilon}$. In Section 4,
we give a new version of the second variations of $\nu(\cdot)$ and prove the
local maximality of $\lambda(\cdot)$ (cf. Theorem 4.4 and Proposition 4.11).
Section 5 is devoted to prove the Lojasiewicz inequality (cf. Proposition
5.1). Theorem 0.1 is proved in Section 6 while Both of Theorem 0.2 and Theorem
7.5 are proved in Section 7. In Section 8, we prove Theorem 0.3.
## 1\. Weighted Hodge-Laplace on $A^{p,q}(M,T^{1,0}M)$
In this section, we introduce a weighted Hodge-Laplace operator on the space
$A^{p,q+1}(M,T^{1,0}M)$ on a Fano manifold $(M,J_{0})$ with a Kähler form
$\omega\in 2\pi c_{1}(M)$. This is very similar with the weighted Laplace
operator associated to the Bakry-Émery Ricci curvature studied in [44].
Let $h$ be a Ricci potential of $\omega$, which satisfies that
(1.1) $\displaystyle\rm{Ric}(\omega)-\omega=\sqrt{-1}\partial\bar{\partial}h.$
We denote $\delta_{h}=\overline{\partial}_{h}^{*}$ the dual operator of
$\overline{\partial}$ with respect to the inner product
$\int_{M}<,>e^{h}\omega^{n},$
where $<,>=<,>_{\omega}$ is the inner product on $\Lambda^{p,q}T^{*}M\otimes
T^{1,0}M$ induced by $\omega$. Namely, for any $\varphi\in
A^{p,q}(M,T^{1,0}M)$, $\varphi^{\prime}\in A^{p,q+1}(M,T^{1,0}M)$, we have
$\int_{M}<\bar{\partial}\varphi,\varphi^{\prime}>e^{h}\omega^{n}=\int_{M}<\varphi,\delta_{h}\varphi^{\prime}>e^{h}\omega^{n}.$
Then weighted Hodge-Laplace operator $\Box_{h}$ on $A^{p,q+1}(M,T^{1,0}M)$ is
defined by
$\Box_{h}=\overline{\partial}\cdot\delta_{h}+\delta_{h}\cdot\overline{\partial}.$
Thus, similarly with the Hodge-Laplace operator, we see that
$\Box_{h}\varphi=0$
if only if
$\bar{\partial}\varphi=0~{}{\rm and}\ \delta_{h}\varphi=0.$
For simplicity, we denote
$\mathcal{H}^{p,q}_{h}(M,T^{1,0}M)=\\{\varphi\in
A^{p,q}(M,T^{1,0}M)|~{}\Box_{h}\varphi=0\\}$
the harmonic space of $\Box_{h}$ on $A^{p,q+1}(M,T^{1,0}M)$.
In this paper, we are interested in the space $A^{0,1}(M,T^{1,0}M)$. Then
under local holomorphic coordinates, for any
$\varphi=\varphi^{i}_{\overline{j}}d\overline{z}^{j}\otimes\frac{\partial}{\partial
z^{i}}\in A^{0,1}(M,T^{1,0}M),$
we have
(1.2)
$\displaystyle{}\delta_{h}\varphi=-(\varphi^{i}_{\overline{j},k}+\varphi^{i}_{\overline{j}}h_{k})g^{k\overline{j}}\frac{\partial}{\partial
z^{i}}.$
Moreover,
(1.3) $\displaystyle\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)\cong H^{1}(M,J,\Theta).$
The latter is the C$\overset{\vee}{e}$ch cohomology group associated to the
infinitesimal deformation of complex structures on $(M,J_{0})$ [14].
We define a $h$-divergence operator on $A^{p,q+1}(M,T^{1,0}M)$ by
${\rm div}_{h}\varphi=e^{-h}{\rm div}(e^{h}\varphi).$
In particular, if
$\varphi=\varphi^{i}_{\overline{j}}d\bar{z}^{j}\otimes\frac{\partial}{\partial
z^{i}}\in A^{0,1}(M,T^{1,0}M),$
then
(1.4) $\displaystyle{}{\rm
div}_{h}\varphi=(\varphi^{i}_{\overline{j},i}+\varphi^{i}_{\overline{j}}h_{i})d\bar{z}^{j}.$
Also we introduce an inner product $\varphi\lrcorner\mu$ with respect to
$\mu=\sqrt{-1}\mu_{k\bar{l}}dz^{k}\wedge d\bar{z}^{l}\in A^{1,1}(M)$
by
$\varphi\lrcorner\mu=\sqrt{-1}\varphi^{k}_{\overline{j}}\mu_{k\overline{l}}d\bar{z}^{j}\wedge
d\bar{z}^{l}\in A^{0,2}(M).$
We list some identities for the above two operators in the following lemma.
###### Lemma 1.1.
1. (1)
$\overline{\partial}(\varphi\lrcorner\mu)=\overline{\partial}\varphi\lrcorner\mu+\varphi\lrcorner\overline{\partial}\mu.$
2. (2)
$\delta_{h}({\rm div}_{h}\varphi)={\rm div}_{h}(\delta_{h}\varphi).$
3. (3)
$\delta_{h}(\varphi\lrcorner\omega)=-\delta_{h}\varphi\lrcorner\omega-\sqrt{-1}{\rm
div}_{h}\varphi.$
4. (4)
$\overline{\partial}{\rm div}_{h}\varphi-{\rm
div}_{h}(\overline{\partial}\varphi)=-\sqrt{-1}\varphi\lrcorner\omega.$
5. (5)
${\rm div}_{h}[\varphi,\psi]=\psi\lrcorner\partial{\rm
div}_{h}\varphi+\varphi\lrcorner\partial{\rm div}_{h}\psi.$
6. (6)
$[\varphi,\psi]\lrcorner\omega=\varphi\lrcorner\partial(\psi\lrcorner\omega)+\psi\lrcorner\partial(\varphi\lrcorner\omega).$
###### Proof.
All identities can be verified directly. $(1)$ is simple. For $(2)$, we note
that
$\delta_{h}({\rm
div}_{h}\varphi)=-(\varphi^{i}_{\overline{j},is}+\varphi^{i}_{\overline{j}s}h_{i}+\varphi^{i}_{\overline{j}}h_{is}+(\varphi^{i}_{\overline{j},i}+\varphi^{i}_{\overline{j}}h_{i})h_{s})g^{s\overline{j}}$
and
${\rm
div}_{h}(\delta_{h}\varphi)=-(\varphi^{i}_{\overline{j},si}+\varphi^{i}_{\overline{j}i}h_{s}+\varphi^{i}_{\overline{j}}h_{si}+(\varphi^{i}_{\overline{j},s}+\varphi^{i}_{\overline{j}}h_{s})h_{i})g^{s\overline{j}}.$
Thus $(2)$ is true.
Since
$\varphi\lrcorner\omega=\sqrt{-1}\varphi^{p}_{\overline{k}}g_{p\overline{j}}d\overline{z}^{k}\wedge
d\overline{z}^{j}$, we have
$\displaystyle\delta_{h}(\varphi\lrcorner\omega)$
$\displaystyle=-\sqrt{-1}(\varphi^{p}_{\overline{k},s}g_{p\overline{j}}+\varphi^{p}_{\overline{k}}g_{p\overline{j}}h_{s})g^{s\overline{j}}d\overline{z}^{k}+\sqrt{-1}(\varphi^{p}_{\overline{k},s}g_{p\overline{j}}+\varphi^{p}_{\overline{k}}g_{p\overline{j}}h_{s})g^{s\overline{k}}d\overline{z}^{j}$
$\displaystyle=-\sqrt{-1}(\varphi^{s}_{\overline{k},s}+\varphi^{s}_{\overline{k}}h_{s})d\overline{z}^{k}-\sqrt{-1}(\delta_{h}\varphi)^{p}g_{p\overline{j}}d\overline{z}^{j}$
$\displaystyle=-\sqrt{-1}{\rm
div}_{h}\varphi-(\delta_{h}\varphi\lrcorner\omega).$
This is $(3)$.
In order to prove $(4)$, we choose a normal coordinate $(z^{1},\ldots,z^{n})$
around each $p\in M$. By (1.4), we have
$\overline{\partial}{\rm
div}_{h}\varphi=(\varphi^{s}_{\overline{k},s\overline{l}}+\varphi^{s}_{\overline{k},\overline{l}}h_{s}+\varphi^{s}_{\overline{k}}h_{s\overline{l}})d\overline{z}^{l}\wedge
d\overline{z}^{k}.$
Since
$\overline{\partial}\varphi=(\varphi^{s}_{\overline{k},\overline{l}}+\Gamma^{\overline{h}}_{\overline{k}\overline{l}}\varphi^{s}_{\overline{h}})d\overline{z}^{l}\wedge
d\overline{z}^{k}\otimes\frac{\partial}{\partial z^{s}},$
we see that at $p$,
${\rm
div}_{h}\overline{\partial}\varphi=(\varphi^{s}_{\overline{k},\overline{l}s}+\partial_{s}\Gamma^{\overline{h}}_{\overline{k}\overline{l}}\varphi^{s}_{\overline{h}}+\varphi^{s}_{\overline{k},\overline{l}}h_{s})d\overline{z}^{l}\wedge
d\overline{z}^{k}.$
Thus we get
(1.5) $\displaystyle\overline{\partial}{\rm div}_{h}\varphi-{\rm
div}_{h}(\overline{\partial}\varphi)=(\varphi^{s}_{\overline{k},s\overline{l}}-\varphi^{s}_{\overline{k},\overline{l}s}+\varphi^{s}_{\overline{k}}h_{s\overline{l}}-\partial_{s}\Gamma^{\overline{h}}_{\overline{k}\overline{l}}\varphi^{s}_{\overline{h}})d\overline{z}^{l}\wedge
d\overline{z}^{k}.$
On the other hand,
$\displaystyle\varphi^{s}_{\overline{k},s\overline{l}}-\varphi^{s}_{\overline{k},\overline{l}s}$
$\displaystyle=-R_{h\overline{t}s\overline{l}}g^{s\overline{t}}\varphi^{h}_{\overline{k}}-R_{t\overline{k}s\overline{l}}g^{t\overline{h}}\varphi^{s}_{\overline{h}}$
$\displaystyle=-R_{h\overline{l}}\varphi^{h}_{\overline{k}}+\partial_{s}\Gamma^{\overline{h}}_{\overline{k}\overline{l}}\varphi^{s}_{\overline{h}}.$
By (1.5) it follows that
$\overline{\partial}{\rm div}_{h}\varphi-{\rm
div}_{h}(\overline{\partial}\varphi)=(-R_{s\overline{l}}+h_{s\overline{l}})\varphi^{s}_{\overline{k}}d\overline{z}^{l}\wedge
d\overline{z}^{k}.$
We note that
$(-R_{s\overline{l}}+h_{s\overline{l}})\varphi^{s}_{\overline{k}}d\overline{z}^{l}\wedge
d\overline{z}^{k}=\varphi\lrcorner\frac{{\rm
Ric}(\omega)-\sqrt{-1}\partial\overline{\partial}h}{\sqrt{-1}}.$
Together with the assumption
${\rm{Ric}}(\omega)-\omega=\sqrt{-1}\partial\bar{\partial}h$, we conclude that
$\overline{\partial}{\rm div}_{h}\varphi-{\rm
div}_{h}(\overline{\partial}\varphi)=\varphi\lrcorner\frac{{\rm
Ric}(\omega)-\sqrt{-1}\partial\overline{\partial}h}{\sqrt{-1}}=-\sqrt{-1}\varphi\lrcorner\omega,$
which proves $(4)$.
For $(5)$, we recall that for any
$\varphi=\varphi^{l}_{\overline{k}}d\overline{z}^{k}\otimes\frac{\partial}{\partial
z^{l}}$ and
$\psi=\psi^{j}_{\overline{i}}d\overline{z}^{i}\otimes\frac{\partial}{\partial
z^{j}}$ it holds
$\displaystyle[\varphi,\psi]$
$\displaystyle=\varphi^{l}_{\overline{k}}\frac{\partial\psi^{j}_{\overline{i}}}{\partial
z^{l}}d\overline{z}^{k}\wedge d\overline{z}^{i}\otimes\frac{\partial}{\partial
z^{j}}+\psi^{j}_{\overline{i}}\frac{\partial\varphi^{l}_{\overline{k}}}{\partial
z^{j}}d\overline{z}^{i}\wedge d\overline{z}^{k}\otimes\frac{\partial}{\partial
z^{l}}$
$\displaystyle=\varphi^{l}_{\overline{k}}\frac{\partial\psi^{j}_{\overline{i}}}{\partial
z^{l}}d\overline{z}^{k}\wedge d\overline{z}^{i}\otimes\frac{\partial}{\partial
z^{j}}-\psi^{l}_{\overline{i}}\frac{\partial\varphi^{j}_{\overline{k}}}{\partial
z^{l}}d\overline{z}^{k}\wedge d\overline{z}^{i}\otimes\frac{\partial}{\partial
z^{j}}$
$\displaystyle=(\varphi^{l}_{\overline{k}}\frac{\partial\psi^{j}_{\overline{i}}}{\partial
z^{l}}-\psi^{l}_{\overline{i}}\frac{\partial\varphi^{j}_{\overline{k}}}{\partial
z^{l}})d\overline{z}^{k}\wedge
d\overline{z}^{i}\otimes\frac{\partial}{\partial z^{j}}$
$\displaystyle=(\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},l}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l}-(\varphi^{l}_{\overline{k}}\Gamma^{j}_{lh}\psi^{h}_{\overline{i}}-\psi^{l}_{\overline{i}}\Gamma^{j}_{hl}\varphi^{h}_{\overline{k}}))d\overline{z}^{k}\wedge
d\overline{z}^{i}\otimes\frac{\partial}{\partial z^{j}}$
$\displaystyle=(\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},l}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l})d\overline{z}^{k}\wedge
d\overline{z}^{i}\otimes\frac{\partial}{\partial z^{j}}.$
Then,
$\displaystyle{\rm div}[\varphi,\psi]$
$\displaystyle=(\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},l})_{j}d\overline{z}^{k}\wedge
d\overline{z}^{i}-(\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l})_{j}d\overline{z}^{k}\wedge
d\overline{z}^{i}$
$\displaystyle=(\varphi^{l}_{\overline{k},j}\psi^{j}_{\overline{i},l}+\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},lj}-\psi^{l}_{\overline{i},j}\varphi^{j}_{\overline{k},l}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},lj})d\overline{z}^{k}\wedge
d\overline{z}^{i}$
$\displaystyle=(\varphi^{j}_{\overline{k},l}\psi^{l}_{\overline{i},j}+\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},lj}-\psi^{l}_{\overline{i},j}\varphi^{j}_{\overline{k},l}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},lj})d\overline{z}^{k}\wedge
d\overline{z}^{i}$
$\displaystyle=(\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},lj}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},lj})d\overline{z}^{k}\wedge
d\overline{z}^{i}.$
Hence by (1.4), we get
(1.6) $\displaystyle{\rm div}_{h}[\varphi,\psi]$
$\displaystyle=(\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},lj}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},lj}+\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},l}h_{j}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l}h_{j})d\overline{z}^{k}\wedge
d\overline{z}^{i}.$
On the other hand, by (1.4) we also have
$\partial{\rm
div}_{h}\varphi=(\varphi^{l}_{\overline{k},lj}+\varphi^{l}_{\overline{k},j}h_{l}+\varphi^{l}_{\overline{k}}h_{lj})dz^{j}\wedge
d\overline{z}^{k}.$
It follows that
(1.7) $\displaystyle\psi\lrcorner\partial{\rm
div}_{h}\varphi=(\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},lj}+\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l}h_{j}+\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k}}h_{jl})d\overline{z}^{i}\wedge
d\overline{z}^{k}.$
Similarly we have
(1.8) $\displaystyle\varphi\lrcorner\partial{\rm
div}_{h}\psi=(\varphi^{l}_{\overline{i}}\psi^{j}_{\overline{k},lj}+\varphi^{l}_{\overline{i}}\psi^{j}_{\overline{k},l}h_{j}+\varphi^{l}_{\overline{i}}\psi^{j}_{\overline{k}}h_{jl})d\overline{z}^{i}\wedge
d\overline{z}^{k}.$
We note that $h_{ij}=h_{ji}$. Hence, combing the above (1.6)-(1.8) we will
derive $(5)$ immediately.
Finally we prove $(6)$. From the proof of $(5)$ we see that
$[\varphi,\psi]=(\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},l}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l})d\overline{z}^{k}\wedge
d\overline{z}^{i}\otimes\frac{\partial}{\partial z^{j}}.$
Thus we have
(1.9)
$\displaystyle[\varphi,\psi]\lrcorner\omega=\sqrt{-1}\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},l}g_{j\overline{t}}d\overline{z}^{k}\wedge
d\overline{z}^{i}\wedge
d\overline{z}^{t}-\sqrt{-1}\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l}g_{j\overline{t}}d\overline{z}^{k}\wedge
d\overline{z}^{i}\wedge d\overline{z}^{t}.$
On the other hand, we have
$\displaystyle\partial(\psi\lrcorner\omega)=\sqrt{-1}\psi_{\overline{i},t}^{j}g_{j\overline{k}}dz^{t}\wedge
d\overline{z}^{i}\wedge d\overline{z}^{k}.$
It follows that
(1.10)
$\displaystyle\varphi\lrcorner\partial(\psi\lrcorner\omega)=\sqrt{-1}\varphi^{l}_{\overline{k}}\psi_{\overline{i},l}^{j}g_{j\overline{t}}d\overline{z}^{i}\wedge
d\overline{z}^{t}\wedge d\overline{z}^{k}.$
Similarly we have
(1.11)
$\displaystyle\psi\lrcorner\partial(\varphi\lrcorner\omega)=\sqrt{-1}\psi^{l}_{\overline{i}}\varphi_{\overline{k},l}^{j}g_{j\overline{t}}d\overline{z}^{k}\wedge
d\overline{z}^{t}\wedge d\overline{z}^{i}.$
Hence, combining the above (1.9)-(1.11) we get $(6)$. ∎
###### Lemma 1.2.
Suppose that
$\delta_{h}\varphi=0~{}{\rm
and}~{}\overline{\partial}(\varphi\lrcorner\omega)=0.$
Then
(1.12) $\displaystyle\Box_{h}(\varphi\lrcorner\omega)=-\sqrt{-1}({\rm
div}_{h}\overline{\partial}\varphi)-\varphi\lrcorner\omega.$
###### Proof.
Using the assumption $\overline{\partial}(\varphi\lrcorner\omega)=0$, we have
$\displaystyle\Box_{h}(\varphi\lrcorner\omega)$
$\displaystyle=\overline{\partial}\delta_{h}(\varphi\lrcorner\omega)+\delta_{h}\overline{\partial}(\varphi\lrcorner\omega)$
$\displaystyle=\overline{\partial}\delta_{h}(\varphi\lrcorner\omega).$
Then by Lemma 1.1-$(3)$ and the assumption $\delta_{h}\varphi=0$, we get
$\displaystyle\Box_{h}(\varphi\lrcorner\omega)$
$\displaystyle=\overline{\partial}(-\delta_{h}\varphi\lrcorner\omega-\sqrt{-1}{\rm
div}_{h}\varphi)$ $\displaystyle=\overline{\partial}(-\sqrt{-1}{\rm
div}_{h}\varphi).$
Hence, by Lemma 1.1-$(4)$, we obtain (1.12). ∎
###### Corollary 1.3.
Let $\varphi\in\mathcal{H}^{0,1}_{h}(M,T^{1,0}M).$ Then
$\Box_{h}(\varphi\lrcorner\omega)=-\varphi\lrcorner\omega.$
As a consequence,
(1.13) $\displaystyle\varphi\lrcorner\omega=0.$
###### Proof.
Note that $\overline{\partial}\varphi=0$. Then by Lemma 1.1-$(1)$ we have
$\overline{\partial}(\varphi\lrcorner\omega)=0$. On the other hand, since
$\delta_{h}\varphi=0$, by Lemma 1.2 together with
$\overline{\partial}\varphi=0$, we see that
$\displaystyle\Box_{h}(\varphi\lrcorner\omega)$ $\displaystyle=-\sqrt{-1}{\rm
div}_{h}(\overline{\partial}\varphi)-\varphi\lrcorner\omega$
$\displaystyle=-\varphi\lrcorner\omega.$
Thus
$\displaystyle 0\leq(\varphi\lrcorner\omega,\varphi\lrcorner\omega)_{h}$
$\displaystyle=-(\Box_{h}(\varphi\lrcorner\omega),\varphi\lrcorner\omega)_{h}$
$\displaystyle=-(\delta_{h}(\varphi\lrcorner\omega),\delta_{h}(\varphi\lrcorner\omega))_{h}-(\overline{\partial}(\varphi\lrcorner\omega),\overline{\partial}(\varphi\lrcorner\omega))_{h}$
$\displaystyle\leq 0.$
It follows that
$(\varphi\lrcorner\omega,\varphi\lrcorner\omega)_{h}=0,$
which implies (1.13).
∎
## 2\. Kuranishi deformation theory for $\Box_{h}$-operator
We choose a basis $\\{e_{i}\\}_{i=1,...,l}$ of
$\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)$ and denote an $\epsilon$-ball by
$B(\epsilon)=\\{\tau=(\tau_{1},...,\tau_{l})|~{}\psi_{\tau}=\sum\tau_{i}e_{i}\in\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)~{}{\rm
with}~{}\sum_{i}\tau_{i}^{2}<\epsilon^{2}\\}.$
Then by the Kodaira deformation theory for complex structures on $(M,J_{0})$,
there is a map
$\Psi:B(\epsilon)\mapsto A^{0,1}(M,T^{1,0}M)$
as long as $\epsilon$ is small enough such that $\Psi(t)$ is a solution of
Cartan-Maurer equation,
(2.1)
$\displaystyle\overline{\partial}\Psi(\tau)=\frac{1}{2}[\Psi(\tau),\Psi(\tau)].$
More precisely, analogous to the Kodaira theory [14], we can reduce (2.1) to
solving the following equation with gauge fixed,
(2.4) $\displaystyle\left\\{\begin{array}[]{ll}\delta_{h}\varphi(\tau)=0\\\
\overline{\partial}\varphi(\tau)=\frac{1}{2}[\varphi(\tau),\varphi(\tau)].\\\
\end{array}\right.$
The above equation is equivalent to
(2.5)
$\displaystyle\varphi(\tau)=\sum^{m}_{i=1}\tau_{i}e_{i}+\frac{1}{2}\delta_{h}G_{h}[\varphi(\tau),\varphi(\tau)],$
where $G_{h}$ the Green operator associated to $\Box_{h}$. Following the
Kuranshi’s method by the implicity function theorem [13], there is a unique
solution of (2.5) as long as $\sum|\tau_{i}|^{2}<\epsilon^{2}$. Thus there is
a map
(2.6) $\displaystyle\Phi:B(\epsilon)\mapsto A^{0,1}(M,T^{1,0}M)$
such that $\Phi(\tau)=\varphi(\tau)=\varphi_{\tau}$. For simplicity, we call
$\Phi$ the Kuranishi map associated to $\Box_{h}$-operator.
On the other hand, according to [14], we may write $\varphi(\tau)$ as a
convergent expansion to solve (2.1),
(2.7) $\displaystyle\varphi(\tau)=\sum\tau_{i}e_{i}+\sum_{|I|\leq
2}\tau^{I}\varphi_{I}.$
By (2.7), we prove
###### Proposition 2.1.
Let $\varphi(\tau)$ be a Kuranishi solution of (2.5) as the form of (2.7).
Then
(2.8) $\displaystyle\varphi(\tau)\lrcorner\omega=0~{}{\rm and}~{}{\rm
div}_{h}\varphi(\tau)=0.$
###### Proof.
Let
(2.9) $\displaystyle\psi_{k}=\sum_{|I|\leq
k}\tau^{I}\varphi_{I},k=1,2,\ldots.$
Then
$\delta_{h}\psi_{k}=0,~{}{\rm for~{}each}~{}k\geq 1.$
We need to prove (2.8) for each $\psi_{k}$ by induction. Since
$\delta_{h}\psi_{1}=0,\overline{\partial}\psi_{1}=0,$
by Corollary 1.3, we have
$\psi_{1}\lrcorner\omega=0.$
By Lemma 1.1-$(3)$, it follows that
(2.10) $\displaystyle{\rm div}_{h}\psi_{1}=0.$
Thus we may assume that
(2.11) $\displaystyle\psi_{k}\lrcorner\omega=0~{}{\rm and}~{}{\rm
div}_{h}\psi_{k}=0,~{}{\rm for~{}any}~{}k<l.$
By (2.4), we see that
(2.12)
$\displaystyle\overline{\partial}\psi_{l}=\frac{1}{2}\sum_{k=1}^{l-1}[\varphi_{k},\varphi_{l-k}],\delta_{h}\psi_{l}=0.$
Then by Lemma 1.1-(6) together with the first relation in (2.11), we get
$\overline{\partial}\psi_{l}\lrcorner\omega=0.$
By Lemma 1.1-(1), it follows that
(2.13) $\displaystyle\overline{\partial}(\psi_{l}\lrcorner\omega)=0.$
Thus by Lemma 1.2 together with the second relation in (2.12), we derive
(2.14) $\displaystyle\Box_{h}(\psi_{l}\lrcorner\omega)=-\sqrt{-1}{\rm
div}_{h}\overline{\partial}\psi_{l}-\psi_{l}\lrcorner\omega.$
On the other hand,
$\displaystyle{\rm div}_{h}\overline{\partial}\psi_{l}$ $\displaystyle={\rm
div}_{h}(\frac{1}{2}\sum_{k=1}^{l-1}[\varphi_{k},\varphi_{l-k}])$
$\displaystyle=\frac{1}{2}\sum_{k=1}^{l-1}{\rm
div}_{h}[\varphi_{k},\varphi_{l-k}].$
By Lemma 1.1-(5), we have
${\rm div}_{h}\overline{\partial}\psi_{l}=0.$
Thus by (2.14), we get
$\Box_{h}(\psi_{l}\lrcorner\omega)=-\psi_{l}\lrcorner\omega.$
Hence, as in the proof of (1.13), we obtain
(2.15) $\displaystyle\psi_{l}\lrcorner\omega=0.$
This proves the first relation of (2.11) for $k=l$.
By Lemma 1.1-(3), we also have
$\delta_{h}(\psi_{l}\lrcorner\omega)=-\delta_{h}\psi_{l}\lrcorner\omega-\sqrt{-1}{\rm
div}_{h}\psi_{l}.$
Thus (2.15) implies the second relation of (2.11) for $k=l$. The proposition
is proved. ∎
By (2.8), for $v,w\in T^{0,1}M$ we have
$\omega(v+\varphi_{\tau}(v),w+\varphi_{\tau}(w))=0.$
Since $T^{0,1}_{\varphi_{\tau}}=(id+\varphi_{\tau})(T^{0,1}M)$ and $\omega$ is
real, $\omega$ is still a $(1,1)$-form with respect to the complex structure
$J_{\psi_{\tau}}$ defined by $\varphi_{\tau}$. Namely, $\varphi_{\tau}$ is
compatible with the Kähler form $\omega$. As a consequence,
$(\omega,J_{\psi_{\tau}})$ defines a family of Kähler metrics by
(2.16) $\displaystyle g_{\tau}={\omega}(\cdot,J_{\psi_{\tau}}\cdot).$
Hence, we get
###### Corollary 2.2.
For any $\tau\in B(\epsilon)$, $g_{\tau}$ defined in (2.16) is a family of
Kähler metrics with the same Kähler form $\omega$.
The following proposition gives a relationship between the first and second
relations in (2.8), which means that the Kuranishi equation is equivalent to
the Cartan-Maurer equation with the divergence free gauge.
###### Proposition 2.3.
Suppose that $\varphi\in A^{0,1}(M,T^{1,0}M)$ satisfies
$\overline{\partial}\varphi=\frac{1}{2}[\varphi,\varphi]~{}{\rm with}~{}{\rm
div}_{h}\varphi=0.$
Then
$\displaystyle\varphi\lrcorner\omega=0~{}{\rm and}~{}\delta_{h}\varphi=0.$
###### Proof.
By Lemma 1.1-$(5)$ and the assumption that ${\rm div}_{h}\varphi=0$, we have
$\displaystyle{\rm div}_{h}(\overline{\partial}\varphi)$
$\displaystyle=\frac{1}{2}{\rm div}_{h}[\varphi,\varphi]$
$\displaystyle=\varphi\lrcorner\partial{\rm div}_{h}\varphi$
$\displaystyle=0.$
By Lemma 1.1-$(4)$ together with the assumption ${\rm div}_{h}\varphi=0$, it
follows that
(2.17) $\displaystyle\varphi\lrcorner\omega=0.$
On the other hand, by Lemma 1.1-$(3)$ and (2.17), we see that
$\delta_{h}\varphi\lrcorner\omega=0,$
which means that $\delta_{h}\varphi=0$. The proposition is proved. ∎
## 3\. Restricted entropy $\nu(\cdot)$ and its variations
From this section, we will always assume that $(M,J_{0})$ is a Fano Kähler
manifold which admits a KR soliton $(\omega_{KS},X)$. Here the soliton VF $X$
can be regarded as an element in the center of Lie algebra $\eta_{r}(M,J_{0})$
of a maximal reductive subgroup ${\rm Aut}_{r}(M,J_{0})$ of ${\rm
Aut}(M,J_{0})$ [35]. Namely $(\omega_{KS},X)$ satisfies the soliton equation,
$\rm{Ric}(\omega_{KS})-\omega_{KS}=\mathcal{L}_{X}\omega_{KS},$
where $\mathcal{L}_{X}\omega_{KS}$ is the Lie derivative of $\omega_{KS}$
along $X$. Then there is a real smooth function
$\theta=\theta_{X}(\omega_{KS})$ which satisfies
(3.1) $\displaystyle
i_{X}\omega_{KS}=\sqrt{-1}\overline{\partial}\theta,~{}\int_{M}e^{\theta}\omega_{KS}^{n}=\int_{M}\omega_{KS}^{n}.$
Thus by Corollary 2.2, there is a small ball
$B(\epsilon)=\\{\tau|~{}\psi_{\tau}=\sum\tau_{i}e_{i}\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M),\sum_{i}\tau_{i}^{2}<\epsilon^{2}\\},$
such that the Kuranishi map:
$\Phi:B(\epsilon)\mapsto A^{0,1}(M,T^{1,0}M)$
induces a family of Kähler metrics $g_{\tau}$ with the same Kähler form
$\omega_{KS}$. As a consequence, any Kähler metric $g$ in $2\pi c_{1}(M)$ with
small perturbed integral complex structure of $J_{0}$ can be parameterized by
the following map:
$L:~{}B(\epsilon)\times C^{\infty}(M)\mapsto{\rm Sym}^{2}(T^{*}M)$
with $g_{\tau,\chi}(\cdot,\cdot)=L(\psi,\chi)(\cdot,\cdot)$ satisfying
(3.2) $\displaystyle
g_{\tau,\chi}=(\omega_{KS}+\sqrt{-1}\partial_{J_{\psi_{\tau}}}\overline{\partial}_{J_{\psi_{\tau}}}\chi)(\cdot,J_{\psi_{\tau}}\cdot).$
The purpose of this section is to compute the variation of Perelman’s entropy
$\lambda(\cdot)$ for Kähler metrics $g_{\tau,\chi}$. Recall that the
Perelman’s W-functional for Kähler metrics $g$ in $2\pi c_{1}(M)$ is defined
for a pair $(g,f)$ by (cf. [40]),
(3.3) $\displaystyle W(g,f)=(2\pi)^{-n}\int_{M}[R(g)+|\nabla
f|^{2}+f]e^{-f}\omega_{g}^{n},$
where $f$ is a real smooth function normalized by
(3.4) $\displaystyle\int_{M}e^{-f}\omega_{g}^{n}=\int_{M}\omega_{g}^{n}.$
Then $\lambda(g)$ is defined by
$\lambda(g)=\inf_{f}\\{~{}W(g,f)|~{}\text{$(g,f)$ satisfies (\ref{nor})}\
\\}.$
The number $\lambda(g)$ can be attained by some $f$ (cf. [30]). In fact, such
a $f$ is a solution of the equation,
(3.5) $\displaystyle 2\triangle f+f-|Df|^{2}+R=\lambda(g).$
In particular, $f=\theta$ if $\omega_{g}=\omega_{KS}$, so the minimizer of
$W(g,\cdot)$ is unique near a KR soliton [38, 32]. Thus by the relation (3.2),
we get the restricted entropy $\nu(\cdot)$ of $\lambda(g)$ on
$\mathcal{U}_{\epsilon}=B(\epsilon)\times C^{\infty}(M)$ by
$\nu(\psi,\chi)=\lambda(L(\psi,\chi)),$
which is a smooth functional near $\omega_{KS}$. In fact, $\nu(\cdot)$ is
analytic (cf. [32]).
### 3.1. Variation of Kähler metrics
We calculate the variation of Kähler metrics $g_{\tau,\chi}$ at $g=g_{0,0}$
with its Kähler form $\omega=\sqrt{-1}g_{i\bar{j}}dz^{i}\wedge d\bar{z}^{j}.$
Let $\varphi\in A^{0,1}(M,T^{1,0}M)$ with the almost complex structure
$J_{\varphi}$ associated with $\varphi$. Under local coordinates
$(z^{1},\ldots z^{n})$ on $(M,J_{0})$, $\varphi$ is written as a Beltrami
differential by
$\varphi=\varphi_{\overline{i}}^{j}d\overline{z}^{i}\otimes\frac{\partial}{\partial
z^{j}}.$
Decompose $T_{\mathbb{C}}M$ with respect to $J_{\varphi}$ by
$T_{\mathbb{C}}M=T^{1,0}_{J_{\varphi}}M\oplus T_{J_{\varphi}}^{0,1}M.$
Then
$T_{J_{\varphi}}^{0,1}M=(id+\varphi)T^{0,1}M,$
where $\varphi$ is viewed as a map from $T^{1,0}M\mapsto T^{1,0}M$.
Let
$\left\\{\begin{array}[]{ll}J_{\varphi}\frac{\partial}{\partial
z^{i}}=J^{j}_{i}\frac{\partial}{\partial
z^{j}}+J^{\overline{j}}_{i}\frac{\partial}{\partial\overline{z}^{j}}\\\
J_{\varphi}\frac{\partial}{\partial\overline{z}^{i}}=J^{j}_{\overline{i}}\frac{\partial}{\partial
z^{j}}+J^{\overline{j}}_{\overline{i}}\frac{\partial}{\partial\overline{z}^{j}}.\\\
\end{array}\right.$
Since $J_{\varphi}$ is real,
$\overline{J^{j}_{i}}=J^{\overline{j}}_{\overline{i}},\overline{J^{\overline{j}}_{i}}=J^{j}_{\overline{i}}.$
Thus for a family of $\varphi=\varphi(\tau)\in A^{0,1}(T^{1,0}M)$ with
$\phi(0)=0$, we get the derivative of almost complex structure $J_{\varphi}$
as follows,
$\displaystyle\frac{dJ^{j}_{\overline{i}}}{d\tau}|_{\tau=0}$
$\displaystyle=-2\sqrt{-1}\frac{d\varphi^{j}_{\overline{i}}}{d\tau},$
$\displaystyle\frac{dJ^{\overline{j}}_{\overline{i}}}{ds}|_{\tau=0}$
$\displaystyle=0.$
By Corollary 2.2, $g_{\tau}$ given in (2.16) is a family of Kähler metrics
with the fixed Kähler form ${\omega}$. Locally, as a Riemannian tensor,
$g_{\tau}$ is of form,
$\displaystyle g_{\tau}=2{\rm
Re}(-\sqrt{-1}{g_{k\overline{i}}}J^{k}_{\overline{j}}d\overline{z}^{i}\otimes
d\overline{z}^{j}-\sqrt{-1}{g_{k\overline{i}}}J^{k}_{j}d\overline{z}^{i}\otimes
dz^{j}).$
Then the derivative of $L$ at $(0,0)$ is given by
$\eta=DL_{(0,0)}(\psi,0)=-4{\rm
Re}(g_{k\overline{i}}\psi^{k}_{\overline{j}}d\overline{z}^{i}\otimes
d\overline{z}^{j})$
and
$DL_{(0,0)}(0,\chi)=2{\rm Re}(\chi_{j\overline{i}}d\overline{z}^{i}\otimes
dz^{j}),$
where $\psi\in\mathcal{H}_{h}^{0,1}(M,T^{1,0}M)$ and $\chi\in C^{\infty}(M).$
Clearly, $\eta$ is anti-hermitian symmetric and $DL_{(0,0)}(0,\chi)$ is
hermitian symmetric.
We define the divergence for a $(0,2)$-type tensor $\eta$ by
${\rm div}_{h}\eta=e^{-h}{\rm div}(e^{h}\eta)=2{\rm
Re}[\eta_{\overline{i}\overline{j},k}+\eta_{\overline{i}\overline{j}}h_{k})g^{k\overline{j}}d\bar{z}^{i}].$
The following lemma shows that the tensor $\eta$ is also divergence-free as
$\psi$.
###### Lemma 3.1.
(3.6) $\displaystyle{\rm div}_{h}\eta=0~{}{\rm
and}~{}\eta_{\overline{i}\overline{j},\overline{k}}=\eta_{\overline{i}\overline{k},\overline{j}}.$
###### Proof.
By (1.4) we have
$\displaystyle({\rm div}_{h}\eta)_{\overline{i}}$
$\displaystyle=(\eta_{\overline{i}\overline{j},k}+\eta_{\overline{i}\overline{j}}h_{k})g^{k\overline{j}}$
$\displaystyle=-4(g_{l\overline{i}}(\psi^{l}_{\overline{j},k}+\psi^{l}_{\overline{j}}h_{k})g^{k\overline{j}}$
$\displaystyle=-4g_{l\overline{i}}({\rm div}_{h}\psi)^{l}$ $\displaystyle=0.$
The last equality comes from (2.8). Thus ${\rm div}_{h}\eta=0.$ On the other
hand, since $\overline{\partial}\varphi=0$, we have
$\displaystyle\eta_{\overline{i}\overline{j},\overline{k}}$
$\displaystyle=-4g_{l\overline{i}}\psi^{l}_{\overline{j},\overline{k}}$
$\displaystyle=-4g_{l\overline{i}}\psi^{l}_{\overline{k},\overline{j}}$
$\displaystyle=\eta_{\overline{i}\overline{k},\overline{j}}.$
The lemma is proved. ∎
###### Remark 3.2.
When $(M,\omega,J_{0})$ is a KE manifold, (3.6) in Lemma 3.1 was verified by
Koiso [15]. By using the $h$-harmonic space in (1.3), we can generalize
Koiso’s result for any Fano manifold. The lemma will be used in the
computation of the second variation of $\nu$ below.
### 3.2. The first variation of $\nu(\cdot)$
As in [40], we have the first variation of $\lambda$ at $(M,\omega,J_{0})$ as
a Riemannian manifold,
(3.7) $\displaystyle\delta\lambda=-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm
Hess}_{g}(f),\delta g>e^{-f}\omega^{n}.$
Then
(3.8) $\displaystyle\mathcal{N}(g)={\rm Ric}(g)-g+{\rm Hess}_{g}(f)$
can be regarded as the derivative of $\lambda$ which is a map from the space
of $2$-symmetric tensors to itself. But for the restricted entropy
$\nu(\cdot)$, we shall define its derivative from the product space
$\mathcal{U}=\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\times C^{\infty}(M)$ to
itself in the following.
Recall $f_{\psi,\chi}$ be the minimizer of $W$-functional at $g_{\tau,\chi}$
in (3.5). We introduce a map ${\mathbf{R}}:\mathcal{U}\to C^{\infty}(M)$ by
$\displaystyle{\mathbf{R}}(\psi,\chi)$
$\displaystyle=\frac{1}{2}\sqrt{-1}(\bar{\partial}_{J_{\psi}})^{*}_{-f_{\psi,\chi}}\cdot(\partial_{J_{\psi}})^{*}_{-f_{\psi,\chi}}\cdot({\rm
Ric}(\omega_{\tau,\chi})-\omega_{\tau,\chi}+\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}f_{\psi,\chi})e^{-f_{\psi,\chi}-\theta}\frac{\omega_{\tau,\chi}^{n}}{\omega^{n}},$
where $(\overline{\partial}_{J_{\psi}})^{*}_{-f_{\psi,\chi}}$ and
$(\partial_{J_{\psi}})^{*}_{-f_{\psi,\chi}}$ are the dual operators of
$\overline{\partial}_{J_{\psi}}$ and $\partial_{J_{\psi}}$, respectively as
same as $\delta_{h}$ in Section 1 with respect to the following inner product,
(3.9)
$\displaystyle(\chi_{1},\chi_{2})=\int_{M}\chi_{1}\chi_{2}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n},~{}~{}\chi_{1},\chi_{2}\in
L^{2}(M,e^{-f_{\psi,\chi}}).$
Choose an unitary orthogonal basis $\\{e_{1},\ldots,e_{l}\\}$ of
$\mathcal{H}_{\theta}^{0,1}(M,T^{1,0}M)$ with respect to the inner product
$(a,b)_{\theta}=\int_{M}<a,b>_{\omega_{KS}}e^{\theta}\omega_{KS}^{n},~{}\forall~{}a,b\in\mathcal{H}_{\theta}^{0,1}(M,T^{1,0}M).$
We define another map
${\mathbf{Q}}:\mathcal{U}\to\mathcal{H}_{\theta}^{0,1}(M,T^{1,0}M)$ by
${\mathbf{Q}}(\psi,\chi)=\sum_{i=1}^{l}(a_{i}(\psi,\chi)+\sqrt{-1}b_{i}(\psi,\chi))e_{i},$
where
$\displaystyle a_{i}(\psi,\chi)$ $\displaystyle=-\frac{1}{2}\int_{M}({\rm
Ric}(g_{\tau,\chi})-g_{\tau,\chi}+{\rm
Hess}_{g_{\tau,\chi}}(f_{\psi,\chi}),DL_{\psi,\chi}(e_{i},0))e^{-f_{\psi,\chi}}\omega^{n}_{\tau,\chi}$
and
$\displaystyle b_{i}(\psi,\chi)$ $\displaystyle=-\frac{1}{2}\int_{M}({\rm
Ric}(g_{\tau,\chi})-g_{\tau,\chi}+{\rm
Hess}_{g_{\tau,\chi}}(f_{\psi,\chi}),DL_{\psi,\chi}(\sqrt{-1}e_{i},0))e^{-f_{\psi,\chi}}\omega^{n}_{\tau,\chi}.$
###### Definition 3.3.
We call the pair $({\mathbf{Q}},{\mathbf{R}})$ the gradient map $\nabla\nu$ of
$\nu$ on $\mathcal{U}_{\epsilon}$ with the inner product
(3.10)
$\displaystyle(\nabla\nu,(\psi,\chi))_{\theta}=(\mathbf{Q},\psi)_{\theta}+\int_{M}\mathbf{R}\chi
e^{\theta}\omega_{KS}^{n},$
where $(\psi,\chi)\in\mathcal{U}.$
It is easy to verify that $\nabla\nu=({\mathbf{Q}},{\mathbf{R}})$ is real
analytic on $\mathcal{U}_{\epsilon}$. The following lemma gives the first
variation $\nu$ by $\nabla\nu$.
###### Lemma 3.4.
Let $(\psi_{0},\chi_{0})\in\mathcal{U}_{\epsilon}$ and
$(\psi,\chi)\in\mathcal{H}_{\theta}^{0,1}(M,T^{1,0}M)\times C^{\infty}(M)$.
Then
(3.11)
$\displaystyle\frac{d}{ds}|_{s=0}\nu((\psi_{0},\chi_{0})+s(\psi,\chi))=(\nabla\nu(\psi_{0},\chi_{0}),(\psi,\chi))_{\theta}.$
###### Proof.
For convenience, we let $g=L(\psi_{0},\chi_{0})$ and $f=f_{g}$ be the
minimizer of $W$ functional at $g$. By (3.7), we have
$\displaystyle\frac{d\nu((\psi_{0},\chi_{0})+s(\psi,\chi))}{ds}|_{s=0}$
$\displaystyle=-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm
Hess}_{g}(f),DL_{(\psi_{0},\chi_{0})}(\psi,\chi)>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}$
$\displaystyle=-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm
Hess}_{g}(f),DL_{(\psi_{0},\chi_{0})}(\psi,0)>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}$
$\displaystyle-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm
Hess}_{g}(f),DL_{(\psi_{0},\chi_{0})}(0,\chi)>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}.$
It is easy to see that
$\displaystyle I$ $\displaystyle=-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm
Hess}_{g}(f),DL_{(\psi_{0},\chi_{0})}(\psi,0)>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}$
$\displaystyle=(\mathbf{Q}(\psi_{0},\chi_{0}),\psi)_{\theta}$
and
$\displaystyle II$ $\displaystyle=-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm
Hess}_{g}(f),DL_{(\psi_{0},\chi_{0})}(0,\chi)>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}$
$\displaystyle=\frac{d\lambda((\psi_{0},\chi_{0})+s(0,\chi))}{ds}|_{s=0}$
$\displaystyle=-\frac{1}{2}\int_{M}<\sqrt{-1}\partial_{J_{\psi_{0}}}\overline{\partial}_{J_{\psi_{0}}}\chi,{\rm
Ric}(\omega_{\psi_{0},\chi_{0}})-\omega_{\psi_{0},\chi_{0}}+\sqrt{-1}\partial_{J_{\psi_{0}}}\overline{\partial}_{J_{\psi_{0}}}f>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}$
$\displaystyle=\int_{M}\mathbf{R}(\psi_{0},\chi_{0})\chi
e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}.$
Thus (3.11) is true.
∎
###### Remark 3.5.
From the above, we actually have
$\displaystyle\frac{d}{ds}|_{s=0}\nu((\psi_{0},\chi_{0})+s(\psi,\chi))$
$\displaystyle=((\psi,\chi),\nabla\nu(\psi_{0},\chi_{0}))_{\theta}$ (3.12)
$\displaystyle=-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm
Hess}_{g}(f),DL_{(\psi_{0},\chi_{0})}(\psi,\chi)>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}.$
The $L^{2}$-norm of ${\mathbf{R}}$ can be controlled by
$\nabla\lambda(\cdot)=\mathcal{N}(\cdot)$ as follows.
###### Lemma 3.6.
Let $k>2$ be an integer and $\epsilon$ small enough. Then there exists a
constant $C=C(\epsilon,k)$ such that for any
$(\psi,\chi)\in\mathcal{U}_{\epsilon}$ with
$\|\chi\|_{C^{4,\gamma}}\leq\epsilon$ it holds
(3.13) $\displaystyle\|{\mathbf{R}}(\psi,\chi)\|_{L^{2}}\leq C(\int_{M}|{\rm
Ric}(\omega_{\psi,\chi})-\omega_{\psi,\chi}+\sqrt{-1}\partial\overline{\partial}f_{\psi,\chi}|^{2}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n})^{\frac{k-2}{k-1}}.$
###### Proof.
Let
(3.14) $\displaystyle{\rm
Ric}(\omega_{\psi,\chi})-\omega_{\psi,\chi}+\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}f_{\psi,\chi}=\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}F.$
We extend ${\mathbf{R}}(\psi,\chi)$ to a fourth-order operator on the Hilbert
space $W_{4}^{2}(M,e^{-f_{\psi,\chi}})$ with respect to the inner product
(3.9) by
(3.15) $\displaystyle
S=-(\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}})^{*}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}=-\overline{\partial}_{J_{\psi}}^{*}\cdot\partial_{J_{\psi}}^{*}\cdot\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}.$
We show that $S$ is elliptic and self-adjoint like the Lichnerowicz operator
[4].
Let $\eta,\phi\in C^{\infty}(M)$ and $\Delta\eta=\eta_{i\bar{j}}g^{i\bar{j}}$
associated to the metric $g=L(\psi,\chi)$. Then in local coordinates on
$(M,J_{\varphi})$, we compute
$\displaystyle(S\eta,\phi)$
$\displaystyle=\int_{M}\eta_{i\bar{j}}\overline{\phi_{k\bar{l}}}g^{i\bar{k}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$
$\displaystyle=-\int_{M}\eta_{i\bar{j}\bar{k}}\overline{\phi_{\bar{l}}}g^{i\bar{k}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}+\int_{M}\eta_{i\bar{j}}\overline{\phi_{\bar{l}}}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$
$\displaystyle=-\int_{M}\eta_{i\bar{k}\bar{j}}\overline{\phi_{\bar{l}}}g^{i\bar{k}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}+\int_{M}\eta_{i\bar{j}}\overline{\phi_{\bar{l}}}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$
$\displaystyle=-\int_{M}(\Delta\eta)_{\bar{j}}\overline{\phi_{\bar{l}}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}+\int_{M}\eta_{i\bar{j}}\overline{\phi_{\bar{l}}}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$
$\displaystyle=\int_{M}[(\Delta^{2}\eta)-(\Delta\eta)_{\bar{j}}(f_{\psi,\chi})_{l}g^{l\bar{j}}]\phi
e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$
$\displaystyle-\int_{M}[\eta_{i\bar{j}l}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}+\eta_{i\bar{j}}(f_{\psi,\chi})_{l\bar{k}}g^{i\bar{k}}g^{l\bar{j}}-\eta_{i\bar{j}}(f_{\psi,\chi})_{\bar{k}}(f_{\psi,\chi})_{l}g^{i\bar{k}}g^{l\bar{j}}]\phi
e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$
$\displaystyle=\int_{M}[(\Delta^{2}\eta)-(\Delta\eta)_{\bar{j}}(f_{\psi,\chi})_{l}g^{l\bar{j}}]\phi
e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$
$\displaystyle-\int_{M}[\eta_{l\bar{j}i}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}+\eta_{i\bar{j}}(f_{\psi,\chi})_{l\bar{k}}g^{i\bar{k}}g^{l\bar{j}}-\eta_{i\bar{j}}(f_{\psi,\chi})_{\bar{k}}(f_{\psi,\chi})_{l}g^{i\bar{k}}g^{l\bar{j}}]\phi
e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}.$
It follows that
$\displaystyle(S\eta,\phi)$
$\displaystyle=\int_{M}[\Delta^{2}\eta-(\Delta\eta)_{\bar{j}}(f_{\psi,\chi})_{l}g^{l\bar{j}}-(\Delta\eta)_{l}(f_{\psi,\chi})_{\bar{j}}g^{l\bar{j}}$
$\displaystyle-\eta_{i\bar{j}}(f_{\psi,\chi})_{l\bar{k}}g^{i\bar{k}}g^{l\bar{j}}+\eta_{i\bar{j}}(f_{\psi,\chi})_{l}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}]\phi
e^{-f_{\psi,\chi}}\omega_{g}^{n}.$
Thus we derive
$S\eta=\Delta^{2}\eta-(\Delta\eta)_{\bar{j}}(f_{\psi,\chi})_{l}g^{l\bar{j}}-(\Delta\eta)_{l}(f_{\psi,\chi})_{\bar{j}}g^{l\bar{j}}-\eta_{i\bar{j}}(f_{\psi,\chi})_{l\bar{k}}g^{i\bar{k}}g^{l\bar{j}}+\eta_{i\bar{j}}(f_{\psi,\chi})_{l}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}.$
Hence, $S$ is an elliptic operator. By the regularity theorem of elliptic
operator, $S$ is a self-adjoint operator on the domain
$D(S)=W^{2}_{4}(M,e^{-f_{\psi,\chi}})$.
Since $S$ is non-negative, by the spectral theorem we see that for integer
$k>0$, $x\in D(S)$ it holds
(3.16)
$\displaystyle(S^{k}x,x)=\int_{0}^{\infty}\lambda^{k}dE_{x,x}(\lambda),$
where $E_{x,x}(\lambda)$ is the spectral decomposition defined by $S$ [31]. By
the Hölder inequality and (3.16) it follows that
(3.17)
$\displaystyle(S^{2}x,x)\leq(Sx,x)^{\frac{k-2}{k-1}}(S^{k}x,x)^{\frac{1}{k-1}}.$
Thus by (3.14), we get
$\displaystyle\|{\mathbf{R}}(\psi,\chi)\|_{L^{2}}$ $\displaystyle\leq
C((\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}})^{*}\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}F,(\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}})^{*}\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}F)$
$\displaystyle=C(SF,SF)$ $\displaystyle=C(S^{2}F,F)$ $\displaystyle\leq
C(SF,F)^{\frac{k-2}{k-1}}(S^{k}F,F)^{\frac{1}{k-1}}$ (3.18) $\displaystyle\leq
C^{\prime}(\int_{M}|{\rm
Ric}(\omega_{\psi,\chi})-\omega_{\psi,\chi}+\sqrt{-1}\partial\overline{\partial}f_{\psi,\chi}|^{2}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n})^{\frac{k-2}{k-1}}(S^{k}F,F)^{\frac{1}{k-2}}.$
Note that
$SF=(\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}})^{*}({\rm
Ric}(\omega_{\psi,\chi})-\omega_{\psi,\chi}+\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}f_{\psi,\chi}).$
Then
$\displaystyle(S^{k}F,F)$ $\displaystyle=(S^{k-2}SF,SF)$
$\displaystyle=(S^{k-2}(\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\varphi}})^{*}({\rm
Ric}(\omega_{\psi,\chi})-\omega_{\psi,\chi}+\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}f_{\psi,\chi}).$
Hence
(3.19) $\displaystyle(S^{k}F,F)^{\frac{1}{k-2}}<C(\epsilon)\to 0,~{}{\rm
as}~{}\epsilon\to 0.$
Therefore, we get (3.13) immediately by (3.2). ∎
### 3.3. The second variation of $\nu(\cdot)$
We will calculate the second valuation of $\nu$ at
$(0,0)\in\mathcal{U}_{\epsilon}$. Let $(g,f)$ be a pair of $W$-functional in
(3.3) while $f$ is a smooth solution of (3.5). Denote $\eta=\delta g,k=\delta
f$ to be the variations of $g$ and $f$ respectively. Then it has been shown in
[5, 40] that
(3.20) $\displaystyle\delta({\rm Ric}(g)-g+{\rm
Hess}(f))=-\Delta_{-f}(\eta)-{\rm Rm}(\eta,\cdot)-{\rm div}^{*}_{-f}{\rm
div}_{-f}(\eta)-\frac{1}{2}{\rm Hess}(v_{\eta}),$
where the function $v_{\eta}={\rm tr}\eta-2k$. Moreover, by differentiating
(3.5), we get (cf. [17]),
(3.21) $\displaystyle\Delta_{-f}(v_{\eta})+\frac{v_{\eta}}{2}=-\frac{1}{2}{\rm
div}_{-f}{\rm div}_{-f}(\eta).$
For convenience, we write the right term in (3.20) as
$N(\eta)=-\Delta_{-f}(\eta)-{\rm Rm}(\eta,\cdot)-{\rm div}^{*}_{-f}{\rm
div}_{-f}(\eta)-\frac{1}{2}{\rm Hess}(v_{\eta}).$
In case that $-f=\theta$, namely $g$ is a KR soliton, if
(3.22) $\displaystyle{\rm div}_{\theta}\eta=0,$
then
$\Delta_{\theta}(v_{\eta})+\frac{v_{\eta}}{2}=0.$
Since the first non-zero eigenvalue of $-\Delta_{\theta}$ is not less than one
[40], we get
$v_{\eta}=0.$
Thus
(3.23) $\displaystyle N(\eta)=-\Delta_{\theta}(\eta)-{\rm Rm}(\eta,\cdot),$
which is an anti-hermitian symmetric 2-tensor.
Now we restrict the Kähler metric $g=g_{\tau,\chi}$ in
$\mathcal{U}_{\epsilon}$. Let
$(\psi,\chi),(\psi^{\prime},\chi^{\prime})\in\mathcal{U}=\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\times
C^{\infty}(M).$
Then by (3.5), we have
$\displaystyle\frac{d}{ds}|_{s=0}(\nabla\nu(s(\psi,\chi)),(\psi^{\prime},\chi^{\prime}))_{\theta}$
$\displaystyle=-\frac{1}{2}\int_{M}<\frac{d}{ds}_{s=0}({\rm
Ric}(g_{s\psi,s\chi})+{\rm
Hess}(f_{s\psi,s\chi})-g_{s\psi,s\chi}),DL_{(0,0)}(\psi^{\prime},\chi^{\prime})>e^{\theta}\omega_{KS}^{n}$
(3.24)
$\displaystyle=-\frac{1}{2}\int_{M}<N(DL_{(0,0)}(\psi,\chi),DL_{(0,0)}(\psi^{\prime},\chi^{\prime})>e^{\theta}\omega_{KS}^{n}.$
###### Lemma 3.7.
$\int_{M}<N(DL_{(0,0)}(\psi,0),DL_{(0,0)}(0,\chi^{\prime})>e^{\theta}\omega_{KS}^{n}=0.$
###### Proof.
We note that $DL_{(0,0)}(\psi,0)$ is anti-hermitian symmetric and (3.22) holds
by Lemma 3.1. Thus $N(DL_{(0,0)}(\psi,0))$ is an anti-hermitian symmetric
2-tensor by (3.23). On the other hand, $DL_{(0,0)}(0,\chi^{\prime})$ is
hermitian symmetric. Hence the lemma is true. ∎
Analogous to the $Q$-map in Section 3.1, we introduce a map
$H_{1}:\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\mapsto\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$
by
$H_{1}(\psi)=\sum_{i=1}^{l}(c_{i}(\psi)+\sqrt{-1}d_{i}(\psi))e_{i},$
where
$c_{i}(\psi)=-\frac{1}{2}\int_{M}<N(DL_{(0,0)}(\psi,0),DL_{(0,0)}(\delta_{i},0)>e^{\theta}\omega_{KS}^{n},i=1,2,\ldots,l,$
and
$d_{i}(\psi)=-\frac{1}{2}\int_{M}<N(DL_{(0,0)}(\psi,0),DL_{(0,0)}(\sqrt{-1}\delta_{i},0)>e^{\theta}\omega_{KS}^{n},i=1,2,\ldots,l.$
Recall a fourth order non-positively elliptic operator $H_{2}$ on
$C^{\infty}(M)$ introduced in [40] by
$H_{2}=[P_{0}^{-1}(\overline{L}^{\prime}_{1}L^{\prime}_{1})(\overline{L}_{1}L_{1})],$
where
$P_{0}\chi=2\triangle_{\theta}\chi+\chi-(X+\overline{X})(\chi),$
$L_{1}\chi=\triangle_{\theta}\chi+\psi-X(\chi)$
and
$L_{1}^{\prime}\chi=\triangle_{\theta}\chi-X(\chi).$
###### Definition 3.8.
Define a map $H_{\psi,\chi}:\mathcal{U}\to\mathcal{U}$ by
$H_{\psi,\chi}=D_{\psi,\chi}\nabla\nu$
and write $H=H_{0,0}$ for convenience. We call $H$ the second variation
operator of $\nu(\cdot)$ at $\omega_{KS}$.
By the above definition and (3.3), we see that for any
$(\psi,\chi)\in\mathcal{U}$, it holds
$\displaystyle\delta^{2}\nu_{(0,0)}((\psi,\chi),(\psi,\chi))$
$\displaystyle=\int_{M}<H(\psi,\chi),(\psi,\chi)>e^{\theta}\omega_{KS}^{n}$
(3.25) $\displaystyle=(H(\psi,\chi),(\psi,\chi))_{\theta}.$
Moreover, by Lemma 3.7 we get
###### Proposition 3.9.
$H=H_{1}\oplus H_{2}$, namely, $H(\psi,\chi)=H_{1}(\psi)+H_{2}(\chi).$
By a result in [43] (also see [18]), we have the following explicit formula
for $H_{1}$.
###### Lemma 3.10.
(3.26)
$\displaystyle(H_{1}(\psi),\psi)_{\theta}=\int_{M}|\psi|^{2}\widetilde{\theta}e^{\theta}\omega_{KS}^{n},~{}\forall~{}\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M),$
where $\widetilde{\theta}$ differs from $\theta$ with a constant such that
(3.27) $\displaystyle\int_{M}\widetilde{\theta}e^{\theta}\omega_{KS}^{n}=0.$
###### Proof.
By Lemma 3.1, $\eta=DL_{(0,0)}(\psi,0)$ satisfies that
$\eta_{i\overline{j}}=0,{\rm div}_{\theta}\eta=0~{}{\rm
and}~{}\eta_{\bar{i}\bar{j},\bar{k}}=\eta_{\bar{i}\bar{k},\bar{j}}.$
For such a variation of Kähler metrics, $\delta^{2}\lambda$ has been computed
by the following formula [43, 18],
$\displaystyle\delta^{2}\nu((\psi,0),(\psi,0))=\delta^{2}\lambda(\eta,\eta)=\frac{1}{2}\int_{M}|\eta|^{2}(\nu(\omega_{KS})-2m+\theta)e^{\theta}\omega_{KS}^{n}.$
Notice that $|\eta|^{2}=2|\psi|^{2}$ and
$\int_{M}(\nu(\omega_{KS})-2m+\theta)e^{\theta}\omega_{KS}^{n}=0.$
This implies that (3.26) holds. ∎
## 4\. A new version of $\delta^{2}\nu$
In this section, we give a new version of $H_{1}$ and then describe the
geometry of the kernel space $Z={\rm ker}(H_{1})$. As an application, we are
able to prove the local maximality of $\lambda(\cdot)$ on the space of Kähler
metrics associated to the complex structures determined by $Z$.
### 4.1. Kernel space $Z$ of $H_{1}$
We begin with the following technical lemma.
###### Lemma 4.1.
Suppose that $\varphi,\psi\in A^{0,1}(M,T^{1,0}M)$ satisfy
$\left\\{\begin{array}[]{ll}\overline{\partial}\varphi=\overline{\partial}\psi=0\\\
\varphi\lrcorner\omega=\psi\lrcorner\omega=0.\end{array}\right.$
Let $v$ be a $(1,0)$-VF. Then
$v<\varphi,\psi>-<[v,\varphi],\psi>={\rm
div}_{\theta}(v\lrcorner\overline{\psi}\lrcorner\varphi)-(v\lrcorner\overline{\varphi})\lrcorner{\rm
div}_{\theta}\varphi.$
###### Proof.
Let $v=v^{i}\frac{\partial}{\partial
z^{i}},\varphi=\varphi^{l}_{\overline{k}}d\overline{z}^{k}\otimes\frac{\partial}{\partial
z^{l}},\psi=\psi^{s}_{\overline{t}}d\overline{z}^{t}\otimes\frac{\partial}{\partial
z^{s}}$. Then
$\displaystyle[v,\varphi]$
$\displaystyle=(v^{i}\frac{\partial\varphi_{\overline{k}}^{l}}{\partial
z^{i}}-\varphi_{\overline{k}}^{i}\frac{\partial v^{l}}{\partial
z^{i}})d\overline{z}^{k}\otimes\frac{\partial}{\partial z^{l}}$
$\displaystyle=(v^{i}\varphi_{\overline{k},i}^{l}-\varphi_{\overline{k}}^{i}v^{l}_{,i})d\overline{z}^{k}\otimes\frac{\partial}{\partial
z^{l}}$
and
$<[v,\varphi],\psi>=(v^{i}\varphi_{\overline{k},i}^{l}-\varphi_{\overline{k}}^{i}v^{l}_{,i})\overline{\psi^{s}_{\overline{t}}}g^{t\overline{k}}g_{l\overline{s}}.$
Similarly,
$<\varphi,\psi>=\varphi^{l}_{\overline{k}}\overline{\psi^{s}_{\overline{t}}}g^{t\overline{k}}g_{l\overline{s}}$
and
$v<\varphi,\psi>=v^{i}\varphi^{l}_{\overline{k},i}\psi^{s}_{\overline{t}}g^{t\overline{k}}g_{l\overline{s}}+v^{i}\varphi^{l}_{\overline{k}}\overline{\psi^{s}_{\overline{t}\overline{i}}}g^{t\overline{k}}g_{l\overline{s}}.$
On the other hand, by the condition,
$\varphi\lrcorner\omega=\psi\lrcorner\omega=0,$
we have
$\varphi^{l}_{\overline{k}}g^{t\overline{k}}=\varphi^{t}_{\overline{k}}g^{l\overline{k}},\psi^{s}_{\overline{t}}g_{s\overline{l}}=\psi^{s}_{\overline{l}}g_{s\overline{t}},$
and by the condition,
$\overline{\partial}\psi=0,$
we have
$\psi^{s}_{\overline{t},\overline{i}}=\psi^{s}_{\overline{i},\overline{t}}.$
Thus
$\displaystyle v<\varphi,\psi>-<[v,\varphi],\psi>$
$\displaystyle=v^{i}\varphi^{l}_{\overline{k}}\overline{\psi^{s}_{\overline{t},\overline{i}}}g^{t\overline{k}}g_{l\overline{s}}+\varphi_{\overline{k}}^{i}v^{l}_{,i}\overline{\psi^{s}_{\overline{t}}}g^{t\overline{k}}g_{l\overline{s}}$
$\displaystyle=v^{i}\varphi^{l}_{\overline{k}}\overline{\psi^{s}_{\overline{i},\overline{t}}}g^{t\overline{k}}g_{l\overline{s}}+\varphi_{\overline{k}}^{i}v^{l}_{,i}\overline{\psi^{s}_{\overline{t}}}g^{t\overline{k}}g_{l\overline{s}}$
$\displaystyle=v^{l}\varphi^{i}_{\overline{k}}\overline{\psi^{s}_{\overline{l},\overline{t}}}g^{t\overline{k}}g_{i\overline{s}}+\varphi_{\overline{k}}^{i}v^{l}_{,i}\overline{\psi^{s}_{\overline{l}}}g^{t\overline{k}}g_{t\overline{s}}$
$\displaystyle=v^{l}\varphi^{t}_{\overline{k}}\overline{\psi^{s}_{\overline{l},\overline{t}}}g^{i\overline{k}}g_{i\overline{s}}+\varphi_{\overline{k}}^{i}v^{l}_{,i}\overline{\psi^{s}_{\overline{l}}}g^{t\overline{k}}g_{t\overline{s}}$
$\displaystyle=v^{l}\varphi^{t}_{\overline{k}}\overline{\psi^{k}_{\overline{l},\overline{t}}}+\varphi_{\overline{k}}^{i}v^{l}_{,i}\overline{\psi^{k}_{\overline{l}}}$
$\displaystyle=v^{l}\varphi^{i}_{\overline{k}}\overline{\psi^{k}_{\overline{l},\overline{i}}}+\varphi_{\overline{k}}^{i}v^{l}_{,i}\overline{\psi^{k}_{\overline{l}}}$
$\displaystyle=(v^{l}\varphi^{i}_{\overline{k}}\overline{\psi^{k}_{\overline{l}}})_{i}-v^{l}\varphi^{i}_{\overline{k},i}\overline{\psi^{k}_{\overline{l}}}$
$\displaystyle=(v^{l}\varphi^{i}_{\overline{k}}\overline{\psi^{k}_{\overline{l}}})_{i}+(v^{l}\varphi^{i}_{\overline{k}}\overline{\psi^{k}_{\overline{l}}})\theta_{i}-v^{l}(\varphi^{i}_{\overline{k},i}+\varphi^{i}_{\overline{k}}\theta_{i})\overline{\psi^{k}_{\overline{l}}}$
$\displaystyle={\rm
div}_{\theta}(v\lrcorner\overline{\psi}\lrcorner\varphi)-(v\lrcorner\overline{\psi})\lrcorner{\rm
div}_{\theta}\varphi.$
∎
If $v\in\eta_{r}(M,J_{0})$ is a HVF on $(M,J_{0},\omega_{KS})$, there is a
potential function $P$ of $v$ such that
(4.1) $\displaystyle
v=\nabla_{\overline{j}}Pg^{i\overline{j}}\frac{\partial}{\partial z^{i}}={\rm
grad}^{1,0}P.$
We may normalize $P$ by the following equation (cf. [35]),
$g^{i\overline{j}}\nabla_{\overline{j}}\nabla_{i}P+g^{i\overline{j}}\nabla_{\overline{j}}P\nabla_{i}\theta=-P.$
This means that
(4.2) $\displaystyle{\rm div}_{\theta}(v)=v^{i}_{,i}+v(\theta)=-P.$
###### Lemma 4.2.
Let $v={\rm grad}^{1,0}P$ as in (4.1) and
$\varphi,\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$. Then
(4.3)
$\displaystyle\int_{M}<[v,\varphi],\psi>e^{\theta}\omega_{KS}^{n}=\int_{M}P<\varphi,\psi>e^{\theta}\omega_{KS}^{n}.$
###### Proof.
By Corollary 1.3, we see that
$\left\\{\begin{array}[]{ll}\overline{\partial}\varphi=\overline{\partial}\psi=0\\\
\varphi\lrcorner\omega_{KS}=\psi\lrcorner\omega_{KS}=0.\end{array}\right.$
Note that we also have
${\rm div}_{\theta}\varphi=0.$
Thus by Lemma 4.1 and Stoke’s formula, we get
$\displaystyle\int_{M}<[v,\varphi],\psi>e^{\theta}\omega_{KS}^{n}$
$\displaystyle=\int_{M}v<\varphi,\psi>e^{\theta}\omega_{KS}^{n}.$
Hence, by (4.2), we prove
$\displaystyle\int_{M}<[v,\varphi],\psi>e^{\theta}\omega_{KS}^{n}$
$\displaystyle=-\int_{M}{\rm
div}_{\theta}(v)<\varphi,\psi>e^{\theta}\omega_{KS}^{n}$
$\displaystyle=\int_{M}P<\varphi,\psi>e^{\theta}\omega_{KS}^{n}.$
∎
###### Remark 4.3.
A similar relation (4.3) is obtained in [6] when $\omega_{KS}$ is a KE metric.
Combining Lemma 4.2 with Lemma 3.10, we have the following new version of the
operator $H_{1}$.
###### Theorem 4.4.
Let $\xi={\rm Im}(X)$, where $X$ is a soliton HVF of $(M,J_{0},\omega_{KS}).$
Then
(4.4) $\displaystyle
H_{1}(\psi)=2\sqrt{-1}\mathcal{L}_{\xi}\psi,\forall~{}\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M).$
###### Proof.
Note that
$X={\rm grad}^{1,0}\widetilde{\theta}$
and
$g^{i\overline{j}}\nabla_{\overline{j}}\nabla_{i}\widetilde{\theta}+g^{i\overline{j}}\nabla_{\overline{j}}\widetilde{\theta}\nabla_{i}\widetilde{\theta}=-\widetilde{\theta}.$
Then by Lemma 4.2, for any
$\psi^{\prime}\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$, we have
$\int_{M}<[X,\psi],\psi^{\prime}>e^{\theta}\omega_{KS}^{n}=\int_{M}\widetilde{\theta}<\psi,\psi^{\prime}>e^{\theta}\omega_{KS}^{n}.$
It follows that
(4.5)
$\displaystyle\int_{M}<\mathcal{L}_{X}\psi,\psi^{\prime}>e^{\theta}\omega^{n}=\int_{M}\widetilde{\theta}<\psi,\psi^{\prime}>e^{\theta}\omega_{KS}^{n}.$
Let $(z^{1},\ldots,z^{n})$ be holomorphic local coordinates on $(M,J_{0})$.
Write
$\psi=\psi^{i}_{\overline{k}}d\overline{z}^{k}\otimes\frac{\partial}{\partial
z^{i}},~{}X=X^{i}\frac{\partial}{\partial z^{i}}.$
Then
$\mathcal{L}_{\overline{X}}\psi=(\frac{\partial\overline{X^{k}}}{\partial\overline{z}^{j}}\psi^{i}_{\overline{k}}+\overline{X}(\psi^{i}_{\overline{j}}))d\overline{z}^{j}\otimes\frac{\partial}{\partial
z^{i}}.$
Since
$\overline{\partial}\psi=0,$
$\frac{\partial\psi^{i}_{\overline{j}}}{\partial\overline{z}^{k}}=\frac{\partial\psi^{i}_{\overline{k}}}{\partial\overline{z}^{j}}.$
Thus
$\displaystyle\overline{\partial}(\overline{X}\lrcorner\psi)$
$\displaystyle=\frac{\partial\overline{X^{k}}\psi^{i}_{\overline{k}}}{\partial\overline{z}^{j}}d\overline{z}^{j}\otimes\frac{\partial}{\partial
z^{i}}$
$\displaystyle=(\frac{\partial\overline{X^{k}}}{\partial\overline{z}^{j}}\psi^{i}_{\overline{k}}+\overline{X^{k}}\frac{\partial\varphi^{i}_{\overline{k}}}{\partial\overline{z}^{j}})d\overline{z}^{j}\otimes\frac{\partial}{\partial
z^{i}}$
$\displaystyle=(\frac{\partial\overline{X^{k}}}{\partial\overline{z}^{j}}\psi^{i}_{\overline{k}}+\overline{X^{k}}\frac{\partial\psi^{i}_{\overline{j}}}{\partial\overline{z}^{k}})d\overline{z}^{j}\otimes\frac{\partial}{\partial
z^{i}}$
$\displaystyle=(\frac{\partial\overline{X^{k}}}{\partial\overline{z}^{j}}\psi^{i}_{\overline{k}}+\overline{X}(\psi^{i}_{\overline{j}}))d\overline{z}^{j}\otimes\frac{\partial}{\partial
z^{i}}$ (4.6) $\displaystyle=\mathcal{L}_{\overline{X}}\psi.$
Hence, by the fact that
$\delta_{\theta}\psi=0,$
we derive
(4.7)
$\displaystyle\int_{M}<\mathcal{L}_{\overline{X}}\psi,\psi^{\prime}>e^{\theta}\omega_{KS}^{n}=\int_{M}<\bar{X}\lrcorner\psi,\delta_{\theta}\psi^{\prime}>e^{\theta}\omega^{n}_{KS}=0.$
By (4.5) and (4.7), we have
$\int_{M}<\mathcal{L}_{\xi}\psi,\psi^{\prime}>e^{\theta}\omega_{KS}^{n}=-\frac{\sqrt{-1}}{2}\int_{M}\widetilde{\theta}<\psi,\psi^{\prime}>e^{\theta}\omega_{KS}^{n}.$
By Lemma 3.10, it follows that
(4.8)
$\displaystyle\int_{M}<\mathcal{L}_{\xi}\psi,\psi^{\prime}>e^{\theta}\omega_{KS}^{n}=-\frac{\sqrt{-1}}{2}\int_{M}<H_{1}(\psi),\psi^{\prime}>e^{\theta}\omega_{KS}^{n}.$
On the other hand, for any $\sigma\in K_{X}$, where $K_{X}$ is the compact
1-ps of holomorphic transformations generated by $\xi$, $\sigma$ preserves the
Kähler form $\omega_{KS}$ and the function $\theta$. Then $\sigma$ maps
$\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ to itself. As a consequence,
$\mathcal{L}_{\xi}$ maps $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ to itself.
Thus we prove (4.4) by (4.8) since $\psi^{\prime}$ is an arbitrary element in
$\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$.
∎
By Theorem 4.4, we have
(4.9) $\displaystyle{\rm
Ker}(H_{1})=Z=\\{\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)|~{}\mathcal{L}_{\xi}\psi=0\\}.$
Moreover, we have the following character for the kernel $Z$.
###### Corollary 4.5.
$\psi\in Z$ if only if
$\xi_{J_{\Phi(\tau\psi)}}=J_{\Phi(\tau\psi)}\xi+\sqrt{-1}\xi$ is a HVF on
$(M,J_{\Phi(\tau\psi)})$ for some small $\tau$.
###### Proof.
Recall that $K_{X}=e^{s\xi}$ is the 1-ps of holomorphic transformations on
$(M,J_{0})$ generated by $\xi$. Then $\xi$ is holomorphic on
$(M,J_{\Phi(\tau\psi)})$ if and only if
$\displaystyle(e^{s\xi})^{*}J_{\Phi(\tau\psi)}=J_{\Phi(\tau\psi)},~{}\forall
s\in\mathbb{R},$
which is equivalent to
$\displaystyle J_{(e^{s\xi})^{*}\Phi(\tau\psi)}=J_{\Phi(\tau\psi)},~{}\forall
s\in\mathbb{R}.$
The latter is also equivalent to
(4.10) $\displaystyle(e^{s\xi})^{*}\Phi(\tau\psi)=\Phi(\tau\psi),~{}\forall
s\in\mathbb{R}.$
Note that $e^{s\xi}$ preserves the Kähler form $\omega_{KS}$ and $\theta$.
Then
$(e^{s\xi})^{*}\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M).$
Moreover, for any $(1,1)$-form $\varphi_{k}$ $(k\geq 2)$ defined as in (2.9)
for $\tau\psi$, we have
$\delta_{\theta}((e^{s\xi})^{*}\varphi_{k})=0,$
Thus by the uniqueness of Kuranishi’s solutions we get
$\displaystyle(e^{s\xi})^{*}\Phi(\tau\psi)=\Phi(\tau(e^{s\xi})^{*}\psi).$
Since the Kuranishi map is injective, by (4.10), we derive
(4.11) $\displaystyle(e^{s\xi})^{*}\psi=\psi~{}\forall s\in\mathbb{R}.$
It follows that
$\mathcal{L}_{\xi}\psi=0.$
By Theorem 4.4, we prove that $\psi\in Z$ from (4.9). The inverse is also
true. In fact, if $\psi\in Z$, then (4.10) holds for any small $\tau$. Hence,
$\psi\in Z$ if only if $e^{s\xi}$ is a family of holomorphisms on
$(M,J_{\Phi(\tau\psi)})$. The corollary is proved.
∎
###### Remark 4.6.
It has been shown [40] that the kernel of $H_{2}$ is finitely dimensional,
which is isomorphic to the linear space generalized by the real and imaginary
parts on HVFs of $(M,J_{0})$. Thus by Proposition 3.9,
${\rm Ker}(H)={\rm Ker}(H_{1})\oplus{\rm Ker}(H_{2})$
is also finitely dimensional.
### 4.2. Index of $H_{1}$
Since $H_{2}$ is always non-positively elliptic operator, the index (the
number of positive eigenvalues) of $H$ depends only on the Lie operator
$\mathcal{L}_{\xi}$ on $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ by Theorem
4.4. In the following, we will show that it just depends on the cohomology
group $H^{1}(M,J_{0},\Theta)$.
Suppose that $e_{1},\ldots,e_{l}$ are the eigenvectors of $\mathcal{L}_{\xi}$.
Namely there exists $\lambda_{i},i=1,2,\ldots,l$ such that
$\mathcal{L}_{\xi}e_{i}=\lambda_{i}e_{i}.$
By (4.4) we have
$H_{1}e_{i}=2\sqrt{-1}\lambda_{i}e_{i}.$
Thus $2\sqrt{-1}\lambda_{i}$ is real. Denote
$\lambda_{i}=-\sqrt{-1}\delta_{i},\delta_{i}\in\mathbb{R}$ and let
$\theta_{i}=e_{i},~{}\theta_{l+i}=\sqrt{-1}e_{i},~{}i=1,2,\ldots,l.$
It follows that
$H_{1}\theta_{i}=2\delta_{i}\theta_{i},~{}H_{1}\theta_{l+i}=2\delta_{i}\theta_{l+i}.$
Hence, we need to show that the number $\delta_{i}$ is independent of choice
of representation of $[\theta_{i}]$.
The following lemma can be found in the book of Kodaira [14].
###### Lemma 4.7.
If $\varphi\in A^{0,p}(M,T^{1,0}(M)),\psi\in A^{0,q}(M,T^{1,0}(M))$, we have
(4.12)
$\displaystyle\overline{\partial}[\varphi,\psi]=[\overline{\partial}\varphi,\psi]+(-1)^{p}[\varphi,\overline{\partial}\psi].$
In particular, if $Y$ is a HVF, and $\varphi\in A^{0,p}(M,T^{1,0}(M))$ then
(4.13)
$\displaystyle\overline{\partial}\mathcal{L}_{Y}(\varphi)=\mathcal{L}_{Y}\overline{\partial}(\varphi).$
###### Lemma 4.8.
Let $\varphi\in A^{0,1}(M,T^{1,0}(M))$. Then the following is true:
$\displaystyle\overline{\partial}\mathcal{L}_{\xi}\varphi=0,~{}{\rm
if}~{}\overline{\partial}\varphi=0;$ (4.14)
$\displaystyle\mathcal{L}_{\xi}\varphi=\frac{\overline{\partial}(\mathcal{L}_{X}Y-\overline{X}\lrcorner\varphi)}{2\sqrt{-1}},~{}{\rm
if}~{}\varphi=\overline{\partial}Y,Y\in T^{1,0}M.$
###### Proof.
By (4.1), we have
(4.15)
$\displaystyle\bar{\partial}\mathcal{L}_{\bar{X}}\varphi=0,~{}\forall~{}\varphi\in
H^{1}(M,J_{0},\Theta).$
By (4.13), we also have
(4.16) $\displaystyle\bar{\partial}\mathcal{L}_{X}\varphi=0.$
Thus,
$\overline{\partial}\mathcal{L}_{\xi}\varphi=0.$
By (4.13) we have
$\mathcal{L}_{X}\bar{\partial}Y=\bar{\partial}\mathcal{L}_{X}Y.$
Together with (4.1) we see that
$\displaystyle\mathcal{L}_{\xi}\bar{\partial}Y$
$\displaystyle=\frac{\mathcal{L}_{X}\bar{\partial}Y-\mathcal{L}_{\bar{X}}\bar{\partial}Y}{2\sqrt{-1}}$
$\displaystyle=\frac{\bar{\partial}\mathcal{L}_{X}Y-\bar{\partial}(\bar{X}\lrcorner\bar{\partial}Y)}{2\sqrt{-1}}.$
Hence (4.8) is true. ∎
By (4.8), we see that for any $\varphi=\overline{\partial}Y,Y\in T^{1,0}M$, it
holds
$[\mathcal{L}_{\xi}\varphi]=0.$
Thus
(4.17) $\displaystyle\mathcal{L}_{\xi}[\varphi]=[\mathcal{L}_{\xi}\varphi].$
This means that the eigenvalue $\theta_{i}$ depends only on the operator
$\mathcal{L}_{\xi}$ on $H^{1}(M,J_{0},\Theta)$. Hence, we prove
###### Proposition 4.9.
The index of $H$ depends only on the operator $\mathcal{L}_{\xi}$ on
$H^{1}(M,J_{0},\Theta)$.
### 4.3. Maximality of $\lambda(\cdot)$ associated to $Z$
First we recall a formula computed for the $W$-functional on a Fano manifold
$(M,J)$ in [39]. Let $Y$ be any HVF with ${\rm Im}(Y)$ generating a compact
1-ps $K_{Y}$ of holomorphic transformations on $(M,J)$. Then for any
$K_{Y}$-invariant Kähler form $\omega_{g}\in 2\pi c_{1}(M,J)$, the potential
$\theta_{Y}(\omega_{g})$ of $Y$ in (3.1) associated to $\omega_{g}$ is real.
Define an invariant for $Y$ by
$N_{Y}(c_{1}(M,J))=\int_{M}\theta_{Y}(\omega_{g})e^{\theta_{Y}(\omega_{g})}\omega_{g}^{n},$
which is independent of choice of $K_{Y}$-invariant $\omega_{g}\in 2\pi
c_{1}(M,J)$ [39]. Moreover, for any $K_{Y}$-invariant $\omega_{g}\in 2\pi
c_{1}(M,J)$, we have the following formula,
(4.18) $\displaystyle W(g,-\theta_{Y}(\omega_{g}))=(2\pi)^{-n}(nV-
N_{Y}(c_{1}(M,J))-F_{Y}^{J}(Y)),$
where $F_{\cdot}^{J}(\cdot)$ is the modified Futaki-invariant on $(M,J)$
introduced in [36]. $N_{Y}(c_{1}(M,J))+F_{Y}^{J}(Y)$ is also called the
$H(Y)$-invariant on $\eta_{r}(M,J)$ [39].
By Corollary 4.5, we know that
$X=\xi_{J_{\psi_{\tau}}}=J_{\psi_{\tau}}\xi+\sqrt{-1}\xi$ is a HVF on
$(M,J_{\psi_{\tau}})$ for any $\tau<<1$, where $\psi_{\tau}=\tau\psi\in
B(\epsilon)\cap Z$ and $J_{\psi_{\tau}}$ is associated to
$\varphi_{\tau}=\Phi(\psi_{\tau})$. Thus by (4.18), for any
$\omega_{g}=\omega_{g_{\tau,\chi}}$ with $\xi(\chi)=0$ in (3.2), it holds
(4.19) $\displaystyle W(g,-\theta_{X}(\omega_{g}))=(2\pi)^{-n}(nV-
N_{X}(c_{1}(M,J_{\psi_{\tau}}))-F_{X}^{J_{\psi_{\tau}}}(X)).$
Notice that $\theta=\theta_{X}(\omega_{KS})$ is independent of $\psi_{\tau}$.
Thus
$\displaystyle N_{X}(c_{1}(M,J_{\psi_{\tau}}))$
$\displaystyle=\int_{M}\theta_{X}(\omega_{KS})e^{\theta_{X}(\omega_{KS})}\omega_{KS}^{n}$
$\displaystyle=\int_{M}\theta e^{\theta}\omega_{KS}^{n}$ (4.20)
$\displaystyle=N_{X}(c_{1}(M,J_{0}))$
is independent of $\psi_{\tau}$.
Next we show that $F_{X}^{J_{\psi_{\tau}}}(X)$ is also independent of
$\psi_{\tau}$. In fact, we prove
###### Lemma 4.10.
(4.21) $\displaystyle
F_{X}^{J_{\psi_{\tau}}}(X)=F_{X}^{J_{0}}(X)=0,~{}\forall~{}\psi_{\tau}\in
B(\epsilon)\cap Z.$
###### Proof.
We use an argument in [19] to prove the lemma. Let
$\mathcal{J}_{K_{X}}(M,\omega_{KS})$ be a set of almost $K_{X}$-invariant
complex structures which are compatible with $\omega_{KS}$. Then for any
$J\in\mathcal{J}_{K_{X}}(M,\omega_{KS})$ it induces a Hermitian metric
$g_{J}$. As in [19], we define a modified Hermitian scalar curvature function
on $\mathcal{J}_{K_{X}}(M,\omega_{KS})$ by
$s_{\xi}(J)=s(J)-n+2\Box_{J}{\theta}-X({\theta})-{\theta},~{}\forall~{}J\in\mathcal{J}_{K_{X}}(M,\omega_{KS}),$
where $s(J)$ is the Hermitian scalar curvature of $g_{J}$ (cf. [12]) and
$\Box_{J}$ is the Lapalace operator induced by the Chern connection associated
to $g_{J}$. Now we consider a family of
$J_{\psi_{\tau}}\in\mathcal{J}_{K_{X}}(M,\omega_{KS})$. By [19, Proposition
3.1], we have the formula,
(4.22)
$\displaystyle\frac{d}{ds}\int_{M}2s_{\xi}(J_{\psi_{\tau}}){\theta}e^{{\theta}}\omega_{KS}^{n}=\Omega_{\xi}(\mathcal{L}_{\xi}J_{\psi_{\tau}},\dot{J}_{\psi_{\tau}}).$
where $\Omega_{\xi}$ is a non-degenerate 2-form on $\mathcal{J}_{T}(M,\omega)$
(cf. [12, 19]).
By Corollary 4.5, we have
$\mathcal{L}_{\xi}J_{\psi_{\tau}}=0$
and so we get
$\Omega_{\xi}(\mathcal{L}_{\xi}J_{\psi_{\tau}},\dot{J}_{\psi_{\tau}})=0.$
Thus by (4.22), the quantity
$\int_{M}2s_{\xi}(J_{\psi_{\tau}}){\theta}e^{{\theta}}\omega_{KS}^{n}$
is independent of $\tau$. As a consequence, for the normalized
$\widetilde{\theta}$ as in (3.27),
$\int_{M}2s_{\xi}(J_{\psi_{\tau}}){\tilde{\theta}}e^{{\tilde{\theta}}}\omega_{KS}^{n}$
is also independent of $\tau$. On the other hand, it is know in [36] that
$\int_{M}s_{\xi}(J_{\psi_{\tau}})\widetilde{\theta}e^{\widetilde{\theta}}\omega_{KS}^{n}=-F_{X}^{J_{\psi_{\tau}}}(X).$
Note that
$F_{X}^{J_{0}}(X)=0$
since $(\omega_{KS},X)$ is the KR soliton on $(M,J_{0})$. Hence,
$\int_{M}s_{\xi}(J_{\psi_{\tau}})\widetilde{\theta}e^{\widetilde{\theta}}\omega_{KS}^{n}=0,~{}\forall\tau<<1.$
As a consequence, we get
$F_{X}^{J_{\psi_{\tau}}}(X)=-\int_{M}s_{\xi}(J_{\psi_{\tau}})\widetilde{\theta}e^{\widetilde{\theta}}\omega_{KS}^{n}=0.$
∎
###### Proposition 4.11.
Let $\psi_{\tau}\in B(\epsilon)\cap Z$. Then for any $\chi\in C^{\infty}(M)$
with $\xi(\chi)=0$ it holds
$\lambda(g_{\tau,\chi})\leq\lambda(g_{KS}).$
###### Proof.
By (4.18) and (4.21), we have
$\displaystyle\lambda(g_{\tau,\chi})$ $\displaystyle\leq
W(g_{\tau,\chi},-\theta(\omega_{g_{\tau,\chi}}))$
$\displaystyle=(2\pi)^{-n}(nV-N_{X}(c_{1}(M,J_{\varphi_{\tau}})).$
Thus by (4.3), we get
$\displaystyle\lambda(g_{\tau,\chi})$ $\displaystyle\leq(2\pi)^{-n}(nV-
N_{X}(c_{1}(M,J_{0})))$ $\displaystyle=\lambda(g_{KS}).$
∎
Proposition 4.11 can be also proved by using the equivalent formula for the
modified Futaki-invariant in [47] as follows.
###### Another proof of Proposition 4.11.
According to the above proof of Proposition 4.11, we need to show that (4.21)
holds for $J_{\psi_{\tau}}$. In fact, as in the proof of [21, Lemma 2.1], by
the partial $C^{0}$-estimate, there is a large integer $L_{0}$ such that for
any integer $k$ the family of Fano manifolds $(M,g_{\tau,0})$
$(\tau\leq\epsilon$) can be embed into an ambient projection space
$\mathbb{C}P^{N_{k}}$ by normal orthogonal bases of
$H^{0}(M,kK_{M}^{-L_{0}},g_{\tau,0})$. Then by introducing two equivariant
Riemann-Roch formulas of $S_{1}$ and $S_{2}$ with $G=(S^{1})^{2}$-action by
(4.23) $\displaystyle S_{1}=k\frac{\partial}{\partial t}{\rm
trace}(e^{\frac{sX^{k}+tX^{k}}{k}})|_{s=1,\ t=0},\ \
S_{2}=\frac{1}{2}\frac{\partial}{\partial s}\frac{\partial}{\partial t}{\rm
trace}(e^{\frac{sX^{k}+tX^{k}}{k}})|_{s=1,t=0},$
where $X^{k}=(X_{\alpha}^{k})$ is the induced HVF as an element of Lie algebra
$sl(N_{k}+1,\mathbb{C})$, $F_{X}^{J_{\psi_{\tau}}}(X)$ is the leading term
$F_{0}$ (which is a multiple of $F_{1}$ for a smooth Fano variety) in the
following expansion of
(4.24) $\displaystyle-\frac{S_{1}-S_{2}}{kN_{k}}=F_{0}+F_{1}k^{-1}+o(k^{-2}).$
Here
${\rm trace}(e^{\frac{sX^{k}+tv^{k}}{k}})=\int_{M}{\rm ch}^{G}(kL){\rm
Td}^{G}(M),$
and ${\rm ch}^{G}(kL)$ is the $G$-equivalent Chern character of multiple line
bundle $kL=kK_{M}^{-L_{0}}$ and ${\rm Td}^{G}(M)$ is the $G$-equivalent Chern
character of $M$ [1]. Since $K_{M_{\tau}}^{-1}$ is the restriction of
$\frac{1}{kL_{0}}\mathcal{O}(-1)$, where
$M_{\tau}=(M,J_{\tau})\subset\mathbb{C}P^{N_{k}}$, $S_{1}$ (or $S_{2}$ ) as a
restriction of derivatives of ${\rm trace}(e^{\frac{sX^{k}+tv^{k}}{k}})$ on
$kL$ is same for any $\tau$ as long as $X$ can be lifted as a HVF on
$M_{\tau}$. Thus we get
$F_{X}^{J_{\psi_{\tau}}}(X)=F_{X}^{J_{0}}(X)=0.$
∎
## 5\. Lojasiewicz inequality on the space of Kähler metrics
In this section we prove an inequality of Lojasiewicz type for the functional
$\nu(\cdot)$ on $\mathcal{U}_{\epsilon}$. We note that $\nu(\cdot)$ can be
defined on the $C^{k+4,\gamma}$ continuous space,
$W^{k+4,\gamma}(M)=\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\times
C^{k+4,\gamma}(M),$
where $k\geq 0$ is any integer. Clearly, there is a natural
$C^{k+4,\gamma}$-norm on $W^{k+4,\gamma}(M)$ by
$\|(\psi,\chi)\|_{C^{k+4,\gamma}}=\|\psi\|_{\theta}+\|\chi\|_{C^{k+4,\gamma}}.$
Let
$W_{\epsilon}^{k+4,\gamma}(M)=\\{(\psi,\chi)\in W^{k+4,\gamma}(M)|~{}\psi\in
B(\epsilon)\\}.$
Set an $\epsilon$-neighborhood of $(0,0)$ in $W_{\epsilon}^{k+4,\gamma}(M)$ by
$\mathcal{V}_{\epsilon}=\\{(\psi,\chi)\in
W_{\epsilon}^{k+4,\gamma}(M)|~{}\psi\in
B(\epsilon),\|\chi\|_{C^{k+4,\gamma}}<\epsilon\\}.$
We prove
###### Proposition 5.1.
There are $\epsilon>0$ and $\alpha\in[\frac{1}{2},1)$ such that for any
$a=(\varphi,\chi)\in\mathcal{V}_{\epsilon}$ it holds
(5.1) $\displaystyle\|\nabla\nu(a)\|_{L^{2}}\geq
c_{0}|\nu(a)-\nu(0)|^{\alpha},$
where $\|\cdot\|_{L^{2}}$ is taken for $\nabla\nu=(Q,R)\in W^{k,\gamma}(M)$
and $c_{0}>0$ is some small constant.
###### Proof.
We will follow the argument in [32]. By Remark 4.6, $W_{0}={\rm ker}(H)$ is
finitely dimensional. Then both of $W_{0}={\rm ker}(H)$ and
$W^{\perp}=\\{a\in W^{k+4,\gamma}(M)|~{}(a,b)_{\theta}=0,~{}\forall b\in
W_{0}\\}$
are closed sets of $W^{k+4,\gamma}(M)$. Since $H_{2}$ is elliptic, there is a
constant $C>0$ such that
(5.2) $\displaystyle\parallel H(\eta)\parallel_{L^{2}}\geq
C\parallel\eta\parallel_{L^{2}_{4}},~{}\forall~{}\eta\in W^{\perp}.$
Consider the project map,
$\Phi={\rm pr}_{W^{\perp}}\nabla\nu:\mathcal{U_{\epsilon}}\to W^{\perp}.$
Then $\Phi$ is analysis and it satisfies that
$\displaystyle\Phi(0,0)=0,D_{(0,0)}\Phi={\rm pr}_{W^{\perp}}\circ H.$
Thus
$D_{(0,0)}\Phi(\cdot):0\oplus W^{\perp}\to 0\oplus W^{\perp}$
is an isomorphic. By the implicity function theorem, there is a neighborhood
$U$ of $0$ in $W_{0}$ and a map $G(x):U\to W^{\perp}$ such that
$\nabla\nu(x+G(x))\in W_{0},~{}\forall~{}x\in U.$
Define a functional on $U$ by
$F(x)=\nu(x+G(x)).$
Then for any $x\in U$, $z\in W_{0}$, we have
$\frac{dG(x+tz)}{dt}|_{t=0}\in W^{\perp}.$
It follows that
$\displaystyle\frac{dF(x+tz+G(x+tz))}{dt}|_{t=0}$
$\displaystyle=(z+\frac{dG(x+tz)}{dt}|_{t=0},\nabla\nu(x+G(x)))_{\theta}$
$\displaystyle=(z,\nabla\nu(x+G(x)))_{\theta}$
Thus
$\nabla F(x)=\nabla\nu(x+G(x))\in W_{0},~{}\forall x\in U.$
Since $F(x)$ is analytic, by the classic Lojasiewicz inequality on $W_{0}$
(cf. [8, 32]), there is an $\alpha\in[\frac{1}{2},1)$ such that
$\displaystyle|\nabla\nu(x+G(x))|_{L^{2}}\geq c_{1}|\nabla\nu(x+G(x))|$ (5.3)
$\displaystyle\geq c_{2}|\nu(x+G(x))-\nu(0)|^{\alpha},~{}\forall~{}|x|<<1.$
By Definition 3.8, we have
$\|H_{(\psi,\chi)}\|_{C^{k,\gamma}}\leq
C,~{}\forall~{}(\psi,\chi)\in\mathcal{V}_{\epsilon}.$
Moreover,
(5.4) $\displaystyle\|H-H_{(\psi,\chi)}\|_{C^{k,\gamma}}<<1,~{}{\rm
as~{}long~{}as}~{}\|(\psi,\chi)\|_{C^{k+4,\gamma}}<<1.$
For any $a=(\psi,\chi)\in\mathcal{V}_{\epsilon}$, we write $a=x+G(x)+y$ for
some $y\in W^{\perp}$. Thus there exists a small $\epsilon$ such that for any
$a=(\psi,\chi)\in\mathcal{V}_{\epsilon}$ it holds
$\displaystyle\nabla\nu(a)$ $\displaystyle=\nabla\nu(x+G(x)+y)$
$\displaystyle=\nabla\nu(x+G(x))+\int_{0}^{1}\delta_{y}\nabla\nu(x+G(x)+sy)ds$
$\displaystyle=\nabla\nu(x+G(x))+\delta_{y}\nabla\nu(x+G(x))+\int_{0}^{1}[\delta_{y}\nabla\nu(x+G(x)+sy)-\delta_{y}\nabla\nu(x+G(x))]ds$
$\displaystyle=\nabla
F(x)+\delta_{y}\nabla\nu(0)+\int_{0}^{1}[\delta_{y}\nabla\nu(x+G(x)+sy)-\delta_{y}\nabla\nu(x+G(x))]ds+o(\parallel
y\parallel_{W^{2}_{4}})$ (5.5) $\displaystyle=\nabla F(x)+H(y)+o(\parallel
y\parallel_{W^{2}_{4}}).$
Since $\nabla F(x)$ is perpendicular to $H(y)$ with respect to
$(\cdot,\cdot)_{\theta}$, and $H$ is nondegenerate on $W^{\perp}$ by (5.2), we
get
(5.6) $\displaystyle\|\nabla\nu(a)\|^{2}_{L^{2}}\geq\|\nabla
F(x)\|^{2}_{L^{2}}+c_{3}\|y\|^{2}_{W^{2}_{4}},$
where $c_{3}>0$ is some small constant.
Similarly, by (5.4), we have
$\displaystyle\nu(a)$ $\displaystyle=\nu(x+G(x)+y)$
$\displaystyle=\nu(x+G(x))+\int_{0}^{1}<\nabla\nu(x+G(x)+sy),y>ds$
$\displaystyle=\nu(x+G(x))+\frac{1}{2}<\delta_{y}\nabla\nu(x+G(x)+y),y>$
$\displaystyle+\int_{0}^{1}\int_{0}^{1}s<\delta_{y}\nabla\nu(x+G(x)+sty)-\delta_{y}\nabla\nu(x+G(x)+y),y>dtds$
$\displaystyle=F(x)+\frac{1}{2}<H(y),y>$
$\displaystyle+\int_{0}^{1}\int_{0}^{1}s<\delta_{y}\nabla\nu(x+G(x)+sty)-H(y),y>dtds+o(\parallel
y\parallel_{W^{2}_{4}}^{2})$ (5.7)
$\displaystyle=F(x)+\frac{1}{2}<H(y),y>+o(\parallel
y\parallel_{W^{2}_{4}}^{2}).$
Notice that
$\displaystyle|<H(y),y>|$ $\displaystyle\leq\parallel
y\parallel_{L^{2}}|\parallel H(y)\parallel_{L^{2}}$ $\displaystyle\leq
C_{1}\parallel y\parallel_{L^{2}}\parallel y\parallel_{C^{k+4,\gamma}}$
$\displaystyle\leq C_{2}\parallel y\parallel_{L^{2}}^{2}$ $\displaystyle\leq
C\parallel y\parallel_{W^{2}_{4}}^{2}.$
It follows that
(5.8) $\displaystyle|\nu(a)-\nu(0)|\leq|F(x)-F(0)|+C\parallel
y\parallel_{W^{2}_{4}}^{2}.$
Hence combining (5.6) and (5.8) together with (5), we obtain
$\displaystyle\parallel\nabla\nu(a)\parallel_{L^{2}}^{2}$ $\displaystyle\geq
c_{2}|F(x)-F(0)|^{2\alpha}+c_{3}\parallel y\parallel_{W^{2}_{4}}^{2}$
$\displaystyle\geq c_{4}(|F(x)-F(0)|+\parallel
y\parallel_{W^{2}_{4}}^{2})^{2\alpha}$ $\displaystyle\geq
c_{0}|\nu(a)-\nu(0)|^{2\alpha}.$
This proves (5.1).
∎
Recall the operator $\mathcal{N}(\cdot)$ in (3.8) from ${\rm Sym}^{2}(T^{*}M)$
to itself. Then we can rewrite (3.5) as
$(\nabla\nu(a_{0}),(\psi,\chi))_{\theta}=-\frac{1}{2}(\mathcal{N}(L(a_{0})),DL_{a_{0}}((\psi,\chi)))_{L^{2}(L(a_{0}))},~{}\forall~{}a_{0}\in\mathcal{U}_{\epsilon}.$
Thus there is a dual operator $(DL_{a_{0}})^{*}$ of $DL_{a_{0}}$ with respect
to the inner product $(\cdot,\cdot)_{\theta}$ such that
$((DL_{a_{0}})^{*}\mathcal{N}(L(a_{0})),(\psi,\chi))_{\theta}=(\mathcal{N}(L(a_{0}),DL_{a_{0}}((\psi,\chi)))_{L^{2}(L(a_{0}))}.$
As a consequence, we have
$\nabla\nu(a_{0})=-\frac{1}{2}(DL_{a_{0}})^{*}\mathcal{N}(L(a_{0})).$
Hence,
(5.9)
$\displaystyle(\nabla\nu(a_{0}),\nabla\nu(a_{0}))_{\theta}=\frac{1}{4}(\mathcal{N}(L(a_{0}),DL_{a_{0}}(DL_{a_{0}})^{*}\mathcal{N}(L(a_{0})))_{L^{2}(L(a_{0}))}.$
The following is a generalization of Lemma 3.6.
###### Lemma 5.2.
Let $k>2$ be an integer, and $\epsilon$ a small constant. Then there exists a
constant $C=C(\epsilon)>0$ such that
(5.10)
$\displaystyle((DL_{a})^{*}\mathcal{N}(L(a)),(DL_{a})^{*}\mathcal{N}(L(a)))_{\theta}\leq
C(\mathcal{N}(L(a),\mathcal{N}(L(a))))^{\gamma}_{L^{2}(L(a))},~{}\forall
a\in\mathcal{V}_{\epsilon}.$
Here $\gamma=\frac{k-2}{k-1}<1$.
###### Proof.
Let $S=(DL_{a})^{*}(DL_{a})$ be an operator on the Hilbert space
$\mathcal{H}=\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\times L^{2}(M),$
whose domain $D(S)$ contains $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\times
C^{\infty}(M)$. As same as the operator in (3.15), $S$ is a self-adjoint
fourth-order non-negative elliptic operator. Thus by the spectral theorem, for
integer $k>0$, $x\in D(S)$, it holds
(5.11)
$\displaystyle(S^{k}x,x)_{\theta}=\int_{0}^{\infty}\lambda^{k}dE_{x,x}(\lambda).$
By the Hölder inequality and (5.11) we get
(5.12)
$\displaystyle(S^{2}x,x)_{\theta}\leq(Sx,x)_{\theta}^{\frac{k-2}{k-1}}(S^{k}x,x)_{\theta}^{\frac{1}{k-1}}.$
For any $a\in\mathcal{V}_{\epsilon}$, we decompose $\mathcal{N}(L(a))$ into
(5.13) $\displaystyle\mathcal{N}(L(a))=DL_{a}x+y,$
where $x\in\mathcal{H}^{0,1}(M,T^{1,0}M)\times C^{\infty}(M)$ and $y\in{\rm
Im}(DL_{a})^{\perp}$. Since
$(z,(DL_{a})^{*}(y))_{\theta}=(DL_{a}(z),y)_{L^{2}(L(a))}=0,~{}\forall~{}z\in\mathcal{H}^{0,1}(M,T^{1,0}M)\times
C^{\infty}(M),$ $(DL_{a})^{*}(y)=0.$
Thus by (5.12) and the fact that $S$ is self-adjoint, we have
$\displaystyle((DL_{a})^{*}\mathcal{N}(L(a)),(DL_{a})^{*}\mathcal{N}(L(a)))_{\theta}$
$\displaystyle=((DL_{a})^{*}DL_{a}x,(DL_{a})^{*}DL_{a}x)_{\theta}$
$\displaystyle=(Sx,Sx)_{\theta}$ $\displaystyle=(S^{2}x,x)_{\theta}$
$\displaystyle\leq(Sx,x)_{\theta}^{\gamma}(S^{k}x,x)_{\theta}^{1-\gamma}$
$\displaystyle=(DL_{a}x,DL_{a}x)_{L^{2}(L(a))}^{\gamma}(S^{k}x,x)_{\theta}^{1-\gamma}$
(5.14)
$\displaystyle\leq\|\mathcal{N}(L(a)))\|_{L^{2}(L(a))}(S^{k}x,x)_{\theta}^{1-\gamma}.$
On the other hand,
$\displaystyle(S^{k}x,x)_{\theta}$ $\displaystyle=(S^{k-1}x,Sx)_{\theta}$
$\displaystyle=(S^{k-2}(DL_{a})^{*}DL_{a}x,(DL_{a})^{*}DL_{a}x)_{\theta}$
$\displaystyle=(S^{k-2}(DL_{a})^{*}\mathcal{N}(L(a)),(DL_{a})^{*}\mathcal{N}(L(a)))_{\theta}.$
Then
(5.15) $\displaystyle(S^{k}x,x)_{\theta}^{1-\gamma}\leq C,$
as long as $a\in\mathcal{V}_{\epsilon}$. Hence, combining (5) and (5.15), we
derive (5.10). ∎
###### Remark 5.3.
In order to apply the spectral theorem, the fourth-order operator $S$ should
be self-adjoint as in (3.15). In the other words, we shall define the domain
$D(S)$ of S. By decomposing $S$ into
$S(\varphi,\chi)=(S_{11}\varphi+S_{12}\chi,S_{21}\varphi+S_{22}\chi),$
it suffices to consider the domains $D(S_{12})$ and $D(S_{22})$. On the other
hand, by (3.15),
$S_{22}=(\sqrt{-1}\partial_{J_{\varphi}}\bar{\partial}_{J_{\varphi}})^{*}(\sqrt{-1}\partial_{J_{\varphi}}\bar{\partial}_{J_{\varphi}})$
is a fourth-order elliptic self-adjoint operator. Thus
$D(S_{22})=W^{2}_{4}(M)$. Note that $S_{12}$ is a second order operator.
Hence,
$D(S)=\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\times W^{2}_{4}(M)$
and so $S$ is self-adjoint on $D(S)$.
###### Corollary 5.4.
There are constant $c_{0}>0$ and number $\alpha^{\prime}\in(\frac{1}{2},1)$
such that
(5.16) $\displaystyle\|\mathcal{N}(L(a))\|_{L^{2}(L(a))}\geq
c_{0}\|\lambda(L(a))-\lambda(L(0))\|^{\alpha^{\prime}},\forall
a\in\mathcal{V}_{\varepsilon}.$
###### Proof.
By (5.9), Lemma 5.2 and Proposition 5.1, we have
$\displaystyle\|\mathcal{N}(L(a))\|_{L^{2}(L(a))}$ $\displaystyle\geq
C\|\nabla\nu(a)\|_{L^{2}}^{\frac{1}{\gamma}}$ $\displaystyle\geq
C\|\nu(a)-\nu(0)\|^{\frac{\alpha}{\gamma}}$
$\displaystyle=C\|\lambda(L(a))-\lambda(L(0))\|^{\frac{\alpha}{\gamma}}.$
Set $\alpha^{\prime}=\frac{\alpha}{\gamma}$. Then
$\alpha^{\prime}\in(\frac{1}{2},1)$ when $k>>1$. Hence, (5.16) is true. ∎
## 6\. Proof of Theorem 0.1
In this section, we prove Theorem 0.1. Let $\widetilde{f}(t)$ be the minimizer
of $W$-functional as in (3.5) for the solution $\widetilde{g}(t)$ of KR flow
(0.1). Let $X(t)$ be a family of gradient vector fields defined by
$X(t)=\frac{1}{2}{\rm grad}_{\widetilde{g}(t)}\widetilde{f}(t),$
which generates a family of differential transformations $F(t)\subseteq{\rm
Diff}(M)$. Then $g(t)=F(t)^{*}\widetilde{g}(t)$ is a solution of the following
modified Ricci flow,
(6.1) $\displaystyle\frac{\partial g(t)}{\partial t}=-{\rm
Ric}(g(t))+g(t)+{\rm Hess}_{t}(f(t)),$
where $f(t)=F(t)^{*}\widetilde{f}(t)$ is the minimizer of $W$-functional for
${g}(t)$. It follows that
(6.2) $\displaystyle\|\dot{g}(t)\|_{L^{2}(t)}=\|\mathcal{N}(t)\|_{L^{2}(t)}.$
Here $\mathcal{N}(t)={\rm Ric}(g(t))-g(t)+{\rm Hess}_{t}(f(t))$ just as one in
(3.8).
Let $\omega(t)=F(t)^{*}\widetilde{\omega}(t)$. Then $\omega(t)$ is just the
Kähler form of $g(t)$. Thus by (6.1), we get
$\displaystyle\frac{d\omega(t)}{dt}=-{\rm
Ric}(\omega(t))+\omega(t)+\sqrt{-1}\partial_{J(t)}\bar{\partial}_{J(t)}(f(t))$
and
(6.3) $\displaystyle\omega(t)(\cdot,\frac{dJ(t)}{dt})=D_{t}f(t),$
where $D_{t}f$ denotes the anti-Hermitian part of ${\rm Hess}(f)$. Hence,
$\displaystyle\|\dot{J}(t)\|_{L^{2}(t)}$
$\displaystyle=\|D_{t}f(t)\|_{L^{2}(t)}$
$\displaystyle\leq\|\mathcal{N}(t)\|_{L^{2}(t)}$ (6.4)
$\displaystyle=\|\dot{g}(t)\|_{L^{2}(t)}.$
We first prove the following convergence theorem.
###### Theorem 6.1.
There exists a small $\epsilon$ such that for any
$(\tau,\chi)\in\mathcal{V}_{\epsilon}$ with $\psi_{\tau}=\sum\tau_{i}e_{i}\in
Z$ and $\xi(\chi)=0$ the flow (6.1) with the initial metric $g=L(\tau,\chi)$
converges smoothly to a KR soliton $(M,J_{\infty},g_{\infty})$. Moreover, the
convergence is fast in the polynomial rate.
###### Proof.
We need to prove that the normalized flow $g(t)$ of (6.1) is uniformly bounded
in $C^{k+2,\gamma}$-norm. Fix a small number $\delta_{0}$ we consider
(6.5) $\displaystyle
T=T_{\tau,\chi}=\sup\\{t|~{}\|g(t)-g_{KS}\|_{C^{k+2,\gamma}}<\delta_{0},~{}\|J(t)-J_{0}\|_{C^{k+2,\gamma}}<\delta_{0}\\}.$
Then it suffices to show that $T=\infty$. By the stability of Ricci flow for
the short time, $T_{\tau,\chi}\geq T_{0}>0.$ In fact, for the KR flow (6.1),
$T_{0}$ can be made any large as long as $\tau$ and $\chi$ are small enough.
By the Kuranishi theorem for the completeness of deformation space of complex
structures [25], for any $t<T$, there is a $K(t)\in{\rm Diff(M)}$ closed to
the identity such that
(6.6) $\displaystyle
K(t)^{*}J(t)=J_{\varphi_{t}},~{}\varphi_{t}=\Phi(t)=~{}\Phi(\psi_{t})$
for some $\psi_{t}\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ with
$\|\psi_{t}\|<\epsilon_{0}$, where $\epsilon_{0}=\epsilon$ as chosen in (2.6)
and (5.16) in Corollary 5.4. In fact, by the construction of $K(t)$ in [25,
Theorem 3.1], we have the estimate
$\displaystyle\|\psi_{t}\|_{L^{2}(M)}=O(\|\varphi_{t}\|_{L^{2}(M)})\leq\epsilon_{0},$
(6.7) $\displaystyle
K(t)^{*}\omega(t)=(1+O(\|\varphi_{t}\|_{L^{2}(M)}))\omega(t).$
Thus there is a smooth function $\chi_{t}$ such that
(6.8)
$\displaystyle\omega_{K(t)^{*}g(t)}=K(t)^{*}\omega(t)=\omega_{KS}+\sqrt{-1}\partial_{J_{\varphi_{t}}}\bar{\partial}_{J_{\varphi_{t}}}\chi_{t}.$
Here $\chi_{t}$ can be normalized by
$\int_{M}\chi_{t}\omega_{KS}^{n}=0.$
It follows that
$\displaystyle\|\Delta_{g_{KS}}\chi_{t}\|_{C^{k+2,\gamma}}$ $\displaystyle\leq
2\|\Delta_{g_{\psi_{t},0}}\chi_{t}\|_{C^{k+2,\gamma}}$ $\displaystyle=2\|{\rm
trace}_{\omega_{KS}}(K(t)^{*}\omega(t))-n\|_{C^{k+2,\gamma}}$ (6.9)
$\displaystyle\leq 2\|(1+\delta_{1}){\rm
trace}_{g_{KS}}(g(t))-n\|_{C^{k+2,\gamma}}\leq\delta_{2}(\delta_{0})<<1.$
Hence, we get
(6.10) $\displaystyle\|\chi_{t}\|_{C^{k+4,\gamma}(M)}\leq\epsilon_{0}$
as long as $\delta_{2}$ is chosen small enough. Note that
$\|\mathcal{N}(g)\|_{L^{2}(g)}$ is invariant under the action of ${\rm
Diff}(M)$. Therefore, by Corollary 5.4, we obtain the following Lojasiewicz
inequality,
(6.11)
$\displaystyle\|\mathcal{N}(g(t))\|_{L^{2}(g(t))}=\|\mathcal{N}(L(\psi_{t},\chi_{t}))\|_{L^{2}(L(\psi_{t},\chi_{t}))}\geq
c_{0}\|\lambda(g(t))-\lambda(g_{KS})\|^{\alpha},$
where $\alpha\in(\frac{1}{2},1)$.
Note that $\widetilde{g}(t)$ are all $K_{X}$-invariant for any $t\geq 0$. Then
by Proposition 4.11, we have
$\displaystyle\lambda(\widetilde{g}(t))\leq\lambda(g_{KS}),~{}t>0.$
and so,
(6.12) $\displaystyle\lambda(g(t))\leq\lambda(g_{KS}),~{}t>0.$
Thus by (6.1), for any $\beta>2-\frac{1}{\alpha}$, we get
$\displaystyle\frac{d}{dt}[\lambda(g_{KS})-\lambda(g(t))]^{1-(2-\beta)\alpha}$
$\displaystyle=-(1-(2-\beta)\alpha)[\lambda(g_{KS})-\lambda(g(t))]^{-(2-\beta)\alpha}\frac{d}{dt}\lambda(g(t))$
(6.13)
$\displaystyle=-\frac{(1-(2-\beta)\alpha)}{2}[\lambda(g_{KS})-\lambda(g(t))]^{-(2-\beta)\alpha}\int_{M}<\mathcal{N}(t),\mathcal{N}(t)>e^{-f_{t}}\omega_{t}^{n}.$
By (6.11), it follows that
$\displaystyle\frac{d}{dt}[\lambda(g_{KS})-\lambda(g(t))]^{1-(2-\beta)\alpha}$
$\displaystyle\leq-C(\int_{M}<\mathcal{N}(t),\mathcal{N}(t)>e^{-f_{t}}\omega_{t}^{n})^{\frac{\beta}{2}}$
$\displaystyle=-C\parallel\dot{g}(t)\parallel^{\beta}_{L^{2}(t)}.$
As a consequence,
(6.14)
$\displaystyle\int_{t_{1}}^{t_{2}}\parallel\dot{g}(t)\parallel^{\beta}_{L^{2}(t)}dt$
$\displaystyle\leq
C(\beta)[\lambda(g_{KS})-\lambda(g(t_{1}))]^{1-(2-\beta)\alpha}$
Hence, for any $(\tau,\chi)\in\mathcal{V}_{\epsilon}$, we prove
$\int_{1}^{T}\|\dot{g}(t)\|_{L^{2}(t)}^{\beta}dt\leq
C(\beta)[\lambda(g_{KS})-\lambda(g(0))]^{1-(2-\beta)\alpha}\leq\delta_{3}(\epsilon).$
Similarly, it also holds
$\int_{1}^{T}\|\dot{J}(t)\|_{L^{2}(t)}^{\beta}dt<\delta_{4}(\epsilon).$
By (6) and (6.11), we see that
$\frac{d}{dt}[\lambda(g_{KS})-\lambda(g(t))]^{1-(2-\beta)\alpha}\leq-C^{\prime}(\lambda(g_{KS})-\lambda(g(t)))^{\alpha\beta}.$
Then
$\frac{d}{dt}[\lambda(g_{KS})-\lambda(g(t))]^{1-2\alpha}\geq C>0.$
It follows that
(6.15) $\displaystyle\lambda(g_{KS})-\lambda(g(t))\leq
C^{\prime\prime}(t+1)^{-\frac{1}{2\alpha-1}}.$
On the other hand, by the interpolation inequalities for tensors, for
$\beta\in(2-\frac{1}{\alpha},1)$ and any integer $p\geq 1$, there exists
$N(p)$ which is independent of $t$, such that
$\displaystyle\|\dot{g}(t)\|_{L^{2}_{p}(t)}$ $\displaystyle\leq
C(p)\|\dot{g}(t)\|^{\beta}_{L^{2}(t)}\||\mathcal{N}(t)|^{1-\beta}_{L^{2}_{N(p)}(t)}$
$\displaystyle\leq
C(p)\parallel\dot{g}(t)\parallel^{\beta}_{L^{2}(t)},~{}\forall~{}t<T.$
Similarly, we have
(6.16) $\displaystyle\|\dot{J}(t)\|_{L^{2}_{p}(t)}\leq
C(p)\parallel\dot{J}(t)\parallel^{\beta}_{L^{2}(t)},~{}\forall~{}t<T.$
Hence, by (6.14) and (6.15), we derive
$\displaystyle\parallel g(t_{1})-g(t_{2})\parallel_{C^{k+2,\gamma}}$
$\displaystyle\leq\int_{t_{1}}^{t_{2}}\parallel\dot{g}(t)\parallel_{C^{k+2,\gamma}}$
$\displaystyle\leq
C\int_{t_{1}}^{t_{2}}\parallel\dot{g}(t)\parallel_{L^{2}_{p}(t)}$
$\displaystyle\leq
C\int_{t_{1}}^{t_{2}}\parallel\dot{g}(t)\parallel^{\beta}_{L^{2}(t)}$
$\displaystyle\leq
C(\beta)[\lambda(g_{KS})-\lambda(g(t_{1}))]^{1-(2-\beta)\alpha}$ (6.17)
$\displaystyle\leq
C(\beta)(t_{1}+1)^{-\frac{1-(2-\beta)\alpha}{2\alpha-1}},~{}\forall~{}t_{2}>t_{1}.$
Therefore, we can choose a large $T_{0}$ such that
$\|g(t)\|_{C^{k+2,\gamma}}<\delta_{0},~{}\forall~{}t\geq T_{0}.$
Similarly we can use (6) and (6.16) to prove that
(6.18) $\displaystyle\|J(t)\|_{C^{k+2,\gamma}}<\delta_{0}.~{}\forall~{}t\geq
T_{0}.$
As a consequence, we prove that $T=\infty$. Furthermore, we can show that the
limit of $g(t)$ is a KR soliton by (6.2) (cf. [37, 38]). The convergence speed
comes from (6).
∎
###### Remark 6.2.
By (6.15) and a result of Dervan-Székelyhidi [11] (also see [45]), we know
that
(6.19) $\displaystyle\sup_{\omega_{g}\in 2\pi
c_{1}(M,J_{\psi_{\tau}})}\lambda(g)=\lim_{t}\lambda(g(t))=\lambda(g_{KS}).$
In particular, (6.12) holds for KR flow (0.1) with any initial metric in $2\pi
c_{1}(M,J_{\psi_{\tau}})$. Thus the condition $\xi(\chi)=0$ can be removed in
Theorem 6.1 according to the above proof 333The convergence part also comes
from the Hamilton-Tian conjecture and the uniqueness result in [16, 45]. .
We also remark that the limit complex structure $J_{\infty}$ in Theorem 6.1
may be different with the original one $J_{\psi_{\tau}}$. But the soliton VF
of $(M_{\infty},J_{\infty})$ must be conjugate to $X$. In fact, we have the
following analogy of [46, Proposition 5.10] for the uniqueness of soliton VFs
.
###### Lemma 6.3.
There is a small $\delta_{0}$ such that for any KR soliton
$(M,J^{\prime},g_{KS}^{\prime})$ with
(6.20) $\displaystyle{\rm
dist}_{CG,C^{3}}((M^{\prime},g_{KS}^{\prime}),(M,g_{KS}))\leq\delta_{0},$
$X$ can be lifted to a HVF on $(M,J^{\prime})$ so that it is a soliton VF of
$(M,J^{\prime},g_{KS}^{\prime})$. Moreover,
(6.21) $\displaystyle\lambda(g_{KS}^{\prime})=\lambda(g_{KS}),$
###### Proof.
As in the second proof of Proposition 4.11, by the partial $C^{0}$-estimate,
one can embed any KR soliton $(M,J^{\prime};\omega_{KS}^{\prime},X^{\prime})$
with satisfying (6.20) into an ambient projection space $\mathbb{C}P^{N}$.
Then the lemma turns to prove that there is some $\sigma\in{\rm
U}(N+1,\mathbb{C})$ such that
$X^{\prime}=\sigma\cdot X\cdot\sigma^{-1}.$
Thus one can use the argument in [46, Proposition 5.10] to get the compactness
of soliton VFs in ${\rm sl}(N+1,\mathbb{C})$ and prove the lemma by the
uniqueness result of soliton VFs [46, Proposition 2.2].
On the other hand, by (6.20), there is a $F\in{\rm Diff(M)}$ such that
$\|F^{*}J^{\prime}-J_{0}\|_{C^{3}}\leq\delta_{0}^{\prime}.$
Then by the Kuranishi’s theorem, there are $K\in{\rm Diff(M)}$ and
$\tau^{\prime}\in B(\epsilon)$ such that
$K^{*}(F^{*}J^{\prime})=J_{\psi_{\tau^{\prime}}}.$
Thus, we may assume that $(M,\omega_{KS}^{\prime})$ is a KR soliton with
respect to $J^{\prime}=J_{\psi_{\tau^{\prime}}}$. Since both of
$\theta_{X}(\omega_{KS}^{\prime})$ and $\theta_{X}(\omega_{KS})$ are
minimizers of the $W$-functional respect to $\omega_{KS}^{\prime}$ and
$\omega_{KS}$, by (4.19)-(4.21) in Section 4, we obtain
$\lambda(g_{KS}^{\prime})=W(g_{KS}^{\prime},-\theta_{X}(\omega_{KS}^{\prime}))=W(g_{KS},-\theta_{X}(\omega_{KS}))=\lambda(g_{KS}).$
∎
By Lemma 6.3, we can finish the proof of Theorem 0.1.
###### Proof of Theorem 0.1.
By the uniqueness of limits of KR flow [16, 45], we may assume that
$\widetilde{\omega}_{0}=g=L(\tau,\chi)$ with
$(\tau,\chi)\in\mathcal{U}_{\epsilon}$ and $\xi(\chi)=0$. Thus the convergence
part of theorem comes from Theorem 6.1. Moreover, by Lemma 6.3, $X$ can be
lifted to a HVF on $(M,J_{\infty})$ so that it is a soliton VF of
$(M,J_{\infty},g_{\infty})$ and (0.2) is satisfied. (0.2) also comes from
(6.15) as well as the convergence speed of $g(t)$ with the polynomial rate
comes from (6).
∎
## 7\. Applications of Theorem 0.1
In this section, we first prove Theorem 0.2. Recall that a special
degeneration on a Fano manifold $M$ is a normal variety $\mathcal{M}$ with a
$\mathbb{C}^{*}$-action which consists of three ingredients [34]:
1. (1)
an flat $\mathbb{C}^{*}$-equivarant map $\pi:\mathcal{M}\to\mathbb{C}$ such
that $\pi^{-1}(t)$ is biholomorphic to $M$ for any $t\neq 0$;
2. (2)
an holomorphic line bundle $\mathcal{L}$ on $\mathcal{M}$ such that
$\mathcal{L}|_{\pi^{-1}(t)}$ is isomorphic to $K_{M}^{-r}$ for some integer
$r>0$ and any $t\neq 0$;
3. (3)
a center $M_{0}=\pi^{-1}(t)$ which is a $Q$-Fano variety.
The following definition can be found in [47] (also see [42, 3, 10], etc.).
###### Definition 7.1.
A Fano manifold $M$ is modified $K$-semistable with respect to a HVF $X$ in
$\eta(M)$ if the modified Futaki-invariant $F(\cdot)\geq 0$ for any special
degeneration $\mathcal{M}$ associated to a 1-ps $\sigma_{t}$ induced by a
$\mathbb{C}^{*}$\- action, which communicates with the one-parameter subgroup
$\sigma_{t}^{X}$ associated to the lifting of $X$ on $\mathcal{M}$. In
addition that $F(\cdot)=0$ if only if $\mathcal{M}\cong M\times\mathbb{C}$,
$M$ is called modified $K$-polystable with respect to $X$.
For a Fano manifold $(M,J_{\psi_{\tau}})$ in the deformation space in Theorem
0.1, we introduce
###### Definition 7.2.
A Fano manifold $(M,J_{\psi_{\tau}})$ is called modified $K$-semistable
(modified $K$-polystable) in the deformation space of complex structures on
$(M,J_{0})$ which admits a KR soliton $(g_{KS},X)$ if $X$ can be lifted to a
HVF on $(M,J_{\psi_{\tau}})$ and $(M,J_{\psi_{\tau}})$ is modified
$K$-semistable (modified $K$-polystable) with respect to $X$.
###### Proof of Theorem 0.2.
By Lemma 6.3, the soliton VF on $(M,J_{\psi_{\tau}})$ is conjugate to $X$.
Thus we need to prove the sufficient part since the modified $K$-polystability
is a necessary condition for the existence of KR solitons (cf. [3]).
By Theorem 0.1 and Lemma 6.3, the KR flow $g(t)$ converges smoothly to a KR
soliton $(M,J_{\infty},g_{\infty})$ with respect to $X$ for the initial Kähler
metric $g_{\tau,0}$ on $(M,J_{\psi_{\tau}})$. Then as in the proof of [21,
Lemma 2.1], by the partial $C^{0}$-estimate, there is a large integer $L_{0}$
such that the family of Kähler manifolds $(M,g(t))$ and the limit manifold
$(M,J_{\infty},g_{\infty})$ can be embed into an ambient projection space
$\mathbb{C}P^{N}$ by normal orthogonal bases of $H^{0}(M,K_{M}^{-L_{0}},g(t))$
and the images $\tilde{M}_{t}$ of $(M,g(t))$ converges smoothly to the image
$\tilde{M}_{\infty}$ of $(M,J_{\infty},g_{\infty})$ in $\mathbb{C}P^{N}$. Thus
there is a family of group $\sigma_{t}\in{\rm SL}(N+1,\mathbb{C})$ such that
$\sigma_{t}(\tilde{M}_{t_{0}})=\tilde{M}_{t},~{}\forall t\geq t_{0}.$
Moreover, we may assume that
$\sigma_{t}\cdot\sigma_{s}^{X}=\sigma_{s}^{X}\cdot\sigma_{t},$
by modifying the base of $H^{0}(M,K_{M}^{-L_{0}},g(t))$ after a transformation
in ${\rm SL}(N+1,\mathbb{C})$ (cf. [10]). Here $X$ can be lifted to a HVF in
$\mathbb{C}P^{N}$ such that it is tangent to each $\tilde{M}_{t}$.
Set a reductive subgroup of ${\rm SL}(N+1,\mathbb{C})$ by
$G=\\{\sigma\in{\rm
SL}(N+1,\mathbb{C})|~{}\sigma\cdot\sigma_{s}^{X}=\sigma_{s}^{X}\cdot\sigma\\}.$
Then
$G_{c}=\\{\sigma\in
G|~{}\sigma(\tilde{M}_{\infty})=\tilde{M}_{\infty}\\}\subset{\rm
Aut}_{r}(\tilde{M}_{\infty}),$
where ${\rm Aut}_{r}(\tilde{M}_{\infty})$ is a reductive subgroup of ${\rm
Aut}(\tilde{M}_{\infty})$ which contains $\sigma_{s}^{X}$. Note that
$M_{\infty}$ admits a KR soliton and $X$ is a center of
$\eta_{r}(\tilde{M}_{\infty})$ by [36]. Thus $G_{c}={\rm
Aut}_{r}(\tilde{M}_{\infty})$ is a reductive subgroup of $G$. By GIT, there is
a $\mathbb{C}^{*}$-action in $G$ which induces a smooth degeneration
$\mathcal{M}$ on the Fano manifold $\tilde{M}_{t_{0}}$ with the center
$\tilde{M}_{\infty}$. Clearly, this $\mathbb{C}^{*}$-action communicates with
$\sigma_{s}^{X}$. It follows that the corresponding modified Futaki-invariant
$F(\cdot)=0$ by the fact $\tilde{M}_{\infty}$ admitting a KR soliton. Hence
$\mathcal{M}$ must be a trivial degeneration and we get $M\cong M_{\infty}$.
This proves that $M$ admits a KR soliton.
∎
Let $T$ be a torus subgroup of ${\rm Aut}_{r}(M,J_{0})$ which contains the
soliton VF $X$. Then by Proposition 4.9 and Corollary 4.5, we see that any
$T$-equivalent subspace $H_{X}^{1}(M,J_{0},\Theta)\subset
H^{1}(M,J_{0},\Theta)$ is included in $Z$, which is invariant under ${\rm
Aut}_{r}(M,J_{0})$. Thus by Theorem 0.2 we actually prove the following
existence result for KR solitons in the $T$-equivalent deformation space.
###### Corollary 7.3.
Let $(M,J_{0},\omega)$ be a Fano manifold which admits a KR soliton
$(\omega_{KS},X)$. Then there exists a small $\epsilon$-ball
$B_{\epsilon}(0)\subset H_{T}^{1}(M,J_{0},\Theta)$ such that for any
$\psi_{\tau}\in B_{\epsilon}(0)$ the Fano manifold $(M,J_{\psi_{\tau}})$
admits a KR soliton if and only if $(M,J_{\psi_{\tau}})$ is modified
$K$-polystable.
###### Remark 7.4.
By using the deformation theory, Inoue proved the sufficient part of Corollary
7.3 in sense of the GIT-polystability via the group ${\rm Aut}(M,J_{0})$ [19,
Proposition 3.8]. But it is still unknown whether the necessary part is true
in sense of the GIT-polystability [19, Postscript Remark 1].
Next we prove the following uniqueness result for KR-solitons in the closure
of the orbit by diffeomorphisms.
###### Theorem 7.5.
Let $\\{\omega_{i}^{1}\\}$ and $\\{\omega_{i}^{2}\\}$ be two sequences of
Kähler metrics in $2\pi c_{1}(M,J)$ which converge to KR-solitons
$(M_{\infty}^{1},\omega_{KS}^{1})$ and $(M_{\infty}^{2},\omega_{KS}^{2})$ in
sense of Cheeger-Gromov, respectively. Suppose that
(7.1)
$\displaystyle\lambda(\omega_{KS}^{1})=\lambda(\omega_{KS}^{2})=\sup\\{\lambda(\omega_{g^{\prime}})|~{}\omega_{g^{\prime}}\in
2\pi c_{1}(M,J)\\}.$
Then $M_{\infty}^{1}$ is biholomorphic to $M_{\infty}^{2}$ and
$\omega_{KS}^{1}$ is isometric to $\omega_{KS}^{2}$.
Theorem 7.5 generalizes the uniqueness result of Tian-Zhu for KR-solitons [35]
as well as a recent result of Wang-Zhu [45, Theorem 0.4] in sense of
diffeomorphisms orbit where both of ${\rm Aut}_{0}(M_{\infty}^{1})$ and ${\rm
Aut}_{0}(M_{\infty}^{2})$ are assumed to be reductive444In fact, we expect to
generalize Theorem 7.5 for the singular KR-solitons of
$(M_{\infty}^{1},\omega_{KR}^{1})$ and $(M_{\infty}^{2},\omega_{KR}^{2})$ as
in [45, Theorem 6.7], and it is also a generalization of uniqueness result of
Chen-Sun for KE-metrics orbit [8] (also see [23]). We also note that the
assumption (7.1) is necessary according to Pasquier’s counter-example of
horospherical variety [45, Remark 6.5].
Recall [46]
###### Definition 7.6.
Let $(M,J)$ be a Fano manifold. A complex manifold $(M^{\prime},J^{\prime})$
is called a canonical smooth deformation of $(M,J)$ if there are a sequence of
Kähler metrics $\omega_{i}$ in $2\pi c_{1}(M,J)$ and diffeomorphisms
$\Psi_{i}:M^{\prime}\to M$ such that
(7.2) $\displaystyle\Psi_{i}^{*}\omega_{i}\stackrel{{\scriptstyle
C^{\infty}}}{{\longrightarrow}}\omega^{\prime},~{}\Psi_{i}^{*}J\stackrel{{\scriptstyle
C^{\infty}}}{{\longrightarrow}}J^{\prime},~{}{\rm on}~{}M^{\prime}.$
In addition that $J^{\prime}$ is not conjugate to $J$, $J^{\prime}$ is called
a jump of $J$.
Theorem 7.5 is a direct corollary of following convergence result of KR flow
together with the uniqueness result of Han-Li [16] (cf. [45]).
###### Proposition 7.7.
Let $(M^{\prime},J^{\prime})$ be a canonical smooth jump of a Fano manifold
$(M,J)$. Suppose that $(M^{\prime},J^{\prime})$ admits a KR soliton
$\omega_{KS}$ such that
(7.3) $\displaystyle\lambda(\omega_{KS})=\sup\\{\lambda(g)|~{}\omega_{g}\in
2\pi c_{1}(M,J)\\}.$
Then for any initial metric $\widetilde{\omega}_{0}\in 2\pi c_{1}(M,J)$ the
flow $(M,J,\widetilde{\omega}(t))$ of (0.1) is uniformly
$C^{\infty}$-convergent to $(M^{\prime},J^{\prime},\omega_{KS})$.
###### Proof.
By the assumption, there is a sequence of Kähler metrics $\omega_{i}$ in $2\pi
c_{1}(M,J)$ such that
$\lim_{i}{\rm dist}_{CG}((M,\omega_{i}),(M^{\prime},\omega^{\prime}))=0,$
where $\omega^{\prime}\in 2\pi c_{1}(M^{\prime},J^{\prime})$. Note that the KR
flow of (0.1) with the initial $\omega^{\prime}$ converges to the KR soliton
$\omega_{KS}$ [39, 11]. Then by the stability of (0.1) for the finite time,
there is a sequence of $\tilde{\omega}_{i}^{t_{i}}$ such that
$\tilde{\omega}_{i}^{t_{i}}=\omega_{KS}+\sqrt{-1}\partial_{J}\bar{\partial}_{J}\chi_{i}$
and
$\lim_{i}{\rm
dist}_{CG,C^{3}}((M,\tilde{\omega}_{i}^{t_{i}}),(M^{\prime},\omega_{KS}))=0,$
where $\tilde{\omega}_{i}^{t}$ is the solution of flow (0.1) with the initial
metric $\omega_{i}$. It follows that there are diffeomorphisms $\Phi_{i}$ such
that
$\lim_{i}\|\Phi_{i}^{*}J-J^{\prime}\|_{C^{4,\gamma}}=0.$
Thus there are diffeomorphisms $K_{i}$ (cf. (6.6)) such that
$J_{\varphi_{i}}=K_{i}^{*}(\Phi_{i}^{*}J)~{}{\rm
and}~{}\|\varphi_{i}\|_{C^{k+4,\gamma}(M)}<<1,~{}{\rm as}~{}i>>1.$
Hence, as in the proof of Theorem 6.1 555(6.12) always holds by (7.3)., we
conclude that the sequence $\\{g_{i}(t)\\}$ of modified flows of (6.1)
uniformly converges to the soliton flow generated by $\omega_{KS}$. Since the
limit of $g_{i}(t)$ is independent of the initial metrics
$\tilde{\omega}_{i}^{t_{i}}$ [16, 45], each $g_{i}(t)$ must converge to
$\omega_{KS}$. Again by the uniqueness result in [16, 45], we prove the
proposition.
∎
By Proposition 7.7, we in particular prove the following uniqueness result for
the centers of smooth degenerations with admitting KR solitons.
###### Corollary 7.8.
Let $(M,J)$ be a Fano manifold. Suppose there is a smooth degeneration on
$(M,J)$ with its center $(M^{\prime},J^{\prime})$ admitting a KR soliton
$g_{KS}$ which satisfies
(7.4) $\displaystyle\lambda(g_{KS})=\sup\\{\lambda(g)|~{}\omega_{g}\in 2\pi
c_{1}(M,J)\\}.$
Then $(M^{\prime},J^{\prime})$ is unique.
###### Proof.
By Corollary 2.2 and Kuranishi’s completeness theorem [25], there is a smooth
path $\tau(s)\in B(\epsilon)$ $(s<<1)$ such that $g_{0}=g_{KS}$. Then
$g_{\tau(s)}={\omega}(\cdot,J_{\tau(s)}\cdot)$
induces a smooth jump of $(M,J)$ to $(M^{\prime},J^{\prime})$. Here $\omega$
is the Kähler form of $g_{KS}$. Thus the corollary comes from Proposition 7.7
immediately.
∎
## 8\. Generalization of Theorem 0.1
In this section, we generalize the argument in the proof of Theorem 0.1 to
prove Theorem 0.3. We will use a different way to obtain the entropy estimate
(6.12) in the proof of Theorem 6.1. We first consider the special case of
$H_{1}<0$, i.e., the stable case, and prove the jump of KR flow (0.1) to the
KR soliton $(M,J_{0},\omega_{KS})$.
### 8.1. Linearly stable case
###### Theorem 8.1.
Let $(M,J_{0})$ be a Fano manifold which admits a KR soliton $\omega_{KS}\in
2\pi c_{1}(M,J_{0})$. Suppose that for any $\psi\neq 0~{}{\rm
in}~{}\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)$ it holds
(8.1) $\displaystyle H_{1}(\psi)<0.$
Then there exists a small $\epsilon$ such that for any $\tau\in B(\epsilon)$
the flow (6.1) with an initial metric $g=L(\tau,\chi)$ converges smoothly to
the KR soliton $(M,J_{0},\omega_{KS})$. Furthermore, the convergence is fast
in the polynomial rate.
###### Proof.
By the Hamilton-Tian conjecture and the uniqueness result in [16, 45], we need
to prove the convergence of flow $g(t)$ of (6.1) with the initial metric
$g_{\tau}=L(\tau,0)$ for any $\tau\in B(\epsilon)$. Moreover by (8.1), we may
assume that there is $\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ such that
(8.2)
$\displaystyle\|\psi\|=1,\psi_{\tau}=\sum\tau_{i}e_{i}=\tau\psi=\tau(\psi_{1}+\psi^{\prime})$
with the property:
$\displaystyle\|\psi_{1}\|\geq\frac{1}{l}>0,H_{1}(\psi_{1})=-\delta_{1}\psi_{1};$
(8.3) $\displaystyle<H_{1}(\psi^{\prime}),\psi^{\prime}>\leq
0,~{}\|\psi^{\prime}\|\leq 1.$
Here $\delta_{1}\geq 0$. Without loss of generality, $-\delta_{1}$ may be
regarded as the largest negative eigenvalue of $H_{1}$. Thus for any $\chi$
with $\|\chi\|_{C^{4,\gamma}}\leq\tau N_{0}$, where $N_{0}$ is fixed, the
following is true:
$\displaystyle(\psi_{\tau},\chi)=\tau(\psi,\chi^{\prime}),~{}\|\chi^{\prime}\|_{C^{4,\gamma}}\leq
N_{0},$ (8.4)
$\displaystyle\lambda(g_{\tau,\chi})\leq\lambda(g_{KS})-\tau^{2}(\frac{\delta_{1}}{l^{2}}+o(1))<\lambda(g_{KS}).$
Let $T=T_{\tau,0}$ be the set defined as in (6.5) with $\delta_{0}=O(\tau)$.
Let $\tilde{\psi}=\psi_{t}\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ with
$\|\tilde{\psi}\|<\epsilon_{0}=O(\tau)$ defined as in (6.6) such that
$K(t)^{*}J(t)=J_{\tilde{\varphi}},~{}\tilde{\varphi}=\Phi(\tilde{\psi}).$
Then as in (8.2) and (8.1), there is
$\tilde{\psi}_{1}\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ with
$\|\tilde{\psi}_{1}\|\geq\frac{1}{l}$ such that
$\displaystyle\|\tilde{\psi}\|=\tau^{\prime}<\epsilon_{0};$
$\displaystyle\tilde{\psi}=\tau^{\prime}(\tilde{\psi}_{1}+\tilde{\psi}^{\prime}),\|\tilde{\psi}_{1}+\tilde{\psi}^{\prime}\|=1;$
(8.5) $\displaystyle
H_{1}(\tilde{\psi}_{1})=-\delta_{1}^{\prime}\tilde{\psi}_{1}~{}{\rm
and}~{}<H_{1}(\tilde{\psi}^{\prime}),\tilde{\psi}^{\prime}>\leq 0,$
where $\delta_{1}^{\prime}\geq\delta_{1}.$
On the other hand, we may assume that $\omega_{g(t)}$ is same as
$\omega_{KS}$. Otherwise, by Moser’s theorem, there is a diffeomorphism
$\hat{K}(t)\in{\rm Diff(M)}$ such that $\omega_{\hat{g}(t)}=\omega_{KS},$
where $\hat{g}(t)=\hat{K}(t)^{*}g(t)$. Then we can replace $g(t)$ by
$\hat{g}(t)$. Thus, there are $K(t)\in{\rm Diff(M)}$ and $\tilde{\chi}\in
C^{\infty}(M)$ as in (6.8) such that
(8.6)
$\displaystyle\omega_{K(t)^{*}g(t)}==K(t)^{*}\omega_{KS}=\omega_{KS}+\sqrt{-1}\partial_{J_{\tilde{\varphi}}}\bar{\partial}_{J_{\tilde{\varphi}}}\tilde{\chi},~{}\int_{M}\tilde{\chi}\omega_{KS}^{n}=0.$
Moreover, as in (6), we have
$K(t)^{*}\omega_{KS}=(1+O(\|\tilde{\varphi}_{t}\|_{L^{2}(M)}))\omega_{KS}.$
It follows that (cf. (6))
$\|\Delta\tilde{\chi}\|_{C^{4,\gamma}}\leq\tau^{\prime}N_{0}.$
Consequently, by (8.1), we derive
(8.7)
$\displaystyle\lambda(g(t))=\lambda(L{\tilde{\psi},\tilde{\chi}})\leq\lambda(g_{KS})-(\tau^{\prime})^{2}(\frac{\delta_{1}}{l^{2}}+o(1))\leq\lambda(g_{KS}).$
Hence, we can continue the argument in the proof of Theorem 6.1 to show that
the flow (6.1) converges smoothly to a KR soliton
$(M,J_{\infty},\omega_{\infty})$ such that
$\lambda(g_{\infty})=\lambda(g_{KS}).$
Moreover, by (8.7), $\tau^{\prime}$ must go to zero. Therefore, $\tilde{\psi}$
goes to zero and $g_{\infty}$ is same as $g_{KS}$ by the uniqueness of KR
solitons [35].
For a general initial metric in $2\pi c_{1}(M,J_{\tau})$, we only remark how
to get the decay estimate. In fact, we can choose a large $T_{0}$ such that
${\rm dist}_{CG,C^{k}}((M,g(T_{0})),(M,g_{\infty}))\leq\epsilon$
and there is an auto-diffeomorphism $\sigma$ such that
$\|\sigma^{*}J({T_{0}})-J_{0}\|_{C^{k}}\leq\epsilon^{\prime}.$
Then as in (8.6), there is an auto-diffeomorphism $K(T_{0})$ and
$\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ with
$\varphi=\Phi^{\prime}(\psi)$ for the metric $\sigma^{*}g(T_{0})$ such that
$\|\psi\|=\tau<<1~{}{\rm and}\|\Delta\chi\|_{C^{4,\gamma}}\leq\tau N_{0}.$
Hence, by the above argument, the KR flow with the initial metric $g(T_{0})$
converges to $g_{\infty}$ fast in the polynomial rate. The proof is complete.
∎
Theorem 8.1 means that any KR flow with an initial metric in $2\pi
c_{1}(M,J_{\tau})$ with $\tau<<1$ under the condition (7.6) will jump upto the
original KR soliton $(M,J_{0},\omega_{KS})$ and also show that the KR soliton
$(M,J_{0},\omega_{KS})$ is isolated in the deformation space of complex
structures in this case. But upto now, we do not know whether there is such an
example of Fano manifold with admitting an isolated KR soliton around her
deformation space of complex structures.
### 8.2. Linearly semistable case
In this subsection, we generalize Theorem 8.1 with the existence of non-
trivial kernel $Z$ of operator $H_{1}$ to prove Theorem 0.3. Let $K$ be a
maximal compact subgroup of ${\rm Aut}_{r}(M,J_{0})$ which contains $K_{X}$.
Then $(\omega_{KS},J_{0})$ is $K$-invariant [35], and so $\sigma$ maps
$\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ to itself for any $\sigma\in K$. The
latter means that $\sigma(\psi)$ is still $\theta$-harmonic whenever $\psi$ is
$\theta$-harmonic. Thus we can extend the action ${\rm Aut}_{r}(M,J_{0})$ on
$\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ so that
$\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ is an ${\rm
Aut}_{r}(M,J_{0})$-invariant space. Since
$K_{X}\cdot\sigma=\sigma\cdot K_{X},~{}\forall\sigma\in{\rm
Aut}_{r}(M,J_{0}),$
we have
$\mathcal{L}_{\xi}\sigma^{*}\psi=0,~{}\forall~{}\psi\in Z.$
Hence, $Z$ is also an ${\rm Aut}_{r}(M,J_{0})$-invariant subspace of
$\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$. Furthermore, we prove
###### Lemma 8.2.
Suppose that $(M,J_{\psi_{\tau}})$ admits a KR soliton for any $\psi_{\tau}\in
B(\epsilon)\cap Z$. Then
(8.8) $\displaystyle\sigma^{*}{\psi}=\psi_{,}~{}\forall~{}\sigma\in{\rm
Aut}_{r}(M,J_{0}),\psi\in Z.$
###### Proof.
Since the union of maximal tori is dense in a reductive complex group, we need
to prove (8.8) for any torus 1-ps $\sigma_{t}$ and $\psi\in Z$. On the
contrary, there are $\sigma\in{\rm Aut}_{r}(M,J_{0})$ and $\psi\in Z$ such
that $\sigma_{t}=\sigma^{-1}\cdot\rho_{t}\cdot\sigma$ with some nontrivial
weights for $\psi$, where
$\rho_{t}:\mathbb{C}^{*}\mapsto{\rm Aut}_{r}(M,J_{0})$
is a diagonal torus action on $Z$. Since $Z$ is ${\rm
Aut}_{r}(M,J_{0})$-invariant, there is a basis of $Z$,
$\\{e_{1},\ldots,e_{s}\\}$ $(s={\rm dim}Z)$ such that
$\sigma(\psi)=\sum_{i\leq s}e_{i}$ and
$\sigma_{t}(\psi)=\sum_{i}t^{a_{i}}\sigma^{-1}(e_{i}),t\in\mathbb{C}^{*},$
where $a_{i}\in\mathbb{Z}$ are weights of $\sigma_{t}$ with some $a_{i}\neq
0$. Without loss of generality, we may assume $a_{1}>0$.
Now we consider a degeneration of $\rho_{t}(e_{1})$
$(|t|<\epsilon,|e_{1}|<<1)$ in $Z$. Note that
$J_{\rho_{t}^{*}\Phi(e_{1})}=\rho_{t}^{*}J_{\Phi(e_{1})}.$
Then by the Kuranishi theorem, there is a $K_{t}\in{\rm Diff(M)}$ such that
$J_{\Phi(\rho_{t}(e_{1}))}=K_{t}^{*}(\rho_{t}^{*}J_{\Phi(e_{1})}).$
Thus, for any small $t_{1}$ and $t_{2}$ it holds
$(M,J_{\Phi(t_{1}e_{1})})\cong(M,J_{\Phi(t_{2}e_{1})}).$
Hence, the family of $(M,J_{\Phi(te_{1})})$ $(|t|<\epsilon)$ is generated by a
$C^{*}$-action on $(M,J_{\Phi(e_{1})})$, which degenerates to $(M,J_{0})$.
Moreover, it communicates with 1-ps $\sigma_{s}^{X}$ and its modified Futaki-
invariant is zero. Therefore, we get a contradiction with the modified
K-polystability of $(M,J_{\Phi(e_{1})})$ which admits a KR soliton. The proof
is finished.
∎
###### Remark 8.3.
In case of $\omega_{KS}=\omega_{KE}$, $Z=\mathcal{H}^{0,1}(M,T^{1,0}M)$. Then
the property (8.8) turns to hold for any $\sigma\in{\rm
Aut}(M,J_{0}),\psi\in\mathcal{H}^{0,1}(M,T^{1,0}M)$. Thus Lemma 8.2 is
actually a generalization of [6, Theorem 3.1] in the case of KE metrics.
By Lemma 8.2, we prove
###### Lemma 8.4.
Under the assumption in Lemma 8.2, there exists $\delta>0$ such that for any
$(\tau,\chi)\in\mathcal{V}_{\delta}$ it holds
$\lambda(g_{\tau,\chi})\leq\lambda(g_{KS}),$
if $H_{1}(\cdot)\leq 0$ on $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M).$
###### Proof.
Let $\mathfrak{k}$ be the Lie algebra of $K$, and $\eta_{u}$ the nilpotent
part of $\eta(M,J_{0};\mathbb{R})$. Then
$\eta(M,J_{0};\mathbb{R})=\eta_{r}\oplus\eta_{u}=\mathfrak{k}\oplus
J_{0}\mathfrak{k}\oplus\eta_{u}.$
Fix a small ball $U(\epsilon_{0})\subseteq\mathfrak{k}\oplus\eta_{u}$ centered
at the original. By the Kuranishi theorem there exists $\tau^{\prime}\in
B(\epsilon)$ and $\gamma\in{\rm Diff}(M)$ for any $\tau\in
B(\epsilon),(v_{1},v_{2})\in U(\epsilon_{0})$ such that
(8.9)
$\displaystyle(e^{J_{\tau}v_{1}+v_{2}})^{*}J_{\tau}=\gamma^{*}J_{\tau^{\prime}},$
where $J_{\tau}$ and $J_{\tau^{\prime}}$ are complex structures associated to
$\psi_{\tau}$ and $\psi_{\tau^{\prime}}$, respectively. We define a smooth map
$\Phi:U(\epsilon)\times\mathcal{V}_{\epsilon}\mapsto\mathcal{V}_{\epsilon}$ by
$\Phi((v_{1},v_{2}),(\tau,\chi))=(\tau^{\prime},\chi^{\prime}),$
where the Kähler potential $\chi^{\prime}$ is determined by
(8.10)
$\displaystyle(\gamma^{-1})^{*}(e^{J_{\tau}v_{1}+v_{2}})^{*}(\omega+\sqrt{-1}\partial_{J_{\tau}}\bar{\partial}_{J_{\tau}}\chi)=\omega+\sqrt{-1}\partial_{J_{\tau^{\prime}}}\bar{\partial}_{J_{\tau^{\prime}}}\chi^{\prime}~{}{\rm
and}~{}\int_{M}\chi^{\prime}\omega_{KS}=0.$
Let $\Psi:U(\epsilon)\times\mathcal{V}_{\epsilon}\mapsto{\rm ker}(H_{2})$ be a
projection of $\Phi$ such that
$\Psi={\rm Pr}_{{\rm ker}(H_{2})}\circ{\rm Pr}_{2}\circ\Phi.$
Namely,
$\Psi(((v_{1},v_{2})(\tau,\chi)))={\rm Pr}_{{\rm ker}(H_{2})}(\chi^{\prime}).$
A direct calculation shows that
$D_{(0,0)}\Psi((v_{1},v_{2}),0)=\theta_{Y}+\overline{\theta_{Y}},$
where $\theta_{Y}$ is a potential of HVF,
$Y=\frac{1}{2}\sqrt{-1}(v_{1}-\sqrt{-1}J_{0}v_{1})+\frac{1}{2}(v_{2}-\sqrt{-1}J_{0}v_{2}).$
Thus by [40], we see that
$D_{(0,0)}\Psi(\cdot,0):\mathfrak{k}\oplus\eta_{u}\mapsto{\rm ker}(H_{2})$
is an isomorphism. By the implicit function theorem, there are
$\delta<\epsilon$ and map $G:\mathcal{V}_{\delta}\to U(\varepsilon_{0})$ such
that
$\displaystyle{\rm Pr}_{2}\circ\Phi(G(\tau,\chi),(\tau,\chi))\in{\rm
ker}(H_{2})^{\perp}.$
It follows that
(8.11)
$\displaystyle(\tau^{\prime},\chi^{\prime})=\Phi(G(\tau,\chi),(\tau,\chi))\in\mathcal{V}_{\delta^{\prime}},$
where $\chi^{\prime}\in{\rm ker}(H_{2})^{\perp}$ and
$\delta^{\prime}(\delta)<<1.$
Let
$\tilde{\mathcal{V}}_{\epsilon}=\\{(\tau_{0},\widetilde{\chi})\in\mathcal{V}_{\epsilon}|~{}\tau_{0}\in
Z,~{}\xi(\widetilde{\chi})=0\\}.$
Then the restricted map $\widetilde{\Psi}$ of $\Psi$ on
$\mathfrak{k}\times\tilde{\mathcal{V}}_{\epsilon}$ is also smooth and
$D_{(0,0)}\widetilde{\Psi}(\cdot,0):\mathfrak{k}\mapsto\\{\theta_{Y}+\overline{\theta_{Y}}\\}$
is an isomorphic map. Here
$Y=\frac{1}{2}\sqrt{-1}(v-\sqrt{-1}J_{0}v),~{}v\in\mathfrak{k}.$ We claim:
(8.12) $\displaystyle{\rm
ker}(H_{2})\cap\\{\chi|~{}\xi(\chi)=0\\}=\\{\theta_{Y}+\overline{\theta_{Y}}\\}.$
On contrary, there is a nontrivial $v^{\prime}~{}\in\eta_{u}$ such that
$\xi(\theta_{Y^{\prime}}+\overline{\theta_{Y^{\prime}}})=0,$
where $Y^{\prime}=v^{\prime}-\sqrt{-1}J_{0}v^{\prime}$. Then for any
$\sigma\in K_{X}$,
$\sigma^{*}(\theta_{Y^{\prime}}+\overline{\theta_{Y^{\prime}}})=\theta_{Y^{\prime}}+\overline{\theta_{Y^{\prime}}}.$
It follows that
$\sigma^{*}Y^{\prime}=Y^{\prime},~{}\forall~{}\sigma\in K_{X}.$
This implies $Y^{\prime}\in\eta_{r}(M,J_{0})$, which is a contradiction!
By (8.12),
$D_{(0,0)}\widetilde{\Psi}(\cdot,0):\mathfrak{k}\mapsto{\rm
ker}(H_{2})\cap\\{\chi|~{}\xi(\chi)=0\\}$
is an isomorphism. On the other hand, by Lemma 8.4,
$(e^{J_{\tau_{0}}v})^{*}J_{\tau_{0}}=J_{\tau_{0}},~{}\forall~{}\psi_{\tau_{0}}\in
Z,v\in\mathfrak{k}.$
Hence, applying the implicit function theorem to $\widetilde{\Psi}$ at
$(\tau_{0},\widetilde{\chi})\in\tilde{\mathcal{V}}_{\epsilon}$, there are
$v\in\mathfrak{k}$ and Kähler potential $\chi_{0}\in{\rm ker}(H_{2})^{\perp}$
such that $(\tau_{0},\chi_{0})\in\tilde{\mathcal{V}}_{\delta^{\prime}}$ and
$(e^{J_{\tau}v})^{*}(\omega+\sqrt{-1}\partial_{J_{\tau_{0}}}\bar{\partial}_{J_{\tau_{0}}}\widetilde{\chi})=\omega+\sqrt{-1}\partial_{J_{\tau_{0}}}\bar{\partial}_{J{\tau_{0}}}\chi_{0}.$
Note that a Kähler potential $\widetilde{\chi}$ of KR soliton with respect to
$X$ on $(M,J_{\tau_{0}})$ satisfies $\xi(\widetilde{\chi})=0$ [35]. Therefore,
there is a KR soliton
$\omega+\sqrt{-1}\partial_{J_{\tau_{0}}}\bar{\partial}_{J{\tau_{0}}}\chi_{0}$
on $(M,J_{\tau_{0}})$ such that
(8.13) $\displaystyle\chi_{0}\in{\rm ker}(H_{2})^{\perp}~{}{\rm
and}~{}(\tau_{0},\chi_{0})\in\tilde{\mathcal{V}}_{\delta^{\prime}}.$
Decompose $\psi_{\tau^{\prime}}$ in (8.11) as
(8.14)
$\displaystyle\psi_{\tau^{\prime}}=\psi_{\tau_{0}}+\psi_{\tau_{1}},~{}\psi_{\tau_{0}}\in
Z,~{}\psi_{\tau_{1}}\in Z^{\perp}.$
Then by (8.13), there are Kähler potentials $\chi_{0}$ and $\chi_{1}\in{\rm
ker}(H_{2})^{\perp}$ such that
(8.15) $\displaystyle\chi^{\prime}=\chi_{0}+\chi_{1},$
where
$\omega+\sqrt{-1}\partial_{J_{\tau_{0}}}\bar{\partial}_{J{\tau_{0}}}\chi_{0}$
is a KR soliton. Thus, we get the following expansion for the reduced entropy
$\nu$,
(8.16)
$\displaystyle\nu(\tau^{\prime},\chi^{\prime})=\nu(\tau_{0},\chi_{0})+\frac{1}{2}(D^{2}_{(\tau_{0},\chi_{0})+\zeta(\tau_{1},\chi_{1})}\nu)((\tau_{1},\chi_{1}),(\tau_{1},\chi_{1})).$
Here $\zeta\in(0,1)$. Since $D^{2}_{(0,0)}\nu(0,\cdot)$ is strictly negative
on ${\rm ker}(H_{2})^{\perp}$ [40], by the assumption in Lemma 8.4, it is
strictly negative on ${\rm ker}(H_{1})^{\perp}\times{\rm ker}(H_{2})^{\perp}$.
It follows that $D^{2}_{(\tau_{0},\chi_{0})+\zeta(\tau_{1},\chi_{1})}\nu$ is
strictly negative on ${\rm ker}(H_{1})^{\perp}\times{\rm ker}(H_{2})^{\perp}$.
Hence, we derive
(8.17)
$\displaystyle\nu(\tau^{\prime},\chi^{\prime})\leq\nu(\tau_{0},\chi_{0}).$
As a consequence, we prove
$\lambda(g_{\tau,\chi})\leq\lambda(g_{\tau_{0},\chi_{0}})=\lambda(g_{KS}).$
∎
By Lemma 8.4, we can use the argument in the proof of Theorem 6.1 (or Theorem
8.1) to finish the proof of Theorem 0.3. We leave it to the reader.
We end this subsection by the following two remarks to Theorem 0.3.
###### Remark 8.5.
In Theorem 0.3, we can actually prove that the convergence is of polynomial
rate of any order. This is because we can improve the Lojasiewicz inequality
of (5.1) for $\nu(\cdot)$ in Proposition 5.1 as follows: For any
$a=(\varphi,\chi)\in\mathcal{V}_{\epsilon}$ it holds
(8.18) $\displaystyle\|\nabla\nu(a^{\prime})\|_{L^{2}}\geq
c_{0}|\nu(a^{\prime})-\nu(0)|^{\frac{1}{2}},$
where
$a^{\prime}=(\tau^{\prime},\chi^{\prime})\in\mathcal{V}_{\delta^{\prime}}$ is
determined in (8.11). It follows that the Lojasiewicz inequality of (6.11) for
$\lambda(\cdot)$ along the flow holds for any $\alpha^{\prime}>\frac{1}{2}.$
Hence, by (6), the convergence is of polynomial rate of any order. (8.18) can
be proved together with (5) and (5) since the functional $F$ there can vanish
by the decompositions (8.14) and (8.15).
###### Remark 8.6.
We call the KR flow $\widetilde{\omega}(t)$ of (0.1) is stable on
$(M,J_{\psi_{\tau}})$ if it converges smoothly to a KR soliton
$(M_{\infty},J_{\infty},\omega_{\infty})$ with
$\lambda(\omega_{\infty})=\lambda(\omega_{KS})$. In Theorem 0.3, we show that
the flow (0.1) is always stable for any complex structure in the deformation
space under the conditions of (1) and (2). By the above argument (also see
Remark 6.2), it is easy to see that the flow $\widetilde{\omega}(t)$ is stable
on $(M,J_{\psi_{\tau}})$ if and only if the energy level
$L([M,J_{\psi_{\tau}}])$ of flow is equal to $\lambda(\omega_{KS}).$ Here
(8.19) $\displaystyle
L([M,J_{\psi_{\tau}}])=\lim_{t}\lambda(\widetilde{\omega}(t)),$
which is independent of flow $\widetilde{\omega}(t)$ with the initial metric
$\widetilde{\omega}_{0}\in 2\pi c_{1}(M,J_{\psi_{\tau}})$ [38, 11, 45].
## References
* [1] Atiyah, M.F. and Singer, M.I., The index of elliptic operator, III, Ann. of Math. (2) 87 (1968), 546-604.
* [2] Bamler, R., Convergence of Ricci flows with bounded scalar curvature, Ann. Math. 188 (2018), 753-831.
* [3] Berman, R. and Nystrom, D., Complex optimal transport and the pluripotential theory of Kähler-Ricci solitons , arXiv: 1401.8264.
* [4] Calabi, E., Extremal Kähler metric, Seminar on Differential Geometry, pp. 259-290, Ann. of Math. Stud., 102, Princeton Univ. Press, Princeton, N.J., 1982.
* [5] Cao, H.D., Hamilton, S. and Ilmanen, T., Gaussian densities and stability for some Ricci solitons, arXiv:0404165.
* [6] Cao, H.D., Sun, X., Yau, S.T. and Zhang, Y., On deformation of fano manifolds, arXiv:2006.01355.
* [7] Chen, X. and Wang, B., Space of Ricci flows (II)-Part B: Weak compactness of the flows, J. Differential Geom. 116 (2020), 1-123.
* [8] Chen, X. and Sun, S., Calabi flow, geodesic rays, and uniqueness of constant scalar curvature Kähler metrics, Ann. of Math. (2) 180 (2014), no. 2, 407-454.
* [9] Chen, X., Sun S., and Wang B., Kähler-Ricci flow, Kähler-Einstein metric, and K-stability, Geometry and Topology, 22 (2018), 3145-3173.
* [10] Datar, D. and Székelyhidi, G., Kähler-Einstein metrics along the smooth continuity method, Geom. Funct. Anal. 26 (2016), no. 4, 975-1010.
* [11] Dervan, R. and Székelyhidi G., Kähler-Ricci flow and optimal degenerations, J. Differential Geom. 116 (2020), no. 1, 187-203.
* [12] Donaldson, S., Remarks on gauge theory, complex geometry and 4-manifold topology, Fields Medallists’ lectures, 384-403, World Sci. Ser. 20th Century Math., 5, World Sci. Publ., River Edge, NJ, 1997.
* [13] Kuranishi, M., New proof for the existence of locally complete families of complex structures,1965 Proc. Conf. Complex Analysis (Minneapolis, 1964) pp. 142-154 Springer, Berlin.
* [14] Kodaira, K., Complex manifolds and deformation of complex structures, Springer-Verlag, Berlin, 2005. x+465 pp. ISBN: 3-540-22614-1.
* [15] Koiso, N., Einstein metrics and complex structures, Invent. Math. 73 (1983), no. 1, 71-dh106.
* [16] Han, Z. and Li, C., Algebraic uniqueness of Kähler-Ricci flow limits and optimal degenerations of Fano varieties, arXiv: 2009.01010v1.
* [17] Hall S and Murphy T., On the linear stability of Kähler-Ricci solitons, Proc. Amer. Math. Soc. 139 (2011), no. 9, 3327-3337.
* [18] Hall S and Murphy T., Variation of complex structures and the stability of Kähler-Ricci solitons, Pacific J. Math. 265 (2013), no. 2, 441-454.
* [19] Inoue, E., The moduli space of Fano manifolds with Kähler Ricci solitons. Adv. Math. 357 (2019), 106841, 65 pp.
* [20] Li, C., Yau-Tian-Donaldson correspondence for K-semistable Fano manifolds, J. Reine Angew. Math, 733 (2017), 55-85.
* [21] Li, Y., Tian G. and Zhu X.H., Singular limits of Kähler-Ricci flow on Fano $G$-manifolds, arXiv:1807.09167.
* [22] Li, C. and Xu, C., Special test-configurations and K-stability of Fano varieties, Ann. of Math. 180 (2014), no.1, 197-232.
* [23] Li, C. and Xu, C. and Wang X., Quasi-projectivity of the moduli space of smooth Kähler-Einstein Fano manifolds, Ann. Sci. Ec. Norm. Super. (4) 51 (2018), no. 3, 739-772.
* [24] Li, C., Xu, C. and Wang X., On the proper moduli spaces of smoothable Kähler-Einstein Fano varieties, Duke Math. J. 168 (2019), no. 8, 1387-1459.
* [25] Morrow, J. and Kodaira, K., Complex manifolds, AMS Chelsea Publishing, Providence, RI, 2006. x+194 pp. ISBN: 0-8218-4055-X.
* [26] Pasquier, B., On some smooth projective two-orbit varieties with Picard number 1, Math. Ann. 344 (2009), no. 4, 963-987.
* [27] Pali, N., Variational stability of Kähler-Ricci solitons, Adv. Math. 290 (2016), 15-35.
* [28] Pali, N., Concavity of Perelman’s W -functional over the space of Kähler potentials, Eur. J. Math. 3 (2017), no. 3, 587-602.
* [29] Perelman, G., The entropy formula for the Ricci flow and its geometric applications, arXiv:0211159, 2002.
* [30] Rothaus, O., Logarithmic Sobolev inequality and the spectrum of Schördinger operators, J. Funct Anal, 42 (1981), 110-120.
* [31] Rudin, W., Functional analysis, McGraw-Hill, Inc., New York, 1991. xviii+424 pp. ISBN: 0-07-054236-8.
* [32] Sun, S. and Wang, Y., On the Kähler-Ricci flow near a Kähler-Einstein metric, J. Reine Angew. Math. 699 (2015), 143-158.
* [33] Székelyhidi, G., The Kähler-Ricci flow and K-polystability, Amer. J. Math. 132 (2010), no. 4, 1077-1090.
* [34] Tian, G., Kähler-Einstein metrics with positive scalar curvature, Invent. Math. 130 (1997), no. 1, 1-37.
* [35] Tian, G. and Zhu, X. H., Uniqueness of Kähler-Ricci solitons, Acta Math. 184 (2000), no. 2, 271-305.
* [36] Tian, G. and Zhu, X. H., A new holomorphic invariant and uniqueness of Kähler Ricci solitons, Comment. Math. Helv. 77 (2002), no. 2, 297-325.
* [37] Tian, G. and Zhu, X. H., Convergence of the Kähler-Ricci flow, J. Amer Math. Sci. 17 (2007), 675-699.
* [38] Tian, G. and Zhu, X. H., Convergence of the Kähler-Ricci flow on Fano manifolds, J. Reine Angew. Math. 678 (2013), 223-245.
* [39] Tian, G., Zhang, S., Zhang, Z. and Zhu, X. H., Perelman’s entropy and Kähler-Ricci flow an a Fano Manifold, Tran. AMS. 365 (2013), 6669-6695.
* [40] Tian, G. and Zhu, X. H., Perelman’s $W$-functional and stability of Kähler-Ricci flows, Progress in Math., vol 2 (2018), n 1, 1-14; arXiv:0801.3504v2.
* [41] Tosatti, V., The K-energy on small deformations of constant scalar curvature Kähler manifolds, Advances in geometric analysis, 139-147, Adv. Lect. Math. (ALM), 21, Int. Press, Somerville, MA, 2012.
* [42] Xiong M., Kähler-Ricci solitons and generalized Tian-Zhu’s invariant, Internat. J. Math. 25 (2014), no. 7, 1450068, 13 pp.
* [43] Wang, Y., On Ricci solitons and Ricci flows, Thesis (Ph.D.), The University of Wisconsin-Madison. 2011. 91 pp.
* [44] Wang, F. and Zhu, X. H., The structure of spaces with Bakry-Émery Ricci curvature bounded below, J. Reine Angew. Math. 757 (2019), 1-50.
* [45] Wang, F. and Zhu, X. H., Uniformly strong convergence of Kähler-Ricci flows on a Fano manifold, arXiv: 2009.10354
* [46] Wang, F. and Zhu, X. H., Tian’s partial $C^{0}$-estimate implies Hamilton-Tian’s conjecture, Adv. Math. 381 (2021), 107619, 29 pp.
* [47] Wang, F., Zhou, B. and Zhu, X. H., Modified Futaki invariant and equivariant Riemann-Roch formula, Adv. Math. 289 (2016), 1205-1235.
* [48] Zhang, L., Lower bound of modified $K$-energy on a Fano manifold with degeneration to Kähler-Ricci solitons, preprint, 2021.
* [49] Zhu, X.H. Stability on Kähler-Ricci flow on a compact Kähler manifold with positive first Chern class, Math. Ann. 356 (2013), 1425-1454.
| arxiv-papers | 2021-07-27T09:07:25 | 2024-09-04T03:07:20.982767 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Gang Tian, Liang Zhang and Xiaohua Zhu",
"submitter": "Xiaohua Zhu",
"url": "https://arxiv.org/abs/2107.12680"
} |
2107.12681 | # Uniqueness of conservative solutions for the Hunter–Saxton equation
Katrin Grunert Department of Mathematical Sciences
NTNU Norwegian University of Science and Technology
NO-7491 Trondheim
Norway [email protected] https://www.ntnu.edu/employees/katrin.grunert
and Helge Holden Department of Mathematical Sciences
NTNU Norwegian University of Science and Technology
NO-7491 Trondheim
Norway [email protected] https://www.ntnu.edu/employees/holden
###### Abstract.
We show that the Hunter–Saxton equation
$u_{t}+uu_{x}=\frac{1}{4}\big{(}\int_{-\infty}^{x}d\mu(t,z)-\int^{\infty}_{x}d\mu(t,z)\big{)}$
and $\mu_{t}+(u\mu)_{x}=0$ has a unique, global, weak, and conservative
solution $(u,\mu)$ of the Cauchy problem on the line.
###### Key words and phrases:
Hunter–Saxton equation, uniqueness, conservative solutions
###### 1991 Mathematics Subject Classification:
Primary: 35A02, 35L45 Secondary: 35B60
We acknowledge support by the grants Waves and Nonlinear Phenomena (WaNP) and
Wave Phenomena and Stability — a Shocking Combination (WaPheS) from the
Research Council of Norway.
## 1\. Introduction
The Hunter–Saxton (HS) equation [14] reads
$\displaystyle u_{t}+uu_{x}$
$\displaystyle=\frac{1}{4}\Big{(}\int_{-\infty}^{x}d\mu(t,z)-\int^{\infty}_{x}d\mu(t,z)\Big{)},$
$\displaystyle\mu_{t}+(u\mu)_{x}$ $\displaystyle=0.$
Here $u$ is an $H^{1}(\mathbb{R})$ function for each time $t$, and $\mu(t)$ is
a non-negative Radon measure. Derived in the context of modeling liquid
crystals, the HS equation has turned out to have considerable interest
mathematically. It has, e.g., a geometric interpretation [17, 19, 20, 21, 18],
convergent numerical methods [9, 12], and a stochastic version [11], in
addition to numerous extensions and generalizations [24, 25], too many to
mention here. The first comprehensive study appeared in [15, 16]. While the HS
equation was originally derived on differential form
$(u_{t}+uu_{x})_{x}=\frac{1}{2}u_{x}^{2},$
where, in the case of smooth functions, $\mu$ equal to $u_{x}^{2}$ will
automatically satisfy the second equation, we prefer to work on the integrated
version. Note that there are several ways to integrate this equation, say
$u_{t}+uu_{x}=\frac{1}{2}\int_{0}^{x}u_{x}^{2}(t,y)dy,$
for which the uniqueness of conservative solutions on the half-line has been
established in [5], but we prefer the more symmetric form. For us it is
essential to introduce a measure $\mu(t)$ on the line such that for almost all
times $d\mu=d\mu_{\rm ac}=u_{x}^{2}dx$. The times $t$ when $d\mu\neq
u_{x}^{2}dx$ will precisely be the times when uniqueness can break down. Our
task here is to analyze this situation in detail, and restore uniqueness by
carefully selecting particular solutions called conservative solutions. The
aim of this paper is to show the following uniqueness result (Theorems 3.6 and
5.10):
For any initial data $(u_{0},\mu_{0})\in\mathcal{D}$ the Hunter–Saxton
equation has a unique global conservative weak solution
$(u,\mu)\in\mathcal{D}$. Here $\mathcal{D}$ is given in Definition 2.2.
In the case of the so-called dissipative solutions, where energy is removed
exactly at the times when the measure $\mu$ ceases to be absolutely
continuous, the uniqueness question has been addressed in [7] by showing
uniqueness of the characteristics.
The problem at hand can be illustrated by the following explicit example [6].
Consider the trivial case $u_{0}=0$, which clearly has $u(t,x)=0$ as one
solution. However, as can be easily verified, also
(1.1)
$u(t,x)=-\frac{\alpha}{4}t\,\mathbb{I}_{(-\infty,-\frac{\alpha}{8}t^{2})}(x)+\frac{2x}{t}\,\mathbb{I}_{(-\frac{\alpha}{8}t^{2},\frac{\alpha}{8}t^{2})}(x)+\frac{\alpha}{4}t\,\mathbb{I}_{(\frac{\alpha}{8}t^{2},\infty)}(x)$
is a solution for any $\alpha\geq 0$, with $\mu(0)=\alpha\delta_{0}$ and
$d\mu(t)=4t^{-2}\mathbb{I}_{(-\alpha t^{2}/8,\alpha t^{2}/8)}(x)dx$ for
$t\not=0$. Here $\mathbb{I}_{A}$ is the indicator (characteristic) function of
the set $A$. Thus the initial value problem is not well-posed without further
constraints.
Furthermore, it turns out that the solution $u$ of the HS equation may develop
singularities in finite time in the following sense: Unless the initial data
is monotone increasing, we find
(1.2) $\inf(u_{x})\to-\infty\text{ as }t\uparrow
t^{*}=2/\sup(-u_{0}^{\prime}).$
Past wave breaking there are at least two different classes of solutions,
denoted conservative (energy is conserved) and dissipative (where energy is
removed locally) solutions, respectively, and this dichotomy is the source of
the interesting behavior of solutions of the equation (but see also [8, 10]).
We will in this paper consider the so-called conservative case where the
associated energy is preserved.
The natural approach to solve the HS equation is by the use of
characteristics, i.e., to solve the equation
(1.3)
$\check{y}_{t}(t,\xi)=u(t,\check{y}(t,\xi)),\quad\check{y}(0,\xi)=\check{y}_{0}(\xi).$
However, in this case the function $u=u(t,x)$ will in general only be Hölder
and not Lipschitz continuous. This is the crux of the problem. Thus we cannot
expect uniqueness of solutions of this equation. Indeed, it is precisely in
the case where uniqueness fails that the HS equation encounters singularities.
See [3, 5, 7, 26, 27, 28]. We will reformulate the HS equation in new
variables, the aim being to identify variables where the singularities
disappear.
Rewriting the HS equation, using characteristics, yields a linear system of
differential equations [4],
$\displaystyle\check{y}_{t}(t,\xi)$ $\displaystyle=\check{U}(t,\xi),$ (1.4)
$\displaystyle\check{U}_{t}(t,\xi)$
$\displaystyle=\frac{1}{2}(\check{H}(t,\xi)-\frac{1}{2}C),$
$\displaystyle\check{H}_{t}(t,\xi)$ $\displaystyle=0,$
where $C=\mu(0,\mathbb{R})=\mu(t,\mathbb{R})$. Here
$\check{U}(t,\xi)=u(t,\check{y}(t,\xi))$ and
$\check{H}(t,\xi)=\int_{-\infty}^{\check{y}(t,\xi)}u_{x}^{2}(t,x)dx$. This
system describes weak, conservative solutions and can be integrated to yield
$\displaystyle\check{y}(t,\xi)$
$\displaystyle=\check{y}(0,\xi)+t\big{(}\check{U}(0,\xi)+\frac{t}{4}(\check{H}(0,\xi)-\frac{1}{2}C)\big{)},$
$\displaystyle\check{U}(t,\xi)$
$\displaystyle=\check{U}(0,\xi)+\frac{t}{2}(\check{H}(0,\xi)-\frac{1}{2}C),$
$\displaystyle\check{H}(t,\xi)$ $\displaystyle=\check{H}(0,\xi).$
Here we may recover $(u,\mu)$ from $u(t,x)=\check{U}(t,\xi)$ for some $\xi$
such that $x=\check{y}(t,\xi)$ and $\mu=\check{y}_{\\#}(\check{H}_{\xi})d\xi$.
In particular, it has been shown in [4], that given any initial data
$(u_{0},\mu_{0})\in\mathcal{D}$ there exists at least one conservative
solution and this solution satisfies (1.4). On the other hand, the question of
uniqueness of conservative solutions has not been addressed. This question can
also be rephrased as: Do all conservative solutions satisfy (1.4)?
In [6] we introduced a new set of coordinates, which allowed us, in contrast
to [4], to construct a Lipschitz metric $d$, which is not based on equivalence
classes. The underlying system of differential equations, which has been
derived using pseudo-inverses and the system (1.4), is surprisingly simple,
but forced us to impose an additional first moment condition111Condition
(2.15) in [6], here stated in terms of the measure $\mu$.,
$\int_{\mathbb{R}}(1+\left|x\right|)d\mu_{0}<\infty$, on the measure. To be
more specific, $d$ satisfies
$d((u_{1},\mu_{1})(t),(u_{2},\mu_{2})(t))\leq\big{(}1+t+\frac{1}{8}t^{2}\big{)}d((u_{1},\mu_{1})(0),(u_{2},\mu_{2})(0))$
for any two weak, conservative solutions $(u_{i},\mu_{i})\in\mathcal{D}$,
which satisfy the additional condition
$\int_{\mathbb{R}}(1+\left|x\right|)d\mu_{i,0}<\infty$. The new coordinates
are defined as follows. Let
$\chi(t,\eta)=\sup\\{x\mid\mu(t,(-\infty,x))<\eta\\}$ and
$\mathcal{U}(t,\eta)=u(t,\chi(t,\eta))$ and introduce
$\hat{\chi}(t,\eta)=\chi(t,C\eta)$ and
$\hat{}\mathcal{U}(t,\eta)=\mathcal{U}(t,C\eta)$ where $C=\mu(t,\mathbb{R})$.
Then we define
$d((u_{1},\mu_{1})(t),(u_{2},\mu_{2})(t))=\left\|\hat{}\mathcal{U}_{1}(t)-\hat{}\mathcal{U}_{2}(t)\right\|_{L^{\infty}}+\left\|\hat{\chi}_{1}(t)-\hat{\chi}_{2}(t)\right\|_{L^{1}}+\left|C_{1}-C_{2}\right|.$
However, a closer look reveals that one explicitly associates to any initial
data the weak conservative solution computed using (1.4). Thus the question if
all weak conservative solutions satisfy (1.4) is never addressed.
Furthermore, to study stability questions for conservative solutions the
coordinates from [6] seem to be favorable, but not for investigating the
uniqueness. The main difficulty stems from the fact that for each
$t\in\mathbb{R}$, the function $F(t,x)=\mu(t,(-\infty,x))$, where $\mu$
denotes a positive, finite Radon measure, is increasing but not necessarily
strictly increasing. This means, in particular, that its spatial inverse
$\chi(t,\eta)$ might have jumps. Time evolution of increasing functions with
possible jumps can lead to the same problems as for conservation laws. What
happens to jumps as time evolves? Do they satisfy some kind of
Rankine–Hugoniot condition or do they behave more like rarefaction waves? In
[6] this issue has been resolved by using the system (1.4) to show that any
jump preserves position and height. Thus the associated system for
$(\chi(t,\eta),\mathcal{U}(t,\eta))$ cannot be treated using classical ODE
theory, but only in a weak sense with some additional constraints. Hence these
new variables would not simplify the study of uniqueness questions.
Given a conservative solution $(u,\mu)$, define the quantities
$\displaystyle y(t,\xi)$ $\displaystyle=\sup\\{x\mid
x+\mu(t,(-\infty,x))<\xi\\},$ $\displaystyle U(t,\xi)$
$\displaystyle=u(t,y(t,\xi)),$ $\displaystyle\tilde{H}(t,\xi)$
$\displaystyle=\xi-y(t,\xi).$
Then one can derive, see Theorem 3.4, that these quantities satisfy
$\displaystyle y_{t}(t,\xi)+Uy_{\xi}(t,\xi)$ $\displaystyle=U(t,\xi),$
$\displaystyle\tilde{H}_{t}(t,\xi)+U\tilde{H}_{\xi}(t,\xi)$ $\displaystyle=0,$
$\displaystyle U_{t}(t,\xi)+UU_{\xi}(t,\xi)$
$\displaystyle=\frac{1}{2}(\tilde{H}(t,\xi)-\frac{1}{2}C).$
In contrast to $u(t,x)$, the function $U(t,\xi)$ is Lipschitz continuous and
hence the above system can be solved uniquely using the method of
characteristics, which is sufficient to ensure the uniqueness of conservative
solutions. In particular, it can be shown that by applying the method of
characteristics the above system turns into (1.4), see Remark 3.5.
Although the uniqueness question is successfully addressed, the above system
has one main drawback: The definition of the function $y(t,\xi)$ is far from
unique. On the other hand, the above system can be used to find other
equivalent formulations of the Hunter–Saxton equation, which might be
advantageous for addressing, e.g., stability questions. As an illustration, we
here introduce a novel set of coordinates, which can be studied on its own,
without relying on special properties of solutions to (1.4) and which avoids
the formation of jumps but requires to impose additional moment conditions.
The main idea is to introduce an auxiliary measure $\nu$, such that
$G(t,x)=\nu(t,(-\infty,x))$ is strictly increasing for each $t\in\mathbb{R}$.
To that end define the auxiliary function (the power $n$ to be fixed later)
$p(t,x)=\int_{\mathbb{R}}\frac{1}{(1+(x-y)^{2})^{n}}d\mu(t,y),$
which will be a smooth function for all Radon measures $\mu$ and let
$\displaystyle\chi(t,\eta)$
$\displaystyle=\sup\\{x\mid\nu(t,(-\infty,x))<\eta\\}$
$\displaystyle=\sup\\{x\mid\int_{-\infty}^{x}p(t,y)dy+\mu(t,(-\infty,x))<\eta\\},$
$\displaystyle\mathcal{U}(t,\eta)$ $\displaystyle=u(t,\chi(t,\eta)),$
$\displaystyle\mathcal{P}(t,\eta)$ $\displaystyle=p(t,\chi(t,\eta)).$
Provided $(u,\mu)$ is a weak, conservative solution of the HS equation, which
satisfies an additional moment condition, see (5.2), we show, cf. Theorem 5.9,
that the triplet $(\chi(t,\eta),\mathcal{U}(t,\eta),\mathcal{P}(t,\eta))$
satisfies
(1.5a) $\displaystyle\chi_{t}+h\chi_{\eta}$ $\displaystyle=\mathcal{U},$
(1.5b) $\displaystyle\mathcal{U}_{t}+h\mathcal{U}_{\eta}$
$\displaystyle=\frac{1}{2}\Big{(}\eta-\int_{0}^{\eta}\mathcal{P}\chi_{\eta}(t,\tilde{\eta})d\tilde{\eta}\Big{)}-\frac{1}{4}C,$
(1.5c) $\displaystyle\mathcal{P}_{t}+h\mathcal{P}_{\eta}$
$\displaystyle=\mathcal{R}$
where
(1.6) $\displaystyle h(t,\eta)$
$\displaystyle=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta},$
$\displaystyle\mathcal{R}(t,\eta)$
$\displaystyle=-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta}$
(1.7)
$\displaystyle\quad+\mathcal{U}(t,\eta)\int_{0}^{B+C}K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta}.$
In particular, $h(t,\eta)$ is continuous w.r.t. time and Lipschitz continuous
w.r.t. space, so that the above system has a unique solution and can be solved
by applying the method of characteristics. This is sufficient to ensure the
uniqueness of conservative solutions that satisfy an additional moment
condition, cf. Theorem 5.10.
## 2\. Background
In this section we introduce the concept of weak conservative solutions for
the Hunter–Saxton equation. Afterwards we show that there indeed exists at
least one weak conservative solution to every admissible initial data. We use
$\mathcal{C}_{c}^{\infty}$ to denote smooth functions with compact support and
$\mathcal{C}_{0}^{\infty}$ to denote smooth functions that vanish at infinity.
As a starting point we introduce the spaces we work in.
###### Definition 2.1.
Let $E$ be the vector space defined by
(2.1) $E=\\{f\in L^{\infty}(\mathbb{R})\mid f^{\prime}\in
L^{2}(\mathbb{R})\\}$
equipped with the norm
$\left\|f\right\|_{E}=\left\|f\right\|_{L^{\infty}}+\left\|f^{\prime}\right\|_{L^{2}}$.
Furthermore, let
$H_{1}^{1}(\mathbb{R})=H^{1}(\mathbb{R})\times\mathbb{R}\quad\text{and}\quad
H_{2}^{1}(\mathbb{R})=H^{1}(\mathbb{R})\times\mathbb{R}^{2}.$
Write $\mathbb{R}$ as $\mathbb{R}=(-\infty,1)\cup(-1,\infty)$ and consider the
corresponding partition of unity $\psi^{+}$ and $\psi^{-}$, i.e., $\psi^{+}$
and $\psi^{-}$ belong to $C^{\infty}(\mathbb{R})$, $\psi^{-}+\psi^{+}\equiv
1$, $0\leq\psi^{\pm}\leq 1$,
$\operatorname{supp}(\psi^{-})\subset(-\infty,1)$, and
$\operatorname{supp}(\psi^{+})\subset(-1,\infty)$. Furthermore, introduce the
linear mapping $\mathcal{R}_{1}$ from $H_{1}^{1}(\mathbb{R})$ to $E$ defined
as
$(\bar{f},a)\mapsto f=\bar{f}+a\psi^{+},$
and the linear mapping $\mathcal{R}_{2}$ from $H_{2}^{1}(\mathbb{R})$ to $E$
defined as
$(\bar{f},a,b)\mapsto f=\bar{f}+a\psi^{+}+b\psi^{-}.$
The mappings $\mathcal{R}_{1}$ and $\mathcal{R}_{2}$ are linear, continuous,
and injective. Accordingly introduce $E_{1}$ and $E_{2}$, the images of
$H_{1}^{1}(\mathbb{R})$ and $H_{2}^{1}(\mathbb{R})$ by $\mathcal{R}_{1}$ and
$\mathcal{R}_{2}$, respectively, i.e.,
(2.2) $E_{1}=\mathcal{R}_{1}(H_{1}^{1}(\mathbb{R}))\quad\text{ and }\quad
E_{2}=\mathcal{R}_{2}(H_{2}^{1}(\mathbb{R})).$
The corresponding norms are given by
$\left\|f\right\|_{E_{1}}=\left\|\bar{f}+a\psi^{+}\right\|_{E_{1}}=\Big{(}\left\|\bar{f}\right\|_{L^{2}}^{2}+\left\|\bar{f}^{\prime}\right\|_{L^{2}}^{2}+a^{2}\Big{)}^{1/2}$
and
$\left\|f\right\|_{E_{2}}=\left\|\bar{f}+a\psi^{+}+b\psi^{-}\right\|_{E_{2}}=\Big{(}\left\|\bar{f}\right\|_{L^{2}}^{2}+
\left\|\bar{f}^{\prime}\right\|_{L^{2}}^{2}+a^{2}+b^{2}\Big{)}^{1/2}.$
Note that the mappings $\mathcal{R}_{1}$ and $\mathcal{R}_{2}$ are also well-
defined for all $(\bar{f},a)\in
L^{2}_{1}(\mathbb{R})=L^{2}(\mathbb{R})\times\mathbb{R}$ and $(\bar{f},a,b)\in
L_{2}^{2}(\mathbb{R})=L^{2}(\mathbb{R})\times\mathbb{R}^{2}$. Accordingly, let
$E^{0}_{1}=\mathcal{R}_{1}(L^{2}_{1}(\mathbb{R}))\quad\text{ and }\quad
E^{0}_{2}=\mathcal{R}_{1}(L^{2}_{2}(\mathbb{R}))$
equipped with the norms
$\left\|f\right\|_{E^{0}_{1}}=\left\|\bar{f}+a\psi^{+}\right\|_{E^{0}_{1}}=\big{(}\left\|\bar{f}\right\|^{2}_{L^{2}}+a^{2}\big{)}^{1/2}$
and
$\left\|f\right\|_{E^{0}_{2}}=\left\|\bar{f}+a\psi^{+}+b\psi^{-}\right\|_{E^{0}_{2}}=\big{(}\left\|\bar{f}\right\|^{2}_{L^{2}}+a^{2}+b^{2}\big{)}^{1/2},$
respectively.
With these spaces in mind, we can define next the admissible set of initial
data.
###### Definition 2.2 (Eulerian coordinates).
The space $\mathcal{D}$ consists of all pairs $(u,\mu)$ such that
* •
$u\in E_{2}$,
* •
$\mu\in\mathcal{M}^{+}(\mathbb{R})$,
* •
$\mu((-\infty,\,\cdot\,))\in E_{1}^{0}$,
* •
$d\mu_{\rm ac}=u_{x}^{2}dx$,
where $\mathcal{M}^{+}(\mathbb{R})$ denotes the set of positive, finite Radon
measures on $\mathbb{R}$.
A weak conservative solution is not only a weak solution of the Hunter–Saxton
equation, but has to satisfy several additional conditions, which make it
possible to single out a unique, energy preserving solution.
###### Definition 2.3.
We say that $(u,\mu)$ is a weak conservative solution of the Hunter–Saxton
equation with initial data $(u(0,\,\cdot\,),\mu(0,\,\cdot\,))\in\mathcal{D}$
if
1. (i)
At each fixed $t$ we have $u(t,\,\cdot\,)\in E_{2}$.
2. (ii)
At each fixed $t$ we have $\mu(t,(-\infty,\,\cdot\,))\in E^{0}_{1}$ and
$d\mu_{\rm ac}(t)=u_{x}^{2}(t,\,\cdot\,)dx$.
3. (iii)
The pair $(u,\mu)$ satisfies for any
$\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$
(2.3a)
$\displaystyle\int_{0}^{\infty}\int_{\mathbb{R}}\Big{[}u\phi_{t}+\frac{1}{2}u^{2}\phi_{x}+\frac{1}{4}\left(\int_{-\infty}^{x}d\mu(t)-\int_{x}^{\infty}d\mu(t)\right)\phi\Big{]}dxdt$
$\displaystyle=-\int_{\mathbb{R}}u\phi|_{t=0}dx,$ (2.3b)
$\displaystyle\int_{0}^{\infty}\int_{\mathbb{R}}(\phi_{t}+u\phi_{x})d\mu(t)dt$
$\displaystyle=-\int_{\mathbb{R}}\phi|_{t=0}d\mu(0).$
4. (iv)
The function $u(t,x)$ defined on $[0,T]\times\mathbb{R}$ is Hölder continuous
and the map $t\mapsto u(t,\,\cdot\,)$ is Lipschitz continuous from $[0,T]$
into $E^{0}_{2}$.
5. (v)
There exists a set $\mathcal{N}\subset\mathbb{R}$ with
$\operatorname{meas}(\mathcal{N})=0$ such that for every $t\not\in\mathcal{N}$
the measure $\mu(t)$ is absolutely continuous and has density
$u_{x}^{2}(t,\,\cdot\,)$ w.r.t. the Lebesgue measure.
6. (vi)
The family of Radon measures $\\{\mu(t)\mid t\in\mathbb{R}\\}$ depends
continuously on time w.r.t. the topology of weak convergence of measures.
Note that the family $\\{\mu(t)\mid t\in\mathbb{R}\\}$ provides a measure-
valued solution $w$ to the linear transport equation
$w_{t}+(uw)_{x}=0.$
Thus one has that $\mu(t,\mathbb{R})=\mu(0,\mathbb{R})$ for all
$t\in\mathbb{R}$.
In [4] weak conservative solutions in $\mathcal{D}$ have been constructed. A
closer look at their construction reveals that the following theorem holds.
###### Theorem 2.4.
For any initial data $(u_{0},\mu_{0})\in\mathcal{D}$ the Hunter–Saxton
equation has a global conservative weak solution $(u,\mu)$ in the sense of
Definition 2.3.
In other words, all the properties stated in Definition 2.3 are satisfied for
the conservative solutions constructed in [4]. However, some of them are
better hidden than others. This is especially true for (iv) and (vi), which we
show here.
We start by recalling the set of Lagrangian coordinates.
###### Definition 2.5 (Lagrangian coordinates).
The set $\mathcal{F}$ consists of all triplets
$(\check{y},\check{U},\check{H})$ such that
* •
$(\check{y}-\operatorname{Id},\check{U},\check{H})\in E_{2}\times E_{2}\times
E_{1}$,
* •
$(\check{y}-\operatorname{Id},\check{U},\check{H})\in[W^{1,\infty}(\mathbb{R})]^{3}$,
* •
$\displaystyle{\lim_{\xi\to-\infty}}\check{H}(\xi)=0$,
* •
$\check{y}_{\xi}\geq 0$, $\check{H}_{\xi}\geq 0$ a.e.,
* •
there exists $c>0$ such that $\check{y}_{\xi}+\check{H}_{\xi}\geq c>0$ a.e.,
* •
$\check{U}_{\xi}^{2}=\check{y}_{\xi}\check{H}_{\xi}$ a.e..
Note that there cannot be a one-to-one correspondence between Eulerian and
Lagrangian coordinates. Instead, one has that each element in Eulerian
coordinates corresponds to an equivalence class in Lagrangian coordinates.
Furthermore, all elements belonging to one and the same equivalence class can
be identified using so-called relabeling functions.
###### Definition 2.6 (Relabeling functions).
We denote by $\mathcal{G}$ the group of homeomorphisms $f$ from $\mathbb{R}$
to $\mathbb{R}$ such that
(2.4) $\displaystyle f-\operatorname{Id}\text{ and }$ $\displaystyle
f^{-1}-\operatorname{Id}\text{ both belong to }W^{1,\infty}(\mathbb{R}),$
(2.5) $\displaystyle f_{\xi}-1\text{ belongs to }L^{2}(\mathbb{R}),$
where $\operatorname{Id}$ denotes the identity function.
Let $X_{1}=(\check{y}_{1},\check{U}_{1},\check{H}_{1})$ and
$X_{2}=(\check{y}_{2},\check{U}_{2},\check{H}_{2})$ in $\mathcal{F}$. Then
$X_{1}$ and $X_{2}$ belong to the same equivalence class if there exists a
relabeling function $f\in\mathcal{G}$ such that
$X_{1}\circ f=(\check{y}_{1}\circ f,\check{U}_{1}\circ f,\check{H}_{1}\circ
f)=(\check{y}_{2},\check{U}_{2},\check{H}_{2})=X_{2}.$
Furthermore, let
$\mathcal{F}_{0}=\\{(\check{y},\check{U},\check{H})\in\mathcal{F}\mid\check{y}+\check{H}=\operatorname{Id}\\}.$
Then $\mathcal{F}_{0}$ contains exactly one representative of each equivalence
class in $\mathcal{F}$. Note that if
$X=(\check{y},\check{U},\check{H})\in\mathcal{F}_{0}$ and $f\in\mathcal{G}$,
then one has
$\check{y}\circ f+\check{H}\circ f=f.$
This implies that for each $X=(\check{y},\check{U},\check{H})\in\mathcal{F}$
one has that $\check{y}+\check{H}\in\mathcal{G}$.
Whether or not a function is a relabeling function, can be checked using the
following lemma, which is taken from [13].
###### Lemma 2.7 (Identifying relabeling functions).
If $f$ is absolutely continuous, $f-\operatorname{Id}\in
W^{1,\infty}(\mathbb{R})$, $f_{\xi}-1\in L^{2}(\mathbb{R})$, and there exists
$c\geq 1$ such that $\frac{1}{c}\leq f_{\xi}\leq c$ almost everywhere, then
$f\in\mathcal{G}$.
In [4], one rewrites the Hunter–Saxton equation, with the help of a
generalized method of characteristics as a linear system of differential
equations, cf. (1.4),
(2.6a) $\displaystyle\check{y}_{t}(t,\xi)$ $\displaystyle=\check{U}(t,\xi),$
(2.6b) $\displaystyle\check{U}_{t}(t,\xi)$
$\displaystyle=\frac{1}{2}(\check{H}(t,\xi)-\frac{1}{2}C),$ (2.6c)
$\displaystyle\check{H}_{t}(t,\xi)$ $\displaystyle=0,$
where $C=\mu(0,\mathbb{R})=\mu(t,\mathbb{R})$. This system of differential
equations does not preserve $\mathcal{F}_{0}$, but respects equivalence
classes. It can be integrated to yield
(2.7a) $\displaystyle\check{y}(t,\xi)$
$\displaystyle=\check{y}(0,\xi)+t\big{(}\check{U}(0,\xi)+\frac{t}{4}(\check{H}(0,\xi)-\frac{1}{2}C)\big{)},$
(2.7b) $\displaystyle\check{U}(t,\xi)$
$\displaystyle=\check{U}(0,\xi)+\frac{t}{2}(\check{H}(0,\xi)-\frac{1}{2}C),$
(2.7c) $\displaystyle\check{H}(t,\xi)$ $\displaystyle=\check{H}(0,\xi),$
with initial data determined as introduced next in (2.8).
The connection between the pairs $(u,\mu)\in\mathcal{D}$ and the triplet
$(\check{y},\check{U},\check{H})\in\mathcal{F}$ is given by the following
definitions.
###### Definition 2.8.
Let the mapping $L\colon\mathcal{D}\to\mathcal{F}_{0}$ be defined by
$L(u,\mu)=(\check{y},\check{U},\check{H})$, where
(2.8a) $\displaystyle\check{y}(\xi)$ $\displaystyle=\sup\\{x\mid
x+\mu((-\infty,x))<\xi\\},$ (2.8b) $\displaystyle\check{H}(\xi)$
$\displaystyle=\xi-\check{y}(\xi),$ (2.8c) $\displaystyle\check{U}(\xi)$
$\displaystyle=u\circ\check{y}(\xi).$
###### Definition 2.9.
Let the mapping $M\colon\mathcal{F}\to\mathcal{D}$ be defined by
$M(\check{y},\check{U},\check{H})=(u,\mu)$, where222The push-forward of a
measure $\nu$ by a measurable function $f$ is the measure $f_{\\#}\nu$ defined
by $f_{\\#}\nu(B)=\nu(f{{}^{-1}}(B))$ for all Borel sets $B$.
(2.9a) $\displaystyle u(x)$ $\displaystyle=\check{U}(\xi)\quad\text{ for some
}\xi\text{ such that }x=\check{y}(\xi),$ (2.9b) $\displaystyle\mu$
$\displaystyle=\check{y}_{\\#}(\check{H}_{\xi})d\xi.$
Now we can finally focus on showing that the weak conservative solutions
constructed in [4] satisfy Definition 2.3 (iv) and (vi).
### 2.1. On the Hölder continuity in the definition of weak conservative
solutions
In [4] a generalized method of characteristics was used to construct weak
conservative solutions as outlined above. This ansatz yields solutions $u$
that are Hölder continuous with respect to space and time, but not Lipschitz
continuous. Indeed, assume we are given a solution $(u,\mu)$ with
corresponding Lagrangian coordinates $(\check{y},\check{U},\check{H})$
satisfying (2.6). Choose two points $(t_{1},x_{1})$ and $(t_{2},x_{2})$. Then
we can find $\xi_{1}$ and $\xi_{2}$ such that
(2.10) $\check{y}(t_{1},\xi_{1})=x_{1}\quad\text{ and
}\quad\check{y}(t_{2},\xi_{2})=x_{2}.$
Thus we have
$\displaystyle|u(t_{1},x_{1})-u(t_{2},x_{2})|$
$\displaystyle\leq|u(t_{1},\check{y}(t_{1},\xi_{1}))-u(t_{2},\check{y}(t_{2},\xi_{1}))|$
(2.11)
$\displaystyle\quad+|u(t_{2},\check{y}(t_{2},\xi_{1}))-u(t_{2},\check{y}(t_{1},\xi_{1}))|$
$\displaystyle\quad+|u(t_{2},x_{1})-u(t_{2},x_{2})|.$
As far as the first term on the right-hand side is concerned, we have
(2.12)
$|u(t_{1},\check{y}(t_{1},\xi_{1}))-u(t_{2},\check{y}(t_{2},\xi_{1}))|=|\check{U}(t_{1},\xi_{1})-\check{U}(t_{2},\xi_{1})|\leq\frac{1}{4}C|t_{2}-t_{1}|,$
where we have used that
$-\frac{1}{4}C\leq\frac{1}{2}\check{H}(t,\xi)-\frac{1}{4}C\leq\frac{1}{4}C$.
For the second term observe that the time variable is the same, but not the
space variable. In particular, we have
$\displaystyle|u(t_{2},\check{y}(t_{2},\xi_{1}))-u(t_{2},\check{y}(t_{1},\xi_{1}))|$
$\displaystyle\leq
C^{1/2}\big{(}\check{y}(t_{2},\xi_{1})-\check{y}(t_{1},\xi_{1})\big{)}^{1/2}$
$\displaystyle\leq
C^{1/2}\Big{(}|\check{U}(t_{1},\xi_{1})||t_{2}-t_{1}|+\frac{1}{8}C(t_{2}-t_{1})^{2}\Big{)}^{1/2}$
(2.13) $\displaystyle\leq
C^{1/2}\Big{(}|\check{U}(0,\xi_{1})|+\frac{3}{8}CT\Big{)}^{1/2}|t_{2}-t_{1}|^{1/2}.$
Here we used that $u_{x}\in L^{2}(\mathbb{R})$ and $d\mu_{\rm ac}=u_{x}^{2}dx$
combined with the Cauchy–Schwarz inequality. Similar considerations yield
(2.14) $|u(t_{2},x_{1})-u(t_{2},x_{2})|\leq C^{1/2}|x_{2}-x_{1}|^{1/2},$
thus one ends up with Hölder continuity with Hölder exponent $\frac{1}{2}$.
An important consequence of the above observation is the following. The
solution to the ODE
$\check{y}_{t}(t,\xi)=u(t,\check{y}(t,\xi))$
would be unique if the function $u(t,\,\cdot\,)$ were Lipschitz continuous.
According to (2.14) this function is Hölder continuous with exponent
$\frac{1}{2}$, which leads to the possibility that there might exist several
weak conservative solutions to one and the same initial data.
Moreover, one has, in general, that
$|u(t,x)-u(t,y)|\leq\left\|u_{x}(t,\,\cdot\,)\right\|_{L^{\infty}}|y-x|,$
and hence every time wave breaking occurs, the Lipschitz continuity is lost.
### 2.2. On the Lipschitz continuity in the definition of weak conservative
solutions
In [4] a generalized method of characteristics was used to construct weak
conservative solutions. The same approach has been used in [23], see also [6],
in the case of the two-component Hunter–Saxton system, which generalizes the
HS equation. However, there is a slight, but important difference in the
solution spaces.
The one used in [23] is bigger, since one only assumes $u(t,\,\cdot\,)\in
L^{\infty}(\mathbb{R})$ and $F(t,\,\cdot\,)\in L^{\infty}(\mathbb{R})$ instead
of $u(t,\,\cdot\,)\in E_{2}^{0}$ and $F(t,\,\cdot\,)\in E_{1}^{0}$ . Thus one
would expect that the mapping $t\mapsto u(t,\,\cdot\,)$ is Lipschitz
continuous from $[0,T]$ into $L^{\infty}(\mathbb{R})$. Yet, a closer look at
(2.15) $u_{t}=-uu_{x}+\frac{1}{2}(F-\frac{1}{2}C),$
where
(2.16) $F(t,x)=\mu(t,(-\infty,x)),$
reveals that $u_{t}(t,\,\cdot\,)$ cannot be uniformly bounded in
$L^{\infty}(\mathbb{R})$, since $u_{x}(t,\,\cdot\,)$ does not belong to
$L^{\infty}(\mathbb{R})$ and hence $t\mapsto u(t,\,\cdot\,)$ is not Lipschitz
continuous from $[0,T]$ into $L^{\infty}(\mathbb{R})$.
The smaller solution space used in [4] and here, on the other hand, is the
correct choice, since the right-hand side of (2.15) belongs to $E_{2}^{0}$ and
hence the mapping $t\mapsto u(t,\,\cdot\,)$ is Lipschitz continuous from
$[0,T]$ into $E_{2}^{0}$.
### 2.3. On the continuity in the topology of weak convergence of measures in
the definition of weak conservative solutions
In [4] a generalized method of characteristics was used to construct weak
conservative solutions as outlined above. This ansatz yields measures $\mu$,
such that the mapping $t\mapsto\mu(t,\,\cdot\,)$ is locally Lipschitz
continuous if we equip the set of positive Radon measures with the
Kantorovich–Rubinstein norm, which generates the weak topology [1].
Denote by ${\rm BL}(\mathbb{R})$ the space of all bounded and Lipschitz
continuous functions equipped with the norm
$\left\|\phi\right\|=\max\left\\{\left\|\phi\right\|_{L^{\infty}},\sup_{x\not=y}\frac{|\phi(x)-\phi(y)|}{|x-y|}\right\\}.$
Then the Kantorovich–Rubinstein norm of $\mu\in\mathcal{M}^{+}(\mathbb{R})$ is
given by
(2.17) $\left\|\mu\right\|_{0}=\sup\left\\{\int_{\mathbb{R}}\phi
d\mu\mid\phi\in{\rm BL}(\mathbb{R}),\left\|\phi\right\|\leq 1\right\\}.$
Given a solution $(u,\mu)$ with corresponding Lagrangian coordinates
$(\check{y},\check{U},\check{H})$, which satisfy (2.6). Let $\phi\in{\rm
BL}(\mathbb{R})$ such that $\left\|\phi\right\|\leq 1$. Then we have
$\displaystyle\left|\int_{\mathbb{R}}\phi(x)d(\mu(t)-\mu(s))\right|$
$\displaystyle=\left|\int_{\mathbb{R}}\big{(}\phi(\check{y}(t,\xi))\check{H}_{\xi}(t,\xi)-\phi(\check{y}(s,\xi))\check{H}_{\xi}(s,\xi)\big{)}d\xi\right|$
$\displaystyle=\left|\int_{\mathbb{R}}(\phi(\check{y}(t,\xi))-\phi(\check{y}(s,\xi)))\check{H}_{\xi}(s,\xi)d\xi\right|$
(2.18)
$\displaystyle\leq\left\|\check{y}(t,\,\cdot\,)-\check{y}(s,\,\cdot\,)\right\|_{L^{\infty}}C.$
Recalling (2.6), we have
$\left\|\check{y}(t,\,\cdot\,)-\check{y}(s,\,\cdot\,)\right\|_{L^{\infty}}\leq|t-s|(\left\|\check{U}(s,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{8}|t-s|C).$
Thus
$\left|\int_{\mathbb{R}}\phi(x)d(\mu(t)-\mu(s))\right|\leq|t-s|(\left\|\check{U}(s,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{8}|t-s|C)C$
for all $\phi\in{\rm BL}(\mathbb{R})$ such that $\left\|\phi\right\|\leq 1$,
and, in particular,
$\left\|\mu(t)-\mu(s)\right\|_{0}\leq|t-s|(\left\|\check{U}(s,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{8}|t-s|C)C,$
which proves the local Lipschitz continuity, since
$\left\|\check{U}(s,\,\cdot\,)\right\|_{L^{\infty}}$ can be uniformly bounded
on any bounded time interval.
Note that we cannot expect global Lipschitz continuity in time due to the last
term in the above inequality.
## 3\. Uniqueness of weak conservative solutions via Lagrangian coordinates
The main goal of this section is to present the proof of Theorem 3.6. To be a
bit more precise, we will show that the characteristic equation
$\check{y}_{t}(t,\xi)=u(t,\check{y}(t,\xi))$
has a unique solution and thereby establish rigorously that each weak
conservative solution satisfies the system of ordinary differential equations
(2.6) in Lagrangian coordinates. The pair $(u,\mu)$ will be a solution in the
sense of Definition 2.3. In particular, this means that the function $u(t,x)$
is Hölder continuous in $(t,x)$, and the map $t\mapsto u(t,\,\cdot\,)$ is
Lipschitz continuous from $[0,T]$ into $E^{0}_{2}$, the set of locally square
integrable functions with possible non-vanishing asymptotics at $\pm\infty$.
The measure $\mu(t)$ is finite, $\mu(t,\mathbb{R})=C$, absolutely continuous
and has density $u_{x}^{2}(t,\,\cdot\,)$ w.r.t. the Lebesgue measure, except
on a set $\mathcal{N}$ of zero measure. Furthermore, no moment condition is
assumed on the measure here.
Given a weak conservative solution $(u,\mu)\in\mathcal{D}$, let
(3.1) $y(t,\xi)=\sup\\{x\mid x+F(t,x)<\xi\\},$
where $F(t,x)$ is given by (2.16). Then
$y(t,\,\cdot\,)\colon\mathbb{R}\to\mathbb{R}$ is non-decreasing,
$y(t,\,\cdot\,)\leq\operatorname{Id}$, and Lipschitz continuous with Lipschitz
constant at most one [13, Thm. 3.8]. Furthermore, define
(3.2) $\tilde{H}(t,\xi)=\xi-y(t,\xi).$
Note that $\tilde{H}(t,\,\cdot\,):\mathbb{R}\to[0,C]$ is non-decreasing (since
$y(t,\,\cdot\,)$ has Lipschitz constant at most one) and continuous. For
completeness, we introduce for later use
(3.3) $U(t,\xi)=u(t,y(t,\xi)).$
For each time $t$, we have that
$y(t,\xi)=\sup\\{x\mid x+F(t,x)<y(t,\xi)+\tilde{H}(t,\xi)\\},$
which implies that
(3.4) $y(t,\xi)+F(t,y(t,\xi)-)\leq y(t,\xi)+\tilde{H}(t,\xi)\leq
y(t,\xi)+F(t,y(t,\xi)+).$
Subtracting $y(t,\xi)$ in the above inequality, we end up with
(3.5) $F(t,y(t,\xi)-)\leq\tilde{H}(t,\xi)\leq F(t,y(t,\xi)+)\quad\text{ for
all }\xi\in\mathbb{R}.$
###### Remark 3.1.
Note that we made a particular choice in the above calculations,
$y(t,\xi)+\tilde{H}(t,\xi)=\xi\quad\text{ for all }(t,\xi),$
i.e.,
$X(t,\,\cdot\,)=(y(t,\,\cdot\,),U(t,\,\cdot\,),\tilde{H}(t,\,\cdot\,))\in\mathcal{F}_{0}$
for all $t$. However, we could have chosen any representative of the
corresponding equivalence class. Indeed, pick $f(t,x)$ such that
$f(t,\,\cdot\,)\in\mathcal{G}$ for all $t$ and replace $y(t,\xi)$, $U(t,\xi)$,
and $\tilde{H}(t,\xi)$ by
$y_{1}(t,\xi)=\sup\\{x\mid x+F(t,x)<f(t,\xi)\\},$
$\tilde{H}_{1}(t,\xi)=f(t,\xi)-y_{1}(t,\xi)$, and
$U_{1}(t,\xi)=u(t,y_{1}(t,\xi))$, respectively. Then
$y_{1}(t,\xi)+\tilde{H}_{1}(t,\xi)=f(t,\xi)\quad\text{ for all }(t,\xi),$
i.e.,
$X_{1}(t,\,\cdot\,)=(y_{1}(t,\,\cdot\,),U_{1}(t,\,\cdot\,),\tilde{H}_{1}(t,\,\cdot\,))\in\mathcal{F}$
for all $t$. In particular, one has
$X_{1}(t,\xi)=X(t,f(t,\xi))\quad\text{ for all }(t,\xi).$
### 3.1. The differential equation satisfied by the characteristics
$y(t,\xi)$
Recall that $u(t,x)$ is a weak solution to
$u_{t}+uu_{x}=\frac{1}{2}(F-\frac{1}{2}C),$
and hence we obtain, by computing $u(t,\,\cdot\,)$ along characteristics, that
(3.6)
$\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}\leq\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\quad\text{
for all }t\in[0,T].$
Thus for every characteristic $x(s)$ given by
(3.7) $\dot{x}(t)=u(t,x(t)),$
we have
(3.8)
$|x(t)-x(s)|\leq\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}|t-s|.$
Recall that due to the Hölder continuity of $u$ the equation (3.7) will in
general not have a unique solution. This estimate together with the Hölder
continuity of the weak conservative solution, helps us to refine the estimate
for $|x(t)-x(s)|$. Indeed, by assumption we know that there exists a constant
$D$ such that
(3.9) $|u(t,x)-u(s,y)|\leq D\big{(}|t-s|+|x-y|\big{)}^{1/2}\quad\text{ for all
}(t,x),(s,y)\in[0,T]\times\mathbb{R}.$
Thus every characteristic $x(t)$ given through (3.7), satisfies
$|\dot{x}(t)-u(s,x(s))|\leq D\big{(}|t-s|+|x(t)-x(s)|\big{)}^{1/2}.$
Recalling (3.8) we end up with
$|\dot{x}(t)-u(s,x(s))|\leq
D|t-s|^{1/2}\big{(}1+\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}^{1/2}.$
Integration then yields for all $s$ and $t$ in $[0,T]$ that
(3.10) $\left|x(t)-x(s)-u(s,x(s))(t-s)\right|\leq M|t-s|^{3/2}.$
Here $M$ denotes some positive constant, which is independent of $s$ and $t$.
Furthermore, using (3.8), there exists a positive constant $N$ such that
$\left|x(t)-x(s)\right|\leq N|t-s|\quad\text{ for all }s,t\in[0,T].$
We are now ready to turn our attention towards the equation
(3.11) $\mu_{t}+(u\mu)_{x}=0.$
In the case of a classical solution, one has that $F(t,x(t))=F(s,x(s))$. In
our more general case, one has
(3.12) $F(t,x(s)-N|t-s|)\leq F(s,x(s)\pm)\leq F(t,x(s)+N|t-s|+).$
We will show this estimate in the next lemma. For simplicity we let $s=0$ and
only consider the right inequality.
###### Lemma 3.2.
In the above notation, we have the following result
$F(0,x(0)+)\leq F(t,x(0)+Nt+)\quad\text{ for all }t\in[0,T].$
###### Proof.
We have that $\mu(t,\mathbb{R})=C$ for all $t$. We will first show that for a
given $\varepsilon>0$, we can find an $M>0$ such that
(3.13) $\mu(t,(-M,M))\geq C-\varepsilon\quad\text{ for all }t\in[0,T].$
To that end we first observe that for $t=0$ we can find an $\tilde{M}_{0}>0$
such that
$F(0,\tilde{M}_{0})-F(0,-\tilde{M}_{0}+)=\mu(0,(-\tilde{M}_{0},\tilde{M}_{0}))\geq
C-\frac{1}{2}\varepsilon.$
Let $\delta$ be a small positive number to be decided later. Since
$u(t,\,\cdot\,)\in E_{2}$ for all $t\in[0,T]$, we can find $u_{\pm\infty}(t)$,
$x_{\delta}$, and $\tilde{x}_{\delta}$ such that
(3.14a) $\displaystyle\left|u_{-\infty}(t)-u(t,x)\right|$
$\displaystyle\leq\delta\quad\text{ for all
}(t,x)\in[0,T]\times(-\infty,x_{\delta}],$ (3.14b)
$\displaystyle\left|u_{\infty}(t)-u(t,x)\right|$
$\displaystyle\leq\delta\quad\text{ for all
}(t,x)\in[0,T]\times[\tilde{x}_{\delta},\infty).$
Next choose $x_{1}<x_{2}<x_{3}<x_{4}$ such that
$\displaystyle x_{2}+\int_{0}^{t}u_{-\infty}(s)ds$ $\displaystyle\leq
x_{\delta}\quad\text{ for all }t\in[0,T],$ $\displaystyle
x_{3}+\int_{0}^{t}u_{\infty}(s)ds$
$\displaystyle\geq\tilde{x}_{\delta}\quad\text{ for all }t\in[0,T],$
and pick functions $\psi_{1},\psi_{2}\in C^{\infty}(\mathbb{R})$ with
$\displaystyle\psi_{1}^{\prime}$ $\displaystyle\geq
0,\quad\psi_{1}|_{(-\infty,x_{1}]}=-\frac{1}{2},\quad\psi_{1}|_{[x_{2},\infty)}=\frac{1}{2},$
$\displaystyle\psi_{2}^{\prime}$ $\displaystyle\leq
0,\quad\psi_{2}|_{(-\infty,x_{3}]}=\frac{1}{2},\quad\psi_{2}|_{[x_{4},\infty)}=-\frac{1}{2}.$
Define
$\psi(t,x)=\psi_{1}\big{(}x-\int_{0}^{t}u_{-\infty}(s)ds\big{)}+\psi_{2}\big{(}x-\int_{0}^{t}u_{\infty}(s)ds\big{)},$
which clearly satisfies $\psi(t,\,\cdot\,)\in C^{\infty}_{c}(\mathbb{R})$ for
$t\in[0,T]$. We then find
$\displaystyle F(t,x_{3}$
$\displaystyle+\int_{0}^{t}u_{\infty}(s)ds)-F(t,x_{2}+\int_{0}^{t}u_{-\infty}(s)ds+)$
$\displaystyle\leq\int_{\mathbb{R}}\psi(t,x)d\mu(t)$ $\displaystyle\leq
F(t,x_{4}+\int_{0}^{t}u_{\infty}(s)ds)-F(t,x_{1}+\int_{0}^{t}u_{-\infty}(s)ds+).$
Furthermore, using that $(u,\mu)$ is a weak solution and $\psi$ is a test
function, we get
$\displaystyle F(t,x_{4}$
$\displaystyle+\int_{0}^{t}u_{\infty}(s)ds)-F(t,x_{1}+\int_{0}^{t}u_{-\infty}(s)ds+)$
$\displaystyle\geq\int_{\mathbb{R}}\psi(t,x)d\mu(t)=\int_{\mathbb{R}}\psi(0,x)d\mu(0)+\int_{0}^{t}\int_{\mathbb{R}}(\psi_{t}+u\psi_{x})d\mu(s)\,ds$
$\displaystyle\qquad\qquad\qquad\qquad\,\geq
F(0,x_{3})-F(0,x_{2}+)+\int_{0}^{t}\int_{\mathbb{R}}(\psi_{t}+u\psi_{x})d\mu(s)\,ds.$
Direct computations yield
$\displaystyle(\psi_{t}+u\psi_{x})(t,x)$
$\displaystyle=\psi_{1}^{\prime}\big{(}x-\int_{0}^{t}u_{-\infty}(s)ds\big{)}(-u_{-\infty}(t)+u(t,x))\mathbb{I}_{A_{1}(t)}(x)$
$\displaystyle\quad+\psi_{2}^{\prime}\big{(}x-\int_{0}^{t}u_{\infty}(s)ds\big{)}(-u_{\infty}(t)+u(t,x))\mathbb{I}_{A_{2}(t)}(x)$
with
$\displaystyle A_{1}(t)$ $\displaystyle=\\{x\mid
x_{1}+\int_{0}^{t}u_{-\infty}(s)ds<x<x_{2}+\int_{0}^{t}u_{-\infty}(s)ds\\},$
$\displaystyle A_{2}(t)$ $\displaystyle=\\{x\mid
x_{3}+\int_{0}^{t}u_{\infty}(s)ds<x<x_{4}+\int_{0}^{t}u_{\infty}(s)ds\\}.$
This implies for all $t\in[0,T]$, using (3.14),
$\displaystyle\left|\int_{0}^{t}\int_{\mathbb{R}}(\psi_{t}+u\psi_{x})d\mu(s)\,ds\right|$
$\displaystyle\leq\left\|\psi_{1}^{\prime}\right\|_{L^{\infty}}\int_{0}^{t}\int_{\mathbb{R}}\left|-u_{-\infty}(s)+u(s,x)\right|\mathbb{I}_{A_{1}(s)}(x)d\mu(s)\,ds$
$\displaystyle\quad+\left\|\psi_{2}^{\prime}\right\|_{L^{\infty}}\int_{0}^{t}\int_{\mathbb{R}}\left|-u_{\infty}(s)+u(s,x)\right|\mathbb{I}_{A_{2}(s)}(x)d\mu(s)\,ds$
$\displaystyle\leq\delta
TC\big{(}\left\|\psi_{1}^{\prime}\right\|_{L^{\infty}}+\left\|\psi_{2}^{\prime}\right\|_{L^{\infty}}\big{)}.$
Choosing
$\delta\leq\varepsilon/(2TC(\left\|\psi_{1}^{\prime}\right\|_{L^{\infty}}+\left\|\psi_{2}^{\prime}\right\|_{L^{\infty}}))$
and
$M=\max\\{\tilde{M}_{0},\left|x_{\varepsilon}\right|,\left|\tilde{x}_{\varepsilon}\right|,\left|x_{2}\right|,\left|x_{3}\right|\\}$,
we see that
$\mu(t,(-M,M))\geq C-\varepsilon\quad\text{ for all }t\in[0,T].$
Let $\phi\in C^{\infty}(\mathbb{R})$ with
$\operatorname{supp}(\phi_{x})\subseteq[-\tilde{M},\tilde{M}]$ and
$\phi_{x}\geq 0$, such that $\phi(x)=\phi(-\infty)$ for $x\leq-\tilde{M}$ with
$\phi(-\infty)=-\int_{\mathbb{R}}\phi_{x}(z)dz$, and $\phi(x)=0$ for
$x\geq\tilde{M}$. Introduce $\bar{\phi}\in C^{\infty}([0,T]\times\mathbb{R})$
such that
$\bar{\phi}|_{[0,T]\times[-M,M]}=0,\quad\bar{\phi}_{x}\geq
0,\quad\bar{\phi}(t,x)=\begin{cases}\phi(-\infty),&\text{for $x\leq-1-M$},\\\
0,&\text{for $x\geq 1+M$}.\end{cases}$
Fix a constant $b$. Then we find, since $\phi(x-bt)-\bar{\phi}(t,x)\in
C^{\infty}_{c}([0,T]\times\mathbb{R})$, that
$\displaystyle\int_{\mathbb{R}}\phi(x-bt)d\mu(t)$
$\displaystyle=\int_{\mathbb{R}}\bar{\phi}(t,x)d\mu(t)+\int_{\mathbb{R}}(\phi(x-bt)-\bar{\phi}(t,x))d\mu(t)$
$\displaystyle=\int_{\mathbb{R}}\bar{\phi}(t,x)d\mu(t)+\int_{\mathbb{R}}(\phi(x)-\bar{\phi}(0,x))d\mu(0)$
$\displaystyle\quad+\int_{0}^{t}\int_{\mathbb{R}}\Big{(}(\phi(x-bs)-\bar{\phi}(s,x))_{t}$
$\displaystyle\qquad\qquad\qquad\qquad+u(s,x)(\phi(x-bs)-\bar{\phi}(s,x))_{x}\Big{)}d\mu(s)ds$
$\displaystyle=\int_{\mathbb{R}}\bar{\phi}(t,x)d\mu(t)-\int_{\mathbb{R}}\bar{\phi}(0,x)d\mu(0)$
$\displaystyle\quad-\int_{0}^{t}\int_{\mathbb{R}}\big{(}\bar{\phi}_{t}+u\bar{\phi}_{x}\big{)}(s,x)d\mu(s)ds$
$\displaystyle\quad+\int_{\mathbb{R}}\phi(x)d\mu(0)+\int_{0}^{t}\int_{\mathbb{R}}(u(s,x)-b)\phi^{\prime}(x-bs)d\mu(s)ds.$
By (3.13) the terms in the next to last line can be made arbitrarily small by
increasing $M$, so that
$\int_{\mathbb{R}}\phi(x-bt)d\mu(t)=\int_{\mathbb{R}}\phi(x)d\mu(0)+\int_{0}^{t}\int_{\mathbb{R}}(u(s,x)-b)\phi^{\prime}(x-bs)d\mu(s)ds.$
If we choose $b\geq u$ a.e., then $\int_{0}^{t}\int(u-b)\phi_{x}d\mu(s)ds\leq
0$, which together with
$\displaystyle\int_{\mathbb{R}}\phi(x-bt)d\mu(t)$
$\displaystyle=-\int_{\mathbb{R}}\phi^{\prime}(x-bt)F(t,x\pm)dx=-\int_{\mathbb{R}}\phi^{\prime}(x)F(t,x+bt\pm)dx$
yields
$\int_{\mathbb{R}}\phi^{\prime}(x)\big{(}F(t,x+bt\pm)-F(0,x\pm)\big{)}dx\geq
0,$
from which we conclude
$F(0,x+)\leq F(t,x+bt+).$
∎
For any $t\in\mathbb{R}$, introduce the strictly increasing function
$L(t,\,\cdot\,)\colon\mathbb{R}\to\mathbb{R}$ given by
(3.15) $L(t,x)=x+F(t,x),$
which satisfies, cf. (3.2) and (3.4),
(3.16) $L(t,y(t,\xi)-)\leq\xi\leq L(t,y(t,\xi)+),\quad t\in[0,T].$
Then
$L(t,x(s)-N|t-s|)\leq L(s,x(s)\pm)\leq L(t,x(s)+N|t-s|+),$
and choosing $x(s)=y(s,\xi)$, we get
$L(t,y(s,\xi)-N|t-s|)\leq L(t,y(t,\xi))\leq L(t,y(s,\xi)+N|t-s|+).$
Recalling that $L(t,\,\cdot\,)$ is strictly increasing we end up with
(3.17) $\left|y(t,\xi)-y(s,\xi)\right|\leq N|t-s|.$
Since $\xi\mapsto y(t,\xi)$ is Lipschitz with Lipschitz constant at most one,
it follows that $y(t,\xi)$ is Lipschitz and hence differentiable almost
everywhere in $[0,T]\times\mathbb{R}$.
Next we aim at computing $y_{t}(t,\xi)$, using (3.10), and deriving the
differential equation for $y(t,\xi)$. One has, combining (3.10) and the
analysis used to derive (3.12),
$\displaystyle F(t,x(s)+$ $\displaystyle u(s,x(s))(t-s)-M|t-s|^{3/2})$
$\displaystyle\leq F(s,x(s)\pm)\leq F(t,x(s)+u(s,x(s))(t-s)+M|t-s|^{3/2}+).$
We can derive this estimate as follows. For simplicity let $s=0$ and consider
only the right estimate.
###### Lemma 3.3.
In the above notation, we have the following result
$F(0,x(0)+)\leq F(t,x(0)+u_{0}(x(0))t+Mt^{3/2}+)\quad\text{ for all
}t\in[0,T].$
###### Proof.
Given an $\varepsilon>0$, we can find, as in the proof of Lemma 3.2, an $M>0$
such that
(3.18) $\mu(t,\mathbb{R}\backslash(-M,M))<\varepsilon\quad\text{ for all
}t\in[0,T].$
Let $\psi\in C^{\infty}(\mathbb{R})$ with
$\operatorname{supp}(\psi_{x})\subseteq[-\tilde{M},\tilde{M}]$ and
$\psi_{x}\geq 0$. Let $\phi=\phi(t,x)$ satisfy $\phi_{t}+g\phi_{x}=0$, with
initial data $\phi|_{t=0}=\psi$ for some given continuous function $g=g(t,x)$.
Introduce $\bar{\phi}\in C^{\infty}([0,T]\times\mathbb{R})$ such that
$\bar{\phi}|_{[0,T]\times[-M,M]}=0,\quad\bar{\phi}_{x}\geq
0,\quad\bar{\phi}(t,x)=\begin{cases}-\int_{\mathbb{R}}\phi_{x}(t,z)dz,&\text{for
$x\leq-1-M$},\\\ 0,&\text{for $x\geq 1+M$}.\end{cases}$
Then we find, since $\phi-\bar{\phi}\in
C^{\infty}_{c}([0,T]\times\mathbb{R})$, that
$\displaystyle\int_{\mathbb{R}}\phi(t,x)d\mu(t)$
$\displaystyle=\int_{\mathbb{R}}\bar{\phi}(t,x)d\mu(t)+\int_{\mathbb{R}}(\phi-\bar{\phi})(t,x)d\mu(t)$
$\displaystyle=\int_{\mathbb{R}}\bar{\phi}(t,x)d\mu(t)+\int_{\mathbb{R}}(\phi-\bar{\phi})(0,x)d\mu(0)$
$\displaystyle\quad+\int_{0}^{t}\int_{\mathbb{R}}\big{(}(\phi-\bar{\phi})_{t}+u(\phi-\bar{\phi})_{x}\big{)}(s,x)d\mu(s)ds$
$\displaystyle=\int_{\mathbb{R}}\bar{\phi}(t,x)d\mu(t)-\int_{\mathbb{R}}\bar{\phi}(0,x)d\mu(0)-\int_{0}^{t}\int_{\mathbb{R}}\big{(}\bar{\phi}_{t}+u\bar{\phi}_{x}\big{)}(s,x)d\mu(s)ds$
$\displaystyle\quad+\int_{\mathbb{R}}\phi(0,x)d\mu(0)+\int_{0}^{t}\int_{\mathbb{R}}\big{(}\phi_{t}+u\phi_{x}\big{)}(s,x)d\mu(s)ds.$
By (3.18) the terms in the next to last line can be made arbitrarily small by
increasing $M$, so that
$\displaystyle\int_{\mathbb{R}}\phi(t,x)d\mu(t)$
$\displaystyle=\int_{\mathbb{R}}\phi(0,x)d\mu(0)+\int_{0}^{t}\int_{\mathbb{R}}\big{(}\phi_{t}+u\phi_{x}\big{)}(s,x)d\mu(s)ds$
$\displaystyle=\int_{\mathbb{R}}\phi(0,x)d\mu(0)+\int_{0}^{t}\int_{\mathbb{R}}\big{(}u-g\big{)}\phi_{x}(s,x)d\mu(s)ds.$
Let $\bar{x}\in\mathbb{R}$ and consider the Hölder continuous function
$g(t,x)=u(0,\bar{x})+D(t+|x-\bar{x}|)^{1/2}$, which satisfies $g\geq u$ a.e.
by (3.9). Furthermore, let $\xi=\xi(t,z)$ solve $\xi_{t}=g(t,\xi)$ with
initial condition $\xi(0,z)=z$. Then
$\phi(t,\xi(t,z))=\phi(0,\xi(0,z))=\psi(z)$ if $\xi(t,\,\cdot\,)$ is a
strictly increasing function. To see this, observe that one has if
$\xi(t,z_{2})>\xi(t,z_{1})$ for $z_{2}>z_{1}$,
$\displaystyle\xi_{t}(t,z_{2})-\xi_{t}(t,z_{1})$
$\displaystyle=g(t,\xi(t,z_{2}))-g(t,\xi(t,z_{1}))$
$\displaystyle=D\frac{|\xi(t,z_{2})-\bar{x}|-|\xi(t,z_{1})-\bar{x}|}{(t+|\xi(t,z_{2})-\bar{x}|)^{1/2}+(t+|\xi(t,z_{1})-\bar{x}|)^{1/2}}$
$\displaystyle\geq-\frac{D}{2t^{1/2}}(\xi(t,z_{2})-\xi(t,z_{1})),$
which implies
$\xi(t,z_{2})-\xi(t,z_{1})\geq
e^{-Dt^{1/2}}(\xi(0,z_{2})-\xi(0,z_{1}))=e^{-Dt^{1/2}}(z_{2}-z_{1}),$
and thus $\xi(t,\,\cdot\,)$ and $\phi(t,\,\cdot\,)$ are strictly increasing
functions.
Since $g\geq u$ a.e., we have $\int_{0}^{t}\int(u-g)\phi_{x}d\mu(s)ds\leq 0$,
which together with
$\displaystyle\int_{\mathbb{R}}\phi(t,x)d\mu(t)$
$\displaystyle=-\int_{\mathbb{R}}\phi_{x}(t,x)F(t,x\pm)dx$
$\displaystyle=-\int_{\mathbb{R}}\phi_{x}(t,\xi(t,z))F(t,\xi(t,z)\pm)\xi_{z}(t,z)dz$
$\displaystyle=-\int_{\mathbb{R}}\frac{d}{dz}\phi(t,\xi(t,z))F(t,\xi(t,z)\pm)dz$
$\displaystyle=-\int_{\mathbb{R}}\frac{d}{dz}\phi(0,\xi(0,z))F(t,\xi(t,z)\pm)dz$
$\displaystyle=-\int\psi^{\prime}(z)F(t,\xi(t,z)\pm)dz,$
implies
$\int_{\mathbb{R}}\psi^{\prime}(x)\big{(}F(t,\xi(t,x)\pm)-F(0,x\pm)\big{)}dx\geq
0,$
from which we conclude
(3.19) $F(0,x+)\leq F(t,\xi(t,x)+).$
It remains to estimate $\xi(t,z)-\xi(0,z)$. Integrating the differential
equation for $\xi(t,z)$ we find
$\displaystyle|\xi(t,z)-\xi(0,z)|$
$\displaystyle\leq|u(0,\bar{x})|t+D\int_{0}^{t}(\tau+|\xi(\tau,z)-\bar{x}|)^{1/2}d\tau$
$\displaystyle\leq|u(0,\bar{x})|t+Dt^{1/2}\left(\int_{0}^{t}(\tau+|\xi(\tau,z)-\bar{x}|)d\tau\right)^{1/2}$
$\displaystyle\leq|u(0,\bar{x})|t+\frac{D^{2}}{4}t+\int_{0}^{t}(\tau+|\xi(\tau,z)-\xi(0,z)|+|\xi(0,z)-\bar{x}|)d\tau$
$\displaystyle\leq Lt+\int_{0}^{t}|\xi(\tau,z)-\xi(0,z)|d\tau$
where $L=|u(0,\bar{x})|+|\xi(0,z)-\bar{x}|+\frac{D^{2}}{4}+\frac{T}{2}$. Thus
$L+|\xi(t,z)-\xi(0,z)|\leq L+\int_{0}^{t}(L+|\xi(\tau,z)-\xi(0,z)|)d\tau,$
which by the Gronwall inequality implies
$L+|\xi(t,z)-\xi(0,z)|\leq Le^{t}$
or
$|\xi(t,z)-\xi(0,z)|\leq Lte^{T},\quad\text{ for all }t\in[0,T].$
Plugging this estimate into the integral representation of the solution, we
find
$\displaystyle\xi(t,z)-\xi(0,z)$
$\displaystyle\leq\int_{0}^{t}(u(0,\bar{x})+D(\tau+|\xi(\tau,z)-\xi(0,z)|+|\xi(0,z)-\bar{x}|)^{1/2})d\tau$
$\displaystyle\leq
u(0,\bar{x})t+D|\xi(0,z)-\bar{x}|^{1/2}t+D(1+Le^{T})t^{3/2}.$
Introducing $\tilde{M}=D(1+Le^{T})$, (3.19) reads
$F(0,\xi(0,z)+)\leq
F(t,\xi(0,z)+u(0,\bar{x})t+D|\xi(0,z)-\bar{x}|^{1/2}t+\tilde{M}t^{3/2}+).$
A close look reveals that
$\tilde{M}=D(1+(|u(0,\bar{x})|+|\xi(0,z)-\bar{x}|+\frac{D^{2}}{4}+\frac{T}{2})e^{T})$,
which means that $\tilde{M}$ depends linearly on $|\xi(0,z)-\bar{x}|$. On the
other hand, one has for $z=\xi(0,z)=\bar{x}$,
$F(0,\bar{x}+)\leq F(t,\xi(0,\bar{x})+u(0,\bar{x})t+\tilde{M}t^{3/2}+)\leq
F(t,\bar{x}+u(0,\bar{x})t+Mt^{3/2}+),$
where
$M=D(1+(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{D^{2}}{4}+\frac{T}{2})e^{T})$.
Since the above argument holds for any choice of $\bar{x}\in\mathbb{R}$ we end
up with
$F(0,x+)\leq F(t,x+u(0,x)t+Mt^{3/2}+)\quad\text{ for all }x\in\mathbb{R}.$
∎
Recalling (3.15), (3.16), and choosing $x(s)=y(s,\xi)$, we get
$\displaystyle L(t,y(s,\xi)+$ $\displaystyle u(s,y(s,\xi))(t-s)-M|t-s|^{3/2})$
$\displaystyle\leq\xi+u(s,y(s,\xi))(t-s)$ $\displaystyle\leq
L(t,y(s,\xi)+u(s,y(s,\xi))(t-s)+M|t-s|^{3/2}+),$
and, applying (3.16) once more,
$\displaystyle L(t,y(s,\xi)+$ $\displaystyle u(s,y(s,\xi))(t-s)-M|t-s|^{3/2})$
$\displaystyle\leq L(t,y(t,\xi+u(s,y(s,\xi))(t-s)))$ $\displaystyle\leq
L(t,y(s,\xi)+u(s,y(s,\xi))(t-s)+M|t-s|^{3/2}+).$
Since $L(t,\,\cdot\,)$ is strictly increasing we end up with
(3.20)
$\left|y(t,\xi+u(s,y(s,\xi))(t-s))-y(s,\xi)-u(s,y(s,\xi))(t-s)\right|\leq
M|t-s|^{3/2}.$
Note that the above inequality implies that
$\lim_{s\to t}\frac{y(t,\xi+u(s,y(s,\xi))(t-s))-y(s,\xi)}{t-s}=u(t,y(t,\xi)),$
since combining (3.9) and (3.17) yields
(3.21) $|u(s,y(s,\xi))-u(t,y(t,\xi))|\leq
D\big{(}1+N\big{)}^{1/2}|t-s|^{1/2}.$
Thus, one has
$\displaystyle y_{t}(t,\xi)$ $\displaystyle=\lim_{s\to
t}\frac{y(t,\xi)-y(s,\xi)}{t-s}$ $\displaystyle=\lim_{s\to
t}\Big{(}\frac{y(t,\xi)-y(t,\xi+u(s,y(s,\xi))(t-s))}{t-s}$
$\displaystyle\qquad\qquad\qquad+\frac{y(t,\xi+u(s,y(s,\xi))(t-s))-y(s,\xi))}{t-s}\Big{)}$
$\displaystyle=\lim_{s\to
t}\frac{y(t,\xi)-y(t,\xi+u(s,y(s,\xi))(t-s))}{t-s}+u(t,y(t,\xi)),$
and it is left to compute
(3.22) $\lim_{s\to
t}\frac{y(t,\xi)-y(t,\xi+u(s,y(s,\xi))(t-s))}{t-s}=\lim_{s\to
t}\frac{y(t,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s))}{t-s}.$
Recalling (3.21), the above equality (3.22) holds since $y(t,\,\cdot\,)$ is
Lipschitz continuous with Lipschitz constant at most one. Moreover, note that
for $u(t,y(t,\xi))\not=0$, one has
$\displaystyle\lim_{s\to t}$
$\displaystyle\frac{y(t,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s))}{t-s}$
$\displaystyle\qquad\qquad\qquad=u(t,y(t,\xi))\lim_{s\to
t}\frac{y(t,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s))}{u(t,y(t,\xi))(t-s)}$
$\displaystyle\qquad\qquad\qquad=-u(t,y(t,\xi))y_{\xi}(t,\xi).$
This result also remains valid in the case $u(t,y(t,\xi))=0$. Hence we
conclude that $y(t,\xi)$ satisfies
(3.23) $y_{t}(t,\xi)+u(t,y(t,\xi))y_{\xi}(t,\xi)=u(t,y(t,\xi)).$
Furthermore, recalling (3.2), direct computations yield
(3.24) $\tilde{H}_{t}(t,\xi)+u(t,y(t,\xi))\tilde{H}_{\xi}(t,\xi)=0.$
### 3.2. The differential equation satisfied by $U(t,\xi)$
To begin with we have a closer look at the system of differential equations,
given by (3.23) and (3.24), which reads, using (3.3)
(3.25a) $\displaystyle y_{t}(t,\xi)+Uy_{\xi}(t,\xi)$ $\displaystyle=U(t,\xi),$
(3.25b) $\displaystyle\tilde{H}_{t}(t,\xi)+U\tilde{H}_{\xi}(t,\xi)$
$\displaystyle=0.$
This systems of equations can be solved (uniquely) by the method of
characteristics, if the differential equation
(3.26) $k_{t}(t,\zeta)=U(t,k(t,\zeta))$
has a unique solution and $k_{\zeta}(t,\,\cdot\,)$ is strictly positive for
all $t\in[0,T]$. According to classical ODE theory, (3.26) has for each fixed
$\zeta$ a unique solution if the function $U(t,\xi)=u(t,y(t,\xi))$ is
continuous with respect to time and Lipschitz with respect to space. The
continuity with respect to time is an immediate consequence of (3.21). To
establish the Lipschitz continuity with respect to space is a bit more
involved. A closer look at (3.2) and (3.4) reveals that one has
$y(t,\xi)+\sigma F(t,y(t,\xi)-)+(1-\sigma)F(t,y(t,\xi)+)=\xi\quad\text{ for
some }\sigma\in[0,1],$
and
$\tilde{H}(t,\xi)=\sigma F(t,y(t,\xi)-)+(1-\sigma)F(t,y(t,\xi)+).$
This means especially, given $\xi\in\mathbb{R}$, there exist
$\xi^{-}\leq\xi\leq\xi^{+}$ such that
$y(t,\xi^{-})=y(t,\xi)=y(t,\xi^{+})$
and
$\tilde{H}(t,\xi^{-})=F(t,y(t,\xi)-)\quad\text{ and
}\quad\tilde{H}(t,\xi^{+})=F(t,y(t,\xi)+).$
In view of Definition 2.3 (v), we then have for $\xi_{1}<\xi_{2}$ such
$y(t,\xi_{1})\not=y(t,\xi_{2})$ that
$\displaystyle|u(t,y(t,\xi_{2}))-$ $\displaystyle u(t,y(t,\xi_{1}))|$
$\displaystyle=|u(t,y(t,\xi_{2}^{-}))-u(t,y(t,\xi_{1}^{+}))|$
$\displaystyle\leq\big{(}y(t,\xi_{2}^{-})-y(t,\xi_{1}^{+})\big{)}^{1/2}\big{(}F(t,y(t,\xi_{2})-)-F(t,y(t,\xi_{1})+)\big{)}^{1/2}$
$\displaystyle=\big{(}y(t,\xi_{2}^{-})-y(t,\xi_{1}^{+})\big{)}^{1/2}\big{(}\tilde{H}(t,\xi_{2}^{-})-\tilde{H}(t,\xi_{1}^{+})\big{)}^{1/2}$
$\displaystyle\leq|\xi_{2}^{-}-\xi_{1}^{+}|\leq|\xi_{2}-\xi_{1}|,$
since both $y(t,\,\cdot\,)$ and $\tilde{H}(t,\,\cdot\,)$ are Lipschitz
continuous in space with Lipschitz constant at most one. Thus (3.26) has a
unique solution. Furthermore, if $k(0,\zeta)=\zeta$ for all
$\zeta\in\mathbb{R}$ and $\zeta_{1}<\zeta_{2}$, we have, as long as the
function $k(t,\,\cdot\,)$ remains non-decreasing that
$-(k(t,\zeta_{2})-k(t,\zeta_{1}))\leq(k(t,\zeta_{2})-k(t,\zeta_{1}))_{t}\leq
k(t,\zeta_{2})-k(t,\zeta_{1}),$
which yields
$(k(0,\zeta_{2})-k(0,\zeta_{1}))e^{-t}\leq
k(t,\zeta_{2})-k(t,\zeta_{1})\leq(k(0,\zeta_{2})-k(0,\zeta_{1}))e^{t}.$
Thus $k(t,\,\cdot\,)$ not only remains strictly increasing, it is also
Lipschitz continuous with Lipschitz constant $e^{t}$ and hence according to
Rademacher’s theorem differentiable almost everywhere. In particular, one has
that
(3.27) $e^{-t}\leq k_{\zeta}(t,\zeta)\leq e^{t}.$
Introducing
$\bar{y}(t,\zeta)=y(t,k(t,\zeta))\quad\text{ and
}\quad\bar{H}(t,\zeta)=\tilde{H}(t,k(t,\zeta)),$
we have from (3.25)
(3.28a) $\displaystyle\bar{y}_{t}(t,\zeta)$
$\displaystyle=u(t,\bar{y}(t,\zeta)),$ (3.28b)
$\displaystyle\bar{H}_{t}(t,\zeta)$ $\displaystyle=0.$
In particular, one has
$\bar{H}(t,\zeta)=\bar{H}(s,\zeta)$
and (3.2) turns into
(3.29) $\bar{y}(t,\zeta)+\bar{H}(t,\zeta)=k(t,\zeta).$
Furthermore, note that $\bar{y}(t,\zeta)$ is a characteristic due to (3.28a).
Introducing
$\bar{U}(t,\zeta)=u(t,\bar{y}(t,\zeta))=u(t,y(t,k(t,\zeta)))=U(t,k(t,\zeta)),$
the system (3.28) reads
$\displaystyle\bar{y}_{t}(t,\zeta)$ $\displaystyle=\bar{U}(t,\zeta),$
$\displaystyle\bar{H}_{t}(t,\zeta)$ $\displaystyle=0.$
The above system can be extended to the system (2.6), which has been
introduced in [4] and which describes conservative solutions in the sense of
Definition 2.3, if we can show that
(3.30)
$\bar{U}_{t}(t,\zeta)=\frac{1}{2}\left(\bar{H}(t,\zeta)-\frac{1}{2}C\right).$
As an immediate consequence, one then obtains the uniqueness of global weak
conservative solutions.
The proof of (3.30) is based on an idea that has been used in [2]. According
to the definition of a weak solution, one has for all
$\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$ that
$\displaystyle\int_{s}^{t}\int_{\mathbb{R}}(u\phi_{t}+\frac{1}{2}u^{2}\phi_{x}+\frac{1}{2}(F-\frac{1}{2}$
$\displaystyle C)\phi)(\tau,x)dxd\tau$
$\displaystyle=\int_{\mathbb{R}}u\phi(t,x)dx-\int_{\mathbb{R}}u\phi(s,x)dx,\quad
s<t.$
Note that in the above equality, one can replace
$\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$ by $\phi(t,x)$
such that $\phi(t,\,\cdot\,)\in\mathcal{C}_{c}^{\infty}(\mathbb{R})$ for all
$t$ and $\phi(\,\cdot\,,x)\in\mathcal{C}^{1}(\mathbb{R})$ for all $x$.
To prove that $\bar{U}(t,\zeta)$ is Lipschitz we have to make a special choice
of $\phi(t,x)$. Let
$\phi_{\varepsilon}(t,x)=\frac{1}{\varepsilon}\psi\Big{(}\frac{\bar{y}(t,\zeta)-x}{\varepsilon}\Big{)}$
where $\psi$ is a standard Friedrichs mollifier. Our choice is motivated by
the following observation,
$\lim_{\varepsilon\to
0}\int_{\mathbb{R}}u\phi_{\varepsilon}(t,x)dx=u(t,\bar{y}(t,\zeta)),$
and hence
$u(t,\bar{y}(t,\zeta))-u(s,\bar{y}(s,\zeta))=\lim_{\varepsilon\to
0}\int_{\mathbb{R}}(u\phi_{\varepsilon}(t,x)-u\phi_{\varepsilon}(s,x))dx.$
Direct calculations then yield
$\displaystyle\int_{\mathbb{R}}\big{(}u\phi_{\varepsilon,t}+\frac{1}{2}u^{2}\phi_{\varepsilon,x}$
$\displaystyle+\frac{1}{2}(F-\frac{1}{2}C)\phi_{\varepsilon}\big{)}(\tau,x)dx$
$\displaystyle=\frac{1}{2}u(\tau,\bar{y}(\tau,\zeta))^{2}\int_{\mathbb{R}}\frac{1}{\varepsilon^{2}}\psi^{\prime}\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx$
$\displaystyle\quad-\frac{1}{2}\int_{\mathbb{R}}\big{(}u(\tau,x)-u(\tau,\bar{y}(\tau,\zeta))\big{)}^{2}\frac{1}{\varepsilon^{2}}\psi^{\prime}\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx$
$\displaystyle\quad+\frac{1}{2}\int_{\mathbb{R}}\big{(}F(\tau,x)-F(\tau,\bar{y}(\tau,\zeta))\big{)}\frac{1}{\varepsilon}\psi\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx$
$\displaystyle\quad+\frac{1}{2}F(\tau,\bar{y}(\tau,\zeta))-\frac{1}{4}C$
$\displaystyle=-\frac{1}{2}\int_{\mathbb{R}}\big{(}u(\tau,x)-u(\tau,\bar{y}(\tau,\zeta))\big{)}^{2}\frac{1}{\varepsilon^{2}}\psi^{\prime}\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx$
$\displaystyle\quad+\frac{1}{2}\int_{\mathbb{R}}\big{(}F(\tau,x)-F(\tau,\bar{y}(\tau,\zeta))\big{)}\frac{1}{\varepsilon}\psi\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx$
$\displaystyle\quad+\frac{1}{2}F(\tau,\bar{y}(\tau,\zeta))-\frac{1}{4}C.$
Introduce the function
$F_{\rm ac}(\tau,x)=\int_{-\infty}^{x}u_{x}^{2}(\tau,y)dy$
and note that $F_{\rm ac}(\tau,\,\cdot\,)$ is absolutely continuous. Moreover,
one has
$|u(\tau,x)-u(\tau,y)|\leq|x-y|^{1/2}|F_{\rm ac}(\tau,x)-F_{\rm
ac}(\tau,y)|^{1/2}$
and
$\displaystyle|\int_{\mathbb{R}}\big{(}u(\tau,x)-u(\tau,\bar{y}(\tau,\zeta))\big{)}^{2}$
$\displaystyle\frac{1}{\varepsilon^{2}}\psi^{\prime}\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx|$
$\displaystyle=\frac{1}{\varepsilon}|\int_{-1}^{1}\big{(}u(\tau,\bar{y}(\tau,\zeta)-\varepsilon\eta)-u(\tau,\bar{y}(\tau,\zeta))\big{)}^{2}\psi^{\prime}(\eta)d\eta|$
$\displaystyle\leq|F_{\rm ac}(\tau,\bar{y}(\tau,\zeta)+\varepsilon)-F_{\rm
ac}(\tau,\bar{y}(\tau,\zeta)-\varepsilon)|,$
which implies
$\lim_{\varepsilon\to
0}|\int_{\mathbb{R}}\big{(}u(\tau,x)-u(\tau,\bar{y}(\tau,\zeta))\big{)}^{2}\frac{1}{\varepsilon^{2}}\psi^{\prime}\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx|=0.$
For the last two terms, observe that for every $\tau\not\in\mathcal{N}$, i.e.,
for almost every $\tau\in[0,T]$ one has
$F(\tau,\bar{y}(\tau,\zeta))=F_{\rm
ac}(\tau,\bar{y}(\tau,\zeta))=\bar{H}(\tau,\zeta)$
and
$\displaystyle\left|\int_{\mathbb{R}}\big{(}F(\tau,x)-F(\tau,\bar{y}(\tau,\zeta))\big{)}\frac{1}{\varepsilon}\psi\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx\right|$
$\displaystyle\qquad=\left|\int_{-1}^{1}\big{(}F(\tau,\bar{y}(\tau,\zeta)-\varepsilon\eta)-F(\tau,\bar{y}(\tau,\zeta))\big{)}\psi(\eta)d\eta\right|$
$\displaystyle\qquad=\left|\int_{-1}^{1}\big{(}F_{\rm
ac}(\tau,\bar{y}(\tau,\zeta)-\varepsilon\eta)-F_{\rm
ac}(\tau,\bar{y}(\tau,\zeta))\big{)}\psi(\eta)d\eta\right|$
$\displaystyle\qquad\leq\left|F_{\rm
ac}(\tau,\bar{y}(\tau,\zeta)-\varepsilon)-F_{\rm
ac}(\tau,\bar{y}(\tau,\zeta))\right|\to 0,\quad\text{as $\varepsilon\to 0$.}$
Thus, the dominated convergence theorem yields
$\displaystyle\bar{U}(t,\zeta)-\bar{U}(s,\zeta)$
$\displaystyle=\int_{s}^{t}\frac{1}{2}\bar{H}(\tau,\zeta)d\tau-\frac{1}{4}C(t-s)$
$\displaystyle=\frac{1}{2}\bar{H}(t,\zeta)(t-s)-\frac{1}{4}C(t-s)=\frac{1}{2}\bar{H}(s,\zeta)(t-s)-\frac{1}{4}C(t-s).$
In particular,
$|\bar{U}(t,\zeta)-\bar{U}(s,\zeta)|\leq\frac{1}{2}C\left|t-s\right|,$
i.e., $\bar{U}(t,\zeta)$ is Lipschitz continuous with respect to time, and
(3.31) $\bar{U}_{t}(t,\zeta)=\frac{1}{2}\bar{H}(t,\zeta)-\frac{1}{4}C$
for all $(t,\zeta)$ in $[0,T]\times\mathbb{R}$. Moreover, one has, using
(3.27) and (3.29)
$\displaystyle|\bar{U}(t,\zeta_{1})-\bar{U}(t,\zeta_{2})|$
$\displaystyle=|u(t,\bar{y}(t,\zeta_{1}))-u(t,\bar{y}(t,\zeta_{2}))|$
$\displaystyle\leq|\bar{y}(t,\zeta_{1})-\bar{y}(t,\zeta_{2})|^{1/2}|F_{\rm
ac}(t,\bar{y}(t,\zeta_{1}))-F_{\rm ac}(t,\bar{y}(t,\zeta_{2}))|^{1/2}$
$\displaystyle\leq\left|\bar{y}(t,\zeta_{1})+F_{\rm
ac}(t,\bar{y}(t,\zeta_{1}))-\bar{y}(t,\zeta_{2})-F_{\rm
ac}(t,\bar{y}(t,\zeta_{2}))\right|$
$\displaystyle=|k(t,\zeta_{1})-k(t,\zeta_{2})|$
$\displaystyle\leq\left\|k_{\zeta}(t,\,\cdot\,)\right\|_{L^{\infty}}|\zeta_{1}-\zeta_{2}|$
(3.32) $\displaystyle\leq e^{t}|\zeta_{1}-\zeta_{2}|,$
i.e., $\bar{U}(t,\zeta)$ is Lipschitz continuous with respect to space.
The final step is to derive the differential equation for $U(t,\xi)$ from
(3.31). Recall that we have the relation
(3.33) $\bar{U}(t,\zeta)=U(t,k(t,\zeta)).$
Since $k(t,\,\cdot\,)$ is continuous and strictly increasing, there exists a
continuous and strictly increasing function $o(t,\,\cdot\,)$ such that
(3.34) $o(t,k(t,\zeta))=\zeta\quad\text{for all
}(t,\zeta)\in[0,T]\times\mathbb{R}.$
Now, given $\xi\in\mathbb{R}$, there exists a unique $\zeta\in\mathbb{R}$ such
that $k(t,\zeta)=\xi$, and thus
$o(t,\xi)-o(s,\xi)=o(t,k(t,\zeta))-o(s,k(t,\zeta))=o(s,k(s,\zeta))-o(s,k(t,\zeta)).$
By definition, we have that $o(t,\,\cdot\,)$ is continuous and strictly
increasing and hence differentiable almost everywhere. Furthermore, one has
that $o(t,\,\cdot\,)$ satisfies
(3.35) $e^{-t}\leq o_{\xi}(t,\xi)=\frac{1}{k_{\zeta}(t,o(t,\xi))}\leq e^{t},$
by (3.27), which yields
$|o(t,\xi)-o(s,\xi)|\leq e^{T}|k(s,\zeta)-k(t,\zeta)|\leq
e^{T}\int_{\min(s,t)}^{\max(s,t)}|u(\tau,y(\tau,k(\tau,\zeta)))|d\tau.$
Since $u(t,x)$ can be uniformly bounded on $[0,T]\times\mathbb{R}$, it follows
that $o(t,\xi)$ is Lipschitz with respect to both space and time on
$[0,T]\times\mathbb{R}$ and by Rademacher’s theorem differentiable almost
everywhere. Moreover, direct calculations yield
(3.36) $o_{t}(t,\xi)+Uo_{\xi}(t,\xi)=0\quad\text{ almost everywhere.}$
For every $t\in[0,T]$, $o(t,\,\cdot\,)$ is strictly increasing and continuous,
and combining (3.33) and (3.34), one has
$U(t,\xi)=\bar{U}(t,o(t,\xi))\quad\text{ for all
}(t,\xi)\in[0,T]\times\mathbb{R}.$
Furthermore, both $\bar{U}$ and $o$ are Lipschitz with respect to both space
and time on $[0,T]\times\mathbb{R}$, and hence both $U$ and $\bar{U}$ are
Lipschitz and hence differentiable almost everywhere on
$[0,T]\times\mathbb{R}$. Using (3.31) and (3.36) we finally end up with
(3.37) $\displaystyle U_{t}(t,\xi)$
$\displaystyle=\bar{U}_{t}(t,o(t,\xi))+\bar{U}_{\zeta}(t,o(t,\xi))o_{t}(t,\xi)$
$\displaystyle=\frac{1}{2}(\tilde{H}(t,\xi)-\frac{1}{2}C)-UU_{\xi}(t,\xi).$
Following closely [4] one can show that for each time $t$ the triplet
$(y,U,\tilde{H})$ belongs to $\mathcal{F}_{0}$. Furthermore, the system given
by (3.25) and (3.37) can be uniquely solved in $\mathcal{F}_{0}$ with the help
of the method of characteristics. Thus we have shown the following result.
###### Theorem 3.4.
Given a weak conservative solution $(u,\mu)$ to the Hunter–Saxton equation.
Then the functions $y(t,\xi)$, $U(t,\xi)$, and $\tilde{H}(t,\xi)$ defined in
(3.1), (3.2), and (3.3), respectively, satisfy the following system of
differential equations
(3.38a) $\displaystyle y_{t}(t,\xi)+Uy_{\xi}(t,\xi)$ $\displaystyle=U(t,\xi),$
(3.38b) $\displaystyle\tilde{H}_{t}(t,\xi)+U\tilde{H}_{\xi}(t,\xi)$
$\displaystyle=0,$ (3.38c) $\displaystyle U_{t}(t,\xi)+UU_{\xi}(t,\xi)$
$\displaystyle=\frac{1}{2}(\tilde{H}(t,\xi)-\frac{1}{2}C),$
which can be solved uniquely in $\mathcal{F}_{0}$ with the help of the method
of characteristics. In particular, applying the method of characteristics
yields the system of ordinary differential equations (2.6), which describes
the weak conservative solutions constructed in [4].
###### Remark 3.5.
Note that the above system of differential equations (3.38) is related to the
system (1.4) by relabeling. Indeed, denote by
$(\check{y},\check{U},\check{H})$ the classical Lagrangian solution with
initial data in $\mathcal{F}_{0}$, which solves (1.4), as introduced in [4].
Applying the method of characteristics to (3.38), will yield a unique
solution, since the characteristic equation
$k_{t}(t,\zeta)=U(t,k(t,\zeta))\quad\text{ with }\quad k(0,\zeta)=\zeta$
can be solved uniquely and $k(t,\,\cdot\,)$ is strictly increasing, see the
beginning of this subsection. Thus we are led to investigating the system
(3.39a) $\displaystyle k_{t}(t,\zeta)$ $\displaystyle=\hat{U}(t,\zeta),$
(3.39b) $\displaystyle\hat{y}_{t}(t,\zeta)$ $\displaystyle=\hat{U}(t,\zeta),$
(3.39c) $\displaystyle\hat{U}_{t}(t,\zeta)$
$\displaystyle=\frac{1}{2}(\hat{H}(t,\zeta)-\frac{1}{2}C),$ (3.39d)
$\displaystyle\hat{H}_{t}(t,\zeta)$ $\displaystyle=0,$
where $(\hat{y},\hat{U},\hat{H})(t,\zeta)=(y,U,\tilde{H})(t,k(t,\zeta))$ with
initial data
$(\hat{y},\hat{U},\hat{H})(0,\zeta)=(y,U,\tilde{H})(0,\zeta)=(\check{y},\check{U},\check{H})(0,\zeta).$
While the last three equations coincide with the ones in (1.4), which suggests
(3.40)
$(\hat{y}(t,\zeta),\hat{U}(t,\zeta),\hat{H}(t,\zeta))=(\check{y}(t,\zeta),\check{U}(t,\zeta),\check{H}(t,\zeta)),$
the role of the first equation has to be clarified to prove (3.40). By
construction one has that
$(y+\tilde{H})(t,\xi)=\xi\quad\text{ for all }(t,\xi),$
which implies that
$k(t,\zeta)=(y+\tilde{H})(t,k(t,\zeta))=(\hat{y}+\hat{H})(t,\zeta)$
and in particular, $k(t,\,\cdot\,)$ is the relabeling function connecting
$(y,U,\tilde{H})(t,\,\cdot\,)\in\mathcal{F}_{0}$ with
$(\hat{y},\hat{U},\hat{H})(t,\,\cdot\,)\in\mathcal{F}$ for every
$t\in\mathbb{R}$. Furthermore, since $k(t,\zeta)$ can be recovered using
$\hat{y}(t,\zeta)$ and $\hat{H}(t,\zeta)$, the system (3.39) can be reduced to
(1.4) and hence one obtains the weak conservative solutions constructed in
[4].
We have proved the following theorem.
###### Theorem 3.6.
For any initial data $(u_{0},\mu_{0})\in\mathcal{D}$ the Hunter–Saxton
equation has a unique global conservative weak solution
$(u,\mu)\in\mathcal{D}$ in the sense of Definition 2.3.
## 4\. Introduction of an auxiliary function
As a preparation for rewriting the Hunter–Saxton equation in a set of
coordinates, which shares the essential features with the Lagrangian
coordinates, while at the same time avoiding equivalence classes, we introduce
an, at the moment, auxiliary function $p(t,x)$.
According to the definition of a weak solution, one has for all
$\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$ that
(4.1)
$\int_{s}^{t}\int_{\mathbb{R}}(\phi_{t}+u\phi_{x})(\tau,x)d\mu(\tau,x)d\tau=\int_{\mathbb{R}}\phi(t,x)d\mu(t,x)-\int_{\mathbb{R}}\phi(s,x)d\mu(s,x).$
Furthermore, recall that $F(t,x)=\mu(t,(-\infty,x))$. If we would use the
change of variables from [6], which is based on the pseudo inverse of $F$, one
difficulty turns up immediately. The function $F(t,\,\cdot\,)$, might have
intervals, where it is constant and that would especially mean that its
inverse would have jumps. The classical method of characteristics implies that
these intervals, where $F(t,\,\cdot\,)$ is constant, will change their
position (i.e., they move to the right or to the left), but their length
remains unchanged. This would imply that one has to deal with jumps in the
inverse, and hence the involved change of variables does not simplify the
problem we are interested in. Therefore, a change of variables, for proving
the existence and uniqueness of conservative solutions of the HS equation,
while at the same time avoiding equivalence classes, should not be based on
the inverse of $F$, but the inverse of a strictly increasing and bounded
function. This is where $p(t,x)$ will come into the play.
Let $n\in\mathbb{N}$. Introduce the non-negative function
(4.2)
$p_{n}(t,x)=\big{(}K_{n}\star\mu(t)\big{)}(x)=\int_{\mathbb{R}}\frac{1}{(1+(x-y)^{2})^{n}}d\mu(t,y),$
with
(4.3) $K_{n}(x)=\frac{1}{(1+x^{2})^{n}}.$
We note the following elementary result.
###### Lemma 4.1.
Let $n\in\mathbb{N}$ and $K_{n}$ be given by (4.3). Then $K_{n}\in
L^{p}(\mathbb{R})\cap\mathcal{C}^{\infty}_{0}(\mathbb{R})$ for all $1\leq
p\leq\infty$. Note that
$\left|K_{n}^{\prime}\right|\leq nK_{n},\quad 0<K_{n}\leq
K_{1},\quad\left\|K_{1}\right\|_{L^{1}(\mathbb{R})}=\pi.$
The $j$th derivative $K_{n}^{(j)}$ satisfies
$K_{n}^{(j)}(x)=\frac{q_{n,j}(x)}{(1+x^{2})^{2^{j}n}},$
where $q_{n,j}(x)$ denotes a polynomial with degree not exceeding
$2^{j+1}n-2n-j$.
Thus
$p_{n}(t,\,\cdot\,)=K_{n}\star\mu(t)\in\mathcal{C}^{\infty}_{0}(\mathbb{R})\cap
H^{s}(\mathbb{R})$ for any integer $s\geq 1$.
###### Proof.
Clearly $K_{n}^{(j)}=q_{n,j}r^{-2^{j}n}$ for some polynomial $q_{n,j}$ where
$r=1+x^{2}$. It remains to estimate the degree of $q_{n,j}$. We prove this by
induction. Observe first that $\deg(q_{n,0})=0$ and $\deg(r^{n})=2n$. We find
in general
$q_{n,j+1}=q_{n,j}^{\prime}r^{2^{j}n}-2^{j}nq_{n,j}r^{2^{j}n-1}r^{\prime},\quad
j\in\mathbb{N}\cup\\{0\\}.$
Assume that $\deg(q_{n,j})\leq 2^{j+1}n-2n-j$ for some $j$. Then we note
$\displaystyle\deg(q_{n,j+1})$
$\displaystyle\leq\max(\deg(q_{n,j}^{\prime}r^{2^{j}n}),\deg(q_{n,j}r^{2^{j}n-1}r^{\prime}))$
$\displaystyle\leq\max(2^{j+1}n-2n-j-1+2^{j+1}n,2^{j+1}n-2n-j+2(2^{j}n-1)+1)$
$\displaystyle=2^{j+2}n-2n-j-1.$
Furthermore, one has
$\deg(q_{n,j})\leq\deg(r^{2^{j}n})-j,$
and therefore $p_{n}(t,x)$ not only belongs to
$\mathcal{C}^{\infty}_{0}(\mathbb{R})$, but $p_{n}(t,\,\cdot\,)$ in
$H^{s}(\mathbb{R})$ for any integer $s\geq 1$. ∎
###### Remark 4.2.
We will drop the subscript $n$ in the notation, and the value of $n$ will only
be fixed later. Thus we write
$K(x)=\frac{1}{(1+x^{2})^{n}},\quad p(t,x)=\big{(}K\star\mu(t)\big{)}(x).$
What can we say about the time evolution of the function $p(t,x)$? We have two
main ingredients: On the one hand the definition of $p(t,x)$. Consider
$\psi\in\mathcal{C}_{c}^{\infty}(\mathbb{R})$ such that
$\operatorname{supp}(\psi)\subset(-1,T+1)$, $\psi\equiv 1$ on $[0,T]$, and
$0\leq\psi\leq 1$. If we define $\phi(t,x)=\psi(t)K(x)$, then
$\phi(t,x)\in\mathcal{C}^{\infty}([0,\infty)\times\mathbb{R})$ and it can be
approximated by admissible test functions. On the other hand we have the
definition of a weak solution (4.1), which implies
$\displaystyle p(s,x)-p(t,x)$
$\displaystyle=\int_{\mathbb{R}}\phi(s,x-y)d\mu(s,y)-\int_{\mathbb{R}}\phi(t,x-y)d\mu(t,y)$
$\displaystyle=-\int_{t}^{s}\int_{\mathbb{R}}u(\tau,y)\phi_{x}(\tau,x-y)d\mu(\tau,y)d\tau$
(4.4)
$\displaystyle=-\int_{t}^{s}\int_{\mathbb{R}}u(\tau,y)K^{\prime}(x-y)d\mu(\tau,y)d\tau,\quad
0\leq t<s\leq T.$
Note that the above equation implies that the function $p(t,x)$ is locally
Lipschitz continuous with respect to time, if
$\int_{\mathbb{R}}u(\tau,y)K^{\prime}(x-y)d\mu(\tau,y)$
can be uniformly bounded. Therefore observe that
$|\int_{\mathbb{R}}u(\tau,y)K^{\prime}(x-y)d\mu(\tau,y)|\leq
n\left\|u(\tau,\,\cdot\,)\right\|_{L^{\infty}}p(\tau,x)\leq
n\left\|u(\tau,\,\cdot\,)\right\|_{L^{\infty}}C.$
Furthermore, since $u(t,x)$ is a weak solution to
$u_{t}+uu_{x}=\frac{1}{2}(F-\frac{1}{2}C),$
we have that
$\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}\leq\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct\quad\text{
for all }\quad t\geq 0.$
Thus Rademacher’s theorem yields that the function
$t\mapsto p(t,x)=\int_{\mathbb{R}}K(x-y)d\mu(t,y)$
from $[0,T]$ to $\mathbb{R}$ is Lipschitz continuous (or locally Lipschitz
continuous on $[0,\infty)\times\mathbb{R}$) and hence differentiable almost
everywhere on the finite interval $[0,T]$. In fact, one has from (4.4) and
Definition 2.3 that
(4.5) $p_{t}(t,x)=-\int_{\mathbb{R}}u(t,y)K^{\prime}(x-y)d\mu(t,y)$
for all $(t,x)\in[0,T]\times\mathbb{R}$. Indeed, use (4.4) as a starting
point, which reads in Lagrangian coordinates
$(\check{y},\check{U},\check{H})$,
(4.6)
$p(s,x)-p(t,x)=-\int_{t}^{s}\int_{\mathbb{R}}\check{U}(\tau,\xi)K^{\prime}(x-\check{y}(\tau,\xi))\check{H}_{\xi}(\tau,\xi)d\xi
d\tau.$
Recalling (2.6), direct calculations yield
$\displaystyle p(s,x)-p(t,x)$
$\displaystyle=-\int_{t}^{s}\int_{\mathbb{R}}\check{U}(t,\xi)K^{\prime}(x-\check{y}(t,\xi))\check{H}_{\xi}(t,\xi)d\xi
d\tau+\mathcal{O}((t-s)^{2})$
$\displaystyle=-\int_{\mathbb{R}}u(t,y)K^{\prime}(x-y)d\mu(t,y)(s-t)+\mathcal{O}((t-s)^{2})$
which implies
(4.7) $\lim_{s\to
t}\frac{p(s,x)-p(t,x)}{s-t}=-\int_{\mathbb{R}}u(t,y)K^{\prime}(x-y)d\mu(t,y)$
for all $(t,x)\in[0,T]\times\mathbb{R}$.
Note that combining (4.5), (3.6), and Lemma 4.1, one has
(4.8)
$|p_{t}(t,x)|\leq\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}n\left\|p(t,\,\cdot\,)\right\|_{L^{\infty}}\leq(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT)nC$
For later use, note that, we have
(4.9) $0\leq p(t,x)\leq\int_{\mathbb{R}}d\mu(t,y)=C$
and
(4.10)
$\int_{\mathbb{R}}p(t,x)dx=\int_{\mathbb{R}}\int_{\mathbb{R}}K(x-y)d\mu(t,y)dx=\int_{\mathbb{R}}\int_{\mathbb{R}}K(x-y)dx\,d\mu(t,y)=B,$
where $B$ is independent of time. A closer look reveals that
$\int_{\mathbb{R}}p(t,x)dx\leq\int_{\mathbb{R}}\int_{\mathbb{R}}\frac{1}{1+(x-y)^{2}}d\mu(t,y)dx=\pi
C.$
Furthermore, Lemma 4.1 implies that
$p_{x}(t,\cdot)\in\mathcal{C}_{0}^{\infty}(\mathbb{R})$ and
(4.11) $|p_{x}(t,x)|\leq np(t,x).$
Finally, note the following useful expression
$\displaystyle\int_{-\infty}^{x}p_{t}(t,z)dz$
$\displaystyle=-\int_{-\infty}^{x}\int_{\mathbb{R}}u(t,y)K^{\prime}(z-y)d\mu(t,y)dz$
$\displaystyle=-\int_{\mathbb{R}}\int_{-\infty}^{x}u(t,y)K^{\prime}(z-y)dz\,d\mu(t,y)$
(4.12) $\displaystyle=-\int_{\mathbb{R}}u(t,y)K(x-y)d\mu(t,y).$
Thus the function
(4.13) $g(t,\xi)=\int_{-\infty}^{y(t,\xi)}p(t,z)dz$
is differentiable almost everywhere on $[0,T]\times\mathbb{R}$ and satisfies
(4.14) $\displaystyle g_{\xi}(t,\xi)$
$\displaystyle=p(t,y(t,\xi))y_{\xi}(t,\xi),$ $\displaystyle g_{t}(t,\xi)$
$\displaystyle=\int_{-\infty}^{y(t,\xi)}p_{t}(t,z)dz+p(t,y(t,\xi))y_{t}(t,\xi)$
(4.15)
$\displaystyle=pu(t,y(t,\xi))\tilde{H}_{\xi}(t,\xi)-\int_{\mathbb{R}}u(t,z)K(y(t,\xi)-z)d\mu(t,z).$
Here we used, in the last step, (3.2) and (3.23). Note, that $g(t,\xi)$ is not
only differentiable on $[0,T]\times\mathbb{R}$, but even Lipschitz continuous.
## 5\. Uniqueness in a new set of coordinates
In this section we will rewrite the Hunter–Saxton equation in a set of
coordinates, which shares the essential features with the Lagrangian
coordinates, while at the same time avoids equivalence classes. However, there
is a price to pay: we have to impose an additional moment condition.
Given $\gamma>2$ and a weak conservative solution $(u,\mu)$ in the sense of
Definition 2.3, such that
(5.1) $\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu(0,x)<\infty.$
Using the reformulation of the Hunter–Saxton equation in Lagrangian
coordinates, whose time evolution is given by (2.6) and that
$f_{\gamma}(x)=|x|^{\gamma}$ is convex for $\gamma>2$, it follows that
(5.2) $\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu(t,x)<\infty\quad\text{ for all
}t\in\mathbb{R}.$
We can see this as follows.
$\displaystyle\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu(t,x)$
$\displaystyle=\int_{\mathbb{R}}(1+|\check{y}(t,\xi)|^{\gamma})\check{H}_{\xi}(t,\xi)d\xi$
$\displaystyle=\int_{\mathbb{R}}(1+|\check{y}(t,\xi)|^{\gamma})\check{H}_{\xi}(0,\xi)d\xi$
$\displaystyle\leq
2^{\gamma-1}\int_{\mathbb{R}}(1+|\check{y}(0,\xi)|^{\gamma})\check{H}_{\xi}(0,\xi)d\xi$
$\displaystyle\quad+2^{\gamma-1}(\|u_{0}\|_{\infty}+\frac{CT}{4})^{\gamma}t^{\gamma}\int_{\mathbb{R}}\check{H}_{\xi}(0,\xi)d\xi$
$\displaystyle\leq\tilde{C}\Big{(}\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu(0,x)+t^{\gamma}\Big{)},$
for a constant $\tilde{C}$, using (2.7c), (2.9b) and the estimate
$\left|\check{y}(t,\xi)\right|\leq\left|\check{y}(0,\xi)\right|+\int_{0}^{t}\left|\check{y}_{t}(s,\xi)\right|ds\leq\left|\check{y}(0,\xi)\right|+(\|u_{0}\|_{\infty}+\frac{CT}{4})t.$
Moreover, recalling the definition of $p(t,x)$, cf. (4.2), and introducing the
non-negative measure
(5.3) $d\nu(t,x)=p(t,x)dx+d\mu(t,x),$
we have that (5.2) implies for any $n\geq\gamma$,
(5.4) $\int_{\mathbb{R}}(1+|x|^{\gamma})d\nu(t,x)<\infty\quad\text{ for all
}t\in\mathbb{R}.$
For details we refer to Lemma A.3.
Furthermore, let
(5.5) $G(t,x)=\nu(t,(-\infty,x))=\int_{-\infty}^{x}p(t,y)dy+F(t,x),$
where $F(t,x)$ is given by (2.16). Then for all $t\in\mathbb{R}$ the function
$G(t,\,\cdot\,)$ is strictly increasing and satisfies
(5.6) $\lim_{x\to-\infty}G(t,x)=0\quad\text{ and
}\quad\lim_{x\to\infty}G(t,x)=B+C.$
Last but not least introduce $\chi(t,\,\cdot\,)$ the (pseudo) inverse of
$G(t,\,\cdot\,)$, i.e.,
(5.7) $\chi(t,\eta)=\sup\\{x\mid G(t,x)<\eta\\}.$
Then $\chi(t,\,\cdot\,)\colon[0,B+C]\to\mathbb{R}$ is strictly increasing for
every $t\not\in\mathcal{N}$. Furthermore, since the function $G(t,\,\cdot\,)$
is of bounded variation, it can have at most countably many jumps, which
implies that $\chi(t,\,\cdot\,)$ can have at most countably many intervals
where it is constant. On the other hand, the function $\chi(t,\,\cdot\,)$ has
no jumps since the function $G(t,\,\cdot\,)$, in contrast to $F(t,\,\cdot\,)$,
is strictly increasing.
Our first goal is to show that
(5.8) $\chi(t,\eta)=y(t,\ell(t,\eta)),$
where $y(t,\xi)$ is given by (3.1) and
$\ell(t,\,\cdot\,)\colon[0,B+C]\to\mathbb{R}$ is a strictly increasing
function to be determined next. Note that combining (4.13) and (5.5) one has
$G(t,y(t,\xi)\pm)=g(t,\xi)+F(t,y(t,\xi)\pm),$
and therefore (3.5) can be rewritten as
$G(t,y(t,\xi)-)\leq g(t,\xi)+\tilde{H}(t,\xi)\leq G(t,y(t,\xi)+).$
Introducing (cf. (3.2) and (4.13))
(5.9) $H(t,\xi)=g(t,\xi)+\tilde{H}(t,\xi),$
we end up with
(5.10) $G(t,y(t,\xi)-)\leq H(t,\xi)\leq G(t,y(t,\xi)+)\quad\text{ for all
}\xi\in\mathbb{R}.$
Since $H(t,\,\cdot\,)\colon\mathbb{R}\to[0,B+C]$ is strictly increasing (as
$\tilde{H}$ is non-decreasing and $g$ is strictly increasing) and continuous,
it is invertible with inverse $\ell(t,\,\cdot\,)$, i.e.,
(5.11) $H(t,\ell(t,\eta))=\eta\quad\text{ for all }(t,\eta).$
This is the function sought in (5.8). Furthermore,
(5.12) $G(t,y(t,\ell(t,\eta))-)\leq H(t,\ell(t,\eta))=\eta\leq
G(t,y(t,\ell(t,\eta))+).$
Since $y(t,\,\cdot\,)$ is surjective and non-decreasing, we end up with
$\chi(t,\eta)=\sup\\{x\mid G(t,x)<\eta\\}=y(t,\ell(t,\eta)).$
###### Remark 5.1.
Recall Remark 3.1 and the notation therein. Assume
$X_{1}(t,\xi)=X(t,f(t,\xi))\quad\text{ for all }(t,\xi),$
where $X(t,\,\cdot\,)\in\mathcal{F}_{0}$ and $f(t,\,\cdot\,)\in\mathcal{G}$,
i.e., $X(t,\,\cdot\,)$ and $X_{1}(t,\,\cdot\,)$ belong to the same equivalence
class. Then, following the same lines as above and denoting the inverse of
$f(t,\,\cdot\,)$ by $f^{-1}(t,\,\cdot\,)$, we would have ended up with
$\chi(t,\eta)=y_{1}(t,\ell_{1}(t,\eta))=y(t,f(t,f^{-1}(t,\ell(t,\eta))))=y(t,\ell(t,\eta))$
and
$\ell_{1}(t,\eta)=f^{-1}(t,\ell(t,\eta)).$
Thus we obtain the same function $\chi(t,\eta)$ independent of which
representative in the corresponding equivalence class we choose. This is in
contrast to some of the following steps, where relabeling will play a crucial
role. In particular, it is then of great importance, which representative we
choose from the equivalence class.
### 5.1. Differentiability of $\chi(t,\eta)$ with respect to time
Next, we want to study the time evolution of $\chi(t,\eta)$. On the one hand,
we will see that $\chi(t,\eta)$ behaves like a characteristic. On the other
hand, we expect $\chi_{t}(t,\,\cdot\,)\in L^{\gamma}([0,B+C])$, since one has
$\int_{\mathbb{R}}|x|^{\gamma}d\nu(t,x)=\int_{0}^{B+C}|\chi(t,\eta)|^{\gamma}d\eta,$
by (5.4) and (5.7).
To begin with we aim at showing that $\chi(t,\eta)$ is differentiable with
respect to time in the following sense: We establish that
$\chi(\,\cdot\,,\eta)$ is Lipschitz continuous and show that for each
$t\in[0,T]$ one has that
$\chi_{t}(t,\eta)=\lim_{s\to t}\frac{\chi(t,\eta)-\chi(s,\eta)}{t-s}$
exists for almost every $\eta\in[0,B+C]$. The dominated convergence theorem
then implies that $\chi_{t}(t,\,\cdot\,)\in L^{\gamma}([0,B+C])$.
To establish that $\chi(t,\eta)$ is Lipschitz with respect to time, a
relabeling argument will be the key. We will show that $(y+H)(t,\,\cdot\,)$ is
a relabeling function denoted $v(t,\,\cdot\,)$. To that end observe that
combining (3.2) and (5.9) yields
(5.13) $y(t,\xi)+H(t,\xi)=\xi+g(t,\xi).$
Introducing the function
(5.14) $v(t,\xi)=\xi+g(t,\xi),$
where $g(t,\xi)$ is given by (4.13), we end up with
(5.15) $y(t,\xi)+H(t,\xi)=v(t,\xi).$
Combining (4.9), (4.10), and $0\leq y_{\xi}(t,\xi)\leq 1$, we have that
$v(t,\,\cdot\,)$ satisfies all assumptions of Lemma 2.7 and hence
$v(t,\,\cdot\,)\colon\mathbb{R}\to\mathbb{R}$ is a relabeling function. Thus
$v(t,\,\cdot\,):\mathbb{R}\to\mathbb{R}$ is strictly increasing and
continuous, which implies that there exists a unique, strictly increasing and
continuous function $w(t,\,\cdot\,):\mathbb{R}\to\mathbb{R}$ such that
(5.16) $v(t,w(t,\xi))=\xi=w(t,v(t,\xi))\quad\text{ for all }
(t,\xi)\in[0,T]\times\mathbb{R}.$
In particular, one has
$y(t,w(t,\xi))+H(t,w(t,\xi))=\xi\quad\text{ for all
}(t,\xi)\in[0,T]\times\mathbb{R}.$
Introducing
(5.17) $\hat{y}(t,\xi)=y(t,w(t,\xi))\quad\text{ and
}\quad\hat{H}(t,\xi)=H(t,w(t,\xi)),$
the relation (5.15) rewrites as
(5.18) $\hat{y}(t,\xi)+\hat{H}(t,\xi)=\xi.$
Since both $H(t,\,\cdot\,)$ and $w(t,\,\cdot\,)$, and hence
$\hat{H}(t,\,\cdot\,)$, are strictly increasing and continuous, there exists a
unique, strictly increasing and continuous function
$\hat{\ell}(t,\,\cdot\,)\colon[0,B+C]\to\mathbb{R}$ such that
(5.19) $\hat{H}(t,\hat{\ell}(t,\eta))=\eta\quad\text{ for all
}(t,\eta)\in[0,T]\times[0,B+C].$
Recalling (5.16) and (5.17), we have that
$H\big{(}t,w(t,v(t,\ell(t,\eta)))\big{)}=H(t,\ell(t,\eta))=\eta=\hat{H}(t,\hat{\ell}(t,\eta))=H\big{(}t,w(t,\hat{\ell}(t,\eta))\big{)}.$
Thus, cf. Remark 5.1,
$\hat{\ell}(t,\eta)=v(t,\ell(t,\eta))\quad\text{ for all
}(t,\eta)\in[0,T]\times[0,B+C].$
and
(5.20) $\chi(t,\eta)=y(t,\ell(t,\eta))=\hat{y}(t,\hat{\ell}(t,\eta)),$
which, together with (5.18), implies
(5.21)
$\chi(t,\eta)+\eta=\hat{y}(t,\hat{\ell}(t,\eta))+\hat{H}(t,\hat{\ell}(t,\eta))=\hat{\ell}(t,\eta)=\ell(t,\eta)+g(t,\ell(t,\eta)).$
An important consequence of the above equality is, that we can choose whether
we want to study the differentiability of
$\chi(t,\eta)=\hat{\ell}(t,\eta)-\eta$ or of $\hat{\ell}(t,\eta)$ with respect
to time. Since $\hat{\ell}(t,\,\cdot\,)$ is the inverse to
$\hat{H}(t,\,\cdot\,)$, it seems advantageous to study $\hat{\ell}(t,\eta)$ in
detail. The basis will be a good understanding of the relabeling function
$v(t,\eta)$ and its inverse $w(t,\eta)$.
#### The Lipschitz continuity of $w(t,\xi)$
We proceed by showing that the function $w(t,\xi)$ is Lipschitz continuous,
which then implies that both $\hat{y}(t,\xi)$ and $\hat{H}(t,\xi)$ are
differentiable almost everywhere. A closer look at (5.14) reveals that
$v(t,\xi)$ is Lipschitz continuous and hence differentiable almost everywhere
on $[0,T]\times\mathbb{R}$. In particular, (4.14), (4.9), and $0\leq
y_{\xi}(t,\xi)\leq 1$ yield
(5.22) $1\leq v_{\xi}(t,\xi)=1+p(t,y(t,\xi))y_{\xi}(t,\xi)\leq 1+C,$
and, using (5.14) and (4.15),
(5.23)
$v_{t}(t,\xi)=g_{t}(t,\xi)=pu(t,y(t,\xi))\tilde{H}_{\xi}(t,\xi)-\int_{\mathbb{R}}u(t,z)K(y(t,\xi)-z)d\mu(t,z),$
which satisfies
$|v_{t}(t,\xi)|\leq
2\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct\big{)}C,$
by applying in addition (3.6) and (3.2). Now, given $\xi\in\mathbb{R}$, there
exists a unique $\eta\in\mathbb{R}$ by (5.16), such that
$w(t,\xi)=w(t,v(t,\eta))=\eta=w(s,v(s,\eta)).$
Thus, we can write
(5.24)
$w(t,\xi)-w(s,\xi)=w(t,v(t,\eta))-w(s,v(t,\eta))=w(s,v(s,\eta))-w(s,v(t,\eta)).$
By definition, we have that $w(t,\,\cdot\,)$ is continuous and strictly
increasing. In particular, one has that $w(t,\,\cdot\,)$ is differentiable
almost everywhere and
$\displaystyle w_{\xi}(t,\xi)=\frac{1}{v_{\xi}(t,w(t,\xi))}$
$\displaystyle=\frac{1}{1+p(t,y(t,w(t,\xi)))y_{\xi}(t,w(t,\xi))}$
$\displaystyle=\frac{1}{1+p(t,\hat{y}(t,\xi))y_{\xi}(t,w(t,\xi))}\leq 1.$
Combined, with (5.24), this yields
$|w(t,\xi)-w(s,\xi)|\leq|v(s,\eta)-v(t,\eta)|\leq
2(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT)C|t-s|.$
Furthermore, one has
$|w(t,\xi_{1})-w(t,\xi_{2})|\leq|\xi_{1}-\xi_{2}|.$
This finishes the proof of the Lipschitz continuity of $w(t,\xi)$, which
implies by Rademacher’s theorem that $w(t,\xi)$ is differentiable almost
everywhere on $[0,T]\times\mathbb{R}$. Since also $y$, $\tilde{H}$, and $g$
are Lipschitz continuous on $[0,T]\times\mathbb{R}$, (5.9) and (5.17) imply
that $\hat{H}$ and $\hat{y}$ are differentiable almost everywhere on
$[0,T]\times\mathbb{R}$.
#### The Lipschitz continuity of $\hat{\ell}(\,\cdot\,,\eta)$
We are now ready to show the Lipschitz continuity of
$\hat{\ell}(\,\cdot\,,\eta)$, which immediately implies that
$\chi(\,\cdot\,,\eta)$ is Lipschitz continuous by (5.21). In view of (5.19),
we start by having a closer look at $\hat{H}(t,\xi)$. By (5.16) we have that,
(5.25)
$w_{t}(t,\xi)=-v_{t}(t,w(t,\xi))w_{\xi}(t,\xi)=-g_{t}(t,w(t,\xi))w_{\xi}(t,\xi),$
and, using (5.9), (3.24), and (4.14) that
$\displaystyle H_{t}(t,\xi)$ $\displaystyle+u(t,y(t,\xi))H_{\xi}(t,\xi)$
$\displaystyle=\tilde{H}_{t}(t,\xi)+u(t,y(t,\xi))\tilde{H}_{\xi}(t,\xi)+g_{t}(t,\xi)+u(t,y(t,\xi))g_{\xi}(t,\xi)$
$\displaystyle=g_{t}(t,\xi)+u(t,y(t,\xi))g_{\xi}(t,\xi)$ (5.26)
$\displaystyle=g_{t}(t,\xi)+up(t,y(t,\xi))y_{\xi}(t,\xi).$
Combing the above equations and recalling (4.15), (5.17), (5.18), and (5.22)
we get
$\displaystyle\hat{H}_{t}(t,\xi)$
$\displaystyle+u(t,\hat{y}(t,\xi))\hat{H}_{\xi}(t,\xi)$
$\displaystyle=\big{(}H_{t}(t,w(t,\xi))+u(t,\hat{y}(t,\xi))H_{\xi}(t,w(t,\xi))\big{)}-u(t,\hat{y}(t,\xi))H_{\xi}(t,w(t,\xi))$
$\displaystyle\quad+H_{\xi}(t,w(t,\xi))w_{t}(t,\xi)+u(t,\hat{y}(t,\xi))\hat{H}_{\xi}(t,\xi)$
$\displaystyle=g_{t}(t,w(t,\xi))+up(t,\hat{y}(t,\xi))y_{\xi}(t,w(t,\xi))-u(t,\hat{y}(t,\xi))\hat{H}_{\xi}(t,\xi)v_{\xi}(t,w(t,\xi))$
$\displaystyle\quad-
g_{t}(t,w(t,\xi))\hat{H}_{\xi}(t,\xi)+u(t,\hat{y}(t,\xi))\hat{H}_{\xi}(t,\xi)$
$\displaystyle=g_{t}(t,w(t,\xi))\hat{y}_{\xi}(t,\xi)+up(t,\hat{y}(t,\xi))y_{\xi}(t,w(t,\xi))$
$\displaystyle\quad-
up(t,\hat{y}(t,\xi))\hat{H}_{\xi}(t,\xi)y_{\xi}(t,w(t,\xi))$
$\displaystyle=(g_{t}(t,w(t,\xi))+up(t,\hat{y}(t,\xi))y_{\xi}(t,w(t,\xi)))\hat{y}_{\xi}(t,\xi)$
$\displaystyle=\Big{(}up(t,\hat{y}(t,\xi))-\int_{\mathbb{R}}u(t,z)K(\hat{y}(t,\xi)-z)d\mu(t,z)\Big{)}\hat{y}_{\xi}(t,\xi).$
If we can show that the term on the right-hand side can be bounded by a
multiple of $\hat{H}_{\xi}$, then we are led to sub- and supersolutions, which
solve a transport equation. Recalling (5.9), (4.13), and (3.6), we have that
$\displaystyle|\Big{(}up(t,\hat{y}(t,\xi))$
$\displaystyle-\int_{\mathbb{R}}u(t,z)K(\hat{y}(t,\xi)-z)d\mu(t,z)\Big{)}\hat{y}_{\xi}(t,\xi)|$
$\displaystyle\leq
2\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}p(t,\hat{y}(t,\xi))\hat{y}_{\xi}(t,\xi)$
$\displaystyle\leq
2\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}\hat{H}_{\xi}(t,\xi).$
Here we have used that
$\displaystyle\hat{H}_{\xi}(t,\xi)$
$\displaystyle=H_{\xi}(t,w(t,\xi))w_{\xi}(t,\xi)$
$\displaystyle=\big{(}\tilde{H}_{\xi}(t,w(t,\xi))+p(t,y(t,w(t,\xi)))y_{\xi}(t,w(t,\xi))\big{)}w_{\xi}(t,\xi)$
$\displaystyle\geq p(t,\hat{y}(t,\xi))\hat{y}_{\xi}(t,\xi),$
which combines (4.13), (5.9), (5.17), $0\leq\tilde{H}_{\xi}(t,\xi)\leq 1$, and
$w_{\xi}(t,\xi)\geq 0$. In particular, one obtains that
$\hat{H}_{t}(t,\xi)-A\hat{H}_{\xi}(t,\xi)\leq
0\leq\hat{H}_{t}(t,\xi)+A\hat{H}_{\xi}(t,\xi),$
where $A=3(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT)$.
Applying the method of characteristics, we end up with the following estimate
$\hat{H}(s,x-A|t-s|)\leq\hat{H}(t,x)\leq\hat{H}(s,x+A|t-s|).$
Now, following the same lines as before, we have: Given $\eta\in[0,B+C]$,
there exists a unique $\hat{\eta}\in\mathbb{R}$ such that
$\hat{\ell}(t,\eta)=\hat{\ell}(t,\hat{H}(t,\hat{\eta}))=\hat{\eta}=\hat{\ell}(s,\hat{H}(s,\hat{\eta})).$
Furthermore, we have
$\displaystyle|\hat{\ell}(t,\eta)-\hat{\ell}(s,\eta)|$
$\displaystyle=|\hat{\ell}(t,\hat{H}(t,\hat{\eta}))-\hat{\ell}(s,\hat{H}(t,\hat{\eta}))|$
$\displaystyle=|\hat{\ell}(s,\hat{H}(s,\hat{\eta}))-\hat{\ell}(s,\hat{H}(t,\hat{\eta}))|$
$\displaystyle\leq\hat{\ell}(s,\hat{H}(s,\hat{\eta}+A|t-s|))-\hat{\ell}(s,\hat{H}(s,\hat{\eta}-A|t-s|))=2A|t-s|,$
since $\hat{\ell}(t,\,\cdot\,)$ is strictly increasing, and (cf. (5.21))
(5.27)
$\left|\frac{\chi(t,\eta)-\chi(s,\eta)}{t-s}\right|=\left|\frac{\hat{\ell}(t,\eta)-\hat{\ell}(s,\eta)}{t-s}\right|\leq
2A.$
This finishes the proof of the Lipschitz continuity of
$\hat{\ell}(\,\cdot\,,\eta)$. Note that
$\chi(t,\,\cdot\,)\colon[0,B+C]\to\mathbb{R}$ and hence $2A$ can be seen as a
dominating function. This observation is essential since the differential
equation for $\chi$ has to be considered in $L^{\gamma}([0,B+C])$.
#### The time derivative of $\chi_{t}(t,\eta)$
It is left to compute, cf. (5.21),
$\displaystyle\chi_{t}(t,\eta)$ $\displaystyle=\lim_{s\to
t}\frac{\chi(t,\eta)-\chi(s,\eta)}{t-s}$ (5.28) $\displaystyle=\lim_{s\to
t}\frac{\ell(t,\eta)-\ell(s,\eta)}{t-s}+\lim_{s\to
t}\frac{g(t,\ell(t,\eta))-g(s,\ell(s,\eta))}{t-s}$
for almost every $\eta\in[0,B+C]$.
#### The time derivative of $\ell(t,\eta)$
To begin with, we will show that
$\lim_{s\to t}\frac{\ell(t,\eta)-\ell(s,\eta)}{t-s}$
exists for almost every $\eta\in[0,B+C]$ and compute its value. Since
$\ell(t,\,\cdot\,)$ is the inverse of $H(t,\,\cdot\,)$, cf. (5.11), we start
by having a closer look at $H(t,\xi)$. Recall (3.21), which implies that
$|y\big{(}t,\xi+u(s,y(s,\xi))(t-s)\big{)}-y(t,\xi+u(t,y(t,\xi))(t-s))|\leq
D(1+N)^{1/2}|t-s|^{3/2},$
and, combined with (3.20), that there exists a positive constant $\tilde{M}$
such that
(5.29)
$\left|y(t,\xi+u(t,y(t,\xi))(t-s))-y(s,\xi)-u(t,y(t,\xi))(t-s)\right|\leq\tilde{M}|t-s|^{3/2}.$
Applying (3.2) the above inequality reads
(5.30)
$\left|\tilde{H}(s,\xi)-\tilde{H}\big{(}t,\xi+u(t,y(t,\xi))(t-s)\big{)}\right|\leq\tilde{M}|t-s|^{3/2}.$
As the following lemma shows a similar estimate holds for $H(t,\xi)$. The
proof relies on a detailed investigation of the function $g(t,\xi)$ and can be
found in Lemma A.1.
###### Lemma 5.2.
(i): Let $g(t,\xi)$ be given by (4.13). Then there exists a positive constant
$\bar{M}$ such that
(5.31) $\displaystyle-\bar{M}$
$\displaystyle|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s)))u(t,y(t,\xi)\big{)}(t-s)$
$\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t)$
$\displaystyle\leq g(s,\xi)-g\big{(}t,\xi+u(t,y(t,\xi))(t-s)\big{)}$
$\displaystyle\leq\bar{M}|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$
$\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t).$
(ii): Let $H(t,\xi)$ be defined by (5.9). Then
$\displaystyle-(\tilde{M}$
$\displaystyle+\bar{M})|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$
$\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t)$
$\displaystyle\leq H(s,\xi)-H\big{(}t,\xi+u(t,y(t,\xi))(t-s)\big{)}$
$\displaystyle\leq(\tilde{M}+\bar{M})|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$
$\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t).$
Since both $H(t,\,\cdot\,)$ and its inverse $\ell(t,\,\cdot\,)$ are strictly
increasing and continuous, we have that there exists a unique $\eta(s)$ such
that
(5.32) $\ell(s,\eta)+u\big{(}t,y(t,\ell(s,\eta))\big{)}(t-s)=\ell(t,\eta(s)),$
and replacing $\xi$ by $\ell(s,\eta)$ in Lemma 5.2 (ii), we have
(5.33) $\displaystyle-($ $\displaystyle\tilde{M}+\bar{M})|t-s|^{3/2}$
$\displaystyle\quad-p\big{(}t,y(t,\ell(s,\eta)+u(t,y(t,\ell(s,\eta)))(t-s))\big{)}u\big{(}t,y(t,\ell(s,\eta))\big{)}(t-s)$
$\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\tilde{\eta}))$
$\displaystyle\qquad\qquad\times
K\big{(}y(t,\ell(s,\eta)+u(t,y(t,\ell(s,\eta)))(t-s))-y(t,\tilde{\eta})\big{)}\tilde{H}_{\xi}(t,\tilde{\eta})d\tilde{\eta}\,(s-t)$
$\displaystyle\leq\eta-\eta(s)$
$\displaystyle\leq(\tilde{M}+\bar{M})|t-s|^{3/2}$
$\displaystyle\quad-p\big{(}t,y(t,\ell(s,\eta)+u(t,y(t,\ell(s,\eta)))(t-s))\big{)}u\big{(}t,y(t,\ell(s,\eta))\big{)}(t-s)$
$\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\tilde{\eta}))$
$\displaystyle\qquad\qquad\times
K\big{(}y(t,\ell(s,\eta)+u(t,y(t,\ell(s,\eta)))(t-s))-y(t,\tilde{\eta})\big{)}\tilde{H}_{\xi}(t,\tilde{\eta})d\tilde{\eta}\,(s-t).$
Furthermore, note that the above inequality implies that $\eta(s)\to\eta$ as
$s\to t$ and hence $\ell(s,\eta)\to\ell(t,\eta)$ as $s\to t$ by (5.32).
Thus we have
(5.34) $\displaystyle\ell_{t}(t,\eta)$ $\displaystyle=\lim_{s\to
t}\frac{\ell(s,\eta)-\ell(t,\eta)}{s-t}$ $\displaystyle=\lim_{s\to
t}\left(\frac{\ell(t,\eta(s))-\ell(t,\eta)}{\eta(s)-\eta}\frac{\eta(s)-\eta}{s-t}+u(t,y(t,\ell(s,\eta)))\right)$
$\displaystyle=\lim_{s\to
t}\frac{\ell(t,\eta(s))-\ell(t,\eta)}{\eta(s)-\eta}\lim_{s\to
t}\frac{\eta(s)-\eta}{s-t}+\lim_{s\to t}u(t,y(t,\ell(s,\eta))),$
if all the above limits exist.
The first limit is of the form
$\lim_{\tilde{\eta}\to\eta}\frac{\ell(t,\tilde{\eta})-\ell(t,\eta)}{\tilde{\eta}-\eta}$
since $\eta(s)\to\eta$ as $s\to t$. Moreover, $\ell(t,\,\cdot\,)$ is strictly
increasing and continuous and hence differentiable almost everywhere. Thus,
the above limit exists for almost every $\eta\in\mathbb{R}$ and equals
$\ell_{\eta}(t,\eta)$.
For the second limit, keep in mind that both $u(t,\,\cdot\,)$ and
$p(t,\,\cdot\,)$ are continuous and that $\ell(s,\eta)\to\ell(t,\eta)$ as
$s\to t$. The estimate (5.33), then implies that
$\displaystyle\lim_{s\to t}\frac{\eta(s)-\eta}{s-t}$
$\displaystyle=-p(t,y(t,\ell(t,\eta)))u(t,y(t,\ell(t,\eta)))$
$\displaystyle\quad+\int_{\mathbb{R}}u(t,y(t,\xi))K(y(t,\ell(t,\eta))-y(t,\xi))\tilde{H}_{\xi}(t,\xi)d\xi$
$\displaystyle=-p(t,\chi(t,\eta))u(t,\chi(t,\eta))$ (5.35)
$\displaystyle\quad+\int_{0}^{B+C}u(t,\chi(t,\xi))K(\chi(t,\eta)-\chi(t,\xi))\big{(}1-p(t,\chi(t,\xi))\chi_{\eta}(t,\xi)\big{)}d\xi.$
Here we used (5.8), (4.13), (5.9). Introducing
(5.36) $\mathcal{U}(t,\eta)=u(t,\chi(t,\eta))\quad\text{ and
}\quad\mathcal{P}(t,\eta)=p(t,\chi(t,\eta)),$
we end up with
(5.37) $\lim_{s\to t}\frac{\eta(s)-\eta}{s-t}=-h(t,\eta),$
where
(5.38)
$h(t,\eta)=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}.$
Using once more that $u(t,\,\cdot\,)$ is continuous and that
$\ell(s,\eta)\to\ell(t,\eta)$ as $s\to t$, we get
(5.39) $\lim_{s\to
t}u(t,y(t,\ell(s,\eta)))=u(t,y(t,\ell(t,\eta)))=\mathcal{U}(t,\eta).$
Combining (5.34)–(5.39) we have shown that for a given $t$, one has for almost
every $\eta\in[0,B+C]$ that
(5.40) $\ell_{t}(t,\eta)+h(t,\eta)\ell_{\eta}(t,\eta)=\mathcal{U}(t,\eta),$
where $h(t,\eta)$ is given by (5.38). This completes the computation of
$\ell_{t}(t,\eta)$.
It is left to show, cf. (5.28), that
$\lim_{s\to t}\frac{g(t,\ell(t,\eta))-g(s,\ell(s,\eta))}{t-s}$
exists for almost every $\eta\in[0,B+C]$ and to compute its value. Recall
(5.31) and (5.32), which imply
$\displaystyle g(t,\ell(t,\eta))-$ $\displaystyle g(s,\ell(s,\eta))$
$\displaystyle=g(t,\ell(t,\eta))-g(t,\ell(t,\eta(s)))$
$\displaystyle\quad+g\big{(}t,\ell(s,\eta)+u(t,y(t,\ell(s,\eta)))(t-s)\big{)}-g(s,\ell(s,\eta))$
$\displaystyle=\frac{g(t,\ell(t,\eta))-g(t,\ell(t,\eta(s)))}{\eta-\eta(s)}(\eta-\eta(s))$
$\displaystyle\quad+p\big{(}t,y(t,\ell(t,\eta(s)))\big{)}u\big{(}t,y(t,\ell(s,\eta))\big{)}(t-s)$
$\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\tilde{\eta}))K\big{(}y(t,\ell(t,\eta(s)))-y(t,\tilde{\eta})\big{)}\tilde{H}_{\xi}(t,\tilde{\eta})d\tilde{\eta}\,(t-s)$
$\displaystyle\quad+\mathcal{O}(\left|t-s\right|^{3/2}).$
Using (5.37) and (5.38), we thus end up with
(5.41) $\displaystyle\lim_{s\to
t}\frac{g(t,\ell(t,\eta))-g(s,\ell(s,\eta))}{t-s}$
$\displaystyle=\big{(}1-g_{\xi}(t,\ell(t,\eta))\ell_{\eta}(t,\eta)\big{)}h(t,\eta)$
$\displaystyle=(1-\mathcal{P}(t,\eta)\chi_{\eta}(t,\eta))h(t,\eta).$
Combining (5.28), (5.40), (5.41), and (5.21), finally yields that for each
$t\in[0,T]$
(5.42) $\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)=\mathcal{U}(t,\eta)$
for almost every $\eta\in[0,B+C]$ and the function $h(t,\eta)$ is given by
(5.38). This completes the computation of $\chi_{t}(t,\eta)$.
To summarize, we showed with the help of the dominated convergence theorem
that
$\displaystyle\int_{0}^{B+C}\chi_{t}^{\gamma}(t,\eta)d\eta$
$\displaystyle=\lim_{s\to
t}\int_{0}^{B+C}\left(\frac{\chi(t,\eta)-\chi(s,\eta)}{t-s}\right)^{\gamma}d\eta$
$\displaystyle=\int_{0}^{B+C}\big{(}-h(t,\eta)\chi_{\eta}(t,\eta)+\mathcal{U}(t,\eta)\big{)}^{\gamma}d\eta.$
Actually we showed that
$\lim_{s\to
t}\int_{0}^{B+C}\left|\frac{\chi(t,\eta)-\chi(s,\eta)}{t-s}+h(t,\eta)\chi_{\eta}(t,\eta)+\mathcal{U}(t,\eta)\right|^{\gamma}d\eta=0,$
which is a limiting process in $L^{\gamma}([0,B+C])$. Thus the correct Banach
space to work in, is $L^{\gamma}([0,B+C])$. This might be surprising at first
sight since only $\chi_{t}(t,\,\cdot\,)$ belongs to $L^{\gamma}([0,B+C])$ but
not $\chi_{\eta}(t,\,\cdot\,)$. On the other hand, one has that the function
$g(t,\ell(t,\,\cdot\,))$ is non-decreasing and hence differentiable almost
everywhere. Furthermore, (5.9) and (5.11) imply that $g(t,\ell(t,\,\cdot\,))$
is Lipschitz continuous with Lipschitz constant at most one and for almost
every $\eta\in[0,B+C]$ it follows that
(5.43)
$0\leq\frac{d}{d\eta}g(t,\ell(t,\eta))=\mathcal{P}\chi_{\eta}(t,\eta)\leq 1.$
Thus
$\int_{0}^{B+C}(\mathcal{P}\chi_{\eta})^{\gamma}(t,\eta)d\eta\leq\int_{0}^{B+C}\mathcal{P}\chi_{\eta}(t,\eta)d\eta=\int_{\mathbb{R}}p(t,x)dx,$
using (5.43), which is finite, cf. (4.10) and which implies that
$h\chi_{\eta}(t,\,\cdot\,)\in L^{\gamma}([0,B+C])$. Thus we will not study
(5.42) pointwise, but as a differential equation in $L^{\gamma}([0,B+C])$.
###### Theorem 5.3.
The function $\chi(t,\,\cdot\,)$ satisfies for almost all $t$ the following
differential equation in $L^{\gamma}([0,B+C])$
(5.44) $\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)=\mathcal{U}(t,\eta),$
where
(5.45)
$h(t,\eta)=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}.$
Furthermore, the mapping $t\mapsto\chi(t,\,\cdot\,)$ is continuous from
$[0,T]$ into $L^{\gamma}([0,B+C])$.
###### Remark 5.4.
The above computations are based on error estimates. This idea is also used
when proving the chain rule in the classical setting for functions of several
variables. However, one cannot use the chain rule here. Namely, writing
$\chi(t,\eta)=\hat{\ell}(t,\eta)-\eta=v(t,\ell(t,\eta))-\eta,$
one is tempted to look at $\chi(t,\eta)$ as a composition of two functions,
since $v(t,\xi)$ is differentiable almost everywhere with respect to both time
and space. However, $v_{t}(t,\xi)$ and $v_{\xi}(t,\xi)$ are not continuous
with respect to time and space, and this fact prevents us from using the
following splitting
$\displaystyle\frac{v(t,\ell(t,\eta))-v(s,\ell(s,\eta))}{t-s}$
$\displaystyle=\frac{v(t,\ell(t,\eta))-v(s,\ell(t,\eta))}{t-s}$
$\displaystyle\quad+\frac{v(s,\ell(t,\eta))-v(s,\ell(s,\eta))}{\ell(t,\eta)-\ell(s,\eta)}\frac{\ell(t,\eta)-\ell(s,\eta)}{t-s},$
together with a limiting process based on the existence of the partial
derivatives of $v$. Furthermore, $\ell(t,\eta)$ is not differentiable almost
everywhere, we only know that for fixed $t$, the derivatives
$\ell_{t}(t,\eta)$ and $\ell_{\eta}(t,\eta)$ exist for almost every $\eta$.
###### Remark 5.5.
An alternative derivation of the differential equation for $\chi(t,\eta)$: By
the weak formulation we have, cf. (2.3b), (4.5), and (5.3), that
$\displaystyle\int_{0}^{T}\int_{\mathbb{R}}$
$\displaystyle(\phi_{t}+u\phi_{x})(t,x)d\nu(t,x)dt$
$\displaystyle\qquad-\int_{0}^{T}\int_{\mathbb{R}}\int_{\mathbb{R}}u(t,y)K^{\prime}(x-y)d\nu(t,y)\phi(t,x)dxdt$
$\displaystyle\qquad-\int_{0}^{T}\int_{\mathbb{R}}\Big{(}up\phi_{x}(t,x)-\int_{\mathbb{R}}u(t,y)K^{\prime}(x-y)p(t,y)dy\phi(t,x)\Big{)}dxdt$
$\displaystyle\quad=\int_{\mathbb{R}}\phi(T,x)d\nu(T,x)-\int_{\mathbb{R}}\phi(0,x)d\nu(0,x)$
for any test function
$\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$. Using (5.5) and
changing the coordinates according to (5.7) and (5.36), we end up with
$\displaystyle\int_{0}^{T}$
$\displaystyle\int_{0}^{B+C}\big{(}\phi_{t}(t,\chi(t,\eta))+\mathcal{U}(t,\eta)\phi_{x}(t,\chi(t,\eta))\big{)}d\eta
dt$
$\displaystyle-\int_{0}^{T}\int_{0}^{B+C}\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})$
$\displaystyle\qquad\qquad\times
K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}\,\phi(t,\chi(t,\eta))\chi_{\eta}(t,\eta)d\eta
dt$
$\displaystyle-\int_{0}^{T}\int_{0}^{B+C}\mathcal{U}\mathcal{P}(t,\eta)\phi_{x}(t,\chi(t,\eta))\chi_{\eta}(t,\eta)d\eta
dt$ (5.46)
$\displaystyle=\int_{0}^{B+C}\phi(T,\chi(T,\eta))d\eta-\int_{0}^{B+C}\phi(0,\chi(0,\eta))d\eta.$
First of all note that using integration by parts (for the integral with
respect to $\eta$) in the triple integral we obtain
$\displaystyle\int_{0}^{T}\int_{0}^{B+C}\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})$
$\displaystyle\qquad\qquad\qquad\times
K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}\,\phi(t,\chi(t,\eta))\chi_{\eta}(t,\eta)d\eta
dt$
$\displaystyle=-\int_{0}^{T}\int_{0}^{B+C}\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})$
$\displaystyle\qquad\qquad\qquad\times
K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}\,\phi_{x}(t,\chi(t,\eta))\chi_{\eta}(t,\eta)d\eta
dt.$
Furthermore, the right-hand side of (5.46) can be rewritten as
$\displaystyle\int_{0}^{B+C}\phi(T,\chi(T,\eta))$ $\displaystyle
d\eta-\int_{0}^{B+C}\phi(0,\chi(0,\eta))d\eta$
$\displaystyle=\int_{0}^{T}\int_{0}^{B+C}\big{(}\phi_{t}(t,\chi(t,\eta))+\phi_{x}(t,\chi(t,\eta))\chi_{t}(t,\eta)\big{)}d\eta
dt.$
Combining the last two equation with (5.46), we have
$\displaystyle\int_{0}^{T}$
$\displaystyle\int_{0}^{B+C}\mathcal{U}(t,\eta)\phi_{x}(t,\chi(t,\eta))d\eta
dt$
$\displaystyle+\int_{0}^{T}\int_{0}^{B+C}\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})$
$\displaystyle\qquad\qquad\times
K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}\,\phi_{x}(t,\chi(t,\eta))\chi_{\eta}(t,\eta)d\eta
dt$
$\displaystyle-\int_{0}^{T}\int_{0}^{B+C}\mathcal{U}\mathcal{P}(t,\eta)\phi_{x}(t,\chi(t,\eta))\chi_{\eta}(t,\eta)d\eta
dt$
$\displaystyle=\int_{0}^{T}\int_{0}^{B+C}\phi_{x}(t,\chi(t,\eta))\chi_{t}(t,\eta)d\eta
dt.$
Now we are ready to read off the differential equation for $\chi(t,\eta)$,
since the above equality is equivalent to
$\int_{0}^{T}\int_{0}^{B+C}\big{(}\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)\big{)}\phi_{x}(t,\chi(t,\eta))d\eta
dt\\\
=\int_{0}^{T}\int_{0}^{B+C}\mathcal{U}(t,\eta)\phi_{x}(t,\chi(t,\eta))d\eta
dt,$
where $h(t,\eta)$ is given by (5.38). Since the above equality must hold for
any test function $\phi$, we end up with
$\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)=\mathcal{U}(t,\eta).$
### 5.2. Differentiability of $\mathcal{U}(t,\eta)$ with respect to time
To begin with we have a closer look at the differential equation (5.44), which
reads
$\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)=\mathcal{U}(t,\eta),$
where $h(t,\eta)$ is given by (5.45). This equation can be solved (uniquely)
by the method of characteristics, if the differential equation
(5.47) $m_{t}(t,\theta)=h(t,m(t,\theta))$
has a unique solution and $m_{\theta}(t,\,\cdot\,)$ is strictly positive for
all $t\in[0,T]$. According to classical ODE theory, (5.47) has for each fixed
$\theta$ a unique solution, if the function $h(t,\eta)$ is continuous with
respect to time and Lipschitz with respect to space. This is the result of the
next lemma, whose proof can be found in Lemma A.2. Hence (5.47) has a unique
solution.
###### Lemma 5.6.
Consider the function $h$ defined by (5.45). Then
(i) $t\mapsto h(t,\eta)$ is continuous;
(ii) $\eta\mapsto h(t,\eta)$ is Lipschitz and satisfies
(5.48)
$|h(t,\eta_{2})-h(t,\eta_{1})|\leq\big{(}1+2n\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+C+\frac{n}{2}Ct\big{)}|\eta_{2}-\eta_{1}|.$
For the method of characteristics to be well-defined, we must check that
solutions to (5.47) are strictly increasing. If $m(0,\theta)=\theta$ for all
$\theta\in[0,B+C]$ and $\theta_{1}<\theta_{2}$, we have, using (5.48), as long
as the function $m(t,\,\cdot\,)$ remains non-decreasing, that
$\left|(m(t,\theta_{2})-m(t,\theta_{1}))_{t}\right|\leq
B(t)(m(t,\theta_{2})-m(t,\theta_{1})),$
where $B(t)=1+2n\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+C+\frac{n}{2}Ct$,
which yields
$(m(0,\theta_{2})-m(0,\theta_{1}))e^{-\int_{0}^{t}B(s)ds}\leq
m(t,\theta_{2})-m(t,\theta_{1})\leq(m(0,\theta_{2})-m(0,\theta_{1}))e^{\int_{0}^{t}B(s)ds}.$
Thus $m(t,\,\cdot\,)$ not only remains strictly increasing, it is also
Lipschitz continuous with Lipschitz constant $e^{\int_{0}^{t}B(s)ds}$ and
hence according to Rademacher’s theorem differentiable almost everywhere. In
particular, one has that
(5.49) $e^{-\int_{0}^{t}B(s)ds}\leq m_{\theta}(t,\theta)\leq
e^{\int_{0}^{t}B(s)ds}.$
Thus $m(t,\,\cdot\,)$ is strictly increasing.
Introducing
(5.50) $\bar{\chi}(t,\theta)=\chi(t,m(t,\theta)),$
we have from (5.44)
(5.51) $\bar{\chi}_{t}(t,\theta)=u(t,\bar{\chi}(t,\theta)),$
and hence $\bar{\chi}(t,\eta)$ is a characteristic. Introducing
(5.52)
$\bar{}\mathcal{U}(t,\theta)=u(t,\bar{\chi}(t,\theta))=\mathcal{U}(t,m(t,\theta)),$
equation (5.51) reads
$\bar{\chi}_{t}(t,\theta)=\bar{}\mathcal{U}(t,\theta).$
To take a next step towards deriving the differential equation for
$\mathcal{U}(t,\eta)$, we want to show that $\bar{}\mathcal{U}(t,\theta)$
satisfies
(5.53)
$\bar{}\mathcal{U}_{t}(t,\theta)=\frac{1}{2}\Big{(}m(t,\theta)-\frac{1}{2}C-\int_{0}^{\theta}\bar{}\mathcal{P}(t,\alpha)\bar{\chi}_{\theta}(t,\alpha)d\alpha\Big{)},$
where
(5.54)
$\bar{}\mathcal{P}(t,\theta)=p(t,\bar{\chi}(t,\theta))=\mathcal{P}(t,m(t,\theta)).$
The proof of (5.53) is again based on an idea that has been used in [2].
According to the definition of a weak solution, one has, see (2.3a) and (5.5),
for all $\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$ that
$\displaystyle\int_{s}^{t}\int_{\mathbb{R}}$
$\displaystyle\Big{(}u(\tau,x)(\phi_{t}+\frac{1}{2}u\phi_{x})(\tau,x)+\frac{1}{2}\big{(}G(\tau,x)-\int_{-\infty}^{x}p(\tau,y)dy-\frac{1}{2}C\big{)}\phi(\tau,x)\Big{)}dxd\tau$
(5.55)
$\displaystyle\qquad\qquad\qquad=\int_{\mathbb{R}}u\phi(t,x)dx-\int_{\mathbb{R}}u\phi(s,x)dx.$
In the above equality one can replace
$\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$ by $\phi(t,x)$
such that $\phi(t,\,\cdot\,)\in\mathcal{C}_{c}^{\infty}(\mathbb{R})$ for all
$t$ and $\phi(\,\cdot\,,x)\in\mathcal{C}^{1}(\mathbb{R})$.
#### The Lipschitz continuity of $\bar{}\mathcal{U}(t,\,\cdot\,)$
To prove that $\bar{}\mathcal{U}(t,\theta)$ is Lipschitz with respect to time,
we have to make a special choice of $\phi(t,x)$. Let
$\phi_{\varepsilon}(t,x)=\frac{1}{\varepsilon}\psi\Big{(}\frac{\bar{\chi}(t,\theta)-x}{\varepsilon}\Big{)},$
where $\psi$ is a standard Friedrichs mollifier. Our choice is motivated by
the following observation,
$\lim_{\varepsilon\to
0}\int_{\mathbb{R}}u\phi_{\varepsilon}(t,x)dx=u(t,\bar{\chi}(t,\theta)),$
and hence
$u(t,\bar{\chi}(t,\theta))-u(s,\bar{\chi}(s,\theta))=\lim_{\varepsilon\to
0}\int_{\mathbb{R}}\big{(}u\phi_{\varepsilon}(t,x)-u\phi_{\varepsilon}(s,x)\big{)}dx.$
Direct calculations then yield, using (5.51)
$\displaystyle\int_{\mathbb{R}}\Big{(}u\phi_{\varepsilon,t}+\frac{1}{2}u^{2}\phi_{\varepsilon,x}$
$\displaystyle+\frac{1}{2}(G-\int_{-\infty}^{x}p(\tau,y)dy-\frac{1}{2}C)\phi_{\varepsilon}(\tau,x)\Big{)}dx$
$\displaystyle=\frac{1}{2}u(\tau,\bar{\chi}(\tau,\theta))^{2}\int_{\mathbb{R}}\frac{1}{\varepsilon^{2}}\psi^{\prime}\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$
$\displaystyle\quad-\frac{1}{2}\int_{\mathbb{R}}(u(\tau,x)-u(\tau,\bar{\chi}(\tau,\theta)))^{2}\frac{1}{\varepsilon^{2}}\psi^{\prime}\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$
$\displaystyle\quad+\frac{1}{2}\int_{\mathbb{R}}(G(\tau,x)-G(\tau,\bar{\chi}(\tau,\theta)))\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$
$\displaystyle\quad-\frac{1}{2}\int_{\mathbb{R}}\int_{\bar{\chi}(\tau,\theta)}^{x}p(\tau,y)dy\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$
$\displaystyle\quad+\frac{1}{2}\left(G(\tau,\bar{\chi}(\tau,\theta))-\int_{-\infty}^{\bar{\chi}(\tau,\theta)}p(\tau,y)dy\right)-\frac{1}{4}C$
$\displaystyle=-\frac{1}{2}\int_{\mathbb{R}}(u(\tau,x)-u(\tau,\bar{\chi}(\tau,\theta)))^{2}\frac{1}{\varepsilon^{2}}\psi^{\prime}\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$
$\displaystyle\quad-\frac{1}{2}\int_{\mathbb{R}}\int_{\bar{\chi}(\tau,\theta)}^{x}p(\tau,y)dy\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$
$\displaystyle\quad+\frac{1}{2}\int_{\mathbb{R}}(G(\tau,x)-G(\tau,\bar{\chi}(\tau,\theta)))\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$
(5.56)
$\displaystyle\quad+\frac{1}{2}\left(G(\tau,\bar{\chi}(\tau,\theta))-\int_{-\infty}^{\bar{\chi}(\tau,\theta)}p(\tau,y)dy\right)-\frac{1}{4}C.$
Introduce the function
$G_{\rm ac}(\tau,x)=\int_{-\infty}^{x}(u_{x}^{2}+p)(\tau,y)dy$
and note that $G_{\rm ac}(\tau,\,\cdot\,)$ is absolutely continuous. Moreover,
one has
$|u(\tau,x)-u(\tau,y)|\leq|x-y|^{1/2}|G_{\rm ac}(\tau,x)-G_{\rm
ac}(\tau,y)|^{1/2},$
and
$\displaystyle|\int_{\mathbb{R}}(u(\tau,x)-u(\tau,\bar{\chi}(\tau,\theta)))^{2}$
$\displaystyle\frac{1}{\varepsilon^{2}}\psi^{\prime}\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx|$
$\displaystyle=\frac{1}{\varepsilon}|\int_{-1}^{1}(u(\tau,\bar{\chi}(\tau,\theta)-\varepsilon\eta)-u(\tau,\bar{\chi}(\tau,\theta)))^{2}\psi^{\prime}(\eta)d\eta|$
$\displaystyle\leq|G_{\rm ac}(\tau,\bar{\chi}(\tau,\theta)+\varepsilon)-G_{\rm
ac}(\tau,\bar{\chi}(\tau,\theta)-\varepsilon)|,$
which implies
$\lim_{\varepsilon\to
0}|\int_{\mathbb{R}}(u(\tau,x)-u(\tau,\bar{\chi}(\tau,\theta)))^{2}\frac{1}{\varepsilon^{2}}\psi^{\prime}\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx|=0.$
For the next term observe
$\displaystyle|\int_{\mathbb{R}}\int_{\bar{\chi}(\tau,\theta)}^{x}p(\tau,y)dy$
$\displaystyle\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx|$
$\displaystyle\leq\frac{1}{\varepsilon}\int_{\mathbb{R}}|G_{\rm
ac}(\tau,x)-G_{\rm
ac}(\tau,\bar{\chi}(\tau,\theta))|\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$
$\displaystyle\leq|G_{\rm ac}(\tau,\bar{\chi}(\tau,\theta)+\varepsilon)-G_{\rm
ac}(\tau,\bar{\chi}(\tau,\theta)-\varepsilon)|,$
which implies
$\lim_{\varepsilon\to
0}|\int_{\mathbb{R}}\int_{\bar{\chi}(\tau,\theta)}^{x}p(\tau,y)dy\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx|=0.$
For the last two terms, observe that for every $\tau\not\in\mathcal{N}$, i.e.,
for almost every $\tau\in[0,T]$ one has, using (5.7), that
$G(\tau,\bar{\chi}(\tau,\theta))=G_{\rm
ac}(\tau,\bar{\chi}(\tau,\theta))=G_{\rm
ac}(\tau,\chi(\tau,m(t,\theta)))=m(\tau,\theta)$
and
$\lim_{\varepsilon\to
0}\frac{1}{2}\int_{\mathbb{R}}\big{(}G(\tau,x)-G(\tau,\bar{\chi}(\tau,\theta))\big{)}\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx=0.$
Thus, the dominated convergence theorem, using (5.56) and (5.55), yields that
$\displaystyle\bar{}\mathcal{U}(t,\theta)-\bar{}\mathcal{U}(s,\theta)$
$\displaystyle=\int_{s}^{t}\frac{1}{2}\Big{(}m(\tau,\theta)-\int_{-\infty}^{\bar{\chi}(\tau,\theta)}p(\tau,y)dy\Big{)}d\tau-\frac{1}{4}C(t-s).$
Furthermore, the continuity of $m(t,\theta)$, $\bar{\chi}(t,\theta)$, and
$p(t,y)$ with respect to time, imply that
(5.57)
$\bar{}\mathcal{U}_{t}(t,\theta)=\frac{1}{2}\Big{(}m(t,\theta)-\int_{-\infty}^{\bar{\chi}(t,\theta)}p(t,y)dy\Big{)}-\frac{1}{4}C$
for all $(t,\theta)\in[0,T]\times[0,B+C]$. Thus
$\bar{}\mathcal{U}(\,\cdot\,,\eta)$ will be Lipschitz on $[0,T]$, if we can
show that the right-hand side of (5.57) can be uniformly bounded on $[0,T]$.
Since $p(t,\,\cdot\,)\in L^{1}(\mathbb{R})$, cf. (4.10), the claim follows if
$m(t,\,\cdot\,)$ can be bounded. Therefore recall that $m(t,\theta)$ satisfies
(5.47) with initial condition $m(0,\theta)=\theta$, which implies that it
suffices to show that $\left\|h(t,\,\cdot\,)\right\|_{L^{\infty}}$ can be
bounded by a function, which is at most growing linearly. Using (5.45),
(5.36), (3.6), Lemma 4.1, and (4.2), we have
$\displaystyle\left\|h(t,\,\cdot\,)\right\|_{L^{\infty}}$
$\displaystyle\leq\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}\left\|p(t,\,\cdot\,)\right\|_{L^{\infty}}$
$\displaystyle\quad+(B+C)\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}+\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}\left\|p(t,\,\cdot\,)\right\|_{L^{\infty}}\left\|K\right\|_{L^{1}}$
$\displaystyle\leq(B+(2+\pi)C)\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}$
(5.58)
$\displaystyle\leq(B+(2+\pi)C)(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct),$
and thus $\left\|h(t,\,\cdot\,)\right\|_{L^{\infty}}$ grows at most linearly.
This finishes the proof of the uniform Lipschitz continuity in time of
$\bar{}\mathcal{U}(t,\theta)$.
As a closer look reveals the differential equation (5.57) holds pointwise.
Thus one can either look at $\bar{}\mathcal{U}(t,\,\cdot\,)$ as a function in
$L^{\gamma}([0,B+C])$ or in $L^{\infty}([0,B+C])$. Furthermore, the mapping
$t\mapsto\bar{}\mathcal{U}(t,\,\cdot\,)$ is continuous from $[0,T]$ into
$L^{\gamma}([0,B+C])$.
#### The differential equation for $\mathcal{U}(t,\eta)$
In view of (5.44) it remains to derive the differential equation for
$\mathcal{U}(t,\eta)$ from (5.57). Recall that we have by (5.52) the relation
$\bar{}\mathcal{U}(t,\theta)=\mathcal{U}(t,m(t,\theta)).$
Since $m(t,\,\cdot\,)$ is continuous and strictly increasing, cf. (5.49),
there exists a unique, continuous and strictly increasing function
$n(t,\,\cdot\,)$ such that
(5.59) $n(t,m(t,\theta))=\theta\quad\text{ for all
}(t,\theta)\in[0,T]\times[0,B+C].$
Now, given $\eta\in[0,B+C]$, there exists a unique $\theta\in[0,B+C]$, such
that
$n(t,\eta)-n(s,\eta)=n(t,m(t,\theta))-n(s,m(t,\theta))=n(s,m(s,\theta))-n(s,m(t,\theta)).$
By definition, we have that $n(t,\,\cdot\,)$ is continuous, strictly
increasing, and hence differentiable almost everywhere. Furthermore, one has
that $n(t,\,\cdot\,)$ satisfies
$\displaystyle e^{-\int_{0}^{t}B(\tau)d\tau}\leq
n_{\eta}(t,\eta)=\frac{1}{m_{\theta}(t,n(t,\eta))}\leq
e^{\int_{0}^{t}B(\tau)d\tau},$
by (5.49), which yields
$\displaystyle|n(t,\eta)-n(s,\eta)|$ $\displaystyle\leq
e^{\int_{0}^{T}B(\tau)d\tau}|m(s,\theta)-m(t,\theta)|$ $\displaystyle\leq
e^{\int_{0}^{T}B(\tau)d\tau}\int_{\min(s,t)}^{\max(s,t)}|h(\tau,m(\tau,\theta))|d\tau.$
Since $h(t,\eta)$ can be uniformly bounded on $[0,T]\times[0,B+C]$, see
(5.58), it follows that $n(t,\eta)$ is Lipschitz with respect to both space
and time on $[0,T]\times[0,B+C]$ and by Rademacher’s theorem differentiable
almost everywhere. Moreover, direct calculations yield
$n_{t}(t,\eta)+hn_{\eta}(t,\eta)=0\quad\text{ almost everywhere}.$
Since $n(t,\,\cdot\,)$ is strictly increasing for every $t\in[0,T]$, combining
(5.52) and (5.59), yields
$\mathcal{U}(t,\eta)=\bar{}\mathcal{U}(t,n(t,\eta))\quad\text{ for all
}(t,\eta)\in[0,T]\times[0,B+C].$
Furthermore, using (5.36), (5.20), (3.3), and (5.52), one has
$\mathcal{U}(t,\eta)=U(t,\ell(t,\eta))\quad\text{ and
}\quad\bar{}\mathcal{U}(t,\theta)=U(t,\ell(t,m(t,\theta))).$
In Section 3.2 we showed, that for every $t\in[0,T]$, the function
$U(t,\,\cdot\,)$ is Lipschitz. Since $\ell(t,\,\cdot\,)$ and $m(t,\,\cdot\,)$
are strictly increasing, it follows that both $\mathcal{U}(t,\,\cdot\,)$ and
$\bar{}\mathcal{U}(t,\,\cdot\,)$ are differentiable almost everywhere on
$[0,B+C]$. Thus, for any $t\in[0,T]$ one ends up with
$\displaystyle\mathcal{U}_{t}(t,\eta)$
$\displaystyle=\bar{}\mathcal{U}_{t}(t,n(t,\eta))+\bar{}\mathcal{U}_{\theta}(t,n(t,\eta))n_{t}(t,\eta)$
$\displaystyle=\frac{1}{2}\Big{(}\eta-\int_{-\infty}^{\chi(t,\eta)}p(t,y)dy\Big{)}-\frac{1}{4}C-h(t,\eta)\mathcal{U}_{\eta}(t,\eta)$
$\displaystyle=\frac{1}{2}\Big{(}\eta-\int_{0}^{\eta}\mathcal{P}\chi_{\eta}(t,\tilde{\eta})d\tilde{\eta}\Big{)}-\frac{1}{4}C-h(t,\eta)\mathcal{U}_{\eta}(t,\eta)$
for almost every $\eta\in[0,B+C]$. This is the sought differential equation
for $\mathcal{U}(t,\eta)$.
The correct Banach space to work in is $L^{\gamma}([0,B+C])\cap
L^{\infty}([0,B+C])$. To see this, introduce the function
$g_{2}(t,\eta)=\int_{-\infty}^{\chi(t,\eta)}pu_{x}(t,y)dy=\int_{0}^{\eta}\mathcal{P}\mathcal{U}_{\eta}(t,\tilde{\eta})d\tilde{\eta}.$
Observe that (5.5) and (5.12) imply that $g_{2}(t,\,\cdot\,)$ is Lipschitz
continuous with Lipschitz constant at most $1+C$, since
$\displaystyle|g_{2}(t,\eta_{2})-g_{2}(t,\eta_{1})|$
$\displaystyle\leq|\int_{\chi(t,\eta_{1})}^{\chi(t,\eta_{2})}pu_{x}(t,y)dy|$
$\displaystyle\leq|\int_{\chi(t,\eta_{1})}^{\chi(t,\eta_{2})}(u_{x}^{2}+p^{2})(t,y)dy|$
$\displaystyle\leq(1+C)|\int_{\chi(t,\eta_{1})}^{\chi(t,\eta_{2})}(u_{x}^{2}+p)(t,y)dy|$
$\displaystyle\leq(1+C)|G_{\rm ac}(t,\chi(t,\eta_{2}))-G_{\rm
ac}(t,\chi(t,\eta_{1}))|$ $\displaystyle\leq(1+C)|\eta_{2}-\eta_{1}|.$
Thus it follows that for any fixed $t\in[0,T]$
$g_{2,\eta}(t,\eta)=\mathcal{P}\mathcal{U}_{\eta}(t,\eta)\quad\text{ for
almost every }\eta\in[0,B+C].$
In particular, one has
$|\mathcal{P}\mathcal{U}_{\eta}(t,\eta)|\leq(1+C)$
and
$\int_{0}^{B+C}|\mathcal{P}\mathcal{U}_{\eta}|^{\gamma}(t,\eta)d\eta\leq(1+C)^{\gamma-1}\int_{0}^{B+C}|\mathcal{P}\mathcal{U}_{\eta}|(t,\eta)d\eta=(1+C)^{\gamma-1}\int_{\mathbb{R}}|pu_{x}|(t,x)dx,$
which is finite, cf. (4.9) and (5.6), and which implies that
$h\mathcal{U}_{\eta}(t,\,\cdot\,)\in L^{\gamma}([0,B+C])\cap
L^{\infty}([0,B+C])$.
To summarize we showed the following theorem.
###### Theorem 5.7.
The function $\mathcal{U}(t,\,\cdot\,)$ satisfies the following differential
equation in $L^{\gamma}([0,B+C])\cap L^{\infty}([0,B+C])$
(5.60)
$\mathcal{U}_{t}(t,\eta)+h(t,\eta)\mathcal{U}_{\eta}(t,\eta)=\frac{1}{2}\Big{(}\eta-\int_{0}^{\eta}\mathcal{P}\chi_{\eta}(t,\tilde{\eta})d\tilde{\eta}\Big{)}-\frac{1}{4}C,$
where
$h(t,\eta)=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}.$
Furthermore, the mapping $t\mapsto\mathcal{U}(t,\,\cdot\,)$ is continuous from
$[0,T]$ into $L^{\gamma}([0,B+C])$.
### 5.3. Differentiability of $\mathcal{P}(t,\eta)$ with respect to time
To close the system of differential equations (5.44) and (5.60), i.e.,
$\displaystyle\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)$
$\displaystyle=\mathcal{U}(t,\eta),$
$\displaystyle\mathcal{U}_{t}(t,\eta)+h(t,\eta)\mathcal{U}_{\eta}(t,\eta)$
$\displaystyle=\frac{1}{2}\Big{(}\eta-\int_{0}^{\eta}\mathcal{P}\chi_{\eta}(t,\tilde{\eta})d\tilde{\eta}\Big{)}-\frac{1}{4}C,$
where
$h(t,\eta)=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta},$
it remains to derive the differential equation satisfied by
$\mathcal{P}(t,\eta)$, given by (5.36).
#### The Lipschitz continuity of $\mathcal{P}(t,\eta)$
To begin with, we show that $\mathcal{P}(t,\eta)$ is Lipschitz continuous on
$[0,T]\times[0,B+C]$ and hence differentiable almost everywhere on
$[0,T]\times[0,B+C]$. Direct calculations yield
(5.61) $\displaystyle\mathcal{P}(t,\eta)-\mathcal{P}(s,\theta)$
$\displaystyle=p(t,\chi(t,\eta))-p(s,\chi(s,\theta))$
$\displaystyle=p(t,\chi(t,\eta))-p(s,\chi(t,\eta))$
$\displaystyle\quad+p(s,\chi(t,\eta))-p(s,\chi(s,\eta))+p(s,\chi(s,\eta))-p(s,\chi(s,\theta))$
$\displaystyle=\int_{s}^{t}p_{t}(\tau,\chi(t,\eta))d\tau$
$\displaystyle\quad+\int_{0}^{1}p_{x}\big{(}s,\chi(s,\eta)+k(\chi(t,\eta)-\chi(s,\eta))\big{)}(\chi(t,\eta)-\chi(s,\eta))dk$
$\displaystyle\quad+\int_{\theta}^{\eta}p_{x}(t,\chi(t,\tilde{\eta}))\chi_{\eta}(t,\tilde{\eta})d\tilde{\eta},$
where we used that $p(t,\,\cdot\,)\in\mathcal{C}_{0}^{\infty}(\mathbb{R})$ and
$p(\,\cdot\,,x)$ is differentiable almost every on the finite interval
$[0,T]$. Furthermore, we took advantage of $\chi(t,\,\cdot\,)$ being
continuous and increasing and hence differentiable almost everywhere on
$[0,B+C]$.
Combining (5.61) with (5.27) and (5.43) as well as (4.8) and (4.11), we end up
with
$|\mathcal{P}(t,\eta)-\mathcal{P}(s,\theta)|\leq\max((\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+2A+\frac{1}{4}CT)nC,n)(|t-s|+|\eta-\theta|),$
i.e., $\mathcal{P}(t,\eta)$ is Lipschitz continuous on $[0,T]\times[0,B+C]$.
We are now ready to derive the differential equation satisfied by
$\mathcal{P}(t,\eta)$. Therefore note that (5.42) implies that for each
$t\in[0,T]$ one has
$\mathcal{P}_{\eta}(t,\eta)=p_{x}(t,\chi(t,\eta))\chi_{\eta}(t,\eta)$
for almost every $\eta\in[0,B+C]$, since
$p(t,\,\cdot\,)\in\mathcal{C}_{0}^{\infty}(\mathbb{R})$. Furthermore, one has
for almost every $(t,\eta)\in[0,T]\times[0,B+C]$ that
$\displaystyle\mathcal{P}_{t}(t,\eta)$ $\displaystyle=\lim_{s\to
t}\frac{\mathcal{P}(t,\eta)-\mathcal{P}(s,\eta)}{t-s}$
$\displaystyle=\lim_{s\to
t}\frac{p(t,\chi(t,\eta))-p(s,\chi(t,\eta))}{t-s}+\lim_{s\to
t}\frac{p(s,\chi(t,\eta))-p(s,\chi(s,\eta))}{t-s},$
if the two limits on the right-hand side exist. The first one exists and is
given by (4.7). The second one, on the other hand, requires a closer look.
Write
$\displaystyle p(s,\chi(t,\eta))-$ $\displaystyle p(s,\chi(s,\eta))$
$\displaystyle=\int_{\chi(s,\eta)}^{\chi(t,\eta)}(p_{x}(s,y)-p_{x}(t,y))dy$
$\displaystyle\quad+\int_{0}^{1}p_{x}\big{(}t,\chi(t,\eta)+k(\chi(s,\eta)-\chi(t,\eta))\big{)}dk\,(\chi(t,\eta)-\chi(s,\eta)).$
Following once more the argument leading to (4.4), recalling (3.6), (5.27),
Lemma 4.1, and that
$p_{x}(t,\,\cdot\,)\in\mathcal{C}_{0}^{\infty}(\mathbb{R})$, we have
$\int_{\chi(s,\eta)}^{\chi(t,\eta)}(p_{x}(s,y)-p_{x}(t,y))dy=\mathcal{O}((t-s)^{2})$
and
$\lim_{s\to
t}\frac{p(s,\chi(t,\eta))-p(s,\chi(s,\eta))}{t-s}=p_{x}(t,\chi(t,\eta))\lim_{s\to
t}\frac{\chi(t,\eta)-\chi(s,\eta)}{t-s},$
if the limit on the right-hand side exists. In view of (5.42), one has that
for each $t\in[0,T]$
$\displaystyle\mathcal{P}_{t}(t,\eta)$
$\displaystyle=p_{t}(t,\chi(t,\eta))+p_{x}(t,\chi(t,\eta))\chi_{t}(t,\eta)$
for almost every $\eta\in[0,B+C]$. We find, using (5.44), (cf. (2.9b)), (4.5),
(5.8), (5.9), (5.11), (4.14), that
(5.62) $\displaystyle\mathcal{P}_{t}(t,\eta)+$ $\displaystyle
h(t,\eta)\mathcal{P}_{\eta}(t,\eta)$ $\displaystyle $
$\displaystyle=p_{t}(t,\chi(t,\eta))+p_{x}(t,\chi(t,\eta))\mathcal{U}(t,\eta)$
$\displaystyle=-\int_{\mathbb{R}}u(t,z)K^{\prime}(\chi(t,\eta)-z)d\mu(t,z)+\mathcal{U}(t,\eta)\int_{\mathbb{R}}K^{\prime}(\chi(t,\eta)-z)d\mu(t,z)$
$\displaystyle=-\int_{\mathbb{R}}u(t,y(t,\xi))K^{\prime}(\chi(t,\eta)-y(t,\xi))\tilde{H}_{\xi}(t,\xi)d\xi$
$\displaystyle\quad+\mathcal{U}(t,\eta)\int_{\mathbb{R}}K^{\prime}(\chi(t,\eta)-y(t,\xi))\tilde{H}_{\xi}(t,\xi)d\xi$
$\displaystyle=-\int_{0}^{B+C}u(t,y(t,\ell(t,\tilde{\eta})))K^{\prime}(\chi(t,\eta)-y(t,\ell(t,\tilde{\eta})))\tilde{H}_{\xi}(t,\ell(t,\tilde{\eta}))\ell_{\eta}(t,\tilde{\eta})d\tilde{\eta}$
$\displaystyle\quad+\mathcal{U}(t,\eta)\int_{0}^{B+C}K^{\prime}(\chi(t,\eta)-y(t,\ell(t,\tilde{\eta})))\tilde{H}_{\xi}(t,\ell(t,\tilde{\eta}))\ell_{\eta}(t,\tilde{\eta})d\tilde{\eta}$
$\displaystyle=-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}$
(5.63)
$\displaystyle\quad+\mathcal{U}(t,\eta)\int_{0}^{B+C}K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}.$
The correct Banach space to work in is again $L^{\gamma}([0,B+C])\cap
L^{\infty}([0,B+C])$, since
$|\mathcal{P}_{\eta}(t,\eta)|\leq n\mathcal{P}\chi(t,\eta)\leq n$
by (4.11) and (5.43).
To summarize we showed the following theorem.
###### Theorem 5.8.
The function $\mathcal{P}(t,\,\cdot\,)$, given by (5.36), satisfies for almost
all $t$ the following differential equation in $L^{\gamma}([0,B+C])\cap
L^{\infty}([0,B+C])$
(5.64)
$\mathcal{P}_{t}(t,\eta)+h(t,\eta)\mathcal{P}_{\eta}(t,\eta)=\mathcal{R}(t,\eta),$
where
$h(t,\eta)=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}$
and
$\displaystyle\mathcal{R}(t,\eta)$
$\displaystyle=-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta}$
(5.65)
$\displaystyle\quad+\mathcal{U}(t,\eta)\int_{0}^{B+C}K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta}.$
Furthermore, the mapping $t\mapsto\mathcal{P}(t,\,\cdot\,)$ is continuous from
$[0,T]$ into $L^{\gamma}([0,B+C])$.
### 5.4. Summary
We have shown the following result.
###### Theorem 5.9.
The functions $\chi(t,\eta)$, $\mathcal{U}(t,\eta)$, and $\mathcal{P}(t,\eta)$
defined by (5.7) and (5.36), respectively, satisfy the following system of
equations:
(5.66a) $\displaystyle\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)$
$\displaystyle=\mathcal{U}(t,\eta),$ (5.66b)
$\displaystyle\mathcal{U}_{t}(t,\eta)+h(t,\eta)\mathcal{U}_{\eta}(t,\eta)$
$\displaystyle=\frac{1}{2}\Big{(}\eta-\int_{0}^{\eta}\mathcal{P}\chi_{\eta}(t,\tilde{\eta})d\tilde{\eta}\Big{)}-\frac{1}{4}C,$
(5.66c)
$\displaystyle\mathcal{P}_{t}(t,\eta)+h(t,\eta)\mathcal{P}_{\eta}(t,\eta)$
$\displaystyle=\mathcal{R}(t,\eta)$
where
(5.67) $\displaystyle h(t,\eta)$
$\displaystyle=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta},$
$\displaystyle\mathcal{R}(t,\eta)$
$\displaystyle=-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta}$
(5.68)
$\displaystyle\quad+\mathcal{U}(t,\eta)\int_{0}^{B+C}K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta},$
which can be uniquely solved using the method of characteristics in
$L^{\gamma}([0,B+C])\times(L^{\gamma}([0,B+C])\cap L^{\infty}([0,B+C]))^{2}$.
We remark that Definition 2.3, which lists all properties that have to be
satisfied by weak conservative solutions, requires
(5.69) $u(t,\,\cdot\,)\in E_{2}\quad\text{ and
}\quad\mu(t,(-\infty,\,\cdot\,))=F(t,\,\cdot\,)\in E_{1}^{0}.$
In our new coordinates these conditions can be formulated in terms of
$\mathcal{U}\chi_{\eta}(t,\eta)$ and $\chi_{\eta}(t,\eta)$, whose time
evolution cannot be described with the help of (5.66). On the other hand, the
imposed moment condition (5.2), which is preserved with respect to time,
implies (5.69). Indeed, let
$u_{\pm\infty}(t)=\lim_{x\to\pm\infty}u(t,x),$
which both exist and are finite. Thus $u(t,\,\cdot\,)\in E_{2}$, if and only
if
$\int_{-\infty}^{-1}\big{(}(u(t,x)-u_{-\infty}(t))^{2}+u_{x}^{2}(t,x)\big{)}dx+\int_{-1}^{1}\big{(}u^{2}+u_{x}^{2}\big{)}(t,x)dx\\\
+\int_{1}^{\infty}\big{(}(u(t,x)-u_{\infty}(t))^{2}+u_{x}^{2}(t,x)\big{)}dx<\infty,$
by the definition of $E_{2}$. Here we only consider one integral, since all of
them can be investigated using similar ideas. One has
$\displaystyle\int_{-\infty}^{-1}(u(t,x)-u_{-\infty}(t))^{2}dx$
$\displaystyle=\int_{-\infty}^{-1}\left(\int_{-\infty}^{x}u_{x}(t,z)dz\right)^{2}dx$
$\displaystyle=\int_{-\infty}^{-1}\left(\int_{-\infty}^{x}\frac{1}{(-z)^{\gamma/2}}(-z)^{\gamma/2}u_{x}(t,z)dz\right)^{2}dx$
$\displaystyle\leq\int_{-\infty}^{-1}\left(\int_{-\infty}^{x}\frac{1}{(-z)^{\gamma}}dz\right)\left(\int_{-\infty}^{x}(-z)^{\gamma}u_{x}^{2}(t,z)dz\right)dx$
$\displaystyle\leq\frac{1}{\gamma-1}\int_{-\infty}^{-1}\frac{1}{(-x)^{\gamma-1}}dx\left(\int_{\mathbb{R}}|z|^{\gamma}u_{x}^{2}(t,z)dz\right)$
$\displaystyle\leq\frac{1}{(\gamma-1)(\gamma-2)}\left(\int_{\mathbb{R}}|z|^{\gamma}d\nu(t,z)\right),$
which is finite if $\gamma>2$ and (5.2) is satisfied.
For the second condition, recall that
$\lim_{x\to-\infty} F(t,x)=0\quad\text{ and }\quad\lim_{x\to\infty} F(t,x)=C.$
Thus $F(t,\,\cdot\,)\in E_{1}^{0}$ if and only if
$\int_{-\infty}^{-1}F^{2}(t,x)dx+\int_{-1}^{1}F^{2}(t,x)dx+\int_{1}^{\infty}(F(t,x)-C)^{2}dx<\infty,$
by the definition of $E_{0}^{1}$. Again we only consider one integral, since
all of them can be considered using similar ideas. One has
$\displaystyle\int_{-\infty}^{-1}$ $\displaystyle F^{2}(t,x)dx$
$\displaystyle=\int_{-\infty}^{-1}\left(\int_{-\infty}^{x}\frac{1}{(-z)^{\gamma/2}}(-z)^{\gamma/2}d\mu(t,z)\right)^{2}dx$
$\displaystyle\leq\int_{-\infty}^{-1}\left(\int_{-\infty}^{x}\frac{1}{(-z)^{\gamma}}d\mu(t,z)dz\right)dx\left(\int_{\mathbb{R}}|z|^{\gamma}d\nu(t,z)\right)$
$\displaystyle=\int_{-\infty}^{-1}\left(\frac{1}{(-x)^{\gamma}}F(t,x)-\gamma\int_{-\infty}^{x}\frac{1}{(-z)^{\gamma+1}}F(t,z)dz\right)dx\left(\int_{\mathbb{R}}|z|^{\gamma}d\nu(t,z)\right)$
$\displaystyle\leq
C\int_{-\infty}^{-1}\left(\frac{1}{(-x)^{\gamma}}+\gamma\int_{-\infty}^{x}\frac{1}{(-z)^{\gamma+1}}dz\right)dx\left(\int_{\mathbb{R}}|z|^{\gamma}d\nu(t,z)\right)$
$\displaystyle\leq\frac{2C}{\gamma-1}\left(\int_{\mathbb{R}}|z|^{\gamma}d\nu(t,z)\right),$
which is finite if $\gamma>2$ and (5.2) is satisfied.
We have proved the following theorem.
###### Theorem 5.10.
Let $\gamma>2$, then for any initial data $(u_{0},\mu_{0})\in\mathcal{D}$ such
that
$\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu_{0}<\infty$
the Hunter–Saxton equation has a unique global conservative weak solution
$(u,\mu)\in\mathcal{D}$ in the sense of Definition 2.3, which satisfies
$\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu(t)<\infty\quad\text{ for all
}t\in\mathbb{R}.$
## Appendix A Proof of Lemma 5.2 and Lemma 5.6
###### Lemma A.1 (Lemma 5.2).
(i): Let $g(t,\xi)$ be given by (4.13). Then there exists a positive constant
$\bar{M}$ such that
(A.1) $\displaystyle-\bar{M}$
$\displaystyle|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$
$\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t)$
$\displaystyle\leq g(s,\xi)-g\big{(}t,\xi+u(t,y(t,\xi))(t-s)\big{)}$
$\displaystyle\leq\bar{M}|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$
$\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t).$
(ii): Let $H(t,\xi)$ be defined by (5.9). Then
$\displaystyle-($
$\displaystyle\tilde{M}+\bar{M})|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$
$\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t)$
$\displaystyle\leq H(s,\xi)-H\big{(}t,\xi+u(t,y(t,\xi))(t-s)\big{)}$
$\displaystyle\leq(\tilde{M}+\bar{M})|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$
$\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t).$
###### Proof.
(i): We want to estimate
$g(s,\xi)-g(t,\xi+u(t,y(t,\xi))(t-s)).$
Recalling (4.13), we split the above difference into two terms as follows
$\displaystyle g(s,\xi)-g(t,\xi+u(t,y(t,\xi))(t-s))$
$\displaystyle=\int_{y(t,\xi+u(t,y(t,\xi))(t-s))}^{y(s,\xi)}p(s,z)dz$
$\displaystyle\qquad+\int_{-\infty}^{y(t,\xi+u(t,y(t,\xi))(t-s))}\big{(}p(s,z)-p(t,z)\big{)}dz$
$\displaystyle=\textup{I}_{1}+\textup{I}_{2}.$
$\textup{I}_{1}$: Since $p(t,x)$ is continuously differentiable on
$[0,T]\times\mathbb{R}$, we have by the mean value theorem that
$\displaystyle\textup{I}_{1}$
$\displaystyle=\int_{y(t,\xi+u(t,y(t,\xi))(t-s))}^{y(s,\xi)}p(s,z)dz$
$\displaystyle=p(s,m)(y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s)))$
$\displaystyle=\big{(}p(s,m)-p(t,y(t,\xi+u(t,y(t,\xi))(t-s)))\big{)}$
$\displaystyle\qquad\qquad\qquad\qquad\qquad\times(y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s)))$
$\displaystyle\quad+p(t,y(t,\xi+u(t,y(t,\xi))(t-s)))(y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s)))$
for some $m$ between $y(s,\xi)$ and $y(t,\xi+u(t,y(t,\xi))(t-s))$.
Furthermore, we find
$\displaystyle\left|p(s,m)-p(t,y(t,\xi+u(t,y(t,\xi))(t-s)))\right|\left|y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s))\right|$
$\displaystyle\quad\leq
M\big{(}\left|s-t\right|+\left|m-y(t,\xi+u(t,y(t,\xi))(t-s))\right|\big{)}$
$\displaystyle\qquad\qquad\qquad\qquad\qquad\times\big{(}\left|u(t,y(t,\xi))(t-s)\right|+\tilde{M}\left|t-s\right|^{3/2}\big{)}$
$\displaystyle\quad\leq
M\big{(}\left|s-t\right|+\left|y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s))\right|\big{)}\left|t-s\right|$
$\displaystyle\quad\leq
M\big{(}\left|s-t\right|+\left|u(t,y(t,\xi))(t-s)\right|\big{)}\left|t-s\right|$
$\displaystyle\quad\leq M\left|s-t\right|^{2},$
for some constant $M$ (that is increased during the calculation), using (4.8),
(4.11), (5.29), and (3.6). In addition, we estimate
$\displaystyle p(t,$ $\displaystyle
y(t,\xi+u(t,y(t,\xi))(t-s)))(y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s)))$
$\displaystyle=p(t,y(t,\xi+u(t,y(t,\xi))(t-s)))\Big{(}u(t,y(t,\xi))(t-s)$
$\displaystyle\qquad+(y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s)))-u(t,y(t,\xi))(t-s)\Big{)}.$
Finally, using (5.29) once more, there exists a positive constant $\hat{M}$
such that
$\left|\textup{I}_{1}+p(t,y(t,\xi+u(t,y(t,\xi))(t-s)))u(t,y(t,\xi))(t-s)\right|\leq\hat{M}|t-s|^{3/2}.$
$\textup{I}_{2}$: Using (3.1), (3.2), and (4.5), we can write
$\displaystyle\textup{I}_{2}$
$\displaystyle=\int_{-\infty}^{y(t,\xi+u(t,y(t,\xi))(t-s))}\big{(}p(s,z)-p(t,z)\big{)}dz$
$\displaystyle=\int_{-\infty}^{y(t,\xi+u(t,y(t,\xi))(t-s))}\int_{t}^{s}p_{t}(\tau,z)d\tau
dz$
$\displaystyle=-\int_{-\infty}^{y(t,\xi+u(t,y(t,\xi))(t-s))}\int_{t}^{s}\int_{\mathbb{R}}u(\tau,x)K^{\prime}(z-x)d\mu(\tau,x)d\tau
dz$
$\displaystyle=-\int_{t}^{s}\int_{\mathbb{R}}u(\tau,x)K(y(t,\xi+u(t,y(t,\xi))(t-s))-x)d\mu(\tau,x)d\tau$
$\displaystyle=-\int_{t}^{s}\int_{\mathbb{R}}u(\tau,y(\tau,\eta))K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(\tau,\eta))\tilde{H}_{\xi}(\tau,\eta)d\eta
d\tau$
$\displaystyle=-\int_{t}^{s}\int_{\mathbb{R}}(u(\tau,y(\tau,\eta))-u(t,y(t,\eta)))$
$\displaystyle\qquad\qquad\qquad\qquad\times
K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(\tau,\eta))\tilde{H}_{\xi}(\tau,\eta)d\eta
d\tau$
$\displaystyle\quad-\int_{t}^{s}\int_{\mathbb{R}}u(t,y(t,\eta))(K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(\tau,\eta))$
$\displaystyle\qquad\qquad\qquad\qquad\qquad-K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)))\tilde{H}_{\xi}(\tau,\eta)d\eta
d\tau$ $\displaystyle\quad-\int_{t}^{s}\int_{\mathbb{R}}u(t,y(t,\eta))$
$\displaystyle\qquad\qquad\qquad\times
K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))(\tilde{H}_{\xi}(\tau,\eta)-\tilde{H}_{\xi}(t,\eta))d\eta
d\tau$
$\displaystyle\quad-\int_{t}^{s}\int_{\mathbb{R}}u(t,y(t,\eta))K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))\tilde{H}_{\xi}(t,\eta)d\eta
d\tau$ $\displaystyle=\textup{II}_{1}+\textup{II}_{2}+\textup{II}_{3}$
$\displaystyle\quad-\int_{t}^{s}\int_{\mathbb{R}}u(t,y(t,\eta))K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))\tilde{H}_{\xi}(t,\eta)d\eta
d\tau.$
Next we will show that each of the terms $\textup{II}_{1}$, $\textup{II}_{2}$,
and $\textup{II}_{3}$ is of order $|t-s|^{3/2}$. Therefore it is important to
keep in mind that $0\leq y_{\xi}$, $\tilde{H}_{\xi}\leq 1$.
$\textup{II}_{1}$: Since $u(t,x)$ is Hölder continuous with Hölder exponent
$\frac{1}{2}$ on $[0,T]\times\mathbb{R}$, we have, by (3.8) and (3.9), for all
$\tau$ between $s$ and $t$ that
$\displaystyle|u(\tau,y(\tau,\eta))-u(t,y(t,\eta))|$ $\displaystyle\leq
D\big{(}|t-\tau|+|y(\tau,\eta)-y(t,\eta)|\big{)}^{1/2}$ $\displaystyle\leq
D\big{(}1+\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}^{1/2}|t-\tau|^{1/2}$
$\displaystyle\leq
D\big{(}1+\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}^{1/2}|t-s|^{1/2},$
and
$|\textup{II}_{1}|\leq
DC\big{(}1+\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}^{1/2}|t-s|^{3/2}.$
$\textup{II}_{2}$: Since $K(\,\cdot\,)$, given by (4.3), is smooth one has for
all $\tau$ between $s$ and $t$ that
$\displaystyle|K(y(t,\xi+u(t,y(t,\xi))(t-s))$
$\displaystyle-y(\tau,\eta))-K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))|$
$\displaystyle=|\int_{y(t,\eta)}^{y(\tau,\eta)}K^{\prime}(y(t,\xi+u(t,y(t,\xi))(t-s))-x)dx|$
$\displaystyle\leq n|y(\tau,\eta)-y(t,\eta)|$ $\displaystyle\leq
n\Big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\Big{)}|t-\tau|$
$\displaystyle\leq
n\Big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\Big{)}|t-s|$
and
$|\textup{II}_{2}|\leq
nC\Big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\Big{)}^{2}|t-s|^{2}.$
$\textup{II}_{3}$: Here integration by parts will be the key. Indeed, one has
$\displaystyle\int_{\mathbb{R}}u(t,y(t,\eta))K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))(\tilde{H}_{\xi}(\tau,\eta)-\tilde{H}_{\xi}(t,\eta))d\eta$
$\displaystyle\quad=-\int_{\mathbb{R}}u_{x}(t,y(t,\eta))$
$\displaystyle\qquad\qquad\times
K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))(\tilde{H}(\tau,\eta)-\tilde{H}(t,\eta))y_{\xi}(t,\eta)d\eta$
$\displaystyle\qquad+\int_{\mathbb{R}}u(t,y(t,\eta))$
$\displaystyle\qquad\qquad\times
K^{\prime}(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))(\tilde{H}(\tau,\eta)-\tilde{H}(t,\eta))y_{\xi}(t,\eta)d\eta.$
Recalling (3.24) and that $0\leq\tilde{H}_{\xi}\leq 1$, we have for all $\tau$
between $s$ and $t$ that
$|\tilde{H}(t,\eta)-\tilde{H}(\tau,\eta)|\leq\Big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\Big{)}|t-s|$
and
$\displaystyle|$
$\displaystyle\int_{\mathbb{R}}u(t,y(t,\eta))K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))(\tilde{H}_{\xi}(\tau,\eta)-\tilde{H}_{\xi}(t,\eta))d\eta|$
$\displaystyle\leq\Big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\Big{)}\int_{\mathbb{R}}|u_{x}(t,x)|K(y(t,\xi+u(t,y(t,\xi))(t-s))-x)dx\,|t-s|$
$\displaystyle\quad+\Big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\Big{)}\int_{\mathbb{R}}|u(t,x)|K^{\prime}(y(t,\xi+u(t,y(t,\xi))(t-s))-x)dx\,|t-s|$
$\displaystyle\leq\Big{(}\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}C^{1/2}\pi^{1/2}+n\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}^{2}\pi\Big{)}|t-s|.$
Thus, we have
$|\textup{II}_{3}|\leq\Big{(}\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}C^{1/2}\pi^{1/2}+n\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}^{2}\pi\Big{)}|t-s|^{2}.$
Combining now all these estimates, we have that there exists a positive
constant $\check{M}$ such that
$\displaystyle\left|\textup{I}_{2}+\int_{\mathbb{R}}u(t,y(t,\eta))K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t)\right|$
$\displaystyle\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\leq\check{M}|t-s|^{3/2}$
(ii): Combine (5.9), (5.30), and (A.1). ∎
###### Lemma A.2 (Lemma 5.6).
Consider the function $h$ defined by (5.45). Then
(i) $t\mapsto h(t,\eta)$ is continuous;
(ii) $\eta\mapsto h(t,\eta)$ is Lipschitz and satisfies
(A.2)
$|h(t,\eta_{2})-h(t,\eta_{1})|\leq(1+2n\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+C+\frac{n}{2}Ct)|\eta_{2}-\eta_{1}|.$
###### Proof.
(i) First, we establish the continuity with respect to time. Recalling (3.6),
(3.9), (4.4), (4.9), and (5.27), we have
$\displaystyle|\mathcal{U}\mathcal{P}(t,\eta)-\mathcal{U}\mathcal{P}(s,\eta)|$
$\displaystyle\leq|\mathcal{U}(t,\eta)||\mathcal{P}(t,\eta)-\mathcal{P}(s,\eta)|+|\mathcal{P}(s,\eta)||\mathcal{U}(t,\eta)-\mathcal{U}(s,\eta)|$
$\displaystyle\leq\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}|p(t,\chi(t,\eta))-p(s,\chi(s,\eta))|$
$\displaystyle\quad+C|u(t,\chi(t,\eta))-u(s,\chi(s,\eta))|$
$\displaystyle\leq\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT+2A\big{)}nC|t-s|$
$\displaystyle\quad+CD\big{(}1+2A\big{)}^{1/2}|t-s|^{1/2}.$
For the second term of $h(t,\eta)$, note that one can write
$\displaystyle\int_{0}^{B+C}$
$\displaystyle\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}$
$\displaystyle=\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))d\tilde{\eta}-\int_{\mathbb{R}}K(\chi(t,\eta)-y)up(t,y)dy.$
Using (3.9), (5.27), and Lemma 4.1, one has
$\displaystyle\Big{|}\int_{0}^{B+C}$
$\displaystyle\Big{(}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))-\mathcal{U}(s,\tilde{\eta})K(\chi(s,\eta)-\chi(s,\tilde{\eta}))\Big{)}d\tilde{\eta}\Big{|}$
$\displaystyle\leq\Big{|}\int_{0}^{B+C}(\mathcal{U}(t,\tilde{\eta})-\mathcal{U}(s,\tilde{\eta}))K(\chi(t,\eta)-\chi(t,\tilde{\eta}))d\tilde{\eta}\Big{|}$
$\displaystyle\quad+\Big{|}\int_{0}^{B+C}\mathcal{U}(s,\tilde{\eta})\big{(}K(\chi(t,\eta)-\chi(t,\tilde{\eta}))-K(\chi(s,\eta)-\chi(s,\tilde{\eta}))\big{)}d\tilde{\eta}\Big{|}$
$\displaystyle\leq(B+C)\left\|\mathcal{U}(t,\,\cdot\,)-\mathcal{U}(s,\,\cdot\,)\right\|_{L^{\infty}}$
$\displaystyle\quad+2n\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}(B+C)\left\|\chi(t,\,\cdot\,)-\chi(s,\,\cdot\,)\right\|_{L^{\infty}}$
$\displaystyle\leq(B+C)D\big{(}1+2A\big{)}^{1/2}|t-s|^{1/2}$
$\displaystyle\quad+2n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT)(B+C)2A|t-s|.$
Last but not least, recalling (3.9), Lemma 4.1, (4.4), (4.10), and (5.27), we
have
$\displaystyle\Big{|}\int_{\mathbb{R}}\big{(}K(\chi(t,\eta)-y)up(t,y)$
$\displaystyle-K(\chi(s,\eta)-y)up(s,y)\big{)}dy\Big{|}$
$\displaystyle\leq\Big{|}\int_{\mathbb{R}}(K(\chi(t,\eta)-y)-K(\chi(s,\eta)-y))up(t,y)dy\Big{|}$
$\displaystyle\quad+\Big{|}\int_{\mathbb{R}}K(\chi(s,\eta)-y)(up(t,y)-up(s,y))dy\Big{|}$
$\displaystyle\leq
n\left\|\chi(t,\,\cdot\,)-\chi(s,\,\cdot\,)\right\|_{L^{\infty}}\int_{\mathbb{R}}|u|p(t,y)dy$
$\displaystyle\quad+\pi\left\|up(t,\,\cdot\,)-up(s,\,\cdot\,)\right\|_{L^{\infty}}$
$\displaystyle\leq
2nA(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT)B|t-s|$
$\displaystyle\quad+\pi
n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT)^{2}C|t-s|+\pi
CD(t-s)^{1/2}.$
Thus we have that $h(t,\eta)$ is Hölder continuous with exponent $\frac{1}{2}$
with respect to time.
(ii) To establish the Lipschitz continuity with respect to space is a bit more
involved, but follows pretty much the same lines. As a closer look at (5.12)
reveals, one has
$\sigma G(t,\chi(t,\eta)-)+(1-\sigma)G(t,\chi(t,\eta)+)=\eta\quad\text{ for
some }\sigma\in[0,1].$
This means especially given $\eta\in[0,B+C]$, there exist
$\eta^{-}\leq\eta\leq\eta^{+}$ such that
$\chi(t,\eta^{-})=\chi(t,\eta)=\chi(t,\eta^{+})$
and
$\eta^{-}=G(t,\chi(t,\eta)-)\quad\text{ and
}\quad\eta^{+}=G(t,\chi(t,\eta)+).$
In view of Definition 2.3 (v), (5.3), (4.11), and (5.5), we then have for
$\eta_{1}<\eta_{2}$ such that $\chi(t,\eta_{1})\not=\chi(t,\eta_{2})$ that
$\displaystyle|\mathcal{U}\mathcal{P}(t,\eta_{2})-$
$\displaystyle\mathcal{U}\mathcal{P}(t,\eta_{1})|$
$\displaystyle=|\mathcal{U}\mathcal{P}(t,\eta_{2}^{-})-\mathcal{U}\mathcal{P}(t,\eta_{1}^{+})|$
$\displaystyle=|up(t,\chi(t,\eta_{2}^{-}))-up(t,\chi(t,\eta_{1}^{+}))|$
$\displaystyle\leq\int_{\chi(t,\eta_{1}^{+})}^{\chi(t,\eta_{2}^{-})}|u_{x}p+up_{x}|(t,y)dy$
$\displaystyle\leq\int_{\chi(t,\eta_{1}^{+})}^{\chi(t,\eta_{2}^{-})}(u_{x}^{2}+p^{2}+n|u|p)(t,y)dy$
$\displaystyle\leq(1+\left\|p(t,\,\cdot\,)\right\|_{L^{\infty}}+n\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}})\int_{\chi(t,\eta_{1}^{+})}^{\chi(t,\eta_{2}^{-})}(u_{x}^{2}+p)(t,y)dy$
$\displaystyle\leq(1+C+n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct))(G(t,\chi(t,\eta_{2}^{-}))-G(t,\chi(t,\eta_{1}^{+})))$
$\displaystyle=(1+C+n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct))|\eta_{2}^{-}-\eta_{1}^{+}|$
$\displaystyle\leq(1+C+n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct))|\eta_{2}-\eta_{1}|.$
As far as the second part is concerned, observe that (cf. (5.63))
$\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}=\int_{\mathbb{R}}u(t,y)K(\chi(t,\eta)-y)d\mu(t,y),$
and we have
$\displaystyle|\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})$
$\displaystyle(K(\chi(t,\eta_{2})-\chi(t,\tilde{\eta}))-K(\chi(t,\eta_{1})-\chi(t,\tilde{\eta})))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}|$
$\displaystyle=|\int_{\mathbb{R}}u(t,y)(K(\chi(t,\eta_{2})-y)-K(\chi(t,\eta_{1})-y))d\mu(t,y)|$
$\displaystyle=|\int_{\mathbb{R}}u(t,y)\int_{\chi(t,\eta_{1})}^{\chi(t,\eta_{2})}K^{\prime}(z-y)dzd\mu(t,y)|$
$\displaystyle=|\int_{\chi(t,\eta_{1}^{+})}^{\chi(t,\eta_{2}^{-})}\int_{\mathbb{R}}u(t,y)K^{\prime}(z-y)d\mu(t,y)dz|$
$\displaystyle\leq(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct)\int_{\chi(t,\eta_{1}^{+})}^{\chi(t,\eta_{2}^{-})}\int_{\mathbb{R}}nK(z-y)d\mu(t,y)dz$
$\displaystyle=n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct)\int_{\chi(t,\eta_{1}^{+})}^{\chi(t,\eta_{2}^{-})}p(t,z)dz$
$\displaystyle=n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct)\big{(}G(t,\chi(t,\eta_{2}^{-}))-G(t,\chi(t,\eta_{1}^{+}))\big{)}$
$\displaystyle\leq
n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct)|\eta_{2}-\eta_{1}|.$
Thus we have that $h(t,\eta)$ is Lipschitz continuous with respect to space
with
$|h(t,\eta_{2})-h(t,\eta_{1})|\leq\big{(}1+2n\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+C+\frac{n}{2}Ct\big{)}|\eta_{2}-\eta_{1}|.$
∎
###### Lemma A.3.
Given $\gamma>2$ and a weak conservative solution $(u,\mu)$ in the sense of
Definition 2.3, which satisfies
$\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu(t)<\infty\quad\text{ for all
}t\in\mathbb{R}.$
Then for any $n\in\mathbb{N}$ such that $n\geq\gamma$
$\int_{\mathbb{R}}(1+|x|^{\gamma})p(t,x)dx<\infty\quad\text{ for all
}t\in\mathbb{R}.$
###### Proof.
Due to (4.10) it suffices to show
$\int_{-\infty}^{-1}|x|^{\gamma}p(t,x)dx+\int_{1}^{\infty}|x|^{\gamma}p(t,x)dx<\infty.$
Since $p(t,\,\cdot\,)$ is non-negative and both integrals can be estimated
using the same ideas, we only present the details for the first one. Direct
computations yield
$\displaystyle\int_{-\infty}^{-1}|x|^{\gamma}p(t,x)dx$
$\displaystyle=\int_{-\infty}^{-1}(x^{2})^{\gamma/2}\int_{\mathbb{R}}\frac{1}{(1+(x-y)^{2})^{n}}d\mu(t,y)dx$
$\displaystyle=\int_{-\infty}^{-1}(((x-y)+y)^{2})^{\gamma/2}\int_{\mathbb{R}}\frac{1}{(1+(x-y)^{2})^{n}}d\mu(t,y)dx$
$\displaystyle\leq
2^{\gamma/2}\int_{-\infty}^{-1}\int_{\mathbb{R}}\left(\frac{(x-y)^{2}+y^{2}}{1+(x-y)^{2}}\right)^{\gamma/2}\frac{1}{(1+(x-y)^{2})^{n-\gamma/2}}d\mu(t,y)dx$
$\displaystyle\leq
2^{\gamma/2}\int_{-\infty}^{-1}\int_{\mathbb{R}}(1+y^{2})^{\gamma/2}\frac{1}{(1+(x-y)^{2})^{n-\gamma/2}}d\mu(t,y)dx$
$\displaystyle\leq
2^{\gamma/2}\int_{\mathbb{R}}\left(\int_{\mathbb{R}}\frac{1}{(1+(x-y)^{2})^{n-\gamma/2}}dx\right)(1+y^{2})^{\gamma/2}d\mu(t,y)$
$\displaystyle\leq
2^{\gamma/2}\int_{\mathbb{R}}\left(\int_{\mathbb{R}}\frac{1}{1+z^{2}}dz\right)(1+y^{2})^{\gamma/2}d\mu(t,y)$
$\displaystyle\leq
2^{\gamma/2}\pi\int_{\mathbb{R}}(1+y^{2})^{\gamma/2}d\mu(t,y)$
$\displaystyle\leq 2^{\gamma}\pi\int_{\mathbb{R}}(1+|y|^{\gamma})d\mu(t,y).$
In the above calculations we used that $(a+b)^{2}\leq 2(a^{2}+b^{2})$ and that
$(a+b)^{2}\leq 2\max(a^{2},b^{2})$. ∎
## References
* [1] V. I. Bogachev, Measure Theory. Vol. I, II. Springer-Verlag, Berlin, 2007.
* [2] A. Bressan, G. Chen, and Q. Zhang. Uniqueness of conservative solutions to the Camassa–Holm equation via characteristics. Discrete Contin. Dyn. Syst. 35 (2015) 25–42.
* [3] A. Bressan and A. Constantin. Global solutions of the Hunter–Saxton equation. SIAM J. Math. Anal. 37 (2005) 996–1026.
* [4] A. Bressan, H. Holden, and X. Raynaud. Lipschitz metric for the Hunter–Saxton equation. J. Math. Pures Appl. 94 (2010) 68–92.
* [5] A. Bressan, P. Zhang, and Y. Zheng. Asymptotic variational wave equations. Arch. Ration. Mech. Anal. 183 (2007), 163–185.
* [6] J. A. Carrillo, K. Grunert, and H. Holden. A Lipschitz metric for the Hunter–Saxton equation. Comm. Partial Differential Equations 44 (2019) 309–334.
* [7] C. M. Dafermos. Generalized characteristics and the Hunter–Saxton equation. J. Hyperbolic Differ. Equ. 8 (2011) 159–168.
* [8] K. Grunert and A. Nordli. Existence and Lipschitz stability for $\alpha$-dissipative solutions of the two-component Hunter–Saxton system. J. Hyperbolic Differ. Equ. 15 (2018) 559–597.
* [9] K. Grunert, A. Nordli, and S. Solem. Numerical conservative solutions of the Hunter–Saxton equation. BIT Numerical Mathematics 61 (2021) 441–471.
* [10] K. Grunert and M. Tandy. Lipschitz stability for the Hunter–Saxton equation. arXiv:2103.10227.
* [11] H. Holden, K. H. Karlsen, and P.H.C. Pang. The Hunter–Saxton equation with noise. J. Differential Equations 270 (2021) 725–786.
* [12] H. Holden, K. H. Karlsen, and N. H. Risebro. Convergent difference schemes for the Hunter–Saxton equation. Math. Comp. 76 (2007) 699–744.
* [13] H. Holden and X. Raynaud. Global conservative solutions of the Camassa–Holm equation — a Lagrangian point of view. Comm. Partial Differential Equations 32 (2007) 1511–1549.
* [14] J. K. Hunter and R. Saxton. Dynamics of director fields. SIAM J. Appl. Math. 51 (6) (1991) 1498–1521.
* [15] J. K. Hunter and Y. X. Zheng. On a nonlinear hyperbolic variational equation. I. Global existence of weak solutions Arch. Rational Mech. Anal. 129 (4) (1995) 305–353.
* [16] J. K. Hunter and Y. X. Zheng. On a nonlinear hyperbolic variational equation. II. The zero-viscosity and dispersion limits. Arch. Rational Mech. Anal. 129 (4) (1995) 355–383.
* [17] B. Khesin and G. Misiołek. Euler equations on homogeneous spaces and Virasoro orbits. Adv. Math. 176 (2003) 116–144.
* [18] J. M. Lee. Geometric approach on the global conservative solutions of the Camassa–Holm equation. J. Geom. Phys. 142 (2019) 137–150.
* [19] J. Lenells. The Hunter–Saxton equation: a geometric approach. SIAM J. Math. Anal. 40 (2008) 266–277.
* [20] J. Lenells. Weak geodesic flow and global solutions of the Hunter–Saxton equation. Discrete Contin. Dyn. Syst. 18 (2007) 643–656.
* [21] J. Lenells. The Hunter–Saxton equation describes the geodesic flow on a sphere. J. Geom. Phys. 57 (2007) 2049–2064.
* [22] H. Li and G. Toscani. Long–time asymptotics of kinetic models of granular flows. Arch. Ration. Mech. Anal. 172 (3) (2004) 407–428.
* [23] A. Nordli. A Lipschitz metric for conservative solutions of the two-component Hunter–Saxton system. Methods Appl. Anal. 23 (2016) 215–232.
* [24] M. Wunsch. The generalized Hunter–Saxton system. SIAM J. Math. Anal. 42 (2010) 1286–1304.
* [25] M. Wunsch. On the Hunter–Saxton system. Discrete Contin. Dyn. Syst. Ser. B 12 (2009) 647–656.
* [26] P. Zhang and Y. Zheng. On oscillations of an asymptotic equation of a nonlinear variational wave equation. Asymptot. Anal. 18 (3-4) (1998) 307–327.
* [27] P. Zhang and Y. Zheng. On the existence and uniqueness of solutions to an asymptotic equation of a variational wave equation. Acta Math. Sin. (Engl. Ser.) 15 (1) (1999) 115–130.
* [28] P. Zhang and Y. Zheng. Existence and uniqueness of solutions of an asymptotic equation arising from a variational wave equation with general data. Arch. Ration. Mech. Anal. 155 (1) (2000) 49–83.
| arxiv-papers | 2021-07-27T09:09:42 | 2024-09-04T03:07:21.008022 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Katrin Grunert, Helge Holden",
"submitter": "Katrin Grunert",
"url": "https://arxiv.org/abs/2107.12681"
} |
2107.12682 | 1030 Research
# Time-Varying Fuzzy Contour Trees
Anna-Pia Lohfink
e-mail: [email protected] Frederike Gartzky e-mail: [email protected]
Florian Wetzels
e-mail: [email protected] Luisa Vollmer Christoph Garth
e-mail: [email protected] Scientific Visualization Lab – Technische
Universität Kaiserslautern
###### Abstract
We present a holistic, topology-based visualization technique for spatial time
series data based on an adaptation of Fuzzy Contour Trees. Common analysis
approaches for time dependent scalar fields identify and track specific
features. To give a more general overview of the data, we extend Fuzzy Contour
Trees, from the visualization and simultaneous analysis of the topology of
multiple scalar fields, to time dependent scalar fields. The resulting time-
varying Fuzzy Contour Trees allow the comparison of multiple time steps that
are not required to be consecutive. We provide specific interaction and
navigation possibilities that allow the exploration of individual time steps
and time windows in addition to the behavior of the contour trees over all
time steps. To achieve this, we reduce an existing alignment to multiple sub-
alignments and adapt the Fuzzy Contour Tree-layout to continuously reflect
changes and similarities in the sub-alignments. We apply time-varying Fuzzy
Contour Trees to different real-world data sets and demonstrate their
usefulness.
Human-centered computingVisualizationVisualization techniquesTreemaps; Human-
centered computingVisualizationVisualization design and evaluation methods
Introduction
Analyzing time dependent scalar fields is usually done feature based by
identifying regions with specific patterns and tracking them between time
steps. While these approaches are helpful for specialized tasks, they are not
suited to provide a general overview of the complete data set due to their
focus on specific features and the chronology. We provide a holistic view of
the data set and its feature candidates by applying Fuzzy Contour Trees (FCTs,
[7]), giving a simultaneous overview of the topological structure of the
considered time steps. By defining sub-alignments that originate from the
_overall alignment_ containing all time steps, the development of the field
topology can be tracked, while also being able to consider the overall
topological structure of the data set and compare the structures of arbitrary
subsets, independent of the chronology.
After the introduction of FCTs as a tool for the simultaneous visualization of
the topological structure of ensembles, we present time-varying FCTs (T-FCTs),
specialized to the analysis of time series data. Since time series data
represents a series of individual results, the application of FCTs to this
problem is straight forward – instead of different ensemble members, we
consider different time points. However, application specific tasks require
further development of possible user interactions and visualization to ensure
usefulness and consistency. After discussing related work and providing
background on our previous work in Section 1, we make the following
contributions: We present the T-FCT interface in Section 2. Our new
contributions in the FCT back-end and front-end are discussed in Sections 3
and 4 respectively, with a short overview of the new interaction possibilities
in 5. We apply T-FCTs to different real-world data sets in Section 6 and
conclude with a short discussion on future work in Section 7.
## 1 Fuzzy Contour Trees and Related Work
Figure 1: The FCT framework developed by Lohfink et al.
We give an overview of previous work related with the novel contributions of
T-FCTs. Work that is related to FCTs in general, concerning contour trees,
their application in ensemble visualization and merging of graph-based
topological descriptors can be found in [7].
#### Time Dependent Contour Trees
A theoretical consideration of time-varying reeb graphs for continuous space-
time data was given by Edelsbrunner et al. [4]. Szymczak describes sub-domain
aware contour trees and uses them to track accumulated topological changes
between slices of the data set. While the evolution of iso-surfaces is
plotted, the contour trees are not visualized [13].
Also different interactive tools for the analysis of time varying contour
trees and iso-contours have been developed: An interactive exploration tool
for split/merge and contour trees for different time steps was developed by
Sohn et al. [12]. They define a topology change graph and use it to navigate
trees of individual time steps. Bajaj et al. provide multiple calculated
signature graphs on time-varying scalar fields. Interaction possibilities and
the additional visualization of single contour trees provide real-time exact
quantification in the visualization of iso-contours [1]. Kettner et al. take
this idea further to non-decomposable topological properties and higher
dimensions in the Safari interface [5]. Lukasczyk et al. define and visualize
spatio-temporal Reeb graphs in [8] to extract and visualize trajectories and
relationships of hotspots. Oesterling et al. show the evolution of extrema in
high-dimensional data by plotting a 1D landscape profile for each time step
and connecting peaks to indicate critical events. These events are determined
as structural changes in time-varying merge trees.
Other than T-FCTs, none of these approaches visualize contour trees for more
than a single time step or show the evolution of contour trees.
#### Feature Tracking in Time Dependent Data
Features have been identified and tracked in scalar fields in many different
ways. The components of interests can be superlevel sets [8, 12] or sub-
domains with special geometric and topological properties [2, 6, 11]. Multiple
features on different levels of interest are often tracked in tracking graphs
[8, 12, 9, 15].
In all of these cases, determined features are tracked between subsequent time
steps, tracing these features over time. In contrast, our approach provides an
overview over topological features instead of tracking individual features.
Considering the topological structure at all time steps and matching it, we
provide a more holistic view on the data. Similarities and differences of time
steps can be determined flexibly and independent of the adjacency of the time
steps.
#### Fuzzy Contour Trees
The foundation for T-FCTs was developed by Lohfink et al. with the Fuzzy
Contour Tree framework [7]. See Figure 1 for an overview. This framework
allows the simultaneous analysis of the topological structure of all members
of an ensemble at once. As underlying back-end functionality, the member
contour trees are matched using the tree alignment algorithm. This is done
incrementally: after aligning two contour trees, the resulting alignment and a
further contour tree are given as input for the alignment algorithm and so on.
Since the order of the contour trees has an impact on the result, the contour
trees are shuffled randomly before the execution.
The resulting alignment is a super tree of all contour trees. Thus, a layout
for the alignment can be transferred to the individual contour trees, yielding
common layouts for all of them. Superimposing the contour trees with this
layout results in a Fuzzy Contour Tree in its grouped layout. Bundling edges
at saddles and linking the edges’ opacity to the fraction of contour trees
that contain this specific edge results in the bundled layout. To further
improve the clarity of the visualization, Lohfink et al. implemented an
optimized branch spacing method that improves the positioning of branches on
their parent branch while keeping certain properties of the original FCT.
Multiple interaction possibilities are available that link the FCT to an
overview of the contained ensemble members. Both, FCTs and T-FCTs were
designed to support certain domain-agnostic, elementary analysis tasks. Due to
space limitations we reserve their detailed description and evaluation for
future work.
## 2 Interface Overview
Figure 2: The time-varying Fuzzy Contour Tree interface: Time selector and the
FCT of the selected time steps.
Similar to the original FCT described by Lohfink et al. in [7] that is applied
to ensembles, the T-FCT gives insight in the topological structure of time
dependent data by simultaneous visualization of multiple contour trees. In
addition, T-FCTs are tailored to the application to time dependent scalar
fields, considering different time steps of the same simulation or
measurement. This specialized application gives us the possibility to adapt
visualization of and interaction with the FCT to support the exploration of
time dependent fields at the best. Figure 2 shows the T-FCT interface. Both,
the time selector on top and the FCT below are enhanced versions of interface
components of the original FCT interface, providing specialized interaction
with time dependent data and ensuring a consistent visualization.
In the following we describe the background of this visualization and how to
generate it. Details on the T-FCT layout and the time selector can be found in
Sections 4 and 5 respectively. The T-FCT interface was implemented using
$D^{3}$, python and jupyter notebook.
## 3 The Time-Varying Alignment
Considering time dependent scalar fields, the main focus lies on a consistent
alignment over time, prohibiting a randomized order of the input contour
trees. Instead, the contour trees are aligned sequentially. Since the
structure of the first aligned time step imposes its structure on the whole
alignment, other choices for this time step might be beneficial depending on
the data set. Furthermore, the matching of nodes in consecutive time steps is
prioritized as follows: the scalar values of nodes in the alignment are set to
the value of the nodes in the lastly aligned contour tree, if they exist in
this contour tree. Else the value remains untouched. Thus, this contour tree
is effectively contained in the alignment with its scalar values. Hence,
aligning consecutive time steps behaves similar to matching adjacent trees,
enforcing the consistent matching of nodes. Since for the final layout, only
values from the individual time steps are used, changing the assigned values
in the alignment has no impact on node ordering.
The alignment process is very flexible in its application due to use of
different metrics. We implemented an overlap metric in addition to the
existing volume, persistence and combined metrics. It is defined as $1-J(A,B)$
where the Jaccard index $J(A,B)=\frac{|A\cap B|}{|A\cup B|}.$ The contour tree
alignment algorithm with optional matching over time is available in the TTK
development branch [14].
Analysis of time dependent data often takes place on the level of individual
time steps instead of the whole data set. Comparing the topological structure
of arbitrary sub-sets is rendered possible by the calculation of the
corresponding _sub-alignment_.
Sub-alignments are calculated based on an existing overall alignment. This
ensures consistent matching of nodes in different sub-alignments, avoids
problems with node identification between sub-alignments and guarantees a
consistent layout. To obtain a sub-alignment, contour trees of time steps that
are not selected are one by one subtracted from the alignment by decrementing
the frequency of all contained nodes. Then, nodes with frequency 0 are deleted
and connectivity of the result is restored. To do so, we determine parent -
child relations of the neighboring nodes by determining paths from these
neighbors to the fixed alignment root (see [7] for details) and connect the
nodes accordingly.
The resulting sub-alignments are alignments of the chosen sub-set of contour
trees. They are likely to be less optimal with respect to the chosen metric
than the result of the alignment algorithm heuristic would be. However, all we
need sub-alignments to be is a sub-tree of the overall alignment to have a
consistent and traceable layout. Employing the resulting FCT, analysis tasks
can be approached for the selected sub-set of time steps.
## 4 The Time-Varying Fuzzy Contour Tree
Figure 3: The trickle-down-layout of the T-FCT: The layout of the overall
alignment (Level I) carries over to sub-alignments (Level II) that are
compared in the time selector. Their layout propagates further to the
individual contour trees (Level III).
As a basis for the T-FCTs, the layout of the overall alignment is computed as
described in [7]. In the setting of T-FCTs, the cost function of the simulated
annealing doesn’t only take into account scalar values of leaves and the
persistence of branches, but also their existence in time. Only contemporary
branches (i.e. branches whose existence intervals overlap) with overlapping
bounding boxes are regarded as overlapping.
Similar to the layout of individual contour trees being based on the layout of
their alignment, the sub-alignments’ layout is based on the layout of the
overall alignment. An illustration for this trickle-down layout is given in
Figure 3.
To obtain the layout of a sub-alignment from the overall alignment, several
steps are taken: First, its branch decomposition is computed. Then, the order
of its branches is set according to the horizontal order in the overall
alignment. The main branch, as the only branch containing two leaf nodes, is
positioned according to its leaf node that can vary over time (the root node
always remains the same). This facilitates spotting changes in the main
branch.
With the horizontal order of the branches set, it is optionally adapted to
avoid gaps that occur if branches from the overall alignment are not present
in the sub-alignment. While this results in more uniform individual layouts,
tracking the development of individual branches is easier without re-
positioning, especially in animations.
After the layout for the sub-alignment is determined, leaves, saddles and
branches are transferred from the individual contour trees as described in
[7], following paths in the sub-alignment. The coloring of leaf nodes is kept
consistent over different sub-alignments.
In contrast to common feature tracking methods, T-FCTs allow the direct
comparison of non-consecutive time steps as well as a topological overview
over all time steps. Matching order and metric are adaptable, providing in-
depth control of the result.
## 5 Interaction
Due to space limitations, we present added and enhanced interaction
possibilities only shortly. For more details see the FCT paper [7] and the
supplemental material.
Figure 4: The time selector: The complete data set with highlighted selected
time steps. Buttons allow the manipulation of the selection.
Interaction possibilities with the FCT aim on linking information concerning
individual contour trees with information on the overall behavior of the
individual fields. To adapt FCTs to the time-varying setting, the grid
providing information on individual contour trees and enabling tree and member
highlighting was turned into the time selector (Figure 4, compare Figure 1).
Instead of showing only time steps that are contained in the current sub-
alignment, every time step is represented by a colored slice of the selector.
Selected time steps are highlighted as boxes with the number of the time step.
To indicate areas of interest, the time selector is colored based on different
measures on the sub-alignment containing a time window of given width with the
considered time step at the center. Either these values are shown directly, or
the averaged sum of their node-wise differences with the neighboring time step
to illustrate changes between them. We implemented two centrality measures:
degree and betweenness centrality [10], focusing on edge insertions and
deletions, and structural changes respectively. Examples for the different
coloring options are given in Figure 5.
Figure 5: Time selector options Different selections and coloring.
Time steps can be selected via the time selector in three different modes:
_Window selection_ , _multi-selection_ and _periodic selection_ as special
case of multi-selection. See Figure 5 for examples.
_Window selection_ selects a connected sub-interval centered at the selected
time step. _Multi-selection_ allows the manual selection of multiple, not
necessarily adjacent time steps to provide deeper insight in individual
members and their differences. As a special case of multi-selection, the
_periodic selection_ automatically selects time steps with a given period and
shows a periodic marker.
A given selection can be shifted left and right. A play and a pause button
start and stop automated shifting to the right (Figure 4).
Figure 6: Tree highlighting: Right: Hovering selected time steps highlights
the individual contour tree in the FCT. Left: For time steps that are not part
of the current sub-alignment, only contained branches are highlighted without
indication of specific nodes and saddles.
_Tree highlighting_ is also generalized for time steps that are currently not
selected: Branches that are present are highlighted without marking specific
saddles and leaves (see Figure 6).
_Member highlighting_ in the time selector does not only take place for
currently selected time steps, but for all available time steps. Like this,
navigating the data set and finding patterns in branch occurrences is
facilitated. See Figure 7 for an example.
## 6 Applications
Figure 7: Periodic behavior in the sea ice data set. The marked branch is
contained in the contour tree only during winter months. (period 12, volume
metric)
### 6.1 Sea Ice
The sea ice data set describes arctic sea ice concentrations and is provided
by the National Snow and Ice Data Center [3]. The concentrations are given as
tenths of grid square area covered by ice. We set the value -1 for grid cells
that are not over sea. We applied T-FCTs to sea ice concentrations from 1980
to 1995 and applied a mild smoothing filter to the data to avoid non-binary
contour trees.
Containing only discrete values, large plateaus in the data result in contour
trees with branches of persistence 0, forbidding the use of metrics that rely
on persistence in the alignment process. Hence, we chose volume and overlap
metric for this example. The discrete nature of the saddles and extrema also
complicates finding a suitable layout for the T-FCT. Optimized branch spacing
as described in [7] shifts the branches to still allow a clear layout.
Figures 7 and 9 show the T-FCT for the sea ice data set with branches of
typical behavior highlighted. The selected branch in Figure 7 can be found in
the winter months of every selected year, reflecting the periodical increase
of sea ice during winter months. The highlighted minimum (ocean) is only
matched if it is surrounded by sufficiently large maxima (sea ice). In Figure
9 on the other hand, the selected branch vanishes after 1986, to re-occur in
early 1994. This branch represents an area of the arctic sea that was
frequently surrounded by sea ice during winters before around 1985 but not any
more. Both of these behaviors, periodical occurrence over the whole data set
and periodical occurrence only in about the first half of the considered time
frame with potential re-occurrence between 1992 and 1994 can be seen in
multiple branches.
Periodic selection allows the selection of individual months over all years.
An example for the comparison of individual months from 1980 to 84 is given in
Figure 8. Here, we used the overlap metric for the alignment and illustrate
the usefulness of optimized branch spacing in discrete data sets. The much
higher complexity of the main structures in the FCT during winter months
indicates the larger extent of sea ice in different ice floes. Although these
floes are interrupted by islands and potentially even free to move,
complicating a matching between time steps, similar structures are visible
between the months, indicating areas of the arctic ocean that are covered by
ice around the whole year.
Figure 8: Sea ice extent during individual months. Similar structures are
highlighted. For March, the comparison between the FCT with and without
optimized branch spacing is given (overlap metric). Figure 9: Vanishing
branches over time show the yearly decreasing extent of the sea ice. In 1994
the sea ice extent peaked and the branch re-occurs (period 12, volume metric).
### 6.2 Convection Simulation
Flow around a hot pole over time was simulated. The resulting 2D flow field is
of size 128 × 256. Material at rest is heated around the pole, begins to rise,
and forms a plume. An exemplary member is shown on the right of Figure 1. This
behavior is clearly reflected in the T-FCTs in Figure 10. Advancing the
selected window step by step through the data provides an overview of the
topological structure at individual time steps but also their connection and
development: Until time step 74, the pole is heating up. Then, the plume forms
and more and more temperature minima are enclosed by the formed plume. The
time selector color shows the degree values, reflecting the dynamic behavior
of the plume towards the end. We chose representative time steps and scaled
them to highlight the raising temperature; find the complete animation in the
supplemental material.
Figure 10: Sliding Window: Advancing step by step through the convection
simulation result provides a clear understanding of the ongoing processes. We
chose an expressive subset of time steps, the step number is given above the
FCTs.
## 7 Conclusion and Future Work
In this paper, we applied FCTs in the time-varying setting. As our new
contribution, we adapted back-end and front-end to its specific challenges,
resulting in the T-FCT interface. We illustrated usefulness and limitations in
real-world examples. As future work, different options to deal with cluttered
(Fuzzy) contour trees could be included, for example hiding nondescript
branches and detail on demand. Also, instead of a purely additive comparison
of contour trees, a subtractive comparison just showing branches not contained
everywhere could improve the overview. In summary, extending and applying FCTs
to time varying data results in useful, coherent visualizations providing a
more general overview of the data than common analysis approaches.
###### Acknowledgements.
Funded by the Deutsche Forschungsgemeinschaft (DFG, German Re- search
Foundation) – 252408385 – IRTG 2057
## References
* [1] C. L. Bajaj, V. Pascucci, and D. R. Schikore. The contour spectrum. In Proceedings. Visualization ’97 (Cat. No. 97CB36155), pp. 167–173, 1997. doi: 10 . 1109/VISUAL . 1997 . 663875
* [2] P.-T. Bremer, E. M. Bringa, M. A. Duchaineau, A. G. Gyulassy, D. Laney, A. Mascarenhas, and V. Pascucci. Topological feature extraction and tracking. Journal of Physics: Conference Series, 78:012007, jul 2007. doi: 10 . 1088/1742-6596/78/1/012007
* [3] W. L. Chapman and J. E. Walsh. Arctic and southern ocean sea ice concentrations, version 1, arctic. Boulder, Colorado USA. NSIDC: National Snow and Ice Data Center, 1991, updated 1996, Accessed: 2021-02-20. doi: 10 . 7265/N5057CVT
* [4] H. Edelsbrunner, J. Harer, A. Mascarenhas, V. Pascucci, and J. Snoeyink. Time-varying reeb graphs for continuous space–time data. Computational Geometry, 41(3):149–166, 2008. doi: 10 . 1016/j . comgeo . 2007 . 11 . 001
* [5] L. Kettner, J. Rossignac, and J. Snoeyink. The safari interface for visualizing time-dependent volume data using iso-surfaces and contour spectra. Computational Geometry, 25(1):97–116, 2003. European Workshop on Computational Geometry - CG01. doi: 10 . 1016/S0925-7721(02)00132-3
* [6] T. Lee, X. Tong, H. Shen, P. C. Wong, S. Hagos, and L. R. Leung. Feature tracking and visualization of the madden-julian oscillation in climate simulation. IEEE Computer Graphics and Applications, 33(4):29–37, 2013. doi: 10 . 1109/MCG . 2013 . 36
* [7] A.-P. Lohfink, F. Wetzels, J. Lukasczyk, G. H. Weber, and C. Garth. Fuzzy contour trees: Alignment and joint layout of multiple contour trees. Computer Graphics Forum, 39(3):343–355, 2020. doi: 10 . 1111/cgf . 13985
* [8] J. Lukasczyk, R. Maciejewski, C. Garth, and H. Hagen. Understanding hotspots: A topological visual analytics approach. In Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems. Association for Computing Machinery, 2015. doi: 10 . 1145/2820783 . 2820817
* [9] J. Lukasczyk, G. Weber, R. Maciejewski, C. Garth, and H. Leitte. Nested tracking graphs. Computer Graphics Forum, 36(3):12–22, 2017. doi: 10 . 1111/cgf . 13164
* [10] M. Roy, S. Schmid, and G. Trédan. Modeling and measuring graph similarity: The case for centrality distance. In Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, FOMC ’14, p. 47–52. Association for Computing Machinery, 2014. doi: 10 . 1145/2634274 . 2634277
* [11] A. Schnorr, D. N. Helmrich, D. Denker, T. W. Kuhlen, and B. Hentschel. Feature tracking by two-step optimization. IEEE Transactions on Visualization and Computer Graphics, 26(6):2219–2233, 2020. doi: 10 . 1109/TVCG . 2018 . 2883630
* [12] B. Sohn and C. L. Bajaj. Time-varying contour topology. IEEE Transactions on Visualization and Computer Graphics, 12(1):14–25, 2006. doi: 10 . 1109/TVCG . 2006 . 16
* [13] A. Szymczak. Subdomain aware contour trees and contour evolution in time-dependent scalar fields. In International Conference on Shape Modeling and Applications 2005 (SMI’ 05), pp. 136–144, 2005. doi: 10 . 1109/SMI . 2005 . 45
* [14] J. Tierny, G. Favelier, J. A. Levine, C. Gueunet, and M. Michaux. The topology toolkit. IEEE Transactions on Visualization and Computer Graphics, 24(1):832–842, 2018. doi: 10 . 1109/TVCG . 2017 . 2743938
* [15] W. Widanagamaachchi, C. Christensen, V. Pascucci, and P. Bremer. Interactive exploration of large-scale time-varying data using dynamic tracking graphs. In IEEE Symposium on Large Data Analysis and Visualization (LDAV), pp. 9–17, 2012. doi: 10 . 1109/LDAV . 2012 . 6378962
| arxiv-papers | 2021-07-27T09:10:10 | 2024-09-04T03:07:21.030305 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Anna-Pia Lohfink, Frederike Gartzky, Florian Wetzels, Luisa Vollmer,\n Christoph Garth",
"submitter": "Anna-Pia Lohfink",
"url": "https://arxiv.org/abs/2107.12682"
} |
2107.12684 | # Microrobots from Toposelective Nanoparticle Attachment
M. R. Bailey,1∗ F. Grillo,1∗ N. D. Spencer2, L. Isa1∗
1Laboratory for Soft Materials and Interfaces, Department of Materials, ETH
Zürich,
Vladimir-Prelog-Weg 5, 8093 Zürich, Switzerland
2Laboratory for Surface Science and Technology, Department of Materials, ETH
Zürich,
Vladimir-Prelog-Weg 5, 8093 Zürich, Switzerland
∗To whom correspondence should be addressed:
E-mail: [email protected];
E-mail: [email protected];
E-mail: [email protected]
> Microrobots hold promise for applications ranging from targeted delivery to
> enhanced mixing at the microscale. However, current fabrication techniques
> suffer from limited throughput and material selection. Here, we demonstrate
> a versatile route enabling the synthesis of microrobots from off-the-shelf
> micro- and nano-particles. Our protocol hinges on the toposelective
> attachment of photocatalytic nanoparticles onto microparticles, exploiting a
> multi-functional polymer and a Pickering-wax emulsification step, to yield
> large quantities of photo-responsive active Janus particles. The polymer
> presents both silane and nitrocatechol groups, binding silica microspheres
> to a range of metal oxide nanoparticles. The Pickering-wax emulsions protect
> part of the microspheres’ surface, enabling asymmetric functionalization, as
> required for self-propulsion. The resulting photocatalytic microrobots
> display a characteristic orientation-dependent 3D active motion upon UV
> illumination, different to that conventionally described in the literature.
> By connecting the extensive library of heterogeneous nanoparticle
> photocatalysts with the nascent field of active matter, this versatile
> material platform lays the groundwork towards designer microrobots, which
> can swim by catalysing a broad range of chemical reactions with potential
> for future applications.
## Introduction
Machines increasingly perform tasks once believed the prerogative of
biological systems. Yet, advances in automation are mostly limited to large
machines such as cars, drones, and industrial robots. The advent of
microrobots, artificial objects that convert energy sources such as light or
chemicals into directed motion (?), promises to bring automation down to the
micro- and nano-scale. Microrobots can transport matter at the microscale, mix
and pump fluids without external agitation (?), thus offering tantalizing
opportunities for performing autonomous tasks at small scales in applications
ranging from targeted drug delivery (?), to environmental remediation (?), and
even energy conversion (?). However, significant technological hurdles must
first be overcome if microrobots are to realise their potential for real-world
applications.
Fabrication remains perhaps the most significant challenge to applied
microrobotics, as both top-down and bottom-up approaches suffer from
significant limitations with respect to scalability and modularity in
combining different materials (?). Designing novel multi-functional
micromachines requires increasingly expensive and specialized equipment, such
as for two-photon polymerization (?), with implications for the accessibility
of scientific research (?). In contrast to the complex microrobots produced by
such techniques, Janus microswimmers are arguably the simplest class of
synthetic active matter. These rely on surface patches with different
physicochemical properties for propulsion in self-generated gradients (?). In
particular, Janus chemical swimmers do not need external actuation, requiring
only a chemical fuel source to move. Nevertheless, these simple microrobots
often suffer from a very low fabrication throughput due to the methodology
used to produce the surface patches (?).
Janus microswimmers are typically produced by sputter-coating particle
monolayers, exploiting line-of-sight vapour-phase deposition and particle
self-shadowing (?). Metal coatings are thus selectively deposited as a
spherical cap, whose extension can be controlled by tilting the monolayer (?,
?). Despite its widespread popularity, this approach has clear downsides,
namely a yield on the order of micrograms and a highly inefficient use of
metal precursors. Recently, Archer et al. demonstrated the scalable
fabrication of Janus microrobots by functionalizing Pickering-wax emulsions
with a two-step nanoparticle seeding and film-growth protocol (?). This
represents a significant advance in the state-of-the-art of microswimmer
fabrication, but the technique is specific to platinum and does not provide
close control over the film morphology or composition. The constrained
material and synthetic options in the literature, although inconsequential for
fundamental studies, hamper the progress of applied microrobotics and, in
particular, inhibit the development of propulsion mechanisms based on useful
chemical reactions.
Here, we demonstrate a modular approach to achieve the asymmetric
functionalization of microparticles from the toposelective attachment of
different nanoparticle thin films, thereby obtaining large (100 mg) quantities
of photo-responsive Janus microrobots. Specifically, commercial nanoparticles
are asymmetrically attached to SiO2 microparticles, which are partially
embedded in Pickering-wax emulsion droplets, via a poly(acrylamide) modified
with silane and nitrocatechol groups (?). The approach is not only scalable
but also connects the vast literature on high-surface-area nanocatalysts (?,
?) to the fabrication of microswimmers, extending the range of targetable
reactions and enabling the facile introduction of new functionalities.
In particular, by utilizing silane and metal oxide-nitrocatechol chelation
chemistry, we demonstrate Janus particles functionalized by TiO2, SrTiO3, and
Fe2O3 nanoparticles. Furthermore, using a post-modifiable
poly(pentafluorophenylacetate) (pPFPAC) backbone presents the opportunity to
exploit other metal-coordination chemistries through the introduction of
various functional groups. Focusing on commercial TiO2 P-25 nanocatalysts, we
fabricate photoresponsive microswimmers, which not only self-propel under UV-
illumination, but also exhibit an interesting orientation-dependent motion
that could be exploited for navigation or directed transport (?).
## Results
### Polymer-assisted nanoparticle attachment on microspheres
The first step in the fabrication of our photocatalytic microrobots is to
identify a protocol for the robust attachment of nanoparticle thin films onto
the microparticle supports. Electrostatic attachment is frequently used as a
means for colloidal heteroaggregation, however, it cannot withstand the harsh
cleaning protocols required to remove the solidified wax in Pickering-wax
emulsions. Alternative strategies employing covalent bonds are therefore to be
sought. In particular, silane groups are frequently used as anchors for SiO2,
while a raft of coordination chemistries exist for transition metal complexes.
However, combining all these features into a single, facile, and robust
protocol presents significant challenges. Here, we overcome these obstacles by
means of a polymer bridge. This comprises an acrylamide polymer backbone
functionalized with both nitrocatechols and silanes to provide multiple
covalent linking sites that can stably bind the nanoparticles to the SiO2
surface.
We base our polymer bridge on (poly)pentafluoroacetate (pPFPAC), a post-
modifiable polymer containing reactive ester linkages, which can be exchanged
with amine-containing functional groups by nucleophilic substitution. To
decorate our microparticles with various metal-oxide nanoparticles, we
functionalize this pPFPAC backbone with: i) N-boc-hexanediamine, ii)
nitrocatechols, and (iii) silane-based groups to obtain
poly(acrylamide)-g-(1,6-hexanediamine, 3-aminopropyldimethylethoxysilane,
nitrodopamine) (?). The N-boc protecting group on the diamine is removed with
TFA, exposing protonated amines on the polymer backbone. This electrostatic
component assists the polymer conformation when binding to negatively charged
inorganic surfaces. The silane groups covalently bind the polymer to the SiO2
microparticle support via siloxane groups, while nitrodopamine facilitates
chelation to a range of metals, including titanium and iron oxides (?, ?). In
this way, the multi-functional polymer acts as a bridge that provides
anchoring between the cores of silica microparticles and oxide nanoparticles
in a simple heteroaggreation process.
Figure 1: Overview of nanoparticle attachment and combination with Pickering-
wax emulsions to achieve Janus particles. a) Protocol to attach nanoparticles
to microparticle supports from the sequential mixing of the polymer and
nanoparticle suspensions. b) SEM image showing the absence of nanoparticles on
SiO2 without intermediate polymer functionalization step (scale bar 3 $\mu$m).
c,d) SEM images showing the successful attachment of TiO2 P-25 to polymer-
functionalized SiO2 microparticles (scale bars 4 $\mu$m, 0.4 $\mu$m
respectively). e) Loading curve of Ti/Si wt% as a function of polymer added
with constant TiO2 concentration. The amount of added polymer is limited by
its solubility in water. f) Loading curve of Ti/Si wt% as a function of TiO2
added with constant polymer concentration. g) Pickering-wax emulsion protocol
to toposelectively attach pre-synthesized nanoparticles. Wax is used as a
temporary mask to screen full coverage of the SiO2 microparticles. h) SEM
image of SiO2-wax colloidosomes produced after emulsification (scale bar 5
$\mu$m). i) SEM image showing TiO2 nanoparticle-functionalized SiO2
microparticles on SiO2-wax colloidosomes (scale bar 1 $\mu$m). j,k) SEM images
of Janus particles obtained after removal of the wax. All scale bars are 1
$\mu$m.
We optimize the attachment of uniform nanoparticle films focusing on TiO2 P-25
as our benchmark nanoparticle system, in concurrence with its status within
the field of photocatalysis. The process, schematized in Fig. 1a, starts with
the activation of the surface of the SiO2 microparticles by an initial
cleaning step, using a hot ammonia and hydrogen peroxide bath to provide
available hydroxyl groups to form siloxane bonds with the polymer. The polymer
is first dispersed at varying concentrations at $50^{\circ}$ C overnight.
Cleaned particles are then added dropwise to the polymer solutions under
magnetic stirring, and left to mix overnight at a final concentration of
0.1w/v%. After stirring, the SiO2 is then washed by centrifugation with
double-distilled water to remove excess polymer from solution. The SiO2
particles retain a yellow color from the polymer, due to the presence of
nitrodopamine. The functionalized polymer-SiO2 particles are then redispersed
in a PBS 7.0 buffer solution, adapting the protocol of Serrano et al. for flat
substrates (?). The particles obtain a pinkish hue, likely arising from
conformational changes of nitrodopamine in alkaline environments (?). TiO2
P-25 of varying concentrations is then added dropwise to a stirred 0.1 w%
solution of the polymer/SiO2 microparticles and then left mixing overnight.
Finally, the P-25/SiO2 microparticles are washed extensively with alternating
sonication and centrifugation steps to remove any excess TiO2 P-25 not bound
to the SiO2.
The produced P-25/SiO2 microparticles are imaged using SEM. We find that in
the absence of the polymer functionalization step, no TiO2 P-25 nanoparticles
are bound to the SiO2 microparticles after washing (Fig. 1b), even at the
highest TiO2 concentrations investigated. We also verify this with ICP-OES
elemental analysis, and find negligible quantities of Ti in the sample (Fig.
1e), highlighting the effectiveness of the cleaning protocol and the
requirement for the polymer to bind the TiO2 P-25 nanoparticles (Figs. 1b-e).
The TiO2 loading can be effectively controlled by varying the amount of
polymer and TiO2 P-25 added, and is retained after washing (Figs. 1e,f). We
observe a linear growth in the Ti/Si ratio with increasing polymer
concentration (Fig. 1e), which is limited by the solubility of the polymer in
water. The Ti/Si ratio would naturally saturate with increasing TiO2 P-25
(Fig. 1f), but, at the highest TiO2 concentrations we explore, aggregation of
the nanoparticles starts to occur.
### Toposelective nanoparticle attachment
Having established the success of the bulk surface modification, we combine it
with a Pickering wax emulsion approach to produce asymmetrically
functionalized SiO2 microparticles, en route to realizing photocatalytic
microrobots (?). This strategy consists in decorating the surface of molten
wax droplets in an aqueous medium with SiO2 microparticles. The particles are
irreversbily adsorbed at the water-wax interface and are immobilized when
solidifying the wax upon cooling. The surface of the particles immersed in the
wax is then protected from surface modifications that are carried out in the
aqueous medium. In particular, we prepare our Pickering emulsions by adapting
the methodology described by Perro et al. (?). Cleaned particles are dispersed
in didodecyldimethylammonium bromide (DDAB) solutions with concentrations
corresponding to an approximate surfactant monolayer coverage on all particles
(?). Wax is added to the suspension, which is heated to $75^{\circ}$ C, and
then subjected to a two-step vigorous stirring protocol (?) (see experimental
section for more details). The hot emulsion is then rapidly cooled in an ice-
bath to obtain solidified SiO2-wax colloidosomes (Figs. S1a-d). The
colloidosomes are then washed consecutively by gravitational sedimentation
with distilled water, a 0.1 M NaCl solution to remove the DDAB cationic
surfactant, then water once more to remove the salt. At this stage, we add the
multifunctional polymer to coat the exposed surface of the SiO2 particles. The
colloidosomes are dispersed in the polymer solution, gently agitated overnight
with an orbital mixer, then washed once more with distilled water to remove
excess polymer, redispersed in a pH 7.0 PBS solution, and gently mixed with
the nanoparticles overnight. Finally, the colloidosomes are collected and
dried, before mixing and filtering with chloroform to remove the wax (Fig.
1g).
For straightforward functionalization, the colloidosomes should be denser than
water (Fig. S3). Colloidosomes with a mean diameter of 33.4 $\mu$m are
produced using 2.12 $\mu$m particles (Supplementary Fig. 2). A particle
concentration of 5w/v% in water is emulsified with wax in a 1:10 wax:water
volumetric ratio. The process can be readily tuned to produce colloidosomes
with SiO2 particles of varying sizes (Figs. S1a-d). Microparticle size
provides a convenient handle on controlling physical properties of the final
microrobots such as the rotational diffusion coefficient, which could be
exploited for e.g. enhanced mixing (?) or navigation (?). However, unlike some
previous reports, we were not able to tune particle penetration into the wax
with surfactant concentration - instead we found that the surfactant
concentration only determined whether or not it was possible to obtain
Pickering emulsions (?).
Figure 2: HR-TEM and elemental mapping of asymmetric TiO2 P-25 nanoparticle
thin films on SiO2 microparticles. a-c) HAADF-STEM and EDS mapping of Janus
particles: the asymmetric functionalization with TiO2 is clearly visible
(scale bars 500 nm). d-f) HR-TEM of the nanoparticle films indicate direct
attachment of porous aggregate structures (scale bars 750 nm, 200 nm, 50 nm
respectively).
Our process gives an approximate 50-50 TiO2/SiO2 surface coating (Figs. 1i-k).
Ti loading is also confirmed by ICP-OES, which gives an approximate 50%
coverage for the Janus microrobots, as observed with SEM (Figs. 1e,f). The
value contrasts with the expected nanoparticle coverage based on the
penetration of the SiO2 microparticles into the wax (approximately 0.36R from
direct measurement of the three-phase contact angle) and on previous findings
using Pickering-wax emulsions (?, ?). We hypothesize that the closely packed
monolayers of SiO2 form an effective barrier to the transport of TiO2 P-25
nanoparticles onto the whole surface of the silica particles that is not
protected by the wax, thereby preventing a higher surface coverage. The
rotated particles in Fig. 1i, likely a result of subsequent filtration steps
after nanoparticle attachment, also suggest this shadowing effect. The Janus
morphology is retained after the harsh cleaning protocols necessary to remove
excess nanoparticles and wax, and the redispersal of the dried Janus
microrobots in water (Figs. 1j,k), indicating the durability of the polymer
linkage.
We confirm the Janus distribution of TiO2 by elemental mapping, namely HAADF-
EDS (Figs. 2a-c). Using TEM, we are also able to visualise the morphology of
the thin nanoparticle films. The thin films are networks of attached
nanoparticle clusters formed from multiple TiO2 primary particles rather than
individual nanoparticle structures. This is in agreement with the expected
morphology of commercial TiO2 P-25 (?). The formation of such porous
nanoparticle structures is favourable due to their enhanced surface area
compared to dense films (?), thereby increasing catalytic activity and thus
swimming speeds (?).
Utilizing nitrocatechol chelation chemistry extends the applicability of our
polymer-based nanoparticle attachment to a range of metal oxides, and could
therefore be exploited to obtain composite thin films of functional
nanoparticles on microparticle supports. To this end, and to demonstrate the
generality of our method, we also attach different phases of TiO2 (amorphous,
anatase, and rutile), Fe2O3, and SrTiO3 using the same protocols developed for
TiO2 P-25 (Fig. 3). Fe2O3 imparts both photocatalytic and magnetic properties,
and could be combined with TiO2 P-25 for enhanced speeds (?) and controlled
steering (?). SrTiO3 is a perovskite photocatalyst widely studied for its
water-splitting properties (?), and therefore is promising as the basis for a
fuel-free microswimmer. Toposelective nanoparticle attachment is thus a
promising modular route to obtaining large quantities of microrobots with a
range of functionalities that can be tuned by selection of the starting
materials.
Figure 3: Symmetric and asymmetric functionalization of SiO2 microparticles
with various commercial, pre-synthesized nanoparticles, highlighting the
versatility of the proposed approach (scale bars 500 nm).
### Microrobots from micro- and nano-particles swimming in 3D
To investigate the autonomous, photocatalytic motion of our TiO2 P-25
microrobots, we perform single-particle tracking studies with bright-field
microscopy, using in-house particle-tracking scripts (Fig. S8), under
different illumination conditions and H2O2 concentrations. TiO2 is known to
degrade H2O2 under UV light, and the Janus distribution of TiO2 P-25
nanoparticles on the SiO2 core’s surface thus leads to the formation of
asymmetric gradients around the microswimmers. These in turn develop flow
fields which result in self-diffusiophoresis of the particles (?) (Figs.
4a,b). We first confirmed the photo-responsive behavior of the microrobots by
alternating off-on UV illumination cycles and found that the UV illumination
is a necessary pre-condition for motion (Figs. 4c,d), with no evidence of
memory or photo-charging effects (?). We then evaluated the instantaneous
velocities of the microrobots under different illumination strengths and
wavelengths (Fig. S8).
The trajectories of microswimmers are typically described with a 2D active
Brownian motion model (?), where a constant propulsion velocity is randomized
in 2D by rotational diffusion. More recently, there has also been a focus on
fabricating and studying microswimmers with unbounded 3D active motion (?).
However, our microrobots demonstrate more complex behavior, which does not
follow the 2D and 3D active Brownian motion equations (?). Specifically, their
motion is mostly confined to the 2D plane, with interdispersed short and rapid
periods of out-of-plane motion (Figs. 4e,h). The predominantly 2D motion may
be explained by hydrodynamic interactions with the glass substrate, which
favor in-plane motion (?). Competing effects from out-of-plane rotational
diffusion and angular velocity arising from a non-uniform nanoparticle coating
and wall-induced flows (?) could cause the observed random out-of-plane
ballistic segments. To characterise this 3D motion, we first confirm that in
the absence of chemical fuel the particles are able to rotate in 3D (Video S2)
and measure their rotational diffusion in solvents of varying viscosity in
line with theory (Table S1) (?). We then measure their 3D active trajectories
via a simple approach making use of the changing diffraction patterns of the
particles as they swim in and out of the focal plane (see Supplementary Text
for details).
Figure 4: Overview of particle motion under UV illumination in fuel-rich
media. a) Schematic of particle motion. Under the decomposition of hydrogen
peroxide, the microrobots swim with the functionalized cap forwards. b) Wide-
field image with superimposed trajectories (shown for 3 s) under UV
illumination (scale bar 20 $\mu$m). c) Distribution of instantaneous
velocities during off (black) and on (violet) cycles. d) Mean instantaneous
velocities of particles during alternating off-on cycles of UV illumination.
e) Example of a microrobot trajectory in 3D, with the magnitude of the
velocity vector color-coded to illustrate the occurrence of an orientation-
dependent velocity. f) Plot of particle velocity vs. out-of-plane orientation
angle. Particles swim faster out of plane, and the fastest motion is observed
when the particle swims towards the glass substrate from above
($\phi=-90^{\circ}$). g) Distribution of out-of-plane orientation angles
($\phi$) across all particle trajectories. h) Distribution of displacements
for all particles in x, y, and z. The distributions in x and y (in-plane) are
Gaussian and similar, while the distribution of z displacements shows
pronounced tails. Error bars correspond to 95% confidence intervals, which
were obtained with bootstrapping.
From the analysis of individual 3D trajectories, like the one reported in Fig.
4e, we measure median instantaneous velocities ranging from 2-13 $\mu$ms-1 on
a per particle basis, and note that the particles swim cap first (Fig. 4a,
Video S1). Under the conditions found to maximize swimming speeds (3v% H2O2,
340 nm, 9.4 mWmm-2), we find a median instantaneous velocity of approximately
6.5 $\mu$ms-1 on a per particle basis (Fig. S8). Lowering the fuel
concentration leads to lower swimming speeds (?), and we also note a
difference in swimming speed depending on the wavelength of illumination used.
By plotting the instantaneous velocities as a function of particle
orientation, we observe a significant asymmetry in the particle motion (Figs.
4f-h). In particular, the microrobots exhibit orientation-dependent
velocities, displaying faster motion as their orientation is increasingly
directed out of plane. The effect persists over multiple frames, indicating
that it is not a tracking artifact. Moreover, contrary to expectations where
shadowing dictates particle motion (?), the observed faster segments are not
uni-directional. Furthermore, the previously discussed on-off photo-
responsiveness of the particles excludes a memory or charging effect (?),
which might have explained the bi-directional fast swimming segments (Figs.
4c,d). Based on the fact that the transmission of 340 nm wavelength light
through 2 $\mu$m fused SiO2 is on the order of 90% (even after accounting for
Fresnel losses), we hypothesise that the SiO2 core does not block the UV
light. This implies that even when the catalytic cap is completely ”shadowed”,
upwards swimming is observed, and we attribute the fastest motion towards the
substrate (cap down) to the direct illumination of the catalytic cap and the
concurrent effect of gravity. The slower in-plane motion could be caused by
the orientation of the propulsion direction, and the near-wall hydrodynamic
interactions which increase drag forces (?). Although statistics for 2D active
Brownian trajectories with orientation-dependent velocities have been reported
(?), their extension to the the 3D case reported here presents potential for
future theoretical developments.
## Discussion
We have demonstrated a modular approach to fabricate large (100 mg) quantities
of photo-responsive microrobots from the asymmetric attachment of commercial
nanoparticles. Our method for toposelective nanoparticle attachment provides a
versatile material platform which can be extended to various functional
nanoparticles. We envision that it will offer an off-the-shelf modular
approach to obtain large quantities of Janus particles with mixed composite
films for a range of applications. The described protocol does not require
specialised equipment beyond that found in typical synthesis laboratories,
lending itself to wide-spread application.
Moreover, the motion of our photo-responsive microrobots highlights several
avenues for further research. Analysis of the observed 3D swimming behaviour
requires a new theoretical framework not currently found in the literature. We
also note that the TiO2 P-25 microrobots self-propel more slowly at higher
illumination wavelengths, which we attribute to TiO2’s large energy band gap.
This demonstrates the opportunities to exploit the wealth of catalysis
literature (?) to inform the design of microrobots with desirable attributes
(e.g. with faster swimming speeds or visible light activation) by appropriate
selection of nanocatalytic materials.
Finally, the ballistic out-of-plane motion of our photocatalytic microrobots
suggests a photoreactor design where the competition between gravity and
activity is exploited. Realizing motion control in 3D, for example by dynamic
light patterning (?), could induce complex flows, which in turn can enhance
overall reactor efficiencies in traditionally difficult-to-mix settings. Such
control would not only be favorable for mixing in microfluidic channels (?),
which have similar dimensions to the observed Z displacements of the
microswimmers, but also in flat-panel reactors where mass transfer is a key
limiting factor (?). Increased reaction rates arising from microswimmer motion
have been previously demonstrated (?), but applicability has been limited by
materials and scalability. By targeting societally relevant reactions, such as
water splitting, we hypothesise that scalable microrobots could be exploited
in a novel photoreactor concept where the particles possess a dual catalyst-
stirrer functionality. Therefore, incorporating aspects of chemical reaction
engineering and soft matter physics could help overcome the four-phase mass-
transfer limitations inherent to current photocatalytic systems.
## Materials and Methods
### Nitrodopamine Synthesis
Nitrodopamine was synthesized following well-established protocols (?).
Briefly, dopamine(5g, 32.6 mmol) and sodium nitrite (6.3g, 91.3 mmol) were
dissolved in 150 mL water and cooled to $0^{\circ}$ C under stirring in an ice
bath. 25mL sulfuric acid (20v/v%) was added dropwise and left stirring at r.T.
overnight. The product mixture was cooled once more to $0^{\circ}$ C,
filtered, and washed with copious amounts of double-distilled water at
$0^{\circ}$ C and then ethanol at $0^{\circ}$ C. The resulting nitrodopamine
hydrogen sulfate was then dried under high vacuum overnight.
### poly(acrylamide)-g-(1,6-hexanediamine, 3-aminopropyl-dimethyloxysilane,
nitrodopamine) synthesis
Synthesis of the pentafluorophenyl acrylate monomer and its polymerization
were performed following previously published protocols (?). Briefly,
pentafluorophenol (87.21 g, 0.47 mol) was dissolved in 150 mL of
dichloromethane (DCM) at $0^{\circ}$ C and 2,6-dimethylpyridine (60.55 mL,
0.52 mol) was added slowly through a dropping funnel, which was afterwards
rinsed with another 150 mL of DCM. This second portion was added to the
reaction mixture. Acryloyl chloride (42.14 mL, 0.52 mol) was then added
dropwise to the reactor, still under cooling, and left to react overnight
under N2 atmosphere at room temperature. The resulting 2,6-dimethylpyridine
hydrochloride salt was removed by filtration and the residual solution was
washed three times with 100 mL of water, dried with magnesium sulfate and the
solvent evaporated under reduced pressure. The product monomer was purified by
distillation (in two portions) under reduced pressure (10 mbar) to give a
colorless liquid (97.09 g, 78%). The monomer pentafluorophenyl acrylate (14.31
g, 60.13 mmol), the initiator AIBN (23.83 mg, 0.15 mmol) and the chain-
transfer agent 2-(dodecylthiocarbonothioylthio)-2-methylpropionic acid (158.45
mg, 0.43 mmol) were dissolved in 15 mL of toluene inside a Schlenk tube. The
solution was degassed via three freeze-pump-thaw cycles and left to react
under a nitrogen atmosphere at $80^{\circ}$C in an oil bath for 18h. After the
RAFT polymerization was completed, the mixture was left to cool to room
temperature and the resulting polymer (pPFPAC) isolated by precipitation in
methanol and dried under vacuum for 48h (12.90 g, 90%).
Likewise, the post-modification steps were carried out as outlined in the work
by Serrano et al., with the exception that the (poly)pentafluoroacetate
(pPFPAC) backbone was not first PEGylated, and instead is only post-modified
with the binding side groups (N-boc-hexanediamine,
3-aminopropyldimethylethoxysilane, nitrodopamine). Briefly, N-boc-
hexanediamine (227 mg, 1.05 mmol) was dissolved in 6.4 mL dimethylformamide
(DMF) with an excess of triethylamine (318 mg, 3.15 mmol). The mixture was
added drop-wise to pPFPAC (500 mg, 2.1 mmol) dissolved in 5.07 mL DMF and left
stirring overnight at $50^{\circ}$ C. A new solution containing 84.5 mg (0.525
mmol) of 3-aminopropyldimethylethoxysilane and triethylamine (160 mg, 1.58
mmol) was dissolved in 7.4 mL of DMF and added drop-wise to the previous
solution, still at $50^{\circ}$ C and under stirring overnight. An excess of
nitrodopamine was dissolved separately (154.4 mg, 0.525 mmol) in 7.4 mL of DMF
with 160 mg of triethylamine (1.58 mmol). The latter solution was added slowly
to the polymer solution and left stirring overnight at $50^{\circ}$ C. DMF was
evaporated under reduced pressure, the mixture re-dissolved in DCM (40 mL, 4
equivalents) and trifluoroacetic acid (TFA, 10 mL, 1 equivalent) and left to
react under stirring overnight. The resulting mixture was again evaporated
under reduced pressure and re-dissolved in twice-distilled water (80 mL). This
solution was purified by dialysis against water for two days using a membrane
with a MWCO of 3,500 Da and subsequently freeze-dried to obtain the yellow-
brown poly(acrylamide)-g-(1,6-hexanediamine, 3-aminopropyl-dimethyloxysilane,
nitrodopamine).
### Polymer-assisted nanoparticle attachment onto microspheres
Polymer solutions were prepared by dispersing the dry
poly(acrylamide)-g-(1,6-hexanediamine, 3-aminopropyl-dimethyloxysilane,
nitrodopamine) in $50^{\circ}$ C water overnight under magnetic stirring. The
maximum polymer concentration is limited by the solubility of the polymer
(approximately 60 mg/L). 1 w/v% SiO2 microparticles suspensions were first
added to a bubbling $70^{\circ}$ C H2O2/NH4OH solution (1:1:1 volumetric
ratio) under magnetic stirring for 10 minutes to activate the SiO2 surface
with reactive hydroxyl groups. The cleaned particles were then added dropwise
under magnetic stirring to the prepared polymer solutions and left stirring
overnight (final SiO2 concentration 0.1 w/v%). The polymer-SiO2 particles were
then washed by centrifugation to remove excess polymer and redispersed in
phosphate-buffered saline (PBS pH 7.0). Nanoparticle suspensions of varying
concentrations ((PBS pH 7.0 media) were then added dropwise to the polymer-
SiO2 suspensions under magnetic stirring and left mixing overnight (final SiO2
concentration 0.1 w/v%). Finally, the nanoparticle functionalized SiO2
microparticles were washed extensively with alternating sonication and
centrifugation steps to remove any excess nanoparticles not bound to the SiO2
microparticles.
### Microrobot Fabrication
Wax-SiO2 Pickering Emulsions were prepared by adapting the methodology used by
Perro et al (?). Suspensions containing 5w/v% SiO2 particles, 10.8 mg/L
didodecyldimethylammonium bromide (DDAB) (?), and a 1:10 molten wax: water
volumetric ratio were heated to $75^{\circ}$ C, then stirred for 15 minutes at
3000 RPM before vigorous mixing at 13500 RPM for 160s using an IKA T-25
Digital Ultraturrax (?). After the emulsification step, the Pickering emulsion
was immediately placed in an ice bath to rapidly solidify the colloidosomes.
The emulsion was then washed in a 0.1M NaCl solution to remove surfactants,
before further washing in deionised water. The SiO2-Wax colloidosomes were
dispersed overnight by gentle agitation in an aqueous solution of a post-
modified (poly)pentafluoroacetate (pPFPAC) polymer. The pPFPAC-colloidosomes
were then washed thoroughly in deionized water before redispersion in a
phosphate-buffered saline (PBS) pH 7.0 suspension containing the functional
metal-oxide nanoparticles. After gentle mixing overnight, the nanoparticle
functionalized colloidosomes were collected by filtration and the wax is
finally removed with chloroform.
### Light-controlled motion experiments
Stock H2O2 (30 v/v%, manufacturer) was added to dilute particle suspensions of
the microrobots to obtain 300 uL of the desired H2O2 concentrations. 280 uL
thereof was then pipetted into a flow-through cell (cell 137-QS; Hellma
Analytics) with a light path length of 1 mm. Particles were imaged on an
inverted microscope under Köhler illumination using a 40x objective (CFI S
Plan Fluor ELWD 40XC) with adjustable collar (set to 1 mm), and videos were
taken at 10 fps on a Hamamatsu C14440-20UP digital camera. UV illumination of
the particles (340/380 nm) was achieved using a Lumencor SPECTRA X light
engine as the excitation source through the objective.
### Particle Tracking
Videos were first pre-processed with Fiji (ImageJ) for conversion to 8-bit and
cropped to obtain one particle per field of view. Particles centres were
tracked using a custom script combining the MATLAB implementation of the
Crocker and Grier IDL particle tracking method (?), and the radial symmetry
approach outlined by Parthasarathy (?). The first invariant moment (inertia)
of masks around the particle centres was determined using a MATLAB
implementation of Hu’s 7 invariant moments formulation (?). Inertia look-up-
tables (LUTs) were first obtained for stationary and diffusive particles. The
evolution of inertia with Z was then inverted, before fitting of a cubic
polynomial using an inbuilt MATLAB non-linear regression function (nlinfit).
From this cubic functional form, the Z values of active particles could be
determined with prediction intervals from inertia of their masks (see
Supplementary Text for more details).
## References
* 1. M. N. Popescu, Langmuir 36, 6861 (2020).
* 2. K. Yuan, M. Pacheco, B. Jurado-Sánchez, A. Escarpa, Advanced Intelligent Systems p. 2100002 (2021).
* 3. P. Díez, et al., ACS Nano 15, 4467 (2021).
* 4. L. Wang, A. Kaeppler, D. Fischer, J. Simmchen, ACS Applied Materials and Interfaces 11, 32937 (2019).
* 5. V. V. Singh, F. Soto, K. Kaufmann, J. Wang, Angewandte Chemie - International Edition 54, 6896 (2015).
* 6. W. Wang, X. Lv, J. L. Moran, S. Duan, C. Zhou, Soft Matter 16, 3846 (2020).
* 7. X. Hu, et al., Science advances 7, 1 (2021).
* 8. A. Maia Chagas, PLoS biology 16, e3000014 (2018).
* 9. J. Zhang, et al., ACS Applied Materials and Interfaces 11, 16639 (2019).
* 10. A. B. Pawar, I. Kretzschmar, Langmuir 25, 9057 (2009).
* 11. R. J. Archer, A. I. Campbell, S. J. Ebbens, Soft Matter 11, 6872 (2015).
* 12. R. J. Archer, A. J. Parnell, A. I. Campbell, J. R. Howse, S. J. Ebbens, Advanced Science 5, 1 (2018).
* 13. Â. Serrano, S. Zürcher, S. Tosatti, N. D. Spencer, Macromolecular Rapid Communications pp. 622–629 (2016).
* 14. D. Astruc, F. Lu, J. R. Aranzaes, Angewandte Chemie - International Edition 44, 7852 (2005).
* 15. P. W. N. M. V. Leeuwen, C. Claver, N. Turner, eds., Recent Advances in Nanoparticle Catalysis (Springer, Cham, 2020).
* 16. W. E. Uspal, Journal of Chemical Physics 150 (2019).
* 17. H. Gulley-Stahl, et al., Environmental Science and Technology 44, 6519 (2010).
* 18. Z. Xu, Scientific Reports 3, 7 (2013).
* 19. S. Cooper, J. Tulane, Ind. Eng. Chem. Anal. Ed. 8, 210 (1936).
* 20. L. Hong, S. Jiang, S. Granick, Langmuir 22, 9495 (2006).
* 21. A. Perro, F. Meunier, V. Schmitt, S. Ravaine, Colloids and Surfaces A: Physicochemical and Engineering Aspects 332, 57 (2009).
* 22. S. Kord Daroun Kalai, Synthesis of silica Janus nanoparticles with metal semishells (2019).
* 23. K. Lebdioua, A. Aimable, M. Cerbelaud, A. Videcoq, C. Peyratout, Journal of Colloid and Interface Science 520, 127 (2018).
* 24. Z. Lin, J. L. Thiffeault, S. Childress, Journal of Fluid Mechanics 669, 167 (2011).
* 25. M. A. Fernandez-Rodriguez, et al., Nature Communications 11, 1 (2020).
* 26. T. Ohno, K. Sarukawa, K. Tokieda, M. Matsumura, Journal of Catalysis 203, 82 (2001).
* 27. M. Gao, L. Zhu, W. L. Ong, J. Wang, G. W. Ho, Catalysis Science and Technology 5, 4703 (2015).
* 28. U. Choudhury, L. Soler, J. G. Gibbs, S. Sanchez, P. Fischer, Chemical Communications 51, 8660 (2015).
* 29. T. Maric, M. Z. M. Nasir, R. D. Webster, M. Pumera, Advanced Functional Materials 1908614, 1 (2020).
* 30. V. Sridhar, B. W. Park, S. Guo, P. A. Van Aken, M. Sitti, ACS Applied Materials and Interfaces 12, 24149 (2020).
* 31. Y. Goto, et al., Joule 2, 509 (2018).
* 32. J. Anderson, Annual Review of Fluid Mechanics 21, 61 (1989).
* 33. V. Sridhar, et al., Proceedings of the National Academy of Sciences of the United States of America 117, 24748 (2020).
* 34. K. Dietrich, et al., New Journal of Physics 19 (2017).
* 35. O. Yasa, P. Erkoc, Y. Alapan, M. Sitti, Advanced Materials 30, 1 (2018).
* 36. H. Löwen, Journal of Chemical Physics 152 (2020).
* 37. W. E. Uspal, M. N. Popescu, S. Dietrich, M. Tasinkevych, Soft Matter 11, 434 (2015).
* 38. F. Rühle, J. Blaschke, J. T. Kuhr, H. Stark, New Journal of Physics 20 (2018).
* 39. S. M. Anthony, L. Hong, M. Kim, S. Granick, Langmuir 22, 9812 (2006).
* 40. J. R. Howse, et al., Physical Review Letters 99, 8 (2007).
* 41. D. P. Singh, W. E. Uspal, M. N. Popescu, L. G. Wilson, P. Fischer, Advanced Functional Materials 28, 1706660 (2018).
* 42. A. J. Goldman, R. G. Cox, H. Brenner, Chemical Engineering Science 22, 637 (1967).
* 43. A. R. Sprenger, et al., Langmuir 36, 7066 (2020).
* 44. V. Etacheri, C. Di Valentin, J. Schneider, D. Bahnemann, S. C. Pillai, Journal of Photochemistry and Photobiology C: Photochemistry Reviews 25, 1 (2015).
* 45. J. Arrieta, M. Polin, R. Saleta-Piersanti, I. Tuval, Physical Review Letters 123, 158101 (2019).
* 46. K. Ward, Z. H. Fan, Journal of Micromechanics and Microengineering 25 (2015).
* 47. K. Takanabe, ACS Catalysis 7, 8006 (2017).
* 48. J. Orozco, et al., Angewandte Chemie - International Edition 52, 13276 (2013).
* 49. A. Napolitano, M. D’Ischia, C. Costantini, G. Prota, Tetrahedron 48, 8515 (1992).
* 50. Z. Chu, et al., Colloids and Surfaces A: Physicochemical and Engineering Aspects 603, 125183 (2020).
* 51. J. C. Crocker, D. G. Grier, Journal of Colloid and Interface Science 179, 298 (1996).
* 52. R. Parthasarathy, Nature Methods 9, 724 (2012).
* 53. M.-K. Hu, IRE Transactions On Information Theory 8, 179 (1962).
* 54. MATLABacademy, MATLAB Central File Exchange (2009).
* 55. D. T. Kovari, D. Dunlap, E. R. Weeks, L. Finzi, Optics Express 27, 29875 (2019).
* 56. M. Speidel, A. Jonáš, E.-L. Florin, Optics Letters 28, 69 (2003).
## Acknowledgments
The authors thank Dr. T Gmür and Dr. K Zhang for their assistance with polymer
synthesis and characterisation. They are also grateful to Dr. S.S Lee for his
assistance with the UV microscopy set up used for the particle tracking
experiments, to Dr. P Zeng for the images taken with SEM and TEM, to V Niggel
for the discussions on image analysis and lab safety, and to Dr. B Hattendorf
for the ICP-OES measurements. M.R Bailey would additionally like to thank Dr.
G.A Filonenko for his various insights pertaining to the synthesis. We
acknowledge the Scientific Center for Optical and Electron Microscopy (ScopeM)
of ETH Zurich for access to their instrumentation and expertise. Fabio Grillo
acknowledges financial support from the Swiss National Science Foundation,
grant number 190735.
### Author Contribution Statement
Author contributions are defined based on the CRediT (Contributor Roles
Taxonomy). Conceptualization: M.R.B., F.G., L.I. Formal Analysis: M.R.B., F.G.
Funding acquisition: F.G., L.I. Investigation: M.R.B. Methodology: M.R.B.,
F.G., L.I., N.S. Software: M.R.B., F.G. Supervision: F.G., L.I. Validation:
M.R.B., F.G. Visualization: M.R.B., F.G., L.I. Writing - original draft:
M.R.B., F.G., L.I. Writing - review and editing: M.R.B., F.G., L.I., N.S.
## Supplementary materials
* Text S1: Preparation of SiO2-wax colloidosomes
* Text S2: Polymer characterisation
* Text S3: 3D tracking with invariant moments
* Text S4: Polymer stability
* Text S5: 3D rotation of microrobots
* Text S6: Motion under different experimental conditions
* Fig. S1: Colloidosomes from different particle sizes
* Fig. S2: Size distribution of colloidosomes
* Fig. S3: Colloidosome density
* Fig. S4: 1HNMR spectrum
* Fig. S5: ATR-IR spectra
* Fig. S6: LUT of Inertia(Z)
* Fig. S7: Microrobot stability under highly oxidizing conditions
* Fig. S8: Box-plots of instantaneous velocity under different conditions
* Table S1: Conditions to obtain colloidosomes
* Table S2: 3D rotational diffusion of microrobots
## Supplementary Text
### Text S1: Preparation of SiO2-wax colloidosomes
SiO2-wax colloidosomes were prepared by adapting the protocol proposed by
Perro et al. as described in the main manuscript (?). In contrast to the
methodology presented in (?), here the particles are dispersed in the water
phase with surfactants, before vigorous stirring by means of an Ultra-Turrax,
to obtain the Pickering wax-in-water emulsion. We find that a 5 w/v% SiO2 in
water concentration provides the best results when preparing the emulsions (5
mL). For the 2.12 $\mu$m SiO2 particles that are the focus of this work, a
volumetric wax:water ratio of 1:10 was used. Surfactant concentrations were
selected such that an approximate monolayer coverage of the SiO2 particles is
achieved (?). The flexibility of the approach is demonstrated by producing
emulsions with various particle sizes (Table S1, Fig. S1), suggesting an
adaptable approach to obtain microrobots with different physical properties.
We note here the importance of the overall colloidosome density. To ensure
effective dispersion of the colloidosomes during functionalization, their
density should be greater than that of water. However, paraffin wax has a
density of 900 kgm-3, and so colloidosome size can affect dispersibility. As a
rough estimation, we find that for 2 $\mu$m particles that fully cover the wax
droplet’s surface, a maximum colloidosome size of approximately 100 $\mu$m
ensures that the colloidosomes are denser than water (Fig. S3). The various
washing procedures, which depend on sedimentation, ensure that larger
colloidosomes are removed from the product before further functionalization
steps.
### Text S2: Polymer characterisation
The D2O 1HNMR spectrum of the post-modified
poly(acrylamide)-g-(1,6-hexanediamine, 3-aminopropyl-dimethyloxysilane,
nitrodopamine) (Fig. S4) is largely in agreement with literature (?). Chemical
shifts of 0.9 to -0.1 and 1.7 to 1.2 ppm, attributed to the presence of
3-aminopropyl-dimethyloxysilane and 1,6-hexanediamine respectively, are
observed. Likewise, the peak positions at 3.5 to 2.8 ppm correspond to the
polymer backbone. However, we are not able to identify the nitro-dopamine
group from the NMR spectrum, although we note that in the work by Serrano et
al. the reported signal is also very weak.
To further investigate the functional groups present on the post-modified
polymer backbone, ATR-IR measurements were also taken (Fig. S5). The
unmodified pPFPAC backbone displays two strong peaks at 990 cm-1 and 1520
cm-1, arising from the pentafluorophenyl groups (C-F stretch and C-C aromatic
stretch, respectively (?)). We note that after post-modification, the C-F
stretch disappears, while a new set of peaks at 1500-1550 cm-1 emerge. Looking
at the spectrum for the synthesized nitrodopamine, we identify the same
structure and attribute these multiple peaks to the combined contribution of
the aromatic C-C in-ring stretch and NO stretch of nitrodopamine. We also
identify; i) peaks which we attribute to 1,6-hexanediamine (3000-2850 cm-1,
C-H stretch), ii) multiple peaks in the fingerprint regime characteristic of
silanes, and iii) a strong merged peak around 1625 cm-1 which is likely a
combination of the signal from the C=O stretch and in-plane N-H bend of the
secondary amides formed when coupling the functional groups to the polymer.
### Text S3: 3D tracking with invariant moments
To characterise the 3D swimming behaviour of the microrobots, we developed a
simple image-invariant-based approach to determine the displacements in Z. We
exploit the changing diffraction pattern of particles imaged under bright-
field Köhler illumination as they move in and out of the focal plane. We
quantify this change in the image properties by taking the inertia (first
moment) of image masks centred at the particle. By studying trajectories in
the Z region where the inertia changes monotonically, we are therefore able to
track motion in 3D.
We first create a look-up-table (LUT) of inertia values by obtaining Z-stacks
of stationary particles with 0.2 $\mu$m increments (Fig. S6). A circular mask
around the particle center is taken for each Z-stack image, from which the
first invariant image moment (inertia) is calculated (?), (?). By performing
this operation for each Z slice, a series of inertia(Z) calibration curves are
obtained. These curves are then averaged, and the monotonic domain is inverted
to obtain Z(inertia), to which a cubic polynomial is fitted using an in-built
MATLAB function (nlinfit).
This cubic polynomial is then used to determine the Z-position of active
swimming trajectories. Briefly, we set the focal plane above the particle
centres so that as the particles swim upwards, they move into focus. This is
done to maximise the monotonically increasing regime of the particle
diffraction ring’s image inertia. We then image this plane under UV
illumination with H2O2 fuel as for normal 2D particle tracking experiments.
For each frame, the image moment of the particle is computed as previously
described for the Z-stacks. From the previously fitted cubic polynomial, a
prediction for the microswimmer out-of-plane position is thus obtained from
Z(inertia) with an average prediction error of approximately +/- 0.5 $\mu$m.
The described methodology carries a distinct advantage over more conventional
confocal approaches, in that a much higher FPS is achievable since only one Z
plane is imaged with wide-field microscopy (?). Such methods also require
computationally expensive point spread functions (PSFs) for accurate center
finding (?). They are therefore well suited for tracking fluorescent passive
particles in suspensions, but less well adapted for tracking photo-responsive
asymmetric active colloids in bright-field.
To capture the diffraction rings of the particles consistently, accurate
center finding is important for the image masks from which the first invariant
moment is calculated.To enhance particle localization and efficiency, the
MATLAB implementation of the Crocker and Grier algorithm (?) is used as a
first approximation to identify the particles. Masks are then created around
these particles, to which the Parthasarathy radial symmetry approach (?) is
applied. By combining the two approaches, we find that center finding is
improved with respect to the base cases, and works well when the particles are
both in and out of focus.
### Text S4: Polymer stability
We investigate the stability of nanoparticle attachment via the polyacrylamide
by imaging the microrobots after a simulated particle tracking experiment. The
microswimmers are illuminated with high power UV (365 nm, 27 mWmm-2) in a H2O2
rich (5v/v%) environment for 30 minutes. The conditions used exceed the
experimental conditions used for the single particle tracking experiments, and
provide a highly oxidative environment which would degrade many organics. We
then collect the particles by centrifugation and image them with SEM. We find
no change to the morphology of the TiO2 nanoparticle thin films (Fig. S7),
indicating a stable attachment.
### Text S5: 3D rotation of microrobots
By illuminating the particles with a mixture of bright-field and 440 nm
wavelength light, we clearly observe 3D rotation of the passive microrobots
(see Video S2). This contrasts with descriptions of purely 2D microswimmers
possessing an orientation vector diffusing on the unit circle. The observation
also indicates that bottom-heaviness likely plays a less significant role for
our microrobots than in previous reports (?). We expect that our porous TiO2
nanoparticle films are less heavy than the 55 nm dense TiO2 films obtained by
e-beam evaporation, resulting in less constrained rotation (?).
We use the ”MOON” approach proposed by Anthony et al (?) to describe this
rotation. The centres of the particles, and the centroids of the nanoparticle
thin films are detected using in-house python scripts. The vector connecting
these structural points defines a diffusing point on a sphere using a
spherical coordinate system. The angle of variation between these points can
thus be obtained, from which the mean squared angular displacement (MSAD) can
be determined. We fit Perrin’s equation for small angular displacements at
short timescales $<\omega\textsuperscript{2}>=4D\textsubscript{R}\Delta t$ to
the MSAD to obtain DR. As in (?), it is necessary to include an intercept term
at $\Delta t=0$ to obtain a fit of the slope (DR), which approximates the
uncertainty in $\omega$. DR values thus obtained decay with viscosity as
expected from theory, indicating a physical origin for the values (Table S2).
We note occasional instabilities when finding the cap centroid which can lead
to outlier values, however we stress that the video clearly demonstrates 3D
rotation of the particles.
### Text S6: Motion under different experimental conditions
The instantaneous velocities of the P-25 microrobots were evaluated under
different experimental conditions (Fig. S8). The concentration of fuel (H2O2),
illumination intensity (mW mm-2), and the wavelength of illumination were
varied for dilute suspensions of the microswimmers. We find that decreasing
the 340 nm UV illumination intensity from 9.7 mWmm-2 to 4.9 mWmm-2 has little
effect on the speeds of the microswimmers, indicating that already at 4.9
mWmm-2 the illumination is almost saturating. A decrease in the instantaneous
velocities is observed upon reducing the H2O2 concentration by 4x, in line
with previous reports on the relationship between fuel concentration and
microswimmer speeds (?). We note that the relative decrease in the
instantaneous velocities is small compared to the reduction in H2O2,
indicating that low fuel concentrations are viable for motion experiments. The
most evident decrease in microrobot speeds is observed when increasing the
wavelength of UV illumination from 340 nm to 380 nm (decreasing the incident
photon energy). The band gap of TiO2 lies between 360 and 380 nm, which likely
explains the more significant reduction in instantaneous velocity observed.
For the analysis of photo-responsive behavior and orientation-dependent
velocities, we use the experimental conditions providing the highest median
velocity (340 nm illumination, 9.4 mWmm-2, 3v% H2O2 concentration).
## Supplementary Figures
Fig. S 1: Colloidosomes obtained with: a. 0.55 $\mu$m particles b. 1.2 $\mu$m
particles c. 2.12 $\mu$m particles d. 4.16 $\mu$m particles Fig. S 2: a.
Colloidosomes obtained from 2.1 $\mu$m particles b. Size distribution of
pictured colloidosomes; from a sample size of 325, we observe a Gaussian
distribution centred at 33.42 $\mu$m with a standard deviation of 4.82 $\mu$m
Fig. S 3: a. Colloidosome (from 2 $\mu$m SiO2 particles) density as a function
of its size. b. Density of a 50 $\mu$m colloidosome with increasing
stabilizing SiO2 particle size. The red dashed line marks the density of
water, and the green dashed line marks the intersection of colloidosome
density and water Fig. S 4: D2O 1HNMR spectrum of post-modified
poly(acrylamide)-g-(1,6-hexanediamine, 3-aminopropyl-dimethyloxysilane,
nitrodopamine) Fig. S 5: ATR-IR spectra of a. Unmodified pPFPAC backbone b.
Nitrodopamine c. Post-modified poly(acrylamide)-g-(1,6-hexanediamine,
3-aminopropyl-dimethyloxysilane, nitrodopamine) Fig. S 6: LUT produced of
Inertia(Z) from Z-stacks of immobilised particles. The monotonic region of
interest is studied. The LUT is inverted to obtain Z(Inertia), to which a
cubic polynomial is fit by nonlinear regression. Left: Images of particles
taken at different Z heights. Right: Inertia(Z) LUT averaged from 5 Z-stacks,
with the particles on the left indicated. Scale bars represent 2$\mu$m Fig. S
7: a-c: Microrobots after exposure to highly oxidative conditions (long UV
exposure in an H2O2-rich solution). The morphology of the nanoparticle thin
films remains unchanged. Fig. S 8: Box-plots of instantaneous velocities
(evaluated over 0.2s) obtained under different conditions as follows: A) 340nm
9.4mW/mm2, H2O2 3v% B) 340nm 4.9mW/mm2, H2O2 3v% C) 340nm 9.4mW/mm2, H2O2
0.75v% D) 380nm 61.7mW/mm2, H2O2 3v%
## Supplementary Tables
Table S 1: Conditions used to obtain colloidosomes with particles of different
sizes Table S 2: Rotational diffusion for single particles in different
viscosity solutions found following the method proposed by Anthony et al (?).
The theoretical values expected from the Stokes-Einstein relationship
($D\textsubscript{R}=k\textsubscript{B}T/8\pi\eta R\textsuperscript{3})$ are
also shown as reference.
| arxiv-papers | 2021-07-27T09:11:14 | 2024-09-04T03:07:21.040487 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Maximilian R. Bailey, Fabio Grillo, Nicholas D. Spencer, and Lucio Isa",
"submitter": "Maximilian Bailey",
"url": "https://arxiv.org/abs/2107.12684"
} |
2107.12687 | # Relaxation of functionals with linear growth: interactions of emerging
measures and free discontinuities
Stefan Krömer Czech Academy of Sciences, Institute of Information Theory and
Automation, Pod vodárenskou věží 4, CZ-182 08 Prague 8, Czechia
[email protected] , Martin Kružík Czech Academy of Sciences, Institute of
Information Theory and Automation, Pod vodárenskou věží 4, CZ-182 08 Prague 8,
Czechia and Faculty of Civil Engineering, Czech Technical University,
Thákurova 7, CZ–166 29 Prague 6, Czechia [email protected] and Elvira
Zappale Dipartimento di Scienze di Base ed Applicate per l’Ingegneria,
Sapienza - Università di Roma, Via Antonio Scarpa, 16 00161, Roma, RM Italy
[email protected]
###### Abstract.
For an integral functional defined on functions $(u,v)\in W^{1,1}\times L^{1}$
featuring a prototypical strong interaction term between $u$ and $v$, we
calculate its relaxation in the space of functions with bounded variations and
Radon measures. Interplay between measures and discontinuities bring various
additional difficulties, and concentration effects in recovery sequences play
a major role for the relaxed functional even if the limit measures are
absolutely continuous with respect to the Lebesgue one.
MSC (2010): 49J45, 28A33
Keywords: Lower semicontinuity, nonreflexive spaces, relaxation, concentration
effects
Date:
## 1\. Introduction
Oscillations and/or concentrations appear naturally in many problems in the
calculus of variations, partial differential equations, and optimal control
theory due to the lack of convexity properties and/or compactness.
Concentrations usually do not play such a prominent role in minimization
problems for integral functionals with superlinear growth because of various
decomposition lemmas (see e.g [25]) allowing us to show that the integrand is
equiintegrable along minimizing sequences. However, concentrations are a key
issue in problems with only linear coercivity. This phenomenon is intimately
connected with nonreflexivity of underlying spaces $L^{1}$ and $W^{k,1}$ where
such problems are usually formulated.
Minimization problems for a functional
$F:W^{1,p}({\Omega};\mathbb{R}^{m})\times L^{q}({\Omega};{\mathbb{R}}^{d})$,
where ${\Omega}\subset{\mathbb{R}}^{n}$ is a bounded Lipschitz domain, were
considered e.g. in [20] with $p=1$, $q=+\infty$, in [14, 15] with $p=1$,
$q\in(1,\infty]$) and in [21] with $p,q>1$ for functionals modeling energy of
multiphase materials. There,
$\displaystyle F(u,v):=\int_{\Omega}\psi(\nabla u(x),v(x))\,{\rm d}x\ ,$
with $\psi$ a material stored energy density, $u$ an elastic deformation, and
$v$ denoting a chemical composition. Other examples include, e.g.,
magnetoelasticity [17, 21] where $u$ is again a deformation mapping and $v$ is
a magnetization vector, models of particle inclusions in elastic matrices
[12], or elastoplasticity, where $v$ plays a role of the plastic strain. In
this article, we focus on $p=q=1$ and study a simplified model problem for the
general case
(1.1) $\displaystyle F(u,v):=\int_{\Omega}\psi(x,u(x),\nabla u(x),v(x))\,{\rm
d}x\ ,$
whose main feature is a ”strong” interaction terms between $u$ and $v$ of the
form $f_{1}(u)f_{2}(v)$ where $f_{2}$ has positive linear growth.
The linear growth $p=q=1$ combines oscillation effects that can be caused by
nonconvexity of the energy density in $\nabla u$ and $v$ with possible
concentrations of minimizing sequences related to the lack of weak compactness
of $W^{1,1}({\Omega};{\mathbb{R}}^{m})\times
L^{1}({\Omega};{\mathbb{R}}^{d})$. The latter inevitably calls for an
extension of our minimization problem to a large space possessing better
compactness properties. A natural choice is the space of functions of bounded
variations $BV({\Omega};{\mathbb{R}}^{m})$ for the variable $u$ and the Radon
measures on $\bar{\Omega}$, $\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$, for
$v$. Correspondingly, $F$ must be extended to
$BV({\Omega};{\mathbb{R}}^{m})\times\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$,
which we perform by calculating an explicit representation of
$\overline{\mathcal{F}}:=\Gamma-\liminf F$ with respect to weak∗-topology in
$BV\times L^{1}$, cf. [18]. This extension procedure is called relaxation and
provides us with a weak∗-lower semicontinuous functional. Relaxation results
for $\psi$ quasiconvex and independent of $v$ and $u$ were first proven by
Ambrosio and Dal Maso in [4] and then extended by Fonseca and Müller to the
case $\psi=\psi(x,u,\nabla u)$ and $\psi(x,u,\cdot)$ quasiconvex in [23, 24].
A new proof under weaker assumptions was recently given by Rindler and Shaw in
[32].
If the variable $v$ is included in $\psi$ and we consider $F$ from (1.1) then
we refer to [30, 31] for relaxation results if $p=1$ and $q\geq 1$. However,
this result uses the $L^{1}$-weak topology for approximation of $v$, thereby
completely ruling out concentrations and avoiding general measures $v$ outside
of $L^{1}$. In the context of dimension reduction, related results for the
case without explicit dependence on $u$ can be found in [7].
Interesting phenomena are expected to occur if concentrations are combined
with discontinuities, because discontinuous functions do not belong to the
predual space of Radon measures. In particular, such phenomena naturally
appear in impulse control. For instance, application of a drug may lead to an
“instant” change of conditions of a patient, the ignition of the engine makes
the space shuttle “suddenly” change its position. Besides, interactions of
oscillations, concentrations and discontinuities lead to interesting questions
and challenges for mathematical research; see e.g. [26, 27] for some recent
results. For suitable examples, the relaxation results presented below allow
us to observe the natural formation of all the three phenomena just described
in minimizing sequences.
In the following, $\Omega\subset\mathbb{R}^{n}$ is a bounded open set with
Lipschitz boundary. For every $(u,v)\in W^{1,1}(\Omega;\mathbb{R}^{m})\times
L^{1}(\Omega;\mathbb{R}^{d})$, we consider the functional
(1.2) $F(u,v):=\int_{\Omega}f_{1}(u)f_{2}(v)dx+\int_{\Omega}W(\nabla u)dx,$
where $f_{1}:\mathbb{R}^{m}\to\mathbb{R}$,
$f_{2}:\mathbb{R}^{d}\to\mathbb{R}$, and $W:\mathbb{R}^{m\times
n}\to\mathbb{R}$ are continuous functions such that
* $(H_{1})$
there exist $C_{2}>C_{1}>0$ such that for every $a\in\mathbb{R}^{m}$:
$C_{1}\leq f_{1}(a)\leq C_{2}$
* $(H_{2})$
there exists $K>0$, such that for every $b\in\mathbb{R}^{d}$:
$K^{-1}|b|\leq f_{2}(b)\leq K(1+|b|);$
* $(H_{3})$
there exists $\kappa>0$ such that for every $\xi\in\mathbb{R}^{m\times n}:$
$\kappa^{-1}|\xi|\leq W(\xi)\leq\kappa(1+|\xi|)\ .$
We aim at giving an integral representation of the sequentially lower
semicontinuous envelope of $F$ with respect to the $BV\times\mathcal{M}$ weak*
convergence, namely:
(1.3) $\displaystyle\begin{aligned}
\overline{\mathcal{F}}(u,v):=\inf\left\\{\,\liminf_{k\to+\infty}F(u_{k},v_{k})\,\left|\,\begin{array}[]{l}(u_{k},v_{k})\in
W^{1,1}(\Omega;\mathbb{R}^{m})\times L^{1}(\Omega;\mathbb{R}^{d}),\\\
(u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in
}BV(\Omega;\mathbb{R}^{m})\times\mathcal{M}(\bar{\Omega};\mathbb{R}^{d})\end{array}\right.\right\\}.\end{aligned}$
Making use of the Radon-Nikodým decomposition of a measure
$\mu=\mu^{a}+\mu^{s}$ given in (2.5), we prove the following two main results.
###### Theorem 1.1 (Relaxation theorem – the case $n\geq 2$).
Let $n\geq 2$ and $\Omega\subset{\mathbb{R}}^{n}$ be a bounded Lipschitz
domain. Under the assumptions $(H_{1})$, $(H_{2})$ and $(H_{3})$, we have that
(1.4) $\displaystyle\begin{aligned}
\overline{\mathcal{F}}(u,v)=&\int_{\Omega}\mathcal{Q}W(\nabla
u)\,dx+\int_{\Omega}(\mathcal{Q}W)^{\infty}\left(\frac{dDu^{s}}{d|Du^{s}|}\right)\,d|Du^{s}|\\\
&+\int_{\Omega}g\left(u,\frac{dv^{a}}{d{\mathcal{L}}^{n}}\right)\,dx+\int_{\bar{\Omega}}f_{1}^{\rm
min}\,(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)\,d|v^{s}|,\end{aligned}$
for every $u\in BV(\Omega;\mathbb{R}^{m})$ and
$v\in\mathcal{M}(\bar{\Omega};\mathbb{R}^{d})$. Here, $\mathcal{Q}W$ denotes
the quasiconvex envelope of $W$ (see Section 2 below),
(1.5) $\displaystyle
g(a,b):=\min\left\\{f_{1}(a)f_{2}^{\ast\ast}(b_{1})+f_{1}^{\rm
min}\,(f_{2}^{\ast\ast})^{\infty}(b_{2})\,\left|\,b_{1},b_{2}\in{\mathbb{R}}^{d},~{}b_{1}+b_{2}=b\right.\right\\},$
$f_{2}^{\ast\ast}$ denotes the bipolar function of $f_{2}$, which, in view of
$(H_{2})$, coincides with the greatest lower semicontinuous and convex
function below $f_{2}$, the superscript “$\infty$” denotes the recession
functions of the above mentioned envelopes, and
(1.6) $\displaystyle f_{1}^{\rm
min}:=\inf_{a\in\mathbb{R}^{m}}\\{f_{1}(a)\\}\geq C_{1}.$
For the one-dimensional case, yet another decomposition of measures is
relevant, namely, $\mu=\mu^{0}+\mu^{\rm diff}$ decomposed into its atomic part
$\mu^{0}$ and the ”diffuse” rest $\mu^{\rm diff}$, cf. (4.1).
###### Theorem 1.2 (Relaxation theorem – the case $n=1$).
Let $\Omega=(\alpha,\beta)$ be a bounded open interval, $u\in
BV(\Omega;{\mathbb{R}}^{m})$,
$v\in\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$, and suppose that $(H_{1})$,
$(H_{2})$ and $(H_{3})$ hold. Then we have that
(1.7) $\displaystyle\begin{aligned}
\overline{\mathcal{F}}(u,v)=&\int_{\Omega}\Big{(}f_{1}(u(x))df_{2}^{\ast\ast}\big{(}v^{\rm
diff}\big{)}(x)+dW^{\ast\ast}\big{(}Du^{\rm diff}\big{)}(x)\Big{)}+\sum_{x\in
S^{0}}f_{W}^{0}\big{(}u(x^{+}),u(x^{-}),v^{0}(\\{x\\})\big{)}\\\
&+\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}\big{(}u(\alpha^{+}),z,v^{0}(\\{\alpha\\})\big{)}+\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}\big{(}z,u(\beta^{-}),v^{0}(\\{\beta\\})\big{)}\end{aligned}$
Here, $f_{2}^{\ast\ast}$ and $W^{\ast\ast}$ are the convex hulls of $f_{2}$
and $W$, respectively,
$S^{0}:=\\{x\in\Omega:|v|(\\{x\\})+|Du|(\\{x\\})\neq 0\\}$
is the (at most countable) set charged by atomic contributions in the interior
of $\Omega$, and the associated density
$f_{W}^{0}:{\mathbb{R}}^{m}\times{\mathbb{R}}^{m}\times{\mathbb{R}}^{d}\to{\mathbb{R}}$
is given by
(1.12) $\displaystyle f_{W}^{0}(a^{+},a^{-},b):=\inf_{\begin{array}[]{ll}u\in
W^{1,1}((-1,1);{\mathbb{R}}^{m}),\\\ v\in L^{1}((-1,1);{\mathbb{R}}^{d})\\\
u(-1)=a^{-},~{}~{}u(1)=a^{+},\\\
\int_{-1}^{1}vdx=b\end{array}}\left\\{\int_{-1}^{1}(f_{1}(u)(f_{2}^{\ast\ast})^{\infty}(v)+(W^{\ast\ast})^{\infty}(u^{\prime}))dx\right\\}.$
In addition, for the diffuse contributions we used the following abbreviations
for nonlinear transformations of measures defined with the help of recession
functions (cf. Subsection 2.4):
$\displaystyle df_{2}^{\ast\ast}\big{(}v^{\rm
diff}\big{)}(x)=f_{2}^{\ast\ast}\Big{(}\frac{dv^{{\rm
diff},a}}{dx}(x)\Big{)}\,dx+(f_{2}^{\ast\ast})^{\infty}\Big{(}\frac{dv^{{\rm
diff},s}}{d|v^{{\rm diff},s}|}(x)\Big{)}d|v^{{\rm diff},s}|(x)\quad\text{and}$
$\displaystyle dW^{\ast\ast}\big{(}Du^{\rm
diff}\big{)}(x)=W^{\ast\ast}\big{(}u^{\prime}(x)\big{)}\,dx+(W^{\ast\ast})^{\infty}\Big{(}\frac{Du^{c}}{d|Du^{c}|}(x)\Big{)}d|Du^{c}|(x),$
where $v^{{\rm diff}}=v^{{\rm diff},a}+v^{{\rm diff},s}$ and $Du^{\rm
diff}=Du^{{\rm diff},a}+Du^{{\rm diff},s}=\nabla u{\mathcal{L}}^{1}+Du^{c}$
are split into absolutely continuous and singular parts with respect to the
Lebesgue measure ${\mathcal{L}}^{1}$. Notice that in case of $Du^{\rm diff}$,
this can be expressed using the approximate gradient $u^{\prime}$ and the
Cantor part $Du^{c}$ of $Du$. Moreover, $u(\alpha^{+})$ and $u(\beta^{-})$
denote the traces of $u$ at the boundary, and similarly, $u(x^{+})$ and
$u(x^{-})$ denote the traces of $u$ from the right and the from the left,
respectively, at an interior point $x$.
###### Remark 1.3.
Both relaxation theorems have easily deduced variants in the space
$BV(\Omega;{\mathbb{R}}^{m})\times\mathcal{M}(\Omega;{\mathbb{R}}^{d})$
(measures on $\Omega$ instead of $\bar{\Omega}$). The integral representations
for the relaxed functionals in that case are obtained by simply dropping all
contributions on $\partial\Omega$ in (1.4) and (1.7), respectively.
###### Remark 1.4.
Both relaxation theorems still hold if we impose an additional mass constraint
on $v$, i.e., $\int_{\Omega}v(x)\,dx=M$ with a constant $M$, which turns into
$v(\overline{\Omega})=M$ for the relaxation. To see this, the recovery
sequences in the proofs (for the upper bound) have to be modified slightly,
artificially correcting the mass which is easily done with negligible error
for the energy. This is actually the reason we chose to study the relaxation
problem with the measures $v$ on the closure $\overline{\Omega}$, as a mass
constraint is in general lost along weak∗-convergence in
$\mathcal{M}(\Omega;{\mathbb{R}}^{d})$.
###### Remark 1.5.
In essence, the difference between the cases $n=1$ and $n\geq 2$ arises from
the fact that points have $1$-capacity zero for $n\geq 2$, but not for $n=1$.
As a consequence, for $n\geq 2$, it is possible to change the value of $u$ to
optimize $f_{1}(u)$ locally near points that get charged by $v$ or its
recovery sequence, without noticeable energy cost paid in $W$. This ultimately
leads to the natural appearance of $f_{1}^{\rm min}$ in the relaxation formula
for $n\geq 2$ and can in fact make concentration effects in the recovery
sequence for $v$ energetically favorable even if the limit state $v$ is
absolutely continuous with respect to the Lebesgue measure, see Example 3.3
and Remark 3.4.
###### Remark 1.6.
For $n\geq 2$, Theorem 1.1 can be easily modified to include the case $1<p\leq
n$, with $u\in W^{1,p}$ and using $W^{1,p}\ni u_{k}\rightharpoonup u$ weakly
in $W^{1,p}$ in (1.3) (instead of $W^{1,1}\ni u_{k}\rightharpoonup^{*}u$
weakly∗ in $BV$). In that scenario, the correct relaxed energy density is
simply the restriction of (1.4) to $u\in W^{1,p}$, i.e., the term with
$(\mathcal{Q}W)^{\infty}$ is removed as $Du^{s}=0$. Apart from a few
simplifications natural in $W^{1,p}$, the proof can essentially be followed
step by step. The only point where one has to be careful is the upper bound
(cf. Subsection 3.2), more precisely, the function $\varphi$, which now has to
be $W^{1,p}$ to still allow the cut-off arguments based on it. This is
possible only for $p\leq n$, as for large $p$, any function in $W^{1,p}$ is
locally bounded by embedding. (The relaxation for $p>n$ is a much more classic
problem where $u_{k}\to u$ uniformly and the variable for $u$ in the
relaxation formula simply gets frozen instead of the more complex phenomena we
observe here.)
The plan of the rest of the paper is as follows. First, we introduce necessary
notation in Section 2. A proof of Theorem 1.1 is contained in Section 3
together with a few remarks. We also indicate there possible generalization
and give an example where the relaxed functional is calculated explicitly.
Finally, a proof of Theorem 1.2 c.an be found in Section 4.
## 2\. Notation and Preliminary Results
In the following $\Omega$ is a bounded open set of $\mathbb{R}^{n}$, $n\geq 2$
and $\mathcal{A}(\Omega)$ stands for the family of open subsets of $\Omega$.
### 2.1. Radon measures
By $\mathcal{M}(\Omega)$ we denote the set of signed Radon measures on
$\Omega$, for the $\mathbb{R}^{d}$-valued we use the symbol
$\mathcal{M}(\Omega;\mathbb{R}^{d})$. We write $\mathrm{Supp}\,\mu$ to denote
the the support of $\mu\in\mathcal{M}(\Omega;\mathbb{R}^{d})$. Any element
$\mu\in\mathcal{M}(\Omega;\mathbb{R}^{d})$ can be decomposed as
(2.1) $\mu:=\mu^{a}+\mu^{s},$
where $\mu^{a}$ is absolutely continuous with respect to the $n$-dimensional
Lebesgue measure $\mathcal{L}^{n}$, and $\mu^{s}$ is the singular part. A
particularly important example of a scalar-valued, purely singular measure is
the _Dirac mass_ $\delta_{z}$ charging a single point $z\in{\mathbb{R}}^{n}$.
For any Borel set $A\subset{\mathbb{R}}^{n}$, it is defined by
$\delta_{z}(A):=1$ if $z\in A$, and $\delta_{z}(A):=0$ otherwise.
If $\mu\in\mathcal{M}(\Omega;\mathbb{R}^{d})$ and
$\lambda\in\mathcal{M}(\Omega)$ is a nonnegative Radon measure, we denote by
$\frac{d\mu}{d\lambda}$ the Radon-Nikodým derivative of $\mu$ with respect to
$\lambda$. By a generalization of the Besicovitch Differentiation Theorem (see
[19, Theorem 1.153 and related results in sections 1.2.1, 1.2.2]), it can be
proved that there exists a Borel set $E\subset\Omega$ such that $\lambda(E)=0$
and
(2.2) $\frac{d\mu}{d\lambda}(x)=\lim_{\varepsilon\to
0^{+}}\frac{\mu(x+\varepsilon\,C)}{\lambda(x+\varepsilon\,C)}$
for all $x\in\mathrm{Supp}\,\mu\setminus E$ and any open convex set $C$
containing the origin. We recall that the exceptional set $E$ does not depend
on $C$. Also recall that almost every point in $\mathbb{R}^{n}$ is a Lebesgue
point if $f\in L^{1}_{\mathrm{loc}}(\mathbb{R}^{n},\mu)$ and $\mu$ is a Radon
measure, i.e.,
$\lim_{\varepsilon\to 0^{+}}\frac{1}{\mu(x+\varepsilon C)}\int_{x+\varepsilon
C}|f(y)-f(x)|d\mu(y)=0$
for $\mu-$ a.e. $x\in\mathbb{R}^{n}$ and for every bounded, convex, open set
$C$ containing the origin.
Analogous results hold for Radon measures on the compact set $\bar{\Omega}$,
and we use analogous notation for this case, consistently replacing $\Omega$
by $\bar{\Omega}$ above. If necessary, every measure in
$\mathcal{M}(\bar{\Omega})$ is understood to be extended by zero outside of
$\bar{\Omega}$.
In what follows, for every measure $\mu\in\mathcal{M}(\Omega;\mathbb{R}^{d})$
we will identify the measure $\mu^{a}$, with its density
$\frac{d\mu^{a}}{d\mathcal{L}^{n}}$.
### 2.2. Functions of bounded variation
By $BV(\Omega;\mathbb{R}^{m})$ we denote the space of functions with bounded
variation, i.e. the set of $L^{1}(\Omega;\mathbb{R}^{m})$ functions whose
distributional gradient $Du$ is a bounded Radon measure on $\Omega$ (i.e. an
element of $\mathcal{M}(\Omega;\mathbb{R}^{d})$) with values in the space
$M^{m\times n}$ of $m\times n$ matrices. For every $u\in
BV(\Omega;\mathbb{R}^{m})$, its distributional derivative $Du$ can be
decomposed as $Du^{a}+Du^{s}$, where $Du^{a}$ is the absolutely continuous
part and the singular part with respect to the Lebesgue measure
$\mathcal{L}^{n}$, respectively. The function $u$ is approximately
differentiable $\mathcal{L}^{n}$-a.e. in $\Omega$ and its approximate gradient
$\nabla u$ belongs to $L^{1}(\Omega;M^{m\times n})$ and coincides
$\mathcal{L}^{n}$-a.e. with $\tfrac{dDu^{a}}{d\mathcal{L}^{n}}$. $S_{u}$
coincides with the complement of the set of Lebesgue points of $u$, up to a
set of null $\mathcal{H}^{n-1}$ measure. See [5, Sections 3.5 and 3.6] for
more details.
More precisely the following decomposition holds:
(2.3) $Du=\nabla u\mathcal{L}^{n}+Du^{s}=\nabla
u\mathcal{L}^{n}+Du^{j}+Du^{c},$
where $Du^{j}$ is concentrated on $\mathcal{S}_{u}$ the latter term is the
part of $Du^{s}$ concentrated on the set
$\\{x\in\Omega:\,\eqref{approximatelimit}\,\text{holds}\\}$, where
(2.4) $\lim_{\varepsilon\rightarrow
0^{+}}\frac{1}{\mathcal{\varepsilon}^{n}}\int_{Q\left(x,\varepsilon\right)}\left|u(y)-u\left(x\right)\right|dy=0.$
holds. Here, and in what follows, given $x\in{\mathbb{R}}^{n}$ and
$\varepsilon>0$,
$Q(x,\varepsilon)=\Pi_{i=1}^{n}(x_{i}-\varepsilon/2,x_{i}+\varepsilon/2)$.
According to decomposition (2.3), we can further specialize (2.1), i.e. we can
decompose any measure $v\in\mathcal{M}(\bar{\Omega};\mathbb{R}^{d})$ into
three mutually orthogonal measures
(2.5) $v=v^{a}+v^{|Du^{s}|}+v^{\sigma},$
i.e. $v^{s}=v^{|Du^{s}|}+v^{\sigma}$, whereas $v^{|Du^{s}|}$ is absolutely
continuous with respect to $|Du^{s}|$ and $v^{\sigma}$ which is singular with
respect to $|Du|$.
### 2.3. Convex envelopes and recession functions
Let $W_{1}:\mathbb{R}^{m}\times\mathbb{R}^{d}\times\mathbb{R}^{m\times
n}\to\mathbb{R}$, be defined as
$W_{1}(a,b,\xi):=f_{1}(a)f_{2}(b)+W(\xi),$
where $f_{1}$, $f_{2}$ and $W$ are the functions introduced above and
satisfying $(H_{1}),(H_{2})$ and $(H_{3})$. This entails, in particular that
$W_{1}$ has linear growth with respect to the last two variables.
We recall that the convex envelope of a function
$f_{2}:\mathbb{R}^{d}\to\mathbb{R}$ is the greatest convex function which is
below $f_{2}$, and as already observed, by virtue of $(H_{2})$, it coincides
with the biconjugate of $f_{2}$; cf. [16]. In the same way the quasiconvex
envelope of a function $W:\mathbb{R}^{d\times n}\to\mathbb{R}$ is the greatest
quasiconvex function which is below $W$ and it admits the following
representation:
$\mathcal{Q}W(\xi)={\rm
inf}\left\\{\frac{1}{|D|}\int_{D}W(\xi+\nabla\phi(y))dy\,\left|\,\phi\in
W^{1,\infty}_{0}(D;\mathbb{R}^{m})\right.\right\\},$
$D$ being a bounded Lipschitz domain. This definition is independent of $D$
and we say that $W$ is quasiconvex if $W=QW$.
Integral functionals with such integrands of linear growth can be extended to
measures in a meaningful way if we assume that there is a well defined
recession function. Here, following [29, 32], we define the (generalized)
recession function of a function $h:{\mathbb{R}}^{m\times n}\to{\mathbb{R}}$
by
(2.6) $h^{\infty}(z):=\limsup_{t\to+\infty,z^{\prime}\to
z}\frac{h(tz^{\prime})}{t}$
We recall that if $h$ is quasiconvex with linear growth, in particular if
$h=QW$, then $h^{\infty}$ inherits these properties, both $h$ and $h^{\infty}$
are globally Lipschitz continuous and the $\limsup$ in (2.6) is a limit along
all rank-$1$ lines, i.e., if both $z$ and $z^{\prime}$ are restricted to the
class of matrices of rank $1$. In case of a convex function
$h:{\mathbb{R}}^{m}\to{\mathbb{R}}$ with linear growth, for instance
$h=f_{2}^{\ast\ast}$, its recession function automatically exists as the limit
(2.7) $h^{\infty}(b)=\lim_{t\to+\infty}\frac{h(tb)}{t},\quad\text{locally
uniformly in $b\in{\mathbb{R}}^{m}$.}$
Another technically useful property equivalent to (2.7) is
(2.8)
$\Big{|}\frac{1}{t}h(tb)-h^{\infty}(b)\Big{|}\leq\sigma(t)(|b|+1)\quad\text{for
all $t>0$, $b\in{\mathbb{R}}^{m}$, where
}\sigma(t)\underset{t\to\infty}{\longrightarrow}0.$
Here, $\sigma:(0,\infty)\to(0,\infty)$ is a non-increasing, continuous
function independent of $b$. (For instance, given (2.7), one may choose
$\sigma(t):=\sup\big{\\{}\big{|}h^{\infty}(b)-\tfrac{1}{s}h(sb)\big{|}\,:\,|b|\leq
1,s\geq t\big{\\}}$).
Due to the special form of $W_{1}$, the recession function of
${\mathcal{C}}{\mathcal{Q}}W_{1}(a,b,\xi):=f_{1}(a)f_{2}^{\ast\ast}(b)+\mathcal{Q}W(\xi)$
can be expressed as
$({\mathcal{C}}{\mathcal{Q}}W_{1})^{\infty}(a,b,\xi)=f_{1}(a)(f_{2}^{\ast\ast})^{\infty}(b)+(\mathcal{Q}W)^{\infty}(\xi)$
for every
$(a,b,\xi)\in\mathbb{R}^{m}\times\mathbb{R}^{d}\times\mathbb{R}^{m\times n}$.
### 2.4. Nonlinear transformation of measures
Throughout, we will use the following notation for scalar-, vector- or matrix
valued measures transformed by a nonlinear function. Let
$\nu\in{\mathcal{M}}(\Lambda;{\mathbb{R}}^{M})$ be such a measure on a Borel
set $\Lambda\subset{\mathbb{R}}^{n}$ (e.g., $\Lambda=\overline{\Omega}$), and
let $f:\Lambda\times{\mathbb{R}}^{M}\to{\mathbb{R}}$ with recession function
$f^{\infty}(x,\cdot):=(f(x,\cdot))^{\infty}$ in the second variable, for fixed
$x\in\Lambda$. For every Borel set $A\subset\Lambda$, we then define
$f(\nu)(A):=\int_{A}\,df(x,\nu)(x),\quad
df(x,\nu)(x):=f\Big{(}x,\frac{d\nu^{a}}{d\mathcal{L}^{n}}(x)\Big{)}\,dx+f^{\infty}\Big{(}x,\frac{d\nu^{s}}{d|\nu|^{s}}(x)\Big{)}d|\nu|^{s}(x),$
where $\nu=\nu^{a}+\nu^{s}$ is the Radon-Nikodým decomposition of $\nu$ into
an absolutely continuous and a singular component with respect to the Lebesgue
measure $\mathcal{L}^{n}$. Obviously, this definition requires $f$ to be
regular enough so that the integral above is well-defined, which will always
be the case below.
### 2.5. Continuous extension of functionals with respect to area-strict
convergence
The most natural way to extend a functional on $W^{1,1}$ or $L^{1}$ to $BV$ or
${\mathcal{M}}$, respectively, is by continuous extension with respect to
area-strict convergence, following [29]. Here, given a Borel set $\Lambda$
which is either open or compact, we say that a sequence
$(v_{k})\subset{\mathcal{M}}(\Lambda;{\mathbb{R}}^{d})$ converges to
$v\in{\mathcal{M}}(\Lambda;{\mathbb{R}}^{d})$ _area-strictly in
${\mathcal{M}}(\Lambda;{\mathbb{R}}^{d})$_ if
$v_{k}\rightharpoonup^{*}v~{}~{}~{}\text{in
${\mathcal{M}}(\Lambda;{\mathbb{R}}^{d})$}\quad\text{and}\quad\int_{\Lambda}da(v_{k})(x)\underset{k\to\infty}{\to}\int_{\Lambda}da(v)(x),\quad\text{where
}a(\cdot):=\sqrt{1+|\cdot|^{2}}$
is the density of the area functional. Accordingly, for a sequence
$(u_{k})\subset BV(\Omega;{\mathbb{R}}^{m})$ and a function $u\in
BV(\Omega;{\mathbb{R}}^{m})$, we say that $u_{k}\to u$ _area-strictly in
$BV(\Omega;{\mathbb{R}}^{m})$_ if $u_{k}\to u$ in
$L^{1}(\Omega;{\mathbb{R}}^{m})$ and $Du_{k}\to Du$ area-strictly in
${\mathcal{M}}(\Omega;{\mathbb{R}}^{m\times n})$. The more classical, slightly
weaker notion of _strict convergence_ is recovered if we replace $a$ by
$\tilde{a}(\cdot):=|\cdot|$ above.
An important feature is that $L^{1}(\Lambda;{\mathbb{R}}^{d})$ is dense in
${\mathcal{M}}(\Lambda;{\mathbb{R}}^{d})$ with respect to area-strict
convergence in ${\mathcal{M}}(\Lambda;{\mathbb{R}}^{d})$,
$\Lambda=\Omega,\overline{\Omega}$ (the slightly more subtle latter case is
shown in Lemma 2.5), and $W^{1,1}(\Omega;{\mathbb{R}}^{m})$ is dense in
$BV(\Omega;{\mathbb{R}}^{m})$ with respect to area-strict convergence in
$BV(\Omega;{\mathbb{R}}^{m})$ (by mollifying as in, e.g., [33, Section 5.3]).
As a consequence, the following continuity result of [29] for functionals on
${\mathcal{M}}$ and $BV$, respectively, implies that these are actually the
unique continuous extensions of their restrictions to $L^{1}$ and $W^{1,1}$,
with respect to area-strict convergence.
###### Proposition 2.1 (cf. [29, Thm. 3 and Thm. 4]).
Let $f_{2}$ and $W$ be continuous functions satisfying $(H_{2})$ and
$(H_{3})$. Then the functionals
$\displaystyle
v\mapsto\int_{\overline{\Omega}}df^{\ast\ast}_{2}(v)(x),\quad{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})\to{\mathbb{R}},$
$\displaystyle
v\mapsto\int_{\Omega}df^{\ast\ast}_{2}(v)(x),\quad{\mathcal{M}}(\Omega;{\mathbb{R}}^{d})\to{\mathbb{R}},~{}~{}\text{and}$
$\displaystyle u\mapsto\int_{\Omega}dQW(Du)(x),\quad
BV(\Omega;{\mathbb{R}}^{m})\to{\mathbb{R}}$
are sequentially continuous with respect to area-strict convergence in
${\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$,
${\mathcal{M}}(\Omega;{\mathbb{R}}^{d})$ and $BV(\Omega;{\mathbb{R}}^{m})$,
respectively.
We remark that the convex or quasiconvex envelopes cannot be dropped in
Proposition 2.1, but convexity is exploited there only to ensure that the
recession functions exist in a strong enough sense, ensuring continuity of the
integrands at infinity.
### 2.6. Auxiliary results concerning sequences and approximation
The following result (cf. [19, Lemma 2.31]) will be used in the proof of the
lower bound of Theorem 1.1.
###### Lemma 2.2 (Decomposition Lemma in $L^{1}$).
Let $(z_{k})_{k}\subset L^{1}(\Omega;\mathbb{R}^{d})$ be bounded. Then $z_{k}$
can be decomposed as
$z_{k}=z_{k}^{\rm osc}+z_{k}^{\rm conc},$
with two bounded sequences $(z_{k}^{\rm osc})_{k},(z_{k}^{\rm
conc})_{k}\subset L^{1}(\Omega;\mathbb{R}^{d})$ such that $|z_{k}^{\rm osc}|$
is equiintegrable and $z_{k}^{\rm conc}$ is the purely concentrated part in
the sense that $z_{k}^{\rm conc}\to 0$ in measure. In fact, one may even
assume that
${\mathcal{L}}^{n}(\\{z_{k}^{\rm conc}\neq 0\\})\to 0\quad\text{as
$k\to+\infty$}.$
Moreover, whenever $f:{\mathbb{R}}^{d}\to{\mathbb{R}}$ is globally Lipschitz,
$\|f(z_{k})-f(z^{\rm osc}_{k})-f(z^{\rm conc}_{k})+f(0)\|_{L^{1}(\Omega)}\to
0\quad\text{as $k\to+\infty$}.$
In one-dimensional case, we also use the following lemma – here stated for any
dimension – which allows us to manipulate boundary values.
###### Lemma 2.3.
Let $\Omega\subset\mathbb{R}^{n}$ be a bounded open set and let
$A\subset\subset\Omega$ be an open subset with Lipschitz boundary. Let
$f_{1}:\mathbb{R}^{m}\to{\mathbb{R}},f_{2}:{\mathbb{R}}^{d}\to{\mathbb{R}}$
and $W:{\mathbb{R}}^{m\times n}\to{\mathbb{R}}$ be continuous functions
satisfying $(H_{1})-(H_{3})$. Consider $(u,v)\in
BV(\Omega;R^{m})\times\mathcal{M}(\Omega;\mathbb{R}^{d})$ such that
$|v|(\partial A)=0$ and assume that $(u_{k},v_{k})\subset
W^{1,1}(A,{\mathbb{R}}^{m})\times L^{1}(A;{\mathbb{R}}^{d})$ is a sequence
satisfying $u_{k}\overset{*}{\rightharpoonup}u$ in $BV(A;\mathbb{R}^{m})$,
$v_{k}\overset{*}{\rightharpoonup}v$ in $\mathcal{M}(A;\mathbb{R}^{d})$ and
$\lim_{k\to+\infty}\int_{A}(f_{1}(u_{k})f_{2}(v_{k})+W(\nabla u_{k}))dx=l,$
for some $l<+\infty$. Then there exist a sequence
$(\bar{u}_{k},\bar{v}_{k})\subset W^{1,1}(A,{\mathbb{R}}^{m})\times
L^{1}(A;{\mathbb{R}}^{d})$ such that $\bar{u}_{k}=u$ on $\partial A$ (in the
sense of trace), $\bar{u}_{k}\rightharpoonup^{*}u$ in
$BV(A;{\mathbb{R}}^{m})$, $\bar{v}_{k}\rightharpoonup^{*}v$ in
$\mathcal{M}(A;\mathbb{R}^{d})$, and
$\limsup_{k\to+\infty}\int_{A}(f_{1}(\bar{u}_{k})f_{2}(\bar{v}_{k})+W(\nabla\bar{u}_{k}))dx\leq
l.$
The proof is omitted, it is similar to [11, Lemma 2.2] and [7, Lemmas 4.4 and
4.5].
The following, essentially well-known approximation of an absolutely
continuous measure by a purely concentrating sequence is a key ingredient for
the construction of a recovery sequence in Theorem 1.1.
###### Lemma 2.4.
Let $\Omega\subset{\mathbb{R}}^{n}$ be a bounded domain and let
$\sigma\in\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$ be absolutely
continuous. There is a sequence $(v_{\varepsilon})_{\varepsilon}\subset
L^{1}(\Omega;{\mathbb{R}}^{d})$ converging to zero in measure such that as
$\varepsilon\to 0$, $v_{\varepsilon}\to\sigma$ weakly* and strictly in
$\mathcal{M}(\overline{\Omega};{\mathbb{R}}^{d})$. In fact, $v_{\varepsilon}$
can be constructed as a function supported on balls of radius $r(\varepsilon)$
centered at finitely many points $x_{j}^{\varepsilon}$, $j=1,\ldots
J(\varepsilon)$, such that $r(\varepsilon)\to 0$ as $\varepsilon\to 0$.
###### Proof.
We partition $\bar{\Omega}$ into a collection of mutually disjoint sets, i.e.,
$P_{\ell}=\\{\Omega^{j}_{\ell}\\}_{j=1}^{J(\ell)}$ such that $\text{diam
}(\Omega_{j}^{\ell})<1/\ell$ and
$\Omega_{j}^{\ell}\cap\Omega_{k}^{\ell}=\emptyset$ if $j\neq k$. Take
$x^{\ell}_{j}\in\text{int }(\Omega^{\ell}_{j})$,
$\displaystyle
z^{\ell}_{j\varepsilon}=\begin{cases}\sigma(\Omega^{\ell}_{j})/(|\sigma|({\Omega}^{\ell}_{j})\varepsilon)&\text{
if }|\sigma|({\Omega}^{\ell}_{j})\neq 0,\\\ 0&\text{ otherwise,}\end{cases}$
and for every $j\in\\{1,\ldots,J(\ell)\\}$ such that
$|\sigma|({\Omega}^{\ell}_{j})\neq 0$ consider $x_{j}^{\ell}\in\text{ int
}{\Omega}^{\ell}_{j}$ and define
$N^{\ell}_{j\varepsilon}=\\{x\in\Omega:\
|x-x_{j}^{\ell}|<(|\sigma|(\Omega^{\ell}_{j})/\mathcal{L}^{n}(B(0,1))/|z_{\varepsilon
j}^{\ell}|)^{1/n}\\}\ .$
If $j$ is such that $\sigma({\Omega}^{\ell}_{j})=0$ we set
$N^{\ell}_{j\varepsilon}=\emptyset$. Put
$w^{\ell}_{\varepsilon}(x)=\begin{cases}z_{j\varepsilon}^{\ell}&\text{if }x\in
N^{\ell}_{j\varepsilon}\\\ 0&\text{ otherwise.}\end{cases}$
Notice that
(2.9)
$\displaystyle\int_{\Omega}|w^{\ell}_{\varepsilon}(x)|\,dx=\sum_{j}\mathcal{L}^{n}(N^{\ell}_{j\varepsilon})|z^{\ell}_{j\varepsilon}|=\sum_{j}|\sigma|(\Omega_{j}^{\ell})=|\sigma|(\bar{\Omega})<+\infty$
and that $w^{\ell}_{j\varepsilon}\to 0$ in measure as $\varepsilon\to 0$.
If $\varphi\in C(\bar{\Omega};{\mathbb{R}}^{m})$ we get
$\displaystyle\lim_{\varepsilon\to
0}\int_{\Omega}w^{\ell}_{\varepsilon}\varphi(x)\,dx$
$\displaystyle=\lim_{\varepsilon\to
0}\sum_{j=1}^{J(l)}\int_{N^{\ell}_{j\varepsilon}}z^{\ell}_{j\varepsilon}\varphi(x_{j}^{\ell})\,dx+\lim_{\varepsilon\to
0}\sum_{j=1}^{J(l)}\int_{N^{\ell}_{j\varepsilon}}z^{\ell}_{j\varepsilon}(\varphi(x)-\varphi(x_{j}^{\ell}))\,dx$
$\displaystyle=\int_{\bar{\Omega}}\varphi(x)\,d\sigma^{\ell}(x)\ ,$
where
$\sigma^{\ell}=\sum_{j=1}^{J(l)}\sigma({\Omega}_{j}^{\ell})\delta_{x_{j}^{\ell}}$.
Above, we exploited that
$\displaystyle\lim_{\varepsilon\to
0}\sum_{j=1}^{J(l)}\int_{N^{\ell}_{j\varepsilon}}z^{\ell}_{j\varepsilon}(\varphi(x)-\varphi(x_{j}^{\ell}))\,dx=0$
because $\varphi$ is uniformly continuous on $\bar{\Omega}$ and
$\mathcal{L}^{n}(N^{\ell}_{j\varepsilon})=|\sigma|(\Omega^{\ell}_{j})/|z^{\ell}_{j\varepsilon}|$.
Altogether we have that $w*-\lim_{\varepsilon\to
0}w^{\ell}_{\varepsilon}=\sigma^{\ell}$.
On the other hand, w*-$\lim_{l\to\infty}\sigma^{\ell}=\sigma$. A
diagonalization argument with a suitable $\ell=\ell(\varepsilon)$ gives us a
sequence $v_{\varepsilon}:=w^{\ell(\varepsilon)}_{\varepsilon}$ converging to
zero in measure as well as weakly∗ to $\sigma$ as $\varepsilon\to 0$.
Combining this with (2.9), we also obtain that $v_{\varepsilon}\to\sigma$
strictly. ∎
Strict approximation of general measures by $L^{1}$ functions is also well-
known, but we would like to stress here that this is possible even when
boundary points can be charged:
###### Lemma 2.5.
Let $\Omega\subset{\mathbb{R}}^{n}$ be open and bounded. There exists a family
of linear operators
$(I_{j})_{j\in{\mathbb{N}}}:{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})\to
L^{1}(\Omega;{\mathbb{R}}^{d})$ with $I_{j}\circ I_{j}=I_{j}$, such that for
all $v\in{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$,
(2.10)
$\displaystyle\int_{\Omega}|I_{j}v|\,dx\leq\|v\|_{{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})},\quad\int_{\Omega}a(I_{j}v)\,dx\leq\int_{\overline{\Omega}}da(v)\quad\text{with}~{}a(\cdot):=\sqrt{1+|\cdot|^{2}},$
and $I_{j}v\to v$ weakly∗, strictly and area-strictly in
${\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$ as $j\to\infty$. If $v\in
L^{1}(\Omega;{\mathbb{R}}^{d})$ then $I_{j}v\to v$ strongly in
$L^{1}(\Omega;{\mathbb{R}}^{d})$.
###### Proof.
The operator $I_{j}$ is defined as a piecewise constant interpolation on a
suitable cubical grid of grid size $\tfrac{1}{j}$. For each $j\in{\mathbb{N}}$
and $z\in{\mathbb{Z}}^{n}$, let
${\mathcal{G}}_{j}:=\big{\\{}Q(j,z)\mid
z\in{\mathbb{Z}}^{n}\big{\\}},\quad\text{with}\quad
Q(j,z):=\tfrac{1}{j}(z+[0,1)^{n}).$
While these cubes form a pairwise disjoint covering of ${\mathbb{R}}^{n}$, it
is possible that certain cubes intersect $\overline{\Omega}$ ”from the
outside” in the sense that for some $Q\in{\mathcal{G}}_{j}$,
$Q\cap\Omega=\emptyset\neq Q\cap\overline{\Omega}$. If $v$ charges
$Q\cap\partial\Omega$, this contribution would be lost in our construction
below. We avoid the issue by slightly changing some cubes on the surface: If
necessary, reassign surface points from an ”outer” cube intersecting
$\overline{\Omega}$ as above to a neighbor cube intersecting $\Omega$. This
leads to
$\tilde{{\mathcal{G}}}_{j}:=\big{\\{}\tilde{Q}(j,z)\mid
z\in{\mathbb{Z}}^{n}\big{\\}},$
where the $\tilde{Q}(j,z)$ are chosen as pairwise disjoint Borel sets such
that $Q(j,z)\subset\tilde{Q}(j,z)\subset\overline{Q(j,z)}$,
${\mathbb{R}}^{n}=\bigcup\tilde{{\mathcal{G}}}_{j}$ and
(2.11)
$\displaystyle\tilde{Q}(j,z)\cap\overline{\Omega}\neq\emptyset~{}\Longrightarrow~{}\tilde{Q}(j,z)\cap\Omega\neq\emptyset.$
With the grid given by $\tilde{{\mathcal{G}}}_{j}$, we define the piecewise
constant interpolation
$I_{j}:{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})\to
L^{1}(\Omega;{\mathbb{R}}^{d})$,
$v\mapsto I_{j}v\quad\text{with}\quad I_{j}v|_{\Omega\cap
Q}:=\frac{v(\overline{\Omega}\cap Q)}{{\mathcal{L}}^{n}(\Omega\cap
Q)}~{}~{}\text{for all $Q\in\tilde{{\mathcal{G}}}_{j}$}.$
As constructed, $I_{j}$ is a linear, continuous projection satisfying (2.10)
(cube by cube, by convexity of $|\cdot|$ and $a$, using Jensen’s inequality)
and $I_{j}v\rightharpoonup^{*}v$ in
${\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$ (notice that due to
(2.11), no contributions on $\partial\Omega$ are lost). Combined with (2.10),
the latter implies that $I_{j}w\to w$ strictly and area-strictly in
${\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$. In case $w\in
L^{1}(\Omega;{\mathbb{R}}^{d})$ with $|w|(\partial\Omega)=0$, we get
$\limsup_{j}\int_{\Omega}|I_{j}w|\,dx\leq\int_{\Omega}|w|\,dx$ and
$I_{j}w\rightharpoonup^{*}w$ in ${\mathcal{M}}(\Omega;{\mathbb{R}}^{d})$,
which implies that $I_{j}w\to w$ strongly in $L^{1}$. ∎
### 2.7. The localized energy and its relaxation
Let $\mathcal{A}_{r}(\overline{\Omega})$ be the family of all subsets of
$\overline{\Omega}$ which are open with respect to the relative topology of
$\overline{\Omega}$. For each $A\in A_{r}(\overline{\Omega})$, we introduce
the localized energy ${\mathcal{F}}(\cdot,\cdot,A):BV(\Omega\cap
A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\to[0,+\infty]$, defined
as
(2.12) $\displaystyle\begin{aligned}
\mathcal{F}(u,v,A):=\left\\{\\!\\!\\!\\!\begin{array}[]{ll}\int_{\Omega\cap
A}\big{(}f_{1}(u)f_{2}(v)+W(\nabla u)\big{)}\,dx,&\hbox{ if }(u,v)\in
W^{1,1}(\Omega\cap A;\mathbb{R}^{n})\times L^{1}(\Omega\cap
A;\mathbb{R}^{m}),\\\ \\\ +\infty,&\hbox{
otherwise.}\end{array}\right.\end{aligned}$
Its _relaxation_ , i.e., its lower semicontinuous envelope with respect to
weak∗ convergence, is the functional
$\overline{\mathcal{F}}(\cdot,\cdot,A):BV(\Omega\cap
A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\to[0,+\infty]$ defined as
(2.13) $\displaystyle\begin{aligned}
\overline{\mathcal{F}}(u,v,A):=\inf\left\\{\,\liminf_{k\to+\infty}\mathcal{F}(u_{k},v_{k},A)\left|\begin{array}[]{l}(u_{k},v_{k})\in
W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap
A;\mathbb{R}^{d}),\\\ (u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{
in }BV(\Omega\cap
A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\end{array}\right.\\!\\!\\!\right\\},\end{aligned}$
Here, recall that for $A\in\mathcal{A}_{r}(\overline{\Omega})$,
$\mathcal{M}(A;\mathbb{R}^{d})$ is the dual space of the continuous functions
$\varphi:A\to\mathbb{R}^{d}$ with $\varphi=0$ on $\partial A\cap\Omega$. Also
notice that (2.13) extends the notation $\overline{\mathcal{F}}(u,v)$ of
(1.4), in the sense that
$\overline{\mathcal{F}}(u,v)=\overline{\mathcal{F}}(u,v,\overline{\Omega})$
There are several other, equivalent representations of
$\overline{\mathcal{F}}$ that will be useful to simplify our proofs. For now,
we only collect the statements of these results. Their proofs are presented in
Appendix A.
A first observation is that in (2.13), $f_{2}$ and $W$ can be replaced by
$f_{2}^{\ast\ast}$ and $QW$, respectively:
###### Proposition 2.6.
Let $f_{1},f_{2}$ and $W$ be continuous functions satisfying
$(H_{1})-(H_{3})$, let $A\in\mathcal{A}_{r}(\overline{\Omega})$ and consider
the corresponding functional $\mathcal{F}$ in (2.12). Consider furthermore the
relaxed functionals (1.3) and
(2.14) $\displaystyle\begin{aligned}
\overline{\mathcal{F}}_{\ast\ast}(u,v,A):=\inf\Big{\\{}&\liminf_{k\to+\infty}\int_{\Omega\cap
A}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k})dx+\int_{\Omega\cap A}\mathcal{Q}W(\nabla
u_{k})dx:\\\ &(u_{k},v_{k})_{k}\subset W^{1,1}(\Omega\cap
A;\mathbb{R}^{m})\times L^{1}(\Omega\cap A;\mathbb{R}^{d}),\\\
&(u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in }BV(\Omega\cap
A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\Big{\\}}.\end{aligned}$
Then, $\overline{\mathcal{F}}(\cdot,\cdot,\cdot)$ coincides with
$\overline{\mathcal{F}}_{\ast\ast}(\cdot,\cdot,\cdot)$ in
$BV(\Omega,\mathbb{R}^{m})\times\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})\times\mathcal{A}_{r}(\overline{\Omega})$.
In addition, $u_{k}\in W^{1,1}(\Omega;{\mathbb{R}}^{m})$ can be replaced by
$u_{k}\in BV(\Omega;{\mathbb{R}}^{m})$ in the definition of
$\overline{{\mathcal{F}}}_{\ast\ast}$, if we use an appropriate extension of
${\mathcal{F}}_{\ast\ast}$:
###### Proposition 2.7.
In the situation of Proposition 2.6, we have
(2.15) $\displaystyle\begin{aligned}
\overline{\mathcal{F}}_{\ast\ast}(u,v,A)=\inf\Big{\\{}&\liminf_{k\to+\infty}\int_{\Omega\cap
A}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k})dx+\int_{\Omega\cap
A}d\mathcal{Q}W(Du_{k})(x):\\\ &(u_{k},v_{k})_{k}\subset BV(\Omega\cap
A;\mathbb{R}^{m})\times L^{1}(\Omega\cap A;\mathbb{R}^{d}),\\\
&(u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in }BV(\Omega\cap
A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\Big{\\}}.\end{aligned}$
A key ingredient to obtain an integral representation of
$\overline{\mathcal{F}}$ via the blow-up method is the following preliminary
result which shows that the localized relaxed functional is the restriction of
a Radon measure on $\mathcal{A}_{r}(\bar{\Omega})$.
###### Lemma 2.8.
Let $\Omega\subset\mathbb{R}^{n}$ be an open bounded set with Lipschitz
boundary and let $f_{1},f_{2}$ and $W$ be as in (1.2), satisfying
$(H_{1})-(H_{3})$. For every $(u,v)\in
BV(\Omega;\mathbb{R}^{m})\times\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$,
the set function $\overline{\mathcal{F}}(u,v,\cdot)$ in (2.13) is the trace of
a Radon measure absolutely continuous with respect to
$\mathcal{L}^{n}+|Du|+|v|$.
## 3\. Proof of Theorem 1.1
We start observing that the growth assumptions $(H_{1})$ and the structure of
the functional (1.2) ensure that sequences $(u_{k},v_{k})_{k}\subset
W^{1,1}(\Omega;\mathbb{R}^{m})\times\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$
with $\sup_{k}F(u_{k},v_{k})<+\infty$ have (non-relabeled) subsequences
$\nabla
u_{k}\overset{\ast}{\rightharpoonup}m\in\mathcal{M}(\Omega;\mathbb{R}^{m})$
and $v_{k}\overset{\ast}{\rightharpoonup}v$ in
$\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$. Up to imposing some boundary
conditions or removing constants by working in a quotient space we can assume
without loss of generality that $u_{k}\overset{\ast}{\rightharpoonup}u$ in
$BV(\Omega;\mathbb{R}^{m})$.
The proof of Theorem 1.1 will be achieved in two main steps, first we find a
lower bound and then we prove that it is sharp.
### 3.1. Lower bound
We will now show that
(3.1) $\displaystyle\begin{aligned}
\overline{\mathcal{F}}(u,v)\geq&\int_{\Omega}\mathcal{Q}W(\nabla
u)\,dx+\int_{\Omega}(\mathcal{Q}W)^{\infty}\left(\frac{dDu^{s}}{d|Du^{s}|}\right)\,d|Du^{s}|\\\
&+\int_{\Omega}g\left(u,\frac{dv^{a}}{d{\mathcal{L}}^{n}}\right)\,dx+\int_{\bar{\Omega}}f_{1}^{\rm
min}\,(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)\,d|v^{s}|.\end{aligned}$
###### Proof of the lower bound.
Take $(u_{k},v_{k})\in W^{1,1}(\Omega;{\mathbb{R}}^{m})\times
L^{1}(\Omega;{\mathbb{R}}^{d})$, $u_{k}\rightharpoonup^{*}u$ in
$BV(\Omega;{\mathbb{R}}^{m})$, $v_{k}\rightharpoonup^{*}v$ in
$\mathcal{M}(\overline{\Omega};{\mathbb{R}}^{d})$. We prove individual lower
bounds for the two parts of $\mathcal{F}$. Due to [4] and the trivial estimate
$W\geq\mathcal{Q}W$, we have that
(3.2) $\displaystyle\liminf_{k}\int_{\Omega}W(\nabla
u_{k})\,dx\geq\int_{\Omega}\mathcal{Q}W(\nabla
u)\,dx+\int_{\Omega}(\mathcal{Q}W)^{\infty}\left(\frac{dDu^{s}}{d|Du^{s}|}\right)\,d|Du^{s}|.$
It remains to show that
(3.3) $\displaystyle\liminf_{k}\int
f_{1}(u_{k})f_{2}(v_{k})\,dx\geq\int_{\Omega}g\left(u,\frac{dv^{a}}{d{\mathcal{L}}^{n}}\right)\,dx+\int_{\bar{\Omega}}f_{1}^{\rm
min}\,(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)\,d|v^{s}|.$
For $v_{k}$, we use the Decomposition Lemma in $L^{1}$, cf. Lemma 2.2:
$v_{k}=v_{k}^{\rm osc}+v_{k}^{\rm conc}$, where $(v_{k}^{\rm osc})_{k}$ is
equi-integrable and $|\\{v_{k}^{\rm conc}\neq 0\\}|\to 0$. Up to a
subsequence,
$v_{k}^{\rm osc}\rightharpoonup^{*}v_{\rm osc},\quad v_{k}^{\rm
conc}\rightharpoonup^{*}v_{\rm conc}\quad\text{in
${\mathcal{M}}(\bar{\Omega};{\mathbb{R}}^{d})$}.$
The equi-integrability of $(v_{k}^{\rm osc})_{k}$ and Dunford-Pettis’ Theorem
(see [19, Theorem 2.54]) ensures that
(3.4) $\displaystyle v_{k}^{\rm osc}\rightharpoonup v_{\rm osc}\quad\text{in
$L^{1}(\Omega;\mathbb{R}^{d})$}\ .$
We decompose $v_{\rm conc}=v_{\rm conc}^{a}+v_{\rm conc}^{s}$ into absolutely
continuous and singular part with respect to the Lebesgue measure.
Accordingly, the Lebesgue decomposition of the original limit measure
$v=v^{a}+v^{s}$ is given by
$v^{a}=v_{\rm osc}+v_{\rm conc}^{a}\quad\text{and}\quad v^{s}=v_{\rm
conc}^{s}.$
With a slight abuse of notation, we identify the absolutely continuous
measures $v_{\rm osc}$ and $v_{\rm conc}^{a}$ with their respective densities
$v_{\rm osc}=\frac{dv_{\rm osc}}{d{\mathcal{L}}^{n}}$ and $v_{\rm
conc}^{a}=\frac{dv_{\rm conc}^{a}}{d{\mathcal{L}}^{n}}$ in
$L^{1}(\Omega;{\mathbb{R}}^{d})$ below. Observe that
(3.5) $\displaystyle\begin{aligned}
&\liminf_{k}\int_{\Omega}f_{1}(u_{k})f_{2}(v_{k})\,dx\geq\liminf_{k}\int_{\Omega}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k})\,dx\\\
&\quad\geq\liminf_{k}\int_{\\{v_{k}^{\rm
conc}=0\\}}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k}^{\rm
osc})\,dx+\liminf_{k}\int_{\\{v_{k}^{\rm conc}\neq
0\\}}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k}^{\rm osc}+v_{k}^{\rm
conc})\,dx.\end{aligned}$
We will estimate these two terms separately. For the first term, by [19, Cor.
7.9], exploiting the convexity of $f_{2}^{\ast\ast}$, we get that
(3.6) $\displaystyle\liminf_{k}\int_{\\{v_{k}^{\rm
conc}=0\\}}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k}^{\rm
osc})\,dx\geq\int_{\Omega}f_{1}(u)f_{2}^{\ast\ast}(v_{\rm osc})\,dx\ .$
For the second term, we claim that
(3.7) $\displaystyle\begin{aligned} &\liminf_{k}\int_{\\{v_{k}^{\rm conc}\neq
0\\}}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k}^{\rm osc}+v_{k}^{\rm
conc})\,dx\geq\liminf_{k}\int_{\\{v_{k}^{\rm conc}\neq 0\\}}f_{1}^{\rm
min}f_{2}^{\ast\ast}(v_{k}^{\rm conc})\,dx\\\ &\qquad\begin{aligned}
&\geq\liminf_{k}\int_{\Omega}f_{1}^{\rm min}(f^{\ast\ast})^{\infty}(v_{k}^{\rm
conc})\,dx\\\ &\geq\int_{\Omega}f_{1}^{\rm
min}\,(f_{2}^{\ast\ast})^{\infty}(v_{\rm
conc}^{a})\,dx+\int_{\overline{\Omega}}f_{1}^{\rm
min}\,(f_{2}^{\ast\ast})^{\infty}\Big{(}\frac{dv_{\rm conc}^{s}}{d|v_{\rm
conc}^{s}|}\Big{)}\,d|v_{\rm conc}^{s}|(x),\end{aligned}\end{aligned}$
To see that the first line of (3.7) holds, notice that $f_{1}(u_{k})\geq
f_{1}^{\rm min}>0$ and
$\displaystyle\int_{\\{v_{k}^{\rm conc}\neq 0\\}}|f_{2}^{\ast\ast}(v_{k}^{\rm
osc}+v_{k}^{\rm conc})-f_{2}^{\ast\ast}(v_{k}^{\rm conc})|\,dx\leq
C\int_{\\{v_{k}^{\rm conc}\neq 0\\}}|v_{k}^{\rm
osc}|\,dx\underset{k\to\infty}{\longrightarrow}0,$
because convex functions with linear growth are Lipschitz continuous; see [16,
Prop. 2.32], for instance. The inequality in the second line of (3.7)
(actually an equality, as a matter of fact) is essentially due (2.7) and the
fact that $(v_{k}^{\rm conc})$ is purely concentrating. More precisely, we
exploit that
$\alpha_{t}:=\inf_{|y|=1}\frac{f_{2}^{\ast\ast}(ty)}{t(f_{2}^{\ast\ast})^{\infty}(y)}\underset{t\to+\infty}{\longrightarrow}1$
by (2.7) and
$\Big{|}\int_{\\{|v_{k}^{\rm conc}|\leq
t\\}}(f_{2}^{\ast\ast})^{\infty}\big{(}v_{k}^{\rm
conc}\big{)}\,dx\Big{|}\leq(1+K)t~{}{\mathcal{L}}^{n}(\\{v_{k}^{\rm conc}\neq
0\\})\underset{k\to\infty}{\longrightarrow}0\quad\text{for every $t>0$}$
(using $(H_{2})$, $(f_{2}^{\ast\ast})^{\infty}(0)=0$ and the fact that
${\mathcal{L}}^{n}(\\{v_{k}^{\rm conc}\neq 0\\})\to 0$ by Lemma 2.2), whence
$\displaystyle\liminf_{k}\int_{\\{v_{k}^{\rm conc}\neq
0\\}}f_{2}^{\ast\ast}(v_{k}^{\rm conc})\,dx$
$\displaystyle\geq\lim_{t\to+\infty}\liminf_{k}\int_{\\{|v_{k}^{\rm
conc}|>t\\}}\alpha_{t}~{}(f_{2}^{\ast\ast})^{\infty}(v_{k}^{\rm conc})\,dx$
$\displaystyle=\liminf_{k}\int_{\Omega}(f_{2}^{\ast\ast})^{\infty}(v_{k}^{\rm
conc})\,dx.$
Finally, in the last line of (3.7), we applied the weak∗-lower semicontinuity
of convex integral functionals on measures (see, e.g., [19, Theorem 5.27]).
Combining (3.5), (3.6) and (3.7), we conclude that
(3.8) $\displaystyle\begin{aligned}
&\liminf_{k}\int_{\Omega}f_{1}(u_{k})f_{2}(v_{k})\,dx\\\
&\qquad\begin{aligned} &\geq\begin{aligned}
\int_{\Omega}f_{1}(u)f_{2}^{\ast\ast}(v_{\rm
osc})\,dx&+\int_{\Omega}f_{1}^{\rm min}\,(f_{2}^{\ast\ast})^{\infty}(v_{\rm
conc}^{a})\,dx\\\ &+\int_{\bar{\Omega}}f_{1}^{\rm
min}\,(f_{2}^{\ast\ast})^{\infty}\Big{(}\frac{dv_{\rm conc}^{s}}{d|v_{\rm
conc}^{s}|}\Big{)}\,d|v_{\rm conc}^{s}|(x)\end{aligned}\\\
&\geq\begin{aligned} \int_{\Omega}g(u,v^{a})\,dx+\int_{\bar{\Omega}}f_{1}^{\rm
min}\,(f_{2}^{\ast\ast})^{\infty}\Big{(}\frac{dv_{\rm conc}^{s}}{d|v_{\rm
conc}^{s}|}\Big{)}\,d|v_{\rm
conc}^{s}|(x),\end{aligned}\end{aligned}\end{aligned}$
because at each $x$, $b_{1}:=v_{\rm osc}(x)$ and $b_{2}:=v_{\rm conc}^{a}(x)$
are admissible for the minimization in (1.5), the definition of $g$, where
$b:=v^{a}(x)=v_{\rm osc}(x)+v_{\rm conc}^{a}(x)$ for ${\mathcal{L}}^{n}$-a.e.
$x$. ∎
### 3.2. Upper bound
By Proposition 2.6 and Proposition 2.7, we may assume that $f_{2}$ is convex
and $W$ is quasiconvex. We must show that the opposite inequality to (3.1)
holds.
The proof will be divided into two steps. First, we assume that $v\in
L^{1}(\Omega;\mathbb{R}^{d})$, and the general case
$v\in\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$ will be considered
afterward.
First Step: Let $u\in BV(\Omega;\mathbb{R}^{m})$ and $v\in
L^{1}(\Omega;\mathbb{R}^{d})$. Fix $\eta>0$ and choose, for $\mathcal{L}^{n}$
a.e. $x\in\Omega$, a decomposition of $v$ into two functions
(3.9) $\displaystyle v(x)=v_{\rm osc}^{\eta}(x)+v_{\rm conc}^{\eta}(x)$
almost optimal for the definition of $g$, i.e., such that
(3.10) $g(u(x),v(x))+\eta\geq f_{1}(u(x))f_{2}(v^{\eta}_{\rm
osc}(x))+f_{1}^{\rm min}f_{2}^{\infty}(v^{\eta}_{\rm conc}(x)).$
Here, notice that for each $x$, the set of admissible choices for
$v^{\eta}_{\rm osc}(x)$ (thus fixing $v^{\eta}_{\rm conc}(x)=v(x)-v_{\rm
osc}^{\eta}(x)$) is always non-empty (as $\eta>0$) and open (by continuity of
$f_{2}$ and $f_{2}^{\infty}$). In addition, $u$ and $v$ are measurable and $g$
and $f_{1}$ are continuous. As a consequence, it is possible to choose
$v^{\eta}_{\rm osc}$ as a measurable function (cf. [22, Lemma 3.10], e.g.). By
the coercivity of $f_{2}$ assumed in $(H_{2})$, (3.10) then implies that
$v^{\eta}_{\rm osc},v^{\eta}_{\rm conc}\in L^{1}(\Omega;{\mathbb{R}}^{d})$.
By Lemma 2.4, we can find a sequence of functions $(v^{\eta,\varepsilon}_{\rm
conc})_{\varepsilon}\subset L^{1}(\Omega;\mathbb{R}^{d})$ such that
(3.11) $\displaystyle v^{\eta,\varepsilon}_{\rm conc}\underset{\varepsilon\to
0}{\longrightarrow}v^{\eta}_{\rm conc}\quad\text{strictly (and therefore also
weakly${}^{*}$) in $\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$},$
as well as $v^{\eta,\varepsilon}_{\rm conc}\to 0$ in measure.
Let $\delta>0$ and choose $u_{\rm min}^{\delta}\in\mathbb{R}^{m}$ such that
(3.12) $f_{1}^{\rm min}\leq f_{1}(u^{\delta}_{\rm min})\leq f_{1}^{\rm
min}+\delta,$
where $f_{1}^{\rm min}=\inf f_{1}$ as defined in (1.6). In the following, we
will modify $u$ near the (small) sets where $v^{\eta,\varepsilon}_{\rm
conc}\neq 0$, there replacing its value by $u^{\delta}_{\rm min}$. For that
purpose, we use that in dimension $n\geq 2$, there exists a function
$\varphi\in C^{\infty}(\overline{B_{1}}(0)\setminus\\{0\\})\cap
W^{1,1}_{0}(B_{1}(0))\quad\text{such that $\varphi(y)\to+\infty$ as $y\to
0$,}$
for instance, $\varphi(y)=\log(1-\log|y|)$. For $s>0$, let
$\varphi_{s}(y):=\left\\{\begin{array}[]{ll}0&\hbox{ if
}\varphi(y)\leq\frac{1}{s},\\\ s\varphi(y)-1&\hbox{ if
}\frac{1}{s}<\varphi(y)<\frac{2}{s},\\\ 1&\hbox{ if
}\varphi(y)\geq\frac{2}{s}.\end{array}\right.$
Notice that $0\leq\varphi_{s}\leq 1$, and the support of $\varphi_{s}$ shrinks
to $0$ as $s\to 0$, since $\varphi(x)\to+\infty$ as $x\to 0$. In particular,
$\|\nabla\varphi_{s}\|_{L^{1}}\to 0$ as $s\to 0$. We define
(3.13)
$\tilde{u}_{\varepsilon,\delta}(x):=(1-h_{\varepsilon}(x))u^{[1/\delta]}(x)+h_{\varepsilon}(x)u_{\rm
min}^{\delta},$
where $u^{[1/\delta]}$ is the component-wise truncation of $u$ on the level
$1/\delta$, i.e., for $u=(u^{(1)},\ldots,u^{(m)})$,
$u^{[1/\delta]}=(u^{[1/\delta],(1)},\ldots,u^{[1/\delta],(m)})$ is defined as
$u^{[1/\delta],(i)}(x):=\left\\{\begin{array}[]{ll}u^{(i)}(x)&\text{if}~{}~{}|u^{(i)}(x)|\leq\frac{1}{\delta},\\\
\frac{1}{\delta}\frac{u^{(i)}(x)}{|u^{(i)}(x)|}&\text{if}~{}~{}|u^{(i)}(x)|>\frac{1}{\delta},\end{array}\right.\qquad
i=1,\ldots,m,$
and, with some $s(\varepsilon)>0$ and
$(x^{\varepsilon}_{j})_{j,\varepsilon}\subset\Omega$,
$J(1/\varepsilon)\in{\mathbb{N}}$ and $r(\varepsilon)$ given by Lemma 2.4 when
we applied it to get (3.11),
(3.14) $\displaystyle h_{\varepsilon}(x):=\sum_{1\leq j\leq
J(1/\varepsilon)}\varphi_{s(\varepsilon)}(x-x^{\varepsilon}_{j}).$
Here, we choose $s(\varepsilon)>0$ such that $s(\varepsilon)\to 0$ as
$\varepsilon\to 0$, but still slow enough so that $\varphi(y)\geq
2/s(\varepsilon)$ for all $|y|\leq r(\varepsilon)$, whence
(3.15) $\displaystyle\varphi_{s(\varepsilon)}(y)=1\quad\text{for all $|y|\leq
r(\varepsilon)$}$
by construction of $\varphi_{s}$. For $\varepsilon>0$ small enough,
$h_{\varepsilon}$ has support contained in a union of disjoint balls centered
at $x^{\varepsilon}_{j}$ with vanishing radii (as $\varepsilon\to 0$).
Moreover, $0\leq h_{\varepsilon}(x)\leq 1$ and $\|\nabla
h_{\varepsilon}\|_{L^{1}}\to 0$. Consequently, for fixed $\delta$, we get that
$\displaystyle\lim_{\varepsilon\to
0}\|\tilde{u}_{\varepsilon,\delta}-u^{[1/\delta]}\|_{L^{1}(\Omega)}=0\quad\text{and}\quad\lim_{\varepsilon\to
0}\int_{\Omega}dQW(D\tilde{u}_{\varepsilon,\delta})(x)=\int_{\Omega}dQW(Du^{[1/\delta]})(x).$
Since $u^{[1/\delta]}\to u$ in $L^{1}$ and
$\int_{\Omega}dQW(Du^{[1/\delta]})\to\int_{\Omega}dQW(Du)$ by dominated
convergence, we can choose a diagonal subsequence
$u_{\varepsilon}:=\tilde{u}_{\varepsilon,\delta(\varepsilon)}$ with
$\delta(\varepsilon)\to 0$ slow enough so that
(3.16) $\displaystyle\lim_{\varepsilon\to
0}\|u_{\varepsilon}-u\|_{L^{1}(\Omega)}=0\quad\text{and}\quad\lim_{\varepsilon\to
0}\int_{\Omega}dQW(Du_{\varepsilon})(x)=\int_{\Omega}dQW(Du)(x).$
On the other hand, in view of (3.9) and (3.11), it is clear that
$v^{\eta,\varepsilon}:=v^{\eta}_{\rm osc}+v^{\eta,\varepsilon}_{\rm conc}$
converges to $v$ weakly* in $\mathcal{M}(\Omega;\mathbb{R}^{d})$ if
$\varepsilon\to 0$. Thus,
$\displaystyle\begin{aligned}
\overline{\mathcal{F}}(u,v,\overline{\Omega})&\leq\liminf_{\varepsilon\to
0}\mathcal{F}(u_{\varepsilon},v^{\eta,\varepsilon},\Omega)\\\
&=\liminf_{\varepsilon\to
0}\left(\int_{\Omega}dQW(Du_{\varepsilon})(x)+\int_{\Omega}f_{1}(u_{\varepsilon})f_{2}^{\ast\ast}(v^{\eta,\varepsilon})dx\right)\end{aligned}$
Concerning the right hand side, recalling (3.16), it is sufficient to focus on
the last integral of the above inequality, for which we have that
(3.17) $\displaystyle\begin{aligned} &\liminf_{\varepsilon\to
0}\int_{\Omega}f_{1}(u_{\varepsilon})f_{2}^{\ast\ast}(v^{\eta,\varepsilon})dx\\\
&\quad\leq\liminf_{\varepsilon\to
0}\left(\int_{\Omega}f_{1}(u_{\varepsilon})f_{2}^{\ast\ast}(v^{\eta}_{\rm
osc})dx+\int_{\Omega}f_{1}(u_{\varepsilon})(f_{2}^{\ast\ast})^{\infty}(v^{\eta,\varepsilon}_{\rm
conc})dx\right)\end{aligned}$
where it has been exploited that (see [19, formula (4.33), with $t=1$]),
$f_{2}^{\ast\ast}(y+z)\leq
f_{2}^{\ast\ast}(y)+(f_{2}^{\ast\ast})^{\infty}(z),\hbox{ for every
}y,z\in\mathbb{R}^{d}.$
By construction of $u_{\varepsilon}$ and $v^{\eta,\varepsilon}_{\rm conc}$, in
particular (3.14) and (3.15), $u_{\varepsilon}\equiv u_{\rm
min}^{\delta(\varepsilon)}$ on the support of $v^{\eta,\varepsilon}_{\rm
conc}$. Since $f_{1}(u_{\rm min}^{\delta(\varepsilon)})\to f_{1}^{\rm min}$ as
$\varepsilon\to 0$, we can replace $f_{1}(u_{\varepsilon})$ by $f_{1}^{\rm
min}$ in the second integral on the right hand side of (3.17). This yields
(3.18) $\displaystyle\begin{aligned} &\liminf_{\varepsilon\to
0}\int_{\Omega}f_{1}(u_{\varepsilon})f_{2}^{\ast\ast}(v^{\eta,\varepsilon})dx\\\
&\quad\leq\liminf_{\varepsilon\to
0}\left(\int_{\Omega}f_{1}(u_{\varepsilon})f_{2}^{\ast\ast}(v^{\eta}_{osc})dx+\int_{\Omega}f_{1}^{\rm
min}(f_{2}^{\ast\ast})^{\infty}\left(v^{\eta,\varepsilon}_{\rm
conc}\right)dx\right)\\\
&\quad\leq\int_{\Omega}f_{1}(u)f_{2}^{\ast\ast}(v^{\eta}_{\rm
osc})dx+\int_{\Omega}f_{1}^{\rm min}(f_{2}^{\ast\ast})^{\infty}(v^{\eta}_{\rm
conc})dx\end{aligned}$
where, in the first limit, we have used the Dominated Convergence Theorem
together with bounds, and in the second we used Reshetnyak’s continuity
theorem (see [5, Theorem 2.39], e.g.), exploiting the strict convergence of
$v^{\eta,\varepsilon}_{\rm conc}$ to $v^{\eta}_{\rm conc}$ obtained from Lemma
2.4.
Hence, together with (3.16), (3.18) gives that
$\displaystyle\overline{\mathcal{F}}(u,v)\leq\int_{\Omega}g(u,v)dx+\int_{\Omega}\mathcal{Q}W(\nabla
u)\,dx+\int_{\Omega}(\mathcal{Q}W)^{\infty}\left(\frac{dDu^{s}}{d|Du^{s}|}\right)\,d|Du^{s}|+\eta$
The arbitrariness of $\eta$ concludes the proof of this case.
Second step: Let $u\in BV(\Omega;\mathbb{R}^{m})$ and
$v\in{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$. To invoke the first
step, we use the approximation $I_{j}v$ of $v$ and some of its components by
functions in $L^{1}$ provided in Lemma 2.5.
The first step and the lower semicontinuity of $\overline{\mathcal{F}}$ ensure
that for every $u\in BV(\Omega;\mathbb{R}^{m})$ and
$v\in\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$
(3.19)
$\displaystyle\overline{\mathcal{F}}(u,v)\leq\liminf_{j}\int_{\Omega}g(u,I_{j}v)dx+\int_{\Omega}dQW(Du)dx.$
As before for (3.10), for any $\eta>0$, we can decompose the absolutely
continuous part of $v$ almost optimally for the infimum defining $g$ in (1.5),
i.e., $v^{a}=v_{\rm osc}^{a,\eta}+v_{\rm conc}^{a,\eta}$ so that
(3.20) $g(u(x),v^{a}(x))+\eta\geq f_{1}(u(x))f_{2}(v^{a,\eta}_{\rm
osc}(x))+f_{1}^{\rm min}f_{2}^{\infty}(v^{a,\eta}_{\rm conc}(x))\quad\text{for
a.e.~{}$x\in\Omega$}.$
The first summand in (3.19) can be estimated as follows.
(3.21) $\displaystyle\begin{aligned}
&\liminf_{j}\int_{\Omega}g(u,I_{j}v)\,dx\\\
&\leq\liminf_{j}\int_{\Omega}f_{1}(u)f_{2}^{\ast\ast}(I_{j}v_{\rm
osc}^{a,\eta})+f_{1}^{\rm min}(f_{2}^{\ast\ast})^{\infty}(I_{j}[v_{\rm
conc}^{a,\eta}+v^{s}])\,dx\\\ &=\int_{\Omega}f_{1}(u)f_{2}^{\ast\ast}(v_{\rm
osc}^{a,\eta})dx+\int_{\overline{\Omega}}f_{1}^{\rm
min}(f_{2}^{\ast\ast})^{\infty}(v^{a,\eta}_{\rm conc})dx+f_{1}^{\rm
min}(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)d|v^{s}|\\\
&=\int_{\Omega}\left(f_{1}(u)f_{2}^{\ast\ast}(v^{a,\eta}_{\rm osc})+f_{1}^{\rm
min}(f_{2}^{\ast\ast})^{\infty}(v^{a,\eta}_{\rm
conc})\right)dx+\int_{\overline{\Omega}}f_{1}^{\rm
min}(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)d|v^{s}|\\\
&\leq\int_{\Omega}g(u,v^{a})dx+\int_{\overline{\Omega}}f_{1}^{\rm
min}(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)d|v^{s}|+\eta.\end{aligned}$
Here, for the first inequality, we used the definition of $g$ (1.5). To pass
to the limit as $j\to\infty$ in the second line of (3.21), Lebesgue’s
dominated convergence theorem has been used for the first term (since
$I_{j}v^{a}_{1}\to v_{1}^{a}$ in $L^{1}$ and $f_{1}$ is bounded), and
Reshetnyak’s continuity theorem ([5, Theorem 2.39], e.g.) for the other
(exploiting strict convergence and positive $1$-homogeneity of
$(f_{2}^{\ast\ast})^{\infty}$). The limit of the latter then splits because
$v^{a}_{\rm conc}$ and $v^{s}$ are orthogonal measures. The last inequality in
(3.21) is due to (3.20).
Finally, combining (3.19) and (3.21) gives
$\overline{\mathcal{F}}(u,v)\leq\int_{\Omega}g(u,v^{a})dx+\int_{\overline{\Omega}}f_{1}^{\rm
min}(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)d|v^{s}|+\int
dQW(Du)(x)+\eta.$
As $\eta>0$ was arbitrary, this concludes the proof.
###### Remark 3.1.
It is easily seen that an entirely analogous proof allows us to replace the
energy density $W$ above by a function
$f:\overline{\Omega}\times\mathbb{R}^{m}\times\mathbb{R}^{m\times
n}\to\mathbb{R}$ satisfying the assumptions in [32, Theorem A], thus leading
to the following representation
$\displaystyle\overline{\mathcal{F}}(u,v)=$
$\displaystyle\int_{\overline{\Omega}}f_{1}^{\rm
min}(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv}{d|v^{s}|}\right)d|v^{s}|+\int_{\Omega}g\left(u,\frac{dv^{a}}{d\mathcal{L}^{N}}\right)dx$
$\displaystyle+\int_{\Omega}f(x,u,\nabla
u)dx+\int_{\Omega}K_{f}(x,u^{+}(x),u^{-}(x),\nu_{u}(x))d\mathcal{H}^{n-1}$
$\displaystyle+\int_{\Omega}f^{\infty}\left(x,u(x),\frac{dDu^{c}}{d|Du^{c}|}\right)d|Du^{c}|,$
with the functions, $K_{f}$ and $f^{\infty}$ defined by [32, page 2] and [32,
Definition 2.8], respectively. We emphasize the same type of result could be
obtained under the more stringent assumptions provided by [24].
###### Remark 3.2 (Properties of $g$).
1. (i)
According to the terminology of [9], for fixed $a$, $g(a,\cdot)$ is the
_infimal convolution_ of $f_{1}(a)f_{2}^{\ast\ast}$ and $f_{1}^{\rm
min}\,(f_{2}^{\ast\ast})^{\infty}$.
2. (ii)
The function $g(a,\cdot)$ is convex, as it is obtained by “projecting” a
convex function defined on ${\mathbb{R}}^{2d}$ to one on ${\mathbb{R}}^{d}$ by
minimizing out the other directions along a fixed linear subspace:
$(b_{1},b_{2})\mapsto f_{1}(a)f_{2}^{\ast\ast}(b_{1})+f_{1}^{\rm
min}\,(f_{2}^{\ast\ast})^{\infty}(b_{2})$ is convex as the sum of convex
functions, and $g(b)$ is its minimal value on the hypersurface $b+H$, with the
fixed $d$-dimensional linear subspace
$H:=\\{(b_{1},b_{2})\in{\mathbb{R}}^{2d}\mid
b_{1}+b_{2}=0\\}\subset{\mathbb{R}}^{2d}$.
3. (iii)
If $f_{1}(a)=f_{1}^{\rm min}$, the choice $b_{1}=b$ (and thus $b_{2}=0$) is
optimal for the minimization in the definition of $g$, because the expression
to be minimized in (1.5) then can be interpreted as (the limit of) a convex
combination:
$\displaystyle\begin{aligned}
&f_{2}^{\ast\ast}(b_{1})+(f_{2}^{\ast\ast})^{\infty}(b_{2})=\lim_{\sigma\to
0^{+}}(1-\sigma)f_{2}^{\ast\ast}(b_{1})+\sigma(f_{2}^{\ast\ast})^{\infty}\Big{(}\frac{b_{2}}{\sigma}\Big{)}\\\
&\quad=\lim_{\sigma\to 0^{+}}(1-\sigma)f_{2}^{\ast\ast}(b_{1})+\sigma
f_{2}^{\ast\ast}\Big{(}\frac{b_{2}}{\sigma}\Big{)}\\\
&\quad\geq\lim_{\sigma\to
0^{+}}f_{2}^{\ast\ast}\Big{(}(1-\sigma)b_{1}+\sigma\frac{b_{2}}{\sigma}\Big{)}=f_{2}^{\ast\ast}(b_{1}+b_{2})\end{aligned}$
(see also [9, p. 685]). Conversely, if $b_{1}=b$ is optimal, then
$g(a,b)=f_{1}(a)f_{2}^{\ast\ast}(b)\leq f_{1}^{\rm
min}(f_{2}^{\ast\ast})^{\infty}(b)$, the latter term being the competitor for
the choice $b_{2}=b$. Since $(f_{2}^{\ast\ast})^{\infty}(b)$ approximates
$f_{2}^{\ast\ast}(b)$ for large $|b|$, this is impossible for large $|b|$
whenever $f_{1}^{\rm min}<f_{1}(a)$.
###### Example 3.3.
Consider the functional
$\mathcal{F}(u,v)=\int_{\Omega}(W(\nabla u)+f_{1}(u)f_{2}(v))\,dx$
subject to the constraints
$\int_{\Omega}u\,dx=|\Omega|,\quad\int_{\bar{\Omega}}v\,dx=1,$
with integrands given by
$W(\nabla u):=(|\nabla u|^{2}+1)^{\frac{1}{2}},\quad
f_{1}(u):=2-\exp(-u^{2}),\quad\text{and}\quad f_{2}(v):=|v|.$
Notice that $W$ and $f_{2}$ are convex, $W^{\infty}=|\cdot|$,
$f_{2}=f_{2}^{\infty}=|\cdot|$, $f_{1}^{\rm min}=f_{1}(0)=1\leq f_{1}\leq 2$
and
(3.22) $\displaystyle
g(a,b)=\min_{b_{1}+b_{2}=b}\Big{(}f_{1}(a)|b_{1}|+f_{1}^{\rm
min}\,|b_{2}|\Big{)}=|b|.$
In this class, the associated functional ${\mathcal{F}}$ is coercive in
$W^{1,1}(\Omega)\times L^{1}(\Omega)$. The associated relaxed functional is
$\displaystyle\overline{\mathcal{F}}(u,v)=\int_{\Omega}W(\nabla
u)\,dx+\int_{\Omega}d|D^{s}u|+|v|(\bar{\Omega}),\quad(u,v)\in
BV(\Omega)\times\mathcal{M}(\bar{\Omega}),$
subject to the appropriately extended constraint
(3.23) $\displaystyle\int_{\Omega}u\,dx=|\Omega|,\quad v(\bar{\Omega})=1.$
Notice that $u$ and $v$ are fully decoupled in $\overline{\mathcal{F}}$, while
$\mathcal{F}$ clearly had coupling in the second term. In addition,
$\inf\big{\\{}\overline{\mathcal{F}}(u,v)\,\mid\,u\in
BV(\Omega),~{}v\in\mathcal{M}(\bar{\Omega}),~{}\text{\eqref{ex:constraints}
holds}\big{\\}}=1=\overline{\mathcal{F}}(u^{*},v^{*}),$
where the minimizers are fully characterized by
$\displaystyle u^{*}=1,\quad v^{*}\geq 0,\quad v^{*}(\bar{\Omega})=1.$
In particular, purely singular measures, for example $v^{*}=\delta_{x_{0}}$
with some $x_{0}\in\bar{\Omega}$, appear among the minimizers.
###### Remark 3.4 (Concentration can be forced for minimizing sequences).
In Example 3.3, for all limit states $(u,v)\in BV\times{\mathcal{M}}$ with
$u(x)\neq 0$ for a.e. $x\in\Omega$ (in particular, for $u=u^{*}=1$), each
associated recovery sequence $v_{k}$ is purely concentrating in the sense that
$v_{k}\to 0$ in measure, while simultaneously $\int_{\Omega}v_{k}(x)\,dx\to
v(\bar{\Omega})=1$. This holds for _all_ recovery sequences $(u_{k},v_{k})$
associated to $(u,v)$ with $u\neq 0$ a.e., even if $v$ is absolutely
continuous with respect to ${\mathcal{L}}^{n}$. In particular, we can choose
$(u,v)=(u^{*},v^{*})$ for an arbitrary minimizer, and therefore $v_{k}$ is
purely concentrating for all minimizing sequences of the original functional
${\mathcal{F}}$.
To prove this concentration effect, we briefly revisit the proof of the lower
bound in Theorem 1.1 where now all estimates have to hold with equality. Let
$(u_{k},v_{k})\in W^{1,1}(\Omega)\times L^{1}(\Omega)$ be a recovery sequence,
i.e., such that $(u_{k},v_{k})\rightharpoonup^{*}(u,v)$ in
$BV(\Omega)\times{\mathcal{M}}(\bar{\Omega})$ and
$\lim_{k}\mathcal{F}(u_{k},v_{k})=\overline{\mathcal{F}}(u,v)$, and recall
that we decomposed $v_{k}=v_{k}^{\rm osc}+v_{k}^{\rm conc}$ into a purely
oscillating (equiintegrable) part and a purely concentrating part, $v_{k}^{\rm
osc}\rightharpoonup v_{\rm osc}$ in $L^{1}$ and $v_{k}^{\rm
conc}\rightharpoonup^{*}v_{\rm conc}$ in ${\mathcal{M}}$, respectively. As
long as $a\neq 0$ and thus $f_{1}(a)>f_{1}^{\rm min}$, the minimum in the
definition of $g(a,b)$ (3.22) is attained if and only if $b_{1}=0$ and
$b_{2}=b$. As $u(x)\neq 0$ for a.e. $x\in\Omega$, the final estimate (3.8)
thus holds with equality if and only if
$v_{\rm osc}(x)=0$ for a.e. $x$.
In addition, the lower semicontinuity inequality of Ioffe’s Theorem
(essentially) used in (3.6) holds with equality, namely,
$\lim_{k}\int_{\Omega}f_{1}(u)|v_{k}^{\rm
osc}|\,dx=\int_{\Omega}f_{1}(u)|v_{\rm osc}|\,dx.$
Since $f_{1}\geq 1$, this implies that $v_{k}^{\rm osc}\to 0=v_{\rm osc}$
strongly in $L^{1}$. Hence, $v_{k}=v_{k}^{\rm osc}+v_{k}^{\rm conc}$ is purely
concentrating as claimed.
###### Remark 3.5.
In Example 3.3, if we replace $f_{1}$ by
$\tilde{f}_{1}(x,u):=(x-x_{0})^{2}+2-\exp(-u^{2}),\quad\text{with a fixed
$x_{0}\in\bar{\Omega}$},$
(adding $(x-x_{0})^{2}$ to the original $f_{1}$ – a situation not covered by
our theorems, but it is easy to see they extend to this case),
$(u^{*},\delta_{x_{0}})$ is still a minimizer with the same minimal energy,
with $u^{*}$ as defined the example and the Dirac mass $\delta_{x_{0}}$ at
$x_{0}$. However, the minimizer is now unique, as it is clearly optimal to
concentrate all the mass of $v$ at $x=x_{0}$ where $\tilde{f}_{1}^{\rm
min}(x)=(x-x_{0})^{2}+1$ is minimal.
###### Remark 3.6 (Relaxation by means of parametrized measures).
Alternatively, one can extend the functional $\mathcal{F}$ in (1.2) by
continuity to a set of generalized Young measures and to define the relaxation
by measures in this set or to use them just as a tool to derive relaxation in
$BV$. We refer to [8] for such approach or to [27] where generalized Young
measures allowing for treatment of oscillations, concentrations, and
discontinuities were developed. This would allow us to give a different proof
of Theorem 1.1. Nevertheless, the requirement that the recovery sequence
$(\tilde{u}_{k})_{k}$ can be first chosen to provide the correct limit for
$(\int_{\Omega}W(\nabla\tilde{u}_{k}(x))\,{\rm d}x)_{k}$ as in [24] which is
then carefully modified to recover also the other term in the functional is
essential and cannot be currently avoided.
## 4\. The 1D case: Proof of Theorem 1.2
The measure representation obtained in Proposition 2.8 for
$\overline{\mathcal{F}}(u,v,\cdot)$ in (2.13), leads us to provide an integral
representation for this functional in any dimension. In the case
$\Omega\subset\mathbb{R}$, the proof, achieved by showing a double inequality,
will make use of the blow-up method introduced in [23], taking into account
the specific structure of any Radon measure defined on subsets of
$\mathbb{R}$.
In the one-dimensional case, it turns out that two cases have to be
distinguished: the zero-dimensional contribution where the limiting measure
charges individual points, and the ”diffuse” rest. Here, notice that for any
finite measure $\nu$ on a set $I$, we can split
$\nu=\nu^{0}+\nu^{\rm diff},$
where $\nu^{0}$ is the zero-dimensional part of $\nu$ charging points, i.e.,
(4.1)
$\displaystyle\nu^{0}:=\nu\lfloor_{S^{0}},\quad\text{where}~{}~{}S^{0}=S^{0}(\nu):=\big{\\{}x\in
I\,:\,|\nu|(\\{x\\})>0\big{\\}}.$
In particular, $\nu^{0}(\\{x_{0}\\})=\nu(\\{x_{0}\\})$ for all $x_{0}\in I$
(and zero for all but countably many), $|\nu^{0}|=|\nu|^{0}$ and $|\nu|^{\rm
diff}=|\nu^{\rm diff}|$. Also recall that for a $BV$-function $u$ defined on
an interval $I$,
$\displaystyle
Du=u^{\prime}\mathcal{L}^{1}+Du^{j}+Du^{c}=u^{\prime}\mathcal{L}^{1}+[u]\mathcal{H}^{0}\lfloor{S_{u}}+Du^{c},$
where for $\mathcal{H}^{0}$-a.e. $x\in S_{u}$ (the jump set of $u$),
$[u](x):=u(x^{+})-u(x^{-})$, with $u(x^{\pm}):=\lim_{y\to x^{\pm}}u(y)$.
Accordingly, $Du^{j}=(Du)^{0}$ and $Du^{\rm
diff}=u^{\prime}\mathcal{L}^{1}+Du^{c}$.
The proof is based on the blow-up method. Let $u\in
BV(\Omega;{\mathbb{R}}^{m})$,
$v\in\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$, and let
$\overline{{\mathcal{F}}}_{u,v}$ denote the signed Radon measure on
$\bar{\Omega}$ given by Lemma 2.8, uniquely extending the set function
$\overline{{\mathcal{F}}}(u,v,\cdot)$ introduced in (2.12), (2.13), i.e.,
$\displaystyle\overline{{\mathcal{F}}}_{u,v}(A)=\overline{{\mathcal{F}}}(u,v,A)=\Gamma-\liminf{\mathcal{F}}(u,v,A)\quad\text{for
all $A\subset\overline{\Omega}$ relatively open}.$
In view of Lemma 2.8, it is enough to rephrase and prove our claim (1.7) in
terms of appropriate localized statements for appropriate densities of
$\overline{{\mathcal{F}}}_{u,v}$.
With the abbreviation (and the implicit convention $|Du|(\partial\Omega)=0$)
$\displaystyle\theta:={\mathcal{L}}^{1}+|v|+|Du|,\quad\theta\in\mathcal{M}(\bar{\Omega}),$
we claim that
(4.2) $\displaystyle\frac{d\overline{{\mathcal{F}}}_{u,v}^{\rm
diff}}{d\theta^{\rm
diff}}(x_{0})=f_{1}(u(x_{0}))\frac{df_{2}^{\ast\ast}\big{(}v^{\rm
diff}\big{)}}{d\theta^{\rm diff}}(x_{0})+\frac{dW^{\ast\ast}\big{(}(Du)^{\rm
diff}\big{)}}{d\theta^{\rm diff}}(x_{0})$ for $\theta^{\rm diff}$-a.e.
$x_{0}\in\Omega$, (4.3)
$\displaystyle\overline{{\mathcal{F}}}_{u,v}^{0}(\\{x_{0}\\})=f_{W}^{0}(u(x_{0}^{+}),u(x_{0}^{-}),v^{0}(\\{x_{0}\\}))$
$\displaystyle\quad\text{for every }x_{0}\in\Omega,$
$\displaystyle\overline{{\mathcal{F}}}_{u,v}^{0}(\\{x_{0}\\})=\Big{(}\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}(u(x_{0}^{+}),z,v^{0}(\\{x_{0}\\})\Big{)}$
$\displaystyle\quad\text{for }x_{0}=\inf\Omega,$
$\displaystyle\overline{{\mathcal{F}}}_{u,v}^{0}(\\{x_{0}\\})=\Big{(}\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}(z,u(x_{0}^{-}),v^{0}(\\{x_{0}\\})\Big{)}$
$\displaystyle\quad\text{for }x_{0}=\sup\Omega.$
Here, $f_{2}^{\ast\ast}\big{(}v^{\rm diff}\big{)}$ and
$W^{\ast\ast}\big{(}(Du)^{\rm diff}\big{)}$ are the measures defined in
Subsection 2.4, and
$f_{W}^{0}:{\mathbb{R}}^{m}\times{\mathbb{R}}^{m}\times{\mathbb{R}}^{d}\to{\mathbb{R}}$
is given by (1.12). As to (4.2), also notice that for $\sigma^{\rm diff}$-a.e.
$x_{0}$, $x_{0}$ is not a jump point of $u$, and thus
$u(x_{0}):=u(x_{0}^{+})=u(x_{0}^{-})$ is well defined.
###### Remark 4.1.
It is easy to check that
$f_{W}^{0}(u(x^{+}),u(x^{-}),0)=(W^{\ast\ast})^{\infty}([u](x))\quad\text{with
$[u](x):=u(x^{+})-u(x^{-})$},$
i.e., the typical energy contribution of a jump of $u$ at $x$ if $v$ does not
play any role. Moreover, if $a^{+}=a^{-}=:a$ and $b=0$, then
$f_{W}^{0}(a,a,0)=0$, with $u\equiv a$ and $v=0$ as the obvious optimal
choices for the infimum. For that reason, (4.3) is trivially correct for all
points $x_{0}$ with $\theta^{0}(\\{x_{0}\\})=0$, and it provides nontrivial
information only for points with $\theta^{0}(\\{x_{0}\\})>0$. The latter
includes the jump points of $u$, but the most interesting case is in fact
$b:=v(\\{x_{0}\\})\neq 0$. In particular, it can happen that
$f_{W}^{0}(a,a,b)<f_{1}(a)(f_{2}^{\ast\ast})^{\infty}(b)$ if reducing the
energy by locally creating an artificial peak in $u$ to reduce $f_{1}(u)$ at a
point charged by $v$ is cheaper than the cost for the corresponding slope of
$u$ paid in $(W^{\ast\ast})^{\infty}$. In any such case, associated recovery
sequences will not converge strictly in $BV$. In this aspect, the case $n=1$
is fundamentally different to the case $n\geq 2$, where our construction for
the upper bound in Subsection 3.2 effectively yields a strictly converging
recovery sequence for $u$.
### 4.1. Lower bound
Since $f_{2}\geq f_{2}^{\ast\ast}$ and $W\geq W^{\ast\ast}$, we can assume
that $f_{2}$ and $W$ are convex.
Let $(u_{k},v_{k})\in W^{1,1}(\Omega;{\mathbb{R}}^{m})\times
L^{1}(\Omega;{\mathbb{R}}^{d})$ such that $u_{k}\to u$ in
$L^{1}(\Omega;{\mathbb{R}}^{m})$ and $v_{k}\overset{\ast}{\rightharpoonup}v$
in $\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$ and assume, up to a (not
relabeled) subsequence, that the limit
$\lim_{k\rightarrow+\infty}\int_{\Omega}(f_{1}(u_{k})f_{2}(v_{k})+W(u_{k}^{\prime}))dx<+\infty$
exists. For every Borel set $B\subset\Omega$, define
(4.4)
$\displaystyle\mu_{k}(B)=\int_{B}(f_{1}(u_{k})f_{2}(v_{k})+W(u_{k}^{\prime}))dx.$
Since the functions are nonnegative and $(H_{1})-(H_{3})$ hold, the sequences
$(\mu_{k})$ and $(|v_{k}|+|Du_{k}|)$ of nonnegative Radon measures, being
uniformly bounded in $\mathcal{M}(\Omega)$, admit two (not relabeled)
subsequences weakly∗ converging to two nonnegative finite Radon measure $\mu$
and $\lambda$, i.e.
(4.5)
$\displaystyle\mu_{k}\overset{\ast}{\rightharpoonup}\mu\quad\text{and}\quad|v_{k}|+|Du_{k}|\overset{\ast}{\rightharpoonup}\lambda\quad\text{in
$\mathcal{M}(\bar{\Omega})$}.$
We decompose $\mu$ as the sum of two mutually singular measures as described
above, $\mu=\mu^{0}+\mu^{\rm diff}$, such that $|\mu^{0}|$ is the atomic part
concentrating on points and $\mu^{\rm diff}$ is the remaining diffuse part.
Notice that, as a consequence of the coercivity conditions in
$(H_{1})$–$(H_{3})$, $|v|+|Du|+{\mathcal{L}}^{1}<<\mu$ and
$|\mu|<<{\mathcal{L}}^{1}+\lambda$. On the other hand, Lemma 2.8, implies that
a density of $\mu^{\rm diff}$ can be computed as a Radon-Nykodim derivative
with respect to $\theta^{\rm diff}={\mathcal{L}}^{1}+|Du^{\rm diff}|+|v^{\rm
diff}|$, and, if $x_{0}$ is a jump point of $u$ (i.e. $|Du|(\\{x_{0}\\})>0$),
or $|v|(\\{x_{0}\\})>0$, then $x_{0}\in S^{0}(\mu)$, set of atomic
contributions defined in (4.1).
We now treat diffuse and atomic contributions in $\mu$ separately. Throughout,
we use the intervals
$I_{x_{0},\varepsilon}:=(x_{0}-\varepsilon,x_{0}+\varepsilon)\quad\text{and}\quad
I:=(-1,1)$
where $x_{0}\in\Omega$ and $\varepsilon>0$ is small enough so that
$I_{x_{0},\varepsilon}\subset\Omega$.
### Diffuse contributions
Let $x_{0}$ be a point with $0=\lambda(\\{x_{0}\\})$ such that the measures
$\mu$, $f_{2}(v)$ and $W(Du)$ have a finite density with respect to
$\theta^{\rm diff}$ at $x_{0}$, i.e,
$\frac{d\mu}{d\theta^{\rm diff}}(x_{0})=\lim_{\varepsilon\rightarrow
0}\frac{\mu(I_{x_{0},\varepsilon})}{\theta^{\rm
diff}(I_{x_{0},\varepsilon})}<+\infty,$ $\frac{df_{2}(v)}{d\theta^{\rm
diff}}(x_{0})=\lim_{\varepsilon\rightarrow
0}\frac{f_{2}(v)(I_{x_{0},\varepsilon})}{\theta^{\rm
diff}(I_{x_{0},\varepsilon})}<+\infty,\quad\text{and}\quad\frac{dW(Du)}{d\theta^{\rm
diff}}(x_{0})=\lim_{\varepsilon\rightarrow
0}\frac{W(Du)(I_{x_{0},\varepsilon})}{\theta^{\rm
diff}(I_{x_{0},\varepsilon})}<+\infty.$
In particular,
$0=|\mu|(\\{x_{0}\\})=|Du|(\\{x_{0}\\})=|v|(\\{x_{0}\\})=W(Du)(\\{x_{0}\\})=f_{2}(v)(\\{x_{0}\\})$,
$\frac{df_{2}(v)}{d\theta^{\rm diff}}(x_{0})=\frac{df_{2}(v^{\rm
diff})}{d\theta^{\rm diff}}(x_{0})$ and $\frac{dW(Du)}{d\theta^{\rm
diff}}(x_{0})=\frac{dW(Du^{\rm diff})}{d\theta^{\rm diff}}(x_{0})$. Notice
that these properties hold for $\theta^{\rm diff}$-a.e. $x_{0}\in\Omega$.
To shorten the notation when calculating densities with respect to
$\theta^{\rm diff}$, below, we will use the abbreviation
$\vartheta_{x_{0},\varepsilon}:=\theta^{\rm
diff}(I_{{x_{0}},\varepsilon})\geq{\mathcal{L}}^{1}(I_{{x_{0}},\varepsilon})=2\varepsilon.$
Take a sequence $\varepsilon\rightarrow 0^{+}$ such that
$\mu\left(\\{x_{0}-\varepsilon,x_{0}+\varepsilon\\}\right)=\lambda(\\{x_{0}-\varepsilon,x_{0}+\varepsilon\\})=0$.
Thus $\mu(\partial I_{x_{0},\varepsilon})=0$, and by definition of $\mu$ and a
changes of variables,
(4.6) $\displaystyle\begin{aligned} &\frac{d|\mu|}{d\theta^{\rm
diff}}(x_{0})=\lim_{\varepsilon\to
0}\frac{\mu(I_{x_{0},\varepsilon})}{\vartheta_{x_{0},\varepsilon}}\\\
&=\lim_{\varepsilon\to
0}\lim_{k\to+\infty}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{I_{x_{0},\varepsilon}}f_{1}(u_{k}(y))f_{2}(v_{k}(y))+W(u_{k}^{\prime}(y))\,dy\\\
&=\lim_{\varepsilon\rightarrow
0}\lim_{k\rightarrow+\infty}\int_{I_{0,\varepsilon\vartheta_{x_{0},\varepsilon}^{-1}}}f_{1}(u_{k}(x_{0})+\vartheta_{x_{0},\varepsilon}w_{k,\varepsilon}(x))f_{2}(\eta_{k,\varepsilon}(x))+W(w_{k,\varepsilon}^{\prime}(x))\,dx\end{aligned}$
where
$w_{k,\varepsilon}(x):=\frac{u_{k}(x_{0}+\vartheta_{x_{0},\varepsilon}x)-u_{k}(x_{0})}{\vartheta_{x_{0},\varepsilon}}\quad\text{and}\quad\eta_{k,\varepsilon}(x):=v_{k}(x_{0}+\vartheta_{x_{0},\varepsilon}x)$
Choosing a sequence $\hat{\varepsilon}(k)>0$ with $\hat{\varepsilon}(k)\to 0$
slow enough, we see that for every sequence $\varepsilon(k)\to 0^{+}$ with
$\varepsilon(k)\geq\hat{\varepsilon}(k)$,
(4.7) $\displaystyle\begin{aligned} \frac{d|\mu|}{d\theta^{\rm
diff}}(x_{0})&=\lim_{k\rightarrow+\infty}\int_{I_{0,\varepsilon(k)\vartheta_{x_{0},\varepsilon(k)}^{-1}}}f_{1}(u_{k}(x_{0})+\vartheta_{x_{0},\varepsilon(k)}w_{k,\varepsilon(k)})f_{2}(\eta_{k,\varepsilon(k)})+W(w_{k,\varepsilon(k)}^{\prime})\,dx\end{aligned}$
By coercivity of $W$ and the fact that $\frac{d|\mu|}{d\theta^{\rm
diff}}(x_{0})$ is finite, we infer that
$\int_{I_{0,\varepsilon(k)\vartheta_{x_{0},\varepsilon(k)}^{-1}}}|w_{k,\varepsilon(k)}^{\prime}|(x)\,dx$
is bounded, and since $w_{k,\varepsilon(k)}(0)=0$, this entails that
$w_{k,\varepsilon(k)}$ is bounded on
$I_{0,\varepsilon(k)\vartheta_{x_{0},\varepsilon(k)}^{-1}}$ by a constant
independent of $k$. Hence,
(4.8) $\displaystyle\vartheta_{x_{0},\varepsilon(k)}w_{k,\varepsilon(k)}(x)\to
0\quad\text{uniformly in $x\in
I_{0,\varepsilon(k)\vartheta_{x_{0},\varepsilon(k)}^{-1}}$}.$
In addition, we claim that
(4.9) $\displaystyle u_{k}(x_{0})\to u(x_{0}),$
essentially because $|Du|\leq w^{*}-\lim|Du_{k}|\leq\lambda$ and
$\lambda(\\{x_{0}\\})=0$. For a proof of (4.9), first recall that $u_{k}\to u$
in $L^{1}$, and thus pointwise a.e. for a subsequence. We can therefore choose
a sequence $x_{j}\to x_{0}$ with, say, $x_{j}\geq x_{0}$, such that
$u_{k}(x_{j})\to u(x_{j})\quad\text{as $k\to\infty$, for each $j$.}$
Since
$\displaystyle\begin{aligned}
|u_{k}(x_{0})-u(x_{0})|&\leq|u_{k}(x_{j})-u(x_{j})|+|u_{k}(x_{0})-u_{k}(x_{j})|+|u(x_{0})-u(x_{j})|\\\
&\leq|u_{k}(x_{j})-u(x_{j})|+(|Du_{k}|+|Du|)([x_{0},x_{j}]),\end{aligned}$
we obtain (4.9) passing to the limit, first as $k\to\infty$ and then as
$j\to\infty$:
$\displaystyle\begin{aligned}
\limsup_{k\to\infty}|u_{k}(x_{0})-u(x_{0})|&\leq(\lambda+|Du|)([x_{0},x_{j}])\leq
2\lambda([x_{0},x_{j}])\underset{j\to\infty}{\longrightarrow}2\lambda(\\{x_{0}\\})=0.\end{aligned}$
Combining (4.8) and (4.9) with the fact that $f_{1}$ is uniformly continuous
on bounded subsets of ${\mathbb{R}}^{m}$, we can replace the argument of
$f_{1}$ by $u(x_{0})$ in (4.7). Retracing our steps to (4.6), we conclude that
(4.10) $\displaystyle\begin{aligned} \frac{d|\mu|}{d\theta^{\rm
diff}}(x_{0})&\geq\liminf_{\varepsilon\to
0^{+}}\lim_{k\to+\infty}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{I_{x_{0},\varepsilon}}f_{1}(u(x_{0}))f_{2}(v_{k}(y))+W(u_{k}^{\prime}(y))\,dy.\end{aligned}$
On the right hand side of (4.10), for fixed $\varepsilon$, we can apply
standard lower semicontinuity results with respect to weak∗-convergence in
${\mathcal{M}}$ and $BV$, respectively, exploiting that $f_{2}$ and $W$ are
convex and that $|v|(\partial I_{x_{0},\varepsilon})=|Du|(\partial
I_{x_{0},\varepsilon})=0$ for all but at most countably many $\varepsilon$.
This yields that
(4.11) $\displaystyle\begin{aligned} \frac{d|\mu|}{d\theta^{\rm
diff}}(x_{0})&\geq\liminf_{\varepsilon\to
0^{+}}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{I_{x_{0},\varepsilon}}\big{(}f_{1}(u(x_{0}))df_{2}(v)(y)+dW(Du)(y)\big{)}\\\
&=f_{1}(u(x_{0}))\frac{df_{2}(v^{\rm diff})}{d\theta^{\rm
diff}}(x_{0})+\frac{dW(Du^{\rm diff})}{d\theta^{\rm
diff}}(x_{0}).\end{aligned}$
As this holds for all sequences $(u_{k},v_{k})$ admissible in the definition
of $\overline{{\mathcal{F}}}(u,v,\cdot)$, (4.11) implies the lower bound
(”$\geq$”) in (4.2).
### Contributions charging individual points in the interior
We claim that
(4.12) $\displaystyle\mu^{0}(\\{x_{0}\\})\geq
f_{W}^{0}\left(u(x_{0}^{+}),u(x_{0}^{-}),v(\\{x_{0}\\})\right)\quad\hbox{ for
all }x_{0}\in\Omega\cap S^{0}(\mu),$
which directly implies the lower bound (”$\geq$”) in (4.3). Here, $f_{W}^{0}$
is defined by (1.12), i.e.,
(4.17) $\displaystyle f_{W}^{0}(a^{+},a^{-},b)=\inf_{\begin{array}[]{ll}u\in
W^{1,1}((-1,1);{\mathbb{R}}^{m}),\\\ v\in L^{1}((-1,1);{\mathbb{R}}^{d})\\\
u(-1)=a^{-},~{}~{}u(1)=a^{+},\\\
\int_{-1}^{1}vdx=b\end{array}}\left\\{\int_{-1}^{1}(f_{1}(u)(f_{2}^{\ast\ast})^{\infty}(v)+(W^{\ast\ast})^{\infty}(u^{\prime}))dx\right\\}.$
Let $x_{0}\in S^{0}(\mu)$. Since $u\in BV$ on a one-dimensional domain,
$u(x_{0}^{+})$ and $u(x_{0}^{-})$ exist in $\mathbb{R}^{m}$ (and outside of
the jump set of $u$, they are equal). In the following let $(\varepsilon)$
denote a sequence of positive reals converging to $0$ such that
(4.18)
$\displaystyle|v|(\\{x_{0}\pm\varepsilon\\})=|Du|(\\{x_{0}\pm\varepsilon\\})=\mu(\\{x_{0}\pm\varepsilon\\})=0.$
By virtue of dominated convergence, $\mu(\\{x_{0}\\})=\lim_{\varepsilon\to
0^{+}}\mu(I_{x_{0},\varepsilon})$, and by (4.5), (4.4) and a change of
variables, we have that
(4.19) $\displaystyle\mu(\\{x_{0}\\})\geq\lim_{\varepsilon\to
0^{+}}\lim_{k\to+\infty}\varepsilon\int_{I}\left(f_{1}(u_{k}(x_{0}+\varepsilon
y))f_{2}(v_{k}(x_{0}+\varepsilon y))+W(u^{\prime}_{k}(x_{0}+\varepsilon
y))\right)dy,$
where $I=(-1,1)$ as before. Next, let
$v_{k,\varepsilon}(y):=v_{k}(x_{0}+\varepsilon y).$
Since $v_{k}\overset{\ast}{\rightharpoonup}v$ in
$\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$ and
$|v|(\\{x_{0}\pm\varepsilon\\})=0$ by (4.18), for fixed $\varepsilon$,
$\int_{I}\varepsilon
v_{k,\varepsilon}(y)dy=\int_{I_{x_{0},\varepsilon}}v_{k}\,dx\underset{k\to\infty}{\longrightarrow}v(I_{x_{0},\varepsilon})$
As $\varepsilon\to 0^{+}$, we conclude that
$\displaystyle\lim_{\varepsilon\to 0^{+}}\lim_{k\to+\infty}\int_{I}\varepsilon
v_{k,\varepsilon}(y)dy=v(\\{x_{0}\\}).$
A diagonalization argument now ensures the existence of a sequence
$\overline{v}_{\varepsilon}:=v_{k(\varepsilon),\varepsilon}$ such that
(4.20) $\displaystyle\lim_{\varepsilon\to
0^{+}}\int_{I}\varepsilon\overline{v}_{\varepsilon}(y)dy=v(\\{x_{0}\\}).$
On the other hand, for $u_{k,\varepsilon}(y):=u_{k}(x_{0}+\varepsilon y)$, it
is easily seen that
(4.23) $\displaystyle\lim_{\varepsilon\to
0^{+}}\lim_{k\to+\infty}\|u_{k,\varepsilon}-u^{\pm}\|_{L^{1}(I)}=0,\quad\text{where}\quad
u^{\pm}(y)=\left\\{\begin{array}[]{ll}u(x_{0}^{+}),\hbox{ if }y\geq 0,\\\
u(x_{0}^{-}),\hbox{ if }y<0.\end{array}\right.$
In addition, defining
$\overline{u}_{\varepsilon}:=u_{k(\varepsilon),\varepsilon},\quad\overline{v}_{\varepsilon}:=v_{k(\varepsilon),\varepsilon},$
with a suitable $k(\varepsilon)\to+\infty$ (fast enough), we can rewrite
(4.19) as
(4.24) $\displaystyle\mu(\\{x_{0}\\})\geq\lim_{\varepsilon\to
0^{+}}\varepsilon\left(\int_{I}f_{1}(\overline{u}_{\varepsilon}(y))f_{2}(\overline{v}_{\varepsilon}(y))+W\left(\frac{1}{\varepsilon}\overline{u}_{\varepsilon}^{\prime}(y)\right)\right)dy.$
Further defining
$\displaystyle\hat{v}_{\varepsilon}(y):=\varepsilon\overline{v}_{\varepsilon}(y)-\varepsilon\int_{I}\overline{v}_{\varepsilon}dy+v(\\{x_{0}\\}),$
we observe that
(4.25)
$\displaystyle|\hat{v}_{\varepsilon}(y)-\varepsilon\overline{v}_{\varepsilon}(y)|=\left|\int_{I}\varepsilon\overline{v}_{\varepsilon}(y)dy-v(\\{x_{0}\\})\right|\to
0\hbox{ as }\varepsilon\to 0.$
Together with the global Lipschitz continuity of $f_{2}$, (4.25) justifies
replacing $\overline{v}_{\varepsilon}$ by
$\frac{1}{\varepsilon}\hat{v}_{\varepsilon}$ in (4.24), which gives
$\displaystyle\mu(\\{x_{0}\\})\geq\lim_{\varepsilon\to
0^{+}}\int_{I}\left(f_{1}(\overline{u}_{\varepsilon}(y))\varepsilon
f_{2}\Big{(}\frac{1}{\varepsilon}\hat{v}_{\varepsilon}(y)\Big{)}+\varepsilon
W\left(\frac{1}{\varepsilon}\overline{u}_{\varepsilon}^{\prime}(y)\right)\right)dy.$
Above, we may replace $f_{2}$ and $W$ by their recession functions in (4.26),
using (2.8) with $h=f_{2}$ and $h=W$ (both convex with linear growth) together
with the fact that both $\hat{v}_{\varepsilon}$ and
$\bar{u}^{\prime}_{\varepsilon}$ are bounded in $L^{1}$. Therefore,
(4.26) $\displaystyle\mu(\\{x_{0}\\})\geq\lim_{\varepsilon\to
0^{+}}\int_{I}\left(f_{1}(\overline{u}_{\varepsilon}(y))f_{2}^{\infty}(\hat{v}_{\varepsilon}(y))+W^{\infty}(\overline{u}_{\varepsilon}^{\prime}(y))\right)dy.$
As $\int_{I}\hat{v}_{\varepsilon}=v(\\{x_{0}\\})$ by construction,
$\hat{v}_{\varepsilon}$ is admissible in the infimum defining $f_{W}^{0}$ in
(4.17) (in place of $v$). Applying Lemma 2.3 to the integrand
$f_{1}f_{2}^{\infty}+W^{\infty}$, we modify $\overline{u}_{\varepsilon}$ into
a function ${\hat{u}}_{\varepsilon}$ which has the same values as $u^{\pm}$ on
$\\{\pm 1\\}$, cf. (4.23). Thus, the new function $\hat{u}_{\varepsilon}$ is
also admissible in (4.17) (in place of $u$) and we obtain (4.12) from (4.26),
more precisely,
$\displaystyle\mu(\\{x_{0}\\})\geq\lim_{\varepsilon\to
0^{+}}\int_{I}\left(f_{1}({\hat{u}}_{\varepsilon}(y))f_{2}^{\infty}(\hat{v}_{\varepsilon})+W^{\infty}({\hat{u}}_{\varepsilon}^{\prime}(y))\right)dy\geq
f_{W}^{0}\left(u(x_{0}^{+}),u(x_{0}^{-}),v(\\{x_{0}\\})\right).$
### Contributions charging boundary points
Let $x_{0}\in\partial\Omega$, say, $x_{0}=\inf\Omega$ (the other case is
analogous). Passing to a subsequence if necessary, we may assume that $z:=\lim
u_{k}(x_{0})$ exists. By extending $u_{k}(x):=u_{k}(x_{0})$ and $v_{k}(x):=0$
for all $x<x_{0}$, which leads to $d\mu_{k}(x)=f_{1}(u_{k}(x_{0}))f_{2}(0)dx$,
$d\mu(x)=f_{1}(z)f_{2}(0)dx$ and $d\lambda(x)=0$ for $x<x_{0}$, we can argue
as for interior points, with $u(x_{0}^{-})=z$.
### 4.2. Upper bound
Let $(u,v)\in
BV(\Omega;{\mathbb{R}}^{m})\times{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$.
As before, without loss of generality (see Proposition 2.6), $f_{2}$ and $W$
can be assumed to be convex, and we can use the representaion (2.15) of
$\overline{\mathcal{F}}=\overline{\mathcal{F}}_{\ast\ast}$ obtained in
Proposition 2.7. By Lemma 2.8 it is enough to prove the upper bounds for the
density of $\overline{{\mathcal{F}}}_{u,v}$ with respect to the atomic and
diffuse parts of $\theta=\theta^{0}+\theta^{\rm diff}$. We therefore have to
show that
(4.27) $\displaystyle\begin{aligned}
\frac{d\overline{{\mathcal{F}}}_{u,v}}{d\theta^{\rm diff}}(x_{0})\leq
f_{1}(u(x_{0}))\frac{df_{2}(v)}{d\theta^{\rm
diff}}(x_{0})+\frac{dW(Du)}{d\theta^{\rm diff}}(x_{0})\end{aligned}$ for
$\theta^{\rm diff}$-a.e. $x_{0}\in\Omega$, (4.28)
$\displaystyle\begin{aligned} \overline{{\mathcal{F}}}_{u,v}(\\{x_{0}\\})\leq
f_{W}^{0}\left(u^{+}(x_{0}),u^{-}(x_{0}),v(\\{x_{0}\\})\right)\end{aligned}$
for every $x_{0}\in\Omega$, $\displaystyle\begin{aligned}
\overline{{\mathcal{F}}}_{u,v}(\\{x_{0}\\})\leq\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}\left(z,u^{-}(x_{0}),v(\\{x_{0}\\})\right)\end{aligned}$
for $x_{0}=\sup\Omega$, and $\displaystyle\begin{aligned}
\overline{{\mathcal{F}}}_{u,v}(\\{x_{0}\\})\leq\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}\left(u^{+}(x_{0}),z,v(\\{x_{0}\\})\right)\end{aligned}$
$\displaystyle\quad\text{for $x_{0}=\inf\Omega$}.$
Here, recall that
$\theta={\mathcal{L}}^{1}+|v|+|Du|\in{\mathcal{M}}(\overline{\Omega})$ (with
$|Du|(\partial\Omega):=0$).
### Diffuse contributions
As before, we denote
$I_{{x_{0}},\varepsilon}:=(x_{0}-\varepsilon,x_{0}+\varepsilon)$ and
$\vartheta_{x_{0},\varepsilon}:=\theta^{\rm diff}(I_{{x_{0}},\varepsilon})$.
We only consider $x_{0}\in\Omega$ such that the Besicovitch derivatives
$\frac{d\overline{\mathcal{F}}(u,v,\cdot)}{d\theta^{\rm diff}}(x_{0})$,
$\frac{df_{2}(v)}{d\theta^{\rm diff}}(x_{0})$ and $\frac{dW(Du)}{d\theta^{\rm
diff}}(x_{0})$ exist with finite values. In particular,
$|v|(\\{x_{0}\\})=|Du|(\\{x_{0}\\})=0$, $x_{0}$ is not a jump point of $u$,
$u$ has a representative which is continuous at $x_{0}$ and
$\vartheta_{x_{0},\varepsilon}\to 0$ as $\varepsilon\to 0$.
For the proof of (4.27), by Proposition 2.7 (with $f=f^{\ast\ast}$ and
$W=QW$), it suffices to find a sequence $v_{k}\subset
L^{1}(\Omega;{\mathbb{R}}^{d})$ such that $v_{k}\rightharpoonup^{*}v$ in
${\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$ and
(4.29) $\displaystyle\begin{aligned} &\liminf_{\varepsilon\to
0}\limsup_{k\to\infty}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(u)f_{2}(v_{k})\,dx+dW(Du)(x)\\\
&\qquad\leq\lim_{\varepsilon\to
0}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(u(x_{0}))df_{2}(v)(x)+dW(Du)(x).\end{aligned}$
As the contribution of $W(Du)$ appears on both sides, (4.29) can be reduced to
(4.30) $\displaystyle\begin{aligned} \liminf_{\varepsilon\to
0}\limsup_{k\to\infty}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(u)f_{2}(v_{k})\,dx&\leq
f_{1}(u(x_{0}))\lim_{\varepsilon\to
0}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}df_{2}(v).\end{aligned}$
We choose $(v_{k})\subset L^{1}(\Omega;{\mathbb{R}}^{d})$ such that $v_{k}\to
v$ area-strictly in ${\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$, for
instance using Lemma 2.5. To prove (4.30), first observe that
(4.31)
$\displaystyle|u(x)-u(x_{0})|\leq\Big{|}\int_{x_{0}}^{x}d|Du|\Big{|}\leq\vartheta_{x_{0},\varepsilon}\quad\text{for
all $x$ with $|x-x_{0}|<\varepsilon$ and $|Du(\\{x\\})=0|$}.$
Here, we excluded the case $|Du(\\{x\\})|>0$ to ensure that $u(x)$ is well
defined; this certainly holds for ${\mathcal{L}}^{1}$-a.e. $x$. Since $f_{1}$
is continuous and $\vartheta_{x_{0},\varepsilon}\to 0$ as $\varepsilon\to 0$,
(4.31) implies that
(4.32)
$\displaystyle\big{\|}f_{1}(u(\cdot))-f_{1}(u(x_{0}))\big{\|}_{L^{\infty}(I_{{x_{0}},\varepsilon})}\to
0\quad\text{as $\varepsilon\to 0$}.$
Moreover, as $v\mapsto\int df_{2}(v)$ is continuous with respect to area-
strict convergence by Proposition 2.1,
(4.33)
$\displaystyle\lim_{k\to\infty}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{2}(v_{k})\,dx=\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}df_{2}(v)\quad\text{if
$v(\\{x_{0}+\varepsilon\\})=v(\\{x_{0}-\varepsilon\\})=0$.}$
(While $v_{k}\to v$ area-strictly on $\overline{\Omega}$ by construction, this
in general only implies area strict-convergence on the smaller set
$I_{{x_{0}},\varepsilon}$ if $v$ does not charge its boundary.) Clearly, all
but countably many $\varepsilon$ satisfy the restriction required in (4.33),
and thus
(4.34) $\displaystyle\liminf_{\varepsilon\to
0}\lim_{k\to\infty}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{2}(v_{k})\,dx=\lim_{\varepsilon\to
0}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}df_{2}(v).$
Combined, (4.32) and (4.34) imply (4.30).
### Contributions charging individual points in the interior
As pointed out before, we may assume w.l.o.g. that $f_{2}$ and $W$ are convex.
In addition, we will exploit that with
$\tilde{u}(x)=u\big{(}\tfrac{1}{\varepsilon}(x-x_{0})\big{)}$ and
$\tilde{v}(x)=\tfrac{1}{\varepsilon}v\big{(}\tfrac{1}{\varepsilon}(x-x_{0})\big{)}$,
by a change of variables and the positive $1$-homogeneity of the recession
functions, the definition of $f_{W}^{0}$ in (4.17) is equivalent to
(4.39) $\displaystyle
f_{W}^{0}(a^{+},a^{-},b)=\inf_{\begin{array}[]{ll}\tilde{u}\in
W^{1,1}(I_{x_{0},\varepsilon};{\mathbb{R}}^{m}),\\\ \tilde{v}\in
L^{1}(I_{x_{0},\varepsilon};{\mathbb{R}}^{d}),\\\
\tilde{u}(x_{0}\pm\varepsilon)=a^{\pm},\\\
\int_{I_{x_{0},\varepsilon}}\tilde{v}dx=b\end{array}}\left\\{\int_{I_{x_{0},\varepsilon}}\big{(}f_{1}(\tilde{u})(f_{2}^{\ast\ast})^{\infty}\big{(}\tilde{v}\big{)}+(W^{\ast\ast})^{\infty}\big{(}\tilde{u}^{\prime}\big{)}\big{)}dx\right\\},$
independently of the choice of $\varepsilon>0$ and $x_{0}\in{\mathbb{R}}^{n}$.
Here, recall that
$I_{x_{0},\varepsilon}=(x_{0}-\varepsilon,x_{0}+\varepsilon)$.
Let $u\in BV(\Omega;\mathbb{R}^{m})$ and
$v\in\mathcal{M}(\Omega;\mathbb{R}^{d})$, and fix $x_{0}\in\Omega$. We want to
show that (4.28) holds, i.e., that
(4.40)
$\displaystyle\frac{d\overline{{\mathcal{F}}}_{u,v}}{d\delta_{x_{0}}}(x_{0})=\overline{{\mathcal{F}}}_{u,v}(\\{x_{0}\\})\leq
f_{W}^{0}(u(x_{0}^{-}),u(x_{0}^{+}),v(\\{x_{0}\\})).$
Here, $u(x_{0}^{-})$ and $u(x_{0}^{+})$ denote the left and right hand side
limits of $u$ at $x_{0}$. In particular,
$Du(\\{x_{0}\\})=u(x_{0}^{+})-u(x_{0}^{-})$. The equality in (4.40) is a
trivial consequence of Lebesgue’s dominated convergence theorem, as
$\overline{{\mathcal{F}}}_{u,v}$ is a finite measure. It therefore suffices to
show the inequality. For each $\varepsilon>0$ we choose
$(U_{\varepsilon},V_{\varepsilon})\in
W^{1,1}(I_{x_{0},\varepsilon};{\mathbb{R}}^{m})\times
L^{1}(I_{x_{0},\varepsilon};{\mathbb{R}}^{m})$ admissible and almost optimal
for the infimum defining $f_{W}^{0}$ in (4.39), with $a^{\pm}:=u(x_{0}^{\pm})$
and $b:=v(\\{x_{0}\\})=\lim_{\varepsilon\to 0}v(I_{x_{0},\varepsilon})$, so
that
(4.41) $\displaystyle
f_{W}^{0}(u(x_{0}^{-}),u(x_{0}^{+}),b)+\varepsilon\geq\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(U_{\varepsilon})f_{2}^{\infty}(V_{\varepsilon})+W^{\infty}(U^{\prime}_{\varepsilon})\,dx.$
In (4.41), we may also assume without loss of generality that
$f_{W}^{0}(u(x_{0}^{-}),u(x_{0}^{+}),b)$ is finite. Hence, (4.41) implies that
$U_{\varepsilon}^{\prime}$ is bounded in $L^{1}$ by the coercivity of
$W^{\infty}$ inherited from $W$.
We define $u_{\varepsilon}\in BV(\Omega;{\mathbb{R}}^{m})$ as the unique
function satisfying
(4.44) $\displaystyle Du_{\varepsilon}=\left\\{\begin{array}[]{ll}Du&\text{on
$\Omega\setminus I_{x_{0},\varepsilon}$},\\\ DU_{\varepsilon}&\text{on
$I_{x_{0},\varepsilon}$},\end{array}\right.\quad\text{and}\quad
u_{\varepsilon}((x_{0}-\varepsilon)^{+})=a^{-}=u(x_{0}^{-}).$
As $U_{\varepsilon}(x_{0}-\varepsilon)=a^{-}$ (recall that $U_{\varepsilon}$
is admissible in (4.17)), this entails that $u_{\varepsilon}=U_{\varepsilon}$
on $I_{x_{0},\varepsilon}$. In addition,
(4.47) $\displaystyle
u_{\varepsilon}(x)-u(x)=\left\\{\begin{array}[]{ll}u(x_{0}^{-})-u((x_{0}-\varepsilon)^{+}){}{}&\text{for
$x<x_{0}-\varepsilon$,}\\\
u(x_{0}^{+})-u((x_{0}+\varepsilon)^{-}){}{}&\text{for
$x>x_{0}+\varepsilon$,}\end{array}\right.$
whence
(4.48)
$\displaystyle\big{\|}u_{\varepsilon}-u\big{\|}_{L^{\infty}(\Omega\setminus
I_{x_{0},\varepsilon};{\mathbb{R}}^{m})}\underset{\varepsilon\to
0}{\longrightarrow}0.$
Since $u_{\varepsilon}$ is a bounded sequence in $BV$, (4.48) implies that
$u_{\varepsilon}\rightharpoonup^{*}u$ in $BV(\Omega;{\mathbb{R}}^{m})$.
For the measure $v$, we define the analogous approximation
(4.51) $\displaystyle v_{\varepsilon}:=\left\\{\begin{array}[]{ll}v&\text{on
$\Omega\setminus I_{x_{0},\varepsilon}$},\\\ V_{\varepsilon}&\text{on
$I_{x_{0},\varepsilon}$}.\\\ \end{array}\right.$
Since
$\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}V_{\varepsilon}\,dx=b=\frac{dv}{d\delta_{x_{0}}}(x_{0})$
and $V_{\varepsilon}$ is bounded in $L^{1}$ by (4.41) and the coercivity of
$f_{2}$,
$v_{\varepsilon}\rightharpoonup^{*}v|_{\Omega\setminus\\{x_{0}\\}}+b\delta_{x_{0}}=v$.
To show the upper bound (4.40), we first consider the case $v\in
L^{1}(\Omega\setminus\\{x_{0}\\};{\mathbb{R}}^{d})$, so that
$(u_{\varepsilon},v_{\varepsilon})\in BV(\Omega;{\mathbb{R}}^{m})\times
L^{1}(\Omega;{\mathbb{R}}^{d})$ and
(4.52)
$\displaystyle\frac{d\overline{{\mathcal{F}}}_{u,v}}{d\delta_{x_{0}}}(\\{x_{0}\\})\leq\limsup_{r\to
0}\limsup_{\varepsilon\to
0}\int_{x_{0}-r}^{x_{0}+r}f_{1}(u_{\varepsilon})f_{2}(v_{\varepsilon})+W(u^{\prime}_{\varepsilon})\,dx,$
since $(u_{\varepsilon},v_{\varepsilon})$ is admissible in the infimum in the
representation of $\overline{\mathcal{F}}=\overline{\mathcal{F}}_{\ast\ast}$
obtained in Proposition 2.7. The case of a general
$v\in{\mathcal{M}}(\Omega;{\mathbb{R}}^{d})$ is easily recovered with an
additional approximation argument, mollifying
$\tilde{v}:=v-v(\\{x_{0}\\})\delta_{x_{0}}$.
In (4.52), we may assume w.l.o.g. that $r=\varepsilon$: As
$u_{\varepsilon}^{\prime}=u^{\prime}$ and $v_{\varepsilon}=v$ on
$\Omega\setminus I_{x_{0},\varepsilon}$, and $u_{\varepsilon}-u\to 0$
uniformly on $\Omega\setminus I_{x_{0},\varepsilon}$, the integral on
$I_{r}\setminus I_{x_{0},\varepsilon}$ converges to zero as $\varepsilon\leq
r\to 0$. It therefore suffices to show that
(4.53) $\displaystyle\limsup_{\varepsilon\to
0}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(u_{\varepsilon})f_{2}(v_{\varepsilon})+W(u^{\prime}_{\varepsilon})\,dx\leq
f_{W}^{0}(u(x_{0}^{-}),u(x_{0}^{+}),b_{0}).$
Since $f_{2}$ and $W$ are convex, we have that $f_{2}(v_{\varepsilon})\leq
f_{2}(0)+f_{2}^{\infty}(v_{\varepsilon})$ and $W(u^{\prime}_{\varepsilon})\leq
W(0)+W^{\infty}(u^{\prime}_{\varepsilon})$. Consequently, also exploiting that
$f_{1}(u_{\varepsilon})$ is uniformly bounded,
(4.54) $\displaystyle\limsup_{\varepsilon\to
0}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(u_{\varepsilon})f_{2}(v_{\varepsilon})+W(u^{\prime}_{\varepsilon})\,dx\leq\limsup_{\varepsilon\to
0}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(u_{\varepsilon})f_{2}^{\infty}(v_{\varepsilon})+W(u^{\prime}_{\varepsilon})\,dx$
As $u_{\varepsilon}=U_{\varepsilon}$ and $v_{\varepsilon}=V_{\varepsilon}$ on
$I_{x_{0},\varepsilon}$ by construction, (4.54) combined with (4.41) implies
(4.53).
### Contributions charging points on the boundary
Let $x_{0}\in\partial\Omega$, say, $x_{0}=\inf\Omega$ (the other case is
analogous). For any $\delta>0$ we can choose
$z_{0}=z_{0}(\delta)\in{\mathbb{R}}^{m}$ such that
$f_{W}^{0}(u(x_{0}^{+}),z_{0},v^{0}(\\{x_{0}\\}))\leq\delta+\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}(u(x_{0}^{+}),z,v^{0}\\{x_{0}\\}).$
The preceding construction for interior points is easily adapted with
$u(x_{0}^{-}):=z_{0}$, we omit the details. It yields that
$\displaystyle\overline{\mathcal{F}}(u,v)(\\{x_{0}\\})\leq
f_{W}^{0}\left(u^{+}(x_{0}),z_{0},v(\\{x_{0}\\})\right)+\delta.$
As this holds for all $\delta>0$, we obtain the assertion.
## Appendix A Proofs of auxiliary results
Here, we present the proofs of some of the auxiliary results collected in
Section 2.
###### Proof of Proposition 2.6.
Clearly, it suffices to prove
$\overline{\mathcal{F}}(\cdot,\cdot,\cdot)\leq\overline{\mathcal{F}}_{\ast\ast}(\cdot,\cdot,\cdot)$,
the opposite inequality being trivial.
In order to achieve the desired conclusion we argue as follows. For every
$A\in\mathcal{A}_{r}(\overline{\Omega})$, denote by
$\overline{\mathcal{F}}^{w}$ the localized sequentially weak
$W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap
A;\mathbb{R}^{d})$ lower semicontinuous envelope of $F$ in (2.12). It was
proved in [13] that for every $A\in\mathcal{A}_{r}(\overline{\Omega})$ (so
that $A\cap\Omega$ can be any open subset of $\Omega$),
$\displaystyle\overline{\mathcal{F}}^{w}(u,v,A)\\!\\!=\\!\\!\\!\int_{\Omega\cap
A}(f_{1}(u)f_{2}^{\ast\ast}(v)+\mathcal{Q}W(\nabla u))dx,\hbox{ for
every}(u,v)\in W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap
A;\mathbb{R}^{d}).$
Since for every $(u,v)\in W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times
L^{1}(\Omega\cap A;\mathbb{R}^{d})$,
$\displaystyle\begin{aligned}
\overline{\mathcal{F}}(u,v,A)\leq\overline{\mathcal{F}}^{w}(u,v,A)\end{aligned}$
we infer that
$\displaystyle\overline{\mathcal{F}}(u,v,A)$ $\displaystyle=\begin{aligned}
\inf\Big{\\{}&\liminf_{k\to+\infty}\overline{\mathcal{F}}(u_{k},v_{k},A):\\\
&W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap
A;\mathbb{R}^{d})\ni(u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in
}BV(\Omega\cap
A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\Big{\\}}\end{aligned}$
$\displaystyle\leq\begin{aligned}
\inf\Big{\\{}&\liminf_{k\to+\infty}\overline{\mathcal{F}}^{w}(u_{k},v_{k},A):\\\
&W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap
A;\mathbb{R}^{d})\ni(u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in
}BV(\Omega\cap
A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\Big{\\}}\end{aligned}$
$\displaystyle=\begin{aligned}
\inf\Big{\\{}&\liminf_{k\to+\infty}\int_{A}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k})dx+\int_{A}\mathcal{Q}W(\nabla
u_{k})dx:\\\ &W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap
A;\mathbb{R}^{d})\ni(u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in
}BV(\Omega\cap
A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\Big{\\}}\end{aligned}$
for every $(u,v)\in BV(\Omega\cap
A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})$, which concludes the
proof. ∎
###### Proof of Proposition 2.7.
It suffices to show ”$\leq$”, as ”$\geq$” is trivial.
For every fixed $k\in\mathbb{N}$ and $u_{k}\in BV(\Omega\cap
A;{\mathbb{R}}^{m})$, we can choose a sequence
$(w_{k,l})_{l\in\mathbb{N}}\subset W^{1,1}(\Omega\cap A;{\mathbb{R}}^{m})$
such that as $l\to\infty$, $w_{k,l}\rightharpoonup^{*}u_{k}$ in $BV(\Omega\cap
A;{\mathbb{R}}^{m})$ and
(A.1) $\displaystyle\int_{\Omega\cap A}\mathcal{Q}W(\nabla
w_{k,l})\,dx=\int_{\Omega\cap A}d\mathcal{Q}W(Du_{k})(x)$
(any $W^{1,1}$ recovery sequence). For instance, since $W^{1,1}$ is dense in
$BV$ with respect to area strict convergence, there exists $(w_{k,l})\subset
W^{1,1}$ such that as $l\to\infty$, $w_{k,l}\to u_{k}$ area-strictly, which
yields (A.1) by Proposition 2.1. By $(H_{3})$ (coercivity and growth of $W$),
(A.1) implies that
$\limsup_{l}\|\nabla w_{k,l}\|_{L^{1}(A;{\mathbb{R}}^{m\times n})}\leq
C\big{(}1+|Du_{k}|(A)\big{)}$
with a constant $C>0$.
In addition, given any $v_{k}\in L^{1}(\Omega\cap A;\mathbb{R}^{m})$, we also
have that
$\int_{\Omega\cap
A}f_{1}(w_{k,l})f_{2}^{\ast\ast}(v_{k})dx\underset{l\to\infty}{\to}\int_{\Omega\cap
A}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k})dx$
by dominated convergence, also using that $w_{k,l}\to u_{k}$ in $L^{1}$,
$f_{1}$ is bounded and $f_{2}^{\ast\ast}(v_{k})\in L^{1}(\Omega\cap A)$.
If $u_{k}\rightharpoonup^{*}u$ in $BV$ and $v_{k}\rightharpoonup^{*}v$ in
${\mathcal{M}}$, it is therefore possible to choose a diagonal sequence
$\tilde{u}_{k}:=w_{k,l(k)}$, with $l(k)\to\infty$ fast enough as $k\to\infty$,
such that for
(A.2) $\displaystyle\begin{aligned} &\liminf_{k}\int_{\Omega\cap
A}f_{1}(\tilde{u}_{k})f_{2}^{\ast\ast}(v_{k})\,dx+\int_{\Omega\cap
A}\mathcal{Q}W(\nabla\tilde{u}_{k})\,dx\\\
&\qquad\qquad=\liminf_{k}\int_{\Omega\cap
A}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k})\,dx+\int_{\Omega\cap
A}d\mathcal{Q}W(Du_{k})(x),\end{aligned}$
$\limsup_{k}\|\nabla\tilde{u}_{k}\|_{L^{1}(\Omega\cap A;\mathbb{R}^{m\times
n})}\leq C(1+\limsup_{k}|Du_{k}|(\Omega\cap A)$ and $\tilde{u}_{k}\to u$ in
$L^{1}(\Omega\cap A;{\mathbb{R}}^{m})$. In particular,
$\tilde{u}_{k}\rightharpoonup^{*}u$ in $BV(\Omega\cap A;\mathbb{R}^{m})$. This
means that if $(u_{k},v_{k})\subset BV(\Omega\cap A;\mathbb{R}^{m})\times
L^{1}(\Omega\cap A;\mathbb{R}^{m})$ is an arbitrary admissible sequence for
the infimum defining $\overline{\mathcal{F}}_{\ast\ast}$ in (2.14), then
$(\tilde{u}_{k},v_{k})\subset W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times
L^{1}(\Omega\cap A;\mathbb{R}^{d})$ is admissible, too. Hence,
(LABEL:extendW11toBV) yields the assertion. ∎
In the following we will discuss the measure representation for the localized
relaxed functionals, i.e., for $A\in\mathcal{A}_{r}(\overline{\Omega})$,
$\displaystyle\begin{aligned}
\overline{\mathcal{F}}(u,v,A):=\inf\left\\{\,\liminf_{k\to+\infty}F(u_{k},v_{k},A)\,\left|\,\begin{array}[]{l}(u_{k},v_{k})\in
W^{1,1}(A;\mathbb{R}^{m})\times L^{1}(A;\mathbb{R}^{d}),\\\
(u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in
}BV(A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\end{array}\right.\right\\}.\end{aligned}$
Here, recall that by $\mathcal{A}_{r}(\overline{\Omega})$ we denote the family
of open subsets of $\overline{\Omega}$ in the relative topology. The following
result is a close relative of [1, Lemma 2.5].
###### Lemma A.1.
Let $\overline{\Omega}$ be as above. Let
$\lambda:\mathcal{A}_{r}(\overline{\Omega})\to[0,+\infty)$ and $\mu$ be such
that
* (i)
$\mu$ is a finite Radon measure on $\overline{\Omega}$;
* (ii)
$\lambda(\overline{\Omega})\geq\mu(\Omega)$;
* (iii)
$\lambda(A)\leq\mu(A)$ for all $A\in\mathcal{A}_{r}(\overline{\Omega})$;
* (iv)
(subadditivity) $\lambda(A)\leq\lambda(A\setminus\overline{U})+\lambda(B)$ for
all $A,B,U\in\mathcal{A}_{r}(\overline{\Omega})$ such that $U\subset\subset
B\subset\subset A$;
* (v)
for all $A\in\mathcal{A}_{r}(\Omega)$, $\varepsilon>0$, there exists
$C\in\mathcal{A}_{r}(\overline{\Omega})$ such that $U\subset\subset A$ and
$\lambda(A\setminus\overline{U})<\varepsilon$.
Then $\lambda=\mu$ on $\mathcal{A}_{r}(\overline{\Omega})$.
###### Proof.
$\lambda(A)\leq\mu(A)$, for every $A\in\mathcal{A}_{r}(\overline{\Omega})$.
Indeed for every $\varepsilon>0$, and by $(iv)$ and $(v)$, we can find
$U\subset\subset B\subset\subset A$, open for the relative topology, such that
$\lambda(A\setminus\overline{U})<\varepsilon$, and
$\lambda(A)\leq\lambda(A\setminus\overline{U})+\lambda(B)\leq\varepsilon+\mu(\overline{B})\leq\varepsilon+\mu(A)$.
The arbitrariness of $\varepsilon$ proves one inequality.
For what concerns the other we can observe that, by the inner regularity of
$\mu$ we can find a relatively open subset of $\overline{\Omega}$, say
$A^{\prime}\subset\subset A$, such that
$\displaystyle\mu(A)<\varepsilon+\mu(\overline{A^{\prime}})=\varepsilon+\mu(\overline{\Omega})-\mu(\overline{\Omega}\setminus\overline{A^{\prime}})\leq$
$\displaystyle\varepsilon+\lambda(\overline{\Omega})+\lambda(\overline{\Omega}\setminus\overline{A^{\prime}})\leq\varepsilon+\lambda(A).$
Thus, letting $\varepsilon\to 0$ we obtain the desired conclusion. ∎
###### Proof of Lemma 2.8.
In order to prove that $\overline{\mathcal{F}}(u,v,A)$ is the trace of a Radon
measure we refer to Lemma A.1, and define the increasing set function
$\lambda:\mathcal{A}_{r}(\overline{\Omega})\to[0,+\infty]$ as
$\lambda(A):=\overline{\mathcal{F}}(u,v,A).$
By defintion of $\overline{\mathcal{F}}$, we know that there exists a sequence
$(u_{h},v_{h})\in
W^{1,1}(\Omega;\mathbb{R}^{m})\times\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$
such that $u_{h}\overset{\ast}{\rightharpoonup}u$ in
$BV(\Omega;\mathbb{R}^{m})$ and $v_{h}\overset{\ast}{\rightharpoonup}v$ in
$\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$ such that
$\overline{\mathcal{F}}(u,v,\overline{\Omega})=\lim_{h\to+\infty}\int_{\Omega}(f_{1}(u_{h})f_{2}(v_{h})+W(\nabla
u_{h}))dx=\lambda(\overline{\Omega}).$
Next, denoting by $\lambda_{h}$ the measures
$(f_{1}(u_{h})f_{2}(v_{h})+W(\nabla u_{h})\mathcal{L}^{n}$, it converges
weakly * in the sense of measures (duality with elements in
$C(\overline{\Omega})$), up to a subsequence (due to the bounds) to a measure
$\mu$. Now, due to the lower semicontinuity with respect to the weak*
convergence, we have
$\mu(\overline{\Omega})\leq\liminf_{h}\lambda_{h}(\overline{\Omega})=\lambda(\overline{\Omega}).$
Then, by the definition of $\lambda$, we have, for every
$A\in\mathcal{A}_{r}(\overline{\Omega})$
$\lambda(A)\leq\liminf_{h}\int_{\Omega\cap
A}(f_{1}(u_{h})f_{2}(v_{h})+W(\nabla u_{h}))dx\leq\mu(\overline{A}).$
Now by the previous lemma we would have that $\lambda=\mu$ if we prove inner
regularity and subadditivity for $\overline{\mathcal{F}}(u,v,\cdot)$.
For what concerns inner regularity (i.e., $(v))$ in Lemma A.1), it follows by
Lemma 2.7 and $(H_{1})\div(H_{3})$. Indeed the growth condition from above and
an argument similar to [7, Lemma 4.7] guarantee that
$\overline{\mathcal{F}}(u,v,A)\leq C(\mathcal{L}^{n}(A)+|Du|(A)+|v|(A))$. Thus
the inner regularity of the upper bound measures provides inner regularity for
$\overline{\mathcal{F}}$.
Indeed one can extend $u$ and $v$ by zero outside $\overline{\Omega}$, thus
obtaining elements in $BV(\mathbb{R}^{n},\mathbb{R}^{m})$ and
$\mathcal{M}(\mathbb{R}^{n},\mathbb{R}^{d})$, respectively. If one first
considers an open set $A$ with Lipschitz boundary such that $|v|(\partial
A)=0$, then one can take a sequence of standard mollifiers $\varrho_{k}$ such
that $v\ast\varrho_{k}\overset{\ast}{\rightharpoonup}v$ in
$\mathcal{M}(A;\mathbb{R}^{d})$. Moreover since $|v|(\partial A)=0$, we have
$|v\ast\varrho_{k}|(A)\to|v|(A)$, thus, taking $v\ast\varrho_{k}$ as test
function for $\mathcal{F}$, and using Lemma 2.7, we have
(A.3)
$\displaystyle\mathcal{F}(u,v,A)\leq\beta(\mathcal{L}^{n}(A)+|Du|(A)+|v|(A)),$
If we take an element $A\in\mathcal{A}_{r}(\overline{\Omega})$ which is open
in $\mathbb{R}^{n}$, then, for any $\eta>0$, arguing as in [18, Example 14.8],
we can find another open set $U$ with smooth boundary, such that
$U\supset\supset A$ and
(A.4) $\displaystyle\mathcal{L}^{n}(U\setminus A)+|Du|(U\setminus
A)+|v|(U\setminus A)<\frac{\eta}{\beta}.$
Moreover the set $U$ itself can be chosen as a subset of $\Omega$, in this
case the proof develops in full analogy with the one of [7, Lemma 4.7], and
the estimate (A.3) holds.
On the other hand, if $A$ is only open in the relative topology of
$\overline{\Omega}$, i.e. it has $A\cap\partial\Omega=\partial
A\cap\partial\Omega\not=\emptyset$, then the same arguments in [18, Example
14.8] allows to construct a set $U\supset\supset A$ with regular boundary,
with $U\setminus(\partial A\cap\partial U)$ open (as a subset of
$\mathbb{R}^{n})$), $\partial U\cap\partial\Omega=A\cap\partial\Omega$, and
such that (A.4) holds. One can construct a family $\\{U_{t}\\}_{0<t<<1}$, of
sets, invading $U$ as $t\to 0$, open in the relative topology such that
$A\subset U_{t}\subset U$ with $\partial\Omega\cap
U_{t}=A\cap\partial\Omega=U\cap\partial\Omega$. Moreover one can find a
$t_{0}$ such that $|v|(\partial U_{t_{0}}\setminus(\partial\Omega\cap
U_{t}))=0$.
Then, exploiting that $\mathcal{F}(u,v,\cdot)$ is an increasing set function,
we obtain the estimate
$\displaystyle{\mathcal{F}}(u,v,A)\leq{\mathcal{F}}(u,v,U_{t_{0}})\leq\beta(\mathcal{L}^{n}(U_{t_{0}})+|Du|(U_{t_{0}})+|v|(\overline{U}_{t_{0}}))\leq\beta(\mathcal{L}^{n}(A)+|Du|(A)+|v|(A))+\eta.$
The arbitrariness of $\eta$ gives the inner regularity.
It remains to prove that $\overline{\mathcal{F}}(u,v,\cdot)$ is subadditive in
the sense of $(iv)$ in Lemma A.1, i.e. it suffices to prove that
(A.5)
$\displaystyle\overline{\mathcal{F}}(u,v,A)\leq\overline{\mathcal{F}}(u,v,B)+\overline{\mathcal{F}}(u,v,A\setminus{\overline{U}})$
for all $A,U,B\in\mathcal{A}_{r}(\overline{\Omega})$ with $U\subset\subset
B\subset\subset A$, $u\in BV(\Omega;\mathbb{R}^{m})$ and
$v\in\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$, (see e.g. [10, Lemma
4.3.4]). Without loss of generality, in view of Proposition 2.6, we can assume
$f_{2}$ convex and $W$ quasiconvex. Fix $\eta>0$ and find $(w_{h})\subset
W^{1,1}((A\setminus\overline{U}),\mathbb{R}^{m}),(v_{h})\subset
L^{1}(A\setminus\overline{U},\mathbb{R}^{d})$ such that
$w_{h}\overset{\ast}{\rightharpoonup}u$ in
$BV((A\setminus\overline{U}),\mathbb{R}^{m}),v_{h}\overset{\ast}{\rightharpoonup}v$
in $\mathcal{M}(A\setminus\overline{U},\mathbb{R}^{d})$ and
(A.6)
$\displaystyle\limsup_{h\to+\infty}\int_{A\setminus\overline{U}}(f_{1}(w_{h})f_{2}(v_{h})+W(\nabla
w_{h}))dx\leq\overline{\mathcal{F}}(u,v,A\setminus\overline{U})+\eta.$
Extract a subsequence still denoted by n such that the above upper limit is a
limit. Let $B_{0}$ be a relatively open subset of $\overline{\Omega}$ with
Lipschitz boundary such that $U\subset\subset B_{0}\subset\subset B$. Then
there exist $(u_{h})\subset W^{1,1}(B_{0},\mathbb{R}^{m})$ and
$(\bar{v}_{h})\subset L^{1}(B_{0};\mathbb{R}^{d})$ such that
$u_{h}\overset{\ast}{\rightharpoonup}u$ in $BV(B_{0},\mathbb{R}^{m})$,
$\bar{v}_{h}\overset{\ast}{\rightharpoonup}v$ in
$\mathcal{M}(\overline{B}_{0},\mathbb{R}^{d})$ and
(A.7)
$\displaystyle\overline{\mathcal{F}}(u,v,B_{0})=\lim_{h\to+\infty}\int_{B_{0}}(f_{1}(u_{h})f_{2}(\bar{v}_{h})+W(\nabla
u_{h}))dx.$
Consider, for every $D\in\mathcal{A}_{r}(\overline{\Omega})$ the set function
${\mathcal{G}}(u,v,D):=\int_{D}(1+|\nabla u|)dx+|v|(D)$. Due to
$(H_{1})\div(H_{3})$, we may extract a bounded subsequence, that we will not
relabel, from the sequences of measures
$\nu_{h}:=\mathcal{G}(w_{h},v_{h},\cdot)+\mathcal{G}(u_{h},{\bar{v}}_{h},\cdot)$
restricted to $B_{0}\setminus{\overline{U}}$, converging in the sense of
distributions to some Radon measure $\nu$ defined on
$B_{0}\setminus{\overline{U}}$. For every $t>0$ let $B_{t}:=\\{x\in B_{0}:{\rm
dist}(x,\partial B_{0})>t\\}$. Define, for $0<\delta<\eta$, the subsets
$L_{\delta}:=B_{\eta-2\delta}\setminus B_{\eta+\delta}$. Consider a smooth
cut-off function $\varphi_{\delta}\in C^{\infty}(B_{\eta-\delta},[0,1])$ such
that $\varphi_{\delta}=1$ on $B_{\eta}$. As the thickness of the strip
$L_{\delta}$ is of order $\delta$, we have an upper bound of the form
$\|\nabla\varphi_{\delta}\|_{L^{\infty}(B_{\eta-\delta})}\leq C/\delta$.
Define
$\displaystyle
w^{\prime}_{h}(x):=\varphi_{\delta}(x(u)_{h}(x)+(1-\varphi_{\delta}(x))w_{h}(x),$
$\displaystyle
v^{\prime}_{h}(x):=\varphi_{\delta}(x)\overline{v}_{h}(x)+(1-\varphi_{\delta}(x))v_{h}(x).$
Clearly the sequences $w^{\prime}_{h}$ and $v^{\prime}_{h}$ weakly* converge
to $u$ in $BV(A,\mathbb{R}^{d})$ and to $v$ in $\mathcal{M}(A;\mathbb{R}^{m})$
as $h\to+\infty$, respectively, and
$\displaystyle\nabla w^{\prime}_{h}=\varphi_{\delta}\nabla
u_{h}+(1-\varphi_{\delta})\nabla
w_{h}+\nabla\varphi_{\delta}\otimes(u_{h}-w_{h}).$
By the growth conditions $(H_{1})\div(H_{3})$, we have the estimate
$\displaystyle\begin{aligned}
&\int_{A}\left(f_{1}(w^{\prime}_{h})f_{2}(v^{\prime}_{h})+W(\nabla
w^{\prime}_{h})\right)dx\\\ &\quad\leq\begin{aligned}
&\int_{B_{\eta}}(f_{1}(u_{h})f_{2}(\overline{v}_{h})+W(\nabla
u_{h}))dx+\int_{A\setminus\overline{B_{\eta-\delta}}}(f_{1}(w_{h})f_{2}(v_{h})+W(\nabla
w_{h}))dx\\\
&\qquad+C\left(\mathcal{G}(u_{n},\overline{v}_{h},L_{\delta})+\mathcal{G}(w_{h},v_{h},L_{\delta})\right)+\frac{1}{\delta}\int_{L_{\delta}}|w_{h}-u_{h}|dx\end{aligned}\\\
&\quad\leq\begin{aligned}
&\int_{B_{0}}(f_{1}(u_{h})f_{2}(\overline{v}_{h})+W(\nabla
u_{h}))dx+\int_{A\setminus\overline{U}}(f_{1}(w_{h})f_{2}(v_{h})+W(\nabla
w_{h}))dx\\\
&\qquad+C\left(\mathcal{G}(u_{h},\overline{v}_{h},L_{\delta})+\mathcal{G}(w_{h},v_{h},L_{\delta})\right)+\frac{1}{\delta}\int_{L_{\delta}}|w_{h}-u_{h}|dx.\end{aligned}\end{aligned}$
Thus, passing to the limit as $n\to+\infty$ and making use of the lower
semicontinuity of $\overline{\mathcal{F}}(\cdot,\cdot,A)$ (which is a
consequence of its definition (2.13)), (A.6) and (A.7), we obtain
$\displaystyle\begin{aligned}
\overline{\mathcal{F}}(u,v,A)&\leq\overline{\mathcal{F}}(u,v,B_{0})+\overline{\mathcal{F}}(u,v,A\setminus\overline{U})+\eta+C\nu(\overline{L_{\delta}})\\\
&\leq\overline{\mathcal{F}}(u,v,B)+\overline{\mathcal{F}}(u,v,A\setminus\overline{U})+\eta+C\nu(\overline{L_{\delta}}).\end{aligned}$
Now passing to the limit as $\delta\to 0^{+}$ we get
$\displaystyle\overline{\mathcal{F}}(u,v,A)\leq\overline{\mathcal{F}}(u,v,B)+\overline{\mathcal{F}}(u,v,A\setminus\overline{U})+\eta+C\nu(\partial
B_{\eta}).$
It suffices to choose a subsequence $\\{\eta_{h}\\}$ such that $\eta_{h}\to
0^{+}$ and $\nu(\partial B_{\eta_{h}})=0$, to conclude the proof of (A.5). ∎
Acknowledgements EZ is grateful to the Institute of Information Theory and
Automation in Prague for its kind support and hospitality. She is a member of
GNAMPA-INdAM, whose support is acknowledged. The visit of SK at Dipartimento
di Ingegneria Industriale, University of Salerno was partially sponsored by
Project 2019 ’Analisi ed Ottimizzazione di Strutture sottili’. SK and MK are
indebted to the Dipartimento di Ingegneria Industriale, University of Salerno
(which EZ was affiliated with during the course of this research) for support
and hospitality during their stay there. Moreover, SK and MK were supported by
the GAČR-FWF project 19-29646L.
## References
* [1] E. Acerbi, G. Bouchitté, I. Fonseca, Relaxation of convex functionals: the gap problem. Ann. I. H. Poincaré – AN 20, 3 (2003) 359–390.
* [2] E. Acerbi, N. Fusco, Semicontinuity problems in the calculus of variations. Arch. Rational Mech. Anal. 86, (1984), 125–145.
* [3] G. Alberti, Rank one property for derivatives of functions with bounded variation. Proc. R. Soc. Edinb., Sect. A 123 (1993), 239–274.
* [4] L. Ambrosio, G. Dal Maso, On the Relaxation in $BV(\Omega;{\mathbb{R}}^{m})$ of quasi-convex integrals. J. Funct. Anal. 109 (1992), 76–97.
* [5] L. Ambrosio, N. Fusco and D. Pallara, _Functions of Bounded Variation and Free Discontinuity Problems_. Oxford University Press, Oxford, (2000).
* [6] L. Ambrosio, S. Mortola, and V. M. Tortorelli, Functionals with linear growth defined on vector valued BV functions, J. Math. Pures Appl. (9),70, (1991), n. 3, 269–323,
* [7] J.-F. Babadjian, E. Zappale and H. Zorgati, _Dimensional reduction for energies involving the bending moments_. J. Math. Pures Appl. 90, (2008), 520–549.
* [8] M. Baia, S. Krömer, M. Kružík, Generalized $\mathbf{W^{1,1}}$-Young measures and relaxation of problems with linear growth. SIAM J. Math. Anal. 50 (2018), 1076–1119.
* [9] G. Bouchitté, G. Buttazzo, _New lower semicontinuity results for nonconvex functionals defined on measures._ Nonlinear Analysis. Th., Meth. Appl. 15, (1990), 679–692.
* [10] G. Bouchitté, I. Fonseca, L. Mascarenhas, A global method for relaxation, Arch. Rational Mech. Anal. 145, (1998), 51–98.
* [11] G. Bouchitté, I. Fonseca, L. Mascarenhas, Bending moment in membrane theory, J. Elasticity 73, (2004), 75–99.
* [12] J.W. Cahn, F. Lärché, Surface stress and the chemical equilibrium of small crystals—II. Solid particles embedded in a solid matrix. Acta Metall. 30 (1981), 51–56.
* [13] G. Carita, A. M. Ribeiro, E. Zappale, Relaxation for some integral functionals in $W^{1,p}_{w}\times L^{q}_{w}$. Boletim da Sociedade Portuguesa de Matemática (2010), 47–53.
* [14] G. Carita, E. Zappale, A relaxation result in $BV\times L^{p}$ for integral functionals depending on chemical composition and elastic strain, Asymptot. Anal., 100, (2016), n=1-2, 1–20.
* [15] G. Carita, E. Zappale, Integral representation results in $BV\times L^{p}$, ESAIM Control Optim. Calc. Var., 23, (2017), n.4, 1555–1599.
* [16] B. Dacorogna, Direct Methods in the Calculus of Variations. 2nd ed., Springer, Berlin, 2008.
* [17] A. De Simone, G. Dolzmann, Existence of minimizers for a variational problem in two-dimensional nonlinear magnetoelasticity. Arch. Ration. Mech. Anal. 144 (1998), 107–120.
* [18] G. Dal Maso: An Introduction to $\Gamma$-Convergence. Birkhäuser, Boston, 1993.
* [19] I. Fonseca & G. Leoni _Modern Methods in the Calculus of Variations:_ $L^{p}$ _spaces_. Springer, New York, 2007.
* [20] I. Fonseca, D. Kinderlehrer, P. Pedregal, Relaxation in $BV\times L^{\infty}$ of functionals depending on strain and composition. In: Boundary value problems for partial differential equations and applications. RMA Res. Notes Appl. Math. 29, pp. 113-–152, Masson, Paris, 1993.
* [21] I. Fonseca, D. Kinderlehrer, P. Pedregal, Energy functionals depending on elastic strain and chemical composition. Calc. Var. PDE 2 (1994), 283–313.
* [22] I. Fonseca, S. Krömer, Multiple integrals under differential constraints: two-scale convergence and homogenization. Indiana Univ. Math. J. 59 (2010), 427–458.
* [23] I. Fonseca, S. Müller, Quasiconvex integrands and Lower Semicontinuity in $L^{1}$. SIAM J. Math. Anal., 23, (1992), 1081–1098.
* [24] I. Fonseca, S. Müller, Relaxation of quasiconvex functionals in $BV(\Omega;\mathbb{R}^{p})$ for integrands $f(x,u,\nabla u)$. Arch. Ration. Mech. Anal., 123, (1993), 1–49.
* [25] I. Fonseca, S. Müller, P. Pedregal, Analysis of concentration and oscillation effects generated by gradients. SIAM J. Math. Anal. 29 (1998), 736–756.
* [26] D. Henrion, M. Kružík, T. Weisser, Optimal control problems with oscillations, concentrations and discontinuities. Automatica 103 (2019), 159–165.
* [27] A. Kałamajska, S. Krömer, M. Kružík, Weak lower semicontinuity by means of anisotropic parametrized measures. Trends in Applications of Mathematics to Mechanics (eds.: E. Rocca, U. Stefanelli, L. Truskinovsky, and A. Visintin), Springer INdAM Series 27, Springer Cham, Switzerland (2018), pp. 23–52.
* [28] A. Kałamajska, M. Kružík, Oscillation and concentrations in sequences of gradients. ESAIM: COCV 14 (2008), 71–-104 .
* [29] J. Kristensen, F. Rindler, Characterization of generalized gradient Young measures generated by sequences in $W^{1,1}$ and $BV$. Arch. Ration. Mech. Anal. 197 (2010), 539-598.
* [30] A. M. Ribeiro, E. Zappale, Relaxation of certain integral functionals depending on strain and chemical composition. Chin. Ann. Math. Ser. B 34 (2013), 491–514.
* [31] A. M. Ribeiro E. Zappale, Lower semicontinuous envelopes in $W^{1,1}\times L^{p},$ Banach Center Publications, 101 (2014), 187–206. Erratum: Lower semicontinuous envelopes in $W^{1,1}\times L^{p}$ 101 (2014), online.
* [32] F. Rindler, G. Shaw, Liftings, Young measures, and lower semicontinuity. Arch. Ration. Mech. Anal. 232 (2019), 1227-1328.
* [33] W.P. Ziemer: Weakly differentiable functions. Springer-Verlag, New York, 1989.
| arxiv-papers | 2021-07-27T09:19:50 | 2024-09-04T03:07:21.055296 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Stefan Kr\\\"omer, Martin Kru\\v{z}\\'ik, Elvira Zappale",
"submitter": "Martin Kru\\v{z}\\'ik",
"url": "https://arxiv.org/abs/2107.12687"
} |
2107.12688 |
We present some “in silico” experiments to design combined chemo- and immunotherapy treatment schedules. We introduce a new framework by combining flatness-based control, which is a model-based setting, along with model-free control. The flatness property of the used mathematical model yields straightforward reference trajectories. They provide us with the nominal open-loop control inputs. Closing the loop via model-free control allows to deal with the uncertainties on the injected drug doses. Several numerical simulations illustrating different case studies are displayed. We show in particular that the considered health indicators are driven to the safe region, even for critical initial conditions. Furthermore, in some specific cases there is no need to inject chemotherapeutic agents.
iomedical control, cancer, nonlinear control, fault accommodation, flatness-based control, model-free control, shooting method.
§ INTRODUCTION
We consider drug injections scheduling for cancer treatments from a control point of view (see, e.g., Chap. 10 in [Padmanabhan et al., 2021] for bibliographical references). Among the many models which have been used, those stemming from an earlier work of [Stepanova, 1979] are quite popular. Most appealing are several publications by d'Onofrio and different coauthors: see especially [d'Onofrio et al., 2012]. Such approaches to chemo- and immunotherapy led in recent years to promising control-theoretic investigations: see, e.g., [Alamir, 2014]; [Schättler & Ledzewicz, 2015] and references therein; [Moussa et al., 2020, Sharifi et al., 2017, Sharifi et al., 2020]. They employ various optimization techniques which are related to optimal control, model predictive control, and robust control.
We explore here another route via tools which are combined here for the first time, although they both gave rise to an abundant literature in control engineering:
* Flatness-based control (see [Fliess et al., 1995, Fliess et al., 1999]; and [Sira-Ramírez & Agrawal, 2004, Lévine, 2009, Rudolph, 2021]) is a model-based approach which has been well received in many industrial domains. See, e.g., [Bonnabel & Clayes, 2020] for tower cranes.
* Besides being useful in concrete case-studies (see, e.g., [Amasyali et al., 2020, Park & Olama, 2021, Park et al., 2021, Telsang et al., 2021, Tumin et al., 2021] for energy management), model-free control in the sense of [Fliess & Join, 2013, Fliess & Join, 2021] has already been illustrated in biomedicine ([MohammadRidha et al., 2018, Bara et al., 2018, Faraji et al. , 2021]) and in bioengineering ([Truong et al., 2021]). Note that the terminology “model-free control” has been used many times with different definitions: see [Chareyron & Alamir, 2009] in oncology.
Our virtual patient is modeled through two ordinary differential equations presented by [d'Onofrio et al., 2012]. This system is trivially flat with obvious flat outputs. The design of suitable reference trajectories with the corresponding open-loop controls becomes straightforward. A major source of uncertainty, according to [Sharifi et al., 2020], is the unknown fluctuation of the drug delivery to the tumor, which should be related to actuators faults, i.e., to a classic topic in fault-tolerant control (see, e.g., [Noura et al., 2015]). It has been already noticed that model-free control is well-suited for dealing with actuators faults: see [Fliess & Join, 2013] for an academic example and [Lafont et al., 2015] for a concrete case-study. The loop is therefore closed via model-free control. Let us emphasize the following points:
* The computer implementation is easy.
* Only a low computing cost is necessary.
* Some scenarios, i.e., in silico experiments, lead to unexpected results. They might attract cancerologists.
Our paper is organized as follows. Section <ref> presents the dynamical model of the virtual patient, Section <ref> reviews briefly flatness-based control, and model-free control. Numerical simulations are presented in Section <ref>. Section <ref> contains some suggestions for for future research on: 1) the possible medical impact of our in silico experiments, 2) some aspects related to systems biology, 3) new control paradigmes which might be derived from the methods developed here.
See [Fliess et al., 2021] for a first draft.
§ VIRTUAL PATIENT DYNAMICAL MODEL
We consider the model presented in [d'Onofrio et al., 2012]
\begin{eqnarray}
\label{1}
\dot x &= -\mu_C x\ln\left(\frac{x}{x_\infty}\right)-\gamma xy - xu\eta_x \\
\label{2}
\dot y &= \mu_I\left(x-\beta x^2\right)y-\delta y+\alpha+ yv\eta_y
\end{eqnarray}
$x$, $y$ are, respectively, the number of tumor cells and the immune cell density; the control variables $u$ and $v$ are the cytotoxic and immune-stimulation drugs; the parameters $\mu_C$, $\mu_I$, $\alpha$, $\gamma$, $\delta$, $x_\infty$ are positive. The terms $\eta_x$, $\eta_y$, $0 \leq \eta_x \leq 1$, $0 \leq \eta_y \leq 1$, are inspired by [Sharifi et al., 2020]: they represent the uncertain and fluctuating parts of drugs which are delivered to the tumor. The definition as well as the numerical values of these parameters can be found in Table <ref>.
Parameter Definition Numerical Value
${\mu_{C}}$ tumor growth rate $1.0078\cdot10^{7}$ cells/day
${\mu_{I}}$ tumor stimulated proliferation rate .0029 ${day^{-1}}$
${\alpha}$ rate of immune cells influx .0827 ${day^{-1}}$
${\beta}$ inverse threshold .00.31
${\gamma}$ interaction rate $1\cdot10^{7}$ cells/day
${\delta}$ death rate .1873 ${day^{-1}}$
${\eta_X}$ chemotherapeutic killing parameter $1\cdot10^{7}$ cells/day
${\eta_Y}$ immunotherapy injection parameter $1\cdot10^{7}$ cells/day
${x_{\infty}}$ fixed carrying capacity $780 \cdot10^{6}$ cells
This system has three equilibria corresponding to $\dot{x} = \dot{y} = u = v =0$:
* a locally stable equilibrium $x = 73$, $y = 1.32$ which corresponds to a benign case;
* an unstable saddle point $x = 356.2$, $y = 0.439$, which separates the benign and malignant regions;
* a locally stable equilibrium $x = 737.3$, $y = 0.032$, which is malignant.
The idea behind controlling such systems consists in driving the state trajectories from the region of attraction of the malignant equilibrium (critical case) to the region of attraction of the benign equilibrium. The simulations that are presented in this paper will show that the state trajectories are driven to the benign equilibrium under control action (drug delivery) for different settings.
§ CONTROL METHODOLOGY
§.§ Flatness property
A control system with $m$ independent control variables is said to be (differentially) flat if, and only if, there exists $m$ system variables $y_1, \dots, y_m$, the flat outputs, such that any system variable $z$, the control variables for instance, may be expressed as a differential function of $y_1, \dots, y_m$, i.e., $z = \Phi (y_1, \dots, y_m, \dots, y_1^{(\nu_1)}, \dots, y_m^{(\nu_m)})$, where the derivation orders $\nu_1, \dots, \nu_m$ are finite. A linear system is flat if, and only if, it is controllable. Thus flatness may be viewed as another extension of Kalman's controllability.
Equations (<ref>)-(<ref>) yield
\begin{eqnarray*}
\label{3}
u &= \frac{\dot x + \mu_C x\ln\left(\frac{x}{x_\infty}\right) + \gamma xy}{- x\eta_x} = X(x, \dot{x}, y) \\
\label{4}
v &= \frac{\dot y - \mu_I\left(x-\beta x^2\right)y + \delta y - \alpha}{y\eta_y} = Y(y, \dot{y}, x)
\end{eqnarray*}
The above equations show immediately that System (<ref>)-(<ref>) is flat; $x$, $y$ are flat outputs.
§.§ Reference trajectory and nominal open-loop control
One of the main benefits of flatness is the possibility of easily deriving a suitable reference trajectory and the corresponding nominal open-loop control. For a given reference trajectory $x^\star(t)$, $y^\star(t)$, the corresponding nominal control variables
\begin{eqnarray}
\label{shoot1}
u^\star (t) &= X(x^\star (t), \dot{x}^\star (t), y^\star (t)) \\
\label{shoot2}
v^\star (t) &= Y(y^\star (t), \dot{y}^\star (t), x^\star (t))
\end{eqnarray}
might exhibit unacceptable negative values. Define therefore the nominal open-loop control variables
\begin{eqnarray*}
u_{\rm OL}(t) &= u^\star (t) \, {\rm if} \, u^\star (t) \geq 0, \; u_{\rm OL}(t) = 0 \, {\rm if} \, u^\star (t) < 0 \\
v_{\rm OL}(t) &= v^\star (t) \, {\rm if} \, v^\star (t) \geq 0, \; v_{\rm OL}(t) = 0 \, {\rm if} \, v^\star (t) < 0
\end{eqnarray*}
§.§ Closing the loop via model-free control
From a control-engineering standpoint the terms $\eta_x$ and $\eta_y$ should be related to actuators faults. Introduce therefore the two “decoupled” ultra-local models ([Fliess & Join, 2013, Lafont et al., 2015]):
\dot{z}_x = F_x + \alpha_x u_{\rm MFC}, \ \dot{z}_y = F_y + \alpha_y v_{\rm MFC}
where $z_x = x - x^\star$, $z_y = y - y^\star$ are the tracking errors; $\alpha_x$ (resp. $\alpha_y$) is a constant parameter which is chosen by the practitioner such that $\dot{x}$ and $\alpha_x u$ (resp. $\dot{y}$ and $\alpha_y v$) are of the same order of magnitude; $F_x$ and $F_y$, which are data-driven, subsume the poorly known structures and disturbances. A real-time estimation ([Fliess & Join, 2013]) of $F_x$, $F_y$ are given by
$$F_x^{\rm est} = - \frac{6}{\tau_x^{3}} \int_{t-\tau_x}^t \left( (t-2\sigma)x(\sigma) + \alpha_x \sigma(\tau_x - \sigma)u_{\rm MFC}(\sigma)\right)d\sigma$$
$$F_y^{\rm est} = - \frac{6}{\tau_y^{3}} \int_{t-\tau_y}^t \left( (t-2\sigma)y(\sigma) + \alpha_y \sigma(\tau_y - \sigma)v_{\rm MFC}(\sigma)\right)d\sigma$$
where $\tau_x, \tau_y > 0$ are “small.” Close the loop via an intelligent Proportional controller, or iP,
$$u_{\rm MFC} = - \frac{F_x^{\rm est} + K_{x, P} z_x}{\alpha_x}, \ v_{\rm MFC} = - \frac{F_y^{\rm est} + K_{y, P} z_y}{\alpha_y}$$
where $K_{x, P}, K_{y, P} > 0$. From $\dot{z}_x + K_{x, P} z_x = 0$, $\dot{z}_y + K_{y, P} z_y = 0$, it follows that those two gains ensure local stability around the reference trajectory.
The close-loop controls $u_{\rm CL}$, $v_{\rm CL}$ may now be defined:
* If $u_{\rm OL} + u_{\rm MFC} \geq 0$, then $u_{CL} = u_{\rm OL} + u_{\rm MFC}$; if $u_{\rm OL} + u_{\rm MFC} < 0$, then $u_{\rm CL} = 0$.
* If $v_{\rm OL} + v_{\rm MFC} \geq 0$, then $v_{CL} = v_{\rm OL} + v_{\rm MFC}$; if $v_{\rm OL} + v_{\rm MFC} < 0$, then $v_{\rm CL} = 0$.
§ NUMERICAL SIMULATIONS
§.§ Presentation
§.§.§ A shooting method
A huge number in silico experiments have been most easily performed via the flatness property, i.e., via Formulae (<ref>)-(<ref>). It permits to select the most suitable ones with respect to boundary conditions, optimality criteria and constraints. Our approach might appear therefore as an alternative to the shooting methods in optimal control and numerical analysis (see, e.g., [Carraro et al., 2015, Pellegrini & Russell, 2020]).
§.§.§ Time sampling and duration
The duration of an experiment is $60$ days. The time sampling interval is equal to $30$ minutes.
The total simulations duration is 60 days, even though the figures are limited to 30 days for visibility reasons, since all the variables reach a steady state at this time.
§.§ Closed-loop and total amount of drugs
Set $\eta_x = \eta_y = 0.5$. This nominal value might be large according to [Sharifi et al., 2020]. Figures <ref> and <ref> display two experiments with the same initial point $x = 500$, $y = 0.5$, which lies in the attraction region of the malignant equilibrium. The total amounts of injected drugs, which are often considered as important constraints, are given by the two integrals $\int_0^T u_{\rm CL}(\tau) d\tau$, $\int_0^T v_{\rm CL}(\tau) d\tau$, where $T$ is the experiment duration. Figure <ref> indicates that the quantity of drugs injected during the slow scenario is lower than in the fast one. This outcome ought to be discussed in oncology.
§.§ Other scenarios
§.§.§ Same initial point.
Here $\eta_x = 0.31$, $\eta_y = 0.75$ are supposed to be unknown. Use the same nominal parameters as in Section <ref>, and the feedback loop of Section <ref>, with $\alpha_x = - 10000$, $\alpha_y = 1$, $K_{x, P} = 100$, $K_{y, P} = 10$. The results depicted in Figures <ref> and <ref> show that the benign equilibrium is reached after a short period of time.
§.§.§ New initial point.
The virtual patient is in a critical state, i.e., the initial state $x = 770$, $y = 0.1$ is close to the malignant equilibrium. The time variation of $\eta_x$ and
$\eta_y$, which are displayed in Figure <ref>, are assumed to be unknown. It is possible to cure the virtual patient without the cytotoxic drug, i.e., $u_{\rm CL} \equiv 0$. Figure <ref>, which should be of interest for concerologists, exhibits a convergence to the benign equilibrium with some oscillations perhaps due to the violent fluctuations of $\eta_y$. The quality of the open loop behavior in Figure <ref> is lower.
§ CONCLUSION
§.§ Main goal
Some results encountered with our computer experiments might question oncologists:
* the quantity of injected drug might be lower in some slow scenario than in the corresponding fast one;
* there are critical situations where only immunotherapy matters: the cytotoxic drugs are useless.
Those startling calculations need of course to be further analyzed.
§.§ Systems Biology
In the spirit of Systems Biology (see, e.g., [Del Vecchio & Murray , 2015]), let us suggest the the following research tracks:
* Examine parameter identification in Equation (<ref>).
* Flatness-based control might be helpful elsewhere: 1) Another model due to [Hahnfeldt et al., 1999] has also been investigated from a control-theoretic perspective (see, e.g., [Kovács et al., 2014], [Schättler & Ledzewicz, 2015] and references therein, [Cacace et al., 2018]). It is easy to check that it is flat; 2) the unicycle in [Sharifi et al., 2020], which is used as a nanorobot for drug delivery, is well known to be flat.
§.§ New control paradigms?
The control strategy which has been developed here for oncological in silico experiments might lead to new paradigms:
* Assume that we have a flat nominal system with some important uncertainties. Use open-loop flatness-based techniques. Close the loop via model-free control. What's about flatness-based control of partial differential equations (see, e.g., [Rudolph, 2003, Meurer, 2013]; and references therein)?
* Investigate possible connections with Active Disturbance Rejection Control, or ADRC, as presented by [Sira-Ramírez et al., 2017].
[Alamir, 2014]
Alamir M. (2014).
Robust feedback design for combined therapy of cancer.
Optim. Control Appl. Meth., 35, 77-88.
[Amasyali et al., 2020]
Amasyali K., Chen Y., Telsang B., Olama M., Djouadi S.M. (2020).
Hierarchical model-free transactional control of building loads to support grid services.
IEEE Access, 8, 219367-219377.
[Bara et al., 2018]
Bara O., Fliess M., Join C., Day J., Djouadi S.M. (2018).
Toward a model-free feedback control synthesis for treating acute inflammation.
J. Theoret. Bio., 448, 26-37.
[Bonnabel & Clayes, 2020]
Bonnabel S., Clayes X. (2020).
The industrial control of tower cranes: An operator-in-the-loop approach.
IEEE Contr. Syst. Magaz., 40, 27-39.
[Cacace et al., 2018]
Cacace F., Cusimano V., Germani A., Palumbo A., Papa F. (2018).
Closed-loop control of tumor growth by means of anti-angiogenic administration.
Math. Biosci. Engin., 15, 827-839.
[Carraro et al., 2015]
Carraro T., Geiger M., Körkel S., Rannacher R. (Eds) (2015).
Multiple Shooting and Time Domain Decomposition Methods.
[Chareyron & Alamir, 2009]
Chareyron S., Alamir M. (2009).
Model-free feedback design for a mixed cancer therapy.
Biotech. Progr., 25, 690-700.
[Del Vecchio & Murray , 2015]
Del Vecchio M., Murray R.M. (2015).
Biomolecular Feedback Systems.
Princeton University Press.
[Faraji et al. , 2021]
Faraji B., Gheisarnejad M., Rouhollahi K., Esfahani Z., Khooban M.H. (2021).
Machine learning approach based on ultra-local model control for treating cancer pain.
IEEE Sensors J., 21, 8245-8252.
[Fliess & Join, 2013]
Fliess M., Join C. (2013).
Model-free control.
Int. J. Contr., 86, 2228-2252.
[Fliess & Join, 2021]
Fliess M., Join C. (2021).
An alternative to proportional-integral and proportional-integral-derivative regulators: Intelligent proportional-derivative regulators.
Int. J. Robust Nonlinear Contr., 2021. https://doi.org/10.1002/rnc.5657
[Fliess et al., 2021]
Fliess M., Join C., Moussa K., Djouadi S.M., Alsager M. (2021).
Preliminary in silico experiments: Towards new cancer treatments?
bioRxiv, https://doi.org/10.1101/2021.04.06.438636
[Fliess et al., 1995]
Fliess M., Lévine J., Martin P., Rouchon P. (1995).
Flatness and defect of non-linear systems: introductory theory and examples.
Int. J. Contr., 61, 1327-1361.
[Fliess et al., 1999]
Fliess M., Lévine J., Martin P., Rouchon P. (1999).
A Lie-Bäcklund approach to equivalence and flatness of nonlinear systems.
IEEE Trans. Automat. Contr., 44, 922-937.
[Hahnfeldt et al., 1999]
Hahnfeldt P., Panigrahy D., Folkman J., Hlatky L. (1999).
Tumor development under angiogenic signaling: A dynamical theory of tumor growth, treatment response, and postvascular dormancy.
Cancer Res., 59, 4770-4775.
[Kovács et al., 2014]
Kovács L., Szeles A., Sápi J., Drexler D.A., Rudas I., Harmati I., Sápi Z. (2014).
Model-based angiogenic inhibition of tumor growth using modern robust control method.
Comput. Meth. Program. Biomed., 114, e98-e110.
[Lafont et al., 2015]
Lafont F., Balmat J.-F., Pessel N., Fliess M. (2015).
A model-free control strategy for an experimental greenhouse with an application to fault accommodation.
Comput. Electron. Agricult., 110, 139-149.
[Meurer, 2013]
Meurer T. (2013).
Control of Higher-Dimensional PDEs – Flatness and Backstepping Designs.
[Lévine, 2009]
Lévine J. (2009).
Analysis and Control of Nonlinear Systems: A Flatness-based Approach.
[MohammadRidha et al., 2018]
MohammadRidha T., Ait-Ahmed M., Chaillous L., Krempf M., Guilhem I., Poirier J.Y., Moog C.H. (2018).
Model free iPID control for glycemia regulation of type-1 diabetes.
IEEE Trans. Biomed. Eng., 65, 199-206.
[Moussa et al., 2020]
Moussa K., Fiacchini M., Alamir M. (2020).
Robust optimal scheduling of combined chemo- and immunotherapy: Considerations on chemotherapy detrimental effects.
Amer. Contr. Conf., Denver.
[Noura et al., 2015]
Noura H., Theilliol D., Ponsart J.-C., Chamseddine A. (2009).
Fault-tolerant Control Systems: Design and Practical Applications.
[d'Onofrio et al., 2012]
d'Onofrio A., Ledzewicz U., Schättler H. (2012).
On the dynamics of tumor-immune system interactions and combined chemo- and immunotherapy.
A. d'Onofrio, P. Cerrai, A. Gandolfi (Eds.): New Challenges for Cancer Systems Biomedicine, Springer, pp. 249-266.
[Padmanabhan et al., 2021]
Padmanabhan R., Meskin N., Al Moustafa A.-I. (2021).
Mathematical Models of Cancer and Different Therapies – Unified Framework.
[Park & Olama, 2021]
Park B., Olama M. (2020).
A model-free voltage control approach to mitigate motor stalling and FIDVR for smart grids.
IEEE Trans. Smart Grid, 12, 67-78.
[Park et al., 2021]
Park B., Zhang Y., Olama M., Kuruganti T. (2021).
Model-free control for frequency response support in microgrids utilizing wind turbines.
Elec. Power Syst. Res., 194, 107080.
[Pellegrini & Russell, 2020]
Pellegrini E., Russell R.P. (2020).
A multiple-shooting differential dynamic programming algorithm. Part 1: Theory.
Acta Astronaut., 170, 686-700.
[Rudolph, 2003]
Rudolph J. (2003).
Flatness Based Control of Distributed Parameter Systems.
Shaker Verlag.
[Rudolph, 2021]
Rudolph J. (2021).
Flatness-Based Control: An Introduction.
Shaker Verlag.
[Schättler & Ledzewicz, 2015]
Schättler H., Ledzewicz U. (2015).
Optimal Control for Mathematical Models of Cancer: An Application of Geometric Methods.
Springer, 2015.
[Sharifi et al., 2017]
Sharifi N., Ozgoli S., Ramezani A. (2017).
Multiple model predictive control for optimal drug administration of mixed immunotherapy and chemotherapy of tumours.
Comput. Meth. Program. Biomed., 144, 13-19.
[Sharifi et al., 2020]
Sharifi N., Zhou Y., Holmes G., Chen Y. (2020a).
Overcoming channel uncertainties in touchable molecular communication for direct-drug-targeting-assisted immuno-chemotherapy.
IEEE Trans. Nanobiosci., 19, 249-258.
[Sharifi et al., 2020]
Sharifi N., Ali M., Holmes G., Chen Y. (2020b).
Blind obstacle avoidance using taxicab geometry for NanorobotAssisted direct drug targeting.
42nd Int. Conf. IEEE Engin. Med. Biol. Soc., Montreal.
[Sira-Ramírez & Agrawal, 2004]
Sira-Ramírez H., & Agrawal S.K. (2004).
Differentially Flat Systems.
Marcel Dekker.
[Sira-Ramírez et al., 2017]
Sira-Ramírez H., Luviano-Juárez A., Ramírez-Neria M., Zurita-Bustamante E.W. (2017).
Active Disturbance Rejection Control of Dynamic Systems – A Flatness-Based Approach.
[Stepanova, 1979]
Stepanova N.V. (1979).
Course of the immune reaction during the development of a malignant tumour (in Russian).
Biophysics, 24, 917-923.
[Telsang et al., 2021]
Telsang B., Amasyali K., Chen Y., Olama M., Djouadi S. (2021).
Power allocation by load aggregator with heterogeneous loads using weighted projection.
Energy Buildings, 242, 110955.
[Truong et al., 2021]
Truong C.T., Huynh K.H., Duong V.T., Nguyen H.H., Pham L.A., Nguyen T.T. (2021).
Model-free volume and pressure cycled control of automatic bag valve mask ventilator.
AIMS Bioengin., 8, 192-207.
[Tumin et al., 2021]
Tumin W., Olama M.M., Djouadi S.M. (2021).
Adaptive Control for Residential HVAC Systems to Support Grid Services.
IEEE Power Energ. Soc. Innov. Smart Grid Techno. Conf., Washington.
[Control $u$ (blue $--$) and Nominal control $u^\ast$ (black $- -$) ]
[Control $v$ (blue $--$) and Nominal control $v^\ast$ (black $- -$)]
[Output $x$ (blue $--$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)]
[Output $y$ (blue $--$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)]
Fast trajectory
[Control $u$ (blue $-$) and Nominal control $u^\ast$ (black $- -$) ]
[Control $v$ (blue $-$) and Nominal control $v^\ast$ (black $- -$)]
[Output $x$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)]
[Output $y$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)]
Slow trajectory
[Control $u$ integral of figure <ref>-(a)]
[Control $v$ integral of figure <ref>-(b)]
[Control $u$ integral of figure <ref>-(a)]
[Control $v$ integral of figure <ref>-(b)]
Comparison between total drug injections
[Control $u$ (blue $-$) and Nominal control $u^\ast$ (black $- -$) ]
[Control $v$ (blue $-$) and Nominal control $v^\ast$ (black $- -$)]
[Output $x$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)]
[Output $y$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)]
Unknown variation of $\eta_x$
[Control $u$ (blue $-$) and Nominal control $u^\ast$ (black $- -$) ]
[Control $v$ (blue $-$) and Nominal control $v^\ast$ (black $- -$)]
[Output $x$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)]
[Output $y$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)]
Unknown variation of $\eta_y$
[Control $u$ (blue $-$) and Nominal control $u^\ast$ (black $- -$) ]
[Control $v$ (blue $-$) and Nominal control $v^\ast$ (black $- -$)]
[Output $x$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)]
[Output $y$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)]
Very sick patient
[Control $u$ (blue $-$) and Nominal control $u^\ast$ (black $- -$) ]
[Control $v$ (blue $-$) and Nominal control $v^\ast$ (black $- -$)]
[Output $x$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)]
[Output $y$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)]
Open loop
[Time evolution of $\eta_x$]
[Time evolution of $\eta_y$]
Fluctuation of the drug delivery
| arxiv-papers | 2021-07-27T09:21:12 | 2024-09-04T03:07:21.073856 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Michel Fliess, C\\'edric Join, Kaouther Moussa, Seddik M. Djouadi,\n Mohamed W. Alsager",
"submitter": "Michel Fliess",
"url": "https://arxiv.org/abs/2107.12688"
} |
2107.12690 | # On the complete convergence for sequences of dependent random variables via
stochastic domination conditions and regularly varying functions theory
Nguyen Chi Dzunga and Lê Vǎn Thànhb CONTACT Lê Vǎn Thành. Email:
[email protected] aInstitute of Mathematics, Vietnam Academy of Science and
Technology, 18 Hoang Quoc Viet, Hanoi 10307, Vietnam
bDepartment of Mathematics, Vinh University, 182 Le Duan, Vinh, Nghe An,
Vietnam
###### Abstract
This note develops Rio’s proof [C. R. Math. Acad. Sci. Paris, 1995] of the
rate of convergence in the Marcinkiewicz–Zygmund strong law of large numbers
to the case of sums of dependent random variables with regularly varying
normalizing constants. It allows us to obtain a complete convergence result
for dependent sequences under uniformly bounded moment conditions. This result
is new even when the underlying random variables are independent. The main
theorems are applied to three different dependence structures: (i)
$m$-pairwise negatively dependent random variables, (ii) $m$-extended
negatively dependent random variables, and (iii) $\varphi$-mixing sequences.
To our best knowledge, the results for cases (i) and (ii) are the first
results in the literature on complete convergence for sequences of
$m$-pairwise negatively dependent random variables and $m$-extended negatively
dependent random variables under the optimal moment conditions even when
$m=1$. While the results for cases (i) and (iii) unify and improve many
existing ones, the result for case (ii) complements the main result of Chen et
al. [J. Appl. Probab., 2010]. Affirmative answers to open questions raised by
Chen et al. [J. Math. Anal. Appl., 2014] and Wu and Rosalsky [Glas. Mat. Ser.
III, 2015] are also given. An example illustrating the sharpness of the main
result is presented.
###### keywords:
Almost sure convergence; Complete convergence; Rate of convergence; Dependent
random variables; Stochastic domination; Regularly varying function
## 1 Introduction and motivations
The maximal inequalities play a crucial role in the proofs of the strong law
of large numbers (SLLN). Let $\\{X,X_{n},n\geq 1\\}$ be a sequence of pairwise
independent and identically distributed random variables. Etemadi [8] is the
first author who proved the Kolmogorov SLLN
$\lim_{n\to\infty}\dfrac{\sum_{i=1}^{n}(X_{i}-\mathbb{E}(X_{i}))}{n}=0\ \text{
almost surely (a.s.)}$
under optimal moment condition $\mathbb{E}(|X|)<\infty$ without using the
maximal inequalities. For $1<p<2$, Martĭkainen [12] proved that if
$\mathbb{E}(|X|^{p}\log^{\beta}(|X|))<\infty$ for some
$\beta>\max\\{0,4p-6\\}$, then the Marcinkiewicz–Zygmund SLLN holds, i.e.,
$\lim_{n\to\infty}\dfrac{\sum_{i=1}^{n}(X_{i}-\mathbb{E}(X_{i}))}{n^{1/p}}=0\
\text{ a.s. }$ (1)
As far as we know, Rio [13] is the first author who proved (1) under the
optimal moment condition $\mathbb{E}(|X|^{p})<\infty$. Since then, many sub-
optimal results on the Marcinkiewicz–Zygmund SLLN have been published. In
2014, Sung [15] proposed a different method and proved (1) under a nearly
optimal condition $\mathbb{E}(|X|^{p}(\log\log(|X|))^{2(p-1)})<\infty$. Here
and thereafter, $\log(x)$ denotes the natural logarithm (base $e$) of
$\max\\{x,e\\}$, $x\geq 0$. Very recently, da Silva [6, Corollary 1] used the
method proposed by Sung [15] to prove that if $\\{X,X_{n},n\geq 1\\}$ are
pairwise negatively dependent and identically distributed random variables and
$\mathbb{E}(|X|^{p})<\infty$, then
$\lim_{n\to\infty}\dfrac{\sum_{i=1}^{n}(X_{i}-\mathbb{E}(X_{i}))}{n^{1/p}(\log\log(n))^{2(p-1)/p}}=0\
\text{ a.s. }$ (2)
A very special case of our main result will show that the optimal condition
for (2) is
$\mathbb{E}\left(|X|^{p}/(\log\log(|X|))^{2(p-1)}\right)<\infty.$ (3)
Anh et al. [1] recently proved the Marcinkiewicz–Zygmund-type SLLN with the
norming constants of the forms $n^{1/p}\tilde{L}(n^{1/p}),\ n\geq 1$, where
$\tilde{L}(\cdot)$ is the Bruijn conjugate of a slowly varying function
$L(\cdot)$. However, the proof in [1] is based on a maximal inequality for
negatively associated random variables which is no longer available even for
pairwise independent random variables.
Although Rio’s result was extended by the second named author in Thành [16],
it only considered sums for pairwise independent identically distributed
random variables there. The motivation of the present note is that many other
dependence structures do not enjoy the Kolmogorov maximal inequality such as
pairwise negative dependence, extended negative dependence, among others.
Unlike Thành [16], we consider in this note the case where the underlying
sequence of random variables is stochastically dominated by a random variable
$X$. This allows us to derive the Baum–Katz-type theorem for sequences of
dependent random variables satisfying a uniformly bounded moment condition as
stated in the following results. To our best knowledge, Theorem 1.1 and
Corollary 1.2 are new even when the underlying sequence is comprise of
independent random variables. We note that, in Theorem 1.1 and Corollary 1.2,
no identical distribution condition or stochastic domination condition is
assumed.
###### Theorem 1.1.
Let $1\leq p<2$, and $\\{X_{n},n\geq 1\\}$ be a sequence of random variables.
Assume that there exists a universal constant $C$ such that
$\operatorname{Var}\left(\sum_{i=k+1}^{k+\ell}f_{i}(X_{i})\right)\leq
C\sum_{i=k+1}^{k+\ell}\operatorname{Var}(f_{i}(X_{i}))$ (4)
for all $k\geq 0,\ell\geq 1$ and all nondecreasing functions $f_{i}$, $i\geq
1$, provided the variances exist. Let $L(\cdot)$ be a slowly varying function
defined on $[0,\infty)$. When $p=1$, we assume further that $L(x)\geq 1$ and
is increasing on $[0,\infty)$. If
$\sup_{n\geq
1}\mathbb{E}\left(|X_{n}|^{p}L^{p}(|X_{n}|)\log(|X_{n}|)\log^{2}(\log(|X_{n}|))\right)<\infty,$
(5)
then for all $\alpha\geq 1/p$, we have
$\sum_{n=1}^{\infty}n^{\alpha p-2}\mathbb{P}\left(\max_{1\leq j\leq
n}\left|\sum_{i=1}^{j}(X_{i}-\mathbb{E}(X_{i}))\right|>\varepsilon
n^{\alpha}{\tilde{L}}(n^{\alpha})\right)<\infty\text{ for all }\varepsilon>0,$
(6)
where $\tilde{L}(\cdot)$ is the Bruijn conjugate of $L(\cdot)$.
Considering a special interesting case $\alpha=1/p$ and $L(x)\equiv 1$, we
obtain the following corollary.
###### Corollary 1.2.
Let $1\leq p<2$, and $\\{X_{n},n\geq 1\\}$ be a sequence of random variables
satisfying condition (4). If
$\sup_{n\geq
1}\mathbb{E}\left(|X_{n}|^{p}\log(|X_{n}|)\log^{2}(\log(|X_{n}|))\right)<\infty,$
(7)
then
$\sum_{n=1}^{\infty}n^{-1}\mathbb{P}\left(\max_{1\leq j\leq
n}\left|\sum_{i=1}^{j}(X_{i}-\mathbb{E}(X_{i}))\right|>\varepsilon
n^{1/p}\right)<\infty\text{ for all }\varepsilon>0.$ (8)
###### Remark 1.
* (i)
Since $\\{\max_{1\leq j\leq n}|\sum_{i=1}^{j}(X_{i}-\mathbb{E}(X_{i}))|,n\geq
1\\}$ is nondecreasing, it follows from (8) that (see, e.g., Remark 1 in
Dedecker and Merlevède [7]) SLLN (1) holds.
* (ii)
For SLLN under the uniformly bounded moment condition, Baxter et al [2] proved
(1) with assumptions that the sequence $\\{X_{n},n\geq 1\\}$ is independent
and $\sup_{n\geq 1}\mathbb{E}\left(|X_{n}|^{r}\right)<\infty\text{ for some
}r>p.$ This condition is much stronger than (7). Baxter et al. [2] studied the
SLLN for weighted sums which is more general than (1) but their method does
not give the rate of convergence like Corollary 1.2.
* (iii)
For sequence of pairwise independent identically distributed random variables
$\\{X,X_{n},n\geq 1\\}$, Chen et al. [4] obtained (8) under condition that
$\mathbb{E}(|X|^{p}(\log(|X|))^{r})<\infty$ for some $1<p<r<2$. We see that
with identical distribution assumption, this moment condition is still
stronger than (7).
* (iv)
Conditions (5) and (7) are very sharp and almost optimal. Even with assumption
that the underlying random variables are independent, a special case of
Example 3.3 in Section 3 shows that (8) may fail if (7) is weakened to
$\sup_{n\geq
1}\mathbb{E}\left(|X_{n}|^{p}\log(|X_{n}|)\log(\log(|X_{n}|))\right)<\infty.$
The rest of the paper is arranged as follows. Section 2 presents a complete
convergence result for sequences of dependent random variables with regularly
varying normalizing constants. The proof of Theorem 1.1 and an example
illustrating the sharpness of the result are presented in Section 3. Finally,
Section 4 contains corollaries and remarks comparing our results and the ones
in the literature.
## 2 Complete convergence for sequences of dependent random variables with
regularly varying normalizing constants
In this section, we will use the method in Rio [13] to obtain complete
convergence for sums of dependent random variables with regularly varying
constants under stochastic domination condition. The proof is similar to that
of Theorem 1 in Thành [16].
A family of random variables $\\{X_{i},i\in I\\}$ is said to be stochastically
dominated by a random variable $X$ if
$\sup_{i\in I}\mathbb{P}(|X_{i}|>t)\leq\mathbb{P}(|X|>t),\ \text{ for all
}t\geq 0.$ (9)
We note that many authors use an apparently weaker definition of
$\\{X_{i},i\in I\\}$ being stochastically dominated by a random variable $X$,
namely that
$\sup_{i\in I}\mathbb{P}(|X_{i}|>t)\leq C\mathbb{P}(|X|>t),\text{ for all
}t\geq 0$ (10)
for some constant $C\in(0,\infty)$. However, it is shown by Rosalsky and Thành
[14] that (9) and (10) are indeed equivalent.
Let $\rho\in\mathbb{R}$. A real-valued function $R(\cdot)$ is said to be
regularly varying (at infinity) with index of regular variation $\rho$ if it
is a positive and measurable function on $[A,\infty)$ for some $A>0$, and for
each $\lambda>0$,
$\lim_{x\to\infty}\dfrac{R(\lambda x)}{R(x)}=\lambda^{\rho}.$
A regularly varying function with the index of regular variation $\rho=0$ is
called slowly varying (at infinity). If $L(\cdot)$ is a slowly varying
function, then by Theorem 1.5.13 in Bingham et al. [3], there exists a slowly
varying function $\tilde{L}(\cdot)$, unique up to asymptotic equivalence,
satisfying
$\lim_{x\to\infty}L(x)\tilde{L}\left(xL(x)\right)=1\ \text{ and
}\lim_{x\to\infty}\tilde{L}(x)L\left(x\tilde{L}(x)\right)=1.$ (11)
The function $\tilde{L}$ is called the de Bruijn conjugate of $L$, and
$\left(L,\tilde{L}\right)$ is called a (slowly varying) conjugate pair (see,
e.g., p. 29 in Bingham et al. [3]). If $L(x)=\log^{\gamma}(x)$ or
$L(x)=\log^{\gamma}\left(\log(x)\right)$ for some $\gamma\in\mathbb{R}$, then
$\tilde{L}(x)=1/L(x)$. Especially, if $L(x)\equiv 1$, then $\tilde{L}(x)\equiv
1$.
Here and thereafter, for a slowly varying function $L(\cdot)$, we denote the
de Bruijn conjugate of $L(\cdot)$ by $\tilde{L}(\cdot)$. Throughout, we will
assume that $L(x)$ and $\tilde{L}(x)$ are both continuous on $[0,\infty)$ and
differentiable on $[A,\infty)$ for some $A>0$. We also assume that (see Lemma
2.2 in Anh et al. [1])
$\lim_{x\to\infty}\dfrac{xL^{\prime}(x)}{L(x)}=0.$ (12)
###### Theorem 2.1.
Let $1\leq p<2$, and $\\{X_{n},n\geq 1\\}$ be a sequence of random variables
satisfying condition (4). Let $L(\cdot)$ be as in Theorem 1.1. If
$\\{X_{n},\,n\geq 1\\}$ is stochastically dominated by a random variable $X$,
and
$\mathbb{E}\left(|X|^{p}L^{p}(|X|)\right)<\infty,$ (13)
then for all $\alpha\geq 1/p$, we have
$\sum_{n=1}^{\infty}n^{\alpha p-2}\mathbb{P}\left(\max_{1\leq j\leq
n}\left|\sum_{i=1}^{j}(X_{i}-\mathbb{E}(X_{i}))\right|>\varepsilon
n^{\alpha}{\tilde{L}}(n^{\alpha})\right)<\infty\text{ for all }\varepsilon>0.$
(14)
We only sketch the proof of Theorem 2.1 and refer the reader to the proof of
Theorem 1 in Thành [16] for details. The main difference here is that we have
to consider the nonnegative random variables so that after applying certain
truncation techniques (see (15) and (16) below), the new random variables
still satisfy condition (4).
###### Sketch proof of Theorem 2.1.
Since $\\{X_{n}^{+},n\geq 1\\}$ and $\\{X_{n}^{-},n\geq 1\\}$ satisfy the
assumptions of the theorem and $X_{n}=X_{n}^{+}-X_{n}^{-},n\geq 1$, without
loss of generality we can assume that $X_{n}\geq 0$ for all $n\geq 1$. For
$n\geq 1$, set
$b_{n}=\begin{cases}n^{\alpha}\tilde{L}\left(A^{\alpha}\right)&\text{ if
}0\leq n<A,\\\ n^{\alpha}\tilde{L}\left(n^{\alpha}\right)&\text{ if }n\geq
A,\\\ \end{cases}$ $X_{i,n}=X_{i}\mathbf{1}(X_{i}\leq
b_{n})+b_{n}\mathbf{1}(X_{i}>b_{n}),\ 1\leq i\leq n,$ (15)
and
$Y_{i,m}=\left(X_{i,2^{m}}-X_{i,2^{m-1}}\right)-\mathbb{E}\left(X_{i,2^{m}}-X_{i,2^{m-1}}\right),\
m\geq 1,\ i\geq 1.$ (16)
It is easy to see that $b_{n}$ is strictly increasing and (14) is equivalent
to
$\sum_{n=1}^{\infty}2^{n(\alpha p-1)}\mathbb{P}\left(\max_{1\leq
j<2^{n}}\left|\sum_{i=1}^{j}(X_{i}-\mathbb{E}(X_{i}))\right|>\varepsilon
b_{2^{n}}\right)<\infty\text{ for all }\varepsilon>0.$ (17)
It follows from stochastic domination condition and definition of $b_{n}$ that
$\begin{split}0\leq\mathbb{E}\left(X_{i,2^{m}}-X_{i,2^{m-1}}\right)&\leq\mathbb{E}\left(|X|\mathbf{1}(|X|>b_{2^{m-1}})\right).\end{split}$
(18)
Using (18) and the same argument as in Thành [16, Equation (23)], the proof of
(17) will be completed if we can show that
$\sum_{n=1}^{\infty}2^{n(\alpha p-1)}\mathbb{P}\left(\max_{1\leq
j<2^{n}}\left|\sum_{i=1}^{j}(X_{i,2^{n}}-\mathbb{E}(X_{i,2^{n}}))\right|\geq\varepsilon
b_{2^{n-1}}\right)<\infty\text{ for all }\varepsilon>0.$ (19)
For $m\geq 0,$ set $S_{0,m}=0$ and
$S_{j,m}=\sum_{i=1}^{j}(X_{i,2^{m}}-\mathbb{E}\left(X_{i,2^{m}}\right)),\
j\geq 1.$
For $1\leq j<2^{n}$ and for $0\leq m\leq n$, let $k_{j,m}=\lfloor
j/2^{m}\rfloor$ be the greatest integer which is less than or equal to
$j/2^{m}$, $j_{m}=k_{j,m}2^{m}$. Then (see Thành [16, Equation (28)])
$\begin{split}\max_{1\leq
j<2^{n}}\left|S_{j,n}\right|&\leq\sum_{m=1}^{n}\max_{0\leq
k<2^{n-m}}\left|\sum_{i=k2^{m}+1}^{k2^{m}+2^{m-1}}\left(X_{i,2^{m-1}}-\mathbb{E}(X_{i,2^{m-1}})\right)\right|\\\
&\quad+\sum_{m=1}^{n}\max_{0\leq
k<2^{n-m}}\left|\sum_{i=k2^{m}+1}^{(k+1)2^{m}}Y_{i,m}\right|+\sum_{m=1}^{n}2^{m+1}\mathbb{E}\left(|X|\mathbf{1}(|X|>b_{2^{m-1}})\right).\end{split}$
(20)
Combining (4), (15) and (16), we have for all $m\geq 1$,
$\mathbb{E}\left(\sum_{i=k+1}^{k+\ell}X_{i,2^{m-1}}-\mathbb{E}(X_{i,2^{m-1}})\right)^{2}\leq
C\sum_{i=k+1}^{k+\ell}\mathbb{E}(X_{i,2^{m-1}}^{2}),\ k\geq 0,\ell\geq 1.$
(21)
and
$\mathbb{E}\left(\sum_{i=k+1}^{k+\ell}Y_{i,m}\right)^{2}\leq
C\sum_{i=k+1}^{k+\ell}\mathbb{E}(Y_{i,m}^{2}),\ k\geq 0,\ell\geq 1.$ (22)
By using (20)–(22), and the argument as in pages 1236-1238 in Thành [16], we
obtain (19).
∎
The next proposition shows that the moment condition in (13) in Theorem 2.1 is
optimal. The proof is the same as that of the implication (iv)$\Rightarrow$(i)
of Theorem 3.1 in Anh et al. [1]. We omit the details.
###### Proposition 2.2.
Let $1\leq p<2$, and let $\\{X_{n},\,n\geq 1\\}$ be a sequence of identically
distributed random variables satisfying (4), $L(\cdot)$ as in Theorem 1.1. If
for some constant $c$,
$\sum_{n=1}^{\infty}n^{-1}\mathbb{P}\left(\max_{1\leq j\leq
n}\left|\sum_{i=1}^{j}(X_{i}-c)\right|>\varepsilon
n^{1/p}{\tilde{L}}(n^{1/p})\right)<\infty\text{ for all }\varepsilon>0,$ (23)
then $\mathbb{E}\left(|X_{1}|^{p}L^{p}(|X_{1}|)\right)<\infty$ and
$\mathbb{E}(X_{1})=c$.
## 3 On the stochastic domination condition via regularly varying functions
In this section, we will present a result on the stochastic domination
condition via regularly varying functions theory, and use it to prove Theorem
1.1. We need the following simple lemma. See Rosalsky and Thành [14] for a
proof.
###### Lemma 3.1.
Let $g:[0,\infty)\to[0,\infty)$ be a measurable function with $g(0)=0$ which
is bounded on $[0,A]$ and differentiable on $[A,\infty)$ for some $A\geq 0$.
If $\xi$ is a nonnegative random variable, then
$\begin{split}\mathbb{E}(g(\xi))&=\mathbb{E}(g(\xi)\mathbf{1}(\xi\leq
A))+g(A)+\int_{A}^{\infty}g^{\prime}(x)\mathbb{P}(\xi>x)\mathrm{d}x.\end{split}$
(24)
###### Proposition 3.2.
Let $\\{X_{i},i\in I\\}$ be a family of random variables, and $L(\cdot)$ a
slowly varying function. If
$\sup_{i\in
I}\mathbb{E}\left(|X_{i}|^{p}L(|X_{i}|)\log(|X_{i}|)\log^{2}(\log(|X_{i}|))\right)<\infty\
\text{ for some }p>0,$ (25)
then there exists a nonnegative random variable $X$ with distribution function
$F(x)=1-\sup_{i\in I}\mathbb{P}(|X_{i}|>x),\ x\in\mathbb{R}$ such that
$\\{X_{i},i\in I\\}$ is stochastically dominated by $X$ and
$\mathbb{E}\left(X^{p}L(X)\right)<\infty.$ (26)
###### Proof.
By (25) and Theorem 2.5 (i) of Rosalsky and Thành [14], we get that
$\\{X_{i},i\in I\\}$ is stochastically dominated by a nonnegative random
variable $X$ with distribution function
$F(x)=1-\sup_{i\in I}\mathbb{P}(|X_{i}|>x),\ x\in\mathbb{R}.$
Let
$g(x)=x^{p}L(x)\log(x)\log^{2}(\log(x)),\ h(x)=x^{p}L(x),\ x\geq 0.$
Applying (12), there exists $B$ large enough such that $g(\cdot)$ and
$h(\cdot)$ are strictly increasing on $[B,\infty)$, and
$\left|\dfrac{xL^{\prime}(x)}{L(x)}\right|\leq\dfrac{p}{2},\ x>B.$
Therefore,
$h^{\prime}(x)=px^{p-1}L(x)+x^{p}L^{\prime}(x)=x^{p-1}L(x)\left(p+\dfrac{xL^{\prime}(x)}{L(x)}\right)\leq\dfrac{3px^{p-1}L(x)}{2},\
x>B.$ (27)
By Lemma 3.1, (25) and (27), there exists a constant $C_{1}$ such that
$\begin{split}\mathbb{E}(h(X))&=\mathbb{E}(h(X)\mathbf{1}(X\leq
B))+h(B)+\int_{B}^{\infty}h^{\prime}(x)\mathbb{P}(X>x)\mathrm{d}x\\\ &\leq
C_{1}+\dfrac{3p}{2}\int_{B}^{\infty}x^{p-1}L(x)\mathbb{P}(X>x)\mathrm{d}x\\\
&=C_{1}+\dfrac{3p}{2}\int_{B}^{\infty}x^{p-1}L(x)\sup_{i\in
I}\mathbb{P}(|X_{i}|>x)\mathrm{d}x\\\ &\leq
C_{1}+\dfrac{3p}{2}\int_{B}^{\infty}x^{-1}\log^{-1}(x)\log^{-2}(\log(x))\sup_{i\in
I}\mathbb{E}\left(g(|X_{i}|)\right)\mathrm{d}x\\\
&=C_{1}+\dfrac{3p}{2}\sup_{i\in
I}\mathbb{E}\left(g(|X_{i}|)\right)\int_{B}^{\infty}x^{-1}\log^{-1}(x)\log^{-2}(\log(x))\mathrm{d}x\\\
&<\infty.\end{split}$
The proposition is proved. ∎
###### Remark 2.
The contribution of the slowly varying function $L(x)$ in Proposition 3.2 help
us to unify Theorem 2.5 (ii) and (iii) of Rosalsky and Thành [14]. Letting
$L(x)=\log^{-1}(x)\log^{-2}(\log(x))$, $x\geq 0$, then by Proposition 3.2, the
condition
$\sup_{i\in I}\mathbb{E}\left(|X_{i}|^{p}\right)<\infty\ \text{ for some
}p>0,$
implies that the family $\\{X_{i},i\in I\\}$ is stochastically dominated by a
nonnegative random variable $X$ satisfying
$\mathbb{E}\left(X^{p}\log^{-1}(X)\log^{-2}(\log(X))\right)<\infty.$
This slightly improves Theorem 2.5 (ii) in Rosalsky and Thành [14]. Similarly,
by letting $L(x)=1$, we obtain an improvement of Theorem 2.5 (iii) in Rosalsky
and Thành [14].
###### Proof of Theorem 1.1.
Applying Proposition 3.2, we have from (5) that the sequence $\\{X_{n},n\geq
1\\}$ is stochastically dominated by a nonnegative random variable $X$ with
$\mathbb{E}\left(X^{p}L^{p}(X)\right)<\infty.$
Applying Theorem 2.1, we immediately obtain (6). ∎
The following example illustrates the sharpness of Theorem 1.1 (and Corollary
1.2). It shows that in Theorem 1.1, (6) may fail if (5) is weakened to
$\sup_{n\geq
1}\mathbb{E}\left(|X_{n}|^{p}L^{p}(|X_{n}|)\log(|X_{n}|)\log(\log(|X_{n}|))\right)<\infty.$
(28)
###### Example 3.3.
Let $1\leq p<2$ and $L(\cdot)$ be a positive slowly varying function such that
$g(x)=x^{p}L^{p}(x)$ is strictly increasing on $[A,\infty)$ for some $A>0$.
Let $B=\lfloor A+g(A)\rfloor+1$, $h(x)$ be the inverse function of $g(x)$,
$x\geq B$, and let $\\{X_{n},n\geq B\\}$ be a sequence of independent random
variables such that for all $n\geq B$
$\mathbb{P}(X_{n}=0)=1-\dfrac{1}{n\log(n)\log(\log(n))},\
\mathbb{P}\left(X_{n}=\pm h(n)\right)=\dfrac{1}{2n\log(n)\log(\log(n))}.$
By (11), we can choose (unique up to asymptotic equivalence)
$\tilde{L}(x)=\dfrac{h(x^{p})}{x},\ x\geq B.$
Since $\tilde{L}(\cdot)$ is a slowly varying function,
$\log(\tilde{L}(n^{1/p}))=o\left(\log(n)\right),$
and so
$\log(h(n))=\log\left(n^{1/p}\tilde{L}(n^{1/p})\right)=\dfrac{1}{p}\log(n)+o(\log(n)).$
It thus follows that
$\begin{split}&\sup_{n\geq
1}\mathbb{E}\left(|X_{n}|^{p}L^{p}(|X_{n}|)\log(|X_{n}|)\log^{2}(\log(|X_{n}|))\right)\\\
&=\sup_{n\geq
1}\mathbb{E}\left(g(|X_{n}|)\log(|X_{n}|)\log^{2}(\log(|X_{n}|))\right)\\\
&=\sup_{n\geq
1}\dfrac{\log(h(n))\log^{2}(\log(h(n)))}{\log(n)\log(\log(n))}=\infty,\end{split}$
and
$\begin{split}&\sup_{n\geq
1}\mathbb{E}\left(|X_{n}|^{p}L^{p}(|X_{n}|)\log(|X_{n}|)\log(\log(|X_{n}|))\right)\\\
&=\sup_{n\geq
1}\mathbb{E}\left(g(|X_{n}|)\log(|X_{n}|)\log(\log(|X_{n}|))\right)\\\
&=\sup_{n\geq
1}\dfrac{\log(h(n))\log(\log(h(n)))}{\log(n)\log(\log(n))}<\infty.\end{split}$
Therefore (5) fails but (28) holds.
Now, if (6) holds, then by letting $\alpha=1/p$, we have
$\lim_{n\to\infty}\dfrac{\sum_{i=B}^{n}X_{i}}{n^{1/p}\tilde{L}(n^{1/p})}=0\text{
a.s.}$ (29)
It follows from (29) that
$\lim_{n\to\infty}\dfrac{X_{n}}{n^{1/p}\tilde{L}(n^{1/p})}=0\text{ a.s.}$ (30)
Since the sequence $\\{X_{n},n\geq 1\\}$ is comprised of independent random
variables, the Borel–Cantelli lemma and (30) ensure that
$\sum_{n=B}^{\infty}\mathbb{P}\left(|X_{n}|>n^{1/p}\tilde{L}(n^{1/p})/2\right)<\infty.$
(31)
However, we have
$\begin{split}\sum_{n=B}^{\infty}\mathbb{P}\left(|X_{n}|>n^{1/p}\tilde{L}(n^{1/p})/2\right)&=\sum_{n=B}^{\infty}\mathbb{P}\left(|X_{n}|>h(n)/2\right)\\\
&=\sum_{n=B}^{\infty}\dfrac{1}{n\log(n)\log(\log(n))}=\infty\end{split}$
contradicting (31). Therefore, (6) must fail.
## 4 Corollaries and remarks
In this section, we apply Theorems 1.1 and 2.1 to three different dependence
structures: (i) $m$-pairwise negatively dependent random variables, (ii)
extended negatively dependent random variables, and (iii) $\varphi$-mixing
sequences. The results for cases (i) and (ii) are new results even $L(x)\equiv
1$. We also give remarks to compare our results with the existing ones.
### 4.1 $m$-pairwise negatively dependence random variables
The Baum–Katz theorem and the Marcinkiewicz–Zygmund SLLN for sequences of
$m$-pairwise negatively dependent random variables were studied by Wu and
Rosalsky [19]. Let $m\geq 1$ be a fixed integer. A sequence of random
variables $\\{X_{n},n\geq 1\\}$ is said to be $m$-pairwise negatively
dependent if for all positive integers $j$ and $k$ with $|j-k|\geq m$, $X_{j}$
and $X_{k}$ are negatively dependent, i.e.,
$\mathbb{P}(X\leq x,Y\leq y)\leq\mathbb{P}(X\leq x)\mathbb{P}(Y\leq y)\text{
for all $x,y\in\mathbb{R}$.}$
When $m=1$, this reduce to the usual concent of pairwise negative dependence.
It is well known that if $\\{X_{i},i\geq 1\\}$ is a sequence of $m$-pairwise
negatively dependent random variables and $\\{f_{i},i\geq 1\\}$ is a sequence
of nondecreasing functions, then $\\{f_{i}(X_{i}),i\geq 1\\}$ is a sequence of
$m$-pairwise negatively dependent random variables.
The following corollary is the first result in the literature on the complete
convergence for sequences of $m$-pairwise negatively dependent random
variables under the optimal condition even when $m=1$ and $L(x)\equiv 1$.
###### Corollary 4.1.
Let $1\leq p<2$, $\alpha\geq 1/p$, and let $\\{X_{n},\,n\geq 1\\}$ be a
sequence of $m$-pairwise negatively dependent random variables, and $L(\cdot)$
as in Theorem 1.1.
* (i)
If (5) holds, then we obtain (6).
* (ii)
If $\\{X_{n},\,n\geq 1\\}$ is stochastically dominated by a random variable
$X$ satisfying (13), then we obtain (14).
###### Proof.
From Lemma 2.1 in Wu and Rosalsky [19], it is easy to see that $m$-pairwise
negatively dependent random variables satisfy condition (4). Corollary 4.1
then follows from Theorems 1.1 and 2.1. ∎
###### Remark 3.
(i)
We consider a special case where $\alpha=1/p$, $1<p<2$ and $L(x)\equiv 1$ in
Corollary 4.1 (ii). Under the condition $\mathbb{E}(|X|^{p})<\infty$, we
obtain
$\sum_{n=1}^{\infty}n^{-1}\mathbb{P}\left(\max_{1\leq j\leq
n}\left|\sum_{i=1}^{j}(X_{i}-\mathbb{E}(X_{i}))\right|>\varepsilon
n^{1/p}\right)<\infty\text{ for all }\varepsilon>0,$ (32)
and
$\begin{split}\lim_{n\to\infty}\dfrac{\sum_{i=1}^{n}(X_{i}-\mathbb{E}(X_{i}))}{n^{1/p}}=0\
\text{ a.s.}\end{split}$ (33)
(ii)
For $1<p<2$, Sung [15] considered the pairwise independent case and obtained
(33) under a slightly stronger condition that
$\mathbb{E}\left(|X|^{p}(\log\log(|X|))^{2(p-1)}\right)<\infty.$ (34)
Furthermore, one cannot obtain the rate of convergence (32) by using the
method used in Sung [15]. In Chen et al. [4, Theorem 3.6], the authors proved
(32) holds under condition that $\mathbb{E}(|X|^{p}\log^{r}(|X|))<\infty$ for
some $r>p$. They stated an open question whether (32) holds or not under (34)
(see [4, Remark 3.1]). For the case where the random variables are
$m$-pairwise negatively dependent, Wu and Rosalsky [19] obtained (32) and (33)
under condition $\mathbb{E}(|X|^{p}\log^{r}(|X|))<\infty$ for some $r>1+p$. Wu
and Rosalsky [19] then raised an open question that whether (33) holds or not
under Sung’s condition (34). For $p=1$ and also the underlying random
variables are $m$-pairwise negatively dependent, Wu and Rosalsky [19, Remarks
3.6] stated another open question that whether (32) (with $p=1$) holds or not
under the condition $\mathbb{E}(|X|)<\infty$. Therefore, a very special case
of Corollary 4.1 gives affirmative answers to the mentioned open questions
raised by Chen et al. [4] and Wu and Rosalsky [19].
(iii)
Let $\alpha=1/p$, $1<p<2$, $L(x)=(\log\log(x))^{2(1-p)/p}$, $x\geq 0$. Then
$\tilde{L}(x)=(\log\log(x))^{2(p-1)/p}$, $x\geq 0$. By Corollary 4.1 (ii),
under condition (3), we obtain (2). Therefore, this special case of Corollary
4.1 also improves Corollary 1 of da Silva [6].
### 4.2 Extended negatively dependent random variables
The Kolmogorov SLLN for extended negatively dependent was first studied by
Chen et al. [5]. A collection of random variables $\\{X_{1},\dots,X_{n}\\}$ is
said to be extended negatively dependent if for all
$x_{1},\dots,x_{n}\in\mathbb{R}$, there exists $M>0$ such that
$\mathbb{P}(X_{1}\leq x_{1},\dots,X_{n}\leq x_{n})\leq M\mathbb{P}(X_{1}\leq
x_{1})\dots\mathbb{P}(X_{n}\leq x_{n}),$
and
$\mathbb{P}(X_{1}>x_{1},\dots,X_{n}>x_{n})\leq
M\mathbb{P}(X_{1}>x_{1})\dots\mathbb{P}(X_{n}>x_{n}).$
A sequence of random variables $\\{X_{i},i\geq 1\\}$ is said to be extended
negatively dependent if for all $n\geq 1$, the collection $\\{X_{i},1\leq
i\leq n\\}$ is extended negatively dependent.
Let $m$ be a positive integer. The notion of $m$-extended negative dependence
was introduced in Wu and Wang [18]. A sequence $\\{X_{i},i\geq 1\\}$ of random
variables is said to be $m$-extended negatively dependent if for any $n\geq 2$
and any $i_{1},i_{2},\ldots,i_{n}$ such that $|i_{j}-i_{k}|\geq m$ for all
$1\leq j\leq k\leq n$, we have $\\{X_{i_{1}},\ldots,X_{i_{n}}\\}$ are extended
negatively dependent. If $\\{X_{i},i\geq 1\\}$ is a sequence of $m$-extended
negatively dependent random variables and $\\{f_{i},i\geq 1\\}$ is a sequence
of nondecreasing functions, then $\\{f_{i}(X_{i}),i\geq 1\\}$ is a sequence of
$m$-extended negatively dependent random variables. We note that the classical
Kolmogorov maximal inequality or the classical Rosenthal maximal inequality
are not available for extended negatively dependent random variables (see Wu
and Wang [18]).
###### Corollary 4.2.
Corollary 4.1 holds if $\\{X_{n},\,n\geq 1\\}$ is a sequence of $m$-extended
negatively dependent random variables.
###### Proof.
Lemma 3.3 of Wu and Wang [18] implies that the sequence $\\{X_{n},\,n\geq
1\\}$ satisfies condition (4). Corollary 4.2 then follows from Theorems 1.1
and 2.1. ∎
###### Remark 4.
Chen et al. [5] proved the Kolmogorov SLLN for sequences of extended
negatively dependent and identically distributed random variables
$\\{X,X_{n},n\geq 1\\}$ under the condition that $\mathbb{E}(|X|)<\infty$.
They used the Etemadi’s method in Etemadi [8] which does not work for the case
$1<p<2$ in the Marcinkiewicz–Zygmund SLLN. To our best knowledge, Corollary
4.2 is the first result in the literature on the Baum–Katz theorem for
sequences of $m$-extended negatively dependent random variables under the
optimal moment condition even when $L(x)\equiv 1$ and $m=1$.
### 4.3 $\varphi$-mixing dependent random variables
A sequence of random variables $\\{X_{n},n\geq 1\\}$ is called
$\varphi$-mixing if
$\varphi(n)=\sup_{k\geq
1,A\in\mathcal{F}_{1}^{k},B\in\mathcal{F}_{k+n}^{\infty},\mathbb{P}(A)>0}\left|\mathbb{P}(B|A)-\mathbb{P}(B)\right|\to
0\text{ as }n\to\infty,$
where $\mathcal{F}_{1}^{k}=\sigma(X_{1},\ldots,X_{k})$ and
$\mathcal{F}_{k+n}^{\infty}=\sigma(X_{i},i\geq k+n)$. The following corollary
is the Baum–Katz type theorem for sums of $\varphi$-mixing random variables.
###### Corollary 4.3.
Corollary 4.1 holds if $\\{X_{n},\,n\geq 1\\}$ is a sequence of
$\varphi$-mixing random variables satisfying
$\sum_{n=1}^{\infty}\varphi^{1/2}(2^{n})<\infty.$ (35)
###### Proof.
Corollary 2.3 of Utev [17] implies that (4) holds under (35). Corollary 4.2
follows from Theorems 1.1 and 2.1. ∎
###### Remark 5.
The condition (4) is very general. The concepts of negative association,
pairwise negative dependence, $\phi$-mixing can all be extended to random
vectors in Hilbert spaces (see, e.g., [7, 11, 9, 10]). It is interesting to
see if the results in this note can be extended to dependence random vectors
taking values in Hilbert spaces.
Acknowledgments The research of the second-named author was supported by the
Ministry of Education and Training, grant no. B2022-TDV-01.
## References
* [1] V.T.N. Anh, N.T.T. Hien, L.V. Thanh, and V.T.H. Van, _The Marcinkiewicz–Zygmund-type strong law of large numbers with general normalizing sequences_ , Journal of Theoretical Probability 34 (2021), pp. 331–348.
* [2] J. Baxter, R. Jones, M. Lin, and J. Olsen, _SLLN for weighted independent identically distributed random variables_ , Journal of Theoretical Probability 17 (2004), pp. 165–181.
* [3] N.H. Bingham, C.M. Goldie, and J.L. Teugels, _Regular variation_ , Vol. 27, Cambridge University Press, 1989.
* [4] P. Chen, P. Bai, and S.H. Sung, _The von Bahr–Esseen moment inequality for pairwise independent random variables and applications_ , Journal of Mathematical Analysis and Applications 419 (2014), pp. 1290–1302.
* [5] Y. Chen, A. Chen, and K.W. Ng, _The strong law of large numbers for extended negatively dependent random variables_ , Journal of Applied Probability 47 (2010), pp. 908–922.
* [6] J.L. da Silva, _On the rates of convergence for sums of dependent random variables_ , arXiv preprint arXiv:2011.10262 (2020).
* [7] J. Dedecker and F. Merlevède, _Convergence rates in the law of large numbers for Banach-valued dependent variables_ , Theory of Probability & Its Applications 52 (2008), pp. 416–438.
* [8] N. Etemadi, _An elementary proof of the strong law of large numbers_ , Zeitschrift für Wahrscheinlichkeitstheorie und verwandte Gebiete 55 (1981), pp. 119–122.
* [9] N.T.T. Hien and L.V. Thanh, _On the weak laws of large numbers for sums of negatively associated random vectors in Hilbert spaces_ , Statistics and Probability Letters 107 (2015), pp. 236–245.
* [10] N.T.T. Hien, L.V. Thanh, and V.T.H. Van, _On the negative dependence in Hilbert spaces with applications_ , Applications of Mathematics 64 (2019), pp. 45–59.
* [11] M.H. Ko, T.S. Kim, and K.H. Han, _A note on the almost sure convergence for dependent random variables in a Hilbert space_ , Journal of Theoretical Probability 22 (2009), pp. 506–513.
* [12] A. Martĭkainen, _On the strong law of large numbers for sums of pairwise independent random variables_ , Statistics and Probability Letters 25 (1995), pp. 21–26.
* [13] E. Rio, _Vitesses de convergence dans la loi forte pour des suites dépendantes (Rates of convergence in the strong law for dependent sequences)_ , Comptes Rendus de l’Académie des Sciences. Série 1, Mathématique 320 (1995), pp. 469–474.
* [14] A. Rosalsky and L.V. Thành, _A note on the stochastic domination condition and uniform integrability with applications to the strong law of large numbers_ , Statistics and Probability Letters, In press (2021).
* [15] S.H. Sung, _Marcinkiewicz–Zygmund type strong law of large numbers for pairwise iid random variables_ , Journal of Theoretical Probability 27 (2014), pp. 96–106.
* [16] L.V. Thành, _On the Baum–Katz theorem for sequences of pairwise independent random variables with regularly varying normalizing constants_ , Comptes Rendus Mathématique 358 (2020), pp. 1231–1238.
* [17] S. Utev, _Sums of random variables with $\phi$-mixing_, Siberian Advances in Mathematics 1 (1991), pp. 124–155.
* [18] Y. Wu and X. Wang, _Strong laws for weighted sums of $m$-extended negatively dependent random variables and its applications_, Journal of Mathematical Analysis and Applications 494 (2021), p. 124566.
* [19] Y. Wu and A. Rosalsky, _Strong convergence for $m$-pairwise negatively quadrant dependent random variables_, Glasnik Matematički, Series III 50 (2015), pp. 245–259.
| arxiv-papers | 2021-07-27T09:21:44 | 2024-09-04T03:07:21.083594 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Nguyen Chi Dzung and L\\^e V\\v{a}n Th\\`anh",
"submitter": "L\\^e V\\v{a}n Th\\`anh",
"url": "https://arxiv.org/abs/2107.12690"
} |
2107.12691 | 11institutetext: Department of Computer Science, Jinan University, Guangzhou
510632, P. R. China
22institutetext: IMCCE, Observatoire de Paris, UMR 8028 du CNRS, UPMC,
Université de Lille, 77 av. Denfert-Rochereau, 75014 Paris, France
33institutetext: School of Software, Jiangxi Normal University, Nanchang
330022, P. R. China
44institutetext: Sino-French Joint Laboratory for Astrometry, Dynamics and
Space Science, Jinan University, Guangzhou 510632, P. R. China
# A deeper solution to the actual geometry of CCD mosaic chips
Z.J. Zheng 1144 Q.Y. Peng Contact:[email protected] A. Vienne 2244 F.R.
Lin 3344 B.F. Guo 1144
###### Abstract
Context. For charge-coupled device (CCD) mosaic chips in the focal plane of a
large telescope, the unification for all the measurements of each chip is
vital to some scientific projects, such as deep astrometric standards or
construction for deeper images that can also seamlessly cover a larger area of
the sky. A key part of the reduction involves the accurate geometric
distortion (GD) correction and the precise determination of the relative
positions of the CCD chips. The short-term and long-term stabilities of them
are also important when it comes to studying whether there are systematic
variations in the optical system of the telescope.
Aims. We present a solution to determine the actual or physical relative
positions between CCD chips. Due to the limited depth of the Gaia catalogue,
there may be few stars identified from the Gaia catalogue for astrometric
calibration on the deep observation of a large, ground-based or space-based
telescope, such as the planned two-metre Chinese Space Station Telescope
(CSST). For this reason, we referred to the idea from the Hubble Space
Telescope (HST) astrometry to only use stars’ pixel positions to derive the
relative positions between chips. We refer to the practice as differential
astrometry in this paper. In order to ensure the results are reliable, we took
advantage of Gaia EDR3 to derive the relative positions between chips, to
provide a close comparison. We refer to the practice as photographic
astrometry.
Methods. By taking advantage of the GD solution and the common distortion-free
frame derived from the observations, we related the physical positions of the
adjacent pixel edges of two CCD chips and estimated the actual relative
positions between chips. We implemented the technique for the CCD mosaic chips
of the Bok 2.3-m telescope at Kitt Peak based on two epochs of observations
(Jan 17,2016 and Mar 5,2017).
Results. There is a good agreement between the two types of astrometry for the
relative positions between chips. For the two epochs of observations, the
averages of the gaps derived from photographic astrometry and differential
astrometry differ to about 0.046 pixels ($\sim$0.021 arcsec) and 0.001 pixels
(¡0.001 arcsec), respectively, while the average precisions of the gaps are
about 0.018 pixel ($\sim$0.008 arcsec) and 0.028 pixels ($\sim$0.013 arcsec),
respectively. The results provide us with more confidence in applying this
solution for the CCD mosaic chips of the CSST by means of differential
astrometry. Compared with the solution described by Anderson & King, which has
been used to determine the interchip offset of Wide Field Planetary Camera 2
(WFPC2) chips and Wide Field Camera 3 (WFC3) chips at the HST, the solution
proposed in this paper shows at least a factor of two improvement in
precision, on average.
Conclusions. We think there are two definite advantages of our method. On one
hand, we perform the measurements for two adjacent edges instead of two
individual chips, allowing the results to be as local as possible, and
meanwhile we alleviate the propagated error of residual distortions of each
observation deviating from the average solution throughout the field of view
(FOV). On the other hand, the final outcome is not mixed up with GD effects,
which would bias the realistic geometry of the CCD mosaic chips. Therefore,
the proposed method is expected to be an effective technique to monitor the
stability of the CCD mosaic chips in the CSST and other ground-based CCD
mosaic as well.
###### Key Words.:
Astrometry — Techniques: image processing — Methods: numerical
## 1 Introduction
Modern telescopes are built with larger and larger apertures to enhance
detection capability for searching dim targets. However, to fully exploit the
scientific productivity of the telescope, an attempt to build a larger single
CCD chip would face tough challenges in manufacturing. An alternative
technique, called mosaic, is to build a close-packed array, in which a certain
number of small-scale CCD chips are placed as close together as possible on a
common base or plate, which enables the ground-based and space-based telescope
to image a much larger sky area. Moreover, there is a definite trend to design
complex mosaic instruments with increasing numbers of chip elements (Sekiguchi
et al. 1992; Gunn et al. 1998; DePoy et al. 2008; Lou et al. 2016).
Notwithstanding, a larger mosaic size brings additional difficulties in data
processing. Since each CCD chip in the mounting plate is an autonomous
detector and their properties vary in quantum efficiency, readout noise, dark
current, and so on, careful calibration is required before the unification of
the measurement of each CCD chip (Luppino et al. 1995). For high-precision
astrometry, two key factors that limit the accuracy and precision of the
unification are (1) geometric distortion (GD) calibration and (2)
determination of relative positions of the CCD chips. For example, with the
application of the GD solution for WFPC2’s corrective optics, as well as the
changes in the relative positions of the four WFPC2 chips (including three WF
chips and one PC chip), over time, Saturn satellite astrometry from multiple
chips is combined to achieve more precise result (French et al. 2006) than
when using only PC images. Some projects such as the combination of different
types of images especially obtained with different chips for the construction
of deeper images also rely on the high accuracy of these solutions (Wadadekar
et al. 2006).
A regular check for the stability of CCD mosaic geometry is necessary,
especially before and after a noticeable change in the thermal environment of
an optical system, since the derived calibration parameters in lab tests are
not proven to be appropriate or stable for on-sky measurement. For example, a
significant variation for the metrics of the NOAO CCD Mosaic Imager indicates
possible thermal cycling of a dewar, which results from the difference in
thermal expansion coefficients between silicon and copper (Platais et al.
2002). Another example is that the relative motion of CCDs over just one week
can even be as large as 200 mas, nearly a pixel for the Dark Energy Camera, as
a result of a warming or cooling event for the camera (see Fig. 15 in
Bernstein et al. 2017). As one of the best space telescopes, the Hubble Space
Telescope (HST) is designed for such precise positional imaging astrometry
that a small variation of its optical system even over one orbital period
should be taken into account or monitored. As the HST orbits the Earth while
the Earth orbits the Sun, its focus variations are correlated with thermal
variations induced by the angles between the Sun and the telescope (the so-
called breathing effect). Also, a clear monotonic trend for the interchip
offset of the WFPC2 chips was found by Anderson & King (2003).
The two-metre Chinese Space Station Optical Survey is a planned full sky
survey operated by the Chinese Space Station Telescope (CSST). The CSST will
be equipped with five first-generation instruments including a survey camera,
a terahertz receiver, a multi-channel imager, an integral field spectrograph,
and a cool planet imaging coronagraph (Zhan 2021). The survey camera is the
most important instrument; its aim is wide-area multi-band imaging and
slitless spectroscopic survey, and its field of view (FOV) is 1.1${\times}$1.2
deg2. It is equipped with 30 9k${\times}$9k CCD detectors, of which 18 CCDs
are for imaging observation and 12 CCDs are for spectroscopic observation.
Before the CSST begins science operations around 2024, we should have
technical preparation for monitoring the interchip offset of its CCD mosaic
chips, for testing the optical system’s stability. In this paper, the CCD
mosaic camera of the Bok 2.3-m telescope, which includes 4 4k$\times$4k CCDs,
is used as a preliminary prototype of the CSST’s CCD mosaic chips to test the
solution to the geometry of CCD mosaic chips proposed by Wang et al. (2019).
Although Wang et al. (2019) derived the relative positions between chips of
the Bok 2.3-m telescope by using Gaia DR2, we refer to the idea from the
astrometry of the HST and propose an alternate solution for the relative
position between chips by only using stars’ pixel positions. It is more
practical for the ground-based or space-based deep observations such as the
CSST, which can observe much fainter stars (e.g. 26 mag in g band) than the
Gaia satellite, and we can usually only obtain their pixel positions. In this
situation, there are few stars identified from the Gaia catalogue for
astrometric calibration. In order to ensure the results were reliable, we took
advantage of Gaia EDR3 to derive the relative positions between chips as in
Wang et al. (2019) in order to provide a close comparison. For simplicity, we
refer to the practice of using Gaia EDR3 to derive the relative positions
between chips as photographic astrometry in this paper. The practice of only
using stars’ pixel positions is referred to as differential astrometry.
During the reduction, we tried our best to eliminate the possible errors on
the basis of Wang et al. (2019). Firstly, we corrected the offset in altitude
introduced by the differential colour refraction effects. In addition, we
adopted some criteria to reject sources with possible bad astrometry based on
Gaia EDR3’s re-normalised unit weight error (RUWE), and we also rejected
sources that suffered from saturated or crowding status on the observations.
We also introduced the weighted scheme to reduce the effect of a large number
of low signal-to-noise (S/N) stars on the reduction.
This paper is organised as follows. In Sect. 2, we briefly describe the
instrument and the observations. In Sect. 3, we introduce the procedure of
deriving the GD solution when using photographic or differential astrometry.
In Sect. 4, we elaborate the solution for relative positions between the CCD
chips, based on photographic astrometry and differential astrometry,
respectively. The results are shown and discussions are made in Sect. 5. In
Sect. 6, we compare the solution for the relative positions between chips
proposed in this paper with the solution described by Anderson & King (2003,
hereafter the AK03 method), which has been used to determine the interchip
offset of WFPC2 chips and WFC3 chips (Bellini & Bedin 2009) at the HST. The
conclusion is drawn in the last section.
## 2 Instrument and observations
The observations are only taken to derive the GD solution for the 90Prime
camera of the Bok 2.3-m telescope when it serves the Beijing-Arizona Sky
Survey (BASS). Although more detailed information about the BASS project can
be found in Wang et al. (2019), we briefly summarise the project below.
The BASS is a new imaging survey resulting from the collaboration between the
National Astronomical Observatory of China (NAOC) and Steward Observatory. It
uses the Bok 2.3-m telescope, which is located at Kitt Peak (IAU code 691,
E248${\degr}$ 24${\arcmin}$ 3.6${\arcsec}$, N31${\degr}$ 57${\arcmin}$
28.7${\arcsec}$) with the 90Prime camera installed at the prime focus (4 CCDs,
4096 $\times$ 4032 pixels each, as shown in Fig. 1) to survey an area of about
5400 deg2 in the north Galactic cap. The photometric system includes the SDSS
g and DES r bands. The expected depths for 5$\sigma$ point sources and
Galactic extinction correction are 24.0 mag for the g band and 23.4 mag for
the r band, respectively.
In order to push the astrometric capability of the Bok 2.3-m telescope to its
limits, the GD solution is needed. We attain two epochs of observations to
derive the GD solution. Specifically, a dithered observational scheme is
organised in an array of 7${\times}$7 pointings with an offset of about
10${\arcmin}$ (Wang et al. 2019). The exposure time of each observation is
60.0 s. The specifications of the instrument and the observations are given in
Table 1 and Table 1. For simplicity, the two observation-sets are called Obs16
(January 17, 2016) and Obs17 (March 5, 2017), respectively.
It should be noted that, due to lack of experience, Obs16 was centred on a
sparse field (coordinates $(\alpha,\delta)_{\rm J2000.0}\sim(\rm
10^{h}48^{m}12^{s}\\!\\!.0,+28^{\circ}45^{\prime}46^{\prime\prime}\\!\\!.9)$).
There are only about 300 stars on each chip, and they are inadequate to derive
a fine GD solution. Also, the observation was interrupted on that night. About
one hour later, the observation resumed. Considering the distortion is
continuously evolving, only the last 30 frames (sorted by observation time) of
Obs16 were chosen for processing in this paper. In 2017, a much denser
calibration field was centred on coordinates $(\alpha,\delta)_{\rm
J2000.0}\sim(\rm
06^{h}48^{m}12^{s}\\!\\!.0,+00^{\circ}45^{\prime}47^{\prime\prime}\\!\\!.0)$.
There are about 3000 stars on each chip. Because of the cloudy weather, we
discarded 11 frames of Obs17 with poor image quality.
Table 1: Specifications of 90Prime camera in the Bok 2.3-m telescope. F-Ratio | f/2.98
---|---
CCD field of view | 1.08${\degr}$${\times}$1.03${\degr}$
Absolute pointing | $<$ 3${\arcsec}$ RMS
Size of CCD array | 4096${\times}$4032${\times}$4
Size of pixel | $15{\times}15$ $\mu$m2
Approximate pixel scale | $0\aas@@fstack{\prime\prime}453$/pix
Table 2: Specifications of the observations.
Date | Abbr. | No. | Filter | Seeing | Airmass
---|---|---|---|---|---
Jan 17,2016 | Obs16 | 32 | DES r | 1.7${\arcsec}$-2.4${\arcsec}$ | 1.05-1.14
Mar 5,2017 | Obs17 | 38 | SDSS g | 1.3${\arcsec}$-1.7${\arcsec}$ | 1.16-1.20
111The second column lists the abbreviation for the observation set. The third
column lists the number of frames in each observation set. The fourth column
lists the adopted filter. The last two columns list the seeing and the range
of the air mass for the observations, respectively.
Figure 1: CCD mosaic layout in the 90 Prime camera of the Bok 2.3-m telescope.
There are four CCDs: CCD#1, CCD#2, CCD#3, and CCD#4, and four identifiers are
listed at the corners of each CCD. For CCD#1, the pixel position of Corners 1,
2, 3, and 4 are (1,4032), (4096,4032), (1,1), and (4096,1), respectively. The
pixel positions of corners in the other chips are the same as CCD#1.
## 3 The GD solution
This section mainly describes the GD solutions for the observations by means
of two types of astrometry. For simplicity, the GD solution through
photographic astrometry is called GD1, while the GD solution via differential
astrometry is called GD2.
### 3.1 Data pre-processing
To derive an accurate GD solution, we first performed a two-dimensional
Gaussian centring to obtain the pixel positions of the star images on the
frame. After that, we cross-matched the pixel positions with the sources in
the Gaia EDR3, considering their motions and gnomonic projection effects.
It should be noted that fewer sources are found in Gaia EDR3 than Gaia DR2
(Gaia Collaboration et al. 2018) for the field of Obs17, which is in a very
crowded area. According to Riello et al. (2021), in the data processing of
Gaia EDR3, the background treatment for BP and RP has been considerably
improved to avoid systematic problems caused by crowding, and as a result, the
crowding evaluation in Gaia EDR3’s processing leads to a cleaner list of
internal calibration sources. We then removed many sources with possible bad
astrometry, whose RUWEs in Gaia EDR3 are larger than 1.4 for Obs16 and 1.1 for
Obs17, respectively, determined by the numbers of the observed star in each
frame and the suggestion given by the Gaia Collaboration (2021). We also
excluded stars that are saturated or suffer from the contamination of blended
neighbour(s) or saturated star(s) on the observation. Finally, we obtain about
3,000 Gaia stars for Obs16 and about 120,000 for Obs17. The above processings
are based on the software developed by us (Peng et al. 2012, 2015, 2017; Wang
et al. 2017).
### 3.2 Differential colour refraction correction
To achieve high-accuracy results through photographic astrometry, we
considered the differential colour refraction (DCR) especially in the
observation of Obs17, which is observed at $\approx$30${\degr}$ zenith
distance with the SDSS g filter. However, the observations were not taken with
several filters on one night, so we cannot correct the DCR using the colour
index of stars by the photometry of them. We referred to the technique
proposed by Lin et al. (2020), which corrects the DCR of each filter against
the colour index proposed by catalogue. Since the filters of the Pan-STARRS1
(PS1) survey are similar to the filters used for the observations, we cross-
identified sources between PS1 and Gaia EDR3 to obtain the stars’ $gmag$
(central wavelength 4866${\AA}$) and $rmag$ (central wavelength 6215${\AA}$)
provided by PS1. They correspond to the SDSS g filter (central wavelength
4776${\AA}$) and the DES r filter (central wavelength 6412${\AA}$) used by the
BASS, respectively.
After we cross-matched the observations with Gaia EDR3 and PS1 data, we
performed the reduction in the alt-azimuth coordinate system with a fourth-
order polynomial, considering all astrometric effects including proper motion,
parallax, aberration, atmosphere refraction, and projection effects. It should
be noted that we did not take the RA-OBS and DE-OBS keywords recorded in the
FITS header as the tangential point as Wang et al. (2019) did, since they are
J2000.0 positions and would affect the accurate calculation for atmospheric
refraction. Instead, we calculated their apparent R.A. and Dec. positions and
transformed them to the apparent azimuth and altitude positions. For
atmosphere refraction correction, a simple $A$ tan $z$+$B$ tan ${}^{3}z$ model
($z$ is the zenith distance) provided by SOFA library222http://www.iausofa.org
was adopted.
The fourth-order polynomial makes it possible to absorb the GD effects in the
observations. The residuals in altitude mainly reveal the DCR of stars. We
adopted Eq. 5 of Lin et al. (2020) to derive the following DCR solution:
$\operatorname{DCR}\left(a_{1},a_{2}\right)=a_{1}+a_{2}\cdot color\cdot\tan
z,$
where $color$ and $z$ are the colour index ($gmag-rmag$) and the zenith
distance of the star, respectively, and $a_{1}$ and $a_{2}$ are the fitted DCR
parameters. The DCR solutions of each chip are shown in Table 3. After DCR
correction, there are no significant systematic errors in the residual
($\langle O-C\rangle$) in altitude against $(g-r)_{PS1}$, especially for
Obs17, as shown in Fig. 2. We note that the results of Obs17 are based on the
stars brighter than 18 Gmag and the results of Obs16 are based on the stars
brighter than 17 Gmag. The dispersion of the $\langle O-C\rangle$s in altitude
is nearly the same as that in the unaffected azimuth direction.
Table 3: DCR solution for the observations.
Obs-set | CCD# | $a_{1}$ | $a_{2}$
---|---|---|---
Obs16 | 1 | 0.006 | -0.013
2 | 0.005 | -0.016
3 | 0.008 | -0.022
4 | 0.007 | -0.020
Obs17 | 1 | 0.019 | -0.045
2 | 0.028 | -0.060
3 | 0.019 | -0.046
4 | 0.028 | -0.059
333The first column lists the observation set. The second column lists the
index of the CCD chip. The last two columns list the coefficients of the
solution. The units are in arcsec.
Figure 2: Residual $(O-C)$ in alt-azimuth coordinate system against
$(g-r)_{PS1}$ before and after DCR correction. The top two panels are $\langle
O-C\rangle$ before and after DCR correction for Obs16. The bottom two panels
are $(O-C)$ before and after DCR correction for Obs17. We note that the
results of Obs17 are based on the stars brighter than 18 Gmag and the results
of Obs16 are based on the stars brighter than 17 Gmag.
### 3.3 GD1 procedure by means of photographic astrometry
The most direct way to solve the GD solution is to compare the observed
positions with the positions of a distortion-free frame (DFF). By definition
(Anderson & King 2003), the DFF is a set of positions, into which any observed
positions after GD correction can be transformed. The set has nothing more
than a displacement, a rotation, and a scale factor from a four-parameter
conformal transformation.
Now, Gaia EDR3 provides us with accurate enough positions to build a DFF for
the observations. For a faint source (Gmag 20), the expected median error
propagated to the astrometric position in J2000.0 of Obs17 is about 0.9 mas,
while the uncertainties of the positional centring for a high S/N star image
is usually 1$\%$ pixel, which is about 5 mas. So, the positions calculated
from Gaia EDR3 can serve as a distortion-free frame for the observations in
this paper. However, we have to consider the possible systematic errors caused
by spurious astrometric solutions in Gaia processing. They are mainly due to
close source pairs, especially in crowded fields, which even Gaia can not
completely resolve (Fabricius et al. 2021). Although Gaia EDR3 has better
angular resolution than Gaia DR2, 1.6$\%$ of the astrometric solutions may be
still spurious, which produces meaningless proper motions and parallaxes
(Fabricius et al. 2021). Thanks to the dithered scheme, which allows the same
stars to be imaged in different positions of the CCD detectors, their possible
systematic errors could be cancelled by implementing the GD1 procedure as
described in the following.
For each observation, we took the standard coordinate calculated from Gaia
EDR3 as its DFF, considering all astrometric effects (proper motion, parallax,
aberration, atmosphere refraction, and differential colour refraction) and
projection effects. After gnomonic projection, a four-parameter conformal
transformation was used to relate stars’ standard coordinates to their pixel
positions. The residual between the observed and the calculated positions ($O$
– $C$) can be resolved into three sources: the GD effect as a function of the
position of the stars in the CCD detector, the possible catalogue systematic
error as described above, and the measurement error. As the same star in
dithered observations falls in different pixel positions on the CCD chip, the
GD effect in specific pixel positions can be derived by cancelling out the
catalogue’s systematic error and compressing the measured errors (see Peng et
al. 2012 for details).
Since the field of Obs17 is much denser than Obs16, we can derive a finer GD
solution for Obs17. We divided the FOV of each detector into 16$\times$16
elements for Obs16 and 32$\times$32 elements for Obs17, according to the
compromise between the need for an adequate number of grid elements to model
the GD solution and an adequate sampling of stars ($\geq 30$, determined
empirically) in each grid element. The GD effect in the centre of each element
was estimated from the average GD effects of all the stars in this element
through a $\sigma$-clipped average solution. Solving for the GD solution is an
iterative process, with continuously improving positions and reduced
residuals. Convergence was reached until the average residual in each element
was not larger than 0.001 pixels.
After the GD solution was adopted for the observations, we calculated the
standard deviation ($\sigma$) of its residuals for each star. Again we derived
a new GD solution using a weighted four-parameter conformal transformation.
The weight of each star was set to $1/\sigma^{2}$.
We note that, during the procedure, a third-order polynomial was used to
present the large-scale GD, and a look-up table was used to present the small-
scale GD. The third-order polynomial is as follows:
$\left\\{\begin{array}[]{rcl}\Delta
x&\\!\\!\\!=\\!\\!\\!&\sum\limits_{0\leqslant i+j\leqslant
3}a_{k}\tilde{x}^{i}\tilde{y}^{j},k=1\cdots 10\\\ \Delta
y&\\!\\!\\!=\\!\\!\\!&\sum\limits_{0\leqslant i+j\leqslant
3}b_{k}\tilde{x}^{i}\tilde{y}^{j},k=1\cdots 10,\\\ \end{array}\right.$
where $\tilde{x}_{i,j,k}$ and $\tilde{y}_{i,j,k}$ are the normalised
positions, defined as
$\left\\{\begin{array}[]{rcl}\tilde{x}=(x-2048)/2048\\\
\tilde{y}=(y-2016)/2016.\\\ \end{array}\right.$
The normalised positions make it easier to recognise the magnitude of the
contribution of each term at the edge of the chip. The coefficients of the
polynomial are given in Appendix A. The details of the look-up table are not
given in this paper, but the interested reader may wish to contact the
corresponding author for more information.
The final derived GD1 solutions are shown in the left panel of Fig. 3. The
median (MED) of GD1 solutions is about 0.60 pixels smaller than that of Wang
et al. (2019) for Obs16 and 0.68 pixels smaller for Obs17. The maximun (MAX)
GD1 solution is about 1.98 pixels larger than that of Wang et al. (2019) for
Obs16 and 3.03 pixels larger for Obs17. We think the main cause is that we
exclude a large amount of sources, which may introduce systematic errors. The
introduced weighted scheme reduces the effect of a large number of low S/N
stars in the GD1 solution.
### 3.4 GD2 procedure by means of differential astrometry
For differential astrometry, its DFF (master frame in this paper) is
constructed directly from the pixel positions of the stars, which the GD-
corrected observations can be transform into, with nothing more than a four-
parameter conformal transformation. However, as the FOV of the instrument is
rather large, the projection effects should be taken into account. Therefore,
we constructed a local master frame for each observation rather than
constructing a global master frame for all of the observations (Anderson &
King 2003). The local master frame represents a set of distortion-free
positions, which can be observed with the used chip at corresponding pointing.
Specifically, when a single observation was taken as the root of the local
master frame, only other observations that have enough common stars ($\geq$30,
determined empirically) with the root observation, were chosen for the
construction of the local master frame. The constraint reduces the projection
effects on the positions of the master frame, since they were derived from the
observations whose pointings are not too far away from the pointing of the
root observation.
In detail, we found a conformal transformation from each observation to the
root observation by the least-squares method, determined from their common
stars’ pixel positions. The position of each star on the master frame was
calculated based on the $\sigma$-clipped average of all the transform
positions from the same stars of different observations. The standard
deviation of each position of the master frame served as a weight for
transformation in the next iteration. At the same time, a star on the frame
would be flagged if it had a transform outlier during the estimation for the
master frame’s position, so the outlier would not be used in the next
iteration. Also, new stars were added to the master frame, and, finally, the
master frame covers all the observations if they have common stars with the
root observation. The primitive master frame was then used to improve the
transformation, with the weights and flags determined by the previous
iteration. The procedure was iterated several times until the positions on the
master frame converged to 0.001 pixels ($\sim$0.5 mas) in each direction. Only
the transformation residuals of the common stars were taken as the GD effects
and used to derive the GD solution as previous. And after the primitive GD
solution was derived, the master frames were reconstructed based on the
corrected positions of the observations. The GD2 procedure iterated until the
average residual in each element was not larger than 0.001 pixels.
The derived GD2 solutions are shown in the right panel of Fig. 3, and they are
similar to the GD1 solutions. A detailed comparison between them (GD2-GD1) for
the respective chip is shown in Fig. 4. The median differences between the two
GD solutions achieve a considerable level (0.91 pixels for Obs16 and 1.85
pixels for Obs17). As shown in Appendix A, the cubic terms of the two GD
solutions are similar, and larger differences are found in quadratic terms and
linear terms. Similar discrepancies between the two GD solutions are also
found in our previous paper (Zheng et al. 2021). Although Anderson & King
(2003) stated that the observations at the same orientation are unable to
constrain the linear distortion terms, we think there are also some quadratic
distortion terms in the constructed master frame. As a result, there might be
a degeneracy between low-order terms (order$\leq$2) in the fitted distortion
polynomial and the translation in the conformal transformation. By introducing
observations at various orientations, the discrepancy between the two GD
solutions will become much smaller (Zheng et al. 2021). Unlike many ground-
based telescopes with rigid mounting of the telescope itself and of its
detectors, the CSST and other space telescopes are able to obtain this type of
observations.
Figure 3: GD solution for 90Prime camera of the Bok 2.3-m telescope. The left
panels show GD1 solutions derived by photographic astrometry, and the right
panels show GD2 solutions derived by differential astrometry. The top panels
show GD solutions derived from Obs16, and the bottom panels show those derived
from Obs17. The horizontal direction corresponds to the x axis, and the
vertical direction corresponds to the y axis. The vectors of the solutions are
magnified by a factor of 20. Maximums and medians are shown at the top in
pixels.
Figure 4: Differences between the models derived from the GD1 solution and the
GD2 solution. The left panels show the differences for Obs16, and the right
panels show the differences for Obs17. The horizontal direction corresponds to
the x axis, and the vertical direction corresponds to the y axis. The vectors
of the solutions are magnified by factors of 200 for Obs16 and 100 for Obs17,
respectively. Maximums, medians, and the RMSs of the differences are shown at
the top in pixels. We note that
RMS=$\sqrt{\frac{\sum_{i=1}^{n}((x_{GD2}-x_{GD1})^{2}+(y_{GD2}-y_{GD1})^{2})}{n-1}}$.
### 3.5 Accuracy of the GD solution
To evaluate the accuracy of the GD solution, the GD-corrected positions were
transformed to the DFF’s positions. The difference between the transformed
positions ($x_{i}^{T},y_{i}^{T}$) and the distortion-free positions
($\tilde{x},\tilde{y}$) directly quantifies how close we are to reaching the
DFF. For example, the standard deviation ($\sigma_{x}$) of
($x_{i}^{T}-\tilde{x}$) was used to estimate the measurement precision in $x$
as follows:
$\begin{aligned}
\sigma_{x}=\sqrt{\frac{\sum_{i=1}^{n}(x_{i}^{T}-\tilde{x})^{2}}{n-1}}\\\
\end{aligned},$
and the precisions of other quantities stated in this paper are similar to the
above equation.
A six-parameter linear model was used to transform GD-corrected positions to
DFF positions. This is because it corrects not only the changes in linear
terms of GD, which are easily changed by variations in the telescope’s
flexure, but also a large amount of the differential atmospheric refraction
(DAR, discussed in detail in the next sub-section) in the FOV for differential
astrometry.
The measurement precisions after GD correction for Obs16 and Obs17 are shown
on the bottom panel of Fig. 5 and Fig. 6. As the $x$ axis is nearly parallel
to the $RA$ direction and the $y$ axis is nearly parallel to the $DEC$
direction, to facilitate the comparison, the results of differential
astrometry are converted to arcseconds with an average pixel scale of
$0\aas@@fstack{\prime\prime}453$ pix${}^{\text{-}1}$.
For Obs16, the precision of differential astrometry is slightly inferior to
photographic astrometry in the $Y$ direction or the approximate $DEC$
direction, although it just tells us how accurately we can expect to register
the relative position of a star among different dithered frames. For Obs17,
the precisions of the two types astrometry reach a comparable level. The
precision in the $RA$ (or $X$) direction is smaller than that in the $DEC$ (or
$Y$) direction. The situation is similar to that of Wang et al. (2019) (Fig.
20). Thanks to the excluding criteria, fewer abnormal values above the average
level are found in our results, especially for stars fainter than 17 Gmag.
Figure 5: Measurement precision for Obs16 after GD correction. Top: Standard
deviation ($\sigma$) of the transformation residuals after GD1 correction as a
function of Gmag by a six-parameter linear transformation to the standard
coordinate. The left shows the $RA$ direction and the right shows the $DE$
direction. Bottom: Standard deviation of the transformation residuals after
GD2 correction as a function of Gmag by a six-parameter linear transformation
to the master frame. The left shows the $X$ direction and the right shows the
$Y$ direction. The red dashed line marks the median ($\sigma$) for the stars
brighter than 18 Gmag. Figure 6: Measurement precision for Obs17 after GD
correction. Top: Standard deviation ($\sigma$) of the transformation residuals
after GD1 correction as a function of Gmag by a four-parameter linear
transformation to the standard coordinate. The left shows the $RA$ direction
and the right shows the $DE$ direction. Bottom: Standard deviation of the
transformation residuals after GD2 correction as a function of Gmag by a six-
parameter linear transformation to the master frame. The left shows the $X$
direction and the right shows the $Y$ direction. The red dashed line marks the
median ($\sigma$) for the stars brighter than 17 Gmag. It should be noted that
the GD solution of the top panel is derived by means of photographic
astrometry and the GD solution of the bottom panel is derived by means of
differential astrometry. Figure 7: Variations of the physical pixel scale for
Obs16 against the zenith distance. The variations can be estimated by the
slope of a fitted straight line to the data. Figure 8: Variations of the
physical pixel scale for Obs17 against the zenith distance. The variations can
be estimated by the slope of a fitted straight line to the data. Figure 9:
Variations of the scale relative to the master frame for Obs16 against the
zenith distance. The variations can be estimated by the slope of a fitted
straight line to the data. Figure 10: Variations of the scale relative to the
master frame for Obs17 against the zenith distance. The variations can be
estimated by the slope of a fitted straight line to the data.
As Anderson & King (2003) indicated, there is an interaction between scale and
distortion. Therefore, we investigate if the scale varies during the
observation. The pixel scale against the zenith distance is shown in Fig. 7
for Obs16. The pixel scale against the zenith distance of Obs17 is shown in
Fig. 8. For the two epochs, the pixel scales change very little during the
observation; although, a close dependence of pixel scale on zenith distance
can be found for Obs16. We thus conclude that the GD effects are stable during
the observation.
We also investigate the variations of the scale relative to the master frame,
and the results are shown in Fig. 9 and Fig. 10. A similar conclusion is
reached. The stability of the scale also confirmed that much of the projection
effects have been reduced since the local master frames have nearly the same
scale as the root observations.
### 3.6 Estimation of the DAR of the observations for differential astrometry
Since the 90Prime camera has such a large FOV, the DAR on the observations
should be considered when using differential astrometry. The DAR for two
sources in arcsec with observed zenith distance $z$ and zenith separation
$\Delta z_{0}$, is given approximately by Gubler & Tytler (1998):
$\begin{aligned} {\rm DAR}&=\frac{(1+\tan^{2}z)(A+3B\tan^{2}z)\Delta
z_{0}}{206265}\\\ \end{aligned},$
where $A$ and $B$ depend on the meteorological conditions (atmospheric
pressure, ambient temperature and relative humidity can be found from the
historic data of the website for the site weather of Kitt Peak National
Observatory444http://www-kpno.kpno.noao.edu/Info/Mtn\\_Weather/) and the
wavelength of the filter.
To estimate the DAR on the observations, we used iauRefco, a C routine from
SOFA library to compute $A$ and $B$. The adopted value of the input parameters
for iauRefco function are listed in Table 4. $\Delta z_{0}$ is set as the
largest separation between a pair of stars as the FOV of each chip
($\approx$0.5${\degr}$). Finally, we find that the DAR is mainly a linear
trend for the observations, since the largest residual after using a line to
fit the DAR just reaches the minimum positional error; that is, 0.01 pixels
($\sim$5 mas). Therefore, the DAR is considered negligible when using a six-
parameter linear transformation for differential astrometry.
Table 4: Specifications of the input parameter for iauRefco. Date | PHPA | TC | RH | WL
---|---|---|---|---
| millibar | ${\degr}$C | | $\mu$m
2016.1.17 | 778 | 5.7 | 50$\%$ | 0.6412
2017.3.5 | 805 | 9.2 | 40$\%$ | 0.4776
## 4 The determination for relative positions between the CCD chips
### 4.1 Solution to the geometry of CCD mosaic chips – Methodology
In this section, we interpret the procedure of determination of the geometry
of CCD mosaic chips by taking advantage of the derived GD solution. The
procedure is mainly explained in the way of photographic astrometry as
follows.
For the same pointing, the observations taken with four chips share the same
standard coordinate derived from Gaia EDR3. We adopted a six-parameter linear
transformation to relate the standard coordinate $(\xi,\eta)$ to the pixel
position $(x,y)$ after GD correction (GDC) for the observations, since it can
absorb not only the linear distortion which is vulnerable to the gravitational
flexure effect, but also the DAR in differential astrometry. The pixel
position $(x,y)$ after GDC on each CCD chip can be transformed into the
standard coordinate $(\xi,\eta)$. In turn, the standard coordinate can be
transformed into the distortion-free pixel position of any chip. Furthermore,
due to the distortion effect, its actual or physical pixel position on the
chip can be estimated by implementing reverse GDC to the distortion-free
position. Throughout the process, the standard coordinate serves as a bridge
to enable the pixel positions of one chip to be transformed into the pixel
coordinate of another chip.
Specifically, we calculated the relative positions of two adjacent edges
between chips to estimate the geometry of CCD mosaic chips. To further
illustrate the process, we first give a layout of the CCD mosaic chips and
designate a number for each corner of the chips, as shown in Fig. 1.
L${}_{m\text{-}n}$ would represent a horizontal or vertical edge from Corner m
to Corner n (all edges are in red in Fig. 1). Any edge of a chip can be
transformed to the physical pixel coordinate of the adjacent reference chip in
order to estimate the relative positions between the chips. In the following,
we take the transformation of L${}_{3\text{-}4}$ into the pixel coordinate of
CCD#2 as an example. The whole procedure is shown in Fig. 11.
As mentioned above, L${}_{3\text{-}4}$ in CCD#1 after GDC of CCD#1 (GDC#1 for
short) can be transformed into the standard coordinate for each frame.
Similarly, L${}_{3\text{-}4,}$ in standard coordinates, can be transformed
into CCD#2’s distortion-free pixel coordinate, depending on the transformation
of CCD#2 into the standard coordinate. Finally, considering the actual GD
effect of CCD#2, we adopted a reverse GDC#2 for L${}_{3\text{-}4}$ to estimate
its physical (distorted) positions in CCD#2’s pixel coordinate, as described
below.
As seen from Fig. 3, the GD effects of the adjacent regions of any two chips
are relatively small, while the GD effects reach the maximum near the four
corners of the FOV. So, firstly, we roughly estimated the distorted positions.
That is, we used the undistorted position ($x_{0},y_{0}$) as the input for the
GD model of CCD#2, to compute GD effects. The distorted positions
($x_{d},y_{d}$) can be derived with the undistorted positions and the
corresponding GD effects. Then, the distorted positions were taken as the new
input for the GD model to derive new undistorted pixel positions
($\tilde{x}_{0},\tilde{y}_{0}$). The differences between the original
undistorted positions ($x_{0},y_{0}$) and the new undistorted pixel positions
($\tilde{x}_{*},\tilde{y}_{*}$) were used to adjust the distorted positions,
leading to much smaller differences. Finally, the iteration stopped until the
differences were less than 0.001 pixels. Based on the estimated distorted
pixel positions, the relative position between CCD#1 and CCD#2 can be solved
analytically.
It should be noted that the GD solution for each chip has the effective area
covering the size of the chip, that is 4032${\times}$4096, therefore one
should avoid transforming an edge too far from the reference chip, which would
introduce excess extrapolation errors when performing a reverse GDC.
Therefore, we choose L${}_{3\text{-}4}$ rather than L${}_{1\text{-}2}$ to be
transformed into CCD#2.
Figure 11: Flow chart of transforming edge L${}_{3\text{-}4}$ in CCD#1 into
the pixel coordinate of the reference chip CCD#2 through photographic
astrometry or differential astrometry. The key distinctions between the two
methods are the ’bridge’ linking two adjacent CCD chips, which are the
standard coordinates, or the master frame, respectively.
However, if there are a lot of stars fainter than the Gaia faint limit
($\sim$21 Gmag), such as in the observations of the CSST, it is more effective
to implement the procedure directly based on stars’ pixel positions.
Accordingly, we provide an alternative procedure by means of differential
astrometry to determine relative positions between CCD chips. In a similar
manner, every pixel position of a chip can be transformed to the pixel
coordinate of another chip, by using the local master frame and the GD
solution (Fig. 11). Therefore, it is not repeated here.
## 5 Results and discussions
Figure 12: Transformed positions of L${}_{3\text{-}4}$ in the pixel coordinate
of CCD#2. The left is derived from photographic astrometry and the right is
derived from differential astrometry. The black line shows the results of
Obs16 and the red line shows the results of Obs17. Figure 13: Similar to Fig.
12, but for the transformed positions of L${}_{13\text{-}15}$ in the pixel
coordinate of CCD#2. Figure 14: Similar to Fig. 12, but for the transformed
positions of L${}_{13\text{-}14}$ in the pixel coordinate of CCD#3. Figure 15:
Similar to Fig. 12, but for the transformed positions of L${}_{2\text{-}4}$ in
the pixel coordinate of CCD#3. Figure 16: Differences between the transformed
positions of L${}_{3\text{-}4}$ in the pixel coordinate of CCD#2 derived from
the two types of astrometry. Each line corresponds to a single observation.
The left is for Obs16 and the right is for Obs17. The averages and the
standard deviation ($\sigma$) of the differences are shown at the top in
pixels. Figure 17: Similar to Fig. 16, but for the transformed positions of
L${}_{13\text{-}15}$ in the pixel coordinate of CCD#2. Each line corresponds
to a single observation. Figure 18: Similar to Fig. 16, but for the
transformed positions of L${}_{13\text{-}14}$ in the pixel coordinate of
CCD#3. Each line corresponds to a single observation. Figure 19: Similar to
Fig. 16, but for the transformed positions of L${}_{2\text{-}4}$ in the pixel
coordinate of CCD#3. Each line corresponds to a single observation.
In this section, we adopted a six-parameter linear transformation to transform
the pixels of L${}_{3\text{-}4}$ and L${}_{13\text{-}15}$ into the pixel
coordinate of CCD#2 and to transform L${}_{13\text{-}14}$ and
L${}_{2\text{-}4}$ into CCD#3. The results of the two epochs are plotted from
Fig. 12 to Fig. 15, respectively. It is clear that the adjacent edges between
any two chips are not parallel. The results of photographic astrometry and
differential astrometry are similar to each other, while the plottings of Wang
et al. (2019) (Fig. 21 and Fig. 22) are clearly different. It confirms that
the adopted tangential points in this paper meet the actual situation and do
not introduce extra errors.
To further investigate the consistency between photographic astrometry and
differential astrometry, we performed a subtraction for the relative positions
derived from the two types of astrometry in the $X$ or $Y$ direction, as shown
from Fig. 16 to Fig. 19. For Obs16, the average of the differences between the
two types of astrometry is about 0.046 pixels ($\sim$0.021 arcsec), and for
Obs17, it is at much smaller level, of about 0.009 pixels ($\sim$0.004
arcsec). The average standard deviations of the differences are about 0.041
pixels ($\sim$0.019 arcsec) for Obs16 and about 0.032 pixels ($\sim$0.014
arcsec) for Obs17, respectively. We think the results of Obs17 are more
credible, since there are more stars in the observations of 2017 than 2016.
Greater differences and dispersions can also be found near the marginal areas.
We think the differences are mainly due to the difference between the adopted
GD solution shown in Fig. 4, while the dispersions are mainly due to the
extrapolation errors when performing reverse GDC to transform positions to the
reference chip. We believe the extrapolation errors are also related to the
magnitude of the GD effects in the grid elements. More extrapolation errors
may be introduced if the adopted GD effects are larger. Since the GD effects
of the Bok 2.3-m telescope are radial, they reach their maximum in the four
corners of the FOV, as shown in Fig. 3, while the adopted GD effects for
determining the relative positions between chips are much smaller.
To estimate the upper bound of the extrapolation errors, we computed the
averages and the precisions of the transformed corners’ position, since they
are easily disturbed by the extrapolation from the GD effects. The results are
shown in Table 5. The averages of the differences between the results of
photographic astrometry and differential astrometry are about 0.018 pixels
($\sim$0.008 arcsec) for Obs16 and about 0.026 pixels ($\sim$0.012 arcsec) for
Obs17, respectively. The average precisions are about 0.049 pixels
($\sim$0.022 arcsec) for Obs16 and about 0.056 pixels ($\sim$0.025 arcsec) for
Obs17, respectively.
Table 5: The transformed positions of the adopted corners to the reference
chips (see Fig. 1).
Date | Corner | 3 | 4 | 13 | 15
---|---|---|---|---|---
Method | mean | $\sigma$ | mean | $\sigma$ | mean | $\sigma$ | mean | $\sigma$
2016 | GD1 | (-7.409,4174.955) | (0.020,0.043) | (4087.713,4174.804) | (0.015,0.059) | (4465.584,4050.774) | (0.031,0.043) | (4474.233,19.740) | (0.022,0.060)
GD2 | (-7.400,4174.983) | (0.027,0.042) | (4087.696,4174.942) | (0.018,0.029) | (4465.591,4050.840) | (0.026,0.032) | (4474.262,19.664) | (0.034,0.021)
2017 | GD1 | (-8.668,4173.269) | (0.028,0.034) | (4086.377,4174.928) | (0.028,0.044) | (4462.119,4054.050) | (0.023,0.031) | (4468.875,23.009) | (0.035,0.025)
GD2 | (-8.730,4173.295) | (0.031,0.055) | (4086.362,4174.791) | (0.029,0.046) | (4462.143,4053.977) | (0.038,0.050) | (4468.928,23.057) | (0.066,0.065)
Date | Corner | 2 | 4 | 13 | 14
Method | mean | $\sigma$ | mean | $\sigma$ | mean | $\sigma$ | mean | $\sigma$
2016 | GD1 | (-365.724,4010.315) | (0.022,0.058) | (-362.840,-20.635) | (0.020,0.040) | (15.129,-144.431) | (0.011,0.032) | (4110.078,-132.512) | (0.018,0.037)
GD2 | (-365.835,4010.479) | (0.023,0.039) | (-362.864,-20.706) | (0.021,0.031) | (15.108,-144.558) | (0.020,0.035) | (4110.114,-132.581) | (0.023,0.029)
2017 | GD1 | (-364.492,4010.520) | (0.036,0.032) | (-362.200,-20.438) | (0.031,0.025) | (13.533,-141.278) | (0.019,0.031) | (4108.507,-133.841) | (0.028,0.050)
GD2 | (-364.520,4010.478) | (0.026,0.029) | (-362.197,-20.513) | (0.050,0.043) | (13.560,-141.323) | (0.034,0.047) | (4108.603,-133.934) | (0.035,0.068)
555GD1 means the results of photographic astrometry and GD2 means the results
of differential astrometry. Column 3 to 10 show the mean pixel positions and
their corresponding precisions. The top table shows the results taking
CCD$\\#$2 as the reference and the bottom table shows the results taking
CCD$\\#$3 as the reference. The averages of the differences between the
results of photographic astrometry and differential astrometry are about 0.018
pixels ($\sim$0.008 arcsec) for Obs16 and about 0.026 pixels ($\sim$0.012
arcsec) for Obs17 respectively. And the average precisions are about 0.049
pixels ($\sim$0.022 arcsec) for Obs16 and about 0.056 pixels ($\sim$0.025
arcsec) for Obs17 respectively. All units are in pixels.
For comparison with the AK03 method in the next section, we consider the
average of the transformed positions as the average gap between chips. The
relative angle between chips can be estimated by the slope of a fitted
straight line of the transformed positions. The results are shown in Table 6.
For the two types of astrometry, there are some little differences between
them in rotation angle, which are within 0.002 degrees. For Obs16, the average
gaps derived from photographic astrometry and differential astrometry differ
by about 0.046 pixel ($\sim$0.021 arcsec). For Obs17, the average gaps derived
from photographic astrometry and differential astrometry only differ by about
0.001 pixel. The precisions of the gaps derived from the two types of
astrometry achieve a comparable level. The average precisions of the gaps are
about 0.018 pixel ($\sim$0.008 arcsec) for Obs16 and 0.028 pixel ($\sim$0.013
arcsec) for Obs17, respectively.
Table 6: Statistics of the average gaps and the relative angles between chips.
Date | Item | $<$mean$>$ | $\sigma$ | $<$mean$>$ | $\sigma$ | $<$mean$>$ | $\sigma$ | $<$mean$>$ | $\sigma$
---|---|---|---|---|---|---|---|---|---
| | CCD1(CCD2) | CCD4(CCD3) | CCD4(CCD2) | CCD1(CCD3)
2016 | GD1gap | 142.853 | 0.019 | 138.590 | 0.018 | 373.893 | 0.023 | 364.373 | 0.014
GD1angle | -0.003 | 0.001 | 0.167 | 0.001 | 89.877 | 0.000 | 89.960 | 0.000
GD2gap | 142.935 | 0.017 | 138.649 | 0.022 | 373.925 | 0.016 | 364.385 | 0.015
GD2angle | -0.002 | 0.001 | 0.169 | 0.001 | 89.877 | 0.001 | 89.960 | 0.000
2017 | GD1gap | 142.079 | 0.029 | 137.686 | 0.028 | 369.456 | 0.021 | 363.432 | 0.023
GD1angle | 0.023 | 0.001 | 0.104 | 0.001 | 89.904 | 0.001 | 89.968 | 0.001
GD2gap | 142.091 | 0.034 | 137.682 | 0.035 | 369.460 | 0.028 | 363.417 | 0.028
GD2angle | 0.022 | 0.001 | 0.104 | 0.001 | 89.903 | 0.001 | 89.968 | 0.001
666GD1 means the result of photographic astrometry and GD2 means the result of
differential astrometry. Columns 3 to 10 show the average and the precision
for the gaps and the angles. The reference chips are in parentheses. The
results of the gaps are in pixels and the results of relative angles are in
degrees.
## 6 Comparison with the AK03 method
As our method is implemented by transforming the adjacent edge of one chip to
the actual pixel coordinate of the reference chip, it is a physical metric for
the CCD mosaic chips. In contrast, the AK03 method determines the geometry of
CCD mosaic chips when each chip is put into a distortion-free coordinate.
Although the AK03 method mainly aims to offer convenient solutions for many
applications needing to transform the GD-corrected positions of each chip into
a common distortion-free reference frame, it is still useful for monitoring
the progress of the interchip offset of CCD mosaic chips. In this section, we
make a comparison between the two methods from this perspective.
Of the CCD#k, the distortion-corrected positions ($x_{k}^{\rm corr},y_{k}^{\rm
corr}$) were transformed to the distortion-corrected positions of reference
chip (CCD#ref,ref$\neq$k) using a six-parameter linear transform, which can
absorb the DAR in the following first-order terms:
$\begin{array}[]{rcl}\left(\begin{array}[]{c}x_{ref}^{\rm corr}\\\
y_{ref}^{\rm corr}\\\
\end{array}\right)&\\!=\\!&\\!\left[\begin{array}[]{cc}\\!\\!A&B\\\
\\!\\!C&D\\\ \end{array}\\!\right]\\!\left(\begin{array}[]{c}x_{k}^{\rm
corr}\\\ y_{k}^{\rm corr}\\\
\end{array}\\!\right)+\left(\begin{array}[]{c}\\!x_{k0}\\\ \\!y_{k0}\\\
\end{array}\\!\right).\end{array}$
The relative scale between CCD#k and CCD#ref can be derived by
$\alpha\textnormal{=}\sqrt{AD\textnormal{-}BC}$ and the rotation angle
$\theta\textnormal{=}\arctan(B\textnormal{-}C,A\textnormal{+}D)$ according to
Anderson (2007). For each frame, we can proceed to solve the relative
quantities (scale, relative angle, and gap) when CCD#2 and CCD#3 are taken as
references, respectively. The results are shown in Appendix B, from Table 7 to
Table 10.
Because our method is implemented in actual or physical coordinate including
GD effects, while the AK03 method is implemented in a distortion-free
coordinate, we only compare the precisions of the relative angle and gap of
the two methods. For the relative angle between chips, the two methods have
similar precisions. For the relative gap, we plot their values and precisions
of the two epochs’s observations in Fig. 20 and Fig. 21, although they are
based on measurements with different filters. We note that the results of our
method are derived from differential astrometry. Similar changes in the offset
can be detected by both methods; however, the solution proposed in this paper
shows at least a factor of two improvement in precision on average over the
AK03 method. We think there are two definite advantages to our method. On one
hand, we perform the measurements for two adjacent edges instead of two
individual chips, making the results as local as possible and meanwhile
alleviating the propagated error of the transformation and the GD model
throughout the FOV. On the other hand, the final outcome is not mixed with the
GD effects, which would bias the realistic geometry of the CCD mosaic chips.
Figure 20: Averages and precisions ($\sigma$) of the gap in the horizonal and
vertical directions as a function of time, when CCD#2 is taken as reference.
We note that the gaps of 2016 are based on measurements with the DES r filter
and the gaps of 2017 are based on measurements with the SDSS g filter. The
black points represent the results derived from the proposed method in this
paper, and the red points represent the results derived from the AK03 method.
The shaded bars indicate a $\pm\sigma\times 15$ (for clarity) interval around
the mean gap location. The values of $\sigma$ are shown in the panel.
Figure 21: Similar to Fig. 20. The variations of the gap in the horizonal and
vertical direction as a function of time are shown, with CCD#3 taken as
reference. We note that the gaps of 2016 are based on measurements with the
DES r filter and the gaps of 2017 are based on measurements with the SDSS g
filter.
## 7 Conclusion
In this paper, we propose a solution to determine the actual geometry of CCD
mosaic chips by taking advantage of the GD solution derived from the
observations. Taking into consideration the fact that there may be few stars
available for astrometric calibration during the deep observation of large
ground-based or space-base telescope, we referred to the idea from the
astrometry of the HST to only use stars’ pixel positions to derive the
relative positions between chips. We refer to the practice of only using the
pixel position as differential astrometry in this paper. In order to ensure
the results are reliable, we took advantage of Gaia EDR3 to derive the
relative positions between chips, as was done in Wang et al. (2019), to
provide a close comparison. We refer to the practice of using an astrometric
catalogue as photographic astrometry.
We implemented the technique for the CCD mosaic chips of the Bok 2.3-m
telescope at Kitt Peak, based on two epochs of observations (Jan 17,2016 and
Mar 5,2017). For the two epochs of observations, the average gaps derived from
photographic astrometry and differential astrometry differ by about 0.046
pixels ($\sim$0.021 arcsec) and 0.001 pixels (¡0.001 arcsec), respectively,
while the average precisions of the gaps are about 0.018 pixels ($\sim$0.008
arcsec) and 0.028 pixels ($\sim$0.013 arcsec), respectively.
We also made a comparison with the AK03 method, which is adopted for measuring
the geometry of WFPC2 chips and WFC3 chips at the HST. The results show that
the solution proposed in this paper shows an improvement of at least a factor
of two in precision on average.
This paper shows there is a good agreement between the two types of astrometry
for the relative positions between chips. This is important for the deep
observations of the planned CSST. Since the CSST can observe much fainter
stars (e.g. 26 mag in the g band) than the Gaia satellite, of which we only
have the pixel positions rather than their astrometric parameters (e.g.
J2000.0 positions, proper motions, parallaxes, etc.), differential astrometry
is expected to be more suitable for determining the relative positions between
chips. In the mean time, the internal positional precisions can be
substantially improved by precisely transforming the positions from different
chips into a global coordinate system. However, accurate solutions for the GD
and the geometry of CCD mosaic chips are needed. So, we recommend verifying
the calibration on a regular basis, since the experiences with the HST show
the importance of detecting long-term variations of the GD (Anderson 2007;
Ubeda et al. 2014), which are caused by, for example, the slow out-gassing of
metals (Bedin & Fontanive 2018). This would also lead to long-term variations
of the geometry of CCD mosaic chips.
###### Acknowledgements.
This work was supported by the China Manned Space Project with NO. CMS-
CSST-2021-B08, by the National Natural Science Foundation of China (Grant Nos.
11873026, 11273014), by the Joint Research Fund in Astronomy (Grant No.
U1431227) under cooperative agreement between the National Natural Science
Foundation of China (NSFC) and Chinese Academy Sciences (CAS), and partly by
the Fundamental Research Funds for the Central Universities and Excellent
Postgraduate Recommendation Scientific Research Innovative Cultivation Program
of Jinan University. This work has made use of data from the European Space
Agency (ESA) mission _Gaia_ (https://www.cosmos.esa.int/gaia), processed by
the _Gaia_ Data Processing and Analysis Consortium (DPAC,
https://www.cosmos.esa.int/web/gaia/dpac/consortium). Funding for the DPAC has
been provided by national institutions, in particular the institutions
participating in the _Gaia_ Multilateral Agreement.
## References
* Anderson (2007) Anderson, J. 2007, Variation of the Distortion Solution, Instrument Science Report ACS 2007-08
* Anderson (2007) Anderson, J. 2007, Proceedings of the American Mathematical Society
* Anderson & King (2003) Anderson, J. & King, I. R. 2003, PASP, 115, 113
* Bedin & Fontanive (2018) Bedin, L. R. & Fontanive, C. 2018, MNRAS, 481, 5339
* Bellini & Bedin (2009) Bellini, A. & Bedin, L. R. 2009, PASP, 121, 1419
* Bernstein et al. (2017) Bernstein, G. M., Armstrong, R., Plazas, A. A., et al. 2017, PASP, 129, 074503
* DePoy et al. (2008) DePoy, D. L., Abbott, T., Annis, J., et al. 2008, in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Vol. 7014, Ground-based and Airborne Instrumentation for Astronomy II, 70140E
* Fabricius et al. (2021) Fabricius, C., Luri, X., Arenou, F., et al. 2021, A&A, 649, A5
* French et al. (2006) French, R. G., McGhee, C. A., Frey, M., et al. 2006, PASP, 118, 246
* Gaia Collaboration et al. (2018) Gaia Collaboration, Brown, A. G. A., Vallenari, A., et al. 2018, A&A, 616, A1
* Gaia Collaboration et al. (2021) Gaia Collaboration, Brown, A. G. A., Vallenari, A., et al. 2021, A&A, 649, A1
* Gubler & Tytler (1998) Gubler, J. & Tytler, D. 1998, PASP, 110, 738
* Gunn et al. (1998) Gunn, J. E., Carr, M., Rockosi, C., et al. 1998, AJ, 116, 3040
* Lin et al. (2020) Lin, F. R., Peng, Q. Y., & Zheng, Z. J. 2020, MNRAS, 498, 258
* Lou et al. (2016) Lou, Z., Liang, M., Yao, D., et al. 2016, in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Vol. 10154, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, 101542A
* Luppino et al. (1995) Luppino, G. A., Mezger, M. R., & Miyazaki, S. 1995, in IAU Symposium, Vol. 167, New Developments in Array Technology and Applications, ed. A. G. D. Philip, K. Janes, & A. R. Upgren, 297
* Peng et al. (2017) Peng, H. W., Peng, Q. Y., & Wang, N. 2017, MNRAS, 467, 2266
* Peng et al. (2012) Peng, Q. Y., Vienne, A., Zhang, Q. F., et al. 2012, AJ, 144, 170
* Peng et al. (2015) Peng, Q. Y., Wang, N., Vienne, A., et al. 2015, MNRAS, 449, 2638
* Platais et al. (2002) Platais, I., Kozhurina-Platais, V., Girard, T. M., et al. 2002, AJ, 124, 601
* Riello et al. (2021) Riello, M., De Angeli, F., Evans, D. W., et al. 2021, A&A, 649, A3
* Sekiguchi et al. (1992) Sekiguchi, M., Iwashita, H., Doi, M., Kashikawa, N., & Okamura, S. 1992, PASP, 104, 744
* Ubeda et al. (2014) Ubeda, L., Kozhurina-Platais, V., & Bedin, L. R. 2014, Instrument Science Report ACS 2013-03, 12 pages
* Wadadekar et al. (2006) Wadadekar, Y., Casertano, S., Hook, R., et al. 2006, PASP, 118, 450
* Wang et al. (2017) Wang, N., Peng, Q. Y., Peng, H. W., et al. 2017, MNRAS, 468, 1415
* Wang et al. (2019) Wang, N., Peng, Q. Y., Zhou, X., Peng, X. Y., & Peng, H. W. 2019, MNRAS, 485, 1626
* Zhan (2021) Zhan, H. 2021, Chinese Science Bulletin, 66, 1290
* Zheng et al. (2021) Zheng, Z. J., Peng, Q. Y., & Lin, F. R. 2021, MNRAS, 502, 6216
## Appendix A Third-order polynomial for the GD solutions
Table 7: Coefficients and their errors of the third-order polynomial for each chip, derived from Obs16. Term $\\!(k)\\!\\!\\!\\!\\!$ | Polyn. | $a_{k}$ | $b_{k}$ | $\sigma_{a}$ | $\sigma_{b}$ | $a_{k}$ | $b_{k}$ | $\sigma_{a}$ | $\sigma_{b}$
---|---|---|---|---|---|---|---|---|---
| | CCD#1
| | GD1 | GD2
0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | 1.782 | -1.876 | 0.002 | 0.005 | 1.947 | -2.194 | 0.003 | 0.008
1 | $\tilde{x}$ | 0.559 | -4.617 | 0.005 | 0.014 | -0.235 | -4.347 | 0.008 | 0.019
2 | $\tilde{y}$ | -4.048 | -0.291 | 0.005 | 0.014 | -3.852 | -1.099 | 0.008 | 0.019
3 | $\tilde{x}^{2}$ | -6.298 | 1.980 | 0.003 | 0.010 | -6.145 | 2.076 | 0.005 | 0.014
4 | $\tilde{x}\tilde{y}$ | 3.897 | -4.199 | 0.003 | 0.008 | 3.775 | -3.882 | 0.005 | 0.012
5 | $\tilde{y}^{2}$ | -2.047 | 5.666 | 0.003 | 0.010 | -2.221 | 5.635 | 0.005 | 0.014
6 | $\tilde{x}^{3}$ | 1.917 | -0.020 | 0.006 | 0.019 | 1.926 | -0.025 | 0.011 | 0.027
7 | $\tilde{x}^{2}\tilde{y}$ | -0.098 | 1.888 | 0.006 | 0.017 | -0.096 | 1.883 | 0.009 | 0.024
8 | $\tilde{x}\tilde{y}^{2}$ | 1.871 | -0.088 | 0.006 | 0.017 | 1.887 | -0.100 | 0.009 | 0.024
9 | $\tilde{y}^{3}$ | -0.026 | 2.140 | 0.006 | 0.019 | -0.027 | 2.269 | 0.011 | 0.027
| | CCD#2
| | GD1 | GD2
0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | 1.729 | 1.479 | 0.001 | 0.003 | 1.862 | 2.045 | 0.002 | 0.004
1 | $\tilde{x}$ | 0.836 | 4.055 | 0.003 | 0.007 | -0.100 | 4.406 | 0.005 | 0.010
2 | $\tilde{y}$ | 4.100 | -0.288 | 0.003 | 0.007 | 4.303 | -1.209 | 0.005 | 0.010
3 | $\tilde{x}^{2}$ | -6.303 | -1.838 | 0.002 | 0.005 | -6.154 | -1.741 | 0.004 | 0.007
4 | $\tilde{x}\tilde{y}$ | -3.622 | -4.191 | 0.002 | 0.004 | -3.821 | -3.881 | 0.003 | 0.006
5 | $\tilde{y}^{2}$ | -2.038 | -5.305 | 0.002 | 0.005 | -2.210 | -5.423 | 0.004 | 0.007
6 | $\tilde{x}^{3}$ | 1.911 | 0.029 | 0.005 | 0.01 | 1.912 | 0.022 | 0.008 | 0.014
7 | $\tilde{x}^{2}\tilde{y}$ | 0.069 | 1.871 | 0.004 | 0.009 | 0.072 | 1.870 | 0.007 | 0.012
8 | $\tilde{x}\tilde{y}^{2}$ | 1.857 | 0.067 | 0.004 | 0.009 | 1.875 | 0.074 | 0.007 | 0.012
9 | $\tilde{y}^{3}$ | 0.024 | 1.892 | 0.005 | 0.010 | 0.008 | 1.968 | 0.008 | 0.014
| | CCD#3
| | GD1 | GD2
0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | -1.578 | -1.566 | 0.002 | 0.003 | -1.968 | -2.111 | 0.002 | 0.004
1 | $\tilde{x}$ | 0.298 | 4.006 | 0.004 | 0.008 | -0.745 | 4.609 | 0.006 | 0.011
2 | $\tilde{y}$ | 4.066 | 0.349 | 0.004 | 0.008 | 4.073 | -0.657 | 0.006 | 0.011
3 | $\tilde{x}^{2}$ | 5.841 | 1.994 | 0.003 | 0.006 | 5.995 | 2.083 | 0.004 | 0.008
4 | $\tilde{x}\tilde{y}$ | 3.898 | 3.857 | 0.003 | 0.005 | 3.785 | 4.166 | 0.004 | 0.007
5 | $\tilde{y}^{2}$ | 1.898 | 5.721 | 0.003 | 0.006 | 1.769 | 5.684 | 0.004 | 0.008
6 | $\tilde{x}^{3}$ | 1.894 | 0.036 | 0.006 | 0.011 | 1.898 | 0.032 | 0.009 | 0.015
7 | $\tilde{x}^{2}\tilde{y}$ | 0.096 | 1.894 | 0.005 | 0.010 | 0.099 | 1.904 | 0.008 | 0.013
8 | $\tilde{x}\tilde{y}^{2}$ | 1.858 | 0.099 | 0.005 | 0.010 | 1.878 | 0.091 | 0.008 | 0.013
9 | $\tilde{y}^{3}$ | 0.041 | 1.900 | 0.006 | 0.011 | 0.040 | 1.979 | 0.009 | 0.015
| | CCD#4
| | GD1 | GD2
0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | -1.423 | 1.352 | 0.002 | 0.003 | -1.880 | 2.106 | 0.003 | 0.005
1 | $\tilde{x}$ | 0.838 | -3.805 | 0.004 | 0.008 | -0.302 | -3.751 | 0.007 | 0.012
2 | $\tilde{y}$ | -3.637 | 0.168 | 0.004 | 0.008 | -3.170 | -0.923 | 0.007 | 0.012
3 | $\tilde{x}^{2}$ | 5.875 | -1.847 | 0.003 | 0.006 | 6.024 | -1.756 | 0.005 | 0.008
4 | $\tilde{x}\tilde{y}$ | -3.622 | 3.894 | 0.003 | 0.005 | -3.815 | 4.205 | 0.004 | 0.007
5 | $\tilde{y}^{2}$ | 1.926 | -5.285 | 0.003 | 0.006 | 1.799 | -5.409 | 0.005 | 0.008
6 | $\tilde{x}^{3}$ | 1.902 | -0.037 | 0.006 | 0.012 | 1.900 | -0.047 | 0.009 | 0.017
7 | $\tilde{x}^{2}\tilde{y}$ | -0.098 | 1.892 | 0.005 | 0.010 | -0.099 | 1.903 | 0.008 | 0.014
8 | $\tilde{x}\tilde{y}^{2}$ | 1.871 | -0.101 | 0.005 | 0.010 | 1.891 | -0.111 | 0.008 | 0.014
9 | $\tilde{y}^{3}$ | -0.032 | 1.933 | 0.006 | 0.012 | -0.035 | 2.019 | 0.009 | 0.017
Table 8: Coefficients and their errors of the third-order polynomial for each chip, derived from Obs17. Term $\\!(k)\\!\\!\\!\\!\\!$ | Polyn. | $a_{k}$ | $b_{k}$ | $\sigma_{a}$ | $\sigma_{b}$ | $a_{k}$ | $b_{k}$ | $\sigma_{a}$ | $\sigma_{b}$
---|---|---|---|---|---|---|---|---|---
| | CCD#1
| | GD1 | GD2
0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | 1.706 | -1.594 | 0.001 | 0.001 | 2.677 | -2.354 | 0.001 | 0.001
1 | $\tilde{x}$ | 0.699 | -4.336 | 0.002 | 0.003 | -0.853 | -4.303 | 0.003 | 0.003
2 | $\tilde{y}$ | -4.459 | 0.235 | 0.002 | 0.003 | -3.830 | -0.659 | 0.003 | 0.003
3 | $\tilde{x}^{2}$ | -6.310 | 2.008 | 0.001 | 0.002 | -6.399 | 2.158 | 0.002 | 0.002
4 | $\tilde{x}\tilde{y}$ | 3.966 | -4.194 | 0.001 | 0.002 | 3.744 | -4.297 | 0.002 | 0.002
5 | $\tilde{y}^{2}$ | -2.041 | 5.800 | 0.001 | 0.002 | -2.022 | 5.709 | 0.002 | 0.002
6 | $\tilde{x}^{3}$ | 1.934 | -0.021 | 0.003 | 0.004 | 1.952 | -0.010 | 0.004 | 0.005
7 | $\tilde{x}^{2}\tilde{y}$ | -0.085 | 1.887 | 0.002 | 0.003 | -0.090 | 1.895 | 0.003 | 0.004
8 | $\tilde{x}\tilde{y}^{2}$ | 1.854 | -0.074 | 0.002 | 0.003 | 1.873 | -0.077 | 0.003 | 0.004
9 | $\tilde{y}^{3}$ | -0.012 | 1.889 | 0.003 | 0.004 | -0.015 | 1.919 | 0.004 | 0.005
| | CCD#2
| | GD1 | GD2
0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | 1.487 | 1.358 | 0.001 | 0.001 | 3.249 | 2.081 | 0.001 | 0.001
1 | $\tilde{x}$ | 1.283 | 3.983 | 0.002 | 0.002 | -0.631 | 4.357 | 0.003 | 0.003
2 | $\tilde{y}$ | 4.022 | 0.044 | 0.002 | 0.002 | 4.424 | -1.207 | 0.003 | 0.003
3 | $\tilde{x}^{2}$ | -6.294 | -1.813 | 0.002 | 0.002 | -6.377 | -1.666 | 0.002 | 0.002
4 | $\tilde{x}\tilde{y}$ | -3.581 | -4.149 | 0.001 | 0.001 | -3.901 | -4.257 | 0.002 | 0.002
5 | $\tilde{y}^{2}$ | -2.025 | -5.276 | 0.002 | 0.002 | -2.001 | -5.461 | 0.002 | 0.002
6 | $\tilde{x}^{3}$ | 1.920 | 0.009 | 0.003 | 0.003 | 1.937 | 0.017 | 0.004 | 0.004
7 | $\tilde{x}^{2}\tilde{y}$ | 0.030 | 1.879 | 0.003 | 0.003 | 0.032 | 1.891 | 0.004 | 0.004
8 | $\tilde{x}\tilde{y}^{2}$ | 1.865 | 0.028 | 0.003 | 0.003 | 1.881 | 0.032 | 0.004 | 0.004
9 | $\tilde{y}^{3}$ | 0.002 | 1.869 | 0.003 | 0.003 | 0.003 | 1.895 | 0.004 | 0.004
| | CCD#3
| | GD1 | GD2
0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | -1.578 | -1.566 | 0.002 | 0.003 | -1.968 | -2.111 | 0.002 | 0.004
1 | $\tilde{x}$ | 0.298 | 4.006 | 0.004 | 0.008 | -0.745 | 4.609 | 0.006 | 0.011
2 | $\tilde{y}$ | 4.066 | 0.349 | 0.004 | 0.008 | 4.073 | -0.657 | 0.006 | 0.011
3 | $\tilde{x}^{2}$ | 5.841 | 1.994 | 0.003 | 0.006 | 5.995 | 2.083 | 0.004 | 0.008
4 | $\tilde{x}\tilde{y}$ | 3.898 | 3.857 | 0.003 | 0.005 | 3.785 | 4.166 | 0.004 | 0.007
5 | $\tilde{y}^{2}$ | 1.898 | 5.721 | 0.003 | 0.006 | 1.769 | 5.684 | 0.004 | 0.008
6 | $\tilde{x}^{3}$ | 1.894 | 0.036 | 0.006 | 0.011 | 1.898 | 0.032 | 0.009 | 0.015
7 | $\tilde{x}^{2}\tilde{y}$ | 0.096 | 1.894 | 0.005 | 0.010 | 0.099 | 1.904 | 0.008 | 0.013
8 | $\tilde{x}\tilde{y}^{2}$ | 1.858 | 0.099 | 0.005 | 0.010 | 1.878 | 0.091 | 0.008 | 0.013
9 | $\tilde{y}^{3}$ | 0.041 | 1.900 | 0.006 | 0.011 | 0.040 | 1.979 | 0.009 | 0.015
| | CCD#4
| | GD1 | GD2
0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | -1.423 | 1.352 | 0.002 | 0.003 | -1.880 | 2.106 | 0.003 | 0.005
1 | $\tilde{x}$ | 0.300 | 4.171 | 0.002 | 0.002 | -1.583 | 4.809 | 0.003 | 0.003
2 | $\tilde{y}$ | 4.226 | 0.504 | 0.002 | 0.002 | 4.411 | -0.739 | 0.003 | 0.003
3 | $\tilde{x}^{2}$ | 5.971 | 2.041 | 0.001 | 0.002 | 5.994 | 2.180 | 0.002 | 0.002
4 | $\tilde{x}\tilde{y}$ | 3.982 | 3.912 | 0.001 | 0.001 | 3.745 | 3.891 | 0.002 | 0.002
5 | $\tilde{y}^{2}$ | 1.925 | 5.846 | 0.001 | 0.002 | 1.952 | 5.742 | 0.002 | 0.002
6 | $\tilde{x}^{3}$ | 1.918 | 0.009 | 0.003 | 0.003 | 1.930 | -0.004 | 0.004 | 0.004
7 | $\tilde{x}^{2}\tilde{y}$ | 0.037 | 1.859 | 0.002 | 0.003 | 0.033 | 1.873 | 0.003 | 0.004
8 | $\tilde{x}\tilde{y}^{2}$ | 1.828 | 0.040 | 0.002 | 0.003 | 1.845 | 0.037 | 0.003 | 0.004
9 | $\tilde{y}^{3}$ | 0.017 | 1.820 | 0.003 | 0.003 | 0.017 | 1.838 | 0.004 | 0.004
## Appendix B Average relative quantities between CCD chips derived from the
AK03 method
Table 9: Average relative quantities (scale, relative angle and gap) derived
from AK03 method for Obs16 when CCD#2 is taken as a reference, with formal
errors.
Parameter | $k=$[1] | $k=$[3] | $k=$[4]
---|---|---|---
$\alpha_{k}/\alpha_{[2]}$ | 0.99997 | 0.99987 | 1.00004
| $\pm$0.00001 | $\pm$0.00002 | $\pm$0.00001
$\theta_{k}$$-$$\theta_{[2]}$ | 0.029 | 0.067 | $-$0.106
| $\pm$0.001 | $\pm$0.001 | $\pm$0.001
$(x_{[2]}^{\rm corr})_{k}$ | $-$7.701 | 4459.920 | 4475.180
| $\pm$0.050 | $\pm$0.063 | $\pm$0.042
$(y_{[2]}^{\rm corr})_{k}$ | 4179.232 | 4196.955 | 21.632
| $\pm$0.042 | $\pm$0.096 | $\pm$0.028
777The values for $\theta_{k}$$-$$\theta_{[2]}$ are expressed in degrees. The
relative shift $(x_{[2]}^{\rm corr})_{k}$ and $(y_{[2]}^{\rm corr})_{k}$ are
given in pixels with regard to the system of CCD#2. The formal errors in bold
are compared with the ones derived from our method.
Table 10: Similar quantities (scale, relative angle and gap) for Obs16 to
those in Table 7 when CCD#3 is taken as a reference, with formal errors.
Parameter | $k=$[1] | $k=$[2] | $k=$[4]
---|---|---|---
$\alpha_{k}/\alpha_{[3]}$ | 1.00010 | 1.00013 | 1.00017
| $\pm$0.00002 | $\pm$0.00002 | $\pm$0.00001
$\theta_{k}$$-$$\theta_{[3]}$ | $-$0.038 | $-$0.067 | $-$0.171
| $\pm$0.000 | $\pm$0.001 | $\pm$0.001
$(x_{[3]}^{\rm corr})_{k}$ | $-$4467.127 | $-$4454.508 | 21.187
| $\pm$0.034 | $\pm$0.059 | $\pm$0.050
$(y_{[3]}^{\rm corr})_{k}$ | $-$22.911 | $-$4202.644 | $-$4175.838
| $\pm$0.035 | $\pm$0.079 | $\pm$0.033
888The values for $\theta_{k}$$-$$\theta_{[3]}$ are expressed in degrees. The
relative shift $(x_{[3]}^{\rm corr})_{k}$ and $(y_{[3]}^{\rm corr})_{k}$ are
given in pixels with regard to the system of CCD#3. The formal errors in bold
are compared with the ones derived from our method.
Table 11: Average relative quantities (scale, relative angle and gap) derived
from AK03 method for Obs17 when CCD#2 is taken as a reference, with formal
errors.
Parameter | $k=$[1] | $k=$[3] | $k=$[4]
---|---|---|---
$\alpha_{k}/\alpha_{[2]}$ | 0.99997 | 1.00006 | 1.00021
| $\pm$0.00002 | $\pm$0.00003 | $\pm$0.00003
$\theta_{k}$$-$$\theta_{[2]}$ | $-$0.024 | 0.015 | $-$0.074
| $\pm$0.001 | $\pm$0.001 | $\pm$0.002
$(x_{[2]}^{\rm corr})_{k}$ | $-$11.772 | 4454.720 | 4470.083
| $\pm$0.046 | $\pm$0.109 | $\pm$0.076
$(y_{[2]}^{\rm corr})_{k}$ | 4178.207 | 4199.352 | 23.171
| $\pm$0.078 | $\pm$0.146 | $\pm$0.092
999The values for $\theta_{k}$$-$$\theta_{[2]}$ are expressed in degrees. The
relative shift $(x_{[2]}^{\rm corr})_{k}$ and $(y_{[2]}^{\rm corr})_{k}$ are
given in pixels with regard to the system of CCD#2. The formal errors in bold
are compared with the ones derived from our method.
Table 12: Similar quantities (scale, relative angle and gap) for Obs17 to
those in Table 9 when CCD#3 is taken as a reference, with formal errors.
Parameter | $k=$[1] | $k=$[2] | $k=$[4]
---|---|---|---
$\alpha_{k}/\alpha_{[3]}$ | 0.99990 | 0.99994 | 1.00015
| $\pm$0.00003 | $\pm$0.00003 | $\pm$0.00002
$\theta_{k}$$-$$\theta_{[3]}$ | $-$0.039 | $-$0.015 | $-$0.088
| $\pm$0.001 | $\pm$0.001 | $\pm$0.001
$(x_{[3]}^{\rm corr})_{k}$ | $-$4466.147 | $-$4452.300 | 16.439
| $\pm$0.084 | $\pm$0.114 | $\pm$0.056
$(y_{[3]}^{\rm corr})_{k}$ | $-$22.285 | $-$4200.284 | $-$4174.967
| $\pm$0.070 | $\pm$0.093 | $\pm$0.073
101010The values for $\theta_{k}$$-$$\theta_{[3]}$ are expressed in degrees.
The relative shift $(x_{[3]}^{\rm corr})_{k}$ and $(y_{[3]}^{\rm corr})_{k}$
are given in pixels with regard to the system of CCD#3. The formal errors in
bold are compared with the ones derived from our method.
| arxiv-papers | 2021-07-27T09:37:50 | 2024-09-04T03:07:21.094737 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Z.J. Zheng, Q.Y. Peng, A. Vienne, F.R. Lin and B.F. Guo",
"submitter": "Zhongjie Zheng",
"url": "https://arxiv.org/abs/2107.12691"
} |
2107.12692 | # Dynamic and Static Object Detection Considering Fusion Regions and Point-
wise Features
Andrés E. Gómez H.1, Thomas Genevois1, Jerome Lussereau1 and Christian
Laugier1 *This work was supported by the FUI STAR project1 Authors are with
Univ. Grenoble Alpes, INRIA Grenoble Rhône-Alpes, Chroma Team, 38334
Montbonnot, France. Correspondence: [email protected],
[email protected]
###### Abstract
Object detection is a critical problem for the safe interaction between
autonomous vehicles and road users. Deep-learning methodologies allowed the
development of object detection approaches with better performance. However,
there is still the challenge to obtain more characteristics from the objects
detected in real-time. The main reason is that more information from the
environment’s objects can improve the autonomous vehicle capacity to face
different urban situations. This paper proposes a new approach to detect
static and dynamic objects in front of an autonomous vehicle. Our approach can
also get other characteristics from the objects detected, like their position,
velocity, and heading. We develop our proposal fusing results of the
environment’s interpretations achieved of YoloV3 and a Bayesian filter. To
demonstrate our proposal’s performance, we asses it through a benchmark
dataset and real-world data obtained from an autonomous platform. We compared
the results achieved with another approach.
## I INTRODUCTION
Autonomous Vehicles (AV) will only become a success if people accept them.
However, as Thomas et al. concluded in [1], some persons still do not believe
in Av’s performance. In fact, behind the AV development still exists several
technical challenges such as software complexity, real-time data analytics,
testing, and verification [2]. Nonetheless, a first step to win the users’
confidence can be to define new models for the AV’s perception-system that
improve its environment understand.
Different mathematical models integrate the perception system. Some of them
permit the AV to find, classify and track several objects. The models decode
sensor data collected from the physical world based on some requirements.
Therefore, the sensors are a central part of the perception system. However,
according to the sensor type, the model outcome could present some troubles.
For example, an RGB camera sensor generally is a common choice given its cost
and the significant amount of information available inside its field of view.
Nevertheless, This sensor is vulnerable to light changes and weather
conditions. Consequently, the models have to consider fusing data from
different sensors to obtain a result free of a single sensor’s limitations.
Critical models for the safety around an AV can improve their results by
fusing information from different sensor sources. Object detection models are
an example of it. By default, the development of some object detection models
considers only the use of RGB cameras. In that models, the image detections
are limited only to located and classified the objects inside a camera field
of view. However, Lidar measures from the environment could help obtain more
information concerning the same object detected by the RGB cameras (e.g.,
object position 2D).
We propose a new approach to detect dynamic and static objects in an urban
environment. Our approach also gets other characteristics from the objects
detected, such as position, velocity, and heading. We found the objects’
information fusing the environment’s interpretations from two different
approaches. The first approach is the YoloV3 object detector [3]. YoloV3
obtains a likely classification and position from each object inside an image
achieved with an RGB camera. The second approach is the Bayesian filter known
as the Conditional Monte Carlo Dense Occupancy Tracker(CMCDOT)[4]. This
approach achieves dynamic and static information from the urban environment
through a lidar sensor. Both approaches work in real-time. Our main
contributions can be summarized as follows:
* •
Fusion of the results achieved from an object detector and a Bayesian filter
to find dynamic and static objects in an urban environment.
* •
To get more characteristics about the objects detected by processing point-
wise features inside fusion regions.
The paper organization has the following structure: Section II reviews the
related work. Section III details the definition of the fusion regions and the
point-wise feature processing. Section IV shows the experimental results.
Finally, section V provides concluding remarks.
## II RELATED WORK
We review related works with a focus on object detections for AV.
Specifically, we considered the works with two essential aspects: i) the
number of sensors employed, ii) and the deep learning approaches examined to
object detection. In the first aspect, we found the work presented by Liang et
al. in [5]. They considered that the range image representation is a feasible
alternative to object detection. Therefore, they developed a 3D object
detector framework called RangeRCNN, based on range images. However, despite
good performance obtained by RangeRCNN in the KITTI benchmark, it only
contemplates lidar data as input.
Arnold et al. in [6] reviewed several 3D object detection approaches on AV.
Moreover, the authors also studied different sensor technologies and standards
datasets. They consider that 2D detections on the image plane are not enough
for a safety-critical system as an AV. Therefore, The authors proved that an
object detection approach needs to fuse information from different sensors
with models executed in real-time. This fact is the basis of our proposal.
The sensors’ information and the fusion models applied in them are essential
to determine the AV’s safety. In [7], Wang, Wu, and Niu analyzed typical
sensors and several multi-sensor fusion strategies used in the last years on
AVs. The authors confirmed the need to fuse sensors’ information because it is
necessary to avoid a single sensor’s limitations and uncertainties. This
conclusion is a found fact in several papers consulted.
Rangesh and Trivedi in [8] present the $M^{3}OT$ framework. This framework can
accept an object proposal from different sensor modalities to track it. To
obtain the object track recommendations, Rangesh and Trivedi considered a
tracking-by-detection approach. This approach uses a nearly-fusion model to
associate the objects detected by each sensor. The result of the nearly-fusion
model is a merged representation from the raw sensor data.
Zhu et al. in [9] presented a literature review about several techniques used
to environment perception for intelligent vehicles. The document summarizes
different methods with their pros and cons. According to this, the deep-
learning methods adopted for the scene understanding obtained a relevant
validation. However, the authors considered that these deep-learning methods
should consider motion and depth information to improve its accuracy.
Consequently, an occupancy grid approach could be helpful to complement these
deep-learning methods.
For the second aspect, it was possible to find different deep learning
approaches used on object detection problems. For example, Pang and Cao in
[10] analyzed some object detection methods based on deep learning. They
compare typical CNN-based architectures focused on a specific use case,
pedestrian detection. One conclusion of this work is that object detection
using deep-learning approaches has several challenges. The occlusion, scale
variation, and deformation in the objects are some of them.
In [11], Zhao et al. provided the result of a systematic review, which
analyzed object detection using deep-learning models on different
applications. They compared each model through experiments. According to the
experiments’ results, the authors also concluded two main challenges on object
detection. The first one is real-time object detection, and the second one is
to extend the classical methods for 2D to 3D object detection.
Additionally, we did find some proposals where the authors considered deep-
learning approaches for the fusion of sensors’ information. For example, Nobis
et al. in [12] proposed the fusion between radar and camera sensor data using
a neural network approach. Their proposal, knowledged as Camera Radar Fusion
Net (CRF-Net), merges a 2D object detector with projected sparse radar data in
the image plane. Moreover, CRF-Net filters the data obtained in the image
plane to improve the object detection performance. However, CRF-Net does not
work in real-time.
In an AV, the perception system not only needs to detect the objects around
the urban environment. This system need also consider if the object is moving
or not. Given this fact, Siam et al. in [13] proposed a new model that
combines motion and appearance cues using a single convolutional network.
Therefore, the outcome obtained with the Moving Object Detection Network
(MODNet) is the static/moving classification for objects. Moreover, another
contribution of this work is the KITTI MOD dataset. This dataset acts as a
benchmark on motion detection on the KITTI dataset.
Finally, Liang et al. in [14] exploited multiple related tasks for 3D object
detection using multiple sensors. Moreover, They proposed to predict dense
depth from multiple sensor data and use this result to find near
correspondences between multiple sensor feature maps. These predictions are
possible through a network architecture that fuses the detections from a LiDAR
point cloud and an RGB image. This network architecture considers 2D and 3D
object detection, ground estimation, and depth completion.
After all the works analyzed previously, it is clear that object detection on
AV is not a trivial problem. Therefore, it is needed to obtain and process
enough scene information from diverse sensor sources. Moreover, the fusion
models used to merge all the information obtained must have a real-time
performance. Consequently, combining distinct methodologies like deep-learning
and Bayesian filters, it is possible to complete these requirements. Our paper
proposes a fusion model that combines the YoloV3 object detector with an
occupancy map obtained from the CMCDOT approach. The following section
explains in detail the methodology used for our proposal.
## III METHOD
Figure 1: The figure shows the methodology’s block diagram used in our
proposal. The input part obtains raw data from an urban scene using two
sensors: lidar and an RGB camera. Eventually, in the object detection part, we
utilized two approaches to look for the objects in front of the Ego-car:
YoloV3 and CMCDOT. Then, we merge the result take from YoloV3 and CMCDOT
approaches in the Fusion model part. Afterward, we processed the previous
area’s outcome in the object information part to found the classification,
motion estimation, position, velocity, and heading from the objects222The
velocity and heading info are only for dynamic objects.. Finally, we present
all the information found in the result part.
Based on the evidence found in the related works, we define the methodology
used in our proposal. It is composed of five parts described in the block
diagram of figure 2. In this figure, it is possible to observe an ordered
sequence of subprocesses connected between each section of the block diagram.
In the remainder of this section, we will explain each subprocess and its
implications in the methodology.
### III-A Input
An object detection approach needs to obtain information from distinct sources
to warranty an adequate performance over different situations. Considering
this fact, we decided to use an RGB camera and a lidar sensor to object
detection. These two kinds of sensors have been used in several works from
state of the art, mainly because each one supports the other in its functional
disadvantages. One instance could be RGB cameras’ problem with lack of depth
information or lidar’s issue with the loss of object details in the point
cloud. Moreover, raw data information about these two sensors is available in
diverse datasets like in [15] or [16].
### III-B Object detection
We used the two sensors’ information as inputs for the YoloV3 and the CMCDOT
approaches. YoloV3 is an object detector that takes the RGB camera images to
classify and locate the objects presented inside the image considering a
probability. The main reason to have chosen this deep-learning approach is its
real-time operation capability. On the other hand, The CMCDOT framework does
not identify the object in the urban scene. However, The CMCDOT represents the
environment around the Ego-car through an occupancy grid map. This map is a
grid of cells, where each cell can identify occupancy states(i.e., static-
object, dynamic-object, empty, and unknown) over time. Specifically, the
static-object and dynamic-object states let us know more characteristics about
the scene’s objects, such as their position, motion estimation, etc. Finally,
the achievement of the occupancy grid map is also in real-time based on the
lidar data.
### III-C Fusion model
In this part, we merged the outcomes from YoloV3 and the CMCDOT approaches to
have a single representation from the environment. However, the result
achieved from these two approaches is not in the same frame. Therefore, we had
to align the results applying projective transformations. Our proposal
projected the occupancy grid map accomplished by CMCDOT onto the image
processed by the YoloV3 approach. In [17], over section III-B, it is possible
to find all the mathematical argumentation used to develop the projective
transformations. Figure 2 shows the result obtained after aligning the outcome
from YoloV3 and CMCDOT.
Figure 2: Urban scene representation considering the outcomes from YoloV3 and
CMCDOT approaches. The green rectangles represent the bounding boxes generated
by YoloV3. The Dynamic/Static points are the information produced by the
CMCDOT approach after the projective transformation. Finally, the red
rectangles represent the fusion regions.
We developed a fusion model that defines several regions of interest in the
image to look for dynamic/static points inside them. We denominated those
regions as fusion regions (see Fig. 3). Equation 1 describes the fusion model
proposed.
${\quad
f}_{m}\left({B}_{min,max},{p}_{i}\right)=\begin{cases}1,{x}_{min}<{x}_{i}<{x}_{max}\\\
\qquad and\quad{Y}_{high}<{y}_{i}<{Y}_{low}.\\\ 0,other\quad
case.\end{cases}\\\ $ (1)
where,
$\begin{matrix}{Y}_{high}\quad=\quad\frac{((5*{y}_{max})-{y}_{min})}{4}\\\ \\\
{Y}_{low}\quad=\quad\frac{((3*{y}_{max})+{y}_{min})}{4}\end{matrix}$
According to equation 1, the fusion model ${f}_{m}()$ depends from the
bounding boxes points(see Fig. 3) ${B}_{min}({x}_{min},{y}_{min})$,
${B}_{max}({x}_{min},{y}_{min})$, and the dynamic/static points(see Fig. 2)
${p}_{i}({x}_{i},{y}_{i})$. Furthermore, the ${f}_{m}()$ delimit the fusion
regions(see Fig. 3) among ${x}_{min}$, ${x}_{max}$, ${Y}_{high}$, and
${Y}_{low}$. When ${f}_{m}()$ found some points ${p}_{i}$ inside the fusion
region, it classifies that point-set with the same label of the object
detected by YoloV3. Otherwise, ${f}_{m}()$ discards the fusion regions where
it did not find some point ${p}_{i}$.
Figure 3: Definition of a fusion region regarding the bounding boxes obtained.
The cyan rectangle highlights a vehicle detected. The green points represent
the main bounding box points, ${B}_{min}$ and ${B}_{max}$, got from YoloV3.
${Y}_{high}$ and ${Y}_{low}$(i.e., defined in Equation 1) are the high and low
vertical thresholds used to determine the red rectangles representing the
fusion regions.
### III-D Object information
The outcome achieved in the fusion model part only classifies a point-set
projected from an occupancy grid map. However, this point-set maintains a
direct correspondence with the occupancy grid map’s information. Therefore, it
is possible to obtain the motion estimation, position 2D, velocity 2D, and
heading from the point set classified. We called this procedure Point-wise
features processing (PFP). Equation 2 describes the information related by
each point belonging to the point-set classified.
$p_{i}^{c}=\left\\{x_{i},\quad y_{i},\quad x_{i}^{o},\quad y_{i}^{o},\quad
vx_{i}^{o},\quad vy_{i}^{o}\right\\}$ (2)
In equation 2, the character ${p}_{i}^{c}$ defines one point $i$ belonging to
the point-set classified $c$. This point contains the coordinates ${x}_{i}$
and ${y}_{i}$ used in ${f}_{m}()$. Subsequently, the symbols ${x}_{i}^{o}$ and
${y}_{i}^{o}$ define the position 2D of the point ${p}_{i}^{c}$ over the
occupancy grid map $o$. Finally, The denotations ${vx}_{i}^{o}$ and
${vy}_{i}^{o}$ represent the velocity 2D of ${p}_{i}^{c}$ over $o$. Those
parameters also let us find the dynamic object’s heading in the scene.
${vx}_{i}^{o}$ and ${vy}_{i}^{o}$ are equal zero when the point-set belong to
a static-object.
Considering all the features contained in the points ${p}_{i}^{c}$ classifies
by ${f}_{m}$, the PFP begins to look for more details of the objects detected.
For instance, the PFP defines the object motion estimation considering the
cardinal number from the dynamic/static points-sets found in the fusion
region(see Fig. 2). The higher cardinal value will determine the motion
feature. Eventually, to find the object position, the PFP consider all the
values ${p}_{i}^{c}({x}_{i}^{o},{y}_{i}^{o})$ from the point-set to compute
their median value ${p}_{m}^{c}({x}_{m}^{o},{y}_{m}^{o})$. Similarly, to find
the dynamic object velocity, the PFP also contemplates all the values
${p}_{i}^{c}({vx}_{i}^{o},{vy}_{i}^{o})$ from the point-set to obtain a median
value ${p}_{m}^{c}({vx}_{m}^{o},{vy}_{m}^{o})$. Finally, for a dynamic object,
the PFP computes the object’s heading based on the arc tangent of
${vy}_{m}^{o}/{vx}_{m}^{o}$.
### III-E Result
We show the results obtained from the object information part through a
Graphical User Interface (GUI) and ROS messages. Figure 4 shows some vehicles
detected by our proposal in the GUI. While the GUI shows the result, Our
algorithm also publishes ROS messages describing the motion estimation plus
the object classification(e.g., Dynamic car), position 2D, velocity 2D, and
heading. The results published in ROS corresponding to each object detected in
front of the Ego-car over time.
Figure 4: Graphical user interface used to present the result achieved with
our proposal. The cars detected inside the blue bounding boxes are static
objects in the urban scene. On the other hand, the only dynamic object in the
environment is the vehicle detected by the green bounding box.
It is essential to highlight that we didn’t consider the object’s position,
velocity, and heading in the experiment results. The main reason is that the
dataset used as a benchmark doesn’t provide this type of information about the
objects.
## IV EXPERIMENTS
This section describes the datasets used, the experimental setup contemplated,
and the results obtained with our object detection approach.
### IV-A Datasets
We evaluated our approach using the KITTI [15] and the KITTI MOD [13]
datasets. We used the training and test images from KITTI to train the YoloV3
approach. Moreover, in our proposal’s evaluation, we employed lidar data from
one city category. Concerning the KITTI MOD dataset, we worked with it because
it was necessary to recognize the objects’ motion based on the KITTI dataset.
The KITTI MOD dataset has 5997 static vehicles and 2383 dynamic ones labeled.
### IV-B Experimental Setup
To Evaluate the object detection and the motion estimation of our approach, we
used ROS to publish several urban images from KITTI MOD with their
corresponding lidar data from KITTI. We obtain this ordered image sequence and
their lidar data in our algorithm through ROS messages. Inside that urban
environment, all the objects are dynamic or static vehicles. This fact is
because the KITTI MOD dataset recognizes only vehicles’ motion. Figure 5 shows
an example of our test.
Figure 5: Example of the experiment accomplished. The orange rectangle
contains one of the dynamic vehicles in the urban scene. Otherwise, the
magenta rectangle represents the static vehicles. Blue and green rectangles in
the image illustrate the comparison between the objects labeled from the KITTI
MOD dataset and the objects detected by our proposal.
In Fig 5, it is possible to observe some dynamic and static vehicles around
the Ego-car. Furthermore, the figure also shows the application of the mean
average precision (mAP) evaluation in the experiment(i.e., blue and green
labels in Fig 6). For the mAP evaluation, we considered the open-source tool
developed in [17]. In the mAP evaluation, we examined all the vehicles inside
a longitudinal distance of thirty meters from the Ego-car. The main reason is
that we found in [18] that the YoloV3 approach has a better performance in
that distance. In [8], also is contemplated a similar longitudinal distance
for the object detections.
### IV-C Experimental results
The result obtained based on our experiment setup are present in detail
through Tables I-II and Figure 6. Table I show the performance evaluation
results based on the precision, recall, and F1 score metrics. The four classes
obtained during the experiment also include their motion estimation. Table I
also reveals that the F1 score metric maintains a balance between the
precision and recall values obtained in the three first classes. The class
dynamicCar is the most significant example with an F1-score value of 73%.
TABLE I: Performance result of our approach. Class | Presicion | Recall | F1-score
---|---|---|---
staticVan | 83 | 75 | 79
dynamicCar | 72 | 74 | 73
staticCar | 91 | 58 | 71
dynamicVan | 100 | 33 | 50
Figure 6 shows the performance evaluation of our proposal using the mean
average precision (mAP). The graph also reports average precision (AP)
achieved by each object in the test based on their class and motion
estimation. It is possible to observe that the AP value between the classes
dynamicCar and staticCar are near. On the other hand, in Table II we compare
the mAP obtained by our approach against the MODNET [13] approach. Although we
achieved an mAP nearby, our proposal also can obtain more characteristics from
the object detected(i.e., position, velocity, and heading). It is possible to
find all the information about the experiment results in
https://gitlab.inria.fr/agomezhe/paper_results.
Figure 6: Mean average precision (mAP) result achieved in our test. The figure shows the Average Precision (AP) values(i.e., in blue bars) obtained by each object detected during the experiment, considering their class and motion estimation. TABLE II: Quantitative evaluation on KITTI MOD data of our proposal. Method | mAP
---|---
MODNET[13] | 62.57
Ours | 55.14
Finally, Figure 7 shows a demonstration example of our proposal with results
achieved. In this urban demonstration, we used sensor data from our autonomous
vehicle platform. The main objective was to test our approach considering
different urban situations under extreme weather conditions(i.e., sunny and
rainy weather). It is possible to find a video with the demonstration results
in https://youtu.be/Rd-0B0--mlc.
Figure 7: Illustration of our proposal using the autonomous vehicle platform.
The graph shows several green bounding boxes representing different dynamic
objects around our autonomous vehicle platform. The blue bounding box present
in the image exhibit only one static object.
## V CONCLUSIONS
This paper considers detecting dynamic and static objects around an autonomous
vehicle in an urban environment. However, our proposal is not only limited to
object detection and its motion estimation. Furthermore, we also look for the
position, velocity, and heading from the objects detected. We found all these
characteristics of the objects detected in the scene, considering the fusion
of the YoloV3 and CMCDOT approaches’ outcomes. That information lets to define
the fusion regions and the point-wise features utilized in our approach.
The results obtained show that our proposal is nearby to the performance
achieved by the work used as a reference. Therefore, to improve our approach’s
performance, future works are focus on taking some actions like updating the
YoloV3 to YoloV4 object detector. Moreover, it will also be necessary to train
the YoloV4 with a new balanced dataset. Finally, even when all our approach
was optimized using a GPU, we will need to compensate our hardware
disadvantage compared to the referenced work.
## ACKNOWLEDGMENT
This work has been supported by the French Government in the scope of the FUI
STAR project. We also would like to thank Özgür Erkent for his meaningful
technical discussions and suggestions.
## References
* [1] E. Thomas, C. McCrudden, Z. Wharton, and A. Behera, “Perception of autonomous vehicles by the modern society: a survey,” _IET Intelligent Transport Systems_ , vol. 14, no. 10, pp. 1228–1239, 2020.
* [2] R. Hussain and S. Zeadally, “Autonomous cars: Research results, issues, and future challenges,” _IEEE Communications Surveys & Tutorials_, vol. 21, no. 2, pp. 1275–1313, 2018.
* [3] J. Redmon and A. Farhadi, “Yolov3: An incremental improvement,” _arXiv preprint arXiv:1804.02767_ , 2018.
* [4] L. Rummelhard, A. Nègre, and C. Laugier, “Conditional monte carlo dense occupancy tracker,” in _2015 IEEE 18th International Conference on Intelligent Transportation Systems_. IEEE, 2015, pp. 2485–2490.
* [5] Z. Liang, M. Zhang, Z. Zhang, X. Zhao, and S. Pu, “Rangercnn: Towards fast and accurate 3d object detection with range image representation,” _arXiv preprint arXiv:2009.00206_ , 2020.
* [6] E. Arnold, O. Y. Al-Jarrah, M. Dianati, S. Fallah, D. Oxtoby, and A. Mouzakitis, “A survey on 3d object detection methods for autonomous driving applications,” _IEEE Transactions on Intelligent Transportation Systems_ , vol. 20, no. 10, pp. 3782–3795, 2019.
* [7] Z. Wang, Y. Wu, and Q. Niu, “Multi-sensor fusion in automated driving: A survey,” _IEEE Access_ , vol. 8, pp. 2847–2868, 2019.
* [8] A. Rangesh and M. M. Trivedi, “No blind spots: Full-surround multi-object tracking for autonomous vehicles using cameras and lidars,” _IEEE Transactions on Intelligent Vehicles_ , vol. 4, no. 4, pp. 588–599, 2019.
* [9] H. Zhu, K.-V. Yuen, L. Mihaylova, and H. Leung, “Overview of environment perception for intelligent vehicles,” _IEEE Transactions on Intelligent Transportation Systems_ , vol. 18, no. 10, pp. 2584–2601, 2017.
* [10] Y. Pang and J. Cao, “Deep learning in object detection,” in _Deep Learning in Object Detection and Recognition_. Springer, 2019, pp. 19–57.
* [11] Z.-Q. Zhao, P. Zheng, S.-t. Xu, and X. Wu, “Object detection with deep learning: A review,” _IEEE transactions on neural networks and learning systems_ , vol. 30, no. 11, pp. 3212–3232, 2019.
* [12] F. Nobis, M. Geisslinger, M. Weber, J. Betz, and M. Lienkamp, “A deep learning-based radar and camera sensor fusion architecture for object detection,” in _2019 Sensor Data Fusion: Trends, Solutions, Applications (SDF)_. IEEE, 2019, pp. 1–7.
* [13] M. Siam, H. Mahgoub, M. Zahran, S. Yogamani, M. Jagersand, and A. El-Sallab, “Modnet: Motion and appearance based moving object detection network for autonomous driving,” in _2018 21st International Conference on Intelligent Transportation Systems (ITSC)_. IEEE, 2018, pp. 2859–2864.
* [14] M. Liang, B. Yang, Y. Chen, R. Hu, and R. Urtasun, “Multi-task multi-sensor fusion for 3d object detection,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_ , 2019, pp. 7345–7353.
* [15] A. Geiger, P. Lenz, C. Stiller, and R. Urtasun, “”vision meets robotics: The kitti dataset”,” _International Journal of Robotics Research (IJRR)_ , 2013\.
* [16] H. Caesar, V. Bankiti, A. H. Lang, S. Vora, V. E. Liong, Q. Xu, A. Krishnan, Y. Pan, G. Baldan, and O. Beijbom, “nuscenes: A multimodal dataset for autonomous driving,” in _Proceedings of the IEEE/CVF conference on computer vision and pattern recognition_ , 2020, pp. 11 621–11 631.
* [17] A. E. G. Hernandez, Ö. Erkent, and C. Laugier, “Recognize moving objects around an autonomous vehicle considering a deep-learning detector model and dynamic bayesian occupancy,” in _2020 16th International Conference on Control, Automation, Robotics and Vision (ICARCV)_. IEEE, 2020, pp. 414–420.
* [18] J. Cartucho, R. Ventura, and M. Veloso, “Robust object recognition through symbiotic deep learning in mobile robots,” in _2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)_ , 2018, pp. 2336–2341.
| arxiv-papers | 2021-07-27T09:42:18 | 2024-09-04T03:07:21.110201 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Andr\\'es G\\'omez, Thomas Genevois, Jerome Lussereau and Christian\n Laugier",
"submitter": "Andr\\'es Eduardo G\\'omez Hernandez Mr",
"url": "https://arxiv.org/abs/2107.12692"
} |
2107.12701 | # End-To-End Real-Time Visual Perception Framework for Construction Automation
Mohit Vohra1, Ashish Kumar1, Ravi Prakash1 and Laxmidhar Behera1,2 1Authors
are with Indian Institute of Technology Kanpur, India,
{mvohra, krashish, ravipr and lbehera}@iitk.ac.in.
2 Author is with TCS Innovation Labs, Noida, India
###### Abstract
In this work, we present a robotic solution to automate the task of wall
construction. To that end, we present an end-to-end visual perception
framework that can quickly detect and localize bricks in a clutter. Further,
we present a light computational method of brick pose estimation that
incorporates the above information. The proposed detection network predicts a
rotated box compared to YOLO and SSD, thereby maximizing the object’s region
in the predicted box regions. In addition, precision (P), recall (R), and
mean-average-precision (mAP) scores are reported to evaluate the proposed
framework. We observed that for our task, the proposed scheme outperforms the
upright bounding box detectors. Further, we deploy the proposed visual
perception framework on a robotic system endowed with a UR5 robot manipulator
and demonstrate that the system can successfully replicate a simplified
version of the wall-building task in an autonomous mode.
## I Introduction
Manufacturing and construction are one of the widespread and continuously
growing industries. The former has seen a dramatic increase in production
capacity due to the optimization of industrial automation, while the latter
has adopted automation only marginally [1]. Construction automation is
inherently quite challenging for several reasons. First, the workspace is
highly unstructured. Therefore, very high precision and robust visual
perception, motion planning, and navigation algorithms are required for
autonomous solutions to adapt to different scenarios. Secondly, a mobile
manipulator needs to move between multiple positions, compelling us to perform
onboard computations for various algorithms. Therefore, limited memory, power,
and computational resources make this task more challenging.
The process of automation can have a broad impact on the construction
industry. First, construction work can continue without pause, which
ultimately shortens the construction period and increases economic benefits.
Also, the essential benefits of construction automation are worker safety,
quality, and job continuity. Towards this end, recently, Construction
Robotics, a New York-based company, has developed a bricklaying robot called
SAM100 (semi-automated mason) [2], which makes a wall six times faster than a
human. However, their robot required a systematic stack of bricks at regular
intervals, making this system semi-autonomous, as the name suggests.
One of the primary construction tasks is to build a wall from a pile of
randomly arranged bricks. To replicate the simplified version of the above
work, humans must complete a sequence of operations: i) Select the appropriate
brick from the pile, e.g., the topmost brick, ii) finding the optimal grasp
pose for the brick, and iii) finally, placing the brick in its desired place,
i.e., on the wall. Humans can do this work very quickly and efficiently.
However, the robot must perform a complex set of underlying operations to
complete the above steps autonomously [3].
(a)
(b)
Figure 1: (a) shows a simple scenario where a pile is located near the
robotic system, (b) the robotic system mimics wall building task i.e. detects
pile, selects a target brick and constructs a wall on its side in a fully
autonomous way.
In this paper, we aim to deploy a robotic solution for the task of
construction automation in a constrained environment (Fig.1) with limited
computational resources (single CPU with I7 processor, 4core, 8GB RAM ). We
assume that all bricks are of equal size, and their dimensions are known. We
further assume that the wall assembly area and brick piles are very close,
exempting us from deploying any localization and navigation modules for
robots. Thus, the main challenge in this task is to detect and localize bricks
in the clutter while handling the multiple instances of the bricks. Once we
have localized the bricks in a clutter, we will use the above information to
estimate the brick pose. Following are the main contributions in this paper:
* •
A computationally efficient object detection network for the detection and
localization of bricks in a clutter is presented in this paper.
* •
A light computational method for estimating brick pose using point cloud data
is presented in this paper.
* •
All the modules are integrated into a robotic system to develop a fully
autonomous system.
* •
Extensive experiments to validate the performance of our system.
In the next section, we briefly provide a review of state-of-the-art
algorithms related to the paper. In the section-III, we formulate the problem
statement. The overall approach and its modules are explained in section-IV.
In section-V, the experimental study of the algorithm is reported for various
test cases. This paper is finally concluded in section-VI.
## II Related Works
### II-A Object Detection
As mentioned in the previous section, the first stage of the construction
process is the localization of the target object. In our case, the target
object is referred to as a brick. In general, bricks are arranged randomly.
Therefore, the brick must be localized before grasping. The process of brick
localization falls under the category of the object detection algorithm. We
perform a brick localization process in the image space. Several object
detection algorithms exist in the literature. Here, we limit our discussion to
only Conventional Neural Network (CNN) based methods.
The RCNN [4] generates object proposals (rectangular regions) in the image
plane, and a CNN is used to extract features from the proposed regions,
followed by a classifier to classify the proposed regions into N different
classes, where N may vary according to application. In RCNN, most of the time
is consumed in proposal generation as this step is performed on CPU, and also
inference time increases linearly with an increase in the number of proposals.
SPPnets [5] were proposed to speed up the RCNN by extracting the features for
the whole image at once and then cropping the feature map corresponding to the
proposals. Due to the multistage nature of the above algorithm, joint training
was required. Fast-RCNN [6] proposes an improved approach that is relatively
faster and requires single-stage training. A further improved version of
Faster-RCNN [7] was also proposed in which proposals are generated within the
CNN, called a Region Proposal Network (RPN). The RPN was the key improvement
in improving the overall algorithmic real-time performance. All the methods
discussed above predict an upright bounding box around the detected object. In
addition to the target object region, the predicted box may contain non-object
regions or backgrounds. Hence, to minimize the background in the detected
boxes, various solutions are present in the literature. For example, in [8],
the author predicts a rotated bounding box from the set of prior rotated boxes
(anchor boxes). Similarly, Mask-RCNN [9] can predict the bounding box and mask
of the object simultaneously, which is known as instance detection and
segmentation.
All the algorithms mentioned above consists of two steps; i) generation of
object proposals or anchor boxes (axis-aligned or rotated), ii) classification
(or regressing) the proposals using a CNN with a backbone such as VGG [10],
ResNet [11]. Thus the performance of the algorithm depends on the proposal
generation process. On the other hand, authors of You Only Look Once (YOLO-v1)
[12] have proposed a single network for object detection which divides the
image into grid cells and directly predicts the fixed number of bounding
boxes, corresponding confidence scores, and class probabilities for each grid
cell. In the same direction, single shot multibox detector (SSD) [13] is
another variant of a single-stage object detector. In this variant, multi-
resolution object detection is performed, i.e., detecting the presence of an
object and its class score at various stages of different spatial resolutions.
### II-B 6D Pose Estimation
After brick localization, a grasp operation needs to be performed by the
manipulator. Choosing an optimal grasp configuration is a non-trivial task and
remains an open problem. The grasp configuration depends on the 6D pose of the
brick. Several Neural-network based pose estimation methods exist in the
literature [14], [15], but limited memory resources compel us to use
computationally light pose-estimation methods. To this end, several algorithms
exist to estimate the object’s 6D poses, which require a high degree of
surface texture on the object. In our case, the estimation of brick poses is
quite challenging due to their cubic shape (flat surfaces), which do not have
surface textures. Therefore, the feature point matching technique [16] [17]
cannot be used. Other approaches [18], [19] consider an earlier model of the
object. These methods require a preprocessing step, followed by the
correspondence matching process. The matching process is the most time-
consuming component of such algorithms. Besides, point-to-point matching
methods (ICP [20], GICP [21]) are based on local geometric properties.
Therefore, these methods can be stuck in local minima when aligning the target
model with the reference due to flat surfaces.
## III Problem Statement
### III-A Object Detection
As mentioned in previous sections, the main challenge is to identify the
bricks in a clutter. All state-of-the-art object detectors predict the upright
or straight bounding box, which has three limitations:
* •
The bounding box corresponding to the rotated or tilted object contains a
significant non-object region (Fig. 2(a)). Thus, it requires an additional
step to extract object information, like object segmentation in the bounding
box region.
* •
If two or more objects are very close to each other. The corresponding
bounding boxes will have non-zero intersecting regions (Fig. 2(b)). Thus,
additional steps are required to handle intersecting regions, as this region
may contain clutter for one box or an object part for another box.
* •
If the intersecting regions are significant, after applying non-maximal-
suppression (NMS), neighbor detection may be missed [22], as shown in Fig.
2(c).
(a) Predicted Boxes
(b) Boxes Overlap
(c) After NMS
Figure 2: Nearby predictions can be missed due to NMS
To compete with the above limitations, we designed a CNN-based model to detect
and localize bricks by predicting rotated boxes. An additional degree of
freedom, i.e., the box’s angle, allows the network to predict the box with
greater alignment with the target object. Since most of the area inside the
rotated bounding box corresponds to the target object, we can directly use the
region corresponding to the rotated bounding box to extract the target
object’s information, avoiding any additional computations. A detailed
description of the proposed model is given in Section-IV.
### III-B 6D Pose Estimation
As mentioned earlier, the bricks used in the experiments have a flat and
textureless surface. Therefore, feature matching methods for pose estimation
are unreliable in our experiments, as the number of features is less and not
very distinct. Since the bricks used in our experiments have a cuboidal shape,
if we can estimate the pose of at least one surface of the brick, this
information is sufficient to estimate the pose of the entire brick. The brick
has six faces, and each face has a specific relative pose with a local brick
frame. Hence to estimate the brick pose, we have to identify the brick surface
(out of six surfaces), estimate the surface pose, and use relative
transformations to get the complete brick pose. A brief description of the
pose estimation method is given in the section - IV-C.
## IV The Proposed Framework
Figure 3: A synthetically generated sample
### IV-A Dataset
We collect $30$ images for each class of brick (e.g., blue and green) using
Kinect. Images are collected, such that each image has an isolated brick with
a different pose. A manual mask is generated for each image. Following [23],
the raw images and the corresponding masks are used to synthesize the
cluttered scenes. A dataset of $10$k training images and $5$k test images are
generated. We generate ground truths for synthetic images such that a unique
instance-ID, as opposed to semantic segmentation, is assigned for each brick
instance. A random sample from the data set is shown in Fig. 3. Furthermore,
for each mask instance, we generate a rotated box using the OpenCV API.
Each image is divided into several grids, where each grid has a size of
$16\times 16$ pixels. Thus if the raw image has a size of $480\times 640$,
then the total number of the grids are $\frac{480}{16}\times\frac{640}{16}$,
i.e., $30\times 40$. Further, each grid is represented by an $8D$ vector
representing the three-class probabilities (blue brick, green brick, or
background) and five bounding box parameters $x,y,w,h,\theta$. For each grid,
class probabilities are assigned if the rotated bounding box’s centroid
(corresponding to the blue brick, green brick) exists within that grid. If
there is no centroid in the grid, then we will assign the probability of $1.0$
to the background label. Suppose a centroid exists within a grid.
Corresponding bounding box parameters are $x,y,w,h,\theta$, where $x,y$ is the
offset between the rotated bounding box center and the topmost grid corner.
Parameters $w,h,\theta$ are width, height, and orientation of the bounding
box, respectively. We scale the bounding box parameters in the range of
($0,1$), where the maximum value of offset is $16$ pixels. The box’s maximum
dimension can be $480\times 640$ pixels, and the maximum orientation value is
$3.14$ radians. Thus for each image, we have an output tensor of size
$30\times 40\times 8$. Further, if multiple centroid points exist in a single
grid, we select the centroid point corresponding to the mask, which has a
larger fraction of the complete mask in that grid.
Figure 4: Proposed Network
### IV-B Rotating Box Network
Fig. 4 represents the network architecture. For each block, the size of the
input and output feature map is mentioned. Also, we use the ReLU activation
function after each layer. The SSD architecture inspires the proposed rotating
box network architecture. In SSD, shallow layer features and depth layer
features are used for final predictions. Similarly, in the proposed network,
features from individual shallow layers are processed, concatenated, and
passed through a series of fully convolutional layers for final prediction.
Unlike SSDs, the proposed network prediction does not use any anchor boxes.
Instead, it predicts an additional degree of freedom (angle of the box), and
thus the predicted bounding boxes can align more accurately than the
constrained bounding box.
In order to train the network for predicting rotated boxes, the input to the
network is the raw image, and the output of the network is a tensor of size
$30\times 40\times 8$. Further, we use a cross-entropy loss for the class
probabilities and a regression loss for the bounding box parameters. Overall
loss for the network is the average of both losses. Further, to avoid any
biasing in training because of the large number of non-object grids as
compared to the object grids, we select positive to negative ratio = $1:2$ by
following [13]. Output the model for the different arrangement of bricks in a
variety of backgrounds is shown in Fig. 5.
Figure 5: Network Predictions
### IV-C Pose Estimation
To estimate the brick pose, as mentioned earlier, we have to calculate the
pose of one of the brick surfaces and use relative transformation to extract
the complete brick pose. For this task, we feed the current image (Fig. 6(a))
to the rotating box network. The region corresponding to the rotating box
(Fig. 6(b)) is called the brick region, and the point cloud corresponding to
the brick region is called the brick cloud. On the brick’s cloud, we apply the
following steps:
* •
Apply RANSAC method for estimating a set of points (inliers) that fits a
planar surface in the brick cloud data.
* •
Compute the centroid, major axis, and minor axis of the inliers. Together
these three pieces of information represent the pose of the planar surface. To
estimate the surface ID, we follow the following steps.
* •
Using [24], extract all boundary points in the inliers, which is marked in
white color in Fig. 6(d).
* •
Apply RANSAC method for fitting the lines on the boundary points which are
shown pink in Fig. 6(e).
* •
Compute all corner points, which are the intersecting point of two or more
lines.
* •
Pair the corner points representing the same line [25], and the distance
between two corner points gives the length of the edge.
* •
Since the brick dimensions are known in advance. Hence the length of the edges
can be used to identify the surface, and we can use relative transformation to
compute the 6D pose of the brick, as shown in Fig. 6(f).
(a) Image
(b) Rotating box
(c) Point Cloud
(d) Edges
(e) Lines
(f) 6D Pose
Figure 6: Pose estimation pipeline
## V Experiments and Result
### V-A Experimental Setup
For experimental evaluation, we use our robotic platform setup, as shown in
Fig. 1(a). It consists of a UR5 robot manipulator with its controller box
(internal computer) mounted on a ROBOTNIK Guardian mobile base and a host PC
(external computer). The UR5 robot manipulator is a 6-DOF robotic arm designed
to work safely alongside humans. We use an eye-in-hand approach, i.e., the
image acquisition hardware, which consists of RGB-D Microsoft Kinect Sensor,
is mounted on the manipulator. A suction-based gripper is used for grasping.
Robot Operating System (ROS) is used to establish a communication link among
the sensor, manipulator, and the gripper.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
Figure 7: Sequence of actions executed in order to carry out a single step of
wall construction
### V-B Overall Algorithmic Flow
For the experiment, we follow a simple pattern (or wall pattern) such that we
place a blue brick on the previously placed blue brick and a green brick over
the previously placed green brick and keep on placing the bricks up to the
height of $6$ layers. The system needs to place the brick correctly for wall
construction, hence requiring the brick pose with high accuracy. Since in a
dense clutter, network prediction for brick can include some portion of other
bricks, directly processing the box regions for pose can give a noisy or less
reliable brick pose. For the safer side, we perform the grasp operation with a
noisy brick pose and place the brick in a separate area and again estimate the
pose of single isolated brick.
Fig. 7 refers to the sequence of steps executed to complete a single phase of
the wall construction task. In the first stage, the Kinect sensor is
positioned to have a clear view of the bricks clutter (Fig. 7(a)), and the
current image is fed to the rotating bounding box network. We compute the
planar surface and its pose (centroid, major-axis, and minor-axis)
corresponding to each rotated box. We select the topmost pose from all the
calculated poses, i.e., the pose at the top of the clutter. The required
motion commands are generated to reach the selected pose for brick grasping in
clutter (Fig. 7(b)).
The grasped brick is placed in a separate area (Fig. 7(c)), and again the
vision sensor is positioned in an appropriate position to have a clear view of
a single isolated brick (Fig. 7(d)). At this instant, the current frame is fed
to the network, and the output of the network is a class label and the
bounding box parameters. The brick’s pose is estimated and required motion
commands are generated to grasp the brick (Fig. 7(e)).
In the final stage, the sensor is positioned in an appropriate position to
have a view of the wall region (Fig. 7(f)). The current frame is fed to the
network. Using the estimated bounding box, point cloud data, and grasped brick
label (previous step), the brick’s final pose is estimated, where the brick is
to be placed to form a wall (Fig. 7(g)).
### V-C Error Metrics
The system’s overall wall-building performance depends entirely upon the
performance of the visual perception system, i.e., the accuracy of brick
detection. Therefore, we report the performance of the detection system in
terms of precision ($P$) and recall ($R$). We have defined $P,C$ as:
$P=\frac{NO}{TP},\ \ \ R=\frac{DB}{TB}$ (1)
where,
$NO$
Number of object pixels in the predicted box (rotated / upright)
$TP$
Total number of object pixels in the predicted box (rotated / upright)
$DB$
Total number of detected bricks
$TB$
Total number of the bricks in the ground truth.
### V-D Quantitative Analysis
We compare rotating box network with YOLO-v3 and SSD-lite. For fair
comparison, all models are trained by choosing hyper-parameters as
$epoch=60,mini-batch=4,lr=0.0001$ except SSD-lite which has a learning rate of
$0.001$. We use Adam optimizer to tune the parameters of CNN. We divide the
quantitative analysis in following two cases:
#### V-D1 Upright Bounding Box Prediction
In this case, we report Mean Average Precision (mAP) score, $P$ and $R$ of the
proposed CNN model against SSD-lite and YOLO-v3 (Table-I). All the three
models produces upright bounding boxes.
Table I: | SSD-lite | YOLO-v3 | Proposed
---|---|---|---
$P$ | $0.608$ | $0.580$ | $0.638$
$R$ | $0.98$ | $0.84$ | $0.84$
mAP | $0.834$ | $0.827$ | $0.811$
#### V-D2 Rotated Bounding Box Prediction
In this case, SSD-lite and YOLO-v3 produce regular bounding boxes, while the
proposed CNN model produces rotated boxes. Since the mAP score of rotated
boxes can not be compared directly with that of upright bounding boxes. Hence
only $P$ and $R$ is reported (Table-II). The precision $P$ for rotating boxes
network is significantly higher as compared to other networks, because of the
one additional degree of freedom (angle of boxes), the network predicts
bounding boxes that can align more accurately as compared to constrained
bounding boxes (straight boxes), thus there will be less overlap between
different boxes and most of the region inside the bounding box represents the
same object which results in high precision.
Table II: | SSD-lite | YOLO-v3 | Proposed
---|---|---|---
$P$ | $0.608$ | $0.580$ | $0.778$
$R$ | $0.98$ | $0.84$ | $0.999$
### V-E Qualitative Analysis
Predictions of all four networks under consideration are shown in Fig. 8. It
can be noticed from Fig. 8(m) and 8(o), two green bricks present in the center
of the frame are represented by a single bounding box, thus decreasing the
recall value for Yolo-v3 and the proposed bounding box network. While SSD-lite
(Fig. 8(n)) and the proposed rotating box network (Fig. 8(p)), both assign two
different boxes for the two green bricks. Thus SSD-lite and our network have a
higher recall. However, in SSD-lite, two predicted bounding boxes have a
significant overlap area, thus having lower precision than the rotating box
network.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
(p)
(q)
(r)
(s)
(t)
Figure 8: From Column 1 to 4: YOLO-v3 predictions, SSD-lite predictions,
Proposed Bounding box predictions, Rotating box predictions.
### V-F Task Evaluation
To evaluate the system’s performance, we repeat the task of wall construction
for $25$ rounds. For each round, the robotic system has to place the bricks up
to the height of $6$ layers, and the wall pattern will remain the same, i.e.,
the blue brick on previously placed blue brick and green brick on previously
placed green brick. For the experiments, the first layer of bricks is placed
manually, and the system has to place the rest of the bricks, i.e., $2-6$
layers, according to the pattern. We count the number of bricks (or layers)
for each round the robotic system has successfully placed on the wall. In the
experiments, we define the brick placement as successful if the distance
between the centroid of the currently placed brick and the centroid of the
manually placed brick, when projected on the ground plane is $<0.1m$. Further,
the Euler angle difference between the calculated pose of the currently placed
brick and the manually placed brick should be less than $None$ for each axis.
From our experiments, we observed that if none of the above criteria are
satisfied, the wall becomes asymmetrical and collapses. The Table-III shows
the performance of the system for $25$ rounds. The video link for the
experiment is https://www.youtube.com/watch?v=FvsCv-Pt58c.
Table III: Task Evaluation | layer-2 | layer-3 | layer-4 | layer-5 | layer-6
---|---|---|---|---|---
Successful rounds (max 25) | 25 | 25 | 22 | 19 | 17
From Table-III, we observed that the robotic system has successfully placed
layer-$2$ and layer-$3$ bricks in all $25$ rounds. However, accuracy decreases
with the upper layers. This is because the new position of the brick on the
wall is estimated by calculating the previously placed brick pose. Thus, if
there is a slight error in brick placement in the previous step, this error is
transferred to the current step. Thus, with higher layers, the error
accumulates, resulting in lower accuracy.
## VI Conclusion
An end-to-end visual perception framework is proposed. The framework consists
of a CNN for predicting a rotated bounding box. The performance of the CNN
detector has been demonstrated in various scenarios, which mainly include
isolated and dense clutter of bricks. The proposed CNN module localizes the
bricks in a clutter while simultaneously handling multiple instances of the
bricks. The detection is free of the anchor-box technique, which improves the
timing performance of the detection module. In order to compare our method
quantitatively with state-of-the-art models, we reported Precision ($P$),
Recall ($R$), and mAP scores for various test cases. We have compared the
effectiveness of rotating bounding box predictions against upright bounding
box detection (YOLO-v3, SSD-Lite). The proposed scheme outperforms the upright
bounding box detection. It implies that rotating bounding boxes can align more
accurately with the object’s convex-hull and thereby reduce the overlap with
neighboring bounding boxes(if any). The framework has also been successfully
deployed on a robotic system to construct a wall from bricks in fully
autonomous operation.
## References
* [1] K. Asadi and K. Han, “Real-time image-to-bim registration using perspective alignment for automated construction monitoring,” in Construction Research Congress, vol. 2018, pp. 388–397, 2018.
* [2] S. Parkes, “Automated brick laying system and method of use thereof,” Jan. 31 2019\. US Patent App. 16/047,143.
* [3] R. Prakash, M. Vohra, and L. Behera, “Learning optimal parameterized policy for high level strategies in a game setting,” in 2019 28th IEEE International Conference on Robot and Human Interactive Communication (RO-MAN), pp. 1–6, IEEE, 2019.
* [4] R. Girshick, J. Donahue, T. Darrell, and J. Malik, “Rich feature hierarchies for accurate object detection and semantic segmentation,” in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 580–587, 2014.
* [5] K. He, X. Zhang, S. Ren, and J. Sun, “Spatial pyramid pooling in deep convolutional networks for visual recognition,” IEEE transactions on pattern analysis and machine intelligence, vol. 37, no. 9, pp. 1904–1916, 2015\.
* [6] R. Girshick, “Fast r-cnn,” in Proceedings of the IEEE international conference on computer vision, pp. 1440–1448, 2015.
* [7] S. Ren, K. He, R. Girshick, and J. Sun, “Faster r-cnn: Towards real-time object detection with region proposal networks,” in Advances in neural information processing systems, pp. 91–99, 2015.
* [8] S. Li, Z. Zhang, B. Li, and C. Li, “Multiscale rotated bounding box-based deep learning method for detecting ship targets in remote sensing images,” Sensors, vol. 18, no. 8, p. 2702, 2018.
* [9] K. He, G. Gkioxari, P. Dollár, and R. Girshick, “Mask r-cnn,” in Proceedings of the IEEE international conference on computer vision, pp. 2961–2969, 2017.
* [10] K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
* [11] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770–778, 2016.
* [12] J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, “You only look once: Unified, real-time object detection,” in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 779–788, 2016.
* [13] W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. Reed, C.-Y. Fu, and A. C. Berg, “Ssd: Single shot multibox detector,” in European conference on computer vision, pp. 21–37, Springer, 2016.
* [14] B. Tekin, S. N. Sinha, and P. Fua, “Real-time seamless single shot 6d object pose prediction,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 292–301, 2018.
* [15] Y. He, W. Sun, H. Huang, J. Liu, H. Fan, and J. Sun, “Pvn3d: A deep point-wise 3d keypoints voting network for 6dof pose estimation,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp. 11632–11641, 2020.
* [16] R. B. Rusu, G. Bradski, R. Thibaux, and J. Hsu, “Fast 3d recognition and pose using the viewpoint feature histogram,” in 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 2155–2162, IEEE, 2010.
* [17] J. P. S. do Monte Lima and V. Teichrieb, “An efficient global point cloud descriptor for object recognition and pose estimation,” in 2016 29th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), pp. 56–63, IEEE, 2016.
* [18] B. Drost, M. Ulrich, N. Navab, and S. Ilic, “Model globally, match locally: Efficient and robust 3d object recognition,” in 2010 IEEE computer society conference on computer vision and pattern recognition, pp. 998–1005, Ieee, 2010.
* [19] S. Hinterstoisser, V. Lepetit, N. Rajkumar, and K. Konolige, “Going further with point pair features,” in European conference on computer vision, pp. 834–848, Springer, 2016.
* [20] P. J. Besl and N. D. McKay, “Method for registration of 3-d shapes,” in Sensor fusion IV: control paradigms and data structures, vol. 1611, pp. 586–606, International Society for Optics and Photonics, 1992.
* [21] A. Segal, D. Haehnel, and S. Thrun, “Generalized-icp.,” in Robotics: science and systems, vol. 2, p. 435, Seattle, WA, 2009.
* [22] N. Bodla, B. Singh, R. Chellappa, and L. S. Davis, “Soft-nms–improving object detection with one line of code,” in Proceedings of the IEEE international conference on computer vision, pp. 5561–5569, 2017.
* [23] A. Kumar and L. Behera, “Semi supervised deep quick instance detection and segmentation,” in 2019 International Conference on Robotics and Automation (ICRA), pp. 8325–8331, IEEE, 2019.
* [24] M. Vohra, R. Prakash, and L. Behera, “Real-time grasp pose estimation for novel objects in densely cluttered environment,” in 2019 28th IEEE International Conference on Robot and Human Interactive Communication (RO-MAN), pp. 1–6, IEEE, 2019.
* [25] M. Vohra., R. Prakash., and L. Behera., “Edge and corner detection in unorganized point clouds for robotic pick and place applications,” in Proceedings of the 18th International Conference on Informatics in Control, Automation and Robotics - ICINCO,, pp. 245–253, INSTICC, SciTePress, 2021.
| arxiv-papers | 2021-07-27T09:58:07 | 2024-09-04T03:07:21.125781 | {
"license": "Creative Commons - Attribution Share-Alike - https://creativecommons.org/licenses/by-sa/4.0/",
"authors": "Mohit Vohra, Ashish Kumar, Ravi Prakash and Laxmidhar Behera",
"submitter": "Mohit Vohra",
"url": "https://arxiv.org/abs/2107.12701"
} |
2107.12703 | # Dislocation assisted phase separation: a phase field study
Arjun Varma R Prita Pant M. P. Gururajan [email protected] Department of
Metallurgical Engineering and Materials Science, Indian Institute of
Technology Bombay, Powai, Mumbai, Maharashtra 400076 INDIA
###### Abstract
Defects play a key role in deciding the mechanisms and kinetics of phase
transformations. In this paper, we show how dislocations influence phase
separation in alloys with miscibility gap. Specifically, depending on the
ratio of pipe mobility to bulk mobility, it is seen that even in a system with
nominal compositions outside the spinodal limit, spinodal phase separation is
possible. Surprisingly, phase separation through both nucleation and growth,
and spinodal decomposition, is seen concurrently (for the case of intersecting
dislocations). Finally, the prominent role played by dislocations in
influencing the morphology of precipitates is explored. We show that these
results agree qualitatively with recent experimental results in iron based
systems obtained using Atom Probe Tomography (APT).
###### keywords:
Segregation , Pipe diffusion , Precipitate morphology , Spinodal decomposition
, Misfit , Nucleation and growth
††journal: Journal of LaTeX templates
## 1 Introduction
It is well known that solutes in alloys segregate to elastically favourable
sites near dislocations [1, 2, 3, 4] forming “solute atmospheres” which hinder
the dislocation movement. The solute segregation to dislocations might depend
on the character of the dislocation and the nature of the misfit (between
solute and matrix), if only the elastic interaction is accounted for [5].
Solutes with dilatational misfit segregate to dislocations with edge character
while solutes with non-dilatational misfit segregate to both edge and screw
dislocations [6]. However, if the broken bonds at the dislocation core are
accounted for, solute segregation is expected at dislocations of both
character [7].
Segregation can also lead to nucleation and growth along dislocations as has
been predicted [8, 9, 10], and, experimentally observed – see, for example,
[11, 5, 12]. Recently, atom probe experiments in Fe-Mn system [13] have shown
that dislocations can also act as sites of localized spinodal decomposition in
systems with nominal alloy compositions outside the spinodal limit. In fact,
in this system, namely, Fe-Mn, there have been recent modelling studies which
show grain boundary induced spinodal decomposition even when the overall alloy
composition is outside the spinodal limits [14, 15]. In this paper, we explore
if dislocations can also induce phase separation by the spinodal mechanism in
systems with nominal alloy compositions outside the spinodal limit.
In the past, attempts have been made to investigate the effects of
dislocations on phase transformation using phase field models [16, 17, 18, 19,
20, 21]. These models have shown that stationary and moving dislocations, in
systems with average composition within the spinodal limit, can lead to faster
kinetics and ordered microstructures. In this regard, the work of Hu and Chen
[17] and Mianroodi et al [15] deserve special mention; both these works show
that even in a system with overall composition outside the spinodal limit,
segregation to the dislocations can take the composition along the dislocation
to within the spinodal regime. However, in both these cases spinodal
fluctuations along the dislocation line are not seen. This is in contrast to
the spinodal decomposition along the dislocations observed experimentally by
Da Silva et al. [13].
The work of Hu and Chen [17] is in 2-D. So, the question of spinodal
fluctuations along the dislocation line does not arise. On the other hand, in
Mianroodi et al, the simulations are done in 3-D [15]. However, faster
diffusivity along the dislocation lines is not incorporated in these
simulations. The diffusivity along the core of a dislocation can be two to
three orders of magnitude higher than the bulk diffusivity [22], and hence,
this can be expected to play a key role in the phase transformation mechanism
and kinetics.
In this paper, we show that faster diffusion along the dislocations is indeed
essential for a system with alloy composition outside spinodal limits to show
segregation-assisted spinodal decomposition along the dislocations. We use a
phase field dislocation dynamics (PFDD) model. There exist several versions of
PFDD models in the literature: see for example, [23, 24, 25, 26, 27, 28]. Our
model is very similar to that of Hunter et al. [28]. We do not incorporate
specific crystallographic geometries; however, dislocation-solute interactions
and the segregation effects are known to depend primarily on the defect
structure and their elastic field [7]. In fact, we show that our model is able
to reproduce the experimentally observed: (i) segregation-assisted spinodal
morphology, and (ii) non-spherical precipitate shapes at dislocation
intersections, in iron based systems, albeit qualitatively.
## 2 Formulation and simulation details
In this paper, we have combined phase field models of phase separation [17]
and dislocation dynamics [27, 28]; we incorporate faster diffusion along the
cores of the dislocations using the variable mobility methodology proposed by
Zhu et al. [29]. In this section, since all these models are well known, we
describe the formulation very briefly – for the sake of completeness.
### 2.1 Formulation
We consider a binary system with dislocations; we describe the system using
two order parameters, namely, composition ($c$) and slip ($\eta$). We assume
the eigenstrain due to the solute misfit to be given by:
$\epsilon^{0c}_{ij}=\epsilon^{*c}\delta_{ij}\beta(c)$ (1)
where $\epsilon^{*c}$ is the magnitude of the eigenstrain, $\delta_{ij}$ is
Kronecker delta and $\beta(c)$ is an interpolation function of c given by
$\beta(c)=c^{3}(10-15c+6c^{2})$. In other words, we assume that the solute
misfit is dilatational and is measured with respect to the matrix lattice
parameter. The eigenstrain due to a dislocation is a pure shear strain [30]
and is obtained as a tensor product of the Burgers vector ($\mathbf{b}$) and
the slip plane normal ($\mathbf{n}$) of the dislocation; it is given as:
$\epsilon^{0d}_{ij}=\sum_{\alpha=1}^{N}\left(\frac{b_{i}n_{j}+b_{j}n_{i}}{d}\right)\eta_{\alpha}$
(2)
where $d$ is the interplanar spacing, $\alpha$ denotes the slip system and $N$
is the total number of slip systems.
The stress and strain fields that go into the elastic strain energy component
are calculated by solving the equation of mechanical equilibrium. We use the
Green’s function approach [30] to solve the equation of mechanical equilibrium
– assuming linear and isotropic elasticity; we also assume that the system is
elastically homogeneous.
The total free energy of the system, consists of, in addition to the elastic
component, the chemical and the dislocation core energy components:
$\displaystyle F(c,\eta)=$
$\displaystyle{N_{V}}\int\left(Ac^{2}(1-c)^{2}+\kappa\left|\nabla
c\right|^{2}\right)\;dV$ $\displaystyle+\frac{1}{2}\int
C_{ijkl}\epsilon^{el}_{ij}\epsilon^{el}_{kl}\;dV+\sum_{\alpha=1}^{N}\int
B_{\alpha}sin^{2}(\pi\eta_{\alpha})\;dV$ (3)
where $N_{V}$ is the number of atoms per unit volume, $V$ is the volume of the
system, $A$ is a constant that determines the height of the bulk free energy
density barrier between the two phases, $B_{\alpha}$ is the core energy
coefficient for slip system $\alpha$, $\kappa$ is the gradient energy
coefficient, $\epsilon^{el}_{ij}$ is the elastic strain (which, in turn, is
related to the total strain $\epsilon^{t}$ and the eigenstrains through the
relation $\epsilon^{t}_{ij}-\epsilon^{0c}_{ij}-\epsilon^{0d}_{ij}$), and
$C_{ijkl}$ denotes the modulus tensor. Here, we have assumed that the
interfacial energy between the two phases is isotropic. As can be seen from
the total strain expression, the $c$ and $\eta$ fields are coupled by the
elastic strain energy of the system. This interaction leads to the segregation
of the solute atoms to the dislocations. We do not consider segregation due to
the broken bonds at the core of the dislocations in this model. Note that we
ignore the gradient energy term associated with $\eta$ in our formulation. The
core width of the dislocations in the system is determined by the balance
between the elastic and the core energies of the dislocation.
Given the free energy functional, the Allen-Cahn equation for $\eta$ and the
Cahn-Hilliard (CH) equation for $c$ can be used to study the microstructural
evolution in the system. In this paper, we are interested in the evolution of
the composition fields in the presence of the dislocations. We assume that the
dislocations are stationary and hence do not evolve the $\eta$ order parameter
– except at the beginning of the simulations to equilibrate the dislocation
structure. Specifically, we use two different dislocation configurations –
edge dislocation dipoles in one and two slip systems.
The CH equation that described the composition evolution is given by:
$\frac{\partial c}{\partial t}=\nabla\left[M(\eta)\cdot\nabla\mu^{c}\right]$
(4)
where $M(\eta)$ is the (scalar) atomic mobility which is $\eta$ and hence,
position dependent, and $\mu^{c}$ is the variational derivative of the free
energy per atom with respect to the composition, and, is given by:
$\mu^{c}(c)=2A(6c^{2}-6c+1)-2\kappa\nabla^{2}c-C_{ijkl}\epsilon^{el}_{kl}\delta_{ij}\epsilon^{*c}\beta^{\prime}(c)$
(5)
where $\beta^{\prime}(c)=\frac{\partial\beta}{\partial c}$. In deriving the
above expression, we have used the symmetry properties of the elastic moduli
tensor $C_{ijkl}$.
Let $M_{b}$ be the bulk mobility of solute atoms and let $M_{p}$ be the
enhanced mobility along the dislocation core over and above the bulk mobility.
We define the mobility $M$ in the simulation domain using the order parameters
as follows:
$M(\eta_{1},\eta_{2})=M_{b}+M_{p}\left\\{\mathrm{max}\left(|\eta_{1}(1-\eta_{1})|,|\eta_{2}(1-\eta_{2})|\right)\right\\}$
(6)
where $\eta_{1}$ and $\eta_{2}$ are the two order parameters that describe
slip in two different slip planes, labelled 1 and 2, respectively. The
mobility of atoms given by Eq. 6 will be highest at points where
$\eta_{1}=0.5$ and/or $\eta_{2}=0.5$. For simulations in which the
dislocations exist only on a single slip system, in this expression, we
substitute $\eta_{1}=\eta$ and $\eta_{2}=0$.
We use a Fourier spectral technique to solve the CH equation (which implies
periodic boundary conditions). The CH equation with the variable atomic
mobility has severe time step constraints. Hence, we use the numerical
technique proposed by Zhu et al. [29], using which, the final evolution
equation in the Fourier space is given as:
$\displaystyle c_{t+\delta t}=c_{t}+\delta
t\left[\frac{ik\\{\\{M(\eta)\\{ik\mu^{c}(c_{n})\\}_{F}\\}_{R}\\}_{F}}{(1+2\zeta\delta
t\kappa k^{4})}\right]$ (7)
where $k=\sqrt{k_{x}^{2}+k_{y}^{2}+k_{z}^{2}}$ is the magnitude of the
reciprocal space vector, the braces denoted by $\left\\{\cdot\right\\}_{R}$
and $\left\\{\cdot\right\\}_{F}$ indicate the terms in real and Fourier space
respectively, $i=\sqrt{-1}$ and $\delta t$ is the time step. As indicated by
Zhu et al. [29], the choice of
$\zeta=\frac{1}{2}\left[\mathrm{max}(M(\eta))+\mathrm{min}(M(\eta))\right]$ is
optimal.
### 2.2 Non-dimensionalisation
All our simulations are carried out using non-dimensionalised parameters.
Specifically, we use a characteristic length $L^{\prime}$ of 1Å, a
characteristic energy of $E^{\prime}=0.7\times 10^{-21}\;\mathrm{J}$ and, a
characteristic times of $T^{\prime}=200\;\mu\mathrm{s}$ to
$T^{\prime}=200\;\mathrm{s}$. In dimensional terms, these choices correspond
to a system of size $25.6\;\mathrm{nm}$ for 256 grid points, an interfacial
energy of $100\;\mathrm{mJ/m^{2}}$, an Young’s modulus of $E=130$ GPa and a
Poisson’s ratio of $\nu=0.3$ (isotropic material) and a bulk diffusivity of
the order of $1\times 10^{-16}\;\mathrm{m^{2}/s}$ to $1\times
10^{-20}\;\mathrm{m^{2}/s}$. Finally, the used dislocation core energy
coefficients imply edge dislocations of width $0.7b$ to $5.8b$, where $b$ is
the magnitude of the Burgers vector. The coherent spinodal limits for the
parameters chosen by us is 0.216 and 0.783. Our simulations start with a
nominal composition well outside the spinodal limit – $c_{0}=0.11$ to
$c_{0}=0.18$.
The non-dimensionalised parameters and their values are listed Table 1.
Parameter | Value
---|---
Spatial discretisation, $\Delta x=\Delta y=\Delta z$ | 1.0
Time step, $\delta t$ | 0.1 – 0.5
Elastic moduli: $C_{1111}$ | 175
Elastic moduli: $C_{1122}$ | 75
Elastic moduli: $C_{1212}$ | 50
Bulk free energy coefficient, $A$ | 1
Dislocation core energy coefficient, $B_{\alpha}$ | 0.31 – 2.52
Gradient energy coefficient, $\kappa$ | 1
Magnitude of eigenstrain, ${\epsilon^{\star}}^{c}$ | 0.01
Table 1: Non-dimensionalised values of parameters used in our simulations
## 3 Results and Discussion
In this section, we show and discuss segregation induced nucleation, spinodal
decomposition, and concurrent nucleation and spinodal decomposition. We
rationalise these results in terms of the strength of the solute-dislocation
interaction, the nominal alloy composition and the ratio of pipe to bulk
mobilities.
### 3.1 Segregation induced nucleation
In Figure 1(a), we show the $c=0.5$ isosurface for a system containing an edge
dislocation dipole. In this and subsequent simulations, the edge dislocations
are set 128 units apart in a system of size $256\times 64\times 256$; the
nominal alloy composition and the dislocation core energy coefficient
$B_{\alpha}$ are taken as $0.15$ and $0.63$ (unless stated otherwise).
The Burgers vectors of these dislocations are along the positive $x$-direction
of the simulation cell and the slip plane normals for both these dislocations
are along the positive $y$-direction of the simulation cell. These two
dislocations are aligned along the $z$-axis of the simulation cell; the sense
vector for the dislocation on the left is the positive $z$-direction of the
simulation cell and the line sense for the dislocation on the right is the
negative $z$-direction of the simulation cell. Note that the strain fields of
the positive edge dislocation (labelled ‘+’) and the negative edge dislocation
(labelled ‘-’) are flipped; hence, the accumulation of the solute happens
above and below the slip plane for the positive and negative edge dislocation,
respectively. Since the results for the two dislocations are different only in
terms of the sign of the strain fields; so, we only consider the positive edge
dislocation for the rest of this discussion.
Figure 1: (a) Segregation and nucleation along the dislocations in an edge
dipole shown using $c=0.5$ isosurfaces aligned along the dislocations. (b)
shows the $c=0.5$ contours for a positive edge dislocation (along the
$z$-direction) in the $xy$-plane for different time steps, and, (c) shows the
iso-surfaces for the $c=0.3$, $c=0.5$ and $c=0.9$ at t=1500.
In this simulation, we assume that the bulk and pipe mobilities are the same.
In Figure 1(b), we show the $c=0.5$ composition contour lines as a function of
time in the ($xy$-)plane perpendicular to the dislocation line. In Figure
1(c), we show three composition contour lines, namely, $c=0.3$, $c=0.5$ and
$c=0.9$ in the plane perpendicular to the dislocation line.
From these figures, it is clear that there is (a) segregation to the
dislocation which leads to precipitate nucleation and subsequent growth.
Further, note that the shape of the composition profile is consistent with the
cardioid profile given by [7]:
$c=c_{0}\;exp\left(\frac{-Ksin\theta}{r}\right)$ (8)
where $r$ is the radial distance from the dislocation line, $c_{0}$ is the
far-field composition, and $K$ is a constant. These shapes are also in
agreement with the shape of the precipitate that nucleates along an edge
dislocation as shown in [4, 17]. Thus, when we do not assume faster pipe
diffusion, we recover the results in the existing literature, which, in turn,
serves as a benchmark for our model and implementation.
### 3.2 Spinodal decomposition induced by enhanced pipe diffusion
Let us consider the same initial profile as in the previous section; however,
let us increase the pipe mobility to be hundred times that of the bulk
mobility. In Figure 2, we show the $c=0.5$ composition contour lines for this
system. It is clear that the system undergoes phase separation via the
spinodal mechanism along the dislocation line. As time progresses, there is
also coarsening and coalescence. Thus, in contrast to Figure 1 where we saw
cardioid shape, here, we see a morphologically discontinuous phase separated
microstructure along the dislocation line at earlier times which becomes a
nearly continuous morphology albeit with a wavy interface.
Figure 2: The $c=0.5$ contours along the dislocation line for a system in
which dislocation core mobility is one hundred times that of the bulk. In this
figure, we show the evolution of composition only along the positive edge
dislocation. The spinodal fluctuations along the dislocation line grow due to
the higher diffusivity along the dislocation core. The phase separated regions
in the form of blobs coalesce as shown in (c) and (d) creating a linearly
elongated morphology along the dislocation line.
In order to see the effect of the ratio of the pipe mobility to bulk mobility,
we also carried out simulations where the atomic mobility was kept as ten and
fifty times that of bulk mobility. These results are summarised in Figure 3 by
plotting the area fraction in the left half of the simulation cell which
contains the positive edge dislocation. We calculate the area fraction (in
percentage – in the $xy$-plane) of the solute-rich phase along the dislocation
line by counting the number of grid points with $c\geq 0.5$ as a fraction of
the total number of grid points in the left half of the $xy$-plane.
Figure 3: (a) Area fractions of the solute-rich phase formed near the
dislocation line at $t=385$ for $\frac{M_{p}}{M_{b}}=50$ and
$\frac{M_{p}}{M_{b}}=100$, (b) Area fraction at three different time steps for
$\frac{M_{p}}{M_{b}}=10$
In Figure 3(a), we show the area fraction (which is a proxy for the morphology
of the solute rich phase) along the dislocation line for the cases where the
atomic mobility along the dislocation core is 100 and 50 times that of the
bulk – for two different times, namely $t=200$ and $t=385$. Both $M=50$ and
$M=100$ cases show wavy profiles, indicating the growth of the composition
fluctuation by spinodal mechanism. However, the amplitudes are different;
smaller the pipe mobility, smaller the amplitude of the profile; in fact, the
profiles, but for the amplitude are almost the same. Since the bulk mobility
is the same in both cases, the amount of solute reaching the dislocation at
any given time is the same. Thus, the enhanced amplitude of fluctuation is
solely due to the higher pipe mobility.
From the classical theory of spinodal decomposition, it is known that the
coherent spinodal limit can be obtained by solving the following equation
[31]:
$2A(6c^{2}-6c+1)+\frac{2(\epsilon^{*c})^{2}E}{1-\nu}=0$ (9)
For our system, the coherent spinodal limit according to Eq. (9) is calculated
as $c_{crit}=0.216$. Even for our initial composition of $c=0.15\pm 0.005$,
which is well outside this spinodal limit, we observe that the solute-
dislocation interaction is strong enough to segregate enough material along
the dislocation and increase the local composition field above the coherent
spinodal limit. As the composition along the dislocation enters the spinodal
regime, there are also the so-called “up-hill” diffusion fluxes set-up along
the dislocation line.
From the classical theory of spinodal decomposition, it is also known that, at
the early stages of the decomposition, at least, the rate of growth of the
amplitude of a fluctuation of wavelength $\lambda$ is given
by$A(\lambda,t)=A(\lambda,0)\exp[R(\lambda)t]$ [31] where $R(\lambda)$ is the
amplification factor. This amplification factor is a function of mobility
$R(\lambda)=-M\lambda^{2}\left[\frac{\partial^{2}g(c)}{\partial
c^{2}}+2(\epsilon^{*c})^{2}E+2\kappa\lambda^{2}\right]$, where M is the
mobility, and $g(c)$ is the bulk free energy density given by the double well
potential. This expression assumes that the system under consideration is
elastically isotropic. The composition fluctuation decays when $R(\lambda)$ is
negative and grows when it is positive. Since the amplification factor is a
function of the wavelength of the fluctuation, there is a critical wavelength
$\lambda_{c}$ at which $R(\lambda)$ will be equal to zero. The critical
wavelength
$\lambda_{c}=\left\\{-\frac{8\pi^{2}\kappa}{\left[\frac{\partial^{2}g(c)}{\partial
c^{2}}+2(\epsilon^{*c})^{2}E\right]}\right\\}^{\frac{1}{2}}$ and the maximally
growing wavelength $\lambda_{max}=\frac{\lambda_{c}}{\sqrt{2}}$. That is, the
energetic parameters of the system such as the (incipient) interfacial energy,
the eigenstrains, and the elastic moduli determine the wavelengths of
compositional fluctuations; on the other hand, the growth rate depends on the
mobility. Thus, in Figure 3(a), the mobilities do not change the profile and
only change their amplitude is consistent with the classical theory of
spinodal decomposition.
In Figure 3(b), we show the profile of the area fraction plot at different
times for the case where the atomic mobility along the dislocation line is 10
times that of bulk mobility. Here, we see that with time, the morphology
becomes more uniform and the waveiness is smoothened out. This can be
understood in terms of the stability of the compositional cylinder (of
cardioid cross-section) along the dislocation line. As shown by Nichols and
Mullins [32], the morphological perturbations along the length of the cylinder
(albeit, of circular cross-section) decay to material flow from the bulk.
Thus, the spinodal fluctuations along the dislocation line, which tend to
perturb the cylinder, will die, unless, the spinodal fluctuations grow faster
than the rate at which bulk diffusion is trying to smoothen these
morphologies. This is the reason why we see spinodal morphology only with
higher mobilities.
Thus, we see that in the case of dislocation assisted phase separation, the
mechanism of phase separation can change from nucleation and growth to
spinodal decomposition depending on the enhanced pipe mobility. Given that the
pipe mobilities are typically two to three orders of magnitude higher, in
systems that undergo spinodal decomposition, the dislocations can play a
crucial role in the phase separation mechanism; more importantly, dislocations
can promote phase separation even when the nominal alloy composition is
outside the spinodal region. Thus, the spinodal phase separation in these
systems is induced by segregation and is assisted by pipe diffusion.
### 3.3 Effect of dislocation network: concurrent nucleation and spinodal
Our aim, in this subsection, is to understand the effect of dislocation
networks. So, let us consider a system with two intersecting slip systems; in
addition to the dipoles in the (010) plane (as in the previous cases), we
introduce another dipole in the (001) plane (that is, with the slip plane
normals in the positive $z$-direction) with the sense vectors of the
dislocations along the positive and negative $y$-direction (for the
dislocations at the left and right, respectively). In this case, we use
$256\times 256\times 256$ grid points and the Burgers vectors are aligned
along the $x$-direction. This configuration is shown in Figure 4(a). In Figure
4(a)-(d) we show the $c=0.5$ iso-surfaces at different times; in the figures
(b)-(d), we show only one intersection for clarity. In this case also, the
pipe mobility is 100 times the bulk mobility.
Figure 4: Growth of spinodal fluctuations along two intersecting
dislocations. The horizontal and vertical lines are drawn through the two
dislocation cores, as a guide to the eye. The vertical and horizontal lines
are parallel to the y and z axes respectively. At t=50, both pairs of
dislocation intersections are shown for better understanding. The composition
profile along the z direction through the dislocation core is shown in the
inset.
The initial overall composition in the simulation cell is $c=0.15\pm 0.005$.
At $t=50$, there solute-rich phase nucleates at the intersection of the two
dislocations. As time progresses, the composition along the other parts of the
two intersecting dislocations cross the spinodal limit of $c^{crit}=0.216$. At
$t=75$, there is phase separation along the dislocation lines via spinodal
mechanism, and subsequently, there is growth and coalescence.
In order to clearly show the concurrent nucleation and growth at the junction,
and spinodal along the dislocations, we also show the composition profile
along one of the dislocations in the inset. The composition profile in the
initial stages clearly shows the nucleation of the second phase at the
intersection. The composition along the rest of the dislocation reaches the
coherent spinodal limit as time progresses, and, at $t=75$, the composition
along the dislocation line is above the spinodal limit; hence, we observe
growing composition fluctuations on both sides of the central precipitate.
These fluctuations along the dislocation lead to solute rich second phase.
When phase separation occurs, material is also added to the central
precipitate by virtue of the faster atomic mobility along the dislocation
core. In the composition profiles in Figure 4, the values above unity are due
to Gibbs-Thomson effect.
### 3.4 Map of phase separation mechanisms
Figure 5: The occurrence of spinodal dominated and segregation dominated
morphologies are shown for different far field compositions ($c_{0}$) and core
energy coefficients ($B_{\alpha}$) at a ratio of mobilities of (a)
$\frac{M_{p}}{M_{b}}=100$ and (b) $\frac{M_{p}}{M_{b}}=300$.
From the results and discussion so far, it is clear that the segregation
(which is controlled, in our model, by the core energy coefficient), the
available solute (which is determined by the overall alloy composition), and
the pipe mobility. Figure 5 shows a map of phase separation mechanisms as a
function of the core energy coefficient $B_{\alpha}$, overall alloy
composition $c_{0}$ and mobility ratio $\frac{M_{p}}{M_{b}}$. We considered
two different pipe mobilities of $\frac{M_{p}}{M_{b}}=100$ (Figure 5(a)), and,
$\frac{M_{p}}{M_{b}}=300$ (Figure 5(b)). For increasing $B_{\alpha}$, the core
width decreases, causing higher segregation of solute to dislocation by
elastic interaction. Due to this, segregation assisted phase transformation
occurs at smaller $c_{0}$ for higher $B_{\alpha}$. Phase separation occurs
only in those cases where the perturbations caused by the pipe mobility grows
at a faster rate as compared to material segregating from the bulk [32]. This
is clear from Figure 5(b), in which there is a wider range of $c_{0}$ across
which spinodal morphology dominates.
## 4 Comparison with experimental results
Even though a direct comparison of our simulation results with experiments is
not possible, a qualitative comparison is possible. In this section, we make
two such comparisons.
### 4.1 Dislocation induced spinodal
Figure 6: Comparison of (a) the morphology formed by localized spinodal
decomposition in our simulation (with pipe-diffusion) ($t=385$) with (b) the
atom probe results of [13] (scale bar represents a length of 40 nm). The
morphology along the arrows indicated in (b) match well with the output from
our simulations. (c) shows the atomic fraction of Mn plotted along the
dislocation line. The dashed lines show the typical fluctuation values. The
sub-figures (b) and (c) are cropped from Figure 1 of Da Silva et al [13] with
the labels removed from the cropped area, and is shared under Creative Commons
Attribution 4.0 International License:
http://creativecommons.org/licenses/by/4.0/.
In Figure 6, we show (a) the spinodally decomposed morphology along the
dislocation line from our simulations; in (b) and (c), the atom probe results
of localised spinodal flcutuations in the Fe-Mn system in which the overall
alloy composition (9 at.% Mn) was outside the spinodal limits (15.8–25 at.%
Mn) at 450 °C [13]. As can be seen, there are composition fluctuations
measured along the dislocations in these experiments. The morphology of phase
separated regions seen in our simulations is very similar to that observed in
these atom probe results.
Further, our results clearly show the role of faster diffusion along the
dislocation cores in producing such morphologies; as shown in the simulations
and explained using the linear stability analysis of Nichols and Mullins [32],
if the bulk and dislocation pipe mobilities are assumed to be the same, this
phenomenon will not be observed; this, we believe could indeed be the case
with some of the previous simulation studies [15].
### 4.2 Effect of dislocation network on precipitate morphology
A precipitate that nucleates homogeneously in an isotropic system will grow
with a spherical shape. However, the presence of elastic fields of defects in
the system can alter this behaviour and can affect the shape of the
precipitate.
A recent APT study in maraging steel [33] has shown that precipitates formed
in high dislocation density regions have a markedly different morphology as
compared to the defect-free region. The Fe-Mo preipitates assume a near
spherical shape in defect free regions and deviate from this shape as the
precipitation happens in regions with dislocation networks.
Figure 7: (a) shows the morphology of the precipitate formed at the
intersection of two dislocations in our simulation. (b), (c) and (d) show the
section contours of the precipitate along the $xy$, $yz$ and $zx$ planes,
respectively. (e) shows the Mo iso-surfaces (11 at. %) depicting a precipitate
in a Maraging steel, that nucleates in a region with high dislocation density
(see [33])
In Figure 7(a), we show the morphology of the precipitate that nucleates at
the dislocation intersection; as can be seen in Figure 7(b)-(d), the cross-
sections along different planes are very different and the precipitate is
highly non-spherical. In fact, we have verified that depending on the nature
of the dislocations that intersect (positive-positive, negative-positive,
positive-negative, and negative-negative), the cross-sections differ (see
supplementary information). Thus, the protuberances in the precipitate shape
are a result of the interaction of solutes with dislocation strain fields.
Very similar morphologies are seen by Jacob et al. [33] in their APT studies
of Fe-Mo precipitates: see Figure 7(e). While the protuberances in the
experimental morphologies are very similar, we believe that the plate-like
structure of the precipitate is a result of the intersection of a large number
of dislocations.
## 5 Conclusions
The following are the salient conclusions from our phase field simulations of
segregation assisted and pipe-diffusion driven spinodal decomposition along
dislocations.
* 1.
For a system with alloy composition well outside the spinodal limit, when
there is faster mobility at the dislocation core, phase transformation occurs
by spinodal decomposition along the dislocation line. The rate of growth of
composition fluctuations increases with increasing pipe mobility. There is
qualitative agreement between the spinodal morphology along the dislocation
line obtained in our simulations with that of APT experiments for Fe-Mn
systems [13].
* 2.
We have identified the range of parameters, namely, dislocation-solute
interaction strength (determined by $B_{\alpha}$), nominal alloy composition
and the enhanced pipe mobility, a combination of which causes phase separation
by spinodal decomposition.
* 3.
Concurrent nucleation and spinodal decomposition is possible in the case of
systems with dislocation networks, where the intersections of dislocations act
as energetically favourable sites for nucleation. The morphology of the
precipitate at the dislocation intersection agrees well with the Mo-rich
precipitates in maraging steels [33].
## Acknolwedgements
We thank (i) Mr Kevin Jacob, and, Professor Nagamani Jaya Balila for sharing
their experimental results (Figure 7(e)) and for useful discussions; (ii)
Professor Ferdinand Haider, Professor T A Abinandanan, and Mr. Abhinav Roy for
discussions on various aspects of the formulation and numerical
implementation; and, (iii) (a) Dendrite and Space-Time, IIT Bombay, (b)
Spinode – the DST-FIST HPC facility, Dept. of ME & MS, IIT Bombay, and (c)
C-DAC, Pune for high performance computing facilities. This project is funded
by Science and Engineering Research Board, Dept. of Science and Technology,
Govt. of India though the research grant CRG/2019/005060.
## References
* [1] A. H. Cottrell, B. A. Bilby, Dislocation theory of yielding and strain ageing of Iron, Proceedings of the Physical Society: Section A 62 (1) (1949) 49–62.
* [2] A. H. Cottrell, M. Jaswon, Distribution of solute atoms round a slow dislocation, Proceedings of the Royal Society of London A: Mathematical and Physical Sciences 199 (1056) (1949) 104–114.
* [3] B. A. Bilby, On the interactions of dislocations and solute atoms, Proceedings of the Physical Society. Section A 63 (3) (1950) 191–200.
* [4] W. G. Wolfer, M. Ashkin, Diffusion of vacancies and interstitials to edge dislocations, Journal of Applied Physics 47 (3) (1976) 791–800.
* [5] P. Beaven, E. Butler, Precipitate nucleation on dislocations in Fe–N, Acta Metallurgica 28 (10) (1980) 1349–1359.
* [6] A. W. Cochardt, G. Schoek, H. Wiedersich, Interaction between dislocations and interstitial atoms in body–centered cubic metals, Acta Metallurgica 3 (6) (1955) 533–537.
* [7] P. M. Anderson, J. P. Hirth, J. Lothe, Theory of dislocations, Cambridge University Press, 2017.
* [8] J. W. Cahn, Nucleation on dislocations, Acta Metallurgica 5 (3) (1957) 169–172.
* [9] F. S. Ham, Stress-assisted precipitation on dislocations, Journal of Applied Physics 30 (6) (1959) 915–926.
* [10] R. Gomez-Ramirez, G. Pound, Nucleation of a second solid phase along dislocations, Metallurgical Transactions 4 (6) (1973) 1563–1570.
* [11] W. C. Dash, Copper precipitation on dislocations in Silicon, Journal of Applied Physics 27 (10) (1956) 1193–1195.
* [12] Z. Feng, Y. Yang, B. Huang, M. Han, X. Luo, J. Ru, Precipitation process along dislocations in Al–Cu–Mg alloy during artificial aging, Materials Science and Engineering: A 528 (2) (2010) 706–714.
* [13] A. K. Da Silva, D. Ponge, Z. Peng, G. Inden, Y. Lu, A. Breen, B. Gault, D. Raabe, Phase nucleation through confined spinodal fluctuations at crystal defects evidenced in Fe-Mn alloys, Nature Communications 9 (1) (2018) 1–11.
* [14] R. D. Kamachali, A. K. da Silva, E. McEniry, D. Ponge, B. Gault, J. Neugebauer, D. Raabe, Segregation-assisted spinodal and transient spinodal phase separation at grain boundaries, npj Computational Materials 6 (1) (2020) 1–13.
* [15] J. R. Mianroodi, P. Shanthraj, B. Svendsen, D. Raabe, Phase-field modeling of chemoelastic binodal/spinodal relations and solute segregation to defects in binary alloys, Materials 14 (7) (2021) 1787.
* [16] F. Léonard, R. C. Desai, Spinodal decomposition and dislocation lines in thin films and bulk materials, Physical Review B 58 (13) (1998) 8277–8288.
* [17] S. Y. Hu, L.-Q. Chen, Solute segregation and coherent nucleation and growth near a dislocation—a phase-field model integrating defect and phase microstructures, Acta Materialia 49 (3) (2001) 463–472.
* [18] M. Haataja, F. Léonard, Influence of mobile dislocations on phase separation in binary alloys, Physical Review B 69 (8) (2004) 081201–(1–4).
* [19] M. Haataja, J. Mahon, N. Provatas, F. Léonard, Scaling of domain size during spinodal decomposition: dislocation discreteness and mobility effects, Applied Physics Letters 87 (25) (2005) 251901–(1–3).
* [20] N. Ma, C. Shen, S. Dregia, Y. Wang, Segregation and wetting transition at dislocations, Metallurgical and Materials Transactions A 37 (6) (2006) 1773–1783.
* [21] Y.-S. Li, S.-X. Li, T.-Y. Zhang, Effect of dislocations on spinodal decomposition in Fe–Cr alloys, Journal of Nuclear Materials 395 (1-3) (2009) 120–130.
* [22] M. Legros, G. Dehm, E. Arzt, T. J. Balk, Observation of giant diffusivity along dislocation cores, Science 319 (5870) (2008) 1646–1649.
* [23] Y. U. Wang, Y. Jin, A. Cuitino, A. Khachaturyan, Nanoscale phase field microelasticity theory of dislocations: model and 3D simulations, Acta Materialia 49 (10) (2001) 1847–1857.
* [24] D. Rodney, Y. Le Bouar, A. Finel, Phase field methods and dislocations, Acta Materialia 51 (1) (2003) 17–30.
* [25] M. Koslowski, A. M. Cuitino, M. Ortiz, A phase-field theory of dislocation dynamics, strain hardening and hysteresis in ductile single crystals, Journal of the Mechanics and Physics of Solids 50 (12) (2002) 2597–2635.
* [26] C. Shen, Y. Wang, Incorporation of $\gamma$-surface to phase field model of dislocations: simulating dislocation dissociation in FCC crystals, Acta Materialia 52 (3) (2004) 683–691.
* [27] L. Lei, M. Koslowski, Mesoscale modeling of dislocations in molecular crystals, Philosophical Magazine 91 (6) (2011) 865–878.
* [28] A. Hunter, I. J. Beyerlein, T. C. Germann, M. Koslowski, Influence of the stacking fault energy surface on partial dislocations in FCC metals with a three-dimensional phase field dislocations dynamics model, Physical Review B 84 (14) (2011) 144108.
* [29] J. Zhu, L.-Q. Chen, J. Shen, V. Tikare, Coarsening kinetics from a variable–mobility Cahn-Hilliard equation: Application of a semi-implicit Fourier spectral method, Physical Review E 60 (4) (1999) 3564–3572.
* [30] T. Mura, Micromechanics of defects in solids, Kluwer, 1987.
* [31] J. W. Cahn, On spinodal decomposition in cubic crystals, Acta Metallurgica 10 (3) (1962) 179–183.
* [32] F. A. Nichols, W. W. Mullins, Surface-(interface-) and volume-diffusion contributions to morphological changes driven by capillarity, Transactions of the Metallurgical Society of AIME 233 (10) (1965) 1840–1848.
* [33] K. Jacob, A. Roy, M. P. Gururajan, B. Nagamani, Effect of dislocation networks on precipitate morphology in maraging steels, Available at SSRN 3799669.
## Supplementary information
Figure 8: The morphology of the precipitate formed at the intersection of
dislocations for (i) positive-positive (a-d), (ii) negative-negative (e-h) and
(iii) positive-negative (i-l) dislocation combinations. The figures (b), (f)
and (j) show the $xy$ section; (c), (g) and (k) show the $yz$ section; and
(d), (h) and (l) show the $yz$ section of the precipitate.
| arxiv-papers | 2021-07-27T10:01:30 | 2024-09-04T03:07:21.142817 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Arjun Varma R and Prita Pant and M P Gururajan",
"submitter": "Mogadalai P Gururajan",
"url": "https://arxiv.org/abs/2107.12703"
} |
2107.12706 | # Improving ClusterGAN Using Self-Augmented Information Maximization of
Disentangling Latent Spaces
Tanmoy Dam ${}^{\href https://orcid.org/0000-0003-3022-0971}$, Sreenatha G.
Anavatti ${}^{\href https://orcid.org/; 0000-0002-4754-8191}$, Hussein A.
Abbass, ${}^{\href https://orcid.org/0000-0002-8837-0748}$
School of Engineering and Information Technology, University of New South
Wales Canberra, Australia.
###### Abstract
Since their introduction in the last few years, conditional generative models
have seen remarkable achievements. However, they often need the use of large
amounts of labelled information. By using unsupervised conditional generation
in conjunction with a clustering inference network, ClusterGAN has recently
been able to achieve impressive clustering results. Since the real conditional
distribution of data is ignored, the clustering inference network can only
achieve inferior clustering performance by considering only uniform prior
based generative samples. However, the true distribution is not necessarily
balanced. Consequently, ClusterGAN fails to produce all modes, which results
in sub-optimal clustering inference network performance. So, it is important
to learn the prior, which tries to match the real distribution in an
unsupervised way. In this paper, we propose self-augmentation information
maximization improved ClusterGAN (SIMI-ClusterGAN) to learn the distinctive
priors from the data directly. The proposed SIMI-ClusterGAN consists of four
deep neural networks: self-augmentation prior network, generator,
discriminator and clustering inference network. The proposed method has been
validated using seven benchmark data sets and has shown improved performance
over state-of-the art methods. To demonstrate the superiority of SIMI-
ClusterGAN performance on imbalanced dataset, we have discussed two imbalanced
conditions on MNIST datasets with one-class imbalance and three classes
imbalanced cases. The results highlight the advantages of SIMI-ClusterGAN.
###### Index Terms:
Clustering, ClusterGAN, Generative Adversarial Networks, Information
Maximisation, Imbalanced Data.
## I introduction
Clustering is a popular unsupervised representation learning method, which has
been widely studied in computer vision and machine learning communities such
as image segmentation [1], visual features representation learning [2], and 3D
object recognition [3]. The lower dimensional representation of high
dimensional semantics data has been described by many latent-space based
clustering methods, such as DCN [4], DEC [5], Dual-AE [6], and ClusterGAN [7].
Latent space clustering methods have been developed based upon the clustering-
assignment objective in the latent-space. Therefore, the objective still lies
in the discriminative learning representation blending with data
reconstruction loss. This discriminative lower dimensional representation can
capture all discrete factors in the lower dimensional latent space such as
data variations within the same group, which are the key factors for
clustering objective. However, it fails to reconstruct the real data due to
the clustering assignment objective. Hence, similarities based clustering
methods (such as K-means) have been incorporated with latent space to
determine the clustering assignments [4]. Further improvement using latent-
space clustering objectives and pretrained reconstruction are employed to
determine the optimal lower cluster assignment representation [8]. However,
this is a very laborious task to obtain both optimal lower representation and
a reconstruction of the real data at the same time. To obtain this
representation, the high-dimensional data is first represented in lower
dimensional latent space and then different distance-metric clustering
objectives are applied on latent space to determine clustering assignments [5]
[9].
Generative adversarial networks (GAN) are one of the most effective tools to
learn an implicit function [10, 11, 12, 13] from complex real data
distribution [14, 3, 15, 16, 17, 18, 7, 19]. The learning process is
formulated as an adversarial game using the min-max principle. The generator
network takes the sample from the noisy latent distribution to estimate the
real distribution, while the discriminator network is trained to discriminate
the real from fake samples, respectively. For learning complicated data
distributions, generative models have been extensively studied in most
circumstances. When it comes to downstream tasks like clustering, the
estimation of the posterior distribution of latent inference from the data is
an intractable problem in GAN models. Therefore, the researchers developed a
mode-matching network for estimating downstream tasks [7, 20]. In a mode
matching network, a clustering inference network estimates the multi-modal
latent prior through bounding loss. Thus, an inference network works as a
regularisation of the GAN objective where each mode is defined for each class
of real data distribution. However, it is well-defined that mode matching
network can’t be fully enforced the clustering objective on the generative
samples when dealing with high-dimensional data [21, 22, 23] . Therefore, for
high-dimensional data like CIFAR-10, STL-10, the mode matching network [7, 20]
is dependent on the semantics of the data, which may not be directly related
to the labels(class) information. In addition, in real-life scenarios, the
classes of real distribution are not uniformly distributed. For example, the
MNIST dataset contains ten distinctive classes, where mode matching methods
try to estimate ten distinctive modes through ten uniform priors [7, 20].
Although the latent priors originate from ten different distributions, the
uniform prior-based generative model can only create major classes. Thus, the
inverting inference network fails to provide appropriate clustering
performance. As a solution, we need to include regularisation that compel
inference networks to accurately estimate downstream tasks and create all
unique modes in imbalanced situations. To tackle both the issues, we propose a
self augmented information maximization improved ClusterGAN (SIMI-ClusterGAN)
in this paper. SIMI-ClusterGAN has four deep neural networks: self-
augmentation prior network, generator, discriminator and clustering inference
encoder. Prior network is used to learn the discrete representation of data in
discrete space by self-augmentation maximization principle. This learned prior
blends with continuous variable to form a discrete noise latent space. Then,
generative network takes continuous-discrete Gaussian noise latent space prior
to map in real data domain. Clustering inference encoder predicts the lower-
level representation of the generated as well as real data through clustering
assignment indices. To enforce the disentanglement clustering representation
of real data, the weight sharing generator-encoder networks pair have been
utilised. We propose three additional loss functions to modify the ClusterGAN
objectives. These three losses are used to create distinctive latent-space to
help maintaining diversity in generative samples in addition to improving the
clustering performance.
In summary, the main contributions of this work are as follows:
* •
We propose self-augmented mutual information maximization based disentangle
categorical priors (one-hot encode)learning from the data.
* •
The learned discrete categorical priors with continuous Gaussian noise are
utilised to form smooth disentangle noise latent spaces. This learned mixture
of continuous-discrete disentangle latent spaces is used to generate the real
class distribution of the data.
* •
Three additional loss functions are introduced to modify ClusterGAN objectives
for improved performance. Theses loss functions account for reconstruction,
prior bounding and cross modality.
* •
A comparison of the the proposed SIMI-ClusterGAN and other GAN clustering
methods is presented to validate the superiority of the proposed method in
clustering tasks. We have used seven datasets including CIFAR-10 and STL-10 to
accommodate complex high-dimensional data. We further demonstrate the
superiority of our proposed method for imbalanced dataset by comparing the
performance with ClusterGAN under two different imbalanced conditions.
## II Related Work
### II-A Disentangle latent space clustering
Most of the latent-space based approaches in practice have the encoder-decoder
(Enc-Dec) structure where lower dimensional encoding latent code is used for
clustering tasks [24, 25, 26, 5]. In deep embedding clustering (DEC) [5], an
Enc-Dec structure with reconstruction loss has been considered to train the
model parameters. Once pre-training has been done, then a clustering network
is added over the Enc network for further training with clustering
similarities loss. In improved DEC [26], to maintain the local structure in
the latent space, reconstruction loss is also considered in the final stage.
The whole learning process is jointly trained as in DEC [5]. The Deep
clustering network(DCN) is developed based on the Enc-Dec and K-means
clustering objective [25]. In order to maintain the local semantics in latent
space, the reconstruction loss is adopted along with the K-means objective.
However, the performance of the DCN method is still not seen to be adequate.
The variation of disentangle factor in autoencoder based generative models can
give explainable semantic latent code from the data. Most of the disentangle
representations are associated with defining the separate latent spaces using
variational factors [27, 28, 29, 30] in which a single-stage or two-stage
learning procedure can be found. Single stage disentanglement mostly deals
with variations of two factors [27, 31, 32, 33] or three factors [28, 29]. In
all single-stage methods, the disentanglement has improved due to the partial
knowledge of label information through cross-entropy loss. Meanwhile, two-
stage disentanglement methods, such as $\beta$-TCVAE [34], $\beta$-VAE [35],
factor-VAE [36], and joint continuous-discrete factors VAE [37] methods create
separate latent spaces without knowledge of class-label information. These
methods mostly deal with autoencoder structures with a Gaussian prior
distribution in the encoded space. The disentanglement is accounted through
reconstruction grade and regularisation of latent code factorization even
though the real world data require more disentanglement’s factors (eg.
labels), which can’t be obtained directly with continuous latent spaces.
Consequently, joint VAE [37] came up with continuous-discrete factors of
variations into the latent space.
### II-B Generative prior-based inverse latent space clustering
The multi-modal prior based latent space clustering can be segregated into two
ways, 1) by applying a mixture of continuous distributions, such as the GMM
[38], and 2) by applying a combination of discrete and continuous
distributions, such as the InfoGAN [20] and ClusterGAN[7]. The latter is the
more popular of the two and is often accomplished by the concatenation of
discrete and continuous random variables. In InfoGAN, the disentanglement of
latent factor is maximised between the latent code and the generated data. The
modification of infoGAN, known as ClusterGAN [7], works on the same principle
except for the bounded non-smooth latent space. The non-smooth discrete
disentangle latent space is based on mixture of continuous-discrete (one-hot
code) latent variables. The one-hot code discrete variable is used to measure
the clustering performance by the encoder inference network. However, the
continuous-discrete latent space variables are unable to complete
disentanglement (e.g. categories) in ClusterGAN. It is reasonable to assume
that the cluster characteristics of real data will not be replicated in the
generated data, resulting in incorrect coverage of clusters in the generated
data, as described in [20]. To tackle such an issue, more disentanglement in
latent space is observed in [23]. However, the proposed NEMGAN [23], that has
the same ClusterGAN structure except a mode engineering network is used to
learn the discrete prior from the data. The Mode network is updated by
minimizing the KL divergence loss between mutual information data and mode
network output. Thus, mode network output depends on mutual information of the
data which is more relevant than the uniform discrete distribution of
ClusterGAN. While updating the mode network, NEMGAN accounts for partial true
label information. However, the performance is not significantly improved
without partial information of true labels compared to the ClusterGAN.
Therefore, NEMGAN is not a completely unsupervised method; instead, we would
say it is a semi-supervised method.
In SIMI-ClusterGAN, we have proposed a two-stage approach to improve
ClusterGAN performance. For learning the discrete prior assignments from the
data, the self-augmented information maximization principle is employed. Once
the learned prior from the data is obtained, it is used to form continuous-
discrete mixtures to improve our SIMI-ClusterGAN performance. Unlike NEMGAN,
the clustering inference network is used to separate the continuous-discrete
variable without any supervision.
## III Proposed approach
This section begins with a brief introduction to the ClusterGAN algorithm. The
discrete prior is then discovered by applying the SIM principle directly to
the data. We created our novel SIMI-ClusterGAN approach by combining this
learnt discrete prior with three additional losses. The architecture of the
proposed method is depicted in Figure 1.
Figure 1: The SIMI-ClusterGAN Architecture. $E_{\omega}$ and $G_{\theta}$ are
sharing networks.
### III-A ClusterGAN
Let, the given $i$-th sample of real data $\\{x_{i}^{r}\\}_{i=1}^{N}\in X\in
p_{r}$, represent the $M$-discrete representable form by the function
$Y=s(X)$, where $Y\in\\{y_{1},y_{2},...,y_{M}\\}\subseteq\textbf{c}$. Where,
$\textbf{c}\in\\{c_{1},c_{2},...,c_{M}\\}$ is the ground truth classes. The
ClusterGAN objective is estimate the $s(.)$ through adversarial GAN game
principle. Generative adversarial networks (GAN) [10] are defined by two
neural network(NN) components, the generative component(G) and the
discriminator component(D), which are parameterised by $\theta$ and $\eta$,
respectively. The generator $(G_{\theta})$ takes noise distribution to map
real distribution, $G_{\theta}:Z\mapsto X$ whereas the discriminator
$(D_{\eta})$ is assigned a probabilistic value for the data sample of being
real vs fake data, $D_{\eta}:X\mapsto R$. The GAN game is working on a two
players min-max game principle defined as follows,
$\mathop{\min}\limits_{\theta}\mathop{\max}\limits_{\eta}\mathbb{E}_{x^{r}\sim
p_{r}}[f(D_{\eta}(x^{r}))]+\mathbb{E}_{z\sim
p_{z}}[f(1-D_{\eta}(G_{\theta}(z)))]$ (1)
where, the real sample $(x^{r}\in X)$ belongs to real probabilities
distribution $x^{r}\in p_{r}$. $z\in p_{z}$ is the latent space samples, which
are drawn from a known prior distribution ($p_{z}$)(e.g. multivariate Gaussian
distribution). $p_{g}$ is the generated sample distribution which defines
$x^{g}=G_{\theta}(z)$ and $f$ is the standard GAN type selection function. For
vanilla GAN, $f(x^{r})=logx^{r}$ and for Wasserstein GAN, $f(x^{r})=x^{r}$
[39]. The adversarial GAN objective is to learn the function $f(.)$
$(p_{r}=f(p_{z}))$ through density estimation [40].
#### III-A1 Continuous-discrete prior based disentanglement in ClusterGAN
In ClusterGAN, the multi-modal latent space($z\in Z$) is defined by a mixture
of continuous and discrete prior distribution to form a discrete smooth
manifold. Generally, a discrete smooth manifold mixture is obtained by
cascading the normal distribution with uniform categorical distribution, and
its disentanglement in latent space is controlled through categorical
distributions. To be more specific, the latent space prior represents
$z=(z_{n},z_{M})$ where $z_{n}=\mathcal{N}({\mu=0,\sigma^{2}*I_{d_{n}}})$ and
$z_{M}\sim\mathcal{U}\\{1,2,...,M\\}$, $\mathcal{U}\in R^{M}$ is the discrete
uniform prior, which represents the number of $M$ classes present in the
dataset. However, the variance$(\sigma)$ of the normal distribution
($\mathcal{N}$) is kept to a low value for the $G_{\theta}$ network so that
all the discrete modes $(labels)$ can be generated with high purity. Hence,
the sigma value [7] has been chosen to ($\sigma=0.10$) for all experiments in
this paper. Thus, the continuous-discrete latent space ($z_{n}$) is bounded
within $z\in(-0.6,0.6)<1$. This uniform discrete latent priors allow us to
design an algorithm capable of detecting a number of clusters in the inverse
generated space.
#### III-A2 Inference Clustering Network in ClusterGAN
Many previous methods [41, 42] are mainly focused on the inverse latent space
to reconstruct $(z^{*})$ through an encoder inference $(E_{\omega})$ network.
However, this bidirectional mapping can’t guarantee the reconstruction of the
latent space due to a lack of consistency between the samples and the latent
space. Due to the non-convex optimization nature of the problem, the
reconstruction always suffers from different latent space embedding $z$.
DeliGAN [38] has used different initialization to reconstruct the discrete
latent space. Stochastic clipping of $z$ at each step is also found in [42].
However, none of the methods are related to the latent space based clustering.
In ClusterGAN [7], the bounded discrete latent space is computed by inference
autoencoder network $(E_{\omega})$. The generator takes the mixture of
continuous-discrete latent space $(z=z_{n},z_{M})$ to generate $x^{g}$ and the
encoder estimates back to the latent space
$(\hat{z}^{g}_{n},\hat{z}^{g}_{M})=E_{\omega}(x^{g})$. The encoding cyclic
loss for generated samples is computed by cross-entropy loss and
reconstruction losses between $(z_{n},z_{M})$ and
$(\hat{z}^{g}_{n},\hat{z}^{g}_{M})$. The generated samples cross entropy loss
$(J_{ce})$ between $z_{M}$ and $\hat{z}^{g}_{M}$ is defined as follows,
$J_{ce}=\operatorname{\mathbb{E}}_{z\sim
p_{z}}[l(z_{M},E_{\omega}(G_{\theta}(z_{n},z_{M})))]$ (2)
where, $l$ is associated with the cross-entropy loss. The reconstruction loss
$(J_{mse})$ between $z_{n}$ and $\hat{z}^{g}_{n}$ is defined by the mean
square error (MSE) as follows,
$J_{mse}=\operatorname{\mathbb{E}}_{z\sim p_{z}}\parallel
z_{n}-E_{\omega}(G_{\theta}(z_{n},z_{M}))\parallel_{2}$ (3)
Finally, the three-player ClusGAN game directs attention to the following
optimisation problem:
$\begin{split}\mathop{\min}\limits_{\theta,\omega}\mathop{\max}\limits_{\eta}\operatorname{\mathbb{E}}_{x\sim
p_{r}}[f(D(x^{r}))]+\operatorname{\mathbb{E}}_{z\sim p_{z}}[f(1-D(G(z)))]\\\
+\alpha_{cl}J_{ce}+\alpha_{mse}J_{mse}\end{split}$ (4)
The regularisation coefficients ($\alpha_{cl},\alpha_{mse}$) control the
disentanglement factors in the encoded latent space. To determine the
clustering accuracy, the real data distribution samples pass through the
$E_{\omega}$ network to predict continuous and discrete variables. Afterwards,
the $K$-means [9] clustering algorithm is applied to concatenated continuous
and discrete vectors to obtain clustering performance. For downstream tasks
like clustering, the cluster characteristics of real data can’t be completely
replicated through generated samples. This results in the disentanglement of
encoded latent space, which may not be enough because the $E_{\omega}$ network
has never been exposed to real distribution. As a result, adequate performance
can’t be obtained with this learning strategy. To tackle this issue, we first
learn the lower level representation by using the SIM principle. Afterwards,
the learned prior is used to guide more disentanglement in encoded latent
space by using three additional losses. Unlike NEMGAN [23], both the learning
stages don’t consider any true level of information.
### III-B Self-augmented information maximization(SIM) for discrete prior
learning:
We use SIM principle to learn the discrete prior(${y_{1},y_{2},...,y_{M}}$)
from the data directly. Our objective is estimate the $s(.)$ by maximised
mutual information between $X\&Y$. According to Gomes et. al. [43],
regularised information maximisation (RIM) maximizes the mutual information
between the data and its discrete representation ($m=1,2,...,M$) by learning
the prior network ($P_{\phi}(Y|X)$). Therefore, the regulariser based RIM
objective function is defined as follows,
$R_{\phi}-\beta_{p}I(X:Y)$ (5)
where, $I(.)$ measures the mutual information between the data and the
discrete representation. The reguliser constraint, $R_{\phi}$, updates the
prior network parameters $\phi$. $\beta_{p}$ controls the reguliser and mutual
information. The prior network objective is to maximise the conditional
probabilities based on the similar representation of the data [43]. The
independent conditional probabilities of given model,
$P_{\phi}(y_{1},y_{2}...,y_{M}|X)$, are represented in the following form,
${P_{\phi}(y_{1},y_{2},...,y_{M}|X)=\prod_{m=1}^{M}P_{\phi}(y_{m}|X)}$ (6)
Maximising Eq. 6 is to represent the $M$ discrete classes based on the mutual
information between data. Hu. et. al. [44] suggested the regularisation
$(R_{\phi})$ can be represented in a flexible formation, which is defined as a
self-augmented training (SAT). The self-augmentation regularisation between
data $x^{r}$ and its augmented variations $T(x^{r})$ is represented as
follows,
${R_{SAT}({\phi;x^{r},T(x^{r}))}=-\sum_{m=1}^{M}\sum_{y_{m}=0}^{M-1}P_{\hat{\phi}}(y_{m}|x^{r})logP_{\phi}(y_{m}|T(x^{r}))}$
(7)
where, $T(.)$ is a self augmentation function. $P_{\hat{\phi}}(y_{m}|x^{r})$
is the current prediction of data $x^{r}$ and $\hat{\phi}$ is the current
update of $P$ network parameters. Equation 7 represents the ability of the
augmented data $(T(x^{r}))$ to push closer to the conditional probabilities
$P_{\phi}(y_{M}|x^{r})$. Generally, for image data, the augmentation is mostly
dealt with an affine transformation such as random rotation, scaling and
shearing [44].
The local perturbation of data can’t alter the invariant nature and the local
perturbation based self-augmentation can be defined as follows,
$T(x^{r})=x^{r}+l_{p}$ (8)
where $l_{p}$ is the local perturbation which does not change the data
representation in low dimensional regions/manifold [45]. The local
perturbation regularisation method is based on the virtual adversarial
training method [46] in which the local perturbation is defined as follows,
$l_{p}=\operatorname*{arg\,max}_{\hat{l}_{p}}[R_{SAT}({\hat{\phi}};x^{r},x^{r}+l_{p}),\,\,\,\parallel{l_{p}}\parallel_{2}\leq\beta_{t}]$
(9)
The local perturbation solution of Eq. 9 can be easily obtained from [46].
The discrete cluster representation of Eq. 5 can be reviewed in-terms of the
difference in the mutual information between the entropy and the marginal
conditional entropy [43] as follows,
$R_{SAT}-\beta_{p}[H(Y)-\beta_{mu}H(Y|X)]$ (10)
where, $H(Y)$ and $H(Y|X)$ represent the marginal entropy and conditionals
entropy, respectively, which are calculated as follows,
$\begin{split}H(Y)=h(P_{\phi}(y_{M}))=h(\frac{1}{N}\sum_{n=1}^{N}P_{\phi}(y_{M}|x^{r}_{n}))\\\
H(Y|X)=\frac{1}{N}\sum_{n=1}^{N}h(P_{\phi}(y_{M}|x^{r}_{n}))\end{split}$ (11)
where, $h(.)$ is an entropy function. The marginal entropy and conditionals
entropy are working together to represent the discrete representation
($y_{M}$) of the data. Hence, Eq. 10 is the final optimization problem that
can give us discrete prior index ($y_{M}$) from the data. After obtaining the
learned prior, it has to be represented in one-hot-code categorical
priors($z_{M}$) in the proposed SIMI-ClusterGAN. The one-hot code (OHC)
representation of $y_{M}$ is defined by the following form,
$z_{M}=1_{M}(y_{M})=\begin{cases}$1$&\text{when , $y_{M}\in M$ }\\\
$0$&\text{when, $y_{M}\not\in M$}\end{cases}$ (12)
### III-C Inference network disentanglement representation in SIMI-ClusterGAN
The generated samples ($x^{g}$) are only considered in the $(E_{\omega})$, to
obtain cluster representations of the data in ClusterGAN. However, this can’t
guarantee that representation of data always lies in the categories of the
labels [7]. Hence, a suitable disentanglement is required to enforce the
representation to remain at categories labels. At the same time, it also
handles the mode diversity issue. The $G_{\theta}$ takes the continuous
$(z_{n})$-discrete$(z_{M})$ mixtures prior noise to generate samples $x^{g}$
and then, the generated samples passing through the $E_{\omega}$ to estimate
the $\hat{z}^{g}_{n}$ and $\hat{z}^{g}_{M}$ by the two equations 3 and 2,
respectively. These two equations are known as cyclic loss in ClusterGAN
objective Eq. 4. To estimate the posterior distribution from the real data
$(x^{r})$, the $E_{\omega}$ encodes as ($\hat{z}^{r}_{n}$, $\hat{z}^{r}_{M}$).
The $G_{\theta}$ takes the estimated categorical posterior $(\hat{z}^{r}_{M})$
with varying continuous distribution, $(z_{n})$, to generate realistic
samples, $(\hat{x}^{r})$. The encoding and decoding distributions match can be
achieved by two networks $E_{\omega}$ and $G_{\theta}$, respectively [47].
This $E_{\omega}-G_{\theta}$ reconstruction loss is defined as follows,
$J_{rec}=\mathbb{E}_{x^{r}\sim p_{r}}\parallel
x^{r}-(G_{\theta}(E_{\omega}(x^{r})))\parallel_{2}$ (13)
This loss can be looked upon as the real-reconstructing loss between
$E_{\omega}$ and $G_{\theta}$ pairs to force reconstruction levels
disentanglement.
The above cyclic losses and reconstruction losses are used to maintain the
local level disentanglement between the real space, $(x^{r})$, and the
generated space, $(x^{g})$. To enforce more disentanglement on the
$E_{\omega}$, we have added one regularisation penalty on the bounded real
discrete prior loss. We have used the same $E_{\omega}$ networks with sharing
weights that will help to update the parameters on different constraints. To
determine prior bounding loss, we draw samples from the real distribution,
$x^{r}\in p_{r}$ and $E_{\omega}$ maps real samples into real disentangle
representation variables, $\hat{z}^{r}_{n}$ and $\hat{z}^{r}_{M}$. The cross-
entropy prior bounded loss is defined as follows,
$J_{pce}=\mathbb{E}_{x^{r}\sim p_{r}}[l(z_{M},E_{\omega}(x^{r})]$ (14)
Moreover, to generate diverse samples within the same prior discrete
representation ($z_{M}$) [48], we have also introduced cross-modality loss by
considering two generated samples from the $G_{\theta}$ network. To generate
two samples $(x^{g},\hat{x}^{g})$ from $G_{\theta}$, two different variants
latent codes have been used with the same prior ($z_{M}$). They are obtained
by varying the continuous variable ($z_{n}$) only while maintaining $z_{M}$
fixed. The latent variables for cross-modality is represented as
$(z_{1},z_{2})$, where $z_{1}=(z_{n},z_{M})$ and
$z_{2}=(z^{\prime}_{n},\hat{z}^{r}_{M}=E_{\omega}(x^{r}))$. Cross-modality
loss continues to generate diverse images and penalises the generator. Cross-
modality is defined as follows,
$J_{cm}=\mathbb{E}_{x^{r}\sim p_{r}}\mathbb{E}_{z\sim p_{z}}\parallel
x_{g}-(G_{\theta}(z^{\prime}_{n},E_{\omega}(x^{r})))\parallel_{2}$ (15)
### III-D Final objective function of SIMI-ClusterGAN
The proposed SIMI-ClusterGAN objective function incorporates all of the above
defined losses along with ClusterGAN cyclic losses. Thus, the SIMI-ClusterGAN
objective function is defined as follows,
$\begin{split}\mathop{\min}\limits_{\theta,\omega}\mathop{\max}\limits_{\eta}\operatorname{\mathbb{E}}_{x^{r}\sim
p_{r}}[f(D_{\eta}(x))]+\operatorname{\mathbb{E}}_{z\sim
p_{z}}[f(1-D_{\eta}(G_{\theta}(z)))]\\\
+\alpha_{cl}J_{ce}+\alpha_{mse}J_{mse}+\alpha_{re}J_{rec}+\alpha_{pcl}J_{pce}+\alpha_{cm}J_{cm}\end{split}$
(16)
where, the regularisation coefficients($\alpha_{re},\alpha_{pcl},\alpha_{cm}$)
are used to maintain disentanglement of encoded latent space and diversify the
generated samples.
Algorithm 1 SIMI-ClusterGAN algorithm
0: training data($D^{tra}$)= ${\left\\{{{{x^{r}}\in R^{d}},{y\in
R^{M}}}\right\\}^{S}}$, testing data($D^{tst}$)=${\left\\{{{{x^{r}}\in
R^{d}},{y\in R^{M}}}\right\\}^{T}}$, $epoch_{1}$=$60$, $epoch_{2}$=$200$,
$B_{p}$=$256$, $B_{m}$=$30$, $\beta_{p}=0.1$, $\beta_{t}=0.25$,
$\beta_{mu}=4$, ADAM optimizer($\beta_{1}=0.5$ & $\beta_{2}=0.999$), $l_{r1}$=
$0.002$ for $P_{\phi}$, $l_{r2}$= $0.0001$ for $D_{\eta}$, $G_{\theta}$,
$E_{\omega}$, Critic iter($C_{iter}$)=1, $\lambda$ =10, regularisation factors
$\alpha_{cl}=10,\alpha_{mse}=10,\alpha_{re}=1,\alpha_{pcl}=10$ and
$\alpha_{cm}=1$
0: $P_{\phi}$, $G_{\theta}$, $D_{\eta}$, $E_{\omega}$
1: Phase 1: The Prior Learning Algorithm ($P_{\phi}$)
2: for $epoch\,\,\,\,in\,\,\,\,epoch_{1}$ do
3: Samples $x^{r}\in p_{r}$ drawn in a mini-batch $B_{p}$.
4: Calculate the self-augmentation distance by using equ.(9)
5: Maximize the discrete representation($y_{M}$) by optimizing the equ.(10)
6: end for
1: Phase 2: SIMI-ClusterGAN using the learned prior($P_{\phi}$)
2: for $epoch\,\,\,in\,\,\,epoch_{2}$ do
3: for iter in $C_{iter}$ do
4: Samples $x^{r}\in p_{r}$ drawn in a mini-batch $B_{m}$.
5: Calculate discrete prior assignment $y_{M}$ = $P_{\phi}(x^{r})$.
6: One hot code representation of learned prior, $z_{M}$ by using equation
(12).
7: Samples $z_{n}\in p_{z}$ drawn in a mini-batch $B_{m}$.
8: the continuous-discrete mixture of latent space variable $z=(z_{n},z_{M})$.
9: $G_{\theta}(z)\rightarrow x^{g}$
10: WGAN 1-GP stability applied on $D_{\eta}$ parameters. Discriminator
parameters ($\eta$) are updated by the following equation,
$D_{\eta}\rightarrow D_{\eta}(x^{r})-D_{\eta}(x^{g})+\lambda(||\nabla
D_{\eta}(\hat{x}^{r})||-0)^{2}$ where, $\hat{x}^{r}=\alpha
x^{r}+(1-\alpha)x^{g}$
11: end for
12: Encodes the generated samples
$E_{\omega}(x^{g})\rightarrow(\hat{z}^{g}_{n},\hat{z}^{g}_{M})$.
13: Calculate the cyclic loss by using equations(3) and (2).
14: The reconstruction loss($J_{rec}$) between $E_{\omega}-G_{\theta}$
networks pair is obtained by equation (13).
15: The prior bounded cross entropy loss ($J_{pce}$) is obtained by equation
14.
16: The cross-modality loss ($J_{cm}$) is obtained by equation 15.
17: The generator($G_{\theta}$) network parameters ($\theta$)are updated by
the following form, $G_{\theta}\rightarrow
D_{\eta}(x^{g})+\alpha_{cl}J_{cl}+\alpha_{mse}J_{mse}+\alpha_{cm}J_{cm}+\alpha_{re}J_{rec}$
18: The inference($E_{\omega}$) network parameters ($\omega$) are updated by
the following form,
$E_{\omega}\rightarrow\alpha_{cl}J_{cl}+\alpha_{mse}J_{mse}+\alpha_{cm}J_{cm}+\alpha_{re}J_{rec}+\alpha_{pcl}J_{pce}$
19: if $epoch_{2}\mathbin{\%}1==0$ then
20: /* Encode latent spaces for $D^{tst}$ */
21: $E_{\omega}(x^{r}\in D^{tst})\rightarrow(\hat{z}_{n}^{r},\hat{z}_{M}^{r})$
22: Apply K-means on $(\hat{z}_{n}^{r},\hat{z}_{M}^{r})$ to calculate ACC and
NMI values.
23: end if
24: end for
## IV Results & Experiments
We validate the proposed SIMI-ClusterGAN performance on several benchmark
datasets. We used an imbalanced dataset under two imbalanced situations to
verify the proposed method’s superiority over ClusterGAN. We also examine the
extensive ablation studies of each component of the proposed method’s
objective function to evaluate the clustering performance.
### IV-A Datasets
SIMI-ClusterGAN clustering performance has been evaluated on several benchmark
datasets such as MNIST, Fashion-MNIST, USPS, Pendigits, $10\times{{}_{-}}73k$,
STL-10 [49] and CIFAR-10 [50] datasets. The information about these datasets
and their corresponding latent space dimensions are provided in Table I. The
SIMI-ClusterGAN algorithm is provided in Algorithm 1
TABLE I: Data and latent variable Dimensions Datasets | Samples | Labels | Dimensions $\in R^{d}$ | $z_{n}$ | $z_{M}$
---|---|---|---|---|---
MNIST [51] | 70k | 10 | $1\times 28\times 28$ | 30 | 10
Fashion-MNIST [51] | 70k | 10 | $1\times 28\times 28$ | 30 | 10
USPS [6] | 9,298 | 10 | $1\times 16\times 16$ | 30 | 10
Pendigits [7] | 10992 | 10 | $1\times 16$ | 5 | 10
$10\times{\\_}73k$ [7] | 73233 | 8 | $1\times 720$ | 30 | 8
CIFAR-10 [44] | 60k | 10 | $3\times 32\times 32$ | 50 | 10
STL-10 [44] | 13k | 10 | $3\times 96\times 96$ | 100 | 10
### IV-B Simulations Implementation
Four different neural networks $P_{\phi},G_{\theta},D_{\eta},E_{\omega}$ have
been developed for handling the four different tasks; prior assignment
learning, generator, discriminator and clustering inference network,
respectively. The $P_{\phi}$ is used to learn the prior indices from the data
using the self-augmentation maximization principle. This prior assignment is
used as the discrete one-hot code variable to train the improved clustering
GAN. The data is normalised in the range of $[-1,1]$ for all datasets except
STL-10 $[0,1]$. The tangent-hyperbolic and sigmoid activation functions are
used in the last layer of the $G_{\theta}$ network. However, for learning the
clustering prior from the data, we have used a $P_{\phi}$ network with three
MLP hidden layers given by ($d-1200-1200-M$) for the MNIST, Fashion-MNIST,
CIFAR-10, STL-10 datasets in which $d$ $\&$ $M$ represent input data dimension
and cluster assignments index respectively. For lower dimensional data such as
Pendigits, USPS, and $10\times{{}_{-}}73k$ , we have used the $P_{\phi}$
network as $d-256-256-M$. For MNIST and Fashion-MNIST, the conv-trans.conv
layer with ReLU and LeakyReLU activation functions have been used in
$G_{\theta},D_{\eta}$ and $E_{\omega}$ networks respectively [7]. The
clustering network $E_{\omega}$, has the same structure of $D_{\eta}$ to
estimate continuous($\hat{z}_{n}$) and discrete ($\hat{z}_{M}$) variables. For
Pendigits, $10\times{{}_{-}}73k$ and USPS datasets, we have used the two
layers MLP models for $G_{\theta},D_{\eta}$, and $E_{\omega}$. Our proposed
SIMI-ClusterGAN method has two learning stages. First, the discrete prior
learns $M$ categorical discretization representations from data by using the
$P_{\phi}$ network. The learning hyper-parameters are set to be
$\beta_{p}=0.1$, mutual information coefficient $\beta_{mu}=4$, perturbation
coefficient $\beta_{t}=0.25$ while updating the $P_{\phi}$ network. We have
used the ADAM optimizer with learning rate of $0.002$. Once the $M$
categorical representation is obtained then it is formulated into one-hot-code
$(z_{M})\in R^{M}$ to create $M$ discrete priors [7]. We have added the
Gaussian Normal distribution,
$z_{n}=\mathcal{N}({\mu=0,\sigma^{2}*I_{dn}},\sigma=0.1)$, into $z_{M}$ to
create the $M$ discrete non-smooth surfaces. The noise samples are drawn from
the continuous and discrete mixture variables to generate the realistic
samples. Moreover, the learning rate of $G_{\theta},D_{\eta}$, $E_{\omega}$
networks are set to $1e-4$. Similarly for $P_{\phi}$ network, we have adapted
the ADAM optimiser with learning hyper-parameters
$(\beta_{1}=0.5,\beta_{2}=0.999)$ [7, 40]. To determine the cluster labels
from the real datasets, the $K-means$ [9] algorithm is applied to estimate
encode latent space from the $E_{\omega}$ network [7]. The variation factors
of each loss are controlled by five multiplication factors given by
$\alpha_{cl}=10$ [7], $\alpha_{mse}=10$ [7], $\alpha_{re}=1$,
$\alpha_{pcl}=10$ and $\alpha_{cm}=1$ . The simulations are implemented on
PyTorch environment with NVIDIA GTX GPU.
### IV-C Clustering performance Evaluation
TABLE II: Quantitative analysis of the clustering performance
Datasets | MNIST | Fashion-MNIST | USPS | Pendigits | $10\times{{}_{-}}73k$
---|---|---|---|---|---
Performance Index | Performance Index | Performance Index | Performance Index | Performance Index
Models | ACC | NMI | ACC | NMI | ACC | NMI | ACC | NMI | ACC | NMI
K-means [9] | 0.532 | 0.500 | 0.474 | 0.501 | 0.668 | 0.601 | 0.793 | 0.730 | 0.623 | 0.577
NMF [52] | 0.471 | 0.452 | 0.500 | 0.510 | 0.652 | 0.693 | 0.670 | 0.580 | 0.710 | 0.690
SC [53] | 0.656 | 0.731 | 0.660 | 0.704 | 0.649 | 0.794 | 0.700 | 0.690 | 0.400 | 0.290
AGGLO [54] | 0.640 | 0.650 | 0.550 | 0.570 | - | - | 0.700 | 0.690 | 0.630 | 0.580
DEC [5] | 0.863 | 0.834 | 0.518 | 0.546 | 0.762 | 0.767 | - | - | - | -
DCN [4] | 0.802 | 0.786 | 0.563 | 0.608 | - | - | 0.720 | 0.690 | - | -
JULE [25] | 0.964 | 0.913 | 0.563 | 0.608 | 0.950 | 0.913 | - | - | - | -
DEPICT [55] | 0.965 | 0.917 | 0.392 | 0.392 | 0.899 | 0.906 | - | - | - | -
SpectralNet [56] | 0.800 | 0.814 | - | - | - | - | - | - | - | -
Dual-AE [6] | 0.978 | 0.941 | 0.662 | 0.645 | 0.869 | 0.857 | - | - | - | -
InfoGAN [24] | 0.890 | 0.860 | 0.610 | 0.590 | - | - | 0.720 | 0.730 | 0.620 | 0.580
ClusterGAN [7] | 0.950 | 0.890 | 0.630 | 0.640 | $0.798^{*}$ | $0.703^{*}$ | 0.770 | 0.730 | 0.810 | 0.730
GAN with bp [7] | 0.950 | 0.900 | 0.560 | 0.530 | - | - | 0.760 | 0.710 | 0.650 | 0.59
CaTGAN [57] | 0.890 | 0.900 | 0.550 | 0.600 | - | - | - | - | - | -
GANMM [58] | 0.640 | 0.610 | 0.340 | 0.270 | - | - | - | - | - | -
NEMGAN_v [23] | 0.960 | 0.910 | 0.650 | 0.610 | - | - | - | - | - | -
SIMI-ClusterGAN | 0.986 | 0.958 | 0.745 | 0.705 | 0.951 | 0.894 | 0.857 | 0.825 | 0.917 | 0.878
No available data : $(-)$, simulated :$*$ .
We mainly focus on two popular evaluation indices given by accuracy (ACC) [5]
and normalised mutual information (NMI) [5] for comparing the clustering
performance. The ACC is defined as follows,
$ACC=max_{\delta}\frac{\sum_{i=1}^{N}\boldsymbol{1}\left\\{c_{i}=\delta(y^{k}_{i})\right\\}}{N}$
(17)
where, $c_{i}\in R^{M}$ is the $i$-th ground truth labels, $y^{k}_{i}$ is
$i$-th predicted labels which is obtained by applying $K$-means [9] method on
encoded latent-space($E_{\omega}$) [7] . The $\delta$ covers all potential
one-to-one mappings between true and predicted labels of data. This measure
identifies the best match between an unsupervised algorithm’s cluster
prediction and a ground truth assignment. The Hungarian method efficiently
computes the optimum mapping [59]. Similarly, NMI is defined as follows,
$NMI=\frac{2\times I(Y;\textbf{c})}{H(Y)+H(\textbf{c})}$ (18)
where, $I(Y;\textbf{c})$ is defined mutual information between predicted and
ground truth labels. NMI determines similarity between the true class and the
predicted class labels, which is bounded by $0$ (worst similarity) to $1$
(ultimate similarity).
Table II represents the clustering results of SIMI-ClusterGAN and other state-
of-the art methods on the five benchmark datasets which are mostly dealt with
single channel image datasets and a tabular dataset. The best evolution
matrices are highlighted in the table II with 5 runs [7]. It is clearly seen
from the Table II that deep neural network based clustering methods attained
better performance compared to traditional machine-learning approaches. In
comparison, our proposed SIMI-ClusterGAN achieved significant performance
improvement for all datasets. For the MNIST dataset, our proposed method
obtained better performance than the second best results of Dual-AE (ACC: .978
vs 0.986, NMI: .941 vs .958). While learning discrete prior ($P_{\phi}$) from
the Fashion-MNIST dataset, we have used the following affine distortion to
maximize the mutual information between categories($Y_{M}$). The following
transformations are adopted to learn the $P_{\phi}$ network parameters,
* •
Uniformly drawn samples along with random rotation by $\chi$ within
$[-10^{\circ},10^{\circ}]$
* •
Uniformly drawn samples along with $x$ axis and $y$-axis by scaling factor
$[.3,1]$
* •
Uniformly drawn samples along with $x$ axis and $y$-axis by random shearing
$(-0.3,0.3)$
The performance has improved significantly due to random affine transformation
on the data since our proposed method is heavily dependent on the learning of
the prior. Besides the affine transformations of data, self-augmentation is
also applied to learn prior for the proposed SIMI-ClusterGAN method. The $ACC$
and $NMI$ values are $0.721$ and $0.675$, which are much better than the
ClusterGAN. Similarly, for $10\times{{}_{-}}73k$ dataset, our proposed method
performance is improved significantly compared with ClusterGAN (ACC: 0.810 vs
0.917 , NMI: 0.730 vs 0.878 ). Specifically, for $16$-dimensional pendigits
dataset, the K-means method outperformed all the GANs methods. But, our
proposed SIMI-ClusterGAN obtained better performance on both evaluation
indices (ACC:0.793 vs 0.857, NMI:0.730 vs 0.825). For the USPS dataset, the
best NMI is obtained by JULE but our proposed method achieved the best results
in ACC. The ClusterGAN method∗111https://github.com/zhampel/clusterGAN
obtained ACC and NMI values as 0.798 and 0.703 respectively.
(a)
(b)
Figure 2: Samples generated by SIMI-ClusterGAN for MNIST and Fashion-MNIST
datasets. Each row represents each class. The generated classes maintained
purity without mixtures of other classes
(a) Sandal
(b) Sneaker
Figure 3: Samples generated by ClusterGAN for Fashion-MNIST dataset
All the distinctive classes are fully achieved by SIMI-ClusterGAN method. It
is observed from Figure 2 that the SIMI-ClusterGAN is able to generate all the
modes without supervision with higher accuracy. For MNIST dataset, all the
distinctive classes are represented in each row of Figure 2(a).Similarly, for
Fashion-MNIST, our proposed method is able to generate all the classes without
supervision as shown in Figure 2(b). For fair comparisons of our proposed
method with ClusterGAN, we have plotted two distinctive generated
classes(”Sandal” and ”Sneaker”) for better understandings. ClusterGAN is not
able to generate two distinctive classes without purity, as can be seen in
Figure 3. As shown in Figure 4,however, the proposed SIMI-ClusterGAN is
capable of generating two different classes with a high degree of purity.
(a) Sandal
(b) Sneaker
Figure 4: Samples generated by SIMI-ClusterGAN for Fashion-MNIST dataset
### IV-D Complex high-dimensional dataset performance
We evaluate the proposed SIMI-ClusterGAN clustering performance on complex
coloured image datasets: CIFAR-10 and STL-10. For learning the clustering
prior, the colour image can’t be directly used in the $P_{\phi}$ network
because associated raw pixels of images are colour dominant [44]. Therefore,
for learning the prior clustering assignments, we have used 50-layer
pretrained features extractor from raw data [44, 60]. We are not directly
using the class information to $P_{\phi}$ network. Instead, the well-separated
lower dimensional features are used to get the class assignment prior. For
both the cases, the extracted features size is $2048$. Once, the prior
assignment network is learned from extracted features data, the learned prior
is used to train SIMI-ClusterGAN. The clustering performance of feature space
data is listed in the Table III. It is clearly observed from the table III
that our proposed method has outperformed other state-of-the-art methods. The
uniform prior based ClusterGAN accuracy performance for CIFAR-10 is obtained
as $15.9$. This is because the clustering loss in clustering inference network
is focused on the generated samples’ semantics instead of categories of data
[7]. The ClusterGAN accuracy performance for STL-10 dataset is $12.6$.
Similarly for the STL-10 dataset, our proposed method SIMI-ClusterGAN obtained
better results.
TABLE III: Quantitative clustering performance for High-dimensional datasets
| CIFAR-10 | STL-10
---|---|---
Methods | ACC | NMI | ACC | NMI
K-means[44] | 0.344 | - | 0.856 | -
DAE+KMeans[44] | 0.442 | - | 0.722 | -
DEC[44] | 0.469 | - | 0.781 | -
Linear RIM[44] | 0.403 | - | 0.735 | -
Deep RIM[44] | 0.403 | - | 0.925 | -
Linear IMSAT[44] | 0.407 | - | 0.917 | -
IMSAT(RPT)[44] | 0.455 | - | 0.928 | -
IMSAT(VAT)[44] | 0.456 | - | 0.941 | -
VADE [61] | - | - | 0.844 | -
DDG [6] | - | - | 0.905 | -
Sarfaraz [62] | - | - | 0.952 | -
ClusterGAN | $0.159^{*}$ | $0.025^{*}$ | $0.126^{*}$ | $0.096^{*}$
SIMI-ClusterGAN | 0.512 | 0.412 | 0.954 | 0.861
Embedding feature-space clustering [44], simulated :$*$ . | | | |
(a) ClusterGAN
(b) SIMI-ClusterGAN
Figure 5: Encoding latent space visualisation for CIFAR-10 datset where colors
are used to differentiate between distinct types of classes.
When dealing with high-dimensional datasets such as CIFAR10 and STL-10, the
disentanglement at $E_{\omega}$ is very important in determining the accuracy
of clustering. In order to facilitate comprehension, the superiority of the
SIMI-ClusterGAN over the ClusterGAN is displayed in Figure 5, which shows
estimated encoded latent spaces from both methods in comparison to each other.
Due to the joint learning framework of $E_{\omega}-G_{\theta}$ networks in the
ClusterGAN method, $E_{\omega}$ is more reliable on generated sample semantics
than focusing on downstream tasks like clustering. When we incorporate prior
learning with three additional losses, the encoded latent spaces are well
separated from ClusterGAN, which will lead to a significant improvement in
clustering performance. Similar phenomena are also being observed for the
STL-10 dataset. The encoded latent representation for the STL-10 dataset is
depicted in Fig 6 where both clustering methods’ results are shown.
(a) ClusterGAN
(b) SIMI-ClusterGAN
Figure 6: Encoding latent space visualisation for STL-10 datset where colors
are used to differentiate between distinct types of classes.
### IV-E Latent space interpolation
The one-hot code $(z_{M})$ variable of the proposed SIMI-ClusterGAN method
represents the cluster information in the data. The continuous variable
($z_{n}$) is controlling the variation of Gaussian representation in the
latent space. In addition, we have also used the interpolation between
different classes while varying two discrete variables $z_{M}^{1}$,
$z_{M}^{2}$. The new continuous-discrete latent space vector is represented by
$z=(z_{n},\tau z_{M}^{1}+(1-\tau)z_{M}^{2})$ where $\tau\in[0,1]$, and $z_{n}$
is fixed. The smooth transition between one class to another class is depicted
in Figure 7 for the two datasets MNIST and Fashion-MNIST.
(a) MNIST
(b) Fashion-MNIST
Figure 7: Latent space interpolation between classes
### IV-F Ablation studies
We have extensively analysed the proposed SIMI-ClusterGAN components in the
following subsections.
#### IV-F1 different losses in SIMI-ClusterGAN
We also evaluate each loss function in the proposed SIMI-ClusterGAN objective
function. The performance on Fashion-MNIST data by SIMI-ClusterGAN is reported
in Table IV. In Table IV, the first loss is related when only the generated
samples are passed to clustering inference network [7]. The uniform
distribution based prior learning is not adequate to improve the clustering
performance while using only generated samples. The performance is below the
ClusterGAN performance. While considering the reconstruction loss into
proposed objective function, the performance has improved significantly. All
losses have an individual impact on the clustering performance to get accurate
categories in fully unsupervised way. Figure 8 depicts the encoding latent
space in 2D for Fashion-MNIST dataset. Figure 8(a) depicts the raw-data in 2D
encoding latent space. Considering the generated samples to the encoding
network, the t-SNE [63] plot of encoded latent space is illustrated in Figure
8(b) which gives better representation than the raw-data. In addition, the
encoding space gets better separated while considering the reconstruction loss
into the proposed objective function. As illustrated in the Fig 8(d), the
SIMI-ClusterGAN gives better discrimination on encoding space while
considering all the losses into proposed objective function.
(a) Raw-data
(b) $J_{ce}+J_{mse}$
(c) $J_{ce}+J_{mse}+J_{rec}$
(d) $J_{ce}+J_{mse}+J_{rec}+J_{cm}+J_{pce}$
Figure 8: Visualisation of individual loss performance through t-SNE [63] TABLE IV: Effects of different losses on clustering performance of Fashion-MNIST dataset Dataset | Fashion-MNIST
---|---
NMI | ACC
$J_{ce}$ \+ $J_{mse}$ | 0.5796 | 0.5853
$J_{ce}$ \+ $J_{mse}$ \+ $J_{rec}$ | 0.6580 | 0.6996
$J_{ce}$ \+ $J_{mse}$ \+ $J_{rec}$ +$J_{cm}$ | 0.6620 | 0.7056
all losses | 0.7053 | 0.7459
#### IV-F2 Variations of $\sigma$ in $z_{n}$
A non-smooth latent variable is formed when the continuous variable($z_{n}$)
is mixed with the discrete variables($z_{M}$). Because the non-smooth bounded
prior has an effect on clustering performance, it is thus necessary to assess
the performance of clustering while changing the variance($\sigma$) of the
continuous variable($z_{n}$). Therefore, we have illustrated the clustering
performance on the Figure 9 when $\sigma$ is varied incrementally by $0.3$.
When the variance is at its highest ($\sigma=1.0$), ClusterGAN suffers a
significant performance drop. Our suggested SIMI-ClusterGAN, in contrast to
ClusterGAN, has no performance issues. Therefore, SIMI-ClusterGAN has a more
robust performance than ClusterGAN.
(a) ACC
(b) NMI
Figure 9: Varying $\sigma$ in $z_{n}$
#### IV-F3 Uniform Prior based SIMI-ClusterGAN
We also examined the clustering performance of our proposed method with the
ClusterGAN when the $P_{\phi}$ network is not involved in the adversarial
game. Thus, the SIMI-ClusterGAN prior comes from uniform distribution, as it
is like ClusterGAN. Table V depicts the quantitative performance comparison
between ClusterGAN and SIMI-ClusterGAN. It is clearly observed from the Table
V that SIMI-ClusterGAN produces more disentanglement’s by considering the real
data distribution into $E_{\omega}$ network. However, for CIFAR-10 dataset,
the adequate performance can’t be obtained by considering uniform prior
distribution. When the $E_{\omega}-G_{\theta}$ networks work together to
learn, the $E_{\omega}$ focus is on semantics of the data rather than
clustering. Therefore, prior learning is required for forcing $E_{\omega}$
network to match the real data distribution.
TABLE V: Uniform prior based SIMI-ClusterGAN performance Methods | MNIST | CIFAR10
---|---|---
| ACC | NMI | ACC | NMI
ClusterGAN | 0.950 | 0.890 | 0.159 | 0.025
SIMI-ClusterGAN \$P_{\phi}$ | 0.972 | 0.921 | 0.228 | 0.067
### IV-G Imbalanced Dataset Performance
We have also validated the performance of the proposed method with ClusterGAN
under two different imbalanced conditions: single class imbalance and multi-
class imbalance. MNIST dataset has been considered in which two class
imbalanced settings have been tested. For single class imbalanced settings,
$0.1$ fraction of zero samples (‘digit-0’) and remaining all the samples have
been taken for training whereas all the test samples($10K$) are used for
testing the clustering performance. Similarly for multi-class imbalanced
settings, three imbalanced classes are ‘digit-1’, ‘digit-3’and ‘digit-5’with
fraction of $0.1,0.3\ $, and $\,0.5$. Similar to the one class-imbalanced
case, all the testing data samples are used to test the clustering inference
network. The performance of the proposed SIMI-ClusterGAN is shown in the Table
VI. It is clearly observed from the Table VI that our proposed method out-
performs uniform prior based ClusterGAN performance. For better understanding
of $E_{\omega}$ performance for both the methods, we have visualised encoding
latent space is shown in Figure 10. It is clearly observed from the figure
that our proposed method gives better separable decision boundary than the
ClusterGAN.
TABLE VI: Imbalanced Clustering Performance Methods | MNIST
---|---
| 1-Class | 3-Classes
| ACC | NMI | ACC | NMI
ClusterGAN | 0.892 | 0.836 | 0.812 | 0.787
SIMI-ClusterGAN | 0.969 | 0.923 | 0.949 | 0.909
(a) ClusterGAN
(b) SIMI-ClusterGAN
Figure 10: Encoding latent space visualisation by t-SNE[63] for one class
imbalanced condition
For three classes imbalanced conditions, both the methods failed to generate
the minor ‘digit-1’which is shown in the Figure 11. However, for other two
minor classes (‘digit-3’and ‘digit-5’), proposed SIMI-ClusterGAN is able to
generate pure classes. For better visual understanding, we have plotted with
two minor classes data in Figure 13 in which ‘50’samples were generated for
each class. It is clearly observed from the Figure 13 that our proposed method
is able to generate both classes with high purity. However, ClusterGAN,
generated mixture of samples of ‘digit-3’and ‘digit-5’and $50$ samples were
generated for digit-8. We have also visualised encoding latent space in 2D for
both the methods in Figure 12.
(a) ClusterGAN
(b) SIMI-ClusterGAN
Figure 11: Samples generated by ClusterGAN and SIMI-ClusterGAN under three
classes imbalanced condition.
(a) ClusterGAN
(b) SIMI-ClusterGAN
Figure 12: Encoding latent space visualisation by t-SNE[63] for three classes
imbalanced condition
(a) ClusterGAN:’digit-3’ and ’digit-5’
(b) SIMI-ClusterGAN: ’digit-3’ and ’digit-5’
Figure 13: Two minor classes generated by ClusterGAN and SIMI-ClusterGAN
## V conclusion
In this paper, we have proposed a SIMI-ClusterGAN which is the modification of
uniform prior latent space based ClusterGAN method. The proposed method
consists of four networks, a prior network, a generator, a discriminator and a
clustering inference network. The proposed method is followed by two stage
learning methods: learning categorical prior from the data directly and then
the learned prior is used to modify clustering performance through adversarial
training between conditional generator and discriminator. The simulation
results indicate that the proposed SIMI-ClusterGAN achieved better performance
than the state-of-the-art methods. The effectiveness of each loss has been
studied through an ablation study. It is also observed that the proposed
method can handle imbalanced conditions. However, if the data distribution is
highly imbalanced in nature, the SIM-based $P_{\phi}$ won’t be able to capture
how the real data is distributed. Consequently, SIMI-ClusterGAN fails to
generate the minority classes. Rather than relying on two-stage techniques, we
will instead leverage self-supervised losses[64] to develop a single-stage
learning technique that simultaneously updates prior and clustering inference
networks.
## References
* [1] K.-S. Chuang, H.-L. Tzeng, S. Chen, J. Wu, and T.-J. Chen, “Fuzzy c-means clustering with spatial information for image segmentation,” _computerized medical imaging and graphics_ , vol. 30, no. 1, pp. 9–15, 2006\.
* [2] M. Caron, P. Bojanowski, A. Joulin, and M. Douze, “Deep clustering for unsupervised learning of visual features,” in _Proceedings of the European Conference on Computer Vision (ECCV)_ , 2018, pp. 132–149.
* [3] P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, P.-A. Manzagol, and L. Bottou, “Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion.” _Journal of machine learning research_ , vol. 11, no. 12, 2010.
* [4] B. Yang, X. Fu, N. D. Sidiropoulos, and M. Hong, “Towards k-means-friendly spaces: Simultaneous deep learning and clustering,” in _international conference on machine learning_ , 2017, pp. 3861–3870.
* [5] J. Xie, R. Girshick, and A. Farhadi, “Unsupervised deep embedding for clustering analysis,” in _International conference on machine learning_ , 2016, pp. 478–487.
* [6] X. Yang, C. Deng, F. Zheng, J. Yan, and W. Liu, “Deep spectral clustering using dual autoencoder network,” in _Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition_ , 2019, pp. 4066–4075.
* [7] S. Mukherjee, H. Asnani, E. Lin, and S. Kannan, “Clustergan: Latent space clustering in generative adversarial networks,” in _Proceedings of the AAAI Conference on Artificial Intelligence_ , vol. 33, 2019, pp. 4610–4617.
* [8] E. Min, X. Guo, Q. Liu, G. Zhang, J. Cui, and J. Long, “A survey of clustering with deep learning: From the perspective of network architecture,” _IEEE Access_ , vol. 6, pp. 39 501–39 514, 2018.
* [9] J. MacQueen _et al._ , “Some methods for classification and analysis of multivariate observations,” in _Proceedings of the fifth Berkeley symposium on mathematical statistics and probability_ , vol. 1, no. 14. Oakland, CA, USA, 1967, pp. 281–297.
* [10] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, “Generative adversarial nets,” in _Advances in neural information processing systems_ , 2014, pp. 2672–2680.
* [11] L. Ma, Y. Ma, Q. Lin, J. Ji, C. A. C. Coello, and M. Gong, “Snegan: Signed network embedding by using generative adversarial nets,” _IEEE Transactions on Emerging Topics in Computational Intelligence_ , 2020.
* [12] J. He, L. Shen, Y. Yao, H. Wang, G. Zhao, X. Gu, and W. Ding, “Finger vein image deblurring using neighbors-based binary-gan (nb-gan),” _IEEE Transactions on Emerging Topics in Computational Intelligence_ , 2021.
* [13] Q. Li, H. Qu, Z. Liu, N. Zhou, W. Sun, S. Sigg, and J. Li, “Af-dcgan: Amplitude feature deep convolutional gan for fingerprint construction in indoor localization systems,” _IEEE Transactions on Emerging Topics in Computational Intelligence_ , 2019.
* [14] P. Isola, J.-Y. Zhu, T. Zhou, and A. A. Efros, “Image-to-image translation with conditional adversarial networks,” in _Proceedings of the IEEE conference on computer vision and pattern recognition_ , 2017, pp. 1125–1134.
* [15] A. v. d. Oord, S. Dieleman, H. Zen, K. Simonyan, O. Vinyals, A. Graves, N. Kalchbrenner, A. Senior, and K. Kavukcuoglu, “Wavenet: A generative model for raw audio,” _arXiv preprint arXiv:1609.03499_ , 2016.
* [16] H. Tang, D. Xu, Y. Yan, J. J. Corso, P. H. Torr, and N. Sebe, “Multi-channel attention selection gans for guided image-to-image translation,” _arXiv preprint arXiv:2002.01048_ , 2020.
* [17] L. Jing and Y. Tian, “Self-supervised visual feature learning with deep neural networks: A survey,” _IEEE Transactions on Pattern Analysis and Machine Intelligence_ , 2020.
* [18] C.-H. Liu, H. Chang, and T. Park, “Da-cgan: A framework for indoor radio design using a dimension-aware conditional generative adversarial network,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops_ , 2020, pp. 498–499.
* [19] C. Zheng, S. Yang, J. M. Parra-Ullauri, A. Garcia-Dominguez, and N. Bencomo, “Reward-reinforced generative adversarial networks for multi-agent systems,” _IEEE Transactions on Emerging Topics in Computational Intelligence_ , 2021.
* [20] X. Chen, Y. Duan, R. Houthooft, J. Schulman, I. Sutskever, and P. Abbeel, “Infogan: Interpretable representation learning by information maximizing generative adversarial nets,” in _Advances in neural information processing systems_ , 2016, pp. 2172–2180.
* [21] S. Arora, A. Risteski, and Y. Zhang, “Do gans learn the distribution? some theory and empirics,” in _International Conference on Learning Representations_ , 2018.
* [22] T. Karras, T. Aila, S. Laine, and J. Lehtinen, “Progressive growing of gans for improved quality, stability, and variation,” in _International Conference on Learning Representations_ , 2018.
* [23] D. Mishra, J. Aravind, and A. Prathosh, “Effect of the latent structure on clustering with gans,” _IEEE Signal Processing Letters_ , 2020.
* [24] J. Chang, L. Wang, G. Meng, S. Xiang, and C. Pan, “Deep adaptive image clustering,” in _Proceedings of the IEEE international conference on computer vision_ , 2017, pp. 5879–5887.
* [25] J. Yang, D. Parikh, and D. Batra, “Joint unsupervised learning of deep representations and image clusters,” in _Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition_ , 2016, pp. 5147–5156.
* [26] X. Guo, L. Gao, X. Liu, and J. Yin, “Improved deep embedded clustering with local structure preservation.” in _IJCAI_ , 2017, pp. 1753–1759.
* [27] M. F. Mathieu, J. J. Zhao, J. Zhao, A. Ramesh, P. Sprechmann, and Y. LeCun, “Disentangling factors of variation in deep representation using adversarial training,” in _Advances in neural information processing systems_ , 2016, pp. 5040–5048.
* [28] A. Gonzalez-Garcia, J. Van De Weijer, and Y. Bengio, “Image-to-image translation for cross-domain disentanglement,” in _Advances in neural information processing systems_ , 2018, pp. 1287–1298.
* [29] M. Tschannen, O. Bachem, and M. Lucic, “Recent advances in autoencoder-based representation learning,” _arXiv preprint arXiv:1812.05069_ , 2018.
* [30] Z. Pan, W. Yu, B. Wang, H. Xie, V. S. Sheng, J. Lei, and S. Kwong, “Loss functions of generative adversarial networks (gans): Opportunities and challenges,” _IEEE Transactions on Emerging Topics in Computational Intelligence_ , vol. 4, no. 4, pp. 500–522, 2020.
* [31] N. Hadad, L. Wolf, and M. Shahar, “A two-step disentanglement method,” in _Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition_ , 2018, pp. 772–780.
* [32] M. Patacchiola, P. Fox-Roberts, and E. Rosten, “Y-autoencoders: disentangling latent representations via sequential-encoding,” _arXiv preprint arXiv:1907.10949_ , 2019.
* [33] M. Ye and J. Shen, “Probabilistic structural latent representation for unsupervised embedding,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_ , 2020, pp. 5457–5466.
* [34] R. T. Chen, X. Li, R. B. Grosse, and D. K. Duvenaud, “Isolating sources of disentanglement in variational autoencoders,” in _Advances in Neural Information Processing Systems_ , 2018, pp. 2610–2620.
* [35] I. Higgins, L. Matthey, A. Pal, C. Burgess, X. Glorot, M. Botvinick, S. Mohamed, and A. Lerchner, “beta-vae: Learning basic visual concepts with a constrained variational framework,” 2016.
* [36] H. Kim and A. Mnih, “Disentangling by factorising,” _arXiv preprint arXiv:1802.05983_ , 2018.
* [37] E. Dupont, “Learning disentangled joint continuous and discrete representations,” in _Advances in Neural Information Processing Systems_ , 2018, pp. 710–720.
* [38] S. Gurumurthy, R. Kiran Sarvadevabhatla, and R. Venkatesh Babu, “Deligan: Generative adversarial networks for diverse and limited data,” in _Proceedings of the IEEE conference on computer vision and pattern recognition_ , 2017, pp. 166–174.
* [39] I. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, and A. C. Courville, “Improved training of wasserstein gans,” in _Advances in neural information processing systems_ , 2017, pp. 5767–5777.
* [40] T. Dam, M. M. Ferdaus, S. G. Anavatti, S. Jayavelu, and H. A. Abbass, “Does adversarial oversampling help us?” in _Proceedings of the 30th ACM International Conference on Information & Knowledge Management_, 2021, pp. 2970–2973.
* [41] A. Creswell and A. A. Bharath, “Inverting the generator of a generative adversarial network,” _IEEE transactions on neural networks and learning systems_ , vol. 30, no. 7, pp. 1967–1974, 2018.
* [42] Z. C. Lipton and S. Tripathi, “Precise recovery of latent vectors from generative adversarial networks,” _arXiv preprint arXiv:1702.04782_ , 2017\.
* [43] A. Krause, P. Perona, and R. G. Gomes, “Discriminative clustering by regularized information maximization,” in _Advances in neural information processing systems_ , 2010, pp. 775–783.
* [44] W. Hu, T. Miyato, S. Tokui, E. Matsumoto, and M. Sugiyama, “Learning discrete representations via information maximizing self-augmented training,” _arXiv preprint arXiv:1702.08720_ , 2017.
* [45] Y. Grandvalet and Y. Bengio, “Semi-supervised learning by entropy minimization,” in _Advances in neural information processing systems_ , 2005, pp. 529–536.
* [46] T. Miyato, S.-i. Maeda, M. Koyama, K. Nakae, and S. Ishii, “Distributional smoothing with virtual adversarial training,” _arXiv preprint arXiv:1507.00677_ , 2015.
* [47] J. Zhao, Y. Kim, K. Zhang, A. Rush, and Y. LeCun, “Adversarially regularized autoencoders,” in _International Conference on Machine Learning_. PMLR, 2018, pp. 5902–5911.
* [48] Q. Mao, H.-Y. Lee, H.-Y. Tseng, S. Ma, and M.-H. Yang, “Mode seeking generative adversarial networks for diverse image synthesis,” in _Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition_ , 2019, pp. 1429–1437.
* [49] A. Coates, A. Ng, and H. Lee, “An analysis of single-layer networks in unsupervised feature learning,” in _Proceedings of the fourteenth international conference on artificial intelligence and statistics_ , 2011, pp. 215–223.
* [50] A. Krizhevsky, G. Hinton _et al._ , “Learning multiple layers of features from tiny images,” 2009.
* [51] H. Xiao, K. Rasul, and R. Vollgraf, “Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms,” _arXiv preprint arXiv:1708.07747_ , 2017.
* [52] D. D. Lee and H. S. Seung, “Learning the parts of objects by non-negative matrix factorization,” _Nature_ , vol. 401, no. 6755, pp. 788–791, 1999\.
* [53] J. Shi and J. Malik, “Normalized cuts and image segmentation,” _IEEE Transactions on pattern analysis and machine intelligence_ , vol. 22, no. 8, pp. 888–905, 2000.
* [54] W. Zhang, X. Wang, D. Zhao, and X. Tang, “Graph degree linkage: Agglomerative clustering on a directed graph,” in _European Conference on Computer Vision_. Springer, 2012, pp. 428–441.
* [55] K. Ghasedi Dizaji, A. Herandi, C. Deng, W. Cai, and H. Huang, “Deep clustering via joint convolutional autoencoder embedding and relative entropy minimization,” in _Proceedings of the IEEE international conference on computer vision_ , 2017, pp. 5736–5745.
* [56] U. Shaham, K. Stanton, H. Li, B. Nadler, R. Basri, and Y. Kluger, “Spectralnet: Spectral clustering using deep neural networks,” _arXiv preprint arXiv:1801.01587_ , 2018.
* [57] J. T. Springenberg, “Unsupervised and semi-supervised learning with categorical generative adversarial networks,” _arXiv preprint arXiv:1511.06390_ , 2015.
* [58] Y. Yu and W.-J. Zhou, “Mixture of gans for clustering.” in _IJCAI_ , 2018, pp. 3047–3053.
* [59] H. W. Kuhn, “The hungarian method for the assignment problem,” _Naval research logistics quarterly_ , vol. 2, no. 1-2, pp. 83–97, 1955.
* [60] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in _Proceedings of the IEEE conference on computer vision and pattern recognition_ , 2016, pp. 770–778.
* [61] Z. Jiang, Y. Zheng, H. Tan, B. Tang, and H. Zhou, “Variational deep embedding: an unsupervised and generative approach to clustering,” in _Proceedings of the 26th International Joint Conference on Artificial Intelligence_ , 2017, pp. 1965–1972.
* [62] S. Sarfraz, V. Sharma, and R. Stiefelhagen, “Efficient parameter-free clustering using first neighbor relations,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_ , 2019, pp. 8934–8943.
* [63] L. Van der Maaten and G. Hinton, “Visualizing data using t-sne.” _Journal of machine learning research_ , vol. 9, no. 11, 2008.
* [64] Y. Li, P. Hu, Z. Liu, D. Peng, J. T. Zhou, and X. Peng, “Contrastive clustering,” in _2021 AAAI Conference on Artificial Intelligence (AAAI)_ , 2021.
| arxiv-papers | 2021-07-27T10:04:32 | 2024-09-04T03:07:21.161372 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Tanmoy Dam, Sreenatha G. Anavatti, Hussein A. Abbass",
"submitter": "Tanmoy Dam",
"url": "https://arxiv.org/abs/2107.12706"
} |
2107.12707 | # DV-Det: Efficient 3D Point Cloud Object Detection
with Dynamic Voxelization
Zhaoyu Su Pin Siang Tan Yu-Hsing Wang
DESR Laboratory
Department of Civil and Environmental Engineering
Hong Kong University of Science and Technology
{zsuad, pstan}@connect.ust.hk; [email protected]
###### Abstract
In this work, we propose a novel two-stage framework for the efficient 3D
point cloud object detection. Instead of transforming point clouds into 2D
bird eye view projections, we parse the raw point cloud data directly in the
3D space yet achieve impressive efficiency and accuracy. To achieve this goal,
we propose dynamic voxelization, a method that voxellizes points at local
scale on-the-fly. By doing so, we preserve the point cloud geometry with 3D
voxels, and therefore waive the dependence on expensive MLPs to learn from
point coordinates. On the other hand, we inherently still follow the same
processing pattern as point-wise methods (e.g., PointNet) and no longer suffer
from the quantization issue like conventional convolutions. For further speed
optimization, we propose the grid-based downsampling and voxelization method,
and provide different CUDA implementations to accommodate to the discrepant
requirements during training and inference phases. We highlight our efficiency
on KITTI 3D object detection dataset with $75$ FPS and on Waymo Open dataset
with $25$ FPS inference speed with satisfactory accuracy.
## 1 Introduction
Algorithms for point cloud detection are receiving increasing attention
nowadays thanks to the blooming of robotics and the autonomous driving
industry. Different from the detection algorithms on 2D images, detection on
3D point cloud is a non-trivial task due to the high sparsity and unstructured
property of point clouds. Meanwhile, detection algorithms are expected to run
at the real-time speed, while they are usually deployed on the edge devices
with limited computation resources, which induces exigent demand for the
computation efficiency.
The existing point cloud detection methods can be roughly classified into two
groups: grid based methods and point-wise methods. Grid based methods
basically follow the same pattern as the 2D image cases: they transform the
point cloud into regular grid representations like 3D voxels[1, 20, 29, 22] or
2D bird eye view (BEV) projections[9, 24, 23], and then use 3D or 2D
convolutional neural networks (CNNs) to extract the features and obtain
bounding box predictions. However, the transformation from the point cloud to
regular grids leads to the information loss, and due to the quantization
issue, the feature maps at high-level CNN layers often lack the precise
regional feature representations (Fig.1 a), which is essential for an accurate
bounding box regression.
On the other hand, developed from the pioneering work PointNet[14, 15], more
and more point-wise methods are proposed recently, which directly take raw 3D
LiDAR points as input and learn point-wise feature representations from point
coordinates via multi-layer perceptrons (MLPs)[13, 19, 27]. As shown in Fig.1
b, point-wise methods no longer suffer from the quantization problem as
conventional convolutions, but this comes at a price: learning representations
from unstructured point coordinates is a hard task, and therefore, heavy MLPs
architectures with expensive computational cost are usually involved in these
methods, leading to relatively slow inference speed.
There have been attempts that try to combine grid based methods and point-wise
methods, e.g., in PV-RCNN[18] , these two methods are leveraged in an
alternate pattern at the framework level to achieve the best performance.
Despite the impressive accuracy, heavy MPLs still remain in [18], while the
inference speed is still limited. Currently, the mainstream point cloud
detection methods run at a speed of 20 FPS for the KITTI dataset (few can
reach 45 FPS111Without TensorRT optimization.[9]) on a powerful dedicated GPU,
with $90\degree$ horizontal front-view FOV. This is apparently not sufficient
for the full $360\degree$ FOV scenario with a LiDAR sampling rate of 20Hz in
reality, not to mention the limited computation hardware resources on the edge
devices.
In this work, we propose a new method that combines the advantages from both
grid based methods and point-wise methods at the perceptron level. As shown in
Fig.1 c, given a point cloud, we first extract key-points and gather
neighbouring points around each key-point just like the point-wise methods.
However, instead of learning from point coordinates with MLPs, we leverage
local-scale 3D voxels to preserve the 3D geometry and then learn features with
3D convolutions. By doing so, we waive the requirements for the expensive MLPs
and tackle the quantization issue as well.
Just like other point-wise methods, we also face the same problem: how to
extract key-points from hundreds of thousands of input points efficiently. In
addition, we also need to figure out how to construct 3D voxels on-the-fly
during the network propagation at real-time. To this end, we propose the grid
based downsampling and hierarchical point-wise convolution with dynamic
voxelization, to take the place of commonly adopted farthest point sampling
(FPS) + k-nearest-neighbours (k-NN) combination, which is time consuming and
memory-hungry. In addition, as a two-stage detection framework, we also
develop location-aware RoI pooling, a light-weight pooling method that is
3$\times$ faster and 4$\times$ more memory efficient than the previous work
without losing accuracy significantly.
Moreover, for further performance improvement, we adopt 3D IoU loss[28] for
bounding box regression. We develop an efficient algorithm for 3D IoU loss
calculation, which is fully based on the native TensorFlow operations and can
be implemented with less than 200 lines of Python code. The tedious back
propagation calculation of 3D IoU can just be left to the deep learning
frameworks and no longer has to be manually implemented.
Powered by all the innovations above, we propose DV-Det, a two-stage detection
framework for efficient 3D object detection from point clouds. Our method
achieves the impressive 75 FPS inference speed on the KITTI dataset[4] and 25
FPS on the Waymo Open Dataset [21], while still maintains satisfactory
accuracy performance.
Figure 1: Comparison between different sampling strategies and network
architectures. (a) Global voxelization for most of the grid based methods,
notice the severe quantization issue at layer 2. (b) Point-wise method,
commonly used for the point-wise MLPs based methods like PointNet; (c) Our
proposed point-wise convolution based on the dynamic voxelization operation.
## 2 Related Works
### 2.1 Point-wise Based 3D Detection
The point-wise 3D detection methods has gained a lot of attention after the
success of PointNet [14], and PointNet is still the most widely adopted
perceptron unit in many point-wise detection methods. Frustum-PointNet[13] is
the first work to apply PointNet into 3D detection, it crops 3D frustums based
on the detection results from 2D images, and then use PointNet to parse the
frustums point cloud data. STD[27] employs PointNet++[15] as the backbone for
features extraction, and uses PointsPool for efficient proposal refinement.
Similarly, [19, 29] also leverages PointNet++ to generate RoI proposals
directly from the input point clouds, while [12] uses a voting strategy for
better feature aggregation returned from PointNet++.
However, PointNet (including its variants) relies on the MLPs (functioning
like a sub-network in each layer) to learn the geometrical features from the
point coordinates, and it is therefore a computationally intensive method.
Hence, the point-wise methods mentioned above usually run only at $\sim$10 FPS
on the KITTI dataset with a dedicated GPU.
### 2.2 Grid Based 3D Detection
Convolutions are particularly good at dealing with data organised in regular
grids. By converting the unstructured point cloud into 3D voxels, the geometry
of points is preserved within the arrangement of voxels, and therefore, it no
longer has to be learnt from point coordinates like PointNet. In previous
works[20, 22, 6], 3D point clouds are converted into 3D voxel representations,
and 3D sparse convolutions[5] are used as backbones for feature extractions.
By converting the 3D points into 2D bird eye view (BEV) projections[9, 23,
24], most of the methods originally proposed for detection on 2D images can be
transferred to the 3D seamlessly. However, converting the entire point cloud
into 2D projections means the permanent loss of 3D geometry information, and
therefore, the existing 2D BEV based methods usually show relatively low
accuracy on the benchmark datasets, especially for the hard cases only with
few points. There are also works that adopt similar implementation, and fuse
the LiDAR point cloud with 2D camera images at the feature map level[10, 11],
but the interpretation of high-resolution camera images is a difficult task,
which usually leads to unsatisfactory inference speed.
### 2.3 Rethink About Existing Methods
Point-wise methods are able to learn precise point-wise feature
representations, however, their dependencies on MLPs often lead to heavy
network architectures. Meanwhile, expensive operations like k-NN and FPS are
also involved for point downsampling and feature aggregation, which further
drags down the inference efficiency.
On the other hand, the grid based methods are more efficient, but due to the
feature dilution issue, feature maps at high-level network layers often
possess low resolution, which obstructs the network learning precise local
feautre representations. E.g., in work [20], although the RoI proposals have
already been predicted at the bottle-neck of its U-Net [17] style network
architecture, but the feature maps are still upsampled to provide accurate
enough information for the RoI-pooling in second stage.
In this work, we propose a novel method which maintains precise feature
representations like point-wise methods without the requirement for
complicated MLPs, while avoids the general issues existing in the grid base
methods at the same time.
## 3 Proposed Method
Learning from point coordinates with MLPs is too expensive for a rapid
detection framework to adopt, therefore, we stick to the grid based
convolution approach as our basic perceptron unit. However, instead of
converting the entire point cloud into 3D voxels, we adopt similar strategy as
point-wise methods: we only construct local-scale 3D voxels around the key-
points of the point cloud, and parse 3D features with dense 3D convolution. In
this way, we fuse the point-wise methods and grid based methods at the
perceptron level, and achieve remarkable efficiency improvement.
Nevertheless, just like other point-wise methods, we are facing the same
problem: how to select key-points from a point cloud with hundreds of
thousands of points. Moreover, we also need to construct the 3D convolution
kernels on-the-fly during the forward propagation efficiently enough to
achieve the real-time performance. In this section, we will give our answers
to these two questions in section 3.1 and 3.2 respectively, followed by the
illustrations to our Location-Aware RoI pooling in section 3.3 and 3D IoU loss
function in section 3.4.
Figure 2: Visualization of the proposed two-stage DV-Det framework. In the
first stage, raw 3D points are processed by point-wise convolutional layers
with dynamic voxelization to extract features and obtain 3D bounding-box
proposals. In the second stage, the proposals are refined based on the
Location-Aware RoI pooling method to get the final prediction results.
### 3.1 Grid Based Point Downsampling
Farthest point sampling (FPS) is the most widely adopted algorithm for point
cloud downsampling[14], however, as an algorithm with complexity $O(n^{2})$,
it runs very slowly for point cloud at large scales, making it a straggler in
the real-time detection framework. On the other hand, random downsampling is
efficient enough with $O(n)$ complexity, but it is sensitive to the local
point density and often leads to unstable performance[7]. In this work, we
propose the grid based point downsampling method, which runs almost as
efficiently as random sampling, while keeps similar functionalities as FPS.
Specifically, for a point cloud $S=\\{(p_{i},f_{i}):i=1,2,...,N\\}$, where
$p_{i}\in\mathbb{R}^{3}$ is the point coordinate, $f_{i}\in\mathbb{R}^{c}$ is
the point-wise feature with channel $c$ and $N$ is the total number of points,
given the downsampling resolution $r$, we first divide the entire point cloud
into 3D regular grids with grid length $r$ as shown in Fig.3 a.
For every point $p_{i}$ in ${P}$ with coordinate
$[p_{i}^{x},p_{i}^{y},p_{i}^{z}]$, we obtain its corresponding grid index as
$[\lfloor\frac{p_{i}^{x}}{r}\rfloor,\lfloor\frac{p_{i}^{y}}{r}\rfloor,\lfloor\frac{p_{i}^{z}}{r}\rfloor]$,
which indicates the grid that point will fall into. Next, we randomly select
one point in each grid as our downsampling output, unless the grid is not
occupied by any points. This strategy may sound straightforward, but not the
implementation, especially for the balance between the time and space
complexity. Therefore, we adopt different implementations for inference and
training phase separately due to their different needs for speed and memory
efficiency.
For the inference purpose, speed matters more than memory efficiency, and
therefore, our implementation creates a 3D grid buffer with size
$\lfloor\frac{W}{r}\rfloor\times\lfloor\frac{L}{r}\rfloor\times\lfloor\frac{H}{r}\rfloor$
first, where the $W$, $L$ and $H$ stand for the dimensions of the input point
cloud; then, we calculate the grid index for every point which are fitted into
the corresponding grid buffer location. Each grid buffer location is writable
for only once, which means its value cannot be modified once it has been
occupied, so that the other points with the same grid index will not overwrite
the same buffer again. With this setup, we achieve the $O(n)$ complexity, but
the speed also comes at a price: the 3D grid buffer has to be pre-allocated in
the memory space first. Fortunately, it usually will not be a problem for most
of the cases, e.g., for Waymo Open Dataset with input range of 150m $\times$
150m $\times$ 6m, when the $r$ is 0.1m, the total RAM consumption by our
inference implementation is around 500MB (with float32), while the speed is
5$\times$ faster than our training implementation (introduced below). Another
good news is that we can reuse the same downsampling results in the subsequent
model layers, as long as the downsampling ratio $r$ remains unchanged.
By contrast, in the training implementation, we aim at fitting as large batch
size as possible into GPU, while the time consumption is less important.
Following this principle, we calculate the grid index
$[\lfloor\frac{p_{i}^{x}}{r}\rfloor,\lfloor\frac{p_{i}^{y}}{r}\rfloor,\lfloor\frac{p_{i}^{z}}{r}\rfloor]$
for every point first, then sort the points according to their grid indexes,
and collect the points with unique grid indexes as the final downsampling
results. By doing so, we waive the requirement for the memory-hungry grid
buffer implementation. Since the sorting operation is involved here, the
approximate complexity is $O(nlogn)$, not as ideal as $O(n)$, but still much
faster than the FPS.
Figure 3: Visualization of grid based point downsampling (a) and dynamic
voxelization (b).
### 3.2 Hierarchical Convolution with Dynamic Voxelization
The purpose of our hierarchical point-wise convolution is to combine the
advantages of both conventional convolutions and the point-wise operations.
Instead of applying these two techniques in an alternate way like PV-RCNN[18],
in this work, we directly deploy 3D convolutions in a point-wise fashion.
Specifically, after the extraction of key-points via downsampling, we first
construct local-scale 3D voxels around each key-point with our proposed
dynamic voxelization operation, then we parse the point-wise 3D voxel data
with dense 3D convolution to obtain the feature representations.
#### 3.2.1 Dynamic Voxelization
Given the input point cloud
$S_{1}=\\{(p_{1}^{i},f_{1}^{i}):i=1,2,...,N_{1}\\}$,
$p_{1}^{i}\in\mathbb{R}^{3}$, $f_{1}^{i}\in\mathbb{R}^{c_{1}}$, with the
subscript "1" suggesting it is the first layer in the network, we first
downsample $\\{p_{1}^{i}\\}$ using our grid-based downsampling with the
downsampling resolution $r_{1}$, and get the downsampled key point set
$\\{p_{2}^{i}:i=1,2,...,N_{2},N_{2}\leq
N_{1}\\}\subseteq\\{p_{1}^{i}:i=1,2,...,N_{1}\\}$. Next, for every
$p_{2}^{i}$, we query its neighbouring points in $S_{1}$ within a fixed radius
$R_{1}$: $S_{1}^{i}=\\{(p_{1}^{j},f_{1}^{j}):j=1,2,...,N_{1}^{i}|\left\lVert
p_{1}^{j}-p_{2}^{i}\right\rVert\leq R_{1}\\}$, and then fit $S_{1}^{i}$ into
the 3D regular voxels with resolution $k\times k\times k$. By doing so, we
convert the original $S_{1}$ into a set of point-wise 3D voxels:
$V_{1}=\\{(p_{2}^{i},v_{1}^{i}),i=1,2,...,N_{2}\\}$, where
$v_{1}^{i}\in\mathbb{R}^{k\times k\times k\times c_{1}}$ encodes the local
point cloud geometry around the key point $p_{2}^{i}$.
The key of our dynamic voxelization lies on how to construct the 3D voxels
$v^{i}$ for each key-point $p^{i}$. However, even after the grid based
downsampling operation, the total number of remaining key-points is still
considerable ($\sim$ 100k at most), and to perform local-scale voxelization
with so many key-points in real-time, we propose the grid based voxelization
operation.
As suggested by its name, grid based voxelization basically shares a similar
implementation as our grid based downsampling operation. As shown in Fig.3 b,
given the kernel radius $R$ and kernel resolution $k$, we divide the point
cloud into regular grids with resolution $2R/k$ (defined as kernel resolution
in this context), and for any given kernel centroid and query radius $R$, we
fit interior points into the $k\times k\times k$ 3D voxels. In regard to the
voxels occupied by multiple points, the average-pooling strategy is used.
To accelerate this process, we only need to go through the points that lies in
the grids which overlap with the kernel area, meanwhile, we also apply
different implementations separately to fulfill the different preferences
during training and inference phases, and readers may refer to the source code
for more details.
A similar idea to our dynamic convolution is also introduced in [8], however,
the voxelization is only performed once for all the layers before the network
propagation in [8], therefore, all the layers in the network always share the
same receptive field and there is no concept of hierarchy. By contrast, in our
work, the voxelization is performed on-the-fly in every convolutional layer
with highly efficient implementations, and therefore the receptive field
dynamically changes along the model depth.
#### 3.2.2 Point-wise 3D Convolution
As for the convolution part, taking the first convolutional layer as an
example, we convolve the point-wise 3D voxel $v_{1}^{i}$ with dense 3D kernel
$W_{1}\in\mathbb{R}^{k\times k\times k\times c_{1}\times c_{2}}$. $W_{1}$ has
the same $k\times k\times k$ resolution as $v_{1}^{i}$, while $c_{1}$ and
$c_{2}$ are the input and output feature channels respectively. After
convolution, we have $f_{2}^{i}=v_{1}^{i}*W_{1}$, and
$f_{2}^{i}\in\mathbb{R}^{c_{2}}$. Finally, we obtain a new point set
$S_{2}=\\{(p_{2}^{i},f_{2}^{i}):i=1,2,...,N_{2}\\}$, which can be treated as
the input of another successive convolutional layer. Since the convolution
output features are closely associated with the point coordinates, the output
$f^{i}$ now exactly represents the features at location $p_{i}$ , instead of a
large pooling area, like conventional convolutions in Fig.1 a. A hierarchical
arrangement of point-wise convolutional layers shapes our backbone and region
proposal network (RPN) as shown in the Fig.2.
### 3.3 Location-Aware RoI Pooling
As a two-stage detection framework, RoI pooling plays an essential part in the
second refinement stage. However, to perform efficient yet accurate RoI
pooling still remains an open problem for 3D point cloud detection. The
concept of RoI pooling was officially introduced in [20], and later on was
adopted in the successive works[18].
Figure 4: Location-Aware RoI pooling illustrated in 2D with two proposals and
pooling resolution of 2$\times$2\. With LA-RoI pooling, our network can
capture the tiny variance between to the two proposals that are very close to
each other.
But how to efficiently aggregate the point-wise features into RoI pooling
grids still remains a problem. In [18], features in each pooling grid are
learnt from additional convolutions, e.g., for RoI pooling with grid
resolution of $6\times 6\times 6$, a total number of 216 convolution
calculations are involved, and that is for one single RoI only, therefore, it
is unaffordable to an efficient detection framework.
To this end, we propose the Location-Aware RoI Pooling method. As shown in
Fig.4, during the pooling operation, we assign additional weight to the input
point-wise features according to their Euclidean distances to the pooling grid
centre. Specifically, given a 3D RoI of dimension $W\times L\times H$ and the
target pooling grid resolution $k$, we first gather all the interior point-
wise features $\\{f_{i}\\}$ within a certain pooling grid $g$ among the
$k\times k\times k$ grids; next, we calculate representative features $f_{g}$
as:
$f_{g}=\frac{1}{n}\sum_{i=1}^{n}{w_{i}f_{i}};w_{i}=e^{1-\frac{d_{i}}{r}};r=max\\{\frac{W}{k},\frac{L}{k},\frac{H}{k}\\}$
(1)
where $d_{i}$ is the Euclidean distance between the feature point $f_{i}$ and
the grid centre $g$, $r$ is the maximum dimension of pooling grid among $W$,
$L$ and $H$ orientations. We normalize $f_{g}$ by the total number of interior
points $n$ in each pooling grid, so that the scale of $f_{g}$ will not be
heavily affected by $n$. In practice, the largest value of $n$ is set as 5,
which means for each grid $g$, only at most 5 interior point-wise features
$f_{i}$ are taken into consideration, and the redundant points are simply
omitted. By doing so, we are able to capture the tiny location perturbations
between different RoIs, while avoid the expensive convolution computations.
Input : Predicted bounding box $B^{p}$ and the corresponding ground truth
$B_{g}$:
$B^{p}=(x^{p},y^{p},z^{p},w^{p},l^{p},h^{p},r^{p})$,
$B^{g}=(x^{g},y^{g},z^{g},w^{g},l^{g},h^{g},r^{g})$
Output : The 3D IoU loss between $B^{p}$ and $B^{g}$: $L_{IoU}$
1:Convert $B_{p}$ and $B_{g}$ to BEV representation:
$B^{p}_{bev}=(x^{p},y^{p},w^{p},l^{p},r^{p})$,
$B^{g}_{bev}=(x^{g},y^{g},w^{g},l^{g},r^{g})$
2:Get the vertices of $B^{p}_{bev}$ and $B^{g}_{bev}$. For
$i\in\\{1,2,3,4\\}$:
$\mathbf{V}_{i}^{p}=[(-1)^{i}w^{p}/2,(-1)^{i-1}l^{p}/2]+[x^{p},y^{p}]$;
$\mathbf{V}_{i}^{g}=[(-1)^{i}w^{g}/2,(-1)^{i-1}l^{g}/2]+[x^{g},y^{g}]$
3:Get the perspective coordinates of $\mathbf{V}^{p}$ regarding its relative
position to $B^{g}_{bev}$ as $\mathbf{V}^{p\rightarrow{g}}$:
$\mathbf{V}^{p\rightarrow{g}}=\mathbf{R}_{(r^{p}-r^{g})}[\mathbf{V}^{p}]^{T}+[x^{p}-x^{g},y^{p}-y^{g}]$
($\mathbf{R}_{*}$ is the rotation transformation regarding angle $*$)
4:Get the edge extensions of $B^{p}_{bev}$ with vertices
$\mathbf{V}^{p\rightarrow{g}}$. For $i\in\\{1,2,3,4\\}$:
$y=(-1)^{i}\frac{\mathbf{V}_{i}^{p\rightarrow{g}}[1]-\mathbf{V}_{i-1}^{p\rightarrow{g}}[1]}{{\mathbf{V}_{i}^{p\rightarrow{g}}[0]-\mathbf{V}_{i-1}^{p\rightarrow{g}}[0]}}x+(-1)^{i-1}\frac{\mathbf{V}_{i-1}^{p\rightarrow{g}}[1]\mathbf{V}_{i}^{p\rightarrow{g}}[0]-\mathbf{V}_{i}^{p\rightarrow{g}}[1]\mathbf{V}_{i-1}^{p\rightarrow{g}}[0]}{{\mathbf{V}_{i}^{p\rightarrow{g}}[0]-\mathbf{V}_{i-1}^{p\rightarrow{g}}[0]}}$
5:Get all the intersections $\\{\mathbf{I}_{j}^{g}\\},j\in\\{1,2,...,16\\}$
between $B^{p}_{bev}$ and $B^{g}_{bev}$ by setting $x$ as
$\pm\frac{1}{2}w^{g}$ or setting $y$ as $\pm\frac{1}{2}l^{g}$ in Step 4 (the
superscript $g$ indicates $\mathbf{I}^{g}$ is represented based on its
relative position to $B^{g}_{bev}$)
6:Concatenate $\mathbf{I}^{g}$, $\mathbf{V}^{p\rightarrow{g}}$ and
$\mathbf{V}^{g}$ as $\mathbf{P}^{g}$={$\mathbf{I}^{g}$,
$\mathbf{V}^{p\rightarrow{g}}$,$\mathbf{V}^{g}$}, filter out the points in
$\mathbf{P}^{g}$ that are outside $B^{g}_{bev}$, and that leads to
$\mathbf{P}^{g}=\\{\mathbf{P}_{k}^{g}|k\in\\{1,2,...,24\\}\cap\left\lVert\mathbf{P}_{k}^{g}[0]\right\rVert\leq\frac{1}{2}w^{g}\cap\left\lVert\mathbf{P}_{k}^{g}[1]\right\rVert\leq\frac{1}{2}l^{g}\\}$
7:Similar to Step 3, get the perspective coordinates of $\mathbf{P}^{g}$
regarding its relative position to $B^{p}_{bev}$ as
$\mathbf{P}^{g\rightarrow{p}}$
8:Repeat Step 6 to filter out the points in $\mathbf{P}^{g\rightarrow{p}}$
that are outside $B^{p}_{bev}$, and that returns a new set
$\mathbf{P}\subset{\mathbf{P}^{g\rightarrow{p}}}$, which are the vertices of
the polygon intersection area between $B^{p}_{bev}$ and $B^{g}_{bev}$
9:Sort the points in $\mathbf{P}$ counterclock-wisely and calculate the area
of the intersection polygon using Shoelace algorithm:
$A=\frac{1}{2}\left|(\sum\limits_{i=1}^{n-1}\mathbf{P}_{i}[0]\mathbf{P}_{i+1}[1])+\mathbf{P}_{n}[0]\mathbf{P}_{1}[1]-(\sum\limits_{i=1}^{n-1}\mathbf{P}_{i+1}[0]\mathbf{P}_{i}[1])-\mathbf{P}_{1}[0]\mathbf{P}_{n}[1]\right|$
10:Get the intersection height $H$ between $B^{p}$ and $B^{g}$, then calculate
the 3D IoU as:
$IoU_{3D}=\frac{A\times H}{w^{p}\times l^{p}\times h^{p}+w^{g}\times
l^{g}\times h^{g}-A\times H}$, and $L_{IoU}=1-IoU_{3D}$
ALGORITHM 1 3D IoU Loss Calculation
### 3.4 Loss Functions
As a two-stage model, we use multi-task loss functions to train our model in
both stages. During the first stage, we try to differentiate foreground points
from the point cloud and generate RoI proposals for every foreground points at
the same time. As for loss function for the RoI regression optimization, we
use the 3D IoU loss[28] as our optimization target, instead of the commonly
adopted smooth-L1 loss.
3D IoU Loss. The IoU loss has been proven to be more suitable for detection
tasks than smooth-L1 loss[28, 16], as it naturally reflects the bias between a
predicted bounding box and its corresponding ground truth. The calculation
itself for 3D IoU is not difficult, but as a loss function, being
differentiable is a prerequisite and it is not an easy task. In previous
works[28], the back propagation of 3D IoU has to be implemented manually with
C++/CUDA extensions, which can be tedious and fallible. To tackle this
problem, here we propose an efficient algorithm for 3D IoU calculation, which
is fully based on the native operations supported by the modern deep learning
framework like TensorFlow and PyTorch. This means that we no long have to
implement the back propagation manually and can safely leave this task to the
auto differentiation functions of modern deep learning frameworks.
Concretely, given a pair of predicted bounding boxes
$B^{p}=(x^{p},y^{p},z^{p},w^{p},l^{p},h^{p},r^{p})$ and the corresponding
ground truth $B^{g}=(x^{g},y^{g},z^{g},w^{g},l^{g},h^{g},r^{g})$, where
$[x^{*},y^{*},z^{*}]$ is the geometry centroid of bounding box $*$; $w^{*}$,
$l^{*}$ and $h^{*}$ are the 3D dimensions and $r^{*}$ is the rotation angle
around $z(yaw)$ axis (assuming only have rotations along $z$ axis), we
calculate the 3D IoU loss according to the algorithm 1. The key of our
algorithm lies on how to obtain the intersections efficiently between two
bounding boxes on 2D BEV plane, and to achieve this goal, we transform the
vertex coordinates of two bounding boxes based on their relative positions to
each other via rotations and translations. By doing so, the intersections can
be easily determined by setting restrictions on $x$, $y$ coordinates, and more
importantly, our algorithm can be executed in batch-wise pattern without
looping through every bounding box, which ensures its usability in
applications.
The multi-task loss function we use for the firs stage optimization is:
$L_{stage1}=L_{cls}+\alpha L_{iou}+\beta L_{rot}$ (2)
where $L_{cls}$ is the focal loss for foreground classification and $L_{i}ou$
is the 3D IoU loss. $L_{rot}$ is the smooth-L1 loss for rotation angle
regression and $L_{rot}=$smooth-L1$(\sin{(r_{p}-r_{g})})$, which prevents
$L_{iou}$ mixing up the $w$ and $l$ dimension. As for the second stage, the
loss function is defined as follow:
$L_{stage2}=L_{conf}+\alpha L_{iou}+\beta L_{rot}+\gamma L_{flip}$ (3)
where $L_{conf}$ is the loss for IoU guided confidence score [pvrcnn], while
$L_{iou}$ and $L_{rot}$ follow the same definitions as before. $L_{flip}$ is
the cross-entropy loss for binary classification, which decides whether the
predicted bounding box shall be rotated by 180°. The reason why $L_{flip}$ is
needed is that $L_{rot}$ only regulates on the $\sin$ value of $r_{p}-r_{g}$,
and the network cannot differentiate the correct orientation of bounding boxes
basing on $L_{rot}$ alone. In practice, we set $\alpha=2$, $\beta=\gamma=0.5$.
$L_{cls}$ and $L_{conf}$ are calculated for all the output points, while
$L_{iou}$, $L_{rot}$ and $L_{flip}$ are only calculated for the foreground
points.
## 4 Experiments
### 4.1 Implementation Details
Network Architecture. As shown in Fig.2, our backbone network is based on the
hierarchical point-wise convolutional layers with dynamic voxelization. The
backbone is composed of four convolution blocks, and each block includes two
point-wise convolutional layers. The downsampling resolution $r$ is set as
0.1m, 0.2m, 0.4m, 0.8m for each block, and the kernel resolution $k$ is 3 for
all the blocks with the number of feature channels 16, 32, 64 and 128. The
output features from each block are then concatenated and fed into the second
stage as input to the LA-RoI pooling layer. The LA-RoI pooling transforms the
point-wise features into $5\times 5\times 5$ dense 3D voxels, and pass them to
the dense $3\times 3\times 3$ 3D convolutions. We apply “valid” padding
strategy for the 3D convolution and the voxel dimensions are reduced to
$1\times 1\times 1$ after two successive dense convolutional layers. Finally,
we feed these features into MLPs to return the final predictions.
Training and Inference Setup. We train our DV-Det in an end-to-end fashion
from scratch on the KITTI 3D object detection dataset[4] and Waymo Open
dataset[21]. The model is trained on 16 NVIDIA RTX 2080 Ti GPUs with 80
training epochs and the learning rate of 0.01. Batch size is set as 64 for
KITTI dataset and 32 for Waymo dataset. In the second stage, we resample the
negative and positive proposals with a ratio of 2:1 and IoU threshold of 0.5.
During training phase, the input data are augmented with random rotations
along $z$ axis between range $[-\frac{\pi}{4},\frac{\pi}{4}]$ and random
scaling along three axes in range $[0.95,1.05]$. Following the practice in
[18, 22], we also randomly "paste" ground truth objects collected from
different scenes (within the same dataset) to enrich the training data. We
train our model with the "training" implementations of grid based downsampling
and dynamic voxelization, and run inference with the "inference"
implementations.
### 4.2 Evaluation on KITTI Dataset
We first evaluate our performance on the KITTI 3D object detection dataset,
which comprises two partitions: training dataset (7,481 samples) and testing
dataset (7,518 samples). We further divide the training partition into two
sets: train set with 3,712 samples and val set with 3,769 samples. In training
phase, we utilize 80% of the samples in the train+val combination as training
data, and leave the rest 20% for validation. We evaluate the performance based
on the testing dataset from the KITTI official online evaluation server, and
report our accuracy on car and cyclist class in Table 1.
We only compare with the pure point cloud based methods, and we divide the
existing methods into two categories: "3D Perceptron" are the methods that
parse the point cloud in 3D space using perceptrons like 3D convolution or
PointNet; "BEV" are the methods that convert 3D point cloud onto 2D BEV plane,
the process data with 2D convolutions. We notice that all of the existing 3D
perceptron based methods have a inference speed less than 25 FPS on a
dedicated GPU, and considering the 90°front-view FOV in KITTI dataset, we can
hardly say they are ready for the real-world applications. On the other hand,
BEV based methods run at considerably faster speed than the 3D perceptrons
based methods, however, converting 3D point cloud into 2D BEV projections
means the permanent loss of 3D spatial information, and that usually leads to
unsatisfactory performance on hard examples.
By contrast, our method achieves remarkable 75 FPS on the KITTI dataset, which
is 3$\times$ faster than the state-of-the-art 3D perceptron based method.
Meanwhile, compared with the existing BEV based methods, we overperform them
regarding all the evaluation metrics and achieve 45% faster inference speed
than the widely adopted PointPillar method.
| Method | Speed | Car - 3D Detection | Car - BEV Detection | Cyclist - 3D Detection | Cyclist - BEV Detection
---|---|---|---|---|---|---
| (FPS) | Easy | Mod. | Hard | Easy | Mod. | Hard | Easy | Mod. | Hard | Easy | Mod. | Hard
3D Perceptron | Point-RCNN†[19] | $\sim$10 | 86.96 | 75.64 | 70.70 | 92.13 | 87.39 | 82.72 | 74.96 | 58.82 | 52.53 | 82.56 | 67.24 | 60.28
STD†[27] | $<$20 | 87.95 | 79.71 | 75.09 | 94.74 | 89.19 | 86.42 | 78.69 | 61.59 | 55.30 | 81.36 | 67.23 | 59.35
Fast Point-RCNN†[2] | $\sim$20 | 85.29 | 77.40 | 70.24 | 90.87 | 87.84 | 80.52 | - | - | - | - | - | -
PV-RCNN†[18] | $\sim$15 | 90.25 | 81.43 | 76.82 | 94.98 | 90.65 | 86.14 | 78.60 | 63.71 | 57.65 | 82.49 | 68.89 | 62.41
SECOND[22] | $\sim$30 | 83.34 | 72.55 | 65.82 | 89.39 | 83.77 | 78.59 | 71.33 | 52.08 | 45.83 | 76.50 | 56.05 | 49.45
Voxel-RCNN†[3] | $\sim$25 | 90.90 | 81.62 | 77.06 | - | - | - | - | - | - | - | - | -
SA-SSD[6] | $\sim$25 | 88.75 | 79.79 | 74.16 | 95.03 | 91.03 | 85.96 | - | - | - | - | - | -
3DSSD[26] | $\sim$25 | 88.36 | 79.57 | 74.55 | - | - | - | 82.48 | 64.10 | 56.90 | - | - | -
BEV | PIXOR[25] | $\sim$10 | - | - | - | 81.70 | 77.05 | 72.95 | - | - | - | - | - | -
HDNET[23] | $\sim$25 | - | - | - | 89.14 | 86.57 | 78.32 | - | - | - | - | - | -
PointPillars[9] | $\sim$45 | 82.58 | 74.31 | 68.99 | 90.07 | 86.56 | 82.81 | 77.10 | 58.65 | 51.92 | 79.90 | 62.73 | 55.58
| DV-Det (Ours)† | $\sim$75 | 85.32 | 76.74 | 70.02 | 91.53 | 87.65 | 83.27 | 77.94 | 58.77 | 52.49 | 80.92 | 63.08 | 57.32
$\dagger$ Two-stage model
Table 1: Performance comparison on the KITTI testing dataset based on the mean
Average Precision (mAP) with 40 recall positions.
### 4.3 Evaluation on Waymo Open Dataset
Apart from the KITTI dataset, we also test our model on the Waymo Open Dataset
to give a comprehensive evaluation. We train our model based on 798 training
sequences with $\sim$158k point cloud scenes, and test our performance on 202
validation sequences with $\sim$40k point cloud scenes. Different from KITTI
dataset, Waymo Open Dataset possesses a full 360°view angle with denser point
cloud point cloud, which asks for more efficient models to achieve the real-
time processing speed. We evaluate our method based on the official tools
released by Waymo. The mAP performance of DV-Det is reported in Table 2 for
vehicle detection with IoU threshold of 0.7, and we only consider the examples
with difficulty LEVEL_1 (objects possess more than 5 LiDAR points).
Method | Speed | 3D mAP (IoU=0.7) | BEV mAP (IoU=0.7)
---|---|---|---
(FPS) | Overall | 0-30m | 30-50m | 50m-Inf | Overall | 0-30m | 30-50m | 50m-Inf
PV-RCNN[19] | $<$5 | 70.30 | 91.92 | 69.21 | 42.17 | 82.96 | 97.53 | 82.99 | 64.97
Voxel-RCNN[3] | $<$10 | 75.59 | 92.49 | 74.09 | 53.15 | 88.19 | 97.62 | 87.34 | 77.70
PointPillar[9] | $\sim$15 | 56.62 | 81.01 | 51.75 | 27.94 | 75.57 | 92.10 | 74.06 | 55.47
DV-Det (Ours) | $\sim$25 | 63.42 | 85.72 | 55.89 | 30.73 | 78.38 | 95.12 | 76.93 | 59.36
Table 2: Performance (mAP) comparison on the Waymo Open Dataset with 202
validation sequences for vehicle class.
Our DV-Det is overperformed by the state-of-the-art 3D perceptron based
methods like Voxel-RCNN regarding the detection accuracy, but our method can
run at a speed of 25 FPS, which is even faster than the 2D BEV methods like
PointPillar with obviously higher accuracy.
## 5 Conclusion
We present the DV-Det, a novel two-stage framework for efficient 3D object
detection from point clouds. Our method combines the advantages from both
point-wise methods and grid based methods, and as a pure 3D point cloud based
method, DV-Det overperforms the 2D BEV based methods by a large margin
regarding both efficiency and accuracy for the first time. With innovations
like grid based point downsampling and dynamic voxelization techniques, we
achieve satisfactory performance on KITTI and Waymo benchmark dataset. We hope
our method can be inspiring and encourage more future works.
## References
* [1] Xiaozhi Chen, Huimin Ma, Ji Wan, Bo Li, and Tian Xia. Multi-view 3d object detection network for autonomous driving. 2017\.
* [2] Yilun Chen, Shu Liu, Xiaoyong Shen, and Jiaya Jia. Fast point r-cnn. pages 9775–9784, 2019.
* [3] Jiajun Deng, Shaoshuai Shi, Peiwei Li, Wengang Zhou, Yanyong Zhang, and Houqiang Li. Voxel r-cnn: Towards high performance voxel-based 3d object detection. arXiv preprint arXiv:2012.15712, 2020.
* [4] Andreas Geiger, Philip Lenz, and Raquel Urtasun. Are we ready for autonomous driving? the kitti vision benchmark suite. pages 3354–3361, 2012.
* [5] Benjamin Graham and Laurens van der Maaten. Submanifold sparse convolutional networks. 6 2017.
* [6] Chenhang He, Hui Zeng, Jianqiang Huang, Xian-Sheng Hua, and Lei Zhang. Structure aware single-stage 3d object detection from point cloud. pages 11873–11882, 2020.
* [7] Qingyong Hu, Bo Yang, Linhai Xie, Stefano Rosa, Yulan Guo, Zhihua Wang, Niki Trigoni, and Andrew Markham. Randla-net: Efficient semantic segmentation of large-scale point clouds. pages 11108–11117, 2020.
* [8] Binh-Son Hua, Minh-Khoi Tran, and Sai-Kit Yeung. Pointwise convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 984–993, 2018.
* [9] Alex H. Lang, Sourabh Vora, Holger Caesar, Lubing Zhou, Jiong Yang, and Oscar Beijbom. Pointpillars: Fast encoders for object detection from point clouds. 2019\.
* [10] Ming Liang, Bin Yang, Yun Chen, Rui Hu, and Raquel Urtasun. Multi-task multi-sensor fusion for 3d object detection. 2019\.
* [11] Ming Liang, Bin Yang, Shenlong Wang, and Raquel Urtasun. Deep continuous fusion for multi-sensor 3d object detection. In Proceedings of the European Conference on Computer Vision (ECCV), pages 641–656, 2018.
* [12] Charles R Qi, Or Litany, Kaiming He, and Leonidas J Guibas. Deep hough voting for 3d object detection in point clouds. pages 9277–9286, 2019.
* [13] Charles R Qi, Wei Liu, Chenxia Wu, Hao Su, and Leonidas J Guibas. Frustum pointnets for 3d object detection from rgb-d data. pages 918–927, 2018.
* [14] Charles R. Qi, Hao Su, Kaichun Mo, and Leonidas J. Guibas. Pointnet: Deep learning on point sets for 3d classification and segmentation. volume 2017-Janua, pages 77–85, 2017.
* [15] Charles R. Qi, Li Yi, Hao Su, and Leonidas J. Guibas. Pointnet++: Deep hierarchical feature learning on point sets in a metric space. 2017\.
* [16] Hamid Rezatofighi, Nathan Tsoi, JunYoung Gwak, Amir Sadeghian, Ian Reid, and Silvio Savarese. Generalized intersection over union: A metric and a loss for bounding box regression. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 658–666, 2019.
* [17] Olaf Ronneberger, Philipp Fischer, and Thomas Brox. U-net: Convolutional networks for biomedical image segmentation. volume 9351, pages 234–241, 5 2015.
* [18] Shaoshuai Shi, Chaoxu Guo, Li Jiang, Zhe Wang, Jianping Shi, Xiaogang Wang, and Hongsheng Li. Pv-rcnn: Point-voxel feature set abstraction for 3d object detection. pages 10529–10538, 2020.
* [19] Shaoshuai Shi, Xiaogang Wang, and Hongsheng Li. Pointrcnn: 3d object proposal generation and detection from point cloud. 2019\.
* [20] Shaoshuai Shi, Zhe Wang, Jianping Shi, Xiaogang Wang, and Hongsheng Li. Part-a2 net: 3d part-aware and aggregation neural network for object detection. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2019.
* [21] Pei Sun, Henrik Kretzschmar, Xerxes Dotiwalla, Aurelien Chouard, Vijaysai Patnaik, Paul Tsui, James Guo, Yin Zhou, Yuning Chai, Benjamin Caine, et al. Scalability in perception for autonomous driving: Waymo open dataset. pages 2446–2454, 2020.
* [22] Yan Yan, Yuxing Mao, and Bo Li. Second: Sparsely embedded convolutional detection. Sensors, 18:3337, 2018.
* [23] Bin Yang, Ming Liang, and Raquel Urtasun. Hdnet: Exploiting hd maps for 3d object detection. In Conference on Robot Learning, pages 146–155. PMLR, 2018.
* [24] Bin Yang, Wenjie Luo, and Raquel Urtasun. Pixor: Real-time 3d object detection from point clouds. In Proceedings of the IEEE conference on Computer Vision and Pattern Recognition, pages 7652–7660, 2018.
* [25] Bin Yang, Wenjie Luo, and Raquel Urtasun. Pixor: Real-time 3d object detection from point clouds. 2018\.
* [26] Zetong Yang, Yanan Sun, Shu Liu, and Jiaya Jia. 3dssd: Point-based 3d single stage object detector. pages 11040–11048, 2020.
* [27] Zetong Yang, Yanan Sun, Shu Liu, Xiaoyong Shen, and Jiaya Jia. Std: Sparse-to-dense 3d object detector for point cloud. pages 1951–1960, 2019.
* [28] Dingfu Zhou, Jin Fang, Xibin Song, Chenye Guan, Junbo Yin, Yuchao Dai, and Ruigang Yang. Iou loss for 2d/3d object detection. pages 85–94, 2019.
* [29] Yin Zhou and Oncel Tuzel. Voxelnet: End-to-end learning for point cloud based 3d object detection. pages 4490–4499, 2018.
| arxiv-papers | 2021-07-27T10:07:39 | 2024-09-04T03:07:21.175630 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Zhaoyu Su, Pin Siang Tan, Yu-Hsing Wang",
"submitter": "Zhaoyu Su",
"url": "https://arxiv.org/abs/2107.12707"
} |
2107.12710 | # End-to-End Spectro-Temporal Graph Attention Networks for
Speaker Verification Anti-Spoofing and Speech Deepfake Detection
###### Abstract
Artefacts that serve to distinguish bona fide speech from spoofed or deepfake
speech are known to reside in specific sub-bands and temporal segments.
Various approaches can be used to capture and model such artefacts, however,
none works well across a spectrum of diverse spoofing attacks. Reliable
detection then often depends upon the fusion of multiple detection systems,
each tuned to detect different forms of attack. In this paper we show that
better performance can be achieved when the fusion is performed within the
model itself and when the representation is learned automatically from raw
waveform inputs. The principal contribution is a spectro-temporal graph
attention network (GAT) which learns the relationship between cues spanning
different sub-bands and temporal intervals. Using a model-level graph fusion
of spectral (S) and temporal (T) sub-graphs and a graph pooling strategy to
improve discrimination, the proposed RawGAT-ST model achieves an equal error
rate of 1.06% for the ASVspoof 2019 logical access database. This is one of
the best results reported to date and is reproducible using an open source
implementation.
## 1 Introduction
It is well known that cues indicative of spoofing attacks reside in specific
sub-bands or temporal segments [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13].
Prior work [10, 9, 14, 11, 12] showed that these can be learned automatically
using a model with either spectral or temporal attention. Our most recent work
[13] showed the merit of graph attention networks (GATs) to learn the
relationships between cues located in different sub-bands or different
temporal intervals. We observed that different attention mechanisms spanning
either the spectral or the temporal domain, work more or less well for
different sets of spoofing attack and that the benefit of both can be
exploited through their fusion at the score level. We also found that neither
model works as well on its own for the full set of diverse spoofing attacks in
the ASVspoof 2019 logical access database.
Motivated by psychoacoustics studies [15, 16, 17, 18] which show the power of
the human auditory system to select simultaneously the most discriminative
spectral bands and temporal segments for a given task, and inspired by the
power of GATs to model complex relationships embedded within graph
representations, we have explored fusion within the model itself (earlier
fusion). The idea is to extend the modelling of relationships between _either_
different sub-bands _or_ different temporal segments using separate models and
attention mechanisms to the modelling of relationships spanning different
spectro-temporal intervals using a GAT with combined spectro-temporal
attention (GAT-ST). The approach facilitates the aggregation of complementary,
discriminative information simultaneously in both domains.
In a further extension to our past work, the GAT-ST reported in this paper
operates directly upon the raw waveform. Such a fully end-to-end approach is
designed to maximise the potential of capturing discriminative cues in both
spectral and temporal domains. Inspired by work in speaker verification [19,
20, 21, 22] and in building upon our end-to-end anti-spoofing solution
reported in [12], the proposed RawGAT-ST model uses a one-dimensional sinc
convolution layer to ingest raw audio. The principal contributions of this
paper hence include:
* •
a fully end-to-end architecture comprising feature representation learning and
a GAT;
* •
a novel spectro-temporal GAT which learns the relationships between cues at
different sub-band and temporal intervals;
* •
a new graph pooling strategy to reduce the graph dimension and to improve
discrimination;
* •
an exploration of different model-level, graph fusion strategies.
The remainder of this paper is organized as follows. Section 2 describes
related works. Section 3 provides an introduction to GATs and describes how
they can be applied to anti-spoofing. The proposed RawGAT-ST model is
described in Section 4. Experiments and results are presented in Sections 5
and 6. Finally, the paper is concluded in Section 7.
## 2 Related works
In recent years, graph neural networks (GNNs) [23, 24, 25, 26, 27] have
attracted growing attention, especially variants such as graph convolution
networks (GCNs) [28] or GATs [29]. A number of studies have shown the utility
and appeal of graph modeling [30, 31, 32, 33] for various speech processing
tasks. Zhang et al. [30] applied GCNs to a few-shot audio classification task
to derive an attention vector which helps to improve the discrimination
between different audio examples. Jung et al. [32] demonstrated the use of
GATs as a back-end classifier to model the relationships between enrollment
and test utterances for a speaker verification task. Panagiotis et al. [33]
used GCNs to exploit the spatial correlations between the different channels
(nodes) for a multi-channel speech enhancement problem.
Our previous work [13] demonstrated how GATs can be used to model spoofing
attack artefacts. This is achieved using a self attention mechanism to
emphasize the most informative sub-bands or temporal intervals and the
relationships between them. We applied GATs separately to model the
relationships in either spectral (GAT-S) or temporal (GAT-T) domains and
demonstrated their complementarity through a score-level fusion (i.e., _late_
fusion). Our hypothesis is that the integration of these two models (i.e.,
_early_ fusion) has better potential to leverage complementary information
(spectral and temporal) and further boost performance while using a _single_
model. We present a summary of our original GAT-S/T approach in the next
section. The new contribution is described in Section 4.
Figure 1: The proposed RawGAT-ST model architecture. The top-left spectral
attention block captures discriminative spectral information. The top-right
temporal attention block captures discriminative temporal information. Fusion
is performed at the model level (middle ellipse). The bottom block comprises
the spectro-temporal graph attention model. Figure 2: An illustration of the
proposed graph-based process including a graph attention layer and a graph
pooling layer for an input graph with 4 nodes.
$\textrm{h}_{n}\in\mathbb{R}^{d}$ represents the node representation $n\in N$.
The graph attention layer estimates attention weights $\alpha$ between each
node pair, aggregating node information, and projecting to a new
representation space $\textrm{o}_{n}\in\mathbb{R}^{d^{\prime}}$ with lower
output dimensionality $d^{\prime}$. The graph pooling layer reduces the number
of nodes to improve discrimination.
## 3 Graph attention networks for anti-spoofing
The work in [13] demonstrated the use of GATs to model the relationships
between artefacts in different sub-bands or temporal intervals. The GAT
learning process is illustrated in Algorithm 1 and is described in the
following. A graph is defined as:
$\mathcal{G}(N,\mathcal{E},\textrm{{h}}),$ (1)
where $N$ is the set of nodes, $\mathcal{E}$ represents the edges between all
possible node connections, including self-connections. $\mathcal{G}$ is formed
from a higher-level feature representation h (e.g. the output feature map of a
residual network), where $\textbf{{h}}\in\mathbb{R}^{N\times d}$. The number
of nodes in the set $N$ is the number of spectral sub-bands remaining after
temporal averaging applied to each channel or, conversely, the number of
temporal frames after spectral averaging. The feature dimensionality of each
node $d$ is equal to the number of channels in the feature map.
The GAT layer operates upon an input graph $\mathcal{G}$ to produce an output
graph $\mathcal{G^{\prime}}$. It aggregates neighboring nodes using learnable
weights via a self-attention mechanism. Node features are projected onto
another representation learned from the minimisation of a training loss
function using an affine transform (dense layer). Nodes are aggregated with
attention weights which reflect the connective strength (relationship) between
a given node pair.
The output graph $\mathcal{G^{\prime}}$ comprises a set of nodes o, where each
node $\textrm{o}_{n}$ is derived according to:
$\textrm{o}_{n}=\textrm{SeLU}(\textrm{BN}(W_{\textrm{att}}(m_{n})+W_{\textrm{res}}({{\textrm{h}}}_{n}))),$
(2)
where SeLU refers to a scaled exponential linear unit [34] activation
function, BN refers to batch normalisation [35], ${m}_{n}$ is the aggregated
information for node $n$, and $\textrm{h}_{n}\in\mathbb{R}^{d}$ represents the
feature vector of node $n\in N$. Each output node
$\textrm{o}_{n}\in\mathbb{R}^{d^{\prime}}$ has a target dimensionality
$d^{\prime}<d$. $W_{\textrm{att}}$ projects the aggregated information for
each node $n$ to the target dimensionality $d^{\prime}$. $W_{\textrm{res}}$
projects the residual (skip) connection output to the same dimension.
The information from neighboring nodes is aggregated via self-attention
according to:
$m_{n}=\sum_{u\in\mathcal{M}(n)\cup\\{n\\}}\alpha_{u,n}{\textrm{h}}_{u},$ (3)
where $\mathcal{M}(n)$ refers to the set of neighbouring nodes for node $n$,
and $\alpha_{u,n}$ refers to the attention weight between nodes $u$ and $n$.
The GAT layer assigns learnable self-attention weights $\alpha$ to each edge.
Weights reflect how informative one node is of another, where higher weights
imply a higher connective strength.
The attention weights are derived according to:
$\alpha_{u,n}=\frac{{\operatorname{exp}}(W_{\textrm{map}}({\textrm{h}}_{n}\odot{\textrm{h}}_{u}))}{\sum_{w\in\mathcal{M}(n)\cup\\{n\\}}{\operatorname{exp}}(W_{\textrm{map}}({\textrm{h}}_{n}\odot{\textrm{h}}_{w}))},$
(4)
where $W_{\textrm{map}}\in\mathbb{R}^{d}$ is the learnable map applied to the
dot product and where $\odot$ denotes element-wise multiplication.
Input: $\mathcal{G}$ ( N, $\mathcal{E}$, h)
$\textrm{h}_{n}$ $\in$ $\mathbb{R}^{d}$, $n\in N$
for _$n$ $\in$ $N$_ do
$\forall u\in\mathcal{M}(n)\cup\\{n\\}$, $\mathcal{M}(n)$ (set of nodes
neighboring n )
$\alpha_{u,n}$ $\leftarrow$
softmax$(W_{\textrm{map}}(\textrm{h}_{n}\odot\textrm{h}_{u}))$
$m_{n}$ $\leftarrow$ $\sum_{u}{\alpha_{u,n}\textrm{h}_{u}}$, node aggregation
w.r.t Eq. 3
$\textrm{o}_{n}$ $\leftarrow$
SeLU$(\textrm{BN}(W_{\textrm{att}}(m_{n})+W_{\textrm{res}}(\textrm{h}_{n})))$,
$\textrm{o}_{n}$ $\in$ $\mathbb{R}^{d^{\prime}}$
end for
Output: $\mathcal{G^{\prime}}$ $\leftarrow$ o
Algorithm 1 The GAT learning process
## 4 RawGAT-ST model for anti-spoofing and speech deepfake detection
In this section, we introduce the proposed raw GAT with spectro-temporal
attention (RawGAT-ST) model. It comprises four stages: i) learning higher-
level semantic feature representations in truly end-to-end fashion by
operating on the raw waveform; ii) a novel graph attention module with
spectro-temporal attention; iii) a new graph pooling layer for discriminative
node selection; iv) model-level fusion. The architecture is illustrated in
Fig. 1 whereas a summary of the network configuration is shown in Table 1.
### 4.1 Front-end (higher-level) feature representation
In contrast to our prior work [13] which used hand-crafted features, the
RawGAT-ST model operates directly upon the raw waveform [12, 36]. The
literature shows that solutions based upon a bank of sinc filters are
particularly effective in terms of both convergence stability and performance
[20, 37, 12]. Accordingly, we use a sinc convolution layer for front-end
feature learning similar to that reported in our previous work [12]. It
performs time-domain convolution of the raw waveform with a set of
parameterized sinc functions which correspond to rectangular band-pass filters
[38, 39]. The centre frequencies of each filter in the filterbank are set
according to a mel-scale. For all work reported in this paper, rather than
learning cut-in and cut-off frequencies of each sinc filter, we used fixed
cut-in and cut-off frequencies to alleviate over-fitting to training data.
The output of the sinc layer is transformed to a time-frequency representation
by adding one additional channel dimension. The result is fed to a
2-dimensional (2D) residual network [40] to learn higher-level feature
representations $\textbf{S}\in\mathbb{R}^{C\times F\times T}$ where $C$, $F$
and $T$ refers to the number of channels, frequency bins and time samples
respectively. We use a residual neural network identical to that reported in
[12], except for the use of a 2D CNN instead of 1D CNN. A summary of the
configuration is shown in Table 1. Each residual block layer consists of batch
normalization (BN) with SeLU activation units, 2D convolution and a final max-
pooling layer for data downsampling.
Table 1: The details of RawGAT-ST model architecture. Numbers denoted in Sinc
layer & Conv layer refers to (filter size, stride, number of filters). The
output size are refers to (CNN channels, Freq, Time). Separate GAT layers are
use for spectral and temporal attention blocks.
Layer | Input: 64600 samples | Output shape
---|---|---
Sinc layer | Conv-1D(129,1,70) | (70,64472)
| add channel (TF representation) | (1,70,64472)
| Maxpool-2D(3) | (1,23,21490)
| BN & SeLU |
Res block | $\left\\{\begin{array}[]{c}\text{Conv-2D((2,3),1,32)}\\\ \text{BN \& SeLU }\\\ \text{Conv-2D((2,3),1,32)}\\\ \text{Maxpool-2D((1,3))}\\\ \end{array}\right\\}\times$ | 2 | (32,23,2387)
Res block | $\left\\{\begin{array}[]{c}\text{Conv-2D((2,3),1,64)}\\\ \text{BN \& SeLU }\\\ \text{Conv-2D((2,3),1,64)}\\\ \text{Maxpool-2D((1,3))}\\\ \end{array}\right\\}\times$ | 4 | (64,23,29)
Spectral-attention | Temporal-attention
$\textrm{max}_{\textrm{T}}(\textrm{abs}())=(64,23)$ | $\textrm{max}_{\textrm{F}}(\textrm{abs}())=(64,29)$
GAT layer =(32,23) | GAT layer =(32,29)
Graph pooling=(32,14) | Graph pooling=(32,23)
Projection=(32,12) | Projection=(32,12)
| element-wise addition | (32,12)
Fusion layer | element-wise multiplication | (32,12)
| concatenation (along feature dim) | (64,12)
Spectro- | GAT layer | (16,12)
temporal | Graph pooling | (16,7)
attention | Projection (along feature dim) | (1,7)
Output | FC(2) | 2
Figure 3: An illustration of the graph pooling layer [41]. The input graph
$\textbf{X}\in\mathbb{R}^{N\times d}$ has $4$ nodes and feature dimensionality
$d=4$. $q\in\mathbb{R}^{d\times 1}$ is a learnable projection vector.
Projection scores $y$ are obtained from the dot product between $q$ and the
input feature vector $X_{n}$ for each node. The indices $idx$ corresponding to
the nodes with the top-k highest projection scores are used to form a new
pooled graph $\textrm{{X}}^{\prime}$ from the element-wise multiplication of
${\textbf{{X}}_{n_{idx}}}$ with $\textrm{sigmoid}({y_{n_{idx}}})$ (Eq. 8).
### 4.2 Spectro-temporal attention
The new approach to bring spectro-temporal graph attention to a single model
is a core contribution of this work. An overview of the proposed RawGAT-ST
model architecture is illustrated in Fig. 1. The input to the RawGAT-ST is a
higher-level feature map (top of Fig. 1). The RawGAT-ST model itself comprises
three principal blocks, each of which contains a single GAT layer: a spectral
attention block (top-left of Fig. 1); a temporal attention block (top-right);
a final spectro-temporal attention block (bottom). The spectral and temporal
attention blocks have the goal of identifying spectral and temporal cues. The
third, spectro-temporal attention block operates upon the pair of resulting
graphs to model the relationships spanning both domains. All three blocks
contain GAT and graph pooling layers. The operation of both processes is
illustrated in Fig. 2. The GAT layer operates upon an input graph
$\mathcal{G}(N,\mathcal{E},\textrm{h})$ and produces an output graph
$\mathcal{G^{\prime}}(N,\mathcal{E},\textrm{o})$ by aggregating node
information using self-attention weights between node pairs. The example in
Fig. 2 shows the operation upon a 4-node input graph where the GAT layer
reduces the node dimension from $d$ to $d^{\prime}$.
This process is first applied separately with attention to either spectral or
temporal domains to model the relationships between spectral or temporal
artefacts present in the different sub-band or temporal intervals. Both
spectral and temporal blocks operate upon the higher-level feature map
$\textbf{S}\in\mathbb{R}^{C\times F\times T}$. The spectral and temporal
attention blocks first collapse temporal and spectral information respectively
to a single dimension via max-pooling before the GAT layer. For the spectral
attention block, max-pooling is applied to absolute values across the temporal
dimension thereby giving a spectral feature map
$\textrm{{f}}\in\mathbb{R}^{C\times F}$:
$\textbf{f}=\max_{\textrm{T}}(\textrm{abs}(\textbf{S})),\vspace{0.2cm}$ (5)
The temporal attention block operates instead across the spectral dimension
giving a temporal feature map $\textrm{{t}}\in\mathbb{R}^{C\times T}$:
$\textbf{t}=\max_{\textrm{F}}(\textrm{abs}(\textbf{S})),$ (6)
Since S is derived from temporal data and hence contains both positive and
negative values, use of absolute values in Eqs. 5 and 6 prevents meaningful
negative-valued data from being discarded.
Graphs $\mathcal{G}_{\textrm{{f}}}\in\mathbb{R}^{N_{\textbf{f}}\times d}$ and
$\mathcal{G}_{\textrm{{t}}}\in\mathbb{R}^{N_{\textbf{t}}\times d}$ are then
constructed from the transpose of f and t feature maps, respectively.
$\mathcal{G}_{\textrm{{f}}}$ contains a set of $23$ nodes (the number of
spectral bins) whereas $\mathcal{G}_{\textrm{{t}}}$ contains a set of $29$
nodes (the number of temporal segments). Both graphs have a common
dimensionality of $d=64$. Separate GAT layers are then applied to both
$\mathcal{G}_{\textrm{{f}}}$ and $\mathcal{G}_{\textrm{{t}}}$ to model the
relationships between different sub-bands and temporal segments thereby
producing a pair of new output graphs
$\mathcal{G}_{\textrm{{f}}}^{{}^{\prime}}\in\mathbb{R}^{N_{\textbf{f}}\times
d^{\prime}}$ and
$\mathcal{G}_{\textrm{{t}}}^{{}^{\prime}}\in\mathbb{R}^{N_{\textbf{t}}\times
d^{\prime}}$ with a common, reduced output feature dimensionality
$d^{\prime}=32$.
### 4.3 Graph pooling
As illustrated in Fig. 1, a graph pooling layer is included in all three GAT
blocks. Graph pooling generates more discriminative graphs by selecting a
subset of the most informative nodes. In the example illustrated in Fig. 2 the
graph pooling layer reduces the number of nodes from 4 to 3.
The approach is based upon the graph pooling layer in the recently proposed
Graph U-Net architecture [41]. An example is illustrated in Fig. 3. The
process is described in the following. Graph pooling uses a learnable
projection vector $q\in\mathbb{R}^{d\times 1}$. The dot-product between the
input feature vector for each node $X_{n}\in\mathbb{R}^{1\times d}$ where,
$n\in N$, and $q$ gives projection scores $y_{n}$:
$y_{n}=X_{n}\cdot q,\vspace{0.1cm}$ (7)
Nodes in the input graph X corresponding to the top-$k$-hot vector
$y^{\prime}$ are then retained according to element-wise multiplication:
$\textrm{{X}}^{\prime}={\textrm{X}_{n_{idx}}}\odot\textrm{sigmoid}({y_{n_{idx}}}),$
(8)
where the pooling ratio $k$ is a hyperparameter, and where
$\textrm{X}_{n_{idx}}$ and ${y_{n_{idx}}}$ are the node features and
projection scores selected corresponding to the highest top-$k$ indices,
$idx$. All other nodes are purged. The complete process is illustrated in Fig.
3 for an input graph X with $4$ nodes, each of dimension $d=4$. Finally,
pooled graph representations
$\mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}$ and
$\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}$ are generated from
the original spectral $\mathcal{G^{\prime}}_{\textrm{{f}}}$ and temporal
$\mathcal{G^{\prime}}_{\textrm{{t}}}$ output graphs, respectively. Since
spectral and temporal pooled graphs
$\mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}$ and
$\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}$ have different
number of nodes, $14$ for
$\mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}$ and $23$ for
$\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}$. Hence, both graph
nodes are projected into the same dimensional space using an affine-transform
to match the input node dimensionality of the fusion layer.
### 4.4 Model-level fusion
Model-level fusion (ellipse in Fig. 1) is used to exploit complementary
information captured by the spectral and temporal attention graphs. We studied
three different approaches to model-level fusion :
$\mathcal{G}_{{\textbf{ft}}}=\left\\{\begin{aligned}
\mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}&\oplus&\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}\\\
\mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}&\odot&\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}\\\
\mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}&\
||&\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}\end{aligned}\right.$
(9)
where the fused graph
$\mathcal{G}_{\textbf{ft}}\in\mathbb{R}^{{N_{\textbf{ft}}}\times{d_{\textbf{ft}}}}$
is generated from one of the fusion approaches in Eq. 9. It acts to combine
the spectral pooled graph
$\mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}$ with the temporal
pooled graph $\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}$. A
fused graph $\mathcal{G}_{\textbf{ft}}$ contains a set of $12$ nodes and
feature dimensionality $d_{\textbf{ft}}=32$. The three different operators in
Eq. 9 are element-wise addition $\oplus$, multiplication $\odot$ and
concatenation $||$. A third GAT layer is then applied to
$\mathcal{G}_{{\textbf{ft}}}$ to produce output graph
$\mathcal{G^{\prime}}_{\textbf{ft}}\in\mathbb{R}^{N_{\textbf{ft}}\times
d^{\prime}_{\textbf{ft}}}$, where $d^{\prime}_{\textbf{ft}}=16$ is the output
feature dimensionality. Graph pooling is then applied one last time to
generate a pooled graph
$\mathcal{G^{\prime}}_{\textbf{ft}_{\textrm{pooled}}}$. The final two-class
prediction (bona fide or spoofed) is then obtained using projection and output
layers.
## 5 Experimental setup
Described in this section are the database, metrics and baseline systems used
for our experiments, together with specific implementation details of the
RawGAT-ST model.
### 5.1 Database and evaluation metric
Experiments were performed on the ASVspoof 2019 logical access (LA) database
[42, 43]. It has three independent partitions: train; development; evaluation.
Spoofed speech is generated using a set of different speech synthesis and
voice conversion algorithms [42]. The training and development partitions were
created with a set of 6 different attacks (A01-A06), whereas the evaluation
set was created with a set of 13 attacks (A07-A19). We used the minimum
normalised tandem detection cost function (t-DCF) [44, 45] as a primary metric
but also report results in terms of the pooled equal error rate (EER) [46].
### 5.2 Baseline
The baseline is an end-to-end RawNet2 system [12]. It is among the best-
performing, reproducible solutions. The first sinc layer is initialised with a
bank of 128 mel-scaled filters. Each filter has an impulse response of 129
samples ( 8 ms duration) which is convolved with the raw waveform. The latter
are truncated or concatenated to give segments of approximately $4$ seconds
duration (64,600 samples). It is followed by a residual network and a gated
recurrent unit (GRU) to predict whether the input audio is bona fide or
spoofed speech. Full details of the baseline system are available in [12].
Our temporal and spectral GAT systems introduced in [13] are not used as
baselines in this work since they are not E2E systems; unlike the spectro-
temporal GAT system introduced in this paper, they operate upon hand-crafted
features. Nonetheless, we do report results for E2E temporal and spectral GAT
solutions which are based upon the appropriate sub-blocks illustrated in Fig.
1. Use of these temporal and spectral GAT variants is necessary in order that
differences in performance can be attributed solely to use of the proposed
spectro-temporal GAT model and not also from differences in the first network
layer. Details are described in Section 6.2.
### 5.3 RawGAT-ST implementation
In contrast to the baseline RawNet2 system and in order to reduce
computational complexity, we reduced the number of filters in the first layer
to $70$. To improve generalisation, we added channel masking in similar
fashion to the frequency masking [47, 14, 48] to mask (set to zero) the output
of a random selection of contiguous sinc channels during training. The same
channel mask is applied to all training data within each mini-batch. The
number of masked channels is chosen from a uniform distribution between $0$
and $F_{\textrm{mask}}$, where $F_{\textrm{mask}}=14$ is the maximum number of
masked channels selected based on minimum validation loss. While attention
helps the model to focus on the most discriminative spectral sub-bands and
temporal segments, channel masking improves generalization by ensuring that
information at all sub-bands and segments is used at least to some extent. In
contrast to usual practice, we also use fewer filters ($32$ and $64$) in the
first and second residual blocks to further protect generalisation to unseen
attacks [49]. Graph pooling is applied with empirically selected pooling
ratios of $k$ = 0.64, 0.81, and 0.64 for spectral, temporal and spectro-
temporal attention blocks respectively.
The complete architecture is trained using the ASVspoof 2019 LA training
partition to minimise a weighted cross entropy (WCE) loss function, where the
ratio of weights assigned to bonafide and spoofed trials are 9:1 to manage the
data imbalance in the training set. We used the standard Adam optimiser [50]
with a mini-batch size of $10$ and a fixed learning rate of $0.0001$ and train
for $300$ epochs. The feature extractor and back-end classifier are jointly
optimised using back-propagation [51]. The best model was selected based on
the minimum validation loss (loss on development set). The spectro-temporal
GAT model has only 0.44M parameters and is comparatively light weight compared
to the baseline as well as other state of the art systems. All experiments
were performed on a single GeForce RTX 3090 GPU and reproducible with the same
random seed and GPU environment using an open source implementation
111https://github.com/eurecom-asp/RawGAT-ST-antispoofing.
## 6 Experimental Results
In this section, we present our results, an ablation study and a comparison of
our results to those of existing, state-of-the-art single systems.
Table 2: Results for the ASVspoof 2019 logical access (LA) database in terms of min t-DCF for each attack in the evaluation partition (A07-A19). Pooled min t-DCF (P1) and pooled EER (P2) are shown in the last two columns. Results shown for the end-to-end RawNet2 baseline system and the three RawGAT-ST based systems introduced in this paper. System | A07 | A08 | A09 | A10 | A11 | A12 | A13 | A14 | A15 | A16 | A17 | A18 | A19 | P1 | P2
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---
RawNet2-baseline [12, 13] | .098 | .179 | .073 | .089 | .042 | .088 | .020 | .013 | .073 | .046 | .240 | .629 | .058 | 0.1547 | 5.54
RawGAT-ST-add | .011 | .030 | .004 | .016 | .009 | .019 | .007 | .007 | .014 | .027 | .053 | .104 | .023 | 0.0373 | 1.15
RawGAT-ST-concat | .021 | .027 | .003 | .027 | .008 | .029 | .015 | .008 | .022 | .029 | .046 | .120 | .022 | 0.0388 | 1.23
RawGAT-ST-mul | .010 | .016 | .002 | .012 | .010 | .010 | .010 | .009 | .009 | .023 | .055 | .080 | .024 | 0.0335 | 1.06
### 6.1 Results
Results are illustrated in Table 2, where the last two columns P1 and P2
indicate pooled min t-DCF and pooled EER results for the baseline system
(RawNet2) and three different configurations of the new RawGAT-ST system. The
variants involve the use of different spectro-temporal fusion strategies.
Whereas all RawGAT-ST systems outperform the baseline by a substantial margin,
the best result is obtained using the RawGAT-ST-mul system for which the t-DCF
is 0.0335 (cf. 0.1547 for the baseline) and the EER is 1.06% (5.54%).
These results show that all RawGAT-ST systems are effective in exploiting
spectro-temporal attention and to model the relationships between different
spectro-temporal estimates, thereby improving the discrimination between
spoofed and bona fide inputs. We now seek to demonstrate the merit of early
fusion at the model level, rather than late fusion at the score level. This is
done by way of ablation experiments.
### 6.2 Ablation study
Only through ablation experiments can we properly demonstrate the merit of the
RawGAT-ST approach; we cannot use results from our previous work [13] since
they were generated using hand-crafted features. Through ablation, we
essentially remove one of the blocks or operations in the full RawGAT-ST
architecture illustrated in Fig. 1. The remaining blocks and operations are
then used as before. Results are illustrated in Table 3. The middle row
highlighted in boldface is the RawGAT-ST-mul result that is also illustrated
in Table 2.
Ablation of the spectral GAT attention block (top left in Fig. 1) leaves the
system being capable of exploiting only temporal attention. Without spectral
attention (first row of Table 3), performance degrades by 34% relative to the
full system (0.0514 cf. 0.0335). The degradation without temporal attention
(0.0385) is less severe (13% relative), indicating the greater importance of
spectral attention versus temporal attention, even if both are beneficial.
Last, we demonstrate the benefit of graph pooling by ablating the pooling
layers in all three blocks. The relative degradation in performance of 58%
(0.0788 cf. 0.0335) is even more substantial and shows the benefit of using
graph pooling to concentrate on the most informative node features.
Table 3: Results for ablation studies System | min-tDCF | EER
---|---|---
w/o spectral attention | 0.0514 | 1.87
w/o temporal attention | 0.0385 | 1.13
w/ spectro-temporal attention | 0.0335 | 1.06
w/o graph pooling | 0.0788 | 2.47
### 6.3 Performance comparison
Illustrated in Table 4 is a comparison of performance for the proposed RawGAT-
ST system and competing single systems reported in the literature [52]. The
comparison shows that our system which uses GATs with self attention
outperforms alternative attention approaches such as: Convolutional Block
Attention Module (CBAM); Squeeze-and-Excitation (SE); Dual attention module
with pooling and convolution operations. Furthermore, to the best of our
knowledge, our approach is the best single model system reported in the
literature to date. Our system is also one of only two that operates on the
raw signal. With only 0.44M parameters, the proposed RawGAT-ST system is also
among the least complex; only the Res-TSSDNet (0.35M) [36] and LCNN-LSTM-sum
(0.27M) [53] have fewer parameters, while our system performs better. Despite
the simplicity, the RawGAT-ST system outperforms our previous best temporal
GAT system with late score fusion [13] (row 12 in Table 4) by 63% and 77%
relative in terms of min t-DCF and EER respectively. This result also points
towards the benefit of operating directly upon the raw signal in fully end-to-
end fashion.
Table 4: Performance for the ASVspoof 2019 evaluation partition in terms of pooled min t-DCF and pooled EER for different state-of-the-art single systems and the best performing RawGAT-ST-mul system (boldface). Only the top two RawGAT-ST and Res-TSSDNet systems operate directly upon raw inputs; all others use some form of hand-crafted representations. System | front-end | min-tDCF | EER
---|---|---|---
RawGAT-ST (mul) | Raw-audio | 0.0335 | 1.06
Res-TSSDNet [36] | Raw-audio | 0.0481 | 1.64
MCG-Res2Net50+CE [54] | CQT | 0.0520 | 1.78
ResNet18-LMCL-FM [14] | LFB | 0.0520 | 1.81
LCNN-LSTM-sum [53] | LFCC | 0.0524 | 1.92
Capsule network [55] | LFCC | 0.0538 | 1.97
Resnet18-OC-softmax [56] | LFCC | 0.0590 | 2.19
MLCG-Res2Net50+CE [54] | CQT | 0.0690 | 2.15
SE-Res2Net50 [57] | CQT | 0.0743 | 2.50
LCNN-Dual attention [58] | LFCC | 0.0777 | 2.76
Resnet18-AM-Softmax [56] | LFCC | 0.0820 | 3.26
ResNet18-GAT-T [13] | LFB | 0.0894 | 4.71
GMM [11] | LFCC | 0.0904 | 3.50
ResNet18-GAT-S [13] | LFB | 0.0914 | 4.48
PC-DARTS [59] | LFCC | 0.0914 | 4.96
Siamese CNN [60] | LFCC | 0.0930 | 3.79
LCNN-4CBAM [58] | LFCC | 0.0939 | 3.67
LCNN+CE [61] | DASC-CQT | 0.0940 | 3.13
LCNN [62] | LFCC | 0.1000 | 5.06
LCNN+CE [63] | CQT | 0.1020 | 4.07
ResNet [64] | CQT-MMPS | 0.1190 | 3.72
## 7 Conclusions
Inspired from previous findings which show that different attention mechanisms
work more or less well for different forms of spoofing attack, we report in
this paper a novel graph neural network approach to anti-spoofing and speech
deepfake detection based on model-level spectro-temporal attention.
The RawGAT-ST solution utilises a self attention mechanism to learn the
relationships between different spectro-temporal estimates and the most
discriminative nodes within the resulting graph. The proposed solution also
operates directly upon the raw waveform, without the use of hand-crafted
features, and is among the least complex of all solutions reported thus far.
Experimental results for the standard ASVspoof 2019 logical access database
show the success of our approach and are the best reported to date by a
substantial margin. Results for an ablation study show that spectral attention
is more important than temporal attention, but that both are beneficial, and
that graph pooling improves performance substantially. Last, a comparison of
different systems, working either on the raw signal or hand-crafted inputs
show the benefit of a fully end-to-end approach.
We foresee a number of directions with potential to improve performance
further. These ideas include the use of learnable pooling ratios to optimise
the number of node features retained after graph pooling and the use of a
learnable weighted selective fusion module to dynamically select the most
discriminative features from spectral and temporal attention networks. Working
with the latest ASVspoof 2021 challenge database [65], these ideas are the
focus of our ongoing work.
## 8 Acknowledgements
This work is supported by the VoicePersonae project funded by the French
Agence Nationale de la Recherche (ANR) and the Japan Science and Technology
Agency (JST).
## References
* [1] M. Sahidullah, T. Kinnunen, and C. Hanilci, “A comparison of features for synthetic speech detection,” in Proc. of the International Speech Communication Association (INTERSPEECH), 2015, pp. 2087–2091.
* [2] K. Sriskandaraja, V. Sethu, P. Ngoc Le, and E. Ambikairajah, “Investigation of sub-band discriminative information between spoofed and genuine speech,” in Proc. INTERSPEECH, 2016, pp. 1710–1714.
* [3] M. Witkowski, S. Kacprzak, P. Zelasko, K. Kowalczyk, and J. Galka, “Audio replay attack detection using high-frequency features.,” in Proc. INTERSPEECH, 2017, pp. 27–31.
* [4] P. Nagarsheth, E. Khoury, K. Patil, and M. Garland, “Replay attack detection using DNN for channel discrimination.,” in Proc. INTERSPEECH, 2017, pp. 97–101.
* [5] L. Lin, R. Wang, and Y. Diqun, “A replay speech detection algorithm based on sub-band analysis,” in International Conference on Intelligent Information Processing (IIP), Nanning, China, 2018, pp. 337–345.
* [6] B. Chettri, D. Stoller, V. Morfi, M. A. M. Ramírez, E. Benetos, and B. L Sturm, “Ensemble models for spoofing detection in automatic speaker verification,” in Proc. INTERSPEECH, 2019, pp. 1118–1112.
* [7] J. Yang, R. K Das, and H. Li, “Significance of subband features for synthetic speech detection,” IEEE Transactions on Information Forensics and Security, 2019.
* [8] S. Garg, S. Bhilare, and V. Kanhangad, “Subband analysis for performance improvement of replay attack detection in speaker verification systems,” in International Conference on Identity, Security, and Behavior Analysis (ISBA), 2019.
* [9] B. Chettri, T. Kinnunen, and E. Benetos, “Subband modeling for spoofing detection in automatic speaker verification,” in Proc. Speaker Odyssey Workshop, 2020.
* [10] H. Tak, J. Patino, A. Nautsch, N. Evans, and M. Todisco, “An explainability study of the constant Q cepstral coefficient spoofing countermeasure for automatic speaker verification,” in Proc. Speaker Odyssey Workshop, 2020, pp. 333–340.
* [11] H. Tak, J. Patino, A. Nautsch, et al., “Spoofing Attack Detection using the Non-linear Fusion of Sub-band Classifiers,” in Proc. INTERSPEECH, 2020, pp. 1106–1110.
* [12] H. Tak, J. Patino, M. Todisco, A. Nautsch, N. Evans, and A. Larcher, “End-to-end anti-spoofing with rawnet2,” in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2021.
* [13] H. Tak, J.-w. Jung, J. Patino, M. Todisco, and N. Evans, “Graph attention networks for anti-spoofing,” in Proc. INTERSPEECH, 2021.
* [14] T. Chen, A. Kumar, P. Nagarsheth, G. Sivaraman, and E. Khoury, “Generalization of audio deepfake detection,” in Proc. Speaker Odyssey Workshop, 2020, pp. 132–137.
* [15] J. Youngberg and S. Boll, “Constant-q signal analysis and synthesis,” in Proc. ICASSP, 1978, pp. 375–378.
* [16] J. Brown, “Calculation of a constant Q spectral transform,” Journal of the Acoustical Society of America (JASA), vol. 89, no. 1, pp. 425–434, 1991.
* [17] C. Schörkhuber, A. Klapuri, N. Holighaus, and M. Dörfler, “A matlab toolbox for efficient perfect reconstruction time-frequency transforms with log-frequency resolution,” in Proc. Audio Engineering Society International Conference on Semantic Audio, London, UK, 2014.
* [18] M. Todisco, H. Delgado, and N. Evans, “A new feature for automatic speaker verification anti-spoofing: Constant Q cepstral coefficients,” in Proc. Speaker Odyssey Workshop, 2016, pp. 249–252.
* [19] J. Jung, H. Heo, I. Yang, H. Shim, and H. Yu, “Avoiding speaker overfitting in end-to-end dnns using raw waveform for text-independent speaker verification,” in Proc. INTERSPEECH, 2018, pp. 3583–3587.
* [20] M. Ravanelli and Y. Bengio, “Speaker recognition from raw waveform with sincnet,” in IEEE Proc. Spoken Language Technology Workshop (SLT), 2018, pp. 1021–1028.
* [21] M. R Kamble, H. B Sailor, H. A Patil, and H. Li, “Advances in anti-spoofing: from the perspective of asvspoof challenges,” APSIPA Transactions on Signal and Information Processing, vol. 9, 2020.
* [22] J.-w. Jung, S.-b. Kim, H.-j. Shim, J.-h. Kim, and H.-J. Yu, “Improved RawNet with Filter-wise Rescaling for Text-independent Speaker Verification using Raw Waveforms,” in Proc. INTERSPEECH, 2020, pp. 1496–1500.
* [23] M. Gori, G. Monfardini, and F. Scarselli, “A new model for learning in graph domains,” in Proceedings. 2005 IEEE International Joint Conference on Neural Networks, 2005. IEEE, 2005, vol. 2, pp. 729–734.
* [24] F. Scarselli, M. Gori, A. C. Tsoi, M. Hagenbuchner, and G. Monfardini, “The graph neural network model,” IEEE transactions on neural networks, vol. 20, no. 1, pp. 61–80, 2009.
* [25] M. M Bronstein, J. Bruna, Y. LeCun, A. Szlam, and P. Vandergheynst, “Geometric deep learning: going beyond euclidean data,” IEEE Signal Processing Magazine, vol. 34, no. 4, pp. 18–42, 2017\.
* [26] W. L Hamilton, R. Ying, and J. Leskovec, “Inductive representation learning on large graphs,” in Proc. Conference on Neural Information Processing Systems (NIPS), 2017, pp. 1025–1035.
* [27] Z. Wu, S. Pan, F. Chen, G. Long, C. Zhang, and S Yu Philip, “A comprehensive survey on graph neural networks,” IEEE transactions on neural networks and learning systems, vol. 32, no. 1, pp. 4–24, 2020.
* [28] T. N. Kipf and M. Welling, “Semi-supervised classification with graph convolutional networks,” in International Conference on Learning Representations (ICLR), 2017\.
* [29] P. Veličković, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio, “Graph attention networks,” in Proc. ICLR, 2018.
* [30] S. Zhang, Y. Qin, K. Sun, and Y. Lin, “Few-shot audio classification with attentional graph neural networks.,” in INTERSPEECH, 2019, pp. 3649–3653.
* [31] R. Liu, B. Sisman, and H. Li, “Graphspeech: Syntax-aware graph attention network for neural speech synthesis,” in Proc. ICASSP, 2021.
* [32] J.-w. Jung, H.-S. Heo, H.-J. Yu, and J. S. Chung, “Graph attention networks for speaker verification,” in Proc. ICASSP, 2021.
* [33] P. Tzirakis, A. Kumar, and J. Donley, “Multi-channel speech enhancement using graph neural networks,” in Proc. ICASSP, 2021, pp. 3415–3419.
* [34] G. Klambauer, T. Unterthiner, A. Mayr, and S. Hochreiter, “Self-normalizing neural networks,” in Proc. NIPS, 2017, pp. 972–981.
* [35] S. Ioffe and C. Szegedy, “Batch normalization: Accelerating deep network training by reducing internal covariate shift,” in International Conference on Machine Learning (ICML), 2015, pp. 448–456.
* [36] G. Hua, A. Beng jin teoh, and H. Zhang, “Towards end-to-end synthetic speech detection,” IEEE Signal Processing Letters, 2021.
* [37] J.-w. Jung, H.-S. Heo, J.-h. Kim, H.-j. Shim, and H.-J. Yu, “Rawnet: Advanced end-to-end deep neural network using raw waveforms for text-independent speaker verification,” in Proc. INTERSPEECH, 2019, pp. 1268–1272.
* [38] T. F Quatieri, Discrete-time speech signal processing: principles and practice, Pearson Education, 2006.
* [39] J. R Deller Jr, J. G Proakis, and J. H Hansen, Discrete time processing of speech signals, Prentice Hall PTR, 1993.
* [40] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proc. CVPR, 2016, pp. 770–778.
* [41] H. Gao and S. Ji, “Graph u-nets,” in international conference on machine learning (PMLR), 2019, pp. 2083–2092.
* [42] X. Wang, J. Yamagishi, M. Todisco, H. Delgado, A. Nautsch, N. Evans, M. Sahidullah, V. Vestman, T. Kinnunen, K. A Lee, et al., “ASVspoof 2019: a large-scale public database of synthetized, converted and replayed speech,” Computer Speech & Language (CSL), vol. 64, 2020, 101114\.
* [43] M. Todisco, X. Wang, V. Vestman, M. Sahidullah, H. Delgado, A. Nautsch, et al., “ASVspoof 2019: Future horizons in spoofed and fake audio detection,” in Proc. INTERSPEECH, 2019, pp. 1008–1012.
* [44] T. Kinnunen, K. Lee, H. Delgado, N. Evans, M. Todisco, J. Sahidullah, M.and Yamagishi, and D. A Reynolds, “t-DCF: A detection cost function for the tandem assessment of spoofing countermeasures and automatic speaker verification,” in Proc. Speaker Odyssey Workshop, 2018, pp. 312–319.
* [45] T. Kinnunen, H. Delgado, N. Evans, K. A. Lee, V. Vestman, A. Nautsch, M. Todisco, X. Wang, M. Sahidullah, J. Yamagishi, and D. A. Reynolds, “Tandem assessment of spoofing countermeasures and automatic speaker verification: Fundamentals,” IEEE/ACM Transactions on Audio Speech and Language Processing (TASLP), vol. 28, pp. 2195 – 2210, 2020.
* [46] N. Brümmer and E. de Villiers, “The BOSARIS toolkit user guide: Theory, algorithms and code for binary classifier score processing,” 2011.
* [47] D. S Park, W. Chan, Y. Zhang, C.-C. Chiu, B. Zoph, E. D Cubuk, and Q. V Le, “Specaugment: A simple data augmentation method for automatic speech recognition,” in Proc. INTERSPEECH, 2019, pp. 2613–2617.
* [48] H. Wang, Y. Zou, and W. Wang, “Specaugment++: A hidden space data augmentation method for acoustic scene classification,” in Proc. INTERSPEECH, 2021.
* [49] P. Parasu, J. Epps, K. Sriskandaraja, and G. Suthokumar, “Investigating light-resnet architecture for spoofing detection under mismatched conditions,” in Proc. INTERSPEECH, 2020, pp. 1111–1115.
* [50] D. P Kingma and J. Ba, “Adam: A method for stochastic optimization,” arXiv preprint arXiv:1412.6980, 2014.
* [51] I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, MIT Press, 2016, http://www.deeplearningbook.org.
* [52] A. Nautsch, X. Wang, N. Evans, T. Kinnunen, V. Vestman, M. Todisco, H. Delgado, M. Sahidullah, J. Yamagishi, and K. A. Lee, “ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech,” IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM), vol. 3, 2021.
* [53] X. Wang and J. Yamagishi, “A comparative study on recent neural spoofing countermeasures for synthetic speech detection,” in Proc. INTERSPEECH, 2021.
* [54] X. Li, X. Wu, H. Lu, X. Liu, and H. Meng, “Channel-wise gated res2net: Towards robust detection of synthetic speech attacks,” in Proc. INTERSPEECH, 2021.
* [55] A. Luo, E. Li, Y. Liu, X. Kang, and Z J. Wang, “A capsule network based approach for detection of audio spoofing attacks,” in Proc. ICASSP, 2021, pp. 6359–6363.
* [56] Y. Zhang, F. Jiang, and Z. Duan, “One-class learning towards synthetic voice spoofing detection,” IEEE Signal Processing Letters, vol. 28, pp. 937–941, 2021.
* [57] X. Li, N. Li, C. Weng, X. Liu, D. Su, D. Yu, and H. Meng, “Replay and synthetic speech detection with res2net architecture,” in Proc. ICASSP, 2021, pp. 6354–6358.
* [58] X. Ma, T. Liang, S. Zhang, S. Huang, and L. He, “Improved lightcnn with attention modules for asv spoofing detection,” in 2021 IEEE International Conference on Multimedia and Expo (ICME), 2021, pp. 1–6.
* [59] W. Ge, M. Panariello, J. Patino, M. Todisco, and N. Evans, “Partially-Connected Differentiable Architecture Search for Deepfake and Spoofing Detection,” in Proc. INTERSPEECH, 2021.
* [60] Z. Lei, Y. Yang, C. Liu, and J. Ye, “Siamese convolutional neural network using gaussian probability feature for spoofing speech detection,” in Proc. INTERSPEECH, 2020, pp. 1116–1120.
* [61] R. K. Das, J. Yang, and H. Li, “Data augmentation with signal companding for detection of logical access attacks,” in Proc. ICASSP, 2021, pp. 6349–6353.
* [62] G. Lavrentyeva, S. Novoselov, A. Tseren, et al., “STC antispoofing systems for the ASVspoof2019 challenge,” in Proc. INTERSPEECH, 2019, pp. 1033–1037.
* [63] Z. Wu, R. K. Das, J. Yang, and H. Li, “Light convolutional neural network with feature genuinization for detection of synthetic speech attacks,” in Proc. INTERSPEECH, 2020, pp. 1101–1105.
* [64] J. Yang, H. Wang, R. K. Das, and Y. Qian, “Modified magnitude-phase spectrum information for spoofing detection,” IEEE/ACM TASLP, vol. 29, pp. 1065–1078, 2021.
* [65] J. Yamagishi, X. Wang, M. Todisco, M. Sahidullah, J. Patino, A. Nautsch, X. Liu, K. A. Lee, T. Kinnunen, N. Evans, and H. Delgado, “ASVspoof2021: accelerating progress in spoofed and deep fake speech detection,” in Proc. ASVspoof 2021 Workshop, 2021.
| arxiv-papers | 2021-07-27T10:11:41 | 2024-09-04T03:07:21.194041 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Hemlata Tak, Jee-weon Jung, Jose Patino, Madhu Kamble, Massimiliano\n Todisco and Nicholas Evans",
"submitter": "Hemlata Tak",
"url": "https://arxiv.org/abs/2107.12710"
} |
2107.12712 | ††thanks: These authors contributed equally to this work††thanks: These
authors contributed equally to this work††thanks: These authors contributed
equally to this work
# Gapless Spin Liquid Behavior in A Kagome Heisenberg Antiferromagnet
with Randomly Distributed Hexagons of Alternate Bonds
Jiabin Liu Wuhan National High Magnetic Field Center and School of Physics,
Huazhong University of Science and Technology, 430074 Wuhan, China Long Yuan
Wuhan National High Magnetic Field Center and School of Physics, Huazhong
University of Science and Technology, 430074 Wuhan, China Xuan Li Institute
of Physics, Chinese Academy of Sciences, P.O. Box 603, Beijing 100190, China
University of Chinese Academy of Sciences, Beijing 100049, China Boqiang Li
Wuhan National High Magnetic Field Center and School of Physics, Huazhong
University of Science and Technology, 430074 Wuhan, China Kan Zhao School of
Physics, Beihang University, Beijing 100191, China Haijun Liao
[email protected] Institute of Physics, Chinese Academy of Sciences, P.O.
Box 603, Beijing 100190, China Songshan Lake Materials Laboratory, Dongguan,
Guangdong 523808, China Yuesheng Li [email protected] Wuhan National
High Magnetic Field Center and School of Physics, Huazhong University of
Science and Technology, 430074 Wuhan, China
###### Abstract
We demonstrate that the new single crystal of YCu3[OH(D)]6.5Br2.5 (YCOB) is a
kagome Heisenberg antiferromagnet (KHA) without evident orphan spins ($\ll$
0.8%). The site mixing between polar OH- and non-polar Br- causes local
distortions of Cu-O-Cu exchange paths, and gives rise to 70(2)% of randomly
distributed hexagons of alternate bonds ($\sim$ $J_{1}-\Delta J$ and
$J_{1}+\Delta J$) and the rest of almost uniform hexagons ($\sim$ $J_{1}$) on
the kagome lattice. Simulations of the random exchange model with $\Delta
J$/$J_{1}$ = 0.7(1) show good agreement with the experimental observations,
including the weak upturn seen in susceptibility and the slight polarization
in magnetization. Despite the average antiferromagnetic coupling of $J_{1}$
$\sim$ 60 K, no conventional freezing is observed down to $T$ $\sim$
0.001$J_{1}$, and the raw specific heat exhibits a nearly quadratic
temperature dependence below 1 K $\sim$ 0.02$J_{1}$, phenomenologically
consistent with a gapless (spin gap $\leq$ 0.025$J_{1}$) Dirac quantum spin
liquid (QSL). Our result sheds new light on the theoretical understanding of
the randomness-relevant gapless QSL behavior in YCOB, as well as in other
relevant materials.
## I Introduction
The search for quantum spin liquid (QSL) has become one of the central topics
in the fields spanning experiment and theory since Anderson’s initial proposal
[1]. QSLs are intimately related to the realizing of the topological quantum
computation [2] and the understanding of the high temperature
superconductivity [3] due to exotic fractional excitations [4] and other
emergent properties [5, 6, 7, 8]. The $S$ = $\frac{1}{2}$ kagome Heisenberg
antiferromagnet (KHA) [9, 10, 11, 12, 13, 14, 15, 16, 17] is one of the most
promising candidates hosting QSLs. Despite recent progress, the precise nature
of the QSL in the KHA remains elusive. Previous density-matrix renormalization
group (DMRG) studies imply a fully gapped $\mathbb{Z}_{2}$ QSL ground state
(GS) [16, 17], but variational Monte Carlo [11, 18, 19], tensor network [12],
and more recent DMRG [13] calculations suggest a gapless Dirac QSL.
Experimentally, many prominent $S$ = $\frac{1}{2}$ KHAs have been extensively
studied, including ZnCu3(OH)6Cl2 (herbertsmithite) [20, 21, 22, 23, 24, 25,
26, 27, 28], $\alpha$-Cu3Zn(OH)6Cl2 (kapellasite) [29, 30], Cu3Zn(OH)6FBr [31,
32], [NH4]2[C7H14N][V7O6F18] [33, 34], (CH3NH3)2NaTi3F12 [35], ZnCu3(OH)6SO4
[36, 37, 38], etc. They show no conventional magnetic transitions down to the
lowest measuring temperature, despite the strong exchange couplings. However,
most of these candidates suffer from 4–27% of magnetic defects [28, 30, 25,
31, 34, 35, 36]. Orphan spins created by these magnetic defects contribute a
pronounced Curie-like tail of magnetic susceptibility [22, 34] and Schottky-
like anomaly of specific heat [23, 34] at low temperatures ($\leq$ 100 K), and
thus prevent us from probing the intrinsic low-energy properties [39].
Therefore, achieving ultrahigh-quality materials is still the key challenge
for the study of kagome QSLs [6].
Recently, a new kagome QSL candidate, nondeuterated YCu3(OH)6.5Br2.5, had been
successfully synthesized [40] by Chen _et al._ The magnetic Cu2+ ($S$ =
$\frac{1}{2}$) ions were expected to fully occupy the regular kagome sites,
and be free from the site mixing with other nonmagnetic ions [40]. Despite the
strong antiferromagnetic coupling, YCu3[OH(D)]6.5Br2.5 (YCOB) exhibits no
magnetic transition down to 50 mK [40, 41]. However, the low-energy magnetism
of this promising QSL candidate YCOB remains poorly understood.
In this paper, we report a comprehensive study of the frustrated magnetism on
the high-quality single crystal of YCOB, including sub-kelvin thermodynamic &
electron spin resonance (ESR) measurements and microscopic modeling by density
functional theory (DFT) and state-of-the-art quantum many-body computations.
The nonsymmetric distribution of OH-/Br- pushes 70(2)% of Y3+ away from its
ideal position, and gives rise to two alternate local distortions of the Cu-O-
Cu superexchange paths ($\sim$ $J_{1}-\Delta J$ and $J_{1}+\Delta J$) around
the hexagons on the kagome lattice, whereas the rest of symmetric local
environments result in nearly uniform hexagons ($\sim$ $J_{1}$). Through
fitting the magnetic susceptibilities, we find a profound fluctuation of the
exchange couplings, $\Delta J$/$J_{1}$ $\sim$ 0.7. The weak upturn in the
low-$T$ susceptibility and the slight polarization in magnetization originate
from the local moments induced by the bond randomness. Despite the average
antiferromagnetic interaction of $J_{1}$ $\sim$ 60 K, no magnetic freezing is
found down to 50 mK [41] $\sim$ 0.001$J_{1}$. Below $\sim$ 0.02$J_{1}$, the
specific heat exhibits a nearly quadratic temperature dependence, which is
phenomenologically consistent with the predictions of a gapless U(1) Dirac QSL
or a $\mathbb{Z}_{2}$ QSL with a gap less than 0.025$J_{1}$. We argue that the
bond randomness is a critical ingredient for the gapless QSL behavior observed
in YCOB, as well as in other relevant materials.
Figure 1: (Color online) (a) The experimental lattice structure of YCOB. (b,
c) Optimized crystal structures for supercells containing the symmetric (s)
and nonsymmetric (n) environments, respectively. The nonsymmetric environments
(probability $\sim$ 70%) cause the deviations of Y3+ from its ideal positions
(green arrows) and the alternate superexchanges (alternate $\angle$CuOCu are
marked in c) along the hexagons on the kagome lattice of Cu2+. (d) Sketch of
the model no.2 with $\sim$ 30% of uniform hexagons (green) and $\sim$ 70% of
randomly distributed hexagons of alternate bonds (blue and red). Real part of
the ac susceptibilities measured on YCOB along the $ab$ plane (e) and $c$ axis
(f), respectively. The dashed and solid lines present the dc susceptibilities
measured at 0.01 T under zero-field cooling (ZFC) and field cooling (FC),
respectively.
## II Experimental Details
We performed a recrystallization in a temperature gradient of $\sim$ 2 ∘C/cm
for a month, and obtained transparent green single crystals of YCOB (typical
size 3$\times$3$\times$0.3 mm) (see Appendix A). Magnetization up to 14 T and
dc/ac susceptibilities down to 1.8 K were measured in a physical property
measurement system (PPMS) and a magnetic property measurement system,
respectively. The specific heat down to 0.36 K 111The Schottky anomaly of the
H and D nuclear spins can appear in $C_{\mathrm{p}}$ below $\sim$ 0.2 K [41,
86, 36], and the temperature of 0.36 K $\sim$ 0.006$J_{1}$ is low enough for
YCOB that the entropy flattens out at $S_{\mathrm{m}}$ $<$ 1.3%$R$ln 2 [see
Fig. 15(d)]. was measured in a PPMS using a 3He refrigerator. The ESR spectra
were measured on continuous wave spectrometers at x-band frequencies ($\sim$
9.7 GHz).
Figure 2: (a) Magnetization measured at 2 K on the YCOB single crystal with
the magnetic fields applied parallel and perpendicular to the $c$ axis. The
green lines present the Brillouin fits [see Eq. (5)]. (b) Raw specific heat of
YCOB measured in selected magnetic fields applied along the $c$ axis, with the
lines showing the calculated Schottky functions for 0.8% of free spins [see
Eq. (6)]. (c) The difference between the zero- and nonzero-field specific
heat. The dashed lines show the calculations of 0.8% of free spins, whereas
the solid lines present the 21-site FLD calculations of the random model no.2
that is valid above $\sim$ 0.1$J_{1}$ $\sim$ 7 K. (d) Magnetic
susceptibilities of YCOB measured at 1 T applied along the $ab$ plane and $c$
axis (cross). The hollow scatters show the data obtained by subtracting the
Brillouin functions for 0.75% and 0.80% of “free spins” (colored lines) from
the corresponding raw susceptibilities.
The DFT$+U$ calculations were performed in the Vienna Ab initio Simulation
Package (VASP) [43, 44] (see Appendix B). We carried out the finite-
temperature Lanczos diagonalization (FLD) simulations for the thermodynamic
properties of YCOB, as well as the local susceptibility
$\chi_{i}^{\mathrm{loc}}$ and correlation function. The FLD calculations were
conducted on the 18-, 21-, 24-, and 27- site KHA clusters with periodic
boundary conditions (PBC), we excluded the thermodynamic data calculated below
$T_{\mathrm{min}}$ in the main text, where the finite-size effect is
significant (see Appendix C). We fit the experimental data by minimizing the
residual function,
$R_{p}=\sqrt{\frac{1}{N_{0}}\sum_{i}(\frac{X_{i}^{\mathrm{obs}}-X_{i}^{\mathrm{cal}}}{\sigma_{i}^{\mathrm{obs}}})^{2}},$
(1)
where $N_{0}$, $X_{i}^{\mathrm{obs}}$ and $\sigma_{i}^{\mathrm{obs}}$ are the
number of the data points, the observed value and its standard deviation,
respectively, whereas $X_{i}^{\mathrm{cal}}$ is the calculated value. The
international system of units is used throughout this work.
## III Results and Discussion
### III.1 Exchange Hamiltonian
Fig. 1(a) shows the crystal structure of YCOB, where the magnetic Cu2+ ($S$ =
$\frac{1}{2}$) ions occupy the 3$f$ Wyckoff position of the space group
$P$3̄$m$1, and form the kagome lattice [see Fig. 1(d)]. The site mixing
between the magnetic Cu2+ (ionic radius $r_{\mathrm{Cu}^{2+}}$ = 0.73 Å) and
other nonmagnetic ions, i.e., Y3+ ($r_{\mathrm{Y}^{3+}}$ = 0.90 Å), H(D)+,
O2-, Br-, is unlikely due to the large chemical differences, which has been
confirmed by single-crystal x-ray diffraction (XRD) [40, 41].
From the Curie-Weiss fitting, we get the Curie-Weiss temperatures
$\theta_{\perp}$ = $-$57.5(4) K and $\theta_{\parallel}$ = $-$58.7(3) K (see
Figs. 3 and 7), which indicate a strong antiferromagnetic exchange coupling,
$J_{1}$ $\sim$ 60 K [40]. A weak upturn is found in the susceptibilities below
$\sim$ 30 K $\sim$ 0.5$J_{1}$ [see Figs. 1(e) and 1(f)], which speaks against
the simplest nearest-neighbor (NN) KHA model (see Fig. 3) 222Because the ideal
NN KHA exhibits a broad peak in susceptibility at $T_{\mathrm{p}}$ $\sim$
0.154$J_{1}$ $\sim$ 9 K, and suggests the existence of net magnetic moments.
Unlike many other kagome QSL candidates [22, 36], e.g., ZnCu3(OH)6Cl2, the
model of conventional orphan spins fails to explain all the low-$T$
thermodynamic observations (see Fig. 2), which suggests the concentration of
orphan spins is much lower than 0.8% in YCOB (see Appendix C). Therefore, the
low-$T$ behaviors are governed by the intrinsic properties of the specific KHA
of YCOB, which deviates from the ideal NN KHA.
To understand the frustrated magnetism of the KHA YCOB, we consider the
following spin-1/2 Hamiltonian in an applied magnetic field of $\mathbf{H}$,
$\mathcal{H}=\sum_{\langle
ij\rangle}J_{1,ij}\mathbf{S}_{i}\cdot\mathbf{S}_{j}-\mu_{0}\mu_{\mathrm{B}}\mathbf{H}\cdot\mathbf{g}\cdot\sum_{i}\mathbf{S}_{i}+\mathcal{H^{\prime}},$
(2)
where $\mathbf{g}$ is the diagonal matrix of $g$ factor with $g_{\perp}$ =
2.18(1) and $g_{\parallel}$ = 2.19(1) determined by fitting the magnetic
susceptibility data (see Fig. 3), and $\mathcal{H^{\prime}}$ represents
symmetry-allowed perturbations, including the Dzyaloshinsky-Moriya (DM)
interaction [46, 47], further-neighbor couplings [48], XXZ anisotropy [49],
etc.
Figure 3: (Color online) Combined fits to the raw susceptibilities measured on
YCOB along the $ab$ plane (a) and $c$ axis (b), respectively, using models
nos.1 (ideal KHA) and 2 (with randomly distributed hexagons of alternate
bonds). The dashed lines show the Curie-Weiss fits above 150 K. The inset of
(a) presents the deviation $R_{p}$ of using model no.2, with the dotted white
line showing the optimized parameters. The vertical dashed line presents the
occupancy fraction of Y1 from XRD, $f_{\mathrm{Y}1}$ = 0.30(2), and the
horizontal line displays the bond randomness ($\Delta J$/$J_{1}$) calculated
by DFT$+U$ in the OH-OH configuration [Fig. 1 (c)]. The circle shows the
optimized value, $\Delta J$/$J_{1}$ = 0.7(1). The upper inset of (b) presents
the magnetization measured at 2 K, with showing the 18- and 21-site FLD
calculations of model no.2. The dashed straight line marks a linear
dependence. The lower inset of (b) displays the measured magnetic anisotropy
($\chi_{\parallel}$/$\chi_{\perp}$).
Starting with the simplest NN KHA (see Fig. 3 for model no.1), we fit the
magnetic susceptibilities ($\chi_{\perp}$ and $\chi_{\parallel}$) measured on
YCOB above $\sim$ 0.1$J_{1}$ $\sim$ 7 K, and find $J_{1}$ = 61.6 K with the
least $R_{p}$ $\sim$ 3.3 [50]. However, the weak upturn of $\chi_{\perp}$ and
$\chi_{\parallel}$ below $\sim$ 30 K is poorly understood (see Fig. 3).
The measured magnetic anisotropy, $\chi_{\parallel}$/$\chi_{\perp}$, only
increases by $\sim$ 4% from $T$ $\sim$ $J_{1}$ down to 1.8 K $\sim$
0.03$J_{1}$ [see the lower inset of Fig. 3(b)], suggesting that the
interaction anisotropy isn’t critical in YCOB due to the weak spin-orbit
coupling of the 3$d$ electrons. Based on the DFT+$U$ calculation, we find that
both further-neighbor and interlayer exchange couplings are negligible, which
are less than 4% of $J_{1}$ (highly similar to the sibling YCu3(OH)6Cl3 [47]).
Therefore, we mainly restrict ourselves to the effective models with only NN
Heisenberg couplings at this stage.
In YCOB, the site mixing between OH- and Br- occurs around the ideal Y3+ site
(Wyckoff position 1$b$ at the center of each hexagon on the kagome lattice of
Cu2+), based on the XRD [40, 41]. Although OH- and Br- have the same net
charge, OH- is polar, and causes local distortions that may have a strong
influence on the exchange couplings. To go beyond the average structure from
XRD, we performed the DFT calculations by constructing various OH/Br
configurations (with H) to simulate this site mixing. In the symmetric (e.g.,
Br-Br) configurations, the center of inversion is located at 1$b$ [see Fig.
1(b)], and Y3+ occupies its ideal position with a statistical probability
$f_{\mathrm{Y}1}$ = 30(2)% from XRD (see Table 1) [40]. In contrast, the other
nonsymmetric OH/Br configurations, e.g., OH-OH, push Y3+ away from its ideal
position, $\Delta z_{\mathrm{Y}2}$ $\sim$ 0.1$c$ $\sim$ 0.6Å, well consistent
with the XRD result [see Figs. 1(a) and 1(c)]. More importantly, the
nonsymmetric configurations give rise to the alternate bond angles
$\angle$CuOCu along the hexagons of the kagome lattice [see Fig. 1(c)].
Therefore, $1-f_{\mathrm{Y}1}$ = 70(2)% of randomly distributed hexagons with
alternate bonds ($\sim$ $J_{1}-\Delta J$ and $J_{1}+\Delta J$) should be
expected on the kagome lattice of YCOB [see Fig. 1(d)] [51].
Figure 4: (Color online) (a) ESR intensities of YCOB. The color lines present
the Curie-Weiss fits, and the inset shows the ESR spectrum measured at 6 K
along the $c$ axis. (b) Magnetic specific heat calculated by using model no.2
($\Delta J$/$J_{1}$ = 0.7) on various size KHA clusters, with the experimental
total specific heat for comparison. (c) Raw specific heat of YCOB measured at
0 T. The blue and black lines present the power-law and quadratic behaviors,
respectively. The inset shows the Brillouin zone of the mean-field Ansatz on
the kagome lattice, and the circles mark the positions of the Dirac nodes. (d)
Raw specific heat measured in selected magnetic fields applied along the $c$
axis. The thin and thick lines display the fittings below 1 K, using the U(1)
and $\mathbb{Z}_{2}$ mean-field Ansatz, respectively. (e) Band structure of
the U(1) Dirac QSL at $h$ = 0. The field of 6 T splits the zero-field bands
(green) into the spin-up ($\uparrow$, blue) and spin-down ($\downarrow$, red)
bands. (f) Band structure of the $\mathbb{Z}_{2}[0,\pi]\beta$ QSL in the Nambu
representation at $h$ = 0. The zero-field spin gap is marked.
We further conduct the DFT$+U$ calculation to estimate the exchange couplings
for YCOB, and find that the fluctuation of these alternate bonds, $\Delta
J$/$J_{1}$, is strong, ranging from 0 to $\sim$ 1.3 (see Appendix B).
According to the simplified model of the crystal structure [see Fig. 1(a)], we
construct a simple KHA model (no.2) with $1-f_{\mathrm{Y}1}$ = 70% of randomly
distributed hexagons of alternate bonds and the rest of almost uniform
hexagons on the kagome lattice, as illustrated in Fig. 1(d). The real
situation of YCOB may be more complicated, but one always seeks to explain the
bulk of experimental observations within the minimum model that captures the
essential physics.
Using the model no.2, we are able to fit the experimental susceptibilities
very well at $J_{1}$ = 50(1) K and $\Delta J$/$J_{1}$ = 0.7(1) with a
significantly reduced $R_{p}$ = 1.4(1) (see Fig. 3). The finite-size effect is
trivial in the model no.2 [see Figs. 3 and 4(b)], and both the weak upturn
below $\sim$ 0.5$J_{1}$ and the broad hump at $\sim$ $J_{1}$ can be
excellently reproduced. In contrast, the complete and continuous randomness of
$J_{1}$ and $g$ with a Lorentzian distribution [52, 53] fails to fit the
experimental susceptibilities (see Fig. 13). Besides that, the model no.2 also
well simulates the slight polarization seen in the low-$T$ magnetization
without any parameter tuning [the upper inset of Fig. 3(b)]. These
observations strongly support the formation of effective $\sim$ 0.8% (see Fig.
2) of local moments due to the bond randomness (see Fig. 4) [54, 55, 56, 57].
The temperature dependence of the ESR intensity shows a Curie-Weiss behavior
with the Curie-Weiss temperatures, $\theta_{\perp}^{\mathrm{ESR}}$ = $-$12(2)
K and $\theta_{\parallel}^{\mathrm{ESR}}$ = $-$16(4) K [Figs. 4(a) and 9(d)],
suggesting the ESR lines may originate from the nearly free local moments
induced by the bond randomness [58]. Moreover, the ESR spectra of YCOB are so
narrow that the hyperfine structures are clearly visible (see Fig. 8),
implying that the weak coupling between the randomness-induced moments may be
nearly isotropic Heisenberg [46].
It is worth to note that the nearly free local moments induced by bond
randomness in YCOB are from the nontrivial many-body correlations and random-
singlet physics (see Fig. 4) [57, 54, 59, 58], which is essentially different
from the trivial “orphan” spins observed in other existing kagome QSL
candidate materials. Above 0.02$J_{1}$ $\sim$ 1 K, the theory of the scaling
collapse recently proposed by Kimchi et al. [60] is applicable to YCOB,
confirming the formation of random-singlet state. However, below $\sim$ 1 K
the raw zero-field specific heat shows a power-law behavior $C_{\mathrm{p}}$
$\propto$ $T^{\alpha}$ with $\alpha$ = 2.31(1) $>$ 1 [Fig. 4(c)] and the
existing theories obviously fail (see Fig. 16).
### III.2 Sub-Kelvin specific heat and mean-field Ansatz
Below $\sim$ 2 K, the lattice contribution is completely negligible [see Figs.
14(a) and 14(b)] in the Mott insulator YCOB with room-$T$ resistance larger
than 20 M$\Omega$ parallel and perpendicular to the $c$ axis, and thus the raw
specific heat directly measures the intrinsic magnetic properties that are
sensitive to the low-energy ($\leq$ 3%$J_{1}$) density of states.
Despite the strong antiferromagnetic exchange coupling of $J_{1}$ $\sim$ 60 K,
no conventional magnetic freezing is evidenced, as there is neither splitting
of zero-field-cooling and field-cooling dc susceptibilities nor frequency
dependence of the ac susceptibilities down to 1.8 K ($\sim$ 0.03$J_{1}$) [see
Figs. 1(e) and 1(f)] [40]. No sharp “$\lambda$” specific heat peak was
observed down to 0.36 K ($\sim$ 0.006$J_{1}$) [see Fig. 4(c)]. Moreover, our
recent thermal conductivity measurements show no sign of phase transitions
down to $\sim$ 80 mK [61]. These observations consistently show that YCOB is a
very promising (randomness-induced) QSL candidate without evident orphan
spins, and thus one is able to explore in depth its intrinsic GS nature.
Thereby, we analysis the experimental results by using the three most
promising mean-field QSLs classified by the Projective Symmetry Group method
[62, 11, 63], including the uniform RVB [11], U(1) Dirac [11], and
$\mathbb{Z}_{2}[0,\pi]\beta$ [63] states.
The inherent exchange randomness should influence the GS nature of the spin
system of YCOB. In contrast to the ideal KHA, the simulated GS of the random
model indeed exhibits the signature of random-singlet or valence bond glass
phase [56, 57]. The pair of NN spins with the strong exchange interaction
($J_{1}+\Delta J$) tends to form a singlet with extremely strong local
correlation $\langle\bm{S}_{i}\cdot\bm{S}_{j}\rangle$ $\sim$ $-0.7$ (see Fig.
4). However, the fraction of such singlets is still very low due to the strong
frustration of the kagome lattice [58], even in the presence of strong
exchange randomness [see Fig. 4(a)]. Therefore, the picture of mobile spinons
is still applicable [57], and the mean-field Ansatz can nevertheless serve as
a simple and phenomenological model for understanding the complicated GS
nature of YCOB, despite the possible distribution of hopping strength (not as
a direct function of the detailed distribution of the exchange couplings, see
Fig. 4). The distribution of hopping strength due to bond randomness might be
general in almost all of the well-studied spin-liquid candidate compounds,
$\kappa$-(ET)2Cu2(CN)3, EtMe3Sb[Pd(dmit)2]2, ZnCu3(OH)6Cl2, etc. [58].
Figure 5: (Color online) Local susceptibility at each kagome site (see Ref.
[55] for the definition) and correlation functions calculated for the 27-site
samples of model no.2 with bond randomness (a) and the ideal KHA model no.1
(b), at $T$ = 0.1$J_{1}$ 444$T$ = 0.1$J_{1}$ is low enough, as the correlation
functions of both systems are nearly constant. and $\mu_{0}H$ = 0 T. The
dashed lines display the cluster with PBC.
The uniform RVB state gives rise to a linear temperature dependence of
specific heat that obviously contradicts the observations in YCOB [see Fig.
17(d)]. The zero-field specific heat of YCOB shows a nearly quadratic behavior
[see Fig. 4(c)], $C_{\mathrm{p}}\sim\gamma_{2}T^{2}$ with $\gamma_{2}$ =
0.11(1) JK-3/mol-Cu, which is consistent with the U(1) Dirac state [11], with
the NN hopping parameter $\chi_{1}$ =
$\frac{k_{\mathrm{B}}}{J_{1}}\sqrt{\frac{6\sqrt{3}\zeta(3)R}{\pi\gamma_{2}}}$
= 0.29(1) and the Fermi velocity $v_{\mathrm{F}}$ =
$\frac{aJ_{1}\chi_{1}}{\sqrt{2}\hbar}$ = 1.07(5)$\times$103 m/s [11]. The
resulted $\chi_{1}$ is slightly larger than the self-consistent mean-field
value 0.221 [64]. The mean-field theory fails to strictly impose the single-
occupancy constraint [65, 7], and the unphysical states may result in the
overestimated coefficient $\gamma_{2}$(MF) = 0.188 JK-3/mol-Cu. This failure
gets more severer when a magnetic field is applied (see below).
For the U(1) Dirac state, the applied magnetic field tends to form Fermi
pockets [see Fig. 4(e)], increase the low-energy density of states and thus
low-$T$ specific heat, which qualitatively accounts for the observations [see
Fig. 4(d)]. However, the fermionic spinon with the effective magnetic moment
$\mu_{\mathrm{eff}}$ $\sim$ $\mu_{\mathrm{B}}$ causes a much stronger
dependence on the field in the mean-field theory, and can’t fit well the
specific heat measured in nonzero fields below $\sim$ 1 K [see Fig. 17(h)]. A
remedy is to set $\mu_{\mathrm{eff}}$ as an adjustable parameter, and we get
$\mu_{\mathrm{eff}}$ $\sim$ 0.43$\mu_{\mathrm{B}}$ [see Fig. 4(d)] 555The
significant decrease of the effective magnetic moment from $\mu_{\mathrm{B}}$
may originate from the unphysical states due to the rough treatment of the
single-occupied condition, which is another issue beyond the mean-field theory
worth of further research.. Moreover, the crossings of different specific heat
curves measured in different magnetic fields are also well captured by this
U(1) Dirac scenario [Fig. 4(d)]. The real material of YCOB with bond
randomness should have a distribution of hopping strength on the kagome
lattice [see Fig. 4(a)], which might slightly renormalize the band structure
and the dispersion around the Dirac nodes and account for the observation of
$\alpha$ = 2.31(1) $\neq$ 2.
In the neighborhood of the U(1) Dirac state, the $\mathbb{Z}_{2}[0,\pi]\beta$
QSL was proposed as the GS of the KHA as well [16, 17, 63]. Therefore, we also
fit the specific heat of YCOB by using the mean-field Ansatz of the
$\mathbb{Z}_{2}[0,\pi]\beta$ state [63], and obtain a similar band structure
with a small zero-field spin (triplet) gap of $\sim$ 0.025$J_{1}$ [see Fig.
4(f)] that is smaller than the DMRG value $\sim$ 0.05$J_{1}$ [16]. The applied
magnetic field tends to close the gap, form Fermi pockets, and thus increase
the low-$T$ specific heat [see Fig. 4(d)]. Similarly, by fitting we obtain the
reduced $\mu_{\mathrm{eff}}$ $\sim$ 0.48$\mu_{\mathrm{B}}$. Finally, it is
worth to note that the spin gap should be slightly overestimated, because the
calculated data drops faster than the experimental one at $\sim$ 0.4 K as $T$
$\rightarrow$ 0 K at 0 T [see Fig. 4(d)].
### III.3 Discussion
In the sibling YCu3(OH)6Cl3, no obvious antisite mixing of OH/Cl has been
reported, the center of inversion is located at 1$b$, Y3+ almost fully
occupies its ideal position, i.e., $f_{\mathrm{Y}1}$ $\sim$ 1 [67], and a
long-range magnetic transition occurs at $T_{\mathrm{N}}$ = 12 K $\sim$
0.15$J_{1}$ [68, 69, 70] possibly due to the DM interaction [47]. In contrast,
a gapless QSL behavior is observed in YCOB (similar to Ref. [41]) with
profound antisite mixing and thus bond randomness. Therefore, we believe that
the bond randomness is a critical ingredient for stabilizing the quantum
paramagnetic state. Both the susceptibility and specific heat of model no.2
indeed exhibit no sign of magnetic transition [see Figs. 3 and 4(b)], and a
randomness-relevant gapless QSL state has been theoretically proposed in KHAs
with a broad range of bond randomness [54]. Since QSLs are typically fragile
in the ideal cases [12, 15], the bond randomness caused by site mixing may
make the gapless QSL behavior more robust against various inevitable
perturbations in real materials, e.g., ZnCu3(OH)6Cl2 and YbMgGaO4 [71, 72].
Our study shows that YCOB is a rare KHA where the bond randomness and its
influence to the QSL behavior might be precisely modelled.
## IV Conclusions And Outlook
We have characterized the magnetic properties of large YCOB single crystals
that are grown for the first time. The exchange Hamiltonian is refined by
magnetic susceptibilities on the orientated single crystals. We find the bond
randomness is significant, and plays an important role in the QSL behavior. No
conventional magnetic transition is found, and the specific heat exhibits a
nearly quadratic temperature dependence below 1 K $\sim$ 0.02$J_{1}$, which
are phenomenologically consistent with the predictions of a gapless U(1) Dirac
QSL or a $\mathbb{Z}_{2}$ QSL with a gap less than 0.025$J_{1}$.
The exact GS nature of YCOB might be further identified by the Knight shift in
nuclear magnetic resonance, and by measuring inelastic neutron scattering and
muon spin relaxation spectra. Future investigations of spin dynamics and
correlations of YCOB are warranted and made possible through the availability
of high-quality single crystals.
###### Acknowledgements.
We thank Tao Xiang, X. Hong, and C. Hess for helpful discussion and J. Schnack
for providing their FLD data. The authors were supported by the National Key
Research and Development Project of China, grant 2017YFA0302901, the Youth
Innovation Promotion Association CAS, grant 2021004, and the Strategic
Priority Research Program of Chinese Academy of Sciences, grant XDB33000000.
This work was supported by the Fundamental Research Funds for the Central
Universities, HUST: 2020kfyXJJS054.
## Appendix A Single crystal growth, structural, thermodynamic, and electron
spin resonance characterizations
We grew single crystals of YCu3(OH)6.5Br2.5 (YCH) and YCu3(OD0.6H0.4)6.5Br2.5
(YCD) in two ways. At first, we synthesized the crystals in a Teflon-lined
stainless steel autoclave (TSA) using the hydrothermal technique [40] reported
by Chen et al. The high-purity D2O ($\geq$ 99.9%, Shanghai Titan Scientific
Co., Ltd) was used instead of H2O when we synthesized YCD. Crystals with a
maximum size of 1.2$\times$1.2$\times$0.15 mm (mass $\sim$ 0.9 mg) were
obtained, as shown in Fig. 6(a).
To improve the quality and size of the single crystals, we performed a
recrystallization process in a two-zone gradient tube furnace (GTF) with a
temperature gradient of $\sim$ 2 ∘C/cm. The starting materials of
Cu(NO3)2$\cdot$3H2O (2.416 g, 10 mmol), Y(NO3)3$\cdot$6H2O (7.662 g, 20 mmol),
KBr (7.140 g, 60 mmol), and 4 mL D2O were mixed together and charged into a
fused quartz tube (inside diameter 14 mm, outside diameter 20 mm, a length of
$\sim$ 30 cm). The tube was sealed, mounted vertically, and then heated to 230
∘C in a box furnace. The temperature was maintained for 3 days and then
decreased to room temperatures. The pre-reacted tube was mounted horizontally
into the two-zone gradient furnace. Both the hot and cold ends were
simultaneously heated to 225 and 165 ∘C, respectively, for 6 hours. The
furnace and all growth parameters were left undisturbed for 30 days, and then
both ends were simultaneously cooled down to room temperatures. Transparent
green single crystals with shining surfaces and a typical size of
3.1$\times$2.4$\times$0.25 mm (mass $\sim$ 7.4 mg) were obtained [see Fig.
6(b)]. Back-scattering Laue x-ray diffraction (XRD) measurements
(LAUESYS_V_674, Photonic Science & Engineering Ltd) were carried out for both
TSA and GTF single crystals. The GTF crystals show obviously sharper Laue
photographs [please compare Fig. 6(b) to Fig. 6(a)], implying that the quality
of the single crystals has been considerably improved by the above
recrystallization process.
Figure 6: Laue XRD patterns on the $ab$ plane of (a) the largest TSA (the
upper inset) and (b) typical GTF (the upper inset) crystals. The thicknesses
of typical TSA and GTF crystals are shown in the lower insets of (a) and (b),
respectively.
The crystal structure was obtained from the refinements of the XRD (Mo
$K_{\alpha}$, $\lambda$ = 0.71073 Å, XtaLAB mini II, Rigaku Corporation) data
measured on selected YCH and YCD crystals with proper sizes. We started with
the crystal structure previously reported in Ref. [40], and got a very similar
refined structure (see Table 1). From the refinements we find that YCH(D) has
a structural composition
YCu3[OH(D)]6Br2[OH(D)]${}_{1-x^{\prime}}$Br${}_{x^{\prime}}$ with $x^{\prime}$
= 0.43–0.47. In comparison, a slightly larger value $x^{\prime}$ = 0.51 had
been reported in Ref. [40]. Henceforth, we use the approximate composition
YCu3[OH(D)]6.5Br2.5 throughout this paper.
Figure 7: Inverse dc susceptibilities ($H/M$) of aligned GTF single crystals
of YCD (total mass 21.8 mg) measured at 1 T applied perpendicular (a) and
parallel (b) to the $c$ axis, with those of TSA crystals of YCD (net weight:
23.0 mg) and YCH (net weight: 23.8 mg) for comparison. The dashed lines
present the linear (Curie-Weiss) fits to the GTF data above 150 K. (c)
Specific heat of a GTF single crystal of YCD (mass 5.90 mg) measured at 0 T,
with those of TSA crystals of YCD (net weight: 1.90 mg) and YCH (net weight:
1.82 mg) for comparison. No substantial sample dependence of the thermodynamic
properties was observed.
The dc magnetization and ac susceptibilities (1.8 $\leq$ $T$ $\leq$ 350 K and
0 $\leq$ $\mu_{0}H$ $\leq$ 7 T) were measured by a magnetic property
measurement system (MPMS, Quantum Design) using well-aligned (by Laue XRD)
single-crystal samples of $\sim$ 23 mg, whereas the magnetization up to 14 T
was measured by a vibrating sample magnetometer in a physical property
measurement system (PPMS, Quantum Design). At high temperatures the
magnetization of the compound is weak, and we carefully chose a quartz holder
without evident background. As shown in Fig. 7(a) and 7(b), our
susceptibilities follow the Curie-Weiss law between $\sim$ 120 and 350 K (the
maximum measured temperature), with the Curie-Weiss temperatures
$\theta_{\perp}$ = $-57.5(4)$ K and $\theta_{\parallel}$ = $-58.7(3)$ K along
the $ab$ plane and $c$ axis, respectively. In comparison, Chen et al. reported
a slightly larger magnitude of the Curie-Weiss temperature of $-74$ K from
fitting their isotropic susceptibility measured in diamagnetic gelatine
capsules below $\sim$ 280 K [40].
The specific heat (1.8 $\leq$ $T$ $\leq$ 220 K) was measured at a magnetic
field of 0 $\leq$ $\mu_{0}H_{\parallel}$ $\leq$ 9 T applied along the $c$ axis
using the single-crystal samples in a PPMS. The specific heat measurements on
a selected GTF single crystal (mass 4.00 mg) between 0.36 and 2 K were
conducted in a 3He refrigerator. N-grease was used to facilitate thermal
contact between the crystal and the puck, and the sample coupling was better
than 98%. The contributions of the grease and puck under different applied
fields were measured independently and subtracted from the data.
Table 1: Structure refinements from single-crystal XRD data measured on selected YCH and YCD crystals at 300 K. crystals | YCH (#1) | YCH (#2) | YCD (#1) | YCD (#2)
---|---|---|---|---
size (mm) | 0.22 $\times$ 0.22 $\times$ 0.08 | 0.19 $\times$ 0.19 $\times$ 0.08 | 0.21 $\times$ 0.21 $\times$ 0.04 | 0.11 $\times$ 0.11 $\times$ 0.06
molar mass (g/mol) | 588.0(1.3) | 586.8(1.3) | 589.5(1.3) | 590.7(1.3)
space group | $P$3̄$m$1 (No. 164) | $P$3̄$m$1 (No. 164) | $P$3̄$m$1 (No. 164) | $P$3̄$m$1 (No. 164)
$a$ (= $b$, Å) | 6.6647(3) | 6.6704(5) | 6.6576(4) | 6.667(1)
$c$ (Å) | 6.0093(3) | 6.0014(4) | 6.0151(3) | 6.004(1)
cell volume (Å3), $Z$ = 1 | 231.16(3) | 231.26(5) | 230.89(4) | 231.1(1)
Y1 (1$b$): occupancy $f_{\mathrm{Y}1}$ | 0.30(2) | 0.30(2) | 0.30(2) | 0.30(2)
100$\times U_{iso}$ | 0.8(2) | 1.4(2) | 0.9(2) | 0.4(2)
Y2 (2$c$): occupancy $f_{\mathrm{Y}2}$ | 0.35(1) | 0.35(1) | 0.35(1) | 0.35(1)
$z$ | 0.374(2) | 0.374(2) | 0.373(2) | 0.373(2)
100$\times U_{iso}$ | 0.8(2) | 1.4(2) | 0.9(2) | 0.4(2)
Cu (3$f$, occupancy = 1): 100*$U_{iso}$ | 0.8(1) | 1.7(1) | 0.8(1) | 0.3(1)
Br1 (2$d$, occupancy = 1): $z$ | 0.8566(6) | 0.8566(6) | 0.8560(5) | 0.8566(7)
100$\times U_{iso}$ | 1.8(1) | 2.6(1) | 1.8(1) | 1.4(1)
O1 (6$i$, occupancy = 1): $x$ ($x$ = 0.5$y$) | 0.1896(9) | 0.1885(9) | 0.1894(8) | 0.189(1)
$z$ | 0.372(3) | 0.362(2) | 0.366(2) | 0.378(3)
100$\times U_{iso}$ | 1.0(3) | 1.4(4) | 1.0(3) | 1.5(5)
Br2 (1$a$): occupancy $f_{\mathrm{Br}2}$ | 0.47(2) | 0.45(2) | 0.43(2) | 0.45(2)
100$\times U_{iso}$ | 2.3(2) | 2.8(4) | 2.5(3) | 1.6(4)
O2 (1$a$): occupancy $f_{\mathrm{O}2}$ | 0.53(2) | 0.55(2) | 0.57(2) | 0.55(2)
100$\times U_{iso}$ | 2.3(2) | 2.8(4) | 2.5(3) | 1.6(4)
$h$ range | $-9\rightarrow 9$ | $-9\rightarrow 9$ | $-8\rightarrow 9$ | $-7\rightarrow 8$
$k$ range | $-8\rightarrow 11$ | $-8\rightarrow 11$ | $-9\rightarrow 11$ | $-9\rightarrow 11$
$l$ range | $-8\rightarrow 10$ | $-3\rightarrow 10$ | $-8\rightarrow 10$ | $-8\rightarrow 10$
reflections ($I$ $>$ 0) | 954 | 795 | 841 | 560
reflections ($I$ $>$ 3$\sigma$($I$)) | 837 | 674 | 740 | 492
$R$($F$) ($I$ $>$ 3$\sigma$($I$)) | 3.8% | 6.7% | 7.1% | 9.7%
$R_{w}$($F$) ($I$ $>$ 3$\sigma$($I$)) | 3.3% | 4.8% | 6.1% | 6.6%
No significant sample dependence of thermodynamic properties was observed
among GTF YCD, TSA YCD, and TSA YCH single crystals (see Fig. 7). Therefore,
we focused on the measurements on the highly-quality GTF YCD (mentioned as
YCOB) single crystals below and also throughout the main text.
The YCOB crystals are good insulators and have resistance larger than 20
M$\Omega$ measured parallel and perpendicular to the $c$ axis at room
temperatures. Above $\sim$ 120 K, the inverse susceptibilities of YCOB show a
linear temperature dependence following the Curie-Weiss law along both the
$ab$ plane and $c$ axis [see Fig. 7(a) and 7(b)]. We obtain the lengths of the
magnetic moments $g_{\perp}\mu_{\mathrm{B}}\sqrt{S(S+1)}$ =
$\sqrt{3k_{\mathrm{B}}C_{\perp}/(N_{\mathrm{A}}\mu_{0})}$ =
1.898(1)$\mu_{\mathrm{B}}$ and $g_{\parallel}\mu_{\mathrm{B}}\sqrt{S(S+1)}$ =
$\sqrt{3k_{\mathrm{B}}C_{\parallel}/(N_{\mathrm{A}}\mu_{0})}$ =
1.882(1)$\mu_{\mathrm{B}}$ from the fitted Curie constants $C_{\perp}$ =
5.661(7) Kcm3 per mol Cu and $C_{\parallel}$ = 5.568(4) Kcm3 per mol Cu,
respectively. By fixing $S$ = $\frac{1}{2}$, we further get $g_{\perp}$ =
2.192(1) and $g_{\parallel}$ = 2.174(1). Moreover, the antiferromagnetic
exchange energy can be roughly estimated as $J_{1}$ $\sim$
$-3\theta_{\perp}/$[4$S$($S$+1)] $\sim$ $-3\theta_{\parallel}/$[4$S$($S$+1)]
$\sim$ 60 K.
The first derivative electron spin resonance (ESR) absorption spectra were
measured at 6–300 K on the aligned single-crystal samples of YCOB (total mass
$\sim$ 22 mg) with the magnetic field applied parallel and perpendicular to
the $c$ axis, respectively, using continuous wave spectrometers (CIQTEK
EPR200-Plus and Bruker EMXmicro-6/1) at x-band frequencies ($\nu$ $\sim$ 9.7
GHz) equipped with 4He refrigerators. The single-crystal samples of YCOB were
washed with high-purity water and ethanol repeatedly and in succession, and
the absence of any obvious impurity phase was confirmed by using a microscope,
before the ESR measurements. The ESR spectra measured at various temperatures
are so narrow that the distinctive hyperfine structure is clearly visible (see
Fig. 8) [73, 74]. The similar ESR lines usually appear in Cu2+-based complexes
with weak couplings [74]. However, in most of the existing strongly-correlated
3$d$ magnets, e.g., ZnCu3(OH)6Cl2 [46] and $\alpha$-CrOOH [75], broad single
ESR lines are typically observed due to the magnetic anisotropy. As shown in
Fig. 8, the ESR signals are still robust even at room temperatures, with the
maximum strength of $\sim$ 1 ($\mu$V) at the microwave power of 0.2 mW,
modulation amplitude of 0.4 mT, and magnification of 10. The integrated
intensity of YCOB is about 1% of that of ZnCu3(OH)6Cl2 reference powder,
roughly consistent with the estimated concentration ($\sim$ 0.8%) of the local
moments [see Fig. 8 (c)]. Moreover, the integrated ESR intensity roughly
follows a Curie-Weiss behavior with the Curie-Weiss temperature of $\sim$
$-$14 K, instead of the bulk susceptibility [see Figs. 9 (c) and 9(d)]. These
observations suggest that the narrow ESR signals of YCOB should mainly
originate from the nearly free local moments induced by the bond randomness on
the kagome lattice (see main text). In contrast, the sibling YCu3(OH)6Cl3
without evident bond randomness shows a very broad ESR signal with the
linewidth of $\sim$ 7 T [47]. Therefore, the possible broad ESR lines from the
strongly-coupled ($J_{1}$ $\sim$ 60 K) Cu spins of YCOB may not be well
captured by our x-band (maximum applied field of $\sim$ 1 T) ESR
spectrometers.
The single-ion hyperfine Hamiltonian of the Cu2+ ($S$ = $\frac{1}{2}$, $I$ =
$\frac{3}{2}$) ions that is invariant under the $D_{3d}$ point group symmetry
can be written as [73, 74]
$\mathcal{H}_{\mathrm{hp}}=-\mu_{0}\mu_{\mathrm{B}}\mathbf{H}\cdot\mathbf{g}\cdot\mathbf{S}+\mathbf{I}\cdot\mathbf{A}\cdot\mathbf{S}\\\
\tiny=\left(\begin{array}[]{cccccccc}\frac{3}{4}A_{\parallel}-\frac{1}{2}G_{\parallel}&0&0&0&\frac{i}{2}G_{\perp}&0&0&0\\\
0&\frac{1}{4}A_{\parallel}-\frac{1}{2}G_{\parallel}&0&0&\frac{\sqrt{3}}{2}A_{\perp}&\frac{i}{2}G_{\perp}&0&0\\\
0&0&-\frac{1}{4}A_{\parallel}-\frac{1}{2}G_{\parallel}&0&0&A_{\perp}&\frac{i}{2}G_{\perp}&0\\\
0&0&0&-\frac{3}{4}A_{\parallel}-\frac{1}{2}G_{\parallel}&0&0&\frac{\sqrt{3}}{2}A_{\perp}&\frac{i}{2}G_{\perp}\\\
-\frac{i}{2}G_{\perp}&\frac{\sqrt{3}}{2}A_{\perp}&0&0&-\frac{3}{4}A_{\parallel}+\frac{1}{2}G_{\parallel}&0&0&0\\\
0&-\frac{i}{2}G_{\perp}&A_{\perp}&0&0&-\frac{1}{4}A_{\parallel}+\frac{1}{2}G_{\parallel}&0&0\\\
0&0&-\frac{i}{2}G_{\perp}&\frac{\sqrt{3}}{2}A_{\perp}&0&0&\frac{1}{4}A_{\parallel}+\frac{1}{2}G_{\parallel}&0\\\
0&0&0&-\frac{i}{2}G_{\perp}&0&0&0&\frac{3}{4}A_{\parallel}+\frac{1}{2}G_{\parallel}\\\
\end{array}\right),$ (3)
under the subspace of
$|S^{z}=\frac{1}{2},I^{z}=\frac{3}{2}\rangle,~{}|\frac{1}{2},\frac{1}{2}\rangle,~{}|\frac{1}{2},-\frac{1}{2}\rangle,~{}|\frac{1}{2},-\frac{3}{2}\rangle,~{}|-\frac{1}{2},\frac{3}{2}\rangle,~{}|-\frac{1}{2},\frac{1}{2}\rangle,~{}|-\frac{1}{2},-\frac{1}{2}\rangle,~{}|-\frac{1}{2},-\frac{3}{2}\rangle$.
Here, $\mathbf{H}$ = $H$[0 $\sin\theta$ $\cos\theta$] is the applied magnetic
field, $G_{\parallel}$ = $\mu_{0}\mu_{\mathrm{B}}Hg_{\parallel}\cos\theta$ and
$G_{\perp}$ = $\mu_{0}\mu_{\mathrm{B}}Hg_{\perp}\sin\theta$ are the Zeeman
terms. The eight eigenstates of Supplementary Eq. (3) are represented as
$|E^{\eta}_{j}\rangle$ ($j$ = 1, 2, …, 8) with increasing eigenenergies. Due
to $A_{\eta}$ $\ll$ $\mu_{0}\mu_{\mathrm{B}}H_{\mathrm{res}}^{\eta}g_{\eta}$,
these eigenstates give rise to four ESR modes with
$E^{\eta}_{9-j^{\prime}}-E^{\eta}_{j^{\prime}}$ = $h\nu$ and nonzero
transition probabilities $\propto$ $|\langle
E^{\eta}_{9-j^{\prime}}|2S^{x}|E^{\eta}_{j^{\prime}}\rangle|^{2}$ $\sim$ 1,
where $j^{\prime}$ = 1, 2, 3, 4. These four ESR modes are governed by the
transitions, $|\frac{1}{2},I^{z}\rangle\rightarrow|-\frac{1}{2},I^{z}\rangle$
($I^{z}$ = $-\frac{3}{2}$, $-\frac{1}{2}$, $\frac{1}{2}$, $\frac{3}{2}$),
similar to other Cu2+-based magnets [74]. Therefore, we fit the experimental
ESR spectra (see Fig. 8) using,
$\frac{dI_{\mathrm{abs}}^{\eta}}{\mu_{0}dH}=\frac{16I_{0}^{\eta}\Delta
H_{\eta}}{\pi\mu_{0}^{2}}\sum_{j^{\prime}=1}^{4}\frac{f_{j^{\prime}}^{\eta}(H_{j^{\prime}}^{\eta}-H)}{[4(H_{j^{\prime}}^{\eta}-H)^{2}+\Delta
H_{\eta}^{2}]^{2}},$ (4)
where $f_{j^{\prime}}^{\eta}$ $>$ 0 is the spectrum weight of each ESR mode
with $\sum_{j^{\prime}=1}^{4}f_{j^{\prime}}^{\eta}$ $\equiv$ 1, $\mu_{0}\Delta
H_{\eta}$ is the line width that is presumed to be independent of $j^{\prime}$
for simplicity, and $I_{0}^{\eta}$ is the total integrated intensity that is
proportional to the dynamical susceptibility in the direction perpendicular to
the applied field, $I_{0}^{\eta}$ $\propto$
$\chi_{\eta^{\prime}}^{\prime\prime}$(q $\rightarrow$ 0, $\omega$) [46]. The
fitted ESR fields are almost temperature-independent [see Figs. 9(a) and
9(b)]. From fitting the ESR fields both parallel ($\eta$ = $\parallel$) and
perpendicular ($\eta$ = $\perp$) to the $c$ axis, we obtain all the single-ion
parameters, $g_{\perp}$ = 2.205(4), $g_{\parallel}$ = 2.211(4), $|A_{\perp}|$
= 15.8(2) mK and $|A_{\parallel}|$ = 16.7(2) mK.
Figure 8: The ESR spectra measured parallel (a) and perpendicular (b) to the
$c$ axis. The solid lines show the four-Lorentzian fits [see Eq. (4)], and the
dashed lines present the calculated ESR fields (see Fig. 9). (c) The x-band
ESR spectra measured at 20 K on single-crystal samples of TSA YCH (23.8 mg)
and YCD (23.0 mg), with the spectrum of the ZnCu3(OH)6Cl2 powder ($\sim$ 20
mg) for comparison. Figure 9: ESR fields obtained from fitting the ESR spectra
measured along the $ab$ plane (a) and $c$ axis (b), respectively (see Fig. 8).
The dashed lines show the combined fit. (c) Scaling of the ESR intensities,
$\chi^{\mathrm{ESR}}(H\perp c)$ and $\chi^{\mathrm{ESR}}(H\parallel c)$, with
the bulk susceptibilities (thick lines), $\chi^{\mathrm{b}}_{\parallel}$ and
$\chi^{\mathrm{b}}_{\perp}$, respectively. The thin dashed and solid lines
present the Curie-Weiss fits with zero (i.e., Curie tails) and adjustable
Curie-Weiss temperatures, respectively. (d) Inverse (integrated) ESR
intensities.
## Appendix B DFT + $U$ calculations
Although our single-crystal XRD measurements (see above), as well as the
reported electron-microprobe analysis [40], show obvious site-mixing disorder
of OH- and Br-, neither global symmetry reduction nor antisite mixing between
Cu2+ and other nonmagnetic ions is probed in YCOB. To go beyond the average
structure from single-crystal XRD and investigate the influence of this
structural disorder on the magnetism, we conducted the density functional
theory (DFT) + $U$ simulation, which had been widely used in other Cu2+-based
magnets, e.g., volborthite Cu3V2O7(OH)2$\cdot$2H2O [76], kapellasite
Cu3Zn(OH)6Cl2, and haydeeite Cu3Mg(OH)6Cl2 [77]. Similar to YbMgGaO4 [78], we
constructed three OH/Br configurations to simulate the site mixing, and
optimized their geometry using DFT calculations (see Fig. 10). All possible
nearest-neighbor (NN) environments of 1$b$ position are included in the three
configurations (see Fig. 10), and the further enlarging of supercells sharply
increases the computational cost. All our DFT + $U$ calculations were
performed in the VASP code [43, 44] with the generalized gradient
approximation (GGA) [79]. The 6$\times$6$\times$6 k-mesh was used, and
residual forces were below 0.006 eV/Å in the fully optimized structures. The
lattice parameters were fixed to the experimental values, $a$ = $b$ = 6.6647 Å
and $c$ = 6.0093 Å.
The random distribution of OH- and Br- takes place around the 1$a$ positions,
which are adjacent to the hexagons on the kagome lattice of magnetic Cu2+ ions
(see Fig. 10). The polar OH- ions easily make the local environments of 1$b$
positions (i.e., the Y1 sites, located at the centers of the hexagons)
nonsymmetric, and drive Y3+ away from its ideal 1$b$ position, i.e., $|\Delta
z_{\mathrm{Y}2}|$ $>$ 0\. Our DFT calculation gives $|\Delta z_{\mathrm{Y}1}|$
= 0 in the symmetric Br-Br [see Fig. 10 (a)] stacking, and $|\Delta
z_{\mathrm{Y}2}|$ $\sim$ 0.6 and 0.4 Å in the nonsymmetric OH-OH [see Fig. 10
(b)] and Br-OH-Br [see Fig. 10 (c)] cases, respectively, which are well
consistent with the XRD results of $|\Delta z_{\mathrm{Y}1}|$ = 0 and $|\Delta
z_{\mathrm{Y}2}|$ $\sim$ 0.7 Å (Table 1). Furthermore, we find that both
$\angle$CuOCu and Cu-O, which are closely relevant to the exchange integrals,
are sensitively dependent on the OH/Br distribution (see Table 2). When the
local environment of the 1$b$ Wyckoff position gets nonsymmetric, the
configuration of two alternate superexchanges along the hexagon is naturally
expected, according to the structural symmetry [see Figs. 10 (b) and 10(c)].
Figure 10: Optimized crystal structures for different stacking sequences of Br/OH, (a) symmetric Br-Br [2YCu3(OH)6Br3, supercell: 2$\times$1$\times$1 unit cells, total energy $-$31.2 eV/Cu], nonsymmetric (b) OH-OH [2YCu3(OH)7Br2, 2$\times$1$\times$1, total energy $-$33.9 eV/Cu] and (c) Br-OH-Br [4YCu3(OH)6.5Br2.5, 2$\times$1$\times$2, total energy $-$32.5 eV/Cu]. The indices of Cu2+ (blue ball) spins and superexchanges are marked. It is worth to note that the symmetric OH-HO configuration (total energy $-$33.6 eV/Cu) isn’t energetically favorable compared to the nonsymmetric one (see b, total energy $-$33.9 eV/Cu). Table 2: Optimized bond angles of $\angle$CuOCu and bond lengths of Cu-O for different stacking sequences, as well as the NN exchange couplings calculated by DFT + $U$ (see Table 3). supercells | $\angle$CuOCu | Cu-O | coupling | $\angle$CuOCu | Cu-O | coupling | $\angle$CuOCu | Cu-O | coupling | $\angle$CuOCu | Cu-O | coupling
---|---|---|---|---|---|---|---|---|---|---|---|---
Br-Br | 115.5∘ | 1.97Å | $J_{1\mathrm{a}}$=56K | $-$ | $-$ | $-$ | $-$ | $-$ | $-$ | $-$ | $-$ | $-$
OH-OH | 116.0∘ | 1.97Å | $J_{1\mathrm{b}1}$=94K | 112.7∘ | 1.99Å | $J_{1\mathrm{b}2}$=38K | $-$ | $-$ | $-$ | $-$ | $-$ | $-$
Br-OH-Br | 116.6∘ | 1.99Å | $J_{1\mathrm{c}1}$=93K | 108.2∘ | 2.02Å | $J_{1\mathrm{c}2}=-$11K | 117.0∘ | 1.95Å | $J_{1\mathrm{c}3}$=101K | 116.8∘ | 1.96Å | $J_{1\mathrm{c}4}$=95K
Table 3: Collinear magnetic states and their energy differences from the fully
ferromagnetic state. From fitting these energy differences, we obtain the
exchange couplings, including NN $J_{1}$, second-neighbor $J_{2}$, and
interlayer $J_{\perp}$. The least-squares standard deviation is defined as
$\sigma$ =
$\sqrt{\frac{1}{N_{0}}\sum_{i}(X_{i}^{\mathrm{DFT}}-X_{i}^{\mathrm{fit}})^{2}}$,
where $X_{i}^{\mathrm{DFT}}$ and $X_{i}^{\mathrm{fit}}$ are the DFT and fitted
values, respectively, $N_{0}$ is the number of the data points.
Br-Br, $St$ = $\mid S_{1}^{z}S_{2}^{z}S_{3}^{z}S_{4}^{z}S_{5}^{z}S_{6}^{z}\rangle$ | $\mid\downarrow\uparrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\mid\downarrow\downarrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\mid\downarrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$ | $\mid\uparrow\downarrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\mid\uparrow\downarrow\downarrow\downarrow\uparrow\uparrow\rangle$ | $\mid\uparrow\downarrow\downarrow\downarrow\downarrow\uparrow\rangle$ | $\mid\uparrow\uparrow\downarrow\uparrow\uparrow\uparrow\rangle$
---|---|---|---|---|---|---|---
DFT + $U$, $E$($\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$)$-E$($St$) (K) | 232.7 | 234.4 | 117.7 | 231.4 | 229.3 | 174.4 | 116.9
least-squares fitted $E$($\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$)$-E$($St$) (K) | 233.2 | 234.1 | 117.5 | 230.8 | 229.9 | 174.9 | 115.7
exchange couplings and standard deviation | $J_{1\mathrm{a}}$ = 56.2 K, $J_{2\mathrm{a}}$ = 2.0 K, $J_{3\mathrm{a}}$ = $-$0.4 K, $J_{d\mathrm{a}}$ = 1.2 K, and $\sigma_{\mathrm{a}}$ = 0.6 K
OH-OH, $St$ = $\mid S_{1}^{z}S_{2}^{z}S_{3}^{z}S_{4}^{z}S_{5}^{z}S_{6}^{z}\rangle$ | $\mid\downarrow\uparrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\mid\downarrow\downarrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\mid\downarrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$ | $\mid\uparrow\downarrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\mid\uparrow\downarrow\downarrow\downarrow\uparrow\uparrow\rangle$ | $\mid\uparrow\downarrow\downarrow\downarrow\downarrow\uparrow\rangle$ | $\mid\uparrow\uparrow\downarrow\uparrow\uparrow\uparrow\rangle$
---|---|---|---|---|---|---|---
DFT + $U$, $E$($\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$)$-E$($St$) (K) | 265.7 | 264.4 | 132.0 | 263.0 | 260.9 | 224.8 | 132.2
least-squares fitted $E$($\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$)$-E$($St$) (K) | 265.9 | 264.7 | 131.7 | 262.5 | 261.3 | 224.8 | 131.7
exchange couplings and standard deviation | $J_{1\mathrm{b}1}$ = 94 K, $J_{1\mathrm{b}2}$ = 38 K, $J_{2\mathrm{b}}$ = 0.5 K, $J_{3\mathrm{b}}$ = $-$0.6 K, $J_{d\mathrm{b}}$ = $-$0.6 K, and $\sigma_{\mathrm{b}}$ = 0.3 K
Br-OH-Br, $St$ = | $\mid\downarrow\uparrow\uparrow\downarrow\uparrow\uparrow$ | $\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow$ | $\mid\downarrow\uparrow\uparrow\downarrow\uparrow\uparrow$ | $\mid\downarrow\uparrow\uparrow\uparrow\downarrow\uparrow$ | $\mid\uparrow\uparrow\downarrow\downarrow\downarrow\uparrow$ | $\mid\uparrow\uparrow\downarrow\downarrow\downarrow\uparrow$ | $\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow$
---|---|---|---|---|---|---|---
$\mid S_{1}^{z}S_{2}^{z}S_{3}^{z}S_{4}^{z}S_{5}^{z}S_{6}^{z}S_{7}^{z}S_{8}^{z}S_{9}^{z}S_{10}^{z}S_{11}^{z}S_{12}^{z}\rangle$ | $\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$ | $\downarrow\uparrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\uparrow\downarrow\downarrow\uparrow\downarrow\downarrow\rangle$ | $\uparrow\downarrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\uparrow\uparrow\downarrow\downarrow\downarrow\uparrow\rangle$ | $\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$ | $\uparrow\uparrow\downarrow\downarrow\downarrow\uparrow\rangle$
DFT + $U$, $E$($\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$)$-E$($St$) (K) | 172.7 | 400.4 | 570.3 | 565.1 | 398.6 | 194.6 | 209.5
least-squares fitted $E$($\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$)$-E$($St$) (K) | 171.3 | 399.0 | 571.7 | 565.1 | 399.0 | 194.1 | 209.0
exchange couplings and standard deviation | $J_{1\mathrm{c}1}$ = 93 K, $J_{1\mathrm{c}2}$ = $-$11 K, $J_{1\mathrm{c}3}$ = 101 K, $J_{1\mathrm{c}4}$ = 95 K
| $J_{2\mathrm{c}}$ = 1.3 K, $J_{\perp\mathrm{c}}$ = 0.7 K, and
$\sigma_{\mathrm{c}}$ = 0.9 K
Starting with the optimized crystal structures, we further calculated the
exchange couplings from the energy differences between the fully ferromagnetic
state and various collinear states. The exchange integrals monotonically
decrease with the increasing of the Coulomb repulsion $U_{\mathrm{eff}}$ [76,
77, 47]. For YCOB, we fixed $U_{\mathrm{eff}}$ = 8.72 eV in all GGA + $U$
calculations, and obtained the average $\bar{J}_{1}$ =
(2$J_{1\mathrm{a}}$+$J_{1\mathrm{b}1}$+$J_{1\mathrm{b}2}$+$J_{1\mathrm{c}1}$+$J_{1\mathrm{c}2}$+$J_{1\mathrm{c}3}$+$J_{1\mathrm{c}4}$)/8
= 65 K (see Table 3), in good agreement with the experimental result of
$|\theta_{\perp}|$ $\sim$ $|\theta_{\parallel}|$ $\sim$ 60 K. From fitting
these energy differences, we obtain the exchange couplings for each stacking
sequence of Br/OH (see Table 3).
Based on the above DFT + $U$ calculations, the following conclusions can be
drawn:
(1) In YCOB, all the long-distance couplings beyond NNs are negligible,
$|J_{2}|$/$\bar{J}_{1}$ $<$ 4%, $|J_{3}|$/$\bar{J}_{1}$ $<$ 2%,
$|J_{d}|$/$\bar{J}_{1}$ $<$ 2%, and $|J_{\perp}|$/$\bar{J}_{1}$ $<$ 2% (see
Table 3), due to the spatial localization of the 3$d$ electrons (highly
similar to YCu3(OH)6Cl3 [47]). This significantly simplifies the exchange
model for YCOB.
(2) The antisite disorder of OH/Br strongly influences the NN exchange
couplings ($J_{1}$), and causes the alternation of two NN exchanges along the
randomly distributed (1$-f_{\mathrm{Y}1}$$\sim$ 70%) nonsymmetric hexagons of
the kagome lattice,
($J_{1\mathrm{c}3}-J_{1\mathrm{c}4}$)/($J_{1\mathrm{c}3}+J_{1\mathrm{c}4}$)
$\sim$ 0.03,
($J_{1\mathrm{b}1}-J_{1\mathrm{b}2}$)/($J_{1\mathrm{b}1}+J_{1\mathrm{b}2}$)
$\sim$ 0.43, and
($J_{1\mathrm{c}1}-J_{1\mathrm{c}2}$)/($J_{1\mathrm{c}1}+J_{1\mathrm{c}2}$)
$\sim$ 1.26.
(3) There exist no orphan spins, even in the presence of the mixing between OH
and Br. The antisite disorder occurs around the high-symmetry Wyckoff
position, 1$a$, and thus the weaker and stronger bonds alternate along the
hexagon in the nonsymmetric environment. Although one of the alternate
$\angle$CuOCu may be profoundly reduced to $\sim$ 108.2∘ (see Table 2), and
the strength of the coupling can be surprisingly weak, e.g.,
$|J_{1\mathrm{c}2}|$ $\sim$ 11 K, there exist no orphan Cu2+ spins that are
weakly coupled to all the other ones.
Similar to the case of the nonmagnetic impurities in the kagome Heisenberg
antiferromagnet (KHA) [55, 56, 57], nearly free local moments can nevertheless
be induced by the bond randomness in YCOB, which accounts for almost all of
the low-temperature observations (see main text for model no.2), including the
weak upturn seen in susceptibilities, the slight polarization in
magnetization, and the very narrow ESR signals (see above).
## Appendix C Refinement of the exchange Hamiltonian.
In this section, we make great efforts to determine the exchange Hamiltonian
of the KHA YCOB. At present, we have collected both susceptibility and
specific heat data of YCOB, which can be used to refine the spin Hamiltonian.
However, it is still extremely challenging to extract precisely the magnetic
contribution from the total specific heat above $\sim$ 10 K (see Appendix D),
in the absence of nonmagnetic reference compounds. Therefore, below we mainly
focus on the magnetic susceptibilities of the YCOB single crystal measured
both parallel and perpendicular to the $c$ axis.
### C.1 No evident orphan spins.
In YCOB, the significant antisite disorder between magnetic Cu2+ and other
nonmagnetic ions, i.e., Y3+, H(D)+, O2-, Br- is expected to be prohibited
owing to the large differences in ionic charges and radii, and thus orphan
spins should be negligible without any obvious impurity phases [40, 41].
Following the method previously used in the KHA herbertsmithite [22], we try
to reproduce the magnetization measured at 2 K and up to 14 T
($\mu_{\mathrm{B}}g_{\eta}\mu_{0}H$ $\sim$ 0.35$J_{1}$) parallel and
perpendicular to the $c$ axis, by a combination of a Brillouin function for
“free” spins and a linear magnetization for “intrinsic” kagome spins [see Fig.
2(a)],
$M_{\eta}=\frac{f_{\eta}g_{\eta}N_{\mathrm{A}}\mu_{\mathrm{B}}}{2}\frac{\exp(\frac{\mu_{\mathrm{B}}g_{\eta}\mu_{0}H}{k_{\mathrm{B}}T})-1}{\exp(\frac{\mu_{\mathrm{B}}g_{\eta}\mu_{0}H}{k_{\mathrm{B}}T})+1}+\chi_{i}^{\eta}H,$
(5)
where $f_{\eta}$ and $\chi_{i}^{\eta}$ are fitting parameters for the fraction
of free spins and nonsaturated “intrinsic” susceptibilities, respectively. We
obtain $f_{\parallel}$ = 0.80%, $\chi_{i}^{\parallel}$ = 0.048 cm3/mol-Cu and
$f_{\perp}$ = 0.75%, $\chi_{i}^{\perp}$ = 0.043 cm3/mol-Cu parallel and
perpendicular to the $c$ axis, respectively.
However, when the formalism of the free spins is extended to the specific
heat, we find obvious inconsistency. The specific heat contributed by free
spins is given by,
$C_{f}(\mu_{0}H_{\parallel})=f_{\parallel}R\frac{[\frac{\Delta
E(\mu_{0}H_{\parallel})}{k_{\mathrm{B}}T}]^{2}\exp[\frac{\Delta
E(\mu_{0}H_{\parallel})}{k_{\mathrm{B}}T}]}{\\{\exp[\frac{\Delta
E(\mu_{0}H_{\parallel})}{k_{\mathrm{B}}T}]+1\\}^{2}},$ (6)
where $\Delta E(\mu_{0}H_{\parallel})$ =
$\mu_{\mathrm{B}}g_{\eta}\mu_{0}H_{\parallel}$ is the energy gap between two
Zeeman levels of free spins under the magnetic field of $H_{\parallel}$
applied along the $c$ axis. At 2 T, the calculated $C_{f}$/$T$ displays an
obvious peak at $T$ = 0.9 K [see the green line in Fig. 2(b)], while the total
measured one ($C_{\mathrm{p}}$/$T$) shows no sign of peaks below 1.5 K.
Moreover, at 0.36 K the Schottky specific heat $C_{f}$/$T$ = 0.067 JK-2/mol-Cu
calculated at 0.4 T is even larger than the total ones, 0.038 and 0.043
JK-2/mol-Cu measured at 0 and 2 T, respectively [Fig. 2(b)]. In the model
widely used in other frustrated magnets, e.g., ZnCu3(OH)6Cl2 [23] and
[NH4]2[C7H14N][V7O6F18] [34], both the lattice and “intrinsic” magnetic
specific heat is believed to be independent of applied magnetic field up to
$\sim$ 9 T, and thus their contributions are expected to be completely
canceled out in the subtracted data, $\Delta C_{\mathrm{p}}$/$T$ =
[$C_{\mathrm{p}}(\mathrm{0~{}T})-C_{\mathrm{p}}(\mu_{0}H_{\parallel})$]/$T$,
as shown in Fig. 2(c). However, the Schottky model
[$C_{f}(\mathrm{0~{}T})-C_{f}(\mu_{0}H_{\parallel})$]/$T$, see Eq. (6) for
$C_{f}$] with $f_{\parallel}$ = 0.80% clearly fails to capture the subtracted
data of YCOB, with a rather large residual $R_{p}$ = 32.3 $\gg$ 1 [see Eq. (1)
for the definition of $R_{p}$]. Following Refs. [23, 34], we also treat both
$f_{\parallel}$ and $\Delta E(\mu_{0}H_{\parallel})$ as adjustable parameters,
and obtain $f_{\parallel}$ = 0.04, $\Delta E$(0 T) = 7.4 K, $\Delta E$(2 T) =
7.7 K, $\Delta E$(6 T) = 9.5 K, and $\Delta E$(9 T) = 11.4 K with the least
$R_{p}$ = 17.4 $\gg$ 1\. In sharp contrast to ZnCu3(OH)6Cl2 [23],
[NH4]2[C7H14N][V7O6F18] [34], and ZnCu3(OH)6SO4 [36], etc., the fitted $\Delta
E(\mu_{0}H_{\parallel})$ in YCOB clearly deviates far from the expected Zeeman
energy gap of free spins.
The above inconsistency unambiguously demonstrates that the concentration of
orphan spins is much lower than 0.8%. The slight polarization and weak upturn
observed in the low-$T$ (below 0.2$J_{1}$) magnetization and susceptibilities,
respectively, should be governed by the “intrinsic” magnetic properties of the
KHA YCOB. Based on the DFT + $U$ calculations discussed in Appendix B, the
site mixing between OH and Br causes two alternate exchanges along 70% of the
hexagons on the kagome lattice, and leads to the random model no.2, which
resolves the above inconsistency naturally [see main text for the reproduction
of the weak upturn and slight polarization, and see Fig. 2(c) for the
simulations of the specific heat differences above $\sim$ 7 K $\sim$
0.1$J_{1}$].
Even when the Brillouin function for 0.8% of the free spins is subtracted from
the raw susceptibilities [see Fig. 2(d)], we find that the final refinement
results keep almost unchanged 666The main changes are the increases of the
fitted $J_{1}$ and least $R_{p}$ by $\sim$ 2 K and $\sim$ 0.6, respectively,
after the subtraction., as the difference is really trivial above
$T_{\mathrm{min}}$ = 6 K (see Fig. 13). Therefore, we use the experimental raw
susceptibilities to refine the exchange Hamiltonian below.
### C.2 Finite-temperature Lanczos diagonalization (FLD) method
Figure 11: Calculated magnetic susceptibility (a) and specific heat (b) of the
27-site NN-KHA cluster as function of normalized temperature ($T/J_{1}$) at
zero field, with the reported 42-site FLD results [50] for comparison. The
size effect is negligible at $T$ $\geq$ 0.1$J_{1}$. The inset of (a) shows the
27-site KHA cluster with the Heisenberg exchange interactions (colored
arrows). Calculated magnetic susceptibility (c) and specific heat (d) of the
24-, 21-, and 18-site NN-KHA clusters as function of normalized temperature at
zero field, with the reported 24-site ED [81], 39- and 42-site FLD [50]
results for comparison. The inset of (c) displays the 21-site KHA cluster. The
size effect of susceptibility is negligible at $T$ $\geq$ 0.2$J_{1}$, whereas
the specific heat shows size effect below $\sim$ 0.3$J_{1}$. Figure 12: (a, b)
Least-$R_{p}$ fits to the experimental raw susceptibilities with different
fixed fluctuations of exchange couplings, $\Delta J$/$J_{1}$, at
$f_{\mathrm{Y}1}$ = 0.3 experimentally determined by XRD, above 6 K. The FLD
calculations on various size random KHA clusters are conducted, and the
finite-size effect is almost negligible at $\Delta J$/$J_{1}$ $\geq$ 0.7 (see
a and b). For clarity, we present here only the low-$T$ data, please see main
text for the full temperature range. Figure 13: (a, b) Calculated
susceptibilities of the 18-site NN-KHA clusters with the Lorentzian
distribution of the NN Heisenberg interactions. (c, d) Calculated
susceptibilities of the 27-site NN-KHA clusters with the Lorentzian
distribution of the $g$ factors. The experimental raw data of YCOB measured
perpendicular and parallel to the $c$ axis are shown by gray circles, the data
subtracted by the Brillouin functions for $\sim$ 0.8% of free spins are
displayed by black squares, and the dashed lines mark the lower valid bounds
of the 18- and 27-site FLD simulations $T_{\mathrm{min}}$ = 0.2$J_{1}$ and
0.1$J_{1}$, respectively, in the ideal KHA case. The insets of (a, c) display
the randomness strength dependence of the deviation $R_{p}$ (fit to data above
$T_{\mathrm{min}}$).
We carried out FLD calculations for the thermodynamic properties on the 18-,
21-, 24-, and 27-site kagome clusters with periodic boundary conditions (PBC)
[82, 75] [insets of Fig. 11(a) and 11(c)]. 40 Lanczos steps and 10 different
randomly chosen states were used in all our FLD calculations. The finite-size
effect of susceptibility turns out to be negligible above $T_{\mathrm{min}}$ =
0.1$J_{1}$ $\sim$ 7 K and 0.2$J_{1}$ $\sim$ 12 K for the 27- and 21-(18-, 24-)
site FLD calculations, respectively, with the error less than $\sim$ 1%
compared to the reported 42-site results [50] (see Fig. 11). In our 27-site
FLD calculations, $S^{z}\equiv\sum_{j}S_{j}^{z}$ symmetry of the system was
used, and the exact diagonalization calculations were conduced in the
subspaces of $|S^{z}|$ $\geq$ 23/2 [50]. No obvious difference between two
independent 27-site FLD calculations is found [see Fig. 11(a) and 11(b)]. In
the ideal $S$ = $\frac{1}{2}$ NN-KHA case, broad peaks of our calculated
magnetic susceptibility and specific heat appear at $T_{\mathbf{p}}$($\chi$) =
0.154(4)$J_{1}$ and $T_{\mathbf{p}}$($C$) = 0.670(2)$J_{1}$, respectively,
which are well consistent with the previously reported results [50].
The ideal $S$ = $\frac{1}{2}$ NN-KHA model can’t capture precisely the
magnetic susceptibilities measured on YCOB below $T$ $\sim$ 0.6$J_{1}$ $\sim$
40 K [see Figs. 11(a)]. To better understand the thermodynamic observations,
we consider a more complicated spin Hamiltonian with bond randomness. In this
section, we first fixed the NN exchange coupling at $J_{1}$ = 1, and
calculated the thermodynamic quantities with varying strength of the
perturbations. Thereupon, we simultaneously fit the magnetic susceptibilities
of YCOB measured both parallel and perpendicular to the $c$ axis above
$T_{\mathrm{min}}$ through fine-tuning $J_{1}$ and $g$ by minimizing the
following loss function [see Eq. (1)].
### C.3 Bond randomness.
Based on the crystal structure determined by XRD (see Table 1), as well as our
DFT + $U$ calculations (see Appendix B), we constructed the model no.2 with
randomly distributed hexagons of alternate bonds (see main text), and
performed the FLD calculations on the 18-, 21-, 24-, and 27-site clusters with
PBC. The calculated thermodynamic data are evaluated over 80, 80, 40, and 36
independent samples for the 18-, 21-, 24-, and 27-site FLD calculations,
respectively, that have led to fully converged results of the random KHA
($X_{i}^{\mathrm{cal}}$) (see Fig. 12). The fluctuation of the bonds ($\Delta
J$/$J_{1}$) gradually induces local moments, which account for the growth of
the upturn in susceptibility and the decrease of the finite-size effect of the
FLD calculations. At $\Delta J$/$J_{1}$ $\geq$ 0.7, the finite-size effect
almost disappears and our FLD simulations get very convincing even at low
temperatures ($T\sim$ 0.1$J_{1}$). Both the weak upturn below $\sim$
0.5$J_{1}$ and broad hump at $\sim$ $J_{1}$ seen in susceptibilities can be
excellently reproduced by this model (see Fig. 12).
If the local symmetries of the bond randomness aren’t taken into account and
conventional Lorentzian distributions of the exchange couplings and $g$
factors are introduced (the average values are $\langle J_{1}\rangle$ and
$\langle g\rangle$, and the full widths at half maximum are $\Delta J_{1}$ and
$\Delta g$) [83, 78, 8, 52, 84, 53], there’s no way one can better fit the
magnetic susceptibilities measured on YCOB, and the residual $R_{p}$ increases
monotonically with the complete and continuous randomness (see Figs. 13).
Because the complete and continuous randomness fails to reproduce the
characteristic hump seen in susceptibilities at $\sim$ $J_{1}$. The above
analysis further validates our microscopic exchange model no.2 based on the
crystal structure and DFT + $U$ calculations for YCOB.
## Appendix D Magnetic specific heat and entropy.
Figure 14: (a, b) Temperature dependence of the total specific heat
($C_{\mathrm{p}}$, per mol Cu2+) measured on the YCOB single crystal at 0 T.
The red lines show the least-$R_{p}$ fit using the fixed model nos.1 (pure NN-
KHA, see a) and 2 (with randomly distributed hexagons of alternate bonds, see
b) and the green lines present the resulted lattice contributions
($C_{\mathrm{la}}$). (c) Magnetic specific heat of YCOB, with $C_{\mathrm{p}}$
for comparison. The violet and olive lines display the specific heat
calculated by using models nos.1 ($C_{\mathrm{nn}}$) and 2
($C_{\mathrm{ra}}$), respectively. Figure 15: (a) Magnetic specific heat of
YCOB ($C_{\mathrm{m1}}$ and $C_{\mathrm{m2}}$) obtained by subtracting the
refined lattice contributions from the total one (see Fig. 14). The colored
lines represent the specific heat calculated by using the model nos. 1 and 2
(see main text). (b) The magnetic specific heat of YCOB ($C_{\mathrm{m1}}$)
with the colored lines showing the power-law fits. The raw $C_{\mathrm{p}}$
data are shown for comparison. (c) The corresponding $C_{\mathrm{m1}}$ vs
$T^{-1}$ plot with the colored lines showing the exponential fits below 0.4 K.
(d) Magnetic entropy of YCOB, $S_{\mathrm{m1}}$ and $S_{\mathrm{m2}}$,
obtained from integrating $C_{\mathrm{m1}}/T$ and $C_{\mathrm{m2}}/T$,
respectively.
Above $\sim$ 10 K, extracting precise magnetic specific heat from the total
measured one is an extremely challenging task, in the absence of nonmagnetic
reference compounds. Recently, a relatively convincing method had been
reported in the frustrated magnets YCu3(OH)6Cl3 [47] and $\alpha$-CrOOH(D)
[75]. In this method, one first fits the total measured specific heat by using
a combination of a typical Debye-Einstein lattice model and the fixed FLD
result (the spin Hamiltonian determined by magnetization/susceptibility
measurements is fixed) well above $T_{\mathrm{min}}$. After subtracting the
refined Debye-Einstein lattice contribution, one obtains the magnetic specific
heat in the full temperature range.
In the case of YCOB, we use the 27-site FLD specific heat results calculated
from the pure NN-KHA ($C_{\mathrm{nn}}$, $J_{1}$ = 61.9 K, model no.1) and
random Hamiltonians($C_{\mathrm{ra}}$, $J_{1}$ = 50 K and $\Delta J$ =
0.7$J_{1}$, model no.2), and choose to fit the total measured specific heat
above 30 K through tuning the Debye and Einstein temperatures [see Figs. 14(a)
and 14(b)]. Each unit cell of YCOB has $\sim$ 19.5 atoms (see Table 1), and
thus 3 acoustic and $\sim$ 55.5 optical vibration modes. Therefore, we use the
similar Debye-Einstein function previously reported in Ref. [75] for YCOB,
$3C_{\mathrm{la}}=\frac{9RT^{3}}{\Theta_{\mathrm{D}}^{3}}\int_{0}^{\frac{\Theta_{\mathrm{D}}}{T}}\frac{\xi^{4}e^{\xi}}{(e^{\xi}-1)^{2}}\mathrm{d}\xi\\\
+\frac{R}{T^{2}}\sum_{n=1}^{5}\frac{w_{n}\Theta_{\mathrm{E}n}^{2}e^{\frac{\Theta_{\mathrm{E}n}}{T}}}{(e^{\frac{\Theta_{\mathrm{E}n}}{T}}-1)^{2}},$
(7)
where $\Theta_{\mathrm{D}}$ and $\Theta_{\mathrm{E}n}$ are fitting parameters.
From fitting, we obtain two series of very similar Debye and Einstein
temperatures [$\Theta_{\mathrm{D}}$ and $\Theta_{\mathrm{E}n}$ ($n$ = 1, 2, 3,
4, 5), listed in Figs. 14(a) and 14(b)] by fixing $w_{1}$, $w_{2}$, $w_{3}$,
$w_{4}$, $w_{5}$ = 6, 9, 9, 12, 19.5, respectively. We further calculate
(extrapolate) the Debye-Einstein lattice specific heat using Eq. (7) in the
full temperature range [see Figs. 14(a) and 14(b)], and get the magnetic
specific heat by removing the lattice contributions [47]. As shown in Fig.
14(c), the resulted magnetic specific heat, $C_{\mathrm{m1}}$ and
$C_{\mathrm{m2}}$, indeed show little dependence upon the starting KHA model
below $\sim$ 6 K. To be completely unbiased, we never use the specific heat
data above 2 K to refine the spin Hamiltonian throughout this work.
Figure 16: (a, c) Temperature dependence of magnetic specific heat
$C_{\mathrm{m1}}$ and $C_{\mathrm{m2}}$ under various magnetic fields applied
along the $c$ axis. Above $\sim$ 1.2 K, the zero-field data roughly show
powder-law behaviors, $C_{\mathrm{m1}}$/$T$ $\sim$ $T^{-0.47}$ (a) and
$C_{\mathrm{m2}}$/$T$ $\sim$ $T^{-0.33}$ (c), respectively. The orange lines
mark the quadratic behavior $C_{\mathrm{m}}$/$T$ $\propto$ $T$. (b, d) Data
collapse in YCOB observed above $\sim$ 1.2 K.
There is no difference between $C_{\mathrm{m1}}$ and $C_{\mathrm{m2}}$ below
$\sim$ 6 K, and thus we only show $C_{\mathrm{m1}}$ in Figs. 15(b) and 15(c).
Below 2 K, the lattice specific heat is completely negligible, which is more
than two orders of magnitude smaller than the total $C_{\mathrm{p}}$ measured
on YCOB [see Figs. 14(a) and 14(b)]. The (magnetic) specific heat of YCOB
shows a power-law behavior, $C_{\mathrm{m}}$ $\propto$ $T^{\alpha}$ at $T$ $<$
1 K [see Fig. 15(b)]. Alternatively, one could fit the low-temperature
specific heat assuming an exponential behavior, $C_{\mathrm{m}}$ $\propto$
$\exp(-\Delta_{\mathrm{g}}/T)$, but such a fit extends only up to 0.4 K with a
very small gap $\Delta_{\mathrm{g}}$ $\leq$ 0.9 K = 0.015$J_{1}$ [see Fig.
15(c)]. Below $\sim$ 1 K, the temperature dependence of magnetic entropy
flattens out at $S_{\mathrm{m}}$ $\leq$ 1.3%$R\ln 2$ [see Fig. 15(d)],
suggesting that we are indeed accessing the GS properties. The final increase
of the magnetic entropy of using model no.2 from 0.36 to 220 K is more close
to the expected value of $R\ln 2$ based on the third law of thermodynamics
than those of using other models, possibly further confirming the validation
of the random model no.2 in YCOB.
## Appendix E Scaling plot of specific heat.
Recently, Kimchi et al. have developed a theory for the scaling collapse based
on an emergent random-singlet regime in frustrated disordered quantum spin
systems [60]. This theory is applicable to lots of spin-$\frac{1}{2}$ quantum
magnets including LiZn2Mo3O8 and ZnCu3(OH)6Cl2, where the low-$T$ specific
heat behaves as $C$($H,T$)/$T$ $\sim$ $H^{-\gamma}F_{q}$($T$/$H$). Here,
$F_{q}$ is a general scaling function [60].
Above $\sim$ 0.02$J_{1}$ $\sim$ 1.2 K, the temperature and field dependence of
the magnetic heat capacity of YCOB are highly similar to those of LiZn2Mo3O8
(see Fig. 16) [60], and indeed show a scaling collapse with a familiar
$\gamma$ $\sim$ 0.33–0.47 (see Fig. 16) owing to the bond randomness. However,
below $\sim$ 0.02$J_{1}$ $\sim$ 1.2 K the zero-field magnetic specific heat of
YCOB $C_{\mathrm{m}}$/$T$ increases with the temperature, $C_{\mathrm{m}}$/$T$
$\sim$ $T^{1.31(1)}$ [see Fig. 15(b)], giving rise to a negative $\gamma$ =
$-$1.31(1). However, the theory for the scaling collapse is based on the non-
universal exponent 0 $\leq$ $\gamma$ $\leq$ 1, and thus obviously isn’t
applicable to YCOB below the crossover temperature of $\sim$ 0.02$J_{1}$
$\sim$ 1.2 K [see Figs. 16(b) and 16(d)].
## Appendix F Mean-field Ansatz of various spin-liquid states.
In this section, we try to understand the specific heat behavior of YCOB below
$\sim$ 2 K, where the lattice contribution is completely negligible and the
raw measured data directly reflect the GS properties of the spin system. Since
no conventional magnetic transition is found in YCOB, we start with the
effective mean-field models (i.e. mean-field Ansatz) of various QSLs,
including the uniform resonating-valence-bond (RVB), U(1) Dirac, and
$\mathbb{Z}_{2}$ states on the kagome lattice.
Figure 17: (a, e, i) Kagome lattice with showing the sign structures of
hopping terms in a unit cell. Red and blue solid lines present the first-
neighbor $\nu_{jl}$ = 1 and $-$1, whereas the red and blue dashed lines (i)
present the second-neighbor $\nu_{jl^{\prime}}$ = 1 and $-$1, respectively.
(b, f, j) The first Brillouin zone for the uniform RVB, U(1) Dirac, and
$\mathbb{Z}_{2}[0,\pi]\beta$ QSL states. The outer hexagons show the first
Brillouin zone for the kagome lattice with the arrows showing the [$h$, 0, 0]
and [0, $k$, 0] directions. The black circles mark the positions of the Dirac
nodes in (f). (c, g, k) The band structures of the uniform RVB, U(1) Dirac,
and $\mathbb{Z}_{2}[0,\pi]\beta$ QSL states along the [0, $k$, 0] direction at
$h$ = 0. The calculated band structures in 0 and 6 T are shown by the blue and
red lines, respectively. In the cases of (c) uniform RVB and (g) U(1) Dirac
QSLs, the spin-up and -down bands of spinons are degenerate in zero field (the
flat band marked in blue is fourfold degenerate in g), and are split in an
applied magnetic field (the flat bands marked in red are still doubly
degenerate in g). In the case of $\mathbb{Z}_{2}[0,\pi]\beta$ state (k), the
applied field shifts the energy levels up by
$\mu_{0}H_{\parallel}\mu_{\mathrm{eff}}$. (d, h, l) Low-$T$ specific heat of
YCOB measured in magnetic fields applied along the $c$ axis, with colored
lines showing the calculations using the mean-field Ansatz of uniform RVB,
U(1) Dirac, and $\mathbb{Z}_{2}[0,\pi]\beta$ states. The solid lines display
the fits with the adjustable effective magnetic moment $\mu_{\mathrm{eff}}$
$\sim$ 0.5$\mu_{\mathrm{B}}$, whereas the dashed lines show the results with
the fixed $\mu_{\mathrm{eff}}$ = $\mu_{\mathrm{B}}$.
### F.1 Uniform resonating-valence-bond state.
The simplest mean-field Hamiltonian is the so-called uniform RVB state and is
given by [11],
$\mathcal{H}_{\mathrm{uniform}}=-J_{1}[\lambda_{3}\sum_{j\sigma}f_{j\sigma}^{{\dagger}}f_{j\sigma}+\chi_{1}\sum_{\langle
jl\rangle,\sigma}(f_{j\sigma}^{{\dagger}}f_{l\sigma}+\mathrm{H.c.})]\\\
-\mu_{0}H_{\parallel}\mu_{\mathrm{eff}}\sum_{j,\sigma}\sigma
f_{j\sigma}^{{\dagger}}f_{j\sigma},$ (8)
where $\sigma$ = $\uparrow$ ($+$1) and $\downarrow$ ($-$1) represents spin-up
and -down fermionic spinons, respectively, $\mu_{\mathrm{eff}}$ is the
effective spin-$\frac{1}{2}$ moments, and $\chi_{1}$ is the first-neighbor
hopping term [see Fig. 17(a)]. The chemical potential $\lambda_{3}$ in both
the uniform RVB and U(1) Dirac scenarios are self-consistently determined by
the constraint, $\sum_{j}(\sum_{\sigma}\langle
f_{j\sigma}^{{\dagger}}f_{j\sigma}\rangle-1)$ = 0, at each temperature and in
each applied magnetic field [11], and $J_{1}$ = 60 K is fixed in this section.
It is worth mentioning that the above constraint isn’t strict enough to impose
the single-occupancy constraint
$\sum_{\sigma}f_{j\sigma}^{{\dagger}}f_{j\sigma}$ = 1 [7]. Therefore, in the
framework of the mean-field theory many unphysical states can contribute to
extra density of states and thus specific heat, which may account for the
reduced specific heat coefficient $\gamma_{2}$ and effect magnetic moment
$\mu_{\mathrm{eff}}$ observed in YCOB (see below).
Below $\sim$ 1 K, the zero-field specific heat of YCOB exhibits a nearly
quadratic temperature dependence, $C_{\mathrm{\mathrm{p}}}$ =
0.142(1)$T^{2.31(1)}$ (JK-1/mol-Cu), which contradicts with the uniform RVB
state. A linear temperature dependence of specific heat is expected in the
uniform RVB state, because of the large Fermi surface [see Fig. 17(c)]. The
applied magnetic field up to $\sim$ 6 T only slightly changes the density of
states around Fermi surface, and thus the calculated field dependence of
specific heat is extremely weak [see Fig. 17(d)]. In contrast, the specific
heat measured on YCOB shows a clear magnetic field dependence [see Fig.
17(d)], and thus unambiguously precludes the uniform RVB scenario.
### F.2 U(1) Dirac spin liquid.
Similarly, the mean-field Ansatz of the U(1) SL state is given by [11],
$\mathcal{H}_{\mathrm{U(1)}}=-J_{1}[\lambda_{3}\sum_{j,\sigma}f_{j\sigma}^{{\dagger}}f_{j\sigma}+\chi_{1}\sum_{\langle
jl\rangle,\sigma}\nu_{jl}(f_{j\sigma}^{{\dagger}}f_{l\sigma}+\mathrm{H.c.})]\\\
-\mu_{0}H_{\parallel}\mu_{\mathrm{eff}}\sum_{j,\sigma}\sigma
f_{j\sigma}^{{\dagger}}f_{j\sigma},$ (9)
where $\nu_{jl}$ $\equiv$ $\pm$1 presents the sign structure of hopping terms
[see Fig. 17(e)]. Our calculated band structure is identical to that reported
in Ref. [11], and the temperature and field dependence of low-$T$ specific
heat in both $\mu_{0}H_{\parallel}\mu_{\mathrm{eff}}$ $\ll$ $k_{\mathrm{B}}T$
$\ll$ $\chi_{1}J_{1}$ and $k_{\mathrm{B}}T$ $\ll$
$\mu_{0}H_{\parallel}\mu_{\mathrm{eff}}$ $\ll$ $\chi_{1}J_{1}$ limits are
reproduced.
At 0 T, the low-$T$ specific heat of U(1) SL state behaves as $C_{\mathrm{p}}$
= $\frac{72\zeta(3)\pi k_{\mathrm{B}}^{3}A}{(2\pi\hbar v_{\mathrm{F}})}T^{2}$
(JK-1/mol-Cu) [11], where $v_{\mathrm{F}}$ =
$\frac{a\chi_{1}J_{1}}{\sqrt{2}\hbar}$ is the Fermi velocity and $A$ =
$\frac{\sqrt{3}N_{\mathrm{A}}a^{2}}{6}$ = 7.72$\times$104 m2/mol-Cu is the
area of the two-dimensional system. From fitting the specific heat using the
quadratic-temperature function below $\sim$ 1 K, we obtain
$C_{\mathrm{p}}\sim\gamma_{2}T^{2}$ with $\gamma_{2}$ = 0.11(1) JK-3/mol-Cu at
0 T, and thus $v_{\mathrm{F}}$ = 1.07(5)$\times$103 m/s, in YCOB. The resulted
$\chi_{1}$ = 0.29(1) is roughly consistent with the mean-field value of
$\chi_{1}(\mathrm{MF})$ = 0.221 found by Hastings [64], and thus supports the
U(1) Dirac scenario in YCOB. The mean-field theory gives a slightly
overestimated specific heat coefficient $\gamma_{2}(\mathrm{MF})$ =
$\frac{6\sqrt{3}\zeta(3)k_{\mathrm{B}}^{3}N_{\mathrm{A}}}{\pi
J_{1}^{2}[\chi_{1}(\mathrm{MF})]^{2}}$ = 0.188 JK-3/mol-Cu, possibly owing to
the unphysical states (see above).
When a magnetic field is applied, the band structure tends to form Fermi
pockets around the Dirac nodes in the reciprocal space [see Fig. 17(g)].
Therefore, both low-energy density of states and thus low-$T$ specific heat
increase with the strength of the magnetic field. The spinons with the free
electron moment $\mu_{\mathrm{eff}}$ = $\mu_{\mathrm{B}}$ will cause a
stronger dependence of specific heat upon the magnetic field, and obviously
can’t explain the observations, resulting in a large $R_{p}$ = 127 [see Fig.
17(h)]. A remedy is to set $\mu_{\mathrm{eff}}$ an adjustable parameter. From
fitting all the low-$T$ ($<$ 1 K) specific heat data of YCOB simultaneously,
we obtain $\chi_{1}$ = 0.27 and a significantly reduced moment
$\mu_{\mathrm{eff}}$ = 0.43$\mu_{\mathrm{B}}$ with the least $R_{p}$ = 20.4
[see Fig. 17(h)].
### F.3 $\mathbb{Z}_{2}[0,\pi]\beta$ spin liquid.
Finally, we check the $\mathbb{Z}_{2}$ scenario for YCOB, and use the mean-
field Hamiltonian previously reported in Ref. [63],
$\mathcal{H}_{\mathbb{Z}_{2}}=-J_{1}[\sum_{j}(\lambda_{3}\sum_{\sigma}f_{j\sigma}^{{\dagger}}f_{j\sigma}+\lambda_{1}f_{j\uparrow}^{{\dagger}}f_{j\downarrow}^{{\dagger}}+\mathrm{H.c.})\\\
+\chi_{1}\sum_{\langle
jl\rangle,\sigma}\nu_{jl}(f_{j\sigma}^{{\dagger}}f_{l\sigma}+\mathrm{H.c.}\\\
+\sum_{\langle\langle
jl^{\prime}\rangle\rangle}\nu_{jl}(\chi_{2}\sum_{\sigma}f_{j\sigma}^{{\dagger}}f_{l^{\prime}\sigma}+\Delta_{2}\sum_{\sigma}\sigma
f_{j\sigma}^{{\dagger}}f_{l^{\prime}\bar{\sigma}}^{{\dagger}}+\mathrm{H.c.})]\\\
-\mu_{0}H_{\parallel}\mu_{\mathrm{eff}}\sum_{j,\sigma}\sigma
f_{j\sigma}^{{\dagger}}f_{j\sigma},$ (10)
where $\lambda_{1}$ and $\lambda_{3}$ are single-ion chemical potentials self-
consistently determined by $\sum_{j}\langle
f_{j\uparrow}^{{\dagger}}f_{j\downarrow}^{{\dagger}}\rangle$ =
$\sum_{j}\langle f_{j\uparrow}f_{j\downarrow}\rangle$ = 0 and
$\sum_{j}(\sum_{\sigma}\langle f_{j\sigma}^{{\dagger}}f_{j\sigma}\rangle-1)$ =
0, and the mean-field Ansatz up to the second neighbors in a unit cell is
shown in Fig. 17(i). By setting the mean-field parameters $\chi_{2}$ =
$\Delta_{2}$ = 0, we naturally go back to the U(1) Dirac scenario [see Eq.
(9)], and reproduce the band structure 777It is worth mentioning that there is
a flip for the spin-down band since we use the Nambu representation in the
$\mathbb{Z}_{2}[0,\pi]\beta$ scenario. and observable quantities (e.g.,
specific heat) of the U(1) Dirac QSL. When both $\chi_{2}$ and $\Delta_{2}$
are small, the $\mathbb{Z}_{2}[0,\pi]\beta$ state is in the neighborhood of
the U(1) Dirac SL state, and has a small gap due to the singlet-pairing term
$\Delta_{2}$ $\neq$ 0 around the wave vectors of the previous U(1) Dirac
nodes.
Similarly, from fitting the specific heat data below $\sim$ 1 K we obtain
$\chi_{1}$ = 0.176, $\chi_{2}$ = 0.043, $\Delta_{2}$ = 0.013, and
$\mu_{\mathrm{eff}}$ = 0.48$\mu_{\mathrm{B}}$ with the least $R_{p}$ = 7.9
[see Fig. 17(l)]. The $\Delta_{2}$ term opens a small spin (triplet) gap
$\sim$ 0.14$\chi_{1}J_{1}$ $\sim$ 0.025$J_{1}$ in the band structure [see Fig.
17(k)]. When $\mu_{\mathrm{eff}}$ = $\mu_{\mathrm{B}}$ is fixed, we get
$\chi_{1}$ = 0.160, $\chi_{2}$ = 0.11, and $\Delta_{2}$ = 0.014, with $R_{p}$
= 32.4 [see Fig. 17(l)].
## References
* Anderson [1973] P. W. Anderson, Resonating valence bonds: A new kind of insulator?, Mater. Res. Bull. 8, 153 (1973).
* Nayak _et al._ [2008] C. Nayak, S. H. Simon, A. Stern, M. Freedman, and S. Das Sarma, Non-Abelian anyons and topological quantum computation, Rev. Mod. Phys. 80, 1083 (2008).
* Anderson [1987] P. W. Anderson, The resonating valence bond state in La2CuO4 and superconductivity, Science 235, 1196 (1987).
* Kasahara _et al._ [2018] Y. Kasahara, T. Ohnishi, Y. Mizukami, O. Tanaka, S. Ma, K. Sugii, N. Kurita, H. Tanaka, J. Nasu, Y. Motome, T. Shibauchi, and Y. Matsuda, Majorana quantization and half-integer thermal quantum Hall effect in a Kitaev spin liquid, Nature 559, 227 (2018).
* Balents [2010] L. Balents, Spin liquids in frustrated magnets, Nature 464, 199 (2010).
* Broholm _et al._ [2020] C. Broholm, R. J. Cava, S. A. Kivelson, D. G. Nocera, M. R. Norman, and T. Senthil, Quantum spin liquids, Science 367, eaay0668 (2020).
* Zhou _et al._ [2017] Y. Zhou, K. Kanoda, and T.-K. Ng, Quantum spin liquid states, Rev. Mod. Phys. 89, 025003 (2017).
* Li [2019] Y. Li, YbMgGaO4: A triangular-lattice quantum spin liquid candidate, Adv. Quantum Technol. 2, 1900089 (2019).
* Elser [1989] V. Elser, Nuclear antiferromagnetism in a registered ${}^{3}\mathrm{He}$ solid, Phys. Rev. Lett. 62, 2405 (1989).
* Waldtmann _et al._ [1998] C. Waldtmann, H.-U. Everts, B. Bernu, C. Lhuillier, P. Sindzingre, P. Lecheminant, and L. Pierre, First excitations of the spin 1/2 Heisenberg antiferromagnet on the kagomé lattice, Eur. Phys. J. B 2, 501 (1998).
* Ran _et al._ [2007] Y. Ran, M. Hermele, P. A. Lee, and X.-G. Wen, Projected-wave-function study of the spin-$1/2$ Heisenberg model on the kagomé lattice, Phys. Rev. Lett. 98, 117205 (2007).
* Liao _et al._ [2017] H. J. Liao, Z. Y. Xie, J. Chen, Z. Y. Liu, H. D. Xie, R. Z. Huang, B. Normand, and T. Xiang, Gapless spin-liquid ground state in the $S$ =1/2 kagome antiferromagnet, Phys. Rev. Lett. 118, 137202 (2017).
* He _et al._ [2017] Y.-C. He, M. P. Zaletel, M. Oshikawa, and F. Pollmann, Signatures of Dirac cones in a DMRG study of the kagome Heisenberg model, Phys. Rev. X 7, 031020 (2017).
* Zhu _et al._ [2018] W. Zhu, X. Chen, Y.-C. He, and W. Witczak-Krempa, Entanglement signatures of emergent Dirac fermions: Kagome spin liquid and quantum criticality, Sci. Adv. 4, eaat5535 (2018).
* Lee _et al._ [2018] C.-Y. Lee, B. Normand, and Y.-J. Kao, Gapless spin liquid in the kagome Heisenberg antiferromagnet with Dzyaloshinskii-Moriya interactions, Phys. Rev. B 98, 224414 (2018).
* Yan _et al._ [2011] S. Yan, D. A. Huse, and S. R. White, Spin-liquid ground state of the $S$ = 1/2 kagome Heisenberg antiferromagnet, Science 332, 1173 (2011).
* Depenbrock _et al._ [2012] S. Depenbrock, I. P. McCulloch, and U. Schollwöck, Nature of the spin-liquid ground state of the $S$ = 1/2 Heisenberg model on the kagome lattice, Phys. Rev. Lett. 109, 067201 (2012).
* Iqbal _et al._ [2013] Y. Iqbal, F. Becca, S. Sorella, and D. Poilblanc, Gapless spin-liquid phase in the kagome spin-$\frac{1}{2}$ Heisenberg antiferromagnet, Phys. Rev. B 87, 060405 (2013).
* Iqbal _et al._ [2014] Y. Iqbal, D. Poilblanc, and F. Becca, Vanishing spin gap in a competing spin-liquid phase in the kagome Heisenberg antiferromagnet, Phys. Rev. B 89, 020407 (2014).
* Shores _et al._ [2005] M. P. Shores, E. A. Nytko, B. M. Bartlett, and D. G. Nocera, A structurally perfect $S$ = 1/2 kagomé antiferromagnet, J. Am. Chem. Soc. 127, 13462 (2005).
* Helton _et al._ [2007] J. S. Helton, K. Matan, M. P. Shores, E. A. Nytko, B. M. Bartlett, Y. Yoshida, Y. Takano, A. Suslov, Y. Qiu, J.-H. Chung, D. G. Nocera, and Y. S. Lee, Spin dynamics of the spin-1/2 kagome lattice antiferromagnet ZnCu3(OH)6Cl2, Phys. Rev. Lett. 98, 107204 (2007).
* Bert _et al._ [2007] F. Bert, S. Nakamae, F. Ladieu, D. L’Hôte, P. Bonville, F. Duc, J.-C. Trombe, and P. Mendels, Low temperature magnetization of the $S$ = $\frac{1}{2}$ kagome antiferromagnet ZnCu3(OH)6Cl2, Phys. Rev. B 76, 132411 (2007).
* de Vries _et al._ [2008] M. A. de Vries, K. V. Kamenev, W. A. Kockelmann, J. Sanchez-Benitez, and A. Harrison, Magnetic ground state of an experimental $S$ = 1/2 kagome antiferromagnet, Phys. Rev. Lett. 100, 157205 (2008).
* Han _et al._ [2012a] T.-H. Han, J. S. Helton, S. Chu, D. G. Nocera, J. A. Rodriguez-Rivera, C. Broholm, and Y. S. Lee, Fractionalized excitations in the spin-liquid state of a kagome-lattice antiferromagnet, Nature 492, 406 (2012a).
* Han _et al._ [2016] T.-H. Han, M. R. Norman, J.-J. Wen, J. A. Rodriguez-Rivera, J. S. Helton, C. Broholm, and Y. S. Lee, Correlated impurities and intrinsic spin-liquid physics in the kagome material herbertsmithite, Phys. Rev. B 94, 060409 (2016).
* Olariu _et al._ [2008] A. Olariu, P. Mendels, F. Bert, F. Duc, J. C. Trombe, M. A. de Vries, and A. Harrison, 17O NMR study of the intrinsic magnetic susceptibility and spin dynamics of the quantum kagome antiferromagnet ZnCu3(OH)6Cl2, Phys. Rev. Lett. 100, 087202 (2008).
* Fu _et al._ [2015] M. Fu, T. Imai, T.-H. Han, and Y. S. Lee, Evidence for a gapped spin-liquid ground state in a kagome Heisenberg antiferromagnet, Science 350, 655 (2015).
* Khuntia _et al._ [2020] P. Khuntia, M. Velazquez, Q. Barthélemy, F. Bert, E. Kermarrec, A. Legros, B. Bernu, L. Messio, A. Zorko, and P. Mendels, Gapless ground state in the archetypal quantum kagome antiferromagnet ZnCu3(OH)6Cl2, Nat. Phys. 16, 469 (2020).
* Fåk _et al._ [2012] B. Fåk, E. Kermarrec, L. Messio, B. Bernu, C. Lhuillier, F. Bert, P. Mendels, B. Koteswararao, F. Bouquet, J. Ollivier, A. D. Hillier, A. Amato, R. H. Colman, and A. S. Wills, Kapellasite: A kagome quantum spin liquid with competing interactions, Phys. Rev. Lett. 109, 037208 (2012).
* Kermarrec _et al._ [2014] E. Kermarrec, A. Zorko, F. Bert, R. H. Colman, B. Koteswararao, F. Bouquet, P. Bonville, A. Hillier, A. Amato, J. van Tol, A. Ozarowski, A. S. Wills, and P. Mendels, Spin dynamics and disorder effects in the $S$ = $\frac{1}{2}$ kagome Heisenberg spin-liquid phase of kapellasite, Phys. Rev. B 90, 205103 (2014).
* Feng _et al._ [2017] Z. Feng, Z. Li, X. Meng, W. Yi, Y. Wei, J. Zhang, Y.-C. Wang, W. Jiang, Z. Liu, and S. Li, Gapped spin-1/2 spinon excitations in a new kagome quantum spin liquid compound Cu3Zn(OH)6FBr, Chin. Phys. Lett. 34, 077502 (2017).
* Fu _et al._ [2021] Y. Fu, M.-L. Lin, L. Wang, Q. Liu, L. Huang, W. Jiang, Z. Hao, C. Liu, H. Zhang, X. Shi, J. Zhang, J. Dai, D. Yu, F. Ye, P. A. Lee, P.-H. Tan, and J.-W. Mei, Dynamic fingerprint of fractionalized excitations in single-crystalline Cu3Zn(OH)6FBr, Nat. Commun. 12, 3048 (2021).
* Aidoudi _et al._ [2011] F. H. Aidoudi, D. W. Aldous, R. J. Goff, A. M. Z. Slawin, J. Paul Attfield, R. E. Morris, and P. Lightfoot, An ionothermally prepared $S$ = 1/2 vanadium oxyfluoride kagome lattice, Nat. Chem. 3, 801 (2011).
* Clark _et al._ [2013] L. Clark, J. C. Orain, F. Bert, M. A. De Vries, F. H. Aidoudi, R. E. Morris, P. Lightfoot, J. S. Lord, M. T. F. Telling, P. Bonville, J. P. Attfield, P. Mendels, and A. Harrison, Gapless spin liquid ground state in the $S$ = 1/2 vanadium oxyfluoride kagome antiferromagnet [NH4]2[C7H14N][V7O6F18], Phys. Rev. Lett. 110, 207208 (2013).
* Jiang _et al._ [2020] N. Jiang, A. Ramanathan, J. Bacsa, and H. S. L. Pierre, Synthesis of a $d^{1}$-titanium fluoride kagome lattice antiferromagnet, Nat. Chem. 12, 691 (2020).
* Li _et al._ [2014] Y. Li, B. Pan, S. Li, W. Tong, L. Ling, Z. Yang, J. Wang, Z. Chen, Z. Wu, and Q. Zhang, Gapless quantum spin liquid in the $S$ = 1/2 anisotropic kagome antiferromagnet ZnCu3(OH)6SO4, New J. Phys. 16, 93011 (2014).
* Gomilšek _et al._ [2017] M. Gomilšek, M. Klanjšek, R. Žitko, M. Pregelj, F. Bert, P. Mendels, Y. Li, Q. M. Zhang, and A. Zorko, Field-induced instability of a gapless spin liquid with a spinon Fermi surface, Phys. Rev. Lett. 119, 137205 (2017).
* Gomilšek _et al._ [2019] M. Gomilšek, R. Žitko, M. Klanjšek, M. Pregelj, C. Baines, Y. Li, Q. M. Zhang, and A. Zorko, Kondo screening in a charge-insulating spinon metal, Nat. Phys. 15, 754 (2019).
* Norman [2016] M. R. Norman, Colloquium: Herbertsmithite and the search for the quantum spin liquid, Rev. Mod. Phys. 88, 041002 (2016).
* Chen _et al._ [2020] X.-H. Chen, Y.-X. Huang, Y. Pan, and J.-X. Mi, Quantum spin liquid candidate YCu3(OH)6Br2[Brx(OH)1-x] ($x$ $\approx$ 0.51): With an almost perfect kagomé layer, J. Magn. Magn. Mater. 512, 167066 (2020).
* Zeng _et al._ [2021] Z. Zeng, X. Ma, S. Wu, H.-F. Li, Z. Tao, X. Lu, X.-h. Chen, J.-X. Mi, S. Song, G. Cao, G. Che, K. Li, G. Li, H. Luo, Z. Y. Meng, and S. Li, Possible dirac quantum spin liquid in a kagome quantum antiferromagnet YCu3(OH)6Br2[Brx(OH)1-x], arXiv preprint arXiv:2107.11942 (2021).
* Note [1] The Schottky anomaly of the H and D nuclear spins can appear in $C_{\mathrm{p}}$ below $\sim$ 0.2 K [41, 86, 36], and the temperature of 0.36 K $\sim$ 0.006$J_{1}$ is low enough for YCOB that the entropy flattens out at $S_{\mathrm{m}}$ $<$ 1.3%$R$ln 2 [see Fig. 15(d)].
* Kresse and Furthmüller [1996a] G. Kresse and J. Furthmüller, Efficiency of ab-initio total energy calculations for metals and semiconductors using a plane-wave basis set, Comput. Mater. Sci. 6, 15 (1996a).
* Kresse and Furthmüller [1996b] G. Kresse and J. Furthmüller, Efficient iterative schemes for ab initio total-energy calculations using a plane-wave basis set, Phys. Rev. B 54, 11169 (1996b).
* Note [2] Because the ideal NN KHA exhibits a broad peak in susceptibility at $T_{\mathrm{p}}$ $\sim$ 0.154$J_{1}$ $\sim$ 9 K.
* Zorko _et al._ [2008] A. Zorko, S. Nellutla, J. van Tol, L. C. Brunel, F. Bert, F. Duc, J.-C. Trombe, M. A. de Vries, A. Harrison, and P. Mendels, Dzyaloshinsky-Moriya anisotropy in the spin-1/2 kagome compound ZnCu3(OH)6Cl2, Phys. Rev. Lett. 101, 026405 (2008).
* Arh _et al._ [2020] T. Arh, M. Gomilšek, P. Prelovšek, M. Pregelj, M. Klanjšek, A. Ozarowski, S. J. Clark, T. Lancaster, W. Sun, J.-X. Mi, and A. Zorko, Origin of magnetic ordering in a structurally perfect quantum kagome antiferromagnet, Phys. Rev. Lett. 125, 027203 (2020).
* Li [2021] T. Li, A continuous family of fully frustrated Heisenberg models on the Kagome lattice, EPL 133, 47001 (2021).
* Han _et al._ [2012b] T. Han, S. Chu, and Y. S. Lee, Refining the spin Hamiltonian in the spin-$\frac{1}{2}$ kagome lattice antiferromagnet ZnCu3(OH)6Cl2 using single crystals, Phys. Rev. Lett. 108, 157202 (2012b).
* Schnack _et al._ [2018] J. Schnack, J. Schulenburg, and J. Richter, Magnetism of the $N$ = 42 kagome lattice antiferromagnet, Phys. Rev. B 98, 094423 (2018).
* Mizuno _et al._ [1998] Y. Mizuno, T. Tohyama, S. Maekawa, T. Osafune, N. Motoyama, H. Eisaki, and S. Uchida, Electronic states and magnetic properties of edge-sharing cu-o chains, Phys. Rev. B 57, 5326 (1998).
* Li _et al._ [2020] Y. Li, S. Bachus, H. Deng, W. Schmidt, H. Thoma, V. Hutanu, Y. Tokiwa, A. A. Tsirlin, and P. Gegenwart, Partial up-up-down order with the continuously distributed order parameter in the triangular antiferromagnet TmMgGaO4, Phys. Rev. X 10, 011007 (2020).
* Li _et al._ [2021] Y. Li, Q.-Y. Li, W. Li, T. Liu, D. J. Voneshen, P. K. Biswas, and D. Adroja, Spin dynamics and Griffiths singularity in the random quantum Ising magnet PrTiNbO6, npj Quantum Mater. 6, 34 (2021).
* Kawamura _et al._ [2014] H. Kawamura, K. Watanabe, and T. Shimokawa, Quantum spin-liquid behavior in the spin-1/2 random-bond Heisenberg antiferromagnet on the kagome lattice, J. Phys. Soc. Jpn. 83, 103704 (2014).
* Gregor and Motrunich [2008] K. Gregor and O. I. Motrunich, Nonmagnetic impurities in the spin-1/2 kagome antiferromagnet, Phys. Rev. B 77, 184423 (2008).
* Rousochatzakis _et al._ [2009] I. Rousochatzakis, S. R. Manmana, A. M. Läuchli, B. Normand, and F. Mila, Dzyaloshinskii-Moriya anisotropy and nonmagnetic impurities in the $s$ = $\frac{1}{2}$ kagome system ZnCu3(OH)6Cl2, Phys. Rev. B 79, 214415 (2009).
* Singh [2010] R. R. P. Singh, Valence bond glass phase in dilute kagome antiferromagnets, Phys. Rev. Lett. 104, 177203 (2010).
* Shimokawa _et al._ [2015] T. Shimokawa, K. Watanabe, and H. Kawamura, Static and dynamical spin correlations of the $S=\frac{1}{2}$ random-bond antiferromagnetic Heisenberg model on the triangular and kagome lattices, Phys. Rev. B 92, 134407 (2015).
* Watanabe _et al._ [2014] H. Watanabe, K.and Kawamura, T. Shimokawa, and T. Sakai, Quantum spin-liquid behavior in the spin-1/2 random Heisenberg antiferromagnet on the triangular lattice, J. Phys. Soc. Jpn. 83, 034714 (2014).
* Kimchi _et al._ [2018a] I. Kimchi, J. P. Sheckelton, T. M. Mcqueen, and P. A. Lee, Scaling and data collapse from local moments in frustrated disordered quantum spin systems, Nat. Commun. 9, 4367 (2018a).
* [61] X. Hong, Y. Li, C. Hess, _et al._ , (in preparation) .
* Wen [2002] X.-G. Wen, Quantum orders and symmetric spin liquids, Phys. Rev. B 65, 165113 (2002).
* Lu _et al._ [2011] Y.-M. Lu, Y. Ran, and P. A. Lee, $\mathbb{Z}_{2}$ spin liquids in the $S=\frac{1}{2}$ Heisenberg model on the kagome lattice: A projective symmetry-group study of Schwinger fermion mean-field states, Phys. Rev. B 83, 224413 (2011).
* Hastings [2000] M. B. Hastings, Dirac structure, RVB, and Goldstone modes in the kagomé antiferromagnet, Phys. Rev. B 63, 014413 (2000).
* Motrunich [2005] O. I. Motrunich, Variational study of triangular lattice spin-$\frac{1}{2}$ model with ring exchanges and spin liquid state in $\kappa-$(ET)2Cu2(CN)3, Phys. Rev. B 72, 045105 (2005).
* Note [3] The significant decrease of the effective magnetic moment from $\mu_{\mathrm{B}}$ may originate from the unphysical states due to the rough treatment of the single-occupied condition, which is another issue beyond the mean-field theory worth of further research.
* Sun _et al._ [2016] W. Sun, Y.-X. Huang, S. Nokhrin, Y. Pan, and J.-X. Mi, Perfect kagome lattices in YCu3(OH)6Cl3: a new candidate for the quantum spin liquid state, J. Mater. Chem. C 4, 8772 (2016).
* Barthélemy _et al._ [2019] Q. Barthélemy, P. Puphal, K. M. Zoch, C. Krellner, H. Luetkens, C. Baines, D. Sheptyakov, E. Kermarrec, P. Mendels, and F. Bert, Local study of the insulating quantum kagome antiferromagnets YCu3(OH)6OxCl3-x ($x$ = 0, 1/3), Phys. Rev. Materials 3, 074401 (2019).
* Zorko _et al._ [2019a] A. Zorko, M. Pregelj, M. Klanjšek, M. Gomilšek, Z. Jagličič, J. S. Lord, J. A. T. Verezhak, T. Shang, W. Sun, and J. X. Mi, Coexistence of magnetic order and persistent spin dynamics in a quantum kagome antiferromagnet with no intersite mixing, Phys. Rev. B 99, 214441 (2019a).
* Zorko _et al._ [2019b] A. Zorko, M. Pregelj, M. Gomilšek, M. Klanjšek, O. Zaharko, W. Sun, and J. X. Mi, Negative-vector-chirality 120∘ spin structure in the defect- and distortion-free quantum kagome antiferromagnet YCu3(OH)6Cl3, Phys. Rev. B 100, 144420 (2019b).
* Zhu _et al._ [2017] Z. Zhu, P. A. Maksimov, S. R. White, and A. L. Chernyshev, Disorder-induced mimicry of a spin liquid in YbMgGaO4, Phys. Rev. Lett. 119, 157201 (2017).
* Kimchi _et al._ [2018b] I. Kimchi, A. Nahum, and T. Senthil, Valence bonds in random quantum magnets: Theory and application to YbMgGaO4, Phys. Rev. X 8, 031028 (2018b).
* Abragam and Bleaney [2012] A. Abragam and B. Bleaney, _Electron paramagnetic resonance of transition ions_ (OUP Oxford, 2012).
* Valko _et al._ [1990] M. Valko, P. Pelikán, S. Biskupič, and M. Mazúr, ESR spectra of copper-(II) complexes in the solids, Chem. Papers 44, 805 (1990).
* Liu _et al._ [2021] J. Liu, B. Liu, L. Yuan, B. Li, L. Xie, X. Chen, H. Zhang, D. Xu, W. Tong, J. Wang, and Y. Li, Frustrated magnetism of the triangular-lattice antiferromagnets $\alpha$-CrOOH and $\alpha$-CrOOD, New J. Phys. 23, 033040 (2021).
* Janson _et al._ [2016] O. Janson, S. Furukawa, T. Momoi, P. Sindzingre, J. Richter, and K. Held, Magnetic behavior of volborthite Cu3V2O7(OH)2$\cdot$2H2O determined by coupled trimers rather than frustrated chains, Phys. Rev. Lett. 117, 037206 (2016).
* Janson _et al._ [2008] O. Janson, J. Richter, and H. Rosner, Modified kagome physics in the natural spin-$1/2$ kagome lattice systems: Kapellasite Cu3Zn(OH)6Cl2 and haydeeite Cu3Mg(OH)6Cl2, Phys. Rev. Lett. 101, 106403 (2008).
* Li _et al._ [2017] Y. Li, D. Adroja, R. I. Bewley, D. Voneshen, A. A. Tsirlin, P. Gegenwart, and Q. Zhang, Crystalline electric-field randomness in the triangular lattice spin-liquid YbMgGaO4, Phys. Rev. Lett. 118, 107202 (2017).
* Perdew _et al._ [1996] J. P. Perdew, K. Burke, and M. Ernzerhof, Generalized gradient approximation made simple, Phys. Rev. Lett. 77, 3865 (1996).
* Note [4] The main changes are the increases of the fitted $J_{1}$ and least $R_{p}$ by $\sim$ 2 K and $\sim$ 0.6, respectively, after the subtraction.
* Misguich and Sindzingre [2007] G. Misguich and P. Sindzingre, Magnetic susceptibility and specific heat of the spin-$\frac{1}{2}$ Heisenberg model on the kagome lattice and experimental data on ZnCu3(OH)6Cl2, Eur. Phys. J. B 59, 305 (2007).
* Jaklič and Prelovšek [1994] J. Jaklič and P. Prelovšek, Lanczos method for the calculation of finite-temperature quantities in correlated systems, Phys. Rev. B 49, 5065 (1994).
* Li _et al._ [2015] Y. Li, H. Liao, Z. Zhang, S. Li, F. Jin, L. Ling, L. Zhang, Y. Zou, L. Pi, Z. Yang, J. Wang, Z. Wu, and Q. Zhang, Gapless quantum spin liquid ground state in the two-dimensional spin-1/2 triangular antiferromagnet YbMgGaO4, Sci. Rep. 5, 16419 (2015).
* Li _et al._ [2018] Y. Li, S. Bachus, Y. Tokiwa, A. A. Tsirlin, and P. Gegenwart, Gapped ground state in the zigzag pseudospin-1/2 quantum antiferromagnetic chain compound PrTiNbO6, Phys. Rev. B 97, 184434 (2018).
* Note [5] It is worth mentioning that there is a flip for the spin-down band since we use the Nambu representation in the $\mathbb{Z}_{2}[0,\pi]\beta$ scenario.
* Yamashita _et al._ [2011] S. Yamashita, T. Yamamoto, Y. Nakazawa, M. Tamura, and R. Kato, Gapless spin liquid of an organic triangular compound evidenced by thermodynamic measurements, Nat. Commun. 2, 275 (2011).
| arxiv-papers | 2021-07-27T10:14:04 | 2024-09-04T03:07:21.213068 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Jiabin Liu and Long Yuan and Xuan Li and Boqiang Li and Kan Zhao and\n Haijun Liao and Yuesheng Li",
"submitter": "Yuesheng Li",
"url": "https://arxiv.org/abs/2107.12712"
} |
2107.12719 |
\begin@twocolumnfalse
Authors’ post-print accepted for publication/published in the IEEE Access (Mar. 2022).
2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.
DOI: <https://doi.org/10.1109/ACCESS.2022.3166906>
URL: <https://ieeexplore.ieee.org/document/9756023>
Cite: A. Xompero, S. Donaher, V. Iashin, F. Palermo, G. Solak, C. Coppola, R. Ishikawa, Y. Nagao, R. Hachiuma, Q. Liu, F. Feng, C. Lan, R. H. M. Chan, G. Christmann, J. Song, G. Neeharika, C. K. T. Reddy, D. Jain, B. U. Rehman, A. Cavallaro, "The CORSMAL benchmark for the prediction of the properties of containers," in IEEE Access, Early Access.
\end@twocolumnfalse
Received March 11, accepted March 26, 2022. Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
The CORSMAL benchmark for the prediction of the properties of containers
Alessio Xompero1,
Santiago Donaher1,
Vladimir Iashin2,
Francesca Palermo1,
Gökhan Solak1,
Claudio Coppola1,
Reina Ishikawa3,
Yuichi Nagao3,
Ryo Hachiuma3,
Qi Liu4,
Fan Feng4,
Chuanlin Lan4,
Rosa H. M. Chan4,
Guilherme Christmann5,
Jyun-Ting Song5,
Gonuguntla Neeharika6,
Chinnakotla K. T. Reddy6,
Dinesh Jain7,
Bakhtawar Ur Rehman8,
Andrea Cavallaro1
[1]Centre for Intelligent Sensing, Queen Mary University of London, London E1 4NS, U.K.
[2]Tampere University, 33100 Tampere, Finland
[3]Keio University, Kanagawa 223-8522, Japan
[4]City University of Hong Kong, Hong Kong
[5]National Taiwan Normal University, Taipei 106, Taiwan
[6]IIT Bhubaneswar, Bhubaneswar 751013, India
[7]IIT Hyderabad, Hyderabad 502285, India
[8]Islamabad 44000, Pakistan
This work was supported by the CHIST-ERA program through the Project CORSMAL under U.K. Engineering and Physical Sciences Research Council (EPSRC) under Grant EP/S031715/1. This work involved human subjects or animals in its research. Approval of all ethical and experimental procedures and protocols was granted by the Queen Mary Ethics of Research Committee under Application No. QMREC2344a.
Xompero : CORSMAL Benchmark for Prediction of Properties of Containers
Xompero : CORSMAL Benchmark for Prediction of Properties of Containers
Corresponding author: Alessio Xompero (e-mail: [email protected]).
The contactless estimation of the weight of a container and the amount of its content manipulated by a person are key pre-requisites for safe human-to-robot handovers. However, opaqueness and transparencies of the container and the content, and variability of materials, shapes, and sizes, make this estimation difficult. In this paper, we present a range of methods and an open framework to benchmark acoustic and visual perception for the estimation of the capacity of a container, and the type, mass, and amount of its content. The framework includes a dataset, specific tasks and performance measures. We conduct an in-depth comparative analysis of methods that used this framework and audio-only or vision-only baselines designed from related works. Based on this analysis, we can conclude that audio-only and audio-visual classifiers are suitable for the estimation of the type and amount of the content using different types of convolutional neural networks, combined with either recurrent neural networks or a majority voting strategy, whereas computer vision methods are suitable to determine the capacity of the container using regression and geometric approaches. Classifying the content type and level using only audio achieves a weighted average F1-score up to 81% and 97%, respectively. Estimating the container capacity with vision-only approaches and estimating the filling mass with audio-visual multi-stage approaches reach up to 65% weighted average capacity and mass scores. These results show that there is still room for improvement on the design of new methods. These new methods can be ranked and compared on the individual leaderboards provided by our open framework.
Acoustic signal processing, image and video signal processing, audio-visual classification, object properties recognition
§ INTRODUCTION
People interact daily with household containers, such as cups, drinking glasses, mugs, bottles, and food boxes. Methods to estimate the physical properties (e.g., weight and shape) of these containers could support human-robot cooperation [1, 2, 3, 4, 5], video annotation and captioning. Methods should generalize to unknown container instances and operate with only limited prior knowledge, such as generic categories of containers and contents [6, 1, 7]. However, the material, texture, transparency, and shape vary considerably across containers and may change with the content. Furthermore, the content may not be visible due to the opaqueness of the container or because of hand occlusions. For these reasons, predicting the physical properties of containers is a challenging task. The combination of sensing modalities, namely RGB images, depth, and audio, may help to overcome challenges such as noisy scenarios, already filled containers with absence of sound, occlusions, or transparent objects whose depth data may be highly inaccurate [8].
The contributions of this paper include:
* A novel framework for the comparison of methods that estimate the physical properties of containers and their content, when a person manipulates the container (see Fig. <ref>);
* The definition of three tasks, such as the classification of the content amount, the classification of the content type, and the estimation of the container capacity, and related performances measures, including the indirect filling mass estimation based on the three tasks, for the framework;
* The design of 12 audio-only baselines and one vision-only baseline for the tasks of classifying the content level and the content type based on related approaches from the literature;
* A formal review, a comparative analysis, and an in-depth discussion of methods that used the framework to address this problem;
* The results of an international benchmarking challenge[<https://corsmal.eecs.qmul.ac.uk/challenge2020.html>].
The multi-modal, multi-sensor system used to record a person manipulating a container and its content. The system includes two third-person view cameras (at the two sides of the robot), a first-person view camera mounted on the robot, a first-person view from the body-worn camera on the person and a 8-microphone circular array (placed next to the robot arm).
The paper is organized as follows. Section <ref> discusses related works. Section <ref> presents the benchmarking framework, including a multi-modal dataset, tasks for the estimation of the container and content properties, and corresponding performance measures. Section <ref> reviews the methods that used the framework for the tasks of filling type and level classification.
Section <ref> reviews the methods that used the framework for the task of container capacity estimation. Section <ref> discusses and compares the results of the methods under analysis. Section <ref> concludes the paper and discusses future research direction.
§ RELATED WORK
In this section, we discuss the object properties that are commonly estimated in the literature. We then review methods that recognize the content type, estimate the amount of content in a container, or estimate the container capacity, based on their approaches and input modalities.
Most of the works in the literature focus on object recognition, object shape and size reconstruction in 3D, as well as pose estimation of a variety of objects using visual data and objects standing on a surface [9, 10, 11, 12, 13, 14, 15, 16]. Object properties, such as transparency, are often tackled independently with ad-hoc designed approaches for 3D shape reconstruction, object localization in 3D, or 6D pose estimation [8, 17, 18, 19]. Recognizing different high-level properties, such as the type and amount of multiple filling materials, the capacity of the container, and the overall weight of the object (i.e., the container with its content) is not yet well-investigated.
Recognizing the content type within a container is addressed only for general food recognition using visual information [20, 21, 22]. Audio modality is commonly used for the recognition of general environmental sounds using the combination of traditional features and machine learning classifiers – e.g., k-Nearest Neighbour kNN [23], Support Vector Machine (SVM) [24], and Random Forest (RF) [25] –, or deep learning approaches – e.g., convolutional neural networks (CNNs) [26]. Examples of traditional acoustic features are spectrograms, zero-crossing rate (ZCR), Mel-frequency Cepstrum Coefficients (MFCCs), chromogram, Mel-scaled spectrogram, spectral contrast, and tonal centroid features (tonnetz) [27, 28, 29, 30]. However, there are no unimodal or audio-visual approaches that recognize the content type during the manipulation of different containers held by person and together with other physical properties.
Methods that used the CORSMAL framework for filling level, filling type, and container capacity estimation. Methods are evaluated on the CORSMAL Container Manipulation dataset.
Ref. FL FT CC 1cDescription App JLT L Gr A R D Temp.
M1 STFT + FCNN C – –
2*M2 [31] MFCCs + CNN C – –
CNN with region of interest and bounding box size R – – 1 1
2*M3 [32] Spectrogram + object-specific MLP selected via majority voting of per-frame object detection across multiple views C 4 –
Gaussian processes R – – 4 –
3*M4 [33] Multi-channel spectrogram + CNN + LSTM C – –
Multi-channel spectrogram + CNN + majority voting C – –
Point cloud + 3D cuboid approximation G – – 1 1
3*M5 [34] R(2+1)D+GRU (video), CNN+GRU (audio), A34F+RF (audio), Late fusion (averaging) C 1 –
CNN+GRU (audio), A34F+RF (audio), Late fusion (averaging) C – –
Energy minimization + 3D cylinder approximation G – – 2 –
3*M6 [35] Cropped, resized, reshaped spectrogram + kNN/SVM/RF C – –
Cropped and resized spectrogram + CNN C – –
Cropped and resized spectrogram + Hierarchy of 3 CNNs C – –
13l.95KEY – FL: filling level estimation, FT: filling type estimation, CC: container capacity estimation, App: approach, JLT: joint filling type and level classification, A: audio, R: number of used RGB views, D: number of views used with depth data, L: liquids, Gr: granular materials, Temp.: temporal, C: classification, R: regression, G: projective geometry, CNN: convolutional neural network, STFT: short-term Fourier transform, FCNN: fully connected neural network, MLP: multi-layer perceptron, LSTM: Long-Short Term Memory, GRU: Gated Recurrent Unit, kNN: k-Nearest Neighbour, SVM: support vector machine. RF: random forest, A34F: 34 audio features [36] consisting of zero crossing rate, energy, entropy of energy, spectral centroid, spectral spread, spectral entropy, spectral flux, spectral rolloff, Mel-frequency Cepstrum Coefficients (MFFCs), chroma vector and chroma deviation.
For content level estimation, some methods regress or classify the property using CNNs and a single image [37, 7], or use temporal information from sequences of RGB or RGB-D data to track the change in the amount during a mechanical action [38, 39, 40]. Other methods use the sound signals generated by the contact of the content with a container during a manipulation [41, 42, 43, 44]. For example, the level of unknown liquids within containers standing on a surface is regressed or classified by using approaches such as Kalman Filter and recurrent neural networks with edge features or spectrograms [39, 40, 44].
For the estimation of the capacity of a container, one work trained a CNN using an RGB image of one or more containers standing on a surface [37]. However, all of these approaches are often designed and evaluated on scenarios with only standing containers, and with limited variability in
the data.
Unlike previous works, in the next sections we present an open framework for the estimation of multiple physical properties of containers and contents as they are manipulated by a person. We also discuss methods that used this framework based on the modalities used as input, the features extracted, and the type of approach (regression, classification, or geometry-based) [31, 34, 33, 32, 35] (see Table <ref>).
§ BENCHMARKING FRAMEWORK
§.§ Containers, fillings, scenarios
The dataset includes audio-visual-inertial recordings of people manipulating a range of containers that vary in shape, size, material, transparency, and deformability, and a set of contents under different scenarios with increasing level of difficulty due to the type of occlusions.
CORSMAL Containers Manipulation [45] is a dataset consisting of 1,140 audio-visual recordings with 12 human subjects manipulating 15 containers, split into 5 cups, 5 drinking glasses, and 5 food boxes. These containers are made of different materials, such as plastic, glass, and cardboard. Each container can be empty or filled with water, rice or pasta at two different levels of fullness: 50% and 90% with respect to the capacity of the container. The combination of containers and contents results in a total of 95 configurations acquired for three scenarios with an increasing level of difficulty caused by occlusions or subject motions.
In the first scenario, the subject sits in front of the robot, while a container is on a table. The subject either pours the content into the empty container, while avoiding touching the container, or shakes an already filled food box. Afterwards, the subject initiates the handover of the container to the robot. In the second scenario, the subject sits in front of the robot, while holding a container before starting the manipulation. In the third scenario, a container is held by the subject while standing to the side of the robot, potentially visible only on the third-person camera view. After the manipulation, the subject takes a few steps and initiates the handover of the container in front of the robot.
Each scenario is recorded with two different backgrounds and under two different lighting conditions. The first background condition involves a plain tabletop with the subject wearing a texture-less t-shirt, while the second background condition involves the table covered with a graphics-printed tablecloth and the subject wearing a patterned shirt. The first lighting condition is based on artificial illumination as provided by lights mounted on the ceiling of the room. The second lighting condition uses two controlled artificial lights placed at the sides of the robot and illuminating the area where the manipulation is happening.
Each subject executed the 95 configurations for each scenario and for each background/illumination condition[Ethical approval (QMREC2344a) obtained at Queen Mary University of London. Consent from the subjects was collected before data collection.].
axis x line*=bottom,
axis y line*=left,
enlarge x limits=false,
bar width=3pt,
ymin=0, ymax=3000,
ylabel=Mass (g),
label style=font=,
tick label style=font=,
+[ybar, black, fill=white, draw opacity=0.5] table[x=CoID,y=E];
+[ybar, black, fill=ts2, draw opacity=0.5] table[x=CoID,y=P5];
+[ybar, black, fill=ts3, draw opacity=0.5] table[x=CoID,y=P9];
+[ybar, black, fill=gray, draw opacity=0.5] table[x=CoID,y=R5];
+[ybar, black, fill=ts5, draw opacity=0.5] table[x=CoID,y=W5];
+[ybar, black, fill=ts6, draw opacity=0.5] table[x=CoID,y=R9];
+[ybar, black, fill=ts7, draw opacity=0.5] table[x=CoID,y=W9];
[inner sep=0pt] (flute1) at (0.9,-0.9)
[inner sep=0pt] (flute1) at (2.7,-0.9)
[inner sep=0pt] (flute1) at (4.5,-0.9)
[inner sep=0pt] (flute1) at (6.3,-0.9)
[inner sep=0pt] (flute1) at (8.1,-0.9)
[inner sep=0pt] (flute1) at (9.9,-0.9)
[inner sep=0pt] (flute1) at (11.7,-0.9)
[inner sep=0pt] (flute1) at (13.5,-0.9)
[inner sep=0pt] (flute1) at (15.3,-0.9)
The mass of objects (container and content) in the training set of the CORSMAL Containers Manipulation dataset. The class empty corresponds to the mass of the container, which is known.
2pt[gray,fill=white] (0,0) rectangle (1.ex,1.ex); Empty,
2pt[gray,fill=ts2] (0,0) rectangle (1.ex,1.ex); P5,
2pt[gray,fill=ts3] (0,0) rectangle (1.ex,1.ex); P9,
2pt[gray,fill=gray] (0,0) rectangle (1.ex,1.ex); R5,
2pt[gray,fill=ts5] (0,0) rectangle (1.ex,1.ex); W5,
2pt[gray,fill=ts6] (0,0) rectangle (1.ex,1.ex); R9,
2pt[gray,fill=ts7] (0,0) rectangle (1.ex,1.ex); W9,
§.§ Sensor data and annotation
The dataset was acquired with 4 multi-sensor devices, Intel RealSense D435i, and an 8-element circular microphone array. Each D435i device has 3 cameras and provides spatially aligned RGB, narrow-baseline stereo infrared, and depth images at 30 Hz with 1280x720 pixels resolution. One D435i is mounted on a robot arm that does not move during the acquisition and provides a more realistic view of the operating area from the robot perspective. Another D435i is chest mount by the person to provide a first-person view, while the remaining two devices are placed at the sides of the robot arm as third-person views that look at the operating area. The microphone array is placed on a table and consists of 8 Boya BY-M1 omnidirectional Lavelier microphones arranged in a circular shape of radius 15 cm. Audio signals are sampled synchronously at 44.1 kHz with a multi-channel audio recorder. All signals are software-synchronized with a rate of 30 Hz. The calibration information (intrinsic and extrinsic parameters) for each D435i and the inertial measurements of the D435i used as a body-worn camera are also provided.
The annotation of the data includes the capacity of the container, the content type, the content level, the mass of the container, the mass of the content, the maximum width and height (and depth for boxes) of each object. Fig. <ref> shows the total object mass across containers and their contents.
The dataset is split into training set (684 recordings of 9 containers), public test set (228 recordings of 3 containers), and private test set (228 recordings of 3 containers). The containers for each set are evenly distributed among the three categories. The annotations of the container capacity, content type and level, and the masses of the container and content are provided publicly only for the training set.
§.§ Tasks and performance scores
We define three tasks for the framework, namely the classification of the amount of content (Task 1), the classification of the content type (Task 2), and the estimation of the capacity of the container (Task 3). We refer to the amount of content as filling level and to the type of content as filling type.
In Task 1, a container is either empty or filled with an unknown content at 50% or 90% of its capacity. There are three classes: empty, half-full, full. For each configuration $j$, the goal is to classify the filling level ($\lambda^j$).
In Task 2, containers are either empty or filled with an unknown content. There are four filling type classes: none, pasta, rice, water. For each configuration $j$, the goal is to classify the type of filling, if any ($\tau^j$). For these two tasks, we compute precision, recall, and F1-score for each class $k$ across all the configurations belonging to class $k$, $J_k$. Precision is the number of true positives over the total number of true positives and false positives for each class $k$ ($P_k$). Recall is the number of true positives over the total number of true positives and false negatives for each class $k$ ($R_k$). F1-score is the harmonic mean of precision and recall for each class $k$ and defined as
\begin{equation}
F_k = 2\frac{P_k R_k}{P_k + R_k}.
\end{equation}
We then compute the weighted average F1-score, $\bar{F}_1$, across the $K$ classes,
\begin{equation}
\bar{F}_1 =\sum_{k=1}^K \frac{J_k F_k}{J},
\label{eq:wafs}
\end{equation}
where $J=\sum_{k=1}^K J_k$ is the total number of configuration. Note that $K=3$ for filling level classification, whereas $K=4$ for filling type classification.
In Task 3, containers vary in shape and size. For each configuration $j$, the goal is to estimate the capacity of the container ($\gamma^j \in \mathbb{R}_{>0}$, in milliliters). For capacity estimation, we compute the relative absolute error between the estimated capacity, $\tilde{\gamma}^j$, and the annotated capacity, $\gamma^j$, for each configuration, $j$,
\begin{equation}
\varepsilon^j = \frac{|\tilde{\gamma}^j - \gamma^j |}{\gamma^j}.
\label{eq:ware}
\end{equation}
We then compute the average capacity score, $\bar{C}$, as
\begin{equation}
\bar{C} = \frac{1}{J} \sum_{j=1}^J \mathds{1} e^{-\varepsilon^j},
\label{eq:acs}
\end{equation}
where the value of the indicator function $\mathds{1} \in \{0,1\}$ is 0 only when the capacity (mass) of the container in configuration $j$ is not estimated.
The weight of the object, $\omega \in \mathbb{R}_{>0}$ (in Newtons), is the sum of the mass of the (empty) container, $m_c \in \mathbb{R}_{>0}$ (in grams), and the mass of the (unknown) filling, $m_f \in \mathbb{R}_{>0}$ (in grams), multiplied by the gravitational earth acceleration, $g=9.81$ m/s$^{-2}$,
\begin{equation}
\omega = (m_c + m_f) g.
\label{eq:objweight}
\end{equation}
While we do not require the mass of the empty container to be estimated, we expect methods to estimate the capacity of the container and to determine the type and amount of filling to estimate the mass of the filling. For each configuration $j$, we then compute the filling mass as
\begin{equation}
m_f^j = \lambda^j \gamma^j D(\tau^j),
\label{eq:fillingmass}
\end{equation}
where $D(\cdot)$ selects a pre-computed density based on the classified filling type. The density of pasta and rice is computed from the annotation of the filling mass, capacity of the container, and filling level for each container. Density of water is 1 g/mL. For filling mass estimation, we compute the relative absolute error between the estimated, $\tilde{m}_{f}^j$, and the annotated filling mass, $m_{f}^j$, for each configuration, $j$, unless the annotated mass is zero (empty filling level),
\begin{equation}
\epsilon^j =
\begin{cases}
0, & \text{if } m_{f}^j = 0 \land \tilde{m}_{f}^j=0, \\
\tilde{m}_{f}^j, & \text{if } m_{f}^j = 0 \land \tilde{m}_{f}^j \neq 0, \\
\frac{|\tilde{m}_{f}^j - m_{f}^j |}{m_{f}^j}, & \text{otherwise}.
\end{cases}
\label{eq:ware2}
\end{equation}
Similarly to the average capacity score, we compute the average filling mass score, $\bar{M}$.
Note that we will present the scores as percentages when discussing the results in the comparative analysis.
§.§ Baselines
CORSMAL provides along with the framework 12 audio-only baselines and one video-only baseline for the tasks of filling level and filling type classification.
The audio-only baselines[Baselines for audio-based classification of the content properties are available at: <https://github.com/CORSMAL/CCM_ML_baselines>] jointly classify filling type and level using traditional acoustic features, such as ZCR, MFCCs, tonnetz, or spectrograms, combined with either of three machine learning classifiers (kNN, SVM, RF). Note that for MFCCs, the 1$^\text{st}$ to 13$^\text{th}$ coefficients are used, whereas the 0$^\text{th}$ coefficient is discarded. Three baselines use as input the mean and standard deviation of the MFCCs and ZCR features across multiple audio frames [46]. Three other baselines extract a feature vector consisting of 193 coefficients from the mean and standard deviation of the MFCCs, chromogram, Mel-scaled spectrogram, spectral contrast, and tonnetz across multiple audio frames [27, 28, 29, 30]. For simplicity, we refer to this set of acoustic features as AF193 in the rest of the paper. Three other baselines use spectrograms, which are cropped, resized and reshaped into a vector of dimension 9,216, as input to the classifiers [35]. To remove redundant information, three additional baselines perform dimensionality reduction with Principal Component Analysis (PCA) on the reshaped spectrograms, retaining only the first 128 components.
The vision-only baseline uses two CNNs to perform an independent classification of filling level and filling type from a single RGB image. We re-trained ResNet-18 architectures [47] using a subset of frames[Data available at: <https://corsmal.eecs.qmul.ac.uk/filling.html>] selected within the video recordings of the training set of the CORSMAL Containers Manipulation and cropped to a rectangular area around the container [7]. On the test sets, the baseline is applied to each camera view independently: an image crop is extracted from the last frame using Mask R-CNN [9] and the segmentation mask with the most confident class between cup and wine glass is selected. The output classes of the two CNNs include an additional class, opaque, to handle cases where containers are not transparent and vision alone fails to determine the content type and level [7, 37].
§ FILLING LEVEL AND TYPE CLASSIFICATION
Six methods used the framework to address the tasks of filling level classification (Task 1) and filling type classification (Task 2) either independently, e.g., when only one of the two properties is necessary for the target application, or jointly, e.g., when both properties are necessary for accurately estimating the total object weight. For simplicity, we refer to the 6 methods as M1, M2 [31], M3 [32], M4 [33], M5 [34] and M6 [35] for the rest of the paper.
For filling type classification, audio is preferred as input modality and methods used either only CNNs, CNN with RNN, or CNN followed by majority voting as classification approaches [31, 33, 34]. For filling level classification, some methods used visual data in combination with audio data [34, 32]. Hand-crafted and/or learned acoustic features are used by the methods. Traditional acoustic features, such as MFCCs, spectral characteristics, ZCR, chroma vector and deviation, are computed from short-term windows. Long-term features can be obtained by summarizing the short-term features from longer windows of the input audio signal and by including additional statistics, such as mean and standard deviation. Learned features are extracted by CNNs from multi-channel or mono-channel audio signals that are post-processed into spectrograms or log-Mel spectrograms [33, 34]. To handle audio signals of different duration, long audio signals can be truncated to a pre-defined duration and zero-padding is added to shorter signals [31, 33].
The fully connected neural network of M1 has 5 layers and uses STFT features as input. The network is trained with the Adam optimizer [48] and dropout [49] on the last hidden layer to reduce overfitting.
The filling type classifier of M2 uses 40 normalized and concatenated MFCCs features that are extracted with 20 ms windows at 22 kHz, with a maximum duration of 30 s [31].
The CNN has 2 convolutional layers and 1 fully connected layer (86,876 trainable parameters).
M4 [33] used all the 8 audio signals from the microphone array to compute log Mel-scaled spectrograms with STFT and 64 filter banks for filling type and filling level classification. A sliding window over the cropped spectrogram with 75% overlap forms overlapping audio frames consisting of 3D tensors, where the third dimension is given by the 8 audio channels. Each window is provided as input to a CNN consisting of 5 blocks, each with 2 convolutional and 1 batch normalization layers followed by a max-pooling layer. The CNN is complemented by 3 fully connected layers for the filling type classification of each audio frame and followed by the majority voting. The CNN has a total of 13 layers with 4,472,580 trainable parameters. The same extracted features are also used as input to the three stacked Long Short-Term Memory (LSTM) [50] units for the filling level classification. The three stacked LSTMs are trained with a set of 100 audio frames and contain 256 hidden states, resulting in 2,366,211 trainable parameters.
The multi-layer perceptrons (MLPs) of M3 [32] are trained for either filling level or filling type classification, and specifically only for each object category (cup, drinking glass, food box). Each MLP has 3 layers with 3,096 nodes in the first hidden layer and 512 in the last hidden layer. The total number of trainable parameters is 20,762,288. The MLPs takes as input a spectrogram computed from a multi-channel sound signal re-sampled at 16,600 Hz and converted into mono-channel by averaging the samples across channels. Only the last 32,000 samples are retained and converted into a spectrogram via Discrete Fourier Transform.
To select which MLP to use at inference time, regions of interest (ROIs) are detected in all frames of the image sequences of all four views in the CORSMAL Containers Manipulation dataset by using YOLOv4 [51] pre-trained on MS COCO [52]. The category (cup, drinking glass, food box) is determined by a majority voting of randomly sampled frames (65% of all frames).
Both traditional and learned acoustic features are used by M5 [34] for filling type classification, whereas visual features are extracted in addition to the acoustic features for filling level classification. Multiple classifiers, each associated with each feature, are used to output the class probabilities. Then, the probabilities are averaged across the classifiers to determine the final class. For the acoustic features, the multi-channel input audio signal is converted into a mono-channel by averaging the samples across channels. MFCCs, energy, spectral characteristics, and their statistics (mean and standard deviation) are computed from 50 ms windows of the input signal as short-term traditional features. The features are concatenated in a 136-dimensional vector used as input to a RF classifier. The number of trees of the RF classifier is automatically set during training by selecting the value between $(10, 25, 50, 100, 200, 500)$ that achieves the highest accuracy in validation. For the learned features, the mono-channel signal is re-sampled at 16 kHz and converted into log-Mel spectrograms from 960 ms windows of the re-sampled signal. Each spectrogram is provided as input to a VGG-based model [53] that is pre-trained on a large dataset (e.g., AudioSet [54]) and computes a 128-dimensional feature vector. The learned features are then provided as input to a GRU model [55] that has 5 layers and a hidden layer of size 512 to handle the intrinsic temporal relations of the signals. The model has a total of 7,291,395 trainable parameters.
Visual features are extracted from the image sequences of all camera views by using R(2+1)D [56], a spatio-temporal CNN that is based on residual connections [47] and 18 (2+1)D convolutional layers that approximate 3D convolution by a 2D convolution (spatial) followed by a 1D convolution (temporal). R(2+1)D is pre-trained for action recognition on Kinetics 400 [57], takes as input a fixed window of 16 RGB frames of 112$\times$112 pixel resolution, and outputs a 512-dimensional feature vector. Long temporal relations between the features of each window are estimated by using a RNN with a GRU model that has 3 layers and a hidden dimension of size 512 (4,729,347 trainable parameters). The GRU models from each camera view are jointly trained and their logits are summed together before applying the final softmax to obtain the class probabilities from the visual input. For filling type classification, the probabilities resulting from the last hidden state of the GRU network and those resulting from the RF are averaged. For filling level classification, the probabilities resulting from the RF classifier and the GRU models for both the audio and visual features are averaged together to compute the final class. The RF classifier and all the GRU models are trained independently for filling type classification and filling level classification by using 3-fold validation strategy.
Jointly estimating the filling type and level can avoid infeasible cases, such as an empty water or half-full none. Different traditional classifiers and existing CNNs that use spectrograms as input have been analyzed and compared in Donaher et al.'s work [35], especially when different containers are manipulated by a person with different content types, such as both liquids and granular materials.
Because of the different container types and corresponding manipulation, the authors of M6 [35] decomposed the problem into two steps, namely action recognition and content classification and devised three independent CNNs. The first CNN (action classifier) identifies the manipulation performed by the human, i.e., shaking or pouring, and the other two CNNs are task-specific and determine the filling type and level. The CNN for action recognition (pouring, shaking, unknown) has 4 convolutional, 2 max-pooling, and 3 fully connected layers; the CNN for the specific action of pouring has 6 convolutional, 3 max-pooling, and 3 fully connected layers; and the CNN for the specific action of shaking has 4 convolutional, 2 max-pooling, and 2 fully connected layers. The choice of which task-specific network should be used is conditioned by the decision of the first CNN. When the action classifier does not distinguish between pouring or shaking, the approach associates the unknown case to the class empty.
§ CAPACITY ESTIMATION
We categorize the methods as regression [31, 32] and geometric-based approaches [33, 34]. These methods use either RGB, RGB and depth data, or multiple RGB images from the CORSMAL Containers Manipulation dataset.
Regression approaches use CNNs [31] or distribution fitting via Gaussian processes [32]. The CNN architecture of M2 has 4 convolutional layers, each followed by batch normalization [58], and 3 fully connected layers (532,175 trainable parameters) [31]. The CNN takes as input a ROI and its normalized relative size, and then regresses the capacity of the container limited to 4,000 mL, accordingly to the range of capacities in the dataset. The ROI is computed from the contour features of a depth image selected from the frame with the most visible pixels of the frontal, fixed view and assuming a maximum depth of 700 mm.
M4 [32] used Gaussian processes to regress the container capacity, depending on the container category. To model multiple multi-variate Gaussian functions for each container category, the container type is recognized by detecting multiple ROIs in all frames of all image sequences as done for filling type and level classification.
Geometric-based approaches approximate the container to a primitive shape in 3D, such as cuboid or cylinder[33, 8, 34]. The shape is represented as a point cloud obtained directly from RGB-D data or computed via energy-based minimization to fit the points to the real shape of the object as observed in the RGB images of a wide-baseline stereo camera and constrained by the object masks [8, 34]. The capacity is then computed as a by-product, e.g., by finding the minimum and maximum values for each coordinate in 3D [33] or using volume formulas specific for the primitive shape [34].
The approximated primitives can lead to inaccurate capacities: a cuboid representation could result in an overestimated capacity and hence re-scaling would be necessary [33]; a cylinder representation may not generalize to different shapes than rotationally symmetric objects.
To handle occlusions caused by the human hand manipulating a container, M5 [33] selects the RGB-D frame with a single silhouette having the largest number of pixels and post-processes the point cloud to deal with inaccuracies in the segmentation. Capacity estimations computed at different frames of the image sequences in the stereo views are then averaged, assuming that the container is fully visible.
§ EXPERIMENT RESULTS AND DISCUSSION
We compare and analyze the performance of the 6 methods and the 13 baselines on the public test set, the private test set, and their combination on the CORSMAL Containers Manipulation dataset [45].
Illustrative comparison of M6 [35] (left) and M4 [33] (right) for filling type ($\tau^j$) and level classification ($\lambda^j$). The two methods take as input only an audio signal that is converted into a spectrogram representation. During training, the initial and final part of the audio signal (gray areas) are removed based on the manual annotations and to focus only on the action. Note that M4 [33] (right) computes MFCC features from overlapping audio frames (shadow gray areas on the spectrogram). KEY – CNN: convolutional neural network, FC: fully connected layer, LSTM: Long-Short Term Memory, MFCC: Mel Frequency Cepstral Coefficients.
§.§ Implementation details
The CNN of M2 for filling type classification is trained with the SGD optimizer, a fixed learning rate of 0.00025 and momentum of 0.9, and a batch size of 16. M4 sets the frame length to 25 ms, the hop-length to 10 ms, and the number of samples for the Fast Fourier Transform to 512 for computing the STFT. During training, M4 crops audio signals based on manual annotations of the starting and ending of the manipulation. The network for filling level classification of M4 is trained by using cross-entropy loss and the Adam optimizer [48] with a learning rate of 0.00001 and a mini-batch size of 32 for 200 epochs.
§.§ Filling level classification
Table <ref> compares the performance of all baselines and methods except M2. M4, M5 and M6 achieve the highest accuracy with 80.84, 79.65, and 78.65 $\bar{F}_1$ on the combined test set, respectively. This performance is almost twice higher than M1 and M3 and shows that using only audio as input modality is sufficient to achieve an accuracy higher than 75 $\bar{F}_1$. M5 uses both audio and visual data, but the similar performance to M4 and M6 suggests that audio features are dominant in determining the classification decision.
M6 is the best performing in the private test set (81.46 $\bar{F}_1$), whereas M4 is the best performing in the public test set (82.63 $\bar{F}_1$). Interestingly, both methods selected a fixed portion of the audio signal, transformed into a spectrogram, where the manipulation of the container by the human subject was more likely to occur (see Fig. <ref>). However, the three CNNs of M6 use the full trimmed spectrograms as input, whereas the CNN+LSTM of M4 uses portions of the log-Mel spectrogram, which are obtained with a temporal sliding window. Both are shown to be valid methods assuming that the whole audio signal is available and the manipulation is completed.
Filling level classification results (Task 1). Baselines and state-of-the-art methods (MX with X ranges from 1 to 6) are ranked by their score in the combined test set.
Method 5cInput modality 3cTest set
A R1 R2 R3 R4 Public Private Combined
Mask + RN 25.12 21.99 23.68
Mask + RN 36.52 25.52 31.46
Spect. + PCA + SVM 30.08 31.99 31.64
Random – – – – – 33.35 41.86 37.62
Spect. + PCA + kNN 39.03 37.16 38.31
Mask + RN 48.90 26.73 39.00
M3 [32] 44.31 42.70 43.53
Spect. + PCA + RF 46.79 42.46 44.66
Spect. + RF 45.43 45.59 45.49
Mask + RN 58.51 32.93 47.00
M1 50.73 47.08 48.71
Spect. + SVM 47.66 51.54 49.67
AF193 + kNN 55.49 53.22 54.47
Spect. + kNN 59.15 53.47 56.38
ZCR + MFCCs + kNN 63.63 54.97 59.35
AF193 + SVM 60.77 58.57 60.09
ZCR + MFCCs + SVM 66.27 57.19 61.87
AF193 + RF 64.18 63.94 64.74
ZCR + MFCCs + RF 70.04 63.11 66.80
M4 [33] 82.63 74.43 78.56
M5 [34] 78.14 81.16 79.65
M6 [35] 80.22 81.46 80.84
9lBold font: result of the best performing method.
9l0.85KEY – A: audio, RX: RGB for view X (1,2,3,4), Mask + RN: Mask R-CNN + ResNet-18, ZCR: zero crossing rate, MFCCs: Mel-frequency cepstrum coefficients, Spect.: spectrogram, RF: random forest, SVM: support vector machine, kNN: k-nearest neighbor, PCA: principal component analysis, AF193: 193 audio features consisting of MFCCs, chromogram, Mel-scaled spectrogram, spectral contrast, and tonal centroid.
axis on top,
axis x line*=bottom,
ylabel=True label,
xlabel=Mask + RN,
y dir=reverse,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
[matrix plot*,mesh/cols=3, point meta=explicit] table [meta=z] ;
axis x line*=top,
axis y line*=right,
y dir=reverse,
xlabel=Predicted label,
axis on top,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
axis on top,
axis x line*=bottom,
y dir=reverse,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
[matrix plot*,mesh/cols=3, point meta=explicit] table [meta=z] ;
axis x line*=top,
axis y line*=right,
y dir=reverse,
xlabel=Predicted label,
axis on top,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
axis on top,
axis x line*=bottom,
y dir=reverse,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
[matrix plot*,mesh/cols=3, point meta=explicit] table [meta=z] ;
axis x line*=top,
axis y line*=right,
y dir=reverse,
xlabel=Predicted label,
axis on top,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
axis on top,
axis x line*=bottom,
y dir=reverse,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
[matrix plot*,mesh/cols=3, point meta=explicit] table [meta=z] ;
axis x line*=top,
axis y line*=right,
y dir=reverse,
xlabel=Predicted label,
axis on top,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
axis on top,
axis x line*=bottom,
y dir=reverse,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
[matrix plot*,mesh/cols=3, point meta=explicit] table [meta=z] ;
axis x line*=top,
axis y line*=right,
y dir=reverse,
xlabel=Predicted label,
axis on top,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
axis on top,
axis x line*=bottom,
y dir=reverse,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
colorbar style=
yticklabel style=
/pgf/number format/.cd,
fixed zerofill,
tick label style=font=,
[matrix plot*,mesh/cols=3, point meta=explicit] table [meta=z] ;
axis x line*=top,
axis y line*=right,
y dir=reverse,
xlabel=Predicted label,
axis on top,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
Confusion matrices of filling level classification for all methods across all the containers of the public and private testing splits of the CORSMAL Container Manipulation dataset [45]. Note that the counting for each cell is normalized by the total number of true labels for each class (colorbar). KEY –E: empty; H: half-full; F: full, Mask + RN: Mask R-CNN + ResNet-18.
The confusion matrices in Fig. <ref> show that M4 and M6 do not confuse the class empty, whereas M5 mis-classifies some empty configurations as half-full. Not surprisingly, most of the confusions occur between the classes half-full and full for all methods. M4 and M5 are more accurate than M6 in recognizing the class half-full, but M6 is more accurate in recognizing the class full. M3 mis-classifies the true class empty as half-full for 40% of the times and as full for 33% of the times, and the class full is confused with half-full for 75% of the times. M3 recognizes the container categories cup, drinking glass and food box with 92%, 73%, and 88% accuracy, respectively, in the training set. Errors in the category recognition may lead to wrong classifications by the selected category-specific MLP-based classifier, which is also trained with limited and selected data. The CNN of M1 made erroneous predictions across all classes, except for empty that was never predicted as half-full but only confused with full. The vision-only baseline (using the first camera view, on the left side of the robot arm) confused 81% of the times the class empty with half-full in addition to mis-classification between half-full and full, making the performance of the baseline only 10 $\bar{F}_1$ points higher than a random classifier (37.62 $\bar{F}_1$).
axis on top,
axis x line*=bottom,
ylabel=True label,
y dir=reverse,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
[matrix plot*,mesh/cols=4, point meta=explicit] table [meta=z] ;
axis x line*=top,
axis y line*=right,
y dir=reverse,
xlabel=Predicted label,
axis on top,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
axis on top,
axis x line*=bottom,
y dir=reverse,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
[matrix plot*,mesh/cols=4, point meta=explicit] table [meta=z] ;
axis x line*=top,
axis y line*=right,
y dir=reverse,
xlabel=Predicted label,
axis on top,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
axis on top,
axis x line*=bottom,
y dir=reverse,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
[matrix plot*,mesh/cols=4, point meta=explicit] table [meta=z] ;
axis x line*=top,
axis y line*=right,
y dir=reverse,
xlabel=Predicted label,
axis on top,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
axis on top,
axis x line*=bottom,
y dir=reverse,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
[matrix plot*,mesh/cols=4, point meta=explicit] table [meta=z] ;
axis x line*=top,
axis y line*=right,
y dir=reverse,
xlabel=Predicted label,
axis on top,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
axis on top,
axis x line*=bottom,
y dir=reverse,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
[matrix plot*,mesh/cols=4, point meta=explicit] table [meta=z] ;
axis x line*=top,
axis y line*=right,
y dir=reverse,
xlabel=Predicted label,
axis on top,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
axis on top,
axis x line*=bottom,
y dir=reverse,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
colorbar style=
yticklabel style=
/pgf/number format/.cd,
fixed zerofill,
tick label style=font=,
[matrix plot*,mesh/cols=4, point meta=explicit] table [meta=z] ;
axis x line*=top,
axis y line*=right,
y dir=reverse,
xlabel=Predicted label,
axis on top,
point meta min=0,
point meta max=1,
tick label style=font=,
label style=font=,
Confusion matrices of filling type classification for all methods across all the containers of the public and private testing splits of the CORSMAL Containers Manipulation dataset [45]. Note that each cell is normalized by the total number of true labels for each class (colorbar). KEY – E: empty; P: pasta; R: rice; W: water.
Filling type classification results (Task 2). Baselines and state-of-the-art methods (MX with X ranges from 1 to 6) are ranked by their score in the combined test set.
Method 5cInput modality 3cTest set
A R1 R2 R3 R4 Public Private Combined
Mask + RN 14.12 11.23 12.70
Mask + RN 21.14 9.04 15.63
Mask + RN 28.75 15.54 22.90
Mask + RN 30.85 13.04 23.05
Spect. + PCA + SVM 20.57 27.60 24.20
Random – – – – – 21.24 27.52 24.38
Spect. + PCA + kNN 24.47 28.34 26.53
Spect. + PCA + RF 28.75 37.79 33.32
Spect. + SVM 39.39 41.81 40.61
M3 [32] 41.77 41.90 41.83
Spect. + RF 47.98 47.68 47.82
Spect. + kNN 60.50 68.58 64.55
AF193 + SVM 64.92 79.72 72.86
M1 78.58 71.75 75.24
AF193 + kNN 76.84 75.96 76.41
ZCR + MFCCs + SVM 84.23 71.96 78.67
ZCR + MFCCs + kNN 88.19 79.23 83.73
M2 [31] 81.97 91.67 86.89
AF193 + RF 88.36 87.46 87.88
ZCR + MFCCs + RF 92.97 89.74 91.31
M5 [34] 93.83 94.70 94.26
M6 [35] 95.12 93.92 94.50
M4 [33] 97.83 96.08 96.95
9lBold font: result of the best performing method.
9l.85KEY – A: audio, RX: RGB for view X (1,2,3,4), Mask + RN: Mask R-CNN + ResNet-18, ZCR: zero crossing rate, MFCCs: Mel-frequency cepstrum coefficients, Spect.: spectrogram, RF: random forest, SVM: support vector machine, kNN: k-nearest neighbor, PCA: principal component analysis, AF193: 193 audio features consisting of MFCCs, chromogram, Mel-scaled spectrogram, spectral contrast, and tonal centroid.
§.§ Filling type classification
Table <ref> shows that M4, M6, and M5 are the best performing methods with 96.95 $\bar{F}_1$, 94.50 $\bar{F}_1$, 94.26 $\bar{F}_1$ scores on the combined test set (as for filling level classification). Audio is the used modality by all the methods except M3 that conditions the selection of the audio-based classifier to the recognition of the container category from visual data. As for filling level classification (43.53 $\bar{F}_1$), selecting which classifier to use is likely to be the main source of error for the classifications of M3 (41.83 $\bar{F}_1$), whereas using only audio is sufficient to achieve performance close to 100 $\bar{F}_1$ score. If the audio modality was not available, both filling level and filling type classifications would be very challenging using only visual data. M1 and M2 achieve 75.24 $\bar{F}_1$ and 86.89 $\bar{F}_1$, respectively, but about 20 and 10 percentage points (pp) lower than M4, respectively.
The table also shows that the performance of the baselines varies from random results to almost the same performance as the best performing M4. Using the spectrogram as an input feature (either after reshaping the spectrogram into a vector or after applying PCA to select the first 128 components) to any of the three classifiers, namely kNN, SVM, or RF, is the worst choice. On the combined test set, the lowest performance is obtained by Spectrogram + PCA + SVM with 24.20 $\bar{F}_1$, whereas the highest performance is obtained by Spectrogram + kNN with 64.55 $\bar{F}_1$.
Classic audio features, such as MFCCs and ZCR, are more discriminative and sufficient to achieve performance higher than 78 $\bar{F}_1$ for the three classifiers. Simply using ZCR and MFCCs with RF can achieve 91.31 $\bar{F}_1$, which is close to the performance of the three top methods (M5, M6, M4) that are using CNNs and LSTMs. On the contrary, the performance decreases when using a larger set of features, such as tonal centroid, spectral contrast, chromogram, Mel-scaled spectrogram, and MFCCs.
Fig. <ref> shows the confusion matrices of the methods. M4 made a few mis-classifications for the class rice with none and pasta, and for the class water with none. M6 confused 4% pasta with rice, 4% rice with pasta, 7% pasta with water, and 2% water with none. The confusion between water and none could be expected due to the low volume of the sound produced by the water, whereas the confusion of water with rice might be caused by the glass material of the container and background noise. The largest confusion for M5 is given by the erroneous prediction of rice with pasta (13%). As for filling level classification, M1 and M3 have large mis-classifications across different classes, with M3 that could not predict water for any audio input.
§.§ Capacity estimation
We compare the results of M2, M3, M4, and M5, in terms of the average capacity score. We also report the results of a pseudo-random generator (Random) that samples the predictions from a uniform distribution in the interval $[50, 4000]$ based on the Mersenne Twister algorithm [59]. We then analyze and discuss the statistics of the absolute error in predicting the container capacity for each testing container as well as for each filling type and level.
Table <ref> shows that M2 achieves the best score with 66.92 $\bar{C}$, 67.67 $\bar{C}$, and 67.30 $\bar{C}$ for the public test set, private test set, and the combined test set, respectively, when using only depth data from the fixed frontal view. All methods achieve a performance score that is twice higher than the random solution (24.58 $\bar{C}$ for the combined test set): M4 has the lowest score (54.79 $\bar{C}$), whereas M5 and M3 obtain 60.57 $\bar{C}$ and 62.57 $\bar{C}$, respectively. Fig. <ref> shows the statistics (median, 25$^\text{th}$ and 75$^\text{th}$ quartiles, and the lower and upper whiskers[The lower whisker is the smallest data value which is larger than 0.25-quartile $-1.5\Delta$, where $\Delta$ is the difference between 0.75-quartile and 0.25-quartile. The upper whisker is the largest data value which is smaller than 0.25-quartile$+1.5\Delta$. See documentation at: <https://anorien.csc.warwick.ac.uk/mirrors/CTAN/graphics/pgf/contrib/pgfplots/doc/pgfplots.pdf>.]) of the relative absolute errors for each container in the test sets of the dataset. M2 has the lowest median error for all containers, except for the private containers C14 and C15. The variation of the error across configurations is either smaller than the variation of the other methods or lower than the median value of the other methods.
M5 is more consistent in estimating the same container shape and capacity for most of the configurations related to containers C12 and C15. M5 also have the largest variations for C10 and C14; M3 for C12 and C15; and M4 for C11. Interestingly, M3 have a median error lower than M4 and M5 for C13 and achieve the lowest median error with a small variation across configurations for C14.
However, we can observe that in general the relative absolute error across containers is around or higher than 0.5.
Container capacity estimation results (Task 3). Methods ranked by the average capacity score on the combined test set.
Method 8cInput modality 3cTest set
R1 D1 R2 D2 R3 D3 R4 D4 Public Private Combined
Random – – – – – – – – 31.63 17.53 24.58
M4 [33] 57.19 52.38 54.79
M5 [34] 60.56 60.58 60.57
M3 [32] 63.00 62.14 62.57
M2 [31] 66.92 67.67 67.30
12lBold font: result of the best performing method.
12l0.9KEY – RGB (R) or depth (D) modality for view X (1,2,3,4)
every non boxed x axis/.style=,
boxplot/every box/.style=solid,ultra thin,black,
boxplot/every whisker/.style=solid,ultra thin,black,
boxplot/every median/.style=solid,very thick, red,
title style=at=(0.5,0.98),
xmin=0.5, xmax=4.5,
tick label style=font=,
boxplot/draw direction=y,
ylabel=Relative absolute error,
label style=font=,
title style=at=(0.5,0.9),font=,
+[boxplot, boxplot/draw position=1,mark=none,boxplot/box extend=0.5] table[y=C10];
+[boxplot, boxplot/draw position=2,mark=none,boxplot/box extend=0.5] table[y=C10];
+[boxplot, boxplot/draw position=3,mark=none,boxplot/box extend=0.5] table[y=C10];
+[boxplot, boxplot/draw position=4,mark=none,boxplot/box extend=0.5] table[y=C10];
xmin=0.5, xmax=4.5,
tick label style=font=,
boxplot/draw direction=y,
label style=font=,
title style=at=(0.5,0.9),font=,
+[boxplot, boxplot/draw position=1,mark=none, boxplot/box extend=0.5] table[y=C11];
+[boxplot, boxplot/draw position=2,mark=none, boxplot/box extend=0.5] table[y=C11];
+[boxplot, boxplot/draw position=3,mark=none, boxplot/box extend=0.5] table[y=C11];
+[boxplot, boxplot/draw position=4,mark=none, boxplot/box extend=0.5] table[y=C11];
xmin=0.5, xmax=4.5,
tick label style=font=,
boxplot/draw direction=y,
ylabel=Relative absolute error,
label style=font=,
title style=at=(0.5,0.9),font=,
+[boxplot, boxplot/draw position=1,mark=none,boxplot/box extend=0.5] table[y=C12];
+[boxplot, boxplot/draw position=2,mark=none,boxplot/box extend=0.5] table[y=C12];
+[boxplot, boxplot/draw position=3,mark=none,boxplot/box extend=0.5] table[y=C12];
+[boxplot, boxplot/draw position=4,mark=none,boxplot/box extend=0.5] table[y=C12];
xmin=0.5, xmax=4.5,
tick label style=font=,
boxplot/draw direction=y,
label style=font=,
title style=at=(0.5,0.9),font=,
+[boxplot, boxplot/draw position=1,mark=none,boxplot/box extend=0.5] table[y=C13];
+[boxplot, boxplot/draw position=2,mark=none,boxplot/box extend=0.5] table[y=C13];
+[boxplot, boxplot/draw position=3,mark=none,boxplot/box extend=0.5] table[y=C13];
+[boxplot, boxplot/draw position=4,mark=none,boxplot/box extend=0.5] table[y=C13];
xmin=0.5, xmax=4.5,
tick label style=font=,
boxplot/draw direction=y,
ylabel=Relative absolute error,
label style=font=,
title style=at=(0.5,0.9),font=,
+[boxplot, boxplot/draw position=1,mark=none,boxplot/box extend=0.5] table[y=C14];
+[boxplot, boxplot/draw position=2,mark=none,boxplot/box extend=0.5] table[y=C14];
+[boxplot, boxplot/draw position=3,mark=none,boxplot/box extend=0.5] table[y=C14];
+[boxplot, boxplot/draw position=4,mark=none,boxplot/box extend=0.5] table[y=C14];
xmin=0.5, xmax=4.5,
tick label style=font=,
boxplot/draw direction=y,
label style=font=,
title style=at=(0.5,0.9),font=,
+[boxplot, boxplot/draw position=1,mark=none,boxplot/box extend=0.5] table[y=C15];
+[boxplot, boxplot/draw position=2,mark=none,boxplot/box extend=0.5] table[y=C15];
+[boxplot, boxplot/draw position=3,mark=none,boxplot/box extend=0.5] table[y=C15];
+[boxplot, boxplot/draw position=4,mark=none,boxplot/box extend=0.5] table[y=C15];
Comparison of statistics of the absolute error in estimating the container capacity for each testing container between M2 [31], M3 [32], M4 [33], and M5 [34]. Statistics of the box plot includes the median (red line), the 25th and 75th quartile, and the lower and upper whiskers. Note that outliers in the data are not shown.
Note also the different scale for the y-axis. KEY – CX: container (C) index (X), where X is in the range [10,15].
In addition to the comparison across containers, Fig. <ref> shows the relative absolute errors grouped by filling type and level for each method. Most of the errors are in the interval [0.3,0.8], and the methods have similar amount of variations between the 25$^\text{th}$ and 75$^\text{th}$ quartiles, but differences are in the median error and the upper whisker error (excluding outliers). M2 achieves the lowest median error (always lower than half of the real container capacity) and smaller variations (25$^\text{th}$-75$^\text{th}$ quartiles), whereas M3 have similar results for rice full. M4 has the largest errors for empty, pasta half-full, pasta full, rice half-full, and rice full. M5 has the largest errors for water half-full and water full.
§.§ Analysis per scenario and container
Table <ref> analyzes and compares the performance scores of the methods grouped by scenario and containers for all the three tasks. For filling level classification on the testing containers, the $\bar{F}_1$ of M4, M5, and M6 increases from scenario 1 to scenario 3, showing how audio information is robust despite the increasing difficulty due to the in-hand manipulation (scenario 2 and 3) and larger distance (scenario 3). However, the performance of M6 decreases by almost 2 pp from scenario 1 (78.52 $\bar{F}_1$) to scenario 2 (76.92 $\bar{F}_1$). The performance of M1 is affected by the in-hand manipulation and distance, decreasing from 52.90 $\bar{F}_1$ in scenario 1 to 45.46 $\bar{F}_1$ in scenario 3. M3 achieves the highest accuracy for scenario 2 (51.34 $\bar{F}_1$), increasing by 11.51 pp compared to scenario 1 (39.83 $\bar{F}_1$), but decreasing to 35.92 $\bar{F}_1$ in scenario 3 (likely caused by the errors in recognizing the container category). For filling type classification, the performance of M4, M5, and M6 is higher than 90 $\bar{F}_1$ across the scenarios, but the trend is the opposite of filling level classification. M5 and M6 decrease in $\bar{F}_1$ from scenario 1 to scenario 3, whereas M4 achieves the highest accuracy in scenario 2 (98.07 $\bar{F}_1$). M3 and M1 show the same behavior for filling level and type classification with a large decrease in scenario 3 by 15.31 pp and 22.16 pp compared to scenario 1, respectively. For capacity estimation, M3 and M4 are less affected by the variations across the scenarios, whereas M2 is the best performing in scenario 1 (68.81 $\bar{C}$) and scenario 2 (73.70 $\bar{C}$) but decreases by 9.42 pp in scenario 3 compared to scenario 1. M2 is based only on the frontal depth view, where the subject is not visible for most of the time. This challenges the method to detect the object in the pre-defined depth range. M5 is affected by the increasing challenges across scenarios, decreasing from 66.51 $\bar{C}$ in scenario 1 to 55.68 $\bar{C}$ in scenario 3. This shows the limitations of the underline approach [8] that was designed for objects free of occlusions and standing upright on a surface.
every non boxed x axis/.style=,
boxplot/every box/.style=solid,ultra thin,black,
boxplot/every whisker/.style=solid,ultra thin,black,
boxplot/every median/.style=solid,very thick, red,
title style=at=(0.5,0.98),
axis x line=box,
xmin=0.5, xmax=34.5,
tick label style=font=,
boxplot/draw direction=y,
ylabel=Relative absolute error,
label style=font=,
title style=font=,
+[boxplot, boxplot/draw position=1,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=E];
+[boxplot, boxplot/draw position=2,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=E];
+[boxplot, boxplot/draw position=3,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=E];
+[boxplot, boxplot/draw position=4,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=E];
+[boxplot, boxplot/draw position=6,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P5];
+[boxplot, boxplot/draw position=7,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P5];
+[boxplot, boxplot/draw position=8,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P5];
+[boxplot, boxplot/draw position=9,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P5];
+[boxplot, boxplot/draw position=11,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P9];
+[boxplot, boxplot/draw position=12,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P9];
+[boxplot, boxplot/draw position=13,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P9];
+[boxplot, boxplot/draw position=14,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P9];
+[boxplot, boxplot/draw position=16,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R5];
+[boxplot, boxplot/draw position=17,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R5];
+[boxplot, boxplot/draw position=18,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R5];
+[boxplot, boxplot/draw position=19,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R5];
+[boxplot, boxplot/draw position=21,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R9];
+[boxplot, boxplot/draw position=22,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R9];
+[boxplot, boxplot/draw position=23,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R9];
+[boxplot, boxplot/draw position=24,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R9];
+[boxplot, boxplot/draw position=26,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W5];
+[boxplot, boxplot/draw position=27,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W5];
+[boxplot, boxplot/draw position=28,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W5];
+[boxplot, boxplot/draw position=29,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W5];
+[boxplot, boxplot/draw position=31,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W9];
+[boxplot, boxplot/draw position=32,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W9];
+[boxplot, boxplot/draw position=33,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W9];
+[boxplot, boxplot/draw position=34,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W9];
axis x line=bottom,
xmin=0.5, xmax=34.5,
xticklabel shift=8,
tick label style=font=,
xticklabels=Empty,Pasta half-full, Pasta full,Rice half-full, Rice full,Water half-full, Water full,
typeset ticklabels with strut,
label style=font=,
Comparison of the absolute error in estimating the container capacity between M2 [31], M3 [32], M4 [33], and M5 [34] for the different combinations of filling type and level in the combined public and private test set of the CORSMAL Containers Manipulation dataset. Statistics of the box plot includes the median (red line), the 25th and 75th percentiles, and the minimum and maximum error..
Comparison of the task performance scores between methods for each scenario and for each testing container.
Method S1 S2 S3 C10 C11 C12 C13 C14 C15
M1 52.90 47.37 45.46 48.69 46.78 58.27 41.43 38.89 62.58
M3 [32] 39.83 51.34 35.92 35.24 36.59 22.86 33.74 33.74 26.33
M4 [33] 75.41 77.70 82.54 92.85 89.25 46.67 86.85 74.16 45.92
M5 [34] 75.87 80.89 82.03 83.12 90.48 41.26 88.09 90.36 47.68
M6 [35] 78.52 76.92 86.84 83.12 88.10 64.98 89.16 78.28 74.99
M1 81.22 77.01 66.06 86.42 69.33 79.67 87.38 55.60 72.77
M2 [31] 90.68 84.57 85.41 77.29 80.60 91.58 94.02 94.09 85.03
M3 [32] 44.06 51.21 28.75 21.72 26.54 86.98 20.33 34.13 79.45
M4 [33] 97.35 98.07 95.45 97.63 98.82 96.72 100.00 97.66 87.96
M5 [34] 96.70 94.76 91.32 96.44 97.62 84.81 97.63 98.81 84.45
M6 [35] 96.70 95.43 91.27 91.58 96.41 98.33 97.62 85.61 100.00
M2 [31] 68.81 73.70 59.39 66.02 69.14 65.08 79.75 61.12 59.94
M3 [32] 64.33 60.41 62.96 60.99 66.21 61.30 71.90 76.75 28.02
M4 [33] 55.45 55.34 53.57 59.62 61.70 47.47 53.77 58.29 42.17
M5 [34] 66.51 59.51 55.68 60.71 62.43 57.71 53.37 54.75 78.82
11lKEY – S: scenario, C: container, T: task.
The performance across containers varies between the methods. Testing containers 12 and 15 are the most challenging for M3, M4, M5, M6, when classifying the filling level, whereas M1 achieves its best performance on both containers. M4 and M5 have the largest decrease with the score in the interval [40,50] $\bar{F}_1$ compared to the interval [75-93] $\bar{F}_1$ for the other containers. M6 outperforms all the other methods with 64.98 $\bar{F}_1$ and 74.99 $\bar{F}_1$ for containers 12 and 15. For filling type classification, M3 obtains 86.98 $\bar{F}_1$ and 79.45 $\bar{F}_1$ for containers 12 and 15, respectively, and less than 30 $\bar{F}_1$ on the other containers. Because of the dataset structure, M3 can recognize the box class and the filling type for that class, but the method cannot easily distinguish filling type and level for drinking glasses and cups. Overall, other methods achieve a score higher than 70 $\bar{F}_1$ across containers. M4 achieves 100 $\bar{F}_1$ on container 13 and M6 on container 15. M4 is the best performing for containers 10 and 11, whereas M5 is the best for container 14. Containers 12 and 15 are the most challenging for M5; container 14 for M6; container 15 for M4; containers 10, 11, and 15 for M2. M1 ranges between 55.60 $\bar{F}_1$ and 87.38 $\bar{F}_1$ across containers, with the drinking glasses being the most challenging and obtaining 69.33 $\bar{F}_1$ for container 11 and 55.60 $\bar{F}_1$ for container 14. For capacity estimation, M2 achieves the best performance on containers 10 (66.02 $\bar{C}$), 11 (69.14 $\bar{C}$), 12 (65.02 $\bar{C}$), and 13 (79.75 $\bar{C}$), M3 on container 14 (76.75 $\bar{C}$), and M5 on container 15 (78.82 $\bar{C}$). M3 achieves higher average capacity score on the private cup and drinking glass than the public containers, but the score drops to 28.02 $\bar{C}$ for the container 15. M4 performs worse on the private testing containers than the public testing containers, with the lowest scores on the boxes (containers 12 and 15). M5 also performs worse for the drinking glass and cups in the private test set than the public test set. Surprisingly, the best score of M5 is on the box container 15 (78.82 $\bar{C}$) despite the modeled shape is a 3D cylinder.
Comparison of the filling mass estimation results. Methods are ranked by their score on the combined test sets of the CORSMAL Containers Manipulation dataset. Note that scores are weighed by the number of tasks addressed by the methods.
Method 3cTask 3cTest set
T1 T2 T3 Public Private Combined
M6 [35] 28.25 21.89 25.07
M1 29.25 23.21 26.23
mylightgrayRandom 38.47 31.65 35.06
M2 [31] 38.56 39.80 39.18
M3 [32] 52.80 51.14 53.47
M4 [33] 63.32 61.01 62.16
M5 [34] 64.98 65.15 65.06
§.§ Filling mass estimation
We discuss the overall performance of the methods based on their results on estimating the filling mass. Methods that estimated either of the physical properties in our framework (e.g., M1, M2, and M6) are complemented by the random estimation of the missing physical properties to compute the filling mass[Note that for the organized challenge, the score is weighted by the number of completed tasks. We report the results in the same manner.]. Table <ref> shows that methods addressing only filling type and level classification achieve a lower score than a random guess for each task. Given the multiplicative formula of the filling mass estimation (see Eq. <ref>), even a few errors in these classification tasks can lead to a low score in the filling mass estimation, especially when combined with the random estimation of the container capacity. However, improving the capacity estimation is an important aspect to achieve more accurate results (and higher score) for the filling mass estimation (see M2). M3, M4, and M5 addressed all three tasks and achieved 53.47 $\bar{M}$, 62.16 $\bar{M}$, and 65.06 $\bar{M}$, respectively. Overall, methods perform better on the public test set than the private test set, except for M2 and M5 that achieve similar performance in the two test sets. We can observe that the more accurate predictions in the container capacity help M3 to obtain 53.47 $\bar{M}$ despite the classification errors for filling level and type. The high classification accuracy on filling level and type, combined with a similar score for the capacity estimations with respect to M3, makes M4 and M5 the best performing in filling mass estimation. The similar scores for container capacity and filling mass estimation shows how important it is to accurately predict the capacity in order to correctly estimate the filling mass.
§ CONCLUSION
We presented the open CORSMAL framework to benchmark methods for estimating the physical properties of different containers while they are manipulated by a person with different content types. The framework includes a dataset, a set of tasks and performance measures, and several baselines that use either audio or visual input. The framework supports the contactless estimation of the weight of the container, including its content (if any), despite variations in the physical properties across containers and occlusions caused by the hand manipulation.
We performed an in-depth comparative analysis of the baselines and state-of-the-art methods that used the framework. The analysis showed that using only audio as input is sufficient to achieve a weighted average F1-score above 80% for filling type and level classification, but the high performance could be limited to the sensor types and setup of the CORSMAL Container Manipulation dataset. Methods that use audio alone are robust to changes in the container type, size, and shape, as well as pose during the manipulation. Moreover, filling type and level estimation can benefit from each other to avoid unfeasible solutions [35]. Container capacity is the most challenging physical property to estimate with all methods affected by large errors and a maximum score of 65%. Performance on this task also affects the successive estimation of the filling mass. The design of a method that can generalize across the different containers and scenarios, especially for container capacity estimation and partially for filling level classification, is still challenging.
Future directions involve the exploration of fusion and learning methods with both acoustic and visual modalities to support the contactless estimation of the physical properties of containers and their content. The CORSMAL framework is open for further submissions and support the research in this upcoming area[<https://corsmal.eecs.qmul.ac.uk/challenge.html>].
§ ACKNOWLEDGMENT
We would like to thank Ricardo Sanchez-Matilla and Riccardo Mazzon for their contribution in the design and collection of the data, and the performance measures definition.
[1]
R. Sanchez-Matilla, K. Chatzilygeroudis, A. Modas, N. Ferreira Duarte,
A. Xompero, P. Frossard, A. Billard, and A. Cavallaro, “Benchmark
for human-to-robot handovers of unseen containers with unknown filling,”
IEEE Robotics Autom. Lett., vol. 5, no. 2, Apr. 2020.
[2]
J. R. Medina, F. Duvallet, M. Karnam, and A. Billard, “A
human-inspired controller for fluid human-robot handovers,” in Proc.
IEEE-RAS Int. Conf. Humanoid Robots, Cancun, Mexico, 15–17 Nov. 2016.
[3]
P. Rosenberger, A. Cosgun, R. Newbury, J. Kwan, V. Ortenzi, P. Corke, and
M. Grafinger, “Object-independent human-to-robot handovers using real time
robotic vision,” IEEE Robotics Autom. Lett., vol. 6, no. 1, pp.
17–23, Jan. 2021.
[4]
V. Ortenzi, A. Cosgun, T. Pardi, W. P. Chan, E. Croft, and D. Kulić, “Object
handovers: A review for robotics,” IEEE Trans. Robotics, pp. 1–19,
[5]
W. Yang, C. Paxton, A. Mousavian, Y. Chao, M. Cakmak, and D. Fox, “Reactive
human-to-robot handovers of arbitrary objects,” in IEEE Int. Conf.
Robotics Autom., Xi'an, China, 30 May5 Jun. 2021.
[6]
H. Liang, C. Zhou, S. Li, X. Ma, N. Hendrich, T. Gerkmann, F.-C. Sun, and
J. Zhang, “Robust robotic pouring using audition and haptics,” in
IEEE Int. Conf. Intell. Robot Syst., Las Vegas, NV, USA,
24 Oct. 2020–24 Jan. 2021.
[7]
A. Modas, A. Xompero, R. Sanchez-Matilla, P. Frossard, and A. Cavallaro,
“Improving filling level classification with adversarial training,” in
IEEE Int. Conf. Image Process., Anchorage, Alaska, USA, 19–22 Sep.
[8]
A. Xompero, R. Sanchez-Matilla, A. Modas, P. Frossard, and A. Cavallaro,
“Multi-view shape estimation of transparent containers,” in IEEE Int.
Conf. Acoustics, Speech Signal Process., Barcelona, Spain, 4-8 May 2020.
[9]
K. He, G. Gkioxari, P. Dollár, and R. B. Girshick, “Mask R-CNN,” in
IEEE Int. Conf. Comput. Vis., Venice, Italy, 22–29 Oct. 2017.
[10]
H. Wang, S. Sridhar, J. Huang, J. Valentin, S. Song, and L. J. Guibas,
“Normalized object coordinate space for category-level 6D object pose and
size estimation,” in IEEE Conf. Comput. Vis. Pattern Recognit., Long
Beach, CA, USA, 16–20 Jun. 2019.
[11]
H. Yang and L. Carlone, “In perfect shape: certifiably optimal 3D shape
reconstruction from 2D landmarks,” in IEEE Conf. Comput. Vis.
Pattern Recognit., Seattle, Washington, USA, 16-18 Jun. 2020.
[12]
A. Ahmadyan, L. Zhang, J. Wei, A. Ablavatski, and M. Grundmann, “Objectron: A
large scale dataset of object-centric videos in the wild with pose
annotations,” in IEEE Conf. Comput. Vis. Pattern Recognit., Virtual,
19-25 Jun. 2021.
[13]
X. Chen, Z. Dong, J. Song, A. Geiger, and O. Hilliges, “Category level object
pose estimation via neural analysis-by-synthesis,” in Eur. Conf.
Comput. Vis., Virtual, 23–28 Aug. 2020.
[14]
D. Chen, J. Li, Z. Wang, and K. Xu, “Learning canonical shape space for
category-level 6D object pose and size estimation,” in IEEE Conf.
Comput. Vis. Pattern Recognit., Virtual, 14–19 Jun. 2020.
[15]
T. Hodaň, F. Michel, E. Brachmann, W. Kehl, A. Glent Buch, D. Kraft,
B. Drost, J. Vidal, S. Ihrke, X. Zabulis, C. Sahin, F. Manhardt, F. Tombari,
T.-K. Kim, J. Matas, and C. Rother, “BOP: Benchmark for 6D object pose
estimation,” in Eur. Conf. Comput. Vis., Munich, Germany, 8–14 Sep.
[16]
R. Kaskman, S. Zakharov, I. Shugurov, and S. Ilic, “Homebreweddb: RGB-D
dataset for 6D pose estimation of 3D objects,” in IEEE Int. Conf.
Comput. Vis. Workshops, Seoul, Korea, 27 Oct.2 Nov. 2019.
[17]
X. Liu, R. Jonschkowski, A. Angelova, and K. Konolige, “Keypose: Multi-view
3D labeling and keypoint estimation for transparent objects,” in
IEEE Conf. Comput. Vis. Pattern Recognit., Virtual, 14–19 Jun. 2020.
[18]
S. Sajjan, M. Moore, M. Pan, G. Nagaraja, J. Lee, A. Zeng, and S. Song,
“ClearGrasp: 3D shape estimation of transparent objects for
manipulation,” in IEEE Int. Conf. Robotics Autom., Paris, France,
31 May31 Aug. 2020.
[19]
C. J. Philips, M. Lecce, and K. Daniilidis, “Seeing glassware: from edge
detection to pose estimation and shape recovery,” in Robotics: Science
and Syst., Ann Arbor, Michigan, USA, 18-22 Jun. 2016.
[20]
L. Bossard, M. Guillaumin, and L. Van Gool, “Food-101 – mining
discriminative components with random forests,” in Eur. Conf. Comput.
Vis., Zurich, Switzerland, 16–12 Sep. 2014.
[21]
Y. Kawano and K. Yanai, “FoodCam-256: A large-scale real-time mobile food
recognition system employing high-dimensional features and compression of
classifier weights,” in ACM Int. Conf. Multimedia, Orlando, Florida,
USA, 3–7 Nov. 2014.
[22]
H. Zhao, K. Yap, and A. C. Kot, “Fusion learning using semantics and graph
convolutional network for visual food recognition,” in IEEE Winter
Conf. Appl. Comput. Vis., Virtual, 5–9 Jan. 2021.
[23]
T. Cover and P. Hart, “Nearest neighbor pattern classification,” IEEE
Trans. Inf. Theory, vol. 13, pp. 21–27, 1967.
[24]
C. Cortes and V. Vapnik, “Support-vector networks,” Machine Learning,
vol. 20, pp. 273–297, 1995.
[25]
L. Breiman, “Random forests,” Machine Learning, vol. 45, pp. 5–32,
[26]
K. J. Piczak, “ESC: Dataset for environmental sound classification,” in
ACM Int. Conf. Multimedia, Brisbane Australia, 26–30 Oct. 2015.
[27]
V. Vivek, S. Vidhya, and P. MadhanMohan, “Acoustic scene classification in
hearing aid using deep learning,” in Int. Conf. Comm.Signal Proc.,
Chennai, India, 28–30 Jul. 2020.
[28]
S. Yang and W. Deliang, “Robust speaker identification using auditory features
and computational auditory scene analysis,” in IEEE Int. Conf.
Acoustics, Speech Signal Process., Las Vegas, Nevada, USA,
30 Mar.4 Apr. 2008.
[29]
G. Deepanway and K. Maheshkumar, “Music genre recognition using deep neural
networks and transfer learning,” in INTERSPEECH, Hyderabad, India,
2–6 Sep. 2018.
[30]
R. Shashidhar, P. Sudarshan, and S.-B. Puneeth, “Audio visual speech
recognition using feed forward neural network architecture,” in IEEE
Int. Conf. for Innovation in Technology, Bengaluru, India, 6–8 Nov. 2020.
[31]
G. Christmann and J.-T. Song, “2020 CORSMAL Challenge - Team
NTNU-ERCReport,” 2020. [Online]. Available:
[32]
Q. Liu, F. Feng, C. Lan, and R. H. M. Chan, “VA2Mass: Towards the fluid
filling mass estimation via integration of vision & audio learning,” in
IEEE Conf. Pattern Recognit. Workshops and Challenges, Virtual,
10–15 Jan. 2021.
[33]
R. Ishikawa, Y. Nagao, R. Hachiuma, and H. Saito, “Audio-visual hybrid
approach for filling mass estimation,” in IEEE Conf. Pattern Recognit.
Workshops and Challenges, Virtual, 10–15 Jan. 2021.
[34]
V. Iashin, F. Palermo, G. Solak, and C. Coppola, “Top-1 CORSMAL challenge
2020 submission: Filling mass estimation using multi-modal observations of
human-robot handovers,” in IEEE Conf. Pattern Recognit. Workshops and
Challenges, Virtual, 10–15 Jan. 2021.
[35]
S. Donaher, A. Xompero, and A. Cavallaro, “Audio classification of the content
of food containers and drinking glasses,” in Europ. Signal Proc.
Conf., Virtual, 23–27 Aug. 2021.
[36]
T. Giannakopoulos, “pyaudioanalysis: An open-source python library for audio
signal analysis,” PLoS ONE, vol. 10, no. 12, p. 1–17, Jan. 2015.
[37]
R. Mottaghi, C. Schenck, D. Fox, and A. Farhadi, “See the glass half full:
Reasoning about liquid containers, their volume and content,” in IEEE
Int. Conf. Comput. Vis., Venice, Italy, 22–29 Oct. 2017.
[38]
C. Schenck and D. Fox, “Reasoning about liquids via closed-loop simulation,”
in Robotics: Science and Syst., Cambridge, Massachusetts, USA,
12–16 Jul. 2017.
[39]
C. Do, T. Schubert, and W. Burgard, “A probabilistic approach to liquid level
detection in cups using an RGB-D camera,” in IEEE Int. Conf. Intell.
Robot Syst., Daejeon, Korea, 9–14 Oct. 2016.
[40]
C. Do and W. Burgard, “Accurate pouring with an autonomous robot using an
RGB-D camera,” in Int. Conf. Intell. Auton. Syst., Baden-Baden,
Germany, 12–16 Jul. 2018.
[41]
S. Griffith, V. Sukhoy, T. Wegter, and A. Stoytchev, “Object categorization in
the sink : Learning behavior – grounded object categories with water,” in
IEEE Int. Conf. Robotics Autom., Minneapolis, MN, USA, 14–18 May
[42]
S. Ikeno, R. Watanabe, R. Okazaki, T. Hachisu, M. Sato, and H. Kajimoto,
“Change in the amount poured as a result of vibration when pouring a
liquid,” in Int. AsiaHaptics Conf., Tsukuba, Japan, 18–20 Nov. 2014.
[43]
S. Clarke, T. Rhodes, C. Atkeson, and O. Kroemer, “Learning audio feedback for
estimating amount and flow of granular material,” in Proc. Conf. Robot
Learn., Zürich, Switzerland, 29–31 Oct. 2018.
[44]
H. Liang, S. Li, X. Ma, N. Hendrich, T. Gerkmann, F. Sun, and J. Zhang,
“Making sense of audio vibration for liquid height estimation in robotic
pouring,” in IEEE Int. Conf. Intell. Robot Syst., Macau, China, Nov.
[45]
A. Xompero, R. Sanchez-Matilla, R. Mazzon, and A. Cavallaro, “CORSMAL
Containers Manipulation,” 2020, (1.0) [Data set]. Queen Mary University of
London. [Online]. Available:
[46]
K. J. Piczak, “Environmental sound classification with convolutional neural
networks,” in Proc. Int. Workshop Mach. Learning Signal Process.,
Boston, MA, USA, 17–20 Sep. 2015.
[47]
K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image
recognition,” in IEEE Conf. Comput. Vis. Pattern Recognit., Las
Vegas, NV, USA, 27–30 Jun. 2016.
[48]
D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” in
Int. Conf. Learning Represent., San Diego, CA, USA, 7–9 May 2015.
[49]
N. Srivastava, G. E. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov,
“Dropout: a simple way to prevent neural networks from overfitting,”
J. Mach. Learn. Res., vol. 15, pp. 1929–1958, 2014.
[50]
S. Hochreiter and J. Schmidhuber, “Long Short-Term Memory,” Neural
Computation, vol. 9, no. 8, pp. 1735–1780, 11 1997.
[51]
A. Bochkovskiy, C. Wang, and H. M. Liao, “YOLOv4: Optimal speed and accuracy
of object detection,” arXiv:2004.10934 [cs.CV], 2020.
[52]
T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan,
P. Dollár, and C. L. Zitnick, “Microsoft COCO: Common objects in
context,” in Eur. Conf. Comput. Vis., Munich, Germany, 8–14 Sep.
[53]
S. Hershey, S. Chaudhuri, D. P. W. Ellis, J. F. Gemmeke, A. Jansen, R. C.
Moore, M. Plakal, D. Platt, R. A. Saurous, and B. Seybold, “CNN
architectures for large-scale audio classification,” in IEEE Int.
Conf. Acoustics, Speech Signal Process., New Orleans, LA, USA, 5–9Mar.
[54]
J. F. Gemmeke, D. P. W. Ellis, D. Freedman, A. Jansen, W. Lawrence, R. C.
Moore, M. Plakal, and M. Ritter, “Audio Set: An ontology and human-labeled
dataset for audio events,” in IEEE Int. Conf. Acoustics, Speech Signal
Process., New Orleans, LA, 2017.
[55]
J. Chung, C. Gulcehre, K. Cho, and Y. Bengio, “Empirical evaluation of gated
recurrent neural networks on sequence modeling,” in Adv. Neural Inf.
Process. Syst. Workshop Deep Learning and Representation Learning, Montreal,
Canada, 12 Dec. 2014.
[56]
D. Tran, H. Wang, L. Torresani, J. Ray, Y. LeCun, and M. Paluri, “A closer
look at spatiotemporal convolutions for action recognition,” in IEEE
Conf. Comput. Vis. Pattern Recognit., Salt Lake City, Utah, USA, 18–22 Jun.
[57]
W. Kay, J. Carreira, K. Simonyan, B. Zhang, C. Hillier, S. Vijayanarasimhan,
F. Viola, T. Green, T. Back, P. Natsev, M. Suleyman, and A. Zisserman, “The
Kinetics human action video dataset,” arXiv:1705.06950 [cs.CV], 2017.
[58]
S. Ioffe and C. Szegedy, “Batch normalization: Accelerating deep network
training by reducing internal covariate shift,” in Int. Conf. Mach.
Learning., Jul. 2015.
[59]
M. Matsumoto and T. Nishimura, “Mersenne twister: A 623-dimensionally
equidistributed uniform pseudo-random number generator,” ACM Trans.
Model. Comput. Simul., vol. 8, no. 1, p. 3–30, Jan. 1998.
| arxiv-papers | 2021-07-27T10:36:19 | 2024-09-04T03:07:21.241964 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Alessio Xompero, Santiago Donaher, Vladimir Iashin, Francesca Palermo,\n G\\\"okhan Solak, Claudio Coppola, Reina Ishikawa, Yuichi Nagao, Ryo Hachiuma,\n Qi Liu, Fan Feng, Chuanlin Lan, Rosa H. M. Chan, Guilherme Christmann,\n Jyun-Ting Song, Gonuguntla Neeharika, Chinnakotla Krishna Teja Reddy, Dinesh\n Jain, Bakhtawar Ur Rehman, Andrea Cavallaro",
"submitter": "Alessio Xompero",
"url": "https://arxiv.org/abs/2107.12719"
} |
2107.12728 | rmkRemark
On the dynamics of nano-frames
Preprint of the article published in
International Journal of Engineering Science
160, March 2021, 103433
Andrea Francesco Russillo,
Giuseppe Failla,
Gioacchino Alotta,
Francesco Marotti de Sciarra,
Raffaele Barretta
https://doi.org/10.1016/j.ijengsci.2020.103433
ⓒ 2021. This manuscript version is made available under the CC-BY-NC-ND 4.0
license http://creativecommons.org/licenses/by-nc-nd/4.0/
###### Abstract
In this paper, size-dependent dynamic responses of small-size frames are
modelled by stress-driven nonlocal elasticity and assessed by a consistent
finite-element methodology. Starting from uncoupled axial and bending
differential equations, the exact dynamic stiffness matrix of a two-node
stress-driven nonlocal beam element is evaluated in a closed form. The
relevant global dynamic stiffness matrix of an arbitrarily-shaped small-size
frame, where every member is made of a single element, is built by a standard
finite-element assembly procedure. The Wittrick-Williams algorithm is applied
to calculate natural frequencies and modes. The developed methodology,
exploiting the one conceived for straight beams in [International Journal of
Engineering Science 115, 14-27 (2017)], is suitable for investigating size-
dependent free vibrations of small-size systems of current applicative
interest in Nano-Engineering, such as carbon nanotube networks and polymer-
metal micro-trusses.
###### keywords:
Nonlocal integral elasticity Stress-driven model Free vibrations Dynamic
stiffness matrix Wittrick-Williams algorithm Carbon nanotubes Nano-engineered
material networks
[orcid=https://orcid.org/0000-0002-8535-0581] [1] 1][email protected]
[cor1]Corresponding author
## 1 Introduction
Small-size structures as carbon nanotube networks (Zhang et al., 2018),
3D-printed polymer-metal micro-trusses (Juarez et al., 2018) and ceramic
nanolattices (Meza et al., 2014) are attracting a considerable interest for
remarkable features not obtainable by standard materials. Properties as high-
thermal conductivity, excellent mechanical strength, electrical conductivity,
high-strain sensitivity and large surface area make carbon nanotube networks
(Zhang et al., 2018) ideally suitable for the next generation of thermal
management (Fasano et al., 2015) and electronic nanodevices (Lee et al.,
2016), strain sensors (Chao et al., 2020) and hydrogen storage (Ozturk et al.,
2015; Bi et al., 2020). Polymer-metal micro-trusses exhibit enhanced strength,
conductivity and electrochemical properties, while ceramic nanolattices
feature highest strength- and stiffness-to-weight ratios (Zhang et al.,
2020b). In view of promising applications in a large number of fields of
Engineering Science, great attention is currently devoted to small-size
structures (Ghayesh and Farajpour, 2019); for an insight, typical geometries
currently under investigation are shown in Figure 1.
There exist accurate yet computationally very demanding mechanical models of
small-size structures, e.g. those involving molecular dynamics simulation for
carbon nanotube networks (Barretta et al., 2017; Genoese et al., 2017). On the
other hand, several studies have focused on developing analytical or numerical
models of small-size continua, which may provide rigorous insight into the
essential mechanics of the system and be readily implementable for design and
optimization at a relatively-low computational effort. For this purpose, a
typical approach is the formulation of continua enriched with nonlocal terms
capable of capturing size effects that, instead, cannot be described by the
free-scale local continuum approach. Now, nonlocal theories represent a rather
established approach to investigate small-size continua. Among others, typical
examples are Eringen’s integral theory (Eringen, 1972, 1983), strain-gradient
theories (Aifantis, 1999, 2003, 2009, 2011; Askes and Aifantis, 2011;
Challamel et al., 2016; Polizzotto, 2014, 2015), micropolar “Cosserat” theory
(Lakes, 1991), peridynamic theory (Silling, 2000; Silling et al., 2007) and
mechanically-based approaches involving long-range interactions among non-
adjacent volumes (Di Paola et al., 2010). Surveys of progress regarding
nonlocal elasticity and generalized continua can be found in (Romano and
Diaco, 2020) and (Romano et al., 2016), respectively.
Most of the existing nonlocal theories have developed nonlocal models of $1$D
and $2$D structures, whose statics and dynamics have been investigated under
various boundary conditions in a considerable number of studies, such as:
(Akgöz and Civalek, 2013; Attia and Abdel Rahman, 2018; Challamel, 2018;
Dastjerdi and Akgöz, 2019; Di Paola et al., 2009, 2013; Farajpour et al.,
2018; Fuschi et al., 2019; Ghayesh et al., 2019; Gholipour and Ghayesh, 2020;
Karami and Janghorban, 2020; Khaniki, 2019; Li et al., 2018, 2020; Malikan et
al., 2020; Numanoğlu et al., 2018; Pinnola et al., 2020a; She et al., 2019;
Srividhya et al., 2018; Zhang and Liu, 2020). In this context, an effective
approach is the so-called stress-driven nonlocal model, relying on the idea
that elastic deformation fields are output of convolution integrals between
stress fields and appropriate averaging kernel (Romano and Barretta, 2017a).
Nonlocal integral convolution, endowed with the special bi-exponential kernel,
can be conveniently replaced with a higher-order differential equation
supplemented with non-standard constitutive boundary conditions. The stress-
driven theory leads to well-posed structural problems (Romano and Barretta,
2017b), does not exhibit paradoxical results typical of alternative nonlocal
beam models (Challamel and Wang, 2008; Demir and Civalek, 2017; Fernández-Sáez
et al., 2016) and, in the last few years, has gained increasing popularity for
consistency, robustness and ease of implementation. Stress-driven nonlocal
theory of elasticity has been applied to several problems of nanomechanics, as
witnessed by recent contributions regarding buckling (Oskouie et al., 2018b;
Darban et al., 2020), bending (Oskouie et al., 2018a, c; Zhang et al., 2020a;
Roghani and Rouhi, ), axial (Barretta et al., 2019a) and torsional responses
(Barretta et al., 2018) of nano-beams and elastostatic behaviour of nano-
plates (Barretta et al., 2019b; Farajpour et al., 2020).
Nonlocal finite-element formulations have been proposed, in general to
discretize single beams or rods (Marotti de Sciarra, 2014; Aria and Friswell,
2019; Alotta et al., 2014, 2017a, 2017b). A very recent study, however, has
posed the issue of addressing the dynamics of small-size 2D frames/trusses
(Numanoğlu and Civalek, 2019), made by assembling nonlocal beams/rods.
Eringen’s differential law has been adopted and the principle of virtual work
has been used to derive separate stiffness and mass matrices of a two-node
nonlocal element. Typical shape functions of a two-node local element have
been exploited, with bending modelled by Bernoulli-Euler kinematic theory. A
further recent contribution in this field has been given by Hozhabrossadati et
al. (2020), who developed a two-node six-degree-of-freedom beam element for
free-vibrations of 3D nano-grids. Separate stiffness and mass matrices have
been derived treating axial, bending and torsional responses by Eringen’s
differential law and weighted residual method.
However, the studies by Numanoğlu and Civalek (2019) and Hozhabrossadati et
al. (2020), dealing with dynamics of nanostructural systems via nonlocal
finite elements, are based on Eringen’s differential formulation which leads
to mechanical paradoxes and unviable elastic responses (Peddieson et al.,
2003), a conclusion acknowledged by the community of Engineering Science
(Fernández-Sáez et al., 2016). Lack of alternative technically significant
contributions on the matter may also be attributed to the fact that not all
size-dependent theories allow for formulating stiffness, mass matrices and
nodal forces to be assembled in $2$D and $3$D frames/trusses. As a matter of
fact, there is a great interest in developing accurate and computationally-
effective nonlocal models of complex nanostructures in view of their
increasing relevance in several engineering fields: carbon nanotube networks
(Zhang et al., 2018), polymer-metal micro-trusses (Juarez et al., 2018),
ceramic nanolattices (Meza et al., 2014). Various examples of nano/micro-scale
hierarchical lattice structures and cellular nanostructures have been pointed
out by Numanoğlu and Civalek (2019) along with several related applications.
(a)
(b)
Figure 1: Typical advanced materials and structures in Engineering Science:
(a) carbon nanotube network (Zhang et al., 2018), (b) polymer-metal micro-
truss (Juarez et al., 2018).
This paper proposes an effective approach to model and assess the dynamic
behaviour of complex small-size frames, exploiting the treatment by Romano and
Barretta (2017a) confined to straight nano-beams. Key novelties are as
follows.
1. 1.
Adoption of a well-posed and experimentally consistent stress-driven nonlocal
formulation to capture size effects within the members of the structure,
assuming uncoupled axial and bending motions (small displacements).
2. 2.
Derivation of the exact dynamic stiffness matrix of a two-node stress-driven
nonlocal element, from which the global dynamic stiffness matrix of the
structure can be readily built by a standard finite-element assembly
procedure.
Upon constructing the global dynamic stiffness matrix, all natural frequencies
and related modes of the structure are calculated using the Wittrick-Williams
(WW) algorithm. The formulation applies not only to frames, but also to
trusses. It is presented for 2D frames and is readily extendable to 3D
networks of nanotechnological interest.
The main advantages of the proposed approach are summarized as follows. The
stress-driven methodology is not affected by inconsistencies and paradoxes
corresponding to alternative nonlocal models (Romano et al., 2017). The
dynamic-stiffness approach captures the exact dynamic response, using a single
two-node beam element for every frame member without any internal mesh.
Further, the WW algorithm provides all natural frequencies exactly, without
missing anyone and including multiple ones.
The paper is organized as follows. The stress-driven nonlocal formulation for
axial and bending motions is described in Section 2. The exact dynamic
stiffness matrix of two-node stress-driven nonlocal truss and beam elements is
established in Section 3. In addition, the assembly procedure to build the
global dynamic stiffness matrix of arbitrarily-shaped small-size frames is
illustrated therein. The implementation of the WW algorithm is discussed in
Section 4. Numerical applications are presented in Section 5, investigating
the role of size effects on the free-vibration responses of small-size 2D
structures of current technical interest.
## 2 Stress-driven nonlocal integral elasticity
This Section introduces fundamental equations governing axial and bending
vibrations of a nonlocal beam, according to the stress-driven model recently
introduced by Romano and Barretta (2017a, b). Specifically, axial and bending
responses are uncoupled on the assumption of small displacements.
Consider a plane beam of length $L$, uniform cross section of area $A$ and
moment of inertia $I$, as shown in Fig. 2. Let $E$ be the local elastic
stiffness at the macroscopic scale.
Figure 2: Stress-driven nonlocal beam in axial and bending vibrations.
According to the stress-driven model, the uniaxial strain-stress relationship
reads:
$\varepsilon(x,t)=\frac{1}{E}\int_{0}^{L}\Phi(|x-\zeta|)\sigma(\zeta,t)d\zeta$
(1)
where $\varepsilon$ is the elastic longitudinal strain, $\sigma$ is the normal
stress, $\Phi(|x-\zeta|)$ is a scalar function known as attenuation function
assumed to fullfil positivity, symmetric and limit impulsivity.
First, let us focus on the axial response of the beam in Fig. (2). On the
assumption that cross sections remain plane and normal to the longitudinal
axis, from Eq. (1) the following equation can be derived between longitudinal
generalized strain $\gamma$ and axial force $N$ (Barretta et al., 2019a):
$\gamma(x,t)=\frac{1}{EA}\int_{0}^{L}\Phi(|x-\zeta|)N(\zeta,t)d\zeta$ (2)
being
$\gamma(x,t)=u^{(1)}(x,t)$ (3)
where $u$ is the axial displacement and superscript $(k)$ means
$k^{\mathrm{th}}$ derivative w.r.t. the spatial coordinate $x$. As in recent
works (Romano and Barretta, 2017a, b; Barretta et al., 2019a), $\Phi$ is taken
as the following bi-exponential function:
$\Phi(x,\zeta)=\frac{1}{2L_{c}}\exp\left(-\frac{|x-\zeta|}{L_{c}}\right)$ (4)
where $L_{c}=\lambda\cdot L$ is the characteristic length, being $\lambda$ a
material-dependent parameter. Eq. (4) fulfils the requirements of symmetry and
positivity. Moreover, Eq. (4) satisfies the property of limit impulsivity,
i.e. reverts to the Dirac’s delta function for $\lambda\rightarrow 0$, so that
Eq. (2) reduces to the standard local constitutive law of linear elasticity at
internal points of the structural domain. The choice of Eq. (4) for $\Phi$ is
motivated by the fact that, using integration by parts, the integral
constitutive law (2) can be now reverted to the following equivalent
differential equation:
$N(x,t)=-EA\cdot
L_{c}^{2}\left(\gamma^{(2)}(x,t)-\frac{1}{L_{c}^{2}}\gamma(x,t)\right)$ (5)
with the additional constitutive BCs
$\displaystyle\gamma^{(1)}(0,t)=\frac{1}{L_{c}}\gamma(0,t)$ (6a,b)
$\displaystyle\gamma^{(1)}(L,t)=-\frac{1}{L_{c}}\gamma(L,t)$
Next, consider the equilibrium equation governing the axial vibration response
(see Fig. 3a)
$N^{(1)}(x,t)+p_{x}(x,t)-\rho A\ddot{u}(x,t)=0$ (7)
where $\rho$ is the volume mass density of the material, $p_{x}(x,t)$ is the
external transversal force per unit length. Combining Eq. (7) with Eq. (5)
leads to the following partial differential equation governing axial
vibrations of a stress-driven nonlocal beam:
$-EA\cdot
L_{c}^{2}\left(u^{(4)}(x,t)-\frac{1}{L_{c}^{2}}u^{(2)}(x,t)\right)+p_{x}(x,t)-\rho
A\ddot{u}(x,t)=0$ (8)
Eq. (8) is a partial differential equation in the unknown time-dependent axial
displacement $u$, to be solved enforcing the two classical static/kinematic
BCs and the additional constitutive BCs (6a,b) together with the initial
conditions. As $\lambda\rightarrow 0$, Eq. (8) reverts to the classical
partial differential equation governing axial vibrations of the local beam.
Further, for the purposes of this study, it is of interest to formulate the
equations governing bending vibrations of the stress-driven nonlocal beam.
Assuming the Bernoulli-Euler beam model, Eq. (1) leads to the following
nonlocal relation between elastic curvature $\chi$ and bending moment
interaction $M$ (Romano and Barretta, 2017a, b)
$\chi(x,t)=\frac{1}{EI}\int_{0}^{L}\Phi(|x-\zeta|)M(\zeta,t)d\zeta$ (9)
In Eq. (9)
$\chi(x,t)=-v^{(2)}(x,t),\qquad\theta(x,t)=-v^{(1)}(x,t)$ (10a,b)
where $v$ is the deflection in the $y$ direction, $\theta$ is the rotation
(positive counterclockwise). Again, using the bi-exponential function (4) in
Eq. (9) and integrating by parts leads to the equivalent differential problem
of Eq. (9):
$M(x)=-EI\cdot L_{c}^{2}\left(\chi^{(2)}(x)-\frac{1}{L_{c}^{2}}\chi(x)\right)$
(11)
with the additional constitutive BCs
$\displaystyle\chi^{(1)}(0,t)=\frac{1}{L_{c}}\chi(0,t)$ (12a,b)
$\displaystyle\chi^{(1)}(L,t)=-\frac{1}{L_{c}}\chi(L,t)$
Figure 3: Equilibrium of a beam segment: axial problem (a), bending problem
(b).
Next, consider that the bending vibration response of a Bernoulli-Euler beam
is governed by the differential condition of equilibrium
$M^{(2)}(x,t)+p_{y}(x,t)-\rho A\ddot{v}(x,t)=0$ (13)
where $p_{y}(x,t)$ is the external transverse force per unit length; further,
$M^{(1)}(x,t)=T(x,t)$ (14)
as shown in Fig. 3b. Combining Eq. (11) and Eq. (13) leads to the following
equation governing bending vibrations of a stress-driven nonlocal beam:
$EI\cdot
L_{c}^{2}\left(v^{(6)}(x,t)-\frac{1}{L_{c}^{2}}v^{(4)}(x,t)\right)+p_{y}(x,t)-\rho
A\ddot{v}(x,t)=0$ (15)
Eq. (15) is a partial differential equation in the unknown time-dependent
deflection $v$, to be solved enforcing the classical four static/kinematic BCs
and the two constitutive BCs (12a,b) (Romano and Barretta, 2017a, b), together
with the initial conditions. Note that, as $\lambda\rightarrow 0$, Eq. (15)
reverts to the classical partial differential equation governing the local
Bernoulli-Euler beam.
Eq. (8) and Eq. (15) are the basis to derive the exact dynamic stiffness of a
two-node stress-driven nonlocal beam element, as explained in the next
Section.
## 3 Exact dynamic stiffness matrix of stress-driven nonlocal beam elements
Let us consider the stress-driven nonlocal beam in Fig. 4, acted upon by
harmonic forces/moments at the ends.
Figure 4: Nodal forces and displacements of a two-node stress-driven nonlocal
beam element.
Beam ends are referred to as “nodes” with three degrees of freedom each and
the beam as a two-node stress-driven nonlocal beam element. Denoting by
$u(x,t)=U(x)\mathrm{e}^{\mathrm{i}\omega t}$,
$v(x,t)=V(x)\mathrm{e}^{\mathrm{i}\omega t}$,
$\theta(x,t)=\Theta(x)\mathrm{e}^{\mathrm{i}\omega t}$, …, axial and bending
response variables, be $\mathbf{F}\mathrm{e}^{\mathrm{i}\omega
t}=[-N(0)\;N(L)\;-T(0)\;-M(0)\;T(L)\;M(L)]^{\mathrm{T}}\mathrm{e}^{\mathrm{i}\omega
t}$ the vector of nodal forces and $\mathbf{U}\mathrm{e}^{\mathrm{i}\omega
t}=[U(0)\;U(L)\;V(0)\;\Theta(0)\;V(L)\;\Theta(L)]^{\mathrm{T}}\mathrm{e}^{\mathrm{i}\omega
t}$ the corresponding vector of nodal displacements.
For generality, the dynamic stiffness matrix of the two-node stress-driven
nonlocal beam element is sought in terms of dimensionless frequencies
(Banerjee and Williams, 1996; Banerjee, 1998, 2001, 2003). Thus, the equations
of motion (8) and (15) governing steady-state responses under harmonic
forces/moments at beam ends and the associated constitutive BCs (6a,b) and
(12a,b) are rewritten as ($\omega$ – dependence of the response variables is
omitted for brevity):
$(\mathcal{L}_{a}+\overline{\omega}_{a}^{2}\mathcal{I})[U]=0\,,\qquad\textrm{with}\qquad\mathcal{L}_{a}:=-\lambda^{2}\frac{{\mathrm{d}^{4}}}{\mathrm{d}\xi^{4}}+\frac{{\mathrm{d}^{2}}}{\mathrm{d}\xi^{2}}\,,\quad\xi\in[0,1]$
(16)
$\displaystyle\left.\frac{\mathrm{d}\Gamma}{\mathrm{d}\xi}\right\rvert_{\xi=0}=\frac{1}{\lambda}\Gamma(0)$
(17a,b)
$\displaystyle\left.\frac{\mathrm{d}\Gamma}{\mathrm{d}\xi}\right\rvert_{\xi=1}=-\frac{1}{\lambda}\Gamma(1)$
$(\mathcal{L}_{b}+\overline{\omega}_{b}^{4}\mathcal{I})[V]=0\,,\qquad\textrm{with}\qquad\mathcal{L}_{b}:=\lambda^{2}\frac{{\mathrm{d}^{6}}}{\mathrm{d}\xi^{6}}-\frac{{\mathrm{d}^{4}}}{\mathrm{d}\xi^{4}}\,,\quad\xi\in[0,1]$
(18)
$\displaystyle\left.\frac{\mathrm{d}X}{\mathrm{d}\xi}\right\rvert_{\xi=0}=\frac{1}{\lambda}X(0)$
(19a,b)
$\displaystyle\left.\frac{\mathrm{d}X}{\mathrm{d}\xi}\right\rvert_{\xi=1}=-\frac{1}{\lambda}X(1)$
where $\,\xi=x/L\,$, $\,\lambda=L_{c}/L\,$, $\,\overline{\omega}_{a}=[\rho
A(\omega L)^{2}/EA]^{1/2}\,$, $\,\overline{\omega}_{b}=[\rho A(\omega
L^{2})^{2}/EI]^{1/4}\,$ and $\,\mathcal{I}\,$ is the identity map. Further, in
Eq. (16) through Eqs. (19a,b), the notation $\mathrm{d}^{k}/\mathrm{d}\xi^{k}$
distinguishes the derivative w.r.t. to the dimensionless spatial coordinate
$\xi$ from the derivative w.r.t. to $x$, indicated by the superscript $(k)$.
Upon enforcing the constitutive BCs (17a,b) and (19a,b), the exact solutions
of Eq. (16) and Eq. (18) can be obtained in the following analytical forms:
$\displaystyle U(\xi)=\sum_{k=1}^{2}c_{a,k}f_{k}(\xi)$ (20) $\displaystyle
V(\xi)=\sum_{k=1}^{4}c_{b,k}g_{k}(\xi)$ (21)
where $c_{a,k}$ for $k=1,2$ and $c_{b,k}$ for $k=1,...,4$ are integration
constants depending on the classical static/kinematic BCs. Further,
$f_{k}(\xi)=f_{k}(\xi,\overline{\omega}_{a})$ and
$g_{k}(\xi)=g_{k}(\xi,\overline{\omega}_{b})$ are closed analytical functions
depending on frequency and parameters of the stress-driven nonlocal beam,
reported in Appendix A for brevity.
Now, from Eq. (20) and Eq. (21) and taking into account Eqs. (10a,b), Eq. (11)
and Eq. (14) for the bending response, as well as Eq. (3) and Eq. (5) for the
axial response, the whole set of response variables can be cast as functions
of the integration constants $\mathbf{c}_{a}=[c_{a,1}\;c_{a,2}]^{T}$ and
$\mathbf{c}_{b}=[c_{b,1}\;c_{b,2}\;c_{b,3}\;c_{b,4}]^{T}$, i.e.
$\displaystyle U=U(\xi,\mathbf{c}_{a})$ (22a-f) $\displaystyle
N=-\frac{EA\cdot\lambda^{2}}{L}\left(\frac{{\mathrm{d}^{3}U}}{\mathrm{d}\xi^{3}}-\frac{1}{\lambda^{2}}\frac{\mathrm{d}U}{\mathrm{d}\xi}\right)=N(\xi,\mathbf{c}_{a})$
$\displaystyle V=V(\xi,\mathbf{c}_{b})$
$\displaystyle\Theta=-\frac{\mathrm{d}V}{\mathrm{d}\xi}=\Theta(\xi,\mathbf{c}_{b})$
$\displaystyle
M=\frac{EI\cdot\lambda^{2}}{L^{2}}\left(\frac{{\mathrm{d}^{4}V}}{\mathrm{d}\xi^{4}}-\frac{1}{\lambda^{2}}\frac{{\mathrm{d}^{2}V}}{\mathrm{d}\xi^{2}}\right)=M(\xi,\mathbf{c}_{b})$
$\displaystyle
T=\frac{EI\cdot\lambda^{2}}{L^{3}}\left(\frac{{\mathrm{d}^{5}V}}{\mathrm{d}\xi^{5}}-\frac{1}{\lambda^{2}}\frac{{\mathrm{d}^{3}V}}{\mathrm{d}\xi^{3}}\right)=T(\xi,\mathbf{c}_{b})$
Computing Eqs. (22a-f) at $\xi=0$ and $\xi=1$, the following expressions are
obtained for the vectors of nodal displacements and forces:
$\displaystyle\mathbf{U}=\mathbf{A}\mathbf{c}$ (23)
$\displaystyle\mathbf{F}=\mathbf{B}\mathbf{c}$ (24)
where $\mathbf{c}=[\mathbf{c}_{a}\;\mathbf{c}_{b}]^{\mathrm{T}}$. Next, using
Eq. (23) to calculate $\mathbf{c}=\mathbf{A}^{-1}\mathbf{U}$ and replacing for
$\mathbf{c}$ in Eq. (24) lead to (Banerjee, 1997)
$\mathbf{B}\mathbf{A}^{-1}\mathbf{U}=\mathbf{D}\mathbf{U}=\mathbf{F}$ (25)
where
$\mathbf{D}(\omega)=\begin{bmatrix}\mathbf{D}_{a}(\overline{\omega}_{a}(\omega))&\mathbf{0}\\\
\mathbf{0}&\mathbf{D}_{b}(\overline{\omega}_{b}(\omega))\\\ \end{bmatrix}$
(26)
being $\mathbf{D}_{a}$ and $\mathbf{D}_{b}$ the block matrices associated with
axial and bending responses, respectively. The matrix $\mathbf{D}$ in Eq. (26)
is the dynamic stiffness matrix of the two-node stress-driven nonlocal beam
element in Fig. 3. Remarkably, it is available in a closed analytical form, as
the inverse matrix $\mathbf{A}^{-1}$ in Eq. (25) can be obtained symbolically
from the inverses of the two separate block matrices associated with axial and
bending responses (Failla, 2016). The matrix $\mathbf{D}$ is exact, because is
based on the exact solutions of the equations of motion (16) and (18) along
with the related constitutive BCs (17a,b) and (19a,b). Indeed, no
approximations have been made in building the solutions (20) and (21).
An alternative approach to derive the exact dynamic stiffness matrix of the
two-node stress-driven nonlocal beam element in Fig. 4 relies on the principle
of virtual work. Consider Eq. (16) governing the steady-state axial vibrations
under harmonic axial forces at the beam ends (see Fig. 4). The identity of
internal and external works reads ($\overline{\omega}_{a}$ – dependence of
response variables and virtual axial displacement/longitudinal generalized
strain is omitted for brevity)
$L\int_{0}^{1}\left(-\lambda^{2}\frac{{\mathrm{d}^{3}U}}{\mathrm{d}\xi^{3}}+\frac{\mathrm{d}U}{\mathrm{d}\xi}\right)\delta\Gamma~{}~{}\mathrm{d}\xi-\overline{\omega}_{a}^{2}L\int_{0}^{1}U\delta
U~{}~{}\mathrm{d}\xi=\widetilde{F}_{a,1}\delta U_{1}+\widetilde{F}_{a,2}\delta
U_{2}$ (27)
where $\delta U_{k}$ for $k=1,2$ are virtual nodal displacements, $\delta U$
and $\delta\Gamma=\mathrm{d}\delta U/\mathrm{d}\xi$ the corresponding virtual
axial displacement and longitudinal generalized strain along the beam;
further, $\widetilde{F}_{a,k}=(L^{2}/EA)F_{a,k}$ for $k=1,2$. Now, exact
expression of the axial displacement $U$ is
$U(\xi)=\sum_{j=1}^{2}U_{j}\psi_{j}(\xi)$ (28)
where $U_{j}$ are the nodal displacements associated with the applied nodal
forces $\widetilde{F}_{a,k}$ and $\psi_{j}$ are frequency-dependent, exact
shape functions obtained from Eq. (20) enforcing the following BCs (omitting
$\overline{\omega}_{a}$ – dependence for brevity)
$\displaystyle U(0)=1\qquad U(1)=0$ $\displaystyle\rightarrow$
$\displaystyle\psi_{1}(\xi)$ (29) $\displaystyle U(0)=0\qquad U(1)=1$
$\displaystyle\rightarrow$ $\displaystyle\psi_{2}(\xi)$
The boundary value problem (29) requires inverting a $2\times 2$ matrix to
calculate the integration constants $c_{a,k}$ in Eq. (20) and the matrix
inversion can be readily implemented in a closed form. Replacing Eq. (28) in
Eq. (27) and enforcing the identity of internal and external works for any
virtual nodal displacements leads to
$\displaystyle\sum_{j=1}^{2}\left(L\int_{0}^{1}\left(-\lambda^{2}\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{{\mathrm{d}^{3}\psi_{j}}}{\mathrm{d}\xi^{3}}+\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{\mathrm{d}\psi_{j}}{\mathrm{d}\xi}\right)~{}~{}\mathrm{d}\xi\right)U_{j}-\sum_{j=1}^{2}\left(\overline{\omega}_{a}^{2}L\int_{0}^{1}\psi_{i}\psi_{j}~{}~{}\mathrm{d}\xi\right)U_{j}=\widetilde{F}_{a,1}\psi_{i}(0)$
(30) $\displaystyle+\widetilde{F}_{a,2}\psi_{i}(1)$
where $\psi_{1}(1)=\psi_{2}(0)=0$ on the r.h.s. Eq. (30) can be written in
matrix form as
$\widetilde{\mathbf{D}}_{a}(\overline{\omega}_{a})\mathbf{U}_{a}=\widetilde{\mathbf{F}}_{a}$
(31)
where $\mathbf{U}_{a}=\begin{bmatrix}U_{1}&U_{2}\end{bmatrix}^{\mathrm{T}}$,
$\widetilde{\mathbf{F}}_{a}=\begin{bmatrix}\widetilde{F}_{a,1}&\widetilde{F}_{a,2}\end{bmatrix}^{\mathrm{T}}$
and $\widetilde{\mathbf{D}}_{a}$ is a $2\times 2$ matrix with elements
$(\widetilde{\mathbf{D}}_{a})_{ij}=L\int_{0}^{1}\left(-\lambda^{2}\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{{\mathrm{d}^{3}\psi_{j}}}{\mathrm{d}\xi^{3}}+\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{\mathrm{d}\psi_{j}}{\mathrm{d}\xi}\right)~{}\mathrm{d}\xi-\overline{\omega}_{a}^{2}L\int_{0}^{1}\psi_{i}\psi_{j}~{}~{}\mathrm{d}\xi$
(32)
Being $\widetilde{\mathbf{F}}_{a}=(L^{2}/EA)\mathbf{F}_{a}$ for
$\mathbf{F}_{a}=\begin{bmatrix}F_{a,1}&F_{a,2}\end{bmatrix}^{\mathrm{T}}$, we
finally obtain
$\mathbf{D}_{a}(\overline{\omega}_{a})\mathbf{U}_{a}=\mathbf{F}_{a}$ (33)
where $\mathbf{D}_{a}$ is the dynamic stiffness matrix of the rod. Next,
consider Eq. (18) governing the steady-state bending vibrations under
transverse forces/moments applied at the beam ends (Fig. 4). The identity of
internal and external works reads ($\overline{\omega}_{b}$ – dependence of
response variables and virtual deflection/curvature is omitted for
conciseness)
$\displaystyle
L\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{4}V}}{\mathrm{d}\xi^{4}}-\frac{{\mathrm{d}^{2}V}}{\mathrm{d}\xi^{2}}\right)\delta
X~{}\mathrm{d}\xi-\overline{\omega}_{b}^{4}L\int_{0}^{1}V\delta
V~{}~{}\mathrm{d}\xi=\widetilde{F}_{b,1}\delta V_{1}+\widetilde{F}_{b,2}\delta
V_{2}+\widetilde{F}_{b,3}\delta V_{3}+\widetilde{F}_{b,4}\delta V_{4}$ (34)
where $\delta V_{k}$ for $k=1,...,4$ are virtual nodal displacements, $\delta
V$ and $\delta X=-\mathrm{d}^{2}\delta V/\mathrm{d}\xi^{2}$ the corresponding
virtual deflection and curvature along the beam; further,
$\widetilde{F}_{b,k}=(L^{4}/EI)F_{b,k}$ for $k=1,3$ and
$\widetilde{F}_{b,k}=(L^{3}/EI)F_{b,k}$ for $k=2,4$, hence:
$\underbrace{\begin{bmatrix}\widetilde{F}_{b,1}\\\ \widetilde{F}_{b,2}\\\
\widetilde{F}_{b,3}\\\
\widetilde{F}_{b,4}\end{bmatrix}}_{\widetilde{\mathbf{F}}_{b}}=\underbrace{\begin{bmatrix}\frac{L^{4}}{EI}&0&0&0\\\
0&\frac{L^{3}}{EI}&0&0\\\ 0&0&\frac{L^{4}}{EI}&0\\\
0&0&0&\frac{L^{3}}{EI}\end{bmatrix}}_{\mathbf{T}}\underbrace{\begin{bmatrix}F_{b,1}\\\
F_{b,2}\\\ F_{b,3}\\\ F_{b,4}\\\ \end{bmatrix}}_{\mathbf{F}_{b}}$ (35)
The exact expression of the deflection $V$ is
$\displaystyle V(\xi)=\sum_{j=1}^{4}V_{j}\beta_{j}(\xi)$ (36)
$V_{j}$ are the nodal displacements associated with the applied nodal
forces/moments $F_{b,k}$ and $\beta_{j}$ are frequency-dependent, exact shape
functions obtained from Eq. (21) by enforcing the following BCs (again,
omitting $\overline{\omega}_{b}$ – dependence for brevity)
$\displaystyle U(0)=1\qquad\Theta(0)=0\qquad U(1)=0\qquad\Theta(1)=0$
$\displaystyle\rightarrow$ $\displaystyle\beta_{1}(\xi)$ (37) $\displaystyle
U(0)=0\qquad\Theta(0)=1\qquad U(1)=0\qquad\Theta(1)=0$
$\displaystyle\rightarrow$ $\displaystyle\beta_{2}(\xi)$ $\displaystyle
U(0)=0\qquad\Theta(0)=0\qquad U(1)=1\qquad\Theta(1)=0$
$\displaystyle\rightarrow$ $\displaystyle\beta_{3}(\xi)$ $\displaystyle
U(0)=0\qquad\Theta(0)=0\qquad U(1)=0\qquad\Theta(1)=1$
$\displaystyle\rightarrow$ $\displaystyle\beta_{4}(\xi)$
The boundary value problem (37) requires inverting a $4\times 4$ matrix to
calculate the integration constants $c_{b,k}$ in Eq. (21), and the matrix
inversion can be readily implemented in closed form (Failla, 2016). Replacing
Eq. (36) in Eq. (34) and enforcing the identity of internal and external works
for any virtual nodal displacements yields
$\displaystyle\sum_{j=1}^{4}\left(L\int_{0}^{1}-\lambda^{2}\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{4}\beta_{j}}}{\mathrm{d}\xi^{4}}+\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\beta_{j}}}{\mathrm{d}\xi^{2}}~{}\mathrm{d}\xi\right)V_{j}-\sum_{j=1}^{4}\left(\overline{\omega}_{b}^{4}L\int_{0}^{1}\beta_{i}\beta_{j}~{}~{}\mathrm{d}\xi\right)V_{j}=\widetilde{F}_{b,1}\beta_{i}(0)$
(38)
$\displaystyle-\widetilde{F}_{b,2}\left.\frac{\mathrm{d}\beta_{i}}{\mathrm{d}\xi}\right\rvert_{\xi=0}+\widetilde{F}_{b,3}\beta_{i}(1)-\widetilde{F}_{b,4}\left.\frac{\mathrm{d}\beta_{i}}{\mathrm{d}\xi}\right\rvert_{\xi=1}$
being
$\beta_{i}(0)=\left.\frac{\mathrm{d}\beta_{i}}{\mathrm{d}\xi}\right\rvert_{\xi=0}=0$
and
$\beta_{i}(1)=\left.\frac{\mathrm{d}\beta_{i}}{\mathrm{d}\xi}\right\rvert_{\xi=1}=0$
except for $\beta_{1}(0)=1$,
$\left.\frac{\mathrm{d}\beta_{2}}{\mathrm{d}\xi}\right\rvert_{\xi=0}=-1$,
$\beta_{3}(1)=1$,
$\left.\frac{\mathrm{d}\beta_{4}}{\mathrm{d}\xi}\right\rvert_{\xi=1}=-1$. Eq.
(38) can be written in matrix form as
$\widetilde{\mathbf{D}}_{b}(\overline{\omega}_{b})\mathbf{U}_{b}=\widetilde{\mathbf{F}}_{b}$
(39)
where
$\mathbf{U}_{b}=\begin{bmatrix}V_{1}&V_{2}&V_{3}&V_{4}\end{bmatrix}^{\mathrm{T}}$,
$\widetilde{\mathbf{F}}_{b}=\begin{bmatrix}\widetilde{F}_{b,1}&\widetilde{F}_{b,2}&\widetilde{F}_{b,3}&\widetilde{F}_{b,4}\end{bmatrix}^{\mathrm{T}}$
and $\widetilde{\mathbf{D}}_{b}$ is a $4\times 4$ matrix whose elements are
$(\widetilde{\mathbf{D}}_{b})_{ij}=L\int_{0}^{1}-\lambda^{2}\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{4}\beta_{j}}}{\mathrm{d}\xi^{4}}+\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\beta_{j}}}{\mathrm{d}\xi^{2}}~{}\mathrm{d}\xi-\overline{\omega}_{b}^{4}L\int_{0}^{1}\beta_{i}\beta_{j}~{}~{}\mathrm{d}\xi$
(40)
From Eq. (40) and taking into account Eq. (35), we finally obtain
$\mathbf{D}_{b}(\overline{\omega}_{b})\mathbf{U}_{b}=\mathbf{F}_{b}$ (41)
being
$\mathbf{D}_{b}(\overline{\omega}_{b})=\mathbf{T}^{-1}\widetilde{\mathbf{D}}_{b}$
(42)
where $\mathbf{T}^{-1}$ is trivially computable. Now, assembling Eq. (32) and
Eq. (40) for axial and bending vibrations yields
$\mathbf{D}\mathbf{U}=\mathbf{F}\qquad\mathbf{D}(\omega)=\begin{bmatrix}\mathbf{D}_{a}(\overline{\omega}_{a})&\mathbf{0}\\\
\mathbf{0}&\mathbf{D}_{b}(\overline{\omega}_{b})\end{bmatrix}$ (43)
where
$\mathbf{U}=\begin{bmatrix}U_{1}&U_{2}&V_{1}&V_{2}&V_{3}&V_{4}\end{bmatrix}^{\mathrm{T}}\qquad\mathbf{F}=\begin{bmatrix}F_{a,1}&F_{a,2}&F_{b,1}&F_{b,2}&F_{b,3}&F_{b,4}\end{bmatrix}^{\mathrm{T}}$
(44a,b)
Remarkably, upon calculating the integrals (32) and (40) by standard numerical
methods, the matrix $\mathbf{D}$ in Eq. (43) is found to coincide with the
dynamic stiffness matrix $\mathbf{D}$ in Eq. (26).
It is noteworthy that all elements of the dynamic stiffness matrix
$\mathbf{D}$ are real. Further, $\mathbf{D}$ is symmetric. Indeed, performing
integration by parts of Eq. (32) yields
$(\widetilde{\mathbf{D}}_{a})_{ij}=L\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{2}\psi_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\psi_{j}}}{\mathrm{d}\xi^{2}}+\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{\mathrm{d}\psi_{j}}{\mathrm{d}\xi}\right)~{}\mathrm{d}\xi-\overline{\omega}_{a}^{2}L\int_{0}^{1}\psi_{i}\psi_{j}~{}~{}\mathrm{d}\xi-\left.\lambda^{2}L\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{{\mathrm{d}^{2}\psi_{j}}}{\mathrm{d}\xi^{2}}\right\rvert_{0}^{1}$
(45)
The shape functions $\psi_{i}$ fulfil Eqs. (17a,b), i.e.
$\left.\frac{{\mathrm{d}^{2}\psi_{i}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=0}=\frac{1}{\lambda}\left.\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\right\rvert_{\xi=0}\qquad\left.\frac{{\mathrm{d}^{2}\psi_{i}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=1}=-\frac{1}{\lambda}\left.\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\right\rvert_{\xi=1}$
(46a,b)
Therefore, in view of Eq. (46a,b) in Eq. (45) takes the form
$\displaystyle(\widetilde{\mathbf{D}}_{a})_{ij}$
$\displaystyle=L\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{2}\psi_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\psi_{j}}}{\mathrm{d}\xi^{2}}+\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{\mathrm{d}\psi_{j}}{\mathrm{d}\xi}\right)~{}\mathrm{d}\xi-\overline{\omega}_{a}^{2}L\int_{0}^{1}\psi_{i}\psi_{j}~{}~{}\mathrm{d}\xi$
(47) $\displaystyle+\lambda
L\left(\left.\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{\mathrm{d}\psi_{j}}{\mathrm{d}\xi}\right\rvert_{\xi=0}\right.\left.+\left.\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{\mathrm{d}\psi_{j}}{\mathrm{d}\xi}\right\rvert_{\xi=1}\right)$
Eq. (47) implies that $(\mathbf{D}_{a})_{ij}=(\mathbf{D}_{a})_{ji}$, i.e the
symmetry of the dynamic stiffness matrix associated with the axial response.
Likewise, performing integration by parts of Eq. (40) yields
$(\widetilde{\mathbf{D}}_{b})_{ij}=L\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{3}\beta_{i}}}{\mathrm{d}\xi^{3}}\frac{{\mathrm{d}^{3}\beta_{j}}}{\mathrm{d}\xi^{3}}+\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\beta_{j}}}{\mathrm{d}\xi^{2}}\right)~{}\mathrm{d}\xi-\overline{\omega}_{b}^{4}L\int_{0}^{1}\beta_{i}\beta_{j}~{}~{}\mathrm{d}\xi-\left.\lambda^{2}L\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{3}\beta_{i}}}{\mathrm{d}\xi^{3}}\right\rvert_{0}^{1}$
(48)
Again, since the shape functions $\beta_{i}$ satisfy Eqs. (19a,b), i.e.
$\left.\frac{{\mathrm{d}^{3}\beta_{i}}}{\mathrm{d}\xi^{3}}\right\rvert_{\xi=0}=\frac{1}{\lambda}\left.\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=0}\qquad\left.\frac{{\mathrm{d}^{3}\beta_{i}}}{\mathrm{d}\xi^{3}}\right\rvert_{\xi=1}=-\frac{1}{\lambda}\left.\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=1}$
(49a,b)
Eq. (48) can be written as
$\displaystyle(\widetilde{\mathbf{D}}_{b})_{ij}$
$\displaystyle=L\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{3}\beta_{i}}}{\mathrm{d}\xi^{3}}\frac{{\mathrm{d}^{3}\beta_{j}}}{\mathrm{d}\xi^{3}}+\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\beta_{j}}}{\mathrm{d}\xi^{2}}\right)~{}\mathrm{d}\xi-\overline{\omega}_{b}^{4}L\int_{0}^{1}\beta_{i}\beta_{j}~{}~{}\mathrm{d}\xi$
(50) $\displaystyle+\lambda
L\left(\left.\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\beta_{j}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=0}\right.\left.+\left.\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\beta_{j}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=1}\right)$
Eq. (50) demonstrates that $(\mathbf{D}_{b})_{ij}=(\mathbf{D}_{b})_{ji}$, that
is the dynamic stiffness matrix associated with the bending response is
symmetric.
At this stage, a few remarks are in order. The dynamic stiffness matrix
$\mathbf{D}$ of the two-node stress-driven beam element in Fig. 4 can be used
to build the global dynamic stiffness matrix of an arbitrarily-shaped frame.
For this, a standard finite-element assembly procedure can be implemented. It
is noteworthy that every frame member is modelled exactly by a single element.
The size of the global dynamic stiffness matrix depends only on the total
number of degrees of freedom of the frame nodes (“beam-to-column” nodes), as
no meshing is required within every frame member.
The global dynamic stiffness matrix is exact because is exact the dynamic
stiffness matrix of every frame member. The exact natural frequencies and
related modes can be calculated by the WW algorithm, using the implementation
described in Section 4.
The frequency response of the frame, acted upon by harmonic forces/moments at
the nodes (Banerjee, 1997), can be calculated upon inverting the global
dynamic stiffness matrix. This can be done numerically, for every frequency of
interest.
The proposed framework can be generalized to build the global dynamic
stiffness matrix of 3D frames. This requires formulating the exact dynamic
stiffness matrix of a two-node stress-driven nonlocal beam element, where each
node features six degrees of freedom including torsional rotation. It is
noticed that the stress-driven nonlocal constitutive law for torsional
behaviour and associated constitutive BCs, formulated by Barretta et al.
(2018), lead to a partial differential equation governing torsional vibrations
that mirror Eq. (8) for axial vibrations. Therefore, under the assumption of
small displacements, the exact dynamic stiffness matrix of the two-node,
twelve-degree-of-freedom stress-driven nonlocal beam element will involve
separate block matrices pertinent to axial, bending and torsional responses.
Again, the global dynamic stiffness matrix will be obtainable by a standard
finite-element assembly procedure.
The global dynamic stiffness matrix of an arbitrarily-shaped truss can be
built based on the dynamic stiffness matrix of a two-node rod, which can be
readily derived from Eq. (25) upon eliminating rows and columns associated
with the bending response. For trusses as well, the exact natural frequencies
and modes can be computed by the WW algorithm, as described in Section 4. Both
2D and 3D dimensional truss structures can be modelled.
The proposed framework represents an exact approach to the dynamics of small-
size frames/trusses, where size effects are modelled by the stress-driven
nonlocal model. Here, the assumption is that the nonlocality introduces a
coupling between the responses at different points that belong to the same
frame/truss member, to an extent depending on the internal length $\lambda$.
Recognize that this assumption is made also in the previous works on small-
size frames/trusses (Numanoğlu and Civalek, 2019; Hozhabrossadati et al.,
2020), where Eringen’s differential model (1983) was used to build stiffness
and mass matrices of a two-node nonlocal finite element.
The differential operators $\,\mathcal{L}_{a}\,$ and $\,\mathcal{L}_{b}\,$ in
Eq. (16) and Eq. (18), governing axial and bending free vibrations of the two-
node stress-driven nonlocal beam element in Fig. 4, are self-adjoint. That is,
$\displaystyle\int_{0}^{1}\mathcal{L}_{a}[U_{m}]U_{n}~{}~{}\mathrm{d}\xi=\int_{0}^{1}\mathcal{L}_{a}[U_{n}]U_{m}~{}~{}\mathrm{d}\xi$
(51)
$\displaystyle\int_{0}^{1}\mathcal{L}_{b}[V_{m}]V_{n}~{}~{}\mathrm{d}\xi=\int_{0}^{1}\mathcal{L}_{b}[V_{n}]V_{m}~{}~{}\mathrm{d}\xi$
(52)
with $U_{m}$, $U_{n}$, $V_{m}$, $V_{n}$ eigenfunctions fulfilling the
constitutive BCs (17a,b)-(19a,b) and the static/kinematic BCs. Eq. (51) can be
demonstrated writing Eq. (16) for the $m^{\mathrm{th}}$ eigenfunction
$U_{m}(\xi)$, multiplying by the $n^{\mathrm{th}}$ eigenfunction $U_{n}(\xi)$
and integrating Eq. (16) over $[0,1]$, performing integration by parts (as to
derive Eq. (45)) and enforcing the constitutive BCs (17a,b) along with the
static/kinematic BCs. Eq. (52) can be proven likewise, starting from Eq. (18).
Furthermore, the self-adjoint differential operators $\mathcal{L}_{a}$ and
$\mathcal{L}_{b}$ feature properly-defined Green’s functions, given by:
$G_{a}(\xi,\xi_{0})=g_{a,1}+g_{a,2}\xi+g_{a,3}\lambda^{2}\mathrm{e}^{-\frac{\xi}{\lambda}}+g_{a,4}\lambda^{2}\mathrm{e}^{\frac{\xi}{\lambda}}+\left[\xi_{0}-\xi+\frac{\lambda}{2}\left(\mathrm{e}^{\frac{\xi-\xi_{0}}{\lambda}}-\mathrm{e}^{-\frac{\xi-\xi_{0}}{\lambda}}\right)\right]\mathcal{H}(\xi-\xi_{0})$
(53) $\displaystyle G_{b}(\xi,\xi_{0})=$
$\displaystyle~{}~{}g_{b,1}+g_{b,2}\xi+g_{b,3}\xi^{2}+g_{b,4}\xi^{3}+g_{b,5}\lambda^{4}\mathrm{e}^{-\frac{\xi}{\lambda}}+g_{b,6}\lambda^{4}\mathrm{e}^{\frac{\xi}{\lambda}}+\frac{1}{6}\left[\vphantom{\frac{\xi-\xi_{0}}{\lambda}}-(\xi-\xi_{0})^{3}+6\lambda^{2}(\xi-\xi_{0})\right.$
(54)
$\displaystyle\left.+6\lambda^{3}\sinh\left(\frac{\xi-\xi_{0}}{\lambda}\right)\right]\mathcal{H}(\xi-\xi_{0})$
where $g_{a,i}$ (for $i=1,...,4$) and $g_{b,i}$ (for $i=1,...,6$) are
integration constants to be evaluated depending on static/kinematic BCs and
$\mathcal{H}$ is the unit-step function defined by
$\mathcal{H}(\xi-\xi_{0})=\left\\{\begin{aligned}
&1&&\text{if}~{}\xi>\xi_{0}\\\
&0&&\text{if}~{}\xi<\xi_{0}\end{aligned}\right.$ (55)
The Green’s functions (53) and (54) are real functions, obtained as solutions
of the equations:
$\displaystyle\mathcal{L}_{a}[U]+\delta(\xi-\xi_{0})=0$ (56)
$\displaystyle\mathcal{L}_{b}[V]+\delta(\xi-\xi_{0})=0$ (57)
Specifically, Eq.(53) and Eq.(54) are built applying direct and inverse
Laplace transform to Eq.(55) and Eq.(56) respectively (for a similar approach,
see (Wang and Qiao, 2007)).
Since $\mathcal{L}_{a}$ and $\mathcal{L}_{b}$ are self-adjoint, the (real)
Green’s functions are symmetric. Accordingly, the free-vibration problem of
the two-node stress-driven nonlocal beam element features an infinite sequence
of real eigenvalues (natural frequencies) with associated eigenfunctions,
which form an infinite system of functions satisfying the orthogonality
conditions (Courant and Hilbert, 1953):
$\displaystyle L\int_{0}^{1}\rho AU_{m}U_{n}~{}\mathrm{d}\xi=\delta_{mn}$ (58)
$\displaystyle L\int_{0}^{1}\rho AV_{m}V_{n}~{}\mathrm{d}\xi=\delta_{mn}$ (59)
with $\delta_{mn}$ Kronecker delta.
Existence of an infinite sequence of real natural frequencies and associated
eigenfunctions follows also for the free-vibration problem of an arbitrarily-
shaped frame whose members are two-node stress-driven nonlocal beam elements.
Indeed, as motivated below, the free-vibration problem of such a frame is
still governed by self-adjoint differential operators with associated
properly-defined, real and symmetric Green’s functions.
* -
As for self-adjointness, see the work by Náprstek and Fischer (2015) proving
that, upon enforcing the classical equilibrium equations at the nodes, the
free-vibration problem of an arbitrarily-shaped frame is still governed by
self-adjoint differential operators, if the free-vibration problem of every
frame member is governed by self-adjoint differential operators.
* -
As for the calculation of the Green’s functions, notice that they can be
obtained exactly by a static finite-element analysis of the frame, acted upon
by a concentrated force applied at an arbitrary point within one of its
members. For this purpose, exact static stiffness matrices and exact static
load vectors of the two-node stress-driven nonlocal beam elements can be
assembled by a standard finite-element assembly procedure. The exact static
stiffness matrix can be obtained mirroring the approach here devised for
deriving the exact dynamic stiffness matrix. The exact static load vector of
the beam element loaded by an arbitrarily-placed concentrated force can be
constructed based on the Green’s functions (53)-(54) using a standard method
to evaluate the corresponding nodal forces (e.g., see the procedure by Failla
(2016) for dynamic problems, applicable also in a static framework). The so-
computed Green’s functions are real and symmetric as a result of self-
adjointess.
Additionally, it is noteworthy that existence and uniqueness of the frequency
response can be demonstrated for forced-vibration problems governed by self-
adjoint operators and associated real, symmetric Green functions (Courant and
Hilbert, 1953). Specifically, the frequency response exists and is unique if
the forcing frequency is not a natural frequency of the system, which avoids
resonance. Accordingly, existence and uniqueness hold true also for the
frequency response of the two-node stress-driven nonlocal beam element or a
frame whose members are two-node stress-driven nonlocal beam elements.
The conclusions drawn above are valid for any BCs and prove the well-posedness
of the stress-driven nonlocal formulation for elastodynamic problems,
including free- and forced-vibration ones. On the other hand, the well-
posedness of the stress-driven nonlocal formulation for elastostatic problems
was already proved by Romano and Barretta (2017a), for any BCs as well.
In the next Section, natural frequencies and modes of arbitrarily-shaped
frames whose members are two-node stress-driven nonlocal beam elements will be
calculated by the WW algorithm.
## 4 Wittrick-Williams algorithm for small-size trusses and frames
It is known that the WW algorithm calculates all the natural frequencies of a
frame whose exact global dynamic stiffness matrix $\mathbf{D}_{G}(\omega)$ is
available (Wittrick and Williams, 1971; Banerjee, 1997). The unique and
distinctive feature of the WW algorithm is that all the natural frequencies
are obtained exactly, without missing anyone and including multiple ones
(Williams and Wittrick, 1970; Wittrick and Williams, 1973; Williams and
Anderson, 1986; Banerjee and Williams, 1992; Su and Banerjee, 2015). For this
reason, the WW algorithm is the benchmark to investigate the exact free-
vibration response of frame.
The basis of the WW algorithm is the calculation of the number of natural
frequencies $J(\omega)$ below a trial frequency $\omega$, based on which upper
and lower bounds can be determined on every target natural frequency and made
to approach each other by the bisection method. Specifically, $J(\omega)$ is
given as (Wittrick and Williams, 1971)
$J(\omega)=J_{0}(\omega)+s[\mathbf{D}_{G}(\omega)]$ (60)
where $J_{0}(\omega)$ is the number of natural frequencies of the component
frame members with fixed ends (“clamped-clamped” frequencies); further,
$s[\mathbf{D}_{G}(\omega)]$ is the number of negative entries on the leading
diagonal of the upper triangular matrix obtained by applying the Gaussian
elimination procedure to $\mathbf{D}_{G}(\omega)$.
Here, the objective is to apply the WW algorithm for small-size frames where
every member is modelled as the two-node stress-driven nonlocal beam element
with exact dynamic stiffness matrix (26). For this purpose,
$s[\mathbf{D}_{G}(\omega)]$ in Eq. (60) can be obtained from the exact global
dynamic stiffness matrix $\mathbf{D}_{G}(\omega)$, built upon assembling the
dynamic stiffness matrices (26) of the frame members by a standard finite-
element assembly procedure, see Section 3. Further, taking into account that
axial and bending vibration responses of the single frame member are uncoupled
(see Eq. (26)), $J_{0}(\omega)$ in Eq. (60) can be written as
$J_{0}(\omega)=\sum_{k=1}^{n}J^{(a)}_{0,k}(\omega)+J^{(b)}_{0,k}(\omega)$ (61)
where $n$ is the number of the frame members, $J^{(a)}_{0,k}(\omega)$,
$J^{(b)}_{0,k}(\omega)$ denote the numbers of “clamped-clamped” frequencies
smaller than $\omega$ of the $k^{\mathrm{th}}$ frame member, for axial and
bending vibrations respectively.
Now, for consistency with the whole formulation in Section 3, the calculation
of $s[\mathbf{D}_{G}(\omega)]$, $J^{(a)}_{0,k}(\omega)$ and
$J^{(b)}_{0,k}(\omega)$ is performed using dimensionless frequencies
$\overline{\omega}_{a}$ and $\overline{\omega}_{b}$ corresponding to the trial
frequency $\omega$. This is straightforward in the calculation of
$s[\mathbf{D}_{G}(\omega)]$, see Eq. (26) for the dynamic stiffness matrix
$\mathbf{D}$ of every frame member. On the other hand, the general expressions
for $J^{(a)}_{0,k}(\overline{\omega}_{a})$ and
$J^{(b)}_{0,k}(\overline{\omega}_{b})$ are
$J^{(a)}_{0,k}(\overline{\omega}_{a})=\sum_{r=1}^{\infty}\min\left\\{1;\left\lfloor\frac{\overline{\omega}_{a}}{\overline{\omega}^{(a)}_{k,r}}\right\rfloor\right\\};\qquad\qquad
J^{(b)}_{0,k}(\overline{\omega}_{b})=\sum_{r=1}^{\infty}\min\left\\{1;\left\lfloor\frac{\overline{\omega}_{b}}{\overline{\omega}^{(b)}_{k,r}}\right\rfloor\right\\}$
(62a,b)
where $\overline{\omega}^{(\diamondsuit)}_{k,r}$ (with $\diamondsuit=a,b$) is
the $r^{\mathrm{th}}$ dimensionless “clamped-clamped” frequency of the
$k^{\mathrm{th}}$ frame member with either axial or bending vibrations
($\overline{\omega}^{(\diamondsuit)}_{k,1}\leq\overline{\omega}^{(\diamondsuit)}_{k,2}\leq\dots\leq\overline{\omega}^{(\diamondsuit)}_{k,r}\leq\overline{\omega}^{(\diamondsuit)}_{k,r+1}\leq\dots$).
For the stress-driven nonlocal beam under study,
$\overline{\omega}^{(\diamondsuit)}_{k,r}$ shall be obtained as roots of a
characteristic equation given as determinant of matrix $\mathbf{A}$ in Eq.
(23). Specifically, two separate characteristic equations can be obtained from
the determinants of the block matrices $\mathbf{A}_{a}$ and $\mathbf{A}_{b}$
associated with axial and bending vibrations:
$\displaystyle\det{\mathbf{A}_{a}(\overline{\omega}_{a})}=g_{1}(0,\overline{\omega}_{b})g_{2}(1,\overline{\omega}_{b})-g_{1}(1,\overline{\omega}_{b})g_{2}(0,\overline{\omega}_{b})$
(63)
$\displaystyle\det{\mathbf{A}_{b}(\overline{\omega}_{b})}=\sum_{i,j,h,k=1}^{4}g_{i}(0,\overline{\omega}_{b})\cdot
g_{j}(1,\overline{\omega}_{b})\cdot\left.\frac{\partial
g_{h}(\xi,\overline{\omega}_{b})}{\partial\xi}\right\rvert_{\xi=0}\cdot\left.\frac{\partial
g_{k}(\xi,\overline{\omega}_{b})}{\partial\xi}\right\rvert_{\xi=1}\epsilon_{ijhk}$
(64)
being $\epsilon_{ijhk}$ the $4^{\mathrm{th}}$-dimensional Levi-Civita tensor
defined as
$\epsilon_{ijhk}=\left\\{\begin{aligned}
&1&&\text{if}~{}(i,j,k,h)=(1,2,3,4),(2,3,4,1),(3,4,1,2)~{}\text{or}~{}(4,1,2,3)\\\
-&1&&\text{if}~{}(i,j,k,h)=(4,3,2,1),(3,2,1,4),(2,1,4,3)~{}\text{or}~{}(1,4,3,2)\\\
&0&&\text{if two or more indices are equal}\end{aligned}\right.$ (65)
It is noticed that the roots of Eq. (63) and Eq. (64) cannot be obtained in
analytical form but are readily obtainable by a numerical root-finding
algorithm. Indeed, whenever roots of the characteristic equation are not
available in analytical form, the implementation of the WW algorithm involves
the numerical calculation of the roots in order to evaluate $J_{0}(\omega)$,
e.g. see (Banerjee and Williams, 1985). Table 1 reports the first 20
dimensionless “clamped-clamped” frequencies of the two-node stress-driven
nonlocal beam element in Figure 4, for various values of the internal length
$\lambda$, as computed by Mathematica (Wolfram Research, Inc., 2017).
Additional frequencies are not included in Table 1 for conciseness.
Table 1: First 20 dimensionless frequencies of clamped-clamped two-node
stress-driven nonlocal beam element: (a) axial vibrations, (b) bending
vibrations
$\lambda$ | 0 | 0.01 | 0.10
---|---|---|---
| 3.14159 | 3.17488 | 3.63694
| 6.28319 | 6.35908 | 8.07878
| 9.42478 | 9.56186 | 13.86928
| 12.56637 | 12.79240 | 21.29970
| 15.70796 | 16.05973 | 30.51843
| 18.84956 | 19.37271 | 41.60268
| 21.99115 | 22.73997 | 54.59429
| 25.13274 | 26.16990 | 69.51703
| 28.27433 | 29.67060 | 86.38503
| 31.41593 | 33.24986 | 105.20705
(a)
$\lambda$ | 0 | 0.01 | 0.10
---|---|---|---
| 4.71239 | 4.78036 | 5.46176
| 7.85398 | 7.94458 | 9.61519
| 10.99557 | 11.13962 | 14.37222
| 14.13717 | 14.34978 | 19.73479
| 17.27876 | 17.58029 | 25.67782
| 20.42035 | 20.83533 | 32.16655
| 23.56194 | 24.11894 | 39.16664
| 26.70354 | 27.43498 | 46.64714
| 29.84513 | 30.78710 | 54.58095
| 32.98672 | 34.17872 | 62.94445
(b)
## 5 Numerical applications
Here, two applications are presented. For a first insight, natural frequencies
and modes of a single small-size beam will be calculated by the proposed
approach and validated by comparison with approximate ones obtained by an
alternative solution method. Secondly, the proposed approach will be applied
to a small-size structure.
### 5.1 Example A
Consider the small-size cantilever beam in Fig. 5, with the following
parameters: $E=427\hskip 1.5pt\text{GPa}$, $L=20\hskip 1.5pt\text{nm}$,
$A=2\hskip 1.5pt\text{$\text{nm}^{2}$}$ (rectangular cross section with
$b=1\hskip 1.5pt\text{nm}$ and $h=2\hskip 1.5pt\text{nm}$), $\rho=3200\hskip
1.5pt\text{kg$\text{m}^{-3}$}$. The proposed approach is implemented to
investigate axial and bending vibrations. Specifically, the exact dynamic
stiffness matrix $\mathbf{D}(\omega)$ of the beam is constructed using a
single element and the WW algorithm described in Section 4 is applied to
calculate exact natural frequencies and modes. For validation, they are
compared with approximate frequency/modes obtained by a linear eigenvalue
problem formulated by the Rayleigh-Ritz method (Meirovitch, 1997), using
Chebyshëv polynomials as trial functions. Details on the implementation of the
Rayleigh-Ritz method are given in Appendix B.
Figure 5: Small-size cantilever beam.
Tables 2 and 3 report the first $10$ natural frequencies of axial and bending
vibrations, assuming $\lambda=0.1$ as internal length of the stress-driven
nonlocal model. As the number $N$ of Chebyshëv polynomials increases, the
approximate natural frequencies obtained by the Rayleigh-Ritz method converge
to the exact ones calculated by the proposed approach, with accuracy up to the
first four digits after the comma. For completeness, Tables 2 and 3 include
also the numbers of $J_{0}$ and $s[\mathbf{D}]$ corresponding to each natural
frequency, as calculated by the WW algorithm.
Table 2: Natural frequencies for axial vibrations of cantilever beam in Fig. 5. Rayleigh-Ritz method | Proposed approach
---|---
$\omega$ (GHz) | $\omega$ (GHz) | $\omega$ (GHz) | $\omega$ (GHz) | $\omega$ (GHz) | $J_{0}$ | $s[\mathbf{D}]$
$N=15$ | $N=20$ | $N=25$ | $N=30$
153.55326 | 153.55326 | 153.55326 | 153.55326 | 153.55326 | 0 | 1
496.47072 | 496.47072 | 496.47072 | 496.47072 | 496.47072 | 1 | 1
935.15490 | 935.15490 | 935.15490 | 935.15490 | 935.15490 | 2 | 1
1507.35332 | 1507.35332 | 1507.35332 | 1507.35332 | 1507.35332 | 3 | 1
2234.00705 | 2234.00701 | 2234.00701 | 2234.00701 | 2234.00701 | 4 | 1
3126.45565 | 3126.44056 | 3126.44056 | 3126.44056 | 3126.44056 | 5 | 1
4191.19849 | 4190.85881 | 4190.85880 | 4190.85880 | 4190.85880 | 6 | 1
5446.24457 | 5430.76615 | 5430.76561 | 5430.76561 | 5430.76561 | 7 | 1
6923.28272 | 6848.28865 | 6848.21510 | 6848.21510 | 6848.21510 | 8 | 1
9171.87686 | 8445.24453 | 8444.45914 | 8444.45902 | 8444.45902 | 9 | 1
Table 3: Natural frequencies for bending vibrations of cantilever beam in Fig. 5. Rayleigh-Ritz method | Proposed approach
---|---
$\omega$ (GHz) | $\omega$ (GHz) | $\omega$ (GHz) | $\omega$ (GHz) | $\omega$ (GHz) | $J_{0}$ | $s[\mathbf{D}]$
$N=15$ | $N=20$ | $N=25$ | $N=30$
10.34411 | 10.34411 | 10.34411 | 10.34411 | 10.34411 | 0 | 1
69.34614 | 69.34614 | 69.34614 | 69.34614 | 69.34614 | 0 | 2
216.98244 | 216.98244 | 216.98244 | 216.98244 | 216.98244 | 1 | 2
486.95413 | 486.95413 | 486.95413 | 486.95413 | 486.95413 | 2 | 2
924.34254 | 924.34242 | 924.34242 | 924.34242 | 924.34242 | 3 | 2
1576.81346 | 1576.71498 | 1576.71498 | 1576.71498 | 1576.71497 | 4 | 2
2493.86913 | 2492.72293 | 2492.72281 | 2492.72281 | 2492.72281 | 5 | 2
3777.69185 | 3721.45057 | 3721.44739 | 3721.44739 | 3721.44738 | 6 | 2
5522.11124 | 5312.63783 | 5312.14577 | 5312.14577 | 5312.14575 | 7 | 2
9394.99642 | 7317.91183 | 7314.14894 | 7314.14767 | 7314.14765 | 8 | 2
Figures 6 and 7 show the eigenfunctions corresponding to the first four modes
for axial and bending vibrations, calculated by the proposed approach and
Rayleigh-Ritz method. The agreement is excellent, substantiating the
correctness of the proposed strategy.
Figure 6: First four eigenfunctions for axial vibrations of the cantilever
beam in Fig. 5: Proposed approach (continuous line), Rayleigh-Ritz method
(dots). Figure 7: First four eigenfunctions for bending vibrations of the
cantilever beam in Fig. 5: Proposed approach (continuous line), Rayleigh-Ritz
method (dots).
### 5.2 Example B
Consider the small-size 2D structures in Fig. 8. The two structures feature
the same external constraints but two different assumptions are made on the
internal nodes, i.e. truss (Fig. 8a) and frame (Fig. 8b) nodal connections are
considered. For numerical purposes, reference parameters are: $E=427\hskip
1.5pt\text{GPa}$, $L=20\hskip 1.5pt\text{nm}$, $A=2\hskip
1.5pt\text{$\text{nm}^{2}$}$ (rectangular cross section with $b=1\hskip
1.5pt\text{nm}$ and $h=2\hskip 1.5pt\text{nm}$), $\rho=3200\hskip
1.5pt\text{kg$\text{m}^{-3}$}$.
Figure 8: Small-size 2D structures: (a) truss; (b) frame.
To investigate the free-vibration response in presence of size effects, every
structural member is modelled by a single stress-driven nonlocal two-node beam
element, whose exact dynamic stiffness matrix is $\mathbf{D}$ given by Eq.
(26) for the frame or its block matrix $\mathbf{D}_{a}$ for the truss. On
building the global dynamic stiffness matrix by a standard finite-element
assembly procedure, exact natural frequencies and modes are calculated by the
WW algorithm described in Section 4. Size effects are investigated considering
different values of the internal length $\lambda$ of the stress-driven
nonlocal model.
Table 4: Natural frequencies, $J_{0}$ and $s[\mathbf{D}_{G}]$ for truss in Fig. 8a. $\lambda$ | 0 | 0.01 | 0.10
---|---|---|---
| $\omega~{}(\hskip 1.5pt\text{GHz})$ | $J_{0}$ | $s[\mathbf{D}_{G}]$ | $\omega~{}(\hskip 1.5pt\text{GHz})$ | $J_{0}$ | $s[\mathbf{D}_{G}]$ | $\omega~{}(\hskip 1.5pt\text{GHz})$ | $J_{0}$ | $s[\mathbf{D}_{G}]$
| 27.43821 | 0 | 1 | 27.57524 | 0 | 1 | 28.92544 | 0 | 1
| 58.27909 | 0 | 2 | 58.56994 | 0 | 2 | 61.51358 | 0 | 2
| 63.87465 | 0 | 4 | 64.20284 | 0 | 4 | 67.53415 | 0 | 4
| 63.87465 | 0 | 4 | 64.20284 | 0 | 4 | 67.53415 | 0 | 4
| 72.19697 | 0 | 5 | 72.56269 | 0 | 5 | 76.27531 | 0 | 5
| 75.49053 | 0 | 6 | 75.86652 | 0 | 6 | 79.78619 | 0 | 6
| 89.90719 | 0 | 7 | 90.34393 | 0 | 7 | 94.99763 | 0 | 7
| 101.00278 | 0 | 9 | 101.47942 | 0 | 9 | 106.72088 | 0 | 9
| 101.00278 | 0 | 9 | 101.47942 | 0 | 9 | 106.72088 | 0 | 9
| 130.70334 | 0 | 10 | 131.39556 | 0 | 10 | 139.26081 | 0 | 10
| 144.39394 | 0 | 11 | 145.13719 | 0 | 11 | 153.55326 | 0 | 11
| 161.97629 | 0 | 13 | 162.98630 | 0 | 13 | 174.80492 | 0 | 13
| 161.97629 | 0 | 13 | 162.98630 | 0 | 13 | 174.80492 | 0 | 13
| 170.78182 | 0 | 14 | 171.94402 | 0 | 14 | 185.74609 | 0 | 14
| 176.32509 | 0 | 15 | 177.47886 | 0 | 15 | 191.44679 | 0 | 15
| 184.61555 | 0 | 17 | 185.96370 | 0 | 17 | 202.32571 | 0 | 17
| 184.61555 | 0 | 17 | 185.96370 | 0 | 17 | 202.32571 | 0 | 17
| 191.85137 | 0 | 18 | 193.44083 | 0 | 18 | 212.98799 | 0 | 18
| 209.44418 | 8 | 11 | 211.20072 | 8 | 11 | 232.47553 | 0 | 19
| 216.59091 | 8 | 12 | 217.73242 | 8 | 12 | 234.52643 | 0 | 20
For a first insight, the truss model in Fig. 8a is considered. Table 4 shows
the first 20 natural frequencies computed by the proposed approach, along with
the numbers $J_{0}$ and $s[\mathbf{D}_{G}]$ corresponding to each natural
frequency calculated by the WW algorithm. Results in Table 4 suggest some
interesting comments. The first is that the natural frequencies increase with
the internal length $\lambda$, meaning that increasing nonlocality induces
stiffening. This is in agreement with previous results obtained for the static
response using the stress-driven nonlocal approach (Romano and Barretta,
2017a, b; Romano et al., 2017); as for size effects in general, it is to be
noticed that experimental evidence of stiffening size effects exists in the
literature for small-size specimens, see for instance the work by Lam et al.
(2003). A second observation is that the natural frequencies tend to those of
the classical local model as the internal length $\lambda$ decreases, as
expected.
Finally, it is noteworthy that some of the natural frequencies reported in
Table 4 are double roots of the characteristic equation, confirming that the
WW algorithm is capable of detecting all natural frequencies, including
multiple ones. The mode shapes associated with some of the natural frequencies
in Table 4 are illustrated in Fig. 9.
(a) $1^{\mathrm{st}}$ mode
(b) $2^{\mathrm{nd}}$ mode
(c) $5^{\mathrm{th}}$ mode
(d) $6^{\mathrm{th}}$ mode
Figure 9: Mode shapes for truss in Fig. 8a, for $\lambda=0.10$.
They appear meaningful based on engineering judgement and exhibit typical
symmetric or anti-symmetric shapes, as is typical the case in vibrating
structures.
Next, the frame in Fig. 8b is investigated. Table 5 reports the first 20
natural frequencies obtained by the proposed approach along with the pertinent
numbers $J_{0}$ and $s[\mathbf{D}_{G}]$. Comments mirrors those on Table 4.
That is, the natural frequencies increase with the internal length $\lambda$,
i.e. increasing nonlocality induces stiffening effects in the free-vibration
response, while the local natural frequencies are retrieved for vanishing
$\lambda$. For a final insight, Fig. 11 illustrates the frequency response for
the horizontal displacement of the top-right node, when a harmonic horizontal
force $1e^{i\omega t}$ (expressed in nN) is applied at the same node of the
frame. As expected, the resonance peaks of the frequency response occur at the
natural frequencies reported in Table 5 for various internal lengths
$\lambda$’s. The results in Fig. 11 substantiate the correctness of the
proposed approach.
Table 5: Natural frequencies, $J_{0}$ and $s[\mathbf{D}_{G}]$ for frame in Fig. 8b. $\lambda$ | 0 | 0.01 | 0.10
---|---|---|---
| $\omega~{}(\hskip 1.5pt\text{GHz})$ | $J_{0}$ | $s[\mathbf{D}_{G}]$ | $\omega~{}(\hskip 1.5pt\text{GHz})$ | $J_{0}$ | $s[\mathbf{D}_{G}]$ | $\omega~{}(\hskip 1.5pt\text{GHz})$ | $J_{0}$ | $s[\mathbf{D}_{G}]$
| 18.06966 | 0 | 1 | 18.20830 | 0 | 1 | 19.74251 | 0 | 1
| 21.43257 | 0 | 2 | 21.66017 | 0 | 2 | 24.85028 | 0 | 2
| 21.82279 | 0 | 3 | 22.07537 | 0 | 3 | 25.64302 | 0 | 3
| 24.23064 | 0 | 4 | 24.55413 | 0 | 4 | 28.90690 | 0 | 4
| 24.64898 | 0 | 5 | 24.99159 | 0 | 5 | 29.58275 | 0 | 5
| 25.11337 | 0 | 6 | 25.48482 | 0 | 6 | 30.54844 | 0 | 6
| 26.38111 | 0 | 7 | 26.75646 | 0 | 7 | 31.37600 | 0 | 7
| 27.73741 | 0 | 8 | 28.01785 | 0 | 8 | 32.04594 | 0 | 8
| 29.36164 | 0 | 9 | 29.97324 | 0 | 9 | 33.37855 | 0 | 9
| 30.50700 | 8 | 2 | 30.63232 | 8 | 2 | 37.90881 | 0 | 10
| 33.07618 | 8 | 3 | 33.39250 | 8 | 3 | 39.42049 | 0 | 11
| 36.73234 | 8 | 4 | 37.08584 | 8 | 4 | 42.08654 | 8 | 4
| 36.90634 | 8 | 5 | 37.29529 | 8 | 5 | 42.64020 | 8 | 5
| 37.22135 | 8 | 6 | 37.67109 | 8 | 6 | 44.91988 | 8 | 6
| 39.65386 | 8 | 7 | 40.09235 | 8 | 7 | 46.64787 | 8 | 7
| 40.83422 | 8 | 8 | 41.28685 | 8 | 8 | 48.15536 | 8 | 8
| 41.20524 | 8 | 9 | 41.74052 | 8 | 9 | 49.12239 | 8 | 9
| 42.17990 | 8 | 10 | 42.71746 | 8 | 10 | 49.56440 | 8 | 10
| 44.39416 | 8 | 11 | 44.97509 | 8 | 11 | 52.63650 | 8 | 11
| 45.49144 | 8 | 12 | 46.10350 | 8 | 12 | 54.30830 | 8 | 12
Mode shapes associated with some of the natural frequencies in Table 5,
reported in Fig. 10, exhibit symmetry and anti-symmetry as expected in
vibrating structures.
(a) $1^{\mathrm{st}}$ mode
(b) $2^{\mathrm{nd}}$ mode
(c) $3^{\mathrm{rd}}$ mode
(d) $5^{\mathrm{th}}$ mode
Figure 10: Mode shapes for frame in Fig. 8b, for $\lambda=0.10$.
Figure 11: Frequency response function for horizontal displacement of top-
right node of frame in Fig. 8b, for various internal lengths: (a) $\lambda=0$,
(b) $\lambda=0.01$, (c) $\lambda=0.10$.
## 6 Closing remarks
A novel approach to the dynamics of small-size frames has been proposed,
resorting to the analysis presented in (Romano and Barretta, 2017a) within
special framework of straight beams. On adopting a stress-driven nonlocal
formulation to account for size effects, the exact dynamic stiffness matrix of
a two-node nonlocal element has been analytically derived in a closed form,
which can readily be used to construct, by a standard finite-element assembly
procedure, the global dynamic stiffness matrix of complex small-size frames.
The Wittrick-Williams algorithm has been applied to calculate all natural
frequencies and related modes. The formulation has been presented for 2D
structures, but can be generalized to 3D ones.
The proposed approach provides, to the best of authors’ knowledge, a first
example of two-node nonlocal element, whose dynamics is treated exactly using
the dynamic-stiffness matrix approach. That is, every member of the frame can
be modelled by a single, exact element without any internal mesh. The stress-
driven approach offers a consistent nonlocal description of size effects that
does overcome theoretical flaws of alternative nonlocal formulations. Finally,
using the Wittrick-Williams technique guarantees that all natural frequencies
can be calculated without missing anyone and including multiple ones. It is
believed that the proposed methodology provides an effective and robust tool
to assess scale effects in nano-frames, within the general framework of
nonlocal mechanics.
## Appendix A
This Appendix reports closed analytical expressions of functions $f_{k}$ and
$g_{k}$ involved in Eq. (20) and Eq. (21) of the main text. First, notice that
the solution of the $4^{\mathrm{th}}$ order differential equation (16) takes
the general expression:
$U(\xi)=\sum_{k=1}^{2}c_{a,k}\mathrm{e}^{\sqrt{r_{k}}\xi}+c_{a,k+2}\mathrm{e}^{-\sqrt{r_{k}}\xi}$
(66)
where $c_{a,k}$ (for $k=1,...,4$) are integration constants and
$\pm\sqrt{r_{k}}$ (for $k=1,...,2$) are the roots of the characteristic
polynomial of Eq. (16), obtained in the following form on assuming the
solution $U=\mathrm{e}^{y\xi}$ and setting $y^{2}=r$:
$-\lambda^{2}r^{2}+r+\overline{\omega}_{a}^{2}=0$ (67)
Enforcing the constitutive BCs (17a,b), (66) reverts to Eq. (20) where
functions $f_{k}$ are:
$\displaystyle
f_{1}(\xi)=\mathcal{A}_{1}\mathrm{e}^{-r_{1}\xi}+\mathcal{A}_{2}\mathrm{e}^{-r_{2}\xi}+\mathrm{e}^{r_{1}\xi}$
(68) $\displaystyle
f_{2}(\xi)=\mathcal{A}_{3}\mathrm{e}^{-r_{1}\xi}+\mathcal{A}_{4}\mathrm{e}^{-r_{2}\xi}+\mathrm{e}^{r_{2}\xi}$
In Eq. (68), symbols $A_{k}$ (for $k=1,...,4$) and $r_{k}$ (for $k=1,2$)
$\displaystyle\mathcal{A}_{1}=\mathcal{O}_{1}^{-1}\mathrm{e}^{r_{1}}\left(\lambda^{2}\mathrm{e}^{r_{1}+r_{2}}r_{1}r_{2}-\lambda^{2}r_{1}r_{2}+\lambda\mathrm{e}^{r_{1}+r_{2}}r_{1}+\lambda
r_{1}+\lambda\mathrm{e}^{r_{1}+r_{2}}r_{2}+\lambda
r_{2}+\mathrm{e}^{r_{1}+r_{2}}-1\right)$ (69)
$\displaystyle\mathcal{A}_{2}=-(r_{2}\mathcal{O}_{1})^{-1}\mathrm{e}^{r_{2}}r_{1}\left(\lambda^{2}\mathrm{e}^{2r_{1}}r_{1}^{2}-\lambda^{2}r_{1}^{2}+2\lambda\mathrm{e}^{2r_{1}}r_{1}+2\lambda
r_{1}+\mathrm{e}^{2r_{1}}-1\right)$
$\displaystyle\mathcal{A}_{3}=(r_{1}\mathcal{O}_{1})^{-1}\mathrm{e}^{r_{1}}r_{2}\left(\lambda^{2}\mathrm{e}^{2r_{2}}r_{2}^{2}-\lambda^{2}r_{2}^{2}+2\lambda\mathrm{e}^{2r_{2}}r_{2}+2\lambda
r_{2}+\mathrm{e}^{2r_{2}}-1\right)$
$\displaystyle\mathcal{A}_{4}=-\mathcal{O}_{1}^{-1}\mathrm{e}^{r_{2}}\left(\lambda^{2}\mathrm{e}^{r_{1}+r_{2}}r_{1}r_{2}-\lambda^{2}r_{1}r_{2}+\lambda\mathrm{e}^{r_{1}+r_{2}}r_{1}+\lambda
r_{1}+\lambda\mathrm{e}^{r_{1}+r_{2}}r_{2}+\lambda
r_{2}+\mathrm{e}^{r_{1}+r_{2}}-1\right)$
with
$\mathcal{O}_{1}=\lambda^{2}\mathrm{e}^{p_{1}}p_{1}p_{2}-\lambda^{2}\mathrm{e}^{p_{2}}p_{1}p_{2}-\lambda\mathrm{e}^{p_{1}}p_{1}-\lambda\mathrm{e}^{p_{2}}p_{1}+\lambda\mathrm{e}^{p_{1}}p_{2}+\lambda\mathrm{e}^{p_{2}}p_{2}-\mathrm{e}^{p_{1}}+\mathrm{e}^{p_{2}}$
(70)
Further, recognize that the solution of the $6^{\mathrm{th}}$ order
differential equation (18) takes the general expression (e.g., see Pinnola et
al. (2020b)):
$V(\xi)=\sum_{k=1}^{3}c_{b,k}\mathrm{e}^{\sqrt{p_{k}}\xi}+c_{b,k+3}\mathrm{e}^{-\sqrt{p_{k}}\xi}$
(71)
where $c_{b,k}$ (for $k=1,...,6$) are integration constants and
$\pm\sqrt{p_{k}}$ (for $k=1,...,3$) are the roots of the characteristic
polynomial of Eq. (18), obtained in the following form on assuming the
solution $V=\mathrm{e}^{y\xi}$ and setting $y^{2}=p$:
$\lambda^{2}p^{3}-p^{2}+\overline{\omega}_{b}^{4}=0$ (72)
Enforcing the constitutive BCs (19a,b), (71) becomes Eq. (21) where functions
$g_{k}$ are:
$\displaystyle
g_{1}(\xi)=\mathrm{e}^{p_{1}\xi}+\mathcal{B}_{1}\mathrm{e}^{-p_{2}\xi}+\mathcal{B}_{2}\mathrm{e}^{-p_{3}\xi}$
(73) $\displaystyle
g_{2}(\xi)=\mathrm{e}^{p_{2}\xi}+\mathcal{B}_{3}\mathrm{e}^{-p_{2}\xi}+\mathcal{B}_{4}\mathrm{e}^{-p_{3}\xi}$
$\displaystyle
g_{3}(\xi)=\mathrm{e}^{p_{3}\xi}+\mathcal{B}_{5}\mathrm{e}^{-p_{2}\xi}+\mathcal{B}_{6}\mathrm{e}^{-p_{3}\xi}$
$\displaystyle
g_{4}(\xi)=\mathrm{e}^{-p_{1}\xi}+\mathcal{B}_{7}\mathrm{e}^{-p_{2}\xi}+\mathcal{B}_{8}\mathrm{e}^{-p_{3}\xi}$
In Eq. (73), symbols $\mathcal{B}_{k}$ (for $k=1,...,8$) and $p_{k}$ (for
$k=1,...,3$) denote:
$\displaystyle\mathcal{B}_{1}=-(p_{2}^{2}\mathcal{O}_{2})^{-1}\mathrm{e}^{p_{2}}p_{1}^{2}\left(\mathrm{e}^{p_{1}+p_{3}}p_{1}p_{3}\lambda^{2}-p_{1}p_{3}\lambda^{2}+\mathrm{e}^{p_{1}+p_{3}}p_{1}\lambda+p_{1}\lambda+\mathrm{e}^{p_{1}+p_{3}}p_{3}\lambda+p_{3}\lambda+\mathrm{e}^{p_{1}+p_{3}}-1\right)$
(74)
$\displaystyle\mathcal{B}_{2}=(p_{3}^{2}\mathcal{O}_{2})^{-1}\mathrm{e}^{p_{3}}p_{1}^{2}\left(\mathrm{e}^{p_{1}+p_{2}}p_{1}p_{2}\lambda^{2}-p_{1}p_{2}\lambda^{2}+\mathrm{e}^{p_{1}+p_{2}}p_{1}\lambda+p_{1}\lambda+\mathrm{e}^{p_{1}+p_{2}}p_{2}\lambda+p_{2}\lambda+\mathrm{e}^{p_{1}+p_{2}}-1\right)$
$\displaystyle\mathcal{B}_{3}=-\mathcal{O}_{2}^{-1}\mathrm{e}^{p_{2}}\left(\mathrm{e}^{p_{2}+p_{3}}p_{2}p_{3}\lambda^{2}-p_{2}p_{3}\lambda^{2}+\mathrm{e}^{p_{2}+p_{3}}p_{2}\lambda+p_{2}\lambda+\mathrm{e}^{p_{2}+p_{3}}p_{3}\lambda+p_{3}\lambda+\mathrm{e}^{p_{2}+p_{3}}-1\right)$
$\displaystyle\mathcal{B}_{4}=(p_{3}^{2}\mathcal{O}_{2})^{-1}\mathrm{e}^{p_{3}}p_{2}^{2}\left(\mathrm{e}^{2p_{2}}\lambda^{2}p_{2}^{2}-\lambda^{2}p_{2}^{2}+2\mathrm{e}^{2p_{2}}\lambda
p_{2}+2\lambda p_{2}+\mathrm{e}^{2p_{2}}-1\right)$
$\displaystyle\mathcal{B}_{5}=-(p_{2}^{2}\mathcal{O}_{2})^{-1}\mathrm{e}^{p_{2}}p_{3}^{2}\left(\mathrm{e}^{2p_{3}}\lambda^{2}p_{3}^{2}-\lambda^{2}p_{3}^{2}+2\mathrm{e}^{2p_{3}}\lambda
p_{3}+2\lambda p_{3}+\mathrm{e}^{2p_{3}}-1\right)$
$\displaystyle\mathcal{B}_{6}=\mathcal{O}_{2}^{-1}\mathrm{e}^{p_{3}}\left(\mathrm{e}^{p_{2}+p_{3}}p_{2}p_{3}\lambda^{2}-p_{2}p_{3}\lambda^{2}+\mathrm{e}^{p_{2}+p_{3}}p_{2}\lambda+p_{2}\lambda+\mathrm{e}^{p_{2}+p_{3}}p_{3}\lambda+p_{3}\lambda+\mathrm{e}^{p_{2}+p_{3}}-1\right)$
$\displaystyle\mathcal{B}_{7}=-(p_{2}^{2}\mathcal{O}_{2})^{-1}\mathrm{e}^{p_{2}-p_{1}}p_{1}^{2}\left(\mathrm{e}^{p_{1}}p_{1}p_{3}\lambda^{2}-\mathrm{e}^{p_{3}}p_{1}p_{3}\lambda^{2}-\mathrm{e}^{p_{1}}p_{1}\lambda-\mathrm{e}^{p_{3}}p_{1}\lambda+\mathrm{e}^{p_{1}}p_{3}\lambda+\mathrm{e}^{p_{3}}p_{3}\lambda-\mathrm{e}^{p_{1}}+\mathrm{e}^{p_{3}}\right)$
$\displaystyle\mathcal{B}_{8}=(p_{3}^{2}\mathcal{O}_{2})^{-1}\mathrm{e}^{p_{3}-p_{1}}p_{1}^{2}\left(\mathrm{e}^{p_{1}}p_{1}p_{2}\lambda^{2}-\mathrm{e}^{p_{2}}p_{1}p_{2}\lambda^{2}-\mathrm{e}^{p_{1}}p_{1}\lambda-\mathrm{e}^{p_{2}}p_{1}\lambda+\mathrm{e}^{p_{1}}p_{2}\lambda+\mathrm{e}^{p_{2}}p_{2}\lambda-\mathrm{e}^{p_{1}}+\mathrm{e}^{p_{2}}\right)$
being
$\mathcal{O}_{2}=\mathrm{e}^{p_{2}}p_{2}p_{3}\lambda^{2}-\mathrm{e}^{p_{3}}p_{2}p_{3}\lambda^{2}-\mathrm{e}^{p_{2}}p_{2}\lambda-\mathrm{e}^{p_{3}}p_{2}\lambda+\mathrm{e}^{p_{2}}p_{3}\lambda+\mathrm{e}^{p_{3}}p_{3}\lambda-\mathrm{e}^{p_{2}}+\mathrm{e}^{p_{3}}$
(75)
## Appendix B
This Appendix describes the formulation of the eigenvalue problem for the free
vibrations of stress-driven nonlocal beams, according to the Rayleigh-Ritz
method (Meirovitch, 1997) using Chebyshëv polynomials (Mason and Handscomb,
2002) as trial functions.
For axial vibrations, the Rayleigh’s quotient is defined by
$\overline{\omega}_{a}^{2}=R(U)=\frac{\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{4}U}}{\mathrm{d}\xi^{4}}U-\frac{{\mathrm{d}^{2}U}}{\mathrm{d}\xi^{2}}\right)~{}\mathrm{d}\xi}{\int_{0}^{1}U^{2}~{}\mathrm{d}\xi}$
(76)
where $U$ is an eigenfunction. Next, integrate by parts the numerator of Eq.
(76), enforce the constitutive BCs (17a,b) along with the static BCs and
assume that $U(\xi)$ is written as an expansion of $N$ shifted Chebyshëv
polynomials of the first kind:
$U(\xi)=\mathbf{c}^{\mathrm{T}}\boldsymbol{\phi}(\xi)$ (77)
where $\mathbf{c}=\begin{bmatrix}c_{0}&\dots&c_{N}\end{bmatrix}^{\mathrm{T}}$
is the vector of constants and $\boldsymbol{\phi}(\xi)$ is the vector
$\boldsymbol{\phi}(\xi)=\begin{bmatrix}T_{0}(-1+2\xi)&\dots&T_{N}(-1+2\xi)\end{bmatrix}^{\mathrm{T}}$
(78)
being $T_{j}$ the $j^{\mathrm{th}}$ Chebyshëv polynomial defined by the
following recurrence relation (Mason and Handscomb, 2002):
$T_{j}(x)=2xT_{j-1}(x)-T_{j-2}(x),\qquad j=2,3,...$ (79)
with $T_{0}(x)=1$ and $T_{1}(x)=x$. Using Eq. (77), the stationary condition
of the Rayleigh’s quotient implies that
$\frac{\partial R(\mathbf{c})}{\partial\mathbf{c}}=\mathbf{0}$ (80)
Eq. (80) leads to following generalized eigenproblem:
$\left(\mathbf{A}_{a}-\overline{\omega}_{a}^{2}\mathbf{B}\right)\mathbf{c}=\mathbf{0}$
(81)
where
$\mathbf{A}_{a}=\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\otimes\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}+\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\otimes\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\right)~{}\mathrm{d}\xi+\lambda\left(\left.\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\otimes\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\right\rvert_{\xi=0}+\left.\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\otimes\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\right\rvert_{\xi=1}\right)$
(82)
and
$\mathbf{B}=\int_{0}^{1}\boldsymbol{\phi}\otimes\boldsymbol{\phi}~{}\mathrm{d}\xi$
(83)
In a similar fashion, the generalized eigenproblem is derived for bending
responses. In this case, the Rayleigh’s quotient is defined by
$\overline{\omega}_{b}^{4}=R(V)=\frac{\int_{0}^{1}\left(-\lambda^{2}\frac{{\mathrm{d}^{6}V}}{\mathrm{d}\xi^{6}}V+\frac{{\mathrm{d}^{5}V}}{\mathrm{d}\xi^{5}}V\right)~{}\mathrm{d}\xi}{\int_{0}^{1}V^{2}~{}\mathrm{d}\xi}$
(84)
with $V$ an eigenfunction. Again, the numerator of Eq. (76) is integrated by
part, the constitutive BCs (19a,b) along with static BCs are enforced and
$V(\xi)$ is written as an expansion of $N$ shifted Chebyshëv polynomials of
the first kind:
$V(\xi)=\mathbf{c}^{\mathrm{T}}\boldsymbol{\phi}(\xi)$ (85)
where $\mathbf{c}=\begin{bmatrix}c_{0}&\dots&c_{N}\end{bmatrix}^{\mathrm{T}}$
is the vector of constants and $\boldsymbol{\phi}(\xi)$ is the vector (78).
Finally, replacing (84) for $R$ in Eq. (80) leads to the following
eigenproblem
$\left(\mathbf{A}_{b}-\overline{\omega}_{b}^{4}\mathbf{B}\right)\mathbf{c}=\mathbf{0}$
(86)
where
$\mathbf{A}_{b}=\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{3}\boldsymbol{\phi}}}{\mathrm{d}\xi^{3}}\otimes\frac{{\mathrm{d}^{3}\boldsymbol{\phi}}}{\mathrm{d}\xi^{3}}+\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\otimes\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\right)~{}\mathrm{d}\xi+\lambda\left(\left.\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\otimes\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=0}+\left.\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\otimes\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=1}\right)$
(87)
and $\mathbf{B}$ is given by Eq. (83). It has to be noticed that, in the
formulation of both eigenvalue problems (81) and (86), kinematic BCs can be
suitably enforced on the trial functions using the method of Lagrange
multipliers (Canales and Mantari, 2016). This leads to the following
eigenvalue problems:
$\left(\begin{bmatrix}\mathbf{A}_{a}&\mathbf{L}_{a}\\\
\mathbf{L}_{a}^{\mathrm{T}}&\mathbf{0}\end{bmatrix}-\overline{\omega}_{a}^{2}\begin{bmatrix}\mathbf{B}&\mathbf{0}\\\
\mathbf{0}&\mathbf{0}\end{bmatrix}\right)\begin{bmatrix}\mathbf{c}\\\
\boldsymbol{\mu}\end{bmatrix}=\mathbf{0}\qquad\left(\begin{bmatrix}\mathbf{A}_{b}&\mathbf{L}_{b}\\\
\mathbf{L}_{b}^{\mathrm{T}}&\mathbf{0}\end{bmatrix}-\overline{\omega}_{b}^{4}\begin{bmatrix}\mathbf{B}&\mathbf{0}\\\
\mathbf{0}&\mathbf{0}\end{bmatrix}\right)\begin{bmatrix}\mathbf{c}\\\
\boldsymbol{\mu}\end{bmatrix}=\mathbf{0}$ (87a,b)
with $\mathbf{L}_{a}$ and $\mathbf{L}_{b}$ involving the trial functions
computed at beam ends according to kinematic BCs. For instance, for a
cantilever beam:
$\mathbf{L}_{a}=\begin{bmatrix}\boldsymbol{\phi}(0)\end{bmatrix}\qquad\mathbf{L}_{b}=\begin{bmatrix}\boldsymbol{\phi}(0)&\left.\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\right\rvert_{\xi=0}\end{bmatrix}$
(88a,b)
Acknowledgment \- Financial supports from MIUR in the framework of the Project
PRIN 2017 - code 2017J4EAYB Multiscale Innovative Materials and Structures
(MIMS) - University of Naples Federico II Research Unit is gratefully
acknowledged.
## References
* Aifantis (1999) Aifantis, E., 1999. Gradient deformation models at nano, micro, and macro scales. Journal of Engineering Materials and Technology, Transactions of the ASME 121, 189–202.
* Aifantis (2003) Aifantis, E.C., 2003. Update on a class of gradient theories. Mechanics of materials 35, 259–280.
* Aifantis (2009) Aifantis, E.C., 2009. Exploring the applicability of gradient elasticity to certain micro/nano reliability problems. Microsystem Technologies 15, 109–115.
* Aifantis (2011) Aifantis, E.C., 2011. On the gradient approach–relation to eringen’s nonlocal theory. International Journal of Engineering Science 49, 1367–1377.
* Akgöz and Civalek (2013) Akgöz, B., Civalek, Ö., 2013\. A size-dependent shear deformation beam model based on the strain gradient elasticity theory. International Journal of Engineering Science 70, 1–14.
* Alotta et al. (2017a) Alotta, G., Failla, G., Pinnola, F., 2017a. Stochastic analysis of a nonlocal fractional viscoelastic bar forced by gaussian white noise. ASCE-ASME Journal of Risk and Uncertainty in Engineering Systems, Part B: Mechanical Engineering 3.
* Alotta et al. (2014) Alotta, G., Failla, G., Zingales, M., 2014. Finite element method for a nonlocal timoshenko beam model. Finite Elements in Analysis and Design 89, 77–92.
* Alotta et al. (2017b) Alotta, G., Failla, G., Zingales, M., 2017b. Finite-element formulation of a nonlocal hereditary fractional-order timoshenko beam. Journal of Engineering Mechanics 143, D4015001.
* Aria and Friswell (2019) Aria, A., Friswell, M., 2019\. A nonlocal finite element model for buckling and vibration of functionally graded nanobeams. Composites Part B: Engineering 166, 233–246.
* Askes and Aifantis (2011) Askes, H., Aifantis, E.C., 2011\. Gradient elasticity in statics and dynamics: an overview of formulations, length scale identification procedures, finite element implementations and new results. International Journal of Solids and Structures 48, 1962–1990.
* Attia and Abdel Rahman (2018) Attia, M.A., Abdel Rahman, A.A., 2018\. On vibrations of functionally graded viscoelastic nanobeams with surface effects. International Journal of Engineering Science 127, 1 – 32.
* Banerjee (1997) Banerjee, J., 1997. Dynamic stiffness formulation for structural elements: a general approach. Computers & structures 63, 101–103.
* Banerjee (1998) Banerjee, J., 1998. Free vibration of axially loaded composite timoshenko beams using the dynamic stiffness matrix method. Computers & Structures 69, 197 – 208.
* Banerjee (2001) Banerjee, J., 2001. Frequency equation and mode shape formulae for composite timoshenko beams. Composite Structures 51, 381 – 388.
* Banerjee and Williams (1985) Banerjee, J., Williams, F., 1985\. Exact bernoulli–euler dynamic stiffness matrix for a range of tapered beams. International Journal for Numerical Methods in Engineering 21, 2289–2302.
* Banerjee and Williams (1992) Banerjee, J., Williams, F., 1992\. Coupled bending-torsional dynamic stiffness matrix for timoshenko beam elements. Computers & Structures 42, 301–310.
* Banerjee and Williams (1996) Banerjee, J., Williams, F., 1996\. Exact dynamic stiffness matrix for composite timoshenko beams with applications. Journal of Sound and Vibration 194, 573 – 585.
* Banerjee (2003) Banerjee, J.R., 2003. Dynamic Stiffness Formulation and Its Application for a Combined Beam and a Two Degree-of-Freedom System . Journal of Vibration and Acoustics 125, 351–358.
* Barretta et al. (2017) Barretta, R., Brčić, M., Čanađija, M., Luciano, R., Marotti de Sciarra, F., 2017. Application of gradient elasticity to armchair carbon nanotubes: Size effects and constitutive parameters assessment. European Journal of Mechanics - A/Solids 65, 1 – 13.
* Barretta et al. (2019a) Barretta, R., Faghidian, S.A., Luciano, R., 2019a. Longitudinal vibrations of nano-rods by stress-driven integral elasticity. Mechanics of Advanced Materials and Structures 26, 1307–1315.
* Barretta et al. (2018) Barretta, R., Faghidian, S.A., Luciano, R., Medaglia, C., Penna, R., 2018. Stress-driven two-phase integral elasticity for torsion of nano-beams. Composites Part B: Engineering 145, 62–69.
* Barretta et al. (2019b) Barretta, R., Faghidian, S.A., Marotti de Sciarra, F., 2019b. Stress-driven nonlocal integral elasticity for axisymmetric nano-plates. International Journal of Engineering Science 136, 38 – 52.
* Bi et al. (2020) Bi, L., Yin, J., Huang, X., Wang, Y., Yang, Z., 2020\. Graphene pillared with hybrid fullerene and nanotube as a novel 3d framework for hydrogen storage: A dft and gcmc study. International Journal of Hydrogen Energy 45, 17637 – 17648.
* Canales and Mantari (2016) Canales, F., Mantari, J., 2016\. Buckling and free vibration of laminated beams with arbitrary boundary conditions using a refined hsdt. Composites Part B: Engineering 100, 136 – 145.
* Challamel (2018) Challamel, N., 2018. Static and dynamic behaviour of nonlocal elastic bar using integral strain-based and peridynamic models. Comptes Rendus Mécanique 346, 320–335.
* Challamel et al. (2016) Challamel, N., Wang, C., Elishakoff, I., 2016. Nonlocal or gradient elasticity macroscopic models: a question of concentrated or distributed microstructure. Mechanics Research Communications 71, 25–31.
* Challamel and Wang (2008) Challamel, N., Wang, C.M., 2008\. The small length scale effect for a non-local cantilever beam: a paradox solved. Nanotechnology 19, 345703\.
* Chao et al. (2020) Chao, M., Wang, Y., Ma, D., Wu, X., Zhang, W., Zhang, L., Wan, P., 2020. Wearable mxene nanocomposites-based strain sensor with tile-like stacked hierarchical microstructure for broad-range ultrasensitive sensing. Nano Energy 78, 105187\.
* Courant and Hilbert (1953) Courant, R., Hilbert, D., 1953\. Methods of Mathematical Physics. Interscience Publishers.
* Darban et al. (2020) Darban, H., Luciano, R., Caporale, A., Fabbrocino, F., 2020\. Higher modes of buckling in shear deformable nanobeams. International Journal of Engineering Science 154, 103338.
* Dastjerdi and Akgöz (2019) Dastjerdi, S., Akgöz, B., 2019\. On the statics of fullerene structures. International Journal of Engineering Science 142, 125 – 144.
* Demir and Civalek (2017) Demir, Ç., Civalek, Ö., 2017\. On the analysis of microbeams. International Journal of Engineering Science 121, 14–33.
* Di Paola et al. (2009) Di Paola, M., Failla, G., Zingales, M., 2009. Physically-based approach to the mechanics of strong non-local linear elasticity theory. Journal of Elasticity 97, 103–130.
* Di Paola et al. (2010) Di Paola, M., Failla, G., Zingales, M., 2010. The mechanically-based approach to 3d non-local linear elasticity theory: Long-range central interactions. International Journal of Solids and Structures 47, 2347 – 2358.
* Di Paola et al. (2013) Di Paola, M., Failla, G., Zingales, M., 2013. Non-local stiffness and damping models for shear-deformable beams. European Journal of Mechanics-A/Solids 40, 69–83.
* Eringen (1983) Eringen, A., 1983. On differential equations of nonlocal elasticity and solutions of screw dislocation and surface waves. Journal of Applied Physics 54, 4703–4710.
* Eringen (1972) Eringen, A.C., 1972. Linear theory of nonlocal elasticity and dispersion of plane waves. International Journal of Engineering Science 10, 425–435.
* Failla (2016) Failla, G., 2016. An exact generalised function approach to frequency response analysis of beams and plane frames with the inclusion of viscoelastic damping. Journal of Sound and Vibration 360, 171 – 202.
* Farajpour et al. (2018) Farajpour, A., Ghayesh, M.H., Farokhi, H., 2018. A review on the mechanics of nanostructures. International Journal of Engineering Science 133, 231 – 263.
* Farajpour et al. (2020) Farajpour, A., Howard, C.Q., Robertson, W.S., 2020. On size-dependent mechanics of nanoplates. International Journal of Engineering Science 156, 103368.
* Fasano et al. (2015) Fasano, M., Bozorg Bigdeli, M., Vaziri Sereshk, M.R., Chiavazzo, E., Asinari, P., 2015. Thermal transmittance of carbon nanotube networks: Guidelines for novel thermal storage systems and polymeric material of thermal interest. Renewable and Sustainable Energy Reviews 41, 1028 – 1036.
* Fernández-Sáez et al. (2016) Fernández-Sáez, J., Zaera, R., Loya, J., Reddy, J., 2016\. Bending of euler–bernoulli beams using eringen’s integral formulation: a paradox resolved. International Journal of Engineering Science 99, 107–116.
* Fuschi et al. (2019) Fuschi, P., Pisano, A., Polizzotto, C., 2019. Size effects of small-scale beams in bending addressed with a strain-difference based nonlocal elasticity theory. International Journal of Mechanical Sciences 151, 661–671.
* Genoese et al. (2017) Genoese, A., Genoese, A., Rizzi, N.L., Salerno, G., 2017\. On the derivation of the elastic properties of lattice nanostructures: The case of graphene sheets. Composites Part B: Engineering 115, 316 – 329.
* Ghayesh and Farajpour (2019) Ghayesh, M.H., Farajpour, A., 2019\. A review on the mechanics of functionally graded nanoscale and microscale structures. International Journal of Engineering Science 137, 8 – 36.
* Ghayesh et al. (2019) Ghayesh, M.H., Farajpour, A., Farokhi, H., 2019. Viscoelastically coupled mechanics of fluid-conveying microtubes. International Journal of Engineering Science 145, 103139.
* Gholipour and Ghayesh (2020) Gholipour, A., Ghayesh, M.H., 2020\. Nonlinear coupled mechanics of functionally graded nanobeams. International Journal of Engineering Science 150, 103221.
* Hozhabrossadati et al. (2020) Hozhabrossadati, S.M., Challamel, N., Rezaiee-Pajand, M., Sani, A.A., 2020\. Free vibration of a nanogrid based on eringen’s stress gradient model. Mechanics Based Design of Structures and Machines , 1–19.
* Juarez et al. (2018) Juarez, T., Schroer, A., Schwaiger, R., Hodge, A.M., 2018\. Evaluating sputter deposited metal coatings on 3d printed polymer micro-truss structures. Materials & Design 140, 442 – 450.
* Karami and Janghorban (2020) Karami, B., Janghorban, M., 2020\. On the mechanics of functionally graded nanoshells. International Journal of Engineering Science 153, 103309.
* Khaniki (2019) Khaniki, H.B., 2019. On vibrations of fg nanobeams. International Journal of Engineering Science 135, 23 – 36.
* Lakes (1991) Lakes, R., 1991. Experimental Micro Mechanics Methods for Conventional and Negative Poisson’s Ratio Cellular Solids as Cosserat Continua. Journal of Engineering Materials and Technology 113, 148–155. doi:10.1115/1.2903371.
* Lam et al. (2003) Lam, D., Yang, F., Chong, A., Wang, J., Tong, P., 2003\. Experiments and theory in strain gradient elasticity. Journal of the Mechanics and Physics of Solids 51, 1477 – 1508.
* Lee et al. (2016) Lee, D., Lee, B.H., Yoon, J., Ahn, D.C., Park, J.Y., Hur, J., Kim, M.S., Jeon, S.B., Kang, M.H., Kim, K., Lim, M., Choi, S.J., Choi, Y.K., 2016. Three-dimensional fin-structured semiconducting carbon nanotube network transistor. ACS Nano 10, 10894 – 10900.
* Li et al. (2020) Li, L., Lin, R., Ng, T.Y., 2020. Contribution of nonlocality to surface elasticity. International Journal of Engineering Science 152, 103311.
* Li et al. (2018) Li, L., Tang, H., Hu, Y., 2018\. The effect of thickness on the mechanics of nanobeams. International Journal of Engineering Science 123, 81 – 91.
* Malikan et al. (2020) Malikan, M., Krasheninnikov, M., Eremeyev, V.A., 2020. Torsional stability capacity of a nano-composite shell based on a nonlocal strain gradient shell model under a three-dimensional magnetic field. International Journal of Engineering Science 148, 103210.
* Mason and Handscomb (2002) Mason, J., Handscomb, D., 2002\. Chebyshev Polynomials. CRC Press.
* Meirovitch (1997) Meirovitch, L., 1997. Principles and Techniques of Vibrations. Prentice Hall.
* Meza et al. (2014) Meza, L.R., Das, S., Greer, J.R., 2014. Strong, lightweight, and recoverable three-dimensional ceramic nanolattices. Science 345, 1322–1326.
* Náprstek and Fischer (2015) Náprstek, J., Fischer, C., 2015\. Static and dynamic analysis of beam assemblies using a differential system on an oriented graph. Computers & Structures 155, 28–41.
* Numanoğlu et al. (2018) Numanoğlu, H.M., Akgöz, B., Civalek, Ö., 2018. On dynamic analysis of nanorods. International Journal of Engineering Science 130, 33–50.
* Numanoğlu and Civalek (2019) Numanoğlu, H.M., Civalek, Ö., 2019\. On the dynamics of small-sized structures. International Journal of Engineering Science 145, 103164.
* Oskouie et al. (2018a) Oskouie, M.F., Ansari, R., Rouhi, H., 2018a. Bending of euler-bernoulli nanobeams based on the strain- and stress-driven nonlocal integral models: a numerical approach. Acta Mechanica Sinica 34, 871 – 882.
* Oskouie et al. (2018b) Oskouie, M.F., Ansari, R., Rouhi, H., 2018b. A numerical study on the buckling and vibration of nanobeams based on the strain- and stress-driven nonlocal integral models. International Journal of Computational Materials Science and Engineering 7, 1850016.
* Oskouie et al. (2018c) Oskouie, M.F., Ansari, R., Rouhi, H., 2018c. Stress-driven nonlocal and strain gradient formulations of timoshenko nanobeams. European Physical Journal Plus 133, 336.
* Ozturk et al. (2015) Ozturk, Z., Baykasoglu, C., Celebi, A.T., Kirca, M., Mugan, A., To, A.C., 2015\. Hydrogen storage in heat welded random cnt network structures. International Journal of Hydrogen Energy 40, 403 – 411.
* Peddieson et al. (2003) Peddieson, J., Buchanan, G.R., McNitt, R.P., 2003. Application of nonlocal continuum models to nanotechnology. International journal of engineering science 41, 305–312.
* Pinnola et al. (2020a) Pinnola, F., Faghidian, S.A., Barretta, R., Marotti de Sciarra, F., 2020a. Variationally consistent dynamics of nonlocal gradient elastic beams. International Journal of Engineering Science 149, 103220.
* Pinnola et al. (2020b) Pinnola, F.P., Vaccaro, M.S., Barretta, R., Marotti de Sciarra, F., 2020b. Random vibrations of stress-driven nonlocal beams with external damping. Meccanica doi:https://doi.org/10.1007/s11012-020-01181-7.
* Polizzotto (2014) Polizzotto, C., 2014. Stress gradient versus strain gradient constitutive models within elasticity. International Journal of Solids and Structures 51, 1809–1818.
* Polizzotto (2015) Polizzotto, C., 2015. A unifying variational framework for stress gradient and strain gradient elasticity theories. European Journal of Mechanics-A/Solids 49, 430–440.
* (73) Roghani, M., Rouhi, H., . Nonlinear stress-driven nonlocal formulation of timoshenko beams made of fgms. Continuum Mechanics and Thermodynamics doi:https://doi.org/10.1007/s00161-020-00906-z.
* Romano and Barretta (2017a) Romano, G., Barretta, R., 2017a. Nonlocal elasticity in nanobeams: the stress-driven integral model. International Journal of Engineering Science 115, 14–27.
* Romano and Barretta (2017b) Romano, G., Barretta, R., 2017b. Stress-driven versus strain-driven nonlocal integral model for elastic nano-beams. Composites Part B: Engineering 114, 184 – 188.
* Romano et al. (2016) Romano, G., Barretta, R., Diaco, M., 2016. Micromorphic continua: non-redundant formulations. Continuum Mechanics and Thermodynamics 28, 1659 – 1670.
* Romano et al. (2017) Romano, G., Barretta, R., Diaco, M., Marotti de Sciarra, F., 2017\. Constitutive boundary conditions and paradoxes in nonlocal elastic nanobeams. International Journal of Mechanical Sciences 121, 151 – 156.
* Romano and Diaco (2020) Romano, G., Diaco, M., 2020\. On formulation of nonlocal elasticity problems. Meccanica doi:https://doi.org/10.1007/s11012-020-01183-5.
* Marotti de Sciarra (2014) Marotti de Sciarra, F., 2014. Finite element modelling of nonlocal beams. Physica E: Low-Dimensional Systems and Nanostructures 59, 144–149.
* She et al. (2019) She, G.L., Yuan, F.G., Karami, B., Ren, Y.R., Xiao, W.S., 2019. On nonlinear bending behavior of fg porous curved nanotubes. International Journal of Engineering Science 135, 58 – 74.
* Silling (2000) Silling, S., 2000. Reformulation of elasticity theory for discontinuities and long-range forces. Journal of the Mechanics and Physics of Solids 48, 175 – 209.
* Silling et al. (2007) Silling, S.A., Epton, M., Weckner, O., Xu, J., Askari, E., 2007. Peridynamic states and constitutive modelings. Journal of Elasticity 88, 151–184.
* Srividhya et al. (2018) Srividhya, S., Raghu, P., Rajagopal, A., Reddy, J., 2018\. Nonlocal nonlinear analysis of functionally graded plates using third-order shear deformation theory. International Journal of Engineering Science 125, 1 – 22.
* Su and Banerjee (2015) Su, H., Banerjee, J., 2015. Development of dynamic stiffness method for free vibration of functionally graded timoshenko beams. Computers & Structures 147, 107 – 116.
* Wang and Qiao (2007) Wang, J., Qiao, P., 2007. Vibration of beams with arbitrary discontinuities and boundary conditions. Journal of Sound and Vibration 308, 12–27.
* Williams and Anderson (1986) Williams, F., Anderson, M., 1986\. Inclusion of elastically connected members in exact buckling and frequency calculations. Computers & structures 22, 395–397.
* Williams and Wittrick (1970) Williams, F., Wittrick, W., 1970\. An automatic computational procedure for calculating natural frequencies of skeletal structures. International Journal of Mechanical Sciences 12, 781–791.
* Wittrick and Williams (1971) Wittrick, W., Williams, F., 1971\. A general algorithm for computing natural frequencies of elastic structures. The Quarterly Journal of Mechanics and Applied Mathematics 24, 263–284.
* Wittrick and Williams (1973) Wittrick, W., Williams, F., 1973\. An algorithm for computing critical buckling loads of elastic structures. Journal of Structural Mechanics 1, 497–518.
* Wolfram Research, Inc. (2017) Wolfram Research, Inc., 2017. Mathematica, Version 11.2. Champaign, IL.
* Zhang et al. (2018) Zhang, C., Akbarzadeh, A., Kang, W., Wang, J., Mirabolghasemi, A., 2018. Nano-architected metamaterials: Carbon nanotube-based nanotrusses. Carbon 131, 38 – 46.
* Zhang et al. (2020a) Zhang, P., Qing, H., Gao, C.F., 2020a. Exact solutions for bending of timoshenko curved nanobeams made of functionally graded materials based on stress-driven nonlocal integral model. Composite Structures 245, 112362\.
* Zhang and Liu (2020) Zhang, Q., Liu, H., 2020. On the dynamic response of porous functionally graded microbeam under moving load. International Journal of Engineering Science 153, 103317.
* Zhang et al. (2020b) Zhang, X., Wang, Y., Ding, B., Li, X., 2020b. Design, fabrication, and mechanics of 3d micro-/nanolattices. Small 16, 1902842\.
| arxiv-papers | 2021-07-27T10:59:25 | 2024-09-04T03:07:21.261836 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Andrea Francesco Russillo, Giuseppe Failla, Gioacchino Alotta,\n Francesco Marotti de Sciarra, Raffaele Barretta",
"submitter": "Raffaele Barretta",
"url": "https://arxiv.org/abs/2107.12728"
} |
2107.12731 |
Limit behaviour of Eringen’s two-phase elastic beams
Preprint of the article published in
European Journal of Mechanics - A/Solids
89, August–October 2021, 104315
Marzia Sara Vaccaro,
Francesco Paolo Pinnola,
Francesco Marotti de Sciarra,
Raffaele Barretta
https://doi.org/10.1016/j.euromechsol.2021.104315
ⓒ 2021. This manuscript version is made available under the CC-BY-NC-ND 4.0
license http://creativecommons.org/licenses/by-nc-nd/4.0/
###### Abstract
In this paper, the bending behaviour of small-scale Bernoulli-Euler beams is
investigated by Eringen’s two-phase local/nonlocal theory of elasticity.
Bending moments are expressed in terms of elastic curvatures by a convex
combination of local and nonlocal contributions, that is a combination with
non-negative scalar coefficients summing to unity. The nonlocal contribution
is the convolution integral of the elastic curvature field with a suitable
averaging kernel characterized by a scale parameter. The relevant structural
problem, well-posed for non-vanishing local phases, is preliminarily
formulated and exact elastic solutions of some simple beam problems are
recalled. Limit behaviours of the obtained elastic solutions, analytically
evaluated, studied and diagrammed, do not fulfill equilibrium requirements and
kinematic boundary conditions. Accordingly, unlike alleged claims in
literature, such asymptotic fields cannot be assumed as solutions of the
purely nonlocal theory of beam elasticity. This conclusion agrees with the
known result which the elastic equilibrium problem of beams of engineering
interest formulated by Eringen’s purely nonlocal theory admits no solution.
###### keywords:
Purely nonlocal elasticity , Local/nonlocal mixture , Nanobeams , Well-
posedness , Constitutive boundary conditions
## 1 Introduction
Over the past decades, growing interest in nanotechnological applications has
required a deep knowledge of mechanical behavior of micro- and nano-structures
conceived as basic components of smaller and smaller electro-mechanical
devices. Among the wide variety of micro/nano-electro-mechanical systems there
are biosensors (Soukarié et al., 2020), actuators (Lu et al., 2019),
resonators (Chorsi and Chorsi, 2018), DNA switches (Chao et al., 2020), porous
structures (Jankowski et al., 2020; Malikan et al., 2020b), valves/pumps
(Banejad et al., 2020), advanced and composite structures (Sedighi et al.,
2017; Żur et. al, 2020), energy harvesters (Ghayesh and Farokhi, 2020).
Micro/nano-structures exhibit technically significant size effects which
therefore have to be taken into account to accurately model and design new-
generation small-scale devices (Ghayesh and Farajpour, 2019). To this end,
nonlocal continuum mechanics (Polizzotto, 2001, 2002; Bažant and Jirásek,
2002; Borino et al., 2003) has been conveniently exploited by the scientific
community to simulate complex scale phenomena in place of atomistic approaches
which are computationally expensive.
One of the first theories of nonlocal elasticity is the strain-driven model
introduced by Eringen (1983) in the wake of seminal contributions by Rogula
(1965); Kröner et al. (1967); Rogula (1982). According to the strain-driven
model, the nonlocal stress field is the convolution integral between elastic
strain and an averaging kernel depending on a characteristic length.
Originally exploited by Eringen to deal with screw dislocations and surface
waves, when applied to structural problems involving bounded domains,
Eringen’s strain-driven model leads to ill-posed structural problems due to
incompatibility between nonlocal and equilibrium requirements (Romano et al.,
2017a).
An effective strategy to get well-posed problems consists in formulating a new
nonlocal model in which the roles of stresses and strains are swapped (Romano
et al., 2017b). The stress-driven nonlocal approach has been successfully
applied to a wide range of problems of nanotechnological interest (see e.g.
Barretta et al., 2018b; Roghani, 2020; Zhang, 2020; Barretta et al., 2018c;
Pinnola, 2020; Oskouie et al., 2018; Barretta et al., 2019).
Another possible strategy to overcome ill-posedness of strain-driven model
consists in formulating a two-phase local/nonlocal model, first introduced in
(Eringen, 1972, 1987) and recently applied in (Pisano and Fuschi, 2003;
Khodabakhshi and Reddy, 2015; Wang et al., 2016; Eptaimeros et al., 2016;
Barretta et al., 2018a). In particular, the mixture strain-driven model is
based on a convex combination of local and nonlocal phases by means of a
mixture parameter, where the nonlocal phase is the Eringen’s integral
convolution. Based on two parameters, the two-phase theory is able to model a
lot of structural problems. However, ill-posedness is eliminated only for
positive mixture parameters (Romano et al., 2017b).
Indeed, for vanishing local phases, Eringen’s purely nonlocal strain-driven
law is recovered, and hence inconsistencies are expected to occur for
structural nonlocal solutions of the limiting elastic equilibrium problem.
In this regard, inaccurate conclusions on the matter are still present in
current literature (see e.g. Mikhasev and Nobili, 2020; Mikhasev, 2021) by
improperly defining limiting cases of free vibration problems as solutions of
elastodynamic problems based on purely nonlocal strain-driven continuum model
which admits no solution (Romano et al., 2017a; Fernández-Sáez and Zaera,
2017; Fathi and Ghassemi, 2017; Vila et al., 2017; Zhang, 2017; Zhu and Li,
2017; Karami et al., 2018; Barretta et al., 2018b; Pisano et al., 2021).
Inconsistencies of limiting solutions of structural problems based on
Eringen’s two-phase theory will be definitely provided in the present
research. The plan is the following. The two-phase integral model for slender
beams is recalled in Sec.2 and the equivalent differential problem is also
provided. The purely nonlocal strain-driven law is then derived and discussed
in Sec.3. Exact structural solutions based on two-phase theory are given in
Sec.4 for simple applicative cases. Analytical limiting solutions, presented
in Sec.5, are shown to be in contrast with equilibrium and kinematic boundary
conditions. Consequently, such fields cannot be assumed as solutions of
structural problems formulated according to Eringen’s purely nonlocal strain-
driven model which is thus confirmed as inapplicable to nanocontinua of
technical interest.
## 2 Two-phase local/nonlocal theory for elastic beams
Let us consider a slender straight beam under flexure of length $\,L\,$. Beam
and bending axes are denoted by $\,x\,$ and $\,y\,$ respectively. According to
Bernoulli-Euler theory, the total curvature field $\,\chi:[0,L]\mapsto\Re\,$
associated with the transverse displacement field $\,v:[0,L]\mapsto\Re\,$ is
expressed by111 The symbol $\,\partial_{x}^{n}\,$ denotes $\,n$-times
differentiation along the beam axis $\,x\,$.
$\chi=\partial_{x}^{2}v=\chi^{el}+\chi^{nel}$ (1)
with $\,\chi^{el}\,$ elastic curvature and $\,\chi^{nel}\,$ all other non-
elastic curvature fields. Stress fields are described by bending moments
$\,M:[0,L]\mapsto\Re\,$ which have to fulfill the differential equation of
equilibrium
$\partial_{x}^{2}M=q$ (2)
with $\,q:[0,L]\mapsto\Re\,$ transversely distributed loading.
According to the two-phase elasticity model (Eringen, 1972), the bending
moment $\,M\,$ is convex combination of the source field $\,s:=K\chi^{el}\,$
and of the convolution between the source $\,s\,$ and a suitable averaging
kernel $\,\phi_{c}\,$
$M(x)=\alpha\>s(x)+(1-\alpha)\>\int_{0}^{L}{\phi_{c}(x,\xi)\>s(\xi)\>d\xi}$
(3)
where $\,K\,$ is the local elastic bending stiffness, i.e. second moment of
the field of Euler-Young elastic moduli $\,E\,$ on beam cross section.
The relation in Eq.(3) is a Fredholm integral equation of the second kind
(Tricomi, 1957; Polyanin and Manzhirov, 2008) in the unknown source field
$\,s\,$, with $\,0\leq\alpha\leq 1\,$ mixture parameter and $c>0$ nonlocal
scale parameter. The purely nonlocal law
$\displaystyle\,M(x)=\int_{0}^{L}{\phi_{c}(x,\xi)\>K\chi^{el}(\xi)\>d\xi}\,$
is got by setting $\,\alpha=0\,$, while for $\,\alpha=1\,$ the purely local
relation $\,M=K\chi^{el}\,$ is recovered.
The averaging kernel is assumed to be the bi-exponential function
$\phi_{c}(x)=\frac{1}{2c}\exp\biggl{(}-\frac{|x|}{c}\biggr{)}\,$ (4)
fulfilling symmetry, positivity and limit impulsivity (Eringen, 1983).
An equivalent differential formulation (Romano et al., 2017a) of the two-phase
model Eq.(3) can be got by observing that the special kernel in Eq.(4) is the
Green’s function of the linear differential operator $\,\mathcal{L}_{x}\,$
defined by
$\mathcal{L}_{x}:=1-c^{2}\,\partial_{x}^{2}$ (5)
Now, rewriting Eq.(3) as follows
$\big{(}M-\alpha\>K\chi^{el}\big{)}(x)=(1-\alpha)\>\int_{0}^{L}{\phi_{c}(x,\xi)\>K\chi^{el}(\xi)\>d\xi}$
(6)
and applying the differential operator $\,\mathcal{L}_{x}\,$ to Eq.(6), we get
$\mathcal{L}_{x}\big{(}M-\alpha\>K\chi^{el}\big{)}(x)=(1-\alpha)\>K\chi^{el}(x)$
(7)
which is the differential equation equivalent to the two-phase model in
Eq.(3).
Indeed, denoting by $\,\boldsymbol{\delta}\,$ the Dirac unit impulse, since
$\,\mathcal{L}_{x}\phi_{c}(x,\xi)\,=\boldsymbol{\delta}(x,\xi)\,$, we may
write
$\mathcal{L}_{x}\big{(}M-\alpha\>K\chi^{el}\big{)}(x)=(1-\alpha)\int_{0}^{L}{\mathcal{L}_{x}\phi_{c}(x,\xi)\>K\chi^{el}(\xi)\>d\xi}=(1-\alpha)K\chi^{el}(x)$
(8)
As proven in (Romano et al., 2017a), the special kernel in Eq.(4) satisfies
the following homogeneous boundary conditions
$\left\\{\begin{aligned} &\mathcal{B}_{0}\phi_{c}\,|_{0}=0\\\
&\mathcal{B}_{L}\phi_{c}\,|_{L}=0\end{aligned}\right.$ (9)
where $\,\mathcal{B}_{0}:=1-c\,\partial_{x}\,$ and
$\,\mathcal{B}_{L}:=1+c\,\partial_{x}\,$ are differential operators defined at
the boundary. By applying $\,\mathcal{B}_{0}\,$ and $\,\mathcal{B}_{L}\,$ to
Eq.(6) we get
$\left\\{\begin{aligned}
&\mathcal{B}_{0}\big{(}M-\alpha\>K\chi^{el}\big{)}\,|_{0}=0\\\
&\mathcal{B}_{L}\big{(}M-\alpha\>K\chi^{el}\big{)}\,|_{L}=0\end{aligned}\right.$
(10)
which are the constitutive boundary conditions associated with Eq.(7).
Finally, the equivalent differential problem in Eqs.(7)-(10) can be explicitly
formulated as follows
$\frac{M(x)}{c^{2}}-\,\partial_{x}^{2}M(x)=\frac{(K\chi^{el})(x)}{c^{2}}-\alpha\>\partial_{x}^{2}(K\chi^{el})(x)$
(11) $\left\\{\begin{aligned}
&\partial_{x}M(0)-\frac{1}{c}\,M(0)=\alpha\>\bigg{(}\partial_{x}(K\chi^{el})(0)-\frac{(K\chi^{el})(0)}{c}\bigg{)}\,\\\
&\partial_{x}M(L)+\frac{1}{c}\,M(L)=\alpha\>\bigg{(}\partial_{x}(K\chi^{el})(L)+\frac{(K\chi^{el})(L)}{c}\bigg{)}\end{aligned}\right.$
(12)
## 3 Limiting case: purely nonlocal elasticity
For vanishing mixture parameter $\,\alpha=0\,$, the purely nonlocal elasticity
model is recovered, that is
$M(x)=\int_{0}^{L}{\phi_{c}(x,\xi)\>(K\chi^{el})(\xi)\>d\xi}$ (13)
which is the Eringen’s purely nonlocal strain-driven law.
Remark. For any value of $\,c>0\,$, the integral convolution Eq.(13) admits a
unique solution (or no solution) if and only if the following constitutive
boundary conditions are satisfied by the bending field (Romano et al., 2017a)
$\left\\{\begin{aligned} &\partial_{x}M(0)-\frac{1}{c}\,M(0)=0\\\
&\partial_{x}M(L)+\frac{1}{c}\,M(L)=0\end{aligned}\right.$ (14)
Fulfillment of Eq.(14) ensures that differential equation (Eq.(15)) provides
the unique solution of the nonlocal problem (Romano et al., 2017a)
$\frac{M(x)}{c^{2}}-\,\partial_{x}^{2}M(x)=\frac{(K\chi^{el})(x)}{c^{2}}$ (15)
As proven in (Romano et al., 2017a), constitutive boundary conditions Eqs.(14)
are incompatible with equilibrium requirements, since they relate bending and
shearing fields through the characteristic nonlocal length $\,c\,$. The two-
phase model eliminates ill-posedness for $\,\alpha>0\,$. Indeed, left-hand
sides of Eq.(12) are known expressions (generally polynomial), unless of
$\,n\,$ integration constants, with $\,n\,$ redundancy degree. Hence, the laws
in Eq.(12) are non-homogeneous boundary conditions imposed on the elastic
curvature and its first derivative and no incompatibility arises with
kinematic boundary constraints since they act on displacement fields and its
first derivatives. However, as $\,\alpha\to 0\,$ the two-phase strain-driven
law will tend to an ill-posed theory and then inconsistencies of limiting
solutions are expected to occur. Predicted singularities for $\,\alpha\to 0\,$
will be investigated in detail in the sequel.
## 4 Case-studies and exact structural solutions
This section provides exact closed-form solutions of the elastic equilibrium
problem of inflected beams using Eringen’s two-phase model Eqs.(11)-(12).
The solution procedure is summarized as follows.
* 1.
Step 1. Solution of the differential equilibrium condition in Eq.(2) equipped
with standard natural boundary conditions to get the bending moment as
functions of $n$ integration constants, with $n$ standing for redundancy
degree. For statically determinate beams, the equilibrated bending field is
univocally determined by equilibrium requirements.
* 2.
Step 2. Inserting the obtained bending field $\,M\,$ in the equivalent
differential problem governed by Eqs.(11)-(12) to get the nonlocal elastic
curvature field $\,\chi^{el}\,$.
* 3.
Step 3. Detection of nonlocal displacement field $v$ by solving Eq.(1) with
prescription of $\,3+n\,$ standard essential boundary conditions.
The solution procedure above is applied to solve the nonlocal elastostatic
problems below. The non-elastic curvature $\,\chi^{nel}\,$ is assumed to
vanish, so that, by virtue Eq.(1), total and elastic curvatures are coincident
$\,\chi=\chi^{el}\,$.
Cantilever under concentrated couple at free end.
Let us consider a cantilever of length $\,L\,$ and uniform bending stiffness
$\,K\,$ under a concentrated couple $\,\mathcal{M}\,$ applied at free end.
The bending moment field $\,M\,$ is obtained by the differential equilibrium
equation $\,\partial_{x}^{2}M=0\,$ equipped with standard natural boundary
conditions $\,M(L)=\mathcal{M}\,$ and $\,\partial_{x}M(L)=0\,$, so that
Eq.(11) becomes
$\frac{\mathcal{M}}{c^{2}}=\frac{K\chi^{el}(x)}{c^{2}}-\alpha\>K\partial_{x}^{2}\chi^{el}(x)$
(16)
supplemented with the constitutive boundary conditions
$\left\\{\begin{aligned}
&-\mathcal{M}\,=\alpha\>K\bigg{(}c\,\partial_{x}\chi^{el}(0)-\chi^{el}(0)\bigg{)}\,\\\
&\mathcal{M}\,=\alpha\>K\bigg{(}c\,\partial_{x}\chi^{el}(L)+\chi^{el}(L)\bigg{)}\end{aligned}\right.$
(17)
Solving the differential problem in Eqs.(16)-(17) provides the elastic
curvature $\,\chi^{el}\,$. Also, Eq.(1) with prescription of standard
essential boundary conditions $\,v(0)=0\,$ and $\,\partial_{x}v(0)=0\,$, gives
the nonlocal displacement field
$\begin{split}v(x)=&\,\frac{\mathcal{M}x^{2}}{2K}-\frac{\mathcal{M}}{\psi_{1}K}\,c\,(\alpha-1)\,e^{-\frac{x}{c\sqrt{\alpha}}}\big{(}(x-c\sqrt{\alpha})\,e^{\frac{L+x}{c\sqrt{\alpha}}}+\,c\,\sqrt{\alpha}\,e^{\frac{L}{c\sqrt{\alpha}}}\\\
&-e^{\frac{x}{c\sqrt{\alpha}}}(c\,\sqrt{\alpha}+x)+c\,\sqrt{\alpha}e^{\frac{2x}{c\sqrt{\alpha}}}\big{)}\end{split}$
(18)
with
$\begin{split}\psi_{1}=(\sqrt{\alpha}+1)\,e^{\frac{L}{c\sqrt{\alpha}}}+\sqrt{\alpha}-1\end{split}$
(19)
Cantilever under concentrated force at free end.
Let us consider a cantilever of length $\,L\,$ and uniform bending stiffness
$\,K\,$ under a concentrated force $\,F\,$ applied at free end.
The equilibrated bending moment field $\,M\,$ is defined by
$\,\partial_{x}^{2}M=0\,$ with prescription of standard natural boundary
conditions $\,M(L)=0\,$ and $\,\partial_{x}M(L)=-F\,$, so that Eq.(11) becomes
$\frac{F(L-x)}{c^{2}}=\frac{K\chi^{el}(x)}{c^{2}}-\alpha\>K\partial_{x}^{2}\chi^{el}(x)$
(20)
equipped with the constitutive boundary conditions
$\left\\{\begin{aligned} &-Fc-
FL\,=\alpha\>K\bigg{(}c\,\partial_{x}\chi^{el}(0)-\chi^{el}(0)\bigg{)}\,\\\
&-Fc\,=\alpha\>K\bigg{(}c\,\partial_{x}\chi^{el}(L)+\chi^{el}(L)\bigg{)}\end{aligned}\right.$
(21)
The unknown elastic curvature $\,\chi^{el}\,$ is obtained by solving the
differential problem in Eqs.(20)-(21). Then, Eq.(1) with prescription of
standard essential boundary conditions provides the following nonlocal
displacement field
$\begin{split}v(x)=\,&\frac{Fx^{2}\,(3L-x)}{6K}+\frac{(\alpha-1)\,c\,F}{\psi
K}\,e^{-\frac{x}{\sqrt{\alpha}c}}\,(\sqrt{\alpha}\,\psi_{1}\,c^{2}\,(e^{\frac{x}{\sqrt{\alpha}c}}-1)\,(e^{\frac{L}{\sqrt{\alpha}c}}+e^{\frac{x}{\sqrt{\alpha}c}})\\\
&-\psi_{2}\,L\,x\,e^{\frac{x}{\sqrt{\alpha}c}}+\,\psi_{3}\,c)\end{split}$ (22)
with
$\begin{split}&\psi=(\sqrt{\alpha}+1)^{2}\,e^{\frac{2L}{\sqrt{\alpha}c}}-(\sqrt{\alpha}-1)^{2}\\\
&\psi_{2}=\sqrt{\alpha}+(\sqrt{\alpha}+1)\,e^{\frac{2L}{\sqrt{\alpha}c}}-1\\\
&\psi_{3}=-(\sqrt{\alpha}+1)\,\sqrt{\alpha}\,L\,e^{\frac{2L}{\sqrt{\alpha}c}}+(\alpha-\sqrt{\alpha})\,L\,e^{\frac{2x}{\sqrt{\alpha}c}}-2\sqrt{\alpha}\,x\,e^{\frac{L+x}{\sqrt{\alpha}c}}+\\\
&(\sqrt{\alpha}+1)(\sqrt{\alpha}L-x)\,e^{\frac{2L+x}{\sqrt{\alpha}c}}-(\sqrt{\alpha}-1)\,e^{\frac{x}{\sqrt{\alpha}c}}(\sqrt{\alpha}L+x)\end{split}$
(23)
Simply supported beam under uniformly distributed loading.
Let us consider a simply supported beam of length $\,L\,$ and uniform bending
stiffness $\,K\,$ under uniformly distributed loading $\,q\,$.
Bending moment field $\,M\,$ is determined by differential equilibrium
equation $\,\partial_{x}^{2}M=q\,$ equipped with natural boundary conditions
$\,M(0)=0\,$ and $\,M(L)=0\,$, so that Eq.(11) becomes
$\frac{qx(x-L)}{2c^{2}}-\,q=\frac{K\chi^{el}}{c^{2}}-\alpha\>K\partial_{x}^{2}\chi^{el}$
(24)
supplemented with constitutive boundary conditions
$\left\\{\begin{aligned}
&-c\,\frac{qL}{2}\,=\alpha\,K\>\bigg{(}c\,\partial_{x}\chi^{el}(0)-\chi^{el}(0)\bigg{)}\,\\\
&c\,\frac{qL}{2}\,=\alpha\,K\>\bigg{(}c\,\partial_{x}\chi^{el}(L)+\chi^{el}(L)\bigg{)}\end{aligned}\right.$
(25)
The elastic curvature $\,\chi^{el}\,$ is obtained from Eqs.(24)-(25); then,
Eq.(1) together with essential boundary conditions $\,v(0)=0\,$ and
$\,v(L)=0\,$, provides the nonlocal displacement field
$\begin{split}v(x)=\,&\frac{qx\,(L^{3}-2Lx^{2}+x^{3})}{24K}-\frac{(\alpha-1)\,c^{2}\,q}{2\psi_{1}K}\,e^{-\frac{x}{\sqrt{\alpha}\,c}}\,(-e^{\frac{x}{\sqrt{\alpha}\,c}}\,(2\,\alpha^{3/2}\,c^{2}+L\,(\sqrt{\alpha}c\\\
&-\sqrt{\alpha}\,x+x)+(\sqrt{\alpha}-1)\,x^{2})+\,e^{\frac{L+x}{\sqrt{\alpha}c}}\,(-2\,\alpha^{3/2}\,c^{2}+L\,(-\sqrt{\alpha}\,c+\sqrt{\alpha}\,x\\\
&+x)-(\sqrt{\alpha}+1)\,x^{2})+\sqrt{\alpha}\,c\,e^{\frac{L}{\sqrt{\alpha}c}}\,(2\,\alpha\,c+L)+\sqrt{\alpha}\,c\,(2\,\alpha\,c+L)\,e^{\frac{2x}{\sqrt{\alpha}\,c}})\end{split}$
(26)
Doubly clamped beam under uniformly distributed loading.
Let us consider a doubly clamped beam of length $\,L\,$ and uniform bending
stiffness $\,K\,$ under uniformly distributed loading $\,q\,$.
The bending moment field $\,M\,$ obtained by the differential equilibrium
equation $\,\partial_{x}^{2}M=q\,$ is a function of two integration constants,
$\,a_{1}\,$ and $\,a_{2}\,$. Hence, Eq.(11) in terms of displacement field
$\,v\,$ becomes
$\frac{qx^{2}}{2}+a_{1}x+a_{2}-c^{2}q=K\partial_{x}^{2}v-\alpha\>c^{2}\,K\partial_{x}^{4}v$
(27)
supplemented with constitutive and kinematic boundary conditions
$\left\\{\begin{aligned} &c\,a_{1}-a_{2}=\alpha
K\,(c\,\partial_{x}^{3}v(0)-\partial_{x}^{2}v(0))\\\
&c\,(qL+a_{1})+\frac{qL^{2}}{2}+a_{1}L+a_{2}=\alpha
K\,(c\,\partial_{x}^{3}v(L)+\partial_{x}^{2}v(L))\\\ &v(0)=0\\\
&\partial_{x}v(0)=0\\\ &v(L)=0\\\ &\partial_{x}v(L)=0\end{aligned}\right.$
(28)
By solving the differential problem in Eqs.(27)-(28) the nonlocal displacement
field is given by
$\begin{split}v(x)=\,&\frac{q\,x^{2}\,(L-x)^{2}}{24K}+\frac{c\,(\alpha-1)\,q}{12\,\psi_{4}\,K}(12\,c^{2}+6c\,L+L^{2})\,e^{-\frac{x}{\sqrt{\alpha}c}}(\sqrt{\alpha}\,c\,L\,e^{\frac{L}{\sqrt{\alpha}c}}\\\
&-e^{\frac{L+x}{\sqrt{\alpha}c}}(\sqrt{\alpha}\,cL-
Lx+x^{2})+e^{\frac{x}{\sqrt{\alpha}c}}(-\sqrt{\alpha}\,cL-
Lx+x^{2})+\sqrt{\alpha}\,c\,L\,e^{\frac{2x}{\sqrt{\alpha}c}})\end{split}$ (29)
with
$\psi_{4}=\,L\,(-\sqrt{\alpha}-(\sqrt{\alpha}+1)\,e^{\frac{L}{\sqrt{\alpha}c}}+1)+2\,(\alpha-1)\,c\,(e^{\frac{L}{\sqrt{\alpha}c}}-1)$
(30)
## 5 Inconsistency of limiting solutions
As enlightened by theoretical outcomes in Sect.3, no solution can be found to
Eq.(3) for a vanishing mixture parameter, i.e.: $\,\alpha=0\,$. Indeed, for
any value $\,c>0\,$, constitutive boundary conditions in Eq.(12) can be
satisfied by equilibrated bending moments only for a strictly positive mixture
parameter. Hence, inconsistencies of two-phase solutions are expected to occur
as $\,\alpha\to 0\,$.
In the following, analytical limiting responses of case-studies in Sec.4 are
provided. Non-dimensional variables are used in parametric plots by
introducing the non-dimensional abscissa $\,\xi=x/L\,$, the nonlocal parameter
$\,\lambda=c/L\,$ and the following non-dimensional limiting displacement
fields
$\bar{v_{l}}=v_{l}\frac{K}{FL^{3}}\quad
or\quad\bar{v_{l}}=v_{l}\frac{K}{\mathcal{M}L^{2}}\quad
or\quad\bar{v_{l}}=v_{l}\frac{K}{qL^{4}}$ (31)
Cantilever under concentrated couple at free end.
Computing the limit as $\,\alpha\to 0\,$ of Eq.(18), we get the following
limiting displacement field
$v_{l}(x)=\frac{\mathcal{M}}{K}\bigg{(}\frac{x^{2}}{2}+c\,x\bigg{)}$ (32)
The displacement field in Eq.(32) is clearly in contrast with essential
boundary conditions prescribed by constraints. Indeed, except for the local
case $\,\lambda=0^{+}\,$, kinematic inconsistency is apparent in parametric
plots of displacement (Fig.1) and rotation fields (Fig.2) obtained from
derivation of Eq.(32).
Figure 1: Cantilever under concentrated couple at free end: displacement
$\,\bar{v_{l}}\,$ versus $\,\xi\,$ for
$\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 2: Cantilever under
concentrated couple at free end: rotation $\,\bar{\varphi_{l}}\,$ versus
$\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$.
Double derivation of Eq.(32) leads to the limiting elastic bending curvature
$\,\chi_{l}\,$ that inserted into the integral convolution in Eq.(3) (with
$\,\alpha=0\,$) should provide the equilibrated bending moment. Moreover,
since the redundancy degree is zero, equilibrated bending interaction is the
uniform field univocally determined by equilibrium conditions. As clearly
shown by parametric plots in Fig.3, the limiting elastic nonlocal curvature
$\,\chi_{l}\,$ provides a bending moment which is not equilibrated; indeed, it
is not uniform and not equal to the applied couple, except for the asymptotic
local bending moment which is equilibrated for $\,\xi\in\,]0,1[\,$. A further
derivation leads to shear force field which is not vanishing (see Fig.4),
except for $\,\lambda=0^{+}\,$ with $\,\xi\in\,]0,1[\,$.
Figure 3: Cantilever under concentrated couple at free end: bending moment
$\,\bar{M_{l}}\,$ versus $\,\xi\,$ for
$\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 4: Cantilever under
concentrated couple at free end: shear force $\,\bar{T_{l}}\,$ versus
$\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$.
Cantilever under concentrated force at free end.
Computing the limit as $\,\alpha\to 0\,$ of Eq.(22), we get the following
limiting displacement field
$v_{l}(x)=\frac{F}{K}\bigg{(}L\,\frac{x^{2}}{2}-\frac{x^{3}}{6}+c^{2}\,x+L\,c\,x\bigg{)}$
(33)
Kinematic inconsistencies are clearly shown in parametric plots of
displacement and rotation fields as a function of $\,\lambda\,$, except for
the local case $\,\lambda=0^{+}\,$ (see Figs.5-6). Double derivation of
Eq.(33) leads to the limiting bending curvature that inserted into the
integral convolution in Eq.(3), for $\,\alpha=0\,$, provides a bending moment
field which is not compatible with differential and boundary equilibrium
requirements.
Figure 5: Cantilever under concentrated force at free end: displacement
$\,\bar{v_{l}}\,$ versus $\,\xi\,$ for
$\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 6: Cantilever under
concentrated force at free end: rotation $\,\bar{\varphi_{l}}\,$ versus
$\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$.
Indeed, since the redundancy degree is zero, the equilibrated bending moment
is the linear field univocally determined by equilibrium conditions. Instead,
as clearly shown by parametric plots in Fig.7, the limiting elastic bending
curvature $\,\chi_{l}\,$ provides a bending moment which is not equilibrated
since it is not linear and does not vanish at free-end of the cantilever,
except for the asymptotic local bending moment which is equilibrated for
$\,\xi\in\,]0,1]\,$. A further derivation leads to the shear force field which
is not equal to the value of the applied force (see Fig.8) and hence, it is
not uniform (except for $\,\lambda=0^{+}\,$ with $\,\xi\in\,]0,1[\,$), i.e.:
the emerging distributed loading is not vanishing.
Figure 7: Cantilever under concentrated force at free end: bending moment
$\,\bar{M_{l}}\,$ versus $\,\xi\,$ for
$\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 8: Cantilever under
concentrated force at free end: shear force $\,\bar{T_{l}}\,$ versus $\,\xi\,$
for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$.
Simply supported beam under uniformly distributed loading.
Computing the limit as $\,\alpha\to 0\,$ of Eq.(26), we get the following
limiting displacement
$v_{l}(x)=\frac{q}{K}\bigg{(}\frac{x^{4}}{24}-\frac{Lx^{3}}{12}-\frac{c^{2}x^{2}}{2}+\frac{L^{3}x}{24}(12\lambda^{2}+1)\bigg{)}$
(34)
Parametric plots of displacement and rotation fields as function of
$\,\lambda\,$ are shown in Figs.9-10. Double derivation of Eq.(34) leads to
the limiting bending curvature that inserted into the integral convolution in
Eq.(3) (for $\,\alpha=0\,$) provides the static fields shown in Figs.11-12.
The bending moment field is clearly incompatible with natural boundary
conditions and the shear force field is not linear, i.e.: the emerging
distributed loading is not uniform (see Fig.13). Hence, the interaction fields
for $\,\lambda>0\,$ are not compatible with differential and boundary
equilibrium requirements.
Figure 9: Simply supported beam under uniformly distributed loading:
displacement $\,\bar{v_{l}}\,$ versus $\,\xi\,$ for
$\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 10: Simply supported
beam under uniformly distributed loading: rotation $\,\bar{\varphi_{l}}\,$
versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure
11: Simply supported beam under uniformly distributed loading: bending moment
$\,\bar{M_{l}}\,$ versus $\,\xi\,$ for
$\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 12: Simply supported
beam under uniformly distributed loading: shear force $\,\bar{T_{l}}\,$ versus
$\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 13:
Simply supported beam under uniformly distributed loading: emerging loading
$\,\bar{q_{l}}\,$ versus $\,\xi\,$ for
$\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$.
Doubly clamped beam under uniformly distributed loading.
The limiting displacement field as $\,\alpha\to 0\,$ of Eq.(29) is given by
$v_{l}(x)=\frac{q}{K}\left(\frac{x^{4}}{24}-\frac{Lx^{3}}{12}-\frac{c^{2}x^{2}}{2}+\frac{c\left(12\lambda^{2}+6\lambda+1\right)L^{2}x}{12(2\lambda+1)}+\frac{L^{2}x^{2}}{24(2\lambda+1)}\right)$
(35)
The displacement field in Eq.(35) is in contrast with essential boundary
conditions prescribed by constraints. These kinematic inconsistencies are
clearly shown in parametric plots of displacement and rotation fields (see
Figs.14-15). Double derivation of Eq.(33) leads to the limiting nonlocal
elastic curvature that is used to compute the integral convolution in Eq.(3),
for $\,\alpha=0\,$, to get the bending moment field depicted in Fig.16. A
further derivation leads to shear force field which is not linear (see Fig.17)
and the emerging distributed loading is not uniform and not equal to the
applied one (see Fig.18). Hence, limiting solutions of the elastostatic
problem do not satisfy kinematic compatibility and equilibrium requirements,
except for the asymptotic local displacement and rotation fields
$\,\forall\xi\in\,[0,1]\,$ and for the asymptotic local bending and shearing
fields for $\,\xi\in\,]0,1[\,$.
Figure 14: Doubly clamped beam under uniformly distributed loading:
displacement $\,\bar{v_{l}}\,$ versus $\,\xi\,$ for
$\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 15: Doubly clamped
beam under uniformly distributed loading: rotation $\,\bar{\varphi_{l}}\,$
versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure
16: Doubly clamped beam under uniformly distributed loading: bending moment
$\,\bar{M_{l}}\,$ versus $\,\xi\,$ for
$\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 17: Doubly clamped
beam under uniformly distributed loading: shear force $\,\bar{T_{l}}\,$ versus
$\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 18:
Doubly clamped beam under uniformly distributed loading: emerging loading
$\,\bar{q_{l}}\,$ versus $\,\xi\,$ for
$\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$.
## 6 Closing remarks
The bending behaviour of elastic beams has been investigated by Eringen’s two-
phase integral theory. Exact closed-form solutions of simple structural
problems of applicative interest have been preliminarily provided in terms of
mixture and nonlocal parameters. Then, relevant asymptotic fields (as the
mixture parameter tends to zero) have been evaluated and studied. It has been
proven that such fields are in contrast with kinematic boundary conditions and
equilibrium requirements for any nonlocal parameter value. Accordingly,
limiting responses of Eringen’s two-phase formulation cannot be used as
solutions of the ill-posed Eringen purely nonlocal structural problem.
Therefore, inaccurate outcomes contributed in current literature (see e.g.
Mikhasev and Nobili, 2020; Mikhasev, 2021), regarding the well-posedness of
limiting elastodynamic problems based on Eringen’s two-phase continuum theory,
should be amended consequently.
Acknowledgment \- Financial support from the MIUR in the framework of the
Project PRIN 2017 - code 2017J4EAYB _Multiscale Innovative Materials and
Structures (MIMS)_ ; University of Naples Federico II Research Unit - is
gratefully acknowledged.
## References
* Banejad et al. (2020) Banejad, A., Passandideh-Fard, M., Niknam, H., Mirshojaeian Hosseini, M.J., Mousavi Shaegh, S.A., 2020. Design, fabrication and experimental characterization of whole-thermoplastic microvalves and micropumps having micromilled liquid channels of rectangular and half-elliptical cross-sections. Sensors and Actuators A 301, 111713.
* Barretta et al. (2018a) Barretta, R., Fabbrocino, F., Luciano, R., Marotti de Sciarra, F., 2018a. Closed-form solutions in stress-driven two-phase integral elasticity for bending of functionally graded nano-beams. Physica E: Low-dimensional Systems and Nanostructures 97, 13–30.
* Barretta et al. (2018b) Barretta, R., Čanadija, M., Feo, L., Luciano, R., Marotti de Sciarra, F., Penna, R., 2018b. Exact solutions of inflected functionally graded nano-beams in integral elasticity. Composites Part B 142, 273-286.
* Barretta et al. (2018c) Barretta, R., Diaco, M., Feo, L., Luciano, R., Marotti de Sciarra, F., Penna, R., 2018c. Stress-driven integral elastic theory for torsion of nano-beams. Mechanics Research Communications 87, 35-41.
* Barretta et al. (2019) Barretta, R., Marotti de Sciarra, F., Vaccaro, M.S., 2019. On nonlocal mechanics of curved elastic beams. International Journal of Engineering Science 144, 103140.
* Bažant and Jirásek (2002) Bažant, Z.P., Jirásek, M., 2002. Nonlocal integral formulation of plasticity and damage: survey of progress. Journal of Engineering Mechanics - ASCE, 128, 1119-1149.
* Borino et al. (2003) Borino, G., Failla, B., Parrinello, F., 2003. A symmetric nonlocal damage theory. International Journal of Solids and Structures 40, 3621-3645.
* Chao et al. (2020) Chao, M., Wang, Y., Ma, D., Wu, X., Zhang, W., Zhang, L., Wan, P., 2020. Wearable mxene nanocomposites-based strain sensor with tile-like stacked hierarchical microstructure for broad-range ultrasensitive sensing. Nano Energy 78, 105187.
* Chorsi and Chorsi (2018) Chorsi, M.T. , Chorsi, H.T., 2018. Modeling and analysis of MEMS disk resonators. Microsystem Technologies 24 (6), 2517–2528 .
* Eringen (1972) Eringen, A. C., 1972. Linear theory of nonlocal elasticity and dispersion of plane waves. International Journal of Engineering Science 10(5), 425-435.
* Eringen (1983) Eringen, A. C., 1983. On differential equations of nonlocal elasticity and solutions of screw dislocation and surface waves. Journal of Applied Physics 54, 4703.
* Eringen (1987) Eringen, A. C., 1987. Theory of nonlocal elasticity and some applications. Res Mechanica 21, 313-342.
* Eptaimeros et al. (2016) Eptaimeros, K.G., Koutsoumaris, C.C., Tsamasphyros, G.J., 2016. Nonlocal integral approach to the dynamical response of nano-beams. Int J Mech Sci 115–116, 68–80 .
* Fathi and Ghassemi (2017) Fathi, M., Ghassemi, A. (2017). The effects of surface stress and nonlocal small scale on the uniaxial and biaxial buckling of the rectangular piezoelectric nanoplate based on the two variable-refined plate theory. Journal of the Brazilian Society of Mechanical Sciences and Engineering 39 3203-3216.
* Fernández-Sáez and Zaera (2017) Fernández-Sáez, J., Zaera, R., 2017. Vibrations of Bernoulli-Euler beams using the two-phase nonlocal elasticity theory. International Journal of Engineering Science 119, 232-248.
* Ghayesh and Farajpour (2019) Ghayesh, M.H., Farajpour, A., 2019. A review on the mechanics of functionally graded nanoscale and microscale structures. International Journal of Engineering Science 137, 8-36.
* Ghayesh and Farokhi (2020) Ghayesh, M.H., Farokhi, H., 2020. Nonlinear broadband performance of energy harvesters. Int J Eng Sci 147, 103202
* Jankowski et al. (2020) Jankowski, P., Żur, K.K., Kim, J., Reddy, J.N., 2020. On the bifurcation buckling and vibration of porous nanobeams. Composite Structures 250, 112632.
* Karami et al. (2018) Karami, B., Shahsavari, D., Janghorban, M., Li, L., 2018. Wave dispersion of mounted graphene with initial stress. Thin-Walled Structures 122, 102-111.
* Kiani (2021) Kiani, K., Żur, K.K., 2021. Vibrations of double-nanorod-systems with defects using nonlocal-integralsurface energy-based formulations. Composite Structures 256, 113028.
* Khodabakhshi and Reddy (2015) Khodabakhshi, P., Reddy, J.N., 2015. A unified integro-differential nonlocal model. International Journal of Engineering Science 95, 60-75.
* Kröner et al. (1967) Kröner, E., 1967. Elasticity theory of materials with long range cohesive forces. International Journal of Solids and Structures 3(5), 731-742.
* Lu et al. (2019) Lu, P., Veletić, M., Laasmaa, M., Vendelin, M., Louch, W.E., Steinar Halvorsen P., Bergsland, J., Balasingham, I., 2019. Multi-nodal nano-actuator pacemaker for energy-efficient stimulation of cardiomyocytes. Nano Communication Networks 22, 100270.
* Malikan et al. (2020b) Malikan, M., Eremeyev, V.A., Żur, K.K., 2020. Effect of axial porosities on flexomagnetic response of in-plane compressed piezomagnetic nanobeams. Symmetry 12(12), 1935.
* Mikhasev and Nobili (2020) Mikhasev, G., Nobili, A., 2020. On the solution of the purely nonlocal theory of beam elasticity as a limiting case of the two-phase theory. International Journal of Solids and Structures 190, 47–57.
* Mikhasev (2021) Mikhasev, G., 2021. Free high-frequency vibrations of nonlocally elastic beam with varying cross-section area. Continuum Mechanics and Thermodynamics. https://doi.org/10.1007/s00161-021-00977-6
* Oskouie et al. (2018) Oskouie, M. F., Ansari, R., Rouhi, H., 2018. Bending of Euler-Bernoulli nanobeams based on the strain-driven and stress-driven nonlocal integral models: a numerical approach. Acta Mechanica Sinica. Doi: 10.1007/s10409-018-0757-0
* Pinnola (2020) Pinnola, F.P., Vaccaro, M.S., Barretta, R., Marotti de Sciarra, F., 2020. Random vibrations of stress-driven nonlocal beams with external damping. Meccanica URL https: //doi.org/10.1007/s11012-020-01181-7.
* Pisano and Fuschi (2003) Pisano, A.A., Fuschi, P., 2003. Closed form solution for a nonlocal elastic bar in tension. International Journal of Solids and Structures 40, 13-23.
* Pisano et al. (2021) Pisano, A.A., Fuschi, P., Polizzotto, C., 2021. Integral and differential approaches to Eringen’s nonlocal elasticity models accounting for boundary effects with applications to beams in bending. ZAMM - Journal of Applied Mathematics and Mechanics. https://doi.org/10.1002/zamm.202000152
* Polizzotto (2001) Polizzotto, C., 2001. Nonlocal elasticity and related variational principles. International Journal of Solids and Structures 38, 7359-7380.
* Polizzotto (2002) Polizzotto, C., 2002. Thermodynamics and continuum fracture mechanics for nonlocal-elastic plastic materials. European Journal of Mechanics A/Solids 21, 85-103.
* Polyanin and Manzhirov (2008) Polyanin, A.D., Manzhirov A.V., 2008. Handbook of integral equations. 2nd ed. Boca Raton, FL: Chapman & Hall/CRC.
* Roghani (2020) Roghani, M., Rouhi, H., 2020. Nonlinear stress-driven nonlocal formulation of timoshenko beams made of fgms. Continuum Mechanics and Thermodynamics. https://doi.org/10. 1007/s00161-020-00906-z
* Rogula (1965) Rogula, D., 1965. Influence of spatial acoustic dispersion on dynamical properties of dislocations. Bulletin de l’Académie Polonaise des Sciences, Séries des Sciences Techniques 13, 337-343 .
* Rogula (1982) Rogula, D., 1982. Introduction to nonlocal theory of material media. In D. Rogula (Ed.), Nonlocal theory of material media, CISM courses and lectures (vol. 268, pp. 125-222). Wien: Springer.
* Romano et al. (2017a) Romano, G., Barretta, R., Diaco, M., Marotti de Sciarra, F., 2017a. Constitutive boundary conditions and paradoxes in nonlocal elastic nano-beams. International Journal of Mechanical Sciences 121, 151-156.
* Romano et al. (2017b) Romano, G., Barretta, R., Diaco, M., 2017b. On nonlocal integral models for elastic nano-beams. International Journal of Mechanical Sciences 131-132, 490-499.
* Sedighi et al. (2017) Sedighi, H.M., Malikan, M., Valipour, A., Żur, K.K., 2020. Nonlocal vibration of carbon/boron-nitride nano-hetero-structure in thermal and magnetic fields by means of nonlinear finite element method. Journal of Computational Design and Engineering 7(5), 591–602.
* Soukarié et al. (2020) Soukarié, D., Ecochard, V., Salomé, L., 2020. Dna-based nanobiosensors for monitoring of water quality. Int. J. Hyg. Environ. Health 226, 113485.
* Tricomi (1957) Tricomi, F.G., 1957. Integral Equations. Interscience, New-York, USA. Reprinted by Dover Books on Mathematics, 1985.
* Vila et al. (2017) Vila, J., Fernández-Sáez, J., Zaera, R., 2017. Nonlinear continuum models for the dynamic behavior of 1D microstructured solids. International Journal of Solids and Structures 117, 111-122.
* Wang et al. (2016) Wang, Y., Zhu, X., Dai, H., 2016. Exact solutions for the static bending of Euler-Bernoulli beams using Eringen two-phase local/nonlocal model. AIP Advances 6(8), 085114. Doi:10.1063/1.4961695
* Zhang (2017) Zhang, Y., 2017. Frequency spectra of nonlocal Timoshenko beams and an effective method of determining nonlocal effect. International Journal of Mechanical Sciences 128-129, 572-582.
* Zhang (2020) Zhang, J.Q., Qing, H., Gao, C.F., 2020. Exact and asymptotic bending analysis of microbeams under different boundary conditions using stress-derived nonlocal integral model. Z. Angew. Math. Mech. 100(1), e201900148.
* Zhu and Li (2017) Zhu, X., Li, L., 2017. Closed form solution for a nonlocal strain gradient rod in tension. International Journal of Engineering Science 119, 16-28.
* Żur et. al (2020) Żur, K.K., Arefi, M., Kimc, J., Reddy, J.N., 2020. Free vibration and buckling analyses of magneto-electro-elastic FGM nanoplates based on nonlocal modified higher-order sinusoidal shear deformation theory. Composites Part B 182, 107601.
| arxiv-papers | 2021-07-27T11:08:45 | 2024-09-04T03:07:21.278017 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Marzia Sara Vaccaro, Francesco Paolo Pinnola, Francesco Marotti de\n Sciarra, Raffaele Barretta",
"submitter": "Raffaele Barretta",
"url": "https://arxiv.org/abs/2107.12731"
} |
2107.12732 | # Towards Black-box Attacks on Deep Learning Apps
Hongchen Cao ShanghaiTech University
[email protected] Shuai Li The Hong Kong Polytechnic University
[email protected] Yuming Zhou Ming Fan Nanjing University
[email protected] Xi’an Jiaotong University
[email protected] Xuejiao Zhao Nanyang Technological University
[email protected] Yutian Tang ShanghaiTech University
[email protected]
###### Abstract
Deep learning is a powerful weapon to boost application performance in various
fields, including face recognition, object detection, image classification,
natural language understanding, and recommendation system. With the rapid
increase in the computing power of mobile devices, developers can embed deep
learning models into their apps for building more competitive products with
more accurate and faster responses. Although there are several works of
adversarial attacks against deep learning models in apps, they all need
information about the models’ internals (i.e., structures, weights) or need to
modify the models. In this paper, we propose an effective black-box approach
by training substitute models to spoof the deep learning systems inside the
apps. We evaluate our approach on 10 real-world deep-learning apps from Google
Play to perform black-box adversarial attacks. Through the study, we find
three factors that can affect the performance of attacks. Our approach can
reach a relatively high attack success rate of 66.60% on average. Compared
with other adversarial attacks on mobile deep learning models, in terms of the
average attack success rates, our approach outperforms counterparts by 27.63%.
###### Index Terms:
Black-box attacks, Deep Learning apps, Android
## I Introduction
The explosive progress of deep learning techniques makes an increasing number
of app developers pay attention to this technology. Deep learning apps reach a
certain scale in the market and keep growing rapidly [1]. To lower the
threshold for developers to utilize and deploy deep learning models on their
apps, companies (i.e., Google) develop deep learning frameworks, including
Tensorflow Lite [2], Pytorch Mobile [3], Caffe2 Mobile [4], MindSpore Lite
[5], Core ML [6] and so on.
To build a deep learning app, mainstream platforms offer two common deploying
strategies, on-device deployment and on-cloud deployment [7]. On-cloud
deployment allows developers to deploy their models on the remote server, and
collect the runtime inputs from app users. Then, the inputs are processed by
the remote server. Finally, the results are returned to app users. However,
the efficiency of this method is often limited by the network quality and
power usage [8]. Even worse, on-cloud deployment has potential risks of user
privacy leakage [9]. Therefore, lots of developers turn to the on-device
deployment strategy.
Motivation. The aforementioned mainstream mobile deep learning frameworks and
deployment platforms rarely provide developers with solutions or APIs to
protect their deep learning models. Unprotected deep learning models are
widely used in apps in various fields such as finance, health, and self-
driving [10]. This may lead to potential user data leakage, commercial
information theft, and the malfunction of important functional modules of the
app (e.g. a polluted face recoginition model fails to recoginize an authorized
user).
State-of-art. Although some studies [11] focus on attacks on mobile deep
learning models, their approaches are often white-box, which means that the
attacker can know or even modify the structure (the number, type, and
arrangement of layers) and weights (parameters of each layer) of the model.
These white-box attacks rely on the source of victim models, which can be
extracted by decompressing the victim app. However, a recent study shows that
developers are more likely to use encryption or hash code to protect their
models [10]. It means that the knowledge of a model (i.e., structure and
weights) inside the app is always unknown, which nullifies these white-box
attacks. Work [12] claims to be a black-box attack method towards deep
learning models. However, they still require knowledge of the structure or
weight of the model. Such information is commonly unknown in the real world,
especially for commercial apps.
Our solution. In this paper, we developed a practical pipeline that covers
data preparation, student model (i.e., a substitute model to mimic the
behavior of the victim model) learning, and adversarial examples generation.
Our black-box attack approach can bypass many existing model protection
measures. First, we instrument a DummyActivity to the victim app to invoke the
deep learning model (a.k.a teacher model) adopted by the victim app. The raw
data fetched from the Internet or public dataset are fed into the teacher
model through the DummyActivity to generate the corresponding labels (See Sec.
III-A). Next, a substitute model (a.k.a. student model), which is selected to
mimic the behavior of the teacher model, is then trained with the labeled data
(See Sec. III-B). Last, adversarial attack algorithms are applied to the
student model, and the generated adversarial examples are leveraged to attack
the teacher model in the victim app (See Sec. III-C).
Contributions. In summary, our main contributions are described as follows:
$\bullet$ We propose a black-box attack pipeline, from the model collection to
adversarial example generation, to attack deep learning apps.
$\bullet$ We conduct a series of experiments to evaluate how different factors
affect the attack success rate, including the structure of the student models,
the scale of the teaching dataset, and the adversarial attack algorithms; and
$\bullet$ We propose a series of strategies to defend against the proposed
attacks.
We release the source code and data on the online artefact [13].
## II Background
### II-A On-device Deep Learning Model
Developers are increasingly using deep learning models to implement face
recognition [14], image classification [15], object detection [15], natural
language understanding [16], speech recognition [17], and recommendation
systems [18] in their apps.
To meet the needs of app developers, vendors build deep learning frameworks
for mobile platforms, such as TensorFlow Lite [2] and PyTorch Mobile [3]. They
also provide platforms (e.g. TensorFlow Hub [19], MindSpore Model [20]) to
share pre-trained deep learning models for mobile apps.
There are two common deploying strategies, on-device deployment and on-cloud
deployment. Developers nowadays are inclined to use the on-device method to
deploy deep learning models. On the one hand, the hardware of modern mobile
devices is qualified to complete computationally intensive deep learning
tasks. As the CPU and GPU of modern mobile devices have stronger computing
power, on-device inference can be completed promptly. The neural processing
units (NPU) in mobile devices further expand the feasibility of on-device
deployment of deep learning models [21].
On the other hand, deep learning frameworks provide simple and easy-to-use
APIs to invoke the model for inference tasks. For example, as shown in List.
1, Interpreter defined in the TensorFlow Lite is used to load the model and
run inference. file_of_a_tflite_model represents the file path of the deep
learning model. input presents the user’s input and output represents the
result of the inference which is a vector. Based on the output, the app can
give a response to the user. For example, the user feeds an image of a rose as
input into the Interpreter. After inference, the output is assigned to a one-
hot vector like [0, 0, 1, 0, …, 0]. According to pre-determined rules from
developers, the vector is then interpreted into a human-readable format such
as a string ”rose”.
Listing 1: TensorFlow Lite API
⬇
1# TensorFlow Lite
2Interpreter interpreter = new Interpreter(file_of_a_tflite_model);
3interpreter.run(input, output);
In the apps, developers can define the locations of their deep learning
models. A common practice is to store the models in the assets folder
(/assets/) of the apk (Android Package, which is the binary format of an app).
Data including user input, output vector, and training dataset are invisible
to users. Although models in some deep learning apps can be directly extracted
by decompiling the apk, lots of them still cannot be fetched even with the
state-of-art tools [10]. Therefore, the information about the structures and
weights of these deep learning models is unknown to attackers.
### II-B Black-box Attack
Since the information about the victim is always unknown, attacks must be
performed in a black-box manner. A black-box attack is not a specific attack
technique but describes an attack scenario. In this scenario, the attackers
have no internal knowledge of the victim, and cannot modify the internal
structure and other attributes of the victim. In our context, the attackers
have no internal knowledge of the deep learning model in the victim app and
cannot modify the internal attributes of the model. The attackers can only
query the model and get its prediction.
### II-C Adversarial Attack
Deep learning models are vulnerable to adversarial attacks. The adversarial
attack utilizes adversarial examples to spoof the deep learning models. An
adversarial example is generated by adding tiny perturbations to the input
data. It can be represented as $x_{adv}=x+\epsilon*p$, where $x_{adv}$ is the
adversarial example, $x$ is the input data, $p$ is the perturbations and
$\epsilon$ is the multiplier to control the degree of the perturbations [22,
12]. An adversarial attack can be briefly summarized in the following example.
With a deep learning model for image classification $M(x)$ and an input image
$x$, $y_{true}$ is the label of $x$ ($y_{true}=M(x)$). Attackers can generate
an adversarial example $x^{\prime}$ by adding infinitesimal perturbations that
a human being cannot distinguish from the original image $x$. But the
adversarial example $x^{\prime}$ can spoof the victim deep learning model to
make an incorrect prediction ($M(x^{\prime})\neq y_{true}$).
(a) orignal input
(b) adversarial example
Figure 1: Comparsion for orignal input and adversarial example Figure 2:
Overview of adversarial attack pipeline
For example, Fig. 1(a) is the original input image, which is labeled as ’rose’
by a deep learning model $M$. After applying adversarial attacks to it, an
adversarial example is generated as shown in Fig. 1(b), which is labeled as
”tulips” by $M$.
## III Methodology
Before introducing the details of our approach, we first define two key
concepts used in our work: teacher model and student model. A teacher model is
the deep learning model that is used in the victim app. A student model can be
considered as a substitute or imitator of the teacher model. A qualified
student model can imitate the teacher’s behaviors well. With the same input,
the student and the teacher model are supposed to output the same prediction.
A well-behaved student model can guarantee that the adversarial examples
generated can be directly transferred to the teacher model.
Our black-box attack pipeline, as illustrated in Fig. 2, consists of three
procedures: teaching dataset preparation, student model learning, and
adversarial examples generation.
$\bullet$ Input: The input of our pipeline is a deep learning app and an
unlabeled dataset. The dataset is either crawled from the web or a public
dataset that is related to the app’s task. For example, the dataset for an app
whose task is flower classification can be images of different kinds of
flowers.
$\bullet$ Teaching dataset preparation: Given a deep learning app, we first
locate and learn how the deep learning model is invoked by tracking the
official APIs from deep learning frameworks in the app. Then, we instrument a
DummyActivity, in which the teacher model is invoked, to the victim app with
Soot [23, 24]. Next, we feed the unlabeled dataset into the DummyActivity to
generate the corresponding labels (see Sec. III-A).
$\bullet$ Student model learning: To imitate the teacher model, we select
mainstream deep learning models with the same task as the student model
candidates. With the labeled teaching dataset generated, a student model can
be trained to imitate the teacher model (see Sec. III-B).
$\bullet$ Adversarial examples generation: With the trained student model,
adversarial examples can be generated with adversarial attack algorithms (see
Sec. III-C).
$\bullet$ Output: The output of the whole pipeline is a set of adversarial
examples, which are used to attack the victim app.
### III-A Teaching Dataset Preparation
For a deep learning app, we identify some basic attributes of the teacher
model in the app. These attributes mainly consist of the type of its task, the
name of classes it predicts, and the formatting requirement of the input.
$\bullet$Type of task and Name of classes : Determining the task of the deep
learning model is a prerequisite for collecting a suitable dataset. The name
of the output (i.e., classes) of the deep learning model can further help
narrow the selection range of the dataset. This information can be obtained by
trying the app.
$\bullet$Formatting requirement of the input : The input format of the deep
learning model is determined by the model developer. These formatting
requirements include size (e.g., 128*128), data type (e.g., int8, float32),
and so forth. By reverse engineering the app, these requirements can be
obtained manually.
For a plant identifier app, its task is image classification. Its names of
classes can be the names of plants (e.g, lily, plane tree). Its formatting
requirement of the input can be a 255$\times$255$\times$3 RGB image.
Based on this information, we search a public dataset $D$ from the web.
However, it is common that no public related dataset is available for real-
world apps. There are two options to collect the dataset for such apps. The
first is to use a pre-trained student model without fine-tuning by the
teaching dataset, which is simple and fast. The second is to crawl the related
data from the Internet. We compare these two options with experiments in Sec.
IV-C.
Since the input format of the deep learning model is determined by the model
developer, the collected dataset needs to be preprocessed to make it meet the
specific formatting requirements. Based on the previously obtained information
about the input formatting requirements, the input data can be manipulated
(e.g., zoom in size, update figure accuracy) to meet the input formatting
requirements.
The dataset we crawled is unlabeled. However, to better imitate the teacher
model, we need to train the student model with a labeled dataset. Therefore,
we need to extract the labels of the dataset with the teacher model. For a
black-box attack, it can be unrealistic to directly retrieve the teacher model
from the app. Therefore, we perform the following steps to transfer an
unlabeled dataset $D$ into a labeled one $D^{\prime}$:
$\bullet$ STEP 1: We collect the API patterns of mainstream mobile deep
learning model deployment frameworks. The corresponding APIs can be found in
the official docs (i.e., Tensorflow Lite inference [25], Pytorch Mobile
inference [26]).
$\bullet$ STEP 2: We use Soot to locate the signatures of these APIs in the
app.
$\bullet$ STEP 3: We instrument DummyActivity into the app with Soot and load
the deep learning model inside the onCreate() method of DummyActivity with the
same API found in STEP 2.
$\bullet$ STEP 4: We pass the dataset $D$ to the inference API and output the
corresponding labels with logs.
$\bullet$ STEP 5: We leverage the Android Debug Bridge (ADB) to launch our
DummyActivity (i.e., am start -n DummyActivity) to trigger the teacher model.
As a result, we can obtain the corresponding labels for the inputs.
Example. The Mushroom Identifier app
(com.gabotechindustries.mushroomIdentifier) detects and identifies mushrooms
in the picture and predicts their categories. This app has a class called
”Xception”. List. 2 summarizes how this app invokes the deep learning model in
”Xception” with the APIs provided by TensorFlow Lite.
Listing 2: API pattern of invoking the deep learning model
⬇
1public class Xception {
2 public Xception(…, final String str, …) {
3 …
4 final Interpreter.Options options = new Interpreter.Options();
5 this.tflite = new Interpreter(map, options);}
6}
7public abstract class AIActivity extends CameraActivity {
8 protected void onCreate(…) {
9 this.xception = new Xception(…, ”xception103.tflite”, …);}
10}
As illustrated in List. 3, we embed the extracted pattern (in List. 2) into
DummyActivity. Then, we instrument the DummayActivity to the app.
Listing 3: Instrumented DummyActivity
⬇
1class DummyActivity extends AppCompatActivity {
2 public void onCreate(Bundle savedInstanceState) {
3 …
4 // Init and run the Interpreter
5 Interpreter interpreter = new Interpreter(”xception103.tflite”);
6 interpreter.run(input, output);
7 int maxIdx = output.indexOf(output.max());//Get label
8 Log.i(”DummyActivity”,maxIdx.toString());//Output label
9 }
10 …
11}
After instrumenting the DummyActivity to the app, we launch the DummyActivity
with an ADB command (i.e., am start -n DummyActivity). As a result, the
corresponding labels of $D$ can be obtained. The labeled dataset $D^{\prime}$
is then leveraged to train the student model.
### III-B Student Model Learning
Selection criteria for student model. The adversarial examples generated based
on the student model are used to attack the teacher model. The selection
criteria of the student model is that it should be able to complete the same
task as the teacher model. Different student models can result in different
attack success rates. We discuss this correlation in Sec. IV-B.
Student model learning. In our approach, the student model can be trained in a
supervised way with the teaching dataset generated in the previous step. In
supervised learning, the model is trained on a labeled dataset, where the
labels are used to evaluate the model’s prediction accuracy. To improve the
prediction accuracy, the model needs to adjust the weights in the process of
training. The adjusting strategy relies on the error between the model’s
predictions and the ground truths(i.e., labels). The loss function is used to
calculate this error. For example, the CrossEntropyLoss is widely used in
image classification [27].
Example. Recall the app in Sec. III-A, its task is to identify mushrooms in an
input image and predict their categories. Thus, the selected student model
must be a model related to image classification. The image classification
model VGGll [28] can be used as the student model to be trained with the
labeled teaching dataset generated in Sec. III-A. Note that a general image
classification model can be trained to identify mushrooms with a suitable
dataset.
### III-C Adversarial Examples Generation
With the trained student model in the previous step, the next step is to use
the student model to generate adversarial examples that can spoof the teacher
model. The adversarial examples are proved to have the property of
transferability [29] which means that the adversarial examples generated for
one model through an attack algorithm can also attack another model. Motivated
by this, adversarial attack algorithms are utilized to generate adversarial
examples based on the student model, and these generated adversarial examples
can be directly applied to attack the teacher model in the victim app. Note
that different domains (e.g., NLP, computer vision) require different
adversarial attack algorithms. For example, in computer vision, the following
algorithms can be representative: FGSM [22], RFGSM [30], FFGSM [31], MIFGSM
[32], PGD [33], TPGD [34], and BIM [35]. Different attack algorithms can
result in different attack performances. We discuss this correlation in Sec.
IV-D.
Figure 3: Distributions of attack success rate for differnet models
### III-D Robustness Evaluation
Given a teacher model, the teaching dataset is divided into training and
testing sets. The training set is used to train the student model and the
testing set is used to generate adversarial examples. Compared with current
methods [12] that use a very limited number of attack examples, our evaluation
set is much larger and thus our results are more convincing.
Suppose there are total $M$ inputs in the testing set for a deep learning app.
$T$ (out of $M$) inputs can be correctly classified by the teacher model.
These $T$ inputs are used to generate adversarial examples since it is
inappropriate to generate an adversarial example when the input cannot be
correctly recognized by the teacher model. Then we generate $T$ adversarial
examples with the student model through an existing attack algorithm (e.g.,
FGSM [22]). These adversarial examples are then fed to the teacher model to
obtain the prediction results. An attack is considered to be successful if the
adversarial example is misclassified by the teacher model. If $Q$ out of $T$
adversarial examples are misclassified by the teacher model, then the attack
success rate is:
$p=\frac{Q}{T}$ (1)
The quality of the student model is key to reach a high attack success rate. A
qualified student model can imitate the behavior of the teacher model well and
generate adversarial examples with higher transferability. These adversarial
examples are more likely to spoof the teacher model [29]. Therefore, we
conduct experiments to investigate the influence factors on the attack success
rate of the student model, including the scale of the teaching dataset and the
model structure of the student model. To further evaluate the effectiveness of
our method, we conduct one control experiment that uses a random pre-trained
model to generate adversarial examples termed as ‘blind attack’ (see Sec.
IV-E).
## IV Evaluation
### IV-A Experiment Settings
In the following experiments, We reuse 10 deep learning apps in the work of
Huang et al. [12] so that we can compare our approach with theirs. Considering
the workload of training student models and applying different attack methods
to generate adversarial examples, it is not trivial to experiment on 10 apps.
For example, one teaching dataset is ImageNet Large Scale Visual Recognition
Challenge 2012 (ILSVRC2012) [36] whose size is above 138GB and the number of
images is about 14 million. This takes more than a week for a computer with 8
NVIDIA Tesla K40s.
Table I: 10 selected apps
ID | App Name | Functionalities
---|---|---
1 | Fresh Fruits | Identify if the fruit is rotten
2 | Image Checker | Image classifier based on ImageNet
3 | Tencent Map | Identify road condition
4 | Baidu Image | Identify flowers
5 | My Pokemon | Identify pokemon
6 | Palm Doctor | Identify skin cancer
7 | QQ browser | Identify plants
8 | Taobao | Identify products
9 | iQIYI | Identify actors
10 | Bei Ke | Identify scenes
The selected apps are listed in Table.I. For convenience, in the following
experiments, every app is represented by its ID instead of name. Deep learning
functionalities of each app are also listed, which are useful for finding
suitable dataset.
Research questions (RQ) 1 to 3 discuss the relationship between attack
performance and student structure (RQ1), teaching dataset size (RQ2), and
hyper-parameter of attack algorithm (RQ3). We compare the attack success rates
between our approach with [12] in RQ4. All these experiments111In the process
of training student models, we set optimizer to SGD [37], loss function to
CrossEntropyLoss [38], learning rate to 0.001, and epoch to 30. are conducted
in a Linux box with Nvidia(R) GeForce RTX(TM) 3080 GPU and 128G RAM.
### IV-B RQ1: How the structure of the student model influences the attack
rate.
(a) Relationship of attack success rate and teaching dataset size
(b) Relationship of student model accuracy and teaching dataset size
Figure 4: Performance of attack and student model when varying teaching
dataset size
Motivation. The stronger the student model’s ability to imitate the teacher
model is, the higher the final attack success rate is. Since the internal
information of the teacher model is unknown, choosing the most similar student
model by comparing weights and structure can be impossible. Therefore, in this
RQ, we intend to explore how the structure of the student model influences the
attack rate and analyze the underlying reasons. The attack rate is defined in
Sec. III-D.
Approach. This RQ explores how the structure of the student model influences
the attack rate, so only one teacher model and only one attack algorithm are
needed. In this RQ, we randomly select one app (i.e., No. 1). The deep
learning model inside the app is considered as the teacher model, MIFGSM as
the attack algorithm. The teaching dataset is a dataset from Kaggle [39] with
13.6K images. The teaching dataset is shuffled and then divided into training
and testing sets at 4:1. We carefully select 16 student models that are
qualified for this image classification task. These student models are grouped
into four categories with the decrease of their model sizes and complexity:
* •
VGGs [28]: VGG11, VGG13, VGG16, VGG19;
* •
Resnets [40]: Resnet18, Resnet34, Resnet50, Resnet101, Resnet152;
* •
Densenets [41]: Densenet161, Densenet169, Densenet201; and
* •
Small nets: MobilenetV2 [42], ShufflenetV2 [43], Squeezenet [44], Googlenet
[45].
Among the above four categories, VGGs have the highest complexity in terms of
the number of weights, which is 3-4 times that of Resnets and Densenets, and
20-30 times that of Small nets. Resnets and Densenets have similar sizes and
complexity.
Result. Fig. 3 shows the comparison of attack performance among four student
model categories. The abscissa represents attack success rates in percentage,
and the ordinate gives four categories. In every single box, the triangle
represents the mean of attack success rate and the line represents the median.
The leftmost and rightmost edges represent minimum and maximum attack success
rates in the corresponding categories.
The attack success rates are divided into three segments. The first watershed
is between Small nets and Resnets, the average attack success rate of Small
nets is 29.4%, the minimum is 23.97% ($Q:T=637:2657$, where $Q$ and $T$ are
defined in Sec. III-D), and the maximum is 32.86% ($873:2657$). The second
watershed is between Densenets and VGGS. Densenets and Resnets who have
similar model complexities also have similar attack success rates. Densenets’
average attack success rate is 37.82%, the minimum is 36.88% ($980:2657$), and
the maximum is 38.92% ($1034:2657$). Resnets’ average attack success rate is
35.28%, the minimum is 33.68% ($895:2657$), and the maximum is 37.79%
($1004:2657$). The most successful student models are VGGs. Their average
attack success rate is 51.44%, the minimum is 47.42% ($1260:2657$), and the
maximum is 56.57% ($1503:2657$).
Throughout the experiment, we found that a more sophisticated student model
has a better opportunity and flexibility to adjust its weights to better
imitate the teacher model. The better the student model imitates, the stronger
the transferability of the adversarial examples generated by the student model
is.
Num. of apps. Due to page restriction, we only present the result of one app.
We also perform the same experiments on other apps and observe the same trend
on them.
Answer to RQ1 To better imitate the teacher model and reach a higher attack
success rate, a student model with a more complex structure is a better
choice. Among 16 models in 4 categories, VGGs have a relatively high average
attack success rate compared with other student model candidates.
### IV-C RQ2: How the scale of the teaching dataset can influence the attack
rate.
Figure 5: Relationship between attack success rate and paramater eps
Motivation. Training a student model on a large teaching dataset consumes
lots of time and computing resources. The size of the teaching dataset can
influence the prediction accuracy of the student model. The prediction
accuracy reflects how well the student model imitates the teacher model. Thus,
this RQ explores how the scale of the teaching dataset can influence the
attack rate.
Approach. As this RQ explores how the scale of the teaching dataset influences
the attack success rate, so only one teacher model, one attack algorithm, and
one structure of the student model are needed. In this RQ, we randomly select
one app (i.e., No.4) as the teacher model, MIFGSM as the attack algorithm, and
VGG11 trained on a teaching dataset from TensorFlow [46] with 3.6K images as
the student model.
The teaching dataset is shuffled and then divided into training and testing
sets at 4:1. The attack success rate and student model accuracy of each
student model is evaluated on the same testing set. training sets are obtained
from the left part of the teaching dataset. Note that without training, the
method degenerated to ‘blind attack’.
Result. Fig. 4(a) shows the relationship between the size of the teaching
dataset (i.e., abscissa in Fig. 4(a)) and attack success rate (i.e., ordinate
in Fig. 4(a)). For example, point (10, 28.28) represents that the attack
success rate of the student model trained on the teaching dataset with 367
images (10% of original size) is 28.28%.
Compared with the models trained on our teaching dataset (black points), the
performance of blind attack (blue points) is 2-4 times worse. It proves that a
teaching dataset generated by our pipeline is indispensable. To better reflect
the relationship, trend line is based on a logarithmic function $y=a\cdot
ln(b+x)+c$, where $a$, $b$ and $c$ control how well the trend line fits the
scattered points. The trend line shows that the attack success rate increases
rapidly and gradually stabilizes with the teaching dataset increases. With the
increase of the scale of the teaching dataset, the student model can further
adjust its weights, resulting in better imitation of the teacher model and
higher transferability of generated adversarial examples.
The reason for the gradual stabilization of the trend line needs to be
explained with the help of Fig. 4(b). The abscissa in Fig. 4(b) represents the
teaching dataset size, which is the percentage of the original dataset, and
the ordinate represents the accuracy of the student model in percentage. For
example, point (20, 86.02) represents that the prediction accuracy of the
student model trained on the teaching dataset with 687 images (20% of original
size) is 86.02%. Compared with other cases, a model without training (i.e.,
(0, 19.59) in Fig. 4(b)) has a poor performance. (20, 86.02) is a key point,
after which the accuracy of the student model becomes stable.
Higher accuracy means a higher model similarity between the student model and
the teacher model. The key point (20, 86.02) in Fig. 4(b) represents that the
imitation ability of the student model is close to its upper bound. Therefore,
further increasing the teaching dataset brings negligible improvement in terms
of the attack success rate. This is why the growth of attack success rate in
Fig. 4(a) becomes stable after this key point.
Num. of apps. Same as RQ1, we perform the same experiments on other apps and
observe the same trend on other apps.
Answer to RQ2 A teaching dataset generated by our pipeline is necessary for a
high attack success rate. The accuracy of the student model increases as the
size of the teaching dataset grows. The accuracy of the student model reflects
how well it imitates the teacher model. When the accuracy of the student model
reaches around 85%-90%, its imitation ability is close to the upper bound.
Therefore, blindly increasing the teaching dataset contribute less to the
attack performance.
### IV-D RQ3: How the hyper-parameter of attack algorithms influences the
attack performance.
(a) MIFGSM with $eps=4/255$
(b) MIFGSM with $eps=8/255$
(c) MIFGSM with $eps=12/255$
(d) MIFGSM with $eps=16/255$
(e) MIFGSM with $eps=20/255$
(f) BIM with $eps=4/255$
(g) BIM with $eps=8/255$
(h) BIM with $eps=12/255$
(i) BIM with $eps=16/255$
(j) BIM with $eps=20/255$
(k) PGD with $eps=4/255$
(l) PGD with $eps=8/255$
(m) PGD with $eps=12/255$
(n) PGD with $eps=16/255$
(o) PGD with $eps=20/255$
Figure 6: Comparison between adversarial example generated with different eps
Motivation. The attack performance is evaluated on both the attack success
rate and the degree of the added perturbation to the original input. A key
property of the adversarial example is that it is generated by adding tiny
perturbations to the original input. If perturbations are too large, they can
be noticed by human beings. If the perturbations are too small, the attack
success rate reduces. The following experiment explores how the hyper-
parameters of attack algorithms can influence attack performance.
Approach. This RQ explores how the hyper-parameters of attack algorithms
influences the attack performance, so only one teacher model and one student
model are needed. In this RQ, we randomly select one app (i.e., No.1) as the
teacher model, VGG11 trained on a teaching dataset from Kaggle [39] with 13.6K
images as the student model.
The important hyper-parameter eps controls the degree of image perturbation in
all seven attack algorithms (FGSM, BIM, RFGSM, PGD, FFGSM, TPGD, MIFGSM). eps
varies from $4/255$ to $20/255$ with step $4/255$. The initial value
$eps=4/255$ is a default value used by the author of these 7 attack algorithms
[32, 22, 30, 31, 33, 34, 35]. We set the end value to $eps=20/255$. Although
larger $eps$ can bring a higher attack success rate, the perturbations of the
image also become larger. A higher degree of perturbations brings a more
significant difference between the original input image and the adversarial
example. As a result, people can distinguish the difference between the
original input and the adversarial example. To ensure the degree of the
perturbations is minuscule, the maximum of eps is set to $20/255$. This
reduces the upper bound of the success rate but can ensure perturbations to be
unperceivable.
Result. As shown in Fig. 5, the attack success rate of FGSM ranges from 23.22%
($617:2657$) to 48.74% ($1295:2657$), RFGSM ranges from 1.96% ($52:2657$) to
48.85% ($1298:2657$), FFGSM ranges from 22.28% ($592:2657$) to 51.79%
($1376:2657$), TPGD ranges from 21.11% ($561:2657$) to 40.72% ($1082:2657$),
MIFGSM ranges from 34.25% ($910:2657$) to 71.47% ($1899:2657$), BIM ranges
from 34.36% ($913:2657$) to 62.93% ($1672:2657$), and PGD ($914:2657$) ranges
from 34.40% ($1668:2657$) to 62.97%. All algorithms reach its highest attack
succes rate with $eps=20/255$.
Fig. 5 also indicates that different attack algorithms have different
sensitivity to the adjustment of eps. However, $eps=8/255$ is an important
watershed for all seven attack algorithms. When $eps\leq 8/255$, the attack
success rate decrease rapidly. This is because that the perturbations are too
minuscule to spoof the teacher model.
Another important watershed is $eps=16/255$. As shown in Fig. 6, when $eps\geq
16/255$ ($4^{th}$ and $5^{th}$ colomun in Fig. 6) the adversarial examples
have relatively large perturbations. Such perturbation can be detected by
human beings, which causes the adversarial example unqualified.
Since attack performance is determined by the success rate and the degree of
perturbation, we evaluate the performance on both sides.
$\bullet$ Attack success rate. MIFGSM shows the highest attack success rate
through all 7 attack algorithms, reaching 71.47% when $eps=20/255$. Also, it
can maintain a relatively rapid growth rate after the first watershed
$eps=8/255$. The reason for its strong attack capability is that the
adversarial examples generated by it are more transferable. Compared with
other FGSM based attack algorithms, the highest attack success rates of FFGSM,
RFGSM, and FGSM are 51.79%, 48.85%, and 48.74%, respectively. The reason why
MIFGSM outperforms other algorithms is that it invites the momentum term into
the iterative process [32].
$\bullet$ Degree of perturbation. Although the attack success rate of MIFGSM
keeps increasing quickly after both watersheds, the perturbations in
adversarial examples become detectable by the human visual system when
$eps\geq 16/255$. This behavior is common among all 4 FGSM based attack
algorithms, so adjusting eps to $16/255$ or higher is not recommended when
using this type of algorithm. For BIM and PGD, the highest attack success
rates of them are the same (62.93%). Although the attack success rate is less
than MIFGSM’s, the degree of perturbation in their generated adversarial
example is much smaller than MIFGSM. Therefore BIM and PGD with $eps\geq
16/255$ are recommended.
Num. of apps. Same as RQ1, we perform the same experiments on other apps and
observe the same trend on other apps.
Answer to RQ3 An ideal eps interval is [8/255, 16/255]. Keeping eps in this
interval can guarantee a higher attack success rate with limited added
perturbation.
### IV-E RQ4: Comparison among our approach, ModelAttacker and blind attack
Motivation. We compare the performance among our approach, ModelAttacker
proposed by Huang et al. [12] and blind attack on 10 apps in Table. I. The
experiment settings of ModelAttacker and blind attack are as same as our
approach.
Approach. The attack success rates of all apps in Table. I are tested with the
best student model structure, the most cost-effective teaching dataset size,
and attack algorithms with a suitable value of eps (defined in Sec. IV-D).
Teaching dataset. The teaching datasets for most apps are fetched from public
datasets, including Kaggle-Fruit [39] (No. 1), ILSVRC2012 [36] (No. 2, 8, 10),
Kaggle-Road [47] (No. 3), Tendorflow-Flowers [46] (No. 4), Kaggle-Pokemon [48]
(No. 5), and HAM10000 [49] (No. 6). For the other 2 apps (No. 7, 9), the
teaching datasets are crawled from Google Images [50]. These datasets are
available in our online artefact [13]. Each teaching dataset is shuffled and
then divided into training and testing sets at 4:1.
Student model. Based on the result of RQ1, we select VGG11 as the student
model for all 10 apps.
Attack algorithm. Based on the result of RQ3, we select MIFGSM as the attack
algorithm and set $eps$ to $12/255$.
Result. As shown in Fig. 7, the height of the first bar for each app
represents our attack success rate, the second is for ModelAttacker, and the
third is for the blind attack. Apps with No.4,5,6,7,10 can be attacked by the
blind attack so the other 5 apps do not have the bars to show the results of
blind attack.
Figure 7: Comparison among our approach, ModelAttacker and blind attack
The range of our attack success rate is from 34.98% to 91.10% and on average
is 66.60%. Our approach does not need the weights and structures of deep
learning models inside the victim apps. Although with these constraints, our
approach still gets a higher attack success rate for 8 of 10 apps compared
with ModelAttacker. Specifically, the attack success rate of our approach is
8.27% to 50.03% higher than ModelAttacker, and on average is 36.79% higher
than ModelAttacker.
For the left 2 apps, ModelAttacker can reach a higher attack success rate.
This is because that they can compare the similarity between the victim model
(i.e., teacher model) and their substitute model (i.e., student model) with
the knowledge of weights and structure of the teacher model [12]. However, our
approach is a black box attack so the weights and structure of the teacher
model are unknown.
Compared with blind attack which is the common basic black-box attack method,
our approach can attack all 10 apps successfully while the blind attack can
only attack 5 of them. Meanwhile, the attack success rate of our approach is
at least 2.6 times higher than the blind attack.
Answer to RQ4 Our approach can indeed effectively attack 10 selected deep
learning apps, thus providing a new perspective and method for evaluating app
reliability. Compared with existing methods, we can reach a relatively high
attack success rate of 66.60% on average, outperforming others by 27.63%.
## V Discussion
### V-A Threats to Validity
To minimize the bias of the results, all three experiments in this paper vary
a single variable while fixing other variables to evaluate its impact on
attack performance. Different from other studies on deep learning apps [11,
12], our experiments are based on a larger dataset and generate a considerable
number of adversarial examples for the victim app in each experiment.
Considering the workload of training, we select 10 apps that are also used by
[12] to evaluate our approaches. Since the success rates of attacks are based
on these apps, we do not attempt to generalize our results to all deep
learning apps.
### V-B Limitations
Our study has two limitations. The main limitation is that our approach only
suitable for non-obfuscated apps. To get the teaching dataset from a teacher
model inside the app, we have to locate and learn how the model is loaded and
used in the app. However, if protection techniques, such as code obfuscation,
are applied to the app, it can be hard to find the API patterns. Another
limitation is that the pipeline developed in this paper focuses on computer
vision apps. On the one hand, the existing studies [12, 11] on adversarial
attacks are mainly in this field. It can be easy to compare our work with
other approaches. On the other hand, adversarial attacks in other deep
learning fields lack a widely accepted evaluation standard. Without widely
adopted and convincing criteria, it can be unfair to compare the results of
our approach with others [51, 52]. Thus, we only consider computer vision apps
in our experiments.
### V-C Consequences of Proposed Attacks
From the perspective of a malicious attacker, the adversarial examples can
threaten users’ property, privacy, and even safety. Dong et al. [53] applied
adversarial examples to a real-world face recognition system successfully. As
a popular way to unlock devices, the breach of the face recognition system
means users’ privacy is at risk of leakage. Although it is not easy to use
adversarial examples in the real world, relevant research has made progress
[54, 55, 56]. The threat of adversarial examples is worthy of attention.
### V-D Countermeasure
According to the study by Sun et al. [10], only 59% of deep learning apps have
protection methods for their models. To fill this gap, we propose several
protection methods for both deep learning models and deep learning apps.
Deep learning model protection scheme. To protect the deep learning model
inside an app from black-box attacks, there are two practical solutions:
$\bullet$ Using self-developed deep learning models instead of open-source
models can reduce the probability of being attacked. For a self-developed deep
learning model, it can be hard to find or train a qualified student model to
imitate the teacher model. Without a qualified student model, it can be hard
to reach a high attack success rate; and
$\bullet$ Training the deep learning model on a private dataset instead of a
public dataset can reduce the success rate of being attacked. The size of the
teaching dataset is critical for training a qualified student model (See Sec.
IV-C). If the deep learning model inside the app is trained on a public
dataset, the attacker can find the same dataset with ease. A student model can
gain a powerful imitating ability by being trained on the same dataset as the
teacher model. As a result, the adversarial examples generated on the student
model can spoof the teacher model with a high success rate.
Deep learning app protection scheme. Using a self-developed deep learning
model and collecting a private dataset is time-consuming and costly. There are
also some common techniques to protect deep learning apps from being attacked
[10, 11, 12]:
$\bullet$ Code obfuscation can prevent attackers from finding out how the apps
invoke the deep learning models. As a result, attackers cannot generate a
labeled teaching dataset by instrumenting a DummyActivity. Thus, the attack
method degenerates to the blind attack with a low attack success rate;
$\bullet$ Hash code can prevent attackers from modifying the model inside the
victim app. Li et al. [11] use images with special patterns to fool the models
by adding specific layers into deep learning models inside apps. With hash
code, such backdoor attacks can be detected with ease; and
$\bullet$ Encryption can prevent attackers from knowing the structure and
weights of the model. It is a fundamental method to protect the deep learning
model inside the app. Without the knowledge of the victim model’s structure
and weights, attackers can only rely on black-box attack methods, which can be
time-consuming (i.e., finding dataset, training the student model).
## VI Related Work
### VI-A Substitute-based adversarial attacks
To overcome black-box attacks’ unreachability to the internals of victim deep
learning models, attackers can train a local model to mimic the victim model,
which is called substitute training. With the in-depth study of black-box
attacks on deep learning models, substitute-based adversarial attacks have
received a lot of attention. Cui et al. [57] proposed an algorithm to generate
the substitute model of CNN models by using knowledge distillation and boost
the attacking success rate by 20%. Gao et al. [58] integrated linear
augmentation into substitute training and achieved success rates of 97.7% and
92.8% in MNIST and GTSRB classifiers. In addition, some researchers studied
substitute attacks from a data perspective. Wang et al. [59] proposed a
substitute training approach that designs the distribution of data used in the
knowledge stealing process. Zhou et al. [60] proposed a data-free substitute
training method (DaST) to obtain substitute models by utilizing generative
adversarial networks (GANs). However, the research on how to apply substitute-
based adversarial attacks to the apps and the analysis of their performance is
lacking. This paper fills the blank in this direction.
### VI-B Deep Learning Model Security of Apps
Previous works on the security of deep learning models in mobile apps mainly
focus on how to obtain information about the structure and weights of the
model. Sun et al. [10] developed a pipeline that can analyze the model
structure and weights and revealed that many deep learning models can not be
extracted directly from mobile apps by decompiling the apks. Huang et al. [12]
developed a pipeline to find the most similar model on TensorFlow Hub and then
use it to generate adversarial examples. However, they still need to know the
information of layers in the model to calculate similarity, which is used to
find the most similar model on TensorFlow Hub for launching attacks. Different
from Huang et al.’s work [12], we do not require the knowledge of the
structure and weights of the model. Li et al. [11] proved the possibility to
perform backdoor attacks on deep learning models and succeeded to use images
with unique patterns to fool the models. To perform such attacks, Li et al.
[11] modified the internal structure of the model inside the app. Whereas, as
a black-box approach, we do not need to alter anything inside the deep
learning model. Different from existing works, our work focuses on
investigating the security of the deep learning models in mobile apps in a
complete black-box manner. Our work offers a new perspective and shed the
light on security research in deep learning models for mobile.
### VI-C Adversarial Attacks and Defenses to Deep Learning Model
Adversarial attacks show their power in spoofing deep learning models related
to computer vision. Researches on image classification attack methods account
for a large part. The most popular technique is adversarial image
perturbations (AIP) [61]. Dai et al. [62] developed an attack method based on
genetic algorithms and gradient descent, which demonstrates that the Graph
Neural Network models are vulnerable to these attacks. Stepan Komkov and
Aleksandr Petiushko [63] proposed a reproducible technique to attack a real-
world Face ID system. Baluja et al. [64] developed an Adversarial
Transformation Network (ATN) to generate adversarial examples. It reaches a
high success rate on MNIST-digit classifiers and Google ImageNet classifiers.
As adversarial attacks pose a huge threat to deep learning models, researches
on how to protect models from such attacks have also drawn wide attention. Li
et al. [65] presented the gradient leaking hypothesis to motivate effective
defense strategies. Liao et al. [66] proposed a high-level representation
guided denoiser (HGD) as a defense for deep learning models related to image
classification. Zhou et al. [67] proposed a defense method to improve the
robustness of DNN-based image ranking systems. Cissé et al [68] proposed
Parseval networks to improve robustness to adversarial examples. Alexandre et
al. [69] used a Randomized Adversarial Training method to improve the
robustness of deep learning neural networks.
However, even though there are a lot of researches on the adversarial attack
and defense methods of deep learning models, research on this topic about
mobile apps is scant. Our work proves that a black-box attack on the deep
learning model inside the apps is feasible and provides a new perspective to
evaluate the robustness of deep learning apps.
## VII Conclusion
In this paper, we propose a practical black-box attack approach on deep
learning apps and develop a corresponding pipeline. The experiment on 10 apps
shows that the average attack success rate reaches 66.60%. Compared with
existing adversarial attacks on deep learning apps, our approach outperforms
counterparts by 27.63%. We also discuss how student model structure, teaching
dataset size, and hyper-parameters of attack algorithms can affect attack
performance.
## References
* [1] M. Xu, J. Liu, Y. Liu, F. X. Lin, Y. Liu, and X. Liu, “A first look at deep learning apps on smartphones,” in _Proceedings of WWW_ , 2019, pp. 2125–2136.
* [2] “Tensorflow lite,” https://tensorflow.google.cn/lite/.
* [3] “Pytorch mobile,” https://pytorch.org/mobile/home/.
* [4] “Caffe2 mobile,” https://caffe2.ai/docs/mobile-integration.html.
* [5] “Mindspore lite,” https://www.mindspore.cn/lite/en.
* [6] “Coreml,” https://developer.apple.com/machine-learning/core-ml/.
* [7] “Firebase-cloud vs on-device,” https://firebase.google.com/docs/ml#cloud_vs_on-device.
* [8] A. McIntosh, S. Hassan, and A. Hindle, “What can android mobile app developers do about the energy consumption of machine learning?” _Empirical Software Engineering_ , vol. 24, no. 2, pp. 562–601, 2019.
* [9] C. Kumar, R. Ryan, and M. Shao, “Adversary for social good: Protecting familial privacy through joint adversarial attacks,” in _Proceedings of AAAI_ , 2020, pp. 11 304–11 311.
* [10] Z. Sun, R. Sun, L. Lu, and A. Mislove, “Mind your weight(s): A large-scale study on insufficient machine learning model protection in mobile apps,” in _Proceedings of the 30th USENIX Security Symposium_ , ser. Processings of USENIX Security, August 2021, pp. 1–17.
* [11] Y. Li, J. Hua, H. Wang, C. Chen, and Y. Liu, “Deeppayload: Black-box backdoor attack on deep learning models through neural payload injection,” in _Proceedings of ICSE-SEIP_ , 2021, pp. 1–12.
* [12] Y. Huang, H. Hu, and C. Chen, “Robustness of on-device models: Adversarial attack to deep learning models on android apps,” in _Proceedings of ICSE-SEIP_ , 2021, pp. 1–12.
* [13] “Online artefact,” https://sites.google.com/view/blackbox-attack-on-dl-apps/home.
* [14] X. Yin, X. Yu, K. Sohn, X. Liu, and M. Chandraker, “Feature transfer learning for face recognition with under-represented data,” in _Proceedings of CVPR_ , 2019, pp. 5704–5713.
* [15] D. Zoran, M. Chrzanowski, P. Huang, S. Gowal, A. Mott, and P. Kohli, “Towards robust image classification using sequential attention models,” in _Proceedings of CVPR_ , 2020, pp. 9480–9489.
* [16] J. Chen, C. Chen, Z. Xing, X. Xu, L. Zhut, G. Li, and J. Wang, “Unblind your apps: Predicting natural-language labels for mobile gui components by deep learning,” in _Proceedings of ICSE_ , 2020, pp. 322–334.
* [17] P. Dong, S. Wang, W. Niu, C. Zhang, S. Lin, Z. Li, Y. Gong, B. Ren, X. Lin, and D. Tao, “Rtmobile: Beyond real-time mobile acceleration of rnns for speech recognition,” in _Proceedings of DAC_ , 2020, pp. 1–6.
* [18] Q. Wang, H. Yin, T. Chen, Z. Huang, H. Wang, Y. Zhao, and N. Q. V. Hung, “Next point-of-interest recommendation on resource-constrained mobile devices,” in _Proceedings of WWW_ , 2020, pp. 906–916.
* [19] “Tensorflow hub,” https://www.tensorflow.org/hub.
* [20] “Mindspore,” https://www.mindspore.cn/lite/models/en.
* [21] T. Tan and G. Cao, “Fastva: Deep learning video analytics through edge processing and npu in mobile,” in _Proceedings of INFOCOM_ , 2020, pp. 1947–1956.
* [22] I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,” in _Proceedings of ICLR_ , 2015, pp. 1–11.
* [23] “Soot:a java optimization framework,” https://github.com/soot-oss/soot.
* [24] “Flowdroid,” https://github.com/secure-software-engineering/FlowDroid.
* [25] “Tensorflow lite inference,” https://tensorflow.google.cn/lite/guide/inference#load_and_run_a_model_in_java.
* [26] “Pytorch mobile inference,” https://pytorch.org/mobile/android/#api-docs.
* [27] H. Takeda, S. Yoshida, and M. Muneyasu, “Learning from noisy labeled data using symmetric cross-entropy loss for image classification,” in _Proceedings on GCCE_ , 2020, pp. 709–711.
* [28] K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” in _Proceedings of ICLR_ , 2015, pp. 1–14.
* [29] Y. Liu, X. Chen, C. Liu, and D. Song, “Delving into transferable adversarial examples and black-box attacks,” in _Proceedings of ICLR_ , 2017, pp. 1–14.
* [30] F. Tramèr, A. Kurakin, N. Papernot, I. J. Goodfellow, D. Boneh, and P. D. McDaniel, “Ensemble adversarial training: Attacks and defenses,” in _Proceedings of ICLR_ , 2018, pp. 1–22.
* [31] H. Kim, “Torchattacks: A pytorch repository for adversarial attacks,” _arXiv preprint arXiv:2010.01950_ , pp. 1–6, 2020.
* [32] Y. Dong, F. Liao, T. Pang, H. Su, J. Zhu, X. Hu, and J. Li, “Boosting adversarial attacks with momentum,” in _Proceedings of CVPR_ , 2018, pp. 9185–9193.
* [33] A. Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu, “Towards deep learning models resistant to adversarial attacks,” in _Proceedings of ICLR_ , 2018, pp. 1–28.
* [34] H. Zhang, Y. Yu, J. Jiao, E. P. Xing, L. E. Ghaoui, and M. I. Jordan, “Theoretically principled trade-off between robustness and accuracy,” in _Proceedings of ICML_ , 2019, pp. 7472–7482.
* [35] A. Kurakin, I. J. Goodfellow, and S. Bengio, “Adversarial examples in the physical world,” in _Proceedings of ICLR_ , 2017, pp. 1–15.
* [36] “Imagenet,” http://www.image-net.org/challenges/LSVRC/2012/index.
* [37] “Pytorch sgd,” https://pytorch.org/docs/master/generated/torch.optim.SGD.html.
* [38] “Pytorch crossentropyloss,” https://pytorch.org/docs/stable/generated/torch.nn.CrossEntropyLoss.html.
* [39] “Kaggle dataset-fruit,” https://www.kaggle.com/sriramr/fruits-fresh-and-rotten-for-classification.
* [40] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in _Proceedings of CVPR_ , 2016, pp. 770–778.
* [41] G. Huang, Z. Liu, L. Van Der Maaten, and K. Q. Weinberger, “Densely connected convolutional networks,” in _Proceedings of CVPR_ , 2017, pp. 4700–4708.
* [42] M. Sandler, A. G. Howard, M. Zhu, A. Zhmoginov, and L. Chen, “Mobilenetv2: Inverted residuals and linear bottlenecks,” in _Proceedings of CVPR_ , 2018, pp. 4510–4520.
* [43] N. Ma, X. Zhang, H.-T. Zheng, and J. Sun, “Shufflenet v2: Practical guidelines for efficient cnn architecture design,” in _Proceedings of ECCV_ , 2018, pp. 116–131.
* [44] F. N. Iandola, S. Han, M. W. Moskewicz, K. Ashraf, W. J. Dally, and K. Keutzer, “Squeezenet: Alexnet-level accuracy with 50x fewer parameters and¡ 0.5 mb model size,” _arXiv preprint arXiv:1602.07360_ , pp. 1–13, 2016.
* [45] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, “Going deeper with convolutions,” in _Proceedings of CVPR_ , 2015, pp. 1–9.
* [46] “Tensorflow dataset,” https://www.tensorflow.org/datasets/catalog/tf_flowers.
* [47] “Kaggle dataset-road,” https://www.kaggle.com/virenbr11/pothole-and-plain-rode-images.
* [48] “Kaggle dataset-pokemon,” https://www.kaggle.com/lantian773030/pokemonclassification.
* [49] “Ham10000,” https://dataverse.harvard.edu/dataset.xhtml?persistentId=doi:10.7910/DVN/DBW86T.
* [50] “Google images,” https://images.google.com/.
* [51] J. Dong, Z. Guan, L. Wu, X. Du, and M. Guizani, “A sentence-level text adversarial attack algorithm against iiot based smart grid,” _Computer Networks_ , pp. 1–11, 2021.
* [52] X. Wang, H. Jin, and K. He, “Natural language adversarial attacks and defenses in word level,” _arXiv preprint arXiv:1909.06723_ , pp. 1–16, 2019.
* [53] Y. Dong, H. Su, B. Wu, Z. Li, W. Liu, T. Zhang, and J. Zhu, “Efficient decision-based black-box adversarial attacks on face recognition,” in _Proceedings of CVPR_ , 2019, pp. 7714–7722.
* [54] L. Sun, M. Tan, and Z. Zhou, “A survey of practical adversarial example attacks,” _Cybersecur._ , pp. 1–9, 2018.
* [55] A. Boloor, X. He, C. D. Gill, Y. Vorobeychik, and X. Zhang, “Simple physical adversarial examples against end-to-end autonomous driving models,” in _Proceedings of ICESS_ , 2019, pp. 1–7.
* [56] X. Xu, J. Chen, J. Xiao, L. Gao, F. Shen, and H. T. Shen, “What machines see is not what they get: Fooling scene text recognition models with adversarial text images,” in _Proceedings of CVPR_ , 2020, pp. 12 304–12 314.
* [57] W. Cui, X. Li, J. Huang, W. Wang, S. Wang, and J. Chen, “Substitute model generation for black-box adversarial attack based on knowledge distillation,” in _Proceedings of ICIP_ , 2020, pp. 648–652.
* [58] X. Gao, Y.-a. Tan, H. Jiang, Q. Zhang, and X. Kuang, “Boosting targeted black-box attacks via ensemble substitute training and linear augmentation,” _Applied Sciences_ , pp. 1–14, 2019.
* [59] W. Wang, B. Yin, T. Yao, L. Zhang, Y. Fu, S. Ding, J. Li, F. Huang, and X. Xue, “Delving into data: Effectively substitute training for black-box attack,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)_ , 2021, pp. 4761–4770.
* [60] M. Zhou, J. Wu, Y. Liu, S. Liu, and C. Zhu, “Dast: Data-free substitute training for adversarial attacks,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)_ , 2020, pp. 234–243.
* [61] S. J. Oh, M. Fritz, and B. Schiele, “Adversarial image perturbation for privacy protection a game theory perspective,” in _Proceedings of ICCV_ , 2017, pp. 1491–1500.
* [62] H. Dai, H. Li, T. Tian, X. Huang, L. Wang, J. Zhu, and L. Song, “Adversarial attack on graph structured data,” in _Proceedings of ICML_ , 2018, pp. 1115–1124.
* [63] S. Komkov and A. Petiushko, “Advhat: Real-world adversarial attack on arcface face ID system,” _CoRR_ , pp. 1–9, 2019.
* [64] S. Baluja and I. Fischer, “Learning to attack: Adversarial transformation networks,” in _Proceedings of AAAI_ , 2018, pp. 1–13.
* [65] Y. Li, S. Cheng, H. Su, and J. Zhu, “Defense against adversarial attacks via controlling gradient leaking on embedded manifolds,” in _Proceedings of ECCV_ , 2020, pp. 753–769.
* [66] F. Liao, M. Liang, Y. Dong, T. Pang, X. Hu, and J. Zhu, “Defense against adversarial attacks using high-level representation guided denoiser,” in _Proceedings of CVPR_ , 2018, pp. 1778–1787.
* [67] M. Zhou, Z. Niu, L. Wang, Q. Zhang, and G. Hua, “Adversarial ranking attack and defense,” in _Proceedings of ECCV_ , 2020, pp. 781–799.
* [68] M. Cissé, P. Bojanowski, E. Grave, Y. N. Dauphin, and N. Usunier, “Parseval networks: Improving robustness to adversarial examples,” in _Proceedings of ICML_ , 2017, pp. 854–863.
* [69] A. Araujo, R. Pinot, B. Négrevergne, L. Meunier, Y. Chevaleyre, F. Yger, and J. Atif, “Robust neural networks using randomized adversarial training,” _CoRR_ , pp. 1–9, 2019.
| arxiv-papers | 2021-07-27T11:15:46 | 2024-09-04T03:07:21.290118 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Hongchen Cao, Shuai Li, Yuming Zhou, Ming Fan, Xuejiao Zhao and Yutian\n Tang",
"submitter": "Hongchen Cao",
"url": "https://arxiv.org/abs/2107.12732"
} |
2107.12733 | Stress-driven two-phase integral elasticity for Timoshenko curved beams
Preprint of the article published in
Proceedings of the Institution of Mechanical Engineers, Part N: Journal of
Nanomaterials, Nanoengineering and Nanosystems
235(1-2), February 2021, 52-63
Marzia Sara Vaccaro,
Francesco Paolo Pinnola,
Francesco Marotti de Sciarra,
Marko Canadija,
Raffaele Barretta
https://doi.org/10.1177/2397791421990514
ⓒ 2021. This manuscript version is made available under the CC-BY-NC-ND 4.0
license http://creativecommons.org/licenses/by-nc-nd/4.0/
###### Abstract
In this research, the size-dependent static behaviour of elastic curved stubby
beams is investigated by Timoshenko kinematics. Stress-driven two-phase
integral elasticity is adopted to model size effects which soften or stiffen
classical local responses. The corresponding governing equations of nonlocal
elasticity are established and discussed, non-classical boundary conditions
are detected and an effective coordinate-free solution procedure is proposed.
The presented mixture approach is elucidated by solving simple curved small-
scale beams of current interest in Nanotechnology. The contributed results
could be useful for design and optimization of modern sensors and actuators.
###### keywords:
Curved beams, size effects, integral elasticity, stress-driven mixture model,
nanotechnology, MEMS/NEMS
Raffaele Barretta
Department of Structures for Engineering and Architecture
University of Naples Federico II, via Claudio 21, 80125 - Naples, Italy.
## 1 Introduction
Analysis and modelling of scale phenomena in micro- and nano-structures is a
subject of current interest in Engineering Science (Farajpour et al., 2018).
Development of simple and computationally convenient methodologies for design
and optimization of modern devices (Tran et al., 2018; Basutkar, 2019a;
Caplins et al., 2019; Ogi et al., 2019; Natsuki, 2019; Basutkar, 2019b;
Ghayesh and Farokhi, 2020) and nanocomposites (Pourasghar and Chen, 2019;
Eyvazian et al., 2020; Omari et al., 2020) has been the main motivation of
numerous investigations. Crucial point is to take in due account small-scale
effects which are technically significant and cannot be overlooked (Rafii-
Tabar et al., 2016). Assessment of size effects can be advantageously
performed by making recourse to tools and techniques of nonlocal continuum
mechanics rather than time consuming atomistic approaches (Ghavanloo, 2019).
Seminal treatments on nonlocal theory of elasticity, based on integro-
differential formulations, were mainly conceived to be applied to engineering
problems involving dislocations and waves (Rogula, 1965, 1976, 1982; Eringen,
1972). Basic concepts of nonlocal mechanics can be consulted in the paper by
Bazant and Jirásek (2002). Strain-driven integral formulations were reverted
by Eringen (1983) to more convenient sets of differential equations due to
tacit and rapid vanishing of nonlocal fields governing relevant convolutions
defined in unbounded domains. Such a mathematical scenario has been recently
proven to be not permissible if strain-driven integral equations of pure
elasticity are exploited in order to describe size effects in small-scale
structures of technical interest. This issue has been comprehensively
discussed by Romano et al. (2017a) and recently acknowledged by the scientific
community, see e.g. (Sidhardh et al., 2020; Zhang et al., 2020; Dilena et al.,
2019; Shahsavari et al., 2018; Vila et al., 2017). Several proposals have been
contributed in literature to bypass the apparent conflict between equilibrium
and non-classical constitutive boundary conditions associated with the strain-
driven integral convolution. An example is the integral approach illustrated
and applied to nanorods by Maneshi et al. (2020), framed in the research field
of nonlocal models providing compensation of boundary effects (Pijaudier-Cabot
and Bazánt, 1987; Borino et al., 2003; Polizzotto et al., 2004; Koutsoumaris
et al., 2017; Fuschi et al., 2019). As applied by Polizzotto (2001), Eringen’s
integral approach can be amended by considering a strain-driven two-phase
(local/nonlocal) mixture (Eringen, 1987) which leads to well-posed
elastostatic problems, provided that the local contribution is not vanishing
(Romano et al., 2017b). The strain-driven mixture has been exploited by
various authors (Khodabakhshi and Reddy, 2015; Wang et al., 2016; Fernández-
Sáez and Zaera, 2017) to model straight structures in several papers and
recently by Zhang et al. (2019) to study circular curved beams. Total remedy
to difficulties and singularity of Eringen’s formulations in structural
mechanics are overcome if the stress-driven integral methodology (Romano and
Barretta, 2017) is adopted for modelling size effects. The well-posed approach
has been recently extended by Barretta et al. (2018) to capture both softening
and stiffening elastic responses characterizing small structural scales by
proposing for straight beams a stress-driven two-phase (local/nonlocal)
mixture which is non-singular for any local fraction.
Motivation of the present paper is to generalize the aforementioned stress-
driven mixture formulation to stubby curved beams which are basic structural
components of modern micro- and nano-systems. The proposed methodology is
valid for arbitrary geometry of beam axis and provides the following special
treatments involving:
1. 1.
stress-driven integral slender (Bernoulli-Euler) beams (Barretta et al.,
2019b);
2. 2.
stress-driven integral stubby (Timoshenko) beams with uniform geometric
curvature of the structural axis (Zhang et al., 2020).
While the strategies contributed by Barretta et al. (2019b); Zhang et al.
(2020) are able to capture hardening structural behaviours for increasing
nonlocal parameter, the approach developed in the present paper is
conveniently able to model also softening elastic responses. Accordingly, the
proposed model can be applied to a wider class of applicative problems in
nanomechanics. The plan is the following. Timoshenko kinematic assumptions and
ensuing equilibrium equations of curved beams are provided in the next section
using a coordinate-free variational approach. Classical local constitutive
equations of elasticity for stubby beams are recalled and extended in the
section named: ”Stress-driven mixture model” to tackle two-phase
local/nonlocal materials. The associated elastostatic problem is formulated
and tackled by a simple solution procedure illustrated in the section
entitled: ”Elastic equilibrium of Timoshenko curved nanobeams”. Selected case-
studies of nanotechnological interest are then investigated and discussed.
Closing remarks are outlined in the last section.
## 2 Kinematics and equilibrium of Timoshenko curved beams
Let us consider a Timoshenko curved beam of length $L$ and denote by
$\boldsymbol{\gamma}$ a regular curve of the plane $\,\boldsymbol{\pi}\,$
describing the beam axis and parameterized by the curvilinear abscissa
$s\in[0,L]$.
Figure 1: Sketch of a Timoshenko beam with local triad and kinematic
parameters.
At each point of the axis is associated a cross-section modeled by a two-
dimensional domain $\Omega$. Denoting by $\,(\bullet)^{\prime}\,$ the
derivative with respect to $s$, the tangent unit vectors field is defined as
$\textbf{t}:=\boldsymbol{\gamma}^{\prime}$ (1)
By applying the orthogonal linear transformation R , which performs the
rotation by $\pi/2$ counterclockwise in the plane $\,\boldsymbol{\pi}\,$, the
transversal unit vectors field is obtained as
$\textbf{t}_{\bot}:=\textbf{R}\textbf{t}$ (2)
Then, we introduce the uniform unit vectors field
$\,\textbf{k}:=\textbf{t}\times\textbf{t}_{\bot}\,$.
Since the curve $\boldsymbol{\gamma}$ is assumed to be regular, the vector
$\textbf{t}^{\prime}$ is defined at each abscissa $s$. Thus, introducing the
scalar geometric curvature of the beam axis $\,c:=\|\textbf{t}^{\prime}\|\,$,
the normal unit vector is defined by $\,\mathbf{n}:=\textbf{t}^{\prime}/c\,$.
Vectors $\,\textbf{t}_{\bot}\,$ and $\,\mathbf{n}\,$ are related as (Romano,
2002) $\,\textbf{t}_{\bot}=(\textbf{t}_{\bot}\cdot\mathbf{n})\,\mathbf{n}\,$.
The kinematic hypothesis of the Timoshenko beam model is that cross-sections
are hinged to the beam axis; thus, denoting by $\,V\,$ the linear space of
translations, the velocity $\,\mathbf{v}:[0,\textrm{L}]\mapsto V\,$ of the
beam axis and the angular velocity of cross sections
$\,\omega:[0,\textrm{L}]\mapsto\Re\,$ are independent parameters describing
the beam kinematics.
The tangent deformation field kinematically compatible with
$\mathbf{w}=\\{\mathbf{v},\>\omega\\}$ is composed of axial strain, shear
strain and flexural curvature scalar fields, i.e.
$\\{\varepsilon_{\mathbf{w}},\gamma_{\mathbf{w}},\chi_{\mathbf{w}}\\}:[0,L]\mapsto\Re$.
$\mathbf{D}_{\mathbf{w}}=\begin{vmatrix}\varepsilon_{\mathbf{w}}\\\
\gamma_{\mathbf{w}}\\\
\chi_{\mathbf{w}}\end{vmatrix}=\begin{vmatrix}\mathbf{v}^{\prime}\cdot\textbf{t}\\\
(\mathbf{v}^{\prime}\cdot\textbf{t}_{\bot})-\omega\\\
\omega^{\prime}\end{vmatrix}$ (3)
By duality with the tangent deformation field $\mathbf{D}_{\mathbf{w}}$, the
stress $\,\boldsymbol{\sigma}\,$ in a Timoshenko beam is composed of axial
force, shear force and bending moment scalar fields, that is
$\\{N,T,M\\}:[0,L]\mapsto\Re\,$.
$\boldsymbol{\sigma}=\begin{vmatrix}N\\\ T\\\ M\end{vmatrix}$ (4)
Equilibrium is expressed by the variational condition that the external
virtual power of the force system l is equal to the internal virtual power of
the stress $\,\boldsymbol{\sigma}\,$, for any virtual translation velocity and
angular velocity, i.e.
$\delta\mathbf{w}=\\{\delta\mathbf{v},\>\delta\omega\\}$, fulfilling
homogeneous kinematic boundary conditions
$\displaystyle{\langle}\kern 1.00006pt\textbf{{l}},\delta\mathbf{w}\kern
1.00006pt{\rangle}=\int_{0}^{L}\boldsymbol{\sigma}(s)\cdot\mathbf{D}_{\delta\mathbf{w}}(s)\,ds$
(5)
Integrating by parts Eq. (5) we get vector differential equation and boundary
conditions ruling equilibrium between stress $\,\boldsymbol{\sigma}\,$ and
external force system l which is composed of a distributed vector loading
$\,\mathbf{p}:[0,L]\mapsto V\,$, distributed bending couples
$\,m:[0,L]\mapsto\Re\,$, boundary concentrated forces $\,{\mathbf{F}}_{0}\in
V\,$ and $\,{\mathbf{F}}_{L}\in V\,$ and boundary concentrated bending couples
$\,\mathcal{M}_{0}\in\Re\,$ and $\,\mathcal{M}_{L}\in\Re\,$.
Then, projecting the vector differential equation of equilibrium along t and
$\textbf{t}_{\bot}$ directions we get the following differential problem in
$\,[0,\textrm{L}]\,$
$\left\\{\begin{aligned}
&N^{\prime}-T\,\textbf{t}_{\bot}\cdot\textbf{t}^{\prime}=-\mathbf{p}\cdot\textbf{t}\,\\\
&T^{\prime}-N\,\textbf{t}\cdot\textbf{t}_{\bot}^{\prime}=-\mathbf{p}\cdot\textbf{t}_{\bot}\,\\\
&T+M^{\prime}=-m\end{aligned}\right.$ (6)
equipped with the boundary conditions at $\,s=0\,$ and $\,s=L\,$
$\left\\{\begin{aligned}
-(N\textbf{t}+T\textbf{t}_{\bot})(0)\cdot\delta\mathbf{v}(0)&={\mathbf{F}}_{0}(0)\cdot\delta\mathbf{v}(0)\,\\\
(N\textbf{t}+T\textbf{t}_{\bot})(L)\cdot\delta\mathbf{v}(L)&={\mathbf{F}}_{0}(L)\cdot\delta\mathbf{v}(L)\,\\\
-M(0)\;\delta\omega(0)&=\mathcal{M}_{0}\;\delta\omega(0)\,\\\
M(L)\;\delta\omega(L)&=\mathcal{M}_{L}\;\delta\omega(L)\,\end{aligned}\right.$
(7)
From Eqs. (7), natural static boundary conditions follow from essential
kinematic boundary conditions related to the assigned constraints. When
essential boundary conditions are not prescribed, i.e. virtual translation
velocity $\,\delta\mathbf{v}\,$ and angular velocity $\,\delta\omega\,$ are
arbitrary, the corresponding natural static conditions from Eqs. (7) are:
$\left\\{\begin{aligned}
-(N\textbf{t}+T\textbf{t}_{\bot})(0)&={\mathbf{F}}_{0}(0)\,\\\
(N\textbf{t}+T\textbf{t}_{\bot})(L)&={\mathbf{F}}_{0}(L)\,\\\
-M(0)&=\mathcal{M}_{0}\,\\\ M(L)&=\mathcal{M}_{L}\end{aligned}\right.$ (8)
Explicit prescriptions of essential and natural boundary conditions for usual
constraints adopted in structural mechanics are provided in the section named
”Case-studies”.
## 3 Stress-driven mixture model
In this section we will first recall the classical theory of local elasticity
for a Timoshenko curved beam. Let us denote by $\,E\,$ and $\,G\,$ Euler-Young
and shear moduli, respectively. $\,A\,$ stands for cross-sectional area and
$\,J_{c}\,$ is the moment of inertia along the bending axis $\eta$ which is
identified by the direction of the transversal unit vector
$\,\textbf{t}_{\bot}\,$, that is:
$J_{c}=\int_{\Omega}\eta^{2}\frac{1}{1-c\,\eta\>(\textbf{n}\cdot\textbf{t}_{\bot})}\,dA\,$
(9)
The constitutive equations of local elasticity for curved beams are expressed
following the treatments by Winkler (1858); Baldacci (1983), generalized by
the presence of $\textbf{n}\cdot\textbf{t}_{\bot}$, that is
$\left\\{\begin{aligned}
\varepsilon_{l}(s)&=\frac{1}{EA}\biggr{[}N+\frac{\textit{c}\,M}{\textbf{n}\cdot\textbf{t}_{\bot}}\biggr{]}(s)\,\\\
\chi_{l}(s)&=\frac{M}{EJ_{c}}(s)+(\textbf{n}\cdot\textbf{t}_{\bot})\frac{\textit{c}}{EA}\biggr{[}N+\frac{\textit{c}\,M}{\textbf{n}\cdot\textbf{t}_{\bot}}\biggr{]}(s)\,\\\
\gamma_{l}(s)&=\bigg{[}\frac{T}{GK_{r}}\bigg{]}(s)\end{aligned}\right.$ (10)
where the equilibrium differential equation $T+M^{\prime}=-m$ has been
considered in Eq. (10)3, assuming vanishing distributed bending couples.
$K_{r}$ in Eq. (10)3 is the shear stiffness for a curved beam defined as
follows
$K_{r}^{-1}=\int_{\Omega}\frac{r^{2}}{{[r-\eta(\textbf{n}\cdot\textbf{t}_{\bot})]}^{2}\>b^{2}}\bigg{[}\frac{S_{c}}{J_{c}}-\frac{A^{*}}{(\textbf{n}\cdot\textbf{t}_{\bot})rA}\bigg{]}^{2}\,dA$
(11)
where $r=1/c$ is the curvature radius and $S_{c}$ is the static moment of
$A^{*}$, that is
$S_{c}:=\int_{\Omega^{*}}\frac{\eta}{1-c\,\eta\>(\textbf{n}\cdot\textbf{t}_{\bot})}\,dA^{*}$
(12)
For a Timoshenko curved nanobeam the nonlocal elastic deformation fields are
expressed by the stress-driven mixture model consisting in a convex
combination of the local response in Eq. (10) and a nonlocal response obtained
by a convolution between the local field and a scalar averaging kernel
$\,\phi:\Re\mapsto[0;+\infty[$.
Let preliminarily inticate with i and f the vectors collecting source and
output fields, i.e.:
$\textbf{i}=\\{\varepsilon_{l},\chi_{l},\gamma_{l}\\};\>\textbf{f}=\\{\varepsilon,\chi,\gamma\\}$.
Then, by denoting with $0\leq m\leq 1$ the mixture parameter and with $l_{c}$
a positive nonlocal length parameter, the stress-driven mixture model is
expressed as follows
$\textbf{f}(s)=m\>\textbf{i}(s)+(1-m)\>\int_{0}^{L}{\phi_{\l_{c}}(s,\xi)\>\textbf{i}(\xi)\>d\xi}$
(13)
which is a Fredholm integral equation of the second kind in the unknown source
field i.
The averaging kernel is assumed to be the special bi-exponential function
adopted by Eringen (1983), that is
$\phi_{\l_{c}}(s)=\frac{1}{2\l_{c}}\exp(-\frac{|s|}{\l_{c}})\,$ (14)
By extending to Timoshenko curved beams the Mixture equivalence by Romano et
al. (2017b, Lemma 2), it can be proved that the integral convolutions in Eq.
(13) is equivalent to the following differential equation
$\frac{\textbf{f}(s)}{\l_{c}^{2}}-\,\partial_{s}^{2}\textbf{f}(s)=\frac{\textbf{i}(s)}{\l_{c}^{2}}-m\>\partial_{s}^{2}\textbf{i}(s)$
(15)
equipped with the constitutive boundary conditions
$\left\\{\begin{aligned}
&\partial_{s}\textbf{f}(0)=\frac{1}{\l_{c}}\,\textbf{f}(0)+m\>\bigg{(}\partial_{s}\textbf{i}(0)-\frac{\textbf{i}(0)}{\l_{c}}\bigg{)}\,\\\
&\partial_{s}\textbf{f}(L)=-\frac{1}{\l_{c}}\,\textbf{f}(L)+m\>\bigg{(}\partial_{s}\textbf{i}(L)+\frac{\textbf{i}(L)}{\l_{c}}\bigg{)}\end{aligned}\right.$
(16)
The stress-driven mixture model in Eq. (13) is purely nonlocal when $m=0$ and
purely local when $m=1$. Since the model is based on two parameters (i.e.
mixture and nonlocal length parameters) it is able to provide softening or
stiffening responses as shown in the section ”Case-studies” and therefore can
effectively model a wide range of nano-engineering problems.
## 4 Elastic equilibrium of Timoshenko curved nanobeams
Let us consider the linearized, plane and curved Timoshenko beam model and
denote by $\,\textbf{u}:[0,\textrm{L}]\mapsto V\,$ the displacement vector
field of the structural axis and by $\,\varphi:[0,\textrm{L}]\mapsto\Re\,$ the
scalar field of rotations of cross-sections.
From Eq. (3), the kinematically compatible deformation field
$\,\mathbf{D}_{\textbf{w}}\,$ associated with
$\textbf{w}=\\{\textbf{u},\varphi\\}$ is composed of axial strain
$\varepsilon_{\textbf{w}}:[0,L]\mapsto\Re$, shear strain
$\gamma_{\textbf{w}}:[0,L]\mapsto\Re$ and flexural curvature
$\chi_{\textbf{w}}:[0,L]\mapsto\Re$ scalar fields.
$\mathbf{D}_{\textbf{w}}=\begin{vmatrix}\varepsilon_{\textbf{w}}\\\
\gamma_{\textbf{w}}\\\
\chi_{\textbf{w}}\end{vmatrix}=\begin{vmatrix}\textbf{u}^{\prime}\cdot\textbf{t}\\\
(\textbf{u}^{\prime}\cdot\textbf{t}_{\bot})-\varphi\\\
\varphi^{\prime}\end{vmatrix}$ (17)
Hence, by virtue of Eq. (17)3, the scalar field of rotations is expressed by
the following integration formula
$\varphi(s)=\varphi(0)+\int_{0}^{s}\chi_{\textbf{w}}(\xi)\,d\xi\,$ (18)
Let us consider the subsequent additive decomposition where Eq.
(17)${}_{1,2}\,$ is taken into account
$\textbf{u}^{\prime}=(\textbf{u}^{\prime}\cdot\textbf{t})\,\textbf{t}+(\textbf{u}^{\prime}\cdot\textbf{t}_{\bot})\,\textbf{t}_{\bot}=\varepsilon_{\textbf{w}}\,\textbf{t}+(\gamma_{\textbf{w}}+\varphi)\,\textbf{t}_{\bot}\,$
(19)
with $\,\varphi\,$ given by Eq. (18).
By integrating the previous equation, the displacements field u can be
expressed as follows
$\begin{split}\textbf{u}(s)&=\textbf{u}(0)+\int_{0}^{s}\textbf{u}^{\prime}d\xi\,\\\
&=\textbf{u}(0)+\int_{0}^{s}[\varepsilon_{\textbf{w}}(\xi)\,\textbf{t}(\xi)+(\gamma_{\textbf{w}}(\xi)+\varphi(\xi))\,\textbf{t}_{\bot}(\xi)]\,d\xi\,\end{split}$
(20)
Thus, the local-nonlocal mixture elastostatic problem of a Timoshenko curved
beam is composed of the differential equilibrium equations (6) equipped with
the boundary conditions (7), the constitutive equations provided by the
integral convolutions in Eq. (13) (or by the equivalent differential problem
in Eqs. (15)-(16)) and the kinematic compatibility condition expressed by Eqs.
(18) and (20). The integration constants $\,\varphi(0)\in\Re\,$ and
$\,\textbf{u}(0)\in V\,$ are univocally evaluated by prescribing essential
kinematic boundary conditions.
## 5 Case-studies
The procedure to solve the elastostatic problem of a Timoshenko nonlocal
curved beam is now illustrated with reference to some cases of applicative
interest in Nanotechnology.
A silicon carbide nanobeam, with Euler-Young modulus $E=427\>$ [GPa] and
Poisson ratio $\nu=0.2$ is considered. The beam axis is assumed to be a circle
arc of radius $r=10\>$ [nm] so that the beam length is $L=r\,\pi/2$. The
cross-section is a rectangular domain $\Omega$ of base $b=5~{}$[nm] and height
$h=2L/3$. In the present section, the following non-dimensional nonlocal
parameter is adopted
$\lambda=\frac{l_{c}}{L}$ (21)
where $l_{c}$ is the nonlocal characteristic length parameter.
A simple procedure is proposed in order to solve the elastostatic problem of
the curved nanobeam introduced above and to investigate size-dependent
responses. It consists of the following steps.
* •
Step 1. Solution of the differential equilibrium problem in Eqs. (6)-(7) to
obtain the stress fields composed of axial force $N$, shear force $T$ and
bending moment $M$ as functions of $n$ integration constants, with $n$
standing for redundancy degree. For statically determinate beams for which
$n=0$, the stress fields are univocally determined by equilibrium
requirements.
* •
Step 2. Evaluation of nonlocal strain fields by applying the nonlocal stress-
driven mixture model in Eq. (13) or by solving the equivalent differential
problem governed by Eqs. (15)-(16).
* •
Step 3. Detection of curved nanobeam nonlocal displacements u and rotations
$\varphi$ fields by imposing $3+n$ essential kinematic boundary conditions.
Note that in the case-studies presented in this section, total deformations
and elastic deformation fields are assumed to be coincident.
Cantilever beam under point-force at free end
The curved nanobeam introduced above is clamped at the abscissa $\,s=0\,$ and
subjected to a force $\,F=10\,$ [nN] applied at free end, as shown in Fig. 2.
Hence, the essential kinematic boundary conditions are
$\textbf{u}(0)=\mathbf{o}\,\qquad\varphi(0)=0\,$ (22)
From Eqs. (7) and (22) follows that natural static boundary conditions are
expressed by
$\begin{cases}N(L)&=0\\\ T(L)&=F\\\ M(L)&=0\end{cases}$ (23)
Figure 2: Cantilever curved nanobeam.
Since the redundancy degree $\,n\,$ is vanishing, by following $Step~{}1$ the
stress fields of axial force $N$, shear force $T$ and bending moment $M$ are
univocally determined by equilibrium requirements in Eqs. (6)-(7) and their
parametric expressions are provided below:
$\begin{cases}&N(s)=F\,\cos\big{(}s/r\big{)}\\\
&T(s)=F\,\sin\big{(}s/r\big{)}\\\ &M(s)=F\,r\cos\big{(}s/r\big{)}\end{cases}$
(24)
Transversal displacements $u_{t_{\bot}}=\textbf{u}\cdot\textbf{t}_{\bot}$,
axial displacements $u_{t}=\textbf{u}\cdot\textbf{t}$ and bending rotations
$\varphi$ are obtained by following $Steps~{}2$-$\,3$ and then plotted as
fuction of $s\in[0,L]$ as shown in Figs. 6 \- 8. In particular Figs. 6 \- 8
represent displacements and rotations of the nanocantilever for increasing
values of the nonlocal parameter $\lambda$, for fixed values of the mixture
parameter. As also shown by numerical results in Tab. 1, the response stiffens
for increasing values of the nonlocal parameter $\lambda$ and exhibits a
softening behavior by increasing the mixture parameter $m$.
Slider and roller supported beam under uniformly distributed loading
The curved nanobeam has a slider and a roller supports, at $s=0$ and $s=L$
respectively. It is subjected to a uniformly distributed vertical loading
$\,q=2\,$ [nN/nm] directed upwards as shown in Fig. 3. Now, the essential
kinematic boundary conditions are
$\textbf{u}(0)\cdot\textbf{t}(0)=0\,\qquad\varphi(0)=0\,\qquad\textbf{u}(L)\cdot\textbf{t}(L)=0\,$
(25)
From Eqs. (7) and (22) follows that natural static boundary conditions are
expressed by
$\left\\{\begin{split}T(0)&=0\,\\\ T(L)&=0\,\\\ M(L)&=0\,\end{split}\right.$
(26)
Figure 3: Curved nanobeam with slider and roller supports.
Since the beam is statically determinate, the stress fields $\,N\,,T\,,M\,$
are univocally obtained by equilibrium conditions and their parametric
expressions as function of the arch length are shown as follows:
$\begin{cases}&N(s)=q\,r\sin^{2}\big{(}s/r\big{)}\\\
&T(s)=-\frac{1}{2}q\,r\sin\big{(}2s/r\big{)}\\\
&M(s)=-\frac{1}{2}q\,r^{2}\cos^{2}\big{(}s/r\big{)}\end{cases}$ (27)
Then, the transversal displacements
$u_{t_{\bot}}=\textbf{u}\cdot\textbf{t}_{\bot}$, axial displacements
$u_{t}=\textbf{u}\cdot\textbf{t}$ and bending rotations $\varphi$ are obtained
by following $Steps~{}2$-$\,3$ and represented in Figs. 9 \- 11 as function of
$\lambda$ for fixed values of the mixture parameters $m$. Numerical results in
terms of displacements and rotations are provided in Tab. 2.
Clamped and roller supported beam under uniformly distributed loading
Let us consider a curved nanobeam with clamped and roller supported ends, at
$s=0$ and $s=L$ respectively. It is subjected to a uniformly distributed
vertical loading $\,q=5\,$ [nN/nm] directed upwards as shown in Fig. 4. Hence,
the essential kinematic boundary conditions are
$\textbf{u}(0)=0\,\qquad\varphi(0)=0\,\qquad\textbf{u}(L)\cdot\textbf{t}(L)=0\,$
(28)
From Eqs. (7) and (28) the corrisponding natural static boundary conditions
take the form
$\left\\{\begin{split}T(L)&=0\,\\\ M(L)&=0\,\end{split}\right.$ (29)
Figure 4: Clamped and roller supported curved nanobeam.
Axial force $N$, shear force $T$ and bending moment $M$ are solutions of the
differential equilibrium problem in Eqs. (6)-(29) and since the redundancy
degree is $n=1$, the stress fields are functions of one integration costant.
Parametric nonlocal strain fields are obtained by the integral stress-driven
mixture model in Eq. (13) or by solving the equivalent differential problem in
Eqs. (15)-(16). Then, nonlocal displacements u and rotations $\varphi$ are
detected by imposing the $3+n$ essential kinematic boundary conditions in Eq.
(28). The static fields of axial force
$\,\textbf{R}N\textbf{t}=N\textbf{t}_{\bot}\,$, shear force
$\,T\textbf{t}_{\bot}\,$ and bending moment
$\,\textbf{R}M\textbf{k}=-M\textbf{t}_{\bot}\,$, parameterized in terms of the
arch length $s$, are graphically represented in Figs. 12, 13, 14,
respectively. A schematic sketch of cross section with the local triad and the
vectors $\textbf{R}M\textbf{k}\,$ and $\textbf{R}N\textbf{t}$ is depicted in
Fig. 5.
Figure 5: Sketch of cross section with local triad and bending
$\textbf{R}M\textbf{k}\,$ and axial $\textbf{R}N\textbf{t}$ vectors.
Transversal displacements $u_{t_{\bot}}=\textbf{u}\cdot\textbf{t}_{\bot}$,
axial displacements $u_{t}=\textbf{u}\cdot\textbf{t}$ and bending rotations
$\varphi$ are plotted versus $s\in[0,L]$ in Figs. 15 \- 17. As it is shown in
the parametric plots, the response stiffens for increasing nonlocal parameter
$\lambda$ and exhibits a softening behavior by increasing the mixture
parameter $m$. This trend is also confirmed by numerical results provided in
Tab. 3.
Remark. It is worth noting that for vanishing geometric curvature and mixture
parameters, solution procedures and results of the case-studies illustrated in
this section are coincident with the ones provided by Barretta et. al(B, 2018)
for straight Timoshenko nanobeams. An alternative solution methodolody for
straight thick nonlocal beams based on Laplace trasform has been recently
proposed by Zhang et al.(ZhangJ, 2019).
(a)
(b)
Figure 6: Cantilever beam: nonlocal transversal displacement
$u_{\textbf{t}_{\bot}}$ [nm] versus $s\in[0,L]$ [nm] as fuction of $\lambda$.
(a)
(b)
Figure 7: Cantilever beam: nonlocal axial displacement $u_{\textbf{t}}$ [nm]
versus $s\in[0,L]$ [nm] as fuction of $\lambda$.
(a)
(b)
Figure 8: Cantilever beam: nonlocal bending rotation $\varphi$ [-] versus
$s\in[0,L]$ [nm] as fuction of $\lambda$.
(a)
(b)
Figure 9: Slider and roller supported beam: nonlocal transversal displacement
$u_{\textbf{t}_{\bot}}$ [nm] versus $s\in[0,L]$ [nm] as fuction of $\lambda$.
(a)
(b)
Figure 10: Slider and roller supported beam: nonlocal axial displacement
$u_{\textbf{t}}$ [nm] versus $s\in[0,L]$ [nm] as fuction of $\lambda$.
(a)
(b)
Figure 11: Slider and roller supported beam: nonlocal bending rotation
$\varphi$ [-] versus $s\in[0,L]$ [nm] as fuction of $\lambda$. Figure 12:
Clamped and roller supported beam: plot of the vector field
$\textbf{R}N\textbf{t}=N\textbf{t}_{\bot}$ [10 nN] in the Cartesian plane x
[nm], y [nm] for $\lambda=0.5$ and $m=0.3$. Figure 13: Clamped and roller
supported beam: plot of the vector field $T\textbf{t}_{\bot}$ [10 nN] in the
Cartesian plane x [nm], y [nm] for $\lambda=0.5$ and $m=0.3$. Figure 14:
Clamped and roller supported beam: plot of the vector field
$\textbf{R}M\textbf{k}=-M\textbf{t}_{\bot}$ [20 nN nm] in the Cartesian plane
x [nm], y [nm] for $\lambda=0.5$ and $m=0.3$.
(a)
(b)
Figure 15: Clamped and roller supported beam: nonlocal transversal
displacement $u_{\textbf{t}_{\bot}}$ [nm] versus $s\in[0,L]$ [nm] as fuction
of $\lambda$.
(a)
(b)
Figure 16: Clamped and roller supported beam: nonlocal axial displacement
$u_{\textbf{t}}$ [nm] versus $s\in[0,L]$ [nm] as fuction of $\lambda$.
(a)
(b)
Figure 17: Clamped and roller supported beam: nonlocal bending rotation
$\varphi$ [-] versus $s\in[0,L]$ [nm] as fuction of $\lambda$.
$\lambda$ | $u_{\bot}(L)\>[10^{-2}nm]$ | $u_{t}(L)\>[10^{-2}nm]$ | $\varphi(L)\>[10^{-3}]$ | $u^{tot}_{max}(L)\>[10^{-2}nm]$
---|---|---|---|---
| $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$
0,1 | 4,131 | 4,289 | -2,633 | -2,732 | 3,808 | 3,916 | 4,899 | 5,085
0,2 | 3,744 | 4,068 | -2,406 | -2,602 | 3,528 | 3,756 | 4,450 | 4,829
0,3 | 3,414 | 3,879 | -2,209 | -2,490 | 3,264 | 3,605 | 4,066 | 4,609
0,4 | 3,149 | 3,728 | -2,048 | -2,398 | 3,037 | 3,475 | 3,756 | 4,432
0,5 | 2,939 | 3,608 | -1,916 | -2,323 | 2,847 | 3,367 | 3,509 | 4,291
0,6 | 2,770 | 3,511 | -1,809 | -2,261 | 2,690 | 3,277 | 3,308 | 4,176
0,7 | 2,632 | 3,432 | -1,721 | -2,211 | 2,558 | 3,202 | 3,145 | 4,083
0,8 | 2,518 | 3,367 | -1,647 | -2,169 | 2,447 | 3,138 | 3,008 | 4,005
0,9 | 2,422 | 3,312 | -1,584 | -2,133 | 2,352 | 3,084 | 2,894 | 3,939
Table 1: Cantilever beam: numerical outcomes.
$\lambda$ | $u_{\bot}(0)\>[10^{-2}nm]$ | $u_{\bot}(L)\>[10^{-2}nm]$ | $\varphi(L)\>[10^{-3}]$ | $u^{tot}_{max}(0)\>[10^{-2}nm]$
---|---|---|---|---
| $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$
0,1 | 3,665 | 3,809 | -3,527 | -3,652 | -3,945 | -4,073 | 3,665 | 3,809
0,2 | 3,321 | 3,613 | -3,196 | -3,463 | -3,652 | -3,905 | 3,321 | 3,613
0,3 | 3,030 | 3,447 | -2,911 | -3,300 | -3,383 | -3,751 | 3,030 | 3,447
0,4 | 2,798 | 3,314 | -2,683 | -3,170 | -3,152 | -3,619 | 2,798 | 3,314
0,5 | 2,613 | 3,208 | -2,502 | -3,067 | -2,959 | -3,509 | 2,613 | 3,208
0,6 | 2,464 | 3,123 | -2,357 | -2,984 | -2,797 | -3,417 | 2,464 | 3,123
0,7 | 2,342 | 3,054 | -2,239 | -2,916 | -2,662 | -3,339 | 2,342 | 3,054
0,8 | 2,241 | 2,996 | -2,141 | -2,860 | -2,547 | -3,274 | 2,241 | 2,996
0,9 | 2,156 | 2,947 | -2,058 | -2,813 | -2,450 | -3,218 | 2,156 | 2,947
Table 2: Slider and roller supported beam: numerical outcomes.
$\lambda$ | $u_{\bot}(L)\>[10^{-2}nm]$ | $\varphi(L)\>[10^{-3}]$ | $u^{tot}_{max}(s^{*})\>[10^{-2}nm]$ | $u^{tot}_{max}(s^{*})\>[10^{-2}nm]$
---|---|---|---|---
| $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$
0,1 | -1,036 | -1,135 | -1,658 | -1,751 | 1,136 $s^{*}$ = 5,892 | 1,241 $s^{*}$ = 5,738
0,2 | -0,815 | -1,010 | -1,474 | -1,648 | 0,921 $s^{*}$ = 6,041 | 1,117 $s^{*}$ = 5,788
0,3 | -0,667 | -0,926 | -1,330 | -1,568 | 0,787 $s^{*}$ = 6,063 | 1,041 $s^{*}$ = 5,774
0,4 | -0,574 | -0,874 | -1,221 | -1,506 | 0,703 $s^{*}$ = 6,042 | 0,993 $s^{*}$ = 5,750
0,5 | -0,515 | -0,840 | -1,137 | -1,458 | 0,648 $s^{*}$ = 6,009 | 0,962 $s^{*}$ = 5,727
0,6 | -0,477 | -0,818 | -1,072 | -1,421 | 0,609 $s^{*}$ = 5,974 | 0,940 $s^{*}$ = 5,707
0,7 | -0,450 | -0,802 | -1,020 | -1,391 | 0,580 $s^{*}$ = 5,940 | 0,923 $s^{*}$ = 5,691
0,8 | -0,431 | -0,791 | -0,977 | -1,366 | 0,559 $s^{*}$ = 5,910 | 0,911 $s^{*}$ = 5,678
0,9 | -0,418 | -0,784 | -0,942 | -1,346 | 0,542 $s^{*}$ = 5,884 | 0,902 $s^{*}$ = 5,667
Table 3: Clamped and roller supported beam: numerical outcomes.
## 6 Closing remarks
The stress-driven mixture model of elasticity developed by Barretta et al.
(2018) for straight structures has been generalized in the present paper to
model and assess size effects in small-scale curved stubby beams. The relevant
elastostatic problem has been preliminarily formulated by making recourse to
Timoshenko kinematic theory, shown to be mathematically well-posed and
analytically addressed by a simple and effective coordinate-free solution
procedure.
Selected case-studies of current interest in nano-mechanics have been studied
and corresponding closed-form solutions have been detected by exploiting the
aforementioned solution technique.
Advantageously, the presented approach, driven by two parameters, has been
proven to be able to simulate both softening and stiffening responses when
compared with classical local structural behaviours.
Thus, the new methodology is technically appropriate for design and optimize
the size-dependent nonlocal behaviour of a wide class of new-generation
technological devices, such as Micro- and Nano-Electro-Mechanical Systems
(M/NEMS) composed of small-scale curved beams.
## Acknowledgments
Financial supports from the MIUR in the framework of the Project PRIN 2017
(code 2017J4EAYB _Multiscale Innovative Materials and Structures (MIMS)_ ;
University of Naples Federico II Research Unit) is gratefully acknowledged.
## References
* Farajpour et al. (2018) Farajpour A, Ghayesh MH and Farokhi H. A review on the mechanics of nanostructures. _International Journal of Engineering Science_ 2018; 133:231–263.
* Tran et al. (2018) Tran N, Ghayesh MH and Arjomandi M. Ambient vibration energy harvesters: a review on nonlinear techniques for performance enhancement. _International Journal of Engineering Science_ 2018; 127:162–185.
* Basutkar (2019a) Basutkar R. Analytical modelling of a nanoscale series-connected bimorph piezoelectric energy harvester incorporating the flexoelectric effect. _International Journal of Engineering Science_ 2019; 139:42–61.
* Caplins et al. (2019) Caplins BW, Holm JD and Keller RR. Transmission imaging with a programmable detector in a scanning electron microscope. _Ultramicroscopy_ 2019; 196:40–48.
* Ogi et al. (2019) Ogi H, Iwagami S, Nagakubo A, Taniguchi T and Ono T. Nano-plate biosensor array using ultrafast heat transport through proteins. _Sensors and Actuators B: Chemical_ 2019; 278:15–20.
* Natsuki (2019) Natsuki T and Urakami K. Analysis of vibration frequency of carbon nanotubes used as nano-force sensors considering clamped boundary condition. _Electronics_ 2019; 8(10):1082.
* Basutkar (2019b) Basutkar R. Analytical modelling of a nanoscale series-connected bimorph piezoelectric energy harvester incorporating the flexoelectric effect. _International Journal of Engineering Science_ 2019; 139:42–61.
* Ghayesh and Farokhi (2020) Ghayesh MH and Farokhi H. Nonlinear broadband performance of energy harvesters. _International Journal of Engineering Science_ 2020; 147:103202.
* Eyvazian et al. (2020) Eyvazian A, Shahsavari D and Karami B. On the dynamic of graphene reinforced nanocomposite cylindrical shells subjected to a moving harmonic load. _International Journal of Engineering Science_ 2020; 154:103339.
* Pourasghar and Chen (2019) Pourasghar A and Chen Z. Effect of hyperbolic heat conduction on the linear and nonlinear vibration of CNT reinforced size-dependent functionally graded microbeams. _International Journal of Engineering Science_ 2019; 137:57–72.
https://doi.org/10.1016/j.ijengsci.2019.02.002
* Omari et al. (2020) Omari MA, Almagableh A, Sevostianov I, Ashhab MS and Yaseen AB. Modeling of the viscoelastic properties of thermoset vinyl ester nanocomposite using artificial neural network. _International Journal of Engineering Science_ 2020; 150:103242.
https://doi.org/10.1016/j.ijengsci.2020.103242
* Rafii-Tabar et al. (2016) Rafii-Tabar H, Ghavanloo E and Fazelzadeh SA. Nonlocal continuum-based modeling of mechanical characteristics of nanoscopic structures. _Phys. Rep._ 2016; 638:1–97.
* Ghavanloo (2019) Ghavanloo E, Rafii-Tabar H and Fazelzadeh SA. Computational continuum mechanics of nanoscopic structures, nonlocal elasticity approaches. Springer, 2019.
https://doi.org/10.1007/978-3-030-11650-7
* Eringen (1983) Eringen AC. On differential equations of nonlocal elasticity and solutions of screw dislocation and surface waves. _Journal of Applied Physics_ 1983; 54:4703.
* Rogula (1965) Rogula D. Influence of spatial acoustic dispersion on dynamical properties of dislocations. Bull. _Acad. Pol. Sci., Ser. Sci. Tech._ 1965; 13:337–385.
* Rogula (1976) Rogula D. Nonlocal theories of material systems. Ossolineum, Wrocław, Poland, 1976.
* Rogula (1982) Rogula D. Introduction to nonlocal theory of material media. Nonlocal theory of material media, CISM courses and lectures. D. Rogula, ed., Springer, Wien, 1982; 268:125-222.
https://doi.org/10.1007/978-3-7091-2890-9
* Eringen (1972) Eringen AC. Linear theory of nonlocal elasticity and dispersion of plane waves. _International Journal of Engineering Science_ 1972; 10(5):425–435.
* Bazant and Jirásek (2002) Bazant ZP and Jirásek M. Nonlocal integral formulation of plasticity and damage: survey of progress. _J. Eng. Mech. ASCE_ 2002; 128:1119–1149.
* Romano et al. (2017a) Romano G, Barretta R, Diaco M and Marotti de Sciarra F. Constitutive boundary conditions and paradoxes in nonlocal elastic nano-beams. _International Journal of Mechanical Sciences_ 2017; 121:151–156.
* Zhang et al. (2020) Zhang P, Qing H and Gao C-F. Exact solutions for bending of Timoshenko curved nanobeams made of functionally graded materials based on stress-driven nonlocal integral model. _Composite Structures_ 2020; 245:112362.
* Sidhardh et al. (2020) Sidhardh S, Patnaik S and Semperlotti F. Geometrically nonlinear response of a fractional-order nonlocal model of elasticity. _International Journal of Non-Linear Mechanics_ 2020; 125:103529.
* Dilena et al. (2019) Dilena M, Fedele Dell’Oste M, Fernández-Sáez J, Morassi A and Zaera R. Mass detection in nanobeams from bending resonant frequency shifts. _Mechanical Systems and Signal Processing_ 2019; 116:261–276.
* Shahsavari et al. (2018) Shahsavari D, Karami B, Fahham HR and Li L. On the shear buckling of porous nanoplates using a new size-dependent quasi-3D shear deformation theory. _Acta Mechanica_ 2018; 229(11):4549–4573.
* Vila et al. (2017) Vila J, Fernández-Sáez J and Zaera R. Nonlinear continuum models for the dynamic behavior of 1D microstructured solids. _Int. J. Solid Struct._ 2017; 117:111–122.
* Maneshi et al. (2020) Maneshi MA, Ghavanloo E, Fazelzadeh SA. Well-posed nonlocal elasticity model for finite domains and its application to the mechanical behavior of nanorods. _Acta Mechanica_ 2020\.
https://doi.org/10.1007/s00707-020-02749-w
* Fuschi et al. (2019) Fuschi P, Pisano AA and Polizzotto C. Size effects of small-scale beams in bending addressed with a strain-difference based nonlocal elasticity theory. _International Journal of Mechanical Sciences_ 2019; 151:661–671.
* Pijaudier-Cabot and Bazánt (1987) Pijaudier-Cabot G and Bazánt ZP. Nonlocal damage theory. _J Eng Mech_ 1987; 113:1512–1533.
* Borino et al. (2003) Borino G, Failla B and Parrinello F. A symmetric nonlocal damage theory. _Int J Solids Struct_ 2003; 40(13-14):3621–3645.
* Polizzotto et al. (2004) Polizzotto C, Fuschi P and Pisano AA. A strain-difference-based nonlocal elasticity model. _Int J Solids Struct_ 2004; 41(9-10):2383–2401.
* Koutsoumaris et al. (2017) Koutsoumaris CC, Eptaimeros KG and Tsamasphyros GJ. A different approach to Eringen’s nonlocal integral stress model with applications for beams. _Int J Solids Struct_ 2017; 112:222–238.
* Polizzotto (2001) C. Polizzotto. Nonlocal elasticity and related variational principles. _Int J Solids Struct_ 2001; 38:7359.
* Eringen (1987) Eringen AC. Theory of nonlocal elasticity and some applications. _Res Mechanica_ 1987; 21:313–342.
* Romano et al. (2017b) Romano G, Barretta R and Diaco M. On nonlocal integral models for elastic nano-beams. _International Journal of Mechanical Sciences_ 2017; 131-132:490–499.
* Wang et al. (2016) Wang Y, Zhu X and Dai H. Exact solutions for the static bending of Euler-Bernoulli beams using Eringen two-phase local/nonlocal model. _AIP Advances_ 2016; 6(8):085114.
https://doi.org/10.1063/1.4961695
* Khodabakhshi and Reddy (2015) Khodabakhshi P and Reddy JN. A unified integro-differential nonlocal model. _Int J Eng Sci_ 2015; 95:60–75.
* Fernández-Sáez and Zaera (2017) Fernández-Sáez J and Zaera R. Vibrations of Bernoulli-Euler beams using the two-phase nonlocal elasticity theory. _Int J Eng Sci_ 2017; 119:232–248.
* Zhang et al. (2019) Zhang P, Qing H and Gao C. Theoretical analysis for static bending of circular Euler-Bernoulli beam using local and Eringen’s nonlocal integral mixed model. _ZAMM_ 2019; 99(8):e201800329
https://doi.org/10.1002/zamm.201800329
* Romano and Barretta (2017) Romano G and Barretta R. Nonlocal elasticity in nanobeams: the stress-driven integral model. _International Journal of Engineering Science_ 2017; 115:14–27.
* B (2018) Barretta R, Luciano R, Marotti de Sciarra F and Ruta G. Stress-driven nonlocal integral model for Timoshenko elastic nano-beams. _European Journal of Mechanics / A Solids_ 2018; 72:275–286.
* ZhangJ (2019) Zhang J, Qing H and Gao C. Exact and asymptotic bending analysis of microbeams under different boundary conditions using stress‐derived nonlocal integral model. _Zamm-Zeitschrift Fur Angewandte Mathematik Und Mechanik_ 2019; DOI:10.1002/zamm.201900148.
* Barretta et al. (2018) Barretta R, Fabbrocino F, Luciano R and Marotti de Sciarra F. Closed-form solutions in stress-driven two-phase integral elasticity for bending of functionally graded nano-beams. _Physica E: Low-dimensional Systems and Nanostructures_ 2018; 97:13–30.
* Barretta et al. (2019b) Barretta R, Marotti de Sciarra F and Vaccaro MS. On nonlocal mechanics of curved elastic beams. _International Journal of Engineering Science_ 2019; 144:103140.
* Romano (2002) Romano G. Scienza delle Costruzioni. Tomo I. Benevento: Hevelius 2002.
* Baldacci (1983) Baldacci R. Scienza delle Costruzioni, Volume II. Torino: UTET 1983.
* Winkler (1858) Winkler E. Formänderung und Festigkeit gekrümmter Körper, insbesondere der Ringe Civilingenieur 4, 232-246, 1858.
| arxiv-papers | 2021-07-27T11:21:02 | 2024-09-04T03:07:21.305597 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Marzia Sara Vaccaro, Francesco Paolo Pinnola, Francesco Marotti de\n Sciarra, Marko Canadija, Raffaele Barretta",
"submitter": "Raffaele Barretta",
"url": "https://arxiv.org/abs/2107.12733"
} |
2107.12734 | # ENHANCE (ENriching Health data by ANnotations of Crowd and Experts):
A case study for skin lesion classification
Ralf Raumanns [email protected]
Fontys University of Applied Science, Eindhoven, The Netherlands
Eindhoven University of Technology, Eindhoven, The Netherlands Gerard Schouten
[email protected]
Fontys University of Applied Science, Eindhoven, The Netherlands
Eindhoven University of Technology, Eindhoven, The Netherlands Max Joosten
[email protected]
Eindhoven University of Technology, Eindhoven, The Netherlands Josien P. W.
Pluim [email protected]
Eindhoven University of Technology, Eindhoven, The Netherlands Veronika
Cheplygina [email protected]
IT University of Copenhagen, Denmark
###### Abstract
We present ENHANCE, an open dataset with multiple annotations to complement
the existing ISIC and PH2 skin lesion classification datasets. This dataset
contains annotations of visual ABC (asymmetry, border, color) features from
non-expert annotation sources: undergraduate students, crowd workers from
Amazon MTurk and classic image processing algorithms. In this paper we first
analyze the correlations between the annotations and the diagnostic label of
the lesion, as well as study the agreement between different annotation
sources. Overall we find weak correlations of non-expert annotations with the
diagnostic label, and low agreement between different annotation sources. Next
we study multi-task learning (MTL) with the annotations as additional labels,
and show that non-expert annotations improve the diagnostic performance of
(ensembles of) state-of-the-art convolutional neural networks. We hope that
our dataset can be used in and inspires further research into multiple
annotations and/or MTL.
All data and models are available on: https://github.com/raumannsr/ENHANCE.
Keywords: Open data, Crowdsourcing, Multi-task learning, Skin cancer,
Ensembles, Overfitting
## 1 Introduction
Machine learning offers many opportunities, but medical imaging datasets, for
example for skin lesion diagnosis, are limited, and overfitting can occur. To
illustrate, Winkler and colleagues found that superimposed scale bars (Winkler
et al., 2021) or skin markings (Winkler et al., 2019) in dermoscopic images
may impair the diagnostic performance of the convolutional neural network
(CNN) when unintentionally overfitting these artifacts during model training.
A promising approach to generalize better in small sample size settings is
multi-task learning (MTL), where the model has to learn different tasks
simultaneously. This approach showed improved performance in various medical
applications, for example, for breast lesions (Shi et al., 2019; Liu et al.,
2018). However, when moving from single-task to multi-task models, we need
additional annotations. Applying MTL is challenging because datasets typically
do not have such additional annotations. Furthermore, building a medical image
dataset from scratch with expert annotations is time-consuming and costly.
We present a dataset of additional annotations for skin lesion diagnosis based
on non-expert annotations on three dermatoscopic criteria: asymmetry, border
and color (so-called ABC criteria). In dermatology, the use of the ABCDE
(asymmetry, border, color, diameter, and evolution or elevation) rule is
widespread. However, scoring the diameter (D) and evolution or elevation (E)
are more complex tasks and therefore less suitable for non-expert annotation.
The term non-expert is defined here as annotations provided by three different
annotation sources: undergraduate students, crowd workers from Amazon MTurk
and automated annotations through classic image processing algorithms.
We study the quality of non-expert annotations from different viewpoints.
Firstly, we determine the discriminative power of ABC features for diagnosis.
We show to what extent the ABC annotations correlate to the diagnosis, and we
study how we can use ABC annotations to improve the performance of a CNN.
Secondly, the inter agreement level for A, B and C feature between the
different annotation sources. The study extends our research on the topic
(Raumanns et al., 2020) by using automated annotations as well as comparing
the performance on three open source CNN architectures, in particular: VGG-16
(Simonyan and Zisserman, 2015), Inception v3 (Szegedy et al., 2016) and
ResNet50 (He et al., 2016) encoders. Further, we investigate whether MTL is
also beneficial for automated annotations and show that the performance
benefits from using multiple annotations in MTL.
Besides addressing the lack of expert annotations using non-expert ones, we
make the dataset with collected ABC annotations and code open, eliminating
obstacles for future research. More specifically, the investigation addresses
the following research questions:
1. 1.
What is the correlation between the ABC annotations and the diagnostic label?
2. 2.
How can we use the ABC annotations to improve the performance of a CNN?
3. 3.
What is the inter agreement level for A, B and C feature between the different
annotation sources?
4. 4.
How can CNN performance benefit from using multiple annotations?
Our results give valuable insights into the quality of non-expert annotations.
Using the collected non-expert annotations in three different CNNs, we show
that these are of added value for the performance of the models. This suggests
that the use of non-expert annotations might be promising for application in
similar domains.
## 2 Related Work
The shortage of publicly available medical datasets suitable for machine
learning is a widely shared problem. Less suitable datasets are small and
contain few attributes. Several initiatives have been launched to disseminate
and make more medical datasets accessible to alleviate this shortcoming. For
example, Tschandl et al. (2018) released the HAM10000 (“Human Against Machine
with 10000 training images”) dataset containing dermatoscopic images from
different populations. Pacheco et al. (2020) released a skin lesion benchmark
composed of clinical images collected from smartphone devices and a set of
patient clinical data containing up to 21 features.
In machine learning, we usually concentrate on training a single-task model,
focusing on a single output. These single-task models have been successful in
medical imaging, but there is a potential to make them even more
generalizable, thereby preventing overfitting by using MTL that share
representations between related tasks. More specific MTL uses inductive
transfer with domain-specific information to improve model generalization
(Caruana, 1997).
MTL has been successfully in various applications in medical imaging. Hussein
et al. (2019) presented a framework for the malignancy determination of lung
nodules based on an MTL method using features provided by experts
(radiologists). Dhungel et al. (2017) used automatically extracted features in
a two-step training process for mass classification in mammograms using a CNN
and Random Forest model. Murthy et al. (2017) included shape information in
classifying glioma nuclei and showed that they could improve CNN performance
compared to a baseline model. Recently we (Raumanns et al., 2020) found that
MTL ensembles with the VGG-16 encoder, combined with crowdsourced features,
lead to improved generalization for skin lesion classification. For more
background information on MTL in deep learning, we refer the reader to an
overview written by Ruder (2017).
In this work, we further investigate the use of non-expert annotations for
skin lesion classification by comparing non-expert annotations and using them
as additional output in three different multi-task models based on commonly
employed CNN architectures. Note that the MTL approach allows using ABC
annotations on the output side of the network, different from traditional
approaches such as Giotis et al. (2013); Cheplygina and Pluim (2018), where
they are used as classifier inputs.
## 3 Dataset creation
This section describes the two public image datasets that we used and details
the annotation procedures used to collect additional annotations for these
datasets.
### 3.1 Image datasets
We used two publicly available datasets of dermoscopic images, the training
set of the ISIC 2017 challenge dataset (Codella et al., 2017) and the PH2
dataset (Mendonca et al., 2015). A summary of the both datasets is provided in
Table 1. There are no other meta-data available than the characteristics
presented.
#### 3.1.1 ISIC dataset
The ISIC 2017 challenge was to develop lesion segmentation and lesion
classification algorithms. The training dataset contains 2000 dermoscopic
images with lesions of three classes: 374 melanoma, 1372 nevi, and 254
seborrheic keratosis lesions. Next to the diagnostic labels, the dataset also
contains age and sex for some of the patients, binary lesion segmentation
masks, and superpixel segmentation masks (the result of dividing a lesion
image with the help of the SLIC algorithm (Achanta et al., 2012)).
#### 3.1.2 PH2 dataset
The PH2 dataset was acquired at the Dermatology Service of Hospital Pedro
Hispano, Matosinhos, Portugal. The objective was to create an open dataset to
help comparative studies on dermoscopic images’ segmentation and
classification algorithms. The PH2 dataset contains 200 dermoscopic images, of
which 80 common nevi, 80 atypical nevi, and 40 melanoma lesions. The dataset
also contains information related to histology and diagnosis, and expert
annotations of lesion characteristics including color, asymmetry, and pigment
network.
Table 1: Summary of the lesion characteristics in the ISIC and PH2 datasets. A dash (-) means that the information was not provided. Characteristics | | ISIC | PH2
---|---|---|---
Diagnosis | Benign nevi | 1372 | 160
| Melanoma | 374 | 40
| Seborrheic keratosis | 254 | 0
Patient sex | Female | 871 | -
| Male | 900 | -
| Not provided | 229 | 200
Age group | 0-10 | 4 | -
| 10-20 | 147 | -
| 20-30 | 136 | -
| 30-40 | 225 | -
| 40-50 | 305 | -
| 50-60 | 270 | -
| 60-70 | 307 | -
| 70-80 | 213 | -
| 80-90 | 137 | -
| Not provided | 256 | 200
Fitzpatrick phototype | II or III | - | 200
| Not provided | 2000 | 0
Expert annotations | Asymmetry | 0 | 200
| Border | 0 | 0
| Color | 0 | 200
### 3.2 Annotations
We collected annotations from three types of sources:
1. 1.
Students of the undergraduate biomedical engineering program at TU Eindhoven,
2. 2.
Crowd workers on the Amazon Mechanical Turk platform, and
3. 3.
Classical image processing algorithms.
Each source assessed the ABC attributes (Abbasi et al., 2004) as are commonly
used by dermatologists: A for asymmetrical shape, B for border irregularity,
and C for color of the assessed lesion.
Figure 1: The left part shows examples of skin lesions and corresponding masks
(black-white image). The top two lesions are from the PH2 dataset; the bottom
two are from the ISIC dataset. The right part shows examples of scores from
different annotation sources are also given. The student and crowd annotations
indicate that at least three different annotators assessed each image.
When training algorithms, multiple annotations per image were combined as
follows: we normalized the annotation scores per annotator (resulting in
standardized data with mean 0 and standard deviation 1) and then averaged
these standardized scores per lesion. Early experiments by (Cheplygina and
Pluim, 2018) showed that this was a justifiable strategy.
#### 3.2.1 Student annotations
Undergraduate students without prior knowledge of rating dermoscopic images
gathered annotations following a similar protocol as in (Cheplygina and Pluim,
2018), in the context of a medical image analysis course. Each group annotated
visual features of 100 images. The students were not blinded to the diagnostic
labels, as ISIC is a public dataset. Each group could decide which visual
features they wanted to focus on, and the type of annotation scale they wanted
to use. However, each visual feature had to be annotated by at least three
students from the group. All groups annotated at least some of the ABC
features, resulting in 1631 images with asymmetry, border, and color
annotations. As we only included the PH2 dataset in the current study after
this educational activity was finished, the students did not annotate images
from the PH2 dataset.
#### 3.2.2 Crowd annotations
Crowd workers on Amazon Mechanical Turk received instructions of how to rate
the ABC features based on three examples. Figures 8, 9 and 10 in (Appendix D.
Amazon MTurk annotation) illustrate how the annotation task is presented to
crowd workers. The annotation scales were as follows:
* •
Asymmetry: Zero for symmetrical, one of half-symmetrical, two for
asymmetrical.
* •
Border: The degree of irregularities in the skin lesion’s edge for the border
score, with a maximum score of eight. A score of eight indicates
irregularities in the entire edge, a score of four in the half-edge, and a
zero score indicates no irregularities.
* •
Color: The number of the following colors being present in the lesion: light
brown, dark brown, white, blue-gray, black, and red.
We requested three different crowd workers to annotate each image. The
diagnostic labels were not provided, but due to the public nature of the
dataset, could be potentially be known. Only workers who had done more than
500 approved tasks previously with an approval rate higher than 90% could
participate. We paid the workers $0.05 per task. The workers annotated 1250
lesions from ISIC, and all 200 lesions from PH2 with asymmetry, border, and
color annotations.
#### 3.2.3 Automated annotations
We used classical image processing algorithms from the literature (Kasmi and
Mokrani (2016), Jaworek-Korjakowska (2015) and Achanta et al. (2012)) to
automatically extract asymmetry, border and color features. We implemented
these algorithms based on the papers, as code was not provided. We explain the
different steps of the automated asymmetry, border and color algorithms in
Appendix C. Automatic annotation.
Note that we used the provided segmentation masks, and we observed a wide
variation of mask boundary definitions: ranging from precisely defined to more
loose boundary ones, including clipped boundaries, therefore not every
algorithm could be applied to all images. Table 2 summarizes the number of
collected annotations for each annotation source and type.
Table 2: Summary of collected annotations. | ISIC | PH2
---|---|---
Automated | | |
Asymmetry (AutoA) | 197011footnotemark: 1 | 16511footnotemark: 1 |
Border (AutoB) | 199611footnotemark: 1 | 0 |
Color (AutoC) | 2000 | 200 |
Crowd | | |
Asymmetry (CrowdA) | 1250 | 200 |
Border (CrowdB) | 1250 | 200 |
Color (CrowdC) | 1250 | 200 |
Student | | |
Asymmetry (StudA) | 1631 | 0 |
Border (StudB) | 1631 | 0 |
Color (StudC) | 1631 | 0 |
Expert | | |
Asymmetry (ExpA) | 0 | 200 |
Border (ExpB) | 0 | 0 |
Color (ExpC) | 0 | 200 |
## 4 Experiments
To investigate the added value of our annotations, we address a binary
classification problem: healthy (nevi) vs abnormal (melanoma and seborrheic
keratosis).
### 4.1 Annotation analysis
To gain insight into the characteristics of the collected annotations, we use
visual representations that provide detail and overview at the same time. In
particular, we created raincloud plots (Allen et al., 2019) with A, B, and C
annotations for each annotation source.
We compared the agreement level between the three types of annotation sources.
We first averaged the image’s scores separately for A, B, and C annotations
and then standardized these mean scores, resulting in z-scores. Based on the
z-scores, we calculated the agreement level using Pearson correlations.
To quantitatively measure how related the annotation sources and the
diagnostic labels (abnormal and healthy) are, we computed the Pearson’s
correlation coefficient between them for all collected annotations for the
ISIC and the PH2 dataset.
We interpret the Pearson’s correlation coefficient $\rho$ as follows: weak
correlation for $0\leq\rho<0.3$, moderate correlation for $0.3\leq\rho<0.5$,
strong correlation for $0.5\leq\rho<1$.
### 4.2 Multi-task learning
To understand how the collected annotations can contribute to training deep
learning algorithms, we performed several experiments where we compared a
baseline model which is trained only on the diagnosis, and a MTL model which
is trained on both the diagnosis and one or more of the collected ISIC based
ABC annotations (Fig. 2). We compared these for three different CNN
architectures: VGG-16 (Simonyan and Zisserman, 2015), Inception v3 (Szegedy et
al., 2016), and ResNet50 (He et al., 2016).
Figure 2: Architecture of baseline (top) and MTL (bottom) models. All models
are on top of the VGG-16, Inception v3 or ResNet50 convolutional base.
The baseline model extends the convolutional base with two fully connected
layers with a sigmoid activation function. During training, we use class
weights to pay more attention to samples from the underrepresented class. We
use cross-entropy as a loss function. All choices for the baseline model were
made based on only the training and validation set. We fine-tune the baseline
model until the performance on the validation dataset was within the
performance of the ISIC 2017 challenge.
The multi-task model extends the convolutional base with three fully connected
layers. The model has two outputs with different network heads: one head is
the classification output, the other represents the visual feature (such as
asymmetry). We use a customized mean squared error loss $L_{MTL}$ and a last
layer linear mapping for the annotation-regression task. We used a vector
$a_{i}$ in which we store per lesion whether or not an annotation is
available. If an annotation is present, then $a_{i}$ is equal to 1; otherwise,
$a_{i}$ is 0. This vector is used in a custom loss function that calculates
the mean squared error. In case no annotation is available, it does not affect
the weights, and the error is not propagated. For the binary classification
task, we used a cross-entropy loss $L_{c}$ and sigmoid activation function of
the nodes. The contribution of the losses is equal – we did not optimize the
weighting parameter, but early experiments showed that the contribution of the
classification loss should not be too low. The resulting loss values are
summed and minimized during network training. For our MTL models, the loss
function (1) is as follows:
$\displaystyle
L_{MTL}=0.5({\frac{1}{A}}{\sum_{i=1}^{N}}a_{i}(y_{i}-\hat{y_{i}})^{2})+0.5L_{c}$
(1)
where $A$ denotes the number of available annotations, $N$ represents the
number of lesions, and $y_{i}$ and $\hat{y_{i}}$ denotes respectively the
prediction and the expected outcome for lesion $i$.
To investigate the value of the additional annotations, we compare baseline
networks with multi-task networks to which we add one of the following nine
types of annotations individually:
* •
Asymmetry: AutoA, CrowdA, StudA
* •
Border: AutoB, CrowdB, StudB
* •
Color: AutoC, CrowdC, StudC
We also combine the networks above into ensembles, by averaging the network
predictions with equal weights (earlier experiments (Raumanns et al., 2020)
showed limited effectiveness of optimizing the weights). We tested the
following three ensembles:
* •
StudA + StudB + StudC (named studABC)
* •
CrowdA + CrowdB + CrowdC (named crowdABC)
* •
AutoA + AutoB + AutoC (named autoABC)
Finally, we trained the ResNet50 MTL models with synthetic annotations. We
replaced the original A, B and C scores with uniformly randomized ones in the
range [0.0, 1.0] and combined them into ensembles.
The experimental procedure is as follows: we trained all CNN models using 70%
as training, 17.5% as validation and 12.5% as test proportions, in a five-fold
cross-validation approach. We trained all layers, including the convolutional
base, starting with the pre-trained ImageNet weights. For training, we used 30
epochs with a batch size of 20 using the default backpropagation algorithm
RMSprop (Tieleman and Hinton, 2012) as the optimizer, with a learning rate of
$2.0\mathrm{e}{-5}$.
To determine a reasonable learning rate, we evaluated six learning rates on
the baseline VGG-16 model (varying over 2 orders of magnitude, between 1.0e-3
and 1.0e-5). We did not vary the learning rate across the different model
architectures to keep the number of experiments reasonable while still having
a systematic comparison. A description of all hyperparameters is available in
Table 6 (Appendix B. Hyperparameters).
We performed the ensemble of the predictions of multi-task models through
averaging; we based the lesion’s classification on the predictions of the
three multi-task models, with each model’s prediction having an equal weight
(a third).
We compared the average area under the receiver operating characteristic curve
(AUC) of the baseline model to the average AUC scores of the different multi-
task models and ensembles. The average AUC score was calculated per
experiment, taking the average of the AUC score of each fold.
We realized our deep learning models in Keras using the TensorFlow backend
(Géron, 2019).
## 5 Results
### 5.1 Correlations between annotations and the diagnostic label
The first research question is whether annotations for ABC criteria are
discriminative for diagnosis. We show the distributions of asymmetry, border
and color versus the label (normal or abnormal) for each annotation source in
Fig. 3 (ISIC) and Fig. 4 (PH2). Table 3 lists Pearson correlation coefficient
measures between annotation type and diagnostic label for ISIC annotations.
Figure 3: Raincloud plots of automated, crowd, and student ISIC annotations. Diagnostic label 1 stands for abnormal, label 0 for healthy lesions. Figure 4: Raincloud plots of automated, crowd, and expert PH2 annotations. Diagnostic label 1 corresponds to abnormal lesions. Table 3: Pearson correlation coefficient measures between annotation type and diagnostic label Type | A | B | C
---|---|---|---
Automated | 0.046 | 0.071 | -0.122
Crowd | 0.166 | -0.017 | 0.103
Student | 0.151 | 0.161 | 0.230
The distributions of the A, B and C scores for each diagnostic label overlap
considerably. StudA, StudB, StudC, CrowdA, and CrowdC sample medians for
abnormal lesions were greater than sample medians for normal ones. AutoA,
AutoB, AutoC, and CrowdB sample medians for abnormal and normal lesion are
almost identical, although the underlying nature of raw AutoA observations is
different. The width of the AutoA annotations belonging to the normal
distribution is greater than those of the abnormal distribution.
The data of ExpA are right-skewed for normal lesions and left-skewed for
abnormal ones; their normal and abnormal distributions do not overlap. CrowdA
for normal lesions is unimodal; the data is centered around the middle. CrowdA
for abnormal lesions is bimodal. The CrowdA’s abnormal and normal
distributions partially overlap. AutoA’s distributions for abnormal and normal
lesions overlap considerably, and the sample median for abnormal is greater
than the sample median for normal ones.
The distributions of ExpC, CrowdC and AutoC are multimodal. The ExpC’s
abnormal and normal distributions partially overlap. CrowdC’s and AutoC’s
distribution for abnormal and normal lesions considerably overlap.
The Pearson’s coefficient (Table 3) indicates there is no correlation between
the crowd-B annotations and the diagnostic label. No correlation also applies
to the AutoA and AutoB annotations. We see a weak correlation between all
three types of student annotations (StudA, StudB, and StudC), the AutoC
annotations and the diagnostic label.
### 5.2 Inter agreement level between the different annotation sources
The second research question examined the level of agreement between
annotation sources for the A, B and C criteria. In order to answer this
question, the results of the analysis of agreement level using Pearson
correlations were examined. Figure 5 illustrates these correlations
graphically.
---
---
---
Figure 5: Pearson’s correlation coefficient measures for A, B and C features
For asymmetry, we observed a moderate positive correlation between student and
crowd annotations. For color, we observed a weak correlation between all
annotation sources. We observed no correlation between the different sources
for border annotations.
### 5.3 Effect on CNN performance for multiple annotations usage
Our last research question examines the performance benefit of using multiple
annotations in a multi-task model. We used the annotations together with skin
lesion images for training multi-task CNNs. We explored how they affect the
model’s performance compared to a baseline model without using annotations.
Figure 6: AUCs of baseline and multi-task models (asymmetry, border and color)
per CNN architecture.
The AUCs of the baseline and multi-task models are shown in Fig. 6 (the
numerical results are also available in Appendix A. AUC performances). Table 4
compares the AUCs of the ensembles based on randomized annotations and
original annotations.
Table 4: Mean AUCx100 performances of ResNet50 MTL ensembles trained with original and randomized annotations Annotations | autoABC | crowdABC | studABC
---|---|---|---
Original | 87.1 ± 1.9 | 86.3 ± 2.4 | 86.1 ± 2.1
Randomized | 85.0 ± 2.4 | 84.4 ± 2.8 | 84.6 ± 2.4
The AUC values for each CNN architecture are close together. The Inception v3
CNN outperformed the ResNet50 and VGG-16 architectures for all three features,
but for studA, autoA and autoB multi-task models, ResNet50 performs slightly
better. The three ensembles show improved performance when compared to the
other models in the same architecture. The best performing model is the
autoABC ResNet50 ensemble model. For VGG-16 and ResNet50 the multi-task models
outperform the baseline models. For Inception v3 only studC, studABC, crowdA,
crowdB, crowdABC, autoA and autoABC models outperform the baseline model.
Table 4 shows that ResNet50 MTL ensembles trained with retrieved annotations
perform better than ensembles with randomized annotations.
## 6 Discussion
### 6.1 Summary of results
#### 6.1.1 At most moderate correlations between annotations and the
diagnostic label
In general, the acquired non-expert annotations (especially the student
annotations) show a weak correlation with the diagnostic label (Table 3). At
the same time, automated annotations show only a correlation for the color
feature. Results in a study by Giotis et al. (2013) support this. They show
that the color feature has a discriminative power, but the border feature not.
In their study, they did not assess asymmetry.
#### 6.1.2 Weak to moderate inter agreement level between the different
annotation sources
We observed low agreement between student and crowd for asymmetry and color
scores and comparable agreement level between automated and non-expert color
features. In contrast, we observed disagreement for the border feature between
non-experts and automated scores. Based on these agreement levels, annotating
the asymmetry and color seems more straightforward than annotating the border.
Measures with disagreement can still be informative. According to Cheplygina
et al., ”Although removing disagreement leads to the best performances, we
show that disagreement alone leads to better-than-random results. Therefore,
the disagreement of these crowd labels could be an advantage when training a
skin lesion classifier with these crowd labels as additional outputs”
Cheplygina and Pluim (2018).
#### 6.1.3 A mainly positive effect on CNN performance for multiple
annotations usage
Our preprint (Raumanns et al., 2020) showed that VGG-16 based multi-task
models with individual crowdsourced features have a limited effect on the
model. Still, when combined in ensembles, it leads to improved generalization.
This paper has further confirmed this improved generalization for Inception v3
CNN and the ResNet50 based multi-task models. We also showed that the
Inception v3 CNN outperformed the ResNet50 and VGG-16 architectures for all
three annotations. The ResNet50 showed improved performance compared to the
VGG-16 model.
One perhaps surprising result is that noisy annotations positively contribute
to the performance. Our annotations are highly noisy, as shown by the
correlation coefficients in Table 3 and the raincloud plots in Fig. 3. We
explain the success of these annotations by several factors. First,
annotations that are perfectly correlated with the diagnostic label would not
add information to the classifier. Second, training multiple (biased)
classifiers and combining these in an ensemble is a well-known result that can
lead to improved generalization (Jain et al., 2000). We also show that this is
the case for fully randomized annotations (Table 4), but that this is less
effective than our gathered annotations. Finally, the classifier also learns
from the diagnostic labels; learning from only the annotations is not
feasible.
### 6.2 Limitations
We demonstrated the added value of using non-expert and automated annotations
for model learning. Yet, we have not optimally tuned the algorithms for
automatically scoring the ABC features. Also, the algorithms depend on the
available masks. The quality of these masks differs and affects the automated
score of asymmetry and border irregularity. Furthermore, we did not optimize
the multi-task model to achieve the highest performance.
There are three main differences between the annotation by the crowd and the
students. Firstly, the student annotations were done in an educational
setting, and students were encouraged to decide their annotation protocols
based on existing literature. Letting the crowd decide on their protocol was
not feasible due to the distributed nature of crowdsourcing: the crowd workers
do not interact with each other, and most annotate only a few images.
Secondly, students were not blinded to the diagnostic label while annotating.
Since it is a public dataset, anybody could try to find the label, but this is
less likely for MTurk because the MTurk jobs are time-limited. Thirdly, only
the ISIC skin lesions were part of the student assignment. The PH2 dataset was
only added to this study after an informal review round after the subject was
no longer taught.
Thompson et al. (2016) conclude that personal characteristics (such as sex and
age) influence healthcare-seeking behavior; thus, the datasets might have an
unintended bias against subjects from specific groups. Abbasi-Sureshjani et
al. (2020) showed that even when the training set is relatively balanced,
there is a variable performance on subgroups based on age and sex. For the
ISIC dataset, the distribution between men and women is roughly the same.
However, the dataset is skewed towards lower age groups. Unfortunately, the
sex and age characteristics are missing for the PH2 dataset. Besides these,
the Fitzpatrick phototype (Sachdeva, 2009) is another characteristic that
would be relevant in this prediction problem. The PH2 dataset contains lesions
with phototype II or III (Mendonca et al., 2015), but it is unspecified per
lesion, and the ISIC database does not have phototype information. The
discussed unintended bias or missing demographic characteristics might lead to
representation bias, ultimately leading to an insufficiently representative
model.
### 6.3 Opportunities
In this study, we used automated annotations based on best in class image
algorithms. However, the automated annotations are not as discriminative as
the expert annotations for diagnosis. A future study could concentrate on
tuning the used image algorithms or finding new algorithms that mimic expert
annotations more closely.
Another important direction for future research is explainability. We showed
that multi-task models with non-expert annotations have a limited effect on
the model performance. However, the multi-task prediction of ABC scores
together with a diagnosis helps to explain the diagnostic outcome. For
example, when the model predicts abnormality and high ABC scores, the latter
could be interpreted as warning signs/explanation for abnormality. The use of
the model in this way needs further research. For instance, what kind of model
architectures fit the best for this explanation task? What types of
annotations are suitable for this task? What kind of model produces gradual
class activation maps (Selvaraju et al., 2017) that explain the model outcome
to dermatologists?
We used three different sources to collect annotations for the ISIC and PH2
dataset to create a new open dataset that incorporates these additional
annotations and then used this dataset to see whether a multi-task model can
take advantage of the extra annotations. A future study, for example, might
consider clarifying the multi-task model performance benefit of additional
annotations for mammography in the domain of breast cancer diagnosis or
studying the quality of the extra annotations in another field.
The annotators’ expertise levels will probably be different. Depending on the
level of expertise, an annotation can have more or less influence during the
model’s training procedure. This could be possible via different weights or by
modeling the expertise of each annotator, similar to Guan et al. (2017).
However, this might be more applicable for few annotators who annotated all
images, rather than many annotators who each annotate a few images, as in
crowdsourcing.
This study used the ground truth masks’ segmentation masks for extracting
asymmetry, border irregularity, and color characteristics. We see a wide
variation in the given segmentation masks, with boundaries ranging from
precisely defined to more loose ones. Some masks also have clipped boundaries.
Optimizing these masks need to be considered in future studies.
## 7 Conclusions
This paper presented ENHANCE, an open dataset with additional annotations,
gathered by three different annotation sources, for ISIC 2017 and PH2 images
of skin lesions, describing the lesions’ asymmetry, border, and color. We
tested the dataset extensively with three different network architectures
(VGG-16, ResNet50 and Inception c3) and show that the often claimed
enhancement of multiple tasks is marginal.
The asymmetry and color annotations from different annotation sources show
their discriminative power to diagnose healthy or abnormal. At the same time,
there is a moderate agreement level between the annotation sources.
Nevertheless, this disagreement could be advantageous when training a skin
lesion classifier with the annotations as additional output.
Acknowledgments
We would like to acknowledge all students and crowd workers who have
contributed to this project with image annotation. We gratefully acknowledge
financial support from the Netherlands Organization for Scientific Research
(NWO), grant no. 023.014.010.
Ethical Standards
The work follows appropriate ethical standards in conducting research and
writing the manuscript, following all applicable laws and regulations
regarding treatment of animals or human subjects.
Conflicts of Interest
We declare we don’t have conflicts of interest.
## References
* Abbasi et al. (2004) Naheed R Abbasi, Helen M Shaw, Darrell S Rigel, Robert J Friedman, William H McCarthy, Iman Osman, Alfred W Kopf, and David Polsky. Early diagnosis of cutaneous melanoma: revisiting the ABCD criteria. _JAMA_ , 292(22):2771–2776, December 2004.
* Abbasi-Sureshjani et al. (2020) Samaneh Abbasi-Sureshjani, Ralf Raumanns, Britt E J Michels, Gerard Schouten, and Veronika Cheplygina. Risk of training diagnostic algorithms on data with demographic bias. In _Interpretable and Annotation-Efficient Learning for Medical Image Computing_ , pages 183–192. Springer International Publishing, 2020\.
* Achanta et al. (2012) Radhakrishna Achanta, Appu Shaji, Kevin Smith, Aurelien Lucchi, Pascal Fua, and Sabine Süsstrunk. SLIC superpixels compared to state-of-the-art superpixel methods. _IEEE Trans. Pattern Anal. Mach. Intell._ , 34(11):2274–2282, November 2012.
* Allen et al. (2019) Micah Allen, Davide Poggiali, Kirstie Whitaker, Tom Rhys Marshall, and Rogier A Kievit. Raincloud plots: a multi-platform tool for robust data visualization. _Wellcome Open Res_ , 4:63, April 2019.
* Caruana (1997) Rich Caruana. Multitask learning. _Mach. Learn._ , 28(1):41–75, July 1997.
* Cheplygina and Pluim (2018) Veronika Cheplygina and Josien P W Pluim. Crowd disagreement about medical images is informative. In _Intravascular Imaging and Computer Assisted Stenting and Large-Scale Annotation of Biomedical Data and Expert Label Synthesis_ , pages 105–111. Springer International Publishing, 2018.
* Codella et al. (2017) Noel C F Codella, David Gutman, M Emre Celebi, Brian Helba, Michael A Marchetti, Stephen W Dusza, Aadi Kalloo, Konstantinos Liopyris, Nabin Mishra, Harald Kittler, and Allan Halpern. Skin lesion analysis toward melanoma detection: A challenge at the 2017 international symposium on biomedical imaging (ISBI), hosted by the international skin imaging collaboration (ISIC). _arXiv preprint arXiv:1710.05006_ , October 2017.
* Dhungel et al. (2017) Neeraj Dhungel, Gustavo Carneiro, and Andrew P Bradley. A deep learning approach for the analysis of masses in mammograms with minimal user intervention. _Medical Image Analysis_ , 37:114–128, 2017.
* Géron (2019) Aurélien Géron. _Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems_. “O’Reilly Media, Inc.”, September 2019.
* Giotis et al. (2013) Ioannis Giotis, Margaretha Visser, Marcel Jonkman, and Nicolai Petkov. Discriminative power of visual attributes in dermatology. _Skin Res. Technol._ , 19(1):e123–31, February 2013.
* Guan et al. (2017) Melody Y Guan, Varun Gulshan, Andrew M Dai, and Geoffrey E Hinton. Who said what: Modeling individual labelers improves classification. _arXiv preprint arXiv:1703.08774_ , 2017.
* He et al. (2016) Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In _Proceedings of the IEEE conference on computer vision and pattern recognition_ , pages 770–778, 2016.
* Hussein et al. (2019) Sarfaraz Hussein, Pujan Kandel, Candice W Bolan, Michael B Wallace, and Ulas Bagci. Lung and pancreatic tumor characterization in the deep learning era: Novel supervised and unsupervised learning approaches. _IEEE Transactions on Medical Imaging_ , 38(8):1777–1787, 2019.
* Jain et al. (2000) Anil K Jain, Robert P. W. Duin, and Jianchang Mao. Statistical pattern recognition: A review. _IEEE Transactions on Pattern Analysis and Machine Intelligence_ , 22(1):4–37, 2000.
* Jaworek-Korjakowska (2015) Joanna Jaworek-Korjakowska. Novel method for border irregularity assessment in dermoscopic color images. _Comput. Math. Methods Med._ , 2015:496202, October 2015\.
* Kasmi and Mokrani (2016) Reda Kasmi and Karim Mokrani. Classification of malignant melanoma and benign skin lesions: implementation of automatic ABCD rule. _IET Image Processing_ , 10(6):448–455, 2016\.
* Liu et al. (2018) Jiali Liu, Wanyu Li, Ningbo Zhao, Kunlin Cao, Youbing Yin, Qi Song, Hanbo Chen, and Xuehao Gong. Integrate domain knowledge in training CNN for ultrasonography breast cancer diagnosis. In _Medical Image Computing and Computer Assisted Intervention – MICCAI 2018_ , pages 868–875. Springer International Publishing, 2018.
* Mendonca et al. (2015) T F Mendonca, M E Celebi, T Mendonca, and J S Marques. Ph2: A public database for the analysis of dermoscopic images. _Dermoscopy image analysis_ , 2015.
* Murthy et al. (2017) Veda Murthy, Le Hou, Dimitris Samaras, Tahsin M Kurc, and Joel H Saltz. Center-focusing multi-task CNN with injected features for classification of glioma nuclear images. In _IEEE Winter Conference on Applications of Computer Vision (WACV)_ , pages 834–841. IEEE, 2017.
* Pacheco et al. (2020) Andre G C Pacheco, Gustavo R Lima, Amanda S Salomão, Breno Krohling, Igor P Biral, Gabriel G de Angelo, Fábio C R Alves, Jr, José G M Esgario, Alana C Simora, Pedro B C Castro, Felipe B Rodrigues, Patricia H L Frasson, Renato A Krohling, Helder Knidel, Maria C S Santos, Rachel B do Espírito Santo, Telma L S G Macedo, Tania R P Canuto, and Luíz F S de Barros. PAD-UFES-20: A skin lesion dataset composed of patient data and clinical images collected from smartphones. _Data Brief_ , 32:106221, October 2020.
* Raumanns et al. (2020) Ralf Raumanns, Elif K Contar, Gerard Schouten, and Veronika Cheplygina. Multi-task ensembles with crowdsourced features improve skin lesion diagnosis. _arXiv preprint arXiv:2004. 14745_ , 2020.
* Ruder (2017) Sebastian Ruder. An overview of multi-task learning in deep neural networks. _arXiv preprint arXiv:1706.05098_ , 2017.
* Sachdeva (2009) Silonie Sachdeva. Fitzpatrick skin typing: applications in dermatology. _Indian J. Dermatol. Venereol. Leprol._ , 75(1):93–96, January 2009.
* Selvaraju et al. (2017) Ramprasaath R Selvaraju, Michael Cogswell, Abhishek Das, Ramakrishna Vedantam, Devi Parikh, and Dhruv Batra. Grad-cam: Visual explanations from deep networks via gradient-based localization. In _Proceedings of the IEEE international conference on computer vision_ , pages 618–626, 2017.
* Shi et al. (2019) Jialin Shi, Department of Electrical Engineering, Tsinghua University, Beijing, China, Ji Wu, Ping Lv, and Jiajia Guo. BreastNet: Entropy-Regularized transferable multi-task learning for classification with limited breast data, 2019.
* Simonyan and Zisserman (2015) Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for large-scale image recognition. _CoRR_ , abs/1409.1556, 2015.
* Szegedy et al. (2016) Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jon Shlens, and Zbigniew Wojna. Rethinking the inception architecture for computer vision. In _Proceedings of the IEEE conference on computer vision and pattern recognition_ , pages 2818–2826, 2016.
* Thompson et al. (2016) Ashley E Thompson, Yvonne Anisimowicz, Baukje Miedema, William Hogg, Walter P Wodchis, and Kris Aubrey-Bassler. The influence of gender and other patient characteristics on health care-seeking behaviour: a QUALICOPC study. _BMC Fam. Pract._ , 17:38, March 2016.
* Tieleman and Hinton (2012) Tijmen Tieleman and Geoffrey Hinton. Rmsprop: Divide the gradient by a running average of its recent magnitude. coursera: Neural networks for machine learning. _COURSERA Neural Networks Mach. Learn_ , 2012.
* Tschandl et al. (2018) Philipp Tschandl, Cliff Rosendahl, and Harald Kittler. The HAM10000 dataset, a large collection of multi-source dermatoscopic images of common pigmented skin lesions. _Scientific Data_ , 5(1), 2018.
* Winkler et al. (2019) Julia K. Winkler, Christine Fink, Ferdinand Toberer, Alexander Enk, Teresa Deinlein, Rainer Hofmann-Wellenhof, Luc Thomas, Aimilios Lallas, Andreas Blum, Wilhelm Stolz, and Holger A. Haenssle. Association Between Surgical Skin Markings in Dermoscopic Images and Diagnostic Performance of a Deep Learning Convolutional Neural Network for Melanoma Recognition. _JAMA Dermatology_ , 155(10):1135–1141, 10 2019\. ISSN 2168-6068. doi: 10.1001/jamadermatol.2019.1735. URL https://doi.org/10.1001/jamadermatol.2019.1735.
* Winkler et al. (2021) Julia K Winkler, Katharina Sies, Christine Fink, Ferdinand Toberer, Alexander Enk, Mohamed S Abassi, Tobias Fuchs, and Holger A Haenssle. Association between different scale bars in dermoscopic images and diagnostic performance of a market-approved deep learning convolutional neural network for melanoma recognition. _Eur. J. Cancer_ , 145:146–154, March 2021.
## Appendix A. AUC performances
Table 5 shows the mean AUCx100 of 5-fold cross-validation of Inception v3,
ResNet50 and VGG-16 CNN baseline and multi-task models. We trained the multi-
task models on all features (A, B and C) from three different annotation
sources (student, crowd, and automated). The AUC of the best performing model
per CNN architecture is emphasized in bold.
Table 5: Mean AUCx100 performances of 5-fold cross-validation on all features (Asymmetry, Border and Color) for three different CNNs. Type | Inception v3 | ResNet50 | VGG-16
---|---|---|---
baseline | 85.3 ± 1.2 | 83.6 ± 2.7 | 77.0 ± 3.0
autoA | 85.4 ± 2.3 | 85.7 ± 1.3 | 79.0 ± 2.6
autoB | 84.8 ± 2.0 | 85.3 ± 2.4 | 78.8 ± 3.7
autoC | 85.0 ± 1.6 | 84.5 ± 2.2 | 79.1 ± 4.0
autoABC | 86.4 ± 1.8 | 87.1 ± 1.9 | 81.0 ± 3.1
crowdA | 85.5 ± 2.2 | 84.8 ± 1.0 | 80.9 ± 1.6
crowdB | 86.1 ± 1.0 | 85.3 ± 2.7 | 78.6 ± 1.3
crowdC | 85.1 ± 0.6 | 84.2 ± 3.5 | 78.6 ± 3.3
crowdABC | 86.7 ± 1.4 | 86.3 ± 2.4 | 80.9 ± 2.3
studA | 84.0 ± 2.2 | 85.8 ± 2.6 | 80.3 ± 1.7
studB | 85.2 ± 1.2 | 84.6 ± 2.1 | 79.9 ± 1.8
studC | 85.7 ± 1.6 | 84.4 ± 2.7 | 78.9 ± 2.9
studABC | 86.2 ± 1.4 | 86.1 ± 2.1 | 81.2 ± 1.9
## Appendix B. Hyperparameters
The table below describes the hyperparameter choices for baseline and MTL
experiments.
Table 6: Describes each parameter, its value, and, when applicable, the name in the Python code Hyperparameter | Value baseline | Value MTL | Name in code
---|---|---|---
Learning rate | $2.0\mathrm{e}{-5}$ | $2.0\mathrm{e}{-5}$ |
Optimizer | RMSprop | RMSprop |
Batch size | 20 | 20 | BATCH$\\_$SIZE
Activation function | Sigmoid | Sigmoid (classification) |
| | Linear (annotation) |
Number of epochs | 30 | 30 | EPOCHS
Steps per epoch | 100 | 100 | STEPS$\\_$PER$\\_$EPOCH
Steps to validate | 50 | 50 | VALIDATION$\\_$STEPS
Steps to yield from pred.generator | 20 | 20 | PREDICTION$\\_$STEPS
Class weights | balanced | balanced |
Input shape | (384, 384, 3) | (384, 384, 3) | INPUT$\\_$SHAPE
Include top | False | False |
Pre-training | Imagenet | Imagenet |
## Appendix C. Automatic annotation
This appendix explains the different steps of automated asymmetry, border and
color algorithms. Fig. 7 presents a schematic overview of the algorithm
annotation steps.
As a preprocessing step, we first rotate and center the provided segmentation
mask, such that the major axis (longest diameter of the lesion) passes
horizontally through the segmentation center of mass. This is the major axis,
the minor axis is then defined as the diameter perpendicular to the major axis
and also passing through the center of mass.
The asymmetry algorithm is based on shape asymmetry (Kasmi and Mokrani, 2016).
The asymmetry score algorithm steps are:
1. 1.
flip the rotated image over both axes separately to measure the overlap in
pixels between the mask areas on either side of the axis;
2. 2.
determine the shape symmetry ratio for an axis by dividing the overlap in
pixels by the total amount of pixels in the lesion’s mask;
3. 3.
calculate the score by averaging the symmetry ratios of both axes.
The border score is based on (Jaworek-Korjakowska, 2015) and assesses the
border irregularity as follows:
1. 1.
calculate a bounding box around the segmentation and connect four lines
between the bounding box’s vertices and the center of mass;
2. 2.
locate the border pixels that are on each of the four lines (resulting in a
total of four border pixels);
3. 3.
divide the border into four parts with the help of the four pixels (clockwise:
top, right, bottom and left part border pixels);
4. 4.
calculate the shortest distance between the border pixel and the edge’s image
for each of the four parts (the direction in which the distances are
calculated varies per part; for the top border pixels in the upward direction,
the right part border pixels in the rightward direction, the bottom border
pixels in the downward direction and the left border pixels in the leftward
direction);
5. 5.
create a borderline function based on the pixel location on the border and the
calculated distances;
6. 6.
smooth the borderline function with a Gaussian filter;
7. 7.
count the number of turning points in the smoothed signal, resulting in the
actual border score.
The color algorithm is based on (Kasmi and Mokrani, 2016) and computes the
number of the suspicious colors present in the lesion: light brown, dark
brown, white, blue-gray, black, and red, as follows:
1. 1.
extract the region of interest from the lesion image using the mask;
2. 2.
segment the region of interest into superpixels by using the SLIC superpixels
algorithm (Achanta et al., 2012);
3. 3.
find all unique colors (having different RGB values) that are present in the
SLIC superpixels;
4. 4.
measure the normalized Euclidean distance between each unique color in the set
of SLIC superpixels and the six predefined values for the suspicious colors;
5. 5.
link a unique color to a suspicious color when its distance is less than a
fixed threshold (0.4);
6. 6.
count a linked unique color as a suspicious color when the number of pixels
belonging to that unique color exceeds five per cent of the total amount of
pixels of the region of interest;
Figure 7: A schematic overview of the different steps of the automated
annotation of asymmetry, border and color.
## Appendix D. Amazon MTurk annotation
The following three figures represent the screens presented to the crowd
workers by the online AmazonMechanical Turk (www.mturk.com) crowdsourcing
tool. First, the workers receive instruction (Figure 8) to assess the skin
lesions. Second, the tool presents three examples (Figure 9) that illustrate
scoring asymmetry, border and color. Third, the crowdsourcing tool presents
one by one the skin lesions (Figure 10). The crowd workers annotate each
presented skin lesion by using the scoring sliders and pressing the submit
button. With each skin lesion presented, the MTurk crowdsourcing tool shows
the instructions and examples.
Figure 8: An instruction screen with the task description. Figure 9: A screen
with three examples showing how to score skin lesions. Figure 10: A screen
with a skin lesion to be scored using the scoring sliders and pressing the
submit button.
| arxiv-papers | 2021-07-27T11:23:33 | 2024-09-04T03:07:21.317319 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Ralf Raumanns, Gerard Schouten, Max Joosten, Josien P. W. Pluim and\n Veronika Cheplygina",
"submitter": "Ralf Raumanns",
"url": "https://arxiv.org/abs/2107.12734"
} |
2107.12737 | # A Study of the Soft X-ray Emission Lines in NGC 4151
I. Kinematic Properties of the Plasma Wind
S. Grafton-Waters Mullard Space Science Laboratory, University College London,
Holmbury St. Mary, Dorking, Surrey RH5 6NT, UK M. Ahmed S. Henson F. Hinds-
Williams B Ivanova E. Marshall H. Udueni D. Theodorakis Nottingham
University Academy of Science and Technology, 93 Abbey St, Lenton, Nottingham
NG7 2PL W. Dunn Mullard Space Science Laboratory, University College London,
Holmbury St. Mary, Dorking, Surrey RH5 6NT, UK
###### Abstract
We present our analysis of the narrow emission lines produced in the plasma
regions within the bright active galactic nucleus of NGC 4151, from an ORBYTS
research-with-schools public engagement project. Our goal was to test whether
the properties of these plasma regions changed between XMM-Newton observations
spanning 15 years from 2000 to 2015, by measuring the outflow velocities and
distances. From this study, we found that NGC 4151 has at least two to three
plasma regions. There is no evidence of the outflowing wind properties
changing as the velocities and distances are consistent throughout the
observations.
## 1 Introduction
NGC 4151 (z = 0.003262) is a type 1.5 Seyfert active galactic nucleus (AGN)
with a black hole (BH) mass of $M_{BH}=3.59\times 10^{7}$ M$\odot$ (Bentz &
Katz, 2015). While NGC 4151 is highly variable in the hard X-ray band (e.g.
Beuchert et al., 2017), the soft X-ray spectrum is very similar to that of NGC
1068 with multiple strong emission features on top of an almost negligible
continuum (e.g. Grafton-Waters, 2021a). This extreme contrast between soft and
hard X-ray bands makes NGC 4151 an ideal target to study the properties of the
narrow line region (NLR). The NLR is part of the outflowing wind, composed of
separate plasma regions, that produces the emission lines observed in the
X-ray spectra (see Figure 1). The aim of this ORBYTS research-with-schools
public engagement was to assess whether the NLR properties changed between
observations spanning a 15 year period, by measuring the outflow velocities
and distances of each region. The code can be found at Grafton-Waters (2021b).
Figure 1: (a) RGS spectrum (grey line) with the Gaussian models (red lines)
fitted to the strongest emission lines. The lines we investigated are labelled
with their respective ions. The r, i and f labels stand for resonance,
intercombination and forbidden, respectively, corresponding to electron
transitions in the He-like triplet ions (see e.g. Porquet & Dubau, 2000, for
details). The insert shows the OVII f line fitted with its respective
Gaussian. (b-c) Measured line velocities using Eq. 2 and (d-e) calculated
distances from Eq. 3 are compared for 2000 (left) and 2015 (right). Colours
indicate different observations from each epoch, as labelled in the legends,
and the black dashed lines signify the boundaries between plasma regions.
## 2 Method
NGC 4151 was observed 27 times by XMM-Newton during six separate epochs
between 2000 and 2015. Here we analysed the reflection grating spectrometer
(RGS; den Herder et al., 2001) data from each observation. The data were
reduced using the RGSPROC command in the SAS software v 17.0.0111See
https://www.cosmos.esa.int/web/xmm-newton/sas-thread-rgs. Any large background
counts in CCD9 were removed before combining RGS1 and RGS2 data with
RGSCOMBINE.
We modelled the thirteen strongest emission lines (labelled in Figure 1) that
were present in all X-ray spectra with a simple Gaussian model in Python,
defined as
$G(x)=\frac{A}{\sqrt{2\pi\sigma^{2}}}\exp{\left[-\frac{(x-\mu)^{2}}{2\sigma^{2}}\right]},$
(1)
where A is the amplitude, $\sigma$ is the standard deviation, and $\mu$ is the
mean value (the emission line centre). To measure the properties of each
emission line we defined a wavelength range ($\lambda_{R}$) to ensure we were
only fitting one line at a time. This is shown in the insert in Figure 1 (a).
This Gaussian model and the X-ray spectrum were then fed into the LMFIT
interface in Python (Newville et al., 2014), which returned the parameter
values ($\mu$, $\sigma$, and A) and errors.
To estimate the outflow velocity ($v_{out}$) of the plasma regions, we used
the redshift ($z$) equation, given by
$z=\frac{v_{out}}{c}=\frac{\lambda_{obs}-\lambda_{rest}}{\lambda_{rest}},$ (2)
where c is the speed of light, and $\lambda_{obs}$ and $\lambda_{rest}$ are
the observed and rest frame wavelengths, respectively. The velocity shift was
measured for each emission line individually. The observed wavelength ($\mu$)
was measured from our modelling and the rest wavelengths were obtained from
the SPEX line
list222https://personal.sron.nl/~kaastra/leiden2020/line_new.pdf. We note that
it is not the emission line that has the velocity, but instead it is a
property of the line-emitting plasma region. If many of the emission lines had
similar values they were likely to originate from the same plasma region
within the outflowing wind. To estimate the distances ($R$) from the BH we
assumed that $v_{out}$ was greater than or equal to the escape velocity
($v_{esc}$) of the BH, given by
$R=\frac{2GM_{BH}}{v^{2}_{esc}},$ (3)
where G is the gravitational constant, and $M_{BH}$ is the BH mass.
After modelling each emission line, and obtaining the velocities and distances
from each observation, we compared results. This allowed us to evaluate
whether the wind properties changed over time.
## 3 Results
Figure 1 (a) shows the 2000 RGS spectrum with the Gaussian models fitted to
the strongest emission lines; these lines are labelled. The insert in Figure 1
(a) displays the OVII forbidden line at 22.15 Å with the Gaussian model fitted
on top. From the spectral modelling of all the observations, we compare the
results for the velocities and distances in 2000 (left) and 2015 (right) in
Figure 1 (b-c) and (d-e), respectively. The black dashed lines in Figure 1
indicate the plasma boundaries for $v_{out}$ and $R$, suggesting that there
are at least two to three plasma regions. However, we cannot rule out the
possibility of more. The results for 2000 and 2015 are consistent with the
velocities and distance from all observations.
Our aim was to see whether the outflowing wind properties changed over the
course of 15 years. However, based on this investigation, we found no evidence
of this. One may expect that from 2000 to 2015, the distances and velocities
would have increased and decreased, respectively, as the plasma regions move
away from the BH. However, assuming the plasma is travelling at 500 km s-1,
the distance travelled in a 15 year time period would only be 0.008 pc, which
is insignificant compared to the distances that we measured (i.e. $>1$ pc).
One explanation could be that we are viewing the plasma perpendicular to the
outflow direction, meaning we are unable to observe the true outflow velocity,
since the Doppler shifting of lines would only represent a component of its
true outflow velocity. Alternatively, the plasma has been relatively static
over the 15 years, which is reasonable given the large distances from the BH.
In that case, 15 years may simply not be enough time for us to observe any
significant changes with regards to the outflowing wind in NGC 4151.
We did have some problems when modelling the data, which could have affected
the final results. For example, the line centre ($\mu$) depended on
$\lambda_{R}$ which we set when modelling the lines. This meant that if
$\lambda_{R}$ was too large, then multiple lines would be fitted together by
the model, or if $\lambda_{R}$ was too small we would lose information about
the feature. This was a particular problem if $\lambda_{R}$ for an emission
line differed between observations, especially if the S/N ratios were poor. As
a result, a slightly different velocity was obtained each time.
## 4 Conclusions
From our RGS analysis on NGC 4151, we found that there are at least two to
three plasma regions that produce the emission features in the outflowing
wind. However, the velocities and distances are consistent throughout the
observations. This implies that either the plasma regions have been relatively
static over the 15 year observation period, or because we are seeing the
outflowing wind perpendicular to the flow direction, we are not measuring the
velocities in the direction of motion.
This work was undertaken with the ORBYTS Research-with-schools public
engagement project, partnering scientists with schools to support students’
involvement in space research. S.G.W. acknowledges the support of a PhD
studentship awarded by the UK Science & Technology Facilities Council (STFC).
## References
* Bentz & Katz (2015) Bentz, M. C., & Katz, S. 2015, PASP, 127, 67, doi: 10.1086/679601
* Beuchert et al. (2017) Beuchert, T., et al. 2017, A&A, 603, A50, doi: 10.1051/0004-6361/201630293
* den Herder et al. (2001) den Herder, J. W., et al. 2001, A&A, 365, L7, doi: 10.1051/0004-6361:20000058
* Grafton-Waters (2021b) Grafton-Waters, S., 2021b, sgwxray/ORBYTS Python Code, v1.0.0, Zenodo, doi: 10.5281/zenodo.5116838
* Grafton-Waters (2021a) Grafton-Waters, S., et al. 2021a, A&A, 649, A162, doi: 10.1051/0004-6361/202039022
* Newville et al. (2014) Newville, M., et al. 2014, LMFIT, 0.8.0, Zenodo, doi: 10.5281/zenodo.11813
* Porquet & Dubau (2000) Porquet, D., & Dubau, J. 2000, A&AS, 143, 495, doi: 10.1051/aas:2000192
| arxiv-papers | 2021-07-27T11:34:17 | 2024-09-04T03:07:21.336479 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "S. Grafton-Waters, M. Ahmed, S. Henson, F. Hinds-Williams, B Ivanova,\n E. Marshall, H. Udueni, D. Theodorakis, and W. Dunn",
"submitter": "Sam Grafton-Waters MPhys",
"url": "https://arxiv.org/abs/2107.12737"
} |
2107.12741 | # Partitioning all $k$-subsets into $r$-wise intersecting families
Noga Alon Princeton University, Princeton, NJ 08544, USA and Tel Aviv
University, Tel Aviv 69978, Israel. Email: [email protected]. Research
supported in part by NSF grant DMS-1855464 and BSF grant 2018267.
###### Abstract
Let $r\geq 2$, $n$ and $k$ be integers satisfying $k\leq\frac{r-1}{r}n$. In
the original arXiv version of this note we suggested a conjecture that the
family of all $k$-subsets of an $n$-set cannot be partitioned into fewer than
$\lceil n-\frac{r}{r-1}(k-1)\rceil$ $r$-wise intersecting families. We noted
that if true this is tight for all values of the parameters, that the case
$r=2$ is Kneser’s conjecture, proved by Lovász, and observed that the
assertion also holds provided $r$ is either a prime number or a power of $2$.
We have recently learned, however, that the assertion of the conjecture for
all values of the parameters follows from a recent result of Azarpendar and
Jafari [4].
## 1 Introduction
One of the earliest and possibly the best known application of topological
methods in extremal combinatorics is the Kneser conjecture, now Lovász’
Theorem [6]. This theorem asserts that for every $n\geq 2k$ it is impossible
to split the family of all $k$-subsets of an $n$-set into fewer than $n-2k+2$
intersecting families. The main purpose of this brief note is to study the
following extension of this result. Call a family of subsets $r$-wise
intersecting if any collection of at most $r$ subsets in it has a common
point.
###### Theorem 1.1.
Let $r\geq 2,n$ and $k$ be integers, and suppose $k\leq\frac{r-1}{r}n$. Then
the family of all $k$-subsets of $[n]=\\{1,2,\ldots,n\\}$ cannot be
partitioned into fewer than $\lceil n-\frac{r}{r-1}(k-1)\rceil$ $r$-wise
intersecting families ${\cal F}_{i}$. This is tight for all admissible values
of the parameters.
The case $r=2$ is Kneser’s Conjecture proved by Lovász.
As mentioned in the abstract, we have learned that this theorem is in fact a
special case of a recent result of Azarpendar and Jafari, see Theorem 1.1 and
Corollary 1.1 in [4]. Since we have already posted an early version of this
note before learning about this paper, we still describe here the observation
that the assertion of the theorem holds for every prime $r$ and for every $r$
which is a power of $2$.
## 2 Proof
One can prove Theorem 1.1 for prime $r$ and for $r$ which is a power of $2$
using tools from equivariant topology. It is much simpler, however, to deduce
it from known results about the chromatic numbers of stable Kneser
hypergraphs. We start by describing these results.
For $n\geq rk$ let $KG^{r}(k,n)$ denote the Kneser hypergraph whose vertex set
is the set of all ${n\choose k}$ subsets of cardinality $k$ of an $n$-set
$[n]=\\{1,2,\ldots,n\\}$ and whose edges are all $r$-tuples of $k$-sets which
are pairwise disjoint. For $r=2$ this is the Kneser graph. Lovász proved that
the chromatic number of $KG^{2}(k,n)$ is $n-2k+2$ for all $n\geq 2k$, and in
[3] it is proved that the chromatic number of $KG^{r}(k,n)$ is
$\lceil\frac{n-r(k-1)}{r-1}\rceil$ for all $n\geq rk$.
Call a subset $F$ of $[n]$ $s$-stable if any two elements of $F$ are at
distance at least $s$ in the cyclic order on $[n]$. Let $KG^{r}(k,n)_{s-stab}$
be the induced sub-hypergraph of $KG^{r}(k,n)$ on the set of vertices which
are $s$-stable. Ziegler [9], and Drewnowski, Łuczak and the present author [2]
conjectured that the chromatic number of $KG^{r}(k,n)_{r-stab}$ is also
$\lceil\frac{n-r(k-1)}{r-1}\rceil$, just as that of the full hypergraph
$KG^{r}(k,n)$. We need the following known result regarding this conjecture.
###### Theorem 2.1 ([8], [2]).
If $r$ is any power of $2$ then the chromatic number of $KG^{r}(k,n)_{r-stab}$
is $\lceil\frac{n-r(k-1)}{r-1}\rceil$ for all admissible values of $k,n$.
The case $r=2$ was proved by Schrijver in [8], and in [2] it is shown that if
the result holds for $r_{1}$ and $r_{2}$ then it also holds for $r_{1}r_{2}$,
implying the assertion for all powers of $2$.
Improving results of Meunier [7] and of Alishahi and Hajiabolhassan [1], Frick
proved in [5] that the chromatic number of $KG^{r}(k,n)_{2-stab}$ is
$\lceil\frac{n-r(k-1)}{r-1}\rceil$. Another result proved in [5] is (a
slightly stronger version of) the following.
###### Theorem 2.2 ([5], Theorem 3.10).
For any prime $r$ and for any partition of $[n]$ into subsets $C_{i}$, each of
size at most $r-1$, the induced subhypergraph of $KG^{r}(k,n)$ on the set of
all vertices $F$ that contain at most $1$ element of each $C_{i}$ has
chromatic number $\lceil\frac{n-r(k-1)}{r-1}\rceil$.
Proof of Theorem 1.1 for $r$ prime or a power of $2$: The upper bound showing
that the result is tight (for all values of $r$) is simple. Put
$s=\lfloor\frac{rk-1}{r-1}\rfloor$. Then every collection of $r$ subsets of
cardinality $k$ of the subset $S=\\{n-s+1,n-s+2,\ldots,n\\}$ has a common
point. For every $i\leq n-s$ let $F_{i}$ be the collection of all $k$-subsets
of $[n]$ whose minimum element is $i$. Let $F_{n-s+1}$ be the remaining
$k$-subsets, that is, all those contained in $S$. This shows that there is a
construction with
$m=n-s+1=n-\lfloor\frac{rk-1}{r-1}\rfloor+1=\lceil
n-\frac{r}{r-1}(k-1)\rceil,$
as needed.
To prove the lower bound let $n,k,r$ and ${\cal F}_{1},\ldots{\cal F}_{m}$ be
as in the statement of the theorem. Assume, first, that $r$ is a prime. Let
$C_{1},C_{2},\ldots,C_{n}$ be $n$ pairwise disjoint sets, each of size $r-1$,
and let $C=\cup_{i=1}^{n}C_{i}$ be their union. For each of the families
${\cal F}_{i}$, let ${\cal G}_{i}$ be the family of all $k$-subsets of $C$
obtained as follows. For each member $F=\\{i_{1},i_{2},\ldots,i_{k}\\}$ of
${\cal F}_{i}$, let $C(F)$ denote the family of all $(r-1)^{k}$ subsets of $C$
containing exactly one element of each $C_{i_{j}}$ for $1\leq j\leq k$. The
family ${\cal G}_{i}$ is the union of all families $C(F)$ for $F\in{\cal
F}_{i}$.
We claim that no set ${\cal G}_{i}$ contains $r$ pairwise disjoint sets.
Indeed, every collection of $r$ (not necessarily distinct) members
$G_{1},G_{2},\ldots,G_{r}$ of ${\cal G}_{i}$ consists of subsets that belong
to $C(F_{1}),C(F_{2}),\ldots,C(F_{r})$, respectively, for some (not
necessarily distinct) members $F_{j}\in{\cal F}_{i}$. Since ${\cal F}_{i}$ is
$r$-wise intersecting there is a common point, say $\ell$, in all sets
$F_{j}$. Thus each $G_{j}$ contains a point of $C_{\ell}$ and as
$|C_{\ell}|=r-1$ some pair of sets $G_{j}$ intersect inside $C_{\ell}$, by the
pigeonhole principle. This proves the claim.
Note that the union of all families ${\cal G}_{i}$ is exactly the collection
of all the $k$-subsets of $C$ that contain at most $1$ element from each
$C_{i}$. Therefore the families ${\cal G}_{i}$ provide a proper coloring of
the hypergraph described in Theorem 2.2 with parameters $(r-1)n$, $r$ and $k$.
The chromatic number of this hypergraph is
$\lceil\frac{(r-1)n-r(k-1)}{r-1}\rceil$, providing the required lower bound
for $m$.
The proof for $r$ which is a power of $2$ is similar, using the result in
Theorem 2.1. We apply the same construction with sets $C_{i}$ and families
${\cal G}_{i}$ as before, and place the sets $C_{i}$ along a cycle of length
$(r-1)n$, where each set $C_{i}$ appears contiguously along the cycle. It is
then easy to see that the union of the families ${\cal G}_{i}$ contains a copy
of the hypergraph $KG^{r}((r-1)n,k)_{r-stab}$ on the set of vertices
$C=\cup_{i=1}^{n}C_{i}$ of the cycle (as well as some additional hyperedges).
As before, here too each family ${\cal G}_{i}$ contains no $r$ pairwise
disjoint members. The lower bound thus follows from Theorem 2.1. This
completes the proof. $\Box$
Acknowledgment I thank Ryan Alweiss for many helpful discussions and Amir
Jafari for telling me about [4].
## References
* [1] M. Alishahi and H. Hajiabolhassan, On the chromatic number of general Kneser hypergraphs, J. Combin. Theory, Ser. B 115 (2015), 186–209.
* [2] N. Alon, L. Drewnowski and T. Łuczak, Stable Kneser Hypergraphs and Ideals in N with the Nikodym Property, Proc. Amer. Math. Soc. (2009), 467–471.
* [3] N. Alon, P. Frankl and L. Lovász, The chromatic number of Kneser hypergraphs, Trans. Amer. Math. Soc. 298 (1986), 359-370.
* [4] S. Azarpendar and A. Jafari, On some topological and combinatorial lower bounds on the chromatic number of Kneser type hypergraphs, arXiv 2002.01748v3, 2020.
* [5] F. Frick, Chromatic numbers of stable Kneser hypergraphs via topological Tverberg-type theorems, Int. Math. Res. Not. IMRN, no. 13 (2020), 4037–4061.
* [6] L. Lovász, Kneser’s conjecture, chromatic number, and homotopy, J. Combin. Theory Ser. A 25 (1978), no. 3, 319–324.
* [7] F. Meunier, The chromatic number of almost stable Kneser hypergraphs, J. Combin. Theory, Ser. A 118 (2011), no. 6, 1820–1828.
* [8] A. Schrijver, Vertex-critical subgraphs of Kneser-graphs, Nieuw Archief voor Wiskunde 26 (1978), 454–461.
* [9] G. M. Ziegler, Generalized Kneser coloring theorems with combinatorial proofs, Invent. Math. 147 (2002), no. 3, 671–691.
| arxiv-papers | 2021-07-27T11:36:03 | 2024-09-04T03:07:21.345240 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Noga Alon",
"submitter": "Noga Alon",
"url": "https://arxiv.org/abs/2107.12741"
} |
2107.12748 | # Extremely low-energy collective modes in a quasi-one-dimensional system
Z. X. Wei State Key Laboratory of Electronic Thin Films and Integrated
Devices, University of Electronic Science and Technology of China, Chengdu
610054, China S. Zhuang Beijing National Laboratory for Condensed Matter
Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100190,
China Y. L. Su State Key Laboratory of Electronic Thin Films and Integrated
Devices, University of Electronic Science and Technology of China, Chengdu
610054, China L. Cheng State Key Laboratory of Electronic Thin Films and
Integrated Devices, University of Electronic Science and Technology of China,
Chengdu 610054, China H. D. Zhou Department of Physics and Astronomy,
University of Tennessee, Knoxville, Tennessee 37996, USA Z. Jiang School of
Physics, Georgia Institute of Technology, Atlanta, Georgia 30332, USA H. Weng
Beijing National Laboratory for Condensed Matter Physics, Institute of
Physics, Chinese Academy of Sciences, Beijing 100190, China J. Qi
[email protected] State Key Laboratory of Electronic Thin Films and Integrated
Devices, University of Electronic Science and Technology of China, Chengdu
610054, China
###### Abstract
We have investigated the quasiparticle dynamics and collective excitations in
the quasi-one-dimensional material ZrTe5 using ultrafast optical pump-probe
spectroscopy. Our time-domain results reveal two coherent oscillations having
extremely low energies of $\hbar\omega_{1}\sim$0.33 meV (0.08 THz) and
$\hbar\omega_{2}\sim$1.9 meV (0.45 THz), which are softened as the temperature
approaches two different critical temperatures ($\sim$54 K and $\sim$135 K).
We attribute these two collective excitations to the amplitude mode of charge
density wave instabilities in ZrTe5 with tremendously small nesting wave
vectors. Furthermore, scattering with the $\hbar\omega_{2}$ mode may result in
a peculiar quasiparticle decay process with a timescale of $\sim$1-2 ps below
the transition temperature $T^{*}$ ($\sim$135 K). Our findings provide pivotal
information for studying the fluctuating order parameters and their associated
quasiparticle dynamics in various low-dimensional topological systems and
other materials.
In a many-body system, interaction between the quasiparticles, and/or
interaction between the quasparticles and other quantized modes may bring
about various broken symmetry ground states G book 1994 , e.g. superconducting
state, density wave state, and magnetically ordered state, accompanied
simultaneously by abundant collective excitations, typical examples of which
are phonons, density waves (charge or spin) and magnons obeying the Bose-
Einstein statistics. Delicate balance among different interactions and phases
might cause the fluctuating characteristics in some order parameters or
collective excitations with a finite correlation time $\tau_{F}$ G book 1994 ;
Kivelson_RMP_2003 .
ZrTe5 is a quasi-one-dimensional material with highly anisotropic crystal
lattice and electronic structures Weng_PRX_2014 . Their subtle correlations
Weng_PRX_2014 ; J sciadv 2019 ; C PRX 2020 make this material enormously
interesting. On the one hand, ZrTe5 is associated with the topological phases
of matter, i.e. the topological insulator (TI) G PRL 2016 ; R PRX 2016 ;
Weng_PRX_2014 ; Y PRB 2018 ; H PRB 2017 ; R PRX 2016 or the Dirac semimetal
RY PRB 2015 ; Y NC 2016 ; Wang 2018 , which have been experimentally
investigated by different equilibrium or quasi-equilibrium techniques, e.g.
electronic transport Niu PRB2017 ; Terry PRB 1999 , infrared optical
spectroscopy RY PRB 2015 ; ZG PNAS 2017 ; Jiang PRL2020 ; Jiang PRB 2017 ; B
PRL 2018 , scanning tunneling microscope Li PRL 2016 ; R PRX 2016 , and angle-
resolved photoemission spectroscopy (ARPES) R PRX 2016 ; H PRB 2017 . On the
other hand, many unusual electronic responses such as the chiral magnetic
effect Li_NPhy_2016 , anomalous Hall effect Liang NP 2018 , and 3D quantum
Hall effect Tang Nature 2019 have been reported.
It is believed that those exotic phenomena are connected to the peculiar
fermionic and bosonic excitations in ZrTe5 with the anomalous phase transition
around temperature $T^{*}$, where the resistivity presents a peak FJ PRB 1981
. In particular, the static charge density wave (CDW) stabilized by the
external magnetic field was employed to interpret the 3D quantum Hall effect
at temperatures below 20 K Tang Nature 2019 ; Qin_PRL_2020 , while the
collective Dirac polarons were proposed to explain the sharp resistivity peak
around $T^{*}$ Fu_PRL_2020 . However, the fluctuating nature of any unique
collective excitation(s) in ZrTe5 has never been observed or elucidated,
although the related dynamics could be critical to understand the emergent
phenomena in this material previously observed via the quasi-equilibrium
probing techniques.
Figure 1: (a) Typical $\Delta R(t)/R$ data as a function of temperature at a
pump fluence of $\sim$0.5 $\mu$J/cm2. Inset: $\Delta R(t)/R$ in short
timescale. The red line is the pump-probe cross correlation profile. (b) and
(c) Typical fitted curves (red solid lines) for $\Delta R(t)/R$ data using Eq.
(1) at 5 K and 200 K, respectively. The blue, green and purple lines are for
components with decay times $\tau_{1}$, $\tau_{2}$, and $\tau_{s}$,
respectively.
By contrast, the ultrafast optical pump-probe technique is a powerful tool
that not only can reveal the quasiparticle dynamics associated with the
topological properties Gedik PRL2011 ; Wang PRL 2016 but also is capable of
unveiling the collective phenomena in a broad correlation time- or length
scale Yusupov_PRL_2008 ; Torchinsky_NM_2013 ; Liu PRL 2020 . Here, using
ultrafast optical pump-probe spectroscopy our measurements for the first time
reveal two extremely low-energy collective amplitude mode oscillations
($\sim$0.33 meV and 1.9 meV) at low temperatures in the high-quality ZrTe5
single crystals note1 , which have a transition temperature $T^{*}$ of
$\sim$135 K. We demonstrate these two modes arising from the fluctuating CDW
triggered by the acoustic phonons. We also observe a novel quasiparticle
dynamics associated with this type of bosonic mode emerging below $T^{*}$ with
a ps-timescale.
All measurements were performed using an ultrafast laser with a repetition
rate of 80 MHz, a pulse width of $\sim$55 fs (FWHM), and a center wavelength
tunable between 780 nm and 820 nm. Detailed information on experimental setup,
sample preparation and additional data can also be found in the Supplemental
Material Suppl and Refs. Wang PRL 2016 ; Qi PRL 2013 ; Liu PRL 2020 ; Jiang
PRB 2017 ; Jiang PRL2020 ; W J 2016 . Figure 1 (a) shows the typical measured
signals at low and high temperatures. Upon photoexcitation, all the $\Delta
R(t)/R$ signals clearly exhibit an instantaneous rise, succeeded by lateral
relaxation processes. Besides, rich damped ultrafast oscillations are
superimposed on the non-oscillating decay background. These coherent
oscillations can verify the high quality of our samples, as will be discussed
in detail later.
We first focus on the non-oscillatory signals. A close inspection of the
rising curve (see the inset to Fig. 1(a)) reveals that it actually comprises
two parts in the time-domain: (1) one exactly overlaps with the pump-probe
cross correlation profile; (2) the other one shows relatively slow rising
before the $\Delta R/R$ signal reaches the maximum value. We identify that the
relative slow-rising can be well described by a sub-ps exponential decay
process having amplitude with a different sign from that of the subsequent
relaxation dynamics O PRL 2013 ; Qi APL 2010 (See also Supplemental Material
for further details Suppl ). However, the succeeding relaxation process does
not exactly follow a single exponential decay at all investigated
temperatures. Rather, an extra decay process can be unambiguously observed
below a critical temperature, which is nearly the same as the transition
temperature $T^{*}\sim$135 K. According to these observations, we can fit our
data using the following formula D PRL 2002 ; Wang PRL 2016 ,
$\Delta
R(t)/R=(A_{1}e^{-\frac{t}{\tau_{1}}}+A_{2}e^{-\frac{t}{\tau_{2}}}+A_{s}e^{-\frac{t}{\tau_{s}}}+C)\otimes
G(t),$ (1)
where $A_{j}$ and $\tau_{j}$ ($j=1,2,s$) are the amplitudes and decay times,
respectively. $A_{1}>0$ and $A_{2},A_{s}\leq 0$. Here, $\tau_{1}$ and
$\tau_{s}$ represent the sub-ps and extra decay processes, respectively.
$\tau_{2}$ is the subsequent decay after $\tau_{1}$ or $\tau_{s}$. $C$ is a
constant, and $G(t)$ is an Gaussian function standing for the pump-probe cross
correlation. As seen in Figs. 1(b) and (c), the fitted curves are in excellent
agreement with the experimental data at low and high temperatures.
Specifically, we found that $\tau_{1}$ is less than $\sim$0.3 ps, $\tau_{2}$
is $\sim$5-18 ps, and $\tau_{s}$ is $\sim$1-2 ps. The decay process
characterized by $\tau_{s}$ emerges below $\sim 135$ K ($T^{*}$), or $A_{s}=0$
for $T\geq T^{*}$. The extracted $\tau_{j}$ ($j=1,2,s$) as a function of
temperature are shown in Fig. 2.
In general, the relaxation processes in conventional nonmagnetic materials
disclosed by $\Delta R(t)/R$ can include the e-e thermalization, the e-ph
scattering, the e-h recombination, and the thermal diffusion processes D Rev
Mod Phys ; J Book 2013 ; R 2002 . The e-e thermalization usually has a
timescale less than $\sim$100 femtoseconds. If this process is faster than the
excitation pulse and out of the time resolution limit, it is often concealed
in the initial rising signal, which then follows the pump-probe cross
correlation profile. This is well consistent with our experiments. On the
other hand, the thermal diffusion process and the e-h recombination across a
direct gap with radiative decay have timescales larger than $\sim$100 ps, and
clearly do not contribute to the three processes characterized by $\tau_{j}$
($j=1,2,s$) shown in Figs. 1 and 2.
Figure 2: (a) $\tau_{1}$ as a function of temperature. Red line is a fit via
TTM. (b) Schematic of the hot carrier excited by $h\nu$ photon cooling via
e-ph scattering. (c) $\tau_{2}$ as a function of temperature. Red line is a
fit based on the phonon-assisted e-h recombination process. Inset:
$1/\tau_{2}$ as a function of pump fluence at 5 K. (d) Schematic of the
phonon-assisted e-h recombination. (e) $\tau_{s}$ as a function of
temperature. Red line is a fit via TTM. (f) Schematic of the hot carrier
cooling excited by $h\nu$ photon involved with unknown bosonic excitations
emerging below $T^{*}$.
Since $\tau_{1}$ and $\tau_{2}$ decay processes exist at all investigated
temperatures, and experience a continuous change across $T^{*}$, they should
represent a generic dynamical responses of ZrTe5, independent of any physics
underlying the transition around $T^{*}$. In fact, the sub-ps process
characterized by $\tau_{1}$ can be attributed to the photoexcited hot-carrier
cooling via e-ph scattering (see Fig. 2(b)), which in turn leads to the
optical phonon emission. Its $T$-dependence is quite similar with those of
e-ph thermalization times observed in metals, semiconductors and topological
materials Liang APL 2014 ; M PRB 2005 ; R PRB 1995 ; Qi APL 2010 ; J Book 2013
; M Nano Lett 2012 . Such $T$-dependent behavior can be described by the two-
temperature model (TTM) Allen PRL 1987 ; R PRB 1995 . Fig. 2(a) demonstrates
that the fitted results using TTM agree very well with the experimental data.
The fluence-dependent $\tau_{1}$ further confirms the effectiveness of TTM
(see Supplemental Material Suppl ). Employing
$\tau^{-1}=3\hbar\lambda\langle\omega^{2}\rangle(\pi k_{B}T_{e})^{-1}$ Allen
PRL 1987 , we can further obtain the dimensionless e-ph coupling constant
$\lambda$ to be $\sim$0.17 via $\tau_{1}(T)$. During the calculations, we
obtained $\lambda\langle\omega^{2}\rangle\simeq 1.8$ $\times 10^{25}$
Hz${}^{2}\simeq$78.2 meV2, where the second moment of the phonon spectrum
$\langle\omega^{2}\rangle$ is $\sim$6.2$\times 10^{4}$ K2 extracted via the
Debye model.
Figure 3: (a) Extracted oscillations for three typical temperatures. (b) The
temperature-dependent Fourier transform spectra for the extracted
oscillations. (c) The two low energy modes, $\omega_{1}$ and $\omega_{2}$, as
a function of temperature in the frequency domain. The red dashed curves are
guide lines. (d) At 5 K, wavelength dependence of the two low energy modes,
$\omega_{1}$ and $\omega_{2}$, indicated by the red dashed lines.
The $\tau_{2}$ decay process, with a timescale of $\sim$3-18 ps, illustrates a
totally different $T$-dependent behavior as that of the $\tau_{1}$ process
(see Fig. 2(c)). After the e-ph thermalization, the nonequilibrium electrons
(holes) can still accumulate in the conduction (valence) bands. We might thus
consider the phonon-assisted e-h recombination She PRB 2013 ; Dai PRB 2015 ,
where the electron and hole recombine with the assistance of e-ph scattering
between the electron and hole pockets, as illustrated in Fig. 2(d). In fact,
the conduction and valence band extrema for ZrTe5 are in close proximity
within the Brillouin zone Weng_PRX_2014 ; Monserrat B Physical Review Research
2019 , in favor of such interband e-h scatterings. Therefore, we assign the
$\tau_{2}$ decay to this type of recombination process. This inference is not
only consistent with the fluence ($F$) dependence of $\tau_{2}^{-1}$ (inset of
Fig. 2(c)) D PRL 2010 ; Liu PRL 2020 , but also is strongly justified by the
excellent agreement between the experimental $\tau_{2}$ and the theoretical
fitted results based on such recombination Suppl , as shown in the Fig. 2(c).
The peculiar $\tau_{s}$ process emerges below $T^{*}$, implying that the
$\tau_{s}$ decay should be associated with the physics behind the transition.
At first glance, $T$-dependent behavior of $\tau_{s}$ well resembles that of
$\tau_{1}(T)$. So we suspect that this $\tau_{s}$ process should
microscopically resemble the e-ph scattering but involves unknown bosonic
excitations emerging below $T^{*}$. Numerically, we still can use
$\tau^{-1}=3\hbar\lambda\langle\omega^{2}\rangle(\pi k_{B}T_{e})^{-1}$ to fit
$\tau_{s}$ based on the TTM Suppl . However, the fitted parameter
$\lambda\langle\omega^{2}\rangle$ ($\sim$5.47 meV2) only gives an upper limit
because the TTM now evolves into a three temperature model Wang PRB 2018 . At
this stage, although the type of boson associated with $\tau_{s}$ is unknown
(to be identified later), we can tell its energy is not very high and probably
close to scale of the acoustic phonons based on its timescale (1-2 ps) Gedik
PRL2011 .
One may argue whether the $\tau_{s}$ process is associated with the Fermi
level shifting from the valence band to the conduction band as the temperature
decreases across $T^{*}$ Zhang NC 2017 . However, previous ultrafast optical
studies on graphene I PRB 2020 demonstrated that when the Fermi level was
continuously tuned across the Dirac point, no emergence or disappearance of
any quasiparticle decay channel was observed except for change of the e-ph
relaxation time. Therefore, this effect should be irrelevant here.
Figure 4: $T$-dependence of the (a) $\omega_{1}$ and (b) $\omega_{2}$ modes.
The red lines are fit described in the main text. (c) and (d) are
$T$-dependent damping rates of the amplitudon for $\omega_{1}$ and
$\omega_{2}$ modes, respectively. The red lines are fits using a power law
($\propto T^{\alpha}$).
Now let us focus on the “rich” oscillations observed in $\Delta R(t)/R$. Fig.
3(a) shows the typical time domain signals at temperatures below and above
$T^{*}$. The temperature evolution of the oscillatory signals can be revealed
by the Fourier transform data in the frequency domain (see Fig. 3(b)), where
five modes with distinct frequencies are clearly observed.
In general, the oscillations with THz frequency in pump-probe spectroscopy
arise from the coherent optical phonon modes near the $\Gamma$ point due to
the coherent Raman scattering or displacive excitation H PRB 1992 . The exact
modes can be revealed by a direct comparison with the Raman spectroscopy data
Taguchi I Solid state communications 1983 ; Landa G Solid state communications
1984 (see also the Supplemental Material Suppl ). We thus obtain that three
modes with center frequencies near $\sim$1.2 THz, $\sim$3.7 THz, and $\sim$4.6
THz are attributed to the $A_{g}$ phonon modes. These modes are
characteristics of a high quality ZrTe5 single crystal, first-time observed
simultaneously in the time-resolved measurements. Temperature-dependence of
all these modes can be well described by the anharmonic phonon model Suppl .
Unexpectedly, as shown in Figs. 3(b)-(d), we also clearly observed two low
energy modes with frequencies of $\omega_{1}/2\pi\sim$0.08 THz and
$\omega_{2}/2\pi\sim$0.45 THz, respectively. These two modes cannot be
attributed to the optical phonons since their frequencies are well under the
low frequency limit of the Raman-active optical phonons, i.e. $\sim$1 THz,
obtained by our theoretical calculations Suppl . In specific, the $\omega_{1}$
mode, emerging below $\sim$60 K, exhibits a clear softening as the temperature
increases. The $\omega_{2}$ mode is non-observable above $\sim T^{*}$. One
might first suspect they originate from the low energy acoustic phonons.
However, the estimated phonon frequency and the corresponding probe-wavelength
dependent shift significantly deviate from our observations (see Fig. 3(d) and
Supplemental Material Suppl ). Therefore, we can exclude such a possibility J
PRB 2006 ; D PRB 2005 ; R PRL 2017 .
Since in ZrTe5 the long-range CDW order stabilized using the strong external
magnetic field has been proposed to explain the quantum Hall effect Tang
Nature 2019 ; Qin_PRL_2020 , these two modes, thus, might be attributed to the
CDW instabilities triggered by the low-energy acoustic phonon mode G book 1994
. The dynamical CDW may give rise two collective excitations: (1) the
amplitude mode (amplitudon) exhibits a gap when the wave vector approaches
zero, and (2) the phase mode (phason) is gapless. Because the phason has
similar dispersion relation as that of acoustic phonon, it is expected to bear
the same wavelength dependence R PRL 2017 and thus cannot contribute to these
two low energy modes. We thus finally arrive at the most reasonable candidate
for these two modes, i.e. the amplitudon of CDW.
Particularly, we notice that $T$ dependence of these two modes is quite
similar with the temperature evolution of the fluctuating CDW G book 1994 ; R
PRL 2017 ; Yusupov_PRL_2008 , as seen in Figs. 4(a) and (b). $\omega_{1}$ and
$\omega_{2}$ as a function $T$ can well be fitted by a mean-field-like $T$
dependence Yusupov_PRL_2008 ; G book 1994 :
$\omega_{A}=\omega_{A}(0)(1-T/T_{C})^{\beta}$, where $T_{C}$ is defined as a
transition temperature. Satisfactory fits to the data in Figs. 4(a)-(b) give
note2 : $\beta_{\omega_{1}}\simeq$0.25 and $\beta_{\omega_{2}}\simeq$0.1
corresponding to $T_{C}^{\omega_{1}}\simeq 54$ K and $T_{C}^{\omega_{2}}\simeq
135$ K, respectively. $\beta_{\omega_{1}}$ having a value of $\sim$1/4
indicates that $\omega_{1}$ mode has a pure one-dimensional origin note2 . In
fact, such character is consistent with our theoretical calculations Suppl .
Specifically, the obtained phonon linewidth in ZrTe5 has a quasi-one-
dimensional character, i.e. the corresponding values of three acoustic modes
along the $\Gamma-Z$ direction (inter-plane) are in general larger than those
along others. Since the e-ph interactions dominate the order parameter
Qin_PRL_2020 , it is not surprising that a fluctuating CDW can emerge along
the inter-plane direction ($b$-axis). By contrast, the $\omega_{2}$ mode
cannot belong to a simple one-dimensional case. The intricate $\omega_{2}$
mode might have higher dimensional characteristics, and needs to be unveiled
by further investigations.
The $T$-dependent damping rate $\Gamma_{1}$ ($\Gamma_{2}$) for the
$\omega_{1}$ ($\omega_{2}$) mode can be extracted by fitting the oscillatory
signals via a damped sine function Suppl , as shown in Figs. 4(c) and (d). In
order to compare with the theoretical calculations Takada_PRB_1985 ;
Richard_SSC_1993 , we used a power law ($\propto T^{\alpha}$) to fit the data,
and obtained that $\Gamma_{1}$ and $\Gamma_{2}$ scale well as $T$ and
$T^{0.6}$, respectively. Such $T$-scalings clearly deviate from the
theoretical intrinsic damping Takada_PRB_1985 ; Richard_SSC_1993 ;
Torchinsky_NM_2013 , i.e. $T^{2}$ away from $T_{C}$ and $T^{5}$ close to
$T_{C}$, respectively. Indeed, decay of the amplitudon includes both the
intrinsic damping and correlation time of the fluctuating CDW. Therefore,
$\Gamma_{1}^{-1}$ and $\Gamma_{2}^{-1}$ here provide a lower bound of the
correlation time $(\tau_{F})_{1}$ and $(\tau_{F})_{2}$.
As is known, the acoustic phonon may soften significantly at $q=2k_{f}$ upon
the phase transition of CDW G book 1994 . In the $q=$0 limit,
$\omega_{A}\simeq\lambda^{1/2}\omega_{2k_{f}}$, where $\omega_{2k_{f}}$ is the
frequency of the softening phonon above the phase transition connected to the
frequency of amplitudon ($\omega_{A}$) via the e-ph coupling constant
$\lambda$. Therefore, using a linear dispersion approximation with sound
velocity of $v_{s}\sim 10^{3}$ m/s Wang_JAP_2018 , $k_{f}$ can be estimated to
have values of 0.053 Å-1 and 0.34 Å-1 for $\omega_{1}$ and $\omega_{2}$ modes,
respectively. Although we do not have accurate knowledge of anisotropic
$v_{s}$ associated with $\omega_{1}$ and $\omega_{2}$ modes, based on these
two estimated values we can conclude that their corresponding modulation wave
vectors should be very small. Such uncommonly small $k_{f}$ values indicate
that our observed density waves have tremendously long lattice modulation
periods in the real space. These results are directly due to the extremely low
energies of $\omega_{1}$ and $\omega_{2}$ modes. Interestingly, these derived
values are consistent with the work demonstrating the 3D quantum Hall effect
Tang Nature 2019 .
Since $\omega_{1}$ and $\omega_{2}$ modes now can be attributed to the
fluctuating CDW that obeys the Bose-Einstein statistics, they can naturally be
assigned to the bosons contributing to the $\tau_{s}$ decay process emerging
below $T^{*}$. However, the $\omega_{2}$ mode is the mostly possible candidate
due to two reasons: (1) appearance temperature of this mode coincides with
that of the $\tau_{s}$ process; (2) No clear anomalies at $T_{C}^{\omega_{1}}$
were found in the $T$-dependent $\tau_{s}$ and $A_{s}$ Suppl ; (3) energy of
the $\omega_{1}$ mode is nearly smaller by an order than that of the
$\omega_{2}$ mode so that the timescale of energy exchange between the
nonequilibrium quasiparticles and $\omega_{1}$ mode can mix up with the long
thermal diffusion process, where large number of low-energy acoustic phonons
will overwhelm the CDW modes.
In summary, using the ultrafast optical spectroscopy we present a detailed
investigation on the quasi-one-dimensional system ZrTe5. Our results reveal
that below $T^{*}$, there emerges a new quasiparticle decay process with a
timescale of $\sim$1-2 ps, in addition to the two relaxation dynamics
persisting at all temperatures with timescales of $\sim$0.15-0.3 ps and
$\sim$3-18 ps, respectively. We address that this new decay process is most
likely due to appearance of some novel collective excitations in ZrTe5, while
the other two can be attributed to the electron-phonon (e-ph) scattering and
the phonon-assisted electron-hole (e-h) recombination processes. Surprisingly,
our experimental data for the first time unambiguously reveal two coherent
oscillations with extremely small energies occurring below two distinct
temperatures $\sim$54 K and $\sim$135 K, respectively. We argue that they
arise from the amplitude mode of fluctuating CDW triggered by the acoustic
phonons, and can well explain the new observed quasiparticle decay below
$T^{*}$. Whether these findings are connected to the other emergent phenomena
in this system deserves further explorations.
We acknowledge the valuable discussion from Hrvoje Petek. This work was
supported by the National Natural Science Foundation of China (Grants Nos.
11974070, 11734006, 11925408, 11921004), the Frontier Science Project of
Dongguan (2019622101004), the National Key R&D Program of China (Grant Nos.
2016YFA0300600 and 2018YFA0305700), the Strategic Priority Research Program of
Chinese Academy of Sciences (Grant No. XDB33000000), the K. C. Wong Education
Foundation (Grant No. GJTD-2018-01), the Beijing Natural Science Foundation
(Grant No. Z180008), the Beijing Municipal Science and Technology Commission
(Grant No. Z191100007219013), and the CAS Interdisciplinary Innovation Team.
## References
* (1) G. Grüner, Density waves in solids (Perseus, Cambridge, MA, 1994).
* (2) S. A. Kivelson, I. P. Bindloss, E. Fradkin, V. Oganesyan, J. M. Tranquada, et al., Rev. Mod. Phys. 75, 1201 (2003).
* (3) H. Weng, X. Dai, and Z. Fang, Phys. Rev. X 4, 011002 (2014).
* (4) J. Mutch, W. C. Chen, P. Went, T. Qian, I. Z. Wilson, et al., Sci. Adv. 5, eaav9771 (2019).
* (5) C. Vaswani, L. L. Wang, D. H. Mudiyanselage, Q. Li, P. M. Lozano, et al., Phys. Rev. X 10, 021013 (2020).
* (6) R. Wu, J. Z. Ma, S. M. Nie, L. X. Zhao, X. Huang, et al., Phys. Rev. X 6, 021017 (2016).
* (7) G. Manzoni, L. Gragnaniello, G. Autès, T. Kuhn, A. Sterzi, et al., Phys. Rev. Lett. 117, 237601 (2016).
* (8) H. Xiong, J. A. Sobota, S. L. Yang, H. Soifer, A. Gauthier, et al., Phys. Rev. B 95, 195119 (2017).
* (9) Y. Y. Lv, B. Bin Zhang, X. Li, K. W. Zhang, X. B. Li, et al., Phys. Rev. B 97, 115137 (2018).
* (10) R. Y. Chen, S. J. Zhang, J. A. Schneeloch, C. Zhang, Q. Li, et al., Phys. Rev. B 92, 075107 (2015).
* (11) Y. Liu, X. Yuan, C. Zhang, Z. Jin, A. Narayan, et al., Nat. Commun. 7, 12516 (2016).
* (12) J. Wang, J. Niu, B. Yan, X. Li, R. Bi, et al., Proc. Natl. Acad. Sci. U. S. A. 115, 9145 (2018).
* (13) T. M. Tritt, N. D. Lowhorn, R. T. Littleton, A. Pope, C. R. Feger, and J. W. Kolis, Phys. Rev. B 60, 7816 (1999).
* (14) J. Niu, J. Wang, Z. He, C. Zhang, X. Li, et al., Phys. Rev. B 95, 035420 (2017).
* (15) Y. Jiang, Z. L. Dun, H. D. Zhou, Z. Lu, K. W. Chen, et al., Phys. Rev. B 96, 041101 (2017).
* (16) Z. G. Chen, R. Y. Chen, R. D. Zhong, J. Schneeloch, C. Zhang, et al., Proc. Natl. Acad. Sci. U. S. A. 114, 816 (2017).
* (17) B. Xu, L. X. Zhao, P. Marsik, E. Sheveleva, F. Lyzwa, et al., Phys. Rev. Lett. 121, 187401 (2018).
* (18) Y. Jiang, J. Wang, T. Zhao, Z. L. Dun, Q. Huang, et al., Phys. Rev. Lett. 125, 046403 (2020).
* (19) X. B. Li, W. K. Huang, Y. Y. Lv, K. W. Zhang, C. L. Yang, et al., Phys. Rev. Lett. 116, 176803 (2016).
* (20) Q. Li, D. E. Kharzeev, C. Zhang, Y. Huang, I. Pletikosić, et al., Nat. Phys. 12, 550 (2016).
* (21) T. Liang, J. Lin, Q. Gibson, S. Kushwaha, M. Liu, et al., Nat. Phys. 14, 451 (2018).
* (22) F. Tang, Y. Ren, P. Wang, R. Zhong, J. Schneeloch, et al., Nature 569, 537 (2019).
* (23) F. J. DiSalvo, R. M. Fleming, and J. V. Waszczak, Phys. Rev. B 24, 2935 (1981).
* (24) F. Qin, S. Li, Z. Z. Du, C. M. Wang, W. Zhang, et al., Phys. Rev. Lett. 125, 206601 (2020).
* (25) B. Fu, H. W. Wang, and S. Q. Shen, Phys. Rev. Lett. 125, 256601 (2020).
* (26) D. Hsieh, F. Mahmood, J. W. McIver, D. R. Gardner, Y. S. Lee, and N. Gedik, Phys. Rev. Lett. 107, 077401 (2011).
* (27) M. C. Wang, S. Qiao, Z. Jiang, S. N. Luo, and J. Qi, Phys. Rev. Lett. 116, 036601 (2016).
* (28) R. V. Yusupov, T. Mertelj, J. H. Chu, I. R. Fisher, and D. Mihailovic, Phys. Rev. Lett. 101, 246402 (2008).
* (29) D. H. Torchinsky, F. Mahmood, A. T. Bollinger, I. Božović, and N. Gedik, Nat. Mater. 12, 387 (2013).
* (30) Y. P. Liu, Y. J. Zhang, J. J. Dong, H. Lee, Z. X. Wei, et al., Phys. Rev. Lett. 124, 057404 (2020).
* (31) The unique properties of ZrTe5 do not manifest them in previous time-resolved optical experiments Zhang PRB 2019 ; Li PRB 2020 , primarily due to the critical deficiencies in these measurements such as the usage of unreliable samples, evidenced by the absence of various coherent Raman modes characterizing the quality of ZrTe5.
* (32) X. Zhang, H. Y. Song, X. C. Nie, S. B. Liu, Y. Wang, et al., Phys. Rev. B 99, 125141 (2019).
* (33) N. Li, W. Liang, and S. N. Luo, Phys. Rev. B 101, 014304 (2020).
* (34) See Supplemental Material for additional data, more experimental and theoretical details, which includes Refs. Weng_PRX_2014 ; Jiang PRB 2017 ; Li_NPhy_2016 ; 1 ; 4 ; 5 ; 6 ; 7 ; 9 ; Landa G Solid state communications 1984 ; 10 ; 11 ; 12 ; Qi PRL 2013 ; Balkanski M PRB 1983 ; Menendez J PRB 1984 ; Tang H PRB 1991 ; 17 ; 18 ; 19 ; 20 ; 22 ; 23 ; 24 ; 25 ; 26 ; 27 ; 28 .
* (35) J. Qi, T. Durakiewicz, S. A. Trugman, J. X. Zhu, P. S. Riseborough, et al., Phys. Rev. Lett. 111, 057402 (2013).
* (36) T. Dekorsy, G. C. Cho, and H. Kurz, in Light Scattering in Solids VIII, Ed. by M. Cardona and G. Güntherodt, (Springer, Berlin, 2000)
* (37) P. B. Allen, Phys. Rev. B 6, 2577 (1972).
* (38) R. H. Groeneveld, R. Sprik, and A. Lagendijk, Phys. Rev. B 51, 11433 (1995).
* (39) A. A. Lopez, Phys. Rev. 175, 823 (1968).
* (40) A. Zwick, G. Landa, R. Carles, M. A. Renucci, and A. Kjekshus, Solid State Commun 44, 89 (1982).
* (41) R. Merlin, Solid State Commun. 102, 207 (1997).
* (42) G. A. Garrett, T. F. Albrecht, J. F. Whitaker, and R. Merlin, Phys. Rev. Lett. 77, 3661 (1996).
* (43) I. Gdor, T. Ghosh, O. Lioubashevski, and S. Ruhman, J. Phys. Chem. Lett. 8, 1920 (2017).
* (44) G. Batignani, C. Ferrante, G. Fumero, and T. Scopigno, J. Phys. Chem. Lett. 10, 7789 (2019).
* (45) Z. Guo, H. Gu, M. Fang, B. Song, W. Wang, X. Chen, C. Zhang, H. Jiang, L. Wang, and S. Liu, ACS Materials Lett. 3, 525 (2021).
* (46) V. L. Ginzburg, Sov. Phys. Usp. 5, 649 (1963).
* (47) Y. Toda, F. Kawanokami, T. Kurosawa, M. Oda, I. Madan, T. Mertelj, V. V. Kabanov, and D. Mihailovic, Phys. Rev. B 90, 094513(2014).
* (48) A. Kogar, A. Zong, P. E. Dolgirev, X. Z. Shen, et al., Nat. Phys. 16, 159 (2019).
* (49) S. Furuseth, L. Brattas, and A. Kjekshus. J. Acta Chemica Scandinavica 27, 2367 (1973).
* (50) P. Giannozzi, S. Baroni, et al., J. Phys. Condens. Matter 21, 395502 (2009).
* (51) P. Giannozzi, O. Andreussi, et al., J. Phys. Condens. Matter 29, 465901 (2017).
* (52) S. Baroni, S. d. Gironcoli, A. D. Corso, and P. Giannozzi, Rev. Mod. Phys. 73, 515 (2001).
* (53) D. R. Hamann. Phys. Rev. B 88, 085117 (2013).
* (54) F. Giustino, M. L. Cohen, and S. G. Louie. Phys. Rev. B 76, 165108 (2007).
* (55) S. Poncé, E.R. Margine, C. Verdi, and F. Giustino. Comput. Phys. Commun. 209, 116 (2016).
* (56) G. Landa, A. Zwick, R. Carles, M. A. Renucci, and A. Kjekshus, Solid State Commun. 49, 1095 (1984).
* (57) M. Balkanski, R. F. Wallis, and E. Haro, Phys. Rev. B 28, 1928 (1983).
* (58) J. Menéndez and M. Cardona, Phys. Rev. B 29, 2051 (1984).
* (59) H. Tang and I. P. Herman, Phys. Rev. B 43, 2299 (1991).
* (60) W. Yu, Y. Jiang, J. Yang, Z. L. Dun, H. D. Zhou, et al., Sci. Rep. 6, 353357 (2016).
* (61) J. Qi, X. Chen, W. Yu, P. Cadden-Zimansky, D. Smirnov, et al., Appl. Phys. Lett. 97, 182102 (2010).
* (62) J. P. Hinton, J. D. Koralek, G. Yu, E. M. Motoyama, Y. M. Lu, et al., Phys. Rev. Lett. 110, 217002 (2013).
* (63) D. J. Hilton and C. L. Tang, Phys. Rev. Lett. 89, 146601 (2002).
* (64) J. Shah, Ultrafast spectroscopy of semiconductors and semiconductor nanostructures. (Springer Science Business Media, 2013).
* (65) D. N. Basov, R. D. Averitt, D. Van Der Marel, M. Dressel, and K. Haule, Rev. Mod. Phys. 83, 471 (2011).
* (66) R. D. Averitt and a J. Taylor, J. Phys. Condens. Matter 14, R1357 (2002).
* (67) R. H. M. Groeneveld, R. Sprik, and A. Lagendijk, Phys. Rev. B 51, 11433 (1995).
* (68) M. Hase, K. Ishioka, J. Demsar, K. Ushida, and M. Kitajima, Phys. Rev. B 71, 184301 (2005).
* (69) M. Hajlaoui, E. Papalazarou, J. Mauchain, G. Lantz, N. Moisan, et al., Nano Lett. 12, 3532 (2012).
* (70) L. Cheng, C. La-O-Vorakiat, C. S. Tang, S. K. Nair, B. Xia, et al., Appl. Phys. Lett. 104, 211906 (2014).
* (71) P. B. Allen, Phys. Rev. Lett. 59, 1460 (1987).
* (72) Y. M. Sheu, Y. J. Chien, C. Uher, S. Fahy, and D. A. Reis, Phys. Rev. B 87, 075429 (2013).
* (73) Y. M. Dai, J. Bowlan, H. Li, H. Miao, S. F. Wu, et al., Phys. Rev. B 92, 161104 (2015).
* (74) B. Monserrat and A. Narayan, Phys. Rev. Res. 1, 033181 (2019).
* (75) D. H. Torchinsky, G. F. Chen, J. L. Luo, N. L. Wang, and N. Gedik, Phys. Rev. Lett. 105, 027005 (2010).
* (76) M. C. Wang, H. S. Yu, J. Xiong, Y. F. Yang, S. N. Luo, et al., Phys. Rev. B 97, 155157 (2018).
* (77) Y. Zhang, C. Wang, L. Yu, G. Liu, A. Liang, et al., Nat. Commun. 8, 15512 (2017).
* (78) I. Katayama, K. I. Inoue, Y. Arashida, Y. Wu, H. Yang, et al., Phys. Rev. B 101, 245408 (2020).
* (79) H. J. Zeiger, J. Vidal, T. K. Cheng, E. P. Ippen, G. Dresselhaus, and M. S. Dresselhaus, Phys. Rev. B 45, 768 (1992).
* (80) I. Taguchi, A. Grisel, and F. Levy, Solid State Commun. 46, 299 (1983).
* (81) D. Lim, V. K. Thorsmølle, R. D. Averitt, Q. X. Jia, K. H. Ahn, et al., Phys. Rev. B 71, 134403 (2005).
* (82) J. K. Miller, J. Qi, Y. Xu, Y. J. Cho, X. Liu, et al., Phys. Rev. B 74, 113313 (2006).
* (83) R. Y. Chen, S. J. Zhang, M. Y. Zhang, T. Dong, and N. L. Wang, Phys. Rev. Lett. 118, 107402 (2017).
* (84) $\beta$ will arrive at 1/4 under the condition of $\omega_{A}\gg$$v_{f}q$ in one-dimensional case G book 1994 .
* (85) S. Takada, K. Y. M. Wong, and T. Holstein, Phys. Rev. B 32, 4639 (1985).
* (86) J. Richard and J. Chen, Solid State Commun. 86, 485 (1993).
* (87) C. Wang, H. Wang, Y. B. Chen, S. H. Yao, and J. Zhou, J. Appl. Phys. 123, 175104 (2018).
| arxiv-papers | 2021-07-27T11:42:34 | 2024-09-04T03:07:21.354668 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Z. X. Wei, S. Zhang, Y. L. Su, L. Cheng, H. D. Zhou, Z. Jiang, H.\n Weng, and J. Qi",
"submitter": "Jingbo Qi",
"url": "https://arxiv.org/abs/2107.12748"
} |
2107.12749 | # The glueball content of $\eta_{c}$
Renqiang Zhang Wei Sun [email protected] Ying Chen [email protected] Ming
Gong Long-Cheng Gui Zhaofeng Liu Institute of High Energy Physics, Chinese
Academy of Sciences, Beijing 100049, P.R. China School of Physics, University
of Chinese Academy of Sciences, Beijing 100049, P.R. China Department of
Physics, Hunan Normal University, Changsha 410081, P.R. China Key Laboratory
of Low-Dimensional Quantum Structures and Quantum Control of Ministry of
Education, Changsha 410081, P.R. China Synergetic Innovation Center for
Quantum Effects and Applications(SICQEA), Hunan Normal University, Changsha
410081, P.R. China
###### Abstract
We carry out the first lattice QCD derivation of the mixing energy and the
mixing angle of the pseudoscalar charmonium and glueball on two gauge
ensembles with $N_{f}=2$ degenerate dynamical charm quarks. The mixing energy
is determined to be $49(6)$ MeV on the near physical charm ensemble, which
seems insensitive to charm quark mass. By the assumption that $X(2370)$ is
predominantly a pseudoscalar glueball, the mixing angle is determined to be
approximately $4.6(6)^{\circ}$, which results in a $+3.9(9)$ MeV mass shift of
the ground state pseudoscalar charmonium. In the mean time, the mixing can
raise the total width of the pseudoscalar charmonium by 7.2(8) MeV, which
explains to some extent the relative large total width of the $\eta_{c}$
meson. As a result, the branching fraction of $\eta_{c}\to\gamma\gamma$ can be
understood in this $c\bar{c}$-glueball mixing framework. On the other hand,
the possible discrepancy of the theoretical predictions and the experimental
results of the partial width of $J/\psi\to\gamma\eta_{c}$ cannot be alleviated
by the $c\bar{c}$-glueball mixing picture yet, which demands future precise
experimental measurements of this partial width.
## 1 Introduction
The $\eta_{c}$ meson is usually assigned to be the $1^{1}S_{0}$ state of
charmonium in the quark model. The latest review of the Particle Data Group
(PDG) [1] gives its mass and the total width to be $m_{\eta_{c}}=2983.9\pm
0.4$ MeV and $\Gamma_{\eta_{c}}=32.0\pm 0.7$ MeV, respectively. Its width
seems quite large among the charmonium states below the $D\bar{D}$ threshold,
since its strong decays take place only through the Okubo-Zweig-Iizuka rule
(OZI rule) [2, 3, 4] suppressed processes. This large width motivates the
scenario that $\eta_{c}$ may have a sizable glueball component. Among the
established flavor singlet pseudoscalar mesons, $\eta(1405)$ is usually taken
as a candidate for the pseudoscalar glueball [5, 6, 7]. However, the quenched
lattice QCD studies [8, 9, 10, 11] predict that the mass of the pseudsoscalar
glueball is around 2.4-2.6 GeV, which is confirmed by lattice simulations with
dynamical quarks [12, 13, 14] (Note that in these lattice studies with
dynamical quarks, only gluonic operators built from Wilson loops were used and
the possible mixing of glueballs with $q\bar{q}$ mesons and multiple meson
states were not considered yet). This raised a question on $\eta(1405)$ as a
glueball candidate because of its much lighter mass. On the other hand, there
is also a theoretical analysis claiming that $\eta(1405)$ and $\eta(1475)$ can
be the same state belong to the $q\bar{q}$-nonet in the 1.3-1.5 GeV mass
region [15], such that there is no need of a pseudoscalar glueball state in
this region. Given the mass of the pseudoscalar glueball predicted by lattice
QCD, it is intriguing to study the possible mixing between the pseudoscalar
charmonium and the glueball. Apart from the total width of $\eta_{c}$, this
mixing scenario is also physically relevant to the understanding of $\eta_{c}$
properties in the $\eta_{c}\to\gamma\gamma$ [16, 17, 18, 19] and
$J/\psi\to\gamma\eta_{c}$ processes [20, 21, 22, 23, 24, 25], where there
exist more or less tensions between the experimental observations and the
theoretical expectations. The phenomenological and lattice studies on this
topic can be found in Refs. [26, 27, 28, 29].
In this work, we investigate the charmonium-glueball mixing relevant to
$\eta_{c}$ in the lattice QCD formalism. There have been pioneering lattice
studies of the mixing of the scalar glueball and $q\bar{q}$ mesons [30, 31].
Strictly speaking, this kind of study should be carried out by the lattice
calculation with dynamical quarks. It is known that glueballs are flavor
singlets and can mix only with flavor singlet $q\bar{q}$ mesons or meson
systems. The propagator of a flavor singlet $q\bar{q}$ meson has contributions
from both connected and disconnected quark diagrams. Theoretically, in full
QCD the disconnected diagrams are the valence quark loops sandwiched with a
tower of sea quark loops. When dynamical quarks are absent, the propagator of
a flavor singlet $q\bar{q}$ state is not complete such that there are no
propagating modes. Since this work is an exploratory study on the charmonium-
glueball mixing, we generate the gauge configurations with charm sea quarks
and omit light sea quarks for the theoretical simplicity. Our lattice setup is
unitary for charm quarks and permits the charmonium-glueball mixing to take
place at any time in a temporal interval, since the species of the sea quarks
and the valence quarks are the same. In practice, we generate two large gauge
ensembles with two degenerate flavors of charm sea quarks. The Large
statistics are mandatory for glueballs to have good signal-to-noise ratios.
The key task of this study is the calculation of the annihilation diagrams of
charm quarks, which is highly computational demanding. For this we adopt the
distillation method [32] which enables us to realize the gauge covariant
smearing of quark fields and the all-to-all quark propagators simultaneously.
## 2 Numerical Details
### 2.1 Lattice Setup
As an exploratory study, we ignore the effect of light quarks and generate
gauge configurations with $N_{f}=2$ flavors degenerate charm sea quarks on an
$L^{3}\times T=16^{3}\times 128$ anisotropic lattice with the aspect ratio
being set to $\xi=a_{s}/a_{t}=5$, where $a_{t}$ and $a_{s}$ are the temporal
and spatial lattice spacing, respectively. The lattice spacing $a_{s}$ is
determined to be $a_{s}=0.1026$ fm through the static potential and
$r_{0}=0.491$ fm.We use the tadpole improved anisotropic clover fermion action
and tadpole improved gauge action, the details of lattice action can be found
in [14]. To investigate the mass dependence of the mixing, we generate two
gauge ensembles (denoted by Ensemble I and Ensemble II) with different bare
charm quark masses. The parameters of the gauge ensembles are listed in Table
1, where $m_{J/\psi}$ is the corresponding mass of the vector charmonium on
these two ensembles. The charm quark mass on Ensemble II is close to the
physical one with $m_{J/\psi}=3068$ MeV, which is not far from the
experimental $J/\psi$ mass $3097$ MeV. The quark mass on Ensemble I is a
little lighter than the physical charm quark mass. We would like to use these
two ensembles to check quark mass dependence of our results. In order to get
good signals of glueballs, we generate the gauge ensembles with high
statistics in this study.
Table 1: Parameters of two $N_{f}=2$ gauge ensembles with degenerate charm sea quarks. Ensemble | $L^{3}\times T$ | $\beta$ | $a_{s}$(fm) | $\xi$ | $N_{\mathrm{cfg}}$ | $m_{J/\psi}$(MeV)
---|---|---|---|---|---|---
I | $16^{3}\times 128$ | 2.8 | $0.1026$ | 5 | $7000$ | $2743(1)$
II | $16^{3}\times 128$ | 2.8 | $0.1026$ | 5 | $6084$ | $3068(1)$
### 2.2 Operators and correlation functions
The principal goal of this work is to investigate the possible mixing of the
pseudoscalar glueball and the pseudoscalar $c\bar{c}$ meson, therefore the
annihilation diagrams of charm quark and antiquark should be taken care of.
For this to be done, we adopt the distillation method [32]: First, for each
configuration and on each time slice, we calculate $N=50$ eigenvectors
$v_{n}(t)$ of the gauge covariant spatial lattice Laplacian operator
$-\nabla_{xy}^{2}(t)$. Thus the smeared charm quark field $c^{(s)}$ can be
obtained by
$c^{(s)}(\mathbf{x},t)=[V(t)V^{\dagger}(t)]_{\mathbf{xy}}c(\mathbf{y},t)$
where $V(t)$ is a matrix with each column being an eigenvector $v_{n}(t)$.
Secondly, the all-to-all propagator
$S^{(c)}_{\alpha\beta}(\mathbf{x},t;\mathbf{y},t^{\prime})$ of $c^{(s)}$ can
be derived through perambulators defined in the framework of the distillation
method (one can refer to Ref. [33] for the technical details).
Physically, there is only one flavor of the charm quark, while we have two
degenerate flavors of charm quarks in the fermion action of our setup,
therefore two degenerate charm sea quarks in the gauge configuration, which
can be denoted by $c_{1}(x)$ and $c_{2}(x)$, and compose an ‘isospin’ doublet
similar to $u$ and $d$ quarks. Since glueballs are independent of quark
flavors and can mix only with flavor singlet mesons, the pseudoscalar
charmonium of interest in this work is only the flavor (isospin) singlet
state, whose interpolation field can be defined in terms of the smeared charm
quark fields $c_{1}^{(s)}$ and $c_{2}^{(s)}$
$\mathcal{O}_{\Gamma}=\frac{1}{\sqrt{2}}(\bar{c}_{1}^{(s)}\Gamma
c_{1}^{(s)}+\bar{c}_{2}^{(s)}\Gamma c_{2}^{(s)}),$ (1)
where $\Gamma$ refers to $\gamma_{5}$ or $\gamma_{5}\gamma_{4}$. Based on the
degeneracy of the two flavors of charm quarks, the correlation function of
$\mathcal{O}_{\Gamma}$ can be expressed as
$\displaystyle C_{CC}(t)$ $\displaystyle=$
$\displaystyle\frac{1}{T}\sum\limits_{t_{s}=1}^{T}\sum\limits_{\mathbf{xy}}\langle\mathcal{O}_{\Gamma}(\mathbf{x},t+t_{s})\mathcal{O}_{\Gamma}^{\dagger}(\mathbf{y},t_{s})\rangle$
(2) $\displaystyle=$
$\displaystyle\frac{1}{T}\sum\limits_{t_{s}=1}^{T}\sum\limits_{\mathbf{xy}}\langle
C(\mathbf{x},t+t_{s};\mathbf{y},t_{s})+2D(\mathbf{x},t+t_{s};\mathbf{y},t_{s})\rangle\equiv
C(t)+2D(t)$
with $C(\mathbf{x},t;\mathbf{y},t^{\prime})$ and
$D(\mathbf{x},t;\mathbf{y},t^{\prime})$ being the contributions from the
connected and disconnected diagrams, respectively,
$\displaystyle C(\mathbf{x};t,\mathbf{y},t^{\prime})$ $\displaystyle=$
$\displaystyle-\mathrm{Tr}[\Gamma
S^{(c)}(\mathbf{x},t;\mathbf{y},t^{\prime})\Gamma^{\dagger}S^{(c)}(\mathbf{y},t^{\prime};\mathbf{x},t)]$
$\displaystyle D(\mathbf{x};t,\mathbf{y},t^{\prime})$ $\displaystyle=$
$\displaystyle\mathrm{Tr}[\Gamma
S^{(c)}(\mathbf{x},t;\mathbf{x},t)]\mathrm{Tr}[\Gamma^{\dagger}S^{(c)}(\mathbf{y},t^{\prime};\mathbf{y},t^{\prime})].$
(3)
For the pseudoscalar glueball operator, we adopt the treatment in Ref. [9, 10]
to get the optimized hermitian operator
$\mathcal{O}_{G}(t)=\mathcal{O}^{\dagger}_{G}(t)$ coupling mainly to the
ground state glueball based on different prototypes of Wilson loops and gauge
link smearing schemes, Appendix A shows details of the operator construction.
Thus we have the following correlation functions
$\displaystyle C_{GG}(t)$ $\displaystyle=$
$\displaystyle\frac{1}{T}\sum\limits_{t_{s}=1}^{T}\langle\mathcal{O}_{G}(t+t_{s})\mathcal{O}_{G}(t_{s})\rangle$
$\displaystyle C_{GC}(t)$ $\displaystyle=$
$\displaystyle\frac{1}{T}\sum\limits_{t_{s}=1}^{T}\sum\limits_{\mathbf{x}}\langle\mathcal{O}_{G}(t+t_{s})\mathcal{O}_{\Gamma}^{\dagger}(\mathbf{x},t_{s})\rangle$
$\displaystyle=$
$\displaystyle-\frac{\sqrt{2}}{T}\sum\limits_{t_{s}=1}^{T}\sum\limits_{\mathbf{x}}\langle\mathcal{O}_{G}(t+t_{s})\mathrm{Tr}[\Gamma^{\dagger}S^{(c)}(\mathbf{x},t_{s};\mathbf{x},t_{s})]\rangle$
$\displaystyle C_{CG}(t)$ $\displaystyle=$
$\displaystyle\frac{1}{T}\sum\limits_{t_{s}=1}^{T}\sum\limits_{\mathbf{x}}\langle\mathcal{O}_{\Gamma}(\mathbf{x},t+t_{s})\mathcal{O}_{G}(t_{s})\rangle=\mp
C_{GC}(t)$ (4)
where the $\mp$ sign comes from the hermiticity of $\mathcal{O}_{\Gamma}$ and
takes the minus sign for $\Gamma=\gamma_{5}$ (anti-hermitian) and positive
sign for $\gamma_{5}\gamma_{4}$ (hermitian).
## 3 Mixing angles
Strictly speaking, the hadronic states in lattice QCD are the eigenstates
$|n\rangle$ of the lattice Hamiltonian $\hat{H}$, which are defined as
$\hat{H}|n\rangle=E_{n}|n\rangle$. For a given quantum number, $|n\rangle$’s
span a orthogonal and complete set, namely $\sum\limits_{n}|n\rangle\langle
n|=1$ with the normalization condition $\langle m|n\rangle=\delta_{mn}$.
Therefore, the correlation function $C_{XY}(t)$ of operator $\mathcal{O}_{X}$
and $\mathcal{O}_{Y}$ can be parameterized as
$C_{XY}(t)\approx\sum\limits_{n\neq 0}\left[\langle
0|\mathcal{O}_{X}|n\rangle\langle
n|\mathcal{O}^{\dagger}_{Y}|0\rangle\left(e^{-E_{n}t}\pm
e^{-E_{n}(T-t)}\right)\right]$ (5)
where the $\pm$ sign is for the same and opposite hermiticities of
$\mathcal{O}_{X}$ and $\mathcal{O}_{Y}$, respectively.
Since our lattice formalism is unitary for charm quarks, namely, the species
of sea quarks and valence quarks are the same, we can choose another complete
state set $\\{|\alpha_{i}\rangle,i=1,2,\cdots\\}$ as the state basis, such
that an eigenstate $|n\rangle$ of $\hat{H}$ can be expressed in terms of
$|\alpha_{i}\rangle$ as $|n\rangle=\sum\limits_{i}C_{ni}|\alpha_{i}\rangle$
with $\sum\limits_{i}|C_{ni}|^{2}=1$. In this sense, one can say that
$|n\rangle$ is an admixture of states $|\alpha_{i}\rangle$ whose fractions are
$|C_{ni}|^{2}$. For the case of this work, we choose the state set
$\\{|\alpha_{i}\rangle,i=1,2,\ldots\\}$ of flavor singlet pseudoscalars to be
$|\alpha_{i}\rangle=|G_{1}\rangle,|(c\bar{c})_{1}\rangle,|G_{2}\rangle,|(c\bar{c})_{2}\rangle,\ldots$,
where $|G_{i}\rangle$ and $|(c\bar{c})_{i}\rangle$ are the $i$-th pure gauge
glueball state and the pure $c\bar{c}$ state, respectively. This might be
physically meaningful since glueball states are well defined and turn out to
exist in the quenched approximation, as well as that charmonium states are
usually considered as $c\bar{c}$ bound states in the phenomenological studies.
It should be emphasized that this assumption is the prerequisite of the
following discussion, and is the common ansatz in the phenomenological mixing
models.
Obviously, the mixing takes place only between glueball states and $c\bar{c}$
states in the state set $\\{|\alpha_{i}\rangle,i=1,2,\ldots\\}$. If the
dynamics of the mixing can be treated as perturbations, then to the lowest
order of the perturbation theory, it may be assumed that the mixing is
dominated by that between the nearest glueball state and $c\bar{c}$ state.
Thus the Hamiltonian $\hat{H}$ can be expressed as
$\hat{H}=\left(\begin{array}[]{cc}m_{G_{1}}&x_{1}\\\
x_{1}&m_{(c\bar{c})_{1}}\\\
\end{array}\right)\oplus\left(\begin{array}[]{cc}m_{G_{2}}&x_{2}\\\
x_{2}&m_{(c\bar{c})_{2}}\\\ \end{array}\right)\oplus\cdots$ (6)
where $m_{G_{i}}$ and $m_{(c\bar{c})_{i}}$ are the masses of the state
$|G_{i}\rangle$ and $|(c\bar{c})_{i}\rangle$, respectively. The off-diagonal
matrix elements $x_{i}$ of $\hat{H}$ are called mixing energies which are
exactly the transition amplitude between state $|G_{i}\rangle$ and
$|(c\bar{c})_{i}\rangle$. Thus the eigenstates
$|n\rangle=|g_{1}\rangle,|\eta_{1}\rangle,|g_{2}\rangle,|\eta_{2}\rangle,\ldots$
are related to $|G_{i}\rangle$ and $|(c\bar{c})_{i}\rangle$ by
$\left(\begin{array}[]{c}|g_{i}\rangle\\\ |\eta_{i}\rangle\\\
\end{array}\right)=\left(\begin{array}[]{cc}\cos\theta_{i}&-\sin\theta_{i}\\\
\sin\theta_{i}&\cos\theta_{i}\\\
\end{array}\right)\left(\begin{array}[]{c}|G_{i}\rangle\\\
|(c\bar{c})_{i}\rangle\\\ \end{array}\right)$ (7)
where the mixing angles $\theta_{i}$ have been introduced. The eigenvalues of
$\hat{H}$, namely, the masses of $|\eta_{i}\rangle$ and $|g_{i}\rangle$ states
can be easily derived as $m_{\eta_{i}}=\bar{m}_{i}+\Delta_{i}\delta_{i}/2$ and
$m_{g_{i}}=\bar{m}_{i}-\Delta_{i}\delta_{i}/2$, where
$\bar{m}_{i}=\frac{1}{2}(m_{G_{i}}+m_{(c\bar{c})_{i}})$,
$\Delta_{i}=m_{(c\bar{c})_{i}}-m_{G_{i}}$,
$\delta_{i}=\sqrt{1+4x_{i}^{2}/\Delta_{i}^{2}}$. Accordingly, the mixing
angles $\theta_{i}$ and mass shifts of $|(c\bar{c})_{i}\rangle$ can be derived
as
$\displaystyle\sin\theta_{i}$ $\displaystyle=$
$\displaystyle\mathrm{sgn}({x_{i}}{\Delta_{i}})\sqrt{\frac{\delta_{i}-1}{2\delta_{i}}}=\frac{x_{i}}{\Delta_{i}}+\mathcal{O}\left(\frac{x_{i}^{3}}{\Delta_{i}^{3}}\right),$
$\displaystyle\Delta m_{\eta_{i}}$ $\displaystyle=$ $\displaystyle
m_{\eta_{i}}-m_{(c\bar{c})_{i}}=-\frac{1}{2}\Delta_{i}+\frac{1}{2}\Delta_{i}\delta_{i}\approx\frac{x_{i}^{2}}{\Delta_{i}},$
(8)
where $\mathrm{sgn}({x_{i}}{\Delta_{i}})$ refers to the sign of
$x_{i}\Delta_{i}$. Therefore, for the ground state $\eta_{c}(1S)$ we are
interested in, the key task is to extract $\theta_{1}$ that is the mixing
angle of the ground state of the pseudoscalar glueball $|G_{1}\rangle$ and the
ground state pseudoscalar charmonium $|(c\bar{c})_{1}\rangle$.
Figure 1: Effective mass from two point functions $C_{CC}(t)$, $C_{GG}(t)$ and
correlation function $C_{GC}(t)$ for operator with $\Gamma=\gamma_{5}$ using
best fit parameters from Eq. (10) and (3.1) on ensemble I (top) and ensemble
II (bottom), where points with error bar are from simulation data with
jackknife estimated error, the light gray band shows the fitted results with
best fit parameters in Table. 2, and the color band indicates the fitting
range. The large errors of $m^{\mathrm{eff}}_{CC}(t)$ in the time range beyond
$t/a_{t}>20$ come mainly from the disconnected diagrams (see discussions in
Appendix B).
### 3.1 The $\Gamma=\gamma_{5}$ case
Actually the mixing angle $\theta_{i}$ can be derived from the correlation
function $C_{CG}(t)$ or $C_{GC}(t)$ for the $\Gamma=\gamma_{5}$ case if we
assume boldly that $\mathcal{O}_{G}$ couples almost exclusively with
$|G_{i}\rangle$ and $\mathcal{O}_{\Gamma}$ couples exclusively with
$|(c\bar{c})_{i}\rangle$, namely,
$\displaystyle\mathcal{O}_{G}^{\dagger}|0\rangle$ $\displaystyle=$
$\displaystyle\sum\limits_{i\neq 0}\sqrt{Z_{G_{i}}}|G_{i}\rangle$
$\displaystyle\mathcal{O}_{\gamma_{5}}^{\dagger}|0\rangle$ $\displaystyle=$
$\displaystyle\sum\limits_{i\neq
0}\sqrt{Z_{(\gamma_{5}),i}}|(c\bar{c})_{i}\rangle$ (9)
With this assumption and by utilizing Eq.(7) and Eq.(3.1), one has
$\displaystyle C_{GC}(t)=$
$\displaystyle-\sum_{i}\sqrt{Z_{G_{i}}Z_{(\gamma_{5}),i}}\cos\theta_{i}\sin\theta_{i}\left(e^{-m_{g_{i}}t}-e^{-m_{g_{i}}(T-t)}-(e^{-m_{\eta_{i}}t}-e^{-m_{\eta_{i}}(T-t)})\right).$
(10)
Note that in the above equation, we also use the fact that
$\mathcal{O}_{\gamma_{5}}$ is anti-hermitian. When $T$ is large, the above
parameterization of $C_{GC}(t)$ requires $C_{GC}(t=0)\approx 0$, which is a
direct consequence of the assumption of Eq. (3.1). The measured $C_{GC}(t)$’s
from the ensemble I and II are shown in the right most column of Fig. 1, where
one can see that this $C_{GC}(t=0)\approx 0$ is meet. This manifests that the
assumptions in Eq. (10) are reasonable.
In order for $\theta_{i}$’s to be extracted using Eq. (10), one has to know
the parameters $m_{g_{i}}$, $m_{\eta_{i}}$, $Z_{G_{i}}$ and
$Z_{(\gamma_{5}),i}$, which, based on the assumptions of Eq. (3.1), are
encoded in the correlation functions $C_{CC}(t)$ and $C_{GG}(t)$ as
$\displaystyle C_{GG}(t)$ $\displaystyle=$
$\displaystyle\sum\limits_{i}Z_{G_{i}}\left[\cos^{2}\theta_{i}\left(e^{-m_{g_{i}}t}+e^{-m_{g_{i}}(T-t)}\right)+\sin^{2}\theta_{i}\left(e^{-m_{\eta_{i}}t}+e^{-m_{\eta_{i}}(T-t)}\right)\right]$
$\displaystyle C_{CC}(t)$ $\displaystyle=$
$\displaystyle\sum\limits_{i}Z_{(\gamma_{5}),i}\left[\cos^{2}\theta_{i}\left(e^{-m_{\eta_{i}}t}+e^{-m_{\eta_{i}}(T-t)}\right)+\sin^{2}\theta_{i}\left(e^{-m_{g_{i}}t}+e^{-m_{g_{i}}(T-t)}\right)\right].$
(11)
Therefore, we carry out a simultaneous fit to $C_{GC}(t)$, $C_{CC}(t)$ and
$C_{GG}(t)$ through the correlated minimal-$\chi^{2}$ fitting procedure using
the function forms in Eq. (10) and (3.1). Since we focus on $\theta_{1}$, in
practice we only consider the contribution from the lowest two glueball states
and two $c\bar{c}$ states, namely, we use $i=1,2$ in above functions to model
the data and treat the second states to be the effective states that take
account of the contribution of all the higher states.
Table 2: Ground state mass and mixing angle fitted from operators with $\Gamma=\gamma_{5}$ and $\Gamma=\gamma_{5}\gamma_{4}$ on ensemble I and ensemble II, rows started with avg. are the final weighted average results. ensemble | $\Gamma$ | $[t_{l},t_{h}]_{CC}$ | $[t_{l},t_{h}]_{GG}$ | $[t_{l},t_{h}]_{GC}$ | $\chi^{2}/dof$ | $m_{\eta_{1}}$(MeV) | $m_{g_{1}}$(MeV) | $\theta_{1}$ | $x_{1}$(MeV)
---|---|---|---|---|---|---|---|---|---
I | $\gamma_{5}$ | [10, 25] | [2, 18] | [2, 25] | $1.1$ | $2705(2)$ | $2289(50)$ | $6.8(9)^{\circ}$ | 49(9)
$\gamma_{5}\gamma_{4}$ | [10, 25] | [2, 18] | [2, 30] | $0.98$ | $2701(1)$ | $2283(51)$ | $6.5(9)^{\circ}$ | 48(9)
avg. | — | — | — | — | $2703(1)$ | $2286(50)$ | $6.6(9)^{\circ}$ | 48(9)
II | $\gamma_{5}$ | [13, 30] | [3, 15] | [2, 20] | $1.1$ | $3028(8)$ | $2261(74)$ | $4.5(6)^{\circ}$ | 60(10)
$\gamma_{5}\gamma_{4}$ | [13, 30] | [2, 15] | [1, 30] | $1.1$ | $3031(3)$ | $2348(47)$ | $3.9(3)^{\circ}$ | 47(5)
avg. | — | — | — | — | $3031(3)$ | $2323(55)$ | $4.3(4)^{\circ}$ | 49(6)
The calculated results and fit results are shown in Fig. 1. The data points in
the left most column show the effective masses $m_{CC}^{\mathrm{eff}}(t)$ of
the correlation function $C_{CC}(t)$ on the two ensembles (the upper panel is
for ensemble I and the lower one is for ensemble II), which are defined by
$m_{CC}^{\mathrm{eff}}(t)=\ln\frac{C_{CC}(t)}{C_{CC}(t+1)}.$ (12)
The effective mass $m_{GG}^{\mathrm{eff}}(t)$ on the two ensembles are shown
as data points in the middle column. The right most two panels of Fig. 1 show
the correlation functions $C_{GC}(t)$ obtained on the two ensembles. The
curves with error bands are plotted using the best fit parameters obtained
through the fitting procedure mentioned above, where the colored bands
illustrate the fitting time range. The fitted masses and the mixing angles
$\theta_{1}$ are collected in Table 2, where the masses are converted into the
values in physical units through the lattice spacings in Table 1. The fit time
windows and the related $\chi^{2}$ per degree of freedom ($\chi^{2}/dof$) are
also presented. It is seen that the function forms of Eq. (10) and Eq. (3.1)
describes the data very well with a reasonable $\chi^{2}/dof$. On the ensemble
I, the fitted $\eta_{c}$ mass is around $m_{\eta_{1}}\approx 2.7$ GeV, while
the result on ensemble II is $m_{\eta_{1}}\approx 3.0$ GeV and close to the
experimental value. On the two ensembles, the fitted pseudoscalar glueball
mass is around $2.3$ GeV and shows little dependence of the charm quark
masses. Finally, we get the mixing angle $\theta_{1}=6.8(9)^{\circ}$ and
$\theta_{1}=4.5(6)^{\circ}$ on ensemble I and ensemble II, respectively.
According to Eq. (3) and using the mass differences $m_{\eta_{1}}-m_{g_{1}}$
listed in Table. 2 as the estimate for
$\Delta_{1}=m_{(c\bar{c})_{1}}-m_{G_{1}}$, the mixing energy $x_{1}$ are
derived to be $49(9)$ MeV and $60(10)$ MeV on these two ensembles.
Figure 2: Effective mass from two point functions $C_{CC}(t)$, $C_{GG}(t)$ and
correlation function $C_{GC}(t)$ for operator with
$\Gamma=\gamma_{5}\gamma_{4}$ using best fit parameters from $C_{GG}(t)$ of
Eq. (3.1) and (18) on ensemble I (top) and ensemble II (bottom), where points
with error bar are from simulation data with jackknife estimated error, the
light gray band shows the fitted results with best fit parameters in Table. 2,
and the color band indicates the fitting range.
### 3.2 The $\Gamma=\gamma_{5}\gamma_{4}$ case
As a cross check, we also carried out the similar calculation by using the
$\Gamma=\gamma_{5}\gamma_{4}$ for the interpolation field operator of the
pseudoscalar $c\bar{c}$ states. The corresponding correlation functions
$C_{CC}(t)$ and $C_{GC}(t)$ are calculated using Eq. (2.2). The effective
masses $m_{CC}^{\mathrm{eff}}(t)$ , $m_{GG}^{\mathrm{eff}}(t)$ and $C_{GC}(t)$
on the two ensembles are shown in Fig.2. It is interesting to see that, in
contrast to the case of $\Gamma=\gamma_{5}$, the correlation function
$C_{GC}(t)$ does not go to zero when $t\to 0$ now (see the right most column
of Fig. 2). This implies that the assumptions in Eq. (3.1) may not apply here.
If we insist the relation
$\mathcal{O}_{G}^{\dagger}|0\rangle=\sum\limits_{i\neq
0}\sqrt{Z_{G_{i}}}|G_{i}\rangle$ still holds, then the second assumption in
Eq. (3.1) should be modified.
Actually, the operator $\mathcal{O}_{\gamma_{5}\gamma_{4}}$ is the temporal
component of the isoscalar axial vector current
$J_{5}^{\mu}=\bar{c}\gamma_{5}\gamma^{\mu}c$ with $c=(c_{1},c_{2})^{T}$ here
(up to a normalization factor since the charm quark fields in
$\mathcal{O}_{\gamma_{5}\gamma_{4}}$ are spatially smeared). According to the
$U_{A}(1)$ anomaly of QCD, $J_{5}^{\mu}$ satisfies the following anomalous
axial vector relation
$\partial_{\mu}J_{5}^{\mu}(x)=2m_{c}\bar{c}(x)\gamma_{5}c(x)+q(x),$ (13)
where
$q(x)=\frac{g^{2}}{16\pi^{2}}\epsilon^{\alpha\beta\rho\sigma}G_{\alpha\beta}^{a}G^{a}_{\rho\sigma}$
is the anomalous term from the $U_{A}(1)$ anomaly with $g$ being the strong
coupling constant and $G_{\alpha\beta}^{a}$ being the strength of color
fields. The first term on the right hand side of Eq. (13) is proportional to
our operator $\mathcal{O}_{\gamma_{5}}$, thus based on the assumption in Eq.
(3.1) we have
$\langle 0|\partial_{\mu}J_{5}^{\mu}(x)|G_{i}\rangle\approx\langle
0|q(x)|G_{i}\rangle.$ (14)
On the other hand, if we introduce the decay constant of the glueball state
$|G_{i}\rangle$ through the definition
$\langle 0|J_{5}^{\mu}(x)|G_{i},p\rangle=if_{G_{i}}p^{\mu}e^{-ip\cdot x},$
(15)
then we have $\langle
0|\partial_{\mu}J_{5}^{\mu}(0)|G_{i},\mathbf{p}=0\rangle=m_{G_{i}}^{2}f_{G_{i}}$
and therefore $f_{G_{i}}=\frac{1}{m_{G_{i}}^{2}}\langle 0|q(0)|G_{i}\rangle$.
Thus from Eq. (15) we can estimate that
$\langle
0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|G_{i},\mathbf{p}=0\rangle\propto\frac{1}{m_{G_{i}}}\langle
0|q(0)|G_{i}\rangle.$ (16)
Previous lattice studies show that pseudoscalar states can be accessed by the
operator $q(x)$ [10, 11], thus the nonzero matrix element $\langle
0|q(0)|G_{i}\rangle$ implies the coupling $\langle
0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|G_{i}\rangle\neq 0$. Consequently we have
the following matrix elements
$\displaystyle\langle 0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|g_{i}\rangle$
$\displaystyle=$ $\displaystyle\cos\theta_{i}\langle
0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|G_{i}\rangle-\sin\theta_{i}\langle
0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|(c\bar{c})_{i}\rangle$
$\displaystyle\langle 0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|\eta_{i}\rangle$
$\displaystyle=$ $\displaystyle\sin\theta_{i}\langle
0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|G_{i}\rangle+\cos\theta_{i}\langle
0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|(c\bar{c})_{i}\rangle.$
Thus the correlation function $C_{GC}(t)$ can be parameterized as
$\displaystyle C_{GC}(t)$ $\displaystyle=$
$\displaystyle\sum_{i=1}^{2}\left[\langle
0|\mathcal{O}_{G}|g_{i}\rangle\langle
g_{i}|\mathcal{O}_{\gamma_{5}\gamma_{4}}|0\rangle\left(e^{-m_{g_{i}}t}+e^{-m_{g_{i}}(T-t)}\right)+\langle
0|\mathcal{O}_{G}|\eta_{i}\rangle\langle\eta_{i}|\mathcal{O}_{\gamma_{5}\gamma_{4}}|0\rangle\left(e^{-m_{\eta_{i}}t}+e^{-m_{\eta_{i}}(T-t)}\right)\right]$
(18) $\displaystyle\approx$ $\displaystyle\sqrt{Z_{G_{1}}}\langle
0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|G_{1}\rangle\cos^{2}\theta_{1}\left(e^{-m_{g_{1}}t}+e^{-m_{g_{1}}(T-t)}\right)$
$\displaystyle-\sum_{i=1}^{2}\sqrt{Z_{G_{i}}Z_{(\gamma_{5}\gamma_{4}),i}}\cos\theta_{i}\sin\theta_{i}\left(e^{-m_{g_{i}}t}+e^{-m_{g_{i}}(T-t)}-(e^{-m_{\eta_{i}}t}+e^{-m_{\eta_{i}}(T-t)})\right),$
where $\sqrt{Z_{(\gamma_{5}\gamma_{4}),i}}=\langle
0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|(c\bar{c})_{i}\rangle$ has been defined.
The second equality is derived based on first assumption of Eq. (3.1), namely
$\langle 0|\mathcal{O}_{G}|(c\bar{c})_{i}\rangle=0$, and $\langle
0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|G_{i}\rangle\neq 0$ discussed above. In
the first term of the last expression of Eq. (18), we only keep the mass term
of $|g_{1}\rangle$ state to take care of the temporal behavior of $C_{GC}(t)$
in the early time range. This is justified since the operator
$\mathcal{O}_{G}(t)$ is optimized to couple most to the ground state with
$Z_{G_{1}}\gg Z_{G_{2}}$. The terms proportional to $\sin^{2}\theta_{i}$ are
expected to be small and also neglected here.
Using Eq. (3.1) (after replacing $Z_{(\gamma_{5}),i}$ by
$Z_{(\gamma_{5}\gamma_{4}),i}$) and Eq. (18), we carry out a simultaneous fit
to $C_{GG}(t)$, $C_{GC}(t)$ and $C_{CC}(t)$. The fit procedure is the same as
the case of $\Gamma=\gamma_{5}$. In Fig. 2, the colored curves with error
bands are plotted using the best fit parameters. It is seen that the function
forms mentioned above also describe the data very well. The fitted results are
shown in Table 2 and can be compared with the $\gamma_{5}$-case directly. On
both ensembles, it is clear that the results of the two cases are compatible
with each other within errors.
For each ensemble, the final results are obtained by averaging the results of
the $\gamma_{5}$ and $\gamma_{5}\gamma_{4}$ case weighted by their inverse
error square. To be specific, for a quantity $A$, its averaged value and error
are calculated through
$A_{\texttt{avg}}=\sum_{i}\omega_{i}A_{i},~{}~{}~{}~{}A_{\texttt{err}}=\sqrt{\sum_{i,j}\omega_{i}\omega_{j}\sigma_{i}\sigma_{j}},$
(19)
with $\omega_{i}=\sigma_{i}^{-2}/\sum_{i}\sigma_{i}^{-2}$, where $\sigma_{i}$
is the standard error of observable $A_{i}$. The averaged results are also
shown in the rows labelled by avg. in Table 2. Finally, we get the following
mixing angles $\theta_{1}$ and the mixing energies $x_{1}$ on ensemble I and
II
$\displaystyle\theta_{1}$ $\displaystyle=$ $\displaystyle
6.6(9)^{\circ},~{}~{}~{}x_{1}=48(9)~{}\mathrm{MeV}~{}~{}~{}(\mathrm{Ensemble~{}~{}I})$
$\displaystyle\theta_{1}$ $\displaystyle=$ $\displaystyle
4.3(4)^{\circ},~{}~{}~{}x_{1}=49(6)~{}\mathrm{MeV}~{}~{}~{}(\mathrm{Ensemble~{}~{}II}).$
(20)
Since the mass $m_{\eta_{1}}$ on ensemble II is close to the experimental
value of $m_{\eta_{c}}$, we use Eq. (3) to estimate the mass shift from
$m_{(c\bar{c})_{1}}$ due to the mixing as
$\displaystyle\Delta m^{lat}_{\eta_{c}}$ $\displaystyle\approx$
$\displaystyle\frac{x_{1}^{2}}{m_{\eta_{1}}-m_{g_{1}}}\approx
3.4(9)~{}\mathrm{MeV}.$ (21)
## 4 Discussion
Till now, our major conclusion is that there does exist the mixing between the
ground state pseudoscalar glueball and the ground state pseudoscalar
charmonium. In this section, we will discuss the possible phenomenological
implications of this kind of mixing. The prerequisite of these discussions is
the identification of the possible pseudoscalar glueball candidate in
experiments. The BESIII collaboration has observed a likely pseudoscalar
structure $X(2370)$ in the processes $J/\psi\to\gamma\eta^{\prime}\pi\pi$ [34]
and $J/\psi\to\gamma\eta^{\prime}K\bar{K}$ [35]. The mass of $X(2370)$ is
consistent with the prediction of the pseudoscalar glueball mass from lattice
QCD studies. On the other hand, the branching fractions are measured to be
$\mathrm{Br}(J/\psi\to\gamma X\to\gamma\eta^{\prime}K^{+}K^{-})=(1.79\pm
0.23(\mathrm{stat.})\pm 0.65(\mathrm{syst.}))\times 10^{-5}$ and
$\mathrm{Br}(J/\psi\to\gamma X\to\gamma\eta^{\prime}K_{S}K_{S})=(1.18\pm
0.32(\mathrm{stat.}))\pm 0.39(\mathrm{syst.}))\times 10^{-5}$ [35], which are
also compatible with the lattice prediction of the branching ratio of $J/\psi$
radiatively decaying into a pseudoscalar glueball, namely
$\mathrm{Br}(J/\psi\to\gamma G)=2.31(80)\times 10^{-4}$ [25]. With these
observations, we tentatively consider $X(2370)$ as the pseudoscalar glueball
candidate in the following discussions.
First, we consider the mass shift of the pseudoscalar charmonium due to the
mixing. The non-zero mixing angle $\theta_{1}$ and mixing energy $x_{1}$ imply
that the mixing can shift the masses of the unmixed pseudoscalar charmonium
upward. Since $x_{1}$ reflects the dynamics of the $c\bar{c}$-glueball mixing,
it is expected that $x_{1}$ is insensitive to the small variances of the
masses of the pseudoscalar glueball and charmonium. Thus, to the lowest order
of the perturbation theory (see Eq. (3)), the mixing angle and the mass shift
of the ground state pseudoscalar charmonium can be estimated as
$\displaystyle\sin\theta^{exp}$ $\displaystyle\approx$
$\displaystyle\frac{x_{1}}{m_{\eta_{c}}-m_{X(2370)}}\approx 0.080(10)$
$\displaystyle\Delta m^{exp}_{\eta_{c}}$ $\displaystyle\approx$
$\displaystyle\frac{x_{1}^{2}}{m_{\eta_{c}}-m_{X(2370)}}\approx
3.9(9)~{}\mathrm{MeV},$ (22)
where the corresponding mixing angle is $\theta^{exp}\approx 4.6(6)^{\circ}$.
These results are relevant to the charmonium hyperfine splitting
$\Delta_{\mathrm{HFS}}=m_{J/\psi}-m_{\eta_{c}}$, which is usually used as a
good quantity to calibrate the systematic uncertainties of lattice QCD
calculations in charm physics. The PDG2020 result [1] gives
$\Delta_{\mathrm{HFS}}=113.0(4)$ MeV. The latest lattice calculation carried
out by the HPQCD collaboration finds $\Delta_{\mathrm{HFS}}=120.3(1.1)$ MeV at
the physical point after considering the quenched QED effects [36]. Obviously,
this result, with a much smaller error, still deviates the experimental value
by $+7.3(1.2)$ MeV. The uncontrolled systematic uncertainties of this
calculation are the charm quark annihilation effects and the possible mixing
between pseudoscalar glueball and the pseudoscalar charmonium. As far as the
charm annihilation effects are concerned, previous lattice studies show that
they contribute little to the $J/\psi$ mass while move the $\eta_{c}$ mass
upward by roughly 2 MeV [37]. We have also investigated this effects using the
same ensembles in this work and obtained the mass shift of $\eta_{c}$ due to
the charm annihilation effects is $+3.7(5)$ MeV [33]. We are not sure whether
this mass shift is theoretically equivalent to $\Delta m_{\eta_{c}}$ in Eq.
(21) or they can be combined together to give the total mass shift of
$\eta_{c}$. Anyway, these corrections to the $\eta_{c}$ mass are in the right
direction. On the other hand, the effect of light sea quarks, which are not
considered in this work, may push the $\eta_{c}$ mass upward further.
Secondly, the $c\bar{c}$-glueball mixing can contribute substantially to the
total width of $\eta_{c}$. It is known that $\eta_{c}$ decays predominantly
into light hadrons such that the total width of $\eta_{c}$ can be approximated
as $\Gamma_{\eta_{c}}\approx\Gamma(\eta_{c}\to\mathrm{LH})$ where LH stands
for all the light hadron final states. Although a direct derivation of
$\Gamma(\eta_{c}\to\mathrm{LH})$ cannot be achieved from lattice QCD in the
present era, we can discuss the contribution of the $c\bar{c}$-glueball mixing
to $\Gamma_{\eta_{c}}$ by the following logic. To the leading order of
perturbative QCD, the processes $\eta_{c}\to\mathrm{LH}$ can be viewed as that
$\eta_{c}$ decays into two gluons first and then the two gluons are hadronized
into light hadrons. Thus the decay width $\Gamma(\eta_{c}\to\mathrm{LH})$ can
be expressed as
$\Gamma_{\eta_{c}}\approx\Gamma(\eta_{c}\to\mathrm{LH})\approx\Gamma(\eta_{c}\to
gg)=\frac{1}{2}\frac{1}{16\pi}\frac{1}{m_{\eta_{c}}}|\mathcal{M}(\eta_{c}\to
gg)|^{2}$ (23)
where the additional factor is due to the identical two final state gluons.
These arguments also apply to the hadronic decays of the pseudoscalar glueball
(denoted by $|G\rangle$) and charmonium (denoted by $|(c\bar{c})\rangle$).
Therefore we obtain the following relation
$\frac{|\mathcal{M}(G\to gg)|}{|\mathcal{M}(c\bar{c}\to
gg)|}\approx\left(\frac{m_{G}\Gamma_{G}}{m_{c\bar{c}}\Gamma_{c\bar{c}}}\right)^{1/2},$
(24)
where $(m_{G},\Gamma_{G})$,$(m_{c\bar{c}},\Gamma_{c\bar{c}})$ are the mass and
width of $|G\rangle$ and $|(c\bar{c})\rangle$, respectively. If $\eta_{c}$ is
an admixture of $|G\rangle$ and $|(c\bar{c})\rangle$, i.e.
$|\eta_{c}\rangle=\cos\theta|(c\bar{c})\rangle+\sin\theta|G\rangle$ (see Eq.
(7)), by using Eq. (24) the ratio of $\Gamma_{\eta_{c}}$ to
$\Gamma_{c\bar{c}}$ is expressed as
$\displaystyle\frac{\Gamma_{\eta_{c}}}{\Gamma_{c\bar{c}}}\approx\frac{|\mathcal{M}(\eta_{c}\to
gg)|^{2}m_{c\bar{c}}}{|\mathcal{M}(c\bar{c}\to gg)|^{2}m_{\eta_{c}}}$
$\displaystyle\approx$
$\displaystyle\left|\cos\theta+\sin\theta\frac{\left|\mathcal{M}(G\to
gg)\right|}{\left|\mathcal{M}(c\bar{c}\to gg)\right|}\right|^{2}$ (25)
$\displaystyle\approx$ $\displaystyle
1+2\sin\theta\left(\frac{m_{G}\Gamma_{G}}{m_{\eta_{c}}\Gamma_{\eta_{c}}}\right)^{1/2}\left(\frac{\Gamma_{\eta_{c}}}{\Gamma_{c\bar{c}}}\right)^{1/2},$
where we use $m_{c\bar{c}}\approx m_{\eta_{c}}$, $\cos\theta\approx 1$. With
the assumption that $X(2370)$ is predominantly a pseudoscalar glueball, and if
we take $\Gamma_{G}\approx\Gamma_{X(2370)}\approx 100$ MeV and use the PDG
value $\Gamma_{\eta_{c}}=32.0(7)$ MeV, then by solving Eq. (25) we get
$\frac{\Gamma_{\eta_{c}}}{\Gamma_{c\bar{c}}}=1.29(4)$, which implies
$\Gamma_{c\bar{c}}\approx 24.8(9)$ MeV. Finally, the contribution of
$c\bar{c}$-glueball mixing to $\Gamma_{\eta_{c}}$ is estimated as
$\delta\Gamma_{c\bar{c}}\equiv\Gamma_{\eta_{c}}-\Gamma_{c\bar{c}}\approx
7.2(8)~{}~{}\mathrm{MeV}.$ (26)
The decays of $c\bar{c}$ pseudoscalar meson into hadrons can be viewed as that
the $c\bar{c}$ first decays into two gluons and then the two gluons are
hadronized into light hadrons. In this sense, one can take the approximation
$\Gamma_{c\bar{c}}\approx\Gamma(c\bar{c}\to gg)$. On the other hand, the
radiative decay $\eta_{c}\to\gamma\gamma$ is dominated by
$c\bar{c}\to\gamma\gamma$. According to the running of the strong coupling
constant $\alpha_{s}(\mu)$, at $\mu\approx m_{c}\approx 1.5$ GeV, $\alpha_{s}$
takes the value in the range $0.3<\alpha_{s}<0.35$. If one takes
$\alpha=1/134$ at the charm quark mass scale, to the leading order QCD
correction [26, 38] one has
$\frac{\Gamma(c\bar{c}\to\gamma\gamma)}{\Gamma(c\bar{c}\to
gg)}\approx\frac{8}{9}\frac{\alpha^{2}}{\alpha_{s}^{2}}\frac{1-3.4\alpha_{s}/\pi}{1+4.8\alpha_{s}/\pi}\approx(1.6\sim
2.5)\times 10^{-4}$ (27)
Experimentally, the PDG result of
$\mathrm{Br}(\eta_{c}\to\gamma\gamma)=(1.61\pm 0.12)\times 10^{-4}$ [1].
Considering the ratio $\Gamma_{\eta_{c}}/\Gamma_{c\bar{c}}=1.29(4)$, the
experimental value implies
${\Gamma(c\bar{c}\to\gamma\gamma)}/{\Gamma(c\bar{c}\to gg)}\approx(2.07\pm
0.17)\times 10^{-4}$, which falls into the range of Eq. (27). Note that the
NRQCD analysis with next-next-leading order QCD corrections predicts the
branching fraction $\mathrm{Br}(\eta_{c}\to\gamma\gamma)\sim(2.3-2.9)\times
10^{-4}$ if $\eta_{c}$ is taken as a pure $c\bar{c}$ state [39], which also
requires a smaller total width of the ground state pseusoscalar charmonium
when comparing with PDG value. Anyway, the above discussions are just
tentative because of the assumption that $X(2370)$ is predominantly a
pseudoscalar glueball. The existence and the status of $X(2370)$ need to be
clarified by future experiments.
As for the decay width of $J/\psi\to\gamma\eta_{c}$, however, the tension
between the experiments and the theoretical predictions cannot be alleviated
by the $c\bar{c}$-glueball mixing. PDG gives the world average value
$\mathrm{Br}(J/\psi\to\gamma\eta_{c})=(1.7\pm 0.4)\times 10^{-2}$ [1], which
corresponds to the partial decay width $\Gamma(J/\psi\to\gamma\eta_{c})=1.6\pm
0.4$ keV. Theoretically, the effective field theories and non-relativistic
potential models predict the partial width to be 1.5-2.9 keV [40, 41, 42, 43,
44, 45]. The result from the NRQCD effective field theory predicts the
branching fraction to be $(1.5\pm 1.0)$ keV [43], which is compatible with the
experimental value but with a quite large error. The predictions of most of
lattice QCD calculations, both quenched and full-QCD ones [20, 21, 22, 23, 24,
25], are around 2.4-2.9 keV, which have discrepancies from the PDG value, but
are in agreement with the KEDR experimental result
$\Gamma(J/\psi\to\gamma\eta_{c})=2.98\pm 0.18^{+0.15}_{-0.33}$ keV [46]. As
addressed before, since the radiative production rate of the pseudoscalar
glueball in the $J/\psi$ decays is two orders of magnitude smaller than that
of the pseudoscalar charmonium [25], and $\eta_{c}$ has a very small fraction
of the pseudoscalar glueball, the mixing cannot change the partial width of
$J/\psi\to\gamma\eta_{c}$. Hopefully, the contraversial situation on the decay
width of $J/\psi\to\gamma\eta_{c}$ can be resolved by the future study of the
BESIII collaboration using its large $J/\psi$ event sample.
## 5 Summary
We generate large gauge ensembles with $N_{f}=2$ degenerate charm quarks on
anisotropic lattices, such that the theoretical framework is unitary for charm
quarks. The annihilation diagrams of charm quark are tackled through the
distillation method. By calculating the correlation functions of the
pseudoscalar quark bilinear operators and the pseudoscalar glueball operator,
the mixing energy $x=49(6)$ MeV and the mixing angle $\theta=4.3(4)^{\circ}$
have been obtained for the first time through lattice QCD calculations.
The nonzero mixing energy and the mixing angle help to understand the
properties of the $\eta_{c}$ meson. If $X(2370)$ observed by BESIII can be
taken as predominantly a pseudoscalar glueball, then the $c\bar{c}$-glueball
mixing can result in a positive mass shift approximately $3.9(9)$ MeV of the
ground state pseudoscalar charmonium, which serves to understand the
discrepancy of lattice and the experimental results of the $1S$ hyperfine
splitting of charmonia. In the mean time, the mixing implies that the total
width of the pseudoscalar charmonium can be increased by 7.2(8) MeV, which can
explain to some extent the relatively large width of $\eta_{c}$ in comparison
with the theoretical expectations for a pure $c\bar{c}$ state. Furthermore,
the branching fraction of $\eta_{c}\to\gamma\gamma$ can be understood in this
$c\bar{c}$-glueball framework. It should be notified that, even though the
assumption that $X(2370)$ is predominantly a pseudoscalar glueball seems
compatible with the discussion in this work, its justification should be
clarified by future experimental and theoretical investigations. At last, the
seemingly discrepancy of the theoretical predictions and the experimental
results of the partial width of $J/\psi\to\gamma\eta_{c}$ cannot be alleviated
by the $c\bar{c}$-glueball mixing picture, which demands future sophisticated
experimental studies. The BESIII collaboration may take this mission by the
help of its largest $J/\psi$ event ensemble in the world.
## Acknowledgements
We thank Prof. Q. Zhao of IHEP for the inspiring discussions. This work is
supported by the Strategic Priority Research Program of Chinese Academy of
Sciences (No. XDB34030302), the National Key Research and Development Program
of China (No. 2020YFA0406400) and the National Natural Science Foundation of
China (NNSFC) under Grants No.11935017, No. 11575196, No.11775229,
No.12075253, No.12070131001 (CRC 110 by DFG and NNSFC), No.12175063. Y. Chen
also acknowledges the support of the CAS Center for Excellence in Particle
Physics (CCEPP). L.C. Gui is supported by Natural Science Foundation of Hunan
Province under Grants No.2020JJ5343, No.20A310. The Chroma software system
[47] and QUDA library [48, 49] are acknowledged. The computations were
performed on the CAS Xiandao-1 computing environment, the HPC clusters at
Institute of High Energy Physics (Beijing) and China Spallation Neutron Source
(Dongguan), and the GPU cluster at Hunan Normal University.
## References
* [1] P. Zyla, et al., Review of Particle Physics, PTEP 2020 (8) (2020) 083C01. doi:10.1093/ptep/ptaa104.
* [2] S. Okubo, Phi meson and unitary symmetry model, Phys. Lett. 5 (1963) 165–168. doi:10.1016/S0375-9601(63)92548-9.
* [3] J. Mandula, J. Weyers, G. Zweig, Patterns of exchange deceneracies, Ann. Rev. Nucl. Part. Sci. 20 (1970) 289–322. doi:10.1146/annurev.ns.20.120170.001445.
* [4] G. ’t Hooft, Symmetry Breaking Through Bell-Jackiw Anomalies, Phys. Rev. Lett. 37 (1976) 8–11. doi:10.1103/PhysRevLett.37.8.
* [5] H.-Y. Cheng, H.-n. Li, K.-F. Liu, Pseudoscalar glueball mass from eta - eta-prime - G mixing, Phys. Rev. D 79 (2009) 014024. arXiv:0811.2577, doi:10.1103/PhysRevD.79.014024.
* [6] S. He, M. Huang, Q.-S. Yan, The Pseudoscalar glueball in a chiral Lagrangian model with instanton effect, Phys. Rev. D 81 (2010) 014003. arXiv:0903.5032, doi:10.1103/PhysRevD.81.014003.
* [7] B. A. Li, Chiral field theory of 0-+ glueball, Phys. Rev. D 81 (2010) 114002. arXiv:0912.2323, doi:10.1103/PhysRevD.81.114002.
* [8] C. J. Morningstar, M. J. Peardon, Efficient glueball simulations on anisotropic lattices, Phys. Rev. D 56 (1997) 4043–4061. arXiv:hep-lat/9704011, doi:10.1103/PhysRevD.56.4043.
* [9] C. J. Morningstar, M. J. Peardon, The Glueball spectrum from an anisotropic lattice study, Phys. Rev. D 60 (1999) 034509. arXiv:hep-lat/9901004, doi:10.1103/PhysRevD.60.034509.
* [10] Y. Chen, et al., Glueball spectrum and matrix elements on anisotropic lattices, Phys. Rev. D 73 (2006) 014516. arXiv:hep-lat/0510074, doi:10.1103/PhysRevD.73.014516.
* [11] A. Chowdhury, A. Harindranath, J. Maiti, Correlation and localization properties of topological charge density and the pseudoscalar glueball mass in SU(3) lattice Yang-Mills theory, Phys. Rev. D 91 (7) (2015) 074507. arXiv:1409.6459, doi:10.1103/PhysRevD.91.074507.
* [12] C. M. Richards, A. C. Irving, E. B. Gregory, C. McNeile, Glueball mass measurements from improved staggered fermion simulations, Phys. Rev. D 82 (2010) 034501. arXiv:1005.2473, doi:10.1103/PhysRevD.82.034501.
* [13] E. Gregory, A. Irving, B. Lucini, C. McNeile, A. Rago, C. Richards, E. Rinaldi, Towards the glueball spectrum from unquenched lattice QCD, JHEP 10 (2012) 170\. arXiv:1208.1858, doi:10.1007/JHEP10(2012)170.
* [14] W. Sun, L.-C. Gui, Y. Chen, M. Gong, C. Liu, Y.-B. Liu, Z. Liu, J.-P. Ma, J.-B. Zhang, Glueball spectrum from $N_{f}=2$ lattice QCD study on anisotropic lattices, Chin. Phys. C 42 (9) (2018) 093103. arXiv:1702.08174, doi:10.1088/1674-1137/42/9/093103.
* [15] J.-J. Wu, X.-H. Liu, Q. Zhao, B.-S. Zou, The Puzzle of anomalously large isospin violations in $\eta(1405/1475)\to 3\pi$, Phys. Rev. Lett. 108 (2012) 081803\. arXiv:1108.3772, doi:10.1103/PhysRevLett.108.081803.
* [16] E. Ackleh, T. Barnes, Two photon widths of singlet positronium and quarkonium with arbitrary total angular momentum, Phys. Rev. D 45 (1992) 232–240. doi:10.1103/PhysRevD.45.232.
* [17] C. R. Munz, Two photon decays of mesons in a relativistic quark model, Nucl. Phys. A 609 (1996) 364–376. arXiv:hep-ph/9601206, doi:10.1016/S0375-9474(96)00265-5.
* [18] S. N. Gupta, J. M. Johnson, W. W. Repko, Relativistic two photon and two gluon decay rates of heavy quarkonia, Phys. Rev. D 54 (1996) 2075–2080. arXiv:hep-ph/9606349, doi:10.1103/PhysRevD.54.2075.
* [19] H.-W. Huang, K.-T. Chao, The Cancellation of infrared divergence in the hadronic annihilation decay of heavy quarkonium, Phys. Rev. D 55 (1997) 244–248. arXiv:hep-ph/9605362, doi:10.1103/PhysRevD.55.244.
* [20] J. J. Dudek, R. G. Edwards, D. G. Richards, Radiative transitions in charmonium from lattice QCD, Phys. Rev. D 73 (2006) 074507. arXiv:hep-ph/0601137, doi:10.1103/PhysRevD.73.074507.
* [21] J. J. Dudek, R. Edwards, C. E. Thomas, Exotic and excited-state radiative transitions in charmonium from lattice QCD, Phys. Rev. D 79 (2009) 094504. arXiv:0902.2241, doi:10.1103/PhysRevD.79.094504.
* [22] Y. Chen, et al., Radiative transitions in charmonium from $N_{f}=2$ twisted mass lattice QCD, Phys. Rev. D 84 (2011) 034503. arXiv:1104.2655, doi:10.1103/PhysRevD.84.034503.
* [23] D. Becirevic, F. Sanfilippo, Lattice QCD study of the radiative decays $J/\psi\to\eta_{c}\gamma$ and $h_{c}\to\eta_{c}\gamma$, JHEP 01 (2013) 028. arXiv:1206.1445, doi:10.1007/JHEP01(2013)028.
* [24] G. C. Donald, C. T. H. Davies, R. J. Dowdall, E. Follana, K. Hornbostel, J. Koponen, G. P. Lepage, C. McNeile, Precision tests of the $J/{\psi}$ from full lattice QCD: mass, leptonic width and radiative decay rate to ${\eta}_{c}$, Phys. Rev. D 86 (2012) 094501. arXiv:1208.2855, doi:10.1103/PhysRevD.86.094501.
* [25] L.-C. Gui, J.-M. Dong, Y. Chen, Y.-B. Yang, Study of the pseudoscalar glueball in $J/\psi$ radiative decays, Phys. Rev. D 100 (5) (2019) 054511. arXiv:1906.03666, doi:10.1103/PhysRevD.100.054511.
* [26] Y.-D. Tsai, H.-n. Li, Q. Zhao, $\eta_{c}$ mixing effects on charmonium and $B$ meson decays, Phys. Rev. D 85 (2012) 034002. arXiv:1110.6235, doi:10.1103/PhysRevD.85.034002.
* [27] W. Qin, Q. Zhao, X.-H. Zhong, Revisiting the pseudoscalar meson and glueball mixing and key issues in the search for a pseudoscalar glueball state, Phys. Rev. D 97 (9) (2018) 096002. arXiv:1712.02550, doi:10.1103/PhysRevD.97.096002.
* [28] W. I. Eshraim, C. S. Fischer, Hadronic decays of the (pseudo-)scalar charmonium states $\eta_{c}$ and $\chi_{c0}$ in the extended Linear Sigma Model, Eur. Phys. J. A 54 (8) (2018) 139. arXiv:1802.05855, doi:10.1140/epja/i2018-12569-3.
* [29] T. Chen, et al., Two-photon decays of $\eta_{c}$ from lattice QCD, Eur. Phys. J. C 76 (7) (2016) 358. arXiv:1602.00076, doi:10.1140/epjc/s10052-016-4212-8.
* [30] W.-J. Lee, D. Weingarten, Scalar quarkonium masses and mixing with the lightest scalar glueball, Phys. Rev. D 61 (2000) 014015. arXiv:hep-lat/9910008, doi:10.1103/PhysRevD.61.014015.
* [31] C. McNeile, C. Michael, Mixing of scalar glueballs and flavor singlet scalar mesons, Phys. Rev. D 63 (2001) 114503. arXiv:hep-lat/0010019, doi:10.1103/PhysRevD.63.114503.
* [32] M. Peardon, J. Bulava, J. Foley, C. Morningstar, J. Dudek, R. G. Edwards, B. Joo, H.-W. Lin, D. G. Richards, K. J. Juge, A Novel quark-field creation operator construction for hadronic physics in lattice QCD, Phys. Rev. D 80 (2009) 054506. arXiv:0905.2160, doi:10.1103/PhysRevD.80.054506.
* [33] R. Zhang, W. Sun, F. Chen, Y. Chen, M. Gong, X. Jiang, Z. Liu, Annihilation diagram contribution to charmonium masses, Chin. Phys. C 46 (4) (2022) 043102\. arXiv:2110.01755, doi:10.1088/1674-1137/ac3d8c.
* [34] M. Ablikim, et al., Confirmation of the $X(1835)$ and observation of the resonances $X(2120)$ and $X(2370)$ in $J/\psi\to\gamma\pi^{+}\pi^{-}\eta^{\prime}$, Phys. Rev. Lett. 106 (2011) 072002. arXiv:1012.3510, doi:10.1103/PhysRevLett.106.072002.
* [35] M. Ablikim, et al., Observation of $X(2370)$ and search for X(2120) in $J/\psi\rightarrow\gamma K{\bar{K}}\eta^{\prime}$, Eur. Phys. J. C 80 (8) (2020) 746. arXiv:1912.11253, doi:10.1140/epjc/s10052-020-8078-4.
* [36] D. Hatton, C. T. H. Davies, B. Galloway, J. Koponen, G. P. Lepage, A. T. Lytle, Charmonium properties from lattice $QCD$+QED : Hyperfine splitting, $J/\psi$ leptonic width, charm quark mass, and $a^{c}_{\mu}$, Phys. Rev. D 102 (5) (2020) 054511\. arXiv:2005.01845, doi:10.1103/PhysRevD.102.054511.
* [37] L. Levkova, C. DeTar, Charm annihilation effects on the hyperfine splitting in charmonium, Phys. Rev. D 83 (2011) 074504. arXiv:1012.1837, doi:10.1103/PhysRevD.83.074504.
* [38] W. Kwong, P. B. Mackenzie, R. Rosenfeld, J. L. Rosner, Quarkonium Annihilation Rates, Phys. Rev. D 37 (1988) 3210. doi:10.1103/PhysRevD.37.3210.
* [39] N. Brambilla, H. S. Chung, J. Komijani, Inclusive decays of $\eta_{c}$ and $\eta_{b}$ at NNLO with large $n_{f}$ resummation, Phys. Rev. D 98 (11) (2018) 114020\. arXiv:1810.02586, doi:10.1103/PhysRevD.98.114020.
* [40] A. Y. Khodjamirian, On the Calculation of $J/\psi\to\eta_{c}\gamma$ Width in QCD, Sov. J. Nucl. Phys. 39 (1984) 614.
* [41] S. Godfrey, N. Isgur, Mesons in a Relativized Quark Model with Chromodynamics, Phys. Rev. D 32 (1985) 189–231. doi:10.1103/PhysRevD.32.189.
* [42] T. Barnes, S. Godfrey, E. S. Swanson, Higher charmonia, Phys. Rev. D 72 (2005) 054026. arXiv:hep-ph/0505002, doi:10.1103/PhysRevD.72.054026.
* [43] N. Brambilla, Y. Jia, A. Vairo, Model-independent study of magnetic dipole transitions in quarkonium, Phys. Rev. D 73 (2006) 054005. arXiv:hep-ph/0512369, doi:10.1103/PhysRevD.73.054005.
* [44] N. Brambilla, P. Roig, A. Vairo, Precise determination of the $\eta_{c}$ mass and width in the radiative $J/\Psi\to\eta_{c}\gamma$ decay, AIP Conf. Proc. 1343 (2011) 418–420. arXiv:1012.0773, doi:10.1063/1.3575048.
* [45] A. Pineda, J. Segovia, Improved determination of heavy quarkonium magnetic dipole transitions in potential nonrelativistic QCD, Phys. Rev. D 87 (7) (2013) 074024. arXiv:1302.3528, doi:10.1103/PhysRevD.87.074024.
* [46] V. V. Anashin, et al., Measurement of $J/\psi\to\gamma\eta_{\rm c}$ decay rate and $\eta_{\rm c}$ parameters at KEDR, Phys. Lett. B 738 (2014) 391–396. arXiv:1406.7644, doi:10.1016/j.physletb.2014.09.064.
* [47] R. G. Edwards, B. Joo, The Chroma software system for lattice QCD, Nucl. Phys. B Proc. Suppl. 140 (2005) 832. arXiv:hep-lat/0409003, doi:10.1016/j.nuclphysbps.2004.11.254.
* [48] M. A. Clark, R. Babich, K. Barros, R. C. Brower, C. Rebbi, Solving Lattice QCD systems of equations using mixed precision solvers on GPUs, Comput. Phys. Commun. 181 (2010) 1517–1528. arXiv:0911.3191, doi:10.1016/j.cpc.2010.05.002.
* [49] R. Babich, M. A. Clark, B. Joo, G. Shi, R. C. Brower, S. Gottlieb, Scaling Lattice QCD beyond 100 GPUs, in: SC11 International Conference for High Performance Computing, Networking, Storage and Analysis, 2011. arXiv:1109.2935, doi:10.1145/2063384.2063478.
## Appendix
## Appendix A Glueball operator construction
Based on the four prototypes of Wilson loops shown in Fig. 3, we build
$A_{1}^{-+}$ operators for the pseudoscalar glueball operators with $A_{1}$
being an irreducible representation of spatial symmetry group, namely, the
octahedral group $O$. We adopt six different schemes to smear gauge links,
which are different combinations of single-sink smearing and double link
smearing [9, 10]. Let $W_{\alpha}(\mathbf{x},t)$ be one prototype of Wilson
loop under a specific smearing scheme, then the $A_{1}^{-+}$ operator in the
rest frame of a glueball can be obtained by
$\phi_{\alpha}(t)=\sum\limits_{\mathbf{x}}\sum\limits_{R\in
O}c_{R}^{A_{1}}\left[R\circ W_{\alpha}(\mathbf{x},t)-\mathcal{P}R\circ
W_{\alpha}(\mathbf{x},t)\mathcal{P}^{-1}\right]$ (28)
where $R\circ W_{\alpha}$ refers to a differently oriented Wilson loops after
one of the 24 elements of $O$ ($R$) operated on $W_{\alpha}$, $\mathcal{P}$ is
spatial reflection operation and $C_{R}^{A_{1}}$ are the combinational
coefficients for the $A_{1}$ representation. Thus we obtain a $A_{1}^{-+}$
operator set $\\{\phi_{\alpha}(t),\alpha=1,2,\ldots,24\\}$ based on the four
prototypes and six smearing schemes. We then use the well established
variational method to get an optimized operator $O_{G}$ that couples most to
the ground state glueball by solving the generalized eigenvalue problem.
## Appendix B Large $t$ behaviour of $C_{GG}(t)$ and $C_{CC}(t)$
The spectrum of $C_{GG}(t)$ and $C_{CC}(t)$ should be the same, as reflected
by Eq. (3.1). It is expected $C_{GG}(t)$ and $C_{CC}(t)$ are dominated by the
contribution from the lowest state $|g_{1}\rangle$ at very large $t$ (when
$T\to\infty$) such that their effective masses $m^{\mathrm{eff}}_{GG}(t)$ and
$m^{\mathrm{eff}}_{CC}(t)$ should merge into $m_{g_{1}}a_{t}$ at very large
$t$. The left panel of Fig. 4 shows $m^{\mathrm{eff}}_{GG}(t)$ and
$m^{\mathrm{eff}}_{CC}(t)$ for the $\Gamma=\gamma_{5}$ case on ensemble II. We
do not observed a clear tendency that they will merge together at
$m_{g_{1}}a_{t}$ in the available time range. This implies that
$\sin^{2}\theta_{1}$ should be very small, as confirmed by the fitted result
$\sin^{2}\theta_{1}\sim 0.006$.
On the other hand, the error of $m^{\mathrm{eff}}_{CC}(t)$ is quite small when
$t/a_{t}<20$ but grows rapidly beyond $t/a_{t}>25$. Actually, the error of
$C_{CC}(t)$ comes mainly from the error of the disconnected diagram
contribution. Since the disconnected part falls off more slowly than the
connected part, the contribution and the error of the former become more
pronounced when $t$ increases. In the right panel of Fig. 4, we compare
$m^{\mathrm{eff}}_{CC}(t)$ with the effective mass $m^{\mathrm{eff}}_{C}(t)$
of the connected part for the $\Gamma=\gamma_{5}$ case on ensemble II. It is
seen that $m^{\mathrm{eff}}_{CC}(t)$ deviates from $m^{\mathrm{eff}}_{C}(t)$
gradually beyond $t/a_{t}\sim 15$ where the mixing effect begins to show up.
Figure 3: Wilson loop prototypes used to construct the pseudoscalar glueball
operator [9, 10].
Figure 4: (left): Effective mass from two point functions $C_{CC}(t)$,
$C_{GG}(t)$ for operator with $\Gamma=\gamma_{5}$ on ensemble II shown in same
plot for comparison. (right): Effective mass $m^{\mathrm{eff}}_{C}(t)$ from
connected part of $O_{\Gamma}$’s correlation function $C(t)$ and
$m^{\mathrm{eff}}_{CC}(t)$ from full correlation function $C(t)+2D(t)$
including disconnected diagram with $\Gamma=\gamma_{5}$ on ensemble II.
| arxiv-papers | 2021-07-27T11:44:44 | 2024-09-04T03:07:21.366212 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Renqiang Zhang, Wei Sun, Ying Chen, Ming Gong, Long-Cheng Gui,\n Zhaofeng Liu",
"submitter": "Renqiang Zhang",
"url": "https://arxiv.org/abs/2107.12749"
} |
2107.12758 | # Fixed point behavior of cumulants in the three-dimensional Ising
universality class
Xue Pan [email protected] School of Electronic Engineering, Chengdu
Technological University, Chengdu 611730, China
###### Abstract
High-order cumulants and factorial cumulants of conserved charges are
suggested to study the critical dynamics in heavy-ion collision experiments.
In this paper, using the parametric representation of the three-dimensional
Ising model which is believed to belong to the same universality class with
the Quantum chromo-dynamics, temperature dependence of the second- to fourth-
order (factorial) cumulants of the order parameter is studied. It is found
that the values of the normalized cumulants are independent of the external
magnetic field at the critical temperature, which results in a fixed point in
the temperature dependence of the normalized cumulants. In finite-size systems
simulated by Monte Carlo method, the fixed point behavior still exists at the
temperature near the critical one. The fixed point behavior is also appeared
in the temperature dependence of normalized factorial cumulants at least from
the fourth-order one. With a mapping from the Ising model to QCD, the fixed
point behavior is also found in the energy dependence of the normalized
cumulants (or fourth-order factorial cumulants) along different freeze-out
curves.
###### pacs:
25.75.Gz, 25.75.Nq
## I Introduction
One of the main goals of current relativistic heavy-ion collision experiments
is to make clear the phase diagram of quantum chromo-dynamics (QCD) main goal
. At vanishing baryon chemical potential, the transition from hadronic matter
to quark-gluon plasma has been proved to be a crossover by lattice QCD fodor-
nature . Due to the fermion sign problem, lattice QCD can not calculate the
cases at large baryon chemical potential. Some effective theories predict that
the QCD system undergoes a first order phase transition at high baryon density
and low temperature first-PRD ; first-NPB ; first-PRL ; first-NPB1 ; first-
LQCD ; first-PRC . From first order phase transition to crossover, there is a
critical point, which is a unique feature of the QCD phase diagram. Large
fluctuations and correlations of conserved charges are expected at the
critical point.
The high-order cumulants of conserved charges, reflecting their fluctuations,
are suggested to search for the critical point stephanov-prl91 ; koch ;
Stephanov-prl102 ; Karsch-EPJC71 . Results from effective theories of QCD
suggest that the non-monotonic behavior of the high-order cumulants are
related to the critical point Asakawa-prl103 ; Fuweijie ; Vladi . Especially,
sign change of the fourth-order cumulant of net-proton is used to search for
the critical point in experiments Stephanov-prl107 ; Phys. Rev. Lett.
112.032302 . While in Ref. Chin. Phys. C.43.033103 ; Chin. Phys. C.45.104103 ,
the authors argued that the sign change is not sufficient to prove the
presence of the critical point. Other work pointed out that the peak structure
remains a solid feature and can be used as a clean signature of the critical
point Eur. Phys. J. C.79.245 ; PhysRevC103034901 .
Recently, the factorial cumulants, which are also known as the integrated
multi-particle correlations, get a lot of attention Phys. Lett. B.728.386-392
; Nuclear Physics A.942.65-96 ; Phys. Rev. C.93.034915 ; Phys. Rev.
C.95.064912 ; Phys. Rev. C.95.054906 ; Phys. Lett. B.774.623-629 ; Phys. Rev.
C.96.024910 ; Eur. Phys. J. C.77.288 ; Phys. Rev. C.100.051902 . Multi-proton
correlations have been found in the STAR data, at least at the lower energies
Phys. Rev. C.95.054906 ; Phys. Rev. C.98.054901 ; Eur. Phys. J. C.77.288 . It
has been shown that the signs of the second- to fourth-order factorial
cumulants are a useful tool to exclude regions in the QCD phase diagram close
to the critical point using parametric representation of the Ising model Phys.
Rev. C.95.054906 . The causes of sign change of factorial cumulants far away
from the critical point compared with the cumulants have been analyzed in our
recent work panx . In the vicinity of the critical point, the sign and
temperature dependence of factorial cumulants is almost the same with that of
the cumulants. It has also argued in Ref. Phys. Rev. C.93.034915 that the
cumulants and factorial cumulants can not be distinguished in the vicinity of
the critical point in a model of critical fluctuations.
Except non-monotonic behavior or sign change of the cumulants and factorial
cumulants, the other behavior of the high-order cumulant is also suggested
searching for the critical point, such as the finite-size scaling Phys. Rev.
D.97.034015 ; Journal of Physics G: Nuclear and Particle Physics.42.015104 .
The finite-size scaling implies a fixed point. Usually, the fixed point is
obtained from the scale transformation of the re-normalization group,
resulting in the independence of rescaled thermodynamics on the system sizes
at the critical point fixed point 1 ; fixed point 2 ; fixed point 3 . This
feature has also been used to search for the critical point fixed point 4 ;
Phys.Rev.E.100.052146 ; chenlz .
The QCD critical point, if exists, is expected to belong to the same
universality class of the three-dimensional Ising model class 1 ; class 2 ;
class 3 ; class 4 . Critical behavior of the corresponding thermodynamics in
different systems that belongs to the same universality class is the same
which is supervised by the same critical exponents. Recently, many works have
been made to map the results of the three-dimensional Ising model to that of
the QCD PhysRevD102014505 ; PhysRevC103034901 . Usually, a linear ansatz
between the QCD variables, temperature and net-baryon chemical potential, and
the Ising variables, temperature and external magnetic field is suggested
linearmap1 ; linearmap2 ; linearmap3 ; NPA . Cumulants of net-baryon number,
which are the derivatives of the QCD free energy density with respect to net-
baryon chemical potential, can be regarded as the combination of the
derivatives with respect to temperature and magnetic field in the three-
dimensional Ising model in the vicinity of the critical point. Since the
critical exponent of external magnetic field is larger than that of the
temperature Ising exponents1 , the critical behavior of net-baryon number
fluctuations is expected to be mainly controlled by the derivatives with
respect to the external magnetic field, i.e., the fluctuations of the order
parameter in the three-dimensional Ising model.
In this paper, using parametric representation and Monte Carlo simulations of
the three-dimensional Ising model, we study and discuss the other kind of
fixed point behavior in the temperature dependence of the normalized cumulants
and factorial cumulants. Assuming the system formed in the heavy-ion collision
experiments is in equilibrium, with a mapping from the Ising model to QCD, the
fixed point behavior is also studied and discussed in the energy dependence of
the normalized cumulants and factorial cumulants along different freeze-out
curves, which may be helpful to locate the QCD critical point.
The paper is organized as follows. In section 2, the three-dimensional Ising
model and its parametric representation are introduced. Parametric expressions
of second- to fourth-order cumulants and factorial cumulants of the order
parameter are derived. At the critical temperature, the independence on the
external magnetic fields of the normalized cumulants has been deduced. In
section 3, temperature dependence of second- to fourth-order cumulants and
factorial cumulants at different distances to the phase boundary and fixed
point behavior of the corresponding normalized ones are studied and discussed
in the parametric representation. In section 4, the fixed point behavior of
normalized second- to fourth-order cumulants and factorial cumulants is
discussed in finite-size systems simulated by the Monte Carlo method. In
section 5, a mapping from the Ising model to QCD is introduced. The fixed
point behavior in the energy dependence of the normalized (factorial)
cumulants is studied and discussed. Finally, conclusions and summary are given
in section 6.
## II The second- to fourth-order cumulants and factorial cumulants
The three-dimensional Ising model is defined as follows,
$\displaystyle\qquad\mathcal{H}=-J\sum_{\langle
i,j\rangle}{s}_{i}{s}_{j}-H\sum_{i}{s}_{i},$ (1)
where $\mathcal{H}$ is the Hamiltonian, $s_{i}$ is spin at site $i$ on a
simple cubic lattice which can take only two values $\pm 1$. $J$ is the
interaction energy between nearest-neighbor spins $\langle i,j\rangle$. $H$
represents the external magnetic field. The magnetization $M$ (the order
parameter) is
$\displaystyle\qquad
M=\frac{1}{V}{\langle\sum_{i}{s_{i}}\rangle}=\frac{\langle s\rangle}{V},$ (2)
$s=\sum_{i}{s_{i}}$ and $V=L^{d}$ denotes the total spin and volume of the
lattice, respectively, where $d=3$ is the dimension of the lattice and $L$ is
the number of lattice points of each direction on the cubic lattice. The
magnetization is dependent on the external magnetic field $H$ and the reduced
temperature $t=(T-T_{c})/{T_{c}}$, where $T_{c}$ is the critical temperature.
At $t>0$, it is the crossover side. At $t<0$, it is the first order phase
transition side.
High-order cumulants of the order parameter can be got from the derivatives of
magnetization with respect to $H$ at fixed $t$,
$\displaystyle\qquad\left.\kappa_{n}(t,H)=(\frac{\partial^{n-1}M}{\partial
H^{n-1}})\right|_{t}.$ (3)
In particular, the second- to fourth-order cumulants are as follows,
$\displaystyle\qquad\kappa_{2}=\frac{1}{V}{\langle(\delta s)^{2}\rangle},$
$\displaystyle\qquad\kappa_{3}=\frac{1}{V}{\langle(\delta s)^{3}\rangle},$
$\displaystyle\qquad\kappa_{4}=\frac{1}{V}(\langle(\delta
s)^{4}\rangle-3\langle(\delta s)^{2}\rangle^{2}),$ (4)
where $\delta s=s-\langle s\rangle$.
Turn to the parametric representation of the three-dimensional Ising model,
magnetization $M$ and reduced temperature $t$ can be parameterized by two
variables $R$ and $\theta$ linear para ; linear para 3 ,
$\displaystyle\qquad M=m_{0}R^{\beta}\theta,\leavevmode\nobreak\
\leavevmode\nobreak\ \leavevmode\nobreak\ \leavevmode\nobreak\
\leavevmode\nobreak\ \leavevmode\nobreak\ t=R(1-\theta^{2}).$ (5)
The equation of state of the Ising model can be given by the parametric
representation in terms of $R$ and $\theta$ as
$\displaystyle\qquad H=h_{0}R^{\beta\delta}h(\theta).$ (6)
Where $m_{0}$ in Eq. (5) and $h_{0}$ in Eq. (6) are normalization constants.
They are fixed by imposing the normalization conditions $M(t=-1,H=+0)=1$ and
$M(t=0,H=1)=1$. $\beta$ and $\delta$ are critical exponents of the three-
dimensional Ising universality class with values 0.3267(10) and 4.786(14),
respectively Ising exponents .
If $M$, $t$ and $h$ are analytic function of $\theta$, the analytic properties
of the equation of state are satisfied linear para 1 . The analytic expression
of the high-order cumulants can be derived in the parametric representation.
What is more, the function $h(\theta)$ is an odd function of $\theta$ because
the magnetization is an odd function of the external magnetic field
$M(-H)=-M(H)$.
One simple function of $h(\theta)$ obeying all the demands is as follows,
$\displaystyle\qquad h(\theta)=\theta(3-2\theta^{2}).$ (7)
This is a mean-field approximation of representation for the equation of state
of the three-dimensional Ising model to order $\varepsilon^{2}$, where
$\varepsilon$ is a parameter related to the number of dimensions of space.
$\varepsilon$-expansion is one of the techniques to explore the critical
phenomena. It is enough for our purpose although the parametric representation
is also known up to order $\varepsilon^{3}$ linear para 3 . On the other hand,
there is an excellent agreement of the scaling magnetization data from Monte
Carlo simulation and the equation of state in the parametric representation J.
Engels .
When taking the approximate values of the critical exponents $\beta=1/3$ and
$\delta=5$ (it is enough for our purpose), the first fourth-order cumulants in
the parametric representation are as follows:
$\begin{split}&\kappa_{1}(t,H)=m_{0}R^{1/3}\theta,\\\
&\kappa_{2}(t,H)=\frac{m_{0}}{h_{0}}\frac{1}{R^{4/3}(2\theta^{2}+3)},\\\
&\kappa_{3}(t,H)=\frac{m_{0}}{h_{0}^{2}}\frac{4\theta(\theta^{2}+9)}{R^{3}(\theta^{2}-3)(2\theta^{2}+3)^{3}},\\\
&\kappa_{4}(t,H)=12\frac{m_{0}}{h_{0}^{3}}\frac{(2\theta^{8}-5\theta^{6}+105\theta^{4}-783\theta^{2}+81)}{R^{14/3}(\theta^{2}-3)^{3}(2\theta^{2}+3)^{5}}.\\\
\end{split}$ (8)
The reduced temperature $t$ and external magnetic field $H$, are functions of
$R$ and $\theta$ provided by Eq. (5) and Eq. (6). At fixed $H$, $R$ can be
represented in terms of $\theta$ by Eq. (6). As a consequence, cumulants in
Eq. (8) just depends on $\theta$, so is the reduced temperature $t$ in Eq.(5).
There are three kinds of special values of $\theta$, they are
$\theta=\theta_{n}^{max}$ for the peak of $\kappa_{n}$ if the peak exists,
$\theta=\theta_{n}^{min}$ for the valley of $\kappa_{n}$ if the valley exists,
$\theta=1$ for the reduced temperature $t=0$ (the critical temperature) at a
positive magnetic field (or $\theta=-1$ for $t=0$ at a negative magnetic
field), respectively.
The first two cases imply the ratios (the factor of $H$ is offset in the
ratios) of the peak hight to the valley depth for $\kappa_{4}$, $\kappa_{5}$
and $\kappa_{6}$ are universal and independent of $H$. They are approximately
$-28$, $-0.1$, and $-6$ for $H>0$, respectively Stephanov-prl107 ; panx .
At a positive magnetic field, temperature dependence of even-order cumulants
shows a positive peak in the vicinity of the critical temperature, while it is
a negative valley for the odd-order cumulants panx . Normalizing the even-
order cumulants by their peak hight $\kappa_{2n}^{max},n=1,2,3...$, and the
odd-order cumulants by the absolute value of the valley depth
$|\kappa_{2n+1}^{min}|,n=1,2,3...$, then from the last case, one can get a
fixed point behavior of temperature dependence of normalized cumulants
$\kappa_{n}^{Norm}$ for different values of $H$ at $t=0$.
Figure 1: (Color online). Temperature dependence of $\kappa_{2}$ (a),
$\kappa_{3}$ (b), $\kappa_{4}$ (c), $C_{2}$ (d), $C_{3}$ (e) and $C_{4}$ (f)
at three different values of external magnetic fields, $H=0.05$, $0.1$ and
$0.2$, in the parametric representation of the three-dimensional Ising model.
The green dashed line shows the critical temperature.
Especially, one can get the second- to fourth-order normalized cumulants,
$\begin{split}&\kappa_{2}^{Norm}=\kappa_{2}/\kappa_{2}^{max},\\\
&\kappa_{3}^{Norm}=\kappa_{3}/|\kappa_{3}^{min}|,\\\
&\kappa_{4}^{Norm}=\kappa_{4}/\kappa_{4}^{max}.\\\ \end{split}$ (9)
At any positive magnetic field, values of second- to fourth-order normalized
cumulants at $t=0$ are as follows,
$\begin{split}&\kappa_{2}^{Norm}(t=0)=\frac{\kappa_{2}(\theta=1)}{\kappa_{2}(\theta=\theta_{2}^{max})}\approx
0.58,\\\
&\kappa_{3}^{Norm}(t=0)=\frac{\kappa_{3}(\theta=1)}{|\kappa_{3}(\theta=\theta_{3}^{min})|}\approx-0.51,\\\
&\kappa_{4}^{Norm}(t=0)=\frac{\kappa_{4}(\theta=1)}{\kappa_{4}(\theta=\theta_{4}^{max})}\approx
0.49.\\\ \end{split}$ (10)
In fact, cumulants can be normalized by their values at any $\theta$ to get
the fixed point behavior at the critical temperature, but among those the most
convenient choice would be normalization by the extreme values which can be
identified easily from measured data.
The second- to fourth-order factorial cumulants can be expressed by the
cumulants as follows Phys. Rev. C.96.024910 ,
$\begin{split}&C_{2}=\kappa_{2}-\kappa_{1},\\\
&C_{3}=\kappa_{3}-3\kappa_{2}+2\kappa_{1},\\\
&C_{4}=\kappa_{4}-6\kappa_{3}+11\kappa_{2}-6\kappa_{1}.\\\ \end{split}$ (11)
They can also be normalized by their maximum or the absolute values of their
minimum as follows,
$\begin{split}&C_{2}^{Norm}=C_{2}/C_{2}^{max},\\\
&C_{3}^{Norm}=C_{3}/|C_{3}^{min}|,\\\ &C_{4}^{Norm}=C_{4}/C_{4}^{max}.\\\
\end{split}$ (12)
Because the factorial cumulants mix different orders of cumulants as showed in
Eq. (11), far away from the critical point, the behavior of factorial
cumulants is very different from the same order cumulants panx . It also
appears to be that there may be no fixed point behavior in the temperature
dependence of the factorial cumulants at the critical temperature for
different external magnetic fields. But one should keep in mind that in the
vicinity of the critical point, cumulants and the same order factorial
cumulants can not be distinguished. The higher the order of the factorial
cumulant, the more dominant role of the same order cumulant in its critical
behavior.
## III Fixed point behavior of normalized cumulants and factorial cumulants
in the parametric representation
As the increase of value of $H$, it is far away from the phase boundary. At
three different magnetic fields $H=0.05,0.1,0.2$, the temperature dependence
of second- to fourth-order cumulants and factorial cumulants are studied in
the parametric representation of the three-dimensional Ising model, as showed
in Fig. 1(a) to 1(f). The vertical green dashed line shows the critical
temperature.
It is clear that, as the decreasing value of $H$, the qualitative temperature
dependence of $\kappa_{2}$ does not change, all showing a peak structure in
the vicinity of the critical temperature. But the peak becomes higher, sharper
and closer to the critical temperature as showed in Fig. 1(a). The similar
situation occurs for $\kappa_{3}$ in Fig. 1(b) and $\kappa_{4}$ in Fig. 1(c).
The smaller value of $H$, the closer to the phase boundary, the more singular
of the behavior of cumulants.
In the vicinity of the critical temperature, trends of temperature dependence
of factorial cumulants are similar with the same order cumulants as showed in
Fig. 1(d) to 1(f). When it is far away from the critical temperature, the sign
of factorial cumulants is possible to change, this is consistent with the
results in Ref. panx .
The normalized cumulants and factorial cumulants are showed in Fig. 2. The
vertical green dashed line shows the critical temperature, while the
horizontal green dashed line shows the value of normalized cumulants at the
critical temperature which inferred from Eq. (10).
Figure 2: (Color online). Temperature dependence of $\kappa_{2}^{Norm}$ (a),
$\kappa_{3}^{Norm}$ (b), $\kappa_{4}^{Norm}$ (c), $C_{2}^{Norm}$ (d),
$C_{3}^{Norm}$ (e) and $C_{4}^{Norm}$ (f) at three different values of
external magnetic fields, $H=0.05$, $0.1$ and $0.2$, in the parametric
representation of the three-dimensional Ising model. The cross point of green
dashed lines is the fixed point.
It is clear that for $\kappa_{2}^{Norm}$, $\kappa_{3}^{Norm}$ and
$\kappa_{4}^{Norm}$ showed in Fig. 2(a) to 2(c), a common feature occurs. That
is the fixed point behavior at the critical temperature. At different values
of $H$, values of the $\kappa_{2}^{Norm}$ are the same at the critical
temperature. It is independent of the distance to the phase boundary. So are
the values of $\kappa_{3}^{Norm}$ and $\kappa_{4}^{Norm}$. The fixed point is
just at the cross point of the two dashed green lines. That is to say the
values of the normalized cumulants at $t$ are consistent with Eq. (10).
As shown in Fig. 2(c), the valley depths for $\kappa_{4}^{Norm}$ at
$H=0.05,0.1,0.2$ are almost the same Stephanov-prl107 . One can easily
conclude that the ratios of the peak hight to the valley depth are independent
of $H$. For the fourth-order cumulant, in some cases, if the peak can not be
decided, one can normalize it by its valley depth. The fixed point behavior
also exists.
All in all, the ratios of the value of even-order cumulants (odd-order
cumulants) at critical temperature to its peak value (valley depth) is
independent on the external magnetic fields. This results in a fixed point
behavior in the temperature dependence of normalized cumulants, which may be
helpful to search for the critical temperature.
Turn to the normalized factorial cumulants showed in Fig. 2(d) to 2(f), it is
clear that far away from the critical temperature, each order of factorial
cumulant has sign changes as the increasing $H$. That is to say far away from
the phase boundary, there exists sign difference between cumulants and the
same order factorial cumulants.
Let us pay attention to the fixed point behavior of the normalized factorial
cumulants, there is no fixed point behavior in temperature dependence of
$C_{2}^{Norm}$ as showed in Fig. 2(d), which is in line with the inference
from relation of factorial cumulants with cumulants in Eq. (11).
For $C_{3}^{Norm}$ in Fig. 2(e), the fixed point behavior is not so obvious.
But the fixed point occurs again in $C_{4}^{Norm}$ as showed in Fig. 2(f). The
position of the fixed point is just at the cross point of the two green dashed
line, consistent with $\kappa_{4}^{Norm}$. In fact, the higher the order of
the cumulants, the more sensitive of the cumulants to the correlation length,
the more dominant role of the cumulants in the critical behavior of the same
order factorial cumulants. So fixed point behavior occurring in $C_{4}^{Norm}$
again is not hard to understand.
## IV Fixed point behavior of normalized cumulants and factorial cumulants by
Monte Carlo simulations
Figure 3: (Color online). Temperature dependence of $\kappa_{2}^{Norm}$ (a),
$\kappa_{3}^{Norm}$ (b) and $\kappa_{4}^{Norm}$ (c), $C_{2}^{Norm}$ (d),
$C_{3}^{Norm}$ (e) and $C_{4}^{Norm}$ (f) at three different values of
external magnetic fields, $H=0.05$, $0.07$ and $0.1$, in the three-dimensional
Ising model simulated by Monte Carlo method. The cross point of green dashed
lines is the fixed point for the upper panel. The positions of the green
dashed lines in the lower panel are keep consistent with that in the upper
panel.
By Monte Carlo simulation method, the fixed point behavior is tested in
finite-size systems at three different values of external magnetic fields.
Because of the finite-size effects, the temperature dependence curves of the
cumulants will shift to the higher temperature side until the system size is
bigger enough and sufficiently converge to the thermodynamic limit. The
typical size is determined by the saturation of size dependence of an
observable at a given magnetic field systemsize . For cumulants up to the
fourth-order at three different magnetic fields $H=0.05$, $0.07$, and $0.1$,
lattice sizes $L=14$, $12$ and $10$ is sufficient to converge to the
thermodynamic limit, respectively. For each value of $H$, the simulations are
performed at $5$ values of inverse temperature $J/T=0.202$, $0.212$, $0.222$,
$0.232$ and $0.242$ near the critical temperature $T_{c}/J\approx 4.51$, where
the value of interaction energy $J$ is set to $1$. The Wolff cluster algorithm
is used with the helical boundary conditions Wolff . At each pair of
$(H,J/T)$, $48$ million independent configurations are generated and used in a
Ferrenberg-Swendsen reweighting analysis to calculate observables at
intermediate temperature values FS .
Results of the second- to fourth- order normalized cumulants and factorial
cumulants are shown in Fig. 3(a) to 3(f), respectively. It is clear that the
fixed point behavior in temperature dependence of $\kappa_{2}^{Norm}$,
$\kappa_{3}^{Norm}$ and $\kappa_{4}^{Norm}$ still exists as shown in Fig. 3(a)
to Fig. 3(c). The cross point of the two green dashed line shows the position
of the fixed point. The corresponding temperature is about one percent lower
than the critical one. What is more, the higher the order of the cumulants,
the closer of the fixed point to the critical temperature. In addition, the
values of the normalized cumulants at fixed points are different from those in
the parametric representation. This can be caused by the finite-size system,
the choice of function $h(\theta)$ and the different quantitative temperature
dependence of $\kappa_{n}$ in Monte Carlo simulation and the parametric
representation.
Figure 4: (Color online). Phase diagram on $t-H$ plane of the three-
dimensional Ising model (a). Sketch of the $t-H$ axes mapped onto the QCD
$T-\mu_{B}$ plane (b). The black solid line and the red point are the first-
order phase transition line and the critical point, respectively. The $t$ axis
is tangential to the QCD phase boundary at the critical point. The $H$
direction is set to be perpendicular to the $t$ axis. The three lines parallel
to the phase boundary from left to right ($H=0.05,0.1$ and $H$ = 0.2) of Ising
model (a) are mapped to the three freeze-out curves which is parallel to the
$t$ axis from up to down (FC I, FC II and FC III) in QCD $T-\mu_{B}$ plane
(b).
Comparing temperature dependence of normalized factorial cumulants as showed
in Fig. 3(d) to 3(f) with the same order normalized cumulants showed in Fig.
3(a) to Fig. 3(c), respectively, there are no significant difference between
them. That is because the temperatures are close to the critical one. This
result is consistent with that in Ref. panx ; Phys. Rev. C.93.034915 that
these two kinds of cumulants can not be distinguished in the vicinity of the
critical point. So it is not hard to understand that except $C_{2}^{Norm}$,
there are both obvious fixed point behavior in the temperature dependence in
$C_{3}^{Norm}$ and $C_{4}^{Norm}$ as showed in Fig. 3(e) and 3(f). The
positions of the green dashed lines are set as the same with that in the same
order normalized cumulants. It is not hard to infer that the temperature of
fixed point in the normalized factorial cumulants is almost the same with that
in the normalized cumulants.
All in all, at different external magnetic fields in finite-size systems of
the three-dimensional Ising model, temperature dependence of the normalized
cumulants or factorial cumulants (at least from the third-order) form a fixed
point just about one percent distance to the critical temperature. Comparing
with positions of the peak and sign change, the fixed point of normalized
cumulants or factorial cumulants is much closer to the critical temperature.
## V Fixed point behavior in the energy dependence of normalized cumulants
and factorial cumulants
Figure 5: (Color online). Energy dependence of $\kappa_{2}^{Norm}$ (a),
$\kappa_{3}^{Norm}$ (b) and $\kappa_{4}^{Norm}$ (c), $C_{2}^{Norm}$ (d),
$C_{3}^{Norm}$ (e) and $C_{4}^{Norm}$ (f) along three different freeze-out
curves as showed in Fig. 4(b). The vertical green dashed lines show the energy
${\sqrt{s}}_{c}$ corresponding to $\mu_{Bc}$. The horizontal green dashed
lines show the value of the normalized cumulants at the fixed point for the
upper panel. The positions of the green dashed lines in the lower panel are
keep consistent with that in the upper panel.
In the current study we focus on the equilibrium properties of the cumulants
and factorial cumulants. Thus the non-equilibrium effects are not taken into
account Phys. Rev. C.92.034912 .
In order to apply the results of this paper to the heavy-ion collision
experiments to search for the QCD critical point, it is essential to specify
the map between the Ising variables $t$, $H$ to the QCD variables temperature
$T$, baryon chemical potential $\mu_{B}$. The $t$ axis is tangential to the
first-order phase transition line at the QCD critical point. The angle between
the horizontal (fixed $T$) lines on the QCD phase diagram and $t$ axis is
$\alpha$. For simplicity, we assume that the $H$ axis is perpendicular to the
$t$ axis after the map to the $T-\mu_{B}$ plane which has been studied in Ref.
linearmap3 . Then a linear mapping relations can be got as follows:
$\begin{split}&\frac{T-T_{cep}}{\Delta T}=-\cos\alpha\frac{H}{\Delta
H}+\sin\alpha\frac{t}{\Delta t},\\\
&\frac{\mu_{B}-\mu_{Bc}}{\Delta\mu_{B}}=-\sin\alpha\frac{H}{\Delta
H}-\cos\alpha\frac{t}{\Delta t}.\\\ \end{split}$ (13)
Where $T_{cep}$, $\mu_{Bc}$ represent the temperature and baryon chemical
potential at the QCD critical point. $\Delta T$ and $\Delta\mu_{B}$ denote the
width of the critical regime in the QCD phase diagram. Because the location of
the critical point and the width of the critical regime for QCD are not known,
the suggestion that $\Delta\mu_{B}\approx 0.1$ GeV from model calculations
Phys. Rev. D.67.014028 and lattice QCD calculations Phys. Rev. D.78.114503
is used. We set $\Delta\mu_{B}=0.1$ GeV and $\mu_{Bc}=0.25$ GeV as was done in
Ref. Phys. Rev. C.92.034912 .
$\Delta H$ and $\Delta t$ denote the width of the critical regime in the Ising
variables. For simplicity, we set $\Delta H=0.4$ and $\Delta t=2$,
respectively (the fixed point behavior is not sensitive to the width of the
critical regime in the Ising variables. For more information to define the
critical regime, to see Ref. Phys. Rev. C.92.034912 ).
At last, the freeze-out curve is assumed below the crossover/first-order phase
transition line. An empirical parametrization of the heavy-ion-collision data
from Ref. Phys. Rev. C.73.034905 can be used to describe the freeze-out
curves,
$T_{f}(\mu_{B})=a-b{\mu_{B}}^{2}-c{\mu_{B}}^{4}.$ (14)
Where $a=0.166$ GeV, $b=0.139$ GeV-1, $c=0.053$ GeV-3. At a small range of
$\mu_{B}$ (0.15 GeV ¡ $\mu_{B}$ ¡ 0.35 GeV), $T_{f}$ is approximately viewed
varying linearly with $\mu_{B}$ in this study. The angle between the straight
line of $T_{f}(\mu_{B})$ and the horizontal (fixed $T$) line on the QCD
$T-\mu_{B}$ plane is very small. For simplicity, we assume the freeze-out
curve approximately parallel to the $t$ direction which has been mapped to the
QCD phase diagram.
For straightforward, phase diagram of the three-dimensional Ising model on the
$t-H$ plane and one possible sketch of the $t-H$ axes mapped onto the
$T-\mu_{B}$ plane of QCD are showed in Fig. 4(a) and 4(b), respectively. Thus
three lines parallel to the $t$ axis from left to right at three different
values of $H$ in Fig. 4(a) can be simply mapped to three freeze-out curves
from up to down in QCD as showed in Fig. 4(b).
Base on the mapping and using Eq. (13), the temperature dependence of
normalized cumulants and factorial cumulants at the three different $H$ can be
converted to the $\mu_{B}$ dependence of normalized cumulants and factorial
cumulants along the three different freeze-out curves.
Turn to the heavy-ion collision experiments, using the energy ($\sqrt{s}$)
dependence of $\mu_{B}$ given in Ref. Phys. Rev. C.73.034905 ,
$\mu_{B}(\sqrt{s})=\frac{d_{0}}{d_{1}\sqrt{s}+1},$ (15)
where $d_{0}=1.308$ GeV, $d_{1}=0.273$ GeV-1, one can get the energy
dependence of normalized cumulants and factorial cumulants along the three
different freeze-out curves.
Supposing the angel $\alpha=3^{\circ}$, based on the parametric representation
of the Ising model, energy dependence of the second- to fourth-order
normalized cumulants and factorial cumulants along the three freeze-out curves
are showed in Fig. 5(a) to 5(f), respectively. The vertical green dashed lines
show the critical energy ${\sqrt{s}}_{c}=15.5$ GeV which is corresponding to
$\mu_{Bc}=0.25$ GeV at the QCD critical point through Eq. (15). It is clear
that, the fixed point behavior exists at ${\sqrt{s}}_{c}$ in the energy
dependence of $\kappa_{2}^{Norm}$ to $\kappa_{4}^{Norm}$ as showed in Fig.
5(a) to 5(c), respectively. The values of the normalized cumulants at the
fixed point showed by the horizontal green dashed line are a little changed
compared to the values given by Eq. (10) because of the mapping from the Ising
variables to the QCD variables.
For the normalized factorial cumulants showed in Fig. 5(d) to 5(f), the fixed
point behavior occurs from the fourth-order one, and its position is
consistent with that in $\kappa_{4}^{Norm}$.
The fixed point behavior in the energy dependence of the normalized cumulants
is derived directly from the linear mapping in Eq. (13), where $\Delta H$,
$\Delta t$ and the angle $\alpha$ are all set a fixed value in this paper. The
influence of these three parameters on the fixed point behavior should be
explained. The fixed point behavior still exists as the variation of these
three parameters. Different values of $\Delta H$ and $\Delta t$ almost do not
change the energy at the fixed point. They just influence the range of the
energy (the range of $\mu_{B}$) after the mapping. Small values of $\alpha$
(like $3^{\circ}$ used in this paper) has little influence on the fixed point
behavior. While soaring values of $\alpha$ not only change the range of the
energy, but also shift the fixed point away from ${\sqrt{s}}_{c}$ (but one
should notice that a small value for $\alpha$ should be more closer to the
truth here).
One other problem should be discussed is that how can one get different
freeze-out curves in the heavy-ion collisions? In fact, the centrality
dependence of the chemical freeze-out temperature and baryon chemical
potential has been studied in Ref. Phys. Rev. C.71.054901 ; Advances in High
Energy Physics.2021.6611394 . Although the chemical freeze-out temperature
does not vary much with centralities, the temperature interval between the
three different freeze-out curves can be very small. If we set $T_{cep}=1.8$
GeV and $\Delta T=T_{cep}/8$ which has been used in Ref. Phys. Rev.
C.92.034912 , the critical regime of QCD temperature is $\Delta T$ = 0.0225
GeV. When the external magnetic field $H$ changes from 0.05 to 0.2 at the same
$t$, after mapping to the QCD variables through Eq. (13), the freeze-out
temperature interval is just about $0.0084$ GeV. What is more, baryon chemical
potential increases from peripheral to the most central collisions Advances in
High Energy Physics.2021.6611394 . It is enough for one to get different
freeze-out curves at different centralities. So the centrality controlling the
freeze-out curves in the QCD phase diagram may play a similar role of the
external magnetic field $H$ of the Ising model.
Under the mapping from the three-dimensional Ising model to QCD, the fixed
point behavior may be expected in the energy dependence of normalized net-
proton (factorial) cumulants in heavy-ion collision experiments. This feature
can be used to locate the QCD critical point.
## VI Summary
By using the parametric representation of the three-dimensional Ising model,
temperature dependence of the second- to fourth-order cumulants and factorial
cumulants of the order parameter is studied. The qualitative behavior of
temperature dependence of cumulants does not change with the varying external
magnetic field in the vicinity of the critical temperature. So does that of
the factorial cumulants.
The fixed point behavior in temperature dependence of normalized cumulants at
the critical temperature for different magnetic fields is deduced and showed.
By Monte Carlo simulation of the three-dimensional Ising model, the fixed
point behavior in the temperature dependence of normalized second- to fourth-
order cumulants is checked in finite-size systems. The fixed point behavior
still exists just about one percent distance to the critical temperature,
which is much closer to the critical temperature than the peak structure or
sign change showed in the temperature dependence of the cumulants.
For the normalized factorial cumulants, the fixed point behavior is also
survived at least from the fourth order cumulants both in the parametric
representation and finite-size systems which reflect the fact that the
critical behavior of factorial cumulants is dominant by the corresponding
cumulants. The higher the order of the factorial cumulant, the more dominant
role of the same order cumulant in its critical behavior.
Through a mapping from the three-dimensional Ising model to QCD, the fixed
point behavior is also found in the energy dependence of the normalized
cumulants (or fourth-order factorial cumulants) along different freeze-out
curves. The fixed point is very close to the critical energy (corresponding to
the baryon-chemical potential at the QCD critical point). It should be
promising for the method to be applicable to locate the QCD critical point in
heavy-ion collision experiments.
More generally it must be emphasized that all of the results here rely on the
equilibrium of the system. Whether the fixed point behavior survived in the
non-equilibrium cumulants needs further studies. What is more, further studies
of different ways of mapping from the Ising model to QCD will be helpful.
The author acknowledges fruitful discussions with Yuanfang Wu, MingMeiXu and
Lizhu Chen
## References
* (1) J. Adams et al (STAR Collaboration), Nucl. Phys. A, 757: 102 (2005)
* (2) Y. Aoki, G. Endrödi, Z. Fodor et al, Nature, 443: 675 (2006)
* (3) L. G. Yaffe, B. Svetitsky, Phys. Rev. D, 26: 963 (1982)
* (4) A. Roberge, N. Weiss, Nucl. Phys. B, 27: 5734 (1986)
* (5) M. Fukugita, M. Okawa, A. Ukawa, Phys. Rev. Lett., 63: 1768 (1989)
* (6) P. de Forcrand, O. Philipsen, Nucl. Phys. B, 64: 2290 (2002)
* (7) S. Ejiri, Phys. Rev. D, 78: 074507 (2008)
* (8) E. S. Bowman, J. I. Kapusta, Phys. Rev. C, 79: 015202 (2009)
* (9) B. Friman, F. Karsch, K. Redlich et al, Eur. Phys. J. C, 71: 1694 (2001)
* (10) Y. Hatta, M. A. Stephanov, Phys. Rev. Lett., 91: 102003 (2003)
* (11) V. Koch, arXiv:0810.2520
* (12) M. A. Stephanov, Phys. Rev. Lett., 102: 032301 (2009)
* (13) M. Asakawa, S. Ejiri, M. Kitazawa, Phys. Rev. Lett., 103: 262301 (2009)
* (14) V. Skokov, B. Stokić, B. Friman et al, Phys. Rev. C, 82: 015206 (2010)
* (15) Wei-jie Fu, Yu-Xin Liu, and Yue-Liang Wu, Phys. Rev. D, 81: 014028 (2010)
* (16) M. A. Stephanov, Phys. Rev. Lett., 107: 052301 (2011)
* (17) S. Collaboration, L. Adamczyk, J. K. Adkins, et al., Phys. Rev. Lett., 112: 032302 (2014)
* (18) W. Fan, X. Luo and H. Zong, Chin. Phys. C, 43: 033103 (2019)
* (19) Li-Zhu Chen, Ye-yin Zhao, Jin Wu, et al., Chin. Phys. C, 45: 104103 (2021)
* (20) Z. Li, K. Xu, X. Wang and M. Huang, Eur. Phys. J. C, 79: 245 (2019)
* (21) D. Mroczek, A. R. Nava Acuna, J. Noronha-Hostler et al., Phys. Rev. C, 103: 034901 (2021)
* (22) M. Kitazawa, M. Asakawa and H. Ono, Phys. Lett. B, 728: 386 (2014)
* (23) M. Kitazawa, Nuclear Physics A, 942: 65 (2015)
* (24) B. Ling and M. A. Stephanov, Phys. Rev. C, 93: 034915 (2016)
* (25) T. Nonaka, M. Kitazawa and S. Esumi, Phys. Rev. C, 95: 064912 (2017)
* (26) A. Bzdak, V. Koch and N. Strodthoff, Phys. Rev. C, 95: 054906 (2017)
* (27) S. He and X. Luo, Phys. Lett. B, 774: 623 (2017)
* (28) M. Kitazawa and X. Luo, Phys. Rev. C, 96: 024910 (2017)
* (29) A. Bzdak, V. Koch and V. Skokov, Eur. Phys. J. C, 77: 288 (2017)
* (30) A. Bzdak and V. Koch, Phys. Rev. C, 100: 051902 (2019)
* (31) A. Bzdak, V. Koch, D. Oliinychenko, et al., Phys. Rev. C, 98: 054901 (2018)
* (32) Xue Pan, Mingmei Xu and Yuanfang Wu, Int. Jour. Mod. Phys. E, 30: 2150036 (2021)
* (33) N. G. Antoniou, F. K. Diakonos, X. N. Maintas and C. E. Tsagkarakis, Phys. Rev. D, 97: 034015 (2018)
* (34) X. Pan, M. Xu and Y. Wu, Journal of Physics G: Nuclear and Particle Physics, 42: 015104 (2015)
* (35) J. Cardy, Scaling and Renormalization in Statistical Physics. Cambridge University Press, Cambridge, UK, 1996
* (36) M. E. Fisher, Rev. Mod. Phys., 46: 597 (1974)
* (37) K. Wilson, Phys. Rep., 12: 75 (1974)
* (38) Privman V. Finite Size Scaling and Numerical Simulation of Statistical Physics. World Scientific, Singapore, 1990
* (39) Y. Zhang, Y. Zhao, L. Chen, X. Pan, M. Xu, Z. Li, Y. Zhou and Y. Wu, Phys. Rev. E, 100: 052146 (2019)
* (40) L. Chen, Y. Zhao, X. Li, Z. Li and Y. Wu, Int. Jour. Mod. Phys. E, 30: 2150056 (2021)
* (41) P. de Forcrand, O. Philipsen, Phys. Rev. Lett., 105: 152001 (2010)
* (42) M. Stephanov, K. Rajagopal, E. Shuryak, Phys. Rev. Lett., 81: 4816 (1998)
* (43) M. Asakawa, J. Phys. G: Nucl. Part. Phys, 36: 064042 (2009)
* (44) R. D. Pisarski, F. Wilczek, Phys. Rev. D, 29: 338 (1984)
* (45) M. Caselle and M. Sorba, Phys. Rev. D, 102: 014505 (2020)
* (46) J.J. Rehr and N.D. Mermin, Phys. Rev. A, 8: 472 (1973)
* (47) N. B Wilding, J. Phys.: Condens. Matter, 9: 585 (1997)
* (48) C. Nonaka and M. Asakawa, Phys. Rev. C, 71: 044904 (2005)
* (49) Xue pan, Lizhu Chen, X.S. Chen and Yuanfang Wu, Nucl. Phys. A, 913: 206 (2013)
* (50) J. Garcia, J.A. Gonzalo, Phys. A, 326: 464 (2003)
* (51) P. Schofield, Phys. Rev. Lett., 22: 606 (1969)
* (52) D. J. Wallace, R. K. P. Zia, J. Phys. C: Solid State Phys, 7: 3480 (1974)
* (53) H. W. J. Blöte, E. Luijten, J. R. Heringa, J. Phys. A: Math. Gen, 28: 6289 (1995)
* (54) B. D. Josephson and J. Phys. C: Solid State Phys, 2: 113 (1969)
* (55) J. Engels, L. Fromme, M. Seniuch, Nucl. Phys. B, 655: 277 (2003)
* (56) Mark Abraao York and Guy D. Moore, arXiv: 1106.2535 (2011)
* (57) U. Wolff, Phys. Rev. Lett., 62: 361 (1989)
* (58) A. M. Ferrenberg and R. H. Swendsen, Phys. Rev. Lett., 61: 2635 (1988)
* (59) S. Mukherjee, R. Venugopalan and Y. Yin, Phys. Rev. C, 92: 034912 (2015)
* (60) Y. Hatta and T. Ikeda, Phys. Rev. D, 67: 014028 (2003)
* (61) R. V. Gavai and S. Gupta, Phys. Rev. D, 78: 114503 (2008)
* (62) J. Cleymans, H. Oeschler, K. Redlich and S. Wheaton, Phys. Rev. C, 73: 034905 (2006)
* (63) J. Cleymans, B. Kämpfer, M. Kaneta, S. Wheaton and N. Xu, Phys. Rev. C, 71: 054901 (2005)
* (64) D. Biswas, Advances in High Energy Physics, 2021: 6611394 (2021)
| arxiv-papers | 2021-07-27T11:58:45 | 2024-09-04T03:07:21.390409 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Xue Pan",
"submitter": "Xue Pan",
"url": "https://arxiv.org/abs/2107.12758"
} |
2107.12762 | # Multi-Scale Local-Temporal Similarity Fusion for Continuous Sign Language
Recognition
Pan Xie Zhi Cui Yao Du Mengyi Zhao Jianwei Cui Bin Wang Xiaohui Hu
###### Abstract
Continuous sign language recognition (cSLR) is a public significant task that
transcribes a sign language video into an ordered gloss sequence. It is
important to capture the fine-grained gloss-level details, since there is no
explicit alignment between sign video frames and the corresponding glosses.
Among the past works, one promising way is to adopt a one-dimensional
convolutional network (1D-CNN) to temporally fuse the sequential frames.
However, CNNs are agnostic to similarity or dissimilarity, and thus are unable
to capture local consistent semantics within temporally neighboring frames. To
address the issue, we propose to adaptively fuse local features via temporal
similarity for this task. Specifically, we devise a Multi-scale Local-Temporal
Similarity Fusion Network (mLTSF-Net) as follows: 1) In terms of a specific
video frame, we firstly select its similar neighbours with multi-scale
receptive regions to accommodate different lengths of glosses. 2) To ensure
temporal consistency, we then use position-aware convolution to temporally
convolve each scale of selected frames. 3) To obtain a local-temporally
enhanced frame-wise representation, we finally fuse the results of different
scales using a content-dependent aggregator. We train our model in an end-to-
end fashion, and the experimental results on RWTH-PHOENIX-Weather 2014
datasets (RWTH) demonstrate that our model achieves competitive performance
compared with several state-of-the-art models.
###### keywords:
Sign Language Recognition , Temporal Similarity , Content-aware Feature
Selector , Position-aware Convolution , Content-dependent Aggregator
††journal: Nuclear Physics B
[inst1]organization=Beihang University,city=Beijing, country=China
[inst2]organization=Xiaomi AI Lab,city=Beijing, country=China
[inst3]organization=Institute of Software, Chinese Academy of
Sciences,city=Beijing, country=China
## 1 Introduction
Sign language (SL), consisted of various hand gestures, motions, facial
expressions, transitions and etc, is an indispensable daily communication tool
between people with hearing impairment. A gloss is the minimal semantic unit
of sign language [1], and people would have to accomplish one single or a set
of gestures in order to sign a gloss.
The video-based continuous Sign Language Recognition (cSLR) is the task that
transcribes a sequence of signing frames into an ordered gloss sentence.
However, this task is challenging: 1) On the one hand, many gestures or
actions could be shared across different glosses due to the richness of the
vocabulary in a sign language. 2) On the other hand, even a same gloss may
also be comprised of different lengths of corresponding video frames, as
different people would act in different speed. These aspects address
difficulties in explicitly aligning the video frames with the corresponding
signing glosses. Therefore, it would be challenging to recognize glosses from
such a dynamic sequential video, where there is no explicit semantic
boundaries between glosses.
Figure 1: Case study of two examples: the figures above respectively visualize
the pairwise cosine similarities $cos_{ij}$ between the spatial features of
framei and framej, where the diagonal elements always equal 1. Note that
spatial features are extracted from a CNN backbone model.
To address the aforementioned challenge, many recent approaches have achieved
excellent performance by adopting a mainstream framework [2, 3, 4]: they
firstly utilize a convolution neural network (CNN) to extract a sequence of
spatial features from video frames, and then fuse the temporal sequence either
using a recurrent neural network (RNN) or one-dimensional convolution neural
network (1D-CNN). However, these two conventional fusion methods still have
several problems. In terms of RNNs, previous research [3] has indicated that
they tend to focus more on the sequential order of sign language than the
fine-grained gloss-level details, and thus RNNs are not suitable for this task
where the local details play a vital role.
On the contrary, it is more promising to use the fully convolutional neural
network (FCN) [3], which uses 1D-CNNs to learn such gloss-level granularities.
However 1D-CNNs are content-agnostic [5], i.e., the same trained CNN filters
are applied to all the videos frames without distinction between locally
similar or dissimilar ones. But note that the sign language is semantically
coherent, suggesting that the temporally close video frames share similarities
[6]. To further demonstrate such phenomenon, we plot similarity heatmaps of
two examples shown in Figure 1. We can clearly see that the temporal
neighbours share much higher cosine similarities than those far-away ones,
where there are more yellow pixels along the diagonal of the heatmaps.
Besides, another research [7] has implied that a learned CNN filter could also
be insensitive to where it is targeting. As a result, 1D-CNNs would tend to
skip temporal consistency of the convolved frames. To sum up, 1D-CNNs alone
could not model this task very well if without extra regulations.
Figure 2: An overview of our model, where we mainly zoom on in our proposed
mLTSF module. In this figure, ”CFS” stands for content-aware feature selector,
”PTC” stands for position-aware temporal convolver, and ”CMA” stands for
content-dependent multi-scale aggregator.
To tackle the problem, we propose to adaptively augment the sequential fusion
with locally similar frames for continuous Sign Language Recognition.
Specifically, we introduce a (multi-scale Local-Temporal Similarity Fusion)
Network (mLTSF-Net). Compared with the fully convolutional neural network
(FCN) [3], our model additionally has an mLTSF module as shown in Figure 2,
which brings the following improvements: 1) Rather than a fixed receptive
region, we propose a content-aware feature selector (CFS) which firstly
selects similar neighboring frames with different scaled selection regions.
Facilitated by this, our model is induced to accommodate different lengths of
glosses. 2) To enhance temporal consistency, we then introduce a position-
aware temporal convolver (PTC), where each scale of selected frames will be
appended with relative positional embeddings and convolved in an temporal
order. 3) To augment local-temporal frame-wise representations, we finally
fuse different scales of convolved features with a content-dependent multi-
scale aggregator (CMA), where we incorporate a dynamic weight using an
attention-like mechanism. We conduct experiments on the benchmark dataset,
RWTH-PHOENIX-Weather-2014 (RWTH) [8]. We also apply extensive ablation studies
to validate the effectiveness of our model. The experimental results
demonstrate that our proposed model mLTSF-Net achieves the state-of-the-art
accuracy (with a word error rate (WER) as 23.0$\%$) compared with many
competitive baseline models.
## 2 Related Work
Most researches on continuous sign language recognition mainly focus on two
aspects (feature-level and sequence-level): 1) either strive to better model
the spatial or temporal semantic information of sign language video frames, or
2) design a better sequence learning mechanism to learn the mapping
relationship between the sign video frames and the corresponding gloss
sequences.
#### Feature-Level
Generally, the feature-level researches for cSLR include two aspects: spatial
modeling and temporal modeling. Early works of cSLR mostly use the hand-
crafted feature for sign video representation [9, 10, 11, 12, 13]. Recently,
deep learning based methods achieve the state-of-the-art in cSLR for their
strong feature representation capability[14, 15, 16, 17, 18, 3, 4, 19]. A
common practice is to use 2D-CNNs to extract the spatial features, and then
RNNs or 1D-CNNs are employed to model the temporal variations of sign
language. Cui et al. [17] utilizes the combination of 2D-CNNs and LSTMs to
learn the spatial-temporal representation. Cheng et al. [3] adopts a fully
convolutional network which is composed of 2D-CNNs and 1D-CNNs. The comparison
of these two approaches shows that 1D-CNNs are more robust than RNNs for cSLR
to model the semantic structure of sign glosses.
#### Sequence-Level
Sequence learning in cSLR is to learn the mapping relationship between sign
video sequences and sign gloss labels. Early on, Hidden markov models (HMMs)
are widely used to model the state transitions in cSLR [20, 14, 21, 22].
Recently, the attention-based encoder-decoder architecture have shown a great
success in machine translation [23]. Despite that several works show promising
results to apply such architecture for cSLR [24, 25], it is time- and labor-
consuming to build a very large-scale source-to-target mapping dataset.
Moreover, Connectionist Temporal Classification (CTC) [26] has proven to be
the state-of-the-art performance in cSLR, where CTC algorithm succeeds in
processing unsegmented sequence [16, 17, 18, 3].
#### Ours
In summary, our model is built upon the fully convolutional network (FCN) [3].
In particular, FCN use 1D-CNNs to learn temporal information of video features
with a window sliding over the time dimension. Despite the successful
performance, CNNs are agnostic to similar neighbouring frames [5], and also
tend to be insensitive to temporal dependency of ordered frames [7]. These
drawbacks would hinder the performance of model from being further improved.
In this paper, our contributions lie in that we propose a multi-scale Local-
Temporal Simialrity Fusion Network (mLTSF-Net) to address the above issue, and
our model achieves the state-of-the-art performance compared with many
competitive baseline models.
Figure 3: An overview of our proposed model. ”CFS” means content-aware feature
selector. ”PTC” means position-aware convolver. ”CMA” means content-dependent
aggregator. ”GELU” means gaussian error linear units activation.
## 3 Method
### 3.1 Preliminaries
Towards the task of cSLR, our objective is to learn a mapping probability
$p(\mathcal{Y|X})$ from a given series of video frames
$\mathcal{X}=\\{x_{t}\\}^{T}_{t=1}$ to an ordered gloss sequence
$\mathcal{Y}=\\{y_{i}\\}^{L}_{i=1}$, where $T$ and $L$ respectively denote the
lengths.
To model the mapping probability, a promising method is to adopt a fully
convolutional network (FCN) [3] to learn feature representations. To be
specific, the FCN framework is consisted of two main components in a top-down
order: 1) a frame feature extractor, and 2) a gloss feature encoder. Due to
the drawback of CNNs as discussed previously, the CNN-stacked gloss feature
encoder is insufficient to fully capture gloss-level details.
To address this issue, we introduce a (multi-scale Local-Temporal Similarity
Fusion) Network (mLTSF-Net) as shown in Figure 3. Built upon FCN, our proposed
model has an additional mLTSF module on top of the gloss feature encoder. In
the following subsections, we will firstly revisit the FCN framework and then
give a detailed description about our proposal.
### 3.2 FCN Framwork
#### Frame Feature Extractor
Given a series of video frames $\mathcal{X}=\\{x_{t}\\}_{t=1}^{T}$, the frame
feature extractor firstly encodes them, and then outputs a series of according
spatial features. Specifically, CNNs are commonly adopted as the backbone
model to learn the spatial features as:
$\displaystyle z^{T\times C^{\prime}\times H^{\prime}\times
W^{\prime}}=\mathcal{F}_{2d-CNN}(x^{T\times C\times H\times W})$ (1)
where $C,H,W$ respectively denote the number of spatial channels (here $C=3$),
the height and weight of the input frame, while
$C^{\prime},H^{\prime},W^{\prime}$ denote the sizes of a new activation
feature map $z$ with a lower-resolution.
To collapse the spatial dimension of $z$, a global average pooling function
$\mathcal{F}_{GAP}$ is adopted:
$\displaystyle s^{T\times C^{\prime}}=\mathcal{F}_{GAP}(z^{T\times
C^{\prime}\times H^{\prime}\times W^{\prime}})$ (2)
where $s^{T\times C^{\prime}}$ denotes the sequence of the frame-wise
representations, and $C^{\prime}$ is the number output channels.
#### Gloss Feature Encoder
Given the extracted spatial features, the gloss feature encoder adopts 1D-CNNs
over the time dimension to learn contextual information. Such encoder is
consisted of two levels, where each level is stacked with multiple 1D-CNN
layers and undertakes different functions:
The 1st Level. To capture the semantic information of a gloss in terms of the
whole sign video, the 1st level gloss feature encoder adopts a larger filter
size in order to consider more frames at a time. Since it is hard to learn
extremely long dependencies in a temporal sequence [18], temporal max pooling
layers are utilized to pool the feature sequence to a moderate length. In
other words, the stacked temporal layers can be regarded as a window sliding
function over the time dimension. Mathematically, we obtain the gloss feature
from the 1st level as:
$\displaystyle g_{1}^{T^{\prime}\times
C^{\prime}}=\mathcal{F}_{TP}(\mathcal{F}_{1d-CNN}(s^{T\times C^{\prime}}))$
(3)
where $T^{\prime}$ is smaller than $T$ due the temporal pooling.
The 2nd Level. To learn the neighboring information in between glosses, the
2nd level of gloss feature encoder uses a relatively smaller filter size to
emphasize on the local details. The 2nd level does not has a temporal pooling
layer, where the output time dimension would not be changed. Likewise, the
output gloss feature from 2nd level is represented as:
$\displaystyle g_{2}^{T^{\prime}\times
C^{o}}=\mathcal{F}_{1d-CNN}(g_{1}^{T^{\prime}\times C^{\prime}})$ (4)
where $C^{0}$ is the output feature channels of 2nd level.
Figure 4: An overview of three-step selection by content-aware feature
selector.
### 3.3 Multi-scale Local-Temporal Similarity Fusion
It is worth mentioning again that temporal neighboring frames share consistent
local semantics [6], which highlights the importance of local-temporal
similarity. However, the fully CNN-stacked gloss feature encoder is hard to
catch such detailed information, since CNNs are unable to take additional
consideration into temporally similar and consistent neighbours. More specific
reasons are detailed in Section 1.
Accordingly, we introduce mLTSF-Net to learn the local-temporal similarity. As
mentioned before, our model has an additional mLTSF module compared with FCN.
Specifically, our proposed mLTSF module has three main components as shown in
Figure 3: 1) Content-aware Feature Selector (CFS), 2) Position-aware Temporal
Convolver (PTC), and 3) Content-dependent Multi-scale Aggregator (CMA). In
this section, we will detail each component and how they overcome the drawback
of CNNs.
#### Content-aware Feature Selector
First of all, the aim of Content-aware Feature Selector (CFS) is to adaptively
select top-$k$ similar neighbouring frame-wise features. Given a series of
extracted features from Frame Feature Extractor, CFS will select similar
neighbours via three step as shown in Figure 4:
(a) With the extracted features $s^{T\times C^{\prime}}$ from the backbone CNN
model, we apply outer tensor product and softmax function to get a similarity
matrix $d^{T\times T}$:
$\displaystyle d^{T\times T}=\textup{softmax}(\frac{s^{T\times
C^{\prime}}s^{{C^{\prime}\times T}}}{C^{\prime}})$ (5)
where the diagonal elements in $d^{T\times T}$ represent similarities of the
features themselves.
(b) To ensure neighbors are going to be selected instead of the far-away ones,
we only consider a range $[t-k,t+k]$ for a specific feature
$s_{t}\in{s^{T\times C^{\prime}}}$ to keep local semantic consistency. Outside
that range, we replace the similarity scores with $-inf$. Mathematically, the
selecting criterion for $s_{t}$ becomes as:
$\displaystyle d_{t,j}=\begin{cases}d_{t,j},&j\in[\max(0,t-k),\min(t+k,T)]\\\
-inf,&\text{others}\end{cases}$ (6)
(c) Notably, we denote the selected $k$ neighbours as $\mathbb{K}_{t}$ (i.e.,
Locally Similar Region) for a specific feature $s_{t}$. Finally, we obtain a
sub-series of enhanced frame-wise representations via temporal similarity as:
$\displaystyle s^{T\times k\times C^{\prime}}=\mathcal{F}_{topk}(s^{T\times
C^{\prime}},\mathbb{K})$ (7)
where the $k$ neighbors are sorted based upon the time steps in ascending
order.
Since different glosses usually correspond to different frame lengths, we
propose multi-scale locally similar regions to accommodate such phenomenon
rather than a fixed one. Here, we use three region sizes $k_{1}$, $k_{2}$ and
$k_{3}$, and accordingly obtain three set of selected frames, $s^{T\times
k_{1}\times C^{\prime}}$, $s^{T\times k_{2}\times C^{\prime}}$ and $s^{T\times
k_{3}\times C^{\prime}}$.
#### Position-aware Temporal Convolover
To further facilitate the temporal consistency between the selected frames, we
then use temporal convolutional layers to sequentially fuse the selected
features. However, according to Islam et. al [7], CNN layers are insensitive
to what they are convolving in an image. And thus 1D-CNNs suffers from the
same problem that they are insufficient to fully learn temporal dependency in
between neighbouring frames. To encode the relationship of temporal position
between frames, we adopt the relative position encoding [27, 28, 29] to inject
temporal dependency into the sign feature learning.
Concretely, we first calculate the relative positions w.r.t the center feature
and map them into trainable embedding vectors. Then the relative position
embeddings are added to the selected features, resulting in position-aware
sign features:
$\displaystyle{\hat{s}^{T\times k\times C^{\prime}}}_{t,p}={s^{T\times k\times
C^{\prime}}_{t,p}}+\phi(p-t)$ (8)
where ${s^{T\times k\times C^{\prime}}_{t,p}}$ denotes the $p^{th}$ selected
feature in the region around the center $s_{t}$, and $p-t$ is the relative
position value between the $p^{th}$ feature and the center $s_{t}$.
With a specific scale of selected features, we apply one-dimensional
convolution layers to aggregate the position-aware sign features. The enhanced
sign feature $\tilde{s}\in R^{T\times C^{\prime}}$ is represented as:
$\displaystyle{\tilde{s}^{T\times
C^{\prime}}}=MaxPool(Relu(LN(Conv1d(\hat{s}^{T\times k\times C^{\prime}}))))$
(9)
where Conv1d stands for 1D-CNN and LN denotes Layer Normalization [30]. In
order to learn more expressive features, we add two linear layers
$W_{1}\in\mathbb{R}^{C^{\prime}\times C^{\prime}}$,
$W_{2}\in\mathbb{R}^{C^{\prime}\times C^{\prime}}$ with a GELU activation [31]
in between as follows:
$\displaystyle{s^{\prime}}^{T\times
C^{\prime}}=W_{2}\cdot\text{GELU}(W_{1}\tilde{s}^{T\times
C^{\prime}}+b_{1})+b_{2}$ (10)
where $s^{\prime}\in\mathbb{R}^{T\times C^{\prime}}$ denotes enhanced sign
features with local similar features.
Accordingly, the same operations 8, 9, 10 are applied to all the scales
($k_{1}$, $k_{2}$ and $k_{3}$) of selection regions. Finally, we concatenate
the three resulting enhanced features into ${s^{\prime}}^{T\times 3\times
C^{\prime}}$, which still needs to be fused into a 2D matrix for the following
recognition.
#### Content-dependent Multi-scale Aggregator
In order to fuse the three-scaled features ${s^{\prime}}^{T\times 3\times
C^{\prime}}$, we are inspired by Chen et. al [32] and re-weight the three
scales content-dependently at each time step.
To be specific, we introduce a linear projection and map them into a weight
distribution $\alpha$, which is also shown in the right side of Figure 2:
$\displaystyle\alpha^{T\times 3}=\text{softmax}(Ws^{T\times C^{\prime}}+b)$
(11)
where $W\in\mathbb{R^{C^{\prime}\times 3}}$ and $b\in\mathbb{R^{3}}$. And
then, we dynamically aggregate these three scales using the weight
distribution $\alpha$ as:
$\displaystyle s_{o}^{T\times C^{\prime}}=a^{T\times 3}\cdot s_{o}^{T\times
3\times C^{\prime}}$ (12)
where the resulting feature $s_{o}$ is the final aggregated representation.
With the learned weight distribution, our model is able to dynamically
emphasize on different scale at different time step, e.g., if a gloss is
across a wide range, and the model will pay pay more attention onto the bigger
scale size of selection region, and vice versa.
#### Summary of mLTSF
On the one hand, our mLTSF-Net (CFS + PTC + CMA) is induced to capture
temporal local similarity in sign language, on the other hand it is also able
to enhance temporal consistency of every fused representation.
### 3.4 Sequence Learning
It is hard to train a cSLR model, since the source and target sequences
usually have different lengths. Besides, there is no specific alignment
between the video frames and the corresponding signing glosses.
To tackle the problem, we use Connectionist Temporal Classification (CTC) [26]
to optimize our model for cSLR. Specifically, CTC introduces a designed cost
function for sequence prediction, where the sequence is purely unsegmented or
is weakly segmented. Besides, CTC extends the sign vocabulary with a special
token “blank”, and we name this vocabulary as $V$. Further, the token “blank”
is expected to label the silence or transition frame that may exist in between
output sign labels.
To transform the gloss features into gloss labels, we adopt a fully-connected
layer $\mathcal{F}_{fc}$ on the outputs from the 2nd level of gloss feature
encoder in Equation 4. Mathematically, we obtain the normalized probabilities
of predicted labels as:
$\displaystyle p^{T^{\prime}\times V}=\mathcal{F}_{fc}(g_{2}^{T^{\prime}\times
C^{o}})$ (13)
Moreover, CTC defines a mapping function $\mathcal{B}$:
$\mathcal{Y}^{L}=\mathcal{B}(\pi^{T^{\prime}})$ by removing “blank” tokens and
collapsing repetitions. Note that $L\leq T^{\prime}$ and $\pi$ is a possible
alignment sequence. During training, the objective of CTC is to minimize the
negative log-likelihoods of all possible alignments,
$\mathcal{B}^{-1}(\mathcal{Y})=\\{\pi:\mathcal{B}(\pi)=\mathcal{Y}\\}$:
$\displaystyle\mathcal{L}_{ctc}(\mathcal{X,Y})=-\sum_{\small{\pi\in\mathcal{B}^{-1}(\mathcal{Y})}}\log{p(\mathcal{Y}|\mathcal{X})}$
(14)
Overall, we train the whole model by minimizing the loss as follows:
$\displaystyle\mathcal{L}=\mathcal{L}_{ctc}+\lambda\lVert W\rVert_{2}$ (15)
where $\lambda$ is the $L_{2}$ regularization coefficient.
## 4 Model Configuration
Frame Feature Extractor
---
CNN backbone
mLTSF Module
Content-aware Feature Selector ($k$={16,12,8})
Position-aware Temporal Convolver | RPE (C512)
Conv1D (F3-S1-P1-C512)
Conv1D (F3-S1-P1-C512)
AdaptiveMaxPool (M1)
Linear + GLEU + Linear
Content-dependent Multi-scale Aggregator
1st Level of Gloss Feature Encoder
Conv1D (F5-S1-P2-C512)
Maxpool1D (M2-S2)
Conv1D (F5-S1-P2-C512)
Maxpool1D (M2-S2)
2nd Level of Gloss Feature Encoder
Conv1D (F3-S1-P1-C1024)
Table 1: The configuration of our proposed architecture.
CNN Backbone
---
Conv2D, $3\times 3,1,1,32$ | MaxPool2D, $2\times 2,2$
Conv2D, $3\times 3,1,1,32$ |
Conv2D, $3\times 3,1,1,64$ | MaxPool2D, $2\times 2,2$
Conv2D, $3\times 3,1,1,64$ |
Conv2D, $3\times 3,1,1,128$ | MaxPool2D, $2\times 2,2$
Conv2D, $3\times 3,1,1,128$ |
Conv2D, $3\times 3,1,1,256$ | MaxPool2D, $2\times 2,2$
Conv2D, $3\times 3,1,1,256$ |
Conv2D, $3\times 3,1,1,512$ | MaxPool2D, $2\times 2,2$
Conv2D, $3\times 3,1,1,512$ |
Global Average Pooling |
Table 2: The settings of our backbone model, which is used to extract spatial
features from the input sign language frames. The parameters of 2D convolution
layer are denoted as ”Conv2D, filter size $\times$ filter size, stride,
padding, output channels”.
In this section, we will provide more details of our model in a left-to-right
order as illustrated in Figure 3. The overall configurations of our proposed
architecture are presented in Table 4.
In terms of the feature extractor shown as in Figure 3, we follow the setting
of Cheng et al. [3], where the parameters are listed in Table 2. Besides, we
also add batch normalization [33] to accelerate training after every
convolution layer.
Followed right after by the frame feature extractor, our proposed mLTSF module
is consisted of three components, 1) Content-aware Feature Selector (CFS), 2)
Position-aware Temporal Convolver (PTC), and 3) Content-dependent Multi-scale
Aggregator (CMA). The CFS component is used to capture similarity in multi-
scale regions, here we set the sizes of three selection regions for CSF as
$k_{1}=16$, $k_{2}=12$, and $k_{3}=8$. We use PTC component to sequentially
convolve a set of selected similar features. Here, we stack two 1D-CNNs for
PTC, where the filter size is set as as 3, the stride size as 1, and the
padding size as 1. Also, we add Layer Normalization [30] after the 1D-CNN
layer. Afterwards, the CMA component just follows equation 11 and 11 to fuse
the three scales.
The 1st level of gloss feature encoder is stacked with two same compounds
(where each compound is consisted of a 1D-CNN and a TP (temporal max
pooling)). Specifically, we set the filter size of 1D-CNNs as 5, stride size
as 1, the padding size is 2, and the channel number is 512. For the sake of
consistency, we name such setting as F5-S1-P2-C512. Besides, the TP layer has
a pooling size of 2 and the stride size of 2. Similarly, we define this
setting as M2-S2. Therefore, the overall receptive field of the 1st level of
gloss feature encoder is equal to 16, which is ensured to be equivalent to
$k_{1}=16$, the largest size of our selection region. Therefore, the original
sequence length $T$ of video frames is reduced to $T^{\prime}=\frac{T}{4}$.
Accordingly, the length of a gloss unit is scaled down by four times. Then, we
use a 1D-CNNs with the setting as F3-S1-P1-C1024 layer for the 2nd level of
gloss feature encoder.
## 5 Experiment
### 5.1 Dataset and Metrics
We conduct experiment on RWTH-PHOENIX-Weather-2014 (RWTH) [8], the
benchmarking dataset of the continuous Sign Language Recognition. It is
curated from a public television broadcast in Germany, where all signers wear
dark clothes and perform sign language in front of a clean background.
Specifically, this dataset contains $\small{6,841}$ sign language sentences
(around $\small{80,000}$ glosses with a vocabulary of size $\small{1,232}$).
Officially, the dataset is splitted with $\small{5,672}$ training samples,
$\small{540}$ validation samples, and $\small{629}$ testing samples. All
videos have been pre-processed to a resolution of $210\times 260$ and
$\small{25}$ frames per second (FPS).
We evaluate the performance of our model using word error rate (WER), which is
broadly adopted metric for cSLR:
$\displaystyle\text{WER}=\dfrac{\\#\text{substitution}+\\#\text{deletion}+\\#\text{insertion}}{\\#\text{words
in reference}}$ (16)
### 5.2 Implementation Details
We resize all the input frames to $256\times 256$ for both training and
testing. To augment the training dataset, we randomly crop the video frames to
$224\times 224$. In addition, we also scale up the training video sequence by
+$20{\%}$ and then scale down by -$20{\%}$. During testing, we however crop
the frames from the center, instead of randomness.
We use the Adam optimizer [34] to optimize our model, where the initial
learning rate is set to $10^{-4}$. After 40 epochs, we decay the learning rate
by 0.5 every 5 epochs, where the decay rate $\lambda$ is $10^{-4}$. Overall,
we train our model for 60 epochs in total on one NVIDIA Titan RTX GPU.
Methods | Iterative | Dev (%) | Test (%)
---|---|---|---
del/ins | WER | del/ins | WER
DeepHand [14] | yes | 16.3/4.6 | 47.1 | 15.2/4.6 | 45.1
Staged-Opt [17] | yes | 13.7/7.3 | 39.4 | 12.2/7.5 | 38.7
Re-Sign [21] | yes | - | 27.1 | - | 26.8
CNN-LSTM-HMM [35] | yes | - | 26.0 | - | 26.0
SBD-RL [36] | yes | 9.9/5.6 | 28.6 | 8.9/5.1 | 28.6
DNF [18] | yes | 7.8/3.5 | 23.8 | 7.8/3.4 | 24.4
SubUNets [16] | no | 14.6/4.0 | 40.8 | 14.3/4.0 | 40.7
DeepSign [22] | no | 12.6/5.1 | 38.3 | 11.1/5.7 | 38.8
SFNet [2] | no | - | 38.0 | - | 38.1
FCN [3] | no | - | 26.1 | - | 26.0
FCN + GFE [3] | no | - | 23.7 | - | 23.9
mLTSF-Net | no | 8.5/3.2 | 23.8 | 8.3/3.1 | 23.5
mLTSF-Net + GFE | no | 7.9/2.7 | 22.9 | 7.6/3.0 | 23.0
Table 3: The evaluation results on baseline models, where del and ins stand
for deletion and insertion, respectively.
### 5.3 Comparison Against Baselines
To demonstrate the effectiveness of our work, we compare with several state-
of-the-art models. The experimental results are summarized in Table 3.
We firstly examine the performance of iterative optimization methods, e.g.,
Stage-Opt [17], Re-sign [21] and DNF [18]. The results are listed in the first
block of Table 3. They resort to iteration in order to address the problem of
weak supervision. They first train an end-to-end recognition model for
alignment proposals, and then use the alignment proposals to finetune the
frame feature extractor. However, these iterative methods are time consuming.
Even worse, the proposed alignments for supervision are noisy, and thus tend
to degrade the performance unavoidably.
Among the non-iteration method as shown in the second block of Table 3, FCN
[3] achieve a remarkable WER compared with the others. It is built upon an
end-to-end fully convolutional neural network for cSLR. Further, Cheng et.al.
[3] introduce a Gloss Feature Enhancement (GFE) to enhance the frame-wise
representation, where GFE is trained to provide a set of alignment proposals
for the frame feature extractor. Notably, FCN+GFE exhibits great potentials
for cSLR, and reduce the WER to a new low.
However, as discussed in previous sections, CNNs are insufficient to capture
local similarities and insensitive to temporal order of a series of video
frames. Built on FCN, our mLTSF-Net additionally introduces a mLTSF module to
address the issues of CNNs for cSLR. As shown in the last two rows in Table 3,
our model outperforms all the other baseline models on WER. Combined with
Gloss Feature Enhancement (GFE), our model can even achieve a better
performance. Such results demonstrate the effectiveness of our proposed mLTSF
module, and our model equipped with GFE achieves the state-of-the-art
performance on the dataset of RWTH-PHOENIX-Weather-2014.
## 6 Ablation Study and Analysis
mLTSF | WER
---|---
DEV | TEST
None | 26.1 | 26.0
$k=8$ | 25.0 | 24.9
$k=12$ | 24.7 | 24.5
$k=16$ | 24.4 | 24.2
$k=20$ | 25.3 | 25.2
$k=\\{8,12\\}$ | 24.3 | 24.5
$k=\\{8,16\\}$ | 23.9 | 24.2
$k=\\{12,16\\}$ | 24.0 | 23.9
$k=\\{8,12,16\\}$ | 23.8 | 23.5
Table 4: The effect of selection region sizes for mLTSF module.
Compared with the FCN framework, our model has an additional module, i.e.,
mLTSF module, which is induced to adaptively fuse the local-temporal features,
in order to capture local semantic consistency. In this section, we will
compare closely with FCN to validate the effectiveness of our proposal.
### 6.1 Single vs Multiple Scales
The main idea of our proposed multi-scale selection regions is to dynamically
adapt to different lengths of gloss. To demonstrate our idea, we evaluate the
performance of our model with different combinations of selection region sizes
in Equation 7 to answer the following two questions: 1) Are multiple scales
are effectively necessary? 2) If necessary, how do the sizes of these scales
influence the overall performance?
The results are shown in Table 4. The 2nd row (None), which represents the
pure FCN and performs the worst, which does not contain our proposed mLTSF
module. Such result indicates that our proposed mLTSF module is effective in
improving the performance over the FCN framework. As we gradually increase the
size from $k=8$ to $k=16$ as shown in Table 4, the performance is promoted
along with such size increase. Particularly, the performance reaches the best
when we set $k$ as 16. This is not surprising since the average length of a
gloss roughly equals to 16. However, when we set $k$ as 20, the performance
becomes much worse. Such performance decline is mostly due to that 20 frames
are usually contain more than on sign gloss, and similar frames which locate
distantly might share little semantic consistency. As a result, the final
representations tend to be indistinguishable for cSLR.
Comparing last four lines with a single scale as illustrated in Table 4, we
see that our model with multiple scales greatly outperforms than single scale.
Especially when we use three scales with the setting as $k={8,12,16}$, our
model achieves the lowest WER. Enhanced with multiple selection regions, our
model is able to seize most salient scale to represent current time-step
feature for downstream sign language recognition. On the other side, since
different gloss is consists of different lengths, our model equipped with
multiple scales are capable of accommodate such phenomenon. To sum up, this
comparison demonstrates that it is recommendable to use multiple scales for
mLTSF module with a setting as $k=\\{8,12,16\\}$.
Feature Selector | WER
---|---
DEV | TEST
FCN | 26.1 | 26.0
global-FS | 26.1 | 26.5
center-FS | 25.3 | 25.0
CFS | 24.4 | 24.2
Table 5: The effect of feature selector.
Method | WER
---|---
DEV | TEST
w/o RPE | 24.8 | 24.7
w/o TCNs | 25.7 | 25.6
mean pooling | 24.6 | 24.4
PTC | 24.4 | 24.2
Table 6: The effect of position-aware temporal convolver.
### 6.2 Analysis on Content-aware Feature Selector
In our proposed mLTSF module, we introduce a content-aware feature selector
(CFS) to dynamically select most similar features in a local region. To
demonstrate its effectiveness, we conduct comparison study to explore two
potential concerns: 1) Compared against a fixed local region, is it necessary
to use content-aware mechanism to dynamically select neighbours based on the
similarity? 2) Is it competent to select similar neighbours from all the whole
sequence globally? To uncover these two doubts, we compare our proposed CFS
with some feature selector variants as shown in Table 5. Note that FCN is the
baseline model where there is no feature selector. For notation, ”center-FS”
stands for that the model simply picks its surrounding left and right
neighbours, where there are 16 neighbours in total. Besides, ”global-FS”
stands for that the model selects top-$k$ similar features from the whole
sequence globally, where $k$ is set as 16. Note that we use a single-scale
receptive region to select top-$k$ similar features locally for a fair
comparison with the variants, where $k$ is also set as 16.
The comparison results are listed in Table 5. It is surprising that global-CFS
even degrades the performance compared with FCN. In such way, the final
aggregated features become indistinguishable, since two similar frames but
locates far away might not share much semantic consistency. On the contrary,
center-FS brings a performance increase over the baseline FCN. This increase
shows that the aggregation of neighbouring local region is a simple yet
effective way, where the model is able to further seize local semantic
consistency. Moreover, our proposed CFS performs the best, which further
demonstrates the importance of concentration of local similar features. This
content-aware mechanism provides a channel to make full use of local semantic
consistency. Besides, this comparison validates the effectiveness of our CFS
component.
### 6.3 Analysis on Position-aware Temporal Convolver
To generate neighborhood-enhanced representation, we propose a position-aware
temporal convolver to ensure the sequential consistency among each scale of
selected features. Specifically, the position-aware temporal convolver (PTC)
is composed of a relative position encoding (RPE), temporal convolutions
(TCNs), and an adaptive max-pooling layer. To testify the influence of each
component, we apply ablation experiments to compare PTC with its variants. As
shown in Table 6, the first two variants are without RPE and TCNs,
respectively. The third variant replaces the adaptive max-pooling layer with
mean pooling. From such comparison, we can see that (1) without RPE, the model
performance is reduced by 0.4/0.5 WER on DEV/TEST. This result validates that
that relative position information is essential for sequence modeling, and
confirms the assertion made by [7] that the CNN filters tend to be insensitive
with temporal dependency. (2) Without TCNs, we aggregate the selected features
only using the max-pooling layer. The performance of our model drops
significantly, showing that temporal convolution is still fundamental for
local-temporal modeling. (3) We replace the adaptive max-pooling with mean-
pooling, where the model tends to become insensitive to the salience. As a
consequence, the performance is decreased by 0.2/0.2 WER. In summary, each
component of PTC is indispensable, and our proposed PTC as a whole can
effectively improve the performance.
### 6.4 Analysis on Content-dependent Multi-scale Aggregator
In order to seize multiple temporal granularities, we introduce a content-
dependent multi-scale aggregator to fuse different scales of selection
regions. To testify if it is necessary to fuse the three scales in a dynamic
way, we conduct an experiment to compare our dynamic method with a static
average one. The experimental results are shown in Table 7. The dynamic method
significantly outperforms the average one in terms of WER. Since different
gloss corresponds to different length, a static average method is insufficient
to catch gloss-level salience. On the contrary, our dynamic method is able to
fuse different scales with salience estimation, and generates a sequence of
distinguishable features for downstream sign language recognition. Finally,
this comparison further demonstrates that a content-dependent assembling
method is an excellent approach for multi-scaled features fusion.
Aggregator Method | WER
---|---
DEV | TEST
average | 24.3 | 23.9
dynamic | 23.8 | 23.5
Table 7: The effect of content-dependent multi-scale aggregator.
Method | WER
---|---
DEV | TEST
non-local sparse attention | 43.0 | 46.6
local sparse attention | 38.2 | 36.6
single-LTSF | 24.4 | 24.2
Table 8: Comparison between single-LTSF and sparse attention.
### 6.5 Our model vs Sparse Attention
Our proposed content-aware feature selector is induced to select top-$k$
similar neighbours. This selection process is similar to Sparse Attention [37,
38, 39], which have been shown great potentials in various tasks. They design
various sparsity patterns, and find similar ones globally from the whole
sequence. However, what is difference from our model is that they aggregate
the selected features by weighted averaging. To verify whether our model is
over designed for cSLR, we compare our model using only a single scale (top-16
similar features) with the sparse attention.
The experimental results are exhibited in Table 8. When comparing the non-
local with local sparse attention, the local one achieves a much better
performance, where the local sparse attention is constrained to attend only in
a local region. This performance promotion further confirms that similar
frames which locate far away do not share much gloss-level consistency. Our
model only using a single scale is named as single-LTSF, which is listed in
the last row of Table 8. Interestingly, single-LTSF outperforms significantly
the other two comparable models. This improvement might due to many reasons,
and we speculate that sparse attention which just uses weighted average is
hard to ensure the temporal consistency with the selected sparse features,
resulting an indistinguishable fusion for downstream sign language
recognition. To sum up, the sparse attention could not model well the task of
cSLR. On the contrary, it is more recommendable to use our proposed mLTSF-Net
for the task of cSLR.
Figure 5: Alignments for a training example by FCN and Ours. The x-axis
represents the alignment with the highest probability among all possible
underlying alignments, where ”-” represents ”blank” symbol. While the y-axis
represents the corresponding probabilities.
### 6.6 Case study
To better understand the effect of our mLTSF-Net, we visualize the alignments
of FCN and our model (FCN + mLTSF) in Figure 5. Particularly, we see that FCN
is more likely to align “blank” tokens to the frames at the boundaries. For
example, the frames around “NOVEMBER” (purple bars) are very similar. However,
FCN does not capture such similarity, and assign a “blank” or gives a very low
probability for “NOVEMBER”. In contrast, our mLTSF-Net performs much better.
Thanks to mLSTF module, our model is able to capture such similarity, and
gives a correct alignment or even assign a much higher probability. This
comparison further demonstrates that our mLTSF module is able to capture local
semantic consistency. This is the most important factor for performance
improvement.
## 7 Conclusion
In this paper, we identify the drawback of fully convolutional network for
cSLR that CNNs would tend to become agnostic to similarity and temporal
consistency, and thus could not model well local semantic consistency in sign
language. To tackle it, we propose a mLTSF-Net which is built upon the FCN
network to fuse temporal similar frames with multiple granularities, in order
to keep consistent semantics in between neighboring frames. On the standard
benchmarking RWTH dataset, we demonstrate that our approach outperforms
several baseline models. The extensive ablation study proves the effectiveness
of our proposed mLTSF-Net for cSLR.
## References
* [1] S. W. Ong, S. Ranganath, Automatic sign language analysis: A survey and the future beyond lexical meaning, IEEE transactions on pattern analysis and machine intelligence 27 6 (2005) 873–91.
* [2] Z. Yang, Z. Shi, X. Shen, Y.-W. Tai, Sf-net: Structured feature network for continuous sign language recognition, ArXiv abs/1908.01341 (2019).
* [3] K. L. Cheng, Z. Yang, Q. Chen, Y.-W. Tai, Fully convolutional networks for continuous sign language recognition, 2020 European Conference on Computer Vision (ECCV) (2020).
* [4] H. Zhou, W. Zhou, Y. Zhou, H. Li, Spatial-temporal multi-cue network for continuous sign language recognition, in: AAAI, 2020.
* [5] H. Su, V. Jampani, D. Sun, O. Gallo, E. Learned-Miller, J. Kautz, Pixel-adaptive convolutional neural networks, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 11166–11175.
* [6] D. Li, C. Xu, X. Yu, K. Zhang, B. Swift, H. Suominen, H. Li, Tspnet: Hierarchical feature learning via temporal semantic pyramid for sign language translation, Advances in Neural Information Processing Systems 33 (2020).
* [7] M. A. Islam, S. Jia, N. D. B. Bruce, How much position information do convolutional neural networks encode?, ArXiv abs/2001.08248 (2020).
* [8] J. Forster, C. Schmidt, O. Koller, M. Bellgardt, H. Ney, Extensions of the sign language recognition and translation corpus rwth-phoenix-weather, in: LREC, 2014\.
* [9] T. D. Nguyen, S. Ranganath, Facial expressions in american sign language: Tracking and recognition, Pattern Recognition 45 (5) (2012) 1877–1891.
* [10] T. Starner, J. Weaver, A. Pentland, Real-time american sign language recognition using desk and wearable computer based video, IEEE Trans. Pattern Anal. Mach. Intell. 20 (1998) 1371–1375.
* [11] N. Habili, C. Lim, A. Moini, Segmentation of the face and hands in sign language video sequences using color and motion cues, IEEE Transactions on Circuits and Systems for Video Technology 14 (2004) 1086–1097.
* [12] L. Wang, R. Wang, D. Kong, B. Yin, Similarity assessment model for chinese sign language videos, IEEE Transactions on Multimedia 16 (2014) 751–761.
* [13] W. Kong, S. Ranganath, Towards subject independent continuous sign language recognition: A segment and merge approach, Pattern Recognition 47 (3) (2014) 1294–1308.
* [14] O. Koller, H. Ney, R. Bowden, Deep hand: How to train a cnn on 1 million hand images when your data is continuous and weakly labelled, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2016) 3793–3802.
* [15] P. Kumar, H. Gauba, P. P. Roy, D. P. Dogra, A multimodal framework for sensor based sign language recognition, Neurocomputing 259 (2017) 21–38.
* [16] N. C. Camgöz, S. Hadfield, O. Koller, R. Bowden, Subunets: End-to-end hand shape and continuous sign language recognition, 2017 IEEE International Conference on Computer Vision (ICCV) (2017) 3075–3084.
* [17] R. Cui, H. Liu, C. Zhang, Recurrent convolutional neural networks for continuous sign language recognition by staged optimization, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017) 1610–1618.
* [18] R. Cui, H. Liu, C. Zhang, A deep neural framework for continuous sign language recognition by iterative training, IEEE Transactions on Multimedia 21 (2019) 1880–1891.
* [19] L. Gao, H. Li, Z. Liu, Z. Liu, L. Wan, W. Feng, Rnn-transducer based chinese sign language recognition, Neurocomputing 434 (2021) 45–54.
* [20] W. Gao, G. Fang, D. Zhao, Y. Chen, A chinese sign language recognition system based on sofm/srn/hmm, Pattern Recognition 37 (12) (2004) 2389–2402.
* [21] O. Koller, S. Zargaran, H. Ney, Re-sign: Re-aligned end-to-end sequence modelling with deep recurrent cnn-hmms, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017) 3416–3424.
* [22] O. Koller, S. Zargaran, H. Ney, R. Bowden, Deep sign: Hybrid cnn-hmm for continuous sign language recognition, in: BMVC, 2016.
* [23] D. Bahdanau, K. Cho, Y. Bengio, Neural machine translation by jointly learning to align and translate, CoRR abs/1409.0473 (2015).
* [24] J. Huang, W. Zhou, Q. Zhang, H. Li, W. Li, Video-based sign language recognition without temporal segmentation, in: AAAI, 2018.
* [25] D. Guo, W. Zhou, H. Li, M. Wang, Hierarchical lstm for sign language translation, in: AAAI, 2018.
* [26] A. Graves, S. Fernández, F. Gomez, J. Schmidhuber, Connectionist temporal classification: labelling unsegmented sequence data with recurrent neural networks, in: ICML ’06, 2006.
* [27] P. Shaw, J. Uszkoreit, A. Vaswani, Self-attention with relative position representations, in: NAACL-HLT, 2018.
* [28] Z. Dai, Z. Yang, Y. Yang, J. Carbonell, Q. V. Le, R. Salakhutdinov, Transformer-xl: Attentive language models beyond a fixed-length context, in: ACL, 2019.
* [29] H. Yan, B. Deng, X. Li, X. Qiu, Tener: Adapting transformer encoder for named entity recognition, ArXiv abs/1911.04474 (2019).
* [30] J. Ba, J. Kiros, G. E. Hinton, Layer normalization, ArXiv abs/1607.06450 (2016).
* [31] D. Hendrycks, K. Gimpel, Gaussian error linear units (gelus), arXiv: Learning (2016).
* [32] Y. Chen, X. Dai, M. Liu, D. Chen, L. Yuan, Z. Liu, Dynamic convolution: Attention over convolution kernels, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020) 11027–11036.
* [33] S. Ioffe, C. Szegedy, Batch normalization: Accelerating deep network training by reducing internal covariate shift, arXiv preprint arXiv:1502.03167 (2015).
* [34] D. P. Kingma, J. Ba, Adam: A method for stochastic optimization, CoRR abs/1412.6980 (2015).
* [35] O. Koller, N. C. Camgoz, H. Ney, R. Bowden, Weakly supervised learning with multi-stream cnn-lstm-hmms to discover sequential parallelism in sign language videos, IEEE Transactions on Pattern Analysis and Machine Intelligence 42 (2020) 2306–2320.
* [36] C. Wei, J. Zhao, W. gang Zhou, H. Li, Semantic boundary detection with reinforcement learning for continuous sign language recognition, IEEE Transactions on Circuits and Systems for Video Technology 31 (2021) 1138–1149.
* [37] R. Child, S. Gray, A. Radford, I. Sutskever, Generating long sequences with sparse transformers, ArXiv abs/1904.10509 (2019).
* [38] I. Beltagy, M. E. Peters, A. Cohan, Longformer: The long-document transformer, ArXiv abs/2004.05150 (2020).
* [39] H.-Y. Zhou, S. Zhang, J. Peng, S. Zhang, J. Li, H. Xiong, W. Zhang, Informer: Beyond efficient transformer for long sequence time-series forecasting, in: AAAI, 2021.
| arxiv-papers | 2021-07-27T12:06:56 | 2024-09-04T03:07:21.403017 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Pan Xie, Zhi Cui, Yao Du, Mengyi Zhao, Jianwei Cui, Bin Wang, Xiaohui\n Hu",
"submitter": "Pan Xie",
"url": "https://arxiv.org/abs/2107.12762"
} |
2107.12767 | # Pointwise A Priori Estimates for Solutions to Some p-Laplacian Equations
Xiaoqiang Sun111 School of Mathematics, Sun Yat-sen University, Guangzhou,
510275, China. ⊠ Jiguang Bao222 School of Mathematical Sciences, Beijing
Normal University, Laboratory of Mathematics and Complex Systems, Ministry of
Education, Beijing 100875, China. Emails: [email protected],
[email protected] $\boxtimes$ Corresponding author
###### Abstract
In this paper, we apply blow-up analysis to study pointwise a priori estimates
for some p-Laplace equations based on Liouville type theorems. With newly
developed analysis techniques, we first extend the classical results of
interior gradient estimates for the harmonic function to that for the
p-harmonic function, i.e., the solution of $\Delta_{p}u=0,\ x\in\Omega$. We
then obtain singularity and decay estimates of the sign-changing solution of
Lane-Emden-Fowler type p-Laplace equation $-\Delta_{p}u=|u|^{\lambda-1}u,\
x\in\Omega$, which are then extended to the equation with general right hand
term $f(x,u)$ with certain asymptotic properties. In addition, pointwise
estimates for higher order derivatives of the solution to Lane-Emden type
p-Laplace equation, in a case of $p=2$, are also discussed.
## 1 Introduction
p-Laplacian equation arises in many studies of non-linear phenomena, for
instance, in mathematical modeling of non-Newtonian fluids in physics [1, 2],
and in the theory of quasi-regular, quasi-conformal mappings in geometry [3,
4, 5]. The p-Laplacian equation represents an important type of quasi-linear
equations. It has the following form
$-\Delta_{p}u=f(x,u),\qquad x\in\Omega$ (1.1)
where $\Omega$ is a domain in $\mathbb{R}^{N}$, and
$\Delta_{p}u:=div(|\nabla u|^{p-2}\nabla u),\qquad 1<p<\infty$
is p-Laplace operator. When $p=2$, $\Delta_{p}u$ is Laplace operator.
$\Delta_{p}u$ is degenerate elliptic when $p>2$ and has singularity when
$p<2$.
We call $u\in C^{1}(\Omega)$ as a weak solution of (1.1), if
$\int_{\Omega}|\nabla u|^{p-2}(\nabla
u,\nabla\varphi)dx=\int_{\Omega}f(x,u)\varphi dx,\qquad\forall\varphi\in
C_{c}^{\infty}(\Omega).$ (1.2)
In this paper we assume $f\in C^{1}(\mathbb{R}^{N})$. In the following text, a
weak solution always refers to that defined above with $C^{1,\alpha}_{loc}$
regularity.
###### Remark 1.1.
Although weak solutions in other weaker forms could be defined as well, for
example $u\in W^{1,m}_{loc}(\Omega)\cap L^{\infty}_{loc}(\Omega)$ [1], or
$C^{1,\alpha}_{loc}$ weak solution [6], however, we can deduce that these
definitions are equivalent to each other due to the following established
conclusion on regularity [7, 8, 1, 9]: _If $u\in C^{1}$ is a weak solution of
(1.1), then there exists $\beta\in(0,1)$ such that $u\in
W^{2,2}_{loc}(\Omega)\cap C^{1,\beta}_{loc}(\Omega).$ _
When $f$=0, Eq. (1.1) becomes
$-\Delta_{p}u=0,\qquad x\in\Omega.$ (1.3)
The solution $u$ of (1.3) is called p-harmonic function. In the case of $p=2$,
it is well-known harmonic function, satisfying the following Laplace equation
$-\Delta u=0,\qquad x\in\Omega.$ (1.4)
For harmonic function, the following pointwise interior estimate of its
gradient [10] can be derived via Poisson integrative formula or mean vale
theorem:
$|\nabla u(x)|\leq N\cdot\sup_{\Omega}|u|\cdot
dist^{-1}(x,\partial\Omega),\qquad\forall x\in\Omega.$ (1.5)
A natural question is that whether the above gradient estimate for harmonic
function can be extended to that for p-harmonic function? We will seek to
answer it in this paper.
On the other hand, when $f$ has the form of $u^{\lambda}$, then Eq. (1.1)
becomes the following Lane-Emden type equation
$-\Delta_{p}u=u^{\lambda},\qquad x\in\Omega.$ (1.6)
J. Serrin and H. Zou [1] proved the Liouville type theorems of (1.6), i.e.
nonexistence of the nonnegative nontrivial solution on the whole space
$\mathbb{R}^{N}$. Based on the Liouville type theorems, P. Polacik, P.
Quittner and P. Souplet [11] obtained the following singularity and decay
estimates for the nonnegative weak solution of (1.6) by applying the method of
blow-up analysis:
_Let $0<p-1<\lambda<\Lambda_{s}(p),$ and let $\Omega\neq\mathbb{R}^{N}$ be a
domain, then there exists a constant $C=C(p,N,\lambda)>0$ $($independent of
$\Omega$ and $u),$ such that any $($ nonnegative weak $)$ solution $u$ of
(1.6) satisfies_
$u(x)+|\nabla u(x)|^{\frac{p}{\lambda+1}}\leq
Cdist^{-\frac{p}{\lambda+1-p}}(x,\partial\Omega),\qquad\forall x\in\Omega$
(1.7)
where,
$\Lambda_{s}(p):=\begin{cases}\frac{N(p-1)+p}{n-p},\qquad\qquad ifN>p\\\
\infty,\qquad\qquad\qquad ifN\leq p\end{cases}$ (1.8)
is the corresponding Sobolev critical exponent ([12, 13]).
Again, we are curious about that whether the decay estimates (1.7) could be
obtained for the following Lane-Emden-Fowler type p-Laplacian equation [8]
$-\Delta_{p}u=|u|^{\lambda-1}u,\qquad x\in\Omega.$ (1.9)
To answer the above two questions, we here develop new analytic techniques to
get pointwise a priori estimates for the solution and/or gradient of some
types of quasilinear equations by coupling blow up analysis with Liouville-
type theorems. In this paper, we first extend the interior estimates for the
gradient of harmonic function to p-harmonic function. Subsequently, we study
the singularity and decay estimates of the sign-changing solutions of the
Lane-Emden-Fowler type p-Laplacian equation, $-\Delta_{p}u=|u|^{\lambda-1}u$.
Furthermore, we also discuss the pointwise a priori estimates for higher order
derivatives of solution to $-\Delta u=u^{\lambda},x\in\Omega$, i.e., the Lane-
Emden type p-Laplacian equation in the case of $p=2$. Different from the
estimates in the form of $L^{p}$ norm or $C^{\alpha}$ seminorm, the pointwise
a priori estimates deduced in this paper have some interesting features: (1)
$dist^{-1}(x,\partial\Omega)$ is explicitly expressed in the right hand of the
estimates. (2) The constant $C$ in the right hand of the estimates depends
only on the exponents in the equation ($p$, $N$ and/or $\lambda$), and is
independent of domain $\Omega$ and solution $u$. In this sense the pointwise
estimates are also universal.
## 2 Main Results
### 2.1 Interior estimates of gradient of p-harmonic function
###### Theorem 2.1.
Let $p\in(1,\infty)$, and let $\Omega$ be a bounded domain in $\mathbb{R}^{N}$
$(N\geq 2)$. Then there exists a constant $C=C(p,N)>0$, such that any $C^{1}$
weak solution $u$ of
$\Delta_{p}u=0,\qquad x\in\Omega,$
satisfies
$|\nabla u(x)|\leq C\sup_{\Omega}|u|\cdot
dist^{-1}(x,\partial\Omega),\qquad\forall x\in\Omega.$ (2.1)
###### Remark 2.1.
This result extends the classical interior estimates (1.5) of gradient of the
harmonic function [10].
### 2.2 Singularity estimates for Lane-Emden-Fowler type equation
For Lane-Emden-Fowler type equation
$-\Delta_{p}u=|u|^{\lambda-1}u,\qquad x\in\Omega,$ (2.2)
according to (1.2), we say $u\in C^{1}(\Omega)$ is a weak solution of (2.2),
if
$\int_{\Omega}|\nabla u|^{p-2}(\nabla
u,\nabla\varphi)dx=\int_{\Omega}|u|^{\lambda-1}u\varphi
dx,\qquad\forall\varphi\in C_{c}^{\infty}(\Omega).$ (2.3)
A weak solution is called "stable" if the second variation of energy function
of (2.2) is nonnegative. More specifically, we have the following definition
[8].
###### Definition 2.1.
Denote
$L_{u}(v,\varphi)=\int_{\Omega}|\nabla u|^{p-2}(\nabla
v,\nabla\varphi)dx+\int_{\Omega}(p-2)|\nabla u|^{p-4}(\nabla u,\nabla
v)\cdot(\nabla v,\nabla\varphi)-\lambda|u|^{\lambda-1}v\varphi dx.$
The weak solution $u\in C^{1}$ of (2.2) is called stable, if
$L_{u}(\varphi,\varphi)\geq 0,\qquad\forall\varphi\in C_{c}^{1}(\Omega).$
(2.4)
Accordingly, the weak solution $u\in C^{1}$ of (2.2) is called stable outside
a compact set $K\subset\Omega$, if
$L_{u}(\varphi,\varphi)\geq 0,\qquad\forall\varphi\in
C_{c}^{1}(\Omega\setminus K).$ (2.5)
###### Remark 2.2.
If $u$ has finite Morse index, then $u$ is stable outside a compact set.
###### Theorem 2.2.
Let $p>2$, and let $\Omega\neq\mathbb{R}^{N}$ be an arbitrary domain of
$\mathbb{R}^{N}$. If
$\begin{cases}p-1<\lambda<\infty,\qquad\qquad\ \ if\
N\leq\frac{p(p+3)}{p-1},\\\ p-1<\lambda<\Lambda_{c}(N,p),\qquad if\
N>\frac{p(p+3)}{p-1},\\\ \end{cases}$ (2.6)
then there exists $C=C(p,N,\lambda)>0$ $($independent of $\Omega$ and $u$ $)$,
such that any stable weak solution $u\in C^{1}(\Omega)$ of (2.2) satisfies
$|u(x)|+|\nabla u(x)|^{\frac{p}{\lambda+1}}\leq
Cdist^{-\frac{p}{\lambda+1-p}}(x,\partial\Omega),\qquad\forall x\in\Omega.$
(2.7)
###### Remark 2.3.
This theorem expands the estimates of singularity and decay for nonnegative
solution of Lane-Emden type equation in [11] to that for sign-changing
solution of Lane-Emden-Fowler type equation, under the condition of
"stability" of the weak solution.
###### Theorem 2.3.
Let $p>2$, and let $\Omega\neq\mathbb{R}^{N}$ be an arbitrary domain of
$\mathbb{R}^{N}$, if
$\begin{cases}p-1<\lambda<\infty,\qquad\qquad\ ifN\leq p,\\\
p-1<\lambda<\frac{N(p-1)+p}{N-p},\qquad ifN>p,\\\ \end{cases}$ (2.8)
then there exists $C=C(p,N,\lambda)>0$ (independent of $\Omega$ and $u$), such
that any weak solution $u\in C^{1}(\Omega)$ of (2.2) which is stable outside a
compact set $K\subset\mathbb{R}^{N}$ satisfies
$|u(x)|+|\nabla u(x)|^{\frac{p}{\lambda+1}}\leq
Cdist^{-\frac{p}{\lambda+1-p}}(x,\partial\Omega),\qquad\forall x\in\Omega.$
(2.9)
The conclusions in the above two theorems can be extended for the following
equation:
$-\Delta_{p}u=f(u),\qquad x\in\Omega.$ (2.10)
###### Corollary 2.4.
Assume that the relations between $N,p,\lambda$ are the same as that in
Theorem 2.2. Let $\Omega\neq\mathbb{R}^{N}$ be an arbitrary domain of
$\mathbb{R}^{N}$, and let $f$ satisfy
$\lim_{u\rightarrow\infty}|u|^{1-\lambda}u^{-1}f(u)=l\in(0,+\infty).$ (2.11)
If $u\in C^{1}(\Omega)$ is a weak solution of (2.10) and satisfies (2.4), then
there exists $C=C(p,N,\lambda,f)>0$ (independent of $\Omega$ and $u$), such
that
$|u(x)|+|\nabla u(x)|^{\frac{p}{\lambda+1}}\leq
C(1+dist^{-\frac{p}{\lambda+1-p}}(x,\partial\Omega)),\qquad\forall
x\in\Omega.$ (2.12)
###### Corollary 2.5.
Assume that the relations between $N,p,\lambda$ are the same as that in
Theorem 2.3. Let $\Omega\neq\mathbb{R}^{N}$ be an arbitrary domain of
$\mathbb{R}^{N}$. Assume that $f$ satisfies
$\lim_{u\rightarrow\infty}|u|^{1-\lambda}u^{-1}f(u)=l\in(0,+\infty).$ (2.13)
If $u\in C^{1}(\Omega)$ is a weak solution of (2.10) and satisfies (2.5), then
there exists $C=C(p,N,\lambda,f)>0$ $($independent of $\Omega$ and $u)$, such
that
$|u(x)|+|\nabla u(x)|^{\frac{p}{\lambda+1}}\leq
C(1+dist^{-\frac{p}{\lambda+1-p}}(x,\partial\Omega)),\qquad\forall
x\in\Omega.$ (2.14)
### 2.3 Estimates of higher order derivatives
###### Theorem 2.6.
Let $n\geq 2$, $1<\lambda<\lambda_{s}$ , here,
$\lambda_{s}:=\begin{cases}\frac{n+2}{n-2},\quad if\ N>2,\\\ \infty,\quad if\
N=2,\\\ \end{cases}$ (2.15)
and let $\Omega$ be an arbitrary domain in $\mathbb{R}^{N}$,
$\Omega\neq\mathbb{R}^{n}$. Then for any nonnegative integer $s$, there exists
$C=C(p,N,\lambda,s)>0$ (independent of $\Omega$ and $u$) such that any
nonnegative smooth solution $u$ of
$-\Delta u=u^{\lambda},\qquad x\in\Omega,$ (2.16)
satisfies
$\sum_{r=0}^{s}|\nabla^{r}u(x)|^{\frac{\lambda-1}{(\lambda-1)r+2}}\leq
Cdist^{-1}(x,\partial\Omega),\qquad\forall x\in\Omega.$ (2.17)
###### Remark 2.4.
The requirements for the regularity of solution actually only need $u\in
C^{s}(\Omega)$. What’s more, in fact, the requirements for the regularity of
solution can be relaxed by applying the regularity theory of elliptic
equation.
###### Remark 2.5.
For the equation with general right hand term $f$ that satisfies corresponding
asymptotic conditions, by using the same method one can obtain the estimates
of higher order derivatives of the solutions. The details are omitted here.
###### Remark 2.6.
Compared to the singularity and decay estimates of the solutions to elliptic
equations that have been obtained in previous studies (e.g., [14]), our result
presented here gives a more precise estimate for higher order derivatives of
the solution to p-Laplacian equation.
## 3 Lemmas
In this section , we first introduce Liouville theorem for p-harmonic function
[1].
###### Lemma 3.1.
Let $u$ be a nonnegative weak solution of
$\Delta_{p}u=0,\qquad x\in\mathbb{R}^{N}\qquad(n>p)$
or
$\Delta_{p}u\leq 0,\qquad x\in\mathbb{R}^{N}\qquad(n\geq 2)$
then $u$ is constant.
For Lane-Emden-Fowler type equation (2.2), the following Liouville type
theorems have been established in [8].
###### Lemma 3.2.
Let $u\in C^{1}(\mathbb{R}^{N})$ be a stable weak solution of (2.2), $p>2$, if
$\begin{cases}p-1<\lambda<\infty,\qquad\qquad ifN\leq\frac{p(p+3)}{p-1},\\\
p-1<\lambda<\Lambda_{c}(N,p),\qquad ifN>\frac{p(p+3)}{p-1},\\\ \end{cases}$
(3.1)
here,
$\Lambda_{c}(N,p)=\frac{[(p-1)N-p]^{2}+p^{2}(p-2)-p^{2}(p-1)N+2p^{2}\sqrt{(p-1)(N-1)}}{(N-p)[(p-1)N-p(p+3)]}.$
(3.2)
then $u\equiv 0.$
###### Lemma 3.3.
Let $u\in C^{1}(\mathbb{R}^{N})$ be a weak solution of (2.2) which is stable
outside of a compact set of $K$, $p>2$, if
$\begin{cases}p-1<\lambda<\infty,\qquad\qquad ifN\leq p,\\\
p-1<\lambda<\frac{N(p-1)+p}{N-p},\qquad ifN>p,\\\ \end{cases}$ (3.3)
then $u\equiv 0.$
Along with the above Liouville type theorems, the following "Doubling lemma"
proposed in [11] also plays an important role in blow-up analysis for the
proof in this paper.
###### Lemma 3.4.
Let $(X,d)$ be a compact metric space and let $D\subset\Sigma\subset X$, where
$D$ is non-empty and $\Sigma$ is closed. Set $\Gamma:=\Sigma\setminus D$. Let
$M:D\rightarrow(0,\infty)$ be bounded on compact subset of $D$, and fix a real
$k>0$. If $y\in D$ satisfies
$M(y)dist(y,\Gamma)>2k,$
then there exists $x\in D$ such that
$M(x)dist(x,\Gamma)>2k,\qquad M(x)\geq M(y),$
and
$M(z)\leq 2M(x),\qquad\forall z\in D\cap\overline{B}(x,kM^{-1}(x)).$
In addition, we present here the following result regarding the convergence of
weak stable solutions of the p-Laplacian equation, which will be used in
proofs of Theorems 2.2 and 2.3 .
###### Lemma 3.5.
Let $\Omega_{k}\upuparrows\mathbb{R}^{N},K$ be a compact subset in
$\mathbb{R}^{N}$. Assume that $u_{k}$ are a set of weak solutions to (2.2) on
$\Omega_{k}$, $k=1,2,\cdots$, respectively and that $($as $k$ large enough$)$
$u_{k}$ is stable outside of $K$. If
$u_{k}\rightarrow u\qquad in\ C_{loc}^{1,\alpha}(\mathbb{R}^{N}),$
then $u$ is a weak solution of (2.2) and is stable outside of $K$.
## 4 Proofs
In this section we apply the method of blow-up analysis to derive pointwise
estimates. The method of blow-up is an efficient approach to deduce estimates
in partial differential equations, which has been applied by many scholars in,
for example, [15, 11, 16]. The corresponding Liouville type theorems ( e.g.
[17, 10, 8, 15, 1, 14]) are important basis of this method. This method can be
briefly described as follows: by proof of contradiction, assuming that an
estimate (in terms of the distance to $\partial\Omega$) fails, we could
construct an appropriate auxiliary function and use "doubling" property, then
the sequence of violating solutions $u_{k}$ will be increasingly large along a
sequence of points $x_{k}$, such that each $x_{k}$ has a suitable neighborhood
where the relative growth of $u_{k}$ remains controlled. After appropriate
rescaling, we can blow up the sequence of neighborhoods and pass to the limit
to obtain a bounded solution of a limiting problem in the whole of
$\mathbb{R}^{N}$ based on $L^{p}$ estimates or $C^{\alpha}$ estimates. By
applying Liouville type theorems to the limiting equation we finally derive a
contradiction.
### 4.1 The proof of Theorem 2.1
###### Proof of Theorem2.1.
Under the same condition with that in Theorem 2.1, we just need to prove the
following estimate: $\forall\epsilon\in(0,1)$, there exists a constant
$C=C(p,N)$, such that any $C^{1}$ weak solution $u$ of
$\Delta_{p}u=0,\qquad x\in\Omega,$
satisfies
$|\nabla u(x)|\leq C\sup_{\Omega}|u|\cdot diam^{\epsilon}(\Omega)\cdot
dist^{-(1+\epsilon)}(x,\partial\Omega),\qquad\forall x\in\Omega.$ (4.1)
Assume $u\geq 0$, otherwise let
$w=u+sup_{\Omega}|u|,$
then $w\geq 0$, and
$\Delta_{p}w=0,\qquad x\in\Omega.$
If for $w,$ (4.1) holds, then for $u$ and $\forall x\in\Omega$ we have
$\displaystyle|\nabla u(x)|$ $\displaystyle=|\nabla w(x)|\leq
C\mathop{\sup_{\Omega}}|w|\cdot diam^{\epsilon}(\Omega)\cdot
dist^{-1+\epsilon}(x,\partial\Omega)$ $\displaystyle\leq
C\mathop{\sup_{\Omega}}|u|\cdot diam^{\epsilon}(\Omega)\cdot
dist^{-(1+\epsilon)}(x,\partial\Omega).$
Moreover, we assume $\mathop{\sup_{\Omega}}|u|\cdot
diam^{\epsilon}(\Omega)=1$. Otherwise, let
$\widetilde{w}=\frac{u}{\mathop{\sup_{\Omega}}|u|\cdot
diam^{\epsilon}(\Omega)},$
then $\mathop{\sup_{\Omega}}|\widetilde{w}|\cdot diam^{\epsilon}(\Omega)=1$,
and
$\Delta_{p}\widetilde{w}=0,\qquad x\in\Omega.$
If for $\widetilde{w}$, (4.1) holds, then for $u$, by
$\frac{|\nabla u(x)|}{\mathop{\sup_{\Omega}}|u|\cdot
diam^{\epsilon}(\Omega)}=|\nabla\widetilde{w}(x)|\leq
Cdist^{-(1+\epsilon)}(x,\partial\Omega),$
we know that
$|\nabla u(x)|\leq C\sup_{\Omega}|u|\cdot diam^{\epsilon}(\Omega)\cdot
dist^{-1+\epsilon}(x,\partial\Omega),\qquad\forall x\in\Omega.\\\ $ (4.2)
Therefore, we only need to prove that if $u$ satisfies $\Delta_{p}u=0$ on
$\Omega$, and $u\geq 0,\sup_{\Omega}|u|\cdot diam(\Omega)=1$, then there holds
$|\nabla u(x)|\leq C\cdot dist^{-(1+\epsilon)}(x,\partial\Omega),\qquad\forall
x\in\Omega.$ (4.3)
If (4.3) fails, then for $k=1,2,\cdots$, there exist sequences
$\Omega_{k},u_{k},y_{k}\in\Omega_{k}$ and $\epsilon_{k}\in(0,1)$, such that
$u_{k}$ is nonnegative $C^{1}$ weak solution of $\Delta_{p}u=0$ on
$\Omega_{k}$, with $\displaystyle{\sup_{\Omega_{k}}u_{k}\cdot
diam^{\epsilon_{k}}(\Omega_{k})=1}$, and the function
$M_{k}:=|\nabla u_{k}|^{\frac{1}{1+\epsilon_{k}}}$
satisfies
$M_{k}(y_{k})>2kdist^{-1}(y_{k},\partial\Omega_{k}).$
By Lemma 3.4, it follows that $\exists x_{k}\in\Omega_{k}$, such that
$M_{k}(x_{k})>2kdist^{-1}(x_{k},\partial\Omega_{k}),$
and
$M_{k}(z)\leq 2M_{k}(x_{k}),\quad\forall z:|z-x_{k}|\leq kM_{k}^{-1}(x_{k}).$
Let $\lambda_{k}:=M_{k}^{-1}(x_{k})$, and we rescale $u_{k}$ by setting
$v_{k}(y):=k^{\epsilon_{k}}\lambda_{k}^{\epsilon_{k}}\cdot
u_{k}(x_{k}+\frac{1}{k^{\epsilon_{k}}}\lambda_{k}y),\qquad\forall y:|y|\leq
k.$
Note that as $|y|\leq k$,
$|\frac{1}{k^{\epsilon_{k}}}\cdot\lambda_{k}y|\leq\frac{1}{k^{\epsilon_{k}}}\cdot\frac{1}{2k}dist(x_{k},\partial\Omega_{k})\cdot
k^{1+\epsilon_{k}}=\frac{1}{2}dist(x_{k},\partial\Omega_{k}),$
thus $x_{k}+\frac{1}{k^{\epsilon_{k}}}\cdot\lambda_{k}y\in\Omega_{k}$. As
such, $v_{k}$ is well defined. Meanwhile we have
$\displaystyle|v_{k}(y)|$
$\displaystyle=k^{\epsilon_{k}}\lambda_{k}^{\epsilon_{k}}\cdot
u_{k}(x_{k}+\frac{1}{k^{\epsilon_{k}}}\lambda_{k}y)$ $\displaystyle\leq
k^{\epsilon_{k}}\cdot(\frac{1}{2k})^{\epsilon_{k}}\cdot
dist^{\epsilon_{k}}(x_{k},\partial\Omega_{k})\cdot\sup_{\Omega_{k}}u_{k}$
$\displaystyle\leq(\frac{1}{2})^{\epsilon_{k}}\cdot\sup_{\Omega_{k}}u_{k}\cdot
diam^{\epsilon_{k}}(\Omega_{k})$
$\displaystyle=(\frac{1}{2})^{\epsilon_{k}}\leq 1,$ $\displaystyle|\nabla
v_{k}(y)|$ $\displaystyle=\lambda_{k}^{1+\epsilon_{k}}\cdot|\nabla
u_{k}(x_{k}+\frac{1}{k^{\epsilon_{k}}}\lambda_{k}y)|$
$\displaystyle=M_{k}(x_{k})^{-(1+\epsilon_{k})}\cdot
M_{k}(x_{k}+\frac{1}{k^{\epsilon_{k}}}\lambda_{k}y)^{1+\epsilon_{k}}\leq
4,\qquad\forall y:|y|\leq k$ $\displaystyle|\nabla v_{k}(0)|$
$\displaystyle=1,$
and
$\Delta_{p}v_{k}(y)=div(|\nabla v_{k}|^{p-2}\cdot\nabla
v_{k})=(\lambda_{k}^{1+\epsilon_{k}})^{p-1}\cdot\Delta_{p}u_{k}=0,$ (4.4)
that is, $v_{k}$ solves
$\Delta_{p}v_{k}=0,\qquad x\in B_{k}(0).$
By using $C^{\alpha}$ estimates, we deduce that there exist $\beta\in(0,1)$
and constant $C$ (independent of $k$) such that
$\parallel v_{k}\parallel_{C_{loc}^{1+\beta}}\leq C.$
Therefore there exist a subsequence of ${v_{k}}$, still denoted by ${v_{k}}$,
such that
$v_{k}\rightarrow v\qquad in\ C_{loc}^{1}(\mathbb{R}^{N}),$ (4.5)
and at point $0$, $v$ satisfies
$|\nabla v(0)|=1.$ (4.6)
By (4.4) it follows that $v$ satisfies
$\Delta_{p}v=0,\qquad x\in\mathbb{R}^{N}.$
By Liouville theorem (Lemma 3.1) we deduce that
$v=const,\qquad x\in\mathbb{R}^{N}.$
So $|\nabla v|\equiv 0$ in $\mathbb{R}^{N}$, this contradicts with (4.6).
Therefore (4.3) holds and we have proved Theorem 2.1.
∎
###### Remark 4.1.
In the above proof, we used an approximation method to get the estimate by
first relaxing the inequality through introducing $\epsilon$ in (4.1) and then
taking limit, which is a critical step since we found that it was hard to
apply blow up analysis for the estimate (2.1) directly.
### 4.2 The proof of Theorem 2.2
###### Proof of Lemma 3.5.
$\forall\varphi\in C_{c}^{1}(\mathbb{R}^{N}\setminus K)$, let
$V=supp\varphi\subset\mathbb{R}^{N}\setminus K$, $V\subset\Omega_{k}$ as $k$
large enough. We first prove that $u$ satisfies (2.3). In fact, as $k$ large
enough,
$\displaystyle|\int_{V}|\nabla u_{k}|^{p-2}(\nabla
u_{k},\nabla\varphi)dx-\int_{V}|\nabla u|^{p-2}(\nabla u,\nabla\varphi)dx|$
$\displaystyle\leq\int_{V}(|\nabla u_{k}|-|\nabla u|)^{p-2}(\nabla
u_{k},\nabla\varphi)dx+\int_{V}|\nabla u|^{p-2}(\nabla u_{k}-\nabla
u,\nabla\varphi)dx\rightarrow 0,\qquad(k\rightarrow\infty).$
We next prove
$L_{u_{k}}(\varphi,\varphi)\rightarrow
L_{u}(\varphi,\varphi)\qquad(k\rightarrow\infty).$ (4.7)
In fact, as $k$ large enough,
$\displaystyle|\int_{V}|\nabla
u_{k}|^{p-2}|\nabla\varphi|^{2}dx-\int_{V}|\nabla
u|^{p-2}|\nabla\varphi|^{2}dx|$
$\displaystyle\leq\displaystyle\max_{V}(|\nabla u_{k}|^{p-2}|-|\nabla
u|^{p-2}|)\int_{V}|\nabla\varphi|^{2}dx\rightarrow
0,\qquad(k\rightarrow\infty).$
Similarly,
$\int_{V}|u_{k}|^{\lambda-1}\varphi^{2}dx\rightarrow\int_{V}|u|^{\lambda-1}\varphi^{2}dx,\qquad(k\rightarrow\infty).$
Moreover,
$\displaystyle|\int_{V}|\nabla u_{k}|^{p-4}|(\nabla
u_{k},\nabla\varphi)|^{2}dx-\int_{V}|\nabla u|^{p-4}|(\nabla
u,\nabla\varphi)|^{2}dx|$ $\displaystyle\leq\int_{V}(|\nabla u_{k}|-|\nabla
u|)^{p-4}|(\nabla u_{k},\nabla\varphi)|^{2}dx+\int_{V}|\nabla u|^{p-4}(\nabla
u_{k}+\nabla u,\nabla\varphi)(\nabla u_{k}-\nabla u,\nabla\varphi)dx$
$\displaystyle\rightarrow 0\qquad(k\rightarrow\infty).$
Therefore,
$L_{u_{k}}(\varphi,\varphi)\rightarrow L_{u}(\varphi,\varphi)\geq
0\qquad(k\rightarrow\infty).$ (4.8)
So $u$ is a weak solution to (2.2) and is stable outside of $K$ according to
the Definition 2.1. ∎
###### Proof of Theorem 2.2.
Let $\alpha=\frac{p}{\lambda+1-p}$. Assume that estimate (2.9) fails, then
there exist sequences $\Omega_{k},u_{k},y_{k}\in\Omega_{k}$ $(k=1,2,\cdots)$,
such that each $u_{k}$ is a stable weak solution of (2.2) on $\Omega_{k}$ and
functions
$M_{k}:=|u_{k}|^{\frac{1}{\alpha}}+|\nabla
u_{k}|^{\frac{1}{(\alpha+1)}},\qquad k=1,2,\cdots,$
satisfy
$M_{k}(y_{k})>2kdist^{-1}(y_{k},\partial\Omega_{k}).$
By Lemma 3.4 it follows that $\exists x_{k}\in\Omega_{k}$, such that
$M_{k}(x_{k})>2kdist^{-1}(x_{k},\partial\Omega_{k}),$ $M_{k}(z)\leq
2M_{k}(x_{k}),\quad\forall z:|z-x_{k}|\leq kM_{k}^{-1}(x_{k}).$
Let $\lambda_{k}:=M_{k}^{-1}(x_{k})$, and rescale $u_{k}$ by setting
$v_{k}(y):=\lambda_{k}^{\alpha}u_{k}(x_{k}+\lambda_{k}y),\qquad\forall
y:|y|\leq k.$
Note that $(p-1)(\alpha+1)+1=\lambda\alpha$. It’s easy to verify that $v_{k}$
is a stable weak solution of
$-\Delta_{p}v_{k}=|v_{k}|^{\lambda-1}v_{k},\qquad y\in B_{k}(0)$ (4.9)
and
$[|v_{k}|^{\frac{1}{\alpha}}+|\nabla
v_{k}|^{\frac{1}{(\alpha+1)}}](0)=1,\qquad\qquad$ (4.10)
$[|v_{k}|^{\frac{1}{\alpha}}+|\nabla v_{k}|^{\frac{1}{(\alpha+1)}}](y)\leq
2,\qquad|y|\leq k.$ (4.11)
By using $C_{loc}^{1,\beta}$ estimates of p-Laplacian equation, we know
$\exists\beta\in(0,1)$ and $C$ (independent of $k$$)$ such that
$\parallel v_{k}\parallel_{C_{loc}^{1+\beta}}\leq C,\qquad\forall
k=1,2,\cdots.$
By Arzela-Ascolli Theorem, it follows that there exist a subsequence of
${v_{k}}$, still denoted by ${v_{k}}$, such that
$v_{k}\rightarrow v\qquad in\ C_{loc}^{1}(\mathbb{R}^{N}).$ (4.12)
and by (4.9) we deduce that $v$ satisfies
$\Delta_{p}v=|v|^{\lambda-1}v,\qquad x\in\mathbb{R}^{N}.$ (4.13)
By Lemma 3.5, $v$ is a stable weak solution of $\eqref{v22}$. By Lemma 3.2 we
know that
$v=0,\qquad x\in\mathbb{R}^{N}.$
But by (4.10) it follows that
$[|v|^{\frac{1}{\alpha}}+|\nabla v|^{\frac{1}{(\alpha+1)}}](0)=1.$ (4.14)
Contradiction is derived. As such we have proved Theorem 2.2. ∎
###### Proof of Theorem 2.3.
By applying the same procedure in proof of Theorem 2.2, it is easy to deduce
the conclusion by Lemma 3.3 and Lemma 3.5. ∎
###### Proofs of Corollary 2.4 and Corollary 2.5.
Similar to the proofs of Theorem 2.2 and Theorem 2.3, the difference lies in
that
$M_{k}(y_{k})>2k(1+dist^{-1}(y_{k},\partial\Omega_{k}))>2kdist^{-1}(y_{k},\partial\Omega_{k}),$
and
$\lambda_{k}\rightarrow 0\quad(k\rightarrow\infty).$
$v_{k}$ solves
$-\Delta_{p}v_{k}(y)=f_{k}(v_{k}(y)):=\lambda_{k}^{(\alpha+1)(p-1)+1}f(\lambda_{k}^{-\alpha
v_{k}(y)}),\qquad|y|\leq k.$ (4.15)
By using $C^{\alpha}$ estimates, we deduce that there exist $\beta\in(0,1)$
and constant $C($independent of $k$$)$ such that
$\parallel v_{k}\parallel_{C_{loc}^{1+\beta}}\leq C,\qquad\forall
k=1,2,\cdots.$
Therefore there exist a subsequence of ${v_{k}}$, still denoted by ${v_{k}}$,
such that
$v_{k}\rightarrow v\qquad in\ C_{loc}^{1}(\mathbb{R}^{N}),$ (4.16)
and by (4.15) we deduce that $v$ satisfies (4.10)-(4.11) and solves
$\Delta_{p}v=l\cdot|v|^{\lambda-1}v,\qquad x\in\mathbb{R}^{N}.$ (4.17)
By Liouville theorems $($Lemma 3.2 and Lemma 3.3$)$ we know
$v=0,\qquad x\in\mathbb{R}^{N}.$
The contradiction is also derived. ∎
###### Proofs of Theorem 2.6.
Assume that (2.17) fails, then, there exist sequences
$\Omega_{k},u_{k},y_{k}\in\Omega_{k}$ $(k=1,2,\cdots)$, such that each $u_{k}$
is a smooth solution of $-\Delta u=u^{\lambda}$ on $\Omega_{k}$, and functions
$M_{k}:=\sum_{r=0}^{s}|\nabla^{r}u_{k}|^{\frac{1}{\alpha+r}},\qquad
k=1,2,\cdots,$ (4.18)
satisfy
$M_{k}(y_{k})>2kdist^{-1}(y_{k},\partial\Omega_{k}),$
where $\alpha=\frac{2}{\lambda-1}$.
By Lemma 3.4 it follows that there exists $x_{k}\in\Omega_{k}$, such that
$M_{k}(x_{k})>2kdist^{-1}(x_{k},\partial\Omega_{k}),$ $M_{k}(z)\leq
2M_{k}(x_{k}),\quad\forall z:|z-x_{k}|\leq kM_{k}^{-1}(x_{k}).$
Let $\lambda_{k}:=M_{k}^{-1}(x_{k})$, and rescale $u_{k}$ by setting
$v_{k}(y):=\lambda_{k}^{\alpha}u_{k}(x_{k}+\lambda_{k}y),\qquad\forall
y:|y|\leq k.$
Note that as $|y|\leq k$ we have
$|\lambda_{k}y|\leq\frac{1}{2k}dist(x_{k},\partial\Omega_{k})\cdot
k=\frac{1}{2}dist(x_{k},\partial\Omega_{k}).$
This implies that
$x_{k}+\lambda_{k}y\in\Omega_{k},$
Therefore $v_{k}$ is well defined. We further deduce that
$\displaystyle-\Delta v_{k}(y)$
$\displaystyle=-\lambda_{k}^{\alpha}\cdot\Delta_{y}u_{k}(x_{k}+\lambda_{k}y)$
$\displaystyle=-\lambda_{k}^{\alpha+2}\Delta u_{k}$
$\displaystyle=\lambda_{k}^{\alpha+2}u_{k}^{\lambda}=(\lambda_{k}^{\alpha}u_{k})^{\lambda}$
$\displaystyle=v_{k}^{\lambda}(y).$
So $v_{k}$ solves
$-\Delta v_{k}=v_{k}^{\lambda},\qquad y\in B_{k}(0),$
and
$\displaystyle\sum_{r=0}^{s}|\nabla^{r}v_{k}(y)|^{\frac{1}{\alpha+r}}$
$\displaystyle=\sum_{r=0}^{s}|\lambda_{k}^{\alpha+r}\nabla^{r}u_{k}|^{\frac{1}{\alpha+r}}$
$\displaystyle=\lambda_{k}M_{k}(x_{k}+\lambda_{k}y)$ $\displaystyle\leq
2,\qquad\qquad\qquad|y|\leq k;$
$\sum_{r=0}^{s}|\nabla^{r}v_{k}|^{\frac{1}{\alpha+r}}(0)=\lambda_{k}M_{k}(x_{k})=1.$
(4.19)
By using $C^{\alpha}$ estimates, we deduce that there exist $\beta\in(0,1)$
and constant $C$ (independent of $k$) such that
$\parallel v_{k}\parallel_{C_{loc}^{s+\beta}}\leq C.$
Therefore there exist a subsequence of ${v_{k}}$, still denoted by ${v_{k}}$,
such that
$v_{k}\rightarrow v\qquad in\ C_{loc}^{s}(\mathbb{R}^{N}),$ (4.20)
and $v$ solves
$-\Delta v=v^{\lambda},\qquad x\in\mathbb{R}^{N}.$ (4.21)
By Lemma 3.1 we deduce
$v=const,\qquad x\in\mathbb{R}^{N}.$
This contradicts with (4.19), thus we have proved Theorem 2.6. ∎
Acknowledgements. This study was supported by grants from the National Natural
Science Foundation of China (11871070), the Guangdong Basic and Applied Basic
Research Foundation (2020B151502120), the Fundamental Research Funds for the
Central Universities (20ykzd20).
## References
* [1] J. Serrin and H. Zou. Cauchy-liouville and universal boundedness theorems for quasilinear elliptic equations and inequalities. Acta Mathematica, 189(1):79–142, 2002.
* [2] G. Astarita, G. Marrucci, and D. D. Joseph. Principles of non-newtonian fluid mechanics. Journal of Applied Mechanics, 42(3), 1975.
* [3] M. Mateljević and M. Vuorinen. On harmonic quasiconformal quasi-isometries. Journal of Inequalities and Applications, 2010(1):1–19, 2010.
* [4] Ilkka Holopainen and Seppo Rickman. Ricci curvature, Harnack functions, and Picard type theorems for quasiregular mappings. In Analysis and topology, pages 315–326. World Sci. Publ., River Edge, NJ, 1998.
* [5] Y. G. Reshetnyak. Index boundedness condition for mappings with bounded distortion. Siberian Mathematical Journal, 9(2):281–285, 1968.
* [6] B. Gidas and J. Spruck. A priori bounds for positive solutions of nonlinear elliptic equations. Communications in Partial Differential Equations, 6(8):883–901, 2007.
* [7] E. Dibenedetto. $c^{1,\alpha}$ local regularity of weak solutions of degenerate elliptic equations. Nonlinear Analysis, 7(8):827–850, 1983.
* [8] D. Gilbarg and N. S. Trudinger. Elliptic Partial Differential Equations of Second Order. Springer, Berlin, 2001.
* [9] Peter and Tolksdorf. Regularity for a more general class of quasilinear elliptic equations. Journal of Differential Equations, 1984.
* [10] B. Gidas and J. Spruck. A priori bounds for positive solutions of nonlinear elliptic equations. Communications in Partial Differential Equations, 6(8):883–901, 2007.
* [11] P Poláčik, P. Quittner, and P. Souplet. Singularity and decay estimates in superlinear problems via liouville-type theorems, i: Elliptic equations and systems. Duke Mathematical Journal, 139(3):555–579, 2015.
* [12] Haïm Brezis and Louis Nirenberg. Positive solutions of nonlinear elliptic equations involving critical sobolev exponents. Communications on Pure and Applied Mathematics, 36(4):437–477, 1983\.
* [13] Asymptotic symmetry and local behavior of semilinear elliptic equations with critical sobolev growth. Communications on Pure and Applied Mathematics, 42(3):271–297, 1989\.
* [14] G. Lu, P. Wang, and J. Zhu. Liouville-type theorems and decay estimates for solutions to higher order elliptic equations. Annales De Linstitut Henri Poincare Non Linear Analysis, 29(5):653–665, 2012.
* [15] Y. Y. Li and L. Zhang. Liouville-type theorems and harnack-type inequalities for semilinear elliptic equations. Journal d’Analyse Mathématique, 90(1):27–87, 2003.
* [16] P. Polacik, P. Quittner, and P. Souplet. Singularity and decay estimates in superlinear problems via liouville-type theorems. part ii: Parabolic equations. Indiana University Mathematics Journal, 56(2):879–908, 2007.
* [17] B. Gidas and J. Spruck. Global and local behavior of positive solutions of nonlinear elliptic equations. Communications on Pure and Applied Mathematics, 34(4), 1981.
| arxiv-papers | 2021-07-27T12:23:43 | 2024-09-04T03:07:21.416083 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Xiaoqiang Sun, Jiguang Bao",
"submitter": "Xiaoqiang Sun",
"url": "https://arxiv.org/abs/2107.12767"
} |
2107.12770 | # Comparing Prophet and Deep Learning to ARIMA in Forecasting Wholesale Food
Prices
Lorenzo Menculini111Corresponding author: [email protected] Idea-re
S.r.l., Perugia, Italy Andrea Marini Idea-re S.r.l., Perugia, Italy
Massimiliano Proietti Idea-re S.r.l., Perugia, Italy Alberto Garinei
Department of Engineering Sciences, Guglielmo Marconi University, Rome, Italy
Idea-re S.r.l., Perugia, Italy Alessio Bozza Cancelloni Food Service S.p.A.,
Magione (PG), Italy Cecilia Moretti Marcello Marconi Department of
Engineering Sciences, Guglielmo Marconi University, Rome, Italy Idea-re
S.r.l., Perugia, Italy
###### Abstract
Setting sale prices correctly is of great importance for firms, and the study
and forecast of prices time series is therefore a relevant topic not only from
a data science perspective but also from an economic and applicative one. In
this paper we examine different techniques to forecast sale prices applied by
an Italian food wholesaler, as a step towards the automation of pricing tasks
usually taken care by human workforce. We consider ARIMA models and compare
them to Prophet, a scalable forecasting tool by Facebook based on a
generalized additive model, and to deep learning models exploiting Long
Short–Term Memory (LSTM) and Convolutional Neural Networks (CNNs). ARIMA
models are frequently used in econometric analyses, providing a good benchmark
for the problem under study. Our results indicate that ARIMA models and LSTM
neural networks perform similarly for the forecasting task under
consideration, while the combination of CNNs and LSTMs attains the best
overall accuracy, but requires more time to be tuned. On the contrary, Prophet
is quick and easy to use, but considerably less accurate.
## 1 Introduction
The main aim of firms is profit maximization. To achieve this goal, the
constant updating and forecasting of selling prices is of fundamental
importance for every company. Although the digital transformation is a
phenomenon that is involving all companies, from small to large, many of them
still update prices by hand through logics that are not always clear nor
objective and transparent, but rather based on the experience and expertise of
those in charge of updating the price list. On the other hand, the automation
of price prediction and update can provide a strong productivity boost by
freeing up human resources, which can thus be allocated to more creative and
less repetitive tasks. This also increases the morale and commitment of
employees; it also speeds up the achievement of goals, and improves accuracy
by minimizing human errors. Subjectivity is also reduced: once the operating
criteria have been established, forecast algorithms will keep behaving
consistently. This in turn means an improvement in compliance.
Besides the automation of price updates, the prediction of the sales prices
charged to customers in the short term also holds great value. In general,
organizations across all sectors of industry must undertake business capacity
planning to be efficient and competitive. Predicting the prices of products is
tightly connected to demand forecasting and therefore allows for a better
management of warehouse stocks. The current economic crisis caused by COVID-19
has highlighted the value of such management optimization, stressing the
importance of the companies’ ability to minimize inventory reserves and just-
in-time production models. Forecast models considered in this paper can
contribute to keeping the difference between wholesale purchase prices and
company’s sales prices under control, in view of maximizing the gross
operating income. They can therefore help companies avoid the risk of
incalculable losses and ultimately improve their contractual capacity.
The present work proposes to deal with these topics by investigating and
comparing different price forecasting models. The specific task we consider is
that of predicting the prices of three food products sold by a medium/large-
size local wholesaler based in central Italy. In such way, we investigate the
predictability of wholesale prices, comparing the performance of traditional
econometrics time series forecasting models with Facebook’s Prophet and
machine learning models. The main goal of this paper is therefore to develop a
forecasting model that could represent a first step towards the automation of
the price-setting process, thus effectively aiding the work of company
employees. In this way, it aims to be of practical use to companies for the
maintenance and management of price lists. Scalability and flexibility of the
models presented in this paper are also an important point: for the sake of
simplicity, we have applied the models to three different products, but we
underline that the same models and algorithms can be easily applied to any
product.
Time series forecasting has always been a major topic in data science with
plenty of applications. For a general review of some of the most used tools,
see for example [1]. Well-known traditional econometric methods are not always
appropriate to study and forecast big and noisy time series data. This has
generated particular interest in machine learning methods, bolstering data
driven approaches that include a wide range of methods that have the advantage
of not relying on prior assumptions and knowledge on data. See for example [2,
3, 4, 5] for reviews focusing on the application of deep learning [6] to time
series. Long short–term memory (LSTM) networks [7] and convolutional neural
networks (CNNs) [8] are almost ubiquitous in time series forecasting with
machine learning. CNNs are even more commonly used for image recognition and
feature extraction. However, the forecasting accuracy of standalone CNNs can
be relatively low [9].
The literature concerning economic time series prediction employing various
methos – for classical to artificial intelligence ones – is very rich.
Nevertheless, although we believe automatic updating mechanisms and
forecasting of sale prices are of uttermost relevance, the literature on these
topics is not as developed as one would expect. Most studies focus primarily
on the implementation of models for the analysis and forecasting of general
price levels (inflation) or commodity and stock market prices. The forecasting
of food prices in China was considered by the authors of [10, 11]. In
particular, Zou et al. [11] compared the performances of ARIMA, neural
networks (NNs) and a combination of the two to forecast wheat prices in the
Chinese market. Their findings showed that, overall, NNs perform best at the
task. Neural networks were also employed in [12] to forecast monthly wholesale
prices of two agricultural products. Ahumada and Cornejo [13] considered a
similar problem, also taking into account possible cross-dependencies of
different product prices. In [14] the author focused on sales forecasting
using machine learning models, a topic similar to the one considered in the
present paper. For more recent work on forecasting commodities prices see
[15], where the authors forecasted gold prices, and [16] where the Levenberg-
Marquardt Backpropagation (LM-BP) algorithm was applied to stock prices
prediction. Other authors used machine learning methods for inflation
forecasting [17, 18], also in comparison with more classical econometric
models [19]. Xue et al. [20] recently presented a high-precision short-term
forecasting model for financial market time series employing deep LSTM neural
networks, comparing them with other NN models. Their results showed that LSTM
deep neural networks have high forecasting accuracy for stock market time
series. In 2020, Kamalov [21] evaluated multilayer perceptrons, CNNs and LSTM
neural networks to forecast significant changes in stock prices for four major
US public companies, showing that these three methods yield better results
when compared to similar studies that forecast the direction of price change.
For models similar to the ones considered in this work and applied again to
stock indexes forecasting, see [22]. Hybrid ARIMA/neural network models where
instead studied by the authors of [23]. Stock prices have also been forecasted
using LSTMs in conjunction with the attention mechanism [24]. Machine learning
models using LSTMs and CNNs are of widespread use in time series forecasting,
well beyond the financial and economic realm. For recent work on time series
forecasting using machine learning outside the economic and financial area see
[25], an application to COVID-19 spreading forecasting, and [26] for an
application of deep learning to Influenza prevalence forecasting.
In this paper we compare the performance of standard Autoregressive Integrated
Moving Average (ARIMA) models [27], which we take as a benchmark, to Prophet –
a forecasting tool developed by Facebook and based on a Generative Additive
Model (GAM) [28] – and machine learning models exploiting LSTMs, both on their
own and in combination with CNNs. ARIMA univariate models are considered a
standard reference model in econometrics. The compared models are rather
different, as are the datasets that they accept in input, making the
comparison interesting. On one hand, Prophet’s driving principles are
simplicity and scalability; it is specifically tailored for business
forecasting problems and handles missing data very well by construction. On
the other, the NN models we construct allow for a multivariate regression,
fully exploiting all the collected data, but also require some data pre-
processing, as does ARIMA. Prophet has been compared to ARIMA models for the
prediction of stock prices [29] and bitcoin [30].
Our results indicate that the combination of CNNs and LSTMs yields the most
accurate results for all the three products, but require the longest and
computationally more expensive tuning. On the contrary, Prophet performances
were not brilliant, but model tuning and data preparation were particularly
quick. ARIMA and LSTM-only neural networks showed good performances both in
terms of accuracy and time required for model selection and training.
The rest of the paper proceeds as follows. Section 2 introduces the dataset
features, discussing its properties and some pre-processing steps that were
taken on it; it also briefly presents the three models under consideration,
their set-up and tuning. In Section 3 we give the results obtained with the
three approaches and compare them. We conclude in Section 4 by discussing the
results of this study and providing an outlook on future perspectives in the
light of the paper findings.
## 2 Materials and Methods
### 2.1 Dataset description and preparation
For this study we had access to a dataset comprising a total of approximately
260,000 food order records, reporting the following information: _date of
order_ , _order number_ , _unit price_ , _article code_ , _sold quantity_ ,
_customer code_ , _offer_ (if present) and _offer type_ , _unitary cost_. The
records were collected by the wholesaler in a period ranging from year 2013 to
2021. For the study conducted in this paper, we decided to focus on the three
products with the most records, namely _Carnaroli rice 1kg $\times$ 10_
(henceforth product 1), _Gorgonzola cheese 1/8 of wheel 1.5 kg_ (product 2)
and _Cured aged ham 6.5 kg_ (product 3). The forecasting task considered in
this work was to predict the average selling price for the following week, for
each of the selected products.
As a first thing, we chose to leave out all data following the outbreak of the
COVID-19 pandemic. This was motivated by the huge impact that the lockdowns
and restrictions imposed by the authorities had on the food and catering
sector, introducing a major shock in sales trends at all scales. Therefore, we
excluded all records dated later than March 9, 2020 (last day before the first
national lockdown in Italy).
A preliminary data analysis revealed that the dataset contained a good number
of outliers: for some of them, it appeared evident that this was due to
incorrect typing of the product sale price. To improve the quality of the
dataset, we calculated the _z-score_ of each record based on its price as
$z=(p-\bar{p}^{(w)})/\sigma^{(w)}\,,$ where $p$ is the unit sale price and
$\bar{p}^{(w)}$ and $\sigma^{(w)}$ are the mean and standard deviation for the
selected product, weighted by the quantity sold in each order. Then, we
filtered out all records with $|z|>4$. Figure 1 shows the price distribution
for product 2, after the filtering.
Figure 1: Price distribution (after _z-score_ filtering) for product 2: to the
left, boxplot, and to the right, violin plot.
In view of the subsequent time series forecasting and as a further step in
dealing with data inaccuracies, we decided to resample the dataset with weekly
frequency. This was done by cumulating the number of orders in each window and
calculating the average sale price for each week. For later use in neural
network models, when resampling data we also kept track of the following
fields in the dataset: _number served customers_ , _number of orders_ ,
_number of orders on sale_ , (weighted) _average product cost_ , and
(weighted) _price standard deviation_. Table 1 summarizes the main features of
the resampled price time series for each of the products. In Figures 2, 3 and
4 we display the time series of sale prices and sold quantities after
resampling. All prices, here and everywhere in the paper, are intended in
euros (€).
Table 1: Mean and standard deviation of the weekly prices time series. Product | 1 | 2 | 3
---|---|---|---
Mean (€) | 1.99 | 7.64 | 7.27
Std (€) | 0.36 | 0.40 | 0.26
Figure 2: (a) Unit price and (b) sold quantity time series for product 1 after
resampling with weekly frequency.
Figure 3: (a) Unit price and (b) sold quantity time series for product 2 after
resampling with weekly frequency.
Figure 4: (a) Unit price and (b) sold quantity time series for product 3 after
resampling with weekly frequency.
We then split the weekly dataset in the following way:
* •
_Training dataset_ : years 2013–2017,
* •
_Validation dataset_ : year 2018,
* •
_Test dataset_ : years 2019–March 2020
This choice was made in order to make the training set as large as possible,
while also having validation and test sets that cover at least one year of
data.
As can be seen in Figures 2, 3 and 4, even after resampling the price time
series have missing periods. Therefore, they are not suited for being given as
input to ARIMA and neural network forecasting models, as they require evenly
spaced data. To overcome this problem, we adopt the following strategy for all
products:
1. 1.
Since the time series for all products have a long window with no data in the
second half of year 2013, we do not consider this empty period and start right
after it;
2. 2.
When occasional weeks with no data occur, we take the average of the preceding
and following week prices and interpolate.
In this way we were able to fill in all empty weeks – in fact, after
resampling the missing records were very sparse. Note that the above procedure
is only necessary for preparing the dataset for ARIMA and NN models, as
Prophet has no problems in handling missing datapoints. The size of the
datasets for each product, both before and after removal of empty periods, is
summarized in Table 2.
Table 2: Dataset size (# of datapoints) for each product and forecasting model. Product | Model | Train | Valid | Test
---|---|---|---|---
1 | Prophet | 240 | 52 | 62
ARIMA & NN | 211
2 | Prophet | 241 | 52 | 62
ARIMA & NN | 211
3 | Prophet | 242 | 52 | 62
ARIMA & NN | 212
### 2.2 ARIMA models
ARIMA models [27] are among the most simple and used econometric approaches to
univariate time series modeling. In this work, we implemented non-seasonal
ARIMA models, neglecting the modulation effects of holidays and using
therefore pure trend lines.
In econometrics, it is quite customary when dealing with price variables to
transform prices through a logarithmic map, since this generally leads to
better results. We decided to follow this approach when using the ARIMA
modelling, thus working with $\log(p_{t})$ in the model fitting. As a first
step we checked the stationarity properties of the time series. We performed
the _Augmented Dikey-Fuller_ unit root test using the built-in method in the
_statsmodels_ Python package. The results we obtained are qualitatively
similar for all the three products we considered: for the $\log(p_{t})$ time
series one cannot reject the null hypothesis of the presence of a unit root,
signalling the non-stationarity of the series. First differencing the series,
i.e. considering $\Delta\log(p_{t})=\log(p_{t})-\log(p_{t-1})$, makes it
stationary. Thus the $\log(p_{t})$ series are integrated of order one, and
accordingly the models we considered are ARIMA$(p,1,q)$.
In order to have a rough indication on the AR orders, $p$’s, and on the MA
orders, $q$’s, we computed the sample autocorrelation function (ACF) and the
partial autocorrelation function (PACF) for $\Delta\log(p_{t})$. Recall that
* •
for an exact MA($q$), ACF is zero for lags larger than $q$;
* •
for an exact AR($p$), PACF is zero for lags larger than $p$.
As an example we show the plots of these functions for product 2 in Figure 5.
Figure 5: Autocorrelation function and partial autocorrelation function for
$\Delta\log(p_{t})$ of product 2.
In the ARIMA model selection and fitting procedures, we used a different
dataset splitting scheme with respect to the one described above, in that the
_training_ set comprised years 2013–2018 (i.e. the union of the former
training and validation sets). This is since we decided not to use the
validation set to selected the hyperparameters $p$ and $q$, instead exploiting
the _Bayesian Information Criterion_ (BIC) as a metric for model comparison
[31]. Hence we took into account different combinations of $p$ and $q$ around
the values suggested by the ACF and PACF plots, and eventually we selected the
model with least BIC.
### 2.3 Prophet
Prophet is an open-source tool provided by Facebook Inc., available both in
Python and R. For the current analysis, the Python package (with Python 3.9)
was used. As explained by the authors [32], the idea leading to Prophet was to
develop a flexible forecasting tool which is easy to both use and tune. The
underlying model features a decomposable time series with three components:
growth (or trend) $g(t)$, seasonality $s(t)$ and holidays $h(t)$ (if present).
In the present case, there are no obvious holidays to consider, as the
wholesaler’s customers are mainly restaurants and hotels, which tend to stay
open during holidays. The time series is therefore decomoposed as
$y(t)=g(t)+s(t)+\epsilon_{t}\,,$ (1)
where $\epsilon_{t}$ encodes variations that are not taken into account by the
model, and which are assumed to be normally distributed [32]. The Prophet
model can be seen as a GAM [28]. In this framework, forecasting is phrased as
a curve-fitting task, with time as the only regressor, so the model is
univariate.
The trend function adopted for the problem under study is a piecewise linear
function written as
$g(t)=\big{(}k+\sum_{i:t>s_{i}}\delta_{i}\big{)}t+\big{(}m+\sum_{j:t>s_{j}}\gamma_{j}\big{)}\,,$
(2)
where $k$ is a scalar coefficient, $s_{i}$ are the _trend changepoints_ –
_i.e._ $S$ times $s_{1}$, $s_{2}$, … , $s_{S}$ at which the angular
coefficient of the trend is allowed to change – $\delta_{i}$ are the rate
adjustements, and $\gamma_{j}=-s_{j}\delta_{j}$ are parameters used to make
the function continuous. The algorithm starts with a number $S=25$ of
potential changepoints, placed in the first $80\%$ of the time series in order
to avoid responding to fluctuations in the last part of the series. Then, the
actual changepoints are selected by putting a sparse prior of the kind
$\delta_{j}\sim\text{Laplace}(0,\tau)$, with $\tau$ (tunable hyperparameter)
regulating222Using a Laplace prior is equivalent to L1-regularization. the
magnitudes rate adjustments. A larger $\tau$ means the model has more power to
fit trend changes.
As for seasonality, Prophet accounts for it using Fourier series, namely
$s(t)=\sum_{n=1}^{N}\left(a_{n}\cos\left(\frac{2\pi
nt}{P}\right)+b_{n}\sin\left(\frac{2\pi nt}{P}\right)\right)\,.$ (3)
Since we considered weekly data with no other obvious expected seasonality
effects but yearly ones, we had $P=365.25\text{d}$. For weekly seasonality,
the truncation parameter is set to $N=10$ by the authors of [32] when
modelling yearly seasonality, and we follow this specification. When
performing the fit, a smoothing prior $\beta\sim N(0,\sigma^{2})$ is imposed
on the $2N$ components $\beta=(a_{1},\ldots,a_{n},b_{1},\ldots,b_{n})^{T}$,
with $\sigma$ a second hyperparameter (essentially acting as an
L2-regularization parameter).
Prophet fits its GAM using the L-BFGS quasi-Newton optimization method of [33]
in a Bayesian setting, finding a maximum _a posteriori_ estimate.
### 2.4 Neural Networks
The advent of artificial intelligence, in particular machine learning, has led
to the development of a set of techniques that have proved to be very useful
in many different areas. One breakthrough has certainly been deep learning
[6], which has revolutionized our way of handling and exploiting information
contained in data. Deep learning can effectively detect and model hidden
complexity in data, automatically extracting features that should otherwise be
extracted manually by dataset inspection.
A standard choice when facing problems involving time series is that of using
LSTM neural networks, a kind of recurrent neural networks (RNNs) devised by
Hochreiter and Schmidhuber in 1997 [7]. Like all RNNs, they can by
construction handle data endowed with temporal structure, while also providing
a way to deal with the vanishing gradient problem [34]. Here we will describe
the application of LSTM NNs to the problem under study, both on their own and
in combination with CNNs. Indeed, standard LSTM NNs for time series
forecasting can be enriched with one-dimensional convolutional layers that
sequentially apply a unidimensional filter to the time series. Convolutions
can be seen as non-linear transformations on the time series data. This
enhances the model’s capability to learn discriminative features which are
useful for the forecasting and that can be fed to the LSTM layers that follow.
The models developed in this work were trained and tested using Python 3.9 and
TensorFlow 2.5.
Unlike in the ARIMA and Prophet case, with NNs we can exploit a larger
fraction of the information available in the dataset by setting up a
multivariate regression. However, since dates cannot be used as input
variables to a NN, we made an addition to the fields listed in Section 2.1,
performing a time embedding to provide information about seasonality. We did
this by adding the columns
week_cos $\displaystyle=\cos(2\pi w/52.1429)\,,$ (4a) week_sin
$\displaystyle=\sin(2\pi w/52.1429)\,,$ (4b)
where $w$ is the week number ($w=0,1,\ldots,52$). Therefore, we had a total of
9 input columns that were passed to the NN models. A sample of the input
dataset for one product is shown in Table 3.
Table 3: A slice of the dataset used to generate input data for the NN models. quantity | customers | orders | on sale | cost | week_cos | week_sin | p_std | avg_price
---|---|---|---|---|---|---|---|---
10 | 1 | 1 | 0 | 1.40 | 0.990 | -0.141 | 0 | 1.41
0 | 0 | 0 | 0 | 1.40 | 1.000 | -0.0214 | 0 | 1.55
70 | 6 | 6 | 0 | 1.40 | 0.993 | 0.120 | 0.0690 | 1.69
220 | 17 | 18 | 0 | 1.40 | 0.971 | 0.239 | 0.0580 | 1.75
230 | 14 | 15 | 0 | 1.39 | 0.935 | 0.353 | 0.0685 | 1.86
To construct the actual training dataset (made of a tensor $\bf{x}_{t}$ and a
scalar $y_{t}$, for each time $t$) that could be fed to LSTM neural networks,
we then performed the following steps:
* •
reshape data so that at each time $t$, $\bf{x}_{t}$ is a $n\times 9$ tensor
containing the $n$ last values of each time series in Table 3;
* •
set $y_{t}=\Delta_{t+1}=p_{t+1}-p_{t}$ as the variable to be used in the cost
function.
In this way, the model learns to predict $y$ (price variation) at each time
based on information about the last $n$ timesteps. Predicting the increment of
the quantity of interest instead of the quantity itself is a well-known way to
improve performance when training multivariate machine learning models.
Moreover, we checked through the _Augmented Dikey-Fuller_ test that the
$\Delta_{t}$ time series was stationary. The number $n$ of timesteps used
depends on the model and will be specified later.
The NN models tried in this paper for predicting product prices fall in two
classes: those using only LSTM layers and those with CNN layers before the
LSTM. We denoted these classes A and B, respectively.
## 3 Results
In this section we report results obtained with the three different approaches
to forecasting – namely ARIMA, Prophet and deep learning – studied in this
work.
### 3.1 ARIMA results
We considered first ARIMA models, to provide a standard performance benchmark
with which to compare the other models developed in the rest of this work.
The best ARIMA models for the three products are given in Table 4. As outlined
in Section 2.2, they were selected by considering the series of the price
logarithms $\log(p_{t})$ and using a least BIC criterion [31]. For the sake of
comparison with the other models, we transformed back the $\log(p_{t})$ series
to the $p_{t}$ series to compute the root mean squared error (RMSE) between
the predicted and observed increments
$\hat{\Delta}(t)=\hat{p}_{t}-p_{t-1}\,,\qquad\Delta(t)=p_{t}-p_{t-1}\,,$ (5)
$\hat{p}_{t}$ being the predicted price at time $t$.
Table 4: Selected ARIMA models for the three products and associated RMSE on the entire training+validation set. Product | selected model | (tr+v)RMSE
---|---|---
1 | ARIMA(2,1,0) | 0.097
2 | ARIMA(0,1,2) | 0.232
3 | ARIMA(3,1,1) | 0.211
In all cases, we checked also that the Ljung-Box statistics [35, 36] for 1-,6-
and 12-lag residual autocorrelations do not reject the null hypothesis, so the
residuals can be considered approximately white noise.
The results obtained on the test set by the selected ARIMA models are
summarized in Table 5. We also report values for the MAE (mean absolute error)
and MAPE (mean absolute percent error).
Table 5: Performance of the best ARIMA models on the test set. The MAPE is
computed for price time series $p_{t}$, not for the $\Delta(t)$ time series.
ARIMA results
---
Product | 1 | 2 | 3
RMSE | 0.0758 | 0.173 | 0.215
MAE | 0.0581 | 0.132 | 0.159
MAPE | 0.0348 | 0.0178 | 0.0222
### 3.2 Prophet results
#### 3.2.1 Prophet grid search
As suggested in the Prophet documentation and reviewed in Section 2.3, one can
tune the $\tau$ (trend changepoints prior scale) and $\sigma$ (seasonality
prior scale) hyperparameters so that the model fits data as well as possible.
We did so by performing a grid search over $\tau$ and $\sigma$ in the
following way: for each combination of $\tau\in\\{0.005,0.01,0.05,0.1,0.5\\}$
and $\sigma\in\\{0.01,0.05,0.1,0.5,1,2\\}$, we started by fitting the model
over the training dataset, and predicted the price for the following week
(first datapoint in the validation set). We calculated the squared error
between predicted and observed price. Then, we moved on to the second
datapoint in the validation set, performed a new fit using also the first
validation set datapoint, and predicted the price for the following week. The
whole process was repeated until the validation dataset was exhausted. For
each product, the configuration with least RMSE was selected, yielding the
results shown in Table 6.
Table 6: Prophet grid search results. vRMSE indicates the RMSE on the validation set, calculated as described in the main text. Product | $\tau$ | $\sigma$ | vRMSE
---|---|---|---
1 | 0.5 | 0.01 | 0.0831
2 | 0.1 | 0.01 | 0.293
3 | 0.5 | 1.0 | 0.215
#### 3.2.2 Prophet forecasting
After selecting the best values of the parameters for each product, we
employed them to specify the Prophet model in the test phase. Testing took
place in the following way: we started by fitting the model over the entire
training plus validation dataset, predicting the first data entry in the test
dataset and calculating the squared error. We repeated the procedure for all
entries in the test dataset, each time using all previous history, and
calculated the achieved RMSE at the end of the process. Note that by employing
this procedure, also the test dataset is progressively used to fit the model.
We plot in Figure 6 the result of the fit over the entire dataset for product
1, i.e. the function that would be used to predict the unit price for the
first week following the end of the test dataset.
Figure 6: Prophet fit over the entire product 1 dataset. The actual fit is
shown in light blue, while trend changepoints are shown in red.
Figure 7 shows instead the plot of the predicted and observed increments –
$\hat{\Delta}(t)$ and $\Delta(t)$ as defined in Eq. 5 – in the case of product
2. The performance of Prophet in forecasting the weekly price time series is
summarized in Table 7. As done for ARIMA models, besides the RMSE parameter
used in the fine tuning, we also report values for the MAE and MAPE.
Figure 7: Comparison of Prophet forecasts and observed data for price
variations in the test set, for product 2. The corresponding RMSE is 0.220.
Table 7: Performance of the tuned Prophet models on the test dataset. Prophet
results
---
Product | 1 | 2 | 3
RMSE | 0.0812 | 0.220 | 0.350
MAE | 0.0694 | 0.165 | 0.301
MAPE | 0.0414 | 0.0224 | 0.0424
### 3.3 Neural Networks results
#### 3.3.1 NN grid search
As a third forecasting tool, we studied deep neural networks. Two different
classes of models – class A and B as introduced in Section 2.4 – were
analyzed. We performed two different grid searches to select the best model in
each class, as we now briefly describe. The common features between the
classes were: the usage of an MSE cost function and of the _Adam_ optimization
algorithm [37], with learning rate (or _stepsize_)
$\alpha\in\\{0.0005,0.001\\}$; the adoption of an early stopping procedure,
monitoring the cost function on the validation set with a patience of 5
epochs, while also setting an upper bound of 150 training epochs. Finally,
data were standardized using a _z-score_ normalization333Specifically, the
_MinMaxScaler_ function of the _scikit-learn_ Python package was employed.,
and we used a batch size of 32.
For class A, we trained NN models with the following architecture and
hyperparameters: a number $l\in\\{1,2,3\\}$ of LSTM layers with
$n_{u}\in\\{32,64,96\\}$ neurons each and _normal Glorot_ weight
initialization [38]. Each LSTM layer was followed by a dropout layer, with
dropout rate $r\in\\{0.1,0.2,0.3\\}$. The output layer consisted of a single
neuron with linear activation function, again with normal Glorot
initialization. For this class of models, we used a number of timesteps $n=4$.
The grid search over the hyperparameters $l$, $n_{u}$, $r$, $\alpha$ was
performed by initializing and training each model ten times, monitoring the
cost function on the validation set and recording the best result obtained for
every configuration. The best performing models for each product are reported
in Table 8.
Table 8: Results of the grid search on class A (LSTM only). trRMSE and vRMSE are the RMSEs computed on the training and validation sets, respectively. Product | $l$ | $n_{u}$ | $r$ | $\alpha$ | trRMSE | vRMSE
---|---|---|---|---|---|---
1 | 3 | 32 | 0.1 | 0.001 | 0.0964 | 0.0612
2 | 3 | 64 | 0.3 | 0.001 | 0.163 | 0.173
3 | 1 | 96 | 0.1 | 0.0005 | 0.156 | 0.142
The second class of models, class B, consisted in a combination of CNN layers
and LSTM layers, as done for example in [15] and [22]. We added two one-
dimensional convolutional layers, with a pooling layer in between. Each of the
convolutional layers had $f\in\\{10,20,30\\}$ _output filters_ , _kernel size_
$k_{s}\in\\{2,4\\}$ and _relu_ (rectified linear unit) activation function.
Moreover, we tried to use _same_ , _causal_ or no padding in each of the
conv1D layers: we dub the corresponding hyperparameters pad1, pad2. The 1D
_average pooling_ layer had _pool size_ equal to 2 and no padding. This block
was then followed by the same LSTM layers as for the first class of models.
The reason behind adding CNN layers is that they can help make better use of
the data history, improving the ability of LSTM networks to learn from long
series of past data. The grid search was indeed performed with varying numbers
of timesteps $n\in{4,8,12}$. As for the previous class, each model was
initialized and trained twice. Results for the grid search over the
hyperparameters $l$, $n_{u}$, $r$, $\alpha,f,k_{s},n$ are shown in Table 9.
Figure 8 shows the trajectory of training and validation cost functions for
the best-performing model in the case of product 1.
Table 9: Results of the grid search on class B (CNN + LSTM). trRMSE and vRMSE are the RMSEs computed on the training and validation sets, respectively. Product | $l$ | $n_{u}$ | $r$ | $\alpha$ | $f$ | $k_{s}$ | pad1 | pad2 | $n$ | trRMSE | vRMSE
---|---|---|---|---|---|---|---|---|---|---|---
1 | 1 | 64 | 0.3 | 0.0005 | 20 | 2 | causal | causal | 8 | 0.0770 | 0.0553
2 | 3 | 64 | 0.1 | 0.0005 | 20 | 2 | no | same | 12 | 0.175 | 0.165
3 | 1 | 32 | 0.2 | 0.001 | 20 | 2 | same | same | 8 | 0.148 | 0.132
Figure 8: Trajectory of training and validation losses, as a function of the
training epoch, for product 1. Note that the cost functions are calculated on
rescaled data, therefore they cannot be directly compared to the values
appearing on the first line of Table 9.
### 3.4 NN forecasting
We then used the models specified by the hyperparameter choices in Tables 8
and 9 to forecast price variations on the test set. We proceeded by training
the each selected model on the entire training _and_ validation set, for a
number of epochs corresponding to the epoch at which the training had stopped
during the grid search. Table 10 reports the test set performances of NN
models obtained in this way. Although they played no role in model training
and validation, here we also report the values of the MAE and MAPE metrics
obtained on the test set. We already observe that class B models always
outperform class A models in forecasting prices for all the three products.
Figure 9 displays the forecasts made by the best NN model and compares it to
the actual price variations, in the case of product 3.
Table 10: Performance of the fine-tuned NN models on the test dataset. NN
results
---
Product | 1 | 2 | 3
class | A | B | A | B | A | B
RMSE | 0.0617 | 0.0613 | 0.179 | 0.162 | 0.219 | 0.200
MAE | 0.0498 | 0.0511 | 0.135 | 0.126 | 0.157 | 0.150
MAPE | 0.0299 | 0.0305 | 0.0181 | 0.0168 | 0.0221 | 0.0212
Figure 9: Comparison of NN forecasts and observed data for price variations in
the test set, for product 3. The corresponding RMSE is 0.200.
### 3.5 Result comparison
We can now compare the results obtained with the various models that have been
tried. The comparison can be made by looking at Tables 5, 7 and 10
We begin by noting that Prophet performances are considerably poorer than the
ARIMA benchmark and neural networks. On one hand, this could be expected as
Prophet is based on a model with relatively low complexity that prioritizes
ease of use and of tuning. On the other, as mentioned in Section 3.2.2,
Prophet was progressively fitted also on the test set, effectively using more
data than the other models for the fit, so its performances have arguably
benefited from that. Nevertheless, one point that needs to be stressed is that
we were able to provide Prophet with the entire weekly price time series
comprising all of 2013 data, with no need for particular data pre-processing.
Therefore, although Prophet’s performances were not brilliant for the problem
studied in this paper, it could still be useful in certain contexts where
quick, preliminary forecasts are needed.
Turning to the other models, we observe that those featuring both CNN and LSTM
layers (class B) yielded the most accurate forecasts for all the three
products. At the same time, tuning them required by far the longest time
(approximately 20 hrs for each product using a NVIDIA RTX 3060 graphic card)
with moderate improvement on purely LSTM (class A) models: considering the
RMSE metric, the improvement amounts to about 9% for both product 2 and 3,
while for product 1 the two classes yield similar results (class B has lower
RMSE but higher MAE and MAPE). On the other hand, class A models required a
considerably lower computational effort (of the order of 30 minutes to select
the model hyperparameters for each product). Notice that once the grid search
was concluded, training the best model on the entire training plus validation
dataset required only a few minutes, both for class A and B models.
ARIMA models performed well if we take into account both the achieved values
of the metrics and time necessary for tuning. They were less accurate than
class B models, yielding RMSEs that were 23% higher RMSE for product 1, 7%
higher for product 2, and 8% higher for product 3444Similar considerations
apply if we instead look at MAE and MAPE metrics.. However, they required
about the same tuning time as class A models, and performed better for product
2 and 3: the RMSE obtained by ARIMA models was 23% higher for product 1, but
2% lower for products 2 and 3. We remark that ARIMA is univariate, while a
multivariate input dataset was used to train and test deep learning models:
this highlights the effectiveness of the ARIMA approach for the problem under
study, while at the same time suggesting that the additional data fields used
to perform the multivariate analysis were not so informative for price
prediction. We add that machine learning models were tuned over a larger
parameter space than the others: the search grids were made of 54 and
8978555Factoring out the three different choices of the timesteps number $n$,
which are not really part of the NN models but refer to the way data is
prepared, we are left with 2916 configurations for class B models.
hyperparameter configurations for class A and class B NN models respectively,
versus a maximum of 5 ARIMA configurations and the 25 of Prophet.
Another important aspect to consider in comparing the models is that dataset
size strongly affects the performance of machine learning models. To this
regard, we note that the sizes of the datasets were not very large (just over
200 for each product, as seen in Table 2), hence one could expect especially
the NN models performance to further improve when more historical data is made
available.
## 4 Discussion
In this paper, we have discussed the application of different methods to the
forecast of wholesale prices. We put a standard econometric model (ARIMA) side
by side with two different approaches to time series forecasting. These were
rather diverse both in kind and complexity, going from a simple additive model
using a piecewise linear trend and Fourier series seasonality (Prophet) to
deep learning models featuring both convolutional and LSTM layers. The
findings showed that while Prophet was quick to set-up and tune, requiring no
data pre-processing, it was not able to come close to the performance of the
other, well-established time-series forecasting models. Instead, we found that
the best deep learning models performed better than ARIMA, but also required
much longer times for the hyperparameter tuning.
The work done in this paper can be extended in many directions. First, it
would be interesting to carry out a similar analysis also for the forecasting
of sales, and to consider data with daily frequency instead of weekly. Sales
forecasting with higher frequency can indeed be relevant for wholesalers and
retailers. Second, a more refined version of the study would distinguish
between different customers, as the selling strategies adopted by the
wholesaler do certainly differ when dealing with customers of various kinds
and sizes. Customer profiling is an extremely interesting and active avenue of
applied research, which can clearly enhance companies’ returns. Therefore, in
the near future we plan to carry on the analysis by combining customer
classification algorithms with time-series forecasting: understanding how and
when each customer buys, how specific products are treated differently by
different customers (identifying _complementary_ and _substitute_ goods for
each of them), as well as relating the price elasticity of demand for
different product/customers, are all aspects that could lead to economic
benefits for the wholesaler. To this end, one would want to compare further
machine learning models to dynamic panel data where prices for each product
and customer and price demand elasticity are considered. The approach could
lead to an essential gain in the accuracy of the forecast, and would be an
important contribution to sales prediction analysis, which is becoming an
increasingly important part of modern business intelligence [39, 40]. Another
aspect of sure relevance would be to evaluate algorithms and models on data
including the effects of the COVID-19 outbreak, to both learn how the market
has transformed and help modifying selling strategies in adapting to the
current rapidly changing situation.
The limits encountered in the application of the forecasting tools examined in
this work encourage the evaluation of further models that could bring together
the advantages of each approach. Finally, it would be relevant to apply one of
the most exciting recent advances in machine learning, namely the attention
mechanism [41], to the forecasting task we have considered. Work on this
particular topic is definitely attractive and recently made its appearance in
this field [42].
##### Note:
The paper is an output of the project “Cancelloni Big Data Analytics (BDA)” at
Cancelloni Food Service S.p.A. Data used in this work are property of
Cancelloni Food Service S.p.A. and cannot be disclosed.
## References
* [1] Ratnadip Adhikari and R.. Agrawal “An Introductory Study on Time Series Modeling and Forecasting” In _CoRR_ abs/1302.6613, 2013 arXiv: http://arxiv.org/abs/1302.6613
* [2] Hassan Ismail Fawaz et al. “Deep learning for time series classification: a review” In _Data mining and knowledge discovery_ 33.4 Springer, 2019, pp. 917–963 DOI: https://doi.org/10.1007/s10618-019-00619-1
* [3] Omer Berat Sezer, Mehmet Ugur Gudelek and Ahmet Murat Ozbayoglu “Financial time series forecasting with deep learning : A systematic literature review: 2005–2019” In _Applied Soft Computing_ 90, 2020, pp. 106181 DOI: https://doi.org/10.1016/j.asoc.2020.106181
* [4] Bryan Lim and Stefan Zohren “Time-series forecasting with deep learning: a survey” In _Philosophical Transactions of the Royal Society A_ 379.2194 The Royal Society Publishing, 2021, pp. 20200209 DOI: http://doi.org/10.1098/rsta.2020.0209
* [5] Pedro Lara-Benítez, Manuel Carranza-García and José C Riquelme “An Experimental Review on Deep Learning Architectures for Time Series Forecasting” In _International Journal of Neural Systems_ 31.03 World Scientific, 2021, pp. 2130001 DOI: https://doi.org/10.1142/S0129065721300011
* [6] Yann LeCun, Yoshua Bengio and Geoffrey Hinton “Deep learning” In _Nature_ 521.7553 Nature Publishing Group, 2015, pp. 436–444 DOI: https://doi.org/10.1038/nature14539
* [7] Sepp Hochreiter and Jürgen Schmidhuber “Long Short-Term Memory” In _Neural Computation_ 9.8, 1997, pp. 1735–1780 DOI: 10.1162/neco.1997.9.8.1735
* [8] Yann LeCun and Yoshua Bengio “Convolutional networks for images, speech, and time series” In _The handbook of brain theory and neural networks_ 3361.10, 1995
* [9] Emir Alibašić, Boris Fažo and Ivica Petrović “A new approach to calculating electrical energy losses on power lines with a new improved three-mode method” In _Tehnički vjesnik_ 26.2 Strojarski fakultet u Slavonskom Brodu; Fakultet elektrotehnike, računarstva …, 2019, pp. 405–411
* [10] Zou Haofei, Xia Guoping, Yang Fangting and Yang Han “A neural network model based on the multi-stage optimization approach for short-term food price forecasting in China” In _Expert Systems with Applications_ 33.2 Elsevier, 2007, pp. 347–356 DOI: https://doi.org/10.1016/j.eswa.2006.05.021
* [11] HF Zou, GP Xia, FT Yang and HY Wang “An investigation and comparison of artificial neural network and time series models for Chinese food grain price forecasting” In _Neurocomputing_ 70.16-18 Elsevier, 2007, pp. 2913–2923 DOI: https://doi.org/10.1016/j.neucom.2007.01.009
* [12] Girish K Jha and Kanchan Sinha “Agricultural price forecasting using neural network model: An innovative information delivery system” In _Agricultural Economics Research Review_ 26.347-2016-17087, 2013, pp. 229–239 DOI: 10.22004/ag.econ.162150
* [13] Hildegart Ahumada and Magdalena Cornejo “Forecasting food prices: The case of corn, soybeans and wheat” In _International Journal of Forecasting_ 32.3 Elsevier, 2016, pp. 838–848 DOI: https://doi.org/10.1016/j.ijforecast.2016.01.002
* [14] Bohdan M. Pavlyshenko “Machine-Learning Models for Sales Time Series Forecasting” In _Data_ 4.1, 2019 DOI: 10.3390/data4010015
* [15] Ioannis E Livieris, Emmanuel Pintelas and Panagiotis Pintelas “A CNN–LSTM model for gold price time-series forecasting” In _Neural computing and applications_ 32.23 Springer, 2020, pp. 17351–17360 DOI: https://doi.org/10.1007/s00521-020-04867-x
* [16] Li Zhang et al. “Prediction of stock prices based on LM-BP neural network and the estimation of overfitting point by RDCI” In _Neural Computing and Applications_ 30.5 Springer, 2018, pp. 1425–1444 DOI: 10.1007/s00521-017-3296-x
* [17] Gour Sundar Mitra Thakur, Rupak Bhattacharyya and Seema Sarkar Mondal “Artificial Neural Network Based Model for Forecasting of Inflation in India” In _Fuzzy Information and Engineering_ 8.1, 2016, pp. 87–100 DOI: https://doi.org/10.1016/j.fiae.2016.03.005
* [18] Livia Paranhos “Predicting Inflation with Neural Networks”, 2021 arXiv:2104.03757 [econ.EM]
* [19] Gustavo Silva Araujo and Wagner Piazza Gaglianone “Machine learning methods for inflation forecasting in Brazil: new contenders versus classical models”, 2020
* [20] Xue Yan, Wang Weihan and Miao Chang “Research on financial assets transaction prediction model based on LSTM neural network” In _Neural Computing and Applications_ 33.1 Springer, 2021, pp. 257–270 DOI: 10.1007/s00521-020-04992-7
* [21] Firuz Kamalov “Forecasting significant stock price changes using neural networks” In _Neural Computing and Applications_ 32.23 Springer, 2020, pp. 17655–17667 DOI: 10.1007/s00521-020-04942-3
* [22] Yaping Hao and Qiang Gao “Predicting the trend of stock market index using the hybrid neural network based on multiple time scale feature learning” In _Applied Sciences_ 10.11 Multidisciplinary Digital Publishing Institute, 2020, pp. 3961 DOI: https://doi.org/10.3390/app10113961
* [23] Yi Xiao, Jin Xiao and Shouyang Wang “A hybrid model for time series forecasting” In _Human Systems Management_ 31.2 IOS Press, 2012, pp. 133–143
* [24] Jiayu Qiu, Bin Wang and Changjun Zhou “Forecasting stock prices with long-short term memory neural network based on attention mechanism” In _PLOS ONE_ 15.1 Public Library of Science, 2020, pp. 1–15 DOI: 10.1371/journal.pone.0227222
* [25] Vinay Kumar Reddy Chimmula and Lei Zhang “Time series forecasting of COVID-19 transmission in Canada using LSTM networks” In _Chaos, Solitons & Fractals_ 135, 2020, pp. 109864 DOI: https://doi.org/10.1016/j.chaos.2020.109864
* [26] Neo Wu, Bradley Green, Xue Ben and Shawn O’Banion “Deep Transformer Models for Time Series Forecasting: The Influenza Prevalence Case” In _CoRR_ abs/2001.08317, 2020 URL: https://arxiv.org/abs/2001.08317
* [27] George EP Box, Gwilym M Jenkins, Gregory C Reinsel and Greta M Ljung “Time series analysis: forecasting and control” John Wiley & Sons, 2015
* [28] Trevor Hastie and Robert Tibshirani “Generalized Additive Models” In _Statistical Science_ 1.3 Institute of Mathematical Statistics, 1986, pp. 297–310 DOI: 10.1214/ss/1177013604
* [29] Wint Nyein Chan “Time Series Data Mining: Comparative Study of ARIMA and Prophet Methods for Forecasting Closing Prices of Myanmar Stock Exchange” In _J. Comput. Appl. Res._ 1, 2020, pp. 75–80
* [30] Işil Yenidoğan et al. “Bitcoin forecasting using ARIMA and prophet” In _2018 3rd International Conference on Computer Science and Engineering (UBMK)_ , 2018, pp. 621–624 IEEE DOI: 10.1109/UBMK.2018.8566476
* [31] Gareth James, Daniela Witten, Trevor Hastie and Robert Tibshirani “An introduction to statistical learning” Springer, 2013 DOI: DOI https://doi.org/10.1007/978-1-4614-7138-7
* [32] Sean J. Taylor and Benjamin Letham “Forecasting at Scale” In _The American Statistician_ 72.1 Taylor & Francis, 2018, pp. 37–45 DOI: 10.1080/00031305.2017.1380080
* [33] Richard H. Byrd, Peihuang Lu, Jorge Nocedal and Ciyou Zhu “A Limited Memory Algorithm for Bound Constrained Optimization” In _SIAM Journal on Scientific Computing_ 16.5, 1995, pp. 1190–1208 DOI: 10.1137/0916069
* [34] Razvan Pascanu, Tomas Mikolov and Yoshua Bengio “On the difficulty of training recurrent neural networks” In _Proceedings of the 30th International Conference on Machine Learning_ 28.3, Proceedings of Machine Learning Research Atlanta, Georgia, USA: PMLR, 2013, pp. 1310–1318 arXiv: http://proceedings.mlr.press/v28/pascanu13.html
* [35] George EP Box and David A Pierce “Distribution of residual autocorrelations in autoregressive-integrated moving average time series models” In _Journal of the American statistical Association_ 65.332 Taylor & Francis, 1970, pp. 1509–1526 DOI: 10.2307/2284333
* [36] Greta M Ljung and George EP Box “On a measure of lack of fit in time series models” In _Biometrika_ 65.2 Oxford University Press, 1978, pp. 297–303 URL: http://www.jstor.org/stable/2335207
* [37] Diederik P Kingma and Jimmy Ba “Adam: A method for stochastic optimization” In _3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings_ , 2014 URL: http://arxiv.org/abs/1412.6980
* [38] Xavier Glorot and Yoshua Bengio “Understanding the difficulty of training deep feedforward neural networks” In _Proceedings of the thirteenth international conference on artificial intelligence and statistics_ 9, Proceedings of Machine Learning Research, 2010, pp. 249–256 JMLR WorkshopConference Proceedings URL: http://proceedings.mlr.press/v9/glorot10a.html
* [39] John T Mentzer and Mark A Moon “Sales forecasting management: a demand management approach” Sage Publications, 2004
* [40] G Peter Zhang “Neural networks in business forecasting” IGI global, 2004
* [41] Ashish Vaswani et al. “Attention is all you need” In _Advances in neural information processing systems_ 30, 2017, pp. 5998–6008 arXiv: https://proceedings.neurips.cc/paper/2017/file/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdf
* [42] Vijay Ekambaram et al. “Attention based Multi-Modal New Product Sales Time-series Forecasting” In _Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining_ Association for Computing Machinery, 2020, pp. 3110–3118 DOI: https://doi.org/10.1145/3394486.3403362
| arxiv-papers | 2021-07-23T15:13:31 | 2024-09-04T03:07:21.432537 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Lorenzo Menculini, Andrea Marini, Massimiliano Proietti, Alberto\n Garinei, Alessio Bozza, Cecilia Moretti, Marcello Marconi",
"submitter": "Lorenzo Menculini",
"url": "https://arxiv.org/abs/2107.12770"
} |
2107.12771 | # Theoretical Study and Comparison of SPSA and RDSA Algorithms with Different
Perturbations
Yiwen Chen
###### Abstract
Stochastic approximation (SA) algorithms are widely used in system
optimization problems when only noisy measurements of the system are
available. This paper studies two types of SA algorithms in a multivariate
Kiefer-Wolfowitz setting: random-direction SA (RDSA) and simultaneous-
perturbation SA (SPSA), and then describes the bias term, convergence, and
asymptotic normality of RDSA algorithms. The gradient estimations in RDSA and
SPSA have different forms and, consequently, use different types of random
perturbations. This paper looks at various valid distributions for
perturbations in RDSA and SPSA and then compares the two algorithms using
mean-square errors computed from asymptotic distribution. From both a
theoretical and numerical point of view, we find that SPSA generally
outperforms RDSA.
††1\. A compressed version of this paper appears in the 2021 55rd Annual
Conference on Information Sciences and Systems (CISS), Mar 2021.
2\. Contact Information: [email protected] / [email protected]
## 1 Introduction
Stochastic approximation is a well-known recursive procedure for finding roots
of equations in the presence of noisy measurements. Consider a smooth
$p$-dimensional loss function $L:\,\mathbb{R}^{p}\rightarrow\mathbb{R}$, with
gradient $\bm{g}:\mathbb{R}^{p}\rightarrow\mathbb{R}^{p}$. Assume that $L$ has
a unique minimum $\bm{\uptheta}^{*}\in\mathbb{R}^{p}$; i.e.
$L(\bm{\uptheta}^{*})\leq L(\bm{\uptheta})$ for all
$\bm{\uptheta}^{*}\in\mathbb{R}^{p}$, and $\bm{g}(\bm{\uptheta}^{*})=\bm{0}$.
In many cases where only noisy measurements of the gradient are available, the
Robbins-Monro stochastic approximation (SA) algorithm is widely used with the
form of:
$\displaystyle\bm{\hat{\uptheta}}_{k+1}=\bm{\hat{\uptheta}}_{k}-a_{k}\bm{Y}_{k}(\bm{\hat{\uptheta}}_{k}).\;k=0,1,2,...$
(1)
where
$\bm{Y}_{k}(\bm{\hat{\uptheta}}_{k})=\partial{Q}/\partial{\bm{\uptheta}}$
represents a direct noisy measurement of the true gradient
$\bm{g}_{k}(\bm{\hat{\uptheta}}_{k})$ for $Q$ in the representation
$L(\bm{\uptheta})=E[Q(\bm{\uptheta,V})]$ with $\bm{V}$ corresponding to the
randomness in the problem. $a_{k}>0$ is the step size, determining the
convergence of the algorithm.
However, in most practical cases, such direct measurement is difficult to
obtain and only noisy measurements of the loss function are available. Then it
comes to the use of gradient-free algorithms. There are several common
algorithms such as the finite-difference (FD) SA, random-direction SA (RDSA)
and the simultaneous-perturbation SA (SPSA). All of them use the measurement
of the loss function to estimate the gradient. The FDSA algorithm has also
been discussed comprehensively in [15]. It has an $i$th component in the form
of:
$\displaystyle\hat{\bm{g}}_{ki}(\hat{\bm{\uptheta}}_{k})=\dfrac{y(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{e}_{i})-y(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{e}_{i})}{2c_{k}},$
(2)
where $\bm{e}_{i}$ denotes the unit vector along the $i$th axis and $y$ is the
noisy measurement of the loss value and $c_{k}>0$ defines the difference
magnitude. The pair ${\\{a_{k},c_{k}}\\}$ represents the gain sequences.
Nevertheless, the FDSA algorithm shows inefficiency in solving problems with
high dimension due to its use of $2p$ measurements of $L$ per iteration. The
other two RDSA and SPSA approaches, alleviate this problem by requiring only
two system simulations regardless of the parameter dimension.
Several papers have discussed the three SA algorithms. Spall has discussed
details of FDSA and SPSA algorithms in [13] and [15]; Kushner discussed the
RDSA algorithm in [9]; Blakney and Zhu compared FDSA and SPSA algorithms in
[2] and Chin compared the three algorithms using mean-square errors in [3].
Because the FDSA and SPSA algorithms have been well analyzed, this paper will
mainly focus on the RDSA algorithm. Some papers investigated the theoretical
foundation for RDSA algorithms such as [1], [18] and [3]; however, some of
them gave the illustration only briefly. This paper is going to arrange and
organize those different versions of theoretical proofs to show the
convergence and asymptotic normality. After that, we will conduct the
comparison between RDSA and SPSA using Mean-Square Error and present certain
conditions under which SPSA outperforms RDSA with specific perturbations.
The remainder of this paper is organized as follows. Section 2 introduces the
general formulation of the SPSA and RDSA algorithms. Section 3 covers the bias
term, convergence condition, and asymptotic normality of RDSA algorithm and
leads to the comparison of relative accuracy of SPSA and RDSA. Section 4
presents several numerical studies to assist the theoretical conclusion in
Section 3. Especially, this paper uses the skewed-quartic function as an
example to show how the theory works on the performance of distinct
distributed perturbation in SPSA and RDSA.
## 2 Background
This section briefly discusses the SPSA algorithm and the RDSA algorithm with
their estimates for the gradient, $\hat{\bm{g}}(\hat{\bm{\uptheta}}_{k})$.
SPSA (‘Simultaneous Perturbation Stochastic Algorithm’) has been well
discussed in [15, Chap. 7] and [14]. The estimate for
$\bm{g}(\hat{\bm{\uptheta}}_{k})$ is in the form of:
$\displaystyle\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})=\dfrac{y(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\Delta}_{k})-y(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\Delta}_{k})}{2c_{k}\bm{\Delta}_{k}},$
where $y(\hat{\bm{\uptheta}}_{k}\pm
c_{k}\bm{\Delta}_{k})=L(\hat{\bm{\uptheta}}_{k}\pm
c_{k}\bm{\Delta}_{k})+\upepsilon^{(\pm)}_{k}$ with $\upepsilon^{(\pm)}_{k}$
representing measurement noise term that satisfies
$E[\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}]=0$.
$\bm{\Delta}_{k}\in\mathbb{R}^{p}$ is a vector of $p$ mutually independent
mean-zero random variables representing the perturbation, which satisfies
certain conditions, and $\bm{\Delta}^{-1}_{k}$ represents the vector of
inverse components. There’s no specific type of distribution for
$\bm{\Delta}_{k}$ as long as the perturbation satisfies general conditions
mentioned in [15, Chap. 7] (Principally, mean 0, symmetric, finite moments and
certain inverse moments). Usually, $\bm{\Delta}_{k}$ can be chosen as
Bernoulli, U-shape, and other distributions. The range of choices is
restricted due to the main constraint that the inverse moment
$E(|1/\Delta_{km}|)$ should be finite. Many common distributions, such as
Gaussian distribution and Uniform distribution, cannot be applied to the SPSA
algorithm since they contain too much probability mass near 0.
For RDSA (‘Random Direction Stochastic Algorithm’), the estimate for
$\bm{g}(\hat{\bm{\uptheta}}_{k})$ is in the form of:
$\displaystyle\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})=\dfrac{y(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\pi}_{k})-y(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\pi}_{k})}{2c_{k}}\bm{\pi}_{k},$
where $\bm{\pi}_{k}\in\mathbb{R}^{p}$ is a vector of Monte-Carlo generated
random variables satisfying certain regularity conditions and normalized so
that $||\bm{\pi}_{k}||^{2}=p$ . Unlike SPSA, the requirement for finite
inverse moment is released for $\bm{\pi}_{k}$ in RDSA, so the range of choices
of distribution for $\bm{\pi}_{k}$ is different from that for
$\bm{\Delta}_{k}$ in SPSA. Several valid choices have been discussed in [18]
such as axis distribution, Gaussian distribution, and Uniformly Spherical
distribution where the perturbation distributes uniformly on a $p$-dimensional
sphere.
The main difference between the two algorithms is that in RDSA, both
adjustments to $\hat{\bm{\uptheta}}_{k}$ and
$\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})$ are in the same direction
$\bm{\pi}_{k}$ while the SPSA employs two different directions,
$\bm{\Delta}_{k}$ and $\bm{\upzeta}_{k}$ with component
$\upzeta_{ki}=1/{\Delta}_{ki}$.
There are two popular choices for $\bm{\pi}_{k}$: independent Gaussian
distribution $N(0,1)$ and Uniformly Spherical distribution with radius
$\sqrt{p}$. Notice that in Uniformly Spherical distribution, since there is
the normalization, $||\bm{\pi}_{k}||^{2}=p$, variables are not independent,
but uncorrelated.
## 3 Methodology
This section presents several results that form the theoretical basis for the
RDSA algorithm, similar to those results of SPSA, which have been completely
proved in [12]. The following sections consider the bias term in
$\bm{\hat{g}}_{k}(\bm{\hat{\uptheta}}_{k})$, the strong convergence and
asymptotic normality of $\hat{\bm{\uptheta}}_{k}$ in the RDSA algorithm. Then
we compare the performance of RDSA with SPSA using mean-square error computed
with the asymptotic distribution.
### 3.1 The bias in $\hat{\bm{g}}_{k}$
The bias term in $\hat{\bm{g}}_{k}$ is in the form of:
$\displaystyle\bm{b}_{k}(\hat{\bm{\uptheta}}_{k})=E[\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})|\hat{\theta}_{k}]-\bm{g}_{k}(\bm{\hat{\uptheta}}_{k}),$
(3)
where $\upepsilon^{(\pm)}_{k}=y(\bm{\uptheta}_{k}\pm
c_{k}\bm{\pi}_{k})-L(\bm{\uptheta}_{k}\pm c_{k}\bm{\pi}_{k})$ is the noise on
the estimate of the loss function $L$, with mean 0 and variance
$\upsigma^{2}$. Here we henceforth assume that the noise is independent with
$\hat{\bm{\uptheta}}_{k}$ and $\bm{\pi}_{k}$.
Calculate $E[\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})]$ and
$\bm{g}(\hat{\bm{\uptheta}}_{k})$ respectively:
$\displaystyle\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})=$
$\displaystyle\dfrac{y(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\pi}_{k})-y(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\pi}_{k})}{2c_{k}}\;\bm{\pi}_{k}$
$\displaystyle=\dfrac{L(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\pi}_{k})+\upepsilon^{(+)}_{k}-L(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\pi}_{k})-\upepsilon^{(-)}_{k}}{2c_{k}}\;\bm{\pi}_{k}$
$\displaystyle=\dfrac{L(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\pi}_{k})-L(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\pi}_{k})}{2c_{k}}\;\bm{\pi}_{k}+\dfrac{\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}}{2c_{k}}\bm{\pi}_{k}$
$\displaystyle=\dfrac{2c_{k}\bm{g}(\hat{\bm{\uptheta}}_{k})^{T}\bm{\pi}_{k}+\dfrac{1}{6}c^{3}_{k}L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(+)}_{k})[\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}]}{2c_{k}}\;\bm{\pi}_{k}$
$\displaystyle+\dfrac{\dfrac{1}{6}c^{3}_{k}L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(-)}_{k})[\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}]}{2c_{k}}\;\bm{\pi}_{k}$
$\displaystyle+O(c^{5}_{k})+\dfrac{\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}}{2c_{k}}\bm{\pi}_{k}$
where $\bar{\bm{\uptheta}}^{(\pm)}_{k}$ denotes points on the line segments
between $\hat{\bm{\uptheta}}_{k}$ and $\hat{\bm{\uptheta}}_{k}\pm
c_{k}\bm{\pi}_{k}$.
Then look at the $m$th term of $\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})$:
$\displaystyle\hat{g}_{km}(\hat{\bm{\uptheta}}_{k})=$
$\displaystyle\left(\sum_{i=1}^{p}g_{i}(\hat{\bm{\uptheta}}_{k}){\pi}_{ki}+\dfrac{1}{12}c^{2}_{k}[L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(+)}_{k})+L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(-)}_{k})][\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}]\right)\,\pi_{km}$
$\displaystyle+\dfrac{\upepsilon^{(+)}_{km}-\upepsilon^{(-)}_{km}}{2c_{k}}\pi_{km}$
$\displaystyle=g_{m}(\hat{\uptheta}_{k})\pi^{2}_{km}+\sum_{i=1,i\neq
m}^{p}g_{i}(\hat{\uptheta}_{k})\pi_{ki}{\pi}_{km}$
$\displaystyle+\dfrac{1}{12}c^{2}_{k}\left\\{[L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(+)}_{k})+L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(-)}_{k})][\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}])\;\pi_{km}\right\\}+\dfrac{\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}}{2c_{k}}\pi_{km}$
Based on the basic assumption of independence between $\upepsilon^{(\pm)}_{k}$
and $\bm{\pi}_{k}$ and the uncorrelation between $\pi_{ki}$ and $\pi_{kj}$,
$i\neq j$, we have:
$E\left[\dfrac{\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}}{2c_{k}}\bm{\pi}_{k}\right]=0;\;E(\pi^{2}_{km})=1;\;E(\pi_{ki}\pi_{km})=0.$
Then,
$\displaystyle E[\hat{g}_{km}(\hat{\bm{\uptheta}}_{k})]$
$\displaystyle=g_{m}(\hat{\bm{\uptheta}}_{k})E(\pi^{2}_{km})+\sum_{i=1,i\neq
m}^{p}g_{i}(\hat{\bm{\uptheta}}_{k})E(\pi_{ki}\pi_{km})$
$\displaystyle+\dfrac{c^{2}_{k}}{12}E\left\\{[L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(+)}_{k})+L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(-)}_{k})][\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}]\;\pi_{km}\right\\}$
$\displaystyle=g_{m}(\hat{\bm{\uptheta}}_{k})+\dfrac{c^{2}_{k}}{12}E\left\\{[L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(+)}_{k})+L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(-)}_{k})][\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}]\pi_{km}\right\\}$
$\displaystyle=g_{m}(\hat{\bm{\uptheta}}_{k})+\dfrac{1}{6}c^{2}_{k}E\left\\{[L^{{}^{\prime\prime\prime}}(\hat{\bm{\uptheta}}_{k})+O(c^{2}_{k})][\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}]\;\pi_{km}\right\\}$
$\displaystyle=g_{m}(\hat{\bm{\uptheta}}_{k})+\dfrac{1}{6}c^{2}_{k}\left(\sum_{i,j,k}\dfrac{\partial^{3}L}{\partial\pi_{ki}\partial\pi_{kj}\partial\pi_{kl}}\;\pi_{ki}\pi_{kj}\pi_{kl}\right)\;\pi_{km}+O(c^{4}_{k})$
$\displaystyle=g_{m}(\hat{\bm{\uptheta}}_{k})+\dfrac{1}{6}c^{2}_{k}\left(\dfrac{\partial^{3}L(\hat{\bm{\uptheta}}_{k})}{\partial{\pi}_{km}^{3}}\;\pi^{4}_{km}+\sum_{i,j,l\neq
m}\dfrac{\partial^{3}L}{\partial\pi_{ki}\partial\pi_{kj}\partial\pi_{kl}}\;\pi_{ki}\pi_{kj}\pi_{kl}\pi_{km}\right)+O(c^{4}_{k})$
So, the $m$th bias term is in the form of:
$\displaystyle\begin{split}\bm{b}_{km}(\hat{\bm{\uptheta}}_{k})&=E[\hat{g}_{km}(\hat{\bm{\uptheta}}_{k})]-g_{m}(\hat{\bm{\uptheta}}_{k})\\\
&=\dfrac{1}{6}c^{2}_{k}\left(L^{{}^{\prime\prime\prime}}_{mmm}(\hat{\bm{\uptheta}}_{k})E(\pi^{4}_{km})+3\sum\limits_{i=1,i\neq
m}^{p}L^{{}^{\prime\prime\prime}}_{iim}(\hat{\bm{\uptheta}}_{k})E(\pi^{2}_{ki}\pi^{2}_{km})\right)+O(c^{4}_{k})\end{split}$
### 3.2 Convergence Conditions
This subsection presents conditions for convergence of the RDSA iteration:
$\bm{\uptheta}^{*}\rightarrow\bm{\uptheta}^{*}\;\text{a.s.}$. The following
conditions ensure convergence of $\hat{\bm{\uptheta}}_{k}$ to
$\bm{\uptheta}^{*}$ in the RDSA algorithm:
Consider all $k\geq K$ for some $K<\infty$. Suppose that for each $k$, there
exists some $\upalpha_{0},\upalpha_{1},\upalpha_{2}>0$, $\bm{\pi}_{k}$ is a
direction vector normalized so that $||\bm{\pi}_{k}||^{2}=p$ and symmetrically
distributed about 0 with $|\pi_{ki}^{4}|\leq\upalpha_{0}\;\text{a.s.
and}\;E|\pi_{ki}|^{2}\leq\upalpha_{1}.i=1,2,...,p$ For almost all
$\hat{\bm{\uptheta}}_{k}$, suppose that for $\forall\;\bm{\uptheta}$ in an
open neighborhood of $\hat{\bm{\uptheta}}_{k}$,
$L^{{}^{\prime\prime\prime}}(\bm{\uptheta})$ exists continuously with
individual elements satisfying
$|L^{{}^{\prime\prime\prime}}_{ijk}(\bm{\uptheta})|\leq\upalpha_{2}$. Similar
to the conditions for SPSA discussed in [15, Chap.7], if the derivatives of
$L$ are equicontinuous and bounded, then the RDSA algorithm will converge
almost surely under the following conditions:
* •
A1: $a_{k},c_{k}>0,\;\forall k:a_{k}\rightarrow 0,c_{k}\rightarrow
0\;{\text{as}}\;k\rightarrow\infty,\;\sum\limits^{\infty}_{k=0}a_{k}=\infty,\;\sum\limits^{\infty}_{k=0}\left(\dfrac{a_{k}}{c_{k}}\right)^{2}<\infty.$
* •
A2:
$\mathop{{\text{sup}}}\limits_{k}||\hat{\bm{\uptheta}}_{k}||<\infty\;\text{a.s.}$
* •
A3: $\bm{\uptheta}^{*}$ is an asymptotically stable solution of the
differential equation: $d\bm{x}(t)/dt=-\bm{g}(\bm{x}).$
* •
A4: Let
$D(\bm{\uptheta}^{*})=[x_{0}|\mathop{\text{lim}}\limits_{t\rightarrow\infty}\bm{x}(t|x_{0})=\bm{\uptheta}^{*}]$
where $\bm{x}(t|x_{0})$ denotes the solution to the differential equation of
$d\bm{x}(t)/dt=-\bm{g}(\bm{x})$ based on initial conditions $\bm{x}_{0}$.
There exists a compact $S\subseteq D(\bm{\uptheta}^{*})$ s.t
$\tilde{\bm{\uptheta}}\in S$ infinitely often for almost all sample points.
* •
A5: $\forall
k,E|\upepsilon^{(\pm)}_{k}|^{2}\leq\upalpha_{0},E(\bm{\pi}_{k}\bm{\pi}^{T}_{k})=\bm{I}$,
and $E|\pi^{2}_{kl}L(\hat{\bm{\uptheta}}_{k}\pm
c_{k}{\bm{\pi}}_{k})^{2}|\leq\upalpha_{1},\;l=1,2,...,p.$
Proposition 1A: Let A1–A5 hold and for some $K<\infty$, each $k\geq K$,
${\\{\pi_{ki}\\}}$ is Gaussian (0,1) distributed i.i.d., then
$\hat{\bm{\uptheta}}_{k}\rightarrow\bm{\uptheta}^{*}$ as $k\rightarrow\infty$.
Proposition 1B: Let A1–A5 hold and for some $K<\infty$, each $k\geq K$,
${\\{\pi_{ki}\\}}$ are uniformly distributed on a $p$-dim sphere, then
$\hat{\bm{\uptheta}}_{k}\rightarrow\bm{\uptheta}^{*}$ as $k\rightarrow\infty$.
Proof: This proof applies for both 1A and 1B above. From the above subsection
in terms of bias in $\hat{\bm{g}}_{k}$ and the A1 condition, we know that:
$\displaystyle||b_{k}(\hat{\bm{\uptheta}}_{k})||<\infty\qquad\forall
k,\;b_{k}(\hat{\bm{\uptheta}}_{k})\rightarrow\bm{0}\;\;\text{a.s.}$ (4)
According to the inequality in [7, p. 315] , it holds that:
$\displaystyle P(\mathop{\text{sup}}\limits_{m\geq
k}||\sum\limits_{i=k}^{m}a_{i}\bm{e}_{i}||\geq\upeta)\leq\upeta^{-2}E||\sum\limits_{i=k}^{\infty}a_{i}\bm{e}_{i}||^{2}=\upeta^{-2}\sum\limits_{i=k}^{\infty}a^{2}_{i}E||\bm{e}_{i}||^{2}.$
(5)
By the definition of $\bm{e}_{k}(\hat{\bm{\uptheta}}_{k})$ and Condition A1,
A5, we would have:
$\mathop{\text{lim}}\limits_{k\rightarrow\infty}P(\mathop{\text{sup}}\limits_{m\geq
k}||\sum\limits_{i=k}^{m}a_{i}\bm{e}_{i}||\geq\upeta)=0\;\;\text{for\;any\;}\upeta>0.$
Then, by [5, Lemma 2.2.1], the above propositions hold.
### 3.3 Asymptotic Normality
This subsection mainly discusses the asymptotic normality for
$\hat{\bm{\uptheta}}_{k}$ in RDSA algorithm, especially, how the Fabian’s
Theorem in [5, Theorem 2.2] applies on RDSA algorithm based on its
generalization for SPSA shown in [12] and [6]. In order to satisfy the
conditions for Fabian’s Theorem, we strengthen the Condition A5 to:
A5′: For some $\updelta,\upalpha_{0},\upalpha_{1},\upalpha_{2}>0$ and $\forall
k,E|\upepsilon^{(\pm)}_{k}|^{2+\delta}\leq\upalpha_{0},E(\pi_{kl}L(\hat{\bm{\uptheta}}_{k}\pm
c_{k}\bm{\pi}_{k}))^{2+\updelta}\leq\upalpha_{1},E(\pi_{kl})^{4+\updelta}\leq\upalpha_{2},\;l=1,2,...,p,E(\bm{\pi}_{k}\bm{\pi}^{T}_{k})=\bm{I}$.
Then, the conditions for the asymptotic normality for
$\hat{\bm{\uptheta}}_{k}$ in RDSA can be stated as the following proposition:
Proposition 2: Assume that conditions A1–A4 and A5′ hold and $\upbeta>0$. Let
$\bm{H}(\cdot)$ denote the Hessian matrix for $L(\bm{\uptheta})$;
$\upsigma,\upphi$ be such that
$E(\upepsilon_{k}^{(+)}-\upepsilon_{k}^{(-)})^{2}\rightarrow\upsigma^{2}$ and
$E(\pi_{kl}^{4})\rightarrow\upphi,\;k\rightarrow\infty$. Suppose the gain
sequences are
$a_{k}=a/(k+1)^{\upalpha},c_{k}=c/(k+1)^{\upgamma},a>0,c>0,k=0,1,2,3,...$ and
set $0<\upalpha\leq 1,\upgamma\geq\upalpha/6,\upbeta=\upalpha-2\upgamma$. Let
$\bm{P}$ be an orthogonal matrix such that
$\bm{PH}(\bm{\uptheta}^{*})\bm{P}^{T}=a^{-1}\text{diag}(\uplambda_{1},...,\uplambda_{p})$.
Then
$\displaystyle
k^{\upbeta/2}(\hat{{\uptheta}}_{k}-{\uptheta}^{*})\stackrel{{\scriptstyle\text{dist}}}{{\longrightarrow}}N(\bm{\upmu},\bm{PMP}^{T}),\quad
k\rightarrow\infty,$ (6)
where
$\bm{M}=\dfrac{1}{4c^{2}}a^{2}\upsigma^{2}\text{diag}[1/(2\uplambda_{1}-\upbeta_{+}),....,1/(2\uplambda_{p}-\upbeta_{+})]$
with $\upbeta_{+}=\upbeta<2\mathop{\text{min}}\limits_{i}\uplambda_{i}$ if
$\upalpha=1$ and $\upbeta_{+}=0$ if $\upalpha<1$, and
$\displaystyle\bm{\upmu}=\left\\{\begin{array}[]{ccr}0&&{\text{if}\;3\upgamma-\upalpha/2>0}\\\
(a\bm{H}(\uptheta^{*})-\dfrac{1}{2}\upbeta_{+}\bm{I})^{-1}\bm{T}&&{\text{if}\;3\upgamma-\upalpha/2=0}\\\
\end{array}\right.,$ (9)
where the $l$th component of $\bm{T}$ is:
$\displaystyle\bm{T}^{\text{RD}}_{l}=-\dfrac{1}{6}ac^{2}\left[{\upphi}L^{{}^{\prime\prime\prime}}_{lll}(\bm{\uptheta}^{*})+3{\upsilon}\sum\limits_{i\neq
l}^{p}L^{{}^{\prime\prime\prime}}_{iil}(\bm{\uptheta}^{*})\right],$
and
$\displaystyle{\upphi}=E(\pi^{4}_{kl}),\;{\upsilon}=E(\pi^{2}_{kl}\pi^{2}_{km}),\;l\neq
m.$
Proof: The result will be shown if conditions (2.2.1), (2.2.2), and (2.2.3) of
[5, Theorem 2.2] hold. In the notation of [5, Theorem 2.2], we can rewrite the
formula (1) in the form of:
$\displaystyle\hat{\bm{\uptheta}}_{k+1}-\bm{\uptheta}^{*}=(\bm{I}-k^{-\upalpha}\bm{\Gamma}_{k})(\hat{\bm{\uptheta}}_{k}-\bm{\uptheta}^{*})+k^{-(\upalpha+\upbeta)/2}\bm{\Phi}_{k}\bm{V}_{k}+k^{-\upalpha-\upbeta/2}\bm{T}_{k},$
where
$\displaystyle\bm{\Gamma}_{k}$
$\displaystyle=k^{\upalpha}a_{k}\tilde{\bm{H}}_{k},\;\;\;\bm{\Phi}_{k}=-a\bm{I},$
$\displaystyle\bm{V}_{k}$
$\displaystyle=\dfrac{1}{k^{\upgamma}}[\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})-E(\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})],\;\;\bm{T}_{k}=-ak^{\upbeta/2}\bm{b}_{k}(\hat{\bm{\uptheta}}_{k}).$
Next, we are going to verify Fabian’s conditions.
As shown in the [4, p. 233], let
$\bm{\Gamma}_{k}=k^{\upalpha}a_{k}\tilde{\bm{H}}_{k}$ where the $i$th row of
$\tilde{\bm{H}}_{k}$ equals to the $i$th row of the Hessian matrix evaluated
at
$\bm{\uptheta}=(1-\uplambda_{i})\hat{\bm{\uptheta}}_{k}+\uplambda_{i}\bm{\uptheta}^{*}$
for some $\uplambda_{i}\in[0,1]$. Due to the continuity of
$\bm{H}(\bm{\uptheta})$ at $\bm{\uptheta}^{*}$ and
$k^{\upalpha}a_{k}\rightarrow a,k\rightarrow\infty$,
$a\bm{H}(\bm{\uptheta}^{*})$ would be a positive definite matrix, which
$\bm{\Gamma}_{k}$ would converge to.
Next, consider the convergence of $\bm{T}_{k}$:
$\displaystyle T_{kl}$
$\displaystyle=-\dfrac{1}{12}ac^{2}\dfrac{1}{k^{3\upgamma-\upalpha/2}}E\left\\{\pi_{kl}[L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(+)}_{k})+L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(-)}_{k})]\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}\right\\}.$
If $3\upgamma-\upalpha/2>0$, we have ${T}_{kl}\rightarrow 0$ a.s.
If $3\upgamma-\upalpha/2=0$, use the fact that $L^{{}^{\prime\prime\prime}}$
is uniformly bounded near $\bm{\uptheta}^{*}$, we have:
$T_{kl}\rightarrow-\dfrac{ac^{2}}{6}\left\\{E(\pi^{4}_{kl})L^{{}^{\prime\prime\prime}}_{lll}(\bm{\uptheta}^{*})+3\sum\limits_{i\neq
l}^{p}L^{{}^{\prime\prime\prime}}_{iil}(\bm{\uptheta}^{*})E(\pi^{2}_{ki}\pi^{2}_{kl})\right\\}\;\text{a.s.}$
So, we can show that $\bm{T}_{k}$ converges a.s. for $3\upgamma-\upalpha/2\geq
0.$. Further, obviously,
$\bm{\Phi}_{k}=-a\bm{I}\rightarrow\bm{\Phi}=-a\bm{I}.$
Last, consider $\bm{V}_{k}$:
$\displaystyle\begin{split}&E(\bm{V}_{k}\bm{V}^{T}_{k})\\\
&=k^{-2\upgamma}E\bigg{\\{}\bm{\pi}_{k}(\bm{\pi}_{k})^{T}\left[\dfrac{L(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\pi}_{k})-L(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\pi}_{k})}{2ck^{-\upgamma}}\right]^{2}\\\
&+\bm{\pi}_{k}(\bm{\pi}_{k})^{T}\left[\dfrac{\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}}{2ck^{-\upgamma}}\right]\left[\dfrac{L(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\pi}_{k})-L(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\pi}_{k})}{2ck^{-\upgamma}}\right]\\\
&+\bm{\pi}_{k}(\bm{\pi}_{k})^{T}\left[\dfrac{\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}}{2ck^{-\upgamma}}\right]^{2}\bigg{\\}}\\\
&-k^{-2\upgamma}\left[\bm{g}(\hat{\bm{\uptheta}}_{k})+\bm{b}_{k}(\hat{\bm{\uptheta}}_{k})\right]\left[\bm{g}(\hat{\bm{\uptheta}}_{k})+\bm{b}_{k}(\hat{\bm{\uptheta}}_{k})\right]^{T}.\end{split}$
(10)
Similar to the proof (3.5) in [12], for sufficiently large $k$,
$L(\hat{\bm{\uptheta}}_{k}\pm c_{k}{\bm{\pi}_{k}})$ is uniformly bounded in
$\bm{\pi}_{k}$. Combined with condition A2 and Holder’s Inequality, it is
implied that the first and second terms in (10) will converge to 0 a.s. Also,
by conditions A1–A5, the fourth term will converge to 0 a.s. as well.
Then consider the third term:
$\displaystyle
E\left\\{\bm{\pi}_{k}(\bm{\pi}_{k})^{T}\left[\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}\right]^{2}\right\\}$
$\displaystyle=\int_{\Omega_{\bm{\pi}}}\bm{\pi}_{k}(\bm{\pi}_{k})^{T}E\left[\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}\right]^{2}dP_{\bm{\pi}}.$
where $\Omega_{\bm{\pi}}$ is the sample space generating the $\bm{\pi}_{k}$
and $P$ is the corresponding probability measure. Here we have the fact that
$E\left[\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}\right]^{2}\rightarrow\upsigma^{2}$
a.s. and $||\bm{\pi}_{k}||^{2}=p$. If we consider ${\\{\bm{\pi}_{ij}}\\}$ to
be independently generated with mean 0 and second moment 1 and then it leads
to the result that $E({\pi}_{kl}{\pi}_{km})=E({\pi}_{kl})E({\pi}_{km})=0$. If
we consider $\\{\pi_{k}\\}$ being generated from a $p$-dimensional sphere with
radius $\sqrt{p}$ uniformly, then for $l\neq m,\;{\pi}_{kl},{\pi}_{km}$ are
not independent, but uncorrelated. In this case, we still have
$E({\pi}_{kl}{\pi}_{km})=E({\pi}_{kl})E({\pi}_{km})=0$. Moreover,
$E({\pi}^{2}_{kl})=E({\pi}^{2}_{km})$, such that $E({\pi}^{2}_{kl})=1$. So, we
can have: $E[\bm{\pi}_{k}(\bm{\pi}_{k})^{T}]=\bm{I},\;\;\forall\;l\neq m$.
such that,
$E(\bm{V}_{k}\bm{V}^{T}_{k})\rightarrow\dfrac{1}{4}c^{-2}\upsigma^{2}\bm{I}.$
Now, the conditions (2.2.1) and (2.2.2) in [5, Theorem 2.2] have been shown.
Next, we are going to show the condition (2.2.3) also holds. By the definition
of $\bm{V}_{k}$, Markov Inequality, and the triangle inequality and the proof
shown in (3.8) in [12], for any $0<\upsilon<\updelta/2$, it holds that:
$\displaystyle||\bm{V}_{k}||^{2(1+\upsilon)}\leq$ $\displaystyle
2^{2(1+\upsilon)}k^{-2\upgamma(1+\upsilon)}[||\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})||^{2(1+\upsilon)}$
$\displaystyle+||\bm{b}_{k}(\hat{\bm{\uptheta}}_{k})||^{2(1+\upsilon)}+||\bm{g}_{k}(\hat{\bm{\uptheta}}_{k})||^{2(1+\upsilon)}].$
Since $\bm{g}(\hat{\bm{\uptheta}}_{k})$ and
$\bm{b}_{k}(\hat{\bm{\uptheta}}_{k})$ are uniformly bounded and
$L(\hat{\bm{\uptheta}}_{k}\pm c_{k}{\bm{\pi}}_{k})$ is uniformly bounded for
$\forall k>K$, we have
$\displaystyle
E[k^{-2\upgamma(1+\upsilon)}||\bm{b}_{k}(\hat{\bm{\uptheta}}_{k})||^{2(1+\upsilon)}]\rightarrow\bm{0},$
$\displaystyle
E[k^{-2\upgamma(1+\upsilon)}||\bm{g}_{k}(\hat{\bm{\uptheta}}_{k})||^{2(1+\upsilon)}]\rightarrow\bm{0}.$
as $k\rightarrow\infty$. Moreover, invoking A5′, Holder’s Inequality, similar
to the case in [12], it implies that
$E[||\hat{g}_{k}(\hat{\bm{\uptheta}}_{k})||^{2(1+\upsilon)}]=O(k^{2\upgamma(1+\upsilon)})$.
As a result, $E||\bm{V}_{k}||^{2(1+\upsilon)}=O(1)$, which shows that:
$\mathop{\rm{lim}}\limits_{k\rightarrow\infty}E\left(I_{||\bm{V}_{k}||^{2}\geq
rk^{\upalpha}}||\bm{V}_{k}||^{2}\right)=0,\qquad\forall r>0,$
where $I_{\\{.\\}}$ is the indicator function.
Now all the required conditions for Fabian’s Theorem in [5, Theorem 2.2] have
been verified. It is stated that $\hat{\bm{\uptheta}}_{k}$ in RDSA algorithm
is asymptotically normal.
Corollary 2A: Assume conditions in Proposition 2 hold and perturbation
$\\{{\bm{\pi}_{k}\\}}$ is Gaussian distributed $N(0,1)$ independently. Then
the $l$th component of $\bm{T}$ is:
$\bm{T}^{\text{RD}}_{l}=-\dfrac{1}{6}ac^{2}\left[3L^{{}^{\prime\prime\prime}}_{lll}(\bm{\uptheta}^{*})+3\sum\limits_{m\neq
l}^{p}L^{{}^{\prime\prime\prime}}_{llm}(\bm{\uptheta}^{*})\right].$
Corollary 2B: Assume conditions in Proposition 2 hold and perturbation
$\\{{\bm{\pi}_{k}}\\}$ is uniformly distributed on a $p$-dim sphere with
radius $\sqrt{p}$. Then the $l$th element of $\bm{T}$ is:
$\bm{T}^{\text{RD}}_{l}=-\dfrac{1}{6}ac^{2}\left[\dfrac{3p}{p+2}L^{{}^{\prime\prime\prime}}_{lll}(\bm{\uptheta}^{*})+\dfrac{3p}{p+2}\sum\limits_{m\neq
l}^{p}L^{{}^{\prime\prime\prime}}_{llm}(\bm{\uptheta}^{*})\right].$
### 3.4 Relative Accuracy between SPSA and RDSA
#### 3.4.1 Introduction
This subsection discusses the MSE for SPSA and RDSA algorithm using the same
gain sequence. We mainly focus on several widely used distributions for
perturbations in SPSA and RDSA. We choose Bernoulli, and U-shape, especially
polynomial with high order for $\bm{\Delta}_{k}$. (Here we choose
$\Delta_{ki}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}x^{10},\,x\in[-1.17,1.17]$
to make it a valid probability density function) and choose Gaussian and
uniform-spherical for $\bm{\pi}_{k}$ in RDSA.
Notice that $\hat{{\bm{\uptheta}}}_{k}$ in the SPSA and RDSA algorithms have
the asymptotic normality in, respectively, [12] or formula (6) with different
values for the parameters. Here we give several notations to make the
parameters more concise:
$\displaystyle\begin{split}&\upphi=E[({\pi}^{4}_{ki})]\;\;;\;\,\qquad{\upsilon}=E({\pi}^{2}_{ki}{\pi}^{2}_{km}),\;i\neq
m\\\
&{\uprho}^{2}=E\left[({\Delta}_{ki})^{-2}\right];\;\;{\xi}^{2}=E\left[({\Delta}_{ki})^{2}\right].\end{split}$
Then we have:
$\displaystyle\bm{T}^{\text{RD}}_{l}$
$\displaystyle=-\dfrac{1}{6}ac^{2}\left[{\upphi}L^{{}^{\prime\prime\prime}}_{lll}(\bm{\uptheta}^{*})+3{\upsilon}\sum\limits_{m\neq
l}^{p}L^{{}^{\prime\prime\prime}}_{llm}(\bm{\uptheta}^{*})\right];$
$\displaystyle\bm{M}^{\text{RD}}$
$\displaystyle=\dfrac{1}{4c^{2}}a^{2}\upsigma^{2}\text{diag}\left(\dfrac{1}{2\uplambda_{1}-\beta_{+}},....,\dfrac{1}{2\uplambda_{p}-\beta_{+}}\right);$
$\displaystyle\bm{T}^{\text{SP}}_{l}$
$\displaystyle=-\dfrac{1}{6}ac^{2}{\xi}^{2}\left[L^{{}^{\prime\prime\prime}}_{lll}(\bm{\uptheta}^{*})+3\sum\limits_{m\neq
l}^{p}L^{{}^{\prime\prime\prime}}_{llm}(\bm{\uptheta}^{*})\right];$
$\displaystyle\bm{M}^{\text{SP}}$
$\displaystyle=\dfrac{1}{4c^{2}}a^{2}\upsigma^{2}{\uprho}^{2}\text{diag}\left(\dfrac{1}{2\uplambda_{1}-\upbeta_{+}},....,\dfrac{1}{2\uplambda_{p}-\beta_{+}}\right).$
Notice that tr$(\bm{M}_{\text{SP}})={\uprho}^{2}$tr$(\bm{M}_{\text{RD}}).$
Then, we can compute the asymptotic mean-square error by the definition:
$\displaystyle{\text{MSE}}=\bm{\upmu}^{T}\bm{\upmu}+{\text{tr}}(\bm{PMP}^{T})=\bm{\upmu}^{T}\bm{\upmu}+{\text{tr}}(\bm{M}).$
Asymptotically, the ratio of the MSE values of the two algorithms are in the
form of:
$\displaystyle\begin{split}\dfrac{\text{MSE}_{\text{RD}}}{\text{MSE}_{\text{SP}}}&\rightarrow\dfrac{\bm{\mu}^{T}_{\text{RD}}\bm{\mu}_{\text{RD}}+{\text{tr}}(\bm{PM}_{\text{RD}}\bm{P}^{T})}{\bm{\mu}^{T}_{\text{SP}}\bm{\mu}_{\text{SP}}+{\text{tr}}(\bm{PM}_{\text{SP}}\bm{P}^{T})}\\\
&={\left[{\upphi}\bm{u}_{1}+{\upsilon}\bm{u}_{2}\right]^{T}\bm{S}\left[{\upphi}\bm{u}_{1}+{\upsilon}\bm{u}_{2}\right]+{D}}{\left[\upxi^{2}\bm{u}_{1}+\upxi^{2}\bm{u}_{2}\right]^{T}\bm{S}\left[\upxi^{2}\bm{u}_{1}+\upxi^{2}\bm{u}_{2}\right]+{\uprho}^{2}{D}},\end{split}$
(11)
where
$\displaystyle\bm{u}_{1}=ac^{2}[L^{{}^{\prime\prime\prime}}_{111}(\bm{\uptheta}^{*}),...,L^{{}^{\prime\prime\prime}}_{ppp}(\bm{\uptheta}^{*})]^{T}/6;$
$\displaystyle\bm{u}_{2}=ac^{2}[3\sum\limits_{j\neq
1}L^{{}^{\prime\prime\prime}}_{jj1}(\bm{\uptheta}^{*}),...,3\sum\limits_{j\neq
p}L^{{}^{\prime\prime\prime}}_{jjp}(\bm{\uptheta}^{*})]^{T}/6;$
$\displaystyle\bm{S}=\left(a\bm{H}(\bm{\uptheta}^{*})-\dfrac{\upbeta_{+}}{2}\bm{I}\right)^{-2};$
$\displaystyle
D={\text{tr}}(\bm{M}_{\text{RD}})=\dfrac{a^{2}\upsigma^{2}}{4c^{2}}\sum\limits_{i=1}^{p}\dfrac{1}{2\uplambda_{i}-\upbeta_{+}}.$
Denote
$\displaystyle\begin{split}&{Q}_{1}=(\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(\bm{u}_{1}+\bm{u}_{2}),\\\
&{Q}_{2}=(3\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(3\bm{u}_{1}+\bm{u}_{2}).\end{split}$
The parameters ${\\{\upphi,\upsilon,\upxi^{2},\uprho^{2}}\\}$ and the MSE
values for several common used perturbations in SPSA and RDSA are listed as
follows:
Table 1: Key parameters for perturbations in RDSA and SPSA algorithms with different distributions Perturbation in RDSA | ${\upphi}$ | ${\upsilon}$
---|---|---
${\pi}_{ki}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}N(0,1)$ | 3 | 1
$\bm{\pi}_{k}\sim$ Uniformly Spherical | $\dfrac{3p}{p+2}$ | $\dfrac{p}{p+2}$
Perturbation in SPSA | ${\xi}^{2}$ | ${\rho}^{2}$
---|---|---
${\Delta}_{ki}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}$ Bernoulli ($\pm 1$) | 1 | 1
${\Delta}_{ki}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}x^{10}$, $x\in[-1.17,1.17]$ | 1.15 | 0.90
Table 2: MSE in SPSA and RDSA with different perturbations Algorithm | Distribution | MSE
---|---|---
SPSA | Bernoulli | ${Q}_{1}+D$
SPSA | U-shape ($x^{10}$) | $1.33{Q}_{1}+0.9D$
RDSA | Gaussian | ${Q}_{2}+D$
RDSA | Uniformly Spherical | $\dfrac{p}{p+2}{Q}_{2}+D$
From the two tables, we notice that when dimension $p$ is sufficiently large,
$\upphi,\upsilon$ of uniformly spherical are identical to those of the
Gaussian distribution. Also, as the order $d$ of $x^{d}$ in the U-shape
distribution increases, $\upxi^{2}$ of that distribution is close to that of
Bernoulli as well (the curve of the U-shape converges to two single points
$\pm 1$). Next, we are going to choose Bernoulli and Gaussian, respectively to
be the representative distribution of SPSA and RDSA and make comparisons
between them.
Proposition 3: If $2\bm{u}^{T}_{1}\bm{Su}_{1}+\bm{u}^{T}_{1}\bm{Su}_{2}\geq 0$
holds, then SPSA with Bernoulli distributed perturbation has a smaller MSE
value than RDSA with Gaussian perturbation.
Corollary 3A: If $|2\bm{u}_{1}|>|\bm{u}_{2}|$ holds component-wise and
$S_{ij}\geq 0$, then Proposition 3 holds.
Proof: $\bm{S}=(a\bm{H}(\bm{\uptheta}^{*})-\upbeta_{+}\bm{I}/2)^{-2}$ is a
positive-definite matrix by the fact that $\bm{H}(\bm{\uptheta}^{*})$ is
diagonalizable and
$\upbeta_{+}<2\text{min}\uplambda_{i}(a\bm{H}(\uptheta^{*}))$. By matrix
analysis, for any $\bm{u}_{1},\bm{u}_{2}\in\mathbb{R}^{p}$:
$|\bm{u}^{T}_{1}\bm{S}\bm{u}_{2}|\leq\sqrt{(\bm{u}^{T}_{1}\bm{Su}_{1})(\bm{u}^{T}_{2}\bm{Su}_{2})},$
So we would have,
$\displaystyle\begin{split}&2\bm{u}^{T}_{1}\bm{Su}_{1}+\bm{u}^{T}_{1}\bm{Su}_{2}\\\
&\geq
2\bm{u}^{T}_{1}\bm{Su}_{1}-\sqrt{(\bm{u}^{T}_{1}\bm{Su}_{1})(\bm{u}^{T}_{2}\bm{Su}_{2})}.\end{split}$
(12)
If $|2\bm{u}_{1}|\geq|\bm{u}_{2}|$ component-wise and $S_{ij}\geq 0$, then the
r.h.s of (12) would be larger than 0, so that
$2\bm{u}^{T}_{1}\bm{Su}_{1}+\bm{u}^{T}_{1}\bm{Su}_{2}\geq 0$, leading to,
$\displaystyle(3\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(3\bm{u}_{1}+\bm{u}_{2})\geq(\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(\bm{u}_{1}+\bm{u}_{2}).$
Consequently, the MSE of SPSA with Bernoulli-distributed perturbation will be
lower than that of RDSA with Gaussian-distributed perturbation.
Corollary 3B: If the loss function does not have cross-third derivative term,
i.e. $\bm{u}_{2}=\bm{0}$ along with $\upxi^{2}<\upphi,\uprho<1$, then SPSA has
a smaller MSE value than RDSA for any valid perturbation.
Proof: When $\bm{u}_{2}=\bm{0}$, we would have:
$\displaystyle\begin{split}&\text{MSE}_{\text{SPSA}}=\upxi^{4}\bm{u}^{T}_{1}\bm{Su}_{1}+\uprho^{2}D,\\\
&\text{MSE}_{\text{RDSA}}=\upphi^{2}\bm{u}^{T}_{1}\bm{Su}_{1}+D,\end{split}$
(13)
Then under the condition that $\upxi^{2}<\upphi,\uprho<1$, SPSA would have a
smaller MSE value.
#### 3.4.2 Application on the skewed-quartic function
Consider the skewed quartic loss function:
$L(\bm{\uptheta})=\bm{\uptheta}^{T}\bm{B}^{T}\bm{B\uptheta}+0.1\sum\limits^{p}_{i=1}(\bm{B\uptheta})^{3}_{i}+0.01\sum\limits^{p}_{i=1}(\bm{B\uptheta})^{4}_{i}.$
where $\bm{\uptheta}=(t_{1},t_{2},...,t_{p})^{T}$. After calculation we obtain
that:
$\bm{u}_{1}=ac^{2}(L^{{}^{\prime\prime\prime}}_{111}(\bm{\uptheta}),...,L^{{}^{\prime\prime\prime}}_{ppp}(\bm{\uptheta}))^{T}/6|_{\bm{\uptheta}^{*}=\bm{0}}$=
$\displaystyle\dfrac{ac^{2}}{6}\left(\begin{array}[]{l}\dfrac{0.6}{p^{3}}+\dfrac{0.01}{p^{4}}\times
24\sum\limits^{p}_{i=1}t_{i}\\\ \dfrac{0.6}{p^{3}}\times
2+\dfrac{0.01}{p^{4}}\times
24\times(\sum\limits^{p}_{i=1}t_{i}+\sum\limits^{p}_{i=2}t_{i})\\\
\dfrac{0.6}{p^{3}}\times 3+\dfrac{0.01}{p^{4}}\times
24\times(\sum\limits^{p}_{i=1}t_{i}+\sum\limits^{p}_{i=2}t_{i}+\sum\limits^{p}_{i=3}t_{i})\\\
...\\\ \dfrac{0.6}{p^{3}}\times p+\dfrac{0.01}{p^{4}}\times
24\times(\sum\limits^{p}_{i=1}t_{i}+\sum\limits^{p}_{i=2}t_{i}+\sum\limits^{p}_{i=3}t_{i}+...+t_{p})\end{array}\right)_{\bm{\uptheta}^{*}=\bm{0}}=\dfrac{0.1\times
ac^{2}}{p^{3}}\left(\begin{array}[]{c}1\\\ 2\\\ 3\\\ ...\\\ p-1\\\
p\end{array}\right)$
$\bm{u}_{2}=ac^{2}(3\sum\limits^{p}_{j\neq
1}L^{{}^{\prime\prime\prime}}_{jj1}(\bm{\uptheta}),...,3\sum\limits^{p}_{j\neq
p}L^{{}^{\prime\prime\prime}}_{jjp}(\bm{\uptheta}))^{T}/6|_{\bm{\uptheta}^{*}=\bm{0}}$=
$\displaystyle\dfrac{ac^{2}}{2}\left(\begin{array}[]{l}(p-1)\left(\dfrac{0.6}{p^{3}}+\dfrac{0.01}{p^{4}}\times
24\sum\limits^{p}_{i=1}t_{i}\right)\\\
(p-1)\left(\dfrac{0.6}{p^{3}}+\dfrac{0.01}{p^{4}}\times
24\sum\limits^{p}_{i=1}t_{i}\right)+(p-2)\left(\dfrac{0.6}{p^{3}}+\dfrac{0.01}{p^{4}}\times
24\sum\limits^{p}_{i=2}t_{i}\right)\\\ ...\\\
(p-1)\left(\dfrac{0.6}{p^{3}}+\dfrac{0.01}{p^{4}}\times
24\sum\limits^{p}_{i=1}t_{i}\right)+...+\dfrac{0.6}{p^{3}}+\dfrac{0.01}{p^{4}}\times
24\sum\limits^{p}_{i=p-1}t_{i}\end{array}\right)$
$\displaystyle=\dfrac{0.3\times ac^{2}}{p^{3}}\left(\begin{array}[]{c}p-1\\\
(p-1)+(p-2)\\\ ...\\\ (p-1)+(p-2)+...+2+1\end{array}\right)$
$\bm{H}(\bm{\uptheta}^{*})=(L^{{}^{\prime\prime}}_{ij}(\bm{\uptheta}))_{ij}|_{\bm{\uptheta}^{*}=\bm{0}}$=
$\displaystyle\left(\begin{array}[]{ccccc}\dfrac{2}{p^{2}}&\dfrac{2}{p^{2}}&\dfrac{2}{p^{2}}&...&\dfrac{2}{p^{2}}\\\
\dfrac{2}{p^{2}}&\dfrac{2}{p^{2}}\times 2&\dfrac{2}{p^{2}}\times
2&...&\dfrac{2}{p^{2}}\times 2\\\ \dfrac{2}{p^{2}}&\dfrac{2}{p^{2}}\times
2&\dfrac{2}{p^{2}}\times 3&...&\dfrac{2}{p^{2}}\times 3\\\
\dfrac{2}{p^{2}}\times&\dfrac{2}{p^{2}}\times 2&\dfrac{2}{p^{2}}\times
3&...&\dfrac{2}{p^{2}}\times 4\\\ ...\\\
\dfrac{2}{p^{2}}&\dfrac{2}{p^{2}}\times 2&\dfrac{2}{p^{2}}\times
3&...&\dfrac{2}{p^{2}}\times
p\end{array}\right)=\dfrac{2}{p^{2}}\left(\begin{array}[]{cccccc}1&1&1&1&...&1\\\
1&2&2&2&...&2\\\ 1&2&3&3&...&3\\\ 1&2&3&4&...&4\\\ ...\\\
1&2&3&4&...&p\end{array}\right)$
In many practical cases, we set $\upalpha$ in the gain sequence
$a_{k}=a/(k+1)^{\upalpha}$ less than 1, so the $\upbeta^{+}=0$. Then
$\bm{S}=(a\bm{H}(\bm{\uptheta}^{*})-\dfrac{\upbeta^{+}}{2}\bm{I})^{-2}$=
$\displaystyle\dfrac{p^{4}}{4a^{2}}\left(\begin{array}[]{ccccccccc}5&-4&1&0&0&...&0&0&0\\\
-4&6&-4&1&0&...&0&0&0\\\ 1&-4&6&-4&1&...&0&0&0\\\ 0&1&-4&6&-4&...&0&0&0\\\
...\\\ 0&0&0&0&...&1&-4&6&-3\\\ 0&0&0&0&...&0&1&-3&2\end{array}\right)$
Then we could calculate the key terms:
$\displaystyle\begin{split}&\bm{u}^{T}_{1}\bm{Su}_{1}=\dfrac{0.01\times
c^{4}}{4a^{2}p^{2}};\\\ &\bm{u}^{T}_{1}\bm{Su}_{2}=0;\\\
&\bm{u}^{T}_{2}\bm{Su}_{2}=\dfrac{0.09\times
c^{4}(p-1)}{4a^{2}p^{2}}.\end{split}$
So, we will have:
$\displaystyle
2\bm{u}^{T}_{1}\bm{Su}_{1}+\bm{u}^{T}_{1}\bm{Su}_{2}=\dfrac{0.01\times
c^{4}}{2a^{2}p^{2}}.$ (14)
Since $p$ represents an integer larger than 1, the above term is always
positive. According to Proposition 3, it is known that the asymptotic MSE
value of SPSA with Bernoulli is smaller than the MSE for RDSA with Gaussian
(or other perturbation with fourth moment of its distribution being 3 and the
product of two separate second moments being 1). The corresponding numerical
experiment is shown in the next section.
Moreover, we can obtain the MSE value for each case:
$\displaystyle\begin{split}&Q_{1}=(\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(\bm{u}_{1}+\bm{u}_{2})=\dfrac{0.09c^{4}p-0.08c^{4}}{4a^{2}p^{2}},\\\
&Q_{2}=(3\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(3\bm{u}_{1}+\bm{u}_{2})=\dfrac{0.09c^{4}}{4a^{2}p},\\\
&D=\dfrac{\sigma^{2}}{8c^{2}}\sum\limits_{i}\dfrac{1}{\uplambda_{i}}\;\;\;\;(\uplambda_{i}\;\text{are\;the\;eigenvalues\;of\;matrix\;}a\bm{H}(\bm{\uptheta}^{*})).\end{split}$
From Table 2, we find that the asymptotic MSE value of Bernoulli will always
be smaller than that of Gaussian since $Q_{1}<Q_{2}$. Also, we find that the
MSE value of Uniform Spherical will be smaller than Gaussian with the
coefficient in front of $Q_{2}$ being less than 1. For the U-shape, there is
no certain conclusion for the relative MSE value since one contribution $D$ is
going down while the other one $Q_{1}$ is going up.
### 3.5 A More Straightforward Look
We can have a more straightforward understanding of the comparison of $Q_{1}$
and $Q_{2}$ by looking in a 2-dim way. Let $S,u_{1}$ and $u_{2}$ be scalars,
set $x=\sqrt{S}u_{1},y=\sqrt{S}u_{2}$, then consider $(3x+y)^{2}-(x+y)^{2}$:
$\displaystyle(3x+y)^{2}-(x+y)^{2}$ (15)
$\displaystyle=9x^{2}+6xy+y^{2}-x^{2}-2xy-y^{2}=8x^{2}+4xy.$ (16)
Under the following conditions, we will have (14) larger than 0.
$\left\\{\begin{array}[]{lr}y\geq-2x\;\;\;\text{if\;}x>0\\\
y<-2x\;\;\;\text{if\;}x<0\end{array}\right.$
The shadow region in the following figure shows the area satisfying the above
condition, which indicates a large probability, around 5/6 (more accurately,
1-2*arctan (0.5)) of $Q_{2}-Q_{1}>0$. In other words, there is a probability
around 5/6 that SPSA with Bernoulli outperforms RDSA with Gaussian.
Figure 1: Region of equation (14) being larger than 0
Then we are going to consider the high-dim case. Denote:
$\displaystyle\begin{split}&{Q}_{1}=(\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(\bm{u}_{1}+\bm{u}_{2}),\\\
&{Q}_{2}=(3\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(3\bm{u}_{1}+\bm{u}_{2}).\end{split}$
We would like to compare $Q_{2},Q_{1}$. Similar to the scalar case, set
$\bm{x}=\bm{S}^{1/2}\bm{u}_{1},\bm{y}=\bm{S}^{1/2}\bm{u}_{2}.$ Then consider:
$\displaystyle\bm{z}=Q_{2}-Q_{1}$ (17)
$\displaystyle=(3\bm{x}+\bm{y})^{T}(3\bm{x}+\bm{y})-(\bm{x}+\bm{y})^{T}(\bm{x}+\bm{y})$
(18) $\displaystyle=4(2\bm{x}^{T}\bm{x}+\bm{x}^{T}\bm{y})$ (19)
$\displaystyle=4\bm{x}^{T}(2\bm{x}+\bm{y})$ (20)
Here we consider a simple case to have a straightforward understanding. Set
$\bm{x},\bm{y}$ to be two independent random variables with uniform
symmetrical distribution (i.e.
$\bm{x}=(x_{1},x_{2},...,x_{p})^{T},\bm{y}=(y_{1},y_{2},...,y_{p})^{T},\;x_{i}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}U(-a,a),y_{i}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}U(-b,b)$)
and $\bm{S}$ to be the identical matrix. Then we have:
$\displaystyle
E(\bm{x}^{T}\bm{x})=E\left(\sum\limits^{p}_{i=1}x^{2}_{i}\right)=\sum\limits^{p}_{i=1}E(x^{2}_{i})=\sum\limits^{p}_{i=1}Var(x_{i})=\dfrac{a^{2}p}{3}.$
$\displaystyle
E(\bm{x}^{T}\bm{y})=E\left(\sum\limits^{p}_{i=1}x_{i}y_{i}\right)=\sum\limits^{p}_{i=1}E(x_{i})E(y_{i})=0.\;\;\;(\text{due\;to\;the\;independence})$
$\displaystyle
E(\bm{z})=8E(\bm{x}^{T}\bm{x})+4E(\bm{x}^{T}\bm{y})=\dfrac{8a^{2}p}{3}.$
Furthermore, we use one-sided version of Chebyshev inequality to see the
probability that $\bm{z}\leq 0$, which indicates $Q_{2}\leq Q_{1}$. The
inequality states that $P(X\geq c)\leq Var(X)/[Var(X)+c^{2}]$. In our case,
the inequality is in the form of:
$\displaystyle P[(-\bm{z}+E(\bm{z}))\geq E(\bm{z})]$
$\displaystyle\leq\dfrac{Var[-\bm{z}+E(\bm{z})]}{Var[-\bm{z}+E(\bm{z})]+[E(\bm{z})]^{2}}$
(21) $\displaystyle=\dfrac{Var(\bm{z})}{Var(\bm{z})+[E(\bm{z})]^{2}}.$ (22)
To simplify the calculation, we set
$x_{i}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}U(-a,a),y_{i}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}U(-a,a)$.
Then we have:
$\displaystyle Var(\bm{z})$
$\displaystyle=Var(8\bm{x}^{T}\bm{x})+Var(4\bm{x}^{T}\bm{y})+Cov(8\bm{x}^{T}\bm{x},4\bm{x}^{T}\bm{y})$
$\displaystyle=64Var\left(\sum\limits^{p}_{i=1}x^{2}_{i}\right)+16Var\left(\sum\limits^{p}_{i=1}x_{i}y_{i}\right)=\dfrac{64pa^{4}}{5}+\dfrac{16pa^{4}}{9}=16\times\dfrac{41pa^{4}}{45}.$
Plug it into the inequality (20), it looks like:
$\displaystyle P(\bm{z}\leq 0))$
$\displaystyle\leq\dfrac{Var(\bm{z})}{Var(\bm{z})+[E(\bm{z})]^{2}}$ (23)
$\displaystyle=\dfrac{16\times\dfrac{41pa^{4}}{45}}{16\times\dfrac{41pa^{4}}{45}+\dfrac{64p^{2}a^{4}}{9}}$
(24) $\displaystyle=\dfrac{41}{41+20p}.$ (25)
Inequality (23) shows that as the dimension $p$ increases, the probability of
$\bm{z}\leq 0$ decreases. Here we make a simulation by setting a range of
dimension from 1 to 10 and then take 100,000 independent trials to calculate
the probability, i.e. $P(\bm{z}\leq 0)$ with
$\bm{S}=\bm{I};\;\bm{u}_{1i}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}U(-100,100);\;\bm{u}_{2i}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}U(-100,100),\;i=1,2,...,p$.
The result is shown in the following Table 3, demonstrating a decreasing trend
when the dimension gets large. Also, it shows consistency with the conclusion
in the scalar case, namely, when $p=1,P(z\leq 0)\approx\dfrac{1}{6}$.
Table 3: Relationship Between Dimension and $P(\bm{z}\leq 0)$ Dim | 1 | 2 | 3 | 4 | 5
---|---|---|---|---|---
$\bm{P}(\bm{z}\leq 0)$ | 0.12546 | 0.0336 | 0.00932 | 0.00252 | 0.00071
Dim | 6 | 7 | 8 | 9 | 10
$\bm{P}(\bm{z}\leq 0)$ | 0.00024 | $9\times 10^{-5}$ | $3\times 10^{-5}$ | 0 | 0
As Table 3 indicates, if we consider those high-dimension cases, there will be
a tiny probability that $Q_{2}\leq Q_{1}$, i.e. SPSA with Bernoulli will
highly probably beat RDSA with Gaussian from the perspective of a smaller MSE.
However, it should be noticed that the above case is based on a simple
simulated setting, which aims at providing an intuitive view at the comparison
of Gaussian and Bernoulli.
In the next section, we will show how Proposition 3 works more specifically by
some numerical experiments.
## 4 Numerical Experiment
### 4.1 Numerical Example 1
Consider the loss function [3]:
$L(\uptheta)=||\uptheta||^{2}+\sum\limits_{i=1}^{p}e^{t_{i}/p},$
where $\bm{\uptheta}=[t_{1},t_{2},...,t_{p}]^{T}$ and the minimum occurs at
$\bm{\uptheta}^{*}$ with each component $-0.033$, such that
$L(\bm{\uptheta}^{*})=29.99994$. This is a convex function with third-
derivative being nonzero and cross third-derivative being zero. Namely, in our
case, we have $\bm{u}_{2}=\bm{0}$ and $\bm{u}_{1}>\bm{0}$. So according to the
Corollary in Proposition 3, SPSA with Bernoulli has lower MSE than RDSA with
Gaussian.
Let $p=30$ and take 100 independent trials, each with 3000 iterations. Results
are presented in Fig 2 and Table 4. We assume the noise term has distribution
$N(0,0.01)$ and gain sequence as
$a_{k}=0.05/(k+1)^{0.602},\,c_{k}=0.3/(k+1)^{0.101}$. Set the initial point
$\hat{\bm{\uptheta}}_{0}=[1,1,...,1]^{T}$. The results are shown below. The
lowest MSE is highlighted in bold in Table 4 and other numerical results
below.
Figure 2: Mean Square Error, computed as an average over 100 trials, plotted the last 200 iterations for different random perturbation distributions Table 4: MSE and confidence interval in SPSA and RDSA with different perturbations with same gain sequences in all algorithms Perturbation | MSE | 95% CI
---|---|---
Bernoulli SP | 0.01318 | [0.01281, 0.01354]
U-shape($\bm{x^{10}}$) SP | 0.01301 | [0.01266, 0.01336]
Gaussian RD | 0.01325 | [0.01290, 0.01359]
Uniformly Spherical RD | 0.01319 | [0.01285, 0.01355]
The experimental result shows consistency with the Proposition 3. The
confidence intervals show overlap among the four and then we conduct the two-
sample $t$-test between the Bernoulli and Gaussian cases and obtain the
$p$-value 0.35982, which is larger than the common threshold, 0.05, indicating
that the difference is not statistically significant. The reason is that in
this case, the $D$ value (shown in the Table 2) is much larger than the term
$\bm{u}_{1}^{T}\bm{Su}_{1}$ so that it dominates the whole MSE value. So the
MSE of SPSA with Bernoulli is slightly smaller than that of RDSA with
Gaussian. Moreover, we notice that the MSE of U-Shape distributed perturbation
is the smallest one which can also be explained by the 0.9 in front of the
value $D$.
### 4.2 Numerical Example 2
Consider the Ackley Function with dimension $p=30$:
$\displaystyle L(\bm{\uptheta})$
$\displaystyle=-a\times\text{exp}\left(-b\sqrt{\dfrac{1}{30}\sum\limits^{d}_{i=1}t^{2}_{i}}\right)-\text{exp}\left(\dfrac{1}{30}\sum\limits^{d}_{i=1}\text{cos}(ct_{i})\right)+a+e,$
where $a=20,b=0.2,c=2\pi,\,\bm{\uptheta}=[t_{1},t_{2},...,t_{30}]$ and
$L(\bm{\uptheta})=0$ at $\bm{\uptheta}^{*}=[1,1,...,1]^{T}.$ Here, we assume
the noise term has distribution $N(0,0.01)$ and gain sequence as
$a_{k}=0.02/(k+1+A)^{0.602},\;A=10,\,c_{k}=0.2/(k+1)^{0.101}$. Set the initial
point $\hat{\bm{\uptheta}}_{0}=[0.2,0.2,...,0.2]^{T}$.
In this case, there are no cross-third derivatives, i.e. $\bm{u}_{2}=\bm{0}$.
By Proposition 3, SPSA with Bernoulli would have smaller MSE value than RDSA
with Gaussian. Take 100 independent trials, each with 5000 iterations. The
results are shown in Fig 3 and Table 5:
Figure 3: Mean Square Error, computed as an average over 100 trials, plotted the last 500 iterations for different random perturbation distributions Table 5: MSE and its Confidence Interval in SPSA and RDSA with different perturbations with same gain sequences in all algorithms Perturbation | MSE | 95% CI
---|---|---
Bernoulli SP | 0.00041 | [0.00038, 0.00044]
U-shape ($x^{10}$) SP | 0.00043 | [0.00041, 0.00045]
Uniformly Spherical RD | 0.00054 | [0.00051, 0.00056]
Gaussian RD | 0.00057 | [0.00054, 0.00060]
The MSE value of SPSA with Bernoulli case is lower than that of RDSA with
Gaussian case, which is accordant with the Proposition 3. Notice that the
confidence interval of the two cases does not overlap and we take the two-
sample $t$-test between them and gain the $p$-value $5.96\times 10^{-13}$,
which indicates that the difference is significant.
### 4.3 Numerical Example 3
To give a more specific example. Consider the skewed-quartic function:
$L({\bm{\uptheta}})={\bm{\uptheta}}^{T}{\bm{B}}^{T}{\bm{B\uptheta}}+0.1\sum\limits^{p}_{i=1}({\bm{B\uptheta}})^{3}_{i}+0.01\sum\limits^{p}_{i=1}({\bm{B\uptheta}})^{4}_{i}.$
#### 4.3.1 Optimal Gain Sequence Searching
We consider searching the ‘optimal gain sequence’ for $a_{k}$ and $c_{k}$ in
the gain sequence with the smallest MSE value, i.e. set
$a_{k}=a/(k+A+1)^{\alpha},\;c_{k}=c/(k+1)^{\gamma}$ and keep $A=10$. Then set
the search range of $a$ and $c$ to be 0.1 to 1, with interval 0.02 and pick
the sequence leading to the lowest MSE value. The ‘optimal gain sequence’ for
each case has been listed in Table 6. Particularly, in order to satisfy that
$\bm{\upmu}\neq\bm{0}$ in (9), we set $\upalpha=0.606,\upgamma=0.101$ in the
gain sequence.
Table 6: Optimal Gain Sequence for Algorithms with distinct Perturbations Perturbation | $a_{k}$ | $c_{k}$
---|---|---
Bernoulli SP | $0.12/(k+11)^{0.606}$ | $0.8/(k+1)^{0.101}$
U-shape ($x^{10}$) SP | $0.1/(k+11)^{0.606}$ | $0.48/(k+1)^{0.101}$
Uniformly Spherical RD | $0.1/(k+11)^{0.606}$ | $0.42/(k+1)^{0.101}$
Gaussian RD | 0.1/$(k+11)^{0.606}$ | $0.58/(k+1)^{0.101}$
#### 4.3.2 Further Comparison
In order to conduct a further comparison of the performance of RDSA and SPSA
algorithm, as well as work in connection with our previous theoretical
calculation, we are going to apply the optimal gain sequence for each
distribution to the other three distributions and see the result. That is, in
1)-4) below, we, in turn, pick one of the pairs {$a_{k},c_{k}$} in Table 6 and
run all four methods at the chosen gain sequence. This will demonstrate each
method in its best configuration. Then we mainly focus on the Bernoulli and
Gaussian to see their comparison.
* 1)
Apply the optimal gain sequence for Bernoulli, i.e. set
$a_{k}=0.12/((k+11)^{0.606}),c_{k}=0.8/((k+1)^{0.101}$ for the four methods.
The result is shown in Fig 4 and Table 7.
Figure 4: Mean Square Error, computed as an average over 100 trials each of
4000 iterations with the optimal gain for Bernoulli distributed perturbation
in SPSA, plotted the last 500 iterations for different random direction
distributions Table 7: MSE for Skewed Quartic Loss Function and its Confidence
Interval
(Gain Sequence $a_{k}=0.12/((k+11)^{0.606}),c_{k}=0.8/((k+1)^{0.101}$) Perturbation | MSE | 95% CI
---|---|---
Bernoulli SP | 6.3368 | [6.0959, 6.5778]
U-shape ($x^{10}$) SP | 6.3557 | [6.0536, 6.6579]
Uniformly Spherical RD | 6.6240 | [6.3064, 6.9416]
Gaussian RD | 6.6132 | [6.2637, 6.9626]
We find that the Bernoulli performs the best, then the U-shape, Uniformly
Spherical and Gaussian being the worst one. It is accordant with the previous
Table 2. Also, we find that the 95% confidence interval of Bernoulli and
Gaussian does not overlap. The two-sample test between Bernoulli and Gaussian
produces the $p$-value 0.0040573, indicating that the difference is
significant.
* 2)
Apply the optimal gain sequence for U-shape, i.e. set
$a_{k}=0.1/((k+11)^{0.606}),c_{k}=0.48/((k+1)^{0.101}$ for the four methods.
The result is shown in Fig 5 and Table 8.
Figure 5: Mean Square Error, computed as an average over 100 trials each of
4000 iterations with the optimal gain for U-shape in SPSA, plotted the last
500 iterations for different random direction distributions Table 8: MSE for
Skewed Quartic Loss Function and its Confidence Interval
(Gain Sequence $a_{k}=0.1/((k+11)^{0.606}),c_{k}=0.48/((k+1)^{0.101}$) Perturbation | MSE | 95% CI
---|---|---
Bernoulli SP | 6.3784 | [6.1038, 6.6531]
U-shape($\bm{x^{10}}$) SP | 6.3540 | [6.0761, 6.6320]
Uniformly Spherical RD | 6.6257 | [6.3150, 6.9365]
Gaussian RD | 6.5604 | [6.2803, 6.8406]
* 3)
Apply the optimal gain sequence for Uniform Spherical, i.e. set
$a_{k}=0.1/((k+11)^{0.606}),c_{k}=0.42/((k+1)^{0.101}$ for the four methods.
The result is shown in Fig 6 and Table 9.
Figure 6: Mean Square Error, computed as an average over 100 trials each of
4000 iterations with the optimal gain for Uniform Spherical in RDSA, plotted
the last 500 iterations for different random direction distributions Table 9:
MSE for Skewed Quartic Loss Function and its Confidence Interval
(Gain Sequence $a_{k}=0.1/((k+11)^{0.606}),c_{k}=0.42/((k+1)^{0.101}$) Perturbation | MSE | 95% CI
---|---|---
Bernoulli SP | 6.7323 | [6.4523,7.0123]
U-shape ($x^{10}$) SP | 6.7012 | [6.4212,6.9812]
Uniformly Spherical RD | 6.4436 | [6.1636,6.7236]
Gaussian RD | 7.0789 | [6.7889,7.3689]
We find that under such gain sequence, the Uniform Spherical performs the best
and Bernoulli still outperforms Gaussian, consistent with the Table 2. We then
conduct the two-sample $t$-test between Bernoulli and Gaussian and obtain the
$p$-value 0.121487, indicating that the difference is not statistically
significant.
* 4)
Apply the optimal gain sequence for Gaussian, i.e. set
$a_{k}=0.1/((k+11)^{0.606}),c_{k}=0.58/((k+1)^{0.101}$ for the four methods.
The result is shown in Fig 7 and Table 10.
Figure 7: Mean Square Error, computed as an average over 100 trials each of
4000 iterations with the optimal gain for Gaussian distributed perturbation in
RDSA, plotted the last 500 iterations for different random direction
distributions Table 10: MSE for Skewed Quartic Loss Function and its
Confidence Interval
(Gain Sequence $a_{k}=0.1/((k+11)^{0.606}),c_{k}=0.58/((k+1)^{0.101}$) Perturbation | MSE | 95% CI
---|---|---
Bernoulli SP | 6.4928 | [6.2314, 6.7542]
U-shape ($x^{10}$) SP | 6.9915 | [6.7374, 7.2456]
Uniformly Spherical RD | 7.4873 | [7.1479, 7.8267]
Gaussian RD | 6.5534 | [6.2897, 6.8171]
In this case, although the optimal gain sequence of Gaussian has been applied
and the Gaussian reaches its lowest MSE, it is still smaller than the MSE of
Bernoulli, which can be a strong support for the theoretical conclusion shown
in Proposition 3. The two-sample test between Bernoulli and Gaussian produces
the $p$-value 0.2431523, indicating that the difference is not statistically
significant.
From above four experiments, all the four algorithms show their best
performance from the perspective of a lowest MSE when their optimal gain
sequence is applied. The tables show that no matter in which case, SPSA with
Bernoulli beats RDSA with Gaussian, showing consistency with Proposition 3.
## 5 Conclusion
This paper provides a strict derivation for several essential terms in the
RDSA algorithm and presents a comparison of the asymptotic MSE between RDSA
and SPSA. Furthermore, this paper presents specific conditions under which
SPSA with Bernoulli perturbation works better in the MSE sense than RDSA with
Gaussian perturbation, which may provide practitioners a general guidance in
the practical cases. In particular, it is found that SPSA outperforms RDSA
across the large majority of implementation cases with different gain
sequences and types of loss functions.
There are several directions for future research. First, we can consider extra
types of random directions with different distributions. Second, more work
related to robustness and relative efficiency would be useful. Third, since
this paper mainly focuses on Bernoulli and Gaussian cases, more general cases
could be considered for the comparison of MSE between SPSA and RDSA. It would
also be of interest to carry out a comparison such as that above for both
second-order or non-continuous versions of SPSA and RDSA, such as presented in
[16], [19], [17], [21], and [10], and constant-gain (step size) versions, such
as in [8], [20], and [11].
## References
* [1] Shalabh Bhatnagar, Harshika Prasad, and L. A. Prashanth. Stochastic recursive algorithms for optimization. Simultaneous perturbation methods, volume 434. Jan 2013.
* [2] A. Blakney and J. Zhu. A comparison of the finite difference and simultaneous perturbation gradient estimation methods with noisy function evaluations. In 2019 53rd Annual Conference on Information Sciences and Systems (CISS), pages 1–6, 2019.
* [3] D. C. Chin. Comparative study of stochastic algorithms for system optimization based on gradient approximations. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 27(2):244–249, 1997.
* [4] Karla Hernández Cuevas. Cyclic stochastic optimization: Generalizations, convergence, and applications in multi-agent systems, PhD Dissertation, Johns Hopkins University, https://arxiv.org/abs/1707.06700, 2017.
* [5] Vaclav Fabian. On asymptotic normality in stochastic approximation. The Annals of Mathematical Statistics, 39(4):1327–1332, 1968.
* [6] Karla Hernández and J. C. Spall. Generalization of a result of Fabian on the asymptotic normality of stochastic approximation. Automatica, 99:420 – 424, 2019.
* [7] J.L.Doob. Stochastic Process. New York: Wiley, 1953.
* [8] Itsuro Kajiwara, Keiichiro Furuya, and Shinichi Ishizuka. Experimental verification of a real-time tuning method of a model-based controller by perturbations to its poles. Mechanical Systems and Signal Processing, 107:396–408, 2018.
* [9] H. J. Kusher and G. Yin. Random directions methods in stochastic approximation. In Proceedings of the 36th IEEE Conference on Decision and Control, pages 3430–3435 vol.4, 1997.
* [10] L. A. Prashanth, S. Bhatnagar, M. Fu, and S. Marcus. Adaptive system optimization using random directions stochastic approximation. IEEE Transactions on Automatic Control, 62(5):2223–2238, 2017\.
* [11] A. Ramaswamy. DSPG: Decentralized simultaneous perturbations gradient descent scheme. In 2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pages 54–62, Los Alamitos, CA, USA, Mar 2020. IEEE Computer Society.
* [12] J. C. Spall. Multivariate stochastic approximation using a simultaneous perturbation gradient approximation. IEEE Transactions on Automatic Control, 37(3):332–341, 1992\.
* [13] J. C. Spall. Developments in stochastic optimization algorithms with gradient approximations based on function measurements. In Proceedings of Winter Simulation Conference, pages 207–214, 1994\.
* [14] J. C. Spall. An overview of the simultaneous perturbation method for efficient optimization. Johns Hopkins APL Technical Digest, 19:482–492, 1998.
* [15] J. C. Spall. Introduction to stochastic search and optimization: estimation, simulation, and control, volume 65. John Wiley & Sons, 2005.
* [16] J. C. Spall. Feedback and weighting mechanisms for improving Jacobian estimates in the adaptive simultaneous perturbation algorithm. IEEE Transactions on Automatic Control, 54(6):1216–1229, 2009.
* [17] S. Sun and J. C. Spall. SPSA method using diagonalized Hessian estimate. In 2019 IEEE 58th Conference on Decision and Control (CDC), pages 4922–4927, 2019.
* [18] J. Theiler and J. Alper. On the choice of random directions for stochastic approximation algorithms. IEEE Transactions on Automatic Control, 51(3):476–481, 2006\.
* [19] L. Wang, J. Zhu, and J. C. Spall. Mixed simultaneous perturbation stochastic approximation for gradient-free optimization with noisy measurements. In 2018 Annual American Control Conference (ACC), pages 3774–3779, 2018.
* [20] J. Zhu and J. C. Spall. Stochastic approximation with nondecaying gain: Error bound and data-driven gain-tuning. International Journal of Robust and Nonlinear Control, 30(15):5820–5870, 2020.
* [21] J. Zhu, L. Wang, and J. C. Spall. Efficient implementation of second-order stochastic approximation algorithms in high-dimensional problems. IEEE Transactions on Neural Networks and Learning Systems, 31:3087–3099, 2020.
| arxiv-papers | 2021-07-24T05:50:17 | 2024-09-04T03:07:21.447185 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Yiwen Chen",
"submitter": "Yiwen Chen",
"url": "https://arxiv.org/abs/2107.12771"
} |
2107.12772 | # Collaborative Software Modeling in Virtual Reality
Enes Yigitbas, Simon Gorissen, Nils Weidmann, Gregor Engels Paderborn
University, Germany
[email protected]
###### Abstract
Modeling is a key activity in conceptual design and system design. Through
collaborative modeling, end-users, stakeholders, experts, and entrepreneurs
are able to create a shared understanding of a system representation. While
the Unified Modeling Language (UML) is one of the major conceptual modeling
languages in object-oriented software engineering, more and more concerns
arise from the modeling quality of UML and its tool-support. Among them, the
limitation of the two-dimensional presentation of its notations and lack of
natural collaborative modeling tools are reported to be significant. In this
paper, we explore the potential of using Virtual Reality (VR) technology for
collaborative UML software design by comparing it with classical collaborative
software design using conventional devices (Desktop PC / Laptop). For this
purpose, we have developed a VR modeling environment that offers a natural
collaborative modeling experience for UML Class Diagrams. Based on a user
study with 24 participants, we have compared collaborative VR modeling with
conventional modeling with regard to efficiency, effectiveness, and user
satisfaction. Results show that the use of VR has some disadvantages
concerning efficiency and effectiveness, but the user’s fun, the feeling of
being in the same room with a remote collaborator, and the naturalness of
collaboration were increased.
###### Index Terms:
Collaborative Modeling, Virtual Reality, UML
## I Introduction
In modern software development collaboration between developers is one of the
driving factors that determines the quality and speed at which the projects
can be realized. One central artifact of communication and discussion in
software engineering are models [1]. The Unified Modeling Language (UML) with
its associated diagrams is one of the most well known general-purpose modeling
languages in software engineering and is considered by many as ”lingua franca”
for software engineers [2]. However, researchers and software designers have
realized the insufficiency of UML in its expressiveness since it is restricted
to a two-dimensional plane. These insufficiencies include a lack of dynamic
expression and interaction ability between groups of remote designers [3], [4]
as well as the complexity for large models [5]. Furthermore, the authors in
[6] argue that the dissatisfaction of developers with UML tools is one of the
reasons it has not been adopted more universally, exemplifying the need for
improving the tool support. Since the COVID-19 pandemic has spread around the
world, this need for good UML tool support has only increased. Many
educational institutions, like schools and universities, around the world have
been forced to switch to online education settings to support social
distancing. Likewise, millions of workplaces wherever possible were
transitioned to home office. To enable collaboration for software engineers in
such situations, tools are needed that offer support for creating and
discussing models from remote locations. While classical modeling
applications, like Lucidchart [7] or GenMyModel [8], support remote
collaboration, they do not overcome the mentioned issues with regard to
visualization and collaboration as they are mostly relying on a 2D UML
notation and do not support a natural way of collaboration comparable to
editing a model on a whiteboard while situated together in one room.
Virtual Reality technology, on the other hand, is becoming increasingly
sophisticated and cost-effective and can be applied to many areas such as
training [9], robotics [10], education [11], healthcare [12], and even
Information Systems (IS) research, to simulate a real environment or represent
complicated scenarios. Modern Head Mounted Display (HMD) Virtual Reality (VR)
devices have several technological capabilities that are not present on
conventional devices (Desktop PC / Laptop): (1) Stereoscopic 3D Images, (2)
Six Degrees of Freedom, (3) Hand Presence Support. and (4) 3D Spatial Voice
Chat. Since HMD devices show a slightly different image to each eye, they can
invoke the perception of a truly 3D virtual world that the user inhabits.
These Stereoscopic 3D Images are more in line with the visual experience of
the real world compared to images on a 2D screen, since people also perceive
the real world in 3D, not in 2D. In VR, users can also look around in the
virtual world by simply moving their heads, like they would in a real
environment. In addition to this rotational movement, modern VR devices can
also track the positional movement of a user, independent of the direction the
user moves in. This means, the user has Six Degrees of Freedom (three
rotational and three positional axes) in her movement and the VR system can
adapt the view and position of the user in the virtual world accordingly.
Additionally, typical VR controllers are used single-handedly with each
controller representing one hand in the virtual world. This Hand Presence
Support allows a user to make natural gestures like grabbing an object and
pointing at things to interact with the virtual world. With the means of 3D
Spatial Voice Chat, it is possible to make users feel like the voices of their
collaborators come with the volume level (distance-based) and from the
direction that their virtual representations (i.e. Avatars) are in. Overall,
the fast development in VR concerning prototyping [13] and engineering of VR
applications [14] as well as the mentioned technological advances allow us to
extend the research field to improve the quality of UML and collaborative
modeling. Thus, the main goal of this paper is to explore the potential of
using Virtual Reality (VR) technology for collaborative UML software design by
comparing it with classical collaborative software design using conventional
devices (Desktop PC / Laptop). For this purpose, we have developed a VR
modeling environment, called VmodlR, that offers a natural collaborative
modeling experience for UML Class Diagrams. Based on a user study with 24
participants, we have compared collaborative VR modeling with conventional
modeling with regard to efficiency, effectiveness, and user satisfaction.
The rest of the paper is structured as follows. In Section 2, we present and
discuss the related work. In Section 3, we describe the conceptual solution of
our VR-based collaborative modeling environment VmodlR. In Section 4, we show
the details of the implementation of VmodlR. In Section 5, we present and
discuss the main results of the usability evaluation. In Section 6, we
conclude the paper and give an outlook for future work.
## II Related Work
Model-based and model-driven development methods have been discussed in the
past for various application domains such as intelligent user interfaces [15,
16, 17], usability engineering [18, 19, 20], digital twins [21, 22] or
business model development [23, 24]. In the following, we draw on prior
research into Collaborative Modeling, 3D Modeling, and Immersive Modeling.
### II-A Collaborative Modeling
In previous work, the topic of collaborative software modeling was already
researched from different perspectives [25]. In [26], the authors present a
distributed UML editor that aims to transfer collaborative discussion and
editing of UML models from regular meeting rooms to remote settings using
regular computers. In addition, a collaborative learning environment for UML
modeling is presented in [27]. Furthermore, [28] introduces an approach to a
real-time synchronous collaborative modeling of software systems using 3D UML.
Besides these approaches from research, there are also many commercial tools
supporting collaborative software modeling. Lucidchart is a web-based
commercial tool for collaboratively creating diagrams [7]. It includes support
for many diagram types and modeling languages like UML, Business Process Model
Notation (BPMN), Enterprise Relationship models, and more. The tool shows a 2D
canvas where standard 2D diagrams can be created. Since Lucidchart is web-
based, it can be used by any device that runs a modern browser, although as
with many web-based contents the experience can be assumed to be best suited
to the use on desktop and laptop computers and is not specifically adopted to
the possibilities of VR devices. Released by Axellience in 2014, GenMyModel
[8] is a web-based tool similar to Lucidchart. GenMyModel supports a subset of
the most commonly used UML diagrams, i.e., Class, Use Case, Component, Object,
State, Deployment, Activity, and Sequence Diagrams. Axellience describes the
mode of collaboration as similar to how Google Drive or Microsoft Office
online collaboration works. So users can see where their co-workers are
editing the model but do not have an integrated voice chat to discuss those
changes. This has to be done via an external tool. The system aims to support
the language’s visual representations according to their official definitions
and thus only presents 2D models to the users.
While the above-described approaches mostly support collaborative modeling
based on standard 2D UML diagrams, they do not support immersive VR.
### II-B 3D Modeling
The authors in [29] presented a conceptual system that visualizes UML Class
and Sequence Diagrams in 3D. The Sequence Diagrams are displayed in the
context of the Classes they belong to and animated to emphasize their
connection. Furthermore, the authors in [30] have also discussed a conceptual
approach to extending 2D UML Diagrams to the third dimension. They introduce
some modeling quality attributes and explain how VR can improve the UML
modeling quality according to these attributes. For example, they argue that
the model’s ”understandability” can be improved through VR’s ”Immersion” and
”Stereopsis” (Stereoscopic 3D presentation) features. Subsequently, they
provide some examples of a Class Diagram and a Sequence Diagram that are
visualized in 3D and demonstrate their advantages in comparison to a 2D
representation. In [31], the authors proposed VisAr3D, a 3D visualization tool
for UML models to make large models easier to comprehend, especially by
inexperienced modelers like students. The system automatically converts a 2D
UML model from an .xmi file into its 3D representation. The virtual
environment the 3D UML models are placed in can be viewed through a web-based
app and does not support HMDs. Their prototype is not a model editor, however,
it only visualizes UML models in 3D. This approach was evaluated based on a
user study assessing the effect of the 3D compared to a 2D representation. The
main results show that the 3D representation aided the understandability of
large models, ”increased students’ interest” and supported teaching purposes
[31]. In [32], the authors described an implementation that visualized a
process model in a 3D virtual world on a desktop computer. It is a training
system intended to aid a single user in understanding Business Process Models
through 3D visualization. They evaluate how the 3D representation assists the
user in learning the modeled process compared to a standard 2D model
representation. They conclude that the 3D representation provides a noticeable
learning benefit. It is not a modeling tool, however, only a visualization and
training tool. Further examples for approaches which make use of a 3D
representation of UML models can be found in [33, 34, 35, 36]. In summary, a
modeling approach that combines and integrates the aspects of 3D modeling,
collaboration, and VR in one solution is not fully covered and yet existing.
### II-C Immersive Modeling in AR and VR
In the following, AR- and VR-based approaches for modeling purposes will be
briefly described and discussed. Although VR is our main focus, we included AR
approaches to cover immersive modeling approaches on the whole.
Augmented Reality (AR) is closely related to VR with the main difference being
that VR immerses a user in a completely virtual world while AR does not
isolate the user from the real world by displaying virtual objects in the real
environment. In general, AR has been already applied for different aspects
such as robot programming [37], product configuration (e.g., [38], [39]),
planning and measurements [40] or for realizing smart interfaces (e.g., [41],
[42]). To be more specific, example approaches that apply AR for software
modeling are as follows. The authors in [43] have presented a framework that
is supposed to allow editing and viewing UML models in a 3D space through the
Microsoft Hololens AR Glasses. Their approach is to overlay 3D model elements
over real scenery so the user can move around and inside the model while not
being shut off from the real world. In this way, their prototype only displays
static objects that are meant to represent UML models. Similarly, in [44], the
authors proposed a system that aims to make learning UML more accessible by
displaying it in 3D as overlays to the natural environment using the Microsoft
Hololense. The system supports creating and editing UML Class Diagrams but is
only intended for single users and does not support collaboration.
Furthermore, in [45] the authors introduce the concept of ”HoloFlows” to
support the modelling of processes for the internet of things in mixed
reality. A similar solution is introduced in [46] where the authors present an
approach for supporting domain-specific modelling environments based on AR.
The main drawback of AR-based solutions for modeling is the small field of
view which narrows down the possibilities for modeling support. Therefore, we
have explored an alternative solution in VR.
Focusing on VR-related approaches for software modeling, we can see that many
previous works already have seen the potential in using VR for improving
modeling activities. In [47], for example, the authors have presented a system
that analyses an object-orientated code base and visualizes its classes,
attributes, and relations automatically in a 3D virtual environment that users
can inspect inside a Cave Automatic Virtual Environment (CAVE). So it supports
VR only in a broader sense. The application is not networked and does not
support editing the model, it is only a visualization tool. In [48], the
authors have proposed a system for HMD VR devices that can import a Finite
State Machine (FSM) and visualize it in a game-like environment where players
stand on islands representing states and can change islands via different
boats representing the possible transitions. It is a single-player game
environment meant for educational purposes and does not support UML modeling
with actual UML Diagram elements or remote collaboration. In [49], the authors
have presented a HMD VR system for visualizing process models in 3D. Therein,
the models can be annotated but not edited. They evaluated the effectiveness,
efficiency, and intuitiveness of the VR visualization in comparison to (1)
paper and (2) desktop tool based BPMN and found that the effectiveness was
equivalent between VR and desktop but task completion in VR was faster than
with the BPMN tool and the users found the VR controls very intuitive.
## III Solution Overview
The system overview of our VR-based collaborative modeling environment VmodlR
is shown in Fig. 1. The top half of this figure represents User A and the
Virtual Environment she accesses through a VR Device. The bottom half
symmetrically shows a remote collaborator, User B, and the VR Device she uses
to access the same shared Virtual Environment. Through the VR Device, each
User is represented in the Virtual Environment as a Virtual Character. The
View Orientation and Position of the VR Device together with the Controller
Input controls the Virtual Character while the Virtual Environment with its
content is displayed from the Virtual Character’s perspective inside the VR
Device.
Figure 1: System overview of VmodlR
Through the Virtual Character, each User interacts with the elements inside
the Virtual Environment: The 3D Model can be edited by either directly editing
model elements (e.g. creating, deleting, or moving them), or through the VR
Text Input component that is used to edit the text inside the 3D Model, for
example, the Class names. All those changes to the model are synchronized
between users through the Network Synchronization component. In the case of
this solution, the 3D Model is a three-dimensional UML Class Diagram, but
theoretically, this could be adapted to any kind of conceptual model. Through
their Virtual Characters, Users can also interact with each other via Network
Synchronization which transmits their voices and synchronizes their body and
hand movements. This is visualized in Fig. 1 as the Synchronize Movements &
Communication interface between the Virtual Characters and the Network
Synchronization. The Network Synchronization component then ensures that the
Virtual Environment and its content is synchronized between the Users through
the Cloud. It offers several different services that can be used by other
components to synchronize all necessary aspects of the Virtual Environment. In
the following, each of the main components Virtual Environment, Network
Synchronization, Virtual Character, 3D Models, and VR Text Input will be
described in more detail.
### III-A Virtual Environment
The Virtual Environment consists of all virtual elements that are needed to
provide a collaborative software modeling environment. Within this
environment, each user can see and move around via their VR Device in 3D. As a
design decision for the Virtual Environment, we opted to use an open space
instead of a closed one to not introduce some unrealistic environment behavior
or limit the user’s ability to create large models. Since there is no open
environment that could be considered natural for creating conceptual models,
any space that offers a planar ground for the user to walk on could be chosen.
We decided on a grass field under a blue sky because it does not limit the 3D
space available to the user and depicts a pleasant real-world environment that
users are familiar with.
### III-B Network Synchronization
All elements inside the Virtual Environment have to be synchronized through
the Network Synchronization component. We will briefly describe how this
networking generally works in this conceptual solution. The networking has a
server-based architecture where all users connect to a server and the server
synchronizes instances of a Virtual Environment between all users that are
currently in that environment. It is important to understand that a networked
environment is not a singular environment. Instead, on each user’s VR Device
(clients) a local version of the networked environment exists, so the user can
look around in it and interact with it. All the changes the user can thereby
make inside the Virtual Environment, like moving their Virtual Character, are
communicated to the server so it can update its reference representation of
the networked environment and forward the changes to the local environments of
all other clients. These clients then apply the changes accordingly to their
local copies of the environment. This way, the local environments on all
clients are always kept in sync with the server’s networked environment. Three
components can be used to synchronize objects inside the Virtual Environment:
The Movement Synchronization Service, the Event Synchronization Service, and
the Voice Synchronization Service. The Movement\- and Event Synchronization
Services can be more generally used. The difference between them is that the
Movement Synchronization Service is dedicated to rapidly and frequently
changing information, that need to be synchronized many times per second. In
the case of movement, this is needed to show the movement of an object that is
moved by a remote collaborator fluently to the local user. The Movement
Synchronization Service also deals with tracking if a synchronized object that
can be moved gets created or deleted. The Event Synchronization Service, on
the other hand, is supposed to synchronize arbitrary events that happen rather
infrequently and therefore only have to be synchronized occasionally, once
they occur, instead of the constant synchronization needed for movement. This
provides flexibility where something that only occasionally changes (like the
name of a Class for example) can be synchronized via the Event Synchronization
Service and otherwise does not consume network bandwidth while things that
often change and have to be synchronized many times per second, like the
movement of a Class or a Virtual Character’s Virtual Hands, can be
synchronized fluently via the Movement Synchronization Service. Finally, the
Voice Synchronization Service is dedicated to synchronizing the voices of
users to enable voice chat inside our solution.
### III-C Virtual Character
In VR, people can be represented by 3D characters through an avatar with a
body, head, and hands. This way, a user can, for example, move around in the
virtual environment and point with their finger in real life and the VR
Controller can reproduce this gesture on the Virtual Character’s hands. Since
this has the possibility to make discussions about models in VR much more
natural than possible on PCs, these features were also included in the design
of our solution and the hands’ gestures are synchronized across the network
for each user, along with the positional audio of voices and the positions and
orientations of Virtual Characters. Our solution supports this form of natural
movement, where the Virtual Character and therefore the user’s view into the
world changes according to the physical VR Headset movement. This is the ideal
scenario for movement, where there is enough physical space available to the
user to move anywhere she would want to go in the virtual world. However, this
is hardly a realistic scenario since the models creatable in our solution can
theoretically become arbitrarily large, meaning that the user would need an
infinitely large physical space to move around in. Therefore, a secondary
movement method, namely teleportation is required, that allows a user to move
their Virtual Character through the environment without moving in the physical
world. Teleportation involves the user entering a teleportation mode, for
example through pressing or holding a specific button on one of the VR
Controllers, and then aiming the controller at a spot that she wishes to
teleport to. When either releasing the button or pressing it again the target
position is selected and the Virtual Character is instantly teleported to the
aimed location. With these two movement methods—natural walking and
teleportation movement—the player can reach any position in the Virtual
Environment independent of the size of physical space available to her while
still moving in a rather natural way.
### III-D 3D Models
Usually, modeling languages are only specified with 2D visual representations.
UML is no exception from that rule. We could stick to those same 2D shapes
inside a 3D world with users being able to position the 2D shapes freely in
3D. However, we believe using 3D shapes instead of 2D ones will likely result
in a more natural experience for users because the real world only consists of
3D objects and we do not want the model elements to seem like foreign bodies
in the Virtual Environment. The main shapes used to visualize UML elements in
the 2D specification are rectangles and lines with different forms of
arrowheads at the end of those lines. To ensure that users familiar with the
2D representations can learn the 3D ones easily we tried to find natural
equivalents of the 2D shapes in 3D. The equivalent of rectangles in 3D are
cubes and cuboids, while lines are best represented by thin tubes (see Fig. 2
(c)). A challenge of a 3D visualization of UML Classes is the text
representation inside them. A 2D Class only has one side that the text is
displayed on which always faces the user. Since the Class rectangles known
from 2D are most similar to Cuboids in 3D, every UML Class is visualized as a
cuboid in our solution (see Fig. 2 (a)). It can be assumed that the users can
see at most three of the six sides of a cuboid at any given time. If the
Class’s cuboid only displays the text on one side, this side could, thus, be
hidden depending on the view direction that the user has towards the Class.
Rotating the cubes automatically so the text-side always faces the user would
be a possible solution to that. However, we wanted the user to be the only
entity changing the model’s appearance, so the model seems more stable and
thus natural. For these reasons, we chose to display the text associated with
a Class on all sides of the Class. This means that every Class side basically
shows the same 2D Class in a notation similar to 2D UML. Since all these sides
belong to a single Class it is important that all sides always show the same
content.
### III-E VR Text Input
In VR, text input is more difficult compared to traditional computers due to
the lack of a physical keyboard that provides haptic feedback on whether a key
was hit or not. Since the user cannot see and use a real keyboard while in VR,
virtual keyboards are often used instead. There are two basic types of
keyboards regularly found in VR applications: Laser pointer and drum-style
keyboards. Laser pointer style keyboards are usually displayed as a vertical
plane in front of the user with each hand representing one laser pointer that
can be used to press a key with a dedicated button. Since the buttons have to
be rather large to be easily hittable, this input method requires a lot of
space. An alternative to laser pointer keyboards are drum-style keyboards
which we have chosen in our solution (see Fig. 2 (b)). These are shown in a
horizontal, slightly tilted, form in front of the user like many real
keyboards are as well. One virtual mallet is attached to each of the user’s
hands that can be used to hit a key similar to how a person would hit a drum
in the real world. Because of the obvious drum analogy, it can be assumed that
this control scheme is also easy to understand for most users and could be
more natural to use than laser pointers.
## IV Implementation
As a target implementation platform for our collaborative VR modeling
environment, we have chosen the Oculus Quest 2 which is a cable-free, mobile
VR HMD. For the implementation of the VR environment, we have used the Unity
3D Game Engine developed by Unity Technologies [50] as it includes a fully
featured Graphics, Sound and Physics Engine and has easy-to-use APIs for many
different aspects like controller input. Furthermore, Unity also provides
support for the Oculus Quest 2 among other Oculus VR headsets through an
Oculus VR SDK. To enable remote collaboration, a networking system is needed
that synchronizes aspects like model element- and user avatar positions, user
hand gestures, etc. For the implementation of the networking system, we have
used the Photon Unity Networking 2 (PUN2) plug-in for Unity. This is a third-
party system developed by Exit Games specifically for use in Unity multiplayer
projects and offers easy-to-use high-level components. PUN2 realizes the
network architecture discussed in the previous section by providing its own
Cloud servers that automatically work with PUN2 without the need for any
custom server-side development. The Oculus Software Development Kit (SDK),
used to realize the interaction between the VR Device and the Virtual
Environment, comes with a variety of assets that can be used to quickly
implement common functionalities inside a VR application. Most aspects needed
to realize the Virtual Character are covered by those assets provided by
Oculus. Therefore, to save development time on those basics, we used Oculus’
OVRAvatar and OVRCameraRig assets and adjusted them slightly for our
application. The OVRCameraRig deals with tracking the position and rotation of
the head and controllers and rendering the world accordingly into the headset.
It does not include animated hands by default but there are separate assets
for that which can simply be placed under the empty GameObjects that track the
controller positions to enable users to see their hands. The gestures of the
hands are tracked locally by default through an animator so we only had to add
an animator synchronizer provided by PUN2 to synchronize the hand’s animation
states across the network [51]. Since all Virtual Characters are represented
equally in this prototype, we chose to display every user’s name above their
character. An example of how a remote user’s Virtual Character looks inside
the VR app is shown in Figure 2.
Figure 2: Screenshots of the collaborative VR modeling environment
## V Evaluation
To evaluate the efficiency, effectiveness, and user satisfaction of VmodlR and
to compare it with conventional collaborative modeling approaches, we have
conducted a user study which will be presented in the following.
### V-A Setup and Participants
The user study was organized in such a way that two people in different rooms
had to collaboratively create a UML Class Diagram. We have chosen a within-
subjects design [52] for our user study where the participants were asked to
use both modeling approaches, a conventional modeling tool, and the developed
VR modeling tool. Two different small UML Class Diagram modeling tasks
(consisting of five classes and based on a textual description) were provided
to the participants, while the sequence and type of task which was carried
with the help of a modeling tool were evenly distributed to avoid potential
bias in the collected data. As a reference application for comparing with our
own VR environment, we have decided to use an existing commercially available
tool for collaborative UML modeling. The tool we used is the Web application
Lucidchart [7]. This was chosen because it offers a mode of collaboration many
users are already familiar with from services like Google Docs, it offers a
free version that could be used for this study, and supported UML Class
Diagrams. The evaluated applications focus on remote collaboration, therefore,
we simulated a remote setting by placing each participant in a different room
during their collaborative tasks where they could only communicate through
computing devices (conventional and VR device). For the VR application, each
participant was positioned in a free space of approximately the same size and
equipped with an Oculus Quest 2 VR Headset including its two VR Controllers.
The participants were able to communicate over the application’s voice chat
feature using the Oculus Quest’s built-in microphone and speakers. The
respective task was displayed inside the VR app on a panel that could be
opened and closed through an icon on the user’s menu. The panel was positioned
slightly to the left of the user so they could leave the panel open and edit
the model in front of them at the same time. While using the Web task, each
participant was sitting at a desk in the same room that the VR free space was
in, equipped with a laptop and a wired mouse. The participants could use the
laptop’s keyboard, its trackpad, and the mouse as they saw fit. Since the Web
application does not include voice chat, the participants communicated via the
voice chat application Skype that was running in the background on their
laptops. The app used the built-in speakers and microphones of the laptops.
The tasks were supplied to users on a sheet of paper so, like in the VR app,
it would not occlude their modeling environment unnecessarily. Since this
study involved participants having to create two small Class Diagrams, these
participants had to bring a basic knowledge about what a Class Diagram is and
which purpose it serves for software modeling. Therefore, we had to rely on
participants who either had lectures or school classes on this topic, for
example in computer science lectures or subjects and/or who knew Class
Diagrams from a different source, like working as a software developer who
uses them. Therefore, we primarily tried to acquire participants with
educational backgrounds, like university students and recent graduates. Our
main source was a lecture on Model-Based Software Engineering designed for
undergraduate students of computer science in their third year of studies. In
this lecture, we presented the study and asked students to participate in it.
We also reached out to students we were still in contact with who took part in
this lecture during the prior year to widen our pool of possible participants
while still ensuring comparable credentials among them. In total, 24
participants took part in the user study, meaning that there were 12 groups of
two people each.
### V-B Procedure
The user study was conducted during one week in February 2021. The
experimental setting was kept as equal as possible for all pairs of
participants. First, the participants were greeted and introduced to the user
study. Then, the basic procedure of how they will take part in the study and
what they will do during their participation were explained. Afterward,
depending on whether the VR or Web app was used first, the collaboration
environment was set up (e.g., splitting the participants, starting Skype,
etc.), and they received a short introduction to the respective program. In
the case of the Web application, this was done through the study supervisor
explaining the main functionality from a pre-written script to ensure all
participants were given the same information. In the VR app, we have
additionally implemented a tutorial that served as an on-boarding tutorial at
the beginning of the user study. After the tutorials, the participants were
provided with the respective task and instructed to solve the task
collaboratively in the sense that they should only create one Class Diagram
together in each application. They were then asked to indicate to the study
executor once they think they are done with their task. When the participants
finished the first task, the procedure was repeated for the second task. After
both tasks were finished, the collaborative applications were closed so
participants would not be able to talk to each other anymore. They were then
given the questionnaire hosted via Google Forms [53] and were asked to fill it
out using the laptops that were used for the Web application as well. During
this process, the users stayed in the different rooms they were in while
working on the tasks to ensure that they would not influence each other’s
answers.
### V-C Usability Measurements
To extract meaningful results from the study we had to choose certain
measurements that we would take during the execution. Figure 3 shows an
overview of the data that was collected during the user study and which
measurements were derived from that.
Figure 3: An overview of what was measured within the user study.
Efficiency was measured by recording the participants’ execution of the task
and tracking the time from the point where they started reading the task to
the time when they told the study executor that they finished it. From these
same recordings, the effectiveness was measured by counting the number of
operating errors that the participants made during the execution of the task.
From this, an error rate was calculated by dividing the number of errors by
the time in minutes that was measured as the efficiency. This error rate was
our final score for the effectiveness in errors per minute. The recordings
used for tracking efficiency and effectiveness were screen-captures including
the voice chat audio. In each group, only one participant was recorded to
reduce the amount of video data that had to be manually evaluated. Another
reason for that was the network infrastructure that did not allow us to
capture and record two video feeds from the VR headsets in parallel. The user
satisfaction was evaluated through a questionnaire that participants were
asked to fill out after they finished both tasks. We chose to use the System
Usability Scale (SUS) questionnaire [54] since it is a well-proven and
reliable questionnaire that provides comparability with SUS evaluations of
other applications and that can be quickly filled out due to its low number of
questions [55]. While efficiency and effectiveness were measured for both
applications, the SUS questionnaire was only asked in the context of the VR
application. This is because the SUS questionnaire’s main purpose in this work
is to provide a proof of concept that the VR solution has a rather good
usability. Furthermore, the participants were asked to answer a custom-
developed questionnaire that included mainly 5 point Likert scale questions
(like the SUS questions) and some free text questions asking for more specific
impressions with regard to collaboration and interaction.
### V-D Results
In the following, we present the main results of the user study.
#### V-D1 Demographic Statistics
24 people in 12 collaborating groups participated in the study. All
participants were between 22 and 30 with a median of 25 and a mean of 25.5. 21
of the 24 participants were male and the others female. Most of the
participants were software engineering practitioners or had a background in
computer science. As a consequence, many participants reported advanced
experience with UML and UML modeling tools. The average rating scores for
prior experience with UML and UML modeling tools were 3.25 and approximately
3, respectively. With regard to prior experience with VR, our results show
that half of the participants have never used a VR device before this study
while 8 used them at least reasonably often.
#### V-D2 Efficiency
The times participants needed to complete their tasks are shown in Figure 4.
Figure 4: The times each group took to execute the task in the Web and the VR
app respectively.
All but two groups (Group 7 and 11) needed more time in VR than in the Web
application to complete their task. From the recordings, it could be observed
that almost all groups split up the work on the Class Diagram by each modeling
one part of the diagram and putting both parts together in the end. During
this process, they occasionally discussed how to model certain aspects if they
were unsure and checked the part of the model their collaborator created in
the end. The two groups that took longer in the Web application than in VR had
a slightly different approach that could explain this anomaly: In VR they
split up their task as outlined above. In the Web application, however, they
mainly followed a pair-programming style approach: For each part of the task
they discussed how to model it, and then only one of them modeled the aspect
accordingly. The first approach obviously saves time in comparison to the
latter one which could explain why they were able to complete the task faster
in VR than in the Web application when everyone else needed longer in VR. This
makes the times for these two groups not comparable since they did not use a
similar organizational method in both conditions. Therefore, we excluded them
from time-related analyses like the box plots shown on the right of figure 4.
Besides this anomaly, it can be said that the spread with respect to time was
way smaller for the Web application than for VR, i.e. they vary less as shown
on the right of figure 4. In VR, times range from almost 20 minutes to as low
as 9:30 min, while in the Web condition, the times vary from approximately
5:30 to 10 minutes. The difference of each group between Web and VR had a mean
of 4:46min and a median of 5:26. This time-data may be normally distributed
around its mean but does not have to be. To perform a significance test, we
used the Wilcoxon Signed-Rank test [56] since it does not assume a normal
distribution and based on our test we cannot confirm that both samples are
normally distributed. This test reports a $Z=-2,589$ with $p<.05$, meaning
that VR had statistically significantly longer task times than Web.
#### V-D3 Effectiveness
In order to consistently track errors across all recordings we had to define
what ”error” means in the context of this usability evaluation. Our definition
of a Usability Problem is based on [57] where the authors define a Usability
Problem as ”a set of negative phenomena, such as user’s inability to reach
his/her goal, inefficient interaction and/or user’s dissatisfaction, caused by
a combination of user interface design factors and factors of usage context”
[57]. Based on this definition, we extracted 3 types of errors that we
analyzed in the recordings:
1. 1.
Missed Interaction Point: The user tried to interact with an element of the
application but did not hit said element (for example a button) or used the
wrong control for interaction. Thus, the user needs to repeat the interaction.
2. 2.
Accidental Interaction: The user did not intend to interact at all or not with
this specific element but accidentally interacted with it anyway. Thus, the
user needs to revert the interaction.
3. 3.
False Interaction: The user tried to do an interaction that is not possible at
all or not possible at that specific element. Thus, the user experiences a
loss of time and needs to find out the correct interaction to achieve the
desired effect.
During the evaluation of the recordings, we tracked each error by its type and
a time stamp. Finally, the effectiveness was measured in errors per minute and
is shown in Figure 5. Most errors belonged to the Missed Interaction Point or
Accidental Interaction types with only a few False Interactions.
Figure 5: The error rates of the recorded participant in each group.
In VR, we observed a mean error rate of approximately 1.5 (error per minute)
with a median of 1.25 (error per minute), while these values lied at 0.66 and
0.61 (error per minute) respectively in the Web application. The Wilcoxon
Signed-Rank test resulted in a test statistic of $Z=-2.599$ with a
significance $<.05$ which shows that VR had a statistically significantly
higher error rate than Web.
#### V-D4 User Satisfaction
The basic user satisfaction was measured in the VR application using the 10
items SUS questionnaire for each participant. In total, our collaborative VR
modeling environment reached an average SUS score of 78 out of 100 which
indicates according to [58] good usability. As mentioned earlier, we did not
ask the participants to fill out the SUS questionnaire for the Web application
as our focus was more on the acceptance of our own VR solution than on the
acceptance of a mature and commercial modeling tool like Lucidchart.
#### V-D5 Additional Questionnaire Results
To assess the perceived naturalness of both applications, the Web and our VR
solution, the similarity of interactions inside the applications to face-to-
face interactions and the feeling of co-presence were analyzed. The results
are depicted in Fig. 6.
Figure 6: Results of additional questions concerning interactivity and co-
presence
Concerning the similarity of interactions to face-to-face interactions (see
Fig. 6 (a)), the average score of the Web application is 2.33 and noticeably
lower than the VR’s 3.58. Additionally, in VR 14 out of 24 people selected the
highest (5/5 on the Likert scale) answers whereas, in the Web, nobody chose
the highest and only two people chose the second highest answer (4/5 on the
Likert scale). A Wilcoxon Signed-Rank test revealed that this observed
difference is indeed statistically significant with $Z=-3.208$ and a
significance of $<0.05$. Overall, this means that users found interactions
with their teammates to be significantly more similar to face-to-face
interactions in the VR modeling environment compared to the Web application. A
further important aspect for natural interaction and collaboration is co-
presence which denotes the feeling of being in the same place despite the
remote setting. Fig. 6 (b) shows how the participants assessed their feeling
of co-presence in both applications. It shows that in the Web, this feeling is
very different from user to user, with larger bulks at both ends of the scale.
The median, however, with a value of 2.6 points more towards the lower end of
the scale. In the VR app, this is very different. While two people rated the
co-presence rather low (2 on the 1-5 scale), every other participant at least
somewhat agreed with the sentiment that there was a feeling of co-presence
with 9 participants selecting 4/5 and 13 choosing 5/5. The Wilcoxon Signed-
Rank test confirmed that this difference is statistically significant with a
$Z=-3.587$ and a significance of $<0.05$. This implies that the VR application
can more successfully make users feel like they are collaborating in the same
room compared to the Web app. Apart from the above-mentioned questions, we
asked the participants to provide us general feedback and remarks (what have
you liked/disliked most) on the developed collaborative VR modeling
environment. The most notable result is that 14 out of 24 people mentioned
that moving the model elements through the grabbing feature felt natural.
Furthermore, most comments were praising the ”collaboration” in the VR
modeling environment. Some comments explicitly mentioned a like for the
collaboration (3 out of 24), some indicated a positive impression for the
ability of talking to the teammate (4 out of 24), being able to see the
teammate (4 out of 24) or the feeling of the teammate’s presence (4 out of
24). Some participants mentioned multiple of these aspects. In total, 11 out
of 24 noted that at least one of these collaboration-related aspects felt
natural or intuitive. Concerning the negative feedback comments, typing on the
keyboard in VR was the most mentioned aspect (9 out of 24) while some of the
participants stated that this would only need some time to get used to it.
Furthermore, the missing of an auto-alignment or snapping feature, like known
from most diagramming and modeling tools (e.g. Microsoft Visio [59]), was
complained about by five users. However, five out of 24 people said that VR
was entertaining or fun to use and two added that it is specifically useful
for home office scenarios since it makes people feel more together and would
”definitely improve motivation and team spirit”. Finally, the participants had
to choose which application they would prefer to use for collaborative UML
modelling: They could choose either one or state that they would want to use
both depending on the situation. A follow up question to this one subsequently
asked in which situations they would want to use which application if they
selected ”Both”. 13% (3 out of 24) wanted to use the VR app over the Web
application and 37% (9 out of 24) vice versa. Half of the participants,
however, indicated that they would want to use both applications, each for
specific situations. When asked in which situations they would want to use
which application, participants gave rather diverse answers. Five users stated
that they would want to use the Web application for complex or longer tasks
and the VR one for shorter ones. Two mentioned that they would prefer the Web
application for time critical work. Brainstorming and planning was mentioned
by three people to be more suited for the VR application and one person stated
that she would like to use ”the web application when you are working on one
device with your partner” and the VR app when in ”different locations”.
#### V-D6 Discussion
Based on previous research and the participants’ familiarity with traditional
computer programs, we expected one downside of VR to be that users’ task
executions are slower and more error-prone in VR. The data from our study
shows that this was indeed the case. These measures could have been influenced
by the universal familiarity of participants with PC applications in general
and UML tools specifically. It is therefore possible that speed and error
rates in VR improve as users get more experience with a specific VR UML tool.
However, the current state-of-art text entry can be seen as a major bottleneck
for the efficiency of text-intensive VR applications. The results of the SUS
evaluation additionally showed that our VR implementation is already quite
usable even though it still lacks many features that users expect from such an
application like automatic aligning of model elements and copy & paste
functionalities. The various data points gathered about the naturalness of
different aspects of the application gave a clearer insight on what concrete
advantages such a VR application can have compared to traditional tools: On
average, users found the interactions and especially the collaboration related
aspects of the VR application significantly more natural than in the Web
application. This is especially important with respect to this work’s focus on
remote collaboration settings as the study showed that the feelings of being
together and collaborating face to face with a co-worker were much higher in
VR compared to the traditional PC alternative. Another aspect that we expected
VR to be beneficial for is the motivation and fun users are having while using
it. Our study shows that it is indeed true that users were a lot more
motivated and had a lot more fun using the VR application compared to the Web
app. It is important to note that this could be influenced by the fact that VR
is a relatively new and therefore possibly more interesting technology, so
these values might align more over time when a user regularly uses a VR
application for modeling. The fact that using VR can be more exhausting for
people was one downside of VR we expected to observe in this study as well.
While we did see that some participants experienced significant discomfort
(due to heavy headsets, pressure against the face, or cybersickness), most
people did not have any issues with that. Considering the suggestions made by
participants about when they would like to use which application, it is
evident, however, that a VR UML tool would not simply replace the desktop
ones. Rather it would be an amendment, so users have the option to use the
tool that is most suited for a given situation. In remote collaboration
settings, where two or more people need to brainstorm or discuss how something
should be modeled, the VR application could be used. When collaborating in the
same room or when creating a model alone, a PC-based application could be more
appropriate. This implies that such apps need seamless interoperability
between PCs and VR when they ought to be used in actual modeling work outside
of usability studies. Summarizing, it can be said that VR can offer a more
natural collaborative modeling experience compared to PC-based tools but that
both techniques have certain advantages and drawbacks. These make the use of
both tool-types, depending on the concrete situation, most sensible instead of
using only one of them exclusively.
#### V-D7 Threats to Validity
With regard to collaboration, this study only evaluated two-person teams.
Therefore, it is unclear if the findings can be generalized to larger numbers
of simultaneous collaborators. The number of participants and thereby
collaboration teams was also rather limited. With more participants, a
between-subjects design [52] could have been chosen which has the possibility
to provide data and thus findings that are more generalizable across many
different users. Due to the participant’s demographics (e.g., age, profession,
background, etc.), the findings of this study should be taken carefully and
further user studies with other user groups are needed to get insights about
the general usability. Additionally, this study compared a fully-featured
commercially available Web application with a VR modeling prototype, missing
many of the features that the Web application supported, like automatic
aligning of model elements. This study therefore could not achieve a strict
like-for-like comparison between the two types of applications.
## VI Conclusion and Future Work
While the Unified Modeling Language (UML) is one of the major conceptual
modeling languages for software engineers, more and more concerns arise from
the modeling quality of UML and its tool-support. Among them, the limitation
of the two-dimensional presentation of its notations and lack of natural
collaborative modeling tools are reported to be significant. In this paper, we
have explored the potential of using Virtual Reality (VR) technology for
collaborative UML software design by comparing it with classical collaborative
software design using conventional devices (Desktop PC / Laptop). For this
purpose, we have presented a VR modeling environment that offers a natural
collaborative modeling experience for UML Class Diagrams. Based on a user
study with 24 participants, we have compared collaborative VR modeling with
conventional modeling with regard to efficiency, effectiveness, and user
satisfaction.
In future work, we plan to extend our collaborative VR modeling environment to
further UML modeling diagram types and even to further modeling languages
(e.g., BPMN, SysML, etc.). In addition, further improvements of the VR
modeling environment are planned to support a multi-modal (e.g. speech
in-/output or haptic feedback) interaction and a more realistic representation
of the virtual character (e.g. realistic avatars or tracking of users’ facial
expressions). Features like automatic aligning of model elements, and tracking
of which collaborator created which parts of the model are also useful aspects
that could be integrated into the VR modeling environment. In addition,
further usability evaluation studies with larger groups of heterogeneous
participants and more complex modeling tasks should be conducted to analyze in
more detail the benefit of collaborative modeling in VR. Finally, we believe
that a cross-device mixed reality collaborative modeling approach is a
promising way to support modeling across different AR/VR capable and
conventional devices.
## References
* [1] J. Whitehead, “Collaboration in software engineering: A roadmap,” in _Future of Software Engineering (FOSE '07)_. IEEE, May 2007.
* [2] M. Petre, “UML in practice,” in _35th International Conference on Software Engineering, ICSE ’13, San Francisco, CA, USA, May 18-26, 2013_ , D. Notkin, B. H. C. Cheng, and K. Pohl, Eds. IEEE Computer Society, 2013, pp. 722–731. [Online]. Available: https://doi.org/10.1109/ICSE.2013.6606618
* [3] M. Gogolla, O. Radfelder, and M. Richters, “Towards three-dimensional representation and animation of uml diagrams,” in _Proceedings of the 2nd International Conference on The Unified Modeling Language: Beyond the Standard_ , ser. UML’99. Berlin, Heidelberg: Springer-Verlag, 1999, p. 489–502.
* [4] J. I. Maletic, J. Leigh, and A. Marcus, “Visualizing software in an immersive virtual reality environment,” in _in Proceedings of ICSE’01 Workshop on Software Visualization_. Society Press, 2001, pp. 12–13.
* [5] J. Erickson and K. Siau, “Unified modeling language: Theoretical and practical complexity,” in _9th Americas Conference on Information Systems, AMCIS 2003, Tampa, FL, USA, August 4-6, 2003_. Association for Information Systems, 2003, p. 164. [Online]. Available: http://aisel.aisnet.org/amcis2003/164
* [6] O. Badreddin, R. Khandoker, A. Forward, O. Masmali, and T. C. Lethbridge, “A decade of software design and modeling: A survey to uncover trends of the practice,” in _Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2018, Copenhagen, Denmark, October 14-19, 2018_ , A. Wasowski, R. F. Paige, and Ø. Haugen, Eds. ACM, 2018, pp. 245–255. [Online]. Available: https://doi.org/10.1145/3239372.3239389
* [7] L. S. Inc., “Lucidchart,” https://www.lucidchart.com/, Dec. 2020.
* [8] Axellience, “Genmymodel,” https://www.genmymodel.com/, Nov. 2020.
* [9] E. Yigitbas, I. Jovanovikj, J. Scholand, and G. Engels, “VR training for warehouse management,” in _VRST ’20: 26th ACM Symposium on Virtual Reality Software and Technology_ , R. J. Teather, C. Joslin, W. Stuerzlinger, P. Figueroa, Y. Hu, A. U. Batmaz, W. Lee, and F. R. Ortega, Eds. ACM, 2020, pp. 78:1–78:3.
* [10] E. Yigitbas, K. Karakaya, I. Jovanovikj, and G. Engels, “Enhancing human-in-the-loop adaptive systems through digital twins and VR interfaces,” in _16th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS@ICSE 2021, Madrid, Spain, May 18-24, 2021_. IEEE, 2021, pp. 30–40. [Online]. Available: https://doi.org/10.1109/SEAMS51251.2021.00015
* [11] E. Yigitbas, C. B. Tejedor, and G. Engels, “Experiencing and programming the ENIAC in VR,” in _Mensch und Computer 2020_ , F. Alt, S. Schneegass, and E. Hornecker, Eds. ACM, 2020, pp. 505–506.
* [12] E. Yigitbas, J. Heindörfer, and G. Engels, “A context-aware virtual reality first aid training application,” in _Proc. of Mensch und Computer 2019_ , F. Alt, A. Bulling, and T. Döring, Eds. GI / ACM, 2019, pp. 885–888.
* [13] I. Jovanovikj, E. Yigitbas, S. Sauer, and G. Engels, “Augmented and virtual reality object repository for rapid prototyping,” in _Human-Centered Software Engineering - 8th IFIP WG 13.2 International Working Conference, HCSE 2020, Eindhoven, The Netherlands, November 30 - December 2, 2020, Proceedings_ , ser. Lecture Notes in Computer Science, R. Bernhaupt, C. Ardito, and S. Sauer, Eds., vol. 12481. Springer, 2020, pp. 216–224. [Online]. Available: https://doi.org/10.1007/978-3-030-64266-2\\_15
* [14] E. Yigitbas, J. Klauke, S. Gottschalk, and G. Engels, “VREUD - an end-user development tool to simplify the creation of interactive VR scenes,” _CoRR_ , vol. abs/2107.00377, 2021. [Online]. Available: https://arxiv.org/abs/2107.00377
* [15] E. Yigitbas, S. Grün, S. Sauer, and G. Engels, “Model-driven context management for self-adaptive user interfaces,” in _Ubiquitous Computing and Ambient Intelligence - 11th International Conference, UCAmI 2017, Philadelphia, PA, USA, November 7-10, 2017, Proceedings_ , ser. Lecture Notes in Computer Science, S. F. Ochoa, P. Singh, and J. Bravo, Eds., vol. 10586\. Springer, 2017, pp. 624–635. [Online]. Available: https://doi.org/10.1007/978-3-319-67585-5\\_61
* [16] E. Yigitbas, S. Sauer, and G. Engels, “Adapt-ui: an IDE supporting model-driven development of self-adaptive uis,” in _Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, EICS 2017, Lisbon, Portugal, June 26-29, 2017_ , J. C. Campos, N. Nunes, P. Campos, G. Calvary, J. Nichols, C. Martinie, and J. L. Silva, Eds. ACM, 2017, pp. 99–104. [Online]. Available: https://doi.org/10.1145/3102113.3102144
* [17] E. Yigitbas, I. Jovanovikj, K. Biermeier, S. Sauer, and G. Engels, “Integrated model-driven development of self-adaptive user interfaces,” _Softw. Syst. Model._ , vol. 19, no. 5, pp. 1057–1081, 2020. [Online]. Available: https://doi.org/10.1007/s10270-020-00777-7
* [18] E. Yigitbas, A. Anjorin, I. Jovanovikj, T. Kern, S. Sauer, and G. Engels, “Usability evaluation of model-driven cross-device web user interfaces,” in _Human-Centered Software Engineering - 7th IFIP WG 13.2 International Working Conference, HCSE 2018, Sophia Antipolis, France, September 3-5, 2018, Revised Selected Papers_ , ser. Lecture Notes in Computer Science, C. Bogdan, K. Kuusinen, M. K. Lárusdóttir, P. A. Palanque, and M. Winckler, Eds., vol. 11262. Springer, 2018, pp. 231–247. [Online]. Available: https://doi.org/10.1007/978-3-030-05909-5\\_14
* [19] E. Yigitbas, A. Hottung, S. M. Rojas, A. Anjorin, S. Sauer, and G. Engels, “Context- and data-driven satisfaction analysis of user interface adaptations based on instant user feedback,” _Proc. ACM Hum. Comput. Interact._ , vol. 3, no. EICS, pp. 19:1–19:20, 2019. [Online]. Available: https://doi.org/10.1145/3331161
* [20] E. Yigitbas, B. Mohrmann, and S. Sauer, “Model-driven UI development integrating HCI patterns,” in _Proceedings of the 1st Workshop on Large-scale and Model-based Interactive Systems: Approaches and Challenges, LMIS 2015, co-located with 7th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2015), Duisburg, Germany, June 23, 2015_ , ser. CEUR Workshop Proceedings, R. Seiger, B. Altakrouri, A. Schrader, and T. Schlegel, Eds., vol. 1380. CEUR-WS.org, 2015, pp. 42–46. [Online]. Available: http://ceur-ws.org/Vol-1380/paper6.pdf
* [21] K. Josifovska, E. Yigitbas, and G. Engels, “A digital twin-based multi-modal UI adaptation framework for assistance systems in industry 4.0,” in _Human-Computer Interaction. Design Practice in Contemporary Societies - Thematic Area, HCI 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings, Part III_ , ser. Lecture Notes in Computer Science, M. Kurosu, Ed., vol. 11568\. Springer, 2019, pp. 398–409. [Online]. Available: https://doi.org/10.1007/978-3-030-22636-7\\_30
* [22] ——, “Reference framework for digital twins within cyber-physical systems,” in _Proceedings of the 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems, SEsCPS@ICSE 2019, Montreal, QC, Canada, May 28, 2019_ , T. Bures, B. R. Schmerl, J. S. Fitzgerald, and D. Weyns, Eds. IEEE / ACM, 2019, pp. 25–31. [Online]. Available: https://doi.org/10.1109/SEsCPS.2019.00012
* [23] S. Gottschalk, E. Yigitbas, A. Nowosad, and G. Engels, “Situation-specific business model development methods for mobile app developers,” in _Enterprise, Business-Process and Information Systems Modeling - 22nd International Conference, BPMDS 2021, and 26th International Conference, EMMSAD 2021, Held at CAiSE 2021, Melbourne, VIC, Australia, June 28-29, 2021, Proceedings_ , ser. Lecture Notes in Business Information Processing, A. Augusto, A. Gill, S. Nurcan, I. Reinhartz-Berger, R. Schmidt, and J. Zdravkovic, Eds., vol. 421. Springer, 2021, pp. 262–276. [Online]. Available: https://doi.org/10.1007/978-3-030-79186-5\\_17
* [24] S. Gottschalk, E. Yigitbas, and G. Engels, “Model-based hypothesis engineering for supporting adaptation to uncertain customer needs,” in _Business Modeling and Software Design - 10th International Symposium, BMSD 2020, Berlin, Germany, July 6-8, 2020, Proceedings_ , ser. Lecture Notes in Business Information Processing, B. Shishkov, Ed., vol. 391. Springer, 2020, pp. 276–286. [Online]. Available: https://doi.org/10.1007/978-3-030-52306-0\\_18
* [25] M. Renger, G. L. Kolfschoten, and G. de Vreede, “Challenges in collaborative modelling: a literature review and research agenda,” _Int. J. Simul. Process. Model._ , vol. 4, no. 3/4, pp. 248–263, 2008. [Online]. Available: https://doi.org/10.1504/IJSPM.2008.023686
* [26] N. Boulila, “Supporting distributed software development with rd-uml,” in _GI-Edition: Lecture Notes in Informatics_ , Jan. 2002.
* [27] W. Chen, R. Pedersen, and Ø. Pettersen, “Colemo: A collaborative learning environment for UML modelling,” _Interact. Learn. Environ._ , vol. 14, no. 3, pp. 233–249, 2006. [Online]. Available: https://doi.org/10.1080/10494820600909165
* [28] M. Ferenc, I. Polásek, and J. Vincur, “Collaborative modeling and visualization of software systems using multidimensional UML,” in _IEEE Working Conference on Software Visualization, VISSOFT 2017, Shanghai, China, September 18-19, 2017_. IEEE, 2017, pp. 99–103. [Online]. Available: https://doi.org/10.1109/VISSOFT.2017.19
* [29] O. Radfelder and M. Gogolla, “On better understanding uml diagrams through interactive three-dimensional visualization and animation,” in _Proceedings of the Working Conference on Advanced Visual Interfaces_ , ser. AVI ’00. New York, NY, USA: Association for Computing Machinery, 2000, p. 292–295. [Online]. Available: https://doi.org/10.1145/345513.345358
* [30] B. Zhang and Y. sho Chen, “Enhancing UML conceptual modeling through the use of virtual reality,” in _Proceedings of the 38th Annual Hawaii International Conference on System Sciences_. IEEE, 2005.
* [31] C. S. C. Rodrigues, C. M. L. Werner, and L. Landau, “VisAr3d: an innovative 3d visualization of uml models,” in _Proceedings of the 38th International Conference on Software Engineering Companion - ICSE '16_. ACM Press, 2016\.
* [32] M. Leyer, R. Brown, B. Aysolmaz, I. Vanderfeesten, and O. Turetken, “3d virtual world BPM training systems: Process gateway experimental results,” in _Advanced Information Systems Engineering_. Springer International Publishing, 2019, pp. 415–429.
* [33] K. Casey and C. Exton, “A java 3d implementation of a geon based visualisation tool for UML,” in _Proceedings of the 2nd International Symposium on Principles and Practice of Programming in Java, PPPJ 2003, Kilkenny City, Ireland, June 16-18, 2003_ , ser. ACM International Conference Proceeding Series, J. F. Power and J. Waldron, Eds., vol. 42. ACM, 2003, pp. 63–65. [Online]. Available: https://dl.acm.org/citation.cfm?id=957309
* [34] J. von Pilgrim and K. Duske, “Gef3d: a framework for two-, two-and-a-half-, and three-dimensional graphical editors,” in _Proceedings of the ACM 2008 Symposium on Software Visualization, Ammersee, Germany, September 16-17, 2008_ , R. Koschke, C. D. Hundhausen, and A. C. Telea, Eds. ACM, 2008, pp. 95–104. [Online]. Available: https://doi.org/10.1145/1409720.1409737
* [35] J. von Pilgrim, K. Duske, and P. McIntosh, “Eclipse GEF3D: bringing 3d to existing 2d editors,” _Inf. Vis._ , vol. 8, no. 2, pp. 107–119, 2009. [Online]. Available: https://doi.org/10.1057/ivs.2009.9
* [36] P. McIntosh and M. Hamilton, “X3D-UML: 3d UML mechatronic diagrams,” in _21st Australian Software Engineering Conference (ASWEC 2010), 6-9 April 2010, Auckland, New Zealand_. IEEE Computer Society, 2010, pp. 85–93. [Online]. Available: https://doi.org/10.1109/ASWEC.2010.14
* [37] E. Yigitbas, I. Jovanovikj, and G. Engels, “Simplifying robot programming using augmented reality and end-user development,” _CoRR_ , vol. abs/2106.07944, 2021. [Online]. Available: https://arxiv.org/abs/2106.07944
* [38] S. Gottschalk, E. Yigitbas, E. Schmidt, and G. Engels, “Model-based product configuration in augmented reality applications,” in _Human-Centered Software Engineering - 8th IFIP WG 13.2 International Working Conference, HCSE 2020, Eindhoven, The Netherlands, November 30 - December 2, 2020, Proceedings_ , ser. Lecture Notes in Computer Science, R. Bernhaupt, C. Ardito, and S. Sauer, Eds., vol. 12481. Springer, 2020, pp. 84–104. [Online]. Available: https://doi.org/10.1007/978-3-030-64266-2\\_5
* [39] ——, “Proconar: A tool support for model-based AR product configuration,” in _Human-Centered Software Engineering - 8th IFIP WG 13.2 International Working Conference, HCSE 2020, Eindhoven, The Netherlands, November 30 - December 2, 2020, Proceedings_ , ser. Lecture Notes in Computer Science, R. Bernhaupt, C. Ardito, and S. Sauer, Eds., vol. 12481\. Springer, 2020, pp. 207–215. [Online]. Available: https://doi.org/10.1007/978-3-030-64266-2\\_14
* [40] E. Yigitbas, S. Sauer, and G. Engels, “Using augmented reality for enhancing planning and measurements in the scaffolding business,” in _EICS ’21: ACM SIGCHI Symposium on Engineering Interactive Computing Systems, virtual, June 8-11, 2021_. ACM, 2021\. [Online]. Available: https://doi.org/10.1145/3459926.3464747
* [41] S. Krings, E. Yigitbas, I. Jovanovikj, S. Sauer, and G. Engels, “Development framework for context-aware augmented reality applications,” in _EICS ’20: ACM SIGCHI Symposium on Engineering Interactive Computing Systems, Sophia Antipolis, France, June 23-26, 2020_ , J. Bowen, J. Vanderdonckt, and M. Winckler, Eds. ACM, 2020, pp. 9:1–9:6. [Online]. Available: https://doi.org/10.1145/3393672.3398640
* [42] E. Yigitbas, I. Jovanovikj, S. Sauer, and G. Engels, “On the development of context-aware augmented reality applications,” in _Beyond Interactions \- INTERACT 2019 IFIP TC 13 Workshops, Paphos, Cyprus, September 2-6, 2019, Revised Selected Papers_ , ser. Lecture Notes in Computer Science, J. L. Abdelnour-Nocera, A. Parmaxi, M. Winckler, F. Loizides, C. Ardito, G. Bhutkar, and P. Dannenmann, Eds., vol. 11930. Springer, 2019, pp. 107–120. [Online]. Available: https://doi.org/10.1007/978-3-030-46540-7\\_11
* [43] A. Mikkelsen, S. Honningsøy, T.-M. Grønli, and G. Ghinea, “Exploring microsoft hololens for interactive visualization of UML diagrams,” in _Proceedings of the 9th International Conference on Management of Digital EcoSystems - MEDES '17_. ACM Press, 2017.
* [44] R. Reuter, F. Hauser, D. Muckelbauer, T. Stark, E. Antoni, J. Mottok, and C. Wolff, “Using augmented reality in software engineering education? first insights to a comparative study of 2d and AR UML modeling,” in _Proceedings of the 52nd Hawaii International Conference on System Sciences_. Hawaii International Conference on System Sciences, 2019.
* [45] R. Seiger, R. Kühn, M. Korzetz, and U. Aßmann, “Holoflows: modelling of processes for the internet of things in mixed reality,” _Software and Systems Modeling_ , pp. 1–25, 2021.
* [46] L. Brunschwig, R. Campos-López, E. Guerra, and J. de Lara, “Towards domain-specific modelling environments based on augmented reality,” in _43rd IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results, ICSE (NIER) 2021, Madrid, Spain, May 25-28, 2021_. IEEE, 2021, pp. 56–60. [Online]. Available: https://doi.org/10.1109/ICSE-NIER52604.2021.00020
* [47] J. Maletic, J. Leigh, A. Marcus, and G. Dunlap, “Visualizing object-oriented software in virtual reality,” in _Proceedings 9th International Workshop on Program Comprehension. IWPC 2001_. IEEE Comput. Soc, 2001.
* [48] A. Dengel, “Seeking the treasures of theoretical computer science education: Towards educational virtual reality for the visualization of finite state machines,” in _2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)_. IEEE, Dec. 2018.
* [49] R. Oberhauser, C. Pogolski, and A. Matic, “VR-BPMN: Visualizing BPMN models in virtual reality,” in _Lecture Notes in Business Information Processing_. Springer International Publishing, 2018, pp. 83–97.
* [50] U. Technologies, “Unity engine,” https://unity.com, Feb. 2021.
* [51] Exit Games, “Pun — player networking,” https://doc.photonengine.com/en-us/pun/v2/demos-and-tutorials/pun-basics-tutorial/player-networking, Feb. 2021.
* [52] C. M. Barnum, _Usability Testing Essentials: Ready, Set…Test!_ , 1st ed. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2010.
* [53] Google LLC, “Google forms,” https://www.google.de/intl/en/forms/about/, Mar. 2021.
* [54] J. Brooke, _”SUS - A quick and dirty usability scale.” Usability evaluation in industry_. CRC Press, June 1996, iSBN: 9780748404605. [Online]. Available: https://www.crcpress.com/product/isbn/9780748404605
* [55] A. Bangor, P. Kortum, and J. Miller, “Determining what individual sus scores mean: Adding an adjective rating scale,” _J. Usability Stud._ , vol. 4, pp. 114–123, 04 2009.
* [56] Ahmed Sabbir Arif, University of California, “A brief note on selecting & reporting the right statistical test,” https://www.asarif.com/notes/HypothesisTesting.html, Mar. 2021.
* [57] P. Manakhov and V. D. Ivanov, “Defining usability problems,” in _Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems_. ACM, May 2016.
* [58] J. Sauro, _A practical guide to the system usability scale: background, benchmarks & best practices_. Denver, Colorado: Measuring Usability LLC, 2011.
* [59] Microsoft, “Visio — the ultimate tool for diagramming,” https://www.microsoft.com/en-us/microsoft-365/visio/flowchart-software/, Feb. 2021.
*[UML]: Unified Modeling Language
*[HMD]: Head Mounted Display
*[VR]: Virtual Reality
*[BPMN]: Business Process Model Notation
*[AR]: Augmented Reality
*[CAVE]: Cave Automatic Virtual Environment
*[FSM]: Finite State Machine
*[PUN2]: Photon Unity Networking 2
*[SDK]: Software Development Kit
*[SUS]: System Usability Scale
| arxiv-papers | 2021-07-27T12:34:54 | 2024-09-04T03:07:21.463047 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Enes Yigitbas, Simon Gorissen, Nils Weidmann, Gregor Engels",
"submitter": "Enes Yigitbas",
"url": "https://arxiv.org/abs/2107.12772"
} |
2107.12776 | # Black holes solutions in power-law Maxwell-$f(T)$ gravity in diverse
dimensions
G.G.L. Nashed [email protected] Centre for Theoretical Physics, The British
University in Egypt, P.O. Box 43, El Sherouk City, Cairo 11837, Egypt
Int. Lab. Theor. Cosmology, Tomsk State University of Control Systems and
Radioelectronics (TUSUR), 634050 Tomsk, Russia Kazuharu Bamba
[email protected] Division of Human Support System, Faculty of
Symbiotic Systems Science, Fukushima University, Fukushima 960-1296, Japan
###### Abstract
We investigate the solutions of black holes in $f(T)$ gravity with nonlinear
power-law Maxwell field, where $T$ is the torsion scalar in teleparalelism. In
particular, we introduce the Langranian with diverse dimensions in which the
quadratic polynomial form of $f(T)$ couples with the nonlinear power-law
Maxwell field. We explore the leverage of the nonlinear electrodynamics on the
space-time behavior. It is found that these new black hole solutions tend
towards those in general relativity without any limit. Furthermore, it is
demonstrated that the singularity of the curvature invariant and the torsion
scalar is softer than the quadratic form of the charged field equations in
$f(T)$ gravity and much milder than that in the classical general relativity
because of the nonlinearity of the Maxwell field. In addition, from the
analyses of physical and thermodynamic quantities of the mass, charge and the
Hawking temperature of black holes, it is shown that the power-law parameter
affects the asymptotic behavior of the radial coordinate of the charged terms,
and that a higher-order nonlinear power-law Maxwell field imparts the black
holes with the local stability.
## I Introduction
Over the past years, black holes (BHs) possessing linear and nonlinear Maxwell
fields have attracted tremendous attention. The study of charged BH solutions
is relevant because BH created in a collider may generally possess an electric
field. Moreover, the difference between the electroweak and Planck scales is
still an unsolved challenge that is known as the hierarchy problem. This
problem has been tackled in the frame of theories with extra spatial
dimensions. Further, this work is an attempt at elucidating higher-dimension
charged BH solutions. The first higher-dimension spherically symmetric BH
solution was derived in Tangherlini (1963), after which it was generalized in
Myers and Perry (1986). Moreover, a higher-dimension charged BH solution,
which is a generalization of the Reissner-Nordström BH, was derived in Fadeev
_et al._ (1991). There are different sets of the charged BH solutions, which
were derived by the Brans-Dicke and Lovelock theories; their physical
properties have been studied Dehghani and Hendi (2007); Dehghani _et al._
(2007, 2008); Hendi (2010). The research on the higher dimensions of the Kerr-
Newman solution is in progress, although the slowly rotating BH solution has
been derived in Mignemi and Stewart (1993); El Hanafy and Nashed (2016);
Volkov and Straumann (1997); Ghosh and SenGupta (2007); Kim and Cai (2008);
Sheykhi and Allahverdizadeh (2008).
It is known that the Maxwell theory is invariant under conformal
transformation in four dimensions, although it is not invariant in a higher
dimension. The lack of this transformation has been explicitly studied in
higher dimensions employing the nonlinear power-law Maxwell field Hassaine and
Martinez (2007, 2008). The conformal invariance in a higher dimension was
considered to derive a similar four-dimensional Reissner-Nordström BH with
extra dimensions. Thus, the present study is aimed at deriving diverse-
dimensional charged BH solutions within the frame of the modified teleparallel
equivalent of general relativity (TEGR), namely, f(T)-gravitational theory.
There are various reasons, ranging from our accelerated expansion of the
universe and its dark energy in the astrophysical tests, for researchers to
consider modifying general relativity (GR). Among the modifications, the
Brans-Dicke Brans and Dicke (1961); Dicke (1962), Lovelock Lovelock (1971),
$f(R)$ Buchdahl (1970); Sotiriou and Faraoni (2010); Nojiri _et al._ (2017),
and $f(T)$ (refer to Cai _et al._ (2016) for more details) gravitational
theories have gained much attraction for different reasons. In the present
study, we concentrate on the $f(T)$ gravity for many reasons, such as the fact
that the Lagrangian of this theory which depends on the torsion scalar only,
which makes it easy to handle compared with other modified gravitational
theories ($f(R)$ Cembranos _et al._ (2012); Nojiri and Odintsov (2011)).
Another major reason for focusing on $f(T)$ is the point that the
gravitational field equations are of the second order, unlike those in the
other modified theories Ferraro and Fiorini (2007); Awad and Nashed (2017); Li
_et al._ (2011).
TEGR is a theory, which was developed by Einstein to unify the gravitational
and electromagnetic fields Nashed (2006, 2008, 2010, 2007a); Unzicker and Case
(2005); Nashed (2007b). The TEGR theory could be applied to calculate the
conserved quantities, mass and angular momentum employing the energy-momentum
tensor Maluf (1995); Maluf _et al._ (2002). The main motivation of the
modification of TEGR theory was the issues recently appeared in observations
that TEGR cannot explain Ferraro and Fiorini (2007). $f(T)$, which exhibits
many viable applications, is the modification of the TEGR theory Capozziello
_et al._ (2015); Nashed (2002); Iorio and Saridakis (2012); Gamal (2012);
Bamba _et al._ (2014). By employing this theory, not only inflation Ferraro
and Fiorini (2007) in the early universe but also the late-time cosmic
acceleration could be explained Bengochea and Ferraro (2009); Linder (2010);
Wu and Yu (2011); Dent _et al._ (2011); Awad and Nashed (2017); Bamba _et
al._ (2011, 2010, 2012); Aviles _et al._ (2013); Jamil _et al._ (2012);
Ferraro and Fiorini (2011a, b); Sebastiani and Zerbini (2011); Salako _et
al._ (2013); Haghani _et al._ (2012, 2013). There exist a number of
interesting applications of $f(T)$ gravity to the realm of cosmology Bamba
_et al._ (2013a, b); Bamba (2011); Bamba _et al._ (2013c); Bengochea and
Ferraro (2009); Linder (2010); Geng _et al._ (2011); Otalora (2013);
Chattopadhyay and Pasqua (2013); Dent _et al._ (2011); Yang (2011); Bamba
_et al._ (2011); Capozziello _et al._ (2011); Awad _et al._ (2018);
Capozziello _et al._ (2011); Geng _et al._ (2012); Farajollahi _et al._
(2012); Cardone _et al._ (2012); Bahamonde _et al._ (2015), as well as in
the domain of astrophysics Capozziello _et al._ (2013); Paliathanasis _et
al._ (2014); Gonzalez _et al._ (2012); Boehmer _et al._ (2012); Nashed
(2013); Ruggiero and Radicella (2015). In the astrophysical domain, $f(T)$
possesses a new exact charged BH solution, which involves, in addition to the
monopole term, a quadruple term whose contribution accrues from the quadratic
$f(T)$ form, i.e., $T^{2}$. Based on the achievements recorded in $f(T)$
gravity, we explore the implication of the nonlinear power-law Maxwell field.
Particularly, we derive the field equations of $f(T)$ coupled with the
nonlinear power-law Maxwell field and apply their quadratic form, that is,
$f(T)=T_{0}+\alpha T-\beta T^{2}$, to diverse-dimensional flat transverse
sections.
The arrangements of the study are the followings. In Sec. II, we explain
$f(T)$ gravity and show the field equations with the Maxwell field. In Sec.
III, we investigate the solutions of the charged static BH with the Anti-de-
Sitter/de-Sitter (AdS/dS) behavior. We analyze the singularity and horizon
structure of these BH solutions and calculate their energies in Sec. III. In
Sec. IV, we explore the charged AdS solutions of the rotating BH in power-law
Maxwell-$f(T)$ gravity. In Sec. V, we calculate different thermodynamical
quantities and establish the local stability of our BH solutions. Finally, the
conclusions and discussions are given in Sec. VI.
## II Basic formulations of $f(T)$ gravity
The f(T)-gravity is a kind of extension of TEGR. In this theory, it is
suitable to apply the vielbein (tetrads) fields, $e_{i}^{\mu}$ , as dynamic
variables (the Greek indices run for the coordinate space and the Latin one
spans for the tangent one) that constitute orthonormal basis of the tangent
space at the spacetime each point. The relations between the covariant and
contravariant tetrads and between the tetrads and metrics are represented by
the following equation:
$e^{i}_{\mu}e_{i}^{\nu}:={\delta_{\mu}}^{\nu},\qquad\qquad
e^{i}_{\mu}e_{j}^{\mu}:={\delta_{j}}^{i},\qquad\qquad{\it
g_{\mu\nu}:=\eta_{ij}{e^{i}}_{\mu}{e^{j}}_{\nu},}\qquad\qquad\eta_{ij}:={e_{i}}^{\mu}{e_{j}}^{\nu}g_{\mu\nu},$
(1)
where $\eta_{ij}=(+,-,-,-\cdots)$ is the $d$-dimensional Minkowskian metric of
the tangent space. Unlike the symmetric Levi-Civita connection in GR, the
(non-symmetric) Weitzenböck connection in TEGR is defined as Weitzenböck
(1923)
$\overset{{\bf{w}}}{\Gamma}^{\lambda}_{\mu\nu}:={e_{i}}^{\lambda}~{}\partial_{\nu}e^{i}_{\mu}.$
(2)
It follows from Eq. (2) that the torsion tensor is given by
${T^{\alpha}}_{\mu\nu}:=\overset{{\bf{w}}}{\Gamma}^{\alpha}_{\nu\mu}-\overset{{\bf{w}}}{\Gamma}^{\alpha}_{\mu\nu}={e_{i}}^{\alpha}\left(\partial_{\mu}{e^{i}}_{\nu}-\partial_{\nu}{e^{i}}_{\mu}\right).$
(3)
This tensor encodes all the information of the gravitational field. The
difference between the Levi-Civita and the Weitzenböck connections defines the
contorsion tensor, which is expressed by Eq. (4):
${K^{\lambda}}_{\mu\nu}:=\overset{{\bf{w}}}{\Gamma}^{\lambda}_{\mu\nu}-\overset{{\bf{\circ}}}{\Gamma}^{\lambda}_{\mu\nu},$
(4)
where $\overset{{\bf{\circ}}}{\Gamma}^{\lambda}_{\mu\nu}$ is the symmetric
Levi-Civita connection. The super-potential can be defined by the foregoing
equations, as follows:
${S_{\lambda}}^{\mu\nu}:={K^{\mu\nu}}_{\lambda}+\delta^{\mu}_{\lambda}{T^{\alpha\nu}}_{\alpha}-\delta^{\nu}_{\lambda}{T^{\alpha\mu}}_{\alpha},$
(5)
that has a skew symmetry in the last two indices. The torsion scalar with the
following form can be defined by Eqs. (3) and (5):
$T=\frac{1}{2}{S_{\lambda}}^{\mu\nu}{T^{\lambda}}_{\mu\nu}\equiv\frac{1}{4}T^{\rho\mu\nu}T_{\rho\mu\nu}+\frac{1}{2}T^{\rho\mu\nu}T_{\nu\mu\rho}-T_{\rho\mu}^{\
\ \rho}T_{\ \ \ \nu}^{\nu\mu}.$ (6)
The Lagrangian of TEGR mainly depends on the torsion scalar $T$ and the
variation of the the Lagrangian with respect to the vierbeins can lead to the
same field equations in GR.
With the same spirit of $f(R)$ gravity, the Lagrangian of TEGR described by
$T$ can be expanded to an arbitrary function $f$ of $T$ as $f(T)$ as follows
Cai _et al._ (2016):
${\cal L}=\frac{1}{2\kappa}\int|e|f(T)~{}d^{d}x.$ (7)
Here, $|e|=\sqrt{-g}=\det\left({e^{a}}_{\mu}\right)$ is the determinant of the
tetrad. Moreover, $\kappa$ is a constant in the $d$-dimensions with the form
$\kappa=2(d-3)\Omega_{d-1}G_{d}$, where $G_{d}$ the Newtonian constant in the
$d$-dimensions and $\Omega_{d-1}$ is the volume of the unit sphere in the
$(d-1)$-dimensions, given by
$\Omega_{d-1}=\frac{2\pi^{(d-1)/2}}{\Gamma[(d-1)/2]},$ (8)
with $\Gamma$ a $\Gamma$-function.
The action (7) coupled with the power law-Maxwell Lagrangian is represented as
${\cal L}=\frac{1}{2\kappa}\int|e|f(T)~{}d^{d}x+\int|e|{\cal
L}_{em}~{}d^{d}x,$ (9)
where ${\cal L}_{em}={\cal F}^{s}$, with ${\cal F}=dQ$ and $Q=Q_{\mu}dx^{\mu}$
is the electromagnetic potential 1-form Capozziello _et al._ (2013) and $s$
is a power-law parameter in terms of the Maxwell field. When the power for the
Maxwell field is equal to unity ($s=1$), the Lagrangian describes the ordinary
Maxwell theory Nashed (2013).
By varing the action in Eq. (9) in terms of the tetrads, we acquire Cai _et
al._ (2016):
$\displaystyle
I^{\nu}{}_{\mu}={S_{\mu}}^{\rho\nu}\partial_{\rho}Tf_{TT}+\left[e^{-1}{e^{i}}_{\mu}\partial_{\rho}\left(e{e_{i}}^{\alpha}{S_{\alpha}}^{\rho\nu}\right)-{T^{\alpha}}_{\lambda\mu}{S_{\alpha}}^{\nu\lambda}\right]f_{T}-\frac{1}{4}f\delta^{\nu}_{\mu}+\frac{1}{2}\kappa{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{\nu}_{\mu}\equiv
0.$ (10)
Here, we show $f(T)$ as $f$, and we describe $f_{T}:=\frac{\partial
f(T)}{\partial T}$ and $f_{TT}:=\frac{\partial^{2}f(T)}{\partial T^{2}}$.
Moreover,
${{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{\nu}_{\mu}$
means the energy-momentum tensor of the power law-Maxwell field defined by
${{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{\nu}_{\mu}=s{\cal
F}_{\mu\alpha}{\cal F}^{\nu\alpha}{\cal
F}^{s-1}-\frac{1}{4}\delta_{\mu}{}^{\nu}{\cal F}^{s}\,,$ (11)
where ${\cal F}={\cal F}_{\mu\nu}{\cal F}^{\mu\nu}$.
Furthermore, the variation of Eq. (9) with respect to $\bm{Q_{\mu}}$, which is
the 1-form of the gauge potential, yields
$\displaystyle\partial_{\alpha}\left(\sqrt{-g}{\cal F}^{\mu\nu}{\cal
F}^{s-1}\right)=0\;.$ (12)
It follows from Eq. (12) clearly that when the power law $s=1$ the energy-
momentum tensor of Eq. (12) coincides with the linear form of Maxwell field
Nashed (2013). Eq. (12) determines the power law of Maxwell field in arbitrary
dimensions.
In addition, Eq. (10) can take the following form:
$\partial_{\nu}\Biggl{[}e{S}^{a\rho\nu}f_{T}\Biggr{]}=\kappa
e{e^{a}}_{\mu}\Biggl{[}t^{\rho\mu}+{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{\rho\mu}\Biggr{]},$
(13)
where $t^{\nu\mu}$ is the energy-momentum tensor of the gravitational
configuration, given by
$t^{\nu\mu}=\frac{1}{\kappa}\Biggl{[}4f_{T}{S^{\alpha}}^{\nu\lambda}{T_{\alpha\lambda}}^{\mu}-g^{\nu\mu}f\Biggr{]}.$
(14)
The anti-symmetry of the tensor ${S}^{a\nu\lambda}$ leads
$\partial_{\mu}\partial_{\nu}\left[e{S}^{a\mu\nu}f_{T}\right]=0,$ (15)
from which we have
$\partial_{\mu}\left[e\left(t^{a\mu}+{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{a\mu}\right)\right]=0.$
(16)
Hence, from Eq. (16) we find
$\frac{d}{dt}\int_{V}d^{(d-1)}x\ e\
{e^{a}}_{\mu}\left(t^{0\mu}+{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{0\mu}\right)+\oint_{\Sigma}\left[e\
{e^{a}}_{\mu}\
\left(t^{j\mu}+{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{j\mu}\right)\right]=0.$
(17)
Equation (17) denotes the conservation law of
${{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{\lambda\mu}$ as
well as the pseudo tensor $t^{\lambda\mu}$, which describes the energy-
momentum tensor of gravitation in $f(T)$ gravity Ulhoa and Spaniol (2013).
Thus, the energy-momentum tensor of $f(T)$ gravity in the ($d-1$)–dimensions
contained in the volume $V$ reads
$P^{a}=\int_{V}d^{(d-1)}x\ e\
{e^{a}}_{\mu}\left(t^{0\mu}+{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{0\mu}\right)=\frac{1}{\kappa}\int_{V}d^{(d-1)}x\partial_{\nu}\left[e{S}^{a0\nu}f_{T}\right],$
(18)
which corresponds to TEGR when $f(T)=T$ Maluf _et al._ (2002). The above
equation (18) is the conserved four-momentum equation for any configuration
that behaves as a flat spacetime. In this research, we derived a class of BH
solutions, which behaves asymptotically as an AdS spacetime. Therefore, it was
necessary to conduct the calculations of the conserved quantities concerning a
pure AdS/dS space to avoid the conserved quantities having infinite value
because the asymptotic behavior of the solutions of BH is similar to that of
AdS. With the difference of the energy of the pure AdS BH solution from that
of the AdS space, the total energy of the AdS BH could be found. Hence, for
the calculation of the conserved quantities, we subtract the effects of the
AdS space, which we describe by using the subscription “$r$” to regularized
value. From Eq. (17), we get
$\frac{d}{dt}\int_{V}d^{(d-1)}x\ e\
{e^{a}}_{\mu}\left(t_{r}^{0\mu}+{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{0\mu}\right)+\oint_{\Sigma}\left[e\
{e^{a}}_{\mu}\
\left(t_{r}^{j\mu}+{{{{\mathrm{T}}_{r}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}}{}^{j\mu}\right)\right]=0.$
(19)
Thus Eq. (19) is the regularized conservation law of any spacetime that
behaves as (A)dS.
## III New Anti-de-Sitter solutions of black holes in power law
Maxwell-$f(T)$ gravity
In this section, we will derive the AdS charged BH solutions in $d$–dimensions
for the power-law Maxwell-$f(T)$-gravity. For this aim, we will use the flat
transverse sections in the $d$–dimensions ($t$, $r$, $\theta_{1}$,
$\theta_{2}$, $\cdots$, $\theta_{i}$, $z_{1}$, $z_{2}$ $\cdots$ $z_{k}$),
where $k=1,2\cdots$ $d-i-2$, $0\leq r<\infty$, $-\infty<t<\infty$,
$0\leq\theta_{i}<2\pi$, $-\infty<z_{k}<\infty$, with the following vielbein
form Capozziello _et al._ (2013); Awad _et al._ (2017):
$\left({e^{i}}_{\mu}\right)=\left(\sqrt{N(r)},\;\frac{1}{\sqrt{N(r)g(r)}},\;r,\;r,\;r\;\cdots\right)$.
---
(20)
Here, $t$ and $r$ are time and the radial coordinate, respectively. The metric
associated of the vielbein in Eq. (20) assumes the following form:
$ds^{2}=N(r)dt^{2}-\frac{1}{N(r)g(r)}dr^{2}-r^{2}\left(\sum_{i=1}^{n}d\theta^{2}_{i}+\sum_{k=1}^{d-n-2}dz_{k}^{2}\right),$
(21)
with $N(r)$ and $g(r)$ two unknown functions $r$111In 4-dimension the metric
(21) yields
$ds^{2}=N(r)dt^{2}-\frac{1}{N(r)g(r)}dr^{2}-r^{2}\gamma_{ij}dx^{i}dx^{j}\,.$
where $\gamma_{ij}dx^{i}dx^{j}$ represents the line element of a two-
dimensional surface with constant curvature $k=-1,0,1$, and the indices
$(i,j)=1,2$. The well-known solutions of GR, such as the Schwarzschild and the
Reissner-Nordstr¨om geometries, correspond to spherical horizon structure
where $k=1$. In this work, however, we shall consider solutions with a flat
horizon structure where $k=0.$. By combining the tetrad in Eq. (20) into the
scalar torsion $T$ in Eq. (6), we obtain
$T=\frac{(d-2)g}{r}\Big{[}N^{\prime}+\frac{(d-3)N}{r}\Big{]},$ (22)
where $N^{\prime}=\frac{dN(r)}{dr}$ and $g^{\prime}=\frac{dg(r)}{dr}$. In the
following, we omit the arguments of $N(r)$, $g(r)$, $N^{\prime}(r)$ and
$g^{\prime}(r)$. Owing to the success of the power-law form of $(T)$ to
describe cosmology Nesseris _et al._ (2013); Nunes _et al._ (2016);
Basilakos _et al._ (2018), we focus on the quadratic form
$f(T)=T_{0}+\alpha T-\beta T^{2},$ (23)
where $T_{0}$, $\alpha$ and $\beta$ are constants.
### III.1 Asymptotically static AdS BHs with the power-law Maxwell field
Regarding the vanishing of the electromagnetic sector, i.e.,
${{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{\nu}_{\mu}=0$,
the results are identical to those obtained in Ref. Capozziello _et al._
(2013); Awad _et al._ (2017); Nashed and Saridakis (2018). However, novel
results can be found for the non-vanishing of the electromagnetic field, and
this could be explained by the tetrads in Eq. (20) in the field equations (10)
and (12) by utilizing the vector potential 1-form222Through out the rest of
this study we will put $\kappa=1$..
$Q(r)=\phi(r)dt.$ (24)
The non-zero components of the field equations read
$\displaystyle I^{r}{}_{r}=2Tf_{T}-f-(2s-1)\Big{\\{}-2\phi^{\prime
2}g(r)\Big{\\}}^{s}=0,$ $\displaystyle
I^{z_{1}}{}_{z_{1}}=I^{z_{2}}{}_{z_{2}}=\cdots\cdots=I^{z_{d-n-2}}{}_{z_{d-n-2}}=\frac{f_{TT}[r^{2}T+(d-2)(d-3)N]gT^{\prime}}{r(d-2)}+\frac{f_{T}}{2r^{2}}\Biggl{\\{}2r^{2}gN^{\prime\prime}+2(3d-8)rgN^{\prime}$
$\displaystyle+4(d-3)^{2}Ng+2(d-3)rNg^{\prime}+r^{2}N^{\prime}g^{\prime}\Biggr{\\}}-f+\Big{\\{}-2\phi^{\prime
2}g(r)\Big{\\}}^{s}=0,$ $\displaystyle
I^{t}{}_{t}=\frac{2(d-2)Ngf_{TT}T^{\prime}}{r}+\frac{(d-2)f_{T}[2\\{(d-3)Ng+rgN^{\prime}\\}+rNg^{\prime}]}{r^{2}}-f-(2s-1)\Big{\\{}-2\phi^{\prime
2}g(r)\Big{\\}}^{s}=0,$
where $\phi^{\prime}=\frac{d\phi}{dr}$. Various observations including the
followings are extracted from Eq. (III.1):
(i)-Equation (III.1) is reduced to those derived in Awad _et al._ (2017) for
$s=1$.
(ii)-When $s=1/2$, the above system does not yield any solution because the
charged terms of Eq. (III.1) are imaginary. Hence, the case (ii) is excluded
in this study.
To derive an exact and well-behaved physical solution for the above system, we
considered $T_{0}=-\frac{1}{12\beta}$ and $\alpha=1$ and assumed that $s$
possessed odd values. Other factors prevented the good behavior of the
solution and imparted it with an imaginary value. By employing the pervious
constraints, we acquire the following general solution of the above
differential equations in $d$-dimensions
$\displaystyle
N(r)=\frac{r^{2}}{6(d-1)(d-2)\beta}+\frac{c_{1}}{r^{d-3}}+\frac{3\;2{{}^{{}^{s}}}(2s-1)^{2}c_{2}{}^{2s}}{2(d-2)(2s+1-d)r^{\frac{2[1+(d-4)s]}{2s-1}}}+\frac{2^{{}^{\frac{3s-1}{2}}}(2s-1)^{\frac{5}{2}}c_{2}{}^{3s}\sqrt{6\beta}}{(d-2)[(d-1)+(d-4)s]r^{\frac{[2+(3d-10)s]}{2s-1}}},$
$\displaystyle
g(r)=\frac{1}{\Bigg{[}c_{2}{}^{s}\sqrt{\frac{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)}{r^{{}^{\frac{2s(d-2)}{2s-1}}}}}+1\Bigg{]}^{2}},\qquad\qquad{\cal
F}_{tr}=\frac{c_{2}}{r^{{}^{\frac{(d-2)}{2s-1}}}}+\frac{c_{2}{}^{s+1}\sqrt{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)}}{{r^{{}^{\frac{(s+1)(d-2)}{2s-1}}}}},$
$\displaystyle\phi(r)=\frac{c_{2}(2s-1)}{(d-1-2s){r^{{}^{\frac{(d-1-2s)}{2s-1}}}}}+\frac{c_{2}{}^{s+1}\sqrt{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)^{5/2}}}{{[d-1+s(d-4)]r^{{}^{\frac{[d-1+s(d-4)]}{2s-1}}}}},$
(26)
where $s$ takes a odd value, ${\cal F}_{tr}$ is the electric field, and
$\phi(r)$ is the gauge potential 1-form. Equation (III.1) clearly expresses
that $s$ must not be equal to half ($s\neq 1/2$). Additionally, Eq. (III.1) is
a generalization of the one presented in Awad _et al._ (2017) and is reduced
to them at $s=1$. For an asymptotic AdS/dS spacetime, we have
$\Lambda_{\mathrm{eff}}=\frac{1}{6(d-1)(d-2)\beta}.$ (27)
Equation (27) ensures that black hole solution (III.1) has no corresponding in
TEGR upon taking the limit $\beta\rightarrow 0$, which means this charged
black hole solution has no analogue in GR or TEGR.
By combining Eqs. (III.1) and (27), we get
$\displaystyle
N(r)=\Lambda_{\mathrm{eff}}r^{2}-\frac{m}{r^{d-3}}+\frac{3\;2{{}^{{}^{s}}}(2s-1)^{2}q^{2s}}{2(d-2)(2s+1-d)r^{\frac{2[1+(d-4)s]}{2s-1}}}+\frac{2^{{}^{\frac{3s-1}{2}}}(2s-1)^{\frac{5}{2}}q^{3s}\sqrt{6\beta}}{(d-2)[(d-1)+(d-4)s]r^{\frac{[2+(3d-10)s]}{2s-1}}},$
(28) $\displaystyle
g(r)=\frac{1}{\Bigg{[}q{}^{s}\sqrt{\frac{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)}{r^{{}^{\frac{2s(d-2)}{2s-1}}}}}+1\Bigg{]}^{2}},\qquad\qquad{\cal
F}_{tr}=\frac{q}{r^{{}^{\frac{(d-2)}{2s-1}}}}+\frac{q{}^{s+1}\sqrt{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)}}{{r^{{}^{\frac{(s+1)(d-2)}{2s-1}}}}},$
$\displaystyle\phi(r)=\frac{q(2s-1)}{(d-1-2s){r^{{}^{\frac{(d-1-2s)}{2s-1}}}}}+\frac{q{}^{s+1}\sqrt{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)^{5/2}}}{{[d-1+s(d-4)]r^{{}^{\frac{[d-1+s(d-4)]}{2s-1}}}}},$
where $c_{1}=-m$, and $c_{2}=q$. It follows from Eq. (28) that a kind of
cosmological constant can appear in $f(T)$ gravity Iorio and Saridakis (2012);
Kofinas _et al._ (2015). Moreover, it is seen from Eq. (28) that
$s\leq\frac{d-1}{2}$ so that the monopole term, first term of $\phi(r)$ in Eq.
(28), could exhibit finite behavior. However, the second term of $\phi(r)$ in
Eq. (28) is always finite at $r\rightarrow 0$.
To discuss some of the physical properties of the aforementioned BH solution,
we substituted Eq. (28) into Eq. (21) and obtained the metric spacetime in the
following form:
$\displaystyle\\!\\!\\!\\!\\!\\!\\!ds{}^{2}=\Biggl{[}\Lambda_{eff}r^{2}-\frac{m}{r^{d-3}}+\frac{3\;2{{}^{{}^{s}}}(2s-1)^{2}q^{2s}}{2(d-2)(2s+1-d)r^{\beta_{1}}}+\frac{2^{{}^{\frac{3s-1}{2}}}(2s-1)^{\frac{5}{2}}q^{3s}\sqrt{6\beta}}{(d-2)[(d-1)+(d-4)s]r^{\beta_{2}}}\Biggr{]}dt^{2}-r^{2}\left(\sum_{i=1}^{n}d\theta^{2}_{i}+\sum_{k=1}^{d-n-2}dz_{k}^{2}\right)$
$\displaystyle\ \ \
-\frac{\\!dr^{2}}{\Biggl{[}\Lambda_{eff}r^{2}-\frac{m}{r^{d-3}}+\frac{3\;2{{}^{{}^{s}}}(2s-1)^{2}q^{2s}}{2(d-2)(2s+1-d)r^{\beta_{1}}}+\frac{2^{{}^{\frac{3s-1}{2}}}(2s-1)^{\frac{5}{2}}q^{3s}\sqrt{6\beta}}{(d-2)[(d-1)+(d-4)s]r^{\beta_{2}}}\Biggr{]}\Bigg{[}q{}^{s}\sqrt{\frac{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)}{r^{\beta_{3}}}}+1\Bigg{]}^{2}},\\!$
(29)
where $\beta_{1}=\frac{2[1+(d-4)s]}{2s-1}$,
$\beta_{2}=\frac{[2+(3d-10)s]}{2s-1}$ and $\beta_{3}={\frac{2s(d-2)}{2s-1}}$.
As expected, we have obtained a solution, which behaves asymptotically as
(A)dS dS according to the sign of the dimensional parameter $\beta$ because
the constants $\beta_{1}$, $\beta_{2}$ $\beta_{3}$ are always positive.
Additionally, Eq. (28) is a generalization of the ones derived in Ref.
Capozziello _et al._ (2013); Awad _et al._ (2017), owing to the application
of a more general power-law Maxwell-$f(T)$-gravity.
Furthermore, we investigate the singularity structure of the BH solution in
Eq. (28),by calculating the curvature and torsion invariants. The curvature
scalars were calculated from the metric in Eq. (III.1, whereas the torsion
scalar was calculated employing the vierbeins in Eq. (20). By calculating the
Ricci scalar, the Ricci tensor square, and the Kretschmann scalar, we find
$\displaystyle
R\approx\frac{C_{1}(r)}{\sqrt{\beta}r^{{}^{\frac{{{s(d-2)}}}{2s-1}}}},\qquad
R^{\mu\nu}R_{\mu\nu}\approx\frac{C_{2}(r)}{\sqrt{\beta}r^{{}^{\frac{{{2s(d-2)}}}{2s-1}}}},\qquad
K\approx
R^{\mu\nu\lambda\rho}R_{\mu\nu\lambda\rho}\approx\frac{C_{3}(r)}{\sqrt{\beta}r^{{}^{\frac{{{2s(d-2)}}}{2s-1}}}},$
(30)
and the torsion scalar exhibited the following form:
$\displaystyle
T(r)\approx\frac{C_{4}(r)}{\sqrt{\beta}r^{{}^{\frac{{{s(d-2)}}}{2s-1}}}},$
(31)
where $C_{i}(r)$ is the lengthy polynomial function of $r$. The foregoing
invariants clearly indicate that there is singularity at $r=0$. At
$limit_{r=0}$, , the above invariants exhibited the following form
$(K,R_{\mu\nu}R^{\mu\nu})\sim r^{{}^{\frac{{{-2s(d-2)}}}{2s-1}}}$ and
$(R,T)\sim r^{{}^{\frac{{{-s(d-2)}}}{2s-1}}}$ (dissimilar to the BH solutions
that were derived from the linear Maxwell-$f(T)$ in which
$(K,R_{\mu\nu}R^{\mu\nu})\sim r^{{}^{{{{-2(d-2)}}}}}$ and $(R,T)\sim
r^{{}^{{{{-(d-2)}}}}}$. the asymptotic behaviors of the curvature and torsion
invariants of the solution (Eq. 28) ) were different from those of the BH
solution that were derived from the Einstein-Max- ell theory in the GR and
TEGR formulations, which behaved as $(K,R_{\mu\nu}R^{\mu\nu})\sim r^{-2d}$ and
$(R,T)\sim r^{-d}$. This clearly indicated that the singularity of the charged
BH solution (28) was softer than that, which was obtained in the linear
Maxwell-$f(T)$ and much softer than those of GR and TEGR for the charged case.
Finally, it is noteworthy that although the solution (28) possessed different
components, $g_{tt}$ and $g_{rr}$, its Killing vector and event horizons were
equal.
To investigate the horizons of the solution (28), it was necessary to
calculate the roots of the function $N(r)=0$. We plotted the function $N(r)$
versus the radial coordinate, $r$, in four and five dimensions for the various
values of the model parameters, as depicted in figure 1.
(a) The $N(r)$ in 4-dim.
(b) The $N(r)$ in 5-dim.
Figure 1: The function $N(r)$ of solution (28) of power law Maxwell-$f(T)$
gravity in four and five dimensions, for various values of the power law
parameter $s$. The term $r_{h}$ denotes the black hole of inner Cauchy
horizon.
Furthermore, the aforementioned properties of the BH solution were explained
differently by expressing the horizon mass–radius, $m_{h}$, of $m$ which
corresponds to $r_{h}$, that representing the global properties of a horizon
as obtained by setting $N(r_{h})=0$, namely
${m_{h}}=\frac{r_{h}^{(d-3)}\left(36\beta(2s-1)^{2}q^{2s}2^{s}\mathrm{A}+(d-1-2s)\Big{[}24\;2^{s}\beta
q^{3s}(2s-1)^{5/2}\sqrt{6\beta}\;r_{h}{}^{\frac{-(d-2)s}{2s-1}}-r_{h}{}^{\frac{2[2+(d-4)s]}{2s-1}}(d-2)\mathrm{A}\Big{]}\right)}{24r_{h}{}^{\frac{2[1+(d-4)s]}{2s-1}}\beta(d-2)(d-1-2s)\mathrm{A}},$
(32)
where $\mathrm{A}=(1+s)d-1-4s$. Noteworthily, at $s=1$ and $d=4$ we obtained
$m_{h}$ of the BH solutions that were derived in Awad _et al._ (2017).
(a) The value $m_{h}$ of the parameter $m$ in 4-dim.
(b) The value $m_{h}$ of the parameter $m$ in 5-dim.
Figure 2: The value $m_{h}$ of the parameter $m$ that corresponds to the
horizon $r_{h}$, of solution (28) of power law Maxwell-$f(T)$ gravity in four
and five dimensions, for various values of the power law parameter $s$.
Eq. (32) is plotted in Fig. 2 when $d=4$ and $d=5$.
### III.2 Energy of the black hole (28)
In this subsection, the energy of the BH solution (28) was calculated from Eq.
(18), and the necessary component of the super-potential $S^{\mu\nu\rho}$ of
the BH solution (28) is given as follows:
$S^{001}=\frac{g(r)}{r},$ (33)
where $g(r)$ is expressed by Eq. (28). The regularized expression of Eq. (19)
takes the following form:
$P^{a}:=\int_{V}d^{d-2}x\left[e{S}^{a00}f_{T}\right]-\int_{V}d^{d-2}x\left[e{S}^{a00}f_{T}\right]_{AdS/dS},$
(34)
where AdS/dS means calculations for pure AdS/dS space. Using Eq. (34) in
solution (28), we get
$\displaystyle
E=\frac{(d-2)m}{2}+\frac{2(d-3)^{2}(2s-1)2^{s-2}3^{s-1}q^{2s}}{(2s-3)r^{\frac{[d-1-2s]}{2s-1}}}+\frac{2^{s+1}(3s-1)(2s-1)(d-3)^{4}\sqrt{3(2s-1)\beta}q^{3s}}{3(2s-3)r^{\frac{(2d-5)}{2s-1}}}+\cdots\,.$
(35)
Eq. (35) indicates that the modification of $f(T)$ did not affect the mass
term of the energy of standard TEGR Maluf _et al._ (2002); Maluf (1995),
although it affected the charge terms. The charge terms would aid the
calculation of energy starting from
${\mathcal{O}}\Bigg{(}\frac{1}{r}\Bigg{)}$, contrary to Reissner-Nordström
spacetime. This difference is due to the contribution of the function $g(r)$
given in Eq. (28). Moreover, as already stated, $s$ must satisfy
$s\leq\frac{d-1}{2}$ so that the second term in Eq. (35) could be finite at
$r\rightarrow 0$.
## IV Rotating BHs in the power law Maxwell-$f(T)$ gravity
Further, the rotating BH solutions were derived to satisfy the field equations
of the power-law $f(T)$ gravity. Thus, we utilized the static BH solutions
that were derived in the previous section and applied the following
transformations with $n$-rotation parameters, as follows:
$\bar{\theta}_{i}=-\aleph~{}{\theta_{i}}+\frac{\omega_{i}}{\lambda^{2}}~{}t,\qquad\qquad\qquad\bar{t}=\Omega~{}t-\sum\limits_{i=1}^{n}\omega_{i}~{}\theta_{i},$
(36)
where $\omega_{i}$ are the rotation parameters (their number is
$n=\lfloor(d-1)/2\rfloor$ where $\lfloor...\rfloor$ represents the integer
part), and $\lambda$ is related to the parameter $\Lambda_{eff}$ of the static
solution (28) through Eq. (37):
$\displaystyle\lambda=-\frac{(d-2)(d-1)}{2\Lambda_{eff}}.$ (37)
Additionally, the parameter $\Omega$ is defined as follows:
$\Omega:=\sqrt{1-\sum\limits_{j=1}^{{n}}\frac{\omega_{j}{}^{2}}{\lambda^{2}}}.$
Applying the transformation (36) to the vielbeins (20) we obtained the
following equation:
$\displaystyle\left({e^{i}}_{\mu}\right)=\left(\begin{array}[]{cccccccccccccc}\Omega\sqrt{N(r)}&0&-\omega_{1}\sqrt{N(r)}&-\omega_{2}\sqrt{N(r)}\cdots&-\omega_{n}\sqrt{N(r)}&0&0&\cdots&0\\\\[5.0pt]
0&\frac{1}{\sqrt{N(r)g(r)}}&0&0\cdots&0&0&0&\cdots&0\\\\[5.0pt]
\frac{\omega_{1}r}{\lambda^{2}}&0&-\Omega r&0\cdots&0&0&0&\cdots&0\\\\[5.0pt]
\frac{a_{2}r}{\lambda^{2}}&0&0&-\Omega r\cdots&0&0&0&\cdots&0\\\\[5.0pt]
\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\cdots&\vdots\\\\[5.0pt]
\frac{\omega_{n}\;r}{\lambda^{2}}&0&0&0\cdots&-\Omega
r&0&0&\cdots&0\\\\[5.0pt] 0&0&0&0\cdots&0&r&0&\cdots&0\\\\[5.0pt]
0&0&0&0\cdots&0&0&r&\cdots&0\\\\[5.0pt] 0&0&0&0\cdots&0&0&0&\cdots&r\\\
\end{array}\right),$ (47)
where $N(r)$ and $g(r)$ are given by Eq. (28). Hence, for the electromagnetic
potential (24), we obtained the following form:
$\bar{\phi}(r)=-\phi(r)\left[\sum\limits_{j=1}^{n}\omega_{j}d\theta^{\prime}_{j}-\Omega
dt^{\prime}\right].$ (49)
Notably, although the transformation (36) did not alter the local properties
of the spacetime, it changed them globally, as reported in Lemos (1995), since
it mixed the compact and noncompact coordinates. Thus, the vielbeins, (20) and
(47) could only be locally mapped into each other Lemos (1995); Awad (2003).
The metric, which corresponds to the vielbein, (47) is written as follows:
$\displaystyle ds^{2}=N(r)\left[\Omega
d{t^{\prime}}-\sum\limits_{i=1}^{n}\omega_{i}d{z}^{\prime}\right]^{2}-\frac{dr^{2}}{N(r)g(r)}-\frac{r^{2}}{\lambda^{2}}\sum\limits_{i=1}^{n}\left[\omega_{i}d{t}^{\prime}+\Omega\lambda^{2}d{\theta}^{\prime}_{i}\right]^{2}-\sum\limits_{k=1}^{d-n-2}r^{2}dz_{k}^{2}-\frac{r^{2}}{\lambda^{2}}\sum\limits_{i<j}^{n}\left(\omega_{i}d{\theta}^{\prime}_{j}-\omega_{j}d{\theta}^{\prime}_{i}\right)^{2},$
where $0\leq r<\infty$, $-\infty<t<\infty$, $0\leq\theta_{i}<2\pi$,
$i=1,2\cdots n$ and $-\infty<z_{k}<\infty$, where $dz_{k}^{2}$ is the
Euclidean metric on $(d-2)$ dimensions with $k=1,,2\cdots d-3$. As mentioned
earlier, the static configuration (21) could be recovered as a special case of
the aforementioned general metric if we choose to vanish the rotation
parameters $\omega_{j}$.
Finally, following the procedure in subsection III.2 , the energy of the
rotating charged AdS BH (LABEL:m1), as calculated as follows:
$E=\frac{(d-2)[1+2(d-1)(d-2)\Lambda_{eff}\beta][\Lambda_{eff}{}^{2}\omega_{j}\sum\limits_{j=1}^{{n}}\omega_{j}+3\Omega^{2}]m}{12(d-3)G_{d}}+\cdots.$
(51)
Equation (51) is the energy of spacetime (47) which contains the rotation
parameters $\omega_{j}$ and when these parameters are vanishing we get the
value of energy given by Eq. (35) provided the use of Eq. (27).
## V Thermodynamics of the derived black holes
To study different thermodynamical properties Hunter (1999); Hawking _et al._
(1999); Bekenstein (1972, 1973); Gibbons and Hawking (1977) of BH solution
(28) we start by defining the Bekenstein–Hawking entropy of $f(T)$ as reported
in Karami and Abdolmaleki (2012); Bamba _et al._ (2012); Nashed (2015a, b)
$S(r_{h})=\frac{1}{4}Af_{T}=\pi r_{h}{}^{2}(1-2\beta T),$ (52)
where $A$ is the area of the event horizon and $T$ is the scalar torsion,
which is given by Eq. (31). We plotted the entropy relation in Fig. 3 for
$d=4$ and $d=5$. The figure 3 2(a) revealed that we obtained a negative
entropy in the region when $r<r_{dg}$. At $r>r_{dg}$, we obtained a positive
value. Eq. (52) revealed that the entropy was not proportional to the area
because of the appearance of $\beta$. However, when $d=5$ we always obtain a
positive entropy as 3 2(b) shows. The heat capacity, $C_{h}$ which is valuable
for examining the stability of BH, was defined thermodynamically according to
its sign. $C_{h}$ is defined as reported in Nouicer (2007); Dymnikova and
Korpusik (2011); Chamblin _et al._ (1999); Nashed _et al._ (2018)
$C_{h}=\frac{\partial m}{\partial T}\equiv\frac{\partial m}{\partial
r_{h}}\left(\frac{\partial r_{h}}{\partial T}\right).$ (53)
Therefore, if the heat capacity is is positive, $C_{h}>0$, BH would
thermodynamically stable. Conversely, at ($C_{h}<0$), BH would be
thermodynamically unstable.
To calculate Eq. (53) we calculate the mass of BH mass in $r_{h}$ as obtained
in Eq. (32). The Hawking temperature of BHs can be defined as reported in
Hawking (1975)
$T=\frac{\kappa}{2\pi},\qquad\textmd{where}\quad\kappa\quad\textmd{ is the
surface gravity which is defined as,
}\qquad\qquad\kappa=\frac{N^{\prime}(r_{h})}{2}.$ (54)
The Hawking temperatures which is associated with the BH solution (28), is
expressed as follows:
$T_{h}=\frac{(d-1)(d-2)r_{h}{}^{2}-24\;2^{s}(2s-1)q^{3s}\beta\sqrt{2^{s}\;(-1)^{{}^{s+1}}\;3\;\beta(2s-1)}\;r^{-\beta_{2}}-36\beta
q^{2s}(2s-1)2^{s}\;r^{-\beta_{1}}}{96r_{h}\beta(d-2)},$ (55)
where ${T_{h}}$ is the Hawking temperature at the inner horizon. We plotted
$T_{h}$ in Fig. 4 for $d=4$ and $d=5$.
(a) The value of the entropy, $S_{h}$ in 4-dim.
(b) The value of the entropy, $S_{h}$ in 5-dim.
Figure 3: The value of the entropy, $S_{h}$, that corresponds to the horizon
$r_{h}$, of solution (28) of power law Maxwell-$f(T)$ gravity in four and five
dimensions, for various values of the power law parameter $s$.
(a) The value of the Hawking temperature, $T_{h}$ in 4-dim.
(b) The value of the Hawking temperature, $T_{h}$ in 5-dim.
Figure 4: The value of the Hawking temperature, $T_{h}$, that corresponds to
the horizon $r_{h}$, of solution (28) of power law Maxwell-$f(T)$ gravity in
four and five dimensions, for various values of the power law parameter $s$.
Further, we calculated $C_{h}$ after substituting Eq. (32) and (55) into (53)
as follows:
$\displaystyle
C_{h}=\Big{(}\frac{4\pi\sqrt{2s-1}r_{h}{}^{d-2}}{A(24\;2^{s}\;q^{3s}\;(2s-1)\sqrt{2^{s}\;(-1)^{{}^{s+1}}\;3\;\beta}(1+3sd-8s)\beta
r_{h}{}^{-\beta_{2}}+\sqrt{2s-1}\\{r_{h}{}^{2}(d-1)(d-2)-36\;q^{2s}\;2^{s}\;\beta\;r_{h}{}^{-\beta_{1}}\\})}\Big{)}$
$\displaystyle\times\Big{(}24\;q^{3s}\;2^{s}\;\sqrt{2^{s}\;(-1)^{{}^{s+1}}\;3\;\beta(2s-1)}(2s-1)[(2+3sd-10s)-(2s-1)(d-3)]\beta\;r_{h}{}^{-\beta_{2}}$
$\displaystyle-A[r_{h}{}^{2}(d-1)(d-2)-36\;q^{2s}\;2^{s}\;(2s-1)\;\beta\;r_{h}{}^{-\beta_{1}}]\Big{)},$
(56)
It was challenging to extract any information from Eq. (V), therefore, we
plotted it in 4-dimension as illustrated in Fig. 5, for particular values of
the BH parameters. As figure 5 4(b) shows that we have always positive heat
which means a stable BH in 5-dimension.
(a) The value of the heat capacity, $C_{h}$ in 4-dim.
(b) The value of the heat capacity, $C_{h}$ in 5-dim.
Figure 5: The value of the heat capacity, $C_{h}$, that corresponds to the
horizon $r_{h}$, of solution (28) of power law Maxwell-$f(T)$ gravity in four
and five dimensions, for various values of the power law parameter $s$.
Although Fig. 5 indicates that $C_{h}$ of the linear case was always positive,
it was negative in the nonlinear case and diverged at some critical values,
$r_{h}<r_{min}$ a, thus exhibiting a positive value. These imply that BH of
the linear Maxwell–$f(T)$ exhibited local stability, whereas the nonlinear
case exhibited local stability only when $r_{h}>r_{min}$, otherwise, it did
not.
The free energy in the grand canonical ensemble, which is called the Gibbs
free energy, is defined as reported in Nashed _et al._ (2018):
$G(r_{h})=M(r_{h})-T(r_{h})S(r_{h}),$ (57)
where $M(r_{h})$, $T(r_{h})$ and $S(r_{h})$ are the mass of the BH, the
temperature and entropy at the event horizon, respectively. Inserting Eqs.
(32), (52) and (55) into (57) ) affords a lengthy expression. Here we just
demonstrated the behavior of the free energy in 4-dimension, as illustrated in
Fig. 6.
(a) The value of the free energy, $G_{h}$ in 4-dim.
(b) The value of the free energy, $G_{h}$ in 5-dim.
Figure 6: The value of the free energy, $G_{h}$, that corresponds to the
horizon $r_{h}$, of solution (28) of power law Maxwell-$f(T)$ gravity in four
and five dimensions, for various values of the power law parameter $s$.
Notably, when $d=4$, the linear Maxwell field had a positive value, followed
by a negative one in the range of $0.2<r<0.8$ and a positive one again
Altamirano _et al._ (2014). However, the nonlinear Maxwell field was always a
positive quantity, and this indicates that the nonlinear Maxwell field was
always locally stable. Same discussion can be applied for $d=5$ but in that
case the linear one has a positive value then a negative value in the range
$0.2<r<0.4$ and the always positive value.
## VI Conclusions and Discussions
We investigated the effect of the nonlinear power law of electrodynamics in
the context of the modified TEGR theory, $f(T)$-gravity. To do this, we
applied the flat horizon spacetime in a diverse dimension and applied it to a
specific form of $f(T)=T_{0}+\alpha T-\beta T^{2}$, where $T_{0}$ and $\alpha$
are constants and $\beta$ is a dimensional parameter. The obtained nonlinear
second-order differential equations were solved in an exact approach. The BH
solution of these differential equations was characterized by two integration
constants, in addition to the nonlinear parameter that describes the
nonlinearity of the Maxwell field equation. The two constants were explained
to represent the mass and charge of BH. This BH solution is a generalization
to that, which was presented in Awad _et al._ (2017) owing to the existence
of the nonlinear parameter. When it was equal to 1, we returned to BH that was
discussed in Awad _et al._ (2017).
To investigate the physical properties of this generalized BH, we calculated
the scalar invariants (the ones that are related to the curvature and those
that are related to the torsion) and demonstrated that the singularities of
this BH were much softer than those of Awad _et al._ (2017) owing to the
contribution of the nonlinear electromagnetic parameter. Moreover, we
demonstrated that the singularities of our BH were much milder than those of
GR BH. This result is considered to be the main merit of this study, in
addition to the fact that the calculations of the energy confirmed that $s$
affects the asymptotic behavior of the charged terms as shown in Eq. (35).
To explore our BH in detail, we applied a coordinate to create an exact
rotating BH with nonlinear electrodynamics in the $f(T)$ frame. The features
of this rotating BH are that it possessed $d$-dimensional rotating parameters,
and could easily return to the nonrotating BH if all the rotation parameters
were set to zero. Notably, all the features of the singularities of the
nonrotating BH were present in the rotating one.
Finally, we calculated some thermodynamic quantities of the nonrotating case
and revealed that the entropy was not proportional to the area. The entropy
was non-proportional to the area because our BH possessed a non-vanishing
value of $T$. Our calculations revealed that the entropy might have a negative
value when $r_{h}<r_{dg}$ otherwise, it would have a positive value. A
negative entropy has been obtained and explained Cvetic _et al._ (2002);
Nojiri _et al._ (2001); Nojiri and Odintsov (2002, 2017); Clunan _et al._
(2004); Nojiri _et al._ (2002). The entropy might be negative because the
dimensional parameter, $\alpha$, had entered an unpermitted phase.
Further, we computed the temperature of BH and demonstrated that its value was
negative. This value mainly accounts for the structure of ultracold BH Davies
(1977). The computations of the thermodynamics in the context of the
$f(T)$-gravity for a non-trivial BH, which possessed a non-vanishing value of
$T$, achieved a limit for validation. This statement required further study,
which would be conducted in another work.
### Acknowledgments
The authors acknowledge the anonymous referee for improving the presentation
of the manuscript. G.N. would like to thank TUSUR for visiting fellowship. The
work of KB has partially been supported by the JSPS KAKENHI Grant Number
JP21K03547.
## References
* Tangherlini (1963) F. R. Tangherlini, “Schwarzschild field inn dimensions and the dimensionality of space problem,” Il Nuovo Cimento 27, 636–651 (1963).
* Myers and Perry (1986) R. C. Myers and M. J. Perry, “Black holes in higher dimensional space-times,” Annals of Physics 172, 304–347 (1986).
* Fadeev _et al._ (1991) S B Fadeev, V D Ivashchuk, and V N Melnikov, “On charged black hole in multidimensional theory with ricci-flat internal spaces,” Chinese Physics Letters 8, 439 (1991).
* Dehghani and Hendi (2007) M. H. Dehghani and S. H. Hendi, “Thermodynamics of rotating black branes in Gauss-Bonnet-Born-Infeld gravity,” Int. J. Mod. Phys. D16, 1829–1843 (2007), arXiv:hep-th/0611087 [hep-th] .
* Dehghani _et al._ (2007) M. H. Dehghani, S. H. Hendi, A. Sheykhi, and H. Rastegar Sedehi, “Thermodynamics of rotating black branes in (n+1)-dimensional Einstein-Born-Infeld-dilaton gravity,” JCAP 0702, 020 (2007), arXiv:hep-th/0611288 [hep-th] .
* Dehghani _et al._ (2008) M. H. Dehghani, N. Alinejadi, and S. H. Hendi, “Topological Black Holes in Lovelock-Born-Infeld Gravity,” Phys. Rev. D77, 104025 (2008), arXiv:0802.2637 [hep-th] .
* Hendi (2010) S. H. Hendi, “Slowly Rotating Black Holes in Einstein-Generalized Maxwell Gravity,” Prog. Theor. Phys. 124, 493–502 (2010), arXiv:1008.0544 [hep-th] .
* Mignemi and Stewart (1993) S. Mignemi and N. R. Stewart, “Dilaton axion hair for slowly rotating Kerr black holes,” Phys. Lett. B298, 299–304 (1993), arXiv:hep-th/9206018 [hep-th] .
* El Hanafy and Nashed (2016) W. El Hanafy and G. G. L. Nashed, “Exact Teleparallel Gravity of Binary Black Holes,” Astrophys. Space Sci. 361, 68 (2016), arXiv:1507.07377 [gr-qc] .
* Volkov and Straumann (1997) Mikhail S. Volkov and Norbert Straumann, “Slowly rotating nonAbelian black holes,” Phys. Rev. Lett. 79, 1428–1431 (1997), arXiv:hep-th/9704026 [hep-th] .
* Ghosh and SenGupta (2007) Tanwi Ghosh and Soumitra SenGupta, “Slowly rotating dilaton black hole in anti-de Sitter spacetime,” Phys. Rev. D76, 087504 (2007), arXiv:0709.2754 [hep-th] .
* Kim and Cai (2008) Hyeong-Chan Kim and Rong-Gen Cai, “Slowly Rotating Charged Gauss-Bonnet Black holes in AdS Spaces,” Phys. Rev. D77, 024045 (2008), arXiv:0711.0885 [hep-th] .
* Sheykhi and Allahverdizadeh (2008) A. Sheykhi and M. Allahverdizadeh, “Higher dimensional slowly rotating dilaton black holes in AdS spacetime,” Phys. Rev. D78, 064073 (2008), arXiv:0809.1131 [gr-qc] .
* Hassaine and Martinez (2007) Mokhtar Hassaine and Cristian Martinez, “Higher-dimensional black holes with a conformally invariant Maxwell source,” Phys. Rev. D75, 027502 (2007), arXiv:hep-th/0701058 [hep-th] .
* Hassaine and Martinez (2008) Mokhtar Hassaine and Cristian Martinez, “Higher-dimensional charged black holes solutions with a nonlinear electrodynamics source,” Class. Quant. Grav. 25, 195023 (2008), arXiv:0803.2946 [hep-th] .
* Brans and Dicke (1961) C. Brans and R. H. Dicke, “Mach’s Principle and a Relativistic Theory of Gravitation,” Physical Review 124, 925–935 (1961).
* Dicke (1962) R. H. Dicke, “Mach’s Principle and Invariance under Transformation of Units,” Physical Review 125, 2163–2167 (1962).
* Lovelock (1971) D. Lovelock, “The Einstein Tensor and Its Generalizations,” Journal of Mathematical Physics 12, 498–501 (1971).
* Buchdahl (1970) H. A. Buchdahl, “Non-linear Lagrangians and cosmological theory,” mnras 150, 1 (1970).
* Sotiriou and Faraoni (2010) Thomas P. Sotiriou and Valerio Faraoni, “f(R) Theories Of Gravity,” Rev. Mod. Phys. 82, 451–497 (2010), arXiv:0805.1726 [gr-qc] .
* Nojiri _et al._ (2017) S. Nojiri, S. D. Odintsov, and V. K. Oikonomou, “Modified Gravity Theories on a Nutshell: Inflation, Bounce and Late-time Evolution,” Phys. Rept. 692, 1–104 (2017), arXiv:1705.11098 [gr-qc] .
* Cai _et al._ (2016) Yi-Fu Cai, Salvatore Capozziello, Mariafelicia De Laurentis, and Emmanuel N. Saridakis, “f(T) teleparallel gravity and cosmology,” Rept. Prog. Phys. 79, 106901 (2016), arXiv:1511.07586 [gr-qc] .
* Cembranos _et al._ (2012) J. A. R. Cembranos, A. de la Cruz-Dombriz, and B. Montes Nunez, “Gravitational collapse in f(R) theories,” JCAP 1204, 021 (2012), arXiv:1201.1289 [gr-qc] .
* Nojiri and Odintsov (2011) Shin’ichi Nojiri and Sergei D. Odintsov, “Unified cosmic history in modified gravity: from F(R) theory to Lorentz non-invariant models,” Phys. Rept. 505, 59–144 (2011), arXiv:1011.0544 [gr-qc] .
* Ferraro and Fiorini (2007) R. Ferraro and F. Fiorini, “Modified teleparallel gravity: Inflation without an inflaton,” Physical Review D 75, 084031 (2007), arXiv: gr-qc/0610067.
* Awad and Nashed (2017) Adel Awad and Gamal Nashed, “Generalized teleparallel cosmology and initial singularity crossing,” JCAP 02, 046 (2017), arXiv:1701.06899 [gr-qc] .
* Li _et al._ (2011) B. Li, T. P. Sotiriou, and J. D. Barrow, “$f(T)$ gravity and local Lorentz invariance,” Physical Review D 83, 064035 (2011), arXiv: gr-qc/1010.1041, arXiv:1010.1041 [gr-qc] .
* Nashed (2006) Gamal G. L. Nashed, “Charged axially symmetric solution, energy and angular momentum in tetrad theory of gravitation,” Int. J. Mod. Phys. A 21, 3181–3197 (2006), arXiv:gr-qc/0501002 .
* Nashed (2008) Gamal Gergess Lamee Nashed, “Charged Dilaton, Energy, Momentum and Angular-Momentum in Teleparallel Theory Equivalent to General Relativity,” Eur. Phys. J. C 54, 291–302 (2008), arXiv:0804.3285 [gr-qc] .
* Nashed (2010) Gamal G. L. Nashed, “Brane World black holes in Teleparallel Theory Equivalent to General Relativity and their Killing vectors, Energy, Momentum and Angular-Momentum,” Chin. Phys. B 19, 020401 (2010), arXiv:0910.5124 [gr-qc] .
* Nashed (2007a) Gamal Gergess Lamee Nashed, “Charged axially symmetric solution and energy in teleparallel theory equivalent to general relativity,” Eur. Phys. J. C 49, 851–857 (2007a), arXiv:0706.0260 [gr-qc] .
* Unzicker and Case (2005) A. Unzicker and T. Case, “Translation of Einstein’s Attempt of a Unified Field Theory with Teleparallelism,” arXiv Physics e-prints (2005), physics/0503046 .
* Nashed (2007b) Gamal G. L. Nashed, “Kerr-Newman Solution and Energy in Teleparallel Equivalent of Einstein Theory,” Mod. Phys. Lett. A 22, 1047–1056 (2007b), arXiv:gr-qc/0609096 .
* Maluf (1995) Jose W. Maluf, “Localization of energy in general relativity,” J. Math. Phys. 36, 4242–4247 (1995), arXiv:gr-qc/9504010 [gr-qc] .
* Maluf _et al._ (2002) J. W. Maluf, J. F. da Rocha-Neto, T. M. L. Toribio, and K. H. Castello-Branco, “Energy and angular momentum of the gravitational field in the teleparallel geometry,” Phys. Rev. D65, 124001 (2002), arXiv:gr-qc/0204035 [gr-qc] .
* Ferraro and Fiorini (2007) Rafael Ferraro and Franco Fiorini, “Modified teleparallel gravity: Inflation without inflaton,” Phys. Rev. D75, 084031 (2007), arXiv:gr-qc/0610067 [gr-qc] .
* Capozziello _et al._ (2015) Salvatore Capozziello, Orlando Luongo, and Emmanuel N. Saridakis, “Transition redshift in $f(T)$ cosmology and observational constraints,” Phys. Rev. D91, 124037 (2015), arXiv:1503.02832 [gr-qc] .
* Nashed (2002) Gamal G. L. Nashed, “Vacuum nonsingular black hole in tetrad theory of gravitation,” Nuovo Cim. B 117, 521–532 (2002), arXiv:gr-qc/0109017 .
* Iorio and Saridakis (2012) Lorenzo Iorio and Emmanuel N. Saridakis, “Solar system constraints on f(T) gravity,” Mon. Not. Roy. Astron. Soc. 427, 1555 (2012), arXiv:1203.5781 [gr-qc] .
* Gamal (2012) G. L. N. Gamal, “Spherically Symmetric Solutions on a Non-Trivial Frame in f(T) Theories of Gravity,” Chinese Physics Letters 29, 050402 (2012), arXiv:1111.0003 [physics.gen-ph] .
* Bamba _et al._ (2014) Kazuharu Bamba, Shin’ichi Nojiri, and Sergei D. Odintsov, “Trace-anomaly driven inflation in $f(T)$ gravity and in minimal massive bigravity,” Phys. Lett. B731, 257–264 (2014), arXiv:1401.7378 [gr-qc] .
* Bengochea and Ferraro (2009) Gabriel R. Bengochea and Rafael Ferraro, “Dark torsion as the cosmic speed-up,” Phys. Rev. D79, 124019 (2009), arXiv:0812.1205 [astro-ph] .
* Linder (2010) E. V. Linder, “Einstein’s other gravity and the acceleration of the Universe,” prd 81, 127301 (2010), arXiv:1005.3039 [astro-ph.CO] .
* Wu and Yu (2011) Puxun Wu and Hong Wei Yu, “$f(T)$ models with phantom divide line crossing,” Eur. Phys. J. C71, 1552 (2011), arXiv:1008.3669 [gr-qc] .
* Dent _et al._ (2011) J. B. Dent, S. Dutta, and E. N. Saridakis, “f(T) gravity mimicking dynamical dark energy. Background and perturbation analysis,” jcap 1, 009 (2011), arXiv:1010.2215 [astro-ph.CO] .
* Bamba _et al._ (2011) K. Bamba, C.-Q. Geng, C.-C. Lee, and L.-W. Luo, “Equation of state for dark energy in f(T) gravity,” jcap 1, 021 (2011), arXiv:1011.0508 .
* Bamba _et al._ (2010) K. Bamba, C.-Q. Geng, and C.-C. Lee, “Comment on “Einstein’s Other Gravity and the Acceleration of the Universe”,” arXiv e-prints (2010), arXiv:1008.4036 [astro-ph.CO] .
* Bamba _et al._ (2012) K. Bamba, R. Myrzakulov, S. Nojiri, and S. D. Odintsov, “Reconstruction of f(T) gravity: Rip cosmology, finite-time future singularities, and thermodynamics,” prd 85, 104036 (2012), arXiv:1202.4057 [gr-qc] .
* Aviles _et al._ (2013) Alejandro Aviles, Alessandro Bravetti, Salvatore Capozziello, and Orlando Luongo, “Cosmographic reconstruction of $f(\mathcal{T})$ cosmology,” Phys. Rev. D87, 064025 (2013), arXiv:1302.4871 [gr-qc] .
* Jamil _et al._ (2012) Mubasher Jamil, D. Momeni, and Ratbay Myrzakulov, “Stability of a non-minimally conformally coupled scalar field in F(T) cosmology,” Eur. Phys. J. C72, 2075 (2012), arXiv:1208.0025 [gr-qc] .
* Ferraro and Fiorini (2011a) Rafael Ferraro and Franco Fiorini, “Non trivial frames for f(T) theories of gravity and beyond,” Phys. Lett. B702, 75–80 (2011a), arXiv:1103.0824 [gr-qc] .
* Ferraro and Fiorini (2011b) Rafael Ferraro and Franco Fiorini, “Cosmological frames for theories with absolute parallelism,” _Proceedings, 8th Alexander Friedmann International Seminar on Gravitation and Cosmology: Rio de Janeiro, Brazil, May 30-June 3, 2011_ , Int. J. Mod. Phys. Conf. Ser. 3, 227–237 (2011b), arXiv:1106.6349 [gr-qc] .
* Sebastiani and Zerbini (2011) Lorenzo Sebastiani and Sergio Zerbini, “Static Spherically Symmetric Solutions in F(R) Gravity,” Eur. Phys. J. C71, 1591 (2011), arXiv:1012.5230 [gr-qc] .
* Salako _et al._ (2013) I. G. Salako, M. E. Rodrigues, A. V. Kpadonou, M. J. S. Houndjo, and J. Tossa, “$\Lambda$ CDM Model in $f(T)$ Gravity: Reconstruction, Thermodynamics and Stability,” JCAP 1311, 060 (2013), arXiv:1307.0730 [gr-qc] .
* Haghani _et al._ (2012) Zahra Haghani, Tiberiu Harko, Hamid Reza Sepangi, and Shahab Shahidi, “Weyl-Cartan-Weitzenboeck gravity as a generalization of teleparallel gravity,” JCAP 1210, 061 (2012), arXiv:1202.1879 [gr-qc] .
* Haghani _et al._ (2013) Zahra Haghani, Tiberiu Harko, Hamid Reza Sepangi, and Shahab Shahidi, “Weyl-Cartan-Weitzenböck gravity through Lagrange multiplier,” Phys. Rev. D88, 044024 (2013), arXiv:1307.2229 [gr-qc] .
* Bamba _et al._ (2013a) Kazuharu Bamba, Shin’ichi Nojiri, and Sergei D. Odintsov, “Effective $F(T)$ gravity from the higher-dimensional Kaluza-Klein and Randall-Sundrum theories,” Phys. Lett. B725, 368–371 (2013a), arXiv:1304.6191 [gr-qc] .
* Bamba _et al._ (2013b) Kazuharu Bamba, Jaume de Haro, and Sergei D. Odintsov, “Future Singularities and Teleparallelism in Loop Quantum Cosmology,” JCAP 1302, 008 (2013b), arXiv:1211.2968 [gr-qc] .
* Bamba (2011) Kazuharu Bamba, “Equation of State for Dark Energy in Modified Gravity Theories,” in _Proceedings, KMI Inauguration Conference on Quest for the Origin of Particles and the Universe (KMIIN): Nagoya, Japan, October 24-26, 2011_ (2011) pp. 73–79, arXiv:1202.4317 [gr-qc] .
* Bamba _et al._ (2013c) Kazuharu Bamba, Sergei D. Odintsov, and Diego Sáez-Gómez, “Conformal symmetry and accelerating cosmology in teleparallel gravity,” Phys. Rev. D88, 084042 (2013c), arXiv:1308.5789 [gr-qc] .
* Geng _et al._ (2011) Chao-Qiang Geng, Chung-Chi Lee, Emmanuel N. Saridakis, and Yi-Peng Wu, ““Teleparallel” dark energy,” Phys. Lett. B704, 384–387 (2011), arXiv:1109.1092 [hep-th] .
* Otalora (2013) G. Otalora, “Scaling attractors in interacting teleparallel dark energy,” JCAP 1307, 044 (2013), arXiv:1305.0474 [gr-qc] .
* Chattopadhyay and Pasqua (2013) S. Chattopadhyay and A. Pasqua, “Reconstruction of f( T) gravity from the Holographic Dark Energy,” apss 344, 269–274 (2013), arXiv:1211.2707 [physics.gen-ph] .
* Yang (2011) Rong-Jia Yang, “New types of $f(T)$ gravity,” Eur. Phys. J. C71, 1797 (2011), arXiv:1007.3571 [gr-qc] .
* Bamba _et al._ (2011) Kazuharu Bamba, Chao-Qiang Geng, Chung-Chi Lee, and Ling-Wei Luo, “Equation of state for dark energy in $f(T)$ gravity,” JCAP 1101, 021 (2011), arXiv:1011.0508 [astro-ph.CO] .
* Capozziello _et al._ (2011) S. Capozziello, V. F. Cardone, H. Farajollahi, and A. Ravanpak, “Cosmography in f(T)-gravity,” Phys. Rev. D84, 043527 (2011), arXiv:1108.2789 [astro-ph.CO] .
* Awad _et al._ (2018) A. Awad, W. El Hanafy, G. G. L. Nashed, S. D. Odintsov, and V. K. Oikonomou, “Constant-roll Inflation in $f(T)$ Teleparallel Gravity,” JCAP 07, 026 (2018), arXiv:1710.00682 [gr-qc] .
* Capozziello _et al._ (2011) S. Capozziello, V. F. Cardone, H. Farajollahi, and A. Ravanpak, “Cosmography in f(T) gravity,” prd 84, 043527 (2011), arXiv:1108.2789 [astro-ph.CO] .
* Geng _et al._ (2012) C.-Q. Geng, C.-C. Lee, and E. N. Saridakis, “Observational constraints on teleparallel dark energy,” jcap 1, 002 (2012), arXiv:1110.0913 [astro-ph.CO] .
* Farajollahi _et al._ (2012) H. Farajollahi, A. Ravanpak, and P. Wu, “Cosmic acceleration and phantom crossing in f( T)-gravity,” apss 338, 195–204 (2012), arXiv:1112.4700 [physics.gen-ph] .
* Cardone _et al._ (2012) V. F. Cardone, N. Radicella, and S. Camera, “Accelerating f(T) gravity models constrained by recent cosmological data,” prd 85, 124007 (2012), arXiv:1204.5294 .
* Bahamonde _et al._ (2015) Sebastian Bahamonde, Christian G. Böhmer, and Matthew Wright, “Modified teleparallel theories of gravity,” Phys. Rev. D92, 104042 (2015), arXiv:1508.05120 [gr-qc] .
* Capozziello _et al._ (2013) Salvatore Capozziello, P. A. Gonzalez, Emmanuel N. Saridakis, and Yerko Vasquez, “Exact charged black-hole solutions in D-dimensional $f(T)$ gravity: torsion vs curvature analysis,” JHEP 02, 039 (2013), arXiv:1210.1098 [hep-th] .
* Paliathanasis _et al._ (2014) A. Paliathanasis, S. Basilakos, E. N. Saridakis, S. Capozziello, K. Atazadeh, F. Darabi, and M. Tsamparlis, “New Schwarzschild-like solutions in $f(T)$ gravity through Noether symmetries,” Phys. Rev. , 104042 (2014), arXiv:1402.5935 [gr-qc] .
* Gonzalez _et al._ (2012) P. A. Gonzalez, Emmanuel N. Saridakis, and Yerko Vasquez, “Circularly symmetric solutions in three-dimensional Teleparallel, f(T) and Maxwell-f(T) gravity,” JHEP 07, 053 (2012), arXiv:1110.4024 [gr-qc] .
* Boehmer _et al._ (2012) Christian G. Boehmer, Tiberiu Harko, and Francisco S. N. Lobo, “Wormhole geometries in modified teleparralel gravity and the energy conditions,” Phys. Rev. D85, 044033 (2012), arXiv:1110.5756 [gr-qc] .
* Nashed (2013) Gamal G. L. Nashed, “Spherically symmetric charged-dS solution in $f(T)$ gravity theories,” Phys. Rev. D88, 104034 (2013), arXiv:1311.3131 [gr-qc] .
* Ruggiero and Radicella (2015) Matteo Luca Ruggiero and Ninfa Radicella, “Weak-Field Spherically Symmetric Solutions in $f(T)$ gravity,” Phys. Rev. D91, 104014 (2015), arXiv:1501.02198 [gr-qc] .
* Weitzenböck (1923) R. Weitzenböck, _Invariance Theorie_ (Gronin-gen, 1923).
* Nashed (2013) G. G. L. Nashed, “Spherically symmetric charged-dS solution in f(T) gravity theories,” Phys. Rev. D 88, 104034 (2013), arXiv:1311.3131 [gr-qc] .
* Ulhoa and Spaniol (2013) S. C. Ulhoa and E. P. Spaniol, “On the Gravitational Energy-Momentum Vector in f(T) Theories,” Int. J. Mod. Phys. D22, 1350069 (2013), arXiv:1303.3144 [gr-qc] .
* Awad _et al._ (2017) A. M. Awad, S. Capozziello, and G. G. L. Nashed, “$D$-dimensional charged Anti-de-Sitter black holes in $f(T)$ gravity,” JHEP 07, 136 (2017), arXiv:1706.01773 [gr-qc] .
* Nesseris _et al._ (2013) S. Nesseris, S. Basilakos, E. N. Saridakis, and L. Perivolaropoulos, “Viable $f(T)$ models are practically indistinguishable from $\Lambda$CDM,” Phys. Rev. D88, 103010 (2013), arXiv:1308.6142 [astro-ph.CO] .
* Nunes _et al._ (2016) Rafael C. Nunes, Supriya Pan, and Emmanuel N. Saridakis, “New observational constraints on f(T) gravity from cosmic chronometers,” JCAP 1608, 011 (2016), arXiv:1606.04359 [gr-qc] .
* Basilakos _et al._ (2018) S. Basilakos, S. Nesseris, F. K. Anagnostopoulos, and E. N. Saridakis, “Updated constraints on $f(T)$ models using direct and indirect measurements of the Hubble parameter,” JCAP 1808, 008 (2018), arXiv:1803.09278 [astro-ph.CO] .
* Nashed and Saridakis (2018) G. G. L. Nashed and E. N. Saridakis, “Rotating AdS black holes in Maxwell-$f(T)$ gravity,” arXiv e-prints (2018), arXiv:1811.03658 [gr-qc] .
* Kofinas _et al._ (2015) Georgios Kofinas, Eleftherios Papantonopoulos, and Emmanuel N. Saridakis, “Self-Gravitating Spherically Symmetric Solutions in Scalar-Torsion Theories,” Phys. Rev. D91, 104034 (2015), arXiv:1501.00365 [gr-qc] .
* Lemos (1995) J. P. S. Lemos, “Cylindrical black hole in general relativity,” Phys. Lett. B353, 46–51 (1995), arXiv:gr-qc/9404041 [gr-qc] .
* Awad (2003) Adel M. Awad, “Higher dimensional charged rotating solutions in (A)dS space-times,” Class. Quant. Grav. 20, 2827–2834 (2003), arXiv:hep-th/0209238 [hep-th] .
* Hunter (1999) C. J. Hunter, “The Action of instantons with nut charge,” Phys. Rev. , 024009 (1999), arXiv:gr-qc/9807010 [gr-qc] .
* Hawking _et al._ (1999) S. W. Hawking, C. J. Hunter, and Don N. Page, “Nut charge, anti-de Sitter space and entropy,” Phys. Rev. , 044033 (1999), arXiv:hep-th/9809035 [hep-th] .
* Bekenstein (1972) J. D. Bekenstein, “Black holes and the second law,” Lett. Nuovo Cim. 4, 737–740 (1972).
* Bekenstein (1973) Jacob D. Bekenstein, “Black holes and entropy,” Phys. Rev. , 2333–2346 (1973).
* Gibbons and Hawking (1977) G. W. Gibbons and S. W. Hawking, “Cosmological Event Horizons, Thermodynamics, and Particle Creation,” Phys. Rev. , 2738–2751 (1977).
* Karami and Abdolmaleki (2012) K. Karami and A. Abdolmaleki, “Generalized second law of thermodynamics in f(T)-gravity,” JCAP 1204, 007 (2012), arXiv:1201.2511 [gr-qc] .
* Bamba _et al._ (2012) Kazuharu Bamba, Ratbay Myrzakulov, Shin’ichi Nojiri, and Sergei D. Odintsov, “Reconstruction of $f(T)$ gravity: Rip cosmology, finite-time future singularities and thermodynamics,” Phys. Rev. D85, 104036 (2012), arXiv:1202.4057 [gr-qc] .
* Nashed (2015a) G. G. L. Nashed, “Kerr-NUT black hole thermodynamics in f(T) gravity theories,” European Physical Journal Plus 130, 124 (2015a).
* Nashed (2015b) G. G. L. Nashed, “Kerr-Newman-NUT Black Hole in f(T) Gravity Theory and Its Thermodynamical Quantities,” Journal of the Physical Society of Japan 84, 044006 (2015b).
* Nouicer (2007) Khireddine Nouicer, “Black holes thermodynamics to all order in the Planck length in extra dimensions,” Class. Quant. Grav. 24, 5917–5934 (2007), [Erratum: Class. Quant. Grav.24,6435(2007)], arXiv:0706.2749 [gr-qc] .
* Dymnikova and Korpusik (2011) Irina Dymnikova and Michał Korpusik, “Thermodynamics of regular cosmological black holes with the de sitter interior,” Entropy 13, 1967–1991 (2011).
* Chamblin _et al._ (1999) Andrew Chamblin, Roberto Emparan, Clifford V. Johnson, and Robert C. Myers, “Charged AdS black holes and catastrophic holography,” Phys. Rev. D60, 064018 (1999), arXiv:hep-th/9902170 [hep-th] .
* Nashed _et al._ (2018) G. G. L. Nashed, W. El Hanafy, and Kazuharu Bamba, “Charged rotating black holes coupled with nonlinear electrodynamics Maxwell field in the mimetic gravity,” (2018), arXiv:1809.02289 [gr-qc] .
* Hawking (1975) S. W. Hawking, “Particle Creation by Black Holes,” _Euclidean quantum gravity_ , Commun. Math. Phys. 43, 199–220 (1975), [,167(1975)].
* Altamirano _et al._ (2014) Natacha Altamirano, David Kubiznak, Robert B. Mann, and Zeinab Sherkatghanad, “Thermodynamics of rotating black holes and black rings: phase transitions and thermodynamic volume,” Galaxies 2, 89–159 (2014), arXiv:1401.2586 [hep-th] .
* Cvetic _et al._ (2002) Mirjam Cvetic, Shin’ichi Nojiri, and Sergei D. Odintsov, “Black hole thermodynamics and negative entropy in de Sitter and anti-de Sitter Einstein-Gauss-Bonnet gravity,” Nucl. Phys. B 628, 295–330 (2002), arXiv:hep-th/0112045 .
* Nojiri _et al._ (2001) Shin’ichi Nojiri, Sergei D. Odintsov, and Sachiko Ogushi, “Holographic entropy and brane FRW dynamics from AdS black hole in d5 higher derivative gravity,” Int. J. Mod. Phys. A 16, 5085 (2001), arXiv:hep-th/0105117 .
* Nojiri and Odintsov (2002) Shin’ichi Nojiri and Sergei D. Odintsov, “(Anti-) de Sitter black holes in higher derivative gravity and dual conformal field theories,” Phys. Rev. D 66, 044012 (2002), arXiv:hep-th/0204112 .
* Nojiri and Odintsov (2017) Shin’ichi Nojiri and S. D. Odintsov, “Regular multihorizon black holes in modified gravity with nonlinear electrodynamics,” Phys. Rev. D 96, 104008 (2017), arXiv:1708.05226 [hep-th] .
* Clunan _et al._ (2004) Tim Clunan, Simon F. Ross, and Douglas J. Smith, “On Gauss-Bonnet black hole entropy,” Class. Quant. Grav. 21, 3447–3458 (2004), arXiv:gr-qc/0402044 .
* Nojiri _et al._ (2002) Shin’ichi Nojiri, Sergei D. Odintsov, and Sachiko Ogushi, “Cosmological and black hole brane world universes in higher derivative gravity,” Phys. Rev. D 65, 023521 (2002), arXiv:hep-th/0108172 .
* Davies (1977) P. C. W. Davies, “Thermodynamics of Black Holes,” Proc. Roy. Soc. Lond. , 499–521 (1977).
| arxiv-papers | 2021-07-25T08:57:33 | 2024-09-04T03:07:21.479422 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "G.G.L. Nashed and K. Bamba",
"submitter": "Gamal G.L. Nashed",
"url": "https://arxiv.org/abs/2107.12776"
} |
2107.12777 | # Spectral properties of strongly correlated multi impurity models in the
Kondo insulator regime: Emergent coherence, metallic surface states and
quantum phase transitions
Fabian Eickhoff Frithjof B. Anders Fakultät Physik, Technische Universität
Dortmund, 44221 Dortmund, Germany
(July 27, 2021)
###### Abstract
We investigate the real-space spectral properties of strongly-correlated
multi-impurity arrays in the Kondo insulator regime. Employing a recently
developed mapping onto an effective correlated cluster problem makes the
problem accessible to the numerical renormalization group. The evolution of
the spectrum as function of cluster size and cluster site is studied. We
applied the extended Lieb-Mattis theorem to predict whether the spectral
function must vanish at the Fermi energy developing a true pseudo-gap or
whether the spectral function remains finite at $\omega=0$. Our numerical
renormalization group spectra confirm the predictions of the theorem and shows
a metallic behavior at the surface of a cluster prevailing in arbitrary
spatial dimensions. We present a conventional minimal extension of a particle-
hole symmetric Anderson lattice model at $U=0$ that leads to a gapped bulk
band but a surface band with mainly $f$-orbital character for weak and
moderate hybridization strength. The change in the site-dependent spectra upon
introducing a Kondo hole in the center of the cluster are presented as a
function of the hole-orbital energy. In particular the spectral signatures
across the Kosterlitz-Thouless type quantum phase transition from a singlet to
a local moment fixed point are discussed.
## I Introduction
Multi-impurity Anderson models (MIAM) [1, 2, 3, 4] and its Kondo model
counterparts have a long history in strongly correlated materials. The basic
properties of Heavy Fermions (HF) [3, 5] can be understood in terms of a
hybridized band picture responsible for the heavy Fermi-liquid (FL) [6]
emerging from the coupling between the light itinerant conduction electrons
and strongly localized and correlated $f$-orbitals. The discovery of
superconductivity [7] and competing magnetic order [3, 8] in such materials
has generated a large interest in this material class over the last 40 years.
One special incarnation of such a system are Kondo insulators, where a
correlation induced gap opens up [9, 10, 11]: The resistivity increases below
a characteristic temperature scale of the lattice, and the material crosses
over from a metal to an insulator with a very small band gap when lowering the
temperature. Triggered by the advent of topological insulators, such Kondo
insulators have again drawn a lot of experimental and theoretical interest.
Particular there is an active debate on whether SmB6 can be classified as
topological Kondo insulator [12, 13] or a trivial surface conductor [11].
Local density approximations [14] in combination with Gutzwiller methods [15]
strongly indicate a topological nature of SmB6, although the Kondo physics in
such materials cannot be addressed by those approaches. In topological
insulators [16] the protection of the Chern number enforces metallic edge
states. This single-particle band properties, induced by spin-orbit coupling,
inspired a lot of theoretical activity [17, 18, 19, 20] to address the
experimental findings of a metallic surface state [12, 13, 11] in Kondo
insulators by converting the conventional Kondo lattice or periodic Anderson
model (PAM) with a spin-orbit coupling term into a topological Kondo insulator
in which a metallic surface emerges naturally from topological constrains.
In this paper, we present site-dependent spectral functions of a MIAM
comprising a finite number of correlated orbitals embedded in a bi-partite
lattice of uncorrelated orbitals. Our conventional starting point [6, 21] does
not take into account the spin-orbit coupling in the Ce 4f-shell considered by
Dzero et al. [17] and, therefore, cannot address a topological Kondo
insulator.
Raczkowski and Assaad reported a metallic surface layer in a finite size Kondo
nano cluster studied with a finite temperature auxiliary-field quantum Monte
Carlo (QMC) algorithm. The authors realized that this spectral feature is
unrelated to topological properties and interpret their results [22] as
decoupling of the metallic surface from the bulk properties.
We argue that the emerging metallic surface is a consequence of the extended
Lieb-Mattis theorem [23, 24] that can be applied to arbitrary large finite
size correlated cluster of a very simple MIAM. In contrary, in a conventional
pristine Kondo lattice model or periodic Anderson model the surface remains
insulating at half filling. In this paper we present a simple argument based
on this theorem how to predict whether a local spectral function must vanish
at $\omega=0$ or a finite density of state is found. We successfully employ
this argument to understand the elementary real-space spectral properties of a
MIAM cluster obtained with Wilson’s numerical renormalization group (NRG)
approach [25, 26]. In particular, the argument rigorously predicts a non-
vanishing spectral density in the $f$-orbitals spectra on the surface of a
Kondo insulator cluster in agreement with auxiliary-field quantum Monte Carlo
data [22] and our NRG spectra.
In order to reconcile the insulating surface of a pristine Kondo insulator
model with the findings of a metallic surface state in a finite size but
arbitrary large Kondo insulator cluster embedded in a metallic host, we
address the question what is the minimum extension of a Kondo insulator to
generate a metallic surface without invoking the well discussed topological
arguments. It turns out to be sufficient to include only one additional layer
of non-interacting orbitals to generate a metallic surface band. We present a
mean-field tight-binding calculation of a 2d Kondo lattice stripe to
demonstrate the emerging of exactly two spin-degenerate metallic surface bands
involving only the edge orbitals. While for weak hybridization, the surface
band has mainly $f$-character close to Fermi energy, the uncorrelated edge
orbital start to dominate once the hybridization strength exceeds the single
particle hopping matrix element. This finding opens the door for speculations
whether the metallic properties of the surface band in Kondo insulators might
be related to ruggedness of the surface edge.
We present the evolution of the spectral function in a finite size 1d MIAM to
study the crossover from single-impurity surface physics to correlated bulk
properties. We find that the gap size at the cluster center agrees excellently
with those obtained from a dynamical mean field (DMFT) calculation [27, 28]
for an infinitely large Kondo lattice model. From the recently developed
mapping of the problem onto an effective cluster [4] it becomes apparent that
a single impurity Kondo model is insufficient to understand the screening of
the local moments, as already suspected by Nozières [29]. The spin moment
screening mechanism in the Kondo lattice model can be better understood in
terms of self-screening [30] after mapping the model onto an emerging Hubbard
model that is also responsible for the band formation.
We extend our study to the site dependent spectral properties of the Kondo
hole problem. In particular, we track the spectral evolution close to the
Kosterlitz-Thouless type quantum phase transition (QPT) from a strong-coupling
fixed point to a local moment fixed point describing the local moment
formation by a charge neutral substitution of a correlated orbital in a Kondo-
insulator [31, 24]. The spectral properties explicitly reveals the occurrence
of a second Kondo temperature well below the lattice coherence temperature
responsible for a sharp Kondo resonance that develops in the gap of the Kondo-
insulator.
The paper is organized as follows: Section II is devoted to define the model
under consideration and a very brief review of our recently developed mapping
onto an effective model [4] which we employ to calculate the spectral
functions using the NRG. In particular, the matrix generalization of the
equation of motion approach by Bulla et al [32] is presented. We present our
results in Sec. III. We start with the spectral evolution as function of the
cluster size in Sec. III.1. Sec. III.2 is devoted to the application of the
extended Lieb-Mattis theorem [24] to predict whether the spectral function
must vanish at $\omega=0$ or not. We demonstrate that our NRG calculations are
fully in line with the prediction of this theorem, providing a better
understanding of the observed zero frequency features at certain lattice
sites. The site-dependent evolution of the spectral functions is presented in
Sec. III.3 for the largest cluster we can access within the NRG. We augment
our findings with a tight-binding $U=0$ calculation for an infinitely large 2d
stripe model with periodic boundary conditions in one dimension to demonstrate
the emergence of a metallic surface band in Sec. III.3.2. The last part of the
result section, Sec. III.4, is devoted to the evolution of the spectral
properties in the vicinity of a Kondo hole. In particular, we trace the
breakdown of the Kondo screening of the emerging local moment close to the
QPT. We close the paper with a short conclusion.
## II Multi-impurity models and Kondo holes
### II.1 Hamiltonian
Figure 1: Sketch of the geometric setup: An array of $N_{f}=7$ correlated
f-orbitals (green) are locally coupled to a 1d tight binding chain (blue).
The MIAM [4] comprises of two subsystems: the uncorrelated conduction
electrons and the localized correlated $f$-electrons. The uncorrelated
condition electrons are modeled by a tight-binding model
$\displaystyle H_{\rm host}=\sum_{\begin{subarray}{c}i,j,\sigma\\\
i\not=j\end{subarray}}\left(-t_{ij}c^{\dagger}_{i,\sigma}c_{j,\sigma}+\epsilon^{c}_{i}c^{\dagger}_{i,\sigma}c_{i,\sigma}\right),$
(1)
where $t_{ij}$, $\epsilon^{c}_{i}$ denote the transfer parameter and single
particle energy, and $i,j$ labels the lattice sites of the underlying lattice.
We assume translational invariance of this subsystem so that this Hamiltonian
is diagonal in $k$ space and the single-particle dispersion is denoted by
$\epsilon_{\vec{k}\sigma}$. In principle a Zeemann energy can be included but
we only consider the system in the absence of an external magnetic field.
The localized $f$-electrons are described the atomic part of a Hubbard
Hamiltonian
$\displaystyle H_{\text{corr}}$ $\displaystyle=$
$\displaystyle\sum_{l,\sigma}\epsilon^{f}_{l}f^{\dagger}_{l,\sigma}f_{l,\sigma}+H_{\rm
int}$ (2) $\displaystyle H_{\rm int}$ $\displaystyle=$
$\displaystyle\sum_{l}U_{l}f^{\dagger}_{l,\uparrow}f_{l,\uparrow}f^{\dagger}_{l,\downarrow}f_{l,\downarrow},$
(3)
on a subset of $N_{f}$ lattice sites $l\in i$. $f_{l}^{(\dagger)}$ destroys
(creates) an electron on impurity $l$, whose on-site energy is labeled by
$\epsilon^{f}_{l}$, and $U$ accounts for the on-site Coulomb repulsion. A
local single particle hopping term
$\displaystyle H_{\rm
hyb}=\sum_{l,\sigma}V_{l}c^{\dagger}_{l,\sigma}f_{l,\sigma}+\rm h.c.\,,$ (4)
facilitates the hopping of an electron between the localized $f$ orbital and
the corresponding Wannier orbital at the same lattice site. $V_{l}$ denotes
the local hybridization of the impurity at lattice site $l$ with the
corresponding local lattice orbital, such that the total Hamiltonian is given
by
$\displaystyle H$ $\displaystyle=$ $\displaystyle H_{\rm
host}+H_{\text{corr}}+H_{\rm hyb}.$ (5)
For $l$ running over all lattice sites of the host, we obtain the periodic
Anderson model. If $N_{f}=1$, we recover the well understood single impurity
model. By setting individual values for $\epsilon^{f}_{l},U_{l}$ at specific
lattice sites, we include the modeling of Kondo holes into our rather general
description [24]. Such a setup is schematically depicted in Fig. 1 for
$N_{f}=7$. We can also set $\epsilon^{f}_{l}=\epsilon_{h}^{f}$ at the location
$h\in l$ of the Kondo hole, and sent $\epsilon_{h}^{f}$ to very large value to
completely deplete that particular orbital.
### II.2 Mapping of the MIAM and Green’s functions
Here we briefly review the mapping of the MIAM onto an effective multi-band
model in the wide band limit which we developed recently [4] and already
applied to the Kondo-hole problem [24]. In a translation invariant lattice the
Hamiltonian $H_{\rm host}$ becomes diagonal in $\vec{k}$ space,
$\displaystyle H_{\rm host}$ $\displaystyle=$
$\displaystyle\sum_{\vec{k}\sigma}\epsilon_{\vec{k}\sigma}c^{\dagger}_{\vec{k}\sigma}c_{\vec{k}\sigma}.$
(6)
We define the coupling function matrix element $\Delta_{l,l^{\prime}}(z)$ [33,
4]
$\displaystyle\Delta_{l,l^{\prime},\sigma}(z)$ $\displaystyle=$ $\displaystyle
V_{l}V^{*}_{l^{\prime}}D_{l,l^{\prime}}^{\sigma}(z),$ (7)
where $D_{l,l^{\prime}}^{\sigma}(z)$ denotes the unperturbed Green function of
the non-interacting host in real-space,
$\displaystyle D^{\sigma}_{l,l^{\prime}}(z)$ $\displaystyle=$
$\displaystyle\frac{1}{N}\sum_{\vec{k}}\frac{1}{z-\epsilon_{\vec{k}\sigma}}e^{i\vec{k}(\vec{R}_{l}-\vec{R}_{l^{\prime}})}.$
(8)
Then, the exact real-space multi impurity Green’s function (GF) is a matrix of
dimension $N_{f}\times N_{f}$ and takes the form
$\displaystyle\bm{G}^{f}_{\sigma}(z)$ $\displaystyle=$
$\displaystyle[z-\bm{E}_{\sigma}-\bm{\Delta}_{\sigma}(z)-\bm{\Sigma}_{\sigma}(z)]^{-1},$
(9)
where the matrix $\bm{E}_{\sigma}$ contains the single-particle energies of
the localized $f$-orbitals and $\bm{\Sigma}(z)$ denotes the self-energy
matrix. Using the exact equation of motion for the GFs it is straight forward
to show that
$\displaystyle\bm{\Sigma}_{\sigma}(z)$ $\displaystyle=$
$\displaystyle\bm{F}_{\sigma}[\bm{G}^{f}_{\sigma}]^{-1},$ (10)
and the matrix elements of the correlation matrix $\bm{F}$ are defined as [32]
$\displaystyle
F_{l,l^{\prime},\sigma}(z)=G_{B_{l\sigma},f^{\dagger}_{l^{\prime}\sigma}}(z),$
(11)
where the composite operator $B_{l\sigma}$ is generated by the commutator
$\displaystyle B_{l\sigma}(z)=[f_{l\sigma},H_{\rm int}].$ (12)
Since the host degrees of freedom are uncorrelated, the local host GF in the
presence of the correlated orbitals obeys the exact relation
$\displaystyle G_{c_{i\sigma},c^{\dagger}_{j\sigma}}(z)$ $\displaystyle=$
$\displaystyle D_{i,j}^{\sigma}(z)$
$\displaystyle+\sum_{l_{l},l_{2}}D_{i,l_{1}}^{\sigma}(z)V_{l_{1}}G^{f}_{l_{1},l_{2}}(z)V^{*}_{l_{2}}D_{l_{2},j}^{\sigma}(z),$
which can be casted into a matrix multiplication. While $D_{i,j}^{\sigma}(z)$
describes the free propagation of a conduction electron from the lattice site
$j$ to the lattice site $i$, the t-matrix
$V_{l_{1}}G^{f}_{l_{1},l_{2}}(z)V^{*}_{l_{2}}$ accounts for all the scattering
processes of the conduction electrons on all the correlated impurity orbitals.
In the wide band limit, the influence of the host onto the dynamics of the
correlated orbitals is determined by the real part and the imaginary part of
$\bm{\Delta}_{\sigma}(z)$ at the Fermi-energy [4].
In a first step, we diagonalize
$\bm{\Gamma}_{\sigma}=\Im\bm{\Delta}_{\sigma}(-i0^{+})$. The eigenvalues
$\tilde{V}_{l}$ define the new couplings to $N_{f}$ independent effective
conduction bands [4], while the eigenvectors describe the composition of the
new local orbitals in the rotated base.
The real part $\bm{T}_{\sigma}=\Re\bm{\Delta}_{\sigma}(-i0^{+})$ contains the
host mediated effective hopping matrix element between the local orbitals,
which are absorbed into the diagonal matrix $\bm{E}_{\sigma}$ and rotated into
the new local orbital basis. This procedure defines a mapping of the original
Hamiltonian, Eq. (5), onto an effective Hubbard model that couples to multiple
effective conduction band channels. Obviously, this Hubbard model cluster
contains already the antiferromagnetic part of the RKKY interaction mediated
by the conduction electrons.
Generically, a multi-band model with $N_{f}$ effective conduction electron
channels is expected from the $N_{f}$ eigenvalues of $\bm{\Gamma}_{\sigma}$.
It turns out, however, that the encoded topology in $\bm{\Delta}_{\sigma}$
typically leads to a reduced rank of $\bm{\Gamma}_{\sigma}$ [4]. Since the
upper bound of the rank is given by the number of $\vec{k}$ vectors on the
Fermi surface of the host, the problem reduces to an effective two-band model
for arbitrary geometries in 1d, which makes the mapped MIAM fully accessible
to the NRG.
Since the NRG always diagonalizes the rotated correlated orbital problem
exactly in the first step, the complexity of the problem is essentially
limited by the Hilbert space dimension of the correlated impurity problem. We
are able to obtain very accurate NRG results up to $N_{f}=7$ correlated sites
with the computer facilities we have access to. We would like to refer the
reader for more details on the approach and its limitation to our recent
paper, Ref. [4].
The NRG applied to the mapped problem provides the correlation functions used
to construct the correlation self-energy matrix according to Eq. (10) after
rotating back into the real-space orbital basis. The full energy dependency of
the uncorrelated host enters via Eq. (9) the $f$-orbital Green’s function
matrix. The equation of motion expression, Eq. (II.2), provides the access to
the real-space Green function matrix at arbitrary lattice sites $i,j$ that can
be chosen independently of the location of the correlated orbitals.
Essentially the mapped MIAM serves as a powerful tool to calculate the real-
space single particle Green function matrix including all spatial correlations
of the original MIAM.
## III Results
Figure 2: $c$-spectral function for the central position in a $N_{f}=7$ MIAM
where $U=-2\epsilon_{f}=10\Gamma_{0}$ in comparison with the DMFT solution of
Kondo lattice model with the identical Kondo coupling $g=\rho J=\rho
J_{SW}=0.25$ obtained by the Schrieffer-Wolff transformation [34].
In order to set the stage for our detailed real-space investigation of the
spectral functions in a finite size MIAM, we plot a comparison between the
$c$-orbital spectrum at the center, obtained via the exact equation of motion
Eq. (II.2), and the conduction electron spectrum for a 1d Kondo lattice
calculated within the dynamical mean field theory (DMFT) [27] in Fig. 2. We
set the local Kondo interaction in such a way that the dimensionless Kondo
coupling $g=\rho J=\rho J_{SW}$ agrees with the prediction of the Schrieffer-
Wolff transformation, $J_{SW}$ [34] in the MIAM.
The data clearly show an excellent agreement between the DMFT and center
spectra in the $N_{f}=7$ cluster. The cluster spectrum contains all many-body
inter-site correlations exactly, which are only treated in mean-field within
the DMFT. In addition, the NRG broadening is overestimated in the effective
site of the DMFT, hence the MIAM spectrum is much sharper and contains sub-
features at higher energies which are absent in the DMFT. In addition, the
DMFT shows a clear pseudo-gap with $\rho^{c}(\omega=0)=0$ while we observe a
finite value $\rho^{c}(\omega=0)>0$ in the MIAM. This finite value can be
explained within the extended Lieb-Mattis theorem as demonstrated later on. In
an infinitely large system, this finite value will disappear and the DMFT form
will be asymptotically recovered.
### III.1 Evolution of the center spectral function with the number of
correlated sites $N_{f}$
We consider the geometry of Fig. 1 shown for $N_{f}=7$ and vary the number of
correlated sites from $N_{f}=2$ to $N_{f}=7$. The sites are labeled
consecutively with $l=1,\cdots,N_{f}$, $\epsilon_{f}=-U/2=5\Gamma_{0}$. The 1d
conduction band host is particle-hole symmetric ($\epsilon^{c}=0$), and the
spectral functions are obtained by an NRG calculation with the parameters
stated in the caption and by employing the algorithm [35, 36] based on the
complete NRG basis set [37, 38].
Figure 3: Spectral function $\rho^{f}_{l_{c}}(\omega)$ of the central
$f$-orbital in a dense array comprising (a) $N^{f}=2$, (b) $N_{f}=3$, (c)
$N_{f}=4$, (d) $N_{f}=5$, (e) $N_{f}=6$ and (f) $N_{f}=7$ impurities. In case
of even $N_{f}$ both central $f$-orbitals are equivalent due to parity
symmetry. Parameters: $\epsilon_{f}=-U/2=5\Gamma_{0}$, $\epsilon^{c}=0$,
$D=10\Gamma_{0}$, $\Lambda=2$ and $N_{s}=8000$.
The evolution of the spectral function at the center of the correlated sites,
$l_{c}$, for $N_{f}=2-7$ respectively, is shown in Fig. 3. The local spectral
function at site $l$ is extracted from the diagonal matrix element
$\displaystyle\rho_{l,\sigma}^{f}(\omega)$ $\displaystyle=$
$\displaystyle\frac{1}{\pi}\Im G_{ll,\sigma}^{f}(\omega-i0^{+})$ (14)
in the usual way. Note that we perform all calculations in the absence of an
external magnetic field. Therefore, all spectra in this paper are spin
independent.
Let us first comment on the feature at $\omega\approx D=10\Gamma_{0}$, visible
in all spectra. This feature originates from the Van Hove singularity of the
1d density of states right at the band edge, which is included in
$\bm{\Delta}(z)$, but doesn’t have any further physical meaning. Hence we will
ignore these discontinuities in the following discussion.
A common feature is the formation of a gap structure symmetrically around
$\omega=0$, whose width is increasing with $N_{f}$. This feature can be traced
back to the spectral properties of a MIAM cluster by artificially setting
$\bm{\Gamma}_{\sigma}=0$ and only include
$\bm{T}_{\sigma}=\Re\bm{\Delta}_{\sigma}(-i0^{+})$ in an exact
diagonalization. $\bm{\Gamma}_{\sigma}$ is responsible for the ferromagnetic
component of the RKKY interaction [4], the remaining Kondo screening of a
small cluster spin moment [4], renormalization of parameters and broadening of
the spectrum.
We notice that $\rho^{f}_{l_{c}}(\omega=0)$ at the center location remains
finite and only vanishes for $N_{f}=3$ and $N_{f}=7$. Particularly, the
finding of very small offset at $\omega=0$ arises the question of whether this
feature is caused by a numerical problem or has a physical origin, since this
has not been reported in 2d QMC spectra for a finite size Kondo lattice
cluster [22]. We show in the next section that this has a physical origin, and
the extended Lieb-Mattis theorem can be used to predict under which
circumstances $\rho^{f}_{l}(\omega=0)=0$ and in which case
$\rho^{f}_{l}(\omega=0)$ must be finite at $T=0$.
For $N_{f}=2$, we have a realization of a two-impurity model where the energy
dependent density of states break the particle-hole symmetry in the even and
the odd channels [39, 40, 41], which generates the finite size hopping between
the two correlated sites [41, 4]. We obtain two Kondo peaks, one in the even
and one in the odd channel, that are shifted away equally and in opposite
direction from the chemical potential as a consequence of a non-resonant
scattering. The symmetric superposition of the even and the odd spectral
function yields the spectrum shown in Fig. 3(a). This spectrum develops a
pronounced valley between the two peaks but with a finite density of states at
$\omega=0$. The lower and upper charge excitations, sometimes referred to as
Hubbard peaks, are well pronounced as known from the SIAM.
In Figure 3(b) we proceed to the center orbital of the $N_{f}=3$ cluster. Here
we have the first MIAM of second kind, where $N_{f}$ exceeds the number of
screening channels [4]. We have shown [4] that the local moments of the two
outer orbitals are aligned and AF correlated with the center spin. By
inspecting the spectrum in the vicinity of the chemical potential we find an
exactly vanishing $\rho_{l_{c}}^{f}(\omega=0)=0$. Increasing the local cluster
size to $N_{f}=4$ generates a small density of states,
$\rho_{l_{c}}^{f}(\omega=0)>0$. This observation holds up to $N_{f}=6$. The
pseudo-gap width increases as well as the peak height, and spectral weight is
transferred from the Hubbard peaks to the sharper features close to the Fermi
level. The $f$-density of states resemble a band formation of the correlated
orbitals by the effective hopping matrix $\bm{T}$, which asymptotically
evolves in the heavy quasiparticles close to the Kondo insulator band gap
[42]. For a cluster size of $N_{f}=7$, the spectral function depicted in Fig.
3(f) develops a true pseudo-gap with $\rho_{l_{c}}^{f}(\omega=0)=0$.
### III.2 Applying the extended Lieb-Mattis theorem for predicting a pseudo-
gap spectrum
We can combine an auxiliary Kondo problem with the extended Lieb-Mattis
theorem [23, 24] to decide whether the spectral function should have a finite
value $\rho_{l}^{f}(0)$ at $\omega=0$ or not. Shen [23] have proven that for a
number of $N_{f}$ local moments coupled by a local AF exchange interaction to
a half-filled system of conduction electrons on a bipartite d-dimensional
lattice with $N_{c}\geq N_{f}$ sites, the ground state has a total $S_{z}$
component of
$\displaystyle
S^{\text{tot}}_{z}=\frac{1}{2}|N_{c,\text{A}}-N_{c,\text{B}}+N_{f,\text{B}}-N_{f,\text{A}}|.$
(15)
The extended version [24] generalizes Shen’s version of the Lieb-Mattis
theorem to predict the ground state multiplet of a MIAM in the continuum
limit, where the number $N_{c}$ of $c$-orbitals is considered to be infinitely
large, $N_{c}\to\infty$. Thereby, a finite size cluster is embedded into a
conduction band continuum to account for a possible Kondo screening of cluster
ground state multiplets.
Setting aside subtle details of the spectrum close to $\omega=0$, the
presented data in Fig. 3 suggest to qualitatively parametrize the density of
states by a power law fit
$\rho_{l}^{f}(\omega)\approx\rho_{l}^{f}(0)+C_{l}|\omega|^{r}$ with an offset
$\rho_{l}^{f}(0)$ and some exponent $r>1/2$.
Let us imagine, we extent the MIAM by an additional spin $1/2$ that is locally
coupled antiferromagnetically with an arbitrarily weak Kondo coupling constant
to the spin in the correlated orbital at site $l$. If the density of states is
finite at $\omega=0$, a Kondo screening of this additional spin must occur in
the limit $T\to 0$, and a strong coupling (SC) fixed point (FP) with a singlet
ground state is found. If, however, $\rho_{l,\sigma}^{f}(0)=0$ and $r\geq
1/2$, we are dealing with a pseudo-gap Kondo problem [43, 44, 45] where the
local local moment (LM) FP is stable in our parameter regime for $T\to 0$.
Since the ground state of the total system remains independent of the
auxiliary AF coupling strength, we can now sent the auxiliary coupling to
infinity creating a local singlet from the auxiliary spin and the local moment
at site $l$, such that the location of the fictitiously induced local moment
is shifted into the remaining system [46, 47, 24].
The essence of this first step is to map the problem of a finite spectral
function $\rho_{l}^{f}(0)$ onto the question of a local moment formation in an
effective MIAM where the correlated site $l$ has been removed. We extensively
studied this so-called Kondo hole problem in a recent paper [24] where we have
shown that the nature of the ground state can be derived from an extended
Lieb-Mattis theorem on a bi-partite lattice with AF couplings at half filling.
In a second step, we employ Shen’s cluster Lieb-Mattis theorem [23] for a
finite size effective MIAM cluster [23, 47] with the $f$-orbital at site $l$
being removed, to determine its maximal spin component $S^{\text{tot}}_{z}$ of
the ground state. If $S^{\text{tot}}_{z}=0$, no effective moment remains and
$\rho_{l}^{f}(\omega=0)>0$.
If, however $S^{\text{tot}}_{z}>0$, we have to be more careful and need to
check in a third step whether by enlarging the conduction electron cluster,
$S^{\text{tot}}_{z}$ is increasing or decreasing as outlined in Ref. [24].
This step extends finite size cluster to a true continuum model including
additional screening channels due to the coupling to the host conduction
electrons. If $S^{\text{tot}}_{z}$ increases, the effective exchange coupling
of the ground state spin multiplet to the remaining conduction band channels
is ferromagnetic, and a local moment prevails leading to
$\rho_{l}^{f}(\omega=0)=0$. If, however $S^{\text{tot}}_{z}$ decreases, we can
conclude that the finite size cluster is AF coupled to the effective
conduction band channel and a singlet ground state is found in the Kondo hole
problem.
A specific example where this procedure agrees perfect with well known and
established theoretical as well as experimental results is the case of
graphene. Here the bi-partite lattice structure in combination with moderate
correlations within the $\pi$-orbital enable the applicability of the Lieb-
Mattis theorem, which predicts a stable local moment when a single carbon atom
is removed. This is in agreement with theoretical studies on a microscopic
level [48, 49, 50] and has already been observed experimentally [51, 52, 53].
At the same time, the pseudo-gap in the density of states of pristine graphene
with an exponent of $r=1$ is well established as well, and the breakdown of
the single ion Kondo effect was experimentally observed [52]. Hence this
example is in line with our argumentation that the occurrence of a stable
local moment when a single site is removed is directly related to a local
pseudo-gap spectrum with exponent $r\geq 1/2$.
Moreover, the predictions of the auxiliary model also fit to the $f$-orbital
spectra of a half filled 2d PAM on simple cubic lattice with one $f$-orbital
being removed, see Fig. 5 of Ref. [54]. According to the Lieb-Mattis theorem,
removing another $f$-orbital on the same sublattice as the first one would
increase the degeneracy of the ground state, whereas it is reduced when a
$f$-orbital on the opposite sublattice gets removed. Consequently, the spectra
of the $f$-orbitals on the opposite sublattice as the hole sites are expected
to be finite at $\omega=0$, while the others should be fully gapped. Note that
the precise value of $\rho^{f}(\omega=0)>0$ can not be predicted by the Lieb-
Mattis theorem. It is expected that $\rho^{f}(\omega=0)>0$ falls of rapidly
with increasing distance from the hole site, such that it might be difficult
to resolve for larger distances as shown in Fig. 3 of Ref. [54].
We applied the extended Lieb-Mattis theorem to the situation where we removed
the correlated orbital at the center position $l_{c}$ for the different
cluster sizes $N_{f}$. Indeed, we only found a LM FP for $N_{f}=3$ and
$N_{f}=7$ confirming our numerical findings as depicted in Fig. 3. For
$N_{f}=2$, the auxiliary problem reduces to a SIAM that has a singlet ground
state, and consequently $\rho_{1}^{f}(\omega=0)>0$.
For $N_{f}=3$, the Kondo-hole cluster yield $2S^{\text{tot}}_{z}=1$, adding
another conduction electron site yields $2S^{\text{tot}}_{z}=2$ indicating a
ferromagnetic coupling so that a the ground state carries a local moment. It
is interesting to note that this $N_{f}=3-1=2$ effective Kondo-hole MIAM is
identical to a two-impurity Anderson model with both impurities located on the
same sub-lattice. For this case we have explicitly proven in a NRG calculation
including the full energy dependency of the conduction band host that the LM
fixed point is stable [40]. Therefore $\rho_{2}^{f}(\omega=0)=0$, for
$N_{f}=3$ as observed in Fig. 3(b).
Note that the $N_{f}=3$ cluster is the minimal model to realize a MIAM of the
second kind in a 1d host. In a MIAM of the second kind the number of screening
channels is less than the number of $f$-orbitals [4], which is required in
order to realize a fully gapped spectra. In Sec. III.1 of Ref. [24], we
presented a detailed analysis for the non-interacting limit of the simplest
realization for a MIAM of the second kind in arbitrary dimensions on a simple
cubic lattice, arranged as schematically depicted in Fig. 6 of Ref. [24] for
the 1d and 2d case. The even parity subspace of the model contains the central
$f$-orbital ($f_{l_{c}}$) and the even linear combination of the outer ones
($f_{+}\propto\sum_{i\not=l_{c}}f_{i}$). At low temperatures, only the center
orbital, $f_{l_{c}}$, couples to the conduction band electrons, while the
$f_{+}$-orbital does only indirectly couple via a finite hopping element
$t_{{l_{c}}+}$ between the $f_{l_{c}}$\- and $f_{+}$-orbital. The Green’s
function of the $f_{l_{c}}$-orbital now involves propagations into the
(decoupled) $f_{+}$-orbital and back, which, in case of PH symmetry, results
in a diverging real part of the self-energy $\propto t^{2}_{{l_{c}}+}/\omega$
and, consequently, in a fully gapped spectra - see Eq. (48) in Ref. [24].
Since this contribution to the self-energy is still present when the
correlations are switched on, the spectra in these models will always be fully
gapped. This argumentation also holds in 2d when $N_{f}=5$ $f$-orbitals are
considered and arranged as depicted in Fig. 6 (b) of Ref. [24]. In the 2d QMC
study of Raczkowski and Assaad [22], however, no fully gapped spectrum was
found for this specific $N_{f}=5$ model - see Fig. 3(a) in Ref. [22]. We
believe that the mismatch is a finite temperature effect, and encourage the
authors of Ref. [22] to adopt the zero temperature project QMC algorithm so as
to investigate in more details the long imaginary time behavior of the local
$\tilde{f}$-Green function.
For $N_{f}=4$, a removal of the $l=2$ f-orbital yields
$2S^{\text{tot}}_{z}=1$. By extending the cluster with one conduction electron
site [24] we can show that one of the two screening channels is AF coupled
and, therefore, the ground state of the extended Kondo-hole MIAM cluster has a
singlet ground state. We leave it to the reader to apply the extended Lieb-
Mattis theorem to show that this prevails for $N_{f}=5,6$ while for $N_{f}=7$
a finite LM FP is predicted by the Lieb-Mattis theorem which is compatible
with our finding of $\rho_{4}^{f}(\omega=0)=0$ for $N_{f}=7$.
The extended Lieb-Mattis theorem has turned out to be a very powerful tool to
rigorously establish the ground state degeneracy of auxiliary MIAM, and allows
us to make a prediction whether $\rho_{l}^{f}(\omega=0)$ is finite or must
vanish, independent of the selected numerical approach for the calculation of
the spectral functions. This establishes the high accuracy of our NRG
calculations presented in Fig. 3, which are fully compatible with the
prediction of the extended Lieb-Mattis theorem.
### III.3 Concentrated MIAM cluster with $N_{f}=7$
This section is devoted to the investigation of the real-space spectral
functions for a MIAM cluster depicted in Fig. 1.
#### III.3.1 Real-space spectral functions
Figure 4: Spectral functions $\rho^{f}(\omega)$ for an impurity array
comprising $N_{f}=7$ $f$-orbitals. The panels depict the spectral function of
the individual $f$-orbitals starting at the outermost in panel (a) and ending
at the center in panel (d). Parameters: as in Fig. 3
After establishing the evolution of the spectral function at the central site
with the cluster size $N_{f}$, we investigate the site depending spectra for
our largest MIAM with $N_{f}=7$. We present the $f$-spectra for the correlated
site $l=1,2,3$ and the center location $l_{c}=4$ in Figs. 4(a)-(d). Note that
the data shown in Fig. 4(d) is identical to Fig. 3(f) and is added for
completeness.
A pseudo-gap feature is found in the spectra of all sites with two nearest
neighbors. This pseudo-gap is absent on the surface of the correlated chain,
i. e. at $l=1$ and $l=N_{f}$, which resembles more a SIAM type spectral
function. Since this feature has also been reported by Raczkowski and Assaad
[22] in an auxiliary QMC calculation for a 2d Kondo cluster model on a
substrate, we believe this is a generic surface property of a finite size MIAM
in arbitrary spatial dimensions.
We can resort to the extended Lieb-Mattis theorem exemplified in our small
clusters, that such metallic surface spectrum must indeed prevail in arbitrary
spatial dimensions and cluster sizes $N_{f}$, as long as the number $N_{c}$ of
lattice sites of the underlying metallic host is always significantly larger,
$N_{c}>N_{f}$. By removing an arbitrary correlated orbital on the surface of
the cluster we are left with a new dense cluster of size $N_{f}-1$ which again
has a singlet ground state. The neglected coupling to the rest of the host
does not change the ground state property. The screening of an auxiliary spin
coupled antiferromagnetically to a surface $f$-orbital is always possible and,
therefore, the density of states of the correlated orbital at the surface for
$\omega=0$ must always remain finite. This general statement provides an
explanation for the finite $f$-spectral function $\rho^{f}(\omega=0)$ at the
surface of $6\times 6$ Kondo cluster model [22] and in our 1d correlated
chain.
Let us proceed to the other correlated sites $l$ with $1<l<N_{f}$. At $l=2$
and $l_{c}=4$, $\rho_{l}^{f}(\omega=0)$ vanishes exactly, while we find
$\rho_{l}^{f}(\omega=0)>0$ for $l=1,3$ in the data presented in Fig. 4. Again,
this observation is consistent with the prediction of the extended Lieb-Mattis
theorem. Since the number of uncorrelated sites are fixed and have a imbalance
of $1$ for $N_{f}=7$, $S_{z}^{\rm tot}$ of the MIAM cluster obtained from Eq.
(15) is independent of the sublattice of the removed correlated orbital, and
we always find $S_{z}^{\rm tot}=1/2$. The cluster develops a local moment
ground state as expected from the isolated Kondo-hole problem [24]. Now we add
one more uncorrelated orbital which must belong to the opposite sublattice as
the first or last lattice site of the cluster. While this leads to
$N_{c,A}-N_{c,B}=0$ the total spin of the extended cluster depends on the
imbalance $N_{f,B}-N_{f,A}$. Without loss of generality, let us assume that
$l$ odd belongs to sublattice $A$. If we remove a correlated f-orbital on
sublattice $A$, we obtain $S_{z}^{\rm tot}=0$, and consequently a finite
$\rho_{l}^{f}(\omega=0)$, while for even $l$ that belongs to sublattice $B$,
the ground state spin is increasing to $S_{z}^{\rm tot}=1$. Consequently, the
effective MIAM cluster ground state spin is ferromagnetically coupled to the
host for removing an $l$ even correlated orbital, and the local moment cannot
be fully screened. At these lattice sites, $\rho_{l}^{f}(\omega=0)$ must
vanish, confirming the findings of our NRG calculation.
Figure 5: Effective spectral functions $\tilde{\rho}^{f}(\omega)$ for an
impurity array comprising $N_{f}=7$ uncorrelated $f$-orbitals that are located
at $\epsilon_{l}^{f}=0$ to maintain half-filling. The panels depict the
spectral function of the individual $f$-orbitals starting at the outermost in
(a) and ending at the center in panel (d).
The magnitude of $\rho_{l}^{f}(\omega=0)>0$, however is not determined by the
extended Lieb-Mattis theorem. In order to provide a basic understanding of the
density of states, we assume that the MIAM cluster shows Fermi liquid
properties for $T\to 0$ implying that we can replace the full self-energy
matrix $\bm{\Sigma}_{\sigma}(z)$ in Eq. (9) for $z\to 0$ by the Hartree
contribution $\Re[\bm{\Sigma}_{\sigma}(0)]$. The diagonal matrix elements
renormalize the local single-particle
$\epsilon^{f}_{l}\to\epsilon^{f}_{l}+U/2=0$ to ensure half-filling. The off-
diagonal matrix elements renormalize the hopping matrix $\bm{T}$ but its
magnitude is analytically not known. Therefore, we calculated the spatially
dependent spectral functions from
$\bm{\tilde{G}}^{f}_{\sigma}(z)=[z-\bm{\Delta}_{\sigma}(z)]^{-1}$ in Fig. 5 by
neglecting the finite $U$ off-diagonal Hartree terms, essentially defining the
$U=0$ and $\epsilon^{f}_{l}=0$ problem.
Interestingly, the surface spectrum $\rho_{1,\sigma}^{f}(\omega=0)$ remains
metallic while all bulk spectral functions develop a finite gap. This gap
corresponds exactly to the analytic gap of the 1d PAM located at
$\pm\Gamma_{0}$. This confirms that a metallic surface and bulk gap-formation
is already present in the $U=0$ PH symmetric MIAM. In the corresponding local
conduction electron spectra calculated by the exact equation of motion in Eq.
(II.2) we found fully gapped spectra for all uncorrected conduction electrons
at the sites $l$ – not shown here.
We still need to reconcile the even-odd oscillations in
$\rho_{l}^{f}(\omega=0)$ for $U>0$ with the finding of a gap for all bulk
sites $1<l<N_{f}$ when $U=0$. A more careful analysis presented in Ref. [24]
relates that to a $U=0$ Kosterlitz-Thouless type transition in the model where
the f-orbital at site $l$ has been removed. To elaborate on this difference we
still use the auxiliary spin picture for probing the local $f$-spectrum and
employ the $U=0$ supercell analysis for the MIAM presented in Ref. [24].
In an isolated cluster of non-interacting orbitals and half-filling we have
shown that removing a single $f$-orbital at site $1<l<N_{f}$ generates a
localized state. For a nearest neighbor tight-binding model, this localized
orbital is located at the neighboring $f$-sites and at the conduction band
Wannier orbital $l$ [24]. Therefore, the $f$-electron spectra must have a gap
which we interpret as a precursor of the bulk gap.
Now we switch on a finite $U$. As we have demonstrated in Ref. [24], the
localized bound single particle orbitals can acquire a U-induced effective
Kondo coupling such that the low-temperature local moments are screened at
$T=0$. This provides the microscopic mechanism that is implicitly accounted
for by the extended Lieb-Mattis theorem which is only valid for $U>0$ and
half-filling. Since this effective Kondo coupling increases with some power
law $U^{\alpha}$, $\alpha>1$ [24] for small $U$, this mechanism also explains
that the zero frequency peaks for $U/\Gamma_{0}=20$ as shown in Fig. 7 are
larger than those in Fig. 4 for $U/\Gamma_{0}=10$. Eventually, for very large
$U$, the crossover temperature $T_{0}$ at which the local moment is screened
will decrease again as depicted in Fig. 15 of Ref. [24].
Since the effective Kondo coupling for screening the local moment depends on
its distance from the edge, this mechanism is increasingly suppressed when
moving from the edge to the center (bulk). Therefore, the pseudo-gap becomes
more pronounce, and the finite $\rho_{l}^{f}(\omega=0)$ is reduced beyond
detectability for large cluster sizes $N_{f}\to\infty$, even when the extended
Lieb-Mattis theory predicts $\rho_{l}^{f}(\omega=0)>0$.
Since the dimensionality of a cluster does not enter the theorem, we expect
that such A-B sublattice oscillations in the local $f$-spectra should also be
present in a 2d Kondo cluster for $U>0$. Raczkowski and Assaad [22], however,
do not address this question, and the presented data in Fig. 3 of Ref. [22]
suggests a true pseudo-gap away from the cluster surface. This might be linked
to the limits of the employed auxiliary QMC. In our NRG calculations we had to
access exponential small temperature scales well below the single impurity
Kondo temperature to reveal these A-B sublattice oscillations in the
f-spectra.
Also note that the extended Lieb-Mattis theorem cannot make a prediction of
the magnitude of $\rho_{l}^{f}(\omega=0)$ and only can help distinguishing
between a finite $\rho_{l}^{f}(\omega=0)$ and $\rho_{l}^{f}(\omega=0)=0$.
Setting aside the even-odd oscillations of $\rho_{l}^{f}(0)$, we clearly can
recognize the evolution of the spectral function from an impurity type
spectrum more towards a bulk spectrum with a well pronounced pseudo-gap that
is compatible in width with the DMFT solution of the 1d Kondo lattice problem.
Figure 6: The conduction electron spectral functions $\rho^{c}_{l}(\omega)$
for the same parameters as in Fig. 4 (a) $l=1$, (b) $l=2$, (c) $l=3$, (d)
$l=4$, The Green’s functions was calculated via Eq. (II.2).
In Figure 6 we present the spectra for the corresponding conduction electron
orbital at the cluster site $l$. The Green’s function was calculated via Eq.
(II.2). The van-Hove singularities of the 1d simple cubic density of states of
the host at the band edges are clearly visible. Additionally, a gaped density
of states is also found at the surface of the cluster. This is for arbitrary
$N_{f}$ and is in agreement with the findings in Ref. [22]. Note that the data
of Fig. 6(d) was already used for the comparison between the DMFT Kondo
lattice solution and the cluster calculations as presented in Fig. 2.
Figure 7: Same as in Fig. 4 but with $\epsilon_{f}=-U/2=10\Gamma_{0}$.
Reminiscence of the Hubbard side peaks expected at $\omega\approx\pm U/2$ in
the spectra can only be seen for $l=1$ in Fig. 4, while they disappeared for
$1<l<N_{f}$. We attribute this to the strongly energy dependent self-energy
matrix $\bm{\Sigma}(z)$ as well as the peculiar feature of a 1d density of
states that is included in $\bm{\Delta}_{\sigma}(z)$ which shows to square
root type divergencies at both band edges.
We can, however, recover the Hubbard side peaks by increasing $U$. The
spectral functions for $U=20\Gamma_{0}$ are shown in Fig. 7 using the same NRG
parameters as in Fig. 4. For each of the calculations we have used the
adequate NRG iterations such that the spectrum remains unaltered when
increasing the number of iteration to ensure that we are well in the low-
temperature fixed point and $T\to 0$.
In addition, a low energy Kondo peak emerges on odd lattice sites. The hopping
matrix $\bm{T}_{\sigma}$ generates an antiferromagnetic coupling of the
different cluster local moments which leave a $S=1/2$ ground state multiplet.
The bulk gap is already seen in the ED spectrum of the cluster. The remaining
coupling to the conduction electron bands causes the Kondo screening of this
spin 1/2 ground state leading a very narrow Kondo peak in the preformed gap
structure at odd cluster sites.
#### III.3.2 Discussion: Metallic surface conductor in an Kondo insulator
Figure 8: Sketch of a strip of a 2d MIAM model for a Kondo insulator with a
infinite large y-axis but a finite size x-axis to define a surface. The
correlated orbitals are depicted in green, the uncorrelated in blue. Note that
on the surface the correlated orbitals are absent.
So far we exemplified a metallic surface $f$-spectra in a small MIAM cluster
embedded in an metallic environment that is in agreement with auxiliary field
QMC data [22] as well as with the extended Lieb-Mattis theorem. Since the
spatial dimension does not enter in the extended Lieb-Mattis theorem, only
requiring half-filling, antiferromagnetic coupling and a bi-partite lattice,
we can conclude that even the surface of a macroscopically large cluster in 3d
will be a surface conductor as long as the number of host lattice sites
$N_{c}\gg N_{f}$.
On the other hand, we can use the cluster Lieb-Mattis theorem [23] to analyze
the surface states of a very large but finite size cluster where
$N_{f}=N_{c}=O(10^{23})$. Since the removal of a single orbital, a correlated
or uncorrelated does not matter, always induces a local moment of $s=1/2$, the
spectra must always have a gap independent of the boundary conditions. This
well known observation inspired many theoretical papers [17, 18, 19, 20] in
which the Kondo lattice model is extended by spin-orbit interactions to a
topological Kondo insulator in order to address the experimental findings of a
metallic surface conductance on Kondo insulators [12, 13, 11]. All these
concepts use a perfect lattice structure that abruptly ends at some boundary
which appears to be very unrealistic in real strongly correlated materials
that often have changing surfaces after cleaving. Chemical reactions with
oxygen or surface roughness leads to deviation of the surface for an ideal
situation. This well known fact made topological models so popular since a
metallic surface state is topologically protected independent of the surface
ruggedness of the real material.
This discrepancy between the ideal trivial Kondo lattice with its insulating
surface and a generically metallic surface in a large Kondo lattice cluster
model embedded in a infinitely large metallic host raises the question of how
many additional uncorrelated orbitals we need to add in order to see a
metallic surface state developing at the edge of the Kondo lattice.
For simplicity let us consider a 2d strip of a Kondo insulator symbolized in
Fig. 8. We imagine a very large system in y-direction with $N_{y}\to\infty$.
The number of sites $N_{x}$ in x-directions remains finite to establish two 1d
surfaces at both edges of the strip. The exact number $N_{x}$ does not enter
the argument and can be arbitrarily large but only need to be finite in order
to establish an edge. The major ingredient in the setup of Fig. 8 is the
removal of the correlated orbital at the surface layer of a Kondo insulator.
In essence, Fig. 8 describes the smallest extension of a pristine finite size
Kondo lattice model to a MIAM by adding a single uncorrelated orbital.
Figure 9: (a) The $k_{y}$-dependent band structure for the periodic stripe in
Hartree mean field theory, $\tilde{\epsilon}^{f}=\epsilon^{f}+U/2=0$ of a
Kondo insulator model depicted in Fig. 8 and $V_{l}/t=0.5$ for a stripe width
of $N_{x}=50$. The inset on the left hand side reveals the small hybridization
gap and the insulating behavior. Clearly visible are the two metallic surface
bands that are not crossing each other, one for positive and one for negative
$k_{y}$. (b) Probability of the edge $f$ and $c$ orbital contribution at the
Fermi-energy to the metallic band as function of $V/t$. The inset depicts this
probability contribution for $V/t=1$ as function of the site along the x-axis
on a logarithmic scale.
In case of a finite $N_{y}$ the conventional Lieb-Mattis theorem needs to be
applied. In analogy to the conventional Kondo insulator, removing a single
orbital always leads to a change of the ground state multiplet and, hence,
starting from $S^{\rm tot}_{z}=0$ results in $S^{\rm tot}_{z}=1/2$, indicating
$\rho^{f/c}_{l}(\omega=0)=0$. In order to clarify the existence of a gapped
$f$-spectra at the boundary in the continuum limit $N_{y}\to\infty$, we invoke
the arguments of the extended Lieb-Mattis theorem as outlined before. In a
first step we neglect the two edge stripes of uncorrelated orbitals such that
the model results in the conventional Kondo insulator, and a $S^{\rm
tot}_{z}=1/2$ ground state emerges after removing one of the $f$-orbitals at
an arbitrary site (not only at the boundary). However, after including the
uncorrelated edge stripes the extended Lieb-Mattis theorem predicts a
reduction of the moment to $S^{\rm tot}_{z}=0$ which proves an effective
antiferromagnetic coupling of the induced local moment and the 1d edge strip
when recovering the original model as depicted in Fig. 8: The ground state
remains in the SC FP from which we conclude that all the $f$-spectra must be
metallic, $\rho^{f}_{l}(\omega=0)>0$.
Since we expect an exponential suppression of the metallic states in the bulk,
that is beyond the extended Lieb-Mattis theorem which only distinguishes
between $\rho^{f}_{l}(\omega=0)>0$ and $\rho^{f}_{l}(\omega=0)=0$, this
strongly indicates that even for an infinitely large system adding a layer of
uncorrelated orbitals immediately yields a metallic surface even in a
conventional Kondo insulator.
Here the metallic behavior is driven by the Kondo effect, while the gap-
formation in the Kondo insulator is more related to a self-screening mechanism
driven by the RKKY interaction than to a picture of a single ion Kondo effect.
This leaves the question of the role of the correlations and in more details
the properties of the uncorrelated surface orbital defining the two vertical
surface boundaries in Fig. 8. By making use of the adiabatic connection of the
ground state properties upon varying the parameter strength we can answer some
aspects by sending the local hybridization $V_{l}\to\infty$. Then the
correlated site form individual bound states with the local conduction orbital
comparable with an infinitely strong Kondo coupling. Consequently, two
uncorrelated 1d surface tight binding models emerge which show trivial
metallic behavior determined by the tight-binding model of the edge states.
This metallic behavior will be preserved for finite $V_{l}$ and we end up with
a trivial metallic surface for arbitrary $V_{l}$ but with an unclear mixture
of the different orbitals.
We tested this prediction by considering the mean-field theory, i. e. setting
$\tilde{\epsilon}^{f}=\epsilon^{f}+U/2$ which is equivalent to $U=0$ while
maintaining particle-hole symmetry. We solved the single-particle tight
binding model in the geometry shown in Fig. 8 for an infinitely large stripe
of width $N_{x}=50$ with periodic boundary condition in $y$-directions. The
$2N_{y}-2$ bands are depicted in Fig. 9(a) revealing an insulating behavior
with a finite band gap. $N_{y}-2$ bands lay completely below the chemical
potential $\mu=0$ and $N_{y}-2$ bands are located above it.
In addition, two non-crossing metallic bands emerge as shown in the inset of
Fig. 9(a). In order to identify the spatial location of the metallic band and
the orbital content, we plot the probability contribution of the $c$-edge
orbital at $l_{x}=1$ or $l_{x}=N_{x}$ and the $f$-edge orbital at $l_{x}=2$ or
$l_{x}=N_{x}-2$ in Fig. 9(b) as function of the hybridization strength $V$ at
the chemical potential. The inset depicts the probability contribution for
$V/t=1$ as function of $l_{x}$ on a logarithmic scale. The data reveals that
the metallic state is exponentially localized at the edge and $V/t$ determines
the mixture of $c$ and $f$ orbitals. For a small hybridization, the wide band
limit, the $f$-orbital content dominates while with increasing $V$ the
uncorrelated edge orbital increases its contribution. For $V=t$, both orbital
contribute equally. The figure also confirms the prediction made above that
for infinitely large $V$, only the uncorrelated edge orbitals contribute to
the metallic surface band close to the chemical potential. We conjecture that
this picture prevails in a model that also includes the fluctuating
contributions of the Coulomb interaction.
In addition the inset in Fig. 9(b) also reveals that the local density of
states $\rho_{l_{x},l_{y}}^{f}(0)$ and $\rho_{l_{x},l_{y}}^{c}(0)$ remain
finite in agreement with the finite $U$ extended Lieb-Mattis theorem. Our
$U=0$ analysis and the exponential localization of the metallic surface state
in the bulk also reconciles the seemingly paradox of the prediction of an
finite spectra at $\omega=0$ by the extended Lieb-Mattis theorem and the
expectation of a bulk insulator. The contribution of the metallic surface band
to the bulk spectrum at $\omega=0$ becomes exponentially small, and for
practical purposes one can not distinguish the bulk spectra from a true
insulator with vanishing spectra at $\omega=0$. Since the results for the
$U=0$ spectra is in line with the finite $U$ prediction, there is no QPT at
$U=0$ in this case which we attribute to geometric differences between
infinite and semi-infinite 2d systems. The supercell analysis in Ref. [24] is
valid in arbitrary dimensions, but relies on periodic boundary conditions in
all spatial directions.
### III.4 Real-space spectral functions for the Kondo-hole problem
Figure 10: Sketch of the geometric setup with a Kondo hole: An array of
$N_{f}=7$ correlated f-orbitals (green) are locally coupled to a 1D tight
binding chain (blue). We replace the center correlated orbital with one
uncorrelated orbital (red) and introduce $\epsilon^{h}$ as its single orbital
energy.
In this section we address the question how a Kondo-hole located at the center
of a $N_{f}=7$ MIAM cluster changes the spectral properties. The geometry of
the problem is sketched in Fig. 10. We replace the center $f$-orbital by an
uncorrelated orbital with an single-particle energy
$\epsilon^{f}_{l_{c}}=\epsilon^{h}$ and $U_{l_{c}}=0$. This allows for
modeling charge neutral substitution of Ce by La which has a finite
$4f$-orbital energy $\epsilon^{h}\geq 0$ up to complete removing the site by
setting $\epsilon^{h}\to\infty$ [24].
Figure 11: Spectral function of the outermost $f$-orbital in an $N_{f}=7$
impurity array with an uncorrelated hole-orbital in its center at
$\epsilon_{c}=0$. For the correlated $f$-orbitals
$\epsilon_{f}=-U/2=5\Gamma_{0}$ holds, and the different panels show different
onsite-energies of the hole-orbital: (a) $\epsilon^{h}/\Gamma_{0}=0.0$, (b)
$\epsilon^{h}/\Gamma_{0}=1.0$, (c) $\epsilon^{h}/\Gamma_{0}=2.0$, (d)
$\epsilon^{h}/\Gamma_{0}=2.1$, (e) $\epsilon^{h}/\Gamma_{0}=2.2$, (f)
$\epsilon^{h}/\Gamma_{0}=5.0$. The QCP occurs at around
$\epsilon^{h}_{c}/\Gamma_{0}\approx 2.25$.
Let us start with the evolution of the spectrum at the outermost f-orbital for
six different values $\epsilon^{h}/\Gamma_{0}$ plotted in Fig. 11. The initial
cluster occupation starts out at $N_{f}=7$ charges at
$\epsilon^{h}/\Gamma_{0}=0.0$ and monotonically decreases to $6$ charges for
$\epsilon^{h}\to\infty$ when the central orbital is completely unoccupied and
can be removed. Therefore, we expect that spectral weight is shifted from
$\omega<0$ to $\omega>0$ upon increasing $\epsilon^{h}$. The main shift of the
spectral weight is expected to occur for the central orbital.
The system undergoes a quantum phase transition (QPT) [24] at critical value
$\epsilon^{h}_{c}/\Gamma_{0}\approx 2.25$ from a SC FP for
$|\epsilon^{h}|<\epsilon^{h}_{c}$ to a local moment FP for
$|\epsilon^{h}|>\epsilon^{h}_{c}$in agreement with the extended Lieb-Mattis
theorem. The initial PH symmetric spectrum becomes PH asymmetric for
$\epsilon^{h}>0$. The screening temperature $T_{0}$ is exponentially
suppressed at $\epsilon^{h}_{c}$, typical for a Kosterlitz-Thouless type
transition, and the very narrow Kondo peak developing at $\omega=0$ becomes
numerically not resolvable when approaching the QPT, i. e.
$\epsilon^{h}\to[\epsilon^{h}_{c}]^{-}$. However, the boundary or surface
spectrum remains metallic at any time.
Figure 12: Same as Fig. 11 but for the second $f$-orbital.
The situation changes when inspecting the spectral evolution for the second
correlated orbital $l=2$ as depicted in Fig. 12 for the same parameters as in
the previous figure. As in Fig. 4(b), the spectra vanishes at $\omega=0$ for
$\epsilon^{h}=0$ 111Note that $U_{l_{c}}=0$ in this case in contrary to Fig.
4. Therefore, the $\epsilon^{h}=0$ spectra at different sites are not fully
identical to those plotted in Fig. 4.. Also the extended Lieb-Mattis theorem
is not applicable for finite $\epsilon^{h}$ since the system is shifted away
from half-filling. A quasi-bound state is developing at the two adjacent sites
to the Kondo hole, $l=3$ and $l=5$, whose local moment is screened via a
coupling mediated by the central uncorrelated Kondo hole orbital. Once the
low-energy (Kondo) scale is small enough, a very narrow Kondo peak develops
inside of the gap as can be seen in Fig. 12(c). Furthermore, the pseudo-gap is
absent ,and $\rho^{f}_{2,\sigma}(0)>0$. This additional Kondo effect well
below the coherent temperature of the $N_{f}=7$ cluster destroys the Kondo
insulator properties in the spectra. The system approaches the KT type QPT
when increasing $\epsilon^{h}\to\epsilon^{h}_{c}$. The low temperature
screening scale is already exponentially suppressed in Fig. 12(e) such that
the peak is very hard to resolve. In the local moment phase, depicted in Fig.
12(f) the Kondo peak is absent in the spectrum leaving us with a slightly
asymmetric spectrum with an onset of a pseudo-gap. For
$\epsilon^{h}\to\infty$, we recover a half-filled system with one correlated
site removed. The extended Lieb-Mattis theorem predicts a true pseudo-gap
spectrum with $\rho_{2,\sigma}^{f}(0)=0$, consistent with the spectrum in the
local moment phase as depicted in Fig. 12(f). Note, however, that
$\rho_{2,\sigma}^{f}(0)$ is very small at finite $\epsilon^{h}$ and only
vanishes in the limit $\epsilon^{h}\to\infty$ where the extended Lieb-Mattis
theorem is applicable.
Figure 13: Evolution of $\rho_{3,\sigma}^{f}(\omega)$ neighboring the hole
site for the same parameters as in Fig. 11.
Figure 13 shows the evolution of spectra for the third side using the same
parameters as in the previous two figures. On top of a spectral valley around
$\omega=0$ with $\rho_{3,\sigma}^{f}(0)>0$, a Kondo peak emerges at $\omega=0$
due to the screening of local moment that is created by the Kondo hole as long
as $\epsilon^{h}<\epsilon^{h}_{c}$. This Kondo peak also disappears at the QPT
once we enter the local moment regime. However, an additional finite frequency
peak is clearly visible at finite but small $\omega$ in the spectral function
plotted in Fig. 13(f) whose origin we discuss below.
Figure 14: Evolution of the Kondo hole spectrum $\rho_{4,\sigma}^{f}(\omega)$
in the cluster center for the same parameters as in Fig. 11.
With this basic understanding of spectral evolution we draw our attention to
the spectrum at the Kondo hole site hosting an uncorrelated $f$-orbital whose
single-particle energy is increased across the KT-type transition in the
panels from Fig. 14(a) to Fig. 14(f) using the same parameters as for the
previous three figures. Starting from a PH symmetric spectrum with a gap, i.
e. $\rho_{4,\sigma}^{f}(0)=0$, for $\epsilon^{h}=0$ the spectrum becomes
increasing more asymmetric, and the gap disappears. We also observe the
substantial shift of the spectral weight from below to above the chemical
potential reflecting that the Kondo hole occupations is rapidly and
monotonically decreasing for $1<\epsilon^{h}/\Gamma_{0}\to\infty$. In fact,
the crossover from half-filling to an empty orbital occurs just before
$\epsilon^{h}_{c}$ but does not coincide with the QPT.
Starting from Fig. 14(c) the main single-particle spectral peak from the local
orbital is clearly visible at $0<\omega\approx\epsilon^{h}$. Simultaneously
the spectrum show and additional peak that crosses the Fermi-energy just below
the critical value $\epsilon^{h}_{c}$. Its spectral contribution is small and
is overshadowed by a very narrow Kondo resonance that disappears in the local
moment regime depicted in Fig. 14(f).
Figure 15: Zoom of the spectral functions around the Fermi energy near the QCP
located at $\epsilon^{h}_{c}/\Gamma_{0}\approx 2.25$. (a) $l=1$, (b) $l=2$,
(c) $l=3$, (d) $l=l_{c}=4$.
In order to address the spectral evolution across the QPT in more detail, we
focus on the low-energy part of the site-dependent spectra for three values
$\epsilon^{h}/\Gamma_{0}=2.1,2.2,2.3$ and combine the three spectra for each
cluster site into one panel of Fig. 15, starting from the outermost site $l=1$
in Fig. 15(a) and ending at the center site $l_{c}=4$ plotted in Fig. 15(d).
We clearly see the Kondo resonances at each site pinned at $\omega=0$ which is
a result of the screening of the cluster local moment. The peak height depends
on the contribution of the local site to this Kondo effect, and the resonance
is absent in the LM FP.
In addition, we observe an broader resonance just above the Fermi energy most
pronounced in the spectra around the Kondo hole as plotted in Fig.
15(c)$+$(d). In order to clarify its origin, we performed an exact
diagonalization of the MIAM Kondo-hole cluster by just taking into account the
inter-site hopping generated by
$\bm{T}_{\sigma}=\Re\bm{\Delta}_{\sigma}(-i0^{+})$ and ignoring the coupling
to the effective band continua setting $\bm{\Gamma}_{\sigma}=0$. It turns out
that upon raising of $\epsilon^{h}$ a low lying excitation in the spectrum is
crossing the Fermi-energy and simultaneously the cluster occupation on the
$f$-sites decreases from $N=7$ to $N=6$ charges. This sharp cluster excitation
is broadened by including the hybridization $\bm{\Gamma}$ to the broader peaks
located around $0.1<\omega/\Gamma_{0}<0.3$. Therefore, this is a contribution
from a collective excitation within the effective MIAM cluster.
The QPT, however does not occur exactly at this mixed valence point between
$N=6$ and $N=7$: It is energetically more favorable to form a SC FP and pay
some extra single particle energy $\epsilon^{h}$ as long as the energy gain in
spin screening energy as well as the gain in hybridization energy is larger
than the energy loss by the virtual occupation of the Kondo hole orbital. Such
behavior is typical for a QPT changing the ground state degeneracy and has
been discussed in the context of a chemically driven quantum phase transition
in a two-molecule Kondo system [56]. This energy argument explains why the
orbital peak and the peak of low-lying cluster excitation is observed at
$\omega>0$ and still a Kondo effect is formed.
## IV Conclusion
In this paper we studied the spectral properties of dense 1d MIAM comprising
up to $N_{f}=7$ correlated orbitals using NRG in combination with a recently
developed wide band approximation [4]. We focused on the parameter regime with
a half filled conduction band such that the model describes a Kondo insulator
in the limit $N_{f}\to\infty$ when maintaining PH symmetry.
Increasing $N_{f}$ a dip in the spectra of the central sites develops rapidly,
leading to a full gap already for $N_{f}=3$. This rapid onset of heavy Fermion
formation is in agreement with QMC calculations [22] for a finite size Kondo
cluster on a 2d square lattice and is caused by the crossover from a MIAM of
the first kind to a MIAM of the second kind [4].
In case of $N_{f}=7$ the gap width in the spectral function of the central
orbitals already agrees astonishing well with a full DMFT(NRG) calculation for
a Kondo lattice with a Kondo coupling obtained from a Schrieffer-Wolff
transformation of the corresponding SIAM for $N_{f}=1$.
Using two techniques, (i) a supercell analysis for the uncorrelated limit and
(ii) the extended Lieb-Mattis theorem for the strongly interacting and PH
symmetric MIAM on a bi-partite lattice, which originally were developed in
order to make a statement on the nature of the ground state in a Kondo hole
problem [24], we predicted the essential feature of the spectra at the Fermi
energy of an orbital at an arbitrary site $l$: If the degeneracy of the ground
state is enhanced by removing that orbital the spectra needs to be fully
gapped, $\rho_{l}(\omega=0)=0$, whereas it is finite if the degeneracy remains
constant, $\rho_{l}(\omega=0)>0$. These predictions are in perfect agreement
with our 1d NRG calculations and can be summarized as follows: (i) The spectra
of the $f$-orbitals at the edge of the impurity array are always metallic,
independent of the strength of correlations. (ii) In case of nearest neighbor
hopping between the $c$-orbitals, the remaining spectra are fully gapped at
$\omega=0$ in the uncorrelated limit, according to the supercell analysis.
(iii) In the strongly interacting limit either all of the $f$-orbitals acquire
a finite spectra at $\omega=0$ if the finite size $c$-$f$-orbital cluster is
coupled to both of the sublattices of the remaining continuum, or the
$\omega=0$ spectra oscillates as function of the sublattice index otherwise.
Note that our numerical results demonstrate a rapid decrease of
$\rho(\omega=0)$ with increasing distance to the boundary of the $f$-orbital
array such that a fully gapped bulk will be restored in the limit
$N_{f}\to\infty$.
The finding of metallic surface states in the MIAM is in agreement with recent
QMC calculations [22] for a finite size Kondo cluster on a 2d square lattice,
however, the oscillations of the spectra at $\omega=0$ in the bulk have not
been reported, even if the Kondo cluster only couples to one sublattice of the
remaining continuum.
Since the experimental observation of metallic surface states in Kondo
insulators triggered a lot of theoretical research with the focus on
topological protection protected mechanisms caused by spin-orbit coupling, the
finding of such states in the MIAM naturally raised the question, of how many
additional uncorrelated $c$-orbitals are needed in an extension of the
conventional Kondo insulator description to obtain a metallic surface. Using
the Lieb-Mattis theorem in combination with a mean-field calculation we
demonstrated that the removal of only the outermost $f$-orbitals in a 2d Kondo
insulator is sufficient to realize a metallic band that is exponentially
localized at the boundary.
We studied the change in the site dependent spectra upon introducing a Kondo
hole in the center of a $N_{f}=7$ cluster model. Shifting the onsite energy
$\epsilon^{h}$ of the uncorrelated hole orbital from $\epsilon^{h}=0$ to
$\epsilon^{h}=\infty$, the model undergoes a Kosterlitz-Thouless type quantum
phase transition at a critical $\epsilon^{h}_{c}$ which is in accordance with
the extended Lieb-Mattis theorem [24]. For $\epsilon^{h}\to\epsilon^{h}_{c}$ a
Kondo resonance develops inside the gap of all $f$-orbitals in the cluster,
whose width gets exponentially suppressed at the QCP. In addition a collective
excitation is observed in form of a sharp resonance that crosses the Fermi
energy already for $\epsilon^{h}<\epsilon^{h}_{c}$ and signals the reduction
of charge carriers by one due to the removal of the hole orbital.
###### Acknowledgements.
The authors would like to thank fruitful discussion with Fakher Assaad.
## References
* Jones and Varma [1987] B. A. Jones and C. M. Varma, Study of two magnetic impurities in a fermi gas, Phys. Rev. Lett. 58, 843 (1987).
* Ingersent _et al._ [1992] K. Ingersent, B. A. Jones, and J. W. Wilkins, Study of the two-impurity, two-channel kondo hamiltonian, Phys. Rev. Lett. 69, 2594 (1992).
* Grewe and Steglich [1991] N. Grewe and F. Steglich, Heavy fermions, in _Handbook on the Physics and Chemistry of Rare Earths_ , Vol. 14, edited by K. A. Gschneidner, Jr. and L. Eyring (North-Holland, Amsterdam, 1991) p. 343.
* Eickhoff and Anders [2020] F. Eickhoff and F. B. Anders, Strongly correlated multi-impurity models: The crossover from a single-impurity problem to lattice models, Phys. Rev. B 102, 205132 (2020).
* Maple _et al._ [1995] M. B. Maple, M. C. de Andrade, J. Herrmann, Y. Dalichaouch, D. A. Gajewski, C. L. Seaman, R. Chau, R. Movshovich, M. C. Aronson, and R. Osborn, Non fermi liquid ground states in strongly correlated f-electron materials, J. Low Temp. Phys. 99, 223 (1995).
* Grewe [1984] N. Grewe, One particle excitation spectrum of the Kondo-lattice, Solid State Communications 50, 19 (1984).
* Steglich _et al._ [1979] F. Steglich, J. Aarts, C. D. Bredl, W. Lieke, D. Meschede, W. Franz, and H. Schäfer, Superconductivity in the Presence of Strong Pauli Paramagnetism: CeCu2Si2, Phys. Rev. Lett. 43, 1892 (1979).
* Löhneysen _et al._ [2007] H. v. Löhneysen, A. Rosch, M. Vojta, and P. Wölfle, Fermi-liquid instabilities at magnetic quantum phase transitions, Rev. Mod. Phys. 79, 1015 (2007).
* Kasaya _et al._ [1985] M. Kasaya, F. Iga, M. Takigawa, and T. Kasuya, Mixed valence properties of YbB12, Journal of Magnetism and Magnetic Materials 47-48, 429 (1985).
* Kasuya [1996] T. Kasuya, Physical Mechanism in Kondo Insulator, Journal of the Physical Society of Japan 65, 2548 (1996).
* Hlawenka _et al._ [2018] P. Hlawenka, K. Siemensmeyer, E. Weschke, A. Varykhalov, J. Sánchez-Barriga, N. Shitsevalova, A. Dukhnenko, V. Filipov, S. Gabáni, K. Flachbart, O. Rader, and E. Rienks, Samarium hexaboride is a trivial surface conductor, Nat Commun 9, 517 (2018).
* Kim _et al._ [2014] D. Kim, J. Xia, and Z. Fisk, Topological surface state in the Kondo insulator samarium hexaboride., Nature Mater. 13, 466 (2014).
* Park _et al._ [2016] W. K. Park, L. Sun, A. Noddings, D.-J. Kim, Z. Fisk, and L. H. Greene, Topological surface states interacting with bulk excitations in the Kondo insulator SmB6 revealed via planar tunneling spectroscopy, Proceedings of the National Academy of Sciences 113, 6599 (2016).
* Antonov _et al._ [2002] V. N. Antonov, B. N. Harmon, and A. N. Yaresko, Electronic structure of mixed-valence semiconductors in the $\mathrm{LSDA}+U$ approximation. II. ${\mathrm{SmB}}_{6}$ and ${\mathrm{YbB}}_{12}$, Phys. Rev. B 66, 165209 (2002).
* Lu _et al._ [2013] F. Lu, J. Zhao, H. Weng, Z. Fang, and X. Dai, Correlated topological insulators with mixed valence, Phys. Rev. Lett. 110, 096401 (2013).
* Hasan and Kane [2010] M. Z. Hasan and C. L. Kane, Colloquium: Topological insulators, Rev. Mod. Phys. 82, 3045 (2010).
* Dzero _et al._ [2010] M. Dzero, K. Sun, V. Galitski, and P. Coleman, Topological Kondo Insulators, Phys. Rev. Lett. 104, 106408 (2010).
* Alexandrov _et al._ [2013] V. Alexandrov, M. Dzero, and P. Coleman, Cubic Topological Kondo Insulators, Phys. Rev. Lett. 111, 226403 (2013).
* Werner and Assaad [2013] J. Werner and F. F. Assaad, Interaction-driven transition between topological states in a Kondo insulator, Phys. Rev. B 88, 035113 (2013).
* Peters _et al._ [2016] R. Peters, T. Yoshida, H. Sakakibara, and N. Kawakami, Coexistence of light and heavy surface states in a topological multiband Kondo insulator, Phys. Rev. B 93, 235159 (2016).
* Kuramoto [1985] Y. Kuramoto, in _Theory of Heavy Fermions and Valence Fluctuations_ , edited by T. Kasuya and T. Saso (Springer Verlag, Berlin, 1985) p. 152.
* Raczkowski and Assaad [2019] M. Raczkowski and F. F. Assaad, Emergent Coherent Lattice Behavior in Kondo Nanosystems, Phys. Rev. Lett. 122, 097203 (2019).
* Shen [1996] S.-Q. Shen, Total spin and antiferromagnetic correlation in the Kondo model, Phys. Rev. B 53, 14252 (1996).
* Eickhoff and Anders [2021] F. Eickhoff and F. B. Anders, Kondo holes in strongly correlated impurity arrays: RKKY-driven Kondo screening and hole-hole interactions, Phys. Rev. B 104, 045115 (2021).
* Wilson [1975] K. G. Wilson, The renormalization group: Critical phenomena and the Kondo problem, Rev. Mod. Phys. 47, 773 (1975).
* Bulla _et al._ [2008] R. Bulla, T. A. Costi, and T. Pruschke, The numerical renormalization group method for quantum impurity systems, Rev. Mod. Phys. 80, 395 (2008).
* Georges _et al._ [1996] A. Georges, G. Kotliar, W. Krauth, and M. J. Rozenberg, Dynamical mean-field theory of strongly correlated fermion systems and the limit of infinite dimensions, Rev. Mod. Phys. 68, 13 (1996).
* Kotliar and Vollhardt [2004] G. Kotliar and D. Vollhardt, Strongly correlated materials: Insights from dynamical mean field theory, Physics Today 57, 53 (2004).
* Nozières [1985] P. Nozières, Ann. Phys. (Paris) 10, 19 (1985).
* Grewe [1988] N. Grewe, On the competition between magnetic and Fermi liquid phases in Kondo lattices, Solid State Commun. 66, 1053 (1988).
* Sollie and Schlottmann [1991] R. Sollie and P. Schlottmann, A simple theory of the Kondo hole, Journal of Applied Physics 69, 5478 (1991).
* Bulla _et al._ [1998] R. Bulla, A. C. Hewson, and T. Pruschke, Numerical renormalization group calculations for the self-energy of the impurity Anderson model, J. Phys.: Condens. Matter 10, 8365 (1998).
* Jabben _et al._ [2012] T. Jabben, N. Grewe, and S. Schmitt, Spectral properties of the two-impurity Anderson model with varying distance and various interactions, Phys. Rev. B 85, 045133 (2012).
* Schrieffer and Wolff [1966] J. R. Schrieffer and P. A. Wolff, Relation between the Anderson and Kondo Hamiltonians, Phys. Rev. 149, 491 (1966).
* Peters _et al._ [2006] R. Peters, T. Pruschke, and F. B. Anders, A Numerical Renormalization Group approach to Green’s Functions for Quantum Impurity Models, Phys. Rev. B 74, 245114 (2006).
* Weichselbaum and von Delft [2007] A. Weichselbaum and J. von Delft, Sum-rule conserving spectral functions from the numerical renormalization group, Phys. Rev. Lett. 99, 076402 (2007).
* Anders and Schiller [2005] F. B. Anders and A. Schiller, Time-dependent numerical renormalization group approach to non-equilibrium dynamics of quantum impurity systems, Phys. Rev. Lett. 95, 196801 (2005).
* Anders and Schiller [2006] F. B. Anders and A. Schiller, Spin precession and real-time dynamics in the Kondo model: Time-dependent numerical renormalization-group study, Phys. Rev. B 74, 245113 (2006).
* Affleck _et al._ [1995] I. Affleck, A. W. W. Ludwig, and B. A. Jones, Conformal-field-theory approach to the two-impurity Kondo problem: Comparison with numerical renormalization-group results, Phys. Rev. B 52, 9528 (1995).
* Lechtenberg _et al._ [2017] B. Lechtenberg, F. Eickhoff, and F. B. Anders, Realistic quantum critical point in one-dimensional two-impurity models, Phys. Rev. B 96, 041109 (2017).
* Eickhoff _et al._ [2018] F. Eickhoff, B. Lechtenberg, and F. B. Anders, Effective low-energy description of the two-impurity Anderson model: RKKY interaction and quantum criticality, Phys. Rev. B 98, 115103 (2018).
* Pruschke _et al._ [2000] T. Pruschke, R. Bulla, and M. Jarrell, Low-energy scale of the periodic Anderson model, Phys. Rev. B 61, 12799 (2000).
* Withoff and Fradkin [1990] D. Withoff and E. Fradkin, Phase transitions in gapless fermi systems with magnetic impurities, Phys. Rev. Lett. 64, 1835 (1990).
* Ingersent [1996] K. Ingersent, Behavior of magnetic impurities in gapless fermi systems, Phys. Rev. B 54, 11936 (1996).
* Fritz and Vojta [2004] L. Fritz and M. Vojta, Phase transitions in the pseudogap Anderson and Kondo models: Critical dimensions, renormalization group, and local-moment criticality, Phys. Rev. B 70, 214427 (2004).
* Yu [1996] C. C. Yu, Numerical renormalization-group study of a Kondo hole in a one-dimensional Kondo insulator, Phys. Rev. B 54, 15917 (1996).
* Titvinidze _et al._ [2014] I. Titvinidze, A. Schwabe, and M. Potthoff, Ferromagnetism of magnetic impurities coupled indirectly via conduction electrons: Insights from various theoretical approaches, Phys. Rev. B 90, 045112 (2014).
* Yazyev and Helm [2007] O. V. Yazyev and L. Helm, Defect-induced magnetism in graphene, Phys. Rev. B 75, 125408 (2007).
* Palacios _et al._ [2008] J. J. Palacios, J. Fernández-Rossier, and L. Brey, Vacancy-induced magnetism in graphene and graphene ribbons, Phys. Rev. B 77, 195428 (2008).
* Uchoa _et al._ [2008] B. Uchoa, V. N. Kotov, N. M. R. Peres, and A. H. Castro Neto, Localized Magnetic States in Graphene, Phys. Rev. Lett. 101, 026805 (2008).
* Chen _et al._ [2014] J.-J. Chen, H.-C. Wu, D.-P. Yu, and Z.-M. Liao, Magnetic moments in graphene with vacancies, Nanoscale 6, 8814 (2014).
* Jiang _et al._ [2018] Y. Jiang, P.-W. Lo, D. May, G. Li, G.-Y. Guo, F. B. Anders, T. Taniguchi, K. Watanabe, J. Mao, and E. Y. Andrei, Inducing Kondo screening of vacancy magnetic moments in graphene with gating and local curvature, Nature Communications 9, 2349 (2018).
* May _et al._ [2018] D. May, P.-W. Lo, K. Deltenre, A. Henke, J. Mao, Y. Jiang, G. Li, E. Y. Andrei, G.-Y. Guo, and F. B. Anders, Modeling of the gate-controlled Kondo effect at carbon point defects in graphene, Phys. Rev. B 97, 155419 (2018).
* Costa _et al._ [2018] N. C. Costa, M. V. Araújo, J. P. Lima, T. Paiva, R. R. dos Santos, and R. T. Scalettar, Compressible ferrimagnetism in the depleted periodic Anderson model, Phys. Rev. B 97, 085123 (2018).
* Note [1] Note that $U_{l_{c}}=0$ in this case in contrary to Fig. 4. Therefore, the $\epsilon^{h}=0$ spectra at different sites are not fully identical to those plotted in Fig. 4.
* Esat _et al._ [2016] T. Esat, B. Lechtenberg, T. Deilmann, ChristianWagner, P. Krüger, R. Temirov, M. Rohlfing, F. B. Anders, and F. S. Tautz, A chemically driven quantum phase transition in a two-molecule Kondo system, Nature Physics 12, 8 (2016).
| arxiv-papers | 2021-07-27T12:37:42 | 2024-09-04T03:07:21.492100 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Fabian Eickhoff and Frithjof B. Anders",
"submitter": "Frithjof Anders",
"url": "https://arxiv.org/abs/2107.12777"
} |
2107.12785 |
A mechanistic model for airborne and direct human-to-human transmission of COVID-19: Effect of mitigation strategies and immigration of infectious persons
mymainaddress]Saheb [email protected]
mysecondaryaddress]Indrajit Ghoshmycorrespondingauthor[mycorrespondingauthor]Corresponding [email protected]
[mymainaddress]Department of Mathematics, Visva-Bharati, Santiniketan-731235, India
[mysecondaryaddress]Department of Computational and Data Sciences, Indian Institute of Science,
Bangalore - 560012, Karnataka, India
The COVID-19 pandemic is the most significant global crisis since World War II that affected almost all the countries of our planet. To control the COVID-19 pandemic outbreak, it is necessary to understand how the virus is transmitted to a susceptible individual and eventually spread in the community. The primary transmission pathway of COVID-19 is human-to-human transmission through infectious droplets. However, a recent study by Greenhalgh et al. (Lancet: 397:1603-1605, 2021) demonstrates 10 scientific reasons behind the airborne transmission of SARS-COV-2. In the present study, we introduce a novel mathematical model of COVID-19 that considers the transmission of free viruses in the air beside the transmission of direct contact with an infected person. The basic reproduction number of the epidemic model is calculated using the next-generation operator method and observed that it depends on both the transmission rate of direct contact and free virus contact. The local and global stability of disease-free equilibrium (DFE) is well established. Analytically it is found that there is a forward bifurcation between the DFE and an endemic equilibrium using central manifold theory. Next, we used the nonlinear least-squares technique to identify the best-fitted parameter values in the model from the observed COVID-19 mortality data of two major districts of India. Using estimated parameters for Bangalore urban and Chennai, different control scenarios for mitigation of the disease are investigated. Results indicate that the vaccination of susceptible individuals and treatment of hospitalized patients are very crucial to curtail the disease in the two locations. It is also found that when a vaccine crisis is there, the public health authorities should prefer to vaccinate the susceptible people with compared to the recovered persons who are now healthy. Along with face mask use, treatment of hospitalized patients and vaccination of susceptibles, immigration should be allowed in a supervised manner so that economy of the overall society remain healthy.
COVID-19; Airborne transmission; Compartmental model; Mathematical analysis; Mitigation strategies.
§ INTRODUCTION
The current outbreak of coronavirus disease 2019 (COVID-19) has significantly affected public health and the economy worldwide. As of 31 May 2021, more than 171 million COVID-19 cases and 3 million deaths have been reported globally [1]. COVID-19 is an emerging respiratory infectious disease that was first detected in early December 2019 in Wuhan, China. The virus that causes COVID-19 is severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), which spread rapidly throughout the globe. The World Health Organization (WHO) initially declared the COVID-19 outbreak as a public health emergency of international concern but with the spread across and within countries leading to a rapid increase in the number of cases, the outbreak was officially declared a global pandemic on 11 March 2020 [44]. Given the global scenario on the series of waves and unprecedented strains of COVID-19, there is a need for more investigation to timely and effectively curtail the spread of the disease.
Mathematical modelling is a very versatile and effective instrument for understanding infectious disease transmission dynamics and helps us to develop preventive measures for controlling the infection spread both qualitatively and quantitatively. To model the epidemiological data of infectious diseases, compartmental models are widely used due to their simplicity and well-studied applications [17]. In this regard, the recent epidemiological threat of COVID-19 is not an exception. In such types of models, the population is categorized into several classes, or compartments, based on the stage of the infection that is affecting them. These models are governed by a system of ordinary differential equations that take into account the time-discoursed infection status of the population compartments. Wu et al. [46] first developed a mathematical model for COVID-19 which is based on SEIR (Susceptible-Exposed-Infectious-Recovered) model and explains the transmission dynamics and estimate the national and global spread of COVID-19. After that, various mathematical models were proposed by considering several stages of susceptible and infected populations [49, 25, 11, 34]. Many researchers studied the dynamics of COVID-19 using real incidence data of the affected countries and examined different characteristics of the outbreak as well as evaluated the effect of intervention strategies implemented to suppress the outbreak in respective countries [49, 11].
Presently, the second wave of COVID-19 is affecting most of the countries in the world. In a densely populated country like India, this scenario is more threatening. On April 15, 2021, the daily cases of COVID-19 were double the first peak. However, The epidemic evolution of the country is quite complex due to regional inhomogeneities. Thus, governments of various states in India are adopting different strategies to control the outbreak, such as wearing masks, vaccination drives, social distancing guidelines, partial lockdowns, and restricted store hours in place. Thus, gaining an understanding of how this outbreak spread in the form of waves and possible interventions on a short-term basis is urgent. As of 31 May 2021, more than 28 million COVID-19 cases and more than 331 thousand deaths are reported in India [2]. We have chosen to concentrate on two major districts namely, Bangalore urban and Chennai of India for our case studies. These two districts are very crucial hubs of south India and are experiencing a severe second wave of COVID-19. Additionally, taking small regions is also necessary to make reliable projections using mechanistic mathematical models. Due to the small area and populations, it is also easy to implement and supervise specific control measures.
As a case study in India, several researchers proposed models that are fitted to the daily COVID-19 cases and deaths, and examined different control strategies [23, 31, 28, 33, 34, 15]. Some of the studies explore the vaccine allocation strategy in India due to limited supply and to support relevant policies [14]. However, none of the above studies has considered the airborne transmission of the SARS-COV-2 virus in their respective models with application to Indian districts.
To control a pandemic outbreak, it is necessary to understand how the virus transmits to a susceptible individual and eventually spreads in the community. The primary transmission pathway of COVID-19 is human-to-human propagation through infectious droplets [42]. However, a recent study of Greenhalgh et al. [16] suggests that SARS-COV-2 can be transmitted through the air and they showed 10 scientific reasons behind this. Later on, Addleman et al. [6] commented that Canadian public health guidance and policies should be updated to address the airborne mode of transmission. The authors also suggested that addressing airborne transmission requires the expertise of interdisciplinary teams to inform solutions that can end this pandemic faster. Motivated by these scientific pieces of evidence, we consider a compartmental model of SEIR-type including shedding of free virus in the air by infectious persons. To the best of our knowledge, this is the first modelling study that considers the airborne transmission of COVID-19 with applications to Indian districts. We consider that the susceptible population becomes exposed in two different ways: firstly through direct contact with an infected population or touches a surface that has been contaminated. This transmission also occurs through large and small respiratory droplets that contain the virus, which would occur when near an infected person. The next is through the airborne transmission of smaller droplets and particles that are suspended in the air over longer distances and time [13]. We also study the effect of immigration along with popular control strategies. The main focus of our study is to explore the following epidemiological issues:
* Mathematically analyze the COVID-19 transmission dynamics by incorporating the airborne pathway of free SARS-CoV-2 virus into the model structure.
* Impact of anti-COVID drugs on the reduction of hospitalized persons.
* Individual and combined effects of various control measures (use of face mask, vaccination) as well as immigration of infectious persons on the COVID-19 pandemic.
The remainder of this paper is organized as follows. In the next section, we propose a deterministic compartmental model to describe the disease transmission mechanism. We consider the amount of free virus in the air as a dynamic variable. Section <ref> describes the theoretical analysis of the model, which incorporates the existence of positive invariance region, boundedness of solutions, computation of the basic reproduction number, and stability of disease-free equilibrium. Also, in this section, the existence of forward bifurcation of the model system is explored. In Section <ref>, we fit the mathematical model using nonlinear least-squares technique from the observed mortality data and estimate unknown parameters. Section <ref> describe several control mechanisms and immigration of infectives through numerical simulation. We examine the effects of vaccination, treatment by drugs, and use of face masks with different degrees of efficacy as intervention strategies. Finally, in Section <ref> we discuss the findings and some concluding remarks about mitigation strategy obtained from our study.
§ MODEL DESCRIPTION
To design the basic mathematical model for COVID-19 transmission dynamics, some general epidemiological factors are considered including the airborne transmission of the free virus. Several studies of novel corona virus suggest that an infected person can be asymptomatic (infectious but not symptomatic) or symptomatic with small, moderate, severe, or critical symptoms [43, 48, 21, 47]. For simplicity of model formulation, we break the infected individuals in two separated classes, notified and un-notified. Here, the un-notified class contains untested asymptomatic, asymptomatic who are tested negative, untested symptomatic, and symptomatic who are tested negative, whereas notified class contains those symptomatic and asymptomatic persons who are tested COVID-19 positive. Population among both the notified and un-notified class can be hospitalized, when they have a critical health situation. Thus the entire population can be stratified into six main compartments based on the status of the disease: susceptible ($S(t)$), exposed ($E(t)$), un-notified ($I_u(t)$), notified ($I_n(t)$), hospitalized ($I_h(t)$), and recovered ($R(t)$), at time $t$. Consequently, the total population size is given by $N(t)=S(t)+E(t)+I_u(t)+I_n(t)+I_h(t)+R(t)$. In addition, $V(t)$ describes the amount of free virus in the environment.
Now, we consider individuals from each human class have a per capita natural mortality rate $\mu$. The net influx rate of susceptible population per unit time is $\Pi$. This parameter includes new births, immigration, and emigration of susceptible persons. Also, the susceptible population decrease after infection, acquired through the direct contact of notified or un-notified infected individuals. Let $\beta_1$ be the transmission rate for direct contact with the modification factor $\nu$ for notified infected individuals. Then $\nu\in(0,1)$, since the notified persons are advised to take preventive measures like face mask use, social distancing more seriously. In addition, the susceptible population is infected through the contact of the free virus in air [16, 6]. Let $\beta_2$ be the transmission rate for free virus contact. The interaction of susceptible individuals with infected individuals (un-notified or notified) follows standard mixing incidence and with free virus follows mass action incidence. For basic details and difference between standard mixing incidence and mass action incidence, interested readers are referred to Martcheva's book ([24]; Chap. 3). Then the differential equation that describes the rate of change of susceptible individuals at time $t$, is given by
$$\displaystyle{\od{S}{t}} =\Pi-\frac{\beta_1 S( I_u+ \nu I_n)}{N} - \beta_2 SV -\mu S + \theta R.$$
Here, $\theta$ be the rate at which recovered individuals eventually lose the temporal immunity from the infection and become susceptible [32, 14].
Schematic diagram of the proposed model. Solid arrows represent the transmission rate from one compartment to other, whereas dashed arrows represent interaction between compartments.
Alongside, the exposed population ($E(t)$) who are infected individuals, however still not infectious for the community. By making successful contact with infectives, susceptible individuals become exposed. Also, these people decreases at a rate $\gamma$ and become notified or un-notified. The probability that exposed individuals progress to the notified infectious class is $p$ and that of un-notified class is $1-p$. This assumption leads to the following rate of change in $E$:
$$\displaystyle{\od{E}{t}} = \frac{\beta_1 S( I_u+ \nu I_n)}{N} + \beta_2 SV - (\gamma + \mu) E. $$
The un-notified individuals ($I_u$), who are transferred from exposed class at a rate $(1-p)\gamma$ are the population who are un-notified from COVID-19 disease. Also, the un-notified individuals progress to hospitalized class at a rate $\eta_u$ and recovered at a rate $\sigma_u$. The un-notified individuals are assumed to have no disease-induced mortality rate as most of them will not develop severe symptoms. However, if some of the un-notified persons develop sudden severe symptoms, they will be transferred to the hospital and die as a hospitalized patients. Thus, the equation governing the rate of change of un-notified persons is
$$\displaystyle{\od{I_u}{t}} =(1-p)\gamma E- (\eta_u+\sigma_u+\mu)I_u.$$
The notified individuals ($I_n$), who are transferred from exposed class at a rate $p\gamma$ are the population who are notified as COVID-19 positive people. Also, the notified individuals reduced by progressing to hospitalized class at a rate $\eta_n$, by recovery at a rate $\sigma_n$, and COVID-19 induced mortality rate $\delta_n$. Therefore we have the following equation
$$\displaystyle{\od{I_n}{t}} = p \gamma E-(\eta_n + \sigma_n + \mu + \delta_n) I_n. $$
The hospitalized individuals ($I_h$) increase from un-notified or notified people at rates $\eta_n$ or $\eta_u$, respectively. Also, this class of people recover at a rate $\sigma_h$ and decrease through COVID-19 induced mortality rate $\delta_h$. Thus, we have the following rate of change of $I_h$:
$$\displaystyle{\od{I_h}{t}} = \eta_u I_u+ \eta_n I_n - (\sigma_h + \mu + \delta_h)I_h.$$
The recovered individuals ($R$) increase by recovering from each of the infected classes (un-notified, notified and hospitalized) at rates $\sigma_u$, $\sigma_n$, and $\sigma_h$ respectively. As mentioned earlier, $\theta$ is the rate at which recovered population loss immunity against COVID-19 and becomes susceptible again. Thus, following differential equation leads to the rate of change of $R$:
$$\displaystyle{\od{R}{t}} =\sigma_u I_u+\sigma_n I_n + \sigma_h I_h - (\theta + \mu)R.$$
The differential equation describing the rate of change of free virus, increased from the shedding rate of un-notified and notified patients at rates $\alpha_u$ and $\alpha_n$, respectively with a natural clearance rate $\mu_c$. Thus
$$\displaystyle{\od{V}{t}} = \alpha_u I_u+ \alpha_n I_n - \mu_c V.$$
Fig. <ref> describes the flow patterns of individuals between compartments over time.
Assembling all the above differential equations, we have the following system
\begin{eqnarray}
\begin{cases}
\begin{array}{lll}
\displaystyle{\od{S}{t}} &=& \Pi-\frac{\beta_1 S( I_u+ \nu I_n)}{N} - \beta_2 SV -\mu S + \theta R, \\
\displaystyle{\od{E}{t}} &=& \frac{\beta_1 S( I_u+ \nu I_n)}{N} + \beta_2 SV - (\gamma + \mu) E, \\
\displaystyle{\od{I_u}{t}} &=& (1-p) \gamma E - (\eta_u + \sigma_u +\mu )I_u, \\
\displaystyle{\od{I_n}{t}} &=& p \gamma E-(\eta_n + \sigma_n + \mu + \delta_n) I_n, \\
\displaystyle{\od{I_h}{t}} &=& \eta_u I_u+ \eta_n I_n - (\sigma_h + \mu + \delta_h)I_h, \\
\displaystyle{\od{R}{t}} &=& \sigma_u I_u+\sigma_n I_n + \sigma_h I_h - (\theta + \mu)R, \\
\displaystyle{\od{V}{t}} &=& \alpha_u I_u+ \alpha_n I_n - \mu_c V.
\end{array}
\label{EQ:TheModel}
\end{cases}
\end{eqnarray}
All the parameters involved in the above system are positive. We present the parameters with their biological interpretation, dimensions and realistic values in Table <ref>.
Description of model parameters used in the model (<ref>).
Parameter Dimension Interpretation Value(s) Reference
$\Pi$ person day$^{-1}$ Recruitment rate of susceptibles $\mu \times N_{init}$ –
$\beta_1 $ day$^{-1}$ Transmission rate for direct contact (0,1) To be estimated
$\beta_2 $ copies$^{-1}$ litre day$^{-1}$ Transmission rate for free virus contact (0,1) To be estimated
$\nu$ unitless Modification factor for notified infectives 0.1852 [15]
$\theta$ day$^{-1}$ Rate at which recovered individuals lose immunity 1/365 [14]
$\mu$ day$^{-1}$ Natural mortality rate 0.3891 $\times {10}^{-4}$ [3]
$\gamma$ day$^{-1}$ Rate at which the exposed individuals are infected 0.2 [19, 20]
$\eta_u$ day$^{-1}$ Rate at which un-notified patients become hospitalized (0,1) To be estimated
$\eta_n$ day$^{-1}$ Rate at which notified patients become hospitalized (0,1) To be estimated
$p$ unitless Proportion of notified infectives 0.2 [47, 50]
$\sigma_u$ day$^{-1}$ Recovery rate of un-notified patients 0.17 [39, 45]
$\sigma_n$ day$^{-1}$ Recovery rate of notified patients 0.072 [22]
$\sigma_h$ day$^{-1}$ Recovery rate of hospitalized patients (0,1) To be estimated
$\delta_n$ day$^{-1}$ Disease induced mortality rate of notified patients 0.0017 [15]
$\delta_h$ day$^{-1}$ Disease induced mortality rate of hospitalized patients (0,1) To be estimated
$\alpha_u$ copies litre$^{-1}$ person$^{-1}$ day$^{-1}$ Virus shedding rate of un-notified patients (0,10) To be estimated
$\alpha_n$ copies litre$^{-1}$ person$^{-1}$ day$^{-1}$ Virus shedding rate of notified patients (0,10) To be estimated
$\mu_c$ day$^{-1}$ Natural clearance rate of free virus 1 [29]
§ MATHEMATICAL ANALYSIS
§.§ Basic properties
Here, we explore basic dynamical properties of the model (<ref>). Let us first consider the initial conditions of the model as
\begin{equation}
S(0)>0,~E(0),~I_u(0),~I_n(0),~I_h(0),~R(0),~V(0)\geq 0.\label{model_IC}
\end{equation}
The dynamical system (<ref>) is well posed as shown in the following theorem.
Consider the model (<ref>) with initial conditions (<ref>). The nonnegative orthant $\mathbb{R}_+^7$ is invariant under the flow of (<ref>), including $S$ remaining positive with the advancement of time. Moreover, the solutions of the system (<ref>) are bounded in the region
$$\Omega=\left\{(S,~E,~I_u,~I_n,~I_h,~R,~V)|~~0<S+E+I_u+I_n+I_h+R\leq \frac{\Pi}{\mu},~~ 0\leq V<\frac{\Pi(\alpha_u+\alpha_n) }{\mu\mu_c}\right\}.$$
Consider the initial conditions (<ref>). Suppose that at time $t=t_1$, $S(t_1)=0$. Then from (<ref>) at $t=t_1$, $\od{S}{t}=\Pi+\theta R>0$ which implies that $\od{S}{t}>0$ when $S$ is positive and small. Thus, there is no time $t_1$ such that $S(t_1)=0$. Therefore, $S$ stays positive for $t>0$ with the initial condition $S(0)>0$. Now, for the other components
\begin{align*}
\evalat{\od{E}{t}}{E=0}&=\frac{\beta_1 S( I_u+ \nu I_n)}{N} + \beta_2 SV\geq0, \quad
&\evalat{\od{I_u}{t}}{I_u=0}&= (1-p) \gamma E\geq0, \\
\evalat{\od{I_n}{t}}{I_n=0} &= p \gamma E\geq0, \quad
&\evalat{\od{I_h}{t}}{I_h=0} &= \eta_u I_u+ \eta_n I_n,\geq0, \\
\evalat{\od{R}{t}}{R=0} &= \sigma_u I_u+\sigma_n I_n + \sigma_h I_h,\geq0, \quad
& \evalat{\od{V}{t}}{V=0}&=\alpha_u I_u+ \alpha_n I_n\geq0.
\end{align*}
Thus, all the other components are nonnegative and the orthant $\mathbb{R}_+^7$ is invariant under (<ref>).
To show the boundedness of solutions of the system (<ref>), we add all the equations except the last one of (<ref>) to get
\begin{align*}
\od{N}{t}&=\od{}{t}(S+E+I_u+I_n+I_h+R)\\
&=\Pi-\mu N-\delta_nI_n-\delta_hI_h\\
&\leq \Pi-\mu N.
\end{align*}
Using the results of differential inequality, we have
Since the total population is bounded, so the individual components are also bounded.
Also, from the last equation of (<ref>), the rate of change of free virus is given by
\begin{align*}
\od{V}{t} &= \alpha_u I_u+ \alpha_n I_n - \mu_c V\\
&< (\alpha_u+ \alpha_n)\frac{\Pi}{\mu}- \mu_c V
\end{align*}
Again, using the results of differential inequality, we have
$$\limsup_{t\to\infty}V(t)<\frac{\Pi(\alpha_u+ \alpha_n)}{\mu\mu_c}.$$
This completes the proof.
§.§ Disease-free equilibrium and basic reproduction number
As of many epidemiological models, our model (<ref>) also exhibit the
disease-free equilibrium (DFE). At this equilibrium, population persists in the absence of disease. Mathematically, DFE is obtained by assuming all the infected compartments to be zero, i.e., $E, I_u, I_n, I_h$, and $V$ to be zero. Then from the model, $S=\frac{\Pi}{\mu}$ and $R=0$. Thus, the DFE is given by $\mathscr{E}_s=(\frac{\Pi}{\mu},0,0,0,0,0,0)$.
The basic reproduction number $\mathscr{R}_0$ is interpreted as the average number of secondary cases produced by one infected individual introduced into a population of susceptible individuals. This dimensionless number is a measure of the potential for disease outbreak. Now to obtain $\mathscr{R}_0$, we use next-generation operator method [12, 40].
First we assemble the compartments which are infected (i.e., $E$, $I_u$, $I_n$, $I_h$, and $V$) and decomposing the right hand side of the system (<ref>) as $\mathscr{F}-\mathscr{W}$, where $\mathscr{F}$ is the transmission part, expressing the production of new infection, and the transition part is $\mathscr{W}$, which
describe the rate of transfer of individuals from one compartment to another. Then we have for the model (<ref>)
\frac{\beta_1 S( I_u+ \nu I_n)}{N}+ \beta_2 SV\\
\end{pmatrix}\quad \text{and}\quad
\mathscr{W}=\begin{pmatrix}
(\gamma + \mu) E\\
-(1-p) \gamma E+\phi_uI_u\\
-p\gamma E+\phi_n I_n \\
-\eta_u I_u- \eta_n I_n +\phi_hI_h \\
-\alpha_u I_u-\alpha_n I_n+ \mu_c V
\end{pmatrix},$$
with $\phi_u=\eta_u+\sigma_u+\mu$, $\phi_n=\eta_n+\sigma_n+\mu+\delta_n$, and $\phi_h=\sigma_h+\mu+\delta_h$.
Consider $X=(E, I_u, I_n, I_h, V)$.
Then the derivatives of $\mathscr{F}$ and $\mathscr{W}$ at the DFE $\mathscr{E}_s$ are given by
0 & \beta_1 & \beta_1\nu & 0 &\frac{\beta_2\Pi}{\mu}\\
0 & 0 & 0 & 0 & 0\\
0 & 0 & 0 & 0 & 0\\
0 & 0 & 0 & 0 & 0\\
0 & 0 & 0 & 0 & 0
\end{pmatrix}\quad \text{and}\quad
(\gamma + \mu) & 0 & 0 & 0 & 0\\
-(1-p) \gamma & \phi_u & 0 & 0 & 0\\
-p\gamma & 0 & \phi_n & 0 & 0 \\
0 & -\eta_u & -\eta_n &\phi_h& 0\\
0 & -\alpha_u & -\alpha_n & 0 &\mu_c
\end{pmatrix}.$$
Now, we calculate the next-generation matrix $FW^{-1}$, whose $(i,j)$-th entry describe the expected number of new infections in compartment $i$ produced by the infected individual originally introduced into compartment $j$. According to Diekmann et al. [12], the basic reproduction number is given by $\mathscr{R}_0=\rho(FW^{-1})$, where $\rho$ is the spectral radius of the next-generation matrix $FW^{-1}$. A simple calculation leads to the following expression for $\mathscr{R}_0$:
\begin{equation}
\mathscr{R}_0=\frac{(1-p)\gamma\beta_1}{\phi_u( \gamma+\mu)}+\frac{p\gamma\nu\beta_1}{\phi_n( \gamma+\mu)}+\frac{(1-p)\gamma\alpha_u\beta_2(\Pi/\mu)}{\mu_c \phi_u( \gamma+\mu)}+\frac{p\gamma\alpha_n\beta_2(\Pi/\mu)}{\mu_c\phi_n( \gamma+\mu)}.\label{EQ:basic_reproduction}
\end{equation}
Epidemiologically, the first and second term of $\mathscr{R}_0$ can be interpreted as the number of secondary infections that one un-notified and notified individual will produce in a completely susceptible population during its infectious period, respectively. Here, the infection occurs due to direct contact. Also, the last two term represent the same but for free virus contact. Thus, both transmission pathways have impacts on the dynamics of COVID-19 spread in the community.
§.§ Stability of disease-free equilibrium
Following theorem gives the local stability properties of the DFE $\mathscr{E}_s=(\frac{\Pi}{\mu},0,0,0,0,0,0)$.
The disease-free equilibrium (DFE) $\mathscr{E}_s=(\frac{\Pi}{\mu},0,0,0,0,0,0)$ of the system (<ref>) is locally asymptotically stable if $\mathscr{R}_0<1$ and unstable if $\mathscr{R}_0>1$.
The Jacobian matrix at the DFE $\mathscr{E}_s$ is given by
\begin{equation}
J_{\mathscr{E}_s}= \left[ \begin {array}{ccccccc}
-\mu & 0 &-\beta_1 &-\nu\beta_1 & 0 & \theta & -\frac {\Pi\beta_2}{\mu}\\
0 & -(\gamma+\mu)& \beta_1 & \nu\beta_1 & 0 & 0 & \frac{\Pi\beta_2}{\mu}\\
0 & (1-p)\gamma &-\phi_u & 0 & 0 & 0 & 0\\
0 & p\gamma & 0 & -\phi_n & 0 & 0 & 0\\
0 & 0 &\eta_u & \eta_n &-\phi_h & 0 & 0\\
0 & 0 &\sigma_u &\sigma_n &\sigma_h &-(\theta+\mu) & 0 \\
0 &0 &\alpha_u &\alpha_n & 0 &0 &-\mu_c
\end {array} \right],\label{Jacobian_DFE}
\end{equation}
with $\phi_u=\eta_u+\sigma_u+\mu$, $\phi_n=\eta_n+\sigma_n+\mu+\delta_n$, and $\phi_h=\eta_h+\mu+\delta_h$.
The above Jacobian matrix possess three obvious eigenvalues $-\mu$, $-(\theta+\mu)$ and $-\phi_h=-(\sigma_h+\mu+\delta_h)$, which are all negative. Also, the remaining eigenvalues ($\lambda$) are the roots of the equation $\det(M-\lambda I)=0$, where $I$ is the $4\times 4$ identity matrix and
$$M= \left[ \begin {array}{ccccccc}
-(\gamma+\mu) & \beta_1 & \nu\beta_1 & \frac {\Pi\beta_2}{\mu} \\
(1-p)\gamma &-\phi_u & 0 & 0 \\
p\gamma & 0 & -\phi_n & 0 \\
0 &\alpha_u & \alpha_n &-\mu_c \\
\end {array} \right].$$
Now, $\det(M-\lambda I)=0$ gives
\begin{align*}
-(1-p)\gamma\alpha_u\frac{\Pi\beta_2}{\mu}(\lambda+\phi_n)-\frac {\Pi\beta_2}{\mu}p\gamma\alpha_n(\lambda+\phi_u)=0. \end{align*}
The above equation can be written as $H(\lambda)=1$, where
\begin{align}
\begin{split}
\end{split}
\end{align}
We also rewrite $H(\lambda)$ as
where $H_j(\lambda)$, $j=1,2,3,4$, are the respective term of (<ref>).
Now, if $Re(\lambda)\geq0$ with $\lambda=x+iy$, then
$$|H_1(\lambda)|=\frac{(1-p)\gamma\beta_1}{|\lambda+\phi_u||\lambda+\gamma+\mu|}\leq H_1(x)\leq H_1(0).$$
$$|H_j(\lambda)|\leq H_j(x)\leq H_j(0),\quad \text{for}~j=2,3,4.$$
\begin{align*}
|H(\lambda)|\leq& |H_1(\lambda)|+|H_2(\lambda)|+|H_3(\lambda)|+|H_4(\lambda)|\\
\leq &H_1(0)+H_2(0)+H_3(0)+H_4(0)\\
= &H(0).
\end{align*}
From (<ref>) and (<ref>), we have $H(0)=\mathscr{R}_0$. Then $\mathscr{R}_0<1$ $\implies$ $|H(\lambda)|<1$, which implies there does not exist any solutions of $H(\lambda)= 1$ with $Re(\lambda)\geq0$.
Therefore if $\mathscr{R}_0<1$, all the eigenvalues of $H(\lambda)= 1$ have negative real parts and hence the DFE $\mathscr{E}_s$ of the system (<ref>) is locally asymptotically stable.
Now for the case of $\mathscr{R}_0>1$, i.e., $H(0)>1$
Then there exists $\lambda^*>0$ such that $H(\lambda^*)=1$, which confirm the existence of positive eigenvalue of the Jacobian matrix $J_{\mathscr{E}_s}$.
Thus the DFE $\mathscr{E}_s$ is unstable for $\mathscr{R}_0>1$.
Moreover, when $\mathscr{R}_0<1$ the DFE $\mathscr{E}_s$ is globally asymptotically stable, which can be assured by the following theorem.
The disease-free equilibrium (DFE) $\mathscr{E}_s=(\frac{\Pi}{\mu},0,0,0,0,0,0)$ of the system (<ref>) is globally asymptotically stable if $\mathscr{R}_0<1$.
First we rewrite the model (<ref>) into the form
\begin{eqnarray}
\begin{cases}
\begin{array}{lll}
\displaystyle{\od{\mathbb{X}}{t}} &=& P(\mathbb{X},\mathbb{Z}), \\
\displaystyle{\od{\mathbb{Z}}{t}} &=& Q(\mathbb{X},\mathbb{Z})
\end{array}
\label{EQ:global_DFE}
\end{cases}
\end{eqnarray}
where $\mathbb{X}^T=(S,R)\in\mathbb{R}^2_+$ with $S>0$, describe the uninfected compartments and $\mathbb{Z}^T=(E,I_u,I_n,I_h,V)\in\mathbb{R}^5_+$ describe the infected compartments with free virus. Also, $T$ denoting the transpose of the matrix. Note that $Q(\mathbb{X},\mathbf{0})=\mathbf{0}$, where $\mathbf{0}$ is a zero vector.
Following Castillo-Chavez [9], the DFE $\mathscr{E}_s$ of the system (<ref>) is globally asymptotically stable if it is locally asymptotically stable and satisfy following two conditions:
* For the subsystem $\od{\mathbb{X}}{t}=P(\mathbb{X},\mathbf{0})$, the equilibrium $\mathbb{X}^*$ is globally asymptotically stable,
* $Q(\mathbb{X},\mathbb{Z})=B\mathbb{Z}-\widetilde{Q}(\mathbb{X},\mathbb{Z})$, $\widetilde{Q}(\mathbb{X},\mathbb{Z})\geq 0$ for $(\mathbb{X},\mathbb{Z})\in\Omega$,
where $B=\evalat{\frac{\partial Q}{\partial \mathbb{Z}}}{(\mathbb{X},\mathbf{Z})=(\mathbb{X}^*,\mathbf{0})}$ is a Metzler matrix (a matrix whose off diagonal elements are nonnegative) and $\Omega$ is the positive invariant set for the model (<ref>) as described in Subsection <ref>.
Now, for the model (<ref>),
\Pi-\mu S\\0
\end{pmatrix}.$$
Since all the infected compartments are zero, so there is no infection, and thus, no recovery. That's why, we consider $R=0$. Clearly, $\mathbb{X}^*=(\frac{\Pi}{\mu},0)$ is a globally asymptotically equilibrium for the system $\od{\mathbb{X}}{t}=P(\mathbb{X},\mathbf{0})$. So the condition (H1) satisfied.
-(\gamma+\mu) & \beta_1 & \beta_1\nu & 0 & \frac{\beta_2\Pi}{\mu}\\
(1-p)\gamma & -\phi_u & 0 & 0 & 0\\
p\gamma & 0 & -\phi_n & 0 & 0\\
0 & \eta_u & \eta_n & -\phi_h & 0\\
0 & \alpha_u & \alpha_n & 0 & -\mu_c\\
\end{pmatrix}\quad \text{and}$$
\beta_1(1-\frac{S}{N})I_u+\beta_1\nu (1-\frac{S}{N})I_n+\beta_2(\frac{\Pi}{\mu}-S)V\\
\end{pmatrix},$$
with $\phi_u=\eta_u+\sigma_u+\mu$, $\phi_n=\eta_n+\sigma_n+\mu+\delta_n$, and $\phi_h=\eta_h+\mu+\delta_h$.
The matrix $B$ is a Metzler matrix and $\widetilde{Q}(\mathbb{X},\mathbb{Z})\geq0$ whenever the state variables are inside the invariant set $\Omega$. Thus (H2) also satisfied. This completes the proof.
§.§ Existence of endemic equilibrium
Here, we discuss the existence of endemic equilibrium of the model (<ref>). The endemic equilibrium $\mathscr{E}^*=(S^*,E^*,I_u^*,I_n^*,I_h^*,R^*,V^*)$ is given by
$I_u^*=A_1E^*$, $I_n=A_2E^*$, $I_h^*=A_3E^*$, $R=A_4E^*$, $V^*=A_5E^*$, $S^*=\frac{\Pi+(\theta A_4-(\gamma+\mu))E^*}{\mu}=\frac{(\gamma+\mu)(\Pi-A_7E^*)}{A_6+\beta_2A_5(\Pi-A_7E^*)}$,
where all the $A_i$, $i=1,2,\cdots,7$ are positive and given by
\begin{align*}
A_1&=\frac{(1-p)\gamma}{\eta_u+\sigma_u+\mu},\; & A_2&=\frac{p\gamma}{\eta_n+\sigma_n+\mu+\delta_n},\; &
A_3&=\frac{\eta_u A_1+\eta_n A_2}{\sigma_h+\mu+\delta_h},\\
A_4&=\frac{\sigma_u A_1+\sigma_n A_2+\sigma_h A_3}{\theta+\mu},\;&
A_5&=\frac{\alpha_u A_1+\alpha_n A_2}{\mu_c},\; &
A_6&=\mu\beta_1(A_1+\nu A_2),\;\\ A_7&=\delta_n A_2+\delta_h A_3,
\end{align*}
and $E^*$ is a positive root of the quadratic equation
\begin{equation}
\rho_0E^2+\rho_1E+\rho_2=0\label{root_endemic}
\end{equation}
\begin{align*} \rho_0&=-\beta_2 A_5 A_7(\theta A_4-(\gamma+\mu)),\\
\rho_1&=(A_6+\beta_2 A_5 \Pi)(\theta A_4-(\gamma+\mu))-\beta_2 A_5 A_7\Pi+\mu(\gamma+\mu )A_7\\
&=\mu(\gamma+\mu)\mathscr{R}_0(\theta A_4-(\gamma+\mu))+\mu(\gamma+\mu)(1-\mathscr{R}_0)A_7+A_6A_7,\\
\rho_2&=(A_6+\beta_2 A_5 \Pi)\Pi-\mu(\gamma+\mu)\Pi
\end{align*}
For the existence of real roots of (<ref>), we must have $\rho_1^2-4\rho_0\rho_2\geq0$. Without loss of generality, assume that $E_1^*>E_2^*$, when equation (<ref>) have two real roots.
From the expression of $S^*$, $S^*=\frac{\Pi}{\mu}+\frac{(\theta A_4-(\gamma+\mu))}{\mu}E^*$. Since the upper bound of total population is $\Pi/\mu$, so we must have $\theta A_4-(\gamma+\mu)< 0$. Then $\rho_0$ is always positive. Note that, for $\theta A_4-(\gamma+\mu)= 0$, $S^*=\frac{\Pi}{\mu}$ and thus the endemic equilibrium becomes DFE. Also, $\rho_2<(>)0\iff\mathscr{R}_0<(>)1$. At the equilibrium density, $N^*=\frac{\Pi-A_7E^*}{\mu}$. Thus, $N^*>0\iff \Pi-A_7E^*>0$.
Keeping all the conditions in mind, in the next theorem, we state about the existence and possible number of endemic equilibrium points.
When $\mathscr{R}_0<1$, the model (<ref>) has unique endemic equilibrium if $\Pi-A_7E^*>0$. When $\mathscr{R}_0>1$, the model (<ref>) has
* two endemic equilibrium if $\rho_1<0$, $\rho_1^2-4\rho_0\rho_2>0$, and $\Pi-A_7E_i^*>0$, $i=1,2$.
* unique endemic equilibrium if any of the following cases holds
* $\rho_1<0$, $\rho_1^2-4\rho_0\rho_2>0$, and $E_1^*>\frac{\Pi}{A_7}>E_2^*$,
* $\rho_1<0$, $\rho_1^2-4\rho_0\rho_2=0$, $\Pi-A_7E^*>0$,
* no endemic equilibrium otherwise.
§.§ Analysis of the center manifold near DFE $\mathscr{E}_s$ when $\mathscr{R}_0=1$
In this subsection, we discuss the nature of DFE $\mathscr{E}_s$ when $\mathscr{R}_0=1$. Recall the Jacobian matrix $J_{\mathscr{E}_s}$ from (<ref>). Notice that, when $\mathscr{R}_0=1$, $J_{\mathscr{E}_s}$ possess a zero eigenvalue. So the equilibrium $\mathscr{E}_s$ becomes non-hyperbolic. Then center manifold theory is the best approach to study the behaviour of this equilibrium. In this regard, we follow Theorem 4.1 described in Castillo-Chavez and Song [10].
To proceed, first we write the mathematical model (<ref>) into the vector form $\od{\mathbf{x}}{t}=f(\mathbf{x})$, with $\mathbf{x}=(x_1,~ x_2,~ x_3,~ x_4,~ x_5,~ x_6,~ x_7)^T=(S,~E,~I_u,~I_n,~I_h,~R,~V)^T$ and $f(\mathbf{x})=(f_1(\mathbf{x}), ~f_2(\mathbf{x}),~ \cdots,~ f_7(\mathbf{x}))^T$. Since $\mathscr{R}_0$ is often inconvenient to use directly as a bifurcation parameter, we introduce $\beta_1$ as a bifurcation parameter. Then $\mathscr{R}_0=1$ gives
$$\beta_1=\frac{\mu_c (\gamma+\mu)\phi_u \phi_n -\gamma\beta_2(\Pi/\mu)((1-p)\alpha_u\phi_n+p\alpha_n\phi_u)}{\mu_c \gamma((1-p)\phi_n+\nu p\phi_u)}=\beta_1^* ~~(\text{say}).$$
Moreover, $\mathscr{R}_0<1$ for $\beta_1<\beta_1^*$ and $\mathscr{R}_0>1$ for $\beta_1>\beta_1^*$. Now, consider the system $\od{\mathbf{x}}{t}=f(\mathbf{x},\beta_1)$ and at $\beta_1=\beta_1^*$ the Jacobian matrix $J_{\mathscr{E}_s}$ have simple zero eigenvalue and all the other eigenvalues have negative real parts. Let $\mathbf{v}=(v_1,~ v_2,~ \cdots~, v_7)$ and $\mathbf{w}=(w_1,~ w_2,~ \cdots~, w_7)^T$ are the respective left and right eigenvectors corresponding to zero eigenvalue. Simple algebraic calculations lead us to the following expressions of $v_i$ and $w_i$, $i=1,2,\cdots, 7$:
\begin{align*}
v_1&=0=v_5=v_6, \quad v_2=v_2>0,\quad v_3=\frac{1}{\phi_u}\left(\beta_1^*+\frac{\beta_2\alpha_u\Pi}{\mu \mu_c}\right)v_2,\\
v_4&=\frac{1}{\phi_n}\left(\beta_1^*\nu+\frac{\beta_2\alpha_n\Pi}{\mu \mu_c}\right)v_2,\quad
v_7=\frac{\beta_2\Pi}{\mu \mu_c}v_2,
\end{align*}
\begin{align*}
w_2&=w_2>0,\quad w_3=\frac{(1-p)\gamma}{\phi_u}w_2,\quad w_4=\frac{p\gamma}{\phi_n}w_2,\quad w_5=\frac{1}{\phi_h}\left(\frac{(1-p)\gamma\eta_u}{\phi_u}+\frac{p\gamma\eta_n}{\phi_n}\right)w_2,\\
\end{align*}
Clearly, all the $v_i$ and $w_i$ ($i=1,2,\cdots,7$) are positive except $w_1$. From the expression of $w_1$, note that $w_1=\frac{1}{\mu}(\theta A_4-(\gamma+\mu))w_2$. Also, since $\theta A_4-(\gamma+\mu)<0$, so $w_1<0$.
Now, according to the Theorem 4.1 [10], we calculate the quantities $a$ and $b$, which are defined by
\begin{align}
a&=\sum_{k,i,j=1}^{7}v_kw_iw_j\frac{\partial^2 f_k}{\partial x_i \partial x_j}\label{center_manifold_a},\\
b&=\sum_{k,i=1}^{7}v_kw_i\frac{\partial^2 f_k}{\partial x_i \partial \beta_1}\label{center_manifold_b},
\end{align}
where all the partial derivatives are evaluated at the DFE $\mathscr{E}_s$ and $\beta_1=\beta_1^*$. Since $v_1$ is zero and $f_k$, $k=3,4,\cdots 7$ are linear functions of the state variables, so we need to calculate only $\frac{\partial^2 f_2}{\partial x_i \partial x_j}$. Then we have
\begin{align*}
\frac{\partial^2 f_2}{\partial x_1 \partial x_7}&=\beta_2, \quad \frac{\partial^2 f_2}{\partial x_2 \partial x_3}=-\frac{\beta_1^*\mu}{\Pi}=\frac{\partial^2 f_2}{\partial x_3 \partial x_5}=\frac{\partial^2 f_2}{\partial x_3 \partial x_6},\quad \frac{\partial^2 f_2}{\partial x_3 \partial x_4}=-\frac{\beta_1^*\mu(1+\nu)}{\Pi},\\
\frac{\partial^2 f_2}{\partial x_3^2}&=-\frac{2\beta_1^*\mu}{\Pi},\quad \frac{\partial^2 f_2}{\partial x_2 \partial x_4}=-\frac{\beta_1^*\mu\nu}{\Pi}=\frac{\partial^2 f_2}{\partial x_4 \partial x_5}=\frac{\partial^2 f_2}{\partial x_4 \partial x_6}, \quad \frac{\partial^2 f_2}{\partial x_4^2}=-\frac{2\beta_1^*\mu\nu}{\Pi},
\end{align*}
and the rest of the derivatives are zero. Thus from (<ref>), we have
\begin{equation*}
a=v_2\left[\beta_2w_1w_7-\frac{\beta_1^*\mu}{\Pi}\left\{w_3(w_2+2w_3+w_4+w_5+w_6)+\nu w_4(w_2+w_3+2w_4+w_5+w_6)\right\}\right].
\end{equation*}
Again, since $v_1$ is zero and $\frac{\partial^2 f_k}{\partial x_i \partial \beta_1}=0$ for $k=3,4,\cdots,7$, then from (<ref>) we have
\begin{equation*}
b=v_2\left[w_3\frac{\partial^2 f_2}{\partial x_3 \partial \beta_1}+w_4\frac{\partial^2 f_2}{\partial x_4 \partial \beta_1}\right]=v_2(w_3+\nu w_4)>0.
\end{equation*}
Since $w_1<0$, so $a<0$. Hence, for the system (<ref>), $a<0$ and $b>0$. Thus the system exhibit forward bifurcation at $\beta_1=\beta_1^*$, and an endemic equilibrium appears which is locally asymptotically stable.
We numerically verify the existence of forward bifurcation with respect to the basic reproduction number $\mathscr{R}_0$. Since $\mathscr{R}_0$ is not a model parameter and it depends on $\beta_1$, so we vary $\beta_1$. When $\mathscr{R}_0$ crosses the threshold value $1$, the system transits from the stable DFE to the stable endemic equilibrium and the DFE becomes unstable (Fig. <ref>). In the figure, blue-coloured line depicts the stable DFE and red curve depicts the stable endemic equilibrium.
Forward bifurcation of the system (<ref>) with respect to the basic reproduction number $\mathscr{R}_0$. The parameter values are taken as $\Pi=496.68615$, $\beta_2=6.6248\times 10^{-8}$, $\eta_u=0.0223$, $\eta_n = 0.7846$, $\sigma_h= 0.9181$, $\delta_h = 0.0046$, $\alpha_u = 1.3232\times 10^{-6}$, $\alpha_n = 0.0741$ and the other parameter values are same as Table <ref>.
We also draw the time series plot by choosing two different values of $\beta_1$. For $\beta_1=0.15$, $\mathscr{R}_0<1$ and all the infected compartments (un-notified, notified and hospitalized) becomes zero and for $\beta_1=0.3$, $\mathscr{R}_0>1$ and infected compartments persists in a stable manner as time evolves (Fig. <ref>).
Time series evaluation of infected compartments for the system (<ref>). In Fig. (A-C), $\beta_1=0.15$ where $\mathscr{R}_0<1$, and for Fig. (D-F), $\beta_1=0.3$ where $\mathscr{R}_0>1$. The other parameter values are same as Fig. <ref>.
§ MODEL CALIBRATION
Daily new deaths between the period 1 March 2021 to 31 May 2021 for the districts Bangalore Urban and Chennai are used to calibrate the model. The rationale behind using mortality data is that this data is more reliable than the incidence data due to limited testing capacities [26, 18]. We fit the model output ($\int_{t=1}^{T} [\delta_n I_n + \delta_h I_h] dt$, where T=92) to daily new deaths and cumulative deaths due to COVID-19 for both districts. Fixed parameters of the model (<ref>) are given in Table <ref>. Eight unknown model parameters are estimated, namely $\beta_1$, $\beta_2$, $\nu_u$, $\nu_h$, $\sigma_h$, $\delta_h$, $\alpha_u$ and $\alpha_n$. In addition, initial number of exposed people $E(0)$ is also estimated from the mortality data. During the specified time period, nonlinear least square solver $lsqnonlin$ (in MATLAB) is used to fit simulated daily mortality data to the reported COVID-19 deaths in Bangalore urban and Chennai districts. MATLAB codes for generating the fitting figures for Chennai has been uploaded to the GitHub repository <https://github.com/indrajitg-r/ODE_model_fitting>. The fitting of the daily new deaths and cumulative deaths due to COVID-19 are displayed in Fig. <ref> and Fig. <ref> for Bangalore urban and Chennai, respectively.
Initial conditions used to simulate the model (<ref>) in Bangalore urban and Chennai.
IC's Description Values for Bangalore Urban Values for Chennai Reference
$N_{init}$ Total population 12765000 11235000 [4, 5]
$S(0)$ Initial number of susceptible $0.7 \times N_{init}$ $0.7 \times N_{init}$ –
$E(0)$ Initial number of exposed people (1-15000) (1-15000) To be estimated
$I_u(0)$ Initial number of un-notified patients 500 500 –
$I_n(0)$ Initial number of notified patients 210 189 [2]
$I_h(0)$ Initial number of hospitalized patients 10 10 –
$R(0)$ Initial number of recovered patients 1000 1000 –
$V(0)$ Initial concentration of virus $10^{-7}$ $10^{-7}$ –
Fitting model solution to (A) new deaths and (B) cumulative death data due to COVID-19 in Bangalore Urban district.
From Fig. <ref>, it can be argued that the model output fits the mortality data well. Estimated parameter values for Bangalore urban are as follows: $\beta_1=0.2083$, $\beta_2=6.6248 \times 10^{-6}$, $\eta_u =0.0223$, $\eta_n =0.7846$, $\sigma_h =0.9181$, $\delta_h =0.0046$, $\alpha_u =1.3232 \times 10^{-6}$, $\alpha_n = 0.0741$ and $E(0)= 4497$. The data trend is well captured by the model output as seen in Fig. <ref>. Estimated parameter values for Chennai district data are as follows: $\beta_1=0.2155$, $\beta_2=5.361 \times 10^{-6}$, $\eta_u =0.0012$, $\eta_n =0.5470$, $\sigma_h =0.8419$, $\delta_h =3.204 \times 10^{-4}$, $\alpha_u =6.278 \times 10^{-4}$, $\alpha_n = 0.0711$ and $E(0)= 1919$. Using these estimated parameters for both the districts, we investigate different control strategies.
Fitting model solution to (A) new deaths and (B) cumulative deaths data due to COVID-19 in Chennai district.
§ CONTROL INTERVENTIONS AND IMMIGRATION OF INFECTIVES
In this section, we investigate different control mechanisms and immigration of infectives through numerical simulation. We examine the effects of vaccination, treatment by drugs and use of face masks with different degrees of efficacy.
§.§ Use of face mask
Although several vaccines are discovered and people are vaccinated in a rapid process, several drugs are in trial stage and few of them are implemented for hospitalized patients, nevertheless, use of face mask still could offer as a non-pharmaceutical intervention, to avoid transmission of direct contact and airborne transmission of free virus. In a densely populated country like India, it is almost impossible to determine how many people have come in contact with an infected person. Thus wearing face mask properly is an important control strategy for current epidemic outbreak. The idea of using face mask to combat respiratory infections in community was not new [41]. Face masks reduce the amount of droplet inoculum discharging from infectious individuals by capturing a proportion of droplets within the mask [41, 38]. Face masks also reduce the amount of droplet inoculum inhaled by susceptible individuals by capturing a proportion of droplets in inhaled air and hence reducing the airborne transmission rate. Let $0\leq c_m\leq1$ is the community-wide compliance in the face mask usage and $0<\epsilon_m\leq 1$ is the face mask efficiency in preventing of the disease. Then the term $1- c_m \epsilon_m$ describe a measure of reduction in community contacts and free virus contacts due to use of face mask [38, 26]. Note that, $0\leq1- c_m \epsilon_m\leq 1$. We consider three different efficiency levels, depending on the material and layering of the face masks viz. N95 masks are 95% effective; Surgical masks are 55% effective and Multi-layered cloth masks are 38% effective [35]. Community-wide compliance in the face mask usage is chosen at three different levels namely, High 75%, Medium 50% and low 25%. The baseline values for $c_m$ and $\epsilon_m$ are taken to be 10% and 0.1, respectively.
§.§ Treatment by drugs: faster recovery
Recently, several drugs are developed for moderate to severe COVID-19 patients and some of them are in different phase of trial period. The 3rd phase trial of Soin et al. [37] in India predict that, tocilizumab plus standard care in patients admitted to hospital with moderate to severe COVID-19 have faster recovery and reduce the burden of intensive care. Recently, Institute of Nuclear Medicine and Allied Sciences (DRDO-
INMAS) and Dr Reddy’s laboratories, Hyderabad jointly developed a drug, 2-deoxy-D-glucose (2-DG) for emergency use in symptomatic COVID-19 patients [8, 30]. On 8$^{th}$ May, 2021, the Drugs Controller General of India (DCGI) approved this drug [27]. As per the government release, clinical trial data shows that the drug helps in recovery timelines of hospitalized patients and reduces supplemental oxygen dependence. Consider $\epsilon_t\geq1$ be the factor describing the faster recovery of hospitalized patients. Taking the base value of the $\epsilon_t$ as 1, we vary this parameter upto 1.3 while evaluating control strategies.
§.§ Effect of vaccination
To control the ongoing global pandemic, vaccine is a critical tool as a pharmaceutical intervention. At present, Covaxin and Covishield vaccines are being used for the vaccination drive against COVID-19 in India and also, several vaccine are in trial process [36]. To extend our mathematical model under the effect of vaccination, we introduced a new compartment of population, namely protected ($P(t)$), those who are vaccinated. Now, the Susceptible and recovered population both can progress to the protected population at rates $\xi_s$ and $\xi_r$, respectively, through vaccination. For simplicity, we consider that protected population completed the required doses of vaccine (and also completed 14 days after last dose) and thus does not consider any intermediate stage (i.e., the time gap between doses or before 14 days of last dose). The base values for vaccination rates are chosen to be 0.00085 for both susceptibles and recovered people. This value is calculated from the vaccination data of India [2]. Simulations are performed by increasing the vaccination rates to 0.05 for both the sub-populations.
§.§ Immigration of infectives
Communicable disease like the current COVID-19 epidemic may be introduced into a community by the arrival of infectives outside the community. Indeed, in India, the first COVID-19 case was reported in Trissur, Kerala, on January 30, 2020, who was returned from Wuhan, China [7]. Thus, immigration of infectives in a disease-free community played a crucial role for the spread of the disease. We extend the mathematical model (<ref>) by assuming a constant flow of new members of un-notified person. Recruitment of notified person was not considered as they are restricted for travelling. On the other hand, immigration is necessary for many people to maintain a livelihood. Thus, individuals from neighboring locations must be allowed to immigrate for the well being of the overall community. Let $\Lambda$ be the recruitment rate of un-notified infected individuals through immigration. We consider three levels of immigration as low, medium and high with $\Lambda$ = 100, 1000 and 5000 respectively.
By considering above control interventions and immigration of infectives, the model (<ref>) can be extended to the following model:
\begin{eqnarray}
\begin{cases}
\begin{array}{lll}
\displaystyle{\od{S}{t}} &=& \Pi-\frac{\beta_1 (1- c_m \epsilon_m) S( I_u+ \nu I_n)}{N} - \beta_2 (1- c_m \epsilon_m) SV -(\mu + \xi_s) S + \theta R, \\
\displaystyle{\od{E}{t}} &=& \frac{\beta_1 (1- c_m \epsilon_m) S( I_u+ \nu I_n)}{N} + \beta_2 (1- c_m \epsilon_m) SV - (\gamma + \mu) E, \\
\displaystyle{\od{I_u}{t}} &=& \Lambda + (1-p) \gamma E - (\eta_u + \sigma_u +\mu )I_u, \\
\displaystyle{\od{I_n}{t}} &=& p \gamma E-(\eta_n + \sigma_n + \mu + \delta_n) I_n, \\
\displaystyle{\od{I_h}{t}} &=& \eta_u I_u+ \eta_n I_n - ( \epsilon_t \sigma_h + \mu + \delta_h)I_h, \\
\displaystyle{\od{R}{t}} &=& \sigma_u I_u+\sigma_n I_n + \epsilon_t \sigma_h I_h - (\theta + \mu +\xi_r)R, \\
\displaystyle{\od{P}{t}} &=& \xi_s S + \xi_r R - \mu P, \\
\displaystyle{\od{V}{t}} &=& \alpha_u I_u+ \alpha_n I_n - \mu_c V.
\end{array}
\label{EQ:TheModel_with_control}
\end{cases}
\end{eqnarray}
Intensive numerical simulations are performed to quantify the effects of various strategies in Bangalore urban and Chennai district. The fixed parameters and initial conditions are taken from Table <ref> and <ref>. The initial number of protected/vaccinated people is estimated using vaccination coverage data from both the districts [2]. Estimated parameters for both districts are mentioned in the model calibration section. Using these parameters and control parameters at various levels we simulate the model (<ref>) with three months ahead projections.
For both the districts, the projection period is 1 June 2021 to 31 August 2021. Initially, we simulate the effects of single control parameters while other parameters are fixed at the base level. Change in the hospitalized populations with different control levels are depicted for Bangalore urban and Chennai in Fig. <ref> and Fig. <ref>, respectively. For both the districts it can be seen that $\epsilon_t$ and $\xi_s$ have significant impact on reduction of hospitalized persons. Face mask related parameters ($\epsilon_m$ and $c_m$) and vaccination rate of recovered persons ($\xi_r$) show minimal effect on reduction of hospitalized populations. On the other hand, immigration rate of un-notified infected people has significant on the hospitalized populations. In particular, high immigration rates may drive the hospitalized cases to high values.
Further, to quantify the effects of single control strategies more precisely, we calculate the percentage reduction of notified and hospitalized persons in the three month projection period. We use the following basic formula
\begin{eqnarray}\label{percent_reduction}
\textmd{Percentage reduction}=\frac{\textmd{Baseline cases} -
\textmd{Cases with control}}{\textmd{Baseline cases}}\times 100.
\end{eqnarray}
The percentage reduction in notified and hospitalized cases are reported in Table <ref> for Bangalore urban and Chennai districts. The fixed parameters and initial conditions are taken from Tables <ref> and <ref>.
Effects of single control strategies in Bangalore urban namely (A) efficacy of face mask usage, (B) community-wide compliance in face mask usage, (C) increase in recovery rate of hospitalized patients, (D) vaccination rate of susceptible individuals, (E) vaccination rate recovered people and (F) immigration of infectives.
Effects of single control strategies in Chennai namely (A) efficacy of face mask usage, (B) community-wide compliance in face mask usage, (C) increase in recovery rate of hospitalized patients, (D) vaccination rate of susceptible individuals, (E) vaccination rate recovered people and (F) immigration of infectives.
We can see that the face mask related controls when applied individually have moderate impact on the notified and hospitalized populations of both locations. On the other hand, treatment of hospitalized population has large positive impact on the percentage reduction of hospitalized patients. However, treatment do not show any impact on the notified patients for both the locations. This might be due to the fact that the hospitalized patients are not responsible for new infections directly. Comparing the vaccination rates of susceptible and recovered people, it can be inferred from the table that vaccinating susceptibles has better impact than that of recovered people. At least in the short-term (three months) scenario, it is beneficial to vaccinate susceptible people than to vaccinate recovered people. Furthermore, while evaluating the effects of immigration, we noticed that high level of immigration has significant negative impact on the percentage reduction. Thus, the immigration of un-notified COVID-19 patients has to be as low as possible. This can be done by allowing people from low incidence neighbor districts and restricting the immigration from highly affected areas. From the single control results it is evident that pharmaceutical mitigation strategies like treatment of hospitalized patients and vaccination of susceptible individuals are most effective. Additionally, non-pharmaceutical measures such as face mask use has minimal effects on the reduction of notified and hospitalized COVID-19 cases.
Percentage reduction in total number of notified and hospitalized COVID-19 patients for different levels of interventions.
2*Parameter values 2c|Bangalore urban 2c|Chennai
2-3 4-5 Reduction in $I_n$ Reduction in $I_h$ Reduction in $I_n$ Reduction in $I_h$
$\epsilon_m$ = 0.38 3.25 2.91 2.50 2.35
= 0.55 5.21 4.67 4.03 3.78
= 0.95 9.79 8.77 7.65 7.18
$c_m$ = 0.25 1.74 1.56 1.33 1.25
= 0.50 4.64 4.15 3.58 3.36
= 0.75 7.51 6.73 5.83 5.48
$\epsilon_t$ = 1.10 -0.00 8.83 -0.00 8.84
= 1.20 -0.00 16.18 -0.00 16.21
= 1.30 -0.00 22.41 -0.00 22.44
$\xi_s$ = 0.005 8.67 7.71 6.93 6.48
= 0.01 15.91 14.20 13.06 12.24
= 0.05 39.42 35.33 34.85 32.72
$\xi_r$ = 0.01 0.61 0.53 1.24 1.15
= 0.03 1.23 1.08 2.97 2.76
= 0.05 3.98 3.51 4.02 3.74
$\Lambda$ = 100 -0.21 -0.32 -0.19 -0.19
= 1000 -2.03 -3.12 -1.90 -1.87
= 5000 -9.41 -15.01 -8.76 -8.70
To investigate the combined effects of control interventions, we examine four different combinations on the total number of hospitalized patients ($I_h^{tot}$) in the three month projection period. The parameter values are taken as mentioned earlier in this section. We draw contour plots with respect to the control parameters with response variable $I_h^{tot}=\int_{t=92}^{184} I_h(t) dt$. Contour plots depicting combination of interventions are displayed in Fig. <ref> and Fig. <ref> for Bangalore urban and Chennai districts, respectively.
Combination of control strategies and immigration of infectives in Bangalore urban. (A) efficacy of face mask usage $ \textendash$ community-wide compliance in face mask usage ($\epsilon_m-c_m$), (B) increase in recovery rate of hospitalized patients $ \textendash$ vaccination rate of susceptible individuals ($\epsilon_t-\xi_s$), (C) increase in recovery rate of hospitalized patients $ \textendash$ immigration of infectives ($\epsilon_t-\Lambda$), (D) vaccination rate of susceptible individuals $ \textendash$ immigration of infectives ($\epsilon_s-\Lambda$).
For both of the locations, similar scenarios are seen with varying control interventions and immigration of un-notified infectious patients. Simultaneously increasing face mask efficacy and population-wide compliance level will decrease $I_h^{tot}$ in the three month projection period ( Fig. <ref>(A) and <ref>(A)). Thus both the face mask related parameters will have stronger impact on the reduction of $I_h^{tot}$. On the other hand, vaccination rate of susceptibles and increase in the treatment rate of hospitalized patients will have similar effects for both the locations (as seen in Fig. <ref>(B) and <ref>(B)). Further, the immigration of un-notified COVID-19 patients will obviously show increase in $I_h^{tot}$.
But keeping $\Lambda$ low and increasing treatment rate simultaneously will keep $I_h^{tot}$ under control (see Fig. <ref>(C) and <ref>(C)). From the number of $I_h^{tot}$, it should be noted that this combination is risky if there is no other intervention in action. However, if the vaccination of susceptibles are performed with a increased rate, then the immigration may not have very adverse effects (see Fig. <ref>(D) and <ref>(D)). It can be noted that high level of face mask use with maximum efficacy is more effective than the other combined strategies in terms of reduction in $I_h^{tot}$. But the feasibility of face mask usage in such intensity may be critical. From the contour plot analysis, it can be argued that the combination of $\xi_s$ and $\epsilon_t$ is more feasible and has competitive effects on $I_h^{tot}$. Further numerical simulations are necessary to study combination of more than two control interventions and immigration of un-notified infectives.
Combination of control strategies and immigration of infectives in Chennai. (A) efficacy of face mask usage $ \textendash$ community-wide compliance in face mask usage ($\epsilon_m-c_m$), (B) increase in recovery rate of hospitalized patients $ \textendash$ vaccination rate of susceptible individuals ($\epsilon_t-\xi_s$), (C) increase in recovery rate of hospitalized patients $ \textendash$ immigration of infectives ($\epsilon_t-\Lambda$), (D) vaccination rate of susceptible individuals $ \textendash$ immigration of infectives ($\epsilon_s-\Lambda$).
Three or more control interventions and the immigration of infectives are now applied to examine their combined impact on the COVID-19 cases in the three months projection period. We calculate the percentage reduction in notified COVID-19 patients and hospitalized COVID-19 patients using the formula (<ref>). The fixed parameters and initial conditions are taken from Tables <ref> and <ref>. Four different combination strategies are investigated namely, strategy I: face mask efficacy - community level usage of face masks - vaccination of susceptibles ($\epsilon_m$-$c_m$-$\xi_s$), strategy II: face mask efficacy - community level usage of face masks - vaccination of susceptibles - increase in treatment rate ($\epsilon_m$-$c_m$-$\xi_s$-$\epsilon_t$), strategy III: face mask efficacy - community level usage of face masks - vaccination of susceptibles - increase in treatment rate - immigration of un-notified infectives ($\epsilon_m$-$c_m$-$\xi_s$-$\epsilon_t$-$\Lambda$) and strategy IV: combination of all control interventions with immigration of un-notified infectives ($\epsilon_m$-$c_m$-$\xi_s$-$\epsilon_t$-$\Lambda$-$\xi_r$). The parameter values are chosen for feasibility of the strategies i.e., we do not consider hypothetically high values of the parameters. The percentage reduction of $I_n$ and $I_h$ for Bangalore urban and Chennai are reported in Table <ref>.
Percentage reduction in total number of notified and hospitalized COVID-19 patients for different strategies.
2*Parameter values 2c|Bangalore urban 2c|Chennai
Reduction in $I_n$ Reduction in $I_h$ Reduction in $I_n$ Reduction in $I_h$
$\epsilon_m$ = 0.38, $c_m$ = 0.25, $\xi_s$ = 0.005 16.92 15.12 13.66 12.80
2*[origin=c]90Strategy-I $\epsilon_m$ = 0.38, $c_m$ = 0.50, $\xi_s$ = 0.005 25.71 23.02 21.18 19.87
$\epsilon_m$ = 0.55, $c_m$ = 0.25, $\xi_s$ = 0.005 20.92 18.72 17.03 15.98
$\epsilon_m$ = 0.38, $c_m$ = 0.25, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1 16.92 22.58 13.65 20.49
2*[origin=c]90Strategy-II $\epsilon_m$ = 0.38, $c_m$ = 0.50, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1 25.71 29.77 21.18 26.92
$\epsilon_m$ = 0.55, $c_m$ = 0.25, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1 20.92 25.85 17.03 23.37
$\epsilon_m$ = 0.38, $c_m$ = 0.25, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1, $\Lambda$ = 100 16.76 22.33 13.50 20.35
$\epsilon_m$ = 0.38, $c_m$ = 0.50, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1, $\Lambda$ = 100 25.57 29.53 21.03 26.78
4*[origin=c]90Strategy-III $\epsilon_m$ = 0.55, $c_m$ = 0.25, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1, $\Lambda$ = 100 20.77 25.61 16.88 23.24
$\epsilon_m$ = 0.38, $c_m$ = 0.25, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1, $\Lambda$ = 1000 15.38 20.11 12.15 19.11
$\epsilon_m$ = 0.38, $c_m$ = 0.50, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1, $\Lambda$ = 1000 24.28 27.38 19.75 25.60
$\epsilon_m$ = 0.55, $c_m$ = 0.25, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1, $\Lambda$ = 1000 19.42 23.42 15.56 22.02
2*[origin=c]90Strategy-IV $\epsilon_m$ = 0.38, $c_m$ = 0.50, $\xi_s$ = 0.005, $\xi_r$ = 0.01, $\epsilon_t$ = 1.1, $\Lambda$ = 100 25.99 29.87 21.55 27.23
$\epsilon_m$ = 0.38, $c_m$ = 0.50, $\xi_s$ = 0.005, $\xi_r$ = 0.01, $\epsilon_t$ = 1.1, $\Lambda$ = 1000 24.78 27.78 20.36 26.12
From the combinations of strategy I and strategy II, we observe that the second case of strategy II has most the positive reduction for both the districts. However, the travel restrictions are being eased and more people tend to come to these districts. Thus, the immigration of un-notified infectives is also evident and hence it is necessary to consider non-zero values of $\Lambda$. It can be observed that strategy IV (first case) with specified control parameter values and low immigration has the most fruitful results on both the locations (marked bold in Table <ref>). Alternatively, the second case of strategy II show a similar case reduction in both the locations. This strategy does not include immigration and therefore is not feasible. It can be seen that the second case of strategy III also shows competitive results in terms of percentage reduction of both populations. This strategy is feasible and can be implemented with less effort by the policy makers.
§ RESULTS AND CONCLUSIONS
An SEIR-type compartmental model for the transmission dynamics of COVID-19 outbreak incorporating free virus concentration of the environment is considered in this paper. The model assumes standard incidence function while COVID-19 transmission by un-notified and notified individuals. Mass action incidence is considered for the airborne transmission of the virus. The mathematical model consists of a seven-dimensional system of ordinary differential equations. The model is mathematically analysed to obtain insight into the long-term dynamic features of the disease. Basic properties of the model are studied by finding positivity and boundedness of the solutions when the initial conditions are taken non-negative for all the state variables. The disease-free equilibrium (DFE) of the model is found to be unique and the basic reproduction number is found using the next-generation matrix method. The model has a locally stable DFE whenever the basic reproduction number is less than unity otherwise the DFE becomes unstable. Moreover, the global stability of the DFE is guaranteed when $\mathscr{R}_0<1$. This can be inferred that COVID-19 will be mitigated from the community if the corresponding parameters are in the range to ensure $\mathscr{R}_0<1$. The existence of the endemic equilibrium is investigated and it is found that at most two endemic equilibria may exist for the system. Forward transcritical bifurcation is established both analytically and numerically between DFE and one of the endemic equilibrium (see Fig. <ref>). Further, it is numerically shown that all the infected compartments tend to vanish in the long run when $\mathscr{R}_0<1$ and approaches a non-zero equilibrium when $\mathscr{R}_0>1$ (shown in Fig. <ref>).
We calibrated the proposed model parameters to fit daily mortality data of two districts of India during the period of March $1^{st}$, 2021 to May $31^{st}$, 2021. From the fitting of the model output to mortality data, it can be seen that the model output closely anticipates the real data for both the districts. Afterwards, we investigate the impacts of control strategies and immigration of un-notified persons on the number of hospitalized patients. We concentrate on both pharmaceutical and non-pharmaceutical control measures as they are being implemented simultaneously to combat the deadly disease. Two pharmaceutical measures namely, treatment of hospitalized persons and vaccination of susceptibles as well as recovered persons are considered. On the other hand, face mask efficacy and community-wide compliance of face masks are considered as non-pharmaceutical control measures. Along with these interventions, we also study the effect of immigrating un-notified persons from other communities. Individual controls and immigration of infectives are initially projected to understand their sole impact on the hospitalized cases. It is found that treatment of hospitalized patients and vaccination of susceptible impacts has a significant impact on the reduction of hospitalized cases (see Fig. <ref> and Fig. <ref>). Therefore, pharmaceutical measures are more reliable than non-pharmaceutical controls. Additionally, immigration of un-notified infected persons may drive the hospitalized cases to higher prevalence. We calculated the percentage reduction in total hospitalized patients to get a quantitative idea of the control measures and immigration. It is reinforced that face mask related controls have a lower impact than pharmaceutical measures like treatment and vaccination. The immigration of un-notified patients has a negative impact on the total hospitalized cases and thus this should be kept as low as possible. Low immigration of infectives can be maintained by restricting immigration from highly affected neighbouring districts. Further, we investigate the combined effect of two strategies on the total number of hospitalized patients for both districts. We found that the combination of treatment and vaccination of susceptible individuals will be very effective to reduce the disease. Finally, we compare three or more interventions by calculating the percentage reduction of notified and hospitalized patients with different levels of feasible control measures and immigration rates. We examine strategy I – strategy IV (as defined in the previous section) and find that combination of all controls with low immigration will have the best effect on the reduction of the disease. However, the second case of strategy III also show competitive results in terms of percentage reduction of both populations. This strategy differs from the strategy IV by the vaccination of recovered people. Therefore, it can be concluded that when vaccine crisis is there, the public health authorities may not vaccinate the recovered people. In other words, the people who were tested COVID-19 positive in past and are now healthy (they may have developed natural antibodies against SARS-CoV-2) may be vaccinated later when vaccines are available. Low immigration of un-notified patients can be regulated by restricting the movement of people from high prevalence adjacent districts. This analysis can be made with data from other profoundly affected districts with proper parametrization.
In summary, the results indicate that vaccination of susceptible individuals and treatment of hospitalized patients are very crucial to control COVID-19 in the two locations. In the three months short-term period, vaccination of susceptible people should be prioritized over vaccination of recovered people for a better outcome. Whenever vaccine crisis is there, governments may avoid the vaccination of people who were tested COVID-19 positive and are now healthy. However, increased quality and quantity of mask use are also helpful. Along with face mask use, treatment of hospitalized patients and vaccination of susceptibles, immigration should be allowed in a supervised manner so that economy of the overall society remain healthy.
§ ACKNOWLEDGEMENTS
Research of Indrajit Ghosh is supported by National Board for Higher Mathematics (NBHM) postdoctoral fellowship (Ref. No: 0204/3/2020/R & D-II/2458), Department of Atomic Energy, Government of India.
§ CONFLICT OF INTEREST
The authors declare that they have no conflict of interest.
[1]
Coronavirus worldometer.
<https://www.worldometers.info/coronavirus/>, 2021.
Retrieved : 2021-06-04.
[2]
<https://www.covid19india.org/>, 2021.
Retrieved : 2021-06-09.
[3]
Demographics worldometer.
Retrieved : 2021-06-04.
[4]
Macrotrends bangalore population.
Retrieved : 2021-06-09.
[5]
Macrotrends chennai population.
Retrieved : 2021-06-09.
[6]
Sarah Addleman, Victor Leung, Leyla Asadi, Abdu Sharkawy, and Jennifer
Mitigating airborne transmission of sars-cov-2.
CMAJ, 193(26):E1010–E1011, 2021.
[7]
MA Andrews, Binu Areekal, KR Rajesh, Jijith Krishnan, R Suryakala, Biju
Krishnan, CP Muraly, and PV Santhosh.
First confirmed case of covid-19 infection in india: A case report.
The Indian Journal of Medical Research, 151(5):490, 2020.
[8]
Jyostna Bere, Naga Dharant Jonnalagadda, Lavanya Kappari, Jyoshika Karangula,
Narender Boggula, and Vedhavathi Kappari.
2-deoxy-d-glucose: an update review.
Journal For Innovative Development in Pharmaceutical and
Technical Science (JIDPTS), 4(5):68–78, 2021.
[9]
Carlos Castillo-Chavez, Zhilan Feng, Wenzhang Huang, et al.
On the computation of $\mathcal{R}_0$ and its role in global
stability, in mathematical approaches for emerging and reemerging infectious
diseases: an introduction (minneapolis, mn, 1999).
IMA Volumes in Mathematics and Its Applications, New York,
Springer, 125:229–250, 2002.
[10]
Carlos Castillo-Chavez and Baojun Song.
Dynamical models of tuberculosis and their applications.
Mathematical Biosciences & Engineering, 1(2):361–404, 2004.
[11]
Wongyeong Choi and Eunha Shim.
Optimal strategies for vaccination and social distancing in a
game-theoretic epidemiologic model.
Journal of Theoretical Biology, 505:110422, 2020.
[12]
Odo Diekmann, Johan Andre Peter Heesterbeek, and Johan AJ Metz.
On the definition and the computation of the basic reproduction ratio
$r_0$ in models for infectious diseases in heterogeneous populations.
Journal of Mathematical Biology, 28(4):365–382, 1990.
[13]
Covid-19 transmission—up in the air.
The Lancet. Respiratory Medicine, 8(12):1159, 2020.
[14]
Brody H Foy, Brian Wahl, Kayur Mehta, Anita Shet, Gautam I Menon, and Carl
Comparing covid-19 vaccine allocation strategies in india: A
mathematical modelling study.
International Journal of Infectious Diseases, 103:431–438,
[15]
Indrajit Ghosh and Maia Martcheva.
Modeling the effects of prosocial awareness on covid-19 dynamics:
Case studies on colombia and india.
Nonlinear Dynamics, 104:4681–4700, 2021.
[16]
Trisha Greenhalgh, Jose L Jimenez, Kimberly A Prather, Zeynep Tufekci, David
Fisman, and Robert Schooley.
Ten scientific reasons in support of airborne transmission of
The Lancet, 397(10285):1603–1605, 2021.
[17]
William Ogilvy Kermack and Anderson G McKendrick.
A contribution to the mathematical theory of epidemics.
Proceedings of the Royal Society A: Mathematical Physical and
Engineering Sciences, 115(772):700–721, 1927.
[18]
Hien Lau, Tanja Khosrawipour, Piotr Kocbach, Hirohito Ichii, Jacek Bania, and
Veria Khosrawipour.
Evaluating the massive underreporting and undertesting of covid-19
cases in multiple global epicenters.
Pulmonology, 27(2):110–115, 2021.
[19]
Qun Li, Xuhua Guan, Peng Wu, Xiaoye Wang, Lei Zhou, Yeqing Tong, Ruiqi Ren,
Kathy SM Leung, Eric HY Lau, Jessica Y Wong, et al.
Early transmission dynamics in wuhan, china, of novel
coronavirus–infected pneumonia.
New England Journal of Medicine, 382:1199–1207, 2020.
[20]
Natalie M Linton, Tetsuro Kobayashi, Yichi Yang, Katsuma Hayashi, Andrei R
Akhmetzhanov, Sung-mok Jung, Baoyin Yuan, Ryo Kinoshita, and Hiroshi
Incubation period and other epidemiological characteristics of 2019
novel coronavirus infections with right truncation: a statistical analysis of
publicly available case data.
Journal of Clinical Medicine, 9(2):538, 2020.
[21]
Yang Liu, Li-Meng Yan, Lagen Wan, Tian-Xin Xiang, Aiping Le, Jia-Ming Liu,
Malik Peiris, Leo LM Poon, and Wei Zhang.
Viral dynamics in mild and severe cases of covid-19.
The Lancet Infectious Diseases, 20(6):656–657, 2020.
[22]
Leonardo López and Xavier Rodó.
The end of social confinement and covid-19 re-emergence risk.
Nature Human Behaviour, 4(7):746–755, 2020.
[23]
Sandip Mandal, Tarun Bhatnagar, Nimalan Arinaminpathy, Anup Agarwal, Amartya
Chowdhury, Manoj Murhekar, Raman R Gangakhedkar, and Swarup Sarkar.
Prudent public health intervention strategies to control the
coronavirus disease 2019 transmission in india: A mathematical model-based
The Indian Journal of Medical Research, 151(2-3):190, 2020.
[24]
Maia Martcheva.
An Introduction to Mathematical Epidemiology, volume 61.
Springer, New York, 2015.
[25]
Samuel Mwalili, Mark Kimathi, Viona Ojiambo, Duncan Gathungu, and Rachel Mbogo.
Seir model for covid-19 dynamics incorporating the environment and
social distancing.
BMC Research Notes, 13(1):1–5, 2020.
[26]
Calistus N Ngonghala, Enahoro A Iboi, and Abba B Gumel.
Could masks curtail the post-lockdown resurgence of covid-19 in the
Mathematical Biosciences, 329:108452, 2020.
[27]
Dcgi approves anti-covid drug developed by drdo for emergency use.
<https://pib.gov.in/PressReleasePage.aspx?PRID=1717007>, 2021.
Press Information Bureau, Government of India. 2021-05-08 Retrieved :
[28]
Danish Rafiq, Suhail Ahmad Suhail, and Mohammad Abid Bazaz.
Evaluation and prediction of covid-19 in india: A case study of worst
hit states.
Chaos, Solitons & Fractals, 139:110014, 2020.
[29]
Fernando Saldaña, Hugo Flores-Arguedas, José Ariel
Camacho-Gutiérrez, and Ignacio Barradas.
Modeling the transmission dynamics and the impact of the control
interventions for the covid-19 epidemic outbreak.
Mathematical Biosciences & Engineering, 17(4):4165–4183,
[30]
Kailash Chandra Samal, Bhagyalaxmi Panda, and Laxmipreeya Behera.
Anti-covid drug: 2-deoxy-d-glucose and its mechanism of action.
Biotica Research Today, 3(5):345–347, 2021.
[31]
Tridip Sardar, Sk Shahid Nadim, Sourav Rana, and Joydev Chattopadhyay.
Assessment of lockdown effect in some states and overall india: A
predictive mathematical study on covid-19 outbreak.
Chaos, Solitons & Fractals, 139:110078, 2020.
[32]
Alan Sariol and Stanley Perlman.
Lessons for covid-19 immunity from other coronavirus infections.
Immunity, 53(2):248–263, 2020.
[33]
Kankan Sarkar, Subhas Khajanchi, and Juan J Nieto.
Modeling and forecasting the covid-19 pandemic in india.
Chaos, Solitons & Fractals, 139:110049, 2020.
[34]
Abhishek Senapati, Sourav Rana, Tamalendu Das, and Joydev Chattopadhyay.
Impact of intervention on the spread of covid-19 in india: A model
based study.
Journal of Theoretical Biology, 523:110711, 2021.
[35]
Suresh K Sharma, Mayank Mishra, and Shiv K Mudgal.
Efficacy of cloth face mask in prevention of novel coronavirus
infection transmission: A systematic review and meta-analysis.
Journal of Education and Health Promotion, 9:192, 2020.
[36]
Khan Sharun and Kuldeep Dhama.
India’s role in covid-19 vaccine diplomacy.
Journal of Travel Medicine, 2021.
[37]
Arvinder S Soin, Kuldeep Kumar, Narendra S Choudhary, Pooja Sharma, Yatin
Mehta, Sushila Kataria, Deepak Govil, Vikas Deswal, Dhruva Chaudhry,
Pawan Kumar Singh, et al.
Tocilizumab plus standard care versus standard care in patients in
india with moderate to severe covid-19-associated cytokine release syndrome
(covintoc): an open-label, multicentre, randomised, controlled, phase 3
The Lancet Respiratory Medicine, 9(5):511–521, 2021.
[38]
Richard OJH Stutt, Renata Retkute, Michael Bradley, Christopher A Gilligan, and
John Colvin.
A modelling framework to assess the likely effectiveness of facemasks
in combination with ‘lock-down’ in managing the covid-19 pandemic.
Proceedings of the Royal Society A: Mathematical Physical and
Engineering Sciences, 476(2238):20200376, 2020.
[39]
Lauren Tindale, Michelle Coombe, Jessica E Stockdale, Emma Garlock, Wing
Yin Venus Lau, Manu Saraswat, Yen-Hsiang Brian Lee, Louxin Zhang, Dongxuan
Chen, Jacco Wallinga, et al.
Transmission interval estimates suggest pre-symptomatic spread of
MedRxiv, 2020.
[40]
Pauline van den Driessche and James Watmough.
Reproduction numbers and sub-threshold endemic equilibria for
compartmental models of disease transmission.
Mathematical Biosciences, 180(1-2):29–48, 2002.
[41]
Marianne van der Sande, Peter Teunis, and Rob Sabel.
Professional and home-made face masks reduce exposure to respiratory
infections among the general population.
PloS One, 3(7):e2618, 2008.
[42]
Neeltje van Doremalen, Trenton Bushmaker, Dylan H Morris, Myndi G Holbrook,
Amandine Gamble, Brandi N Williamson, Azaibi Tamin, Jennifer L Harcourt,
Natalie J Thornburg, Susan I Gerber, et al.
Aerosol and surface stability of sars-cov-2 as compared with
New England Journal of Medicine, 382(16):1564–1567, 2020.
[43]
Coronavirus disease 2019 (covid-19): situation report, 73.
<https://apps.who.int/iris/handle/10665/331686>, 2020.
[44]
Rolling updates on coronavirus disease (covid-19): Who characterizes
covid-19 as a pandemic.
[45]
Roman Woelfel, Victor Max Corman, Wolfgang Guggemos, Michael Seilmaier, Sabine
Zange, Marcel A Mueller, Daniela Niemeyer, Patrick Vollmar, Camilla Rothe,
Michael Hoelscher, et al.
Clinical presentation and virological assessment of hospitalized
cases of coronavirus disease 2019 in a travel-associated transmission
MedRxiv, 2020.
[46]
Joseph T Wu, Kathy Leung, and Gabriel M Leung.
Nowcasting and forecasting the potential domestic and international
spread of the 2019-ncov outbreak originating in wuhan, china: a modelling
The Lancet, 395(10225):689–697, 2020.
[47]
Zunyou Wu and Jennifer M McGoogan.
Characteristics of and important lessons from the coronavirus disease
2019 (covid-19) outbreak in china: summary of a report of 72 314 cases from
the chinese center for disease control and prevention.
JAMA, 323(13):1239–1242, 2020.
[48]
Xiao-Wei Xu, Xiao-Xin Wu, Xian-Gao Jiang, Kai-Jin Xu, Ling-Jun Ying, Chun-Lian
Ma, Shi-Bo Li, Hua-Ying Wang, Sheng Zhang, Hai-Nv Gao, et al.
Clinical findings in a group of patients infected with the 2019 novel
coronavirus (sars-cov-2) outside of wuhan, china: retrospective case series.
BMJ, 368:m606, 2020.
[49]
Qinling Yan, Yingling Tang, Dingding Yan, Jiaying Wang, Linqian Yang, Xinpei
Yang, and Sanyi Tang.
Impact of media reports on the early spread of covid-19 epidemic.
Journal of Theoretical Biology, 502:110385, 2020.
[50]
Penghui Yang, Yibo Ding, Zhe Xu, Rui Pu, Ping Li, Jin Yan, Jiluo Liu, Fanping
Meng, Lei Huang, Lei Shi, et al.
Epidemiological and clinical features of covid-19 patients with and
without pneumonia in beijing, china.
MedRxiv, 2020.
| arxiv-papers | 2021-07-27T12:57:36 | 2024-09-04T03:07:21.509189 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Saheb Pal and Indrajit Ghosh",
"submitter": "Indrajit Ghosh",
"url": "https://arxiv.org/abs/2107.12785"
} |
2107.12788 | # On the data persistency of replicated erasure codes in distributed storage
systems
Roy Friedman111Research supported by the Israel Science Foundation grant
#1505/16. [email protected] Rafał Kapelko222Supported by Polish National
Science Center (NCN) grant 2019/33/B/ST6/02988 [email protected] Karol
Marchwicki33footnotemark: 3 [email protected] Computer Science
Department, Technion - Israel Institute of Technology, Haifa 32000, Israel
Department of Fundamentals of Computer Science, Wrocław University of
Technology, Poland
###### Abstract
This paper studies the fundamental problem of data persistency for a general
family of redundancy schemes in distributed storage systems, called replicated
erasure codes. Namely, we analyze two strategies of replicated erasure codes
distribution: random and symmetric. For both strategies we derive closed
analytical and asymptotic formulas for expected data persistency despite nodes
failure.
###### keywords:
erasure codes, replication, storage system, asymptotic
## 1 Introduction
### 1.1 Background
Distributed storage systems are very common these days [1, 2, 4, 14]. Storing
data on multiple servers enables scalability, i.e., the ability to handle a
large number of clients, a large number of concurrent requests, and large
amounts of data. Further, geo-distribution helps reduce client access times by
routing client’s requests to a server that is relatively close to them in
terms of Internet topology. Finally, distributed systems offer an inherent
level of fault-tolerance, since if one server fails or becomes disconnected,
other servers can potentially step in to continue the service.
An important criteria for storage systems is long term data persistency. That
is, it should be possible to retrieve any stored data item even long after it
has last been actively saved. This is despite failures and even complete
erasures of storage units, which may occur due to wear and tear, operator
errors, bugs, and even malicious activity. To that end, a distributed system
offers two immediate mechanisms: _replication_ and _error correcting codes_
[10, 15, 19]. In replication, multiple copies of each data item are stored in
multiple distinct servers which are assumed to exhibit independent failure
pattern. This way, if one server is down, or its storage has been erased, the
data can still be retrieved from a replica. This ensures fast recovery, at the
cost of multiplying the storage overhead by the replication factor.
In error correction, each collection of $p$ data items is encoded into $p+q$
chunks, which are spread over $p+q$ distinct, failure independent, servers.
This way, when needed, a stored data item can be retrieved from any $p$ out of
the corresponding $p+q$ servers that collectively encoded the missing data
item. This reduces the storage cost, but increases the recovery time and
network overhead during data recovery.
Hence, replication and error correcting codes present a trade-off, whose right
balance point depends on the applications requirements, network bandwidth,
storage costs, and more [19]. The expected data persistency as well as the
maintenance costs of any of the above systems may be analyzed based on the
choice of the replication degree $r$ or the choice of $p$ and $q$, as the case
may be, together with the other systems characteristics [16].
In order to avoid the above dichotomy and offer a more flexible design,
replicated erasure codes have been proposed [8]. In the latter, each of the
$p+q$ chunks may be replicated $r$ times. In this paper, we investigate the
fundamental problem of expected data persistency of replicated erasure codes
when the storage nodes permanently leave the system and erase their locally
stored data. This study is related and motivated by the work of [8]. Namely,
the general family of redundancy schemes for distributed storage systems,
called replicated erasure codes was introduced in [8].
### 1.2 Preliminaries and Notation
Formally, we recall the definition of replicated erasure codes.
###### Definition 1 (replicated erasure codes $REC(p,p+q,r)$).
Let $p\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ and
$r\in\mathbb{N}\setminus\\{0\\}$ be fixed.
* 1.
The original file $f$ is divided into $p$ chunks and then encoded into $p+q$
chunks; $f_{1}(1),f_{2}(1),$ $\dots f_{p+q}(1)$ chunks after encoding.
* 2.
Each of the $p+q$ chunks is replicated into $r\geq 1$ replicas such that:
$f_{1}(1),f_{1}(2),\dots f_{1}(r)$ are replicas of the chunk $f_{1}(1)$,
$f_{2}(1),f_{2}(2),\dots f_{2}(r)$ are replicas of the chunk $f_{2}(1)$,
$\dots$
$f_{p+q}(1),f_{p+q}(2),\dots f_{p+q}(r)$ are replicas of the chunk
$f_{p+q}(1).$
* 3.
The total $r\cdot(p+q)$ chunks are spread according to some replication
strategy among storage nodes.
The purpose of this paper is the analysis of two replication strategies:
random [18] and symmetric [9]. The random strategy is simple: all chunks are
spread randomly among storage nodes. In the symmetric strategy nodes in the
system are split into groups of size $(p+q)\cdot r$ in which every node keeps
chunks of all data stored at other nodes in the same group (The precise
meaning of the mentioned strategies will be explained further in Algorithm 1
in Section 3 and in Algorithm 2 in Section 4).
Also, we recall the properties of restoring an original data item that is
divided and encoded according to erasure codes in terms of the replication
multisets.
###### Assumption 2 (properties of erasure codes $REC(p,p+q,r)$).
We call the multisets
$U_{1}=\\{f_{1}(1),f_{1}(2),\dots f_{1}(r)\\},$
$U_{2}=\\{f_{2}(1),f_{2}(2),\dots f_{2}(r)\\},$ $\dots$
$U_{p+q}=\\{f_{p+q}(1),f_{p+q}(2),\dots f_{p+q}(r)\\}$ the replication
multisets. To restore the original file, one has to download $p$ chunks, each
from a different replication multiset.
Figure 1 illustrates Assumption 2 for system parameters $p=1,$ $q=2$ and
$r=4$. Observe that, in this special case, to restore the original file $f$,
one has to download two fragments $f_{1}(i),$ $f_{2}(j)$ or $f_{1}(i),$
$f_{3}(j)$ or $f_{2}(i),$ $f_{3}(j)$ for some $i,j\in\\{1,2,3,4\\}$.
$U_{1}$ | $f_{1}(1)$ | $f_{1}(2)$ | $f_{1}(3)$ | $f_{1}(4)$
---|---|---|---|---
$U_{2}$ | $f_{2}(1)$ | $f_{2}(2)$ | $f_{2}(3)$ | $f_{2}(4)$
$U_{3}$ | $f_{3}(1)$ | $f_{3}(2)$ | $f_{3}(3)$ | $f_{4}(4)$
Fig. 1: The replication multisets $U_{1},$ $U_{2},$ $U_{3}$ for the replicated
erasure codes $REC(1,3,4),$ i.e. the system parameters $p=1,$ $q=2$ and $r=4.$
We are now ready to formulate the main problem of data persistency of
replicated erasure codes that is investigated in this paper.
###### Assumption 3 (data persistency of ($REC(p,p+q,r)$)).
Let $N$ be the number of nodes in the storage system and let $D$ be the number
of documents.
* (i)
Assume that each document is replicated according to replicated erasure codes
(see Definition 1 and Assumption 2).
* (ii)
Suppose that nodes successively, independently at random leave the storage
system and erase the data that they stored without notice.
Let $X_{(p,p+q,r)}^{(N,D)}$ denote the number of nodes which must be removed
so that restoring some document is no longer possible. The data persistency of
$REC(p,p+q,r)$ is the random variable $X_{(p,p+q,r)}^{(N,D)}.$
Our main goal is to study the expected value of the random variable
$X_{(p,p+q,r)}^{(N,D)}$ as a function of the parameters $p,q,r,N,D$.
Specifically, we derive a closed analytical formula for
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$ under two replication
strategies: random and symmetric, and explain tradeoffs arising among the
parameters $p,q,r,N,D$.
### 1.3 Contributions and Outline of this Paper
The main contributions of this work include deriving closed form and
asymptotic formulas for the persistency of distributed storage systems that
employ the replicated erasure coding scheme using the random and symmetric
placement strategies. For the specific case that the chosen parameters provide
maximal persistency, we give an exact formula. Our formulas are expressed in
terms of Beta functions.
More specifically, consider a distributed storage system consisting of $N$
nodes and $D$ documents, where each document is replicated according to
replicated erasure codes. That is, fix $p\in\mathbb{N}\setminus\\{0\\}$,
$q\in\mathbb{N}$ and $r\in\mathbb{N}\setminus\\{0\\}$. Each document is
divided into $p$ chunks and then encoded into $p+q$ chunks. Each of the $p+q$
chunks are replicated into $r$ replicas (see Definition 1). All chunks are
spread in the storage nodes according to either the random or the symmetric
strategy (see Algorithm 1 in Section 3 and Algorithm 2 in Section 4).
We further assume that nodes successively, independently at random leave the
storage system and erase the data that they stored without notice. The
objective is to derive the formula for the expected data persistency of
replicated erasure codes in the storage system, i.e., the number of nodes in
the storage system which must be removed so that restoring some document is no
longer possible. To this aim, we make the following two novel contributions:
* 1.
We derive for random and symmetric replication strategies closed form integral
formula for the expected data persistency in terms of incomplete Beta function
(see Theorem 8 in Section 3 and Theorem 10 in Section 4) and asymptotics
formulas (see Theorem 9 in Section 3 and Theorem 12 in Section 4).
* 2.
When the maximal expected data persistency of replicated erasure codes for
both replication strategies is attained by the replicated erasure codes with
parameter $p=1$ (see Corollary 7 in Section 3 and Corollary 11 in Section 4)
444Notice that for $p=1$ replicated erasure codes becomes simply replication
with $(1+q)r$ replicas. we give exact formulas for the expected data
persistency in terms of Beta Function (see Subsection 5.2).
Table 1 summarizes the results proved in this paper (see the Landau asymptotic
notation in Section 2). Let us recall that to restore the original file, one
has to download $p$ chunks, each from $r$ different replication sets (see
Assumption 3). Thus, if $q+1$ chunks in each $r$ replication sets are
distributed in the nodes that leave the storage system then restoring the
original file is not possible. For the random replication strategy, the
expected data persistency is in $N\Theta\left(D^{-\frac{1}{r(q+1)}}\right)$.
If the documents are replicated according to symmetric strategy the expected
data persistency is in $\Theta\left(N^{1-\frac{1}{r(q+1)}}\right)$.
Table 1: The expected data persistency of replicated erasure codes as a function of the replication parameters $p,q,r,$ the number of nodes $N$ and the number of documents $D.$ Replication strategy | $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$ | Algorithm | Theorems
---|---|---|---
random | $N\Theta\left(D^{-\frac{1}{r(q+1)}}\right)$ | 1 | 8, 9
symmetric | $\Theta\left(N^{1-\frac{1}{r(q+1)}}\right)$ | 2 | 10, 12
The rest of the paper is organized as follows. Section 2 provides several
preliminary results that will be used in the sequel. In Section 3 we derive
the main results on the expected data persistency of replicated erasure codes
for the random strategy. Section 4 deals with the main results on the expected
data persistency of replicated erasure codes for the symmetric strategy.
Section 5 presents further insights including comparision of the random and
symmetric placement strategies, non-uniform redundancy scheme and exact
formulas in terms of Beta function. The numerical results are presented in
Section 6. Finally, Conclusions are drawn in Section 7, where we also outline
some future research directions.
## 2 Mathematical Background
In this section, we recall some basic facts about special functions: Gamma,
Beta and incomplete Beta that will be used in the sequel. We also prove Lemma
4 and Lemma 5 about asymptotic expansions for some function that will be
helpful in deriving our main asymptotic results Theorem 9 in Section 3 and
Theorem 12 in Section 4. Finally, we recall Formula (5) for discrete
nonnegative random variable and the Landau asymptotic notation. The Gamma
function is defined via a convergent improper integral
$\Gamma(z)=\int_{0}^{\infty}t^{z-1}e^{-t}dt,\,\,\,\,z>0.$
If $n$ is an integer, the Gamma function is related to factorial
$\Gamma(n+1)=n!.$
The Beta function $\mathrm{Beta}(a,b)$ (see [7, Chapter 8]) is defined for all
positive integer numbers $a,b$ via a convergent improper integral
$\mathrm{Beta}(a,b)=\int_{0}^{1}t^{a-1}(1-t)^{b-1}dt.$ (1)
It is related to the binomial coefficient. Namely,
$\mathrm{Beta}(a,b)=\frac{1}{\binom{a+b-2}{a-1}(a+b-1)}.$ (2)
The incomplete Beta function is defined for all positive integer numbers $a,b$
by the formula
$I_{x}(a,b)=\frac{1}{\mathrm{Beta}(a,b)}\int_{0}^{x}t^{a-1}(1-t)^{b-1}dt,\,\,\,\text{when}\,\,0\leq
x\leq 1.$ (3)
The following Identity about incomplete Beta function is known and can be
proved using integration by parts.
$1-I_{x}(a,b)=\sum_{j=0}^{a-1}\binom{a+b-1}{j}x^{j}(1-x)^{a+b-1-j},$ (4)
(see [13, Identity 8.17.5] for $c=m$ and $d=n-m+1$).
###### Lemma 4.
Assume that $p,r\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ are fixed and
independent on $n.$ Consider the following function
$f(x)=-\ln\left(1-I_{x^{r}}(q+1,p)\right),$
where $I_{x^{r}}(q+1,p)$ is the incomplete Beta function. Then
1. (i)
$f(x)>f(0)$ for all $x\in(0,1),$ and for every $\delta>0$ the infimum of
$f(x)-f(0)$ in $[\delta,1)$ is positive,
2. (ii)
$f(x)$ has as $x\rightarrow 0^{+}$ the following expansion
$\sum_{k=0}^{\infty}a_{k}x^{k+r(q+1)},$
where $a_{0}=\binom{p+q}{q+1}$ and the expansion of $f$ is term-wise
differentiated, that is
$f^{{}^{\prime}}(x)=\sum_{k=0}^{\infty}a_{k}(k+r(q+1))x^{k+r(q+1)-1}.$
###### Proof.
Using Formula (3) we see that the function $I_{x^{r}}(q+1,p)$ is monotonically
increasing over the interval $[0,1]$, giving us the first part of Lemma 4.
To prove the second part, we apply (4) for $a:=q+1,$ $b:=p,$ $x:=x^{r}$ and
derive
$f(x)=-\ln\left(\sum_{j=0}^{q}\binom{p+q}{j}x^{rj}\left(1-x^{r}\right)^{p+q-j}\right).$
By the binomial theorem we have
$\displaystyle f(x)$
$\displaystyle=-\ln\left(1-\sum_{j=q+1}^{p+q}\binom{p+q}{j}x^{rj}\left(1-x^{r}\right)^{p+q-j}\right)$
$\displaystyle=-\ln\left(1-\binom{p+q}{q+1}x^{r(q+1)}-\sum_{j=q+2}^{p+q}a_{j}x^{rj}\right).$
It is very well known that the natural logarithm has Maclaurin series
$-\ln(1-x)=\sum_{k=1}^{\infty}\frac{x^{k}}{k}.$
Applying this expansion for
$x:=\binom{p+q}{q+1}x^{r(q+1)}+\sum_{j=q+2}^{p+q}a_{j}x^{rj}$ we get
$\displaystyle-\ln\left(1-\binom{p+q}{q+1}x^{r(q+1)}-\sum_{j=q+2}^{p+q}a_{j}x^{rj}\right)$
$\displaystyle=\sum_{k=1}^{\infty}\frac{\left(\binom{p+q}{q+1}x^{r(q+1)}+\sum_{j=q+2}^{p+q}a_{j}x^{rj}\right)^{k}}{k}.$
From this we derive easily
$\displaystyle f(0)=$ $\displaystyle
f^{\prime}(0)=f^{\prime\prime}(0)=\dots=f^{(r(q+1)-1)}(0)=0,$ $\displaystyle
f^{(r(q+1))}(0)=\binom{p+q}{q+1}(r(q+1))!$
Therefore
$f(x)=\sum_{k=0}^{\infty}a_{k}x^{k+r(q+1)},\,\,\,\,\,\,f^{{}^{\prime}}(x)=\sum_{k=0}^{\infty}a_{k}(k+r(q+1))x^{k+r(q+1)-1}$
and
$a_{0}=\frac{f^{(r(q+1))}(0)}{(r(q+1))!}=\binom{p+q}{q+1}.$
This is enough to prove Lemma 4. ∎
###### Lemma 5.
Assume that $p,r\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ are fixed and
independent on $n.$ Consider the following function
$f(x)=-((p+q)r)^{-1}\ln\left(1-\left(I_{x}(q+1,p)\right)^{r}\right),$
where $I_{x}(q+1,p)$ is the incomplete Beta function. Then
1. (i)
$f(x)>f(0)$ for all $x\in(0,1),$ and for every $\delta>0$ the infimum of
$f(x)-f(0)$ in $[\delta,1)$ is positive,
2. (ii)
$f(x)$ has as $x\rightarrow 0^{+}$ the following expansion
$\sum_{k=0}^{\infty}a_{k}x^{k+r(q+1)},$
where $a_{0}=((p+q)r)^{-1}\binom{p+q}{q+1}^{r}$ and the expansion of $f$ is
term-wise differentiated, that is
$f^{{}^{\prime}}(x)=\sum_{k=0}^{\infty}a_{k}(k+r(q+1))x^{k+r(q+1)-1}.$
###### Proof.
The proof of Lemma 5 is analogous to that of Lemma 4. Using Formula (3), we
see that the function $I_{x}(q+1,p)$ is monotonic increasing over the interval
$[0,1]$ and get the first part of Lemma 4.
To prove the second part, we apply (4) for $a:=q+1,$ $b:=p,$ $x:=x$ and derive
$f(x)=-((p+q)r)^{-1}\ln\left(1-\left(1-\sum_{j=0}^{q}\binom{p+q}{j}x^{j}\left(1-x\right)^{p+q-j}\right)^{r}\right).$
By the binomial theorem we have
$\displaystyle f(x)$
$\displaystyle=-((p+q)r)^{-1}\ln\left(1-\left(\sum_{j=q+1}^{p+q}\binom{p+q}{j}x^{j}\left(1-x\right)^{p+q-j}\right)^{r}\right)$
$\displaystyle=-((p+q)r)^{-1}\ln\left(1-\binom{p+q}{q+1}^{r}x^{r(q+1)}-\sum_{j=q+2}^{p+q}a_{j}x^{rj}\right).$
Let us recall that the natural logarithm has Maclaurin series
$-\ln(1-x)=\sum_{k=1}^{\infty}\frac{x^{k}}{k}.$
Using this for
$x:=\binom{p+q}{q+1}^{r}x^{r(q+1)}+\sum_{j=q+2}^{p+q}a_{j}x^{rj}$ we get
$\displaystyle-\ln\left(1-\binom{p+q}{q+1}^{r}x^{r(q+1)}-\sum_{j=q+2}^{p+q}a_{j}x^{rj}\right)$
$\displaystyle=\sum_{k=1}^{\infty}\frac{\left(\binom{p+q}{q+1}^{r}x^{r(q+1)}+\sum_{j=q+2}^{p+q}a_{j}x^{rj}\right)^{k}}{k}.$
From this we derive easily
$\displaystyle f(0)=$ $\displaystyle
f^{\prime}(0)=f^{\prime\prime}(0)=\dots=f^{(r(q+1)-1)}(0)=0,$ $\displaystyle
f^{(r(q+1))}(0)=((p+q)r)^{-1}\binom{p+q}{q+1}^{r}(r(q+1))!$
Therefore
$f(x)=\sum_{k=0}^{\infty}a_{k}x^{k+r(q+1)},\,\,\,\,\,\,f^{{}^{\prime}}(x)=\sum_{k=0}^{\infty}a_{k}(k+r(q+1))x^{k+r(q+1)-1}$
and
$a_{0}=\frac{f^{(r(q+1))}(0)}{(r(q+1))!}=((p+q)r)^{-1}\binom{p+q}{q+1}^{r}.$
This is enough to prove Lemma 5. ∎
Assume that $X$ is a discrete nonnegative random variable. Then
$\mathbf{E}\left[X\right]=\sum_{l\geq 0}\Pr[X>l]$ (5)
(see [17, Exercise 2.1]).
We recall the following asymptotic notation:
$(a)$ $f(n)=O(g(n))$ if there exists a constant $C_{1}>0$ and integer $N$ such
that $|f(n)|\leq C_{1}|g(n)|$ for all $n>N,$
$(b)$ $f(n)=\Omega(g(n))$ if there exists a constant $C_{2}>0$ and integer $N$
such that $|f(n)|\geq C_{2}|g(n)|$ for all $n>N,$
$(c)$ $f(n)=\Theta(g(n))$ if and only if $f(n)=O(g(n))$ and
$f(n)=\Omega(g(n)).$
## 3 Analysis of Random Replicated Erasure Codes
In this section, we investigate the expected data persistency of replicated
erasure codes for the random replication strategy. Namely, we analyse
Algorithm 1. It is worth pointing out that while Algorithm 1 is very simple,
its analysis is not completely trivial.
Algorithm 1 Random replication of $REC(p,p+q,r)$
0: A system of $N$ storage nodes; $f^{(1)},f^{(2)},\dots f^{(D)}$ data items;
each of the data items is encoded and replicated into $(p+q)r$ chunks (see
Definition 1); $f^{(1)}_{1}(j),f^{(1)}_{2}(j),\dots f^{(1)}_{p+q}(j),$
$f^{(2)}_{1}(j),f^{(2)}_{2}(j),\dots f^{(2)}_{p+q}(j),\dots$
$f^{(d)}_{1}(j),f^{(d)}_{2}(j),\dots f^{(D)}_{p+q}(j),$ for
$j\in\\{1,2\dots,r\\},$ fragments after encoding and replication.
0: The final random and independent positions of $(p+q)rD$ fragments in the
nodes of the storage system (see Figure $2$).
1: for $k=1$ to $D$ do
2: for $j=1$ to $r$ do
3: for $l=1$ to $p+q$ do
4: choose randomly and independently node in the storage system;
5: replicate fragment $f^{(k)}_{l}(j)$ at the chosen node;
6: end for
7: end for
8: end for
Figure $2$ illustrates Algorithm 1 for the system parameters $p=q=1$, $r=2$,
$D=6$ and $N=8$. In this case, each document is divided and encoded into $4$
chunks. Hence, we have $24$ chunks spread randomly and independently in the
$8$ nodes.
$\begin{array}[]{|c|c|c|c|c|c|c|c|c|c|}\hline\cr n&1&2&3&4&5&6&7&8\\\
\hline\cr&f^{(1)}_{1}(1)&f^{(2)}_{1}(1)&f^{(1)}_{2}(1)&f^{(1)}_{1}(2)&f^{(1)}_{2}(2)&f^{(2)}_{2}(1)&f^{(2)}_{1}(2)&f^{(2)}_{2}(2)\\\
&f^{(6)}_{1}(1)&f^{(3)}_{1}(1)&f^{(4)}_{1}(2)&f^{(3)}_{2}(2)&f^{(4)}_{2}(1)&f^{(4)}_{1}(1)&f^{(3)}_{2}(1)&f^{(3)}_{1}(2)\\\
&&&&f^{(4)}_{2}(2)&f^{(5)}_{1}(1)&f^{(6)}_{1}(2)&f^{(5)}_{1}(2)&\\\
&&&&&f^{(5)}_{2}(1)&f^{(6)}_{2}(1)&&\\\ &&&&&f^{(5)}_{2}(2)&&&\\\
&&&&&f^{(6)}_{2}(2)&&&\\\ \hline\cr\end{array}$ Fig. 2: Random replicated
strategy according to Algorithm 1 for replicated erasure codes $REC(1,2,2),$
i.e. the system parameters $p=q=1,$ $r=2,$ the number of documents $d=6$ and
the number of nodes $n=8.$
We now prove the following exact formula for the expected data persistency of
replicated erasure codes with the random replication strategy. In the proof of
Corollary 6, we derive $\Pr\left[X_{(p,p+q,r)}^{(N,D)}>l\right]$ (see Equation
(6)) and apply Identity (5) to get the desired exact formula as the sum of
incomplete Beta functions.
###### Corollary 6.
Let Assumption 3 hold. Assume that all chunks are spread randomly and
independently in the storage nodes as in Algorithm 1. Then
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\sum_{l=0}^{N}\left(1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p)\right)^{D},$
where $I_{\left(\frac{l}{N}\right)^{r}}(q+1,p)$ is the incomplete Beta
function.
###### Proof.
Let $N$ be the number of nodes and let $D$ be the number of documents in the
storage system. Assume that nodes successively, independently at random leave
the storage system and erase the data that they stored without notice.
Let us recall that random variable $X_{(p,p+q,r)}^{(N,D)}$ denotes the number
of nodes which must be removed so that restoring some document becomes
impossible. Fix $i\in\\{1,2,\dots,p+q\\}$. Assume that the set of nodes of
cardinality $l$ are all removed. Since the $l$ nodes successively,
independently at random leave the storage system, the probability that we
remove all chunks from the replication set $U_{i}$ is equal to
$\left(\frac{l}{N}\right)^{r}$. Notice that to restore the fixed file $f$, one
has to download $p$ chunks, each from a different replication multiset, i.e.,
at most $q$ replication multisets can be removed (see Assumption 2).
Therefore, the probability for restoring the fixed file $f$, when $l$ nodes
successively, independently at random leave the storage system the storage
system is equal to
$\sum_{j=0}^{q}\binom{p+q}{j}\left(\left(\frac{l}{N}\right)^{r}\right)^{j}\left(1-\left(\frac{l}{N}\right)^{r}\right)^{p+q-j}.$
Since each of $D$ documents are transformed into chunks (see Definition 1) and
all the chunks are spread independently and randomly among storage nodes, we
have
$\Pr\left[X_{(p,p+q,r)}^{(N,D)}>l\right]=\left(\sum_{j=0}^{q}\binom{p+q}{j}\left(\left(\frac{l}{N}\right)^{r}\right)^{j}\left(1-\left(\frac{l}{N}\right)^{r}\right)^{p+q-j}\right)^{D}.$
(6)
Combining together Equation (5) for random variable
$X:=X_{(p,p+q,r)}^{(N,D)}$, Equation (6), as well as
$\Pr[X_{(p,p+q,r)}^{(N,D)}>l]=0$ for any $l\geq N+1$, we get
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\sum_{l=0}^{N}\left(\sum_{j=0}^{q}\binom{p+q}{j}\left(\left(\frac{l}{N}\right)^{r}\right)^{j}\left(1-\left(\frac{l}{N}\right)^{r}\right)^{p+q-j}\right)^{D}.$
Applying Identity (4) for $a:=q+1,$ $b:=p$ we have the desired Formula
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\sum_{l=0}^{N}\left(1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p)\right)^{D}.$
This completes the proof of Corollary 6. ∎
We now observe that the maximal expected data persistency of replicated
erasure codes for the random replication strategy is attained by the
replicated erasure codes with parameter $p=1$. Namely, we combine together the
result of previous Corollary 6 with well known Identity [13, Identity 8.17.21]
for the incomplete Beta function to obtain Corollary 7.
###### Corollary 7.
Under the assumption of Corollary 6 we have
$\max_{p\geq
1}\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right].$
###### Proof.
Applying [13, Identity 8.17.21] for $a:=q+1$ and $b:=p$, as well as Identity
(2) for $a:=q+1,$ and $b:=p$ we have
$I_{x}(q+1,p+1)-I_{x}(q+1,p)=x^{1+q}(1-x)^{p}{p+q\choose p}\geq 0.$ (7)
Using (7) for $x:=\left(\frac{l}{N}\right)^{r}$ we have
$1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p)\geq
1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p+1).$
Hence
$\sum_{l=0}^{N}\left(1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p)\right)^{D}\geq\sum_{l=0}^{N}\left(1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p+1)\right)^{D}.$
Applying Corollary 6 we get
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]\geq\mathbf{E}\left[X_{(p+1,p+1+q,r)}^{(N,D)}\right].$
Hence
$\max_{p\geq
1}\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right].$
This completes the proof of Corollary 7. ∎
The next theorem provides an explicit integral formula for
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$
###### Theorem 8.
Let Assumption 3 hold. Assume that all chunks are spread randomly and
independently in the storage nodes as in Algorithm 1. Then
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=N\int_{0}^{1}\left(1-I_{x^{r}}(q+1,p)\right)^{D}dx+ER,$
where $I_{x^{r}}(q+1,p)$ is the incomplete Beta function and $|ER|\leq 1.$
###### Proof.
The main idea of the proof is simple. It is an approximation of the sum in
Corollary 6 by an integral. Notice that
$\sum_{l=0}^{N}\left(1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p)\right)^{D}=\int_{0}^{N}\left(1-I_{\left(\frac{y}{N}\right)^{r}}(q+1,p)\right)^{D}dy+\Delta,$
(8)
where $f(y)=\left(1-I_{\left(\frac{y}{N}\right)^{r}}(q+1,p)\right)^{D}$ and
$|\Delta|\leq\sum_{l=0}^{N}\max_{l\leq y<l+1}|f(y)-f(l)|$ (see [6, Page 179]).
From (3), we deduce that the function
$I_{\left(\frac{y}{N}\right)^{r}}(q+1,p)$ is monotone increasing over the
interval $[0,N]$. Therefore, the function $f(y)$ is monotone decreasing over
the interval $[0,N]$ and the error term $|\Delta|$ telescopes on the interval
$[0,N]$. Hence
$|\Delta|\leq|f(0)-f(N)|^{d}=1.$ (9)
It is easy to see that
$\int_{0}^{N}\left(1-I_{\left(\frac{y}{N}\right)^{r}}(q+1,p)\right)^{D}dy\\\
=N\int_{0}^{1}\left(1-I_{x^{r}}(q+1,p)\right)^{D}dx.$ (10)
Finally, combining together the result of Theorem 7 with (8-10) we get
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=N\int_{0}^{1}\left(1-I_{x^{r}}(q+1,p)\right)^{D}dx+ER,$
where $|ER|\leq 1$. This is enough to prove Theorem 8. ∎
Unfortunately, the formula in the statement of Theorem 8 makes it difficult to
apply it in practice. To that end, we now formulate a very useful asymptotic
approximation for $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$. In the next
Theorem, we analyze the expected data persistency of replicated erasure codes
for the random replication strategy when the number of documents $D$ is large.
In the proof of Theorem 9, we apply the Erdélyi’s formulation of Laplace’s
method for the integral formula obtained in Theorem 8. The following
asymptotic result is true
###### Theorem 9.
Under the assumption of Theorem 8 for large number of documents $D$ we have
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\frac{\Gamma\left(1+\frac{1}{r(q+1)}\right)}{\binom{p+q}{q+1}^{\frac{1}{r(q+1)}}}N{D^{-\frac{1}{r(q+1)}}}\left(1+O\left(D^{-\frac{1}{r(q+1)}}\right)\right)+O(1),$
where $\Gamma\left(1+\frac{1}{r(q+1)}\right)$ is the Gamma function.
###### Proof.
Assume that $p\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ and
$r\in\mathbb{N}\setminus\\{0\\}$ are fixed and independent of $D$. Let
$I(D)=\int_{0}^{1}\left(1-I_{x^{r}}(q+1,p)\right)^{D}dx.$ (11)
We now provide asymptotic analysis of $I(D)$ for large $D.$ In this analysis
we use the Erdélyi’s formulation of Laplace’s method. See [5, 12, 20] for a
description of this technique. Observe that
$I(D)=\int_{0}^{1}e^{-Df(x)}dx,$
where $f(x)=-\ln\left(1-I_{x^{r}}(q+1,p)\right).$
From Lemma 4 we deduce that the assumption of Theorem 1.1 in [12] holds for
$f(x):=-\ln\left(1-I_{x^{r}}(q+1,p)\right),$ $g(x):=1,$ $a:=0$ and $b:=1.$
Namely, we apply Formula $(1.5)$ in [12, Theorem 1.1] for $a:=0$ $f(0):=0,$
$\lambda:=D,$ $\beta:=1,$ $\alpha:=r(q+1),$ $b_{0}=1,$
$a_{0}=\binom{p+q}{q+1},$ $n:=k$ and deduce that the integral $I(D)$ has the
following asymptotic expansion
$\sum_{k=0}^{\infty}\Gamma\left(\frac{k+1}{r(q+1)}\right)\frac{c_{k}}{D^{\frac{k+1}{r(q+1)}}},$
as $D\rightarrow\infty,$ where
$(c_{0})^{-1}=\binom{p+q}{q+1}^{\frac{1}{r(q+1)}}r(q+1)$ and
$\Gamma\left(\frac{k+1}{r(q+1)}\right)$ is the Gamma function. Therefore
$I(D)=\frac{\Gamma\left(\frac{1}{r(q+1)}\right)\frac{1}{r(q+1)}}{{\binom{p+q}{q+1}}^{\frac{1}{r(q+1)}}}\frac{1}{D^{\frac{1}{r(q+1)}}}+O\left(\frac{1}{D^{\frac{2}{r(q+1)}}}\right).$
Using the basic identity for the Gamma function
$\Gamma\left(\frac{1}{r(q+1)}\right)\frac{1}{r(q+1)}=\Gamma\left(1+\frac{1}{r(q+1)}\right)$
(see [13, Identity 5.5.1] for $z:=\frac{1}{r(q+1)}$) we get
$I(D)=\frac{\Gamma\left(1+\frac{1}{r(q+1)}\right)}{{\binom{p+q}{q+1}}^{\frac{1}{r(q+1)}}}\frac{1}{D^{\frac{1}{r(q+1)}}}+O\left(\frac{1}{D^{\frac{2}{r(q+1)}}}\right).$
(12)
Finally, combining together the result of Theorem 8, (11) and (12) we have
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\frac{\Gamma\left(1+\frac{1}{r(q+1)}\right)}{\binom{p+q}{q+1}^{\frac{1}{r(q+1)}}}N{D^{-\frac{1}{r(q+1)}}}\left(1+O\left(D^{-\frac{1}{r(q+1)}}\right)\right)+O(1).$
This completes the proof of Theorem 9. ∎
Table 2 explains Theorem 9 for $p\in\mathbb{N}\setminus\\{0\\}$ and some fixed
parameters $q,r$ in terms of asymptotic notations. In view of Theorem 9, we
have
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=N{\Theta\left(D^{-\frac{1}{r(q+1)}}\right)}+O(1).$
Table 2: The expected data persistency of replicated erasure codes replicated erasure codes for random replication strategy as a function of system parameters $p,q,r$ provided that $D$ is large. parameter $p$ | parameter $q$ | parameter $r$ | $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$
---|---|---|---
$p\in\mathbb{N}\setminus\\{0\\}$ | $q=0$ | $r=1$ | ${N}{\Theta\left(D^{-1}\right)}+O(1)$
$p\in\mathbb{N}\setminus\\{0\\}$ | $q=0$ | $r=2$ | $N{\Theta\left(D^{-\frac{1}{2}}\right)}+O(1)$
$p\in\mathbb{N}\setminus\\{0\\}$ | $q=1$ | $r=2$ | $N{\Theta\left(D^{-\frac{1}{4}}\right)}+O(1)$
$p\in\mathbb{N}\setminus\\{0\\}$ | $q=2$ | $r=3$ | $N{\Theta\left(D^{-\frac{1}{9}}\right)}+O(1)$
## 4 Analysis of Symmetric Replicated Erasure Codes
In this section, we analyze the expected data persistency of replicated
erasure codes for the symmetric replication strategy. We note that the concept
of the expected data persistency for symmetric replication strategy was
investigated in Marchwicki’s PhD thesis [11]. Namely, symmetric replication of
erasure codes was analyzed and the asymptotic result formulated in Theorem 12
of the current paper was earlier obtained for very special parameters
$p\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ and $r=1$. In our notation,
this means for the case $REC(p,p+q,1)$. Thus, in Theorem 12 below we
generalizes one of the main results of PhD thesis [11] for all parameters
$r\in\mathbb{N}\setminus\\{0\\}$. We are now ready to present and analyse
Algorithm 2.
Algorithm 2 Symmetric replication of $REC(p,p+q,r).$
0: A system of $N$ storage nodes; $f^{(1)},f^{(2)},\dots f^{(D)}$ data items;
each of the data items is encoded and replicated into $(p+q)r$ chunks (see
Definition 1); $f^{(1)}_{1}(j),f^{(1)}_{2}(j),\dots f^{(1)}_{p+q}(j),$
$f^{(2)}_{1}(j),f^{(2)}_{2}(j),\dots f^{(2)}_{p+q}(j),\dots$
$f^{(d)}_{1}(j),f^{(d)}_{2}(j),\dots f^{(D)}_{p+q}(j),$ for
$j\in\\{1,2\dots,r\\},$ fragments after encoding and replication.
0: The final positions of $(p+q)rD$ fragments in the nodes of the storage
system (see Figure $3$).
1: $A:=1;$
2: for $k=1$ to $D$ do
3: for $j=1$ to $r$ do
4: for $l=1$ to $p+q$ do
5: replicate fragment $f^{(k)}_{l}(j)$ at the node with identifier $A;$
6: $A:=A+1\mod N;$
7: end for
8: end for
9: end for
Figure $3$ illustrates Algorithm 2 for the system parameters $p=q=1,$ $r=2,$
number of documents $D=7$ and number of nodes $N=16$. In this case, each
document is divided and encoded into $4$ chunks. Hence, we have $28$ chunks
replicated according to the symmetric strategy in $16$ nodes.
$\begin{array}[]{|c|c|c|c|c|c|c|c|c|c|}\hline\cr n&1&2&3&4&5&6&7&8\\\
\hline\cr&f^{(1)}_{1}(1)&f^{(1)}_{2}(1)&f^{(1)}_{1}(2)&f^{(1)}_{2}(2)&f^{(2)}_{1}(1)&f^{(2)}_{2}(1)&f^{(2)}_{1}(2)&f^{(2)}_{2}(2)\\\
&f^{(5)}_{1}(1)&f^{(5)}_{2}(1)&f^{(5)}_{1}(2)&f^{(5)}_{2}(2)&f^{(6)}_{1}(1)&f^{(6)}_{2}(1)&f^{(6)}_{1}(2)&f^{(6)}_{2}(2)\\\
\hline\cr\hline\cr n&9&10&11&12&13&14&15&16\\\
\hline\cr&f^{(3)}_{1}(1)&f^{(3)}_{2}(1)&f^{(3)}_{1}(2)&f^{(3)}_{2}(2)&f^{(4)}_{1}(1)&f^{(4)}_{2}(1)&f^{(4)}_{1}(2)&f^{(4)}_{2}(2)\\\
&f^{(7)}_{1}(1)&f^{(7)}_{2}(1)&f^{(7)}_{1}(2)&f^{(7)}_{2}(2)&&&&\\\
\hline\cr\end{array}$ Fig. 3: Symmetric replicated strategy according to
Algorithm 2 for replicated erasure codes $REC(1,2,2),$ i.e. the system
parameters $p=q=1,$ $r=2,$ the number of documents $D=7$ and the number of
nodes $n=16.$
We now prove the following exact formula for the expected data persistency of
replicated erasure codes for the symmetric replication strategy as the
integral of incomplete Beta functions. It is worth pointing out that the proof
of Theorem 10 is technically complicated. However, as in the proof of
Corollary 6 in the previous section, we derive
$\Pr\left[X_{(p,p+q,r)}^{(N,D)}>l\right]$ (see Equations (13), (17)) and apply
Identity (5) to get the desired exact integral formula for
$\mathbf{E}\left[K_{(p,p+q,r)}^{(N,D)}\right]$ (see Equations (19), (21) and
(25)).
###### Theorem 10.
Let Assumption 3 hold. Assume that all chunks are replicated according to the
symmetric strategy in the storage nodes as in Algorithm 1. Let $(p+q)r$ be a
divisor of the number of nodes $N$ and the number of documents
$D\geq\frac{N}{(p+q)r}$. Then
$\mathbf{E}\left[K_{(p,p+q,r)}^{(N,D)}\right]=(N+1)\int_{0}^{1}\left(1-\left(I_{x}(q+1,p)\right)^{r}\right)^{\frac{N}{(p+q)r}}dx,$
where $I_{x}(q+1,p)$ is the incomplete Beta function.
We note that the expected data persistency of symmetric replicated erasure
codes does not depend on the number of documents $D$.
###### Proof.
Fix $p\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ and
$r\in\mathbb{N}\setminus\\{0\\}.$ Let $\Omega$ denote the set of nodes in the
storage system. Assume that $|\Omega|=N$ and $\frac{N}{(p+q)r}\in\mathbb{N},$
and all chunks are replicated according to the symmetric strategy in the
storage nodes as in Algorithm 1.
We now make the following important observation. Namely,
$\displaystyle U_{i,j}=$
$\displaystyle\\{(p+q)(r(i-1)+(j-1))+1,(p+q)(r(i-1)+(j-1))+2,$
$\displaystyle\dots,(p+q)(r(i-1)+(j-1))+(p+q)\\},$
for $i=1,2,\dots,\frac{n}{(p+q)r}$ and for $j=1,2,\dots,r$ is the fixed
partition of the set $\Omega$ into disjoint clusters of cardinality $p+q$.
Suppose that we are successively, independently and randomly removing distinct
nodes from the set $\Omega$. Let $\omega_{1},\omega_{2},\ldots$ be a
realization of this process. Observe that
$X_{(p,p+q,r)}^{(N,D)}=\min\\{l:(\exists i)(\forall
j)(U_{i,j}\cap\\{\omega_{1},\ldots,\omega_{l}\\}=q+1)\\}$
(see Assumption 3). Let $[\Omega]^{l}$ denote the family of all subsets of
$\Omega$ of cardinality $l$. Let $X$ be a random element from $[\Omega]^{l}.$
Then
$\Pr[X_{(p,p+q,r)}^{(N,D)}>l]=\frac{|\\{X\in[\Omega]^{l}:(\forall i)(\exists
j)(0\leq U_{i,j}\cap X\leq q)\\}|}{|[\Omega]^{l}|}~{}.$ (13)
Let us consider the space $[\Omega]^{l}$ with uniform probability. Assume that
$(\forall i)(\exists j)(0\leq U_{i,j}\cap X\leq q).$
Let $j_{1},j_{2},\dots,j_{r}\in\\{0,1,\dots,p+q\\}.$ Define
$A(p,q,r)=\\{(j_{1},j_{2},\dots,j_{r})\in\\{0,1,\dots p+q\\}:j_{1}\leq
q\,\vee\,j_{2}\leq q\vee\dots\vee j_{r}\leq q\\}.$
Let $k_{(j_{1},j_{2},\dots,j_{r})}$ denote the number of occurrences of
$(j_{1},j_{2},\dots,j_{r})$ in the sequence
$\\{(U_{i,1}\cap X,U_{i,2}\cap X,\dots,U_{i,r}\cap
X)\\}_{i\in\left\\{1,2,\dots,\frac{N}{(p+q)r}\right\\}}.$
Observe that
$\sum_{A(p,q,r)}k_{(j_{1},j_{2},\dots,j_{r})}=\frac{N}{(p+q)r},$ (14)
$\sum_{A(p,q,r)}(j_{1}+j_{2}+\dots+j_{r})k_{(j_{1},j_{2},\dots,j_{r})}=l.$
(15) $\displaystyle
D(p,q,r,l)=\\{k_{(j_{1},j_{2},\dots,j_{r})}:\sum_{A(p,q,r)}(j_{1}+j_{2}+\dots+j_{r})k_{(j_{1},j_{2},\dots,j_{r})}=l\\}.$
(16)
Putting all together (13-16) we derive
$\displaystyle\Pr[X_{(p,p+q,r)}^{(N,D)}>l]$
$\displaystyle=\frac{\sum\limits_{D(p,q,r,l)}\left(\frac{\left(\frac{N}{(p+q)r}\right)!}{\prod\limits_{A(p,q,r)}\left(k_{(j_{1},j_{2},\dots,j_{r})}\right)!}\right)\prod\limits_{A(p,q,r)}\left(\binom{p+q}{j_{1}}\binom{p+q}{j_{2}}\dots\binom{p+q}{j_{r}}\right)^{k_{(j_{1},j_{2},\dots,j_{r})}}}{\binom{N}{l}}.$
(17)
Observe that $\Pr[X_{(p,p+q,r)}^{(N,D)}>l]=0$ for any $l\geq q\frac{N}{p+q}+1$
(see Equation (14) and Equation (15) for $j_{1}=j_{2}=\dots=j_{q}=r$). Using
this and Identity (5) for random variable $X:=X_{(p,p+q,r)}^{(N,D)}$ we have
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\sum_{l\geq
0}\Pr[X_{(p,p+q,r)}^{(N,D)}>l]=\sum_{l=0}^{q\frac{N}{p+q}}\Pr[X_{(p,p+q,r)}^{(N,D)}>l].$
(18)
Combining together (17) and (18) we derive the first complicated formula for
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right].$
$\displaystyle\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\sum_{l=0}^{q\frac{N}{p+q}}{\binom{N}{l}}^{-1}\sum\limits_{D(p,q,r,l)}\left(\frac{\left(\frac{N}{(p+q)r}\right)!}{\prod\limits_{A(p,q,r)}\left(k_{(j_{1},j_{2},\dots,j_{r})}\right)!}\right)\times$
$\displaystyle\times\prod\limits_{A(p,q,r)}\left(\binom{p+q}{j_{1}}\binom{p+q}{j_{2}}\dots\binom{p+q}{j_{r}}\right)^{k_{(j_{1},j_{2},\dots,j_{r})}}.$
(19)
The rest of this proof is devoted to simplification of expression (19) for
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right].$ Using Formula (15) we get
$\left(\frac{x}{1-x}\right)^{l}=\prod\limits_{A(p,q,r)}\left(\frac{x}{1-x}\right)^{(j_{1}+j_{2}+\dots+j_{r})k_{(j_{1},j_{2},\dots,j_{r})}}.$
(20)
Applying Identities (1), (2) for $a:=l+1$ and $b:=N+1-l$ we have
${\binom{N}{l}}^{-1}=(N+1)\int_{0}^{1}x^{l}(1-x)^{N-l}dx.$
This together with (19) and (20), as well as interchanging summation with
integral lead to
$\displaystyle\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=(N+1)\int_{0}^{1}(1-x)^{N}\sum_{l=0}^{q\frac{N}{p+q}}\sum\limits_{D(p,q,r,l)}\left(\frac{\left(\frac{N}{(p+q)r}\right)!}{\prod\limits_{A(p,q,r)}\left(k_{(j_{1},j_{2},\dots,j_{r})}\right)!}\right)\times$
$\displaystyle\times\prod\limits_{A(p,q,r)}\left(\binom{p+q}{j_{1}}\binom{p+q}{j_{2}}\dots\binom{p+q}{j_{r}}\left(\frac{x}{1-x}\right)^{j_{1}+j_{2}+\dots+j_{r}}\right)^{k_{(j_{1},j_{2},\dots,j_{r})}}dx.$
From Equation (14) and multinomial theorem we get
$\displaystyle\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=(N+1)\int_{0}^{1}(1-x)^{N}\times$
$\displaystyle\times\left(\sum\limits_{A(p,q,r)}\binom{p+q}{j_{1}}\binom{p+q}{j_{2}}\dots\binom{p+q}{j_{r}}\left(\frac{x}{1-x}\right)^{j_{1}+j_{2}+\dots+j_{r}}\right)^{\frac{N}{(p+q)r}}dx$
$\displaystyle=(N+1)\int_{0}^{1}\left(\sum\limits_{A(p,q,r)}\prod_{k=1}^{r}\binom{p+q}{j_{k}}\left(x\right)^{j_{k}}\left(1-x\right)^{p+q-j_{k}}\right)^{\frac{N}{(p+q)r}}dx.$
(21)
We now define
$\displaystyle B(p,q,r)=$
$\displaystyle\\{(j_{1},j_{2},\dots,j_{r})\in\\{0,1,\dots p+q\\}:j_{1}\geq
q+1\,\wedge\,j_{2}\geq q+1\wedge\dots\wedge j_{r}\geq q+1\\}.$
Observe that
$A(p,q,r)\cup B(p,q,r)=\\{(j_{1},j_{2},\dots,j_{r})\in\\{0,1,\dots p+q\\}\\},$
(22) $A(p,q,r)\cap B(p,q,r)=\emptyset.$ (23)
Combining together (22) and the binomial theorem we derive
$\displaystyle\sum\limits_{A(p,q,r)\cup B(p,q,r)}$
$\displaystyle\prod_{k=1}^{r}\binom{p+q}{j_{k}}\left(x\right)^{j_{k}}\left(1-x\right)^{p+q-j_{k}}$
$\displaystyle=\prod_{k=1}^{r}\sum_{j_{k}=0}^{p+q}\binom{p+q}{j_{k}}\left(x\right)^{j_{k}}\left(1-x\right)^{p+q-j_{k}}=1.$
Using this, Identity (23), the binomial theorem, as well as Formula (4) for
$a:=q+1,$ $b:=p$ we derive
$\displaystyle\sum\limits_{A(p,q,r)}$
$\displaystyle\prod_{k=1}^{r}\binom{p+q}{j_{k}}\left(x\right)^{j_{k}}\left(1-x\right)^{p+q-j_{k}}$
$\displaystyle=1-\sum\limits_{B(p,q,r)}\prod_{k=1}^{r}\binom{p+q}{j_{k}}\left(x\right)^{j_{k}}\left(1-x\right)^{p+q-j_{k}}$
$\displaystyle=1-\left(\sum_{j=q+1}^{p+q}x^{j}(1-x)^{p+q-j}\right)^{r}=1-\left(I_{x}(q+1,p)\right)^{r}.$
(24)
Finally, combining together (21) and (24) we have the desired Formula
$\mathbf{E}\left[K_{(p,p+q,r)}^{(N,D)}\right]=(N+1)\int_{0}^{1}\left(1-\left(I_{x}(q+1,p)\right)^{r}\right)^{\frac{N}{(p+q)r}}dx.$
(25)
This completes the proof of Theorem 10. ∎
We now observe that like for the random replication strategy, the maximal
expected data persistency of replicated erasure codes for symmetric
replication strategy is attained by the replicated erasure codes with
parameter $p=1.$
###### Corollary 11.
Under the assumption of Theorem 10 we have
$\max_{p\geq
1}\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right].$
###### Proof.
The proof of Corollary 11 is analogous to that of Corollary 7. Using (7) we
have
$I_{x}(q+1,p+1)\geq I_{x}(q+1,p).$
Hence
$\left(1-\left(I_{x}(q+1,p)\right)^{r}\right)^{\frac{N}{(p+q)r}}\geq\left(1-\left(I_{x}(q+1,p+1)\right)^{r}\right)^{\frac{N}{(p+q)r}}.$
Applying Theorem 10 we get
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]\geq\mathbf{E}\left[X_{(p+1,p+1+q,r)}^{(N,D)}\right].$
Therefore
$\max_{p\geq
1}\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right].$
This completes the proof of Corollary 11. ∎
As before, the formula in Theorem 10 makes it hard to apply in practice. To
that end, we formulate in the next theorem a very useful asymptotic
approximation for $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$.
Particularly, we analyze the expected data persistency of replicated erasure
codes for the symmetric replication strategy when the number of nodes $N$ is
large. In the proof of Theorem 12 we apply again the Erdélyi’s formulation of
Laplace’s method for the integral formula obtained in Theorem 11.
###### Theorem 12.
Let Assumption 3 hold. Assume that all chunks are replicated according to the
symmetric strategy in the storage nodes as in Algorithm 1. Let $(p+q)r$ be a
divisor of the number of nodes $N$ and the number of documents
$D\geq\frac{N}{(p+q)r}$. Then
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\frac{\Gamma\left(1+\frac{1}{r(q+1)}\right)\left((p+q)r\right)^{\frac{1}{r(q+1)}}}{\binom{p+q}{q+1}^{\frac{1}{q+1}}}N^{1-\frac{1}{r(q+1)}}+O\left(\frac{1}{N^{\frac{2}{r(q+1)}}}\right),$
(26)
where $\Gamma\left(1+\frac{1}{r(q+1)}\right)$ is the Gamma function.
###### Proof.
The proof of Theorem 12 is analogous to that of Theorem 9. Assume that
$p\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ and
$r\in\mathbb{N}\setminus\\{0\\}$ are fixed and independent on $N$. Let
$J(N)=\int_{0}^{1}\left(1-\left(I_{x}(q+1,p)\right)^{r}\right)^{\frac{N}{(p+q)r}}dx.$
(27)
In the asymptotic analysis of $J(N)$ for large $N$ we apply the Erdélyi’s
formulation of Laplace’s method. Observe that
$J(N)=\int_{0}^{1}e^{-\frac{N}{(p+q)r}f(x)}dx,$
where $f(x)=-((p+q)r)^{-1}\ln\left(1-\left(I_{x}(q+1,p)\right)^{r}\right)$.
From Lemma 4, we deduce that the assumption of Theorem 1.1 in [12] holds for
$f(x):=-((p+q)r)^{-1}\ln\left(1-\left(I_{x}(q+1,p)\right)^{r}\right),$
$g(x):=1,$ $a:=0$ and $b:=1$. Namely, we apply Formula $(1.5)$ in [12, Theorem
1.1] for $a:=0$ $f(0):=0,$ $\lambda:=N,$ $\beta:=1,$ $\alpha:=r(q+1),$
$b_{0}=1,$ $a_{0}=((p+q)r)^{-1}\binom{p+q}{q+1}^{r},$ $n:=k$ and deduce that
the integral $J(N)$ has the following asymptotic expansion
$\sum_{k=0}^{\infty}\Gamma\left(\frac{k+1}{r(q+1)}\right)\frac{c_{k}}{\left(N\right)^{\frac{k+1}{r(q+1)}}},$
as $N\rightarrow\infty,$ where
$(c_{0})^{-1}=\left(\frac{1}{(p+q)r}\right)^{\frac{1}{r(q+1)}}\binom{p+q}{q+1}^{\frac{1}{q+1}}(r(q+1))$
and $\Gamma\left(\frac{k+1}{r(q+1)}\right)$ is the Gamma function. Therefore
$J(N)=\frac{\Gamma\left(\frac{1}{r(q+1)}\right)\frac{1}{r(q+1)}}{{\binom{p+q}{q+1}}^{\frac{1}{q+1}}}\frac{\left((p+q)r\right)^{\frac{1}{r(q+1)}}}{N^{\frac{1}{r(q+1)}}}+O\left(\frac{1}{N^{\frac{2}{r(q+1)}}}\right).$
Using the basic identity for the Gamma function
$\Gamma\left(\frac{1}{r(q+1)}\right)\frac{1}{r(q+1)}=\Gamma\left(1+\frac{1}{r(q+1)}\right)$
(see [13, Identity 5.5.1] for $z:=\frac{1}{r(q+1)}$) we get
$J(N)=\frac{\Gamma\left(1+\frac{1}{r(q+1)}\right)}{{\binom{p+q}{q+1}}^{\frac{1}{q+1}}}\frac{\left((p+q)r\right)^{\frac{1}{r(q+1)}}}{N^{\frac{1}{r(q+1)}}}+O\left(\frac{1}{N^{\frac{2}{r(q+1)}}}\right).$
(28)
Finally, combining together the result of Theorem 10, (27) and (28), we have
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\frac{\Gamma\left(1+\frac{1}{r(q+1)}\right)\left((p+q)r\right)^{\frac{1}{r(q+1)}}}{\binom{p+q}{q+1}^{\frac{1}{q+1}}}N^{1-\frac{1}{r(q+1)}}+O\left(\frac{1}{N^{\frac{2}{r(q+1)}}}\right).$
This completes the proof of Theorem 12. ∎
Table 3 explains Theorem 12 for $p\in\mathbb{N}\setminus\\{0\\}$ and some
fixed parameters $q,r$ and in terms of asymptotic notations. In view of
Theorem 12, we have
$\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\Theta\left(N^{1-\frac{1}{r(q+1)}}\right).$
Table 3: The expected data persistency of replicated erasure codes $REC(p,p+q,r)$ for symmetric replication strategy as a function of the system parameters $p,q,r,$ provided that $N$ is large. parameter $p$ | parameter $q$ | parameter $r$ | $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$
---|---|---|---
$p\in\mathbb{N}\setminus\\{0\\}$ | $q=0$ | $r=1$ | ${\Theta\left(1\right)}$
$p\in\mathbb{N}\setminus\\{0\\}$ | $q=0$ | $r=2$ | ${\Theta\left(N^{\frac{1}{2}}\right)}$
$p\in\mathbb{N}\setminus\\{0\\}$ | $q=1$ | $r=2$ | ${\Theta\left(N^{\frac{3}{4}}\right)}$
$p\in\mathbb{N}\setminus\\{0\\}$ | $q=2$ | $r=3$ | ${\Theta\left(N^{\frac{8}{9}}\right)}$
## 5 Discussions
In this study, we analyzed the expected data persistency of $REC(p,p+q,r)$
(replicated erasure codes) in distributed storage systems for the random and
symmetric replication strategies. Recall that in $REC(p,p+q,r)$, each document
is encoded and replicated. To restore the original document, one has to
download $p$ chunks, each from $r$ different replication sets (see Assumption
3). Thus, if $q+1$ chunks in each $r$ replication sets are placed in the nodes
that leave the storage system, then restoring the original document becomes
impossible.
The expected data persistency of a storage system for the random (as well as
the symmetric) strategy depends on $r(q+1)$. Namely, the expected data
persistency is in $N\Theta\left(D^{-\frac{1}{r(q+1)}}\right)$ for the random
replication strategy and is in $\Theta\left(N^{1-\frac{1}{r(q+1)}}\right)$ for
the symmetric replication strategy, where $N$ is the number of nodes in the
storage system and $D$ is the number of documents. Table 4 displays a
comparison of the strategies: random and symmetric.
Table 4: Comparision of the expected data persistency for random and symmetric erasure codes. | Number
---
of documents
Replication strategy | | Expected
---
data persistency
$D=O(N)$ | random | $N\Theta\left(D^{-\frac{1}{r(q+1)}}\right)$
$D=\Theta(N)$ | random or symmetric | $\Theta\left(N^{1-\frac{1}{r(q+1)}}\right)$
$D=\Omega(N)$ | symmetric | $\Theta\left(N^{1-\frac{1}{r(q+1)}}\right)$
Let us consider case $D=\Delta N,$ provided that $\Delta$ is constant, i.e.,
$\Delta$ is the average number of documents per node. Then both strategies
give asymptotically the same expected data persistency. When $D=O(N)$, then
the random strategy gives highest expected data persistency. If $D=\Omega(N)$,
then the symmetric strategy is better.
### 5.1 Non-uniform Redundancy Scheme
In this paper, it is assumed that each document is encoded and replicated
according to $REC(p,p+q,r)$ for some fixed parameters $p,q,r$. However, our
analysis is not limited to uniform settings only, and the proposed theory can
also handle non-uniform redundancy schemes, where each document is encoded and
replicated according to different parameters $p,q,r$.
Namely, assume that $D_{i}$ is the number of documents that are encoded and
replicated according to $REC(p_{i},p_{i}+q_{i},r_{i})$ for some fixed
$p_{i}\in\mathbb{N}\setminus\\{0\\},$ $q_{i}\in\mathbb{N}$ and
$r_{i}\in\mathbb{N}\setminus\\{0\\}$, provided that $i=1,2,\dots,k$ and
$D_{1}+D_{2}+\dots D_{k}=D$.
Then, the the expected data persistency of storage system with $D_{i}$
documents is in $N\Theta\left(D_{i}^{-\frac{1}{r(q+1)}}\right)$ for the random
replication strategy and is in $\Theta\left(N^{1-\frac{1}{r(q+1)}}\right)$ for
the symmetric replication strategy, where $N$ is the number of nodes. Of
course, the closed analytical and asymptotic formulas for expected data
persistency of a storage system with $D_{1}+D_{2}+\dots D_{k}$ documents need
further theoretical studies.
### 5.2 Exact Formulas in Terms of Beta Functions
We proved that the maximal expected data persistency of $REC(p,p+q,r)$ for
both replication strategies is attained by the replicated erasure codes with
parameter $p=1$ (see Theorem 7 in Section 3 and Theorem 11 in Section 4). Let
us recall that for $p=1$ replicated erasure codes becomes simply replication
with $(1+q)r$ replicas. If we restrict to $p=1$, we can give exacts formulas
for the expected data persistency of $REC(1,1+q,r)$ in terms of the Beta
function (see Formula (29) and Formula (30)).
#### a) The random strategy
Combining together Theorem 8 with Equation (4) for $a:=q+1,b:=1$ and
$x:=x^{r}$ we have
$\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right]=N\int_{0}^{1}\left(\sum_{j=0}^{q}\binom{q+1}{j}x^{rj}\left(1-x^{r}\right)^{q+1-j}\right)^{D}dx+ER.$
By the binomial theorem we get
$\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right]=N\int_{0}^{1}\left(1-x^{r(q+1)}\right)^{D}dx+ER.$
Together, substitution $y:=x^{r(q+1)}$ in the previous formula and Definition
1 for $a:=D+1,$ $b:=\frac{1}{r(q+1)}$ lead to
$\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right]=\frac{N}{r(q+1)}\mathrm{Beta}\left(D+1,\frac{1}{r(q+1)}\right)+ER,\,\,\,\text{where}\,\,\,|ER|\leq
1.$ (29)
#### b) The symmetric strategy
Combining together Theorem 10 with Equation (4) for $a:=q+1,b:=1$ we have
$\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right]=(N+1)\int_{0}^{1}\left(1-\left(1-\sum_{j=0}^{q}\binom{q+1}{j}x^{j}\left(1-x\right)^{q+1-j}\right)^{r}\right)^{\frac{N}{r(q+1)}}dx$
By the binomial theorem we get
$\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right]=(N+1)\int_{0}^{1}\left(1-x^{(q+1)r}\right)^{\frac{N}{r(q+1)}}dx.$
Together substitution $y:=x^{r(q+1)}$ in the previous formula and Definition 1
for $a:=\frac{N}{(q+1)r}+1,$ $b:=\frac{1}{r(q+1)}$ lead to
$\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right]=\frac{N+1}{r(q+1)}\mathrm{Beta}\left(\frac{N}{r(q+1)}+1,\frac{1}{r(q+1)}\right).$
(30)
We note that the Exact Formula (30) was obtained in [3] for the very special
parameter $r=1.$
## 6 Numerical Results
In this section, we use a set of experiments to show how the parameters
$p,q,r$ impact the expected data persistency of the two replication
strategies: random and symmetric. Algorithms 1 and 2 are implemented to
illustrate Theorem 9 together with the exact Formula (29) and Theorem 12.
We repeated the following experiments $10$ times. First, for each number of
nodes $N\in\\{48*1,48*2,48*3,48*62\\}$, we generated $50$ replicas of $D$
documents according to replicated erasure codes and Algorithms 1 and 2
respectively. Let $E_{n,50}$ be the average of $50$ measurements of the data
persistency. Then, we placed the points in the set
$\\{(n,E_{n,50}):n=48*1,48*2,48*3,\dots,48*62\\}$ into the picture.
$\mathbf{E}\left[X_{(1,1,2)}^{(N,5)}\right]=\frac{\mathrm{Beta}\left(6,\frac{1}{2}\right)}{2}N$
Fig. 4: The expected data persistency of Algorithm 1 for $p=1,$ $q=0,$ $r=2$
and $D=5$
$\mathbf{E}\left[X_{(1,1,2)}^{(N,N)}\right]=\Gamma\left(\frac{3}{2}\right)\sqrt{N}$
Fig. 5: The expected data persistency of Algorithm 1 for $p=1,$ $q=0,$ $r=2$
and $D=N$
In Figures 4 and 5 the dots represent the experimental data persistency of
Algorithm 1 considering the parameters $p=1,$ $q=0,$ $r=2,$ $D=5$ and $p=1,$
$q=0,$ $r=2,$ $D=N$ for the number of nodes
$N\in\\{48*1,48*2,48*3,\dots,48*62\\}$. The additional lines
$\left\\{\left(N,\frac{\mathrm{Beta}\left(6,\frac{1}{2}\right)}{2}N\right),48\leq
N\leq 2976\right\\},$
$\left\\{\left(N,\Gamma\left(\frac{3}{2}\right)\sqrt{N}\right),48\leq N\leq
2976\right\\},$ are the leading terms in the theoretical estimation of the
expected data persistency of Algorithm 1 when $p=1,$ $q=0,$ $r=2,$ $D=5$ (see
exact Formula (29) for $p=1,$ $q=0,$ $r=2,$ $D=5$) and when $p=1,$ $q=0,$
$r=2,$ $D=N$ (see Theorem 9 for $p=1,$ $q=0,$ $r=2,$ $D=N$). Figures 4 and 5
together illustrate the decline from
$\frac{\mathrm{Beta}\left(6,\frac{1}{2}\right)}{2}N$ to
$\Gamma\left(\frac{3}{2}\right)\sqrt{N}$ in the expected data persistency for
the random replication strategy in Algorithm 1 when the number of documents
$D$ increases from $5$ to $N$.
$\mathbf{E}\left[X_{(1,2,1)}^{(N,D)}\right]=\Gamma\left(\frac{3}{2}\right)2^{\frac{1}{2}}\sqrt{N}$
Fig. 6: The expected data persistency of Algorithm 2 for $p=1,$ $q=1,$ $r=1$
$\mathbf{E}\left[X_{(2,4,1)}^{(N,D)}\right]=\Gamma\left(\frac{4}{3}\right)N^{\frac{2}{3}}$
Fig. 7: The expected data persistency of Algorithm 2 for $p=2,$ $q=2,$ $r=1$
The experimental data persistency of Algorithm 2 considering the parameters
$p=1,$ $q=1,$ $r=1$ and $p=2,$ $q=2,$ $r=1$ is illustrated in Figures 6 and 7
for the number of nodes $N\in\\{48*1,48*2,48*3,\dots,48*62\\}$. Similarly, the
additional lines
$\left\\{\left(N,\Gamma\left(\frac{3}{2}\right)2^{\frac{1}{2}}\sqrt{N}\right),48\leq
N\leq 2976\right\\},$
$\left\\{\left(N,\Gamma\left(\frac{4}{3}\right)N^{\frac{2}{3}}\right),48\leq
N\leq 2976\right\\},$ are
the leading terms in the theoretical estimation of the expected data
persistency of Algorithm 2 when $p=1,$ $q=1,$ $r=1$ and when $p=2,$ $q=2,$
$r=1$ (see Theorem 12 for $p=1,$ $q=0,$ $r=1$ and $p=2,$ $q=2,$ $r=1$).
Figures 6 and 7 together illustrate the increase from
$\Gamma\left(\frac{3}{2}\right)2^{\frac{1}{2}}\sqrt{N}$ to
$\Gamma\left(\frac{4}{3}\right)N^{\frac{2}{3}}$ in the expected data
persistency for the random replication strategy in Algorithm 2 when $r=1$ and
$p,q$ increase from $1$ to $2$.
$\mathbf{E}\left[X_{(1,3,1)}^{(N,N)}\right]=\Gamma\left(\frac{4}{3}\right)N^{\frac{2}{3}}$
Fig. 8: The expected data persistency of Algorithm 1 for $p=1,$ $q=2,$ $r=1$
abd $D=N$
$\mathbf{E}\left[X_{(1,3,1)}^{(N,D)}\right]=\Gamma\left(\frac{4}{3}\right)3^{\frac{1}{3}}N^{\frac{2}{3}}$
Fig. 9: The expected data persistency of Algorithm 2 for $p=1,$ $q=2,$ $r=1$
Figure 8 depicts the experimental data persistency of Algorithm 1 for $p=1,$
$q=2,$ $r=1,$ $D=N$ and the number of nodes
$N\in\\{48*1,48*2,48*3,\dots,48*62\\}$. The additional line
$\left\\{\left(N,\Gamma\left(\frac{4}{3}\right)N^{\frac{2}{3}}\right),48\leq
N\leq 2976\right\\}$ is the leading term in the theoretical estimation (see
Theorem 9 for $p=1,$ $q=2,$ $r=1,$ $D=N$). The experimental data persistency
of Algorithm 2 for $p=1,$ $q=2,$ $r=1,$ and the number of nodes
$N\in\\{48*1,48*2,48*3,\dots,48*62\\}$ is depicted in Figure 9. Similary, the
additional line
$\left\\{\left(N,\Gamma\left(\frac{4}{3}\right)3^{\frac{1}{3}}N^{\frac{2}{3}}\right),48\leq
N\leq 2976\right\\}$ is the leading term in the theoretical estimation (see
Theorem 9 for $p=1,$ $q=2,$ $r=1$). Figures 8 and 9 together illustrate the
case when for both replication strategies random and symmetric the expected
data persistency is in $\Theta\left(N^{\frac{2}{3}}\right)$ (see Table 4 in
Section 5).
Finally, we point out that the carried experiments match the developed theory
very well.
## 7 Conclusions and Future research
In this paper, we addressed the fundamental problem of the data persistency of
replicated erasure codes for random and symmetric strategies. To this end, we
derived exact and asymptotically approximated formulas for the expected data
persistency, that is, the number of nodes in the storage system that must be
removed so that restoring some document would become impossible.
While we have discussed the applicability of our approach to non-uniform
redundancy schemes, a natural open problem for future study is to find a
closed form formula for the expected data persistency for non-uniform setting.
Additionally, it would be interesting to explore the problem of the data
persistency for a mixture of random and symmetric strategies or others
strategies.
## References
* [1] A. Aghayev, S. Weil, M. Kuchnik, M. Nelson, G. R. Ganger, and G. Amvrosiadis. The case for custom storage backends in distributed storage systems. 16(2), 2020.
* [2] A. Bracher, E. Hof, and A. Lapidoth. Guessing attacks on distributed-storage systems. IEEE Transactions on Information Theory, 65(11):6975–6998, 2019\.
* [3] J. Cichoń, R. Kapelko, and K.Marchwicki. Brief announcement: A note on replication of documents. In Stabilization, Safety, and Security of Distributed Systems - 13th International Symposium, SSS 2011, volume 6976 of LNCS, pages 439 –440. Springer, 2011.
* [4] M. Elyasi and S. Mohajer. Cascade codes for distributed storage systems. IEEE Transactions on Information Theory, 66(12):7490–7527, 2020\.
* [5] Arthur Erdélyi. Asymptotic Expansion. Dover, New York, 1956.
* [6] P. Flajolet and B. Sedgewick. An Introduction to the Analysis of Algorithms. Addison-Wesley, 1995.
* [7] Catherine Forbes, Merran Evans, Nicholas Hastings, and Brian Peacock. Statistical Distributions. John Wiley & Sons, 2011.
* [8] Roy Friedman, Yoav Kantor, and Amir Kantor. Replicated erasure codes for storage and repair-traffic efficiency. In 14-th IEEE International Conference on Peer-to-Peer Computing, 2014.
* [9] Ali Ghodsi, Luc Onana Alima, and Seif Haridi. Symmetric replication for structured peer-to-peer systems. In Databases, Information Systems, and Peer-to-Peer Computing, volume 4125 of Lecture Notes in Computer Science. Springer, 2007.
* [10] W. K. Lin, D.M. Chiu, and Y. B. Lee. Erasure Code Replication Revisited. In Proceedings of the 4th International Conference on Peer-to-Peer Computing, pages 90–97, 2004.
* [11] Karol Marchwicki. Efektywnosc i niezawodnosc w sieciach typu Peer-to-peer. PhD thesis, Institute of Computer Science, Polish Academy of Science, 2019\. in Polish.
* [12] Gergö Nemes. An explicit formula for the coefficients in laplace’s method. Constructive Approximation, 38(3):471–487, 2013.
* [13] NIST Digital Library of Mathematical Functions. http://dlmf.nist.gov/8.17.
* [14] A.S. Rawat, D. S. Papailiopoulos, A. G. Dimakis, and S. Vishwanath. Locality and availability in distributed storage. IEEE Transactions on Information Theory, 62(8):4481–4493, 2016\.
* [15] Rodrigo Rodrigues and Barbara Liskov. High Availability in DHTs: Erasure Coding vs. Replication. In Miguel Castro and Robbert Renesse, editors, Peer-to-Peer Systems, volume 3640 of Lecture Notes in Computer Science, pages 226–239. Springer Berlin Heidelberg, 2005.
* [16] Mark Silberstein, Lakshmi Ganesh, Yang Wang, Lorenzo Alvisi, and Mike Dahlin. Lazy Means Smart: Reducing Repair Bandwidth Costs in Erasure-Coded Distributed Storage. In Proc. of ACM International Conference on Systems and Storage, SYSTOR, 2014.
* [17] Wojciech Szpankowski. Average Case Analysis of Algorithms on Sequences. A Wiley-Interscience Publication, New York, 2001.
* [18] Quang Hieu Vu, Mihai Lupu, and Beng Chin Ooi. Peer-to-Peer Computing - Principles and Applications. 2009\.
* [19] Hakim Weatherspoon and John Kubiatowicz. Erasure Coding Vs. Replication: A Quantitative Comparison. In First International Workshop on Peer-to-Peer Systems, IPTPS, page 328–338. Springer-Verlag, 2002.
* [20] John Wojdylo. On the coefficients that arise from Laplace’s method. Journal of Computational and Applied Mathematics, 196:241–266, November 2006.
| arxiv-papers | 2021-07-27T13:00:21 | 2024-09-04T03:07:21.529256 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Roy Friedman, Rafa{\\l} Kapelko, Karol Marchwicki",
"submitter": "Rafal Kapelko",
"url": "https://arxiv.org/abs/2107.12788"
} |
2107.12791 | # Clickbait Detection in YouTube Videos
Ruchira Gothankar111Department of Computer Science, San Jose State University
Fabio Di Troia11footnotemark: 1 Mark Stamp11footnotemark: 1
222mark.stamp$@$sjsu.edu
###### Abstract
YouTube videos often include captivating descriptions and intriguing
thumbnails designed to increase the number of views, and thereby increase the
revenue for the person who posted the video. This creates an incentive for
people to post clickbait videos, in which the content might deviate
significantly from the title, description, or thumbnail. In effect, users are
tricked into clicking on clickbait videos. In this research, we consider the
challenging problem of detecting clickbait YouTube videos. We experiment with
multiple state-of-the-art machine learning techniques using a variety of
textual features.
## 1 Introduction
Today, web content is increasingly popular and people rely on information
obtained from the internet. Furthermore, with the diversity of available
resources, the amount of time spent on the internet has increased. Many
platforms provide a medium where virtually anyone can publish information that
is accessible to a large number of people. However, the credibility of such
information is not guaranteed.
Online sources of information include blogs, video sharing platforms, and
social media, among others. Many of these applications have been developed
with the main intent to generate revenue. Hence, unscrupulous people can use
false information to increase their viewership and increase their revenue.
Clickbait is false and deceptive information that lures users to click a link,
watch a video, or read an article. It aims to exploit the user’s curiosity by
providing misleading—though captivating—information. Clickbait has become a
marketing tool in many sectors to entice users and thereby to generate
revenue. Publishing eye-catching information to manipulate and trick users is
a common practice to increase the viewership and spread brand awareness. A
clickbait can be an image, a sensational headline, or a misleading video or
audio content. While clickbait sources help in gaining attention, there are
many disadvantages and negative ramifications. In fact, clickbait not only
wastes the time of viewers, but also affects the trustworthiness of the
underlying platform [25].
YouTube is a video publishing platforms where users upload videos and share
them with others. When uploading a video, the user adds a title, a
description, and a thumbnail. The other users then view the title and
thumbnail before deciding whether to view the video. Hence, this data become
crucial parameters on which the users can base their decision to watch a video
or not. For this reason, many YouTube content creators (aka YouTubers) use
clickbait title and thumbnails that might deviate from the actual content to
increase viewership for a video, and thereby generate more revenue.
A recent example includes the COVID-19 pandemic, where individuals have posted
misleading health-related content, including some fake cures for COVID-19.
Some other common examples of clickbait are video titles such as “You’ll Never
Believe What Happened Next$\ldots$”, “The 10 documentaries you should watch
before you die”, “You Can Now Travel Abroad Without Having to$\ldots$”,“You
Won’t Believe$\ldots$” and so on [13]. Figure 1 shows an example of clickbait
video on YouTube.
Figure 1: Clickbait video example [30]
The clickbait problem is somewhat similar to that of spam detection. Spam,
which is unsolicited emails, often includes misleading messages that are sent
to deceive users by redirecting them to websites for the purpose of
advertising or attack. Therefore, considerable research has been focused on
detecting spam. In this research, we are concerned with detecting clickbait
YouTube videos. The YouTube platform relies on users to manually flag
suspected malicious or clickbait content. However, a more automated approach
would clearly be desirable. We consider machine learning and deep learning
based solutions to the clickbait detection problem.
The remainder of this paper is organized as follows. Section 2 considers
relevant previous work and background topics related to natural language
processing (NLP). In Section 3, we discuss our experimental setup, including
the datasets used. Section 4 contains our experimental results and our
analysis of these results. In Section 5, we give our conclusions and we
discuss possible directions for future work.
## 2 Background
This Section discusses relevant work done in this field. We mainly focuses on
clickbait detection, fake news detection, image forgery detection, and hoax
detection. Apart from these topics, we also discuss advancements in natural
language processing (NLP).
### 2.1 Related Work
Clickbait is a way to attract the attention of the users by luring them to
access specific contents. However, misleading information is present on the
internet in multiple forms and is often used interchangeably in different
contexts. For example, a hoax is spreading false stories of, say, a celebrity
death [30], while an example of a forgery is an image that suggests false
information. We now discuss and analyze the performance of previous works on
clickbait, fake news, forgery, and hoax detection.
#### 2.1.1 Clickbait Detection
In 2016 [4], Chakraborty et al. implemented an ML classifier to detect
clickbait. They also created a browser extension to help readers navigate
around clickbait. They used the headlines from the Wiki-news corpus and used
18,513 articles as legitimate posts. For the clickbait posts, they used
articles from popular domains containing illegitimate content. To train their
classifier, they used a set of 14 features spanning linguistic analysis, word
patterns, and $N$-gram. They achieved an accuracy of about 89% using a support
vector machine (SVM) classifier.
Elyashar et al. [8] developed an approach focused on feature engineering.
Their work focused on detecting clickbait posts in online social media. They
performed linguistic analysis using a machine learning classifier which could
differentiate between legitimate and illegitimate posts. The dataset used for
analysis was provided by the 2017 Clickbait Challenge [20]. The results of
their experiments suggest that malicious content tends to be longer than the
benign content. They also concluded that the title of the post played an
important role to identify a clickbait.
Glenski et al. [11] developed a network model which is a linguistically
infused network to detect fake tweets. This model, which is based on long
short term memory (LSTM) and convolutional neural networks (CNN), used the
text of tweets, images, and description for training. Furthermore, the
pretrained embedding model GloVe was used as the embedding layer. They
achieved an accuracy of 82%. Zhou [36] proposed a self-attentive neural
network model using gated recurrent units (GRU) for predicting fake tweets.
They performed multi classification using the annotation scheme. As proof of
the success of their approach, they ranked first in the Clickbait Challenge
2017 with an F-score of 0.683.
#### 2.1.2 Fake News Detection
Fake news is a type of misinformation that has received considerable attention
in recent years. The main idea is to analyze the text content of a news item
to check if the statements are valid or not. Ahmad et al. [2] implemented an
ensemble model based on the linguistic features of the text which involved a
combination of multiple machine learning algorithms, namely, random forest,
multilayer perceptron, and support vector machine (SVM), to detect fake news.
They used XGBoost as an ensemble learner, achieving an accuracy of 92%.
Thota et al. [28] presented a paper on detecting fake news using natural
language processing. They used TF-IDF and Word2Vec with a dense neural network
based on the news headline. In another paper on fake news detection, Jwa et
al. [14] implemented a model using bidirectional encoder representations from
transformers (BERT). The deep contextualizing nature of BERT has yielded
strong results, including the ability to determine the relationship between
the headline and the body of a news article.
#### 2.1.3 Forgery Detection
As the name suggests, image forgery detection consists of trying to detect
malicious information that is conveyed through images. In 2018, Zhang et al.
[35] developed a “fauxtography” detector which could detect images which are
misleading on social media platforms.
Palod et al. [19] passed pretrained Word2Vec comment embeddings through an
LSTM network to generate a “fakeness” vector, and achieved an F-score of 0.82.
Shang et al. [25] proposed a model that involved network feature extraction,
metadata feature extraction, and linguistic feature extraction to detect
clickbait in YouTube videos. The network feature extraction used comments in
the videos and extracted semantic features. In the linguistic feature
extraction, they relied on document embedding for comments using Doc2Vec, and
they also employed a metadata module. In 2019, Reddy et al. [22] implemented a
model using word embedding and trained on a support vector machine (SVM). In
[7], Dong et al. have proposed a “deep similarity-aware attentive model” that
focuses on the relation between the titles that are misleading and the target
content. This method was quite different from traditional feature engineering
and seemed to work reasonably well. In [24], Setlur considered a semi-
supervised confidence network along with a gated attention based network.
Based on a small labeled dataset, this method gave promising results.
In many of the above approaches, only the textual information given by the
title and the description, along with the metadata features, have been taken
into consideration while training a model. An exception is the work in [25],
where the authors have also used comments to extract features. It is also
worth noting that the embedding layers of Word2Vec, BERT, and Doc2Vec have
been used in all of the implementations mentioned above.
In this research, we experiment with multiple embedding layers, including
BERT, DistilBERT, and Word2Vec. In previous research, BERT has proven to be
effective because of its deep contextualizing nature [14]. A combination of
multiple models, known as ensemble learning, has given interesting results in
[28], and we also consider ensemble models in the form of random forest
classifiers.
#### 2.1.4 Hoax Detection
Articles in which facts are knowingly misrepresented can be viewed as hoaxes.
These reports provide deceptive information to readers and present it as
legitimate facts. One of such examples can be a fake story about a celebrity
death. In [27], the authors have proposed a technique that uses logistic
regression for classifying hoaxes. In the model proposed, they have used
features based on user interaction and have achieved an accuracy of 99%. Zaman
et al. [33] employed a nïve Bayes algorithm which uses the feedback from users
as an input to verify if a news is a hoax. Kumar et al. [16] have proposed a
method which uses random forest classifier to classify the credibility of the
articles on Wikipedia. They achieved an accuracy of 92%. Hoax detection is,
though, a less explored area, as compared to the topics discussed above.
### 2.2 Natural Language Processing
Natural language processing (NLP) is the ability of a machine to process and
understand the language of a human. It is used to solve many real-world
problems, such as machine translation, question answering, and predicting
words. Figure 2 shows a timeline of some recent advances in NLP.
Figure 2: NLP advancements in recent years [21]
In the early 1990’s, statistical and probabilistic approaches were employed to
train NLP algorithms. However, with the arrival of the Web, the amount of data
grew considerably, and such algorithms became inadequate. In 2001, Bengio et
al. experimented with feedforward neural networks. Later, recurrent neural
networks (RNN) and long short-term memory (LSTM) models were introduced [12].
As of 2012, techniques such as latent semantic indexing (LSI), latent semantic
analysis (LSA), and support vector machines (SVM) became popular in the NLP
domain. Part of speech (POS) tagging is a commonly used approach.
In 2013, Tomas et. al. introduced Word2Vec, which is used to generate vector
representations of words. These embeddings are obtained from the weights of a
relatively simple neural network, and the vectors can capture important
semantic information, based on the cosine distance between Word2Vec embeddings
[23].
Global vector for word representation (GloVe) was introduced in 2014 and is an
attempt to combine the benefits of LSA, LSI, and Word2Vec. It is based on the
occurrence of a word in the entire corpus. CNNs and LSTMs have become popular
for NLP related tasks in recent years, as such models can capture effectively
utilize sequential information [12]. LSTM is a highly specialized type of RNN
that mitigates the gradient issues that occur with plain vanilla RNNs. Gated
recurrent unit (GRU) is a variant of LSTM introduced in 2014 that is lighter,
in the sense of having fewer parameters that need to be trained.
Sutskever et al. [26] proposed a sequence-to-sequence learning approach which
uses an encoder-decoder architecture. In fact, such encoder-decoder models
appear to be the main language modeling frameworks for NLP tasks today. The
concept of an attention mechanism was proposed by Bahdanau et al. [3] in 2015
to overcome the limitation of fixed vector length for input sentences in
sequence-to-sequence models [31]. Attention provides information about the
importance of a part of a sentence during the decision process.
To better deal with the inherent complexity of attention mechanisms,
transformers were introduced [18]. Transformer includes multiple stacks of
encoder-decoder architecture, where at each step in the processing, the model
takes the output of the previous step as an input. Figure 3 shows the
architecture of a transformer where the decoder is on the right and the
encoder is on the left. Initially, the input tokens are converted to embedding
vectors. Since this model does not have any RNN units, position indices are
stored in a $n$-dimensional vector space in the form of embeddings. There are
three fully connected layers in this particular attention mechanism, namely,
the input key $K$, the value $V$, and the query $Q$, which is a matrix of
queries. The algorithm defines weights for words based on all the words in
$K$, and it generates a vector representation for all words based on multi-
head attention [18]. The other processes include context fragmentation, and
multiple parallel attention layers. Some example of deep learning models that
make use of transformers include BERT, RoBERTa, mBERT, and DistilBERT.
Figure 3: Architecture of a transformer [18]
Bidirectional encoder representations from transformer (BERT) uses a
transformer which is based on attention to learn the contextual relation
between words. It involves an encoder which reads the input, and decoder which
predicts the output. It is called bidirectional because instead of reading
input sequentially from a specific direction, the transformer reads the
sequence of words in both directions. This helps in learning the context of
words based on previous and subsequent words. Figure 4 illustrated the input
pattern used in a BERT model.
Figure 4: Input for the BERT model [15]
BERT has four pretrained versions with different layers, hidden nodes, and
parameters. Each of these BERT models can be fine-tuned for a specific task by
adding additional layers. DistilBERT is a lighter and a faster variant of
BERT.
### 2.3 Learning Techniques
In this section, we discuss the various machine learning techniques that we
have employed in this research. Specifically, we have performed experiments
for YouTube clickbait detection based on logistic regression, random forest,
and MLP, with various embedding mechanisms.
#### 2.3.1 Logistic Regression
Logistic regression is a supervised learning algorithm that is used for
categorical data where some parameter—which depend upon the input features and
the output—is a categorical prediction. In Logistic regression, a sigmoid
function is fitted on the data. The formula for the sigmoid function is
$\sigma(w^{T}x+b)=\frac{1}{1+e^{-(w^{T}x+b)}}$ (1)
which produces a value in the range of 0 to 1, and hence it can be interpreted
as a probability. The clickbait detection problem can be treated as a type of
binomial logistic regression, where the output can be either zero or one [1].
#### 2.3.2 Random Forest
A random forest is based on simple decision trees—a large group of decision
trees operate together in an ensemble-like manner. Each tree is trained on a
subset of the data and features, a process known as boostrap aggregation, or
bagging. In bagging, the data for each tree is randomly selected with
replacement [32]. The final prediction of the random forest can be obtained
via a simple voting scheme. A random forest mitigates the tendency of
individual decision trees to overfit the training data.
The important hyperparameters in a random forest are $n$-estimators, $n$-jobs,
max-features, and min-sample-leaf. The $n$-estimators parameter represent the
number of trees that are constructed. Typically, adding more trees increases
performance at the cost of computation time. The max-features parameter is the
number of features required to split at a specific node. The parameter
$n$-jobs is the number of processors that work in parallel.
#### 2.3.3 Multilayer Perceptron
A multilayer perceptron (MLP) is a basic type of feedforward neural network
that includes input and output layers, along with at least one hidden layer.
An MLP with two hidden layers is illustrated in Figure 5.
$X_{0}$$X_{1}$$f_{0}$$f_{0}$$f_{0}$$f_{1}$$f_{1}$$f_{1}$$f_{1}$$g$$g$$g$$Y_{0}$$Y_{1}$$Y_{2}$Input
layer1st hidden layer2nd hidden layerOutput layerOutput Figure 5: MLP with two
hidden layers
The output layer of an MLP can be used for prediction or classification. Next,
we briefly discuss regularization and activation functions; see [9] for
additional details on these and related topics.
Neural network models are prone to overfitting. An overfitted model is very
effective in classifying the training data but it obtains poor accuracy in
predicting the test data—in effect, the model has “memorized” the training
data, rather than learning from the training data. One useful technique to
prevent overfitting is the use of dropouts, where some number of nodes are
ignored during various training steps [9]. This simple approach forces nodes
that would otherwise atrophy to become active in the learning process.
An activation function is used to determine the output of node in a neural
network. There are multiple types of activation functions, including tanh,
sigmoid, ReLU, and leaky ReLU [9]. In this research, we have experimented with
ReLU and tanh.
## 3 Implementation
This section includes details on the implementation used in this research. We
discuss the setup used to train and execute the various machine learning
models, the experimental design, and so on.
### 3.1 Hardware and Software
In this research, we used multiple Conda virtual environments for each
implementation. Conda is an open source package and environment management
system which runs on multiple operating systems [5]. The host machine was
configured as given in Table 1. All the training and the experiments were run
on the host machine.
Table 1: Host machine configuration
Component Details Model ASUS ZenBook Processor Intel(R) Core(TM) i7-8565U CPU
@ 1.80GHz 1.99 GHz RAM 16.0 GB System Type 64-bit OS Operating System Windows
10
### 3.2 Approach
Our clickbait detection experiments are based on a set of labeled videos. The
problem is formulated as a binary classification problem where for each video
a machine learning algorithm classifies it is clickbait or non-clickbait. The
information from multiple sources (e.g., title, description, comments) are
combined and fed to the classification model. The performance is evaluated and
analyzed by multiple measures, specifically, precision, recall and the
F-score.
There are three types of features considered in this research. The first
involves features from the profile of the user who posted the video
(subscriptions count, views count, and videos count). The second type of
feature is based on extracting textual information from the video (title and
description). The third component involves statistical features related to the
video (like count, dislike count, like-dislike ratio, views, and number of
comments). A classification model performs binary classification (clickbait or
non-clickbait) based on some combination of these features. An overview is
provided in Figure 6.
Figure 6: Overview of clickbait classification model
### 3.3 Features
Features that provide information regarding the reputation of the channel and
the videos include the number of subscribers of the YouTube channel, the
number of likes or upvotes, and the age of the channel. These statistical
features represent the response of viewers to the channel. Previous related
work claimes that videos that are clickbait tend to have a relatively small
number of subscribers and likes [30].
Usually, the number of views for the clickbait and non-clickbait videos are
quite similar [34]. Useful information in determining the credibility of a
video is given by the dislike ratio, the favorites count, the video age, the
views count, and the comments count. Sometime, in clickbait videos the
uploader disables the comment section. This itself provides clues about the
video [30].
Textual features include the headline of the video, the description of the
video, and the comments by the viewers. YouTubers who upload clickbait usually
employ techniques which are deceptive. They use catchy and exaggerated phrases
for the title and description of the video. Some common phrases are “viral,”
“top.” “won’t believe”, “epic”, and similar. We tokenize the text and embed it
in classification models using various embedding techniques, including
Word2Vec, BERT, and DistilBERT
### 3.4 Dataset
Every month, billions of people visit YouTube and the videos are watched for
over a billion hours. A large number of videos are also uploaded by the users.
In fact, YouTube is a platform where people can generate revenue by uploading
videos and gaining viewership for their videos.
In this research, the evaluation is done on a dataset of 8219 labeled videos,
where 4300 are non-clickbait and 3919 are clickbait. The dataset was crawled
from the Google YouTube API for the list of video IDs fetched from a Github
source [17]. These sources were randomly picked and manually verified. The
statistics for various parameters are shown in Table 2.
Table 2: Dataset statistics
Data Item Min Mean Max Title length 10 54 107 Description length 15 1131 5162
View count 21 5,660,978 2,543,466,463 Comment count 0 522 49,060 Like count 0
49,615 13,542,232 Subscriber count 977 10,200 23,695,417 Dislike count 0 1320
516,171
### 3.5 Experiments
In this research, we experimented multiple techniques including multiple
language modeling techniques. We used Word2Vec, BERT, and DistilBERT for word
embeddings. Architecture for the individual models is also shown. A grid
search was used for training and building the models to obtain the best set of
parameters. In this section, we briefly describe each of our models, and in
the next section we give the results for each experiment.
#### 3.5.1 Experiment I: Logistic Regression with Word2Vec
In this experiment, we used a Word2Vec model provided by Gensim [10] to
generate the vector representations of words in the dataset. A logistic
regression model is trained on these embeddings along with additional
features, specifically, comments count, likes count, dislikes count, and
subscriptions count for the channel.
#### 3.5.2 Experiment II: Random Forest with Word2Vec
In this experiment, a random forest classifier is trained on the Word2Vec
embeddings. We again used the Word2Vec model provided by Gensim. The values
tested for $n$-estimators is!10, 20, 30, 50, and 100. The set of input
features are title, description, and metadata features such as comments count,
likes count, dislikes count, and subscriptions count for the channel.
#### 3.5.3 Experiment III: MLP with Word2Vec
In this case, we again use the Word2Vec model provided by Gensim. T The
embedding for title and description is concatenated with the metadata features
of the video and is fed to an MLP for classification. The batch size is 10 for
40 epochs. The activation functions used are ReLU and sigmoid. Figure 11 in
the appendix provides the overall architecture of the model.
Note that we use two input embedding layers for textual data (namely, title
and description), which are then concatenated together. After this step, the
output from the dense layer is flattened and concatenated with the input for
the metadata features. Finally, a fully connected layer is used for
classification.
#### 3.5.4 Experiment IV: MLP with DropOut, Batch Normalization, and Word2Vec
This experiment is an optimization of the previous experiment. In this model,
additional dense layers, along with batch normalization and dropout rate of
0.5, are employed. We have used parametric rectified linear units (PReLU) as
the activation function. The batch size is again 10 for 40 epochs. Figure 12
in the appendix illustrates the overall architecture of the model.
In this model, the output from the embedding layers for the textual data is
concatenated, followed by a fully connected dense layer, batch normalization,
and activation. This output is finally flattened and concatenated with the
metadata features.
#### 3.5.5 Experiment V: MLP with BERT
In this experiment, we have used BERT embedding for title and description of
the video. The advantage of using BERT as an embedding model is that it
provides context-based representation for each word in a sentence. In
contrast, Word2Vec provides representations which are fixed irrespective of
where the word is used in the sentence. The pretrained model of BERT that is
used in this experiment has 12 layers, 110M parameters, and 768 hidden layers.
The BERT tokenizer is used to split the words into tokens and attention masks
are used for padding. The mask value of one is for tokens that are not masked,
while the value zero means that the token is added by padding and should not
be considered for attention. The model uses Adam optimizer, and the batch size
is 10 for 5 epochs, and we have used sequence of length 180 for this
experiment. Figure 13 in the appendix shows the model architecture.
Note that the output of the BERT embedding layer is followed by a dense layer,
which is then concatenated with the metadata features. After this, a dropout
layer followed by a fully connected layer is used for classifying the data.
#### 3.5.6 Experiment VI: MLP with DistilBERT
DistilBERT is a faster, lighter model that is a variant of BERT—it runs 60%
faster and has 45% fewer parameters than BERT [6]. For this experiment, we
have used a pretrained DistilBERT model. The embeddings for tile and
description are fed into a MLP and, later, concatenated with the metadata
features of the video and the YouTube channel. The model uses Adam optimizer
and the batch size is 10 for 5 epochs. Figure 14 in the appendix gives details
on this model architecture.
Note that in this model, the input from the metadata features is concatenated.
Of course, the output layer is a dense layer that is used for classification.
## 4 Results
Recall that in experiment I, we have use logistic regression with Word2Vec
embeddings for the features title and description, along with the metadata
features. In this case, we achieve an accuracy of 52% with just title as
input, and an accuracy of 70% with all of these features. This model is fast
to train and much simple to implement. Figure 7 shows the ROC curve for this
logistic regression model.
Figure 7: ROC curve for logistic regression
Experiment II involves using a random forest classifier based on the title,
description, likes count, dislikes count, comments count, and subscriptions
count. We used Word2Vec embeddings for title and description. We trained this
model in multiple sets of inputs. The first set of inputs includes just the
title and metadata features. The last set of inputs included all the features.
Not surprisingly, we find that the accuracy improves as more features are
added.
Table 3 shows precision and accuracy of 80.1% for the model with the first set
of input features, that is, title and two metadata features for likes count
and dislikes count.
Table 3: Random forest based on title and like/dislike counts
Class Precision Recall F-score Support non-clickbait 0.81 0.80 0.81 1275
clickbait 0.80 0.81 0.80 1182 accuracy — — 0.80 2457 macro avg 0.80 0.80 0.80
2457 weighted avg 0.80 0.80 0.80 2457
Table 4 shows the report for this experiment when we use the title and all the
metadata as features. The accuracy for this experiment is 92.5%. The report
shows the precision and recall of the model in classifying clickbait and non-
clickbait videos. The model performs slightly better in classifying non-
clickbait videos.
Table 4: Random forest based on title and metadata features
Class Precision Recall F-score Support non-clickbait 0.93 0.93 0.93 1275
clickbait 0.92 0.92 0.92 1182 accuracy — — 0.93 2457 macro avg 0.93 0.93 0.93
2457 weighted avg 0.93 0.93 0.93 2457
Figure 8 shows the ROC curve for the random forest model where the input
features included title, description, and all the metadata features, that is,
count, dislikes count, comments count, subscriptions count, and views count.
The AUC for this model is 0.95 with an accuracy of 94%. This shows that the
model performs well and that adding more features increases the accuracy of
the model.
Figure 8: ROC curve for random forest
In experiment III a simple MLP is used for classification, based on Word2Vec
embeddings for title and description that are concatenated with metadata
features. In this case, the test accuracy is observed to fluctuate during the
training process, but the best average accuracy achieved is better than 91%.
Figure 9 (a) shows the accuracy for this experiment over the 30 training
epochs.
|
---|---
(a) Experiment III | (b) Experiment IV
|
(c) Experiment V | (d) Experiment VI
Figure 9: Accuracy over training epochs for experiments III through VI
In experiment IV, a modified MLP is used with batch normalization and PReLU as
an activation function. In this case, the accuracy is slightly worse than in
experiment III, although the training is more stable, as can be observed in
Figure 9 (b).
In experiment V, we have used a transfer learning model based on BERT for word
embeddings. This experiment with BERT gives an accuracy of 94.5%. In this
experiment the length of the input sequence is fixed at 180 characters. Figure
9 (c) shows the plot for accuracy over training epochs for both the train and
validation sets. Note that the number of epochs is small due to the extended
training time required, as compared to other models considered.
In experiment VI, we have used a lighter variant of BERT model for the word
embeddings, namely, DistilBERT. The accuracy achieved in this case is around
92%. This model is significantly faster to train than the BERT, although the
accuracy obtained with BERT is slightly better than using DistilBERT. Table 5
shows the precision and recall for experiment VI, while Figure 9 (d) shows the
training and test accuracy over epochs.
Table 5: Results for experiment VI (MLP with DistilBERT)
Class Precision Recall F-score Support non-clickbait 0.92 0.95 0.93 884
clickbait 0.93 0.89 0.91 754 accuracy — — 0.92 1638 macro avg 0.92 0.92 0.92
1638 weighted avg 0.92 0.92 0.92 1638
In Figure 10 we summarize the results of our six experiments in terms of
accuracy (to two decimal places). Note that in the bar graph in Figure 10,
“MLP plus” is used to denote our MLP model that includes dropout and batch
normalization. Also, the bars from left-to-right represent experiments I
through VI, respectively.
Logistic regression (Word2Vec)Random forest (Word2Vec)MLP (Word2Vec)MLP plus
(Word2Vec)MLP (BERT)MLP
(DistilBERT)$0.00$$0.20$$0.40$$0.60$$0.80$$1.00$$0.70$$0.93$$0.91$$0.88$$0.95$$0.92$Accuracy
Figure 10: Accuracy comparison of experiments
## 5 Conclusion and Future Works
The goal of this research was to utilize state-of-the-art techniques to
classify YouTube videos as clickbait or non-clickbait. A YouTube video has
multiple characteristics that can serve as useful features for such
classification. We leverage three main types of such features, namely, user
profile, video statistics, and textual data. In this research, multiple
classification techniques were considered, including logistic regression,
random forest, and MLP, and we employed Word2Vec, BERT, and DistilBERT as
language models. The best accuracy was achieved using an MLP classifier based
on BERT embeddings, but a the more lightweight DistilBERT performed almost as
well. We also confirmed that the accuracy of the models could be increased by
adding more features.
For future work, more features can be included. For instance, the transcript
of the video might contain useful information. For example, the “distance”
between the transcripts and the title could provide important insight, as the
content of clickbait videos often differs significantly from the title. The
network structure of the comments and replies, which represents the semantic
features and attributes, can also be considered [25].
In this research, we experimented with BERT, Word2Vec, and DistilBERT for word
embeddings. For future work, DocToVec embeddings could also be considered. We
used random forest classifier, and other ensemble techniques could be
considered, including, such as XGBoost. Furthermore, we can also experiment
with state-of-the-art attentive language models, such as XLNet, which is
supposed to be better than BERT for determining long-term dependencies [29].
## References
* [1] Apoorva Agrawal. Logistic regression simplified. https://medium.com/data-science-group-iitr/logistic-regression-simplified-9b4efe801389, 2017\.
* [2] Iftikhar Ahmad, Muhammad Yousaf, Suhail Yousaf, and Muhammad Ovais Ahmad. Fake news detection using machine learning ensemble methods. Complexity, 2020, 2020.
* [3] Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. Neural machine translation by jointly learning to align and translate. https://arxiv.org/abs/1409.0473, 2014.
* [4] Abhijnan Chakraborty, Bhargavi Paranjape, Sourya Kakarla, and Niloy Ganguly. Stop clickbait: Detecting and preventing clickbaits in online news media. In IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM, pages 9–16, 2016.
* [5] Conda. https://docs.conda.io/en/latest/.
* [6] Distilbert — transformers 4.5.0.dev0 documentation. https://huggingface.co/transformers/model_doc/distilbert.html.
* [7] Manqing Dong, Lina Yao, Xianzhi Wang, Boualem Benatallah, and Chaoran Huang. Similarity-aware deep attentive model for clickbait detection. In Pacific-Asia Conference on Knowledge Discovery and Data Mining, pages 56–69, 2019.
* [8] Aviad Elyashar, Jorge Bendahan, and Rami Puzis. Detecting clickbait in online social media: You won’t believe how we did it. https://arxiv.org/abs/1710.06699, 2017.
* [9] Franckepeixoto. A simple overview of multilayer perceptron (MLP) deep learning. https://www.analyticsvidhya.com/blog/2020/12/mlp-multilayer-perceptron-simple-overview/, 2020\.
* [10] Gensim — python framework for fast vector space modelling. https://pypi.org/project/gensim/.
* [11] Maria Glenski, Ellyn Ayton, Dustin Arendt, and Svitlana Volkova. Fishing for clickbaits in social images and texts with linguistically-infused neural network models. https://arxiv.org/abs/1710.06390, 2017.
* [12] Alex Graves. Generating sequences with recurrent neural networks. https://arxiv.org/abs/1308.0850, 2013.
* [13] Jason Hennessey. 12 surprising examples of clickbait headlines that work. https://www.searchenginejournal.com/12-surprising-examples-of-clickbait-headlines-that-work/362688, 2020\.
* [14] Heejung Jwa, Dongsuk Oh, Kinam Park, Jang Mook Kang, and Heuiseok Lim. exBAKE: Automatic fake news detection model based on bidirectional encoder representations from transformers (BERT). Applied Sciences, 9(19), 2019.
* [15] Samia Khalid. BERT explained: A complete guide with theory and tutorial. https://towardsml.com/2019/09/17/bert-explained-a-complete-guide-with-theory-and-tutorial/, 2019\.
* [16] Srijan Kumar, Robert West, and Jure Leskovec. Disinformation on the Web: Impact, characteristics, and detection of Wikipedia hoaxes. In Proceedings of the 25th International Conference on World Wide Web, pages 591–602, 2016.
* [17] Saurabh Mathur. GitHub. https://github.com/saurabhmathur96/clickbait-detector.
* [18] Maxime. What is a transformer? https://medium.com/inside-machine-learning/what-is-a-transformer-d07dd1fbec04, 2020\.
* [19] Priyank Palod, Ayush Patwari, Sudhanshu Bahety, Saurabh Bagchi, and Pawan Goyal. Misleading metadata detection on YouTube. In European Conference on Information Retrieval, pages 140–147, 2019.
* [20] Martin Potthast, Tim Gollub, Matthias Hagen, and Benno Stein. The clickbait challenge 2017: Towards a regression model for clickbait strength. https://arxiv.org/abs/1812.10847.
* [21] Praboda Chathurangani Rajapaksha and Rajapaksha Waththe Vidanelage. Clickbait detection using multimodel fusion and transfer learning. https://tel.archives-ouvertes.fr/tel-03139880/document, 2020.
* [22] KV Sankar Reddy, K Sai Nihith, M Sasank Chowdary, and TR Krishna Prasad. An efficient word embedded click-bait classification of YouTube titles using SVM. In Symposium on Machine Learning and Metaheuristics Algorithms, and Applications, pages 175–184, 2019.
* [23] Moiz Saifee. Recent advancements in NLP (1/2). https://medium.com/swlh/recent-advancements-in-nlp-1-2-192ac7eefe3c, 2019\.
* [24] Amrith Rajagopal Setlur. Semi-supervised confidence network aided gated attention based recurrent neural network for clickbait detection. https://arxiv.org/abs/1811.01355, 2018.
* [25] Lanyu Shang, Daniel Yue Zhang, Michael Wang, Shuyue Lai, and Dong Wang. Towards reliable online clickbait video detection: A content-agnostic approach. https://arxiv.org/abs/1907.07604, 2019.
* [26] Ilya Sutskever, Oriol Vinyals, and Quoc V Le. Sequence to sequence learning with neural networks. https://arxiv.org/abs/1409.3215, 2014.
* [27] Eugenio Tacchini, Gabriele Ballarin, Marco L Della Vedova, Stefano Moret, and Luca de Alfaro. Some like it hoax: Automated fake news detection in social networks. https://arxiv.org/abs/1704.07506, 2017.
* [28] Aswini Thota, Priyanka Tilak, Simrat Ahluwalia, and Nibrat Lohia. Fake news detection: A deep learning approach. SMU Data Science Review, 1(3):10, 2018.
* [29] Phylypo Tum. A survey of the state-of-the-art language models up to early 2020. https://medium.com/@phylypo/a-survey-of-the-state-of-the-art-language-models-up-to-early-2020-aba824302c6, 2020\.
* [30] Deepika Varshney and Dinesh Kumar Vishwakarma. A unified approach for detection of clickbait videos on YouTube using cognitive evidences. Applied Intelligence, pages 1–22, 2021.
* [31] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. Attention is all you need. https://arxiv.org/abs/1706.03762, 2017.
* [32] Tony Yiu. Towards data science: Understanding random forest. https://towardsdatascience.com/understanding-random-forest-58381e0602d2, 2019\.
* [33] Badrus Zaman, Army Justitia, Kretawiweka Nuraga Sani, and Endah Purwanti. An Indonesian hoax news detection system using reader feedback and naïve Bayes algorithm. Cybernetics and Information Technologies, 20(1):82–94, 2020.
* [34] Savvas Zannettou, Sotirios Chatzis, Kostantinos Papadamou, and Michael Sirivianos. The good, the bad and the bait: Detecting and characterizing clickbait on YouTube. In IEEE Security and Privacy Workshops, SPW, pages 63–69, 2018\.
* [35] Daniel Yue Zhang, Lanyu Shang, Biao Geng, Shuyue Lai, Ke Li, Hongmin Zhu, Md Tanvir Amin, and Dong Wang. Fauxbuster: A content-free fauxtography detector using social media comments. In IEEE International Conference on Big Data, Big Data, pages 891–900, 2018.
* [36] Yiwei Zhou. Clickbait detection in tweets using self-attentive network. https://arxiv.org/abs/1710.05364, 2017.
## Appendix: Model Architectures
Figure 11: Architecture of model for experiment III Figure 12: Architecture of
model for experiment IV Figure 13: Architecture of model for experiment V
Figure 14: Architecture of model for experiment VI
| arxiv-papers | 2021-07-26T12:39:32 | 2024-09-04T03:07:21.542237 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Ruchira Gothankar, Fabio Di Troia, Mark Stamp",
"submitter": "Mark Stamp",
"url": "https://arxiv.org/abs/2107.12791"
} |
2107.12795 | # Photoluminescent properties of the carbon-dimer defect in hexagonal boron-
nitride: a many-body finite-size cluster approach
Michael Winter Institute of Theoretical Phyics, Friedrich-Alexander
Universität Erlangen-Nürnberg, Staudtstr. 7/B2, 91058 Erlangen, Germany Univ.
Grenoble Alpes, CNRS, Inst NEEL, F-38042 Grenoble, France Manon H. E.
Bousquet Université de Nantes, CNRS, CEISAM UMR 6230, F-44000 Nantes, France
Denis Jacquemin Université de Nantes, CNRS, CEISAM UMR 6230, F-44000 Nantes,
France Ivan Duchemin Univ. Grenoble Alpes, CEA, IRIG-MEM-L_Sim, 38054
Grenoble, France Xavier Blase Univ. Grenoble Alpes, CNRS, Inst NEEL, F-38042
Grenoble, France
###### Abstract
We study the carbon dimer defect in a hexagonal boron-nitride monolayer using
the $GW$ and Bethe-Salpeter many-body perturbation theories within a finite
size cluster approach. While quasiparticle energies converge very slowly with
system size due to missing long-range polarization effects, optical
excitations converge much faster, with a $1/R^{3}$ scaling law with respect to
cluster average radius. We obtain a luminescence zero-phonon energy of 4.36
eV, including significant 0.13 eV zero-point vibrational energy and 0.15 eV
reorganization energy contributions. Inter-layer screening decreases further
the emission energy by about 0.3 eV. These results bring support to the recent
identification of the substitutional carbon dimer as the likely source of the
zero-phonon 4.1 eV luminescence line. Finally, the $GW$ quasiparticle energies
are extrapolated to the infinite h-BN monolayer limit, leading to a predicted
defect HOMO-LUMO photoemission gap of 7.6 eV. Comparison with the optical gap
yields a very large excitonic binding energy of 3 eV for the associated
localized Frenkel exciton.
Ab initio many-body theory; $GW$ formalism; Bethe-Salpeter equation ; defects
; 2D materials
## I Introduction
There is by now a large experimental [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12,
13, 14, 15, 16] and theoretical [17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27,
28, 29, 30, 31, 32, 33, 34, 35, 36, 37] literature focusing on better
understanding point defects in hexagonal boron-nitride (h-BN), following
similar studies on h-BN nanotubes [38]. The very large band gap of the h-BN
host ($\simeq$ 6.1 eV experimental value for the bulk system [39]) allows in
particular the presence of very deep defect-induced occupied and unoccupied
energy levels, yielding optical transitions between defect levels with an
energy that can span over the visible and UV domains. Recently, the
demonstration that such centers could be responsible for room-temperature
single-photon emission sparkled further the interest of the community to
better identify the origin of such bright emission lines [9, 10, 12, 14, 15,
16].
As a paradigmatic defect-associated emission line, the so-called zero-phonon
4.1 eV bright photoemission band in the UV range is very widely observed in
h-BN systems [1, 2, 3, 4, 5, 6, 10, 13]. This sharp emission line appears at
much lower energy than the intense emission at 5.77 eV (215 nm) found in high-
purity h-BN samples [40, 39]. Spatially-resolved cathodoluminescence allowed
to characterize the localized character of the defect-associated excitons
[10], in contrast with the “free” high-purity h-BN excitons that yield a
homogeneous emission all over the sample [41]. The evolution of the
ultraviolet photoluminescent (PL) spectrum as a function of the h-BN synthesis
conditions and reactants led to early identifications of this feature with
either carbon-related defects [1, 2, 5] or nitrogen vacancies [6]. Very
recently, a periodic-boundary constrained density functional theory (DFT)
calculation suggested the carbon dimer defect as the likely source of
emission, with a calculated zero-phonon emission line value of 4.3 eV [32].
At the theoretical level, the electronic properties of defects in periodic
semiconductors or insulators are commonly explored using periodic boundary
conditions (PBC) with large supercells designed to minimize defect
interactions between neighboring cells [42, 43]. While standard density
functional theory (DFT) calculations can be efficiently used for neutral
defects, charged centers require to carefully cancel the long range Coulomb
interaction between cells [42, 43, 44, 45, 46, 47]. However, even in the case
of neutral defects, the study of their electronic properties using accurate
many-body approaches, such as the $GW$ [48] and Bethe-Salpeter [49, 50]
formalisms, run into similar difficulties. In particular, the $GW$ formalism
properly accounts for the effects associated with the addition or removal of a
charge in the system during a photo-emission experiment used to measure
electronic energy levels. As such, Coulomb interactions between localized
“charged” excitations repeated periodically must also be canceled carefully.
This was clearly illustrated in a $GW$ study of h-BN, showing that the
photoemission gap converges very slowly to the monolayer limit as a function
of interlayer spacing [51]. Due to computational cost, the study of defects in
extended systems is still in its infancy at the $GW$ and Bethe-Salpeter levels
[52, 18, 47, 21], and examples of the monitoring of the evolution of a
localized defect electronic properties as a function of unit cell size, or
using a proper scheme to truncate long-range Coulomb effects, remain very
scarce [21].
In the present work, we explore the electronic and optical properties
associated with the neutral carbon-dimer defect in h-BN using many-body
Green’s function perturbation theory (MBPT) in a finite size cluster approach.
Namely, we use the $GW$ [48, 53, 54, 55, 56, 57, 58, 59] and Bethe-Salpeter
equation (BSE) [49, 50, 60, 61, 62, 63, 57, 58, 64] formalisms to calculate
the in-gap quasiparticle energies and lowest optical excitations associated
with the carbon-dimer defect in h-BN flakes [1, 4, 5, 6, 11, 32]. We find that
the vertical BSE excitation energies, together with the excited-state
reorganization energy and zero-point-vibrational energy (ZPVE), converge
relatively fast with system size, leading to a zero-phonon line emission
energy $(E_{ZPL})$ of 4.36 eV in monolayer h-BN. A very similar value is
obtained using TD-DFT with an adequate hybrid exchange-correlations
functional. This is in good agreement with the 4.31 eV value stemming from a
recent theoretical study using an elegant periodic-boundary-conditions
constrained-DFT [32], but not including ZPVE correction calculated here to be
of the order of 0.13 eV. We further demonstrate that multilayer packing may
lower the defect absorption and emission energies by a few tenths of an eV,
bringing theoretical calculations in closer agreement with the 4.1 eV
experimental value [1, 4, 5, 6, 11]. Finally, extrapolating quasiparticle $GW$
data to the infinite monolayer size limit, we predict the HOMO-LUMO gap
associated with the defect to be of the order of 7.6 eV, yielding by
comparison with the optical gap a large excitonic binding energy of about 3 eV
in relation with the very localized nature of the defect-associated
excitation.
## II Formalisms and Technical details
The DFT calculations used to generate the needed Kohn-Sham (KS) orbitals that
enter the construction of the $GW$ and Bethe-Salpeter Hamiltonians are
performed with the ORCA code [65] with which we also perform our TD-DFT
calculations. Concerning the many-body Green’s functions perturbation
theories, the $GW$ calculations are performed with the BeDeft (Beyond-DFT)
code [66, 67] that is an ongoing rewriting and extension of the Fiesta code
[68, 69, 70, 71] that we use for Bethe-Salpeter (BSE) calculations. In a
nutshell, the $GW$ self-energy operator, that accounts for exchange and
correlation effects, is first built from input Kohn-Sham
$\\{\varepsilon_{n}^{\mathrm{KS}},\phi_{n}^{\mathrm{KS}}\\}$ one-body
eigenstates, with :
$\displaystyle G({\bf r},{\bf r}^{\prime};\omega)$
$\displaystyle=\sum_{n}\frac{\phi_{n}^{\mathrm{KS}}({\bf
r})\phi_{n}^{\mathrm{KS}}({\bf
r}^{\prime})}{\omega-\varepsilon_{n}^{\mathrm{KS}}+i\eta\times\text{sgn}(\varepsilon_{n}^{\mathrm{KS}}-\mu)}$
$\displaystyle\chi_{0}({\bf r},{\bf r}^{\prime};i\omega)$
$\displaystyle=2\sum_{ja}\frac{{\left(\phi_{j}^{\mathrm{KS}}({\bf
r})\right)}^{*}\phi_{a}^{\mathrm{KS}}({\bf
r}){\left(\phi_{a}^{\mathrm{KS}}({\bf
r}^{\prime})\right)}^{*}\phi_{j}^{\mathrm{KS}}({\bf
r}^{\prime})}{i\omega-(\varepsilon_{a}^{\mathrm{KS}}-\varepsilon_{i}^{\mathrm{KS}})}+c.c.$
where $G$ is the time-ordered Green’s function and $\chi_{0}$ the independent-
electron susceptibility used to build, within the random phase approximation,
the screened Coulomb potential $W=v+v\chi_{0}W$ with $v$ the bare Coulomb
potential. In the preceding equations, $\eta$ is a positive infinitesimal and
$\mu$ the chemical potential. Following quantum chemistry notations, (j/a)
index occupied/empty energy levels. The $GW$ exchange correlation self-energy
operator reads:
$\displaystyle\Sigma^{GW}({\bf r},{\bf r}^{\prime};E)=\frac{i}{2\pi}\int
d\omega\;e^{i\eta\omega}G({\bf r},{\bf r}^{\prime};E+\omega)W({\bf r},{\bf
r}^{\prime};\omega)$
where $W$ is obtained along the real axis by an analytic continuation (AC)
from the $W(i\omega)$ calculated at $n_{\omega}$=14 optimized frequencies
along the imaginary axis following a recently improved AC scheme [72, 66, 67].
The knowledge of $\Sigma^{GW}$ allows to obtained $GW$ quasiparticle energies:
$\displaystyle\varepsilon_{n}^{GW}=\varepsilon_{n}^{\mathrm{KS}}+\left\langle\phi_{n}^{\mathrm{KS}}\left|\Sigma^{GW}\left(\varepsilon_{n}^{GW}\right)-V_{\mathrm{XC}}^{\mathrm{DFT}}\right|\phi_{n}^{\mathrm{KS}}\right\rangle$
We explicitly correct 50 occupied and 50 unoccupied states around the gap,
states at lower/higher energy being corrected following the correction of the
lowest/highest explicitly corrected level.
Following extensive benchmarks on finite size systems [68, 73, 70], we adopt
for accuracy an eigenvalue self-consistent scheme (labeled ev$GW$) where the
corrected quasiparticle energies are reinjected self-consistently in place of
the input KS energy levels to calculate $G$ and $\chi_{0}$. Besides accuracy,
such a self-consistent scheme allows to significantly reduce the impact of the
arbitrariness associated with the choice of the DFT
$V_{\mathrm{XC}}^{\mathrm{DFT}}$ functional used to generate the input
$\\{\varepsilon_{n}^{\mathrm{KS}},\phi_{n}^{\mathrm{KS}}\\}$ eigenstates.
Following again recent benchmarks [68, 73, 70], we select the global hybrid
PBE0 functional for this initial step [74]. Finally, Coulomb integrals are
expressed using Coulomb-fitting resolution-of-the-identity techniques [75, 76,
77] with standard auxiliary basis sets [78] designed for the well-established
cc-pVTZ [79] and augmented _aug_ -cc-pVTZ basis sets used below, or the
auxiliary universal Weigend Coulomb fitting basis set [80] in conjunction with
the smaller 6-311G(d) triple-zeta plus polarization basis set [81] adopted for
exploring large size systems. In the calculation of the susceptibility and
self-energy, all unoccupied levels are considered.
Once the ev$GW$ quasiparticle energies and screened Coulomb potential are
obtained, singlet optical excitation energies $\\{\Omega_{\lambda}\\}$ can be
calculated within the Bethe-Salpeter equation (BSE) formalism that expresses
the two-body electron-hole excitation eigenstates on the basis of the
occupied-to-virtual level transitions:
$\displaystyle\psi^{\mathrm{BSE}}_{\lambda}({\bf r}_{\mathrm{e}},{\bf
r}_{\mathrm{h}})=\sum_{ia}\left[X_{ia}^{\lambda}\phi_{i}({\bf
r}_{\mathrm{h}})\phi_{a}({\bf r}_{\mathrm{e}})+Y_{ia}^{\lambda}\phi_{a}({\bf
r}_{\mathrm{h}})\phi_{i}({\bf r}_{\mathrm{e}})\right]$
where the $Y_{ia}^{\lambda}$ components indicate that we go beyond the Tamm-
Dancoff approximation. These eigenstates solve a Casida-like [82] equation :
$\begin{pmatrix}R&C\\\ -C^{*}&-R^{*}\end{pmatrix}\begin{pmatrix}X^{\lambda}\\\
Y^{\lambda}\end{pmatrix}=\Omega_{\lambda}\begin{pmatrix}X^{\lambda}\\\
Y^{\lambda}\end{pmatrix},$ (1)
where the leading resonant block reads:
$R_{ia,jb}=\left(\varepsilon_{a}^{GW}-\varepsilon_{i}^{GW}\right)\delta_{ij}\delta_{ab}+\kappa
V_{ia,jb}^{\mathrm{x}}-W_{ij,ab}^{\mathrm{d}}$ (2)
with $\kappa$=2 or 0 for singlet or triplet excitations, and :
$\displaystyle V_{ia,jb}^{\mathrm{x}}=(ia|jb)=\int\mathrm{d}{\bf
r}\mathrm{d}{\bf r}^{\prime}\;\phi_{i}({\bf r})\phi_{a}({\bf r})v({\bf r},{\bf
r}^{\prime})\phi_{i}({\bf r}^{\prime})\phi_{b}({\bf r}^{\prime})$
$\displaystyle W_{ij,ab}^{\mathrm{d}}=\int\mathrm{d}{\bf r}\mathrm{d}{\bf
r}^{\prime}\;\phi_{i}({\bf r})\phi_{j}({\bf r})W({\bf r},{\bf
r}^{\prime};\omega=0)\phi_{a}({\bf r}^{\prime})\phi_{b}({\bf r}^{\prime})$
Good convergence can be obtained by including all occupied-to-virtual
transitions such that
$\left(\varepsilon_{a}^{GW}-\varepsilon_{i}^{GW}\right)\leq E_{\mathrm{cut}}$
with $E_{\mathrm{cut}}$ = 30 eV (see SM [83] for convergence study). Otherwise
stated, this will be the cutoff adopted. Further, the convergence with basis
sets size is detailed in the SM [83] evidencing the slower convergence of the
BSE data as compared to TD-DFT.
For computing the zero-point vibrational energy (ZPVE) associated with the
ground and excited states, we take advantage of the analytic DFT and TD-DFT
Hessian available in Gaussian 16.A.03 [84]. For these calculations, performed
at the PBE0 [74] 6-311G(d) level in gas phase, we optimized the geometries
with _tight_ convergence criteria for both the SCF and residual forces, and
select the so-called _ultra-fine_ DFT integration grid. The second-order
coupled-cluster, CC2 [85], and algebraic diagrammatic construction, ADC(2)
[86], calculations used for accuracy validation, are performed with the
Turbomole 7.3 code [87], using various Dunning’s basis sets and applying the
RI approach with the corresponding auxiliary basis. Default Turbomole
parameters and algorithms are applied. The calculations of the vibronic
couplings and Huang-Rhys factors was achieved using the FCClasses-3 package
[88, 89, 90, 91], on the basis of the vibrational data associated with the
ground and excited states as obtained with the Gaussian code. These vibronic
calculations, performed in a time-independent (TI) approach, use the Franck-
Condon (FC) approximation and account for the so-called Duschinsky effects as
well as temperature (298 K), and are based on the most refined adiabatic
Hessian (AH) model to determine the vibronic couplings [90]. We used 108
integrals in the TI scheme, allowing a good convergence (FC recovery $>$ 0.9).
## III Systems studied
Figure 1: Isocontour representation for the 6-311G(d) PBE0 (a) HOMO and (b)
LUMO levels in the C2@BN138 intermediate flake. In (c,d) the hole-averaged
electron (orange) and electron-averaged hole (purple) densities, respectively,
are given for the lowest singlet BSE excitation.
The finite size h-BN flakes with a central C-C dimer in substitution are
represented in the Supplemental Material (SM) [83]. One of them, of
intermediate size, is shown in Fig. 1. The systems studied comprise from 42 to
240 B,C,N atoms, or 58 to 278 atoms including the H atoms used to avoid
dangling bonds at the borders. These systems are labeled C2@BNX where X counts
the total number of atoms in the systems. The smallest flake is thus named
C2@BN58 and the largest C2@BN278. In such systems, the minimal number of bonds
between a central C atom and an edge B/N atom ranges from 4 to 11.
The geometries of all systems were optimized at the PBE0/6-311G(d) level [74].
The corresponding C-C bond length is found to range between 1.368 Å and 1.369
Å in the smallest and largest flakes, respectively, in close agreement with
the 1.361 Å periodic boundary condition PBEh(0.4)+D3 value of Ref. 32, where
PBEh(0.4) indicates a global hybrid in the PBE0 family with 40 % of exact
exchange (instead of the default 25 %), while the D3 points to the Grimme
empirical correction scheme for dispersion energies. For sake of illustration,
we plot in Fig. 1(a,b) the PBE0 HOMO and LUMO levels associated with the
intermediate size C2@BN138 system. As expected, independently of the system
size, the PBE0 KS HOMO and LUMO levels are localized on the C-C carbon dimer.
The bonding/anti-bonding character of the HOMO/LUMO along the C-C bond is
clearly seen in Fig. 1(a,b).
Anticipating on the analysis of the Bethe-Salpeter optical excitation
energies, we further plot in Fig. 1(c,d) the hole-averaged
$\rho_{\mathrm{e}}({\bf r})$ electron distribution and electron-averaged
$\rho_{\mathrm{h}}({\bf r})$ hole distribution, with e.g.,
$\rho_{\mathrm{e}}({\bf r}_{\mathrm{e}})=\int\mathrm{d}{\bf
r}_{\mathrm{h}}\;\left|\psi^{\mathrm{BSE}}_{\lambda=1}({\bf
r}_{\mathrm{e}},{\bf r}_{\mathrm{h}})\right|^{2}\,.$
The electron and hole localization allows to recognize that the lowest singlet
BSE excitation is mainly of HOMO-LUMO character. The weight $X_{ia}^{\lambda}$
squared of the BSE electron-hole wavefunction on the HOMO-LUMO transition is
found to be consistently of the order of 0.94, rather independently of the
system size beyond the C2@BN86 system, in close agreement with the 0.96 weight
at the TD-PBE0 level. The remaining contributions, even though small, explain
the evolution of the BSE excitation energy with respect to the
$E_{\mathrm{cut}}$ parameter (see SM [83]). While the two C atoms are non-
equivalent, being bonded either to B or N atoms with different
electronegativities, there is no sign of significant charge-transfer character
for the HOMO-LUMO transition, as confirmed below by the large value of the
oscillator strength.
## IV Benchmark of methods
We first benchmark the accuracy of the present BSE/ev$GW$ scheme, together
with that of standard TD-DFT calculations using various exchange-correlation
functionals, for the present carbon substituted h-BN flakes. The study of
finite size systems allows in particular to use accurate quantum chemistry
wavefunction based methods, such as coupled-cluster (CC) or algebraic
diagrammatic techniques (ADC). A similar comparison between mean-field DFT/TD-
DFT approaches and wavefunction based methods on finite size systems was
already proposed in the case of a few defects in a cluster geometry [26, 31,
35]. Significantly more expensive than BSE and TD-DFT calculations,
calculations with the second-order wavefunction approaches, CC2 and ADC(2),
with a large converged basis set (_aug_ -cc-pVTZ) are only possible for the
smallest C2@BN58 system. Even though limited in size, this small system
presents already well defined defect states, with a lowest singlet excitation
energy within no more than 0.10–0.15 eV of its limit value obtained in larger
flakes (see below).
While very accurate “theoretical best estimates" (TBE), such as those obtained
from third order CC3 calculations [92, 93], cannot be obtained for the present
systems, CC2 and ADC(2) calculations have been shown, thanks to very large
benchmarks on molecular families, to present mean absolute errors of the order
of 0.10 eV to 0.15 eV as compared to TBE or experimental data for various type
of excitations, from localized (Frenkel) to Rydberg or charge-transfer type
transitions [94, 73, 95]. In particular, even though an approximation to CCSD,
CC2 provides a similar level of accuracy for localized (Frenkel) excitations
with a reduced cost scaling [92, 93].
Our data are presented in Table 1. In the converged _aug_ -cc-pVTZ limit, we
observe that the Bethe-Salpeter vertical excitation energy relying on self-
consistent ev$GW$@PBE0 input quasiparticle energies and screened Coulomb
potential, is in close agreement with the CC2 value, even though 0.1 eV larger
than its ADC(2) analogue. In other words, BSE falls within the error bar of
second-order wavefunction schemes. The present results confirm the accuracy of
the BSE/ev$GW$ approach, already demonstrated in large benchmarks on molecular
systems [68, 70] .
Table 1: Lowest singlet ($S_{1}$) excitation energy for the C2@BN058 system. We compare quantum chemistry wavefunction methods [CC2 and ADC(2)], the many-body BSE/ev$GW$@PBE0 method, and TDDFT with the PBE, PBE0 and PBEh(0.4) functionals at the _aug_ -cc-pVTZ level. Energies are in eV and oscillator strength in parenthesis. CC2 | ADC(2) | BSE/evGW@PBE0
---|---|---
4.761 (0.494) | 4.660 (0.468) | 4.765 (0.407)
PBE0 | PBE | PBEh(0.4)
4.716 (0.406) | 4.024 (0.119) | 4.966 (0.443)
Among the TD-DFT calculations, we further observe that the standard TD-PBE0,
with its 25 % ratio of exact exchange, offers an excellent accuracy, standing
in between ADC(2) and CC2 data. TD-PBE0 and BSE/ev$GW$ excitation energies
fall within 50 meV of each other, while their oscillator strengths are also in
excellent agreement. Such values are also in good agreement with the 4.78 eV
CAM-B3LYP energy of Ref. [31] obtained with a minimally augmented cc-pVDZ
basis for a cluster equivalent in size to our C2@BN138 system. In contrast,
TD-PBE calculations yield an excitation energy that is significantly too
small, together with an oscillator strength that is a factor 4 smaller than
that of the CC2 or ADC(2) references. On the contrary, adopting the PBEh(0.4)
functional with 40 % of exact exchange yields an excitation energy that is
somehow too large. The balanced performance of the PBE0 functional is
consistent again with large TD-DFT benchmark on molecular systems, proving
that PBE0 is one of the most accurate functional for localized excited states
[96]. We adopt thus the BSE/ev$GW$ and TD-PBE0 schemes for exploring now the
convergence with system size. Further, since analytic forces in the excited
states have not been developed at the BSE level, reorganization energy and
vibrational-spectrum calculations in the excited state are conducted below at
the TD-PBE0 level.
## V Vertical excitation energies
We now explore the evolution of the lowest singlet ($S_{1}$) vertical
excitation energy with respect to system size. While TD-DFT and BSE data for
the smallest C2@BN58 system have been explicitly calculated at the _aug_ -cc-
pVTZ level, calculations on the largest flakes have been performed with the
6-311G(d) Pople atomic basis set level, stopping at the C2@BN202 system for
BSE calculations. As shown in the SM [83], the evolution with system size of
the excitation energy is weakly dependent on the basis size, allowing to
safely extrapolate the 6-311G(d) data to their _aug_ -cc-pVTZ value. Further,
the small evolution of these energies beyond the C2@BN86 system insures that
errors in the extrapolation are very limited.
Figure 2: Evolution of the lowest vertical singlet ($S_{1}$) excitation energy
(in eV) with respect to the number of non-H atoms ($N_{\mathrm{at}}$). TD-PBE0
(orange) and BSE (blue) data are presented. Plotted values have been
extrapolated to the _aug_ -cc-pVTZ level (see text and the SM [83]). The
largest flakes data points (out of the shaded area) are fitted by an
asymptotic $\;f(x)=a\cdot x^{3}+c\;$ functional with
$x=1/\sqrt{N_{\mathrm{at}}}$ where $N_{\mathrm{at}}\sim{R^{2}}$ with $R$ the
flake average radius. The infinite radius extrapolated energy value is
indicated in the Inset.
As shown in Fig. 2, both the TD-PBE0 and BSE vertical excitation energies
decrease with system size, converging relatively fast, with the C2@BN138
system being within $\sim$20 meV of the extrapolated infinite size limit. The
decay rate within the TD-PBE0 and BSE formalisms are similar. Several effects
can be invoked to understand the reduction of the excitation energy with
system size. A first possible explanation could hinge on the confinement of
the defect states, resulting in an increase of the HOMO-LUMO gap in the small
size limit. The analysis of the KS HOMO and LUMO levels indicates a 75 meV
reduction of the gap between the C2@BN58 and C2@BN278 systems. Even though not
directly related to the optical gap, this reduction of the Kohn-Sham gap, that
fully accounts for confinement effects, can contribute to the $\sim$0.11 eV
decrease of the optical gap with system size. Confinement is expected to yield
an evolution of the band gap that scales as $1/R^{2}$ where $R$ is the flake
radius.
Figure 3: Size evolution with respect to the smallest C2@BN58 system of the
ev$GW$ HOMO-LUMO gap (blue), the lowest vertical singlet ($S_{1}$) excitation
energy (orange), the
$\langle\psi^{\mathrm{BSE}}_{1}|2V^{\mathrm{x}}|\psi^{\mathrm{BSE}}_{1}\rangle$
(green) and
$\langle\psi^{\mathrm{BSE}}_{1}|W^{\mathrm{d}}|\psi^{\mathrm{BSE}}_{1}\rangle$
(red) matrix elements. Calculations performed with the 6-311G(d) atomic basis
set. Energies are in eV.
Another source of reduction of the optical gap with system size is the
polarization energy, or the increase of environmental screening upon increase
of the system size. It is interesting to analyze in this respect the evolution
with size of the various contributions to the BSE absorption energy, including
in particular the ev$GW$ HOMO-LUMO gap together with the expectation values
$\langle\psi^{\mathrm{BSE}}_{1}|2V^{\mathrm{x}}|\psi^{\mathrm{BSE}}_{1}\rangle$
and
$\langle\psi^{\mathrm{BSE}}_{1}|W^{\mathrm{d}}|\psi^{\mathrm{BSE}}_{1}\rangle$
of the bare and screened Coulomb potentials over the $S_{1}$ BSE eigenstate
(see Eqn. 2). As shown in Fig. 3, the drop of the ev$GW$ gap is much larger
than the 75 meV calculated at the KS level. The $GW$ formalism properly mimics
a photoemission experiment that measures charging energies. Upon charging the
defect levels, the generated Coulomb field strongly polarizes the surrounding
medium. The environment charge rearrangement generates a reaction field that
stabilizes the added charge. This effect, that closes the gap, is a strong
long range polarization effect that slowly converges with system size.
The much faster convergence of the BSE excitation energy can be explained by
the evolution of the screened electron-hole
$\langle\psi^{\mathrm{BSE}}_{1}|W^{\mathrm{d}}|\psi^{\mathrm{BSE}}_{1}\rangle$
term that decays with system size similarly as the ev$GW$ energy levels,
compensating largely the drop in the gap. In other words, the evolution of the
screened Coulomb potential with respect to the size of the polarizable
environment affects in a similar fashion both the electron-electron (exchange-
correlation) interaction that enters the ev$GW$ gap, and the electron-hole
interaction that is subtracted in the BSE Hamiltonian. The unscreened bare
electron
$\langle\psi^{\mathrm{BSE}}_{1}|2V^{\mathrm{x}}|\psi^{\mathrm{BSE}}_{1}\rangle$
contribution varies much less dramatically with system size, confirming that
it is the change in long-range screening that determines the evolution of the
ev$GW$ gap and the counterbalancing electron-hole interaction. Overall, the
optical excitation is a neutral excitation that polarizes the environment much
more weakly as compared to charged excitations.
To analyze more precisely the scaling properties of the optical excitation
energy, we briefly recall the so-called linear-response (LR) and state-
specific (SS) contributions to the energy shift induced by a polarizable
environment on a localized excitation [97, 71, 98]. The localized excitation
is here the dimer-defect excitation and the polarizable environment is the
h-BN host. Assuming for simplicity a pure HOMO-LUMO transition, the LR
contribution to the shift of the absorption energy induced by the environment
reads $\langle\rho_{\mathrm{HL}}|v^{\mathrm{reac}}|\rho_{\mathrm{HL}}\rangle$,
with
$\left|\rho_{\mathrm{HL}}\right\rangle=\left|\phi_{\mathrm{H}}\phi_{\mathrm{L}}\right\rangle$
the product of the HOMO and LUMO one-body orbitals. The reaction field
$v^{\mathrm{reac}}({\bf r},{\bf r}^{\prime})$ describes the potential
generated in ${\bf r}^{\prime}$ by the variation of charge induced in the
environment by a point charge added in ${\bf r}$. In the LR contribution, the
environment reacts to the $\rho_{HL}$ transition codensity, and the LR effect
is closely related to the magnitude of the oscillator strength. In the SS
contribution, the energy shift reads
$\langle\Delta\rho_{\mathrm{ES}}|v^{\mathrm{reac}}|\Delta\rho_{\mathrm{ES}}\rangle/2$,
with $\Delta\rho_{\mathrm{ES}}$ the variation of the total charge density
between the ground-state and the excited state, i.e., the SS contribution is
large when the density reorganization is large, such as in CT excitations.
Both contributions scale as the reaction field that we now show to vary as
$1/R^{3}$ with $R$ the radius of the flake as expected in 2D systems.
Both the $\rho_{\mathrm{HL}}$ and $\Delta\rho_{\mathrm{ES}}$ density
variations have no monopolar component. However, the rather large oscillator
strength associated with the transition indicates a large $\rho_{\mathrm{HL}}$
dipolar component. The $1/r^{3}$ electric field associated with these dipolar
components induces dipoles proportional to $\alpha_{\mathrm{at}}/r^{3}$ on B/N
atoms located at a distance $r$ of the defect, where $\alpha_{\mathrm{at}}$ is
some effective average atomic polarizability. Each induced dipole generates a
reaction potential that stabilizes the defect excited-state dipole.
Integrating over the reaction field generated by all B/N atoms in the flake
leads indeed to an overall reaction potential that scales as $1/R^{3}$, with
$R\simeq\sqrt{N_{\mathrm{at}}}$, taking $N_{\mathrm{at}}$ to be the number of
B/C/N atoms. Fitting with such a functional form the TD-PBE0 data for the 3
largest flakes (Fig. 2, dashed blue line) leads to a fit that smoothly goes
close to the 2 smallest systems for which such an asymptotic behavior may be
less accurate, accounting in particular for the $1/R^{2}$ behavior associated
with confinement. Fitting the 2 largest systems for the BSE data leads to a
fit somehow less satisfactory in the small size limit (Fig. 2, dashed orange
line). We must note that such an asymptotic behavior relies on the assumption
that the defect excitation $\rho_{\mathrm{HL}}$ and $\Delta\rho_{\mathrm{ES}}$
charge variations do not change with system size, a condition that may not be
fully validated in the small size limit.
Overall, the large system size extrapolated TD-PBE0 vertical $S_{1}$
excitation energy is found to be 4.61 eV, within 5 meV of the value obtained
for the largest C2@BN278 system. Similarly, the infinite-system size
extrapolated BSE value of 4.64 eV lies within 10 mev of the value obtained for
the C2@BN202 system. We adopt in the following these extrapolated values. The
present results confirm the conclusions of Ref. 35 that optical excitations
converge rather fast with cluster size.
## VI Reorganization energies and ZPVE corrections
As a next step, we explore the convergence with system size of the
reorganization energies in the ground and excited states, namely the
differences
$\;\lambda^{GS}=E_{\mathrm{GS}}[R_{\mathrm{ES}}]-E_{\mathrm{GS}}[R_{\mathrm{GS}}]\;$
and
$\;\lambda^{ES}=E_{\mathrm{ES}}[R_{\mathrm{GS}}]-E_{\mathrm{ES}}[R_{\mathrm{ES}}]\;$
where $R_{\mathrm{GS}}$ and $R_{\mathrm{ES}}$ indicate the $S_{0}$ and $S_{1}$
geometries, respectively. Analytic forces in the ground and excited states are
not available within the BSE formalism so that we use TD-PBE0 for this
exploration. As shown in Fig. 4, the reorganization energies slightly decrease
with system size with variations that are of the same magnitude as those
evidenced above for the vertical excitation energy. While an elastic theory
analysis of the deformation energy induced by a point defect in 2D finite-size
systems is beyond the present study, we find that the ground-state
reorganization energy can be accurately fitted by a $1/N_{\mathrm{at}}^{2}$ or
$1/R$ law, where $N_{\mathrm{at}}$ in the number of atoms and $R$ the
effective radius of the flake. We extrapolate the ground-state reorganization
energy to 0.164 eV. For the ES, the reorganization energy is found to be
somehow smaller with a decay law that seems to rely on a larger exponent.
Whatever the reliability of the fit, the extrapolated value and the one
explicitly calculated for the largest C2@BN202 system are within a very few
meV from each other, indicating again that any extrapolation inaccuracy can
hardly affect the conclusions. We adopt the values of 0.16 eV and 0.15 eV for
the reorganization energy in the ground and excited state, respectively. The
smaller value of the reorganization energy in the excited state can be
associated with smaller vibrational energies as compared to the ground state.
This is what we now explore by considering the zero-point vibrational energy
(ZPVE).
Figure 4: Evolution of the ground and excited state reorganization energy (in
eV) at the TD-PBE0/6-311G(d) level. The solid lines are a
1/$N_{\mathrm{at}}^{2}$ fit to the data points. The dashed lines are a "free"
exponent 1/$N_{\mathrm{at}}^{\alpha}$ with $\alpha\simeq 2.08$ for the ground-
state and $\alpha\simeq 3.71$ for the excited-state. Free fit infinite size
extrapolated values amount to 0.164 eV for the ground-state and 0.150 eV for
the excited-state, respectively.
To further account for the ZPVE correction, we perform calculations of the
vibrational spectrum in the ground-state at the ground-state geometry, and in
the $S_{1}$ excited state at the excited-state geometry. The difference in
ZPVE between the excited and ground states amounts to 0.147 eV for the
smallest C2@BN58 system and 0.131 eV in the larger C2@BN86 system. As expected
[99, 100], the vibrational modes in the excited states are “softer”,
consistent with the antibonding character of the LUMO level (see Fig. 1b).
Such vibrational energy differences are rather large yet not exceptional [99,
100]. This is likely related to a significant tensile stress for the C-C bond
embedded in the h-BN lattice with larger bond length, a constraint that is
essentially released upon populating an antibonding state. In fact, the C-C
bond length changes from 1.37 Å to 1.45 Å at the $S_{1}$ excited state
geometry $R_{\mathrm{ES}}$, a bond length that can be compared to 1.44 Å, the
PBE0/6-311G(d) B-N bond length at the center of an undoped pristine h-BN
flake. In the excited state, the C-C bond length is thus much closer to that
of the host network, confirming the release of the tensile stress. Assuming
that the ZPVE correction will further decrease slightly in the limit of larger
systems, we adopt in the following the value of 0.13 eV.
Finally, taking the 4.64 eV calculated BSE vertical absorption energy,
subtracting the 0.15 eV reorganization energy in the $S_{1}$ excited state and
the ZPVE difference contribution of 0.13 eV, we obtain a zero-phonon-line
(ZPL) energy of about 4.36 eV (see summary in Fig. 5). This is close to the
4.31 eV value found in Ref. 32 using constrained DFT calculations in a PBC
geometry, even though this previous value does not contain the ZPVE
contribution.
## VII Huang-Rhys and Debye-Waller factors
Figure 5: Symbolic representation of the lowest singlet vertical and zero-
phonon transitions, with the reorganization energy in the ground
($\lambda^{\mathrm{GS}}$) and excited ($\lambda^{\mathrm{ES}}$) states, ZPVE
contribution and Huang-Rhys factor $S$.
We now discuss the Huang-Rhys and Debye-Waller factors as an additional mean
to connect to experimental data [13]. Closely related to the reorganization
energy from the ground-state to the excited-state geometry, the Huang-Rhys
(HR) factor is a measure of the strength of coupling between the excitation
and the vibrational modes. In our case, we computed the HR factors for all
vibrational modes using the adiabatic Hessian vibronic model relying on the
(TD-)PBE0/6-311G(d) vibrational data of the two states. The HR factor reported
below, $S$, is obtained as the sum of the HR terms determined for all
vibrational modes.
The $S$ factor associated with the smallest C2@BN58 system is found to be
$S=1.37$, decreasing to $S=1.23$ in the case of the C2@BN86 system. This 10 %
decrease with system size is consistent with the 10 % decrease of the
reorganization energy between these two systems in the excited state (see Fig.
4). The very limited decrease of the reorganization energy at larger sizes
indicates that the value obtained for the C2@BN86 system is a very good
estimate of the converged $S$ in the large size limit. Our calculated value
falls within the 1–2 range of the experimental estimate [13]. The related
$W_{ZPL}\approx e^{-S}$ Debye-Waller coefficient is found to be 0.29, in good
agreement with the estimated 0.26 experimental value [11].
In the C2@BN58 system, the largest single mode contribution to the total $S$
factor is a clear C-C stretching mode located at 1347 cm-1 (168 meV) in the
excited state, that according to the Duschinsky analysis, couples to several
ground state mode, the strongest being the alike C-C stretching mode at 1644
cm-1 (204 meV) that was shown in Ref. [31] to stand higher in energy as
compared to the optical modes of pristine h-BN. The second and third
contributions originate in couplings between low-frequency breathing modes:
the excited state modes appearing at 338 cm-1 (42 meV) and 236 cm-1 (29 meV)
being respectively coupled to the ground state modes at 254 cm-1 (31 meV) and
242 cm-1 (39 meV). In the C2@BN86 flake, the largest single mode contributions
to $S$ are coming from, on the one hand, a breathing mode (272 cm-1 or 33 meV
in the excited state), and on the other hand, the excited-state C-C stretching
at 1260 cm-1 (156 meV). These modes are represented in the SM [83]. In the
computed vibrationally-resolved emission spectrum (see the SM [83]), the
strongest “stick” contributions also involve these vibrations. We note that
the energy of the stretching and breathing modes can be associated with the
174 meV and 60 meV energy spacing between phonon replica of the 4.08 eV zero-
phonon line as observed in the experimental PL spectrum of Ref. 13.
## VIII Multi-layer polarization effects
The theoretical $\sim$4.36 eV zero-phonon emission energy calculated for the
defected monolayer system remains larger than the 4.08 eV experimental value.
However, experimental data were not acquired for defected single-layer h-BN
sheet but multilayer systems. As such, environmental screening phenomena are
expected to affect the optical transition energies, an effect that may be
labeled a solvatochromic shift by analogy with the change in absorption or
emission energies for solvated species as compared to the gas phase. Such
environmental screening phenomena were already shown in Refs. [28, 33] to
stabilize the defect states, namely reducing the HOMO-LUMO photoemission gap.
To study this effect in the present case of photoluminescence, we explore
again the optical properties of our smallest C2@BN58 system in a bilayer and
trilayer geometry. For these model systems, the layers are individually
relaxed and then stacked without further relaxation. We adopt the standard AA’
geometry (B atoms on top of N atoms) with a 3.33 Å interlayer spacing [101,
102]. In this geometry, the C-C dimer is located on top of a B-N dimer of
neighboring layers. As shown in Fig 6, the defect-associated HOMO and LUMO
levels remain strongly localized on the defected layer.
Figure 6: Isocontour representation of the defect-associated (a) HOMO and (b)
LUMO levels in a C2@BN58 trilayer system with the defect localized in the
inner layer. The stacking is of AA’ type and the interlayer spacing has been
set to 3.33 Å. In c) and d), the hole-averaged electron density and electron-
averaged hole density for the lowest defect-associated BSE singlet excitation
are represented.
The most salient feature is that the defect-associated BSE absorption energy
is red-shifted by 0.17 eV and 0.27 eV from the monolayer to the bi- and
trilayer systems, respectively, taking the central layer in its ground-state
geometry. The very same 0.27 eV redshift is found for the $S_{1}$ energy of a
trilayer system taking the central layer in its $S_{1}$ excited state
geometry. As such, the effect on the excitation energy of the neighboring
layers seems rather independent of the central layer geometry, suggesting that
the reorganization energy and ZPVE contributions calculated for the defected
monolayer remain good estimates in the multilayer case.
To better analyze this evolution, we selected the central monolayer in its
ground-state geometry and found that between the monolayer and the trilayer
systems, the KS gap closes by 0.17 eV while the $GW$ gap closes by 0.78 eV. As
such, direct hybridization between layers is not negligible, but is marginal
as compared to polarization effects, namely long-range screening by adjacent
layers. This confirms the stabilization of the defect states, namely the
reduction of the ionization potential and increase of the electronic affinity,
induced by environmental screening. The same effect was studied in the case of
h-BN layers on a substrate [33]. Again, interlayer screening reduces as well
the electron-hole interaction, leading to a reduction of the optical
excitation that is significantly smaller than that of the (photoemission) gap.
This remains however a non-negligible effect when attempting to corroborate
theoretical with experimental data, a message that applies to the present
carbon-dimer defect but certainly to any other defects.
We can speculate that most of the screening effects, inducing a redshift of
the optical lines as compared to the defected monolayer system, originates
from the screening by a very few neighbouring layers, tentatively explaining
why experiments performed on bulk or few-layers h-BN provide a very stable ZPL
emission line at about 4.1 eV. Studying the evolution of the emission line
with respect to the number of layers would be prohibitively expensive and lies
beyond the scope of the present study. The main message however is that
calculations of absorption or luminescence energies on monolayer systems
should overestimate the experimental values by a few tenths of an eV. We adopt
the plausible value of 0.3 eV, namely slightly larger than the 0.27 eV value
explicitly calculated for the trilayer system.
Reducing the calculated 4.36 eV ZPL energy for the monolayer system by a
redshift of the order of 0.3 eV brings that calculated value to close
agreement with the 4.08 eV experimental line. Such a close agreement is
certainly fortuitous given the $\simeq$0.1 eV difference on the vertical
absorption energies between high-level methods [BSE, CC2, ADC(2)], the rough
estimate of the neighboring layers screening effect (rounded to 0.3 eV) and
the extrapolations needed to reach the infinite system size and complete basis
set limits. However, the present estimate certainly comforts the carbon-dimer
defect as the origin of this emission line as proposed by the authors of Ref.
32.
## IX Photoemission gap and excitonic binding energy
We close this study by a brief discussion of the dopant-associated HOMO-LUMO
gap as obtained within the ev$GW$ formalism and the resulting excitonic
binding energy obtained from subtracting the optical gap. Since no
experimental data are available for these quantities, the resulting values
will stand as predictions. More details are available in the SM [83].
Starting with the smallest C2@BN58 system, our most converged _aug_ -cc-pVTZ
ev$GW$ value yields 8.28 eV which is very close to the extrapolated 8.3 eV to
8.4 eV values in the complete basis set (CBS) limit. Adapting the discussion
provided above for the scaling laws associated with long-range polarization
effects, but treating here the response to charged (photoemission)
excitations, the evolution with size of the gap scales as 1/$R^{2}$ (see e.g.
Ref. 103 in the case of molecular 2D systems). Fitting our $GW$ data points
with such a functional form, the extrapolated gap in the infinite system size
limit is found to close by 0.77 eV as compared to the smallest C2@BN58 system,
leading to $\simeq$7.6 eV for the carbon dimer defect HOMO-LUMO gap in an
infinite h-BN monolayer. Subtracting the 4.64 eV vertical optical absorption
energy, one obtains a very large $\simeq$3 eV electron-hole binding energy.
This is much larger than the estimated 0.7-0.8 eV [104, 105, 106] and 1.9 eV -
2.1 eV [51, 107, 108, 104] excitonic binding energy for layered and single-
sheet undefected h-BN systems. The clear localization of the Frenkel electron-
hole pair on the defect, as shown in Fig. 1(c,d), can certainly explain such a
large increase of the excitonic binding energy.
Finally, the knowledge of the defect $GW$ ionization potential and electronic
affinity allows estimating the defect charge transition levels (CTLs) as an
indication of the chemical potential energy range where the neutral defect is
more stable than the charged ones (see e.g. Refs. [23, 34]). Exploiting the
fast convergence with system size of structural reorganization energies, we
estimate from the large C2@BN138 system the reorganization energy from the
neutral to the cationic state geometry to be 0.35 eV [PBE0 6-311G(d) value].
Further, in the infinite size limit (see SM [83], Section VIII), we find the
position of the occupied defect level to be $\simeq$0.64 eV above the
monolayer h-BN occupied band edge. These data bring the (+1/0) CTL at about
1.0 eV above the h-BN top of the valence band, in close agreement with the DFT
calculations of Ref. [32]. Further, with a reorganization energy to the
anionic geometry of 0.25 eV and a defect HOMO-LUMO gap of 7.6 eV, we find the
(0/-1) CTL to lie at about 8.0 eV above the valence band edge. These
calculations confirm the outcomes of Ref. [32] that for the isolated defected
monolayer, the neutral state should be the most stable for a chemical
potential located throughout most of the gap. We will not explore here the
effect of multilayer screening on the CTL positions [34].
## X Conclusion
We have studied the optoelectronic properties of the recently proposed carbon-
dimer defect in hexagonal boron-nitride using the $GW$ and Bethe-Salpeter
equation many-body Green’s function formalisms in a finite size cluster
(flake) approach. More precisely, we calculate vertical excitation energies
within the BSE formalism, while relaxation in the excited state and zero-point
vibrational energies (ZPVE) are calculated at the TD-PBE0 level. Comparison
with wavefunction CC2 and ADC(2) calculations on a small C2@BN58 atoms system
validated the accuracy of both the BSE formalism and of the TD-PBE0 approach
in the family of TD-DFT techniques.
The study of all relevant quantities with respect to system size allows to
find that the vertical optical absorption energy, the reorganization energy,
and the ZPVE contributions, converge rather quickly with system size, being
close to their extrapolated value for systems containing between 100 and 200
B/C/N atoms. As a result, we find a BSE ZPL emission energy of 4.36 eV for the
defected monolayer, accounting for a 0.15 eV reorganization energy in the
excited state and a significant 0.13 eV ZPVE reduction from the ground to the
excited state. We show further that additional screening associated with
neighboring layers reduce the defect emission energy, with a 0.27 eV redshift
in the simple case of a model trilayer system, bringing the calculated ZPL
energy in close agreement with the 4.08 eV experimental value. Further, the
S$\simeq$1.37 Huang-Rhys and $W_{ZPL}\simeq$0.25 Debye-Waller coefficients are
found to be in excellent agreement with experimental estimates. The present
results thus confirm the identification proposed in Ref. 32 that the carbon-
dimer defect is at the origin of the 4.08 eV ZPL luminescence line. On a more
general ground, the present study suggests that many-body Bethe-Salpeter
calculations, performed on finite size systems containing a unique defect,
stand as a valuable alternative to periodic boundary approaches for the study
of the optical properties of defects in the dilute limit.
In contrast to the neutral optical excitations, the $GW$ quasiparticle
energies (HOMO, LUMO, etc.), namely charged excitations, converge very slowly
with system size. Extrapolation of quasiparticle energies to the infinite size
limit can however be safely obtained with a 1/$R^{2}$ law, with $R$ the radius
of the 2D flake containing the defect. This stems from a simple polarization
scaling law in insulating 2D systems. As a result, the gap is found to close
by $\simeq$0.77 eV from the smallest C2@BN58 system to the infinite size
limit, leading to an ev$GW$ HOMO-LUMO gap of 7.6 eV in the monolayer complete-
basis set and infinite system size limits. Subtracting the vertical absorption
energy, one obtains a very large excitonic binding energy of 3 eV. The very
localized Frenkel character of the excitation can justify that this electron-
hole interaction is much larger than what is found in pristine h-BN systems
where the excitons are much more delocalized.
###### Acknowledgements.
X.B., I.D., and D.J. thank the ANR for financial support in the framework of
the BSE-forces grant (ANR-20-CE29-0005). Calculations have been performed on
the French TGCC Joliot-Curie supercomputing center thanks to a GENCI
allocation under contract noA0090910016. M.H.E.B. and D.J. are indebted to the
CCIPL computational center installed in Nantes for (the always very) generous
allocation of computational time. M.W. thanks the RRZE for allocation of
computational time and support, the ERASMUS+ traineeship program for their
financial support and P. Hansmann as co-supervisor of his master’s period.
## References
* Katzir _et al._ [1975] A. Katzir, J. T. Suss, A. Zunger, and A. Halperin, Point defects in hexagonal boron nitride. I. EPR, thermoluminescence, and thermally-stimulated-current measurements, Phys. Rev. B 11, 2370 (1975).
* Era _et al._ [1981] K. Era, F. Minami, and T. Kuzuba, Fast luminescence from carbon-related defects of hexagonal boron nitride, J. Lumin. 24-25, 71 (1981).
* Wu _et al._ [2004] J. Wu, W.-Q. Han, W. Walukiewicz, J. W. Ager, W. Shan, E. E. Haller, and A. Zettl, Raman spectroscopy and time-resolved photoluminescence of BN and $B_{x}C_{y}N_{z}$ nanotubes, Nano Lett. 4, 647 (2004), https://doi.org/10.1021/nl049862e .
* Silly _et al._ [2007] M. G. Silly, P. Jaffrennou, J. Barjon, J.-S. Lauret, F. Ducastelle, A. Loiseau, E. Obraztsova, B. Attal-Tretout, and E. Rosencher, Luminescence properties of hexagonal boron nitride: Cathodoluminescence and photoluminescence spectroscopy measurements, Phys. Rev. B 75, 085205 (2007).
* Museur _et al._ [2008] L. Museur, E. Feldbach, and A. Kanaev, Defect-related photoluminescence of hexagonal boron nitride, Phys. Rev. B 78, 155204 (2008).
* Du _et al._ [2015] X. Z. Du, J. Li, J. Y. Lin, and H. X. Jiang, The origin of deep-level impurity transitions in hexagonal boron nitride, Appl. Phys. Lett. 106, 021110 (2015), https://doi.org/10.1063/1.4905908 .
* Meuret _et al._ [2015] S. Meuret, L. H. G. Tizei, T. Cazimajou, R. Bourrellier, H. C. Chang, F. Treussart, and M. Kociak, Photon bunching in cathodoluminescence, Phys. Rev. Lett. 114, 197401 (2015).
* Wong _et al._ [2015] D. Wong, J. Velasco, L. Ju, J. Lee, S. Kahn, H.-Z. Tsai, C. Germany, T. Taniguchi, K. Watanabe, A. Zettl, F. Wang, and M. F. Crommie, Characterization and manipulation of individual defects in insulating hexagonal boron nitride using scanning tunnelling microscopy, Nature Nanotech. 10 (2015).
* Tran _et al._ [2016] T. Tran, K. Bray, M. Ford, M. Toth, and I. Aharonovich, Quantum emission from hexagonal boron nitride monolayers, Nature Nanotech 11, 37–41 (2016).
* Bourrellier _et al._ [2016] R. Bourrellier, S. Meuret, A. Tararan, O. Stéphan, M. Kociak, L. H. G. Tizei, and A. Zobelli, Bright UV single photon emission at point defects in h-BN, Nano Lett. 16, 4317 (2016), pMID: 27299915, https://doi.org/10.1021/acs.nanolett.6b01368 .
* Vuong _et al._ [2016] T. Q. P. Vuong, G. Cassabois, P. Valvin, A. Ouerghi, Y. Chassagneux, C. Voisin, and B. Gil, Phonon-photon mapping in a color center in hexagonal boron nitride, Phys. Rev. Lett. 117, 097402 (2016).
* Jungwirth _et al._ [2016] N. R. Jungwirth, B. Calderon, Y. Ji, M. G. Spencer, M. E. Flatté, and G. D. Fuchs, Temperature dependence of wavelength selectable zero-phonon emission from single defects in hexagonal boron nitride, Nano Lett. 16, 6052 (2016), pMID: 27580074, https://doi.org/10.1021/acs.nanolett.6b01987 .
* Vokhmintsev _et al._ [2019] A. Vokhmintsev, I. Weinstein, and D. Zamyatin, Electron-phonon interactions in subband excited photoluminescence of hexagonal boron nitride, J. Lumin. 208, 363 (2019).
* Gottscholl _et al._ [2020] A. Gottscholl, M. Kianinia, V. Soltamov, S. Orlinskii, G. Mamin, C. Bradac, C. Kasper, K. Krambrock, A. Sperlich, M. Toth, I. Aharonovich, and V. Dyakonov, Initialization and read-out of intrinsic spin defects in a van der waals crystal at room temperature, Nat. Mater. 19, 540 (2020).
* Hayee _et al._ [2020] F. Hayee, L. Yu, J. L. Zhang, C. J. Ciccarino, M. Nguyen, A. F. Marshall, I. Aharonovich, J. Vučkovič, P. Narang, T. F. Heinz, and J. A. Dionne, Revealing multiple classes of stable quantum emitters in hexagonal boron nitride with correlated optical and electron microscopy, Nat. Mater. 19, 534 (2020).
* Mendelson _et al._ [2021] N. Mendelson, D. Chugh, J. R. Reimers, T. S. Cheng, A. Gottscholl, H. Long, C. J. Mellor, A. Zettl, V. Dyakonov, P. H. Beton, S. V. Novikov, C. Jagadish, H. H. Tan, M. J. Ford, M. Toth, C. Bradac, and I. Aharonovich, Identifying carbon as the source of visible single-photon emission from hexagonal boron nitride, Nat. Matter. 20, 321 (2021).
* Azevedo _et al._ [2009] S. Azevedo, J. R. Kaschny, C. M. de Castilho, and F. de Brito Mota, Electronic structure of defects in a boron nitride monolayer, Eur. Phys. J. B 67, 507 (2009).
* Attaccalite _et al._ [2011] C. Attaccalite, M. Bockstedte, A. Marini, A. Rubio, and L. Wirtz, Coupling of excitons and defect states in boron-nitride nanostructures, Phys. Rev. B 83, 144115 (2011).
* Huang and Lee [2012] B. Huang and H. Lee, Defect and impurity properties of hexagonal boron nitride: A first-principles calculation, Phys. Rev. B 86, 245406 (2012).
* Berseneva _et al._ [2013] N. Berseneva, A. Gulans, A. V. Krasheninnikov, and R. M. Nieminen, Electronic structure of boron nitride sheets doped with carbon from first-principles calculations, Phys. Rev. B 87, 035404 (2013).
* Wu _et al._ [2017a] F. Wu, A. Galatas, R. Sundararaman, D. Rocca, and Y. Ping, First-principles engineering of charged defects for two-dimensional quantum technologies, Phys. Rev. Materials 1, 071001 (2017a).
* Tawfik _et al._ [2017] S. A. Tawfik, S. Ali, M. Fronzi, M. Kianinia, T. T. Tran, C. Stampfl, I. Aharonovich, M. Toth, and M. J. Ford, First-principles investigation of quantum emission from hBN defects, Nanoscale 9, 13575 (2017).
* Wu _et al._ [2017b] F. Wu, A. Galatas, R. Sundararaman, D. Rocca, and Y. Ping, First-principles engineering of charged defects for two-dimensional quantum technologies, Phys. Rev. Materials 1, 071001 (2017b).
* Cheng _et al._ [2017] G. Cheng, Y. Zhang, L. Yan, H. Huang, Q. Huang, Y. Song, Y. Chen, and Z. Tang, A paramagnetic neutral $C_{B}V_{N}$ center in hexagonal boron nitride monolayer for spin qubit application, Comput. Mater. Sci. 129, 247 (2017).
* Jungwirth and Fuchs [2017] N. R. Jungwirth and G. D. Fuchs, Optical absorption and emission mechanisms of single defects in hexagonal boron nitride, Phys. Rev. Lett. 119, 057401 (2017).
* Reimers _et al._ [2018] J. R. Reimers, A. Sajid, R. Kobayashi, and M. J. Ford, Understanding and calibrating density-functional-theory calculations describing the energy and spectroscopy of defect sites in hexagonal boron nitride, J. Chem. Theory Comput. 14, 1602 (2018), pMID: 29412670, https://doi.org/10.1021/acs.jctc.7b01072 .
* Weston _et al._ [2018] L. Weston, D. Wickramaratne, M. Mackoit, A. Alkauskas, and C. G. Van de Walle, Native point defects and impurities in hexagonal boron nitride, Phys. Rev. B 97, 214104 (2018).
* Smart _et al._ [2018] T. J. Smart, F. Wu, M. Govoni, and Y. Ping, Fundamental principles for calculating charged defect ionization energies in ultrathin two-dimensional materials, Phys. Rev. Materials 2, 124002 (2018).
* Sajid _et al._ [2018] A. Sajid, J. R. Reimers, and M. J. Ford, Defect states in hexagonal boron nitride: Assignments of observed properties and prediction of properties relevant to quantum computation, Phys. Rev. B 97, 064101 (2018).
* Turiansky _et al._ [2019] M. E. Turiansky, A. Alkauskas, L. C. Bassett, and C. G. Van de Walle, Dangling bonds in hexagonal boron nitride as single-photon emitters, Phys. Rev. Lett. 123, 127401 (2019).
* Korona and Chojecki [2019] T. Korona and M. Chojecki, Exploring point defects in hexagonal boron-nitrogen monolayers, Int. J. Quant. Chem. 119, e25925 (2019), https://onlinelibrary.wiley.com/doi/pdf/10.1002/qua.25925 .
* Mackoit-Sinkevičiené _et al._ [2019] M. Mackoit-Sinkevičiené, M. Maciaszek, C. G. Van de Walle, and A. Alkauskas, Carbon dimer defect as a source of the 4.1 eV luminescence in hexagonal boron nitride, Appl. Phys. Lett. 115, 212101 (2019), https://doi.org/10.1063/1.5124153 .
* Wang and Sundararaman [2019] D. Wang and R. Sundararaman, Substrate effects on charged defects in two-dimensional materials, Phys. Rev. Materials 3, 083803 (2019).
* Wang and Sundararaman [2020] D. Wang and R. Sundararaman, Layer dependence of defect charge transition levels in two-dimensional materials, Phys. Rev. B 101, 054103 (2020).
* Reimers _et al._ [2020] J. R. Reimers, J. Shen, M. Kianinia, C. Bradac, I. Aharonovich, M. J. Ford, and P. Piecuch, Photoluminescence, photophysics, and photochemistry of the $V_{B}^{-}$ defect in hexagonal boron nitride, Phys. Rev. B 102, 144105 (2020).
* Sajid and Thygesen [2020] A. Sajid and K. S. Thygesen, $V_{N}C_{B}$ defect as source of single photon emission from hexagonal boron nitride, 2D Materials 7, 031007 (2020).
* Jara _et al._ [2021] C. Jara, T. Rauch, S. Botti, M. A. L. Marques, A. Norambuena, R. Coto, J. E. Castellanos-Águila, J. R. Maze, and F. Munoz, First-principles identification of single photon emitters based on carbon clusters in hexagonal boron nitride, J. Phys. Chem. A 125, 1325 (2021), pMID: 33554602, https://doi.org/10.1021/acs.jpca.0c07339 .
* Attaccalite _et al._ [2013] C. Attaccalite, L. Wirtz, A. Marini, and A. Rubio, Efficient gate-tunable light-emitting device made of defective boron nitride nanotubes: from ultraviolet to the visible, Sci. Rep. 3 (2013).
* Cassabois _et al._ [2016] G. Cassabois, P. Valvin, and B. Gil, Hexagonal boron nitride is an indirect bandgap semiconductor, Nature Photon. 10 (2016).
* Watanabe _et al._ [2004] K. Watanabe, T. Taniguchi, and H. Kanda, Direct-bandgap properties and evidence for ultraviolet lasing of hexagonal boron nitride single crystal, Nature Mater. 3 (2004).
* Jaffrennou _et al._ [2007] P. Jaffrennou, J. Barjon, J.-S. Lauret, B. Attal-Trétout, F. Ducastelle, and A. Loiseau, Origin of the excitonic recombinations in hexagonal boron nitride by spatially resolved cathodoluminescence spectroscopy, J. Appl. Phys. 102, 116102 (2007), https://doi.org/10.1063/1.2821413 .
* Leslie and Gillan [1985] M. Leslie and N. J. Gillan, The energy and elastic dipole tensor of defects in ionic crystals calculated by the supercell method, J. Phys., C, Solid State Phys. 18, 973 (1985).
* Makov and Payne [1995] G. Makov and M. C. Payne, Periodic boundary conditions in ab initio calculations, Phys. Rev. B 51, 4014 (1995).
* Freysoldt _et al._ [2009] C. Freysoldt, J. Neugebauer, and C. G. Van de Walle, Fully ab initio finite-size corrections for charged-defect supercell calculations, Phys. Rev. Lett. 102, 016402 (2009).
* Taylor and Bruneval [2011] S. E. Taylor and F. Bruneval, Understanding and correcting the spurious interactions in charged supercells, Phys. Rev. B 84, 075155 (2011).
* Freysoldt _et al._ [2014] C. Freysoldt, B. Grabowski, T. Hickel, J. Neugebauer, G. Kresse, A. Janotti, and C. G. Van de Walle, First-principles calculations for point defects in solids, Rev. Mod. Phys. 86, 253 (2014).
* Chen and Pasquarello [2015] W. Chen and A. Pasquarello, First-principles determination of defect energy levels through hybrid density functionals and $GW$, J. Phys. : Condens. Matter 27, 133202 (2015).
* Hedin [1965] L. Hedin, New method for calculating the one-particle green’s function with application to the electron-gas problem, Phys. Rev. 139, A796 (1965).
* Salpeter and Bethe [1951] E. E. Salpeter and H. A. Bethe, A relativistic equation for bound-state problems, Phys. Rev. 84, 1232 (1951).
* Strinati [1982] G. Strinati, Dynamical shift and broadening of core excitons in semiconductors, Phys. Rev. Lett. 49, 1519 (1982).
* Wirtz _et al._ [2006] L. Wirtz, A. Marini, and A. Rubio, Excitons in boron nitride nanotubes: Dimensionality effects, Phys. Rev. Lett. 96, 126104 (2006).
* Rinke _et al._ [2009] P. Rinke, A. Janotti, M. Scheffler, and C. G. Van de Walle, Defect formation energies without the band-gap problem: Combining density-functional theory and the $GW$ approach for the silicon self-interstitial, Phys. Rev. Lett. 102, 026402 (2009).
* Strinati _et al._ [1980] G. Strinati, H. J. Mattausch, and W. Hanke, Dynamical correlation effects on the quasiparticle bloch states of a covalent crystal, Phys. Rev. Lett. 45, 290 (1980).
* Hybertsen and Louie [1986] M. S. Hybertsen and S. G. Louie, Electron correlation in semiconductors and insulators: Band gaps and quasiparticle energies, Phys. Rev. B 34, 5390 (1986).
* Godby _et al._ [1988] R. W. Godby, M. Schlüter, and L. J. Sham, Self-energy operators and exchange-correlation potentials in semiconductors, Phys. Rev. B 37, 10159 (1988).
* von der Linden and Horsch [1988] W. von der Linden and P. Horsch, Precise quasiparticle energies and hartree-fock bands of semiconductors and insulators, Phys. Rev. B 37, 8351 (1988).
* Onida _et al._ [2002] G. Onida, L. Reining, and A. Rubio, Electronic excitations: density-functional versus many-body green’s-function approaches, Rev. Mod. Phys. 74, 601 (2002).
* Martin _et al._ [2016] R. Martin, L. Reining, and D. Ceperley, _Interacting Electrons: Theory and Computational Approaches_ (Cambridge University Press, 2016).
* Golze _et al._ [2019] D. Golze, M. Dvorak, and P. Rinke, The $GW$ compendium: A practical guide to theoretical photoemission spectroscopy, Front. Chem. 7, 377 (2019).
* Strinati [1984] G. Strinati, Effects of dynamical screening on resonances at inner-shell thresholds in semiconductors, Phys. Rev. B 29, 5718 (1984).
* Benedict _et al._ [1998] L. X. Benedict, E. L. Shirley, and R. B. Bohn, Optical absorption of insulators and the electron-hole interaction: An ab initio calculation, Phys. Rev. Lett. 80, 4514 (1998).
* Rohlfing and Louie [1998] M. Rohlfing and S. G. Louie, Electron-hole excitations in semiconductors and insulators, Phys. Rev. Lett. 81, 2312 (1998).
* Albrecht _et al._ [1998] S. Albrecht, L. Reining, R. Del Sole, and G. Onida, Ab initio calculation of excitonic effects in the optical spectra of semiconductors, Phys. Rev. Lett. 80, 4510 (1998).
* Ping _et al._ [2013] Y. Ping, D. Rocca, and G. Galli, Electronic excitations in light absorbers for photoelectrochemical energy conversion: first principles calculations based on many body perturbation theory, Chem. Soc. Rev. 42, 2437 (2013).
* Neese [2012] F. Neese, The orca program system, WIREs Comput. Mol. Sci. 2, 73 (2012).
* Duchemin and Blase [2020] I. Duchemin and X. Blase, Robust analytic-continuation approach to many-body $GW$ calculations, J. Chem. Theory Comput. 16, 1742 (2020), pMID: 32023052, https://doi.org/10.1021/acs.jctc.9b01235 .
* Duchemin and Blase [2021] I. Duchemin and X. Blase, Cubic-scaling all-electron $GW$ calculations with a separable density-fitting space–time approach, J. Chem. Theory Comput. 17, 2383 (2021), pMID: 33797245, https://doi.org/10.1021/acs.jctc.1c00101 .
* Jacquemin _et al._ [2015a] D. Jacquemin, I. Duchemin, and X. Blase, Benchmarking the bethe–salpeter formalism on a standard organic molecular set, J. Chem. Theory Comput. 11, 3290 (2015a), pMID: 26207104, https://doi.org/10.1021/acs.jctc.5b00304 .
* Li _et al._ [2016] J. Li, G. D’Avino, I. Duchemin, D. Beljonne, and X. Blase, Combining the many-body $GW$ formalism with classical polarizable models: Insights on the electronic structure of molecular solids, J. Phys. Chem. Lett. 7, 2814 (2016), pMID: 27388926, https://doi.org/10.1021/acs.jpclett.6b01302 .
* Jacquemin _et al._ [2017] D. Jacquemin, I. Duchemin, and X. Blase, Is the bethe–salpeter formalism accurate for excitation energies? comparisons with TD-DFT, CASPT2, and EOM-CCSD, J. Phys. Chem. Lett. 8, 1524 (2017), pMID: 28301726, https://doi.org/10.1021/acs.jpclett.7b00381 .
* Duchemin _et al._ [2018] I. Duchemin, C. A. Guido, D. Jacquemin, and X. Blase, The bethe–salpeter formalism with polarisable continuum embedding: Reconciling linear-response and state-specific features, Chem. Sci. 9, 4430 (2018).
* Friedrich [2019] C. Friedrich, Tetrahedron integration method for strongly varying functions: Application to the $GT$ self-energy, Phys. Rev. B 100, 075142 (2019).
* Jacquemin _et al._ [2015b] D. Jacquemin, I. Duchemin, and X. Blase, 0–0 energies using hybrid schemes: Benchmarks of TD-DFT, CIS(D), ADC(2), CC2, and BSE/$GW$ formalisms for 80 real-life compounds, J. Chem. Theory Comput. 11, 5340 (2015b), pMID: 26574326, https://doi.org/10.1021/acs.jctc.5b00619 .
* Adamo and Barone [1999] C. Adamo and V. Barone, Toward reliable density functional methods without adjustable parameters: the PBE0 model, J. Comp. Phys. 110, 6158 (1999).
* Whitten [1973] J. L. Whitten, Coulombic potential energy integrals and approximations, J. Chem. Phys. 58, 4496 (1973), https://doi.org/10.1063/1.1679012 .
* Ren _et al._ [2012] X. Ren, P. Rinke, V. Blum, J. Wieferink, A. Tkatchenko, A. Sanfilippo, K. Reuter, and M. Scheffler, Resolution-of-identity approach to hartree–fock, hybrid density functionals, RPA, MP2 and $GW$ with numeric atom-centered orbital basis functions, New J. Phys. 14, 053020 (2012).
* Duchemin _et al._ [2017] I. Duchemin, J. Li, and X. Blase, Hybrid and constrained resolution-of-identity techniques for coulomb integrals, J. Chem. Theory Comput. 13, 1199 (2017), pMID: 28094983, https://doi.org/10.1021/acs.jctc.6b01215 .
* Weigend _et al._ [2002] F. Weigend, A. Köhn, and C. Hättig, Efficient use of the correlation consistent basis sets in resolution of the identity MP2 calculations, J. Chem. Phys. 116, 3175 (2002), https://doi.org/10.1063/1.1445115 .
* Dunning [1989] T. H. Dunning, Gaussian basis sets for use in correlated molecular calculations. I. The atoms boron through neon and hydrogen, J. Chem. Phys. 90, 1007 (1989), https://doi.org/10.1063/1.456153 .
* Weigend [2008] F. Weigend, Hartree–fock exchange fitting basis sets for H to Rn, J. Comp. Chem. 29, 167 (2008), https://onlinelibrary.wiley.com/doi/pdf/10.1002/jcc.20702 .
* Krishnan _et al._ [1980] R. Krishnan, J. S. Binkley, R. Seeger, and J. A. Pople, Self-consistent molecular orbital methods. XX. A basis set for correlated wave functions, J. Chem. Phys. 72, 650 (1980), https://doi.org/10.1063/1.438955 .
* Casida [1995] M. E. Casida, Time-dependent density functional response theory for molecules, in _Recent Advances in Density Functional Methods_ (1995) pp. 155–192, https://www.worldscientific.com/doi/pdf/10.1142/9789812830586_0005 .
* [83] See Supplemental Material at [Link to be added upon publication] for the representation of the C2@BNX structures, the convergence with basis set and atomic structure sizes of TD-DFT and BSE calculations, the complete basis set (CBS) analysis of the smallest flake $GW$ energy levels, the extrapolation to infinite system size of the $GW$ HOMO-LUMO gap, the illustration of the vibrational modes contributing to the Huang-Rhys factor, the theoretical emission spectrum at room temperature and finally a study of the defect levels position with respect to the h-BN monolayer valence band edge.
* Frisch _et al._ [2016] M. J. Frisch, G. W. Trucks, H. B. Schlegel, G. E. Scuseria, M. A. Robb, J. R. Cheeseman, G. Scalmani, V. Barone, G. A. Petersson, H. Nakatsuji, X. Li, M. Caricato, A. V. Marenich, J. Bloino, B. G. Janesko, R. Gomperts, B. Mennucci, H. P. Hratchian, J. V. Ortiz, A. F. Izmaylov, J. L. Sonnenberg, D. Williams-Young, F. Ding, F. Lipparini, F. Egidi, J. Goings, B. Peng, A. Petrone, T. Henderson, D. Ranasinghe, V. G. Zakrzewski, J. Gao, N. Rega, G. Zheng, W. Liang, M. Hada, M. Ehara, K. Toyota, R. Fukuda, J. Hasegawa, M. Ishida, T. Nakajima, Y. Honda, O. Kitao, H. Nakai, T. Vreven, K. Throssell, J. A. Montgomery, Jr., J. E. Peralta, F. Ogliaro, M. J. Bearpark, J. J. Heyd, E. N. Brothers, K. N. Kudin, V. N. Staroverov, T. A. Keith, R. Kobayashi, J. Normand, K. Raghavachari, A. P. Rendell, J. C. Burant, S. S. Iyengar, J. Tomasi, M. Cossi, J. M. Millam, M. Klene, C. Adamo, R. Cammi, J. W. Ochterski, R. L. Martin, K. Morokuma, O. Farkas, J. B. Foresman, and D. J. Fox, Gaussian 16 Revision A.03 (2016), gaussian Inc. Wallingford CT.
* Koch _et al._ [1995] H. Koch, O. Christiansen, P. Jorgensen, and J. Olsen, Excitation energies of BH, CH2 and Ne in full configuration interaction and the hierarchy CCS, CC2, CCSD and CC3 of coupled cluster models, CPL 244, 75 (1995).
* Dreuw and Wormit [2015] A. Dreuw and M. Wormit, The algebraic diagrammatic construction scheme for the polarization propagator for the calculation of excited states, WIREs Comput. Mol. Sci. 5, 82 (2015).
* Tur [2018] Turbomole v7.3 2018, a development of university of karlsruhe and forschungszentrum karlsruhe gmbh, 1989-2007, turbomole gmbh, since 2007; available from http://www.turbomole.com (accessed 13 june 2016). (2018).
* Santoro _et al._ [2007a] F. Santoro, R. Improta, A. Lami, J. Bloino, and V. Barone, Effective method to compute franck-condon integrals for optical spectra of large molecules in solution, J. Comp. Phys. 126, 084509 (2007a).
* Santoro _et al._ [2007b] F. Santoro, R. Improta, A. Lami, J. Bloino, and V. Barone, Effective method to compute vibrationally resolved optical spectra of large molecules at finite temperature in the gas phase and in solution, J. Comp. Phys. 126, 184102 (2007b).
* Santoro and Jacquemin [2016] F. Santoro and D. Jacquemin, Going beyond the vertical approximation with time-dependent density functional theory, WIREs Comput. Mol. Sci. 6, 460 (2016).
* Cerezo and Santoro [2020] J. Cerezo and F. Santoro, Fcclasses 3.0, http://www.pi.iccom.cnr.it/fcclasses (2020).
* Koch _et al._ [1997] H. Koch, O. Christiansen, P. Jorgensen, A. M. Sanchez de Merás, and T. Helgaker, The cc3 model: An iterative coupled cluster approach including connected triples, J. Chem. Phys. 106, 1808 (1997).
* Véril _et al._ [2021] M. Véril, A. Scemama, M. Caffarel, F. Lipparini, M. Boggio-Pasqua, D. Jacquemin, and P.-F. Loos, Questdb: a database of highly-accurate excitation energies for the electronic structure community, WIREs Comput. Mol. Sci. 11, e1517 (2021).
* Winter _et al._ [2013] N. O. C. Winter, N. K. Graf, S. Leutwyler, and C. Hättig, Benchmarks for 0–0 transitions of aromatic organic molecules: DFT/B3LYP, ADC(2), CC2, SOS-CC2 and SCS-CC2 compared to high-resolution gas-phase data, Phys. Chem. Chem. Phys. 15, 6623 (2013).
* Oruganti _et al._ [2016] B. Oruganti, C. Fang, and B. Durbeej, Assessment of a composite CC2/DFT procedure for calculating 0–0 excitation energies of organic molecules, Mol. Phys. 114, 3448 (2016), http://dx.doi.org/10.1080/00268976.2016.1235736 .
* Laurent and Jacquemin [2013] A. D. Laurent and D. Jacquemin, TD-DFT benchmarks: A review, Int. J. Quantum Chem. 113, 2019 (2013).
* Cammi _et al._ [2005] R. Cammi, S. Corni, B. Mennucci, and J. Tomasi, Electronic excitation energies of molecules in solution: State specific and linear response methods for nonequilibrium continuum solvation models, J. Chem. Phys. 122, 104513 (2005), https://doi.org/10.1063/1.1867373 .
* Guido and Caprasecca [2019] C. A. Guido and S. Caprasecca, On the description of the environment polarization response to electronic transitions, Int. J. Quantum Chem. 119, e25711 (2019), https://onlinelibrary.wiley.com/doi/pdf/10.1002/qua.25711 .
* Goerigk _et al._ [2009] L. Goerigk, J. Moellmann, and S. Grimme, Computation of accurate excitation energies for large organic molecules with double-hybrid density functionals, Phys. Chem. Chem. Phys. 11, 4611 (2009).
* Jacquemin _et al._ [2012] D. Jacquemin, A. Planchat, C. Adamo, and B. Mennucci, A td-dft assessment of functionals for optical 0-0 transitions in solvated dyes, J. Chem. Theory Comput. 8, 2359 (2012).
* Lin _et al._ [2010] Y. Lin, T. V. Williams, and J. W. Connell, Soluble, exfoliated hexagonal boron nitride nanosheets, J. Phys. Chem. Lett. 1, 277 (2010), https://doi.org/10.1021/jz9002108 .
* Shi _et al._ [2010] Y. Shi, C. Hamsen, X. Jia, K. K. Kim, A. Reina, M. Hofmann, A. L. Hsu, K. Zhang, H. Li, Z.-Y. Juang, M. S. Dresselhaus, L.-J. Li, and J. Kong, Synthesis of few-layer hexagonal boron nitride thin film by chemical vapor deposition, Nano Lett. 10, 4134 (2010), pMID: 20812716, https://doi.org/10.1021/nl1023707 .
* D’Avino _et al._ [2016] G. D’Avino, L. Muccioli, F. Castet, C. Poelking, D. Andrienko, Z. G. Soos, J. Cornil, and D. Beljonne, Electrostatic phenomena in organic semiconductors: fundamentals and implications for photovoltaics, J. Phys.: Cond. Mat. 28, 433002 (2016).
* Paleari _et al._ [2018] F. Paleari, T. Galvani, H. Amara, F. Ducastelle, A. Molina-Sánchez, and L. Wirtz, Excitons in few-layer hexagonal boron nitride: Davydov splitting and surface localization, 2D Materials 5, 045017 (2018).
* Aggoune _et al._ [2018] W. Aggoune, C. Cocchi, D. Nabok, K. Rezouali, M. A. Belkhir, and C. Draxl, Dimensionality of excitons in stacked van der waals materials: The example of hexagonal boron nitride, Phys. Rev. B 97, 241114 (2018).
* Kolos and Karlický [2019] M. Kolos and F. Karlický, Accurate many-body calculation of electronic and optical band gap of bulk hexagonal boron nitride, Phys. Chem. Chem. Phys. 21, 3999 (2019).
* Galvani _et al._ [2016] T. Galvani, F. Paleari, H. P. C. Miranda, A. Molina-Sánchez, L. Wirtz, S. Latil, H. Amara, and F. m. c. Ducastelle, Excitons in boron nitride single layer, Phys. Rev. B 94, 125303 (2016).
* Cudazzo _et al._ [2016] P. Cudazzo, L. Sponza, C. Giorgetti, L. Reining, F. Sottile, and M. Gatti, Exciton band structure in two-dimensional materials, Phys. Rev. Lett. 116, 066803 (2016).
| arxiv-papers | 2021-07-27T13:10:11 | 2024-09-04T03:07:21.561662 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Michael Winter and Manon H. E. Bousquet and Denis Jacquemin and Ivan\n Duchemin and Xavier Blase",
"submitter": "Xavier Blase",
"url": "https://arxiv.org/abs/2107.12795"
} |
2107.12797 | # Wasserstein-Splitting Gaussian Process Regression
for Heterogeneous Online Bayesian Inference
Michael E. Kepler1, Alec Koppel2, Amrit Singh Bedi2, and Daniel J. Stilwell1
1M.E. Kepler and D.J. Stilwell are with the Bradley Department of Electrical
and Computer Engineering, Virginia Polytechnic Institute and State University,
Blacksburg, VA 24060, USA [email protected], [email protected]. Koppel and A.S.
Bedi are with the Computational and Information Sciences Directorate, U.S.
Army Research Laboratory, Adelphi, MD 20783, USA [email protected],
[email protected]*This work was supported by the National Defense Science
and Engineering Graduate (NDSEG) fellowship program and the Office of Naval
Research via grants N00014-18-1-2627 and N00014-19-1-2194
###### Abstract
Gaussian processes (GPs) are a well-known nonparametric Bayesian inference
technique, but they suffer from scalability problems for large sample sizes,
and their performance can degrade for non-stationary or spatially
heterogeneous data. In this work, we seek to overcome these issues through (i)
employing variational free energy approximations of GPs operating in tandem
with online expectation propagation steps; and (ii) introducing a local
splitting step which instantiates a new GP whenever the posterior distribution
changes significantly as quantified by the Wasserstein metric over posterior
distributions. Over time, then, this yields an ensemble of sparse GPs which
may be updated incrementally, and adapts to locality, heterogeneity, and non-
stationarity in training data. We provide a 1-dimensional example to
illustrate the motivation behind our approach, and compare the performance of
our approach to other Gaussian process methods across various data sets, which
often achieves competitive, if not superior predictive performance, relative
to other locality-based GP regression methods in which hyperparameters are
learned in an online manner.
## I Introduction
Gaussian Processes (GPs) are a nonparametric Bayesian inference technique that
has been widely used across science and engineering to provide nonlinear
interpolation and uncertainty estimates [1], as in terrain elevation [2],
temperature [3], the inverse mapping of sensor outputs to joint inputs for the
control of a robotic arm [4, 5], systems identification [6, 7] and in
uncertainty-aware mapping [8, 9]. In its most essential form, a posterior
distribution of an unknown nonlinear map $f:\mathcal{X}\rightarrow\mathbb{R}$
is computed using a basis of feature vectors
$\mathbf{x}_{k}\in\mathcal{X}\subset\mathbb{R}^{d}$, $1\leq k\leq N$, and
noisy observations $y_{k}=f(\mathbf{x}_{k})+\epsilon_{k}$ where $\epsilon_{k}$
is observation noise, typically Gaussian. The descriptive power of this
framework is hamstrung by two important attributes of the GP posterior: (i)
computing the conditional mean and covariance require computational effort
cubic $\mathcal{O}(N^{3})$ in the sample size $N$ due to the presence of a
kernel matrix inversion; and (ii) consistency guarantees require data to be
independent and identically distributed (i.i.d) [10]. In robotics, data is
typically arriving incrementally and exhibits locality or drift [11].
Augmenting GPs to address these issues is the goal of this work.
TABLE I: Comparison of characteristics of WGPR and related works. Method | Model representation | Model hyperparameters | Hyperparameters learned | Splitting criterion | Prediction
---|---|---|---|---|---
LGPR[4] | Exact | Globally fixed | Offline | Feature space distance | Weighted average
SOLAR GP[12] | Sparse | Locally adaptive | Online | Feature space distance | Weighted average
WGPR | Sparse | Locally adaptive | Online | Wasserstein distance | Nearest model
Challenge (i), the poor scaling with sample size $N$, originates from the fact
that the posterior mean and covariance depend on a data matrix, or kernel
dictionary, that accumulates all past observations. A long history of works
have studied this issue, and typically select a subset of $M\ll N$ possible
model points called inducing [13] or pseudo-inputs [14], and optimize GP
hyperparameters along this subspace. One may select points via information
gain [15], greedy compression [16], Nyström sampling [17], or other
probabilistic criteria [18, 19]. A related question is the objective for
inducing input optimization, which may be done according to the posterior
likelihood along the $M$-dimensional subspace [14], or a KL-divergence lower
bound thereof called the variational free energy (VFE) [13]. In addition to
pseudo-point methods, sparse spectrum Gaussian processes [20] can be used to
obtain a reduced spectral representation of the Gaussian process. These
methods are predominately offline, where the model is trained over the entire
training set with a fixed finite number of samples. However, as we discuss
next, VFE is more naturally extensible to incremental processing.
In particular, to augment these approaches to apply to settings with
incrementally arriving data, dynamic point selection schemes have been
proposed [21]; however, it is difficult to incorporate hyperparameter search,
especially for inducing inputs, into these schemes, which are essential to
obtaining competitive performance in practice. By contrast, fixed-memory VFE
approximations may gracefully incorporate online Expectation Propagation (EP)
steps [22], as pointed out in [23], and may be subsumed into the streaming
variational Bayes framework [24]. See [25, 26] for a review of recent advances
in Variational Bayes as it pertains to GPs. For this reason, to mitigate the
sample complexity bottleneck, we adopt a VFE approach with online EP steps
[23], whose approximate consistency (for i.i.d. settings) is recently
established [27].
Attempts to address issue (ii), i.e., to broaden use of GPs to non-stationary
or spatially heterogeneous data, have taken inspiration from vector-valued
time-series analysis as well as ensemble methods. Specifically, time-series
approaches seek to define covariance kernels that vary with time and/or space
[28, 29, 30, 31]. These approaches have also given rise to use of GPs in high-
dimensional problems through use of convolutional kernels [32]. However, doing
so typically requires offline training, and numerical conditioning issues make
it challenging to adapt them to the online setting, which is inherent to
continually learning autonomous robots. Efforts to address the non-
stationarity that arises in problems with dynamics have also been considered,
especially in the context of occupancy grids for mapping application [33, 8].
Our approach is, instead, inspired by ensemble methods, where one builds a
family of “weak learners” and forms the inference by appropriately weighting
the constituents [34, 35], as in boosting [36], and local regression, i.e.,
the Nadaraya-Watson estimator [37, 38, 39]. Two design decisions are crucial
to formulating an ensemble GP: (a) how to form the aggregate estimate, and (b)
when to instantiate a new model. The line of research related to ensemble GPs
began with local Gaussian Process regression (LGPR) [4], which (a) formulates
estimates by weighted majority voting akin to Nadaraya-Watson, and (b) assigns
samples to a local model based on a similarity measure defined in terms of the
covariance kernel to the arithmetic mean of a local model’s samples. If no
local models are sufficiently close, then a new local model is instantiated.
We note that this approach requires hyperparameters to be fixed _in advance_
of training. Most similar to this work is sparse online locally adaptive
regression using Gaussian processes (SOLAR GP) [12], where each local GP is
approximated using VFE and updated online using EP [23].
The aforementioned approaches to ensemble GPs have two key limitations [4, 40,
12]: (a) they form aggregate estimates by weighted voting, and (b) use
distance in feature space to quantify whether a new constituent model is
needed. Weighted voting, as inspired by local regression, hinges upon the
validity of an i.i.d. hypothesis [37, 38]. Moreover, using distance in feature
space may falsely ascribe novelty to far away samples that are similar in
distribution to a current local model. To address these issues, we propose
Wasserstein-splitting Gaussian Process Regression (WGPR), whose main merits
are as follows:
* •
the notion of similarity is specified as the Wasserstein distance, a rigorous
metric over distributions which is available in closed-form for Gaussian
Processes. This distance is used to quantify the change in the each model’s
predictive distribution caused by an update with the new training data, and
hence defines a decision rule for when to instantiate a new local model: a new
local model is instantiated only if the change in the posterior predictive
model exceeds a threshold in the Wasserstein distance for every model,
otherwise it is incorporated into the most similar, i.e. smallest Wasserstein
distance, model via expectation propagation (EP) steps;
* •
WGPR forms predictive distributions upon the basis of only the the nearest
local model in terms of Euclidean distance in the input space, rather than a
weighted vote, in order to more strictly encapsulate local heterogeneity in
the data, and hence only operates upon a _local_ i.i.d. hypotheses;
* •
experimentally WGPR identifies the number of data phase transitions on a
1-dimensional data set and achieves competitive performance with the state of
the art for a variety of real data sets.
We compare characteristics of WGPR, LGPR[4], and SOLAR GP[12] in Table I. Note
that LGPR requires the hyperparameters of all models to be fixed to the same
set of global hyperparameters, which are learned a priori offline. WGPR, on
the other hand, does not require the hyperparameters to be globally fixed a
priori, but allows for the hyperparameters of a model to be updated
recursively as more data is collected. In contrast to both LGPR and SOLAR GP,
WGPR decides whether to update an existing model or instantiate a new one
based on the effect the new data has on the posterior distribution of each
model, quantified in terms of the Wasserstein distance, and prediction is
based on the model nearest to the query point in an effort to preserve local
features, which can be filtered out when using a weighted prediction of
models.
## II Background and Notation
In WGPR, we employ a sparse approximation of the posterior predictive
distribution for each model. In this section, we introduce notation and
provide the background material on sparse Gaussian processes required to
implement WGPR.
### II-A Gaussian Process Regression
A Gaussian process is a collection of random variables, any finite number of
which have a joint Gaussian distribution [41]. We use a Gaussian process to
model the spatial field of interest $f:\mathcal{X}\rightarrow\mathbb{R}$,
which we write as $f(\cdot)\sim GP\left(m(\cdot),k(\cdot,\cdot)\right)$, where
$m:\mathcal{X}\rightarrow\mathbb{R}$ and
$k:\mathcal{X}\times\mathcal{X}\rightarrow\mathbb{R}$ denote the mean and
covariance functions, respectively. Practical application involves evaluating
a Gaussian process at a finite set of inputs
$\mathbf{X}=\\{\mathbf{x}_{1},\cdots,\mathbf{x}_{N}\\}\subset\mathcal{X}$, and
with a slight abuse of notation we write
$f(\mathbf{X})\sim\mathcal{N}\left(m(\mathbf{X}),k(\mathbf{X},\mathbf{X})\right)$
where the mean vector $m(\mathbf{X})\in\mathbb{R}^{N}$ and covariance matrix
$k(\mathbf{X},\mathbf{X})\in\mathbb{R}^{N\times N}$ are defined element-wise
via $[m(\mathbf{X})]_{i}=m(\mathbf{x}_{i})$ and
$[k(\mathbf{X},\mathbf{X})]_{i,j}=k(\mathbf{x}_{i},\mathbf{x}_{j})$. More
generally, for
$\mathbf{Z}=\\{\mathbf{z}_{1},\cdots,\mathbf{z}_{M}\\}\subset\mathcal{X}$, the
matrix $k(\mathbf{X},\mathbf{Z})\in\mathbb{R}^{N\times M}$ is defined by
$[k(\mathbf{X},\mathbf{Z})]_{i,j}=k(\mathbf{x}_{i},\mathbf{z}_{j})$ for all
$i=1:N$, and all $j=1:M$.
Gaussian process regression follows a Bayesian approach which begins with
specifying a prior distribution $f(\cdot)\sim
GP_{0}\left(m_{0}(\cdot),k_{0}(\cdot,\cdot)\right)$. As is customarily done
for the sake notational simplicity [41, Ch. 2.2], we select the zero-mean
function as the prior mean function $m_{0}(\cdot)$. The covariance kernel
$k_{0}(\cdot,\cdot)$ is user-specified and encodes prior assumptions, such as
smoothness, about the underlying function $f$. Throughout this paper, we
employ the commonly-used squared exponential covariance kernel given by
$\displaystyle
k_{0}(\mathbf{x},\mathbf{x}^{\prime})=\sigma_{f}^{2}\exp\\{-({1}/{2})(\mathbf{x}-\mathbf{x}^{\prime})^{\mathsf{T}}\Lambda^{-1}(\mathbf{x}-\mathbf{x}^{\prime})\\},$
(1)
where $\sigma_{f}^{2}$ denotes the signal variance, and
$\Lambda=\textrm{diag}(\lambda_{1}^{2},...,\lambda_{d}^{2})$ contains the
length-scale parameter $\lambda_{i}$ of each input dimension $i=1,...,d$. The
entire conceptual development proceeds analogous for other covariance kernels.
The assumption that each measurement is corrupted by independent identically
distributed Gaussian noise $\epsilon\sim N(0,\sigma_{n}^{2})$ gives rise to a
Gaussian likelihood, and given a collection of training data
$\\{(\mathbf{x}_{i},y_{i})\\}_{i=1}^{N}$ the posterior process is
$\displaystyle f(\mathbf{x})\sim
GP(m_{post}(\mathbf{x}),k_{post}(\mathbf{x},\mathbf{x}^{\prime})),$ (2)
where
$\displaystyle m_{post}(\mathbf{x})$
$\displaystyle=k_{0}(\mathbf{x},\mathbf{X})(k_{0}(\mathbf{X},\mathbf{X})+\sigma_{n}^{2}\mathbf{I})^{-1}\mathbf{y},$
$\displaystyle k_{post}(\mathbf{x},\mathbf{x}^{\prime})$
$\displaystyle=k_{0}(\mathbf{x},\mathbf{x}^{\prime})+k_{0}(\mathbf{x},\mathbf{X})(k_{0}(\mathbf{X},\mathbf{X})+\sigma_{n}^{2}\mathbf{I})^{-1}k_{0}(\mathbf{X},\mathbf{x}^{\prime}),$
for all $\mathbf{x},\mathbf{x}^{\prime}\in\mathcal{X}$. Performing inference
with the exact form of the posterior (2), is only feasible for small to
moderate data sets, e.g. sample size $N<10,000$, as the necessary matrix
inversion in the preceding expression for the posterior mean and covariance
functions incurs a computational cost that scales $\mathcal{O}(N^{3})$. To
mitigate the complexity bottleneck in the sample size, we employ a sparse
approximation of the posterior distribution for each Gaussian process
parameterization henceforth considered. Next we define the specific sparse
approximation scheme we consider.
### II-B Variational Free Energy Approximation
We reduce computational and memory costs using the posterior approximation
developed by Titsias [13]. The key idea underpinning the approximation is to
express the posterior in terms of $M\ll N$ pseudo (inducing) points, which
serve to summarize the exact posterior associated with $N$ training points.
With $M$ fixed (by the user), the pseudo points
$\mathbf{Z}=\\{\mathbf{z}_{1},...,\mathbf{z}_{M}\\}\subset\mathcal{X}$,
specified as variational parameters, are selected so as to maximize a lower
bound on the true log marginal likelihood. This bound is referred to as the
variational free energy and is given by
$\displaystyle
F_{VFE}=\log[\mathcal{N}(\mathbf{y};\mathbf{0},\sigma_{n}^{2}\mathbf{I}+\mathbf{Q}_{NN})]-\frac{1}{2\sigma_{n}^{2}}\mathrm{tr}(k_{0}(\mathbf{X},\mathbf{X})-\mathbf{Q}_{NN}),$
(3)
where
$\mathbf{Q}_{NN}=k_{0}(\mathbf{X},\mathbf{Z})k_{0}(\mathbf{Z},\mathbf{Z})^{-1}k_{0}(\mathbf{Z},\mathbf{X})$.
Equivalently, by maximizing the variational free energy, the Kullback-Leibler
divergence between the variational distribution and exact posterior
distribution over $f(\mathbf{Z})$ is minimized. Given the pseudo inputs
$\mathbf{Z}$, the optimal variational distribution over
$f(\mathbf{Z})\triangleq\mathbf{f}_{Z}$ has an analytic form
$\mathbf{f}_{Z}\sim N(\mu_{Z},\mathbf{S}_{Z})$ with
$\displaystyle\mu_{Z}$
$\displaystyle=\sigma_{n}^{-2}k_{0}(\mathbf{Z},\mathbf{Z})\Sigma
k_{0}(\mathbf{Z},\mathbf{X})\mathbf{y},$ $\displaystyle\mathbf{S}_{Z}$
$\displaystyle=k_{0}(\mathbf{Z},\mathbf{Z})\underbrace{(k_{0}(\mathbf{Z},\mathbf{z})+\sigma_{n}^{-2}k_{0}(\mathbf{Z},\mathbf{X})k_{0}(\mathbf{X},\mathbf{Z}))^{-1}}_{\triangleq\Sigma}k_{0}(\mathbf{Z},\mathbf{Z}).$
Given the optimal pseudo-inputs $\mathbf{Z}\subset\mathcal{X}$, the
approximate posterior is given by $f(\cdot)\sim
GP(m_{VFE}(\cdot),k_{VFE}(\cdot,\cdot))$, where
$\displaystyle m_{VFE}(\mathbf{x})=$ $\displaystyle
k_{0}(\mathbf{x},\mathbf{Z})k_{0}(\mathbf{Z},\mathbf{Z})^{-1}\mu_{Z},$ (4)
$\displaystyle k_{VFE}(\mathbf{x},\mathbf{x}^{\prime})=$ $\displaystyle
k_{0}(\mathbf{x},\mathbf{x}^{\prime})-k_{0}(\mathbf{x},\mathbf{Z})k_{0}(\mathbf{Z},\mathbf{Z})^{-1}k_{0}(\mathbf{Z},\mathbf{x}^{\prime})$
$\displaystyle+k_{0}(\mathbf{x},\mathbf{Z})k_{0}(\mathbf{Z},\mathbf{Z})^{-1}\mathbf{S}_{Z}k_{0}(\mathbf{Z},\mathbf{Z})^{-1}k_{0}(\mathbf{Z},\mathbf{x}^{\prime}).$
In practice, we first obtain the pseudo-inputs $\mathbf{Z}\subset\mathcal{X}$
and hyperparameters $\theta=\\{\sigma_{f},\Lambda,\sigma_{n}\\}$ via gradient-
based minimization of the negative variational free energy (3). With the
(locally optimal)111Observe that in general, since the VFE is non-convex with
respect to its hyperparameters $\theta$ and pseudo-inputs $\mathbf{Z}$, the
best pointwise limit one may hope to achieve via gradient-based search is a
local minimizer. hyperparameters and pseudo-inputs in hand, we then form the
posterior predictive distribution (4).
As new training data is collected, we use the principled _expectation
propagation_ framework of Bui et al.[23] to recursively update the existing
sparse approximation, along with the hyperparameters and pseudo points. For
the recursive update, it is assumed that previous measurements are
inaccessible so knowledge about previously collected measurements is inferred
through existing pseudo points. More precisely, let $GP_{old}$ denote the
current sparse posterior approximation with associated pseudo inputs
$\mathbf{Z}_{a}\subset\mathcal{X}$ and hyperparameters $\theta_{old}$. The
updated posterior approximation follows from an optimization problem, where
given the new data
$\mathcal{D}_{new}=\\{(\mathbf{x}_{i},y_{i})\\}_{i=1}^{N_{new}}$ and
$\mathbf{Z}_{a}\subset\mathcal{X}$ we maximize the online log marginal
likelihood $F_{OVFE}$. The optimization gives rise to the updated posterior
predictive distribution
$\displaystyle GP_{upd}(m_{upd}(\cdot),k_{upd}(\cdot,\cdot)),$ (5)
which depends on the new pseudo inputs $\mathbf{Z}_{b}$ and hyperparameters
$\theta_{new}$ that jointly optimize $F_{OVFE}$. We omit the exact expressions
for $F_{OVFE}$ and the posterior mean and covariance as they are prohibitively
long, but they can be readily accessed from the supplementary appendix of
[23]. In summary, the recursive update is performed by first obtaining the
pseudo-inputs $\mathbf{Z}_{b}$ and hyperparameters $\theta_{new}$ that
optimize $F_{OVFE}$, and then using them to form the posterior (5).
## III Wasserstein-Splitting Gaussian Processes
In this section, we present Wasserstein-Splitting Gaussian Process Regression
(WGPR). The high-level structure of WGPR mirrors that of LGPR [4] and SOLAR GP
[12], however our method deviates from the existing methods in two notable
ways: (i) we instantiate new models on the basis of the their posterior
predictive distribution, rather than their locality in the input space, and
(ii) we propose an alternative approach for making predictions.
### III-A Training
Initialization: Training the overall prediction model begins with an empty
collection of models, and given the initial batch of training data
$\mathcal{D}_{new}=\\{(\mathbf{x}_{i},y_{i})\\}_{i=1}^{N_{new}}$ of $N_{new}$
samples, we instantiate the first local model using the VFE approximation as
detailed in Section II-B yielding $GP_{1}$.
Updating the Current Ensemble: Now, suppose we have a collection
$\\{GP_{j}\\}_{j=1}^{J}$ of $J$ Gaussian Process models. Upon obtaining a new
batch of training data $\mathcal{D}_{new}$, the key question is how to decide
which model is most similar, and thus is a suitable candidate for executing an
update. Previous approaches[39, 4, 12] define similarity in terms of the
covariance kernel [cf. (1)]. With this definition of similarity, two distant
regions of the spatial field, characterized by the same set of underlying
hyperparameters, gives rise to two different models. There are indeed apparent
structural similarities to local kernel regression estimates of conditional
expectations such as the Nadaraya-Watson estimator [37, 38] or ensemble
techniques [36] inspired by majority voting [34, 35]. However, the former
approach hinges upon i.i.d. training examples from a stationary distribution,
and the latter collapses distributional inference to point estimates in
feature space, which belies the fact that we are in the Bayesian setting.
We, instead, base similarity on the intuition that if $\mathcal{D}_{new}$ is
similar to an existing model, then the new data should minimally change the
posterior predictive distribution according to some metric over probability
distributions. In other words, predictions of the updated individual model (i)
remain (approximately) unchanged across previously seen data, and (ii) agree
with the predictions of a newly instantiated model across the new
measurements. To formalize this intuition and assess how the new data would
affect each posterior distribution in the collection
$\\{GP_{j}(m_{j}(\cdot),k_{j}(\cdot,\cdot))\\}_{j=1}^{J}$, we update each
model using the recursive VFE framework [23] using the new mini-batch
$\mathcal{D}_{new}$, as outlined in Section II, which yields the updated
collection $\\{GP_{j}^{upd}\\}_{j=1}^{J}$ where
$\displaystyle
GP_{j}^{upd}\left(m_{j}^{upd}(\cdot),k_{j}^{upd}(\cdot,\cdot)\right)\;,\quad
j=1,...,J.$
Let $\mathbf{Z}_{j}\subset\cal X$ denote the pseudo-inputs of model $j$, prior
to performing the update with $\mathcal{D}_{new}$. We then measure the change
in predictions over previous data by computing the squared Wasserstein
distance [42] between the original and updated posterior evaluated at
$\mathbf{Z}_{j}$, i.e.
$\displaystyle w_{j}^{old}=$
$\displaystyle\|\mathbf{m}_{j}\\!-\\!\mathbf{m}_{j,Z}^{upd}\|^{2}\\!+\\!\textrm{tr}\left(\mathbf{S}_{j}\\!+\\!\mathbf{S}_{j,Z}^{upd}-2\left(\mathbf{S}_{j}^{1/2}\mathbf{S}_{j,Z}^{upd}\mathbf{S}_{j}^{1/2}\right)^{1/2}\right),$
where $\|\cdot\|$ denotes the Euclidean norm, and
$\displaystyle\mathbf{m}_{j}$ $\displaystyle\triangleq m_{j}(\mathbf{Z}_{j}),$
$\displaystyle\mathbf{S}_{j}$ $\displaystyle\triangleq
k_{j}(\mathbf{Z}_{j},\mathbf{Z}_{j})$ $\displaystyle\mathbf{m}_{j,Z}^{upd}$
$\displaystyle\triangleq m_{j}^{upd}(\mathbf{Z}_{j}),$
$\displaystyle\mathbf{S}_{j,Z}^{upd}$ $\displaystyle\triangleq
k_{j}^{upd}(\mathbf{Z}_{j},\mathbf{Z}_{j}).$
Note that the Wasserstein distance is a valid metric over probability
measures, and its salient feature is that it is computable in closed-form for
Gaussians, as well as it avoids some of the computational issues of comparable
choices such as the Total Variation or Hellinger metrics – see [43].
Now, with $\\{GP_{j}^{upd}\\}_{j=1}^{J}$ in hand, we quantify how well each
updated model agrees with the new data. To do so, we take $\mathcal{D}_{new}$
and instantiate a new approximate GP via the batch variational free energy
sparse approximation (3) - (4):
$\displaystyle GP_{J+1}\left(m_{J+1}(\cdot),k_{J+1}(\cdot,\cdot)\right)$
that is free from bias of any previous data. Ideally, if model $j$ is similar
to the new data, then the distributions $GP_{j}^{upd}$ and $GP_{J+1}$ should
agree well over the new data. Let $\mathbf{X}_{new}\subset\cal X$ denote the
locations of the new measurements. We measure the agreement by computing the
squared Wasserstein distance between the newly instantiated and updated
posterior evaluated at $\mathbf{X}_{new}$, given by
$\displaystyle
w_{j}^{new}\\!\\!\\!=\\!\\!\|\mathbf{m}_{J\\!+\\!1}\\!-\\!\mathbf{m}_{j,X}^{upd}\|^{2}\\!\\!+\\!\textrm{tr}\left(\\!\\!\mathbf{S}_{J\\!+\\!1}\\!\\!+\\!\mathbf{S}_{j,X}^{upd}\\!-\\!2\left(\mathbf{S}_{J+1}^{1/2}\mathbf{S}_{j,X}^{upd}\mathbf{S}_{J\\!+\\!1}^{1/2}\right)^{\\!\\!1/2}\right),$
where
$\displaystyle\mathbf{m}_{J+1}$ $\displaystyle\triangleq
m_{J+1}(\mathbf{X}_{new}),$ $\displaystyle\mathbf{S}_{J+1}$
$\displaystyle\triangleq k_{J+1}(\mathbf{X}_{new},\mathbf{X}_{new})$
$\displaystyle\mathbf{m}_{j,X}^{upd}$ $\displaystyle\triangleq
m_{j}^{upd}(\mathbf{X}_{new}),$ $\displaystyle\mathbf{S}_{j,X}^{upd}$
$\displaystyle\triangleq k_{j}^{upd}(\mathbf{X}_{new},\mathbf{X}_{new}).$
Thus, the net measure of similarity $w_{j}$ is the aggregation of the squared-
Wasserstein distance between the previous model $GP_{j}$ and its updated
variant $GP_{j}^{upd}$ evaluated at the old pseudo-inputs $\mathbf{Z}_{j}$,
which serve as a proxy for previously seen data, and the squared distance
between $GP_{j}^{upd}$ and the new model $GP_{J+1}$ evaluated at the new
measurement locations $\mathbf{X}_{new}$:
$\displaystyle w_{j}=w_{j}^{new}+w_{j}^{old},$ $\displaystyle j=1,\dots,J.$
(6)
Input : Instantiation threshold $\epsilon$
Output : Collection of models $\\{GP\\}_{j=1}^{J_{k+1}}$
$\mathcal{D}_{new}^{1}\leftarrow$ Receive $1^{st}$ batch of data;
$GP_{1}\leftarrow$ Init. new $GP$ with $\mathcal{D}_{new}^{1}$ (Eq. (4));
for _k = 2,3,…_ do
$\mathcal{D}_{new}^{k}\leftarrow$ Receive new batch of data;
$GP_{J_{k}+1}\leftarrow$ Init. new $GP$ with $\mathcal{D}_{new}^{k}$ (Eq.
(4));
for _$j=1:J_{k}$_ do
$GP_{j}^{upd}\leftarrow$ Update $GP_{j}$ with $\mathcal{D}_{new}^{k}$ (Eq.
(5));
$w_{j}^{old}\leftarrow$ Similarity wrt previous predictions;
$w_{j}^{new}\leftarrow$ Similarity wrt new data;
$w_{j}=w_{j}^{old}+w_{j}^{new}$ ;
end for
$w_{j^{*}}=\min{w_{j}}$ ;
if _$w_{j^{*}}\leq\epsilon$_ then
$\\{GP_{j}\\}_{j=1}^{J_{k+1}}\leftarrow\\{GP_{j}\\}_{j=1}^{J_{k}}\setminus\\{GP_{j*}\\}\cup\\{GP_{j*}^{upd}\\}$;
else
$\\{GP_{j}\\}_{j=1}^{J_{k+1}}\leftarrow\\{GP_{j}\\}_{j=1}^{J_{k}}\cup\\{GP_{J_{k}+1}\\}$.
end if
end for
Algorithm 1 Wasserstein-Splitting GP Regression (WGPR): train online
approximate GP ensemble.
Once we compute $w_{j}$ for all $j$, we define the most similar model
$GP_{j^{*}}$ as the one that minimizes (6) , i.e.,
$j^{*}=\operatorname*{arg\,min}_{j=1,\dots,J}{w_{j}}$ and provided it is
sufficiently similar, meaning $w_{j^{*}}$ is less than a user-defined
threshold $\epsilon$, we retain the updated model $GP_{j*}^{upd}$. All other
models revert back to their previous state, prior to the update, and the newly
instantiated model $GP_{J+1}$ is discarded. However, if $GP_{*}$ is not
sufficiently similar, then we retain $GP_{J+1}$ and revert all local models
back to their state prior to the update.
To be more precise, denote $J_{k}$ as the number of ensemble models at time
$k$. Upon observing mini-batch $\mathcal{D}_{new}^{k}$, we update model
$GP_{j^{*}}$ if (6) is less than a threshold $\epsilon$, otherwise we add
$GP_{J_{K}+1}$ to the collection; succinctly stated as
$\displaystyle\\{GP_{j}\\}_{j=1}^{J_{k+1}}$
$\displaystyle\leftarrow\left\\{\\{GP_{j}\\}_{j=1}^{J_{k}}\setminus\\{GP_{j*}\\}\right\\}\cup\\{GP_{j*}^{upd}\\}$
$\displaystyle\text{ if }w_{j^{*}}\leq\epsilon$
$\displaystyle\\{GP_{j}\\}_{j=1}^{J_{k+1}}$
$\displaystyle\leftarrow\\{GP_{j}\\}_{j=1}^{J_{k}}\cup\\{GP_{J_{k}+1}\\}$
$\displaystyle\text{ if }w_{j^{*}}>\epsilon$ (7)
We summarize the process of iteratively developing the collection of models
$\\{GP_{j}\\}_{j=1}^{J_{k}}$ in Algorithm 1.
### III-B Model Evaluation and Prediction
The previous approaches [39, 4, 12] propose combining predictions from various
models to form a single weighted prediction, as mentioned in the preceding
section, mostly inspired by ensemble [36] and local kernel smoothing
techniques [37, 38]. However, the validity of doing so hinges upon an i.i.d.
stationarity hypothesis for the unknown data distribution. This makes these
approaches well-suited to capture global patterns (long-term spatial
correlations) in data at the expense of filtering out local patterns [25]. In
an effort to preserve the non-stationary features of a heterogeneous spatial
field, we predict the spatial field at a location of interest $\mathbf{x}_{s}$
by considering the model with the pseudo-input closest to $\mathbf{x}_{s}$
evaluated as
$GP_{*}=\operatorname*{arg\,min}_{j=1:J}{\left\\{\min_{\mathbf{z}_{i}\in\mathbf{Z}_{j}}{\|\mathbf{z}_{i}-\mathbf{x}_{s}\|^{2}}\right\\}}$,
and using $GP_{*}(m_{*}(\cdot),k_{*}(\cdot,\cdot))$ to predict
$f(\mathbf{x}_{s})\sim\mathcal{N}(\mu_{s},\sigma_{s}^{2})$ where
$\mu_{s}=m_{*}(\mathbf{x}_{s})$ and
$\sigma^{2}_{s}=k_{*}(\mathbf{x}_{s},\mathbf{x}_{s})$, with the posterior
given by the VFE approximation (4) for models that have not undergone a
recursive update. Models that have been recursively updated have the posterior
mean and covariance functions given by (5). This better encompasses non-
stationarity and heterogeneous nonlinearities, although it may be susceptible
to sub-sampling bias or discontinuities as a respective function of the the
number of pseudo-inputs in a local model or the kernel hyperparameters.
Figure 1: Toy example motivating our definition of similarity. The training
data in (a) is generated from two distinct Gaussian processes with known
hyperparameters. By defining similarity in terms of the posterior predictive
model, WGPR identifies the two models as seen in (b). Other methods that
define similarity based on proximity in input space fail to capture to the two
underlying models succinctly as indicated by the 16 models in (c).
## IV Empirical Assessment
In this section, we explore the performance of WGPR across various numerical
experiments. We start with a 1-dimensional toy example that motivates defining
model similarity in terms of the Wasserstein metric over posterior
distributions rather than simply distance in feature space (or a positive
definite map thereof). Next, the performance of WGPR is compared to SOLAR-GP
[12], which has the same algorithmic structure and Gaussian process model
representation, but defines similarity in terms of Euclidean distance. The
purpose of this comparison is to highlight the difference in performance due
to the new similarity metric and using the prediction of the nearest model.
Lastly, we compare the performance of several methods, that learn
hyperparameters online, with LGPR, which is optimal in the sense that
hyperparameters are learned offline on a training set characteristic of the
entire domain. In all comparisons, we evaluate the methods on a real-world
bathymetry dataset collected at Claytor Lake in Southwest Virginia, as well as
four other publicly accessible datasets222Kin40k:
https://www.cs.toronto.edu/$\sim$delve/data/kin/desc.html
Abalone: https://archive.ics.uci.edu/ml/datasets/abalone
Sarcos Joint 1: http://www.gaussianprocess.org/gpml/data/
Pumadyn(8nm): https://www.cs.toronto.edu/$\sim$delve/data/pumadyn/desc.html.
Our MATLAB-based implementation uses the gradient optimizer and covariance
kernel functionality provided by the GPML toolbox[44].
### IV-A Toy-example
To illustrate the motivation behind our definition of similarity, consider the
non-stationary dataset depicted in Figure 1(a). This dataset was constructed
from two different Gaussian process models with known hyperparameters.
Ideally, this data set could be concisely described with two models. The
dataset is processed in mini-batches of size $N_{new}=100$ in spatial order
from $\mathbf{x}=0$ to $\mathbf{x}=300$ and each local model employs $M=50$
pseudo points. Provided the instantiation threshold $\epsilon$ is set
appropriately, WGPR is able to identify the two underlying models as seen in
1(b). Regardless of how the instantiation threshold is set, SOLAR GP is
incapable of succinctly identifying the two underlying models in 1(a) because
a new model is instantiated provided new data is sufficiently far from all
other existing models. This phenomenon is demonstrated by the 16 models in
1(c). WGPR, with 2 models, achieves a root mean squared error (RMSE) of 0.26.
SOLAR GP, with 16 models, achieves an RMSE of 0.39.
### IV-B Comparison of Online Local GPs on Real Data
To examine how our new definition of similarity and making predictions based
on the nearest model impact performance, we conducted experiments to examine
the difference in performance between WGPR and SOLAR GP [12]. In theory, the
model instantiation threshold can be set to achieve anywhere from a single
model to the maximum allowable number of models (as dictated by the number of
batches of training data). So ideally, the comparison should highlight the
performance difference between the two methods as a function of the number of
models used. Thus, the instantiation thresholds are set separately for WGPR
and SOLAR to yield approximately the same number of models. Training data was
processed in batches of size $N_{new}=100$ and we employed $M=50$ pseudo
points for each individual Gaussian process model.
Additionally, we note that for WGPR, computing the similarity metric $w_{j}$
for each $j=1:J$ can be computationally prohibitive. In practice, we can
reduce computational complexity by computing the similarity metric over the
$\hat{J}\leq J$ models closest in terms of Euclidean distance in input space
given by $\|\mathbf{c}_{j}-\mathbf{c}_{new}\|^{2}$ for $j=1,\dots,J$, where
$\mathbf{c}_{j}\in\mathcal{X}$ is the arithmetic center of the pseudo-inputs
of model $j$ and $\mathbf{c}_{new}\in\mathcal{X}$ is the arithmetic center of
the new batch of data. For the experiments in this subsection and the
following, we fix $\hat{J}=5$. Although the $\hat{J}$ nearest models are
selected on the basis of proximity, similar to [4, 12], the decision to
instantiate a new model or update an existing one is ultimately dictated by
the similarity measure $\eqref{eq: sim metric}$. This distinction is
particularly important for cases in which two regions, that are close in
proximity, are characterized by different spatial fields. Provided the regions
are sufficiently close, a distance-based similarity metric will incorporate
these two different spatial fields into one. In contrast, we can use the
similarity measure (6), based on predictive distributions, to identify that
these two regions are best-characterized by two models and thereby employ two
models to avoid the pathology.
For the comparison of SOLAR GP and WGPR, we began by setting the instantiation
thresholds to yield the maximum number of allowable models and progressively
adjusted the thresholds to yield fewer models. For SOLAR GP, despite
meticulous tuning of the number of pseudo points and mini-batch size, we
regularly observed divergence in the Claytor lake, Abalone, and Sarcos data
sets. By divergence, we mean that the posterior mean evaluated at the pseudo-
inputs, i.e $m(\mathbf{Z}_{b})$, tended to infinity for some local models.
This is due to the online update of the VFE posterior approximation [23],
which only guarantees we recover the batch posterior and marginal likelihood
approximation [13] when the hyperparameters and pseudo-inputs are fixed in
advance. When operating with online updates, however, it is possible that
pseudo-inputs become very concentrated in a small region of the feature space,
causing kernel matrices to become near-singular.
Figure 2: Comparison of the performance difference between our method (WGPR)
and SOLAR GP [12] on the kin40k dataset. Regardless of the number of models
used, WGPR outperforms the other online methods at the expense of additional
computations required to compute new similarity metric.
With our definition of similarity (6), on the other hand, we can identify when
a stable update can be performed, as the effect of the posterior update is
reflected in our similarity metric. In other words, if an EP update with the
new data $D_{new}$ causes numerical instability for model $j$, then clearly
model $j$ is not a suitable candidate to be updated. For our numerical
experiments with WGPR, we observed this had the effect of preserving
convergence, and overall requiring significantly fewer models on a consistent
basis than SOLAR GP. For example, given the batch size of $N_{new}=100$, the
maximum number of models that can be instantiated with the Claytor Lake
dataset is 127. We were consistently able to achieve as few as 14.6 models,
which is the average across 5 trials, with standardized MSE of 0.097, whereas
SOLAR GP only achieves sensible predictive performance when there are more
than 108.8 models, on average, with standarized MSE of 0.183. Thus, for the
Claytor Lake, Sarcos, and Abalone data sets, we can only non-trivially compare
predictive performance between SOLAR GP and WGPR in the setting where a new
model is instantiated with each new batch of data. We observed that WGPR
outperformed SOLAR on the Claytor Lake and Sarcos data sets, and both methods
achieved approximately the same predictiableve performance on the Abalone data
set.
For the Kin40k dataset, however, we were able to achieve stable performance
for SOLAR GP across various numbers of models employed. We illustrate the
overall performance difference between WGPR and SOLAR GP in Figure 2. We
report the root MSE, along with the training frequency achieved by both
methods. Training frequency refers to how many samples are processed per
second. Observe that for a given number of models, WGPR outperforms SOLAR GP
in terms of predictive performance. This is at the expense of additional
computational complexity, as reflected by the lower training frequency.
Additionally, we note that the predictive performance of approximately 10
models with WGPR is superior to SOLAR GP’s best-case predictive performance
which occurs with approximately 100 models. For applications in which the size
of the map representation is critical, as in communication-limited
applications, this is a significant advantage for WGPR.
We conclude by stating that we were also able to achieve stable performance
for SOLAR GP on the Pumadyn dataset and observed that SOLAR GP (RMSE = 1.088)
outperformed WGPR (RMSE = 1.142). However, performance was approximately
constant across the number of models used, and thus we omit the performance
plots for the sake of space limitations.
Figure 3: Evolution of the RMSE as more training batches are processed for
Claytor Lake (a) and the Sarcos (b) datasets for SOLAR GP [12], WGPR, and the
offline benchmark LGPR [4]. Observe that as more training examples are
processed, we approach the performance of the offline method.
### IV-C Offline Benchmark
In various practical applications, there is no a priori access to a dataset,
characteristic of the entire state space, to learn the hyperparameters of the
predictive model. To cope with these situations, we require that our method
have the ability to iteratively update the hyperparameters of the predictive
model as new training data is received. As local Gaussian process regression
(LGPR) [4] learns the hyperparameters on a characteristic subset of all
training data prior to building the prediction model, we consider this an
appropriate offline benchmark to assess the predictive performance of WGPR and
SOLAR GP. Given that there are parameters unique to each method and LGPR
employs the exact posterior (2) for each model, we manually tune the
parameters to achieve the best possible predictive performance (averaged
across 5 trials) for all algorithms and compare them.
We depict the results for Claytor Lake and the Sarcos dataset in Figure 3 (a)
and (b), respectively. Here, we see that as more training data is collected,
the predictive performance of WGPR tends to LGPR and in both cases WGPR
outperforms SOLAR GP. Moreover, for the Claytor Lake dataset, WGPR outperforms
LGPR. This is consistent with the intuition that given the dataset is known to
be nonstationary, we expect WGPR to outperform LGPR, as LGPR requires all
models to have the same set of hyperparameters whereas WGPR does not. For all
datasets, we collect the training time (seconds) and RMSE after processing the
entire dataset in Tables II and III, respectively. We delineate LGPR from all
other methods that iteratively learn hyperparameters using a dashed lined. We
also included the online VFE method of Bui et al. [23], which we denote by
OVFE. Note that entries in the table containing a “-” indicate the algorithm
failed to converge. By and large, we see that at the expense of additional
computational time WGPR either outperforms or attains comparable performance
with all other methods that iteratively learn the hyperparameters, and we
achieve comparable performance with the offline benchmark. Note that LGPR
exhibits the least computational time as all hyperparameter learning is only
done once, prior to allocating samples to their respective models. The methods
that learn hyperparameters online require more computation time, and as WGPR
computes the Wasserstein metric over various candidate posterior distributions
it incurs the greatest computational time.
TABLE II: Training time (s) of online methods and the offline benchmark LGPR
| Claytor Lake | Sarcos | kin40k | Abalone | Pumadyn
---|---|---|---|---|---
LGPR [4] | 39.484 | 347.857 | 31.221 | 13.221 | 38.138
WGPR | 210.053 | 870.358 | 202.184 | 62.912 | 120.836
SOLAR [12] | 131.417 | 477.143 | 119.403 | 40.126 | 76.353
OVFE [23] | - | - | 115.902 | - | 45.267
TABLE III: RMSE of online methods and the offline benchmark LGPR
| Claytor Lake | Sarcos | kin40k | Abalone | Pumadyn
---|---|---|---|---|---
LGPR [4] | 1.381 | 3.195 | 0.231 | 2.07 | 1.079
WGPR | 1.362 | 4.476 | 0.797 | 2.487 | 1.137
SOLAR [12] | 3.524 | 12.686 | 0.910 | 2.887 | 1.085
OVFE [23] | - | - | 0.996 | - | 2.482
## V Conclusion
Our empirical results demonstrate that WGPR achieves comparable, if not
superior, predictive performance to other methods that iteratively learn
hyperparameters. Our new measure of similarity not only allows us to
succinctly characterize a non-stationary spatial field, but more importantly
offers the ability to prevent the pathology that can arise when using
proximity-based similarity metrics: measurements from two regions of the
spatial field, best characterized by different hyperparameters, are merged to
form a single model because the regions were sufficiently close in proximity.
For WGPR, there are two user-specified parameters: the instantiation threshold
$\epsilon$, and the number of inducing inputs $M$ in each Gaussian process
model. In practice, $\epsilon$ can be made “large” to yield a map
representation with fewer models if memory or transmitting data is a concern,
as it is in communication-limited environments like the sub-sea domain [45].
However, this is at the potential cost of a loss in accuracy, as two models
that may be best characterized by two distinct models may effectively be
averaged into a single model. In contrast, if the size of the map
representation is not a concern, $\epsilon$ can be made “small” in an effort
to give rise to more models that may be more accurate. However it remains an
open question of how to precisely define “large” and “small” as the similarity
metric (6) is not generalizable across data sets.
An interesting avenue of further research is to conduct isolation studies to
understand the individual implications of each element: (i) Wasserstein-
splitting, (ii) prediction of the nearest model, and (iii) the expectation
propagation steps. Additionally, studies to better understand how computing
the similarity metric over the $\hat{J}\leq J$ nearest models impacts
performance are of interest. Lastly, we seek principled methods to determine
the number of pseudo-points in each local model to ensure a certain quality of
approximation.
## References
* [1] C. E. Rasmussen, “Gaussian processes in machine learning,” in _Advanced lectures on machine learning_. Springer, 2004, pp. 63–71.
* [2] S. Vasudevan, F. Ramos, E. Nettleton, and H. Durrant-Whyte, “Gaussian process modeling of large-scale terrain,” _Journal of Field Robotics_ , vol. 26, no. 10, pp. 812–840, 2009.
* [3] A. Krause, A. Singh, and C. Guestrin, “Near-optimal sensor placements in gaussian processes: Theory, efficient algorithms and empirical studies,” _Journal of Machine Learning Research_ , vol. 9, no. Feb, pp. 235–284, 2008\.
* [4] D. Nguyen-Tuong, M. Seeger, and J. Peters, “Model learning with local gaussian process regression,” _Advanced Robotics_ , vol. 23, no. 15, pp. 2015–2034, 2009.
* [5] M. P. Deisenroth, D. Fox, and C. E. Rasmussen, “Gaussian processes for data-efficient learning in robotics and control,” _IEEE transactions on pattern analysis and machine intelligence_ , vol. 37, no. 2, pp. 408–423, 2013\.
* [6] G. Pillonetto, F. Dinuzzo, T. Chen, G. De Nicolao, and L. Ljung, “Kernel methods in system identification, machine learning and function estimation: A survey,” _Automatica_ , vol. 50, no. 3, pp. 657–682, 2014.
* [7] M. Liu, G. Chowdhary, B. C. Da Silva, S.-Y. Liu, and J. P. How, “Gaussian processes for learning and control: A tutorial with examples,” _IEEE Control Systems Magazine_ , vol. 38, no. 5, pp. 53–86, 2018.
* [8] R. Senanayake and F. Ramos, “Bayesian hilbert maps for dynamic continuous occupancy mapping,” in _Conference on Robot Learning_ , 2017, pp. 458–471.
* [9] E. Zobeidi, A. Koppel, and N. Atanasov, “Dense incremental metric-semantic mapping via sparse gaussian process regression,” in _IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)_ , 2020.
* [10] A. W. van der Vaart and J. H. van Zanten, “Rates of contraction of posterior distributions based on gaussian process priors,” _The Annals of Statistics_ , pp. 1435–1463, 2008.
* [11] F. Meier and S. Schaal, “Drifting gaussian processes with varying neighborhood sizes for online model learning,” in _2016 IEEE International Conference on Robotics and Automation (ICRA)_. IEEE, 2016, pp. 264–269.
* [12] B. Wilcox and M. C. Yip, “Solar-gp: Sparse online locally adaptive regression using gaussian processes for bayesian robot model learning and control,” _IEEE Robotics and Automation Letters_ , vol. 5, no. 2, pp. 2832–2839, 2020\.
* [13] M. Titsias, “Variational learning of inducing variables in sparse gaussian processes,” in _Artificial Intelligence and Statistics_ , 2009, pp. 567–574.
* [14] E. Snelson and Z. Ghahramani, “Sparse gaussian processes using pseudo-inputs,” in _Advances in neural information processing systems_ , 2006, pp. 1257–1264.
* [15] M. Seeger, C. Williams, and N. Lawrence, “Fast forward selection to speed up sparse gaussian process regression,” in _Artificial Intelligence and Statistics 9_ , no. EPFL-CONF-161318, 2003.
* [16] A. J. Smola and P. L. Bartlett, “Sparse greedy gaussian process regression,” in _Advances in neural information processing systems_ , 2001, pp. 619–625.
* [17] C. K. Williams and M. Seeger, “Using the nyström method to speed up kernel machines,” in _Advances in neural information processing systems_ , 2001, pp. 682–688.
* [18] A. Solin and S. Särkkä, “Hilbert space methods for reduced-rank gaussian process regression,” _Statistics and Computing_ , pp. 1–28, 2014\.
* [19] M. McIntire, D. Ratner, and S. Ermon, “Sparse gaussian processes for bayesian optimization,” in _Proceedings of the Thirty-Second Conference on Uncertainty in Artificial Intelligence_. AUAI Press, 2016, pp. 517–526.
* [20] M. Lázaro-Gredilla, J. Quinonero-Candela, C. E. Rasmussen, and A. R. Figueiras-Vidal, “Sparse spectrum gaussian process regression,” _The Journal of Machine Learning Research_ , vol. 11, pp. 1865–1881, 2010.
* [21] A. Koppel, H. Pradhan, and K. Rajawat, “Consistent online gaussian process regression without the sample complexity bottleneck,” _arXiv preprint arXiv:2004.11094_ , 2020.
* [22] L. Csató, “Gaussian processes: iterative sparse approximations,” Ph.D. dissertation, Aston University, 2002.
* [23] T. D. Bui, C. Nguyen, and R. E. Turner, “Streaming sparse gaussian process approximations,” in _Advances in Neural Information Processing Systems_ , 2017, pp. 3299–3307.
* [24] T. Broderick, N. Boyd, A. Wibisono, A. C. Wilson, and M. I. Jordan, “Streaming variational bayes,” in _Advances in neural information processing systems_ , 2013, pp. 1727–1735.
* [25] H. Liu, Y.-S. Ong, X. Shen, and J. Cai, “When gaussian process meets big data: A review of scalable gps,” _arXiv preprint arXiv:1807.01065_ , 2018.
* [26] J. Shi, M. Titsias, and A. Mnih, “Sparse orthogonal variational inference for gaussian processes,” in _International Conference on Artificial Intelligence and Statistics_. PMLR, 2020, pp. 1932–1942.
* [27] D. Burt, C. E. Rasmussen, and M. Van Der Wilk, “Rates of convergence for sparse variational gaussian process regression,” in _International Conference on Machine Learning_ , 2019, pp. 862–871.
* [28] A. Wilson and H. Nickisch, “Kernel interpolation for scalable structured gaussian processes (kiss-gp),” in _International Conference on Machine Learning_ , 2015, pp. 1775–1784.
* [29] S. Remes, M. Heinonen, and S. Kaski, “Non-stationary spectral kernels,” in _Advances in neural information processing systems_ , 2017, pp. 4642–4651.
* [30] C. Toth and H. Oberhauser, “Variational gaussian processes with signature covariances,” _arXiv preprint arXiv:1906.08215_ , 2019.
* [31] C. J. Paciorek and M. J. Schervish, “Nonstationary covariance functions for gaussian process regression.” in _NIPS_. Citeseer, 2003, pp. 273–280.
* [32] K. Blomqvist, S. Kaski, and M. Heinonen, “Deep convolutional gaussian processes,” in _Joint European Conference on Machine Learning and Knowledge Discovery in Databases_. Springer, 2019, pp. 582–597.
* [33] R. Senanayake, A. Tompkins, and F. Ramos, “Automorphing kernels for nonstationarity in mapping unstructured environments,” in _Conference on Robot Learning_. PMLR, 2018, pp. 443–455.
* [34] N. Littlestone and M. K. Warmuth, “The weighted majority algorithm,” _Information and computation_ , vol. 108, no. 2, pp. 212–261, 1994.
* [35] D. Fudenberg and D. Levine, “Consistency and cautious fictitious play,” _Journal of Economic Dynamics and Control_ , 1995.
* [36] Y. Freund and R. E. Schapire, “A decision-theoretic generalization of on-line learning and an application to boosting,” _Journal of computer and system sciences_ , vol. 55, no. 1, pp. 119–139, 1997.
* [37] E. A. Nadaraya, “On estimating regression,” _Theory of Probability & Its Applications_, vol. 9, no. 1, pp. 141–142, 1964.
* [38] G. S. Watson, “Smooth regression analysis,” _Sankhyā: The Indian Journal of Statistics, Series A_ , pp. 359–372, 1964.
* [39] S. Vijayakumar, A. D’souza, and S. Schaal, “Incremental online learning in high dimensions,” _Neural computation_ , vol. 17, no. 12, pp. 2602–2634, 2005.
* [40] F. Meier, P. Hennig, and S. Schaal, “Incremental local gaussian regression,” in _Advances in Neural Information Processing Systems_ , 2014, pp. 972–980.
* [41] C. K. Williams and C. E. Rasmussen, _Gaussian processes for machine learning_. MIT press Cambridge, MA, 2006, vol. 2, no. 3.
* [42] V. M. Panaretos and Y. Zemel, “Statistical aspects of wasserstein distances,” _Annual review of statistics and its application_ , vol. 6, pp. 405–431, 2019\.
* [43] L. Wasserman, _All of nonparametric statistics_. Springer Science & Business Media, 2006.
* [44] C. E. Rasmussen and H. Nickisch, “Gaussian processes for machine learning (gpml) toolbox,” _The Journal of Machine Learning Research_ , vol. 11, pp. 3011–3015, 2010.
* [45] M. E. Kepler and D. J. Stilwell, “An approach to reduce communication for multi-agent mapping applications,” in _2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)_. IEEE, 2020, pp. 4814–4820.
| arxiv-papers | 2021-07-26T17:52:46 | 2024-09-04T03:07:21.577163 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Michael E. Kepler, Alec Koppel, Amrit Singh Bedi, and Daniel J.\n Stilwell",
"submitter": "Michael Kepler Jr",
"url": "https://arxiv.org/abs/2107.12797"
} |
2107.12800 | 11institutetext: CentraleSupélec, Paris-Saclay University, Mathématiques et
Informatique pour la Complexité et les Systèmes, Gif-sur-Yvette, France.
22institutetext: Radiology Department, Hôpital Cochin AP-HP, Paris, France
33institutetext: Inria Saclay, Gif-sur-Yvette, France 44institutetext: Centre
National de Recherche Scientifique, LIP6, Paris, France 55institutetext:
Therapanacea, Paris, France
# Deep Reinforcement Learning for L3 Slice Localization in Sarcopenia
Assessment
Othmane Laousy 112233 Guillaume Chassagnon 22 Edouard Oyallon 44 Nikos
Paragios 55 Marie-Pierre Revel 22 Maria Vakalopoulou 1133
###### Abstract
Sarcopenia is a medical condition characterized by a reduction in muscle mass
and function. A quantitative diagnosis technique consists of localizing the CT
slice passing through the middle of the third lumbar area (L3) and segmenting
muscles at this level. In this paper, we propose a deep reinforcement learning
method for accurate localization of the L3 CT slice. Our method trains a
reinforcement learning agent by incentivizing it to discover the right
position. Specifically, a Deep Q-Network is trained to find the best policy to
follow for this problem. Visualizing the training process shows that the agent
mimics the scrolling of an experienced radiologist. Extensive experiments
against other state-of-the-art deep learning based methods for L3 localization
prove the superiority of our technique which performs well even with a limited
amount of data and annotations.
###### Keywords:
L3 slice CT slice localization Deep Reinforcement Learning Sarcopenia
## 1 Introduction
Sarcopenia corresponds to muscle atrophy which may be due to ageing,
inactivity, or disease. The decrease of skeletal muscle is a good indicator of
the overall health state of a patient [11]. In oncology, it has been shown
that sarcopenia is linked to outcome in patients treated by chemotherapy [14,
5], immunotherapy [20], or surgery [9]. There are multiple definitions of
sarcopenia [7, 23] and consequently multiple ways of assessing it. On CT
imaging, the method used is based on muscle mass quantification. Muscle mass
is most commonly assessed at a level passing through the middle of the third
lumbar vertebra area (L3), which has been found to be representative of the
body composition [29]. After manual selection of the correct CT slice at the
L3 level, segmentation of muscles is performed to calculate the skeletal
muscle area [8]. In practice, the evaluation is tedious, time-consuming, and
rarely done by radiologists, highlighting the need for an automatic diagnosis
tool that could be integrated into clinical practice. Such automated
measurement of muscle mass could be of great help for introducing sarcopenia
assessment in daily clinical practice.
Muscle segmentation and quantification on a single slice have been thoroughly
addressed in multiple works using simple 2D U-Net like architectures [4, 6].
Few works, however, focus on L3 slice detection. The main challenges for
solving this task rely on the inherent diversity in patient’s anatomy, the
strong resemblance between vertebrae, the variability of CT fields of view as
well as their acquisition and reconstruction protocols.
The most straightforward approach to address L3 localization is by
investigating methods for multiple vertebrae labeling in 3D images using
detection [25] or even segmentation algorithms [22]. Such methods require a
substantial volume of annotations and are computationally inefficient when
dealing with the entire 3D CT scan. In fact, even if our input is 3D, a one-
dimensional output as the $z$-coordinate of the slice is sufficient to solve
the L3 localization problem.
In terms of L3 slice detection, the closest methods leverage deep learning [3,
13] and focus on training simple convolutional neural networks (CNN). These
techniques use maximal intensity projection (MIP), where the objective is to
project voxels with maximal intensity values into a 2D plane. Frontal view MIP
projections contain enough information towards the body and vertebra’s bone
structure differentiation. On the sagittal view, restricted MIP projections
are used to focus solely on the spinal area. In [3] the authors tackle this
problem through regression, training the CNN with parts of the MIP that
contain the L3 vertebra only. More recently, in [13] a UNet-like architecture
(L3UNet-2D) is proposed to draw a 2D confidence map over the position of the
L3 slice.
In this paper, we propose a reinforcement learning algorithm for accurate
detection of the L3 slice in CT scans, automatizing the process of sarcopenia
assessment. The main contribution of our paper is a novel formulation for the
problem of L3 localization, exploiting different deep reinforcement learning
(DRL) schemes that boost the state of the art for this challenging task, even
on scarce data settings. Moreover, in this paper we demonstrate that the use
of 2D approaches for vertebrae detection provides state of the art results
compared to 3D landmark detection methods, simplifying the problem, reducing
the search space and the amount of annotations needed. To the best of our
knowledge, this is the first time a reinforcement learning algorithm is
explored on vertebrae slice localization, reporting performances similar to
medical experts and opening new directions for this challenging task.
## 2 Background
Reinforcement Learning is a fundamental tool of machine learning which allows
dealing efficiently with the exploration/exploitation trade-off [24]. Given
state-reward pairs, a reinforcement learning agent can pick actions to reach
unexplored states or increase its accumulated future reward. Those principles
are appealing for medical applications because they imitate a practitioner’s
behavior and self-learn from experience based on ground-truth. One of the main
issues of this class of algorithm is its sample complexity: a large amount of
interaction with its environment is needed before obtaining an agent close to
an optimal state [26]. However, those techniques were recently combined with
deep learning approaches, which efficiently addressed this issue [17] by
incorporating priors based on neural networks. In the context of highly-
dimensional computer vision applications, this approach allowed RL algorithms
to obtain outstanding accuracy [12] in a variety of tasks and applications.
In medical imaging, model-free reinforcement learning algorithms are highly
used for landmark detection [10] as well as localization tasks [16]. In [1], a
Deep Q-Network (DQN) that automates the view planning process on brain and
cardiac MRI was proposed. This framework takes as an input a single plane and
updates its angle and position during the training process until convergence.
Moreover, in [27] the authors again present a DQN framework for the
localization of different anatomical landmarks introducing multiple agents
that act and learn simultaneously. DRL has also been studied for object or
lesion localization. More recently, in [19] the authors propose a DQN
framework for the localization of $6$ different organs from CT scans achieving
a performance comparable to supervised CNNs. This framework uses a $3$D volume
as input with $11$ different actions to generate bounding boxes for these
organs. Our work is the first to explore and validate a RL scheme on MIP
representations for a single slice detection using the discrete and 2D nature
of the problem.
## 3 Reinforcement Learning Strategy
In this paper, we formulate the slice localization problem as a Markov
Decision Process (MDP), which contains a set of states $S$, actions $A$, and
rewards $R$.
States $S$: For our formulation, the environment $\mathcal{E}$ that we explore
and exploit is a $2$D image representing the frontal MIP projection of the
$3$D CT scans. This projection allows us to reduce our problem’s
dimensionality from a volume of size $512\times 512\times N$ ($N$ being the
varying heights of the volumes) to an image of size $512\times N$. The
reinforcement learning agent is self-taught by interacting with this
environment, executing a set of actions, and receiving a reward linked to the
action taken. An input example is shown in Figure 1. We define a state $s\in
S$ as an image of size $512\times 200$ in $\mathcal{E}$. We consider the
middle of the image to be the slice’s current position on a $z$-axis. To
highlight this, we assign a line of maximum intensity pixel value to the
middle of each image provided as input to our DQN.
Actions $A$: We define a set of discrete actions
$\mathcal{A}=\\{t^{+}_{z},t^{-}_{z}\\}\in\mathbb{R}^{2}$. $t^{+}_{z}$
corresponds to a positive translation (going up by one slice) and $t^{-}_{z}$
corresponds to a negative translation (going down by one slice). These two
actions allow us to explore the entirety of our environment $\mathcal{E}$.
Rewards $R$: In reinforcement learning designing a good reward function is
crucial in learning the goal to achieve. To measure the quality of taking an
action $a\in A$ we use the distance over $z$ between the current slice and the
annotated slice $g$. The reward for non-terminating states is computed with:
$R_{a}(s,s^{\prime})=sign(\mathcal{D}(p,g)-\mathcal{D}(p^{\prime},g))$ (1)
where we denote as $s$ and $s^{\prime}$ the current and next state and $g$ the
ground truth annotation. Moreover, our positions $p$ and $p^{\prime}$ are the
$z$-coordinates of the current and next state respectively. $\mathcal{D}$ is
the Euclidean distance between both coordinates over the $z$-axis. The reward
is non-sparse and binary $r\in\\{-1,+1\\}$ and helps the agent differentiate
between good and bad actions. A good action being when the agent gets closer
to the correct slice. For a terminating state, we assign a reward of $r=0.5$.
Starting States: An episode starts by randomly sampling a slice over the
$z$-axis and ends when the agent has achieved its goal of finding the right
slice. The agent then executes a set of actions and collects rewards until the
episode terminates. When reaching the upper or lower borders of an image, the
current state is assigned to the next state (i.e., the agent does not move),
and a reward of $r=-1$ is appointed to this action.
Final States: During training, a terminal state is defined as a state in which
the agent has reached the right slice. A reward of $r=0.5$ is assigned in this
case, and an episode is terminated. During testing, the termination of an
episode happens when oscillations occur. We adopted the same approach as [1],
and chose actions with the lowest $Q$-value, which have been found to be
closest to the right slice since the DQN outputs higher $Q$-values to actions
when the current slice is far from the ground truth.
### 3.1 Deep Q-Learning
To find the optimal policy $\pi^{*}$ of the MDP, a state-action value function
$Q(s,a)$ can be learned. In Q-Learning, the expected value of the accumulated
discounted future rewards can be estimated recursively using the Bellman
optimality equation:
$Q_{i+1}(s,a)=\mathbb{E}[r+\gamma\underset{a^{\prime}}{\mathrm{max}}\>Q_{i}(s^{\prime},a^{\prime})\mid
s,a]$ (2)
In practice, since the state $S$ is not easily exploitable, we can take
advantage of neural networks as universal function approximators to
approximate $Q(s,a)$ [18]. We utilize an experience replay technique that
consists in storing the agent’s experience
$e_{t}=(s,a,r,s^{\prime},a^{\prime})$ at each time step in a replay memory
$M$. To break the correlation between consecutive samples, we will uniformly
batch a set of experiences from $M$. The Deep Q-Network (DQN) will iteratively
optimize its parameters $\theta$ by minimizing the following loss function:
$L_{i}(\theta_{i})=\mathbb{E}_{(s,a,r,s^{\prime},a^{\prime})}\Big{[}{\big{(}r+\gamma\underset{a^{\prime}}{\mathrm{max}}\>Q_{target}(s^{\prime},a^{\prime};\theta_{i}^{-})-Q_{policy}(s,a;\theta_{i})\big{)}}^{2}\Big{]}$
(3)
with $\theta_{i}$ and $\theta_{i}^{-}$ being the parameters of the policy and
the target network respectively. To stabilize rapid policy changes due to the
distribution of the data and the variations in Q-values, the DQN uses
$Q_{target}(\theta_{i}^{-})$, a fixed version of $Q_{policy}(\theta_{i})$ that
is updated periodically. For our experiments, we update $\theta_{i}^{-}$ every
50 iterations.
### 3.2 Network Architecture
Our Deep Q-Network takes as input the state $s$ and passes it through a
convolutional network. The network contains four convolution layers separated
by parametric ReLU in order to break the linearity of the network, and four
linear layers with LeakyReLU. Contrary to [1], we chose not to add the history
of previously visited states in our case. We opted for this approach since
there is a single path that leads to the right slice. This approach allows us
to simplify our problem even more. Ideally, our agent should learn, just by
looking at the current state, whether to go up or down when the current slice
is respectively below or above the L3 slice. An overview of our framework is
presented in Figure 1.
Figure 1: The implemented Deep Q-Network architecture for L3 slice
localization. The network takes as input an image of size $512\times 200$ with
a single channel. The output is the q-values corresponding to each of the two
actions.
We also explore dueling DQNs from [28]. Dueling DQNs rely on the concept of an
advantage which calculates the benefit that each action can provide. The
advantage is defined as $A(s,a)=Q(s,a)-V(s)$ with $V(s)$ being our state value
function. This algorithm will use the advantage of the Q-values to distinguish
between actions from the state’s baseline values. Dueling DQNs were shown to
provide more robust agents that are wiser in choosing the next best action.
For our dueling DQN, we use the same architecture as the one in Figure 1 but
change the second to last fully connected layer to compute state values on one
side, and action values on the other.
### 3.3 Training
Since our agent is unaware of the possible states and rewards in
$\mathcal{E}$, the exploration step is implemented first. After a few
iterations, our agent can start exploiting what it has learned on
$\mathcal{E}$. In order to balance between exploration and exploitation, we
use an $\epsilon$-greedy strategy. This strategy consists of defining an
exploration rate $\epsilon$, which is initialed to $1$ with a decay of $0.1$,
allowing the agent to become greedy and exploit the environment. A batch size
of $48$ and an experience replay of $17\times 10^{3}$ are used. The entire
framework was developed in Pytorch [21] library using an NVIDIA GTX 1080Ti
GPU. We trained our model for $10^{5}$ episodes, requiring approximately
$20$-$24$ hours. Our source code is available on GitHub: https://git.io/JRyYw.
## 4 Experiments and Results
### 4.1 Dataset
A diverse dataset of $1000$ CT scans has been retrospectively collected for
this study. CT scans were acquired on four different CT models from three
manufacturers (Revolution HD from GE Healthcare, Milwaukee, WI; Brillance 16
from Philips Healthcare, Best, Netherlands; and Somatom AS+ & Somatom Edge
from Siemens Healthineer, Erlangen, Germany). Exams were either abdominal,
thoracoabdominal, or thoraco-abdominopelvic CT scans acquired with or without
contrast media injection. Images were reconstructed using abdominal kernel
with either filtered back-projection or iterative reconstruction. Slice
thickness ranged from $0.625$ to $3$mm, and the number of slices varied from
$121$ to $1407$. The heterogeneity of our dataset highlights the challenges of
the problem from a clinical perspective.
Experienced radiologists manually annotated the dataset, indicating the
position of the middle of the L3 slice. Before computing the MIP, all of the
CT scans are normalized to $1mm$ over the $z$-axis. This normalisation step
harmonises our network’s input, especially since the agent performs actions
along the $z$-axis. After the MIP, we apply a threshold of $100$ HU
(Hounsfield Unit) to $1500$ HU allowing us to eliminate artifacts and foreign
metal bodies while keeping the skeleton structure. The MIP are finally
normalized to [0,1]. From the entire dataset, we randomly selected $100$
patients for testing and the rest $900$ for training and validation. For the
testing cohort, annotations of L3 from a second experienced radiologist have
been provided to measure the interobserver performance.
### 4.2 Results and Discussion
Our method is compared with other techniques from the literature. The error is
calculated as the distance in millimeters ($mm$) between the predicted L3
slice and the one annotated by the experts. In particular, we performed
experiments with the L3UNet-2D [13] approach and the winning SC-Net [22]
method of the Verse2020111https://verse2020.grand-challenge.org/ challenge.
Even if SC-Net is trained on more accurate annotations with 3D landmarks as
well as vertebrae segmentations, and addresses a different problem, we applied
it to our testing cohort. The comparison of the different methods is
summarised in Table 1. SC-Net reports $12$ CT scans with an error higher than
$10$mm. Moreover, L3UNet-2D [13] reports a mean error of $4.24$mm $\pm 6.97$mm
when the method is trained on the entire training set, giving only $7$ scans
with an error higher than $10$mm for the L3 detection. Our proposed method
gives the lowest errors with a mean error of $3.77$mm$\pm 4.71$mm, proving its
superiority. Finally, we evaluated our technique’s performance with a Duel DQN
strategy, reporting higher errors than the proposed one. This observation
could be linked to the small action space that is designed for this study.
Duel DQNs were proven to be powerful in cases with higher action spaces and in
which the computation of the advantage function makes a difference.
Table 1: Quantitative evaluation of the different methods using different number of training samples (metrics in mm). Method | # of samples | Mean | Std | Median | Max | Error $>10mm$
---|---|---|---|---|---|---
Interobserver | - | 2.04 | 4.36 | 1.30 | 43.19 | 1
SC-Net [22] | - | 6.78 | 13.96 | 1.77 | 46.98 | 12
L3UNet-2D [13] | 900 | 4.24 | 6.97 | 2.19 | 40 | 7
Ours (Duel-DQN) | 900 | 4.30 | 5.59 | 3 | 38 | 8
Ours | 900 | 3.77 | 4.71 | 2.0 | 24 | 9
L3UNet-2D [13] | 100 | 145.37 | 161.91 | 32.8 | 493 | 68
Ours | 100 | 5.65 | 5.83 | 4 | 26 | 19
L3UNet-2D [13] | 50 | 108.7 | 97.33 | 87.35 | 392.02 | 86
Ours | 50 | 6.88 | 5.79 | 6.5 | 26 | 11
L3UNet-2D [13] | 10 | 242.85 | 73.07 | 240.5 | 462 | 99
Ours | 10 | 8.97 | 8.72 | 7 | 56 | 33
For the proposed reinforcement learning framework, trained on the whole
training set, 9 CTs had a detection error of more than $10$mm. These scans
were analysed by a medical expert who indicated that $2$ of them have a
lumbosacral transitional vertebrae (LSTV) anomaly [15]. Transitional vertebrae
cases are common and observed in 15-35% of the population [2] highlighting
once again the challenges of this task. For both cases, the localization of
the L3 vertebra for sarcopenia assessment is ambiguous for radiologists and
consequently for the reinforcement learning agent. In fact, the only error
higher than $10mm$ in the interobserver comparison corresponds to an LSTV case
where each radiologist chose a different vertebrae as a basis for sarcopenia
assessment. Even if the interobserver performance is better than the one
reported by the algorithms, our method reports the lowest errors, proving its
potential.
Qualitative results are displayed in Figure 2. The yellow line represents the
medical expert’s annotation and the blue one the prediction of the different
employed models. One can notice that all of the different methods converge to
the correct L3 region with our method reporting great performance. It is
important to note that for sarcopenia assessment, an automatic system does not
need to be at the exact middle of the slice; a few millimeters around will not
skew the end result since muscle mass in the L3 zone does not change
significantly. Concerning prediction times for the RL agent, they depend on
the initial slice that is randomly sampled on the MIP. Computed inference time
for a single step is approximately 0.03 seconds.
Figure 2: Qualitative comparison of different localization methods for two
patients. First left to right represents: interobserver ($4mm$/ $2mm$), SC-Net
($4mm$/$2mm$), L3UNet-2D ($8mm$/$1mm$), Ours ($1mm$/$4mm$). In the parenthesis
we present the reported errors for the first and second row respectively. The
yellow line represents the ground truth and the blue one the prediction.
To highlight the robustness of our network on a low number of annotated
samples, we performed different experiments using 100, 50, and 10 CTs
corresponding respectively to 10%, 5% and 1% of our dataset. We tested those 3
agents on the same 100 patients test set and report results in Table 1. Our
experiments prove the robustness of reinforcement learning algorithms compared
to traditional CNN based ones [13] in the case of small annotated datasets.
One can observe that the traditional methods fail to be trained properly with
a small number of annotations, reporting errors higher than $100$mm for all
three experiments. In our case, decreasing the dataset size does not
significantly affect the performance. In fact, trained on only 10 CTs with the
same number of iterations and memory size, our agent was able to learn a
correct policy and achieve a mean error of $8.97$mm $\pm$ $8.72$mm. Learning a
valid policy from a low number of annotations is one of the strengths of
reinforcement learning. Traditional deep learning techniques rely on pairs of
images and annotations in order to build a robust generalization. Thus, each
pair is exploited only once by the learning algorithm. Reinforcement learning,
however, relies on experiences, each experience
$e_{t}=(s,a,r,s^{\prime},a^{\prime})$ being a tuple of state, action, reward,
next state and next action. Therefore, a single CT scan can provide multiple
experiences to the self-learning agent, making our method ideal for slice
localization problems using datasets with a limited amount of annotations.
## 5 Conclusion
In this paper, we propose a novel direction to address the problem of CT slice
localization. Our experiments empirically prove that reinforcement learning
schemes work very well on small datasets and boost performance compared to
classical convolutional architectures. One limitation of our work lies in the
fact that our agent is always moving $1mm$ independently of the location,
slowing down the process. In the future, we aim to explore different ways to
adapt the action taken depending on the current location, with one possibility
being to incentivize actions with higher increments. Future work also includes
the use of reinforcement learning in multiple vertebrae detection with
competitive or collaborative agents.
## References
* [1] Alansary, A., Le Folgoc, L., Vaillant, G., Oktay, O., Li, Y., Bai, W., Passerat-Palmbach, J., Guerrero, R., Kamnitsas, K., Hou, B., et al.: Automatic view planning with multi-scale deep reinforcement learning agents. In: International Conference on Medical Image Computing and Computer-Assisted Intervention. pp. 277–285. Springer (2018)
* [2] Apazidis, A., Ricart, P.A., Diefenbach, C.M., Spivak, J.M.: The prevalence of transitional vertebrae in the lumbar spine. The Spine Journal 11(9), 858–862 (2011)
* [3] Belharbi, S., Chatelain, C., Hérault, R., Adam, S., Thureau, S., Chastan, M., Modzelewski, R.: Spotting l3 slice in ct scans using deep convolutional network and transfer learning. Computers in biology and medicine 87, 95–103 (2017)
* [4] Blanc-Durand, P., Schiratti, J.B., Schutte, K., Jehanno, P., Herent, P., Pigneur, F., Lucidarme, O., Benaceur, Y., Sadate, A., Luciani, A., Ernst, O., Rouchaud, A., Creze, M., Dallongeville, A., et al.: Abdominal musculature segmentation and surface prediction from ct using deep learning for sarcopenia assessment. Diagnostic and Interventional Imaging 101(12), 789–794 (2020)
* [5] Bozzetti, F.: Forcing the vicious circle: sarcopenia increases toxicity, decreases response to chemotherapy and worsens with chemotherapy. Annals of Oncology 28(9), 2107–2118 (2017), a focus on esophageal squamous cell carinoma
* [6] Castiglione, J., Somasundaram, E., Gilligan, L.A., Trout, A.T., Brady, S.: Automated segmentation of abdominal skeletal muscle in pediatric ct scans using deep learning. Radiology: Artificial Intelligence p. e200130 (2021)
* [7] Cruz-Jentoft, A.J., Bahat, G., Bauer, J., Boirie, Y., Bruyère, O., Cederholm, T., Cooper, C., Landi, F., Rolland, Y., Sayer, A.A., et al.: Sarcopenia: revised european consensus on definition and diagnosis. Age and ageing 48(1), 16–31 (2019)
* [8] Derstine, B.A., Holcombe, S.A., Goulson, R.L., Ross, B.E., Wang, N.C., Sullivan, J.A., Su, G.L., Wang, S.C.: Quantifying Sarcopenia Reference Values Using Lumbar and Thoracic Muscle Areas in a Healthy Population. J Nutr Health Aging 21(10), 180–185 (2017)
* [9] Du, Y., Karvellas, C.J., Baracos, V., Williams, D.C., Khadaroo, R.G.: Sarcopenia is a predictor of outcomes in very elderly patients undergoing emergency surgery. Surgery 156(3), 521–527 (2014)
* [10] Ghesu, F.C., Georgescu, B., Grbic, S., Maier, A., Hornegger, J., Comaniciu, D.: Towards intelligent robust detection of anatomical structures in incomplete volumetric data. Med Image Anal 48, 203–213 (08 2018)
* [11] Gilligan, L.A., Towbin, A.J., Dillman, J.R., Somasundaram, E., Trout, A.T.: Quantification of skeletal muscle mass: sarcopenia as a marker of overall health in children and adults. Pediatric Radiology 50(4), 455–464 (Apr 2020)
* [12] Grill, J.B., Strub, F., Altché, F., Tallec, C., Richemond, P.H., Buchatskaya, E., Doersch, C., Pires, B.A., Guo, Z.D., Azar, M.G., et al.: Bootstrap your own latent: A new approach to self-supervised learning. arXiv preprint arXiv:2006.07733 (2020)
* [13] Kanavati, F., Islam, S., Aboagye, E.O., Rockall, A.: Automatic l3 slice detection in 3d ct images using fully-convolutional networks (2018)
* [14] Lee, J., Chang, C.L., Lin, J.B., Wu, M.H., Sun, F.J., Jan, Y.T., Hsu, S.M., Chen, Y.J.: Skeletal muscle loss is an imaging biomarker of outcome after definitive chemoradiotherapy for locally advanced cervical cancer. Clinical Cancer Research 24(20), 5028–5036 (2018)
* [15] Lian, J., Levine, N., Cho, W.: A review of lumbosacral transitional vertebrae and associated vertebral numeration. European Spine Journal 27(5), 995–1004 (May 2018)
* [16] Maicas, G., Carneiro, G., Bradley, A.P., Nascimento, J.C., Reid, I.: Deep reinforcement learning for active breast lesion detection from dce-mri. In: Descoteaux, M., Maier-Hein, L., Franz, A., Jannin, P., Collins, D.L., Duchesne, S. (eds.) Medical Image Computing and Computer Assisted Intervention - MICCAI 2017. pp. 665–673. Springer International Publishing, Cham (2017)
* [17] Mnih, V., Kavukcuoglu, K., Silver, D., Graves, A., Antonoglou, I., Wierstra, D., Riedmiller, M.: Playing atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602 (2013)
* [18] Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A.A., Veness, J., Bellemare, M.G., Graves, A., Riedmiller, M., Fidjeland, A.K., Ostrovski, G., Petersen, S., Beattie, C., Sadik, A., Antonoglou, I., King, H., Kumaran, D., Wierstra, D., Legg, S., Hassabis, D.: Human-level control through deep reinforcement learning. Nature 518(7540), 529–533 (Feb 2015)
* [19] Navarro, F., Sekuboyina, A., Waldmannstetter, D., Peeken, J.C., Combs, S.E., Menze, B.H.: Deep reinforcement learning for organ localization in ct. In: Medical Imaging with Deep Learning. pp. 544–554. PMLR (2020)
* [20] Nishioka, N., Uchino, J., Hirai, S., Katayama, Y., Yoshimura, A., Okura, N., Tanimura, K., Harita, S., Imabayashi, T., Chihara, Y., Tamiya, N., Kaneko, Y., Yamada, T., Takayama, K.: Association of sarcopenia with and efficacy of anti-pd-1/pd-l1 therapy in non-small-cell lung cancer. Journal of Clinical Medicine 8(4) (2019)
* [21] Paszke, A., Gross, S., Chintala, S., Chanan, G., Yang, E., DeVito, Z., Lin, Z., Desmaison, A., Antiga, L., Lerer, A.: Automatic differentiation in PyTorch. In: NIPS Autodiff Workshop (2017)
* [22] Payer, C., Štern, D., Bischof, H., Urschler, M.: Coarse to fine vertebrae localization and segmentation with spatialconfiguration-net and u-net. In: Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - Volume 5: VISAPP. vol. 5, pp. 124–133 (2020). https://doi.org/10.5220/0008975201240133
* [23] Santilli, V., Bernetti, A., Mangone, M., Paoloni, M.: Clinical definition of sarcopenia. Clinical cases in mineral and bone metabolism 11(3), 177 (2014)
* [24] Sutton, R.S., Barto, A.G.: Reinforcement learning: An introduction. MIT press (2018)
* [25] Suzani, A., Seitel, A., Liu, Y., Fels, S., Rohling, R.N., Abolmaesumi, P.: Fast automatic vertebrae detection and localization in pathological ct scans - a deep learning approach. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) Medical Image Computing and Computer-Assisted Intervention – MICCAI 2015. pp. 678–686. Springer International Publishing (2015)
* [26] Tarbouriech, J., Garcelon, E., Valko, M., Pirotta, M., Lazaric, A.: No-regret exploration in goal-oriented reinforcement learning. In: International Conference on Machine Learning. pp. 9428–9437. PMLR (2020)
* [27] Vlontzos, A., Alansary, A., Kamnitsas, K., Rueckert, D., Kainz, B.: Multiple landmark detection using multi-agent reinforcement learning. In: International Conference on Medical Image Computing and Computer-Assisted Intervention. pp. 262–270. Springer (2019)
* [28] Wang, Z., de Freitas, N., Lanctot, M.: Dueling network architectures for deep reinforcement learning. CoRR abs/1511.06581 (2015), http://arxiv.org/abs/1511.06581
* [29] Zopfs, D., Theurich, S., Große Hokamp, N., Naetlitz, J., Gerecht, L., Borggrefe, J., Schlaak, M., Pinto dos Santos, D.: Single-slice ct measurements allow for accurate assessment of sarcopenia and body composition. European radiology 30 (11 2019)
| arxiv-papers | 2021-07-27T13:15:42 | 2024-09-04T03:07:21.593733 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Othmane Laousy, Guillaume Chassagnon, Edouard Oyallon, Nikos Paragios,\n Marie-Pierre Revel, Maria Vakalopoulou",
"submitter": "Othmane Laousy",
"url": "https://arxiv.org/abs/2107.12800"
} |
2107.12802 |
# Weak scale right-handed neutrino as pseudo-Goldstone fermion of
spontaneously broken $U(1)_{L_{\mu}-L_{\tau}}$
Anjan S. Joshipura [email protected] Ketan M. Patel
[email protected] Theoretical Physics Division, Physical Research Laboratory,
Navarangpura, Ahmedabad-380 009, India.
###### Abstract
Possibility of a Right-Handed (RH) neutrino being a Goldstone fermion of a
spontaneously broken global $U(1)$ symmetry in a supersymmetric theory is
considered. This fermion obtains mass from the supergravity effects leading to
a RH neutrino at the electroweak scale with a mass similar to the gravitino
mass. A prototype model realizing this scenario contains just three gauge
singlet superfields needed for the type I seesaw mechanism. Masses of the
other two neutrinos are determined by the $U(1)$ breaking scale which too can
be around the electroweak scale. Light neutrinos obtain their masses in this
scenario through (a) mixing with the RH neutrinos (type I seesaw), (b) mixing
with neutralinos ($R$-parity breaking), (c) indirectly through mixing of the
RH neutrinos with neutralinos, and (d) radiative corrections. All these
contributions are described by the same set of a small number of underlying
parameters and provide a very constrained and predictive framework for the
neutrino masses which is investigated in detail for various choices of $U(1)$
symmetries. It is found that flavour independent $U(1)$ symmetries cannot
describe neutrino masses if the soft supersymmetry breaking terms are flavour
universal and one needs to consider flavour dependent symmetries. Considering
a particular example of $L_{\mu}-L_{\tau}$ symmetry, it is shown that viable
neutrino masses and mixing can be obtained without introducing any flavour
violation in the soft sector. The leptonic couplings of Majoron are worked out
in the model and shown to be consistent with various laboratory, astrophysical
and cosmological constraints. The neutrino data allows sizeable couplings
between the RH neutrinos and Higgsinos which can be used to probe the pseudo-
Goldstone fermion at colliders through its displaced decay vertex.
## I Introduction
Extensions of the Standard Model (SM) by one or more Right-Handed (RH) singlet
fermions provide the most popular mechanism for obtaining light neutrino
masses Minkowski (1977); Yanagida (1979); Mohapatra and Senjanovic (1980);
Schechter and Valle (1980). The scale $M_{N}$ of the masses of these neutrinos
is set by different underlying physics. $M_{N}$ can be close to the Planck
scale in the absence of any symmetry protecting it. Grand unified theories
based on $SO(10)$ group can lead to $M_{N}$ in the range $10^{10}-10^{16}$ GeV
Fritzsch and Minkowski (1975); Gell-Mann _et al._ (1979). Smaller $M_{N}$
close to TeV scale can be linked to theories with a low scale gauge symmetry
breaking such as $U(1)_{B-L}$ or the left right symmetry. The supersymmetric
theories with a spontaneously broken global symmetry provide an alternate
mechanism for protecting the RH neutrino masses upto TeV scale or less Chun
_et al._ (1995, 1996). If the global symmetry is broken by singlet
superfield(s) and the supersymmetry remains unbroken in the process then the
fermionic partner of the Goldstone Boson - the Goldstone Fermion - would also
remain massless. Once the supersymmetry is broken, say by supergravity
effects, this fermion can pick up a mass around the gravitino mass
$m_{3/2}\sim$ TeV or less. This pseudo-Goldstone Fermion (pGF) can be
identified with one of the sterile neutrinos. Implementation of this mechanism
generically requires more than one singlet superfields which may be identified
with the additional RH neutrinos participating in the seesaw mechanism.
The minimal choice of the global symmetry is $U(1)$. The basic assumption is
that the underlying theory is supersymmetric and invariant under $U(1)$. The
$U(1)$ is assumed to break spontaneously keeping supersymmetry intact. A
prototype model satisfying these requirements contains just three singlet
chiral superfields $\hat{N}_{\alpha}\equiv(\hat{Y},\hat{N},\hat{N}^{\prime})$
with $U(1)$ charges $(0,-1,1)$ and the superpotential
$W_{N}=\lambda\,(\hat{N}\hat{N}^{\prime}-f^{2})\,\hat{Y}\,.$ (1)
As usual, a chiral superfield $\hat{N}_{\alpha}$ contains a complex scalar
$\tilde{N}_{\alpha}$ and its fermionic partner which we denote as
$N_{\alpha}$. We identify the fermionic parts of $\hat{N}_{\alpha}$ with the
three RH neutrinos. Then Eq. (1), apart from breaking $U(1)$ also determines
the zeroeth order structure of the RH neutrino mass matrix which gets
corrected by the supergravity effects. The Dirac mass terms required to
complete the seesaw mechanism arise from the following superpotetial
$W_{D}=\lambda_{\alpha\beta}\,\hat{L}_{\alpha}\hat{N}_{\beta}\hat{H}_{2}\,.$
(2)
The structure of $\lambda_{\alpha\beta}$ is determined by the choice of the
quantum numbers of $(L_{\alpha},H_{2})$ under $U(1)$ symmetry and we will
consider various choices.
Eqs. (1) and (2) contribute to neutrino masses in two different ways. One
obtains non-zero Vacuum Expectation Values (VEVs) for scalars of $\hat{N}$,
$\hat{N}^{\prime}$ at the global supersymmetric minimum from Eq. (1). These
VEVs generate the masses for two of the RH neutrinos. The third RH neutrino
obtains its mass from the supersymmetry breaking effects and the three
neutrinos together generate the seesaw masses for the light neutrinos. VEVs
for $\hat{N}$, $\hat{N}^{\prime}$ also lead to spontaneous bilinear $R$-parity
violation through Eq. (2) which leads to additional contribution to neutrino
masses through their mixing with neutralinos (see for example Barbier _et
al._ (2005) and references therein). These two entirely different
contributions to neutrino masses are governed by the same set of parameters
appearing in Eqs. (1,2) and provide a very constrained and predictive
framework for neutrino masses. Moreover, a simple requirement that the
$R$-parity violating contribution to neutrino masses is smaller or of the
order of the neutrino masses lead to a an upper bound on the RH sneutrino VEVs
since the bilinear $R$-parity breaking parameters are proportional to these
VEVs. This bound is around TeV but is model dependent as the the standard
seesaw also contributes to the neutrino masses. Since the RH sneutrino VEVs
control the masses of the other two RH neutrinos, they also have masses around
TeV. As a result, the masses of all three RH neutrinos are around TeV or less
and one obtains a viable scenario for the TeV scale RH masses without invoking
any additional gauge symmetry, see Deppisch _et al._ (2015) for a review on
weak scale RH neutrinos.
A phenomenological motivation to consider seesaw models with TeV scale RH
neutrinos is the possibility of producing and detecting them at colliders.
Disadvantage of these models on the other hand is the smallness of the active
sterile mixing required to obtain the correct light neutrino masses. Since
this mixing governs the production and decay of the RH neutrino in the minimal
seesaw model it is not possible to observe such RH neutrino within the minimum
set up111There exist special textures of the Dirac and Majorana neutrino mass
matrices which lead to small neutrino masses and large active sterile mixing
even within the minimal seesaw, see for example Kersten and Smirnov (2007);
Lee _et al._ (2013); Chattopadhyay and Patel (2017).. This changes if one or
more RH neutrinos are pGF of the type considered above. In this case, the
symmetry breaking VEV of the RH sneutrino directly couples the pGF to
Higgsinos and their production does not require suppressed mixing as is the
case with the standard seesaw model. Relatively small mixing
$|V_{N\nu_{i}}|\sim 10^{-6}$ of the pGF with neutrinos make them long lived
and pGF can lead to displaced vertex signature at in the collider experiments.
This possibility has been studied extensively recently Lavignac and Medina
(2021) and can also be realized within the scenario presented in this paper.
We introduce the basic framework in the next section choosing the above
mentioned case of the spontaneously broken $U(1)$ symmetry. We then discuss
structure of neutrino masses in section III assuming $U(1)$ to be flavour
independent. It is shown that models in this category cannot reproduce the
neutrino masses correctly if the soft supersymmetry (SUSY) breaking terms are
assumed flavour universal. We then discuss the case of the
$U(1)_{L_{\mu}-L_{\tau}}$ symmetry in section IV which allows correct
description of the observed neutrino spectrum even with the universal soft
terms. The framework implies an existence of Goldstone Boson (GB) of
sponteneously broken $U(1)_{L_{\mu}-L_{\tau}}$ symmetry, namely the Majoron
Chikashige _et al._ (1981). In section V, we derive the couplings of Majoron
with the charged and neutral leptons and discuss their phenomenological
implications. We also discuss about the possibility to detect the lightest RH
neutrino in the direct search experiment in section VI. The work is summarized
in section VII.
## II Basic framework
The starting point of the models we discuss is the renormalizable
superpotential given in Eq. (1). The other terms in $W_{N}$, such as $Y^{2}$
or $Y^{3}$, can be forbidden by an additional symmetry like $R$ symmetry. The
minimization of the potential $V_{N}$ obtained from $W_{N}$ leads to a global
SUSY preserving minimum corresponding to
$\langle\tilde{N}\rangle=Us_{\phi}\,,~{}~{}\langle\tilde{N}^{\prime}\rangle=Uc_{\phi}\,,~{}~{}\langle\tilde{Y}\rangle=0\,,$
(3)
where $s_{\phi}=\sin\phi$, $c_{\phi}=\cos\phi$ and
$U=\frac{f}{\sqrt{s_{\phi}c_{\phi}}}\,,$ (4)
represents $U(1)$ breaking scale. Even in the presence of terms like $Y^{2}$
and $Y^{3}$ in $W_{N}$, Eq. (3) describes the global minimum of the potential.
The spontaneous breaking of global $U(1)$ symmetry implies a massless
Goldstone boson. Writing the scalar fields as
$\tilde{N}_{\alpha}=\langle\tilde{N}_{\alpha}\rangle+\frac{1}{\sqrt{2}}\left(\tilde{N}_{R\alpha}+i\tilde{N}_{I\alpha}\right)\,,$
(5)
at the minimum of the potential, we obtain the Goldstone boson as
$G_{B}=c_{\phi}\tilde{N}^{\prime}_{I}-s_{\phi}\tilde{N}_{I}\,.$ (6)
Its fermionic partner also remains massless in the SUSY preserving limit and
it is given by a similar linear combination
$G_{F}=c_{\phi}N^{\prime}-s_{\phi}N\,.$ (7)
This can also be seen explicitly by constructing singlet fermion mass matrix
from Eq. (1). It is obtained as
$M_{N}^{0}=\lambda U\left(\begin{array}[]{ccc}0&c_{\phi}&s_{\phi}\\\
c_{\phi}&0&0\\\ s_{\phi}&0&0\\\ \end{array}\right)\,.$ (8)
The diagonalization of the above matrix leads to a massless state given by Eq.
(7) and two massive and degenerate states with masses $|\lambda U|$.
The fermion mass matrix in Eq. (8) changes in the presence of the local SUSY
breaking terms. These terms shift the VEVs of $\tilde{N},\tilde{N}^{\prime}$
by ${\cal O}(m_{3/2})$ and also generate a nonzero VEV for $\tilde{Y}$ field
Goto and Yamaguchi (1992). The later makes the Goldstone fermion massive.
These shifts follow from the minimisation of the potential with the soft SUSY
terms Chun _et al._ (1992); Chun and Lukas (1995). If the kinetic terms in
Kahler potential $K$ are minimal and hidden sector is assumed to have Polonyi
form then the shifts are given by Lahanas and Nanopoulos (1987)
$\delta\langle\tilde{N}\rangle=\delta\langle\tilde{N}^{\prime}\rangle=\frac{m_{3/2}}{\lambda}\left(1+\frac{f^{2}\lambda^{2}}{m_{3/2}^{2}}\right)^{\frac{1}{2}}\,,~{}~{}~{}\delta\langle\tilde{Y}\rangle=\frac{m_{3/2}}{\lambda}\,.$
(9)
Shifts for general soft terms are calculated in Chun and Lukas (1995). The
fermion mass matrix in SUGRA is given by
$M_{ab}=M_{P}\,e^{\frac{G}{2M_{P}^{2}}}\,\left(G_{ab}+\frac{1}{3}\frac{G_{a}G_{b}}{M_{P}^{2}}-G_{c}\,(G^{-1})^{c}_{d}\,G^{d}_{ab}\right)\,.$
(10)
with
$G=K+M_{P}^{2}~{}\ln|W/M_{P}^{3}|^{2}\,,$ (11)
$G_{a}=\frac{\delta G}{\delta\phi^{a}}$, $\phi^{a}=\phi_{a}^{*}$ is antichiral
superfield and
$W=g(z)+W_{N}(N_{\alpha})\,.$ (12)
Here, $g(z)$ describes the hidden sector potential and $W_{N}$ is given by Eq.
(1). We evaluate the fermion mass matrix by substituting $\langle
z\rangle=bM_{P}$, $\langle W\rangle\sim\langle
g(z)\rangle\sim\frac{m_{3/2}M_{P}^{2}}{c}$ where $c=e^{b^{2}/2}$ is a
numerical constant and remembering that now
$\lambda\langle\tilde{Y}\rangle\approx{\cal O}(m_{3/2})$. The gravitino mass
is defined as $m_{3/2}=M_{P}\,\exp(\langle G\rangle/2M_{P}^{2})$. The fermion
mass matrix following from Eq. (10) is then given by
$M_{N}^{\rm loc}=c\,m_{3/2}\left(\begin{array}[]{ccc}{\cal
O}\left(\frac{U^{2}}{M_{P}^{2}}\right)&\frac{\lambda
Uc_{\phi}}{m_{3/2}}&\frac{\lambda Us_{\phi}}{m_{3/2}}\\\ \frac{\lambda
Uc_{\phi}}{m_{3/2}}&{\cal
O}\left(\frac{U^{2}}{M_{P}^{2}}\right)&\frac{\lambda\langle\hat{Y}\rangle}{m_{3/2}}\\\
\frac{\lambda
Us_{\phi}}{m_{3/2}}&\frac{\lambda\langle\hat{Y}\rangle}{m_{3/2}}&{\cal
O}\left(\frac{U^{2}}{M_{P}^{2}}\right)\\\ \end{array}\right)\,.$ (13)
The above mass matrix approximately coincides with the $M_{N}^{0}$ in Eq. (8)
if one effectively assumes nonzero VEV for $\tilde{Y}$ in the latter. The
other corrections induced by SUSY breaking are ${\cal O}(U^{2}/M_{P}^{2})$ and
they are very small. Therefore, we approximate the singlet fermion mass matrix
in the presence of local SUSY breaking as
$M_{N}\simeq\lambda U\left(\begin{array}[]{ccc}0&c_{\phi}&s_{\phi}\\\
c_{\phi}&0&\epsilon\\\ s_{\phi}&\epsilon&0\\\ \end{array}\right)\,,$ (14)
where $\epsilon=\langle\hat{Y}\rangle/U<1$ and we have absorbed $c$ in
redefining $\lambda$. Note that $U$ denotes now a shifted VEV and it does not
strictly satisfy Eq. (4). The SUSY breaking generates the mass for the
lightest RH neutrino and split the masses of the other two singlet neutrinos
by ${\cal O}(m_{3/2})$. Explicitly,
$M_{N_{1}}\approx|2\epsilon\lambda
Uc_{\phi}s_{\phi}|\,,~{}~{}M_{N_{2,3}}\approx|\lambda U(1\pm\epsilon
c_{\phi}s_{\phi})|\,.$ (15)
The lightest RH neutrino is now a pseudo-Goldstone fermion which can be
written as
$N_{1}\simeq\cos\phi\,N^{\prime}-\sin\phi\,N-\epsilon\cos 2\phi\,Y\,,$ (16)
at the leading order in $\epsilon$.
## III Flavour independent $U(1)$ symmetries and neutrino masses
We now discuss the interaction of the RH neutrinos with the SM leptons, Higgs
and their superpartners. This depends on the choice of the symmetry $U(1)$.
There are four possible choices. $U(1)$ is (a) a “hidden” symmetry acting only
on the RH fields $N_{\alpha}$, or (b) a leptonic symmetry acting on
$L_{\alpha}$ and $N_{\alpha}$, or (c) a Peccei Quinn like symmetry acting on
the Higgs doublet(s), on some of the right-handed quarks and may also be on
the leptonic fields, or (d) a leptonic family symmetry acting only on leptons
and distinguishing among them. We discuss the case (d) in detail in the next
section. The cases (a-c) can all be described by a general superpotential
$W=\lambda_{\alpha}\,\hat{L}_{\alpha}\hat{H}_{2}\hat{S}_{1}\,+\,\kappa\,\hat{H}_{1}\hat{H}_{2}\hat{S_{2}}\,$
(17)
where we have only shown the part relevant for the neutrino masses. Here
$\hat{S}_{1,2}$ can be any of the three RH fields $\hat{N}_{\alpha}$ depending
on the choice of the $U(1)$ symmetry. For the case (a), one has
$\hat{S}_{1}=\hat{S}_{2}=\hat{Y}$. The case (b) corresponds to $\kappa=0$ and
$\hat{S}_{1}=\hat{N}$ if $L_{\alpha}$ have $U(1)$ charge is +1. $W$ in this
case contains an additional $\mu$ term. The choice of $\hat{S}_{1,2}$ in case
(c) depends on the $U(1)$ charges of $\hat{H}_{1,2}$.
The cases (a-c) are similar and we consider the case (c) with
$\hat{S}_{1}=\hat{N}$ and $\hat{S}_{2}=\hat{N}^{\prime}$ for definiteness.
Without loss of generality, the parameters $\lambda_{\alpha}$ and $\kappa$ can
be chosen real. We shift the fields $\hat{N},\hat{N}^{\prime}$ by the VEV of
their scalar components. This leads to the following superpotetial
$W=\lambda_{\alpha}\,\hat{L}_{\alpha}\hat{H}_{2}\hat{N}\,+\,\kappa\,\hat{H}_{1}\hat{H}_{2}\hat{N^{\prime}}\,-\mu\hat{H}_{1}\hat{H}_{2}-\epsilon_{\alpha}\hat{L}_{\alpha}\hat{H}_{2}\,$
(18)
with
$\epsilon_{\alpha}=-\lambda_{\alpha}Us_{\phi}~{}~{}~{},~{}~{}~{}\mu=-\kappa
Uc_{\phi}~{}.$ (19)
The model contains ten neutral fermion fields which mix with each other
through the gauge and superpotential interactions. The corresponding mass
Lagrangian in the basis
$\psi_{0}=(\nu_{\alpha},N_{\alpha},-i\lambda_{1},-i\lambda_{2},\tilde{h}_{1}^{0},\tilde{h}_{2}^{0})^{T}$
is given by
$-{\cal L}_{\cal N}=\frac{1}{2}\,\psi_{0}^{T}\,{\cal M}_{\cal
N}\,\psi_{0}\,+\,{\rm h.c.}\,,$ (20)
where ${\cal M}_{\cal N}$ is a $10\times 10$ mass matrix which can be
parametrized as
${\cal M}_{\cal N}=\left(\begin{array}[]{ccc}0&m_{D}&m_{\nu\chi}\\\
m_{D}^{T}&M_{N}&m_{N\chi}\\\
m_{\nu\chi}^{T}&m_{N\chi}^{T}&M_{\chi}\end{array}\right)\,.$ (21)
Here, $M_{N}$ is singlet neutrino mass matrix as given by Eq. (14). $m_{D}$ is
$3\times 3$ Dirac neutrino mass matrix as can be read-off from Eq. (18),
$m_{D}=v_{2}\,\left(\begin{array}[]{ccc}0&\lambda_{e}&0\\\
0&\lambda_{\mu}&0\\\ 0&\lambda_{\tau}&0\\\ \end{array}\right)\,,$ (22)
with $v_{1,2}\equiv\langle H_{1,2}\rangle$ and
$\sqrt{v_{1}^{2}+v_{2}^{2}}\equiv v=174\,{\rm GeV}$. $m_{\nu\chi}$ and
$m_{N\chi}$ are $3\times 4$ mass matrices. They can be determined from Eq.
(18) and the gauge interactions as
$m_{\nu\chi}=\left(\begin{array}[]{cccc}-\frac{1}{\sqrt{2}}g^{\prime}\omega^{\prime}_{e}&\frac{1}{\sqrt{2}}g\omega^{\prime}_{e}&0&-\epsilon_{e}\\\
-\frac{1}{\sqrt{2}}g^{\prime}\omega^{\prime}_{\mu}&\frac{1}{\sqrt{2}}g\omega^{\prime}_{\mu}&0&-\epsilon_{\mu}\\\
-\frac{1}{\sqrt{2}}g^{\prime}\omega^{\prime}_{\tau}&\frac{1}{\sqrt{2}}g\omega^{\prime}_{\tau}&0&-\epsilon_{\tau}\end{array}\right)\,,~{}~{}m_{N\chi}=\left(\begin{array}[]{cccc}0&0&0&0\\\
0&0&0&\lambda_{\alpha}\omega_{\alpha}^{\prime}\\\ 0&0&\kappa v_{2}&\kappa
v_{1}\\\ \end{array}\right)\,,$ (23)
where $\omega_{\alpha}^{\prime}\equiv\langle\tilde{\nu}_{\alpha}\rangle$. The
explicit form of the neutralino mass matrix is
$M_{\chi}=\left(\begin{array}[]{cccc}M_{1}&0&-\frac{1}{\sqrt{2}}g^{\prime}v_{1}&\frac{1}{\sqrt{2}}g^{\prime}v_{2}\\\
0&M_{2}&\frac{1}{\sqrt{2}}gv_{1}&-\frac{1}{\sqrt{2}}gv_{2}\\\
-\frac{1}{\sqrt{2}}g^{\prime}v_{1}&\frac{1}{\sqrt{2}}gv_{1}&0&-\mu\\\
\frac{1}{\sqrt{2}}g^{\prime}v_{2}&-\frac{1}{\sqrt{2}}gv_{2}&-\mu&0\\\
\end{array}\right)\,.$ (24)
The tree level light neutrino masses can be obtained from Eq. (21). For
$m_{\nu\chi},m_{D}\ll M_{\chi},M_{N}$, the neutrino mass matrix at the leading
order is given by
$m_{\nu}=-m_{3\times 7}\,{\cal M}_{7\times 7}^{-1}\,(m_{3\times 7})^{T}\,.$
(25)
Here, $m_{3\times 7}\equiv(m_{D},m_{\nu\chi})$ is a $3\times 7$ analogue of
the conventional Dirac matrix in familiar type I seesaw mechanism. ${\cal
M}_{7\times 7}$ is a mass matrix of heavier states corresponding to the lower
$7\times 7$ block of Eq. (21).
Neglecting $\lambda_{\alpha}\omega_{\alpha}^{\prime}$ term222It is shown later
in this section that the SM neutrino mass scale requires $\lambda_{\alpha}\ll
1$ in this framework. Therefore, $\kappa
v_{1,2}\gg\lambda_{\alpha}\omega^{\prime}_{\alpha}$ unless $\kappa$ is
vanishingly small. in $m_{N\chi}$, an explicit evaluation of Eq. (25) gives
$\displaystyle m_{\nu}$ $\displaystyle=$
$\displaystyle\tilde{m}_{0}\left[\left(1-\frac{\kappa
c_{\phi}U}{\mu}\left(2-\frac{\kappa
c_{\phi}U}{\mu}\right)\right)\,s_{\phi}^{2}\,\tilde{\cal
A}+\left(\frac{A_{0}M_{N_{1}}}{v_{2}^{2}}-\frac{2\kappa^{2}c_{\phi}^{2}A_{0}v_{1}}{\mu
v_{2}}\right)\,\tilde{{\cal B}}\right.$ (26) $\displaystyle-$
$\displaystyle\left.\frac{\kappa
A_{0}c_{\phi}(v_{1}^{2}-v_{2}^{2})}{v_{2}\mu}\left(1-\frac{\kappa
c_{\phi}U}{\mu}\right)\,s_{\phi}\,\tilde{{\cal H}}\right]\,,$
where,
$\tilde{m}_{0}=\frac{D_{4}v_{2}^{2}U^{2}\lambda^{2}}{\tilde{D}_{7}}=\frac{v_{2}^{2}}{M_{N_{1}}-\kappa^{2}c_{\phi}^{2}\zeta}\,,$
(27)
$D_{4}$ and $\tilde{D}_{7}$ are the determinants of $M_{\chi}$ and ${\cal
M}_{7\times 7}$, respectively. Explicit expression of $D_{4}$ is
$D_{4}={\rm Det}\,M_{\chi}=-\mu(M_{1}M_{2}\mu-(g^{2}M_{1}+g^{\prime
2}M_{2})v_{1}v_{2})\,.$ (28)
$\tilde{D}_{7}$ can be obtained using the second equality in Eq. (27) in terms
of the other known parameters where
$M_{N_{1}}\equiv 2\epsilon\lambda Us_{\phi}c_{\phi}\,,$ (29)
is the mass of the pGF and
$\zeta=\frac{v^{4}(g^{2}M_{1}+g^{\prime 2}M_{2})-4v_{1}v_{2}\mu
M_{1}M_{2}}{2D_{4}}\,.$ (30)
Further,
$A_{0}=-\frac{\mu(g^{2}M_{1}+g^{\prime 2}M_{2})}{2(M_{1}M_{2}\mu-
v_{1}v_{2}(g^{2}M_{1}+g^{\prime 2}M_{2}))}\,.$ (31)
The matrices in Eq. (26) are obtained as
$\tilde{{\cal
A}}=\left(\begin{array}[]{ccc}\lambda_{e}^{2}&\lambda_{e}\lambda_{\mu}&\lambda_{e}\lambda_{\tau}\\\
\lambda_{e}\lambda_{\mu}&\lambda_{\mu}^{2}&\lambda_{\mu}\lambda_{\tau}\\\
\lambda_{e}\lambda_{\tau}&\lambda_{\mu}\lambda_{\tau}&\lambda_{\tau}^{2}\\\
\end{array}\right)\,,~{}\tilde{{\cal
B}}=\left(\begin{array}[]{ccc}\omega_{e}^{2}&\omega_{e}\omega_{\mu}&\omega_{e}\omega_{\tau}\\\
\omega_{e}\omega_{\mu}&\omega_{\mu}^{2}&\omega_{\mu}\omega_{\tau}\\\
\omega_{e}\omega_{\tau}&\omega_{\mu}\omega_{\tau}&\omega_{\tau}^{2}\\\
\end{array}\right)\,,$ (32) $\tilde{{\cal
H}}=\left(\begin{array}[]{ccc}2\lambda_{e}\omega_{e}&\lambda_{e}\omega_{\mu}+\lambda_{\mu}\omega_{e}&\lambda_{e}\omega_{\tau}+\lambda_{\tau}\omega_{e}\\\
\lambda_{e}\omega_{\mu}+\lambda_{\mu}\omega_{e}&2\lambda_{\mu}\omega_{\mu}&\lambda_{\mu}\omega_{\tau}+\lambda_{\tau}\omega_{\mu}\\\
\lambda_{e}\omega_{\tau}+\lambda_{\tau}\omega_{e}&\lambda_{\mu}\omega_{\tau}+\lambda_{\tau}\omega_{\mu}&2\lambda_{\tau}\omega_{\tau}\\\
\end{array}\right)\,.$ (33)
Here, $\omega_{\alpha}$ denote the VEVs of sneutrino in the basis in which the
bilinear term is rotated away from the superpotential Joshipura _et al._
(2002). Explicitly,
$\omega_{\alpha}=\omega^{\prime}_{\alpha}-\frac{v_{1}}{\mu}\epsilon_{\alpha}\,.$
(34)
If one neglects mixing $m_{N\chi}$ between the RH neutrino and neutralino
induced by $\kappa$, then the ${\cal M}_{7\times 7}$ becomes block diagonal
and $m_{\nu}$ becomes sum of two independent seesaw contributions
corresponding to the first two terms of Eq. (26) with $\kappa=0$. The first
term is the normal seesaw contribution while the second is the standard
$R$-parity violating contribution arising due to neutrino-neutralino mixing.
Both these contributions are of rank one and each can give mass to only one
neutrino. As seen from Eq. (26), the leading terms of the conventional seesaw
contribution is solely governed by the mass of the pGF.
The $\kappa$-dependent terms in Eq. (26) make significant contribution. This
can be seen by eliminating $\kappa$ using the second in Eq. (19) which leads
to
$\displaystyle m_{\nu}$ $\displaystyle=$
$\displaystyle\tilde{m}_{0}\left[4s_{\phi}^{2}\,\tilde{\cal
A}+\frac{A_{0}M_{N_{1}}}{v_{2}^{2}}\left(1-\frac{2\mu
v_{1}v_{2}}{U^{2}M_{N_{1}}}\right)\,\tilde{{\cal
B}}+\frac{2A_{0}(v_{1}^{2}-v_{2}^{2})}{v_{2}U}\,s_{\phi}\,\tilde{{\cal
H}}\right]\,.$ (35)
The snuetrino VEVs arise from the parameters $\epsilon_{\alpha}$ and one can
parametrize them as
$\omega_{\alpha}\equiv
k_{\alpha}\epsilon_{\alpha}=-\lambda_{\alpha}k_{\alpha}Us_{\phi}\,,$ (36)
where we have used Eq. (19). The elements of matrix $m_{\nu}$ in Eq. (35) can
then be rewritten as
$\left(m_{\nu}\right)_{\alpha\beta}\
=\tilde{m}_{0}\,\lambda_{\alpha}\lambda_{\beta}\,s_{\phi}^{2}\left[4+\frac{A_{0}M_{N_{1}}U^{2}}{v_{2}^{2}}\left(1-\frac{2\mu
v_{1}v_{2}}{U^{2}M_{N_{1}}}\right)\,k_{\alpha}k_{\beta}-\frac{2A_{0}(v_{1}^{2}-v_{2}^{2})}{v_{2}}\,(k_{\alpha}+k_{\beta})\right]\,.$
(37)
Assuming the second and third terms are $\lesssim{\cal O}(1)$, one finds
typically
$|\lambda_{\alpha}|^{2}\sim{\cal
O}\left(\frac{m_{\nu}M_{N_{1}}}{v_{2}^{2}}\right)\sim{\cal
O}\left(10^{-13}\right)\times\left(\frac{M_{N_{1}}}{100\,{\rm GeV}}\right)\,.$
(38)
Therefore, $|\lambda_{\alpha}|\ll 1$ and neglecting $\lambda_{\alpha}$
dependent terms in $m_{N\chi}$ is justified. The third term in Eq. (37) is
smaller than the seesaw contribution for $k_{\alpha}\leq 1$. The second term
however increases with $k_{\alpha}U$ and can compete with the seesaw
contribution. Requiring that this term is at most of the order of the seesaw
term implies
$U^{2}|k_{\alpha}|^{2}\lesssim{\cal
O}\left(\frac{v_{2}^{2}}{|A_{0}|M_{N_{1}}}\right)\sim{\cal
O}\left(10^{6}\right)\,{\rm GeV}^{2}\times\left(\frac{2.8\times 10^{-4}\,{\rm
GeV}^{-1}}{|A_{0}|}\right)\times\left(\frac{100\,{\rm
GeV}}{M_{N_{1}}}\right)\,.$ (39)
The parameters $k_{\alpha}$ can be determined from the minimization of the
scalar potential of the model, see Appendix A for details. Generically,
$k_{\alpha}$ would be ${\cal O}(1)$. However, they can be very small if the
soft SUSY breaking terms are correlated (see, Appendix A). For $k_{\alpha}\sim
1$, Eq. (39) implies a strong upper bound on the symmetry breaking scale which
weakens with the decrease in the values of $k_{\alpha}$.
The magnitude of $k_{\alpha}$ depends on the trilinear soft terms and
sneutrino soft masses along with the other parameters and in general it can be
different for different $\alpha$. However, $k_{\alpha}$ can be identical in
minimal SUGRA type theories because of flavour universal soft parameters at
the scale of SUSY breaking mediation. A splitting among the values of
$k_{\alpha}$ then get induced by renormalization group effects and it is
expected to be small. Thus it is natural to assume flavour universal
$k_{\alpha}$ in a large class of models. In such a situation, Eq. (37) can
generate mass for only one neutrino and all the models in this category are
ruled out in spite of the presence of various contributions to neutrino
masses333This is not true if $\omega_{\alpha}$ and $\lambda_{\alpha}$ are
regarded as independent. One can obtain correct masses and mixing in this
case, see for example, model in Lavignac and Medina (2021). However, this
amounts to assuming flavour dependent $k_{\alpha}$..
These models become viable only if sizeable flavour violations in $k_{\alpha}$
are introduced. Even with the most general $k_{\alpha}$, Eq. (37) leads to a
massless neutrino. We find that to get large enough solar angle and viable
ratio of the solar to atmospheric squared mass differences, one requires
$(k_{2}-k_{3})/k_{3}\simeq{\cal O}(1)$. Such a sizeable difference between
$k_{\alpha}$ cannot come from the RG induced small corrections and one needs
to assume large flavour violation in the soft terms at the SUSY breaking
mediation scale. The need for such large flavour violation in case of the
purely bilinear $R$-parity violation was noticed before Joshipura _et al._
(2002); Romao _et al._ (2000); Hirsch _et al._ (2000). This is an unwelcome
feature which can be cured if the flavour independent symmetry considered here
is replaced by a flavour dependent leptonic symmetry. It is possible in this
case to retain flavour universality of $k_{\alpha}$ and reproduce all the
neutrino data as we discuss in the next section.
## IV $U(1)_{L_{\mu}-L_{\tau}}$ symmetry and neutrino masses
The example we consider here is based on the spontaneously broken
$U(1)_{L_{\mu}-L_{\tau}}$ symmetry. The three RH neutrinos
$N_{\alpha}=(\hat{Y},\hat{N},\hat{N}^{\prime})$ retain the same charges as
before and we appropriately relabel them as a
$(\hat{N_{e}},\hat{N_{\mu}},\hat{N_{\tau}})$. The $U(1)$ charges for the three
generations of the lepton doublet superfields, $\hat{L}_{\alpha}$ are
$(0,1,-1)$ while the $SU(2)$ singlet charged lepton superfields,
$\hat{E}^{c}_{\alpha}$, have charges $(0,-1,1)$. The MSSM Higgs superfields
are neutral under $U(1)$. A renormalizable superpotential involving these
superfields is written as
$\displaystyle
W=\lambda_{\alpha}\,\hat{L}_{\alpha}\hat{H}_{2}\hat{N}_{\alpha}\,+\,\lambda_{\alpha}^{\prime}\,\hat{L}_{\alpha}\hat{H}_{1}\hat{E}^{c}_{\alpha}\,-\mu_{0}\hat{H}_{1}\hat{H}_{2}\,+\kappa\hat{N}_{e}\,\hat{H}_{1}\hat{H}_{2}\,$
(40)
The above along with $W_{N}$ gives the complete superpotential characterizing
the leptonic interactions in the model. Without loss of generality, the
parameters $\lambda_{\alpha}$, $\lambda^{\prime}_{\alpha}$ and $\mu_{0}$ can
be chosen real. The bilinear $R$-parity violation and the $\mu$ parameter
generated through the VEVs of scalar components of $\hat{N}_{\alpha}$ are
given by
$\epsilon_{\alpha}=-\lambda_{\alpha}\langle\tilde{N}_{\alpha}\rangle\,,~{}~{}\mu=\mu_{0}-\kappa\langle\tilde{N}_{e}\rangle\,$
(41)
The spontaneous breaking of $R$-parity also induces nonzero VEVs for the
sneutrino fields residing in $\hat{\nu}_{\alpha}$ at the minimum of the scalar
potential.
The masses of all the ten neutral fermions are given by the matrix in Eq.
(21). The matrices $M_{N}$, $M_{\nu\chi}$ and $M_{\chi}$ are the same as given
before by Eqs. (14,23,24), respectively. $m_{D}$ and $M_{N\chi}$ are different
compared to the flavour independent cases and are given by
$m_{D}=v_{2}\,{\rm
Diag.}\left(\lambda_{e},\lambda_{\mu},\lambda_{\tau}\right)\,,~{}~{}~{}~{}m_{N\chi}=\left(\begin{array}[]{cccc}0&0&\kappa
v_{2}&\kappa v_{1}+\lambda_{e}\omega_{e}^{\prime}\\\
0&0&0&\lambda_{\mu}\omega_{\mu}^{\prime}\\\
0&0&0&\lambda_{\tau}\omega_{\tau}^{\prime}\\\ \end{array}\right)\,.$ (42)
The tree level light neutrino mass matrix after the seesaw is still given by
Eq. (25). Neglecting $\lambda_{\alpha}\omega^{\prime}_{\alpha}$ terms in
$M_{N\chi}$, an explicit evaluation of $m_{\nu}^{(0)}$ gives
$\displaystyle m_{\nu}^{(0)}$ $\displaystyle=$ $\displaystyle m_{0}\left[{\cal
A}+\frac{A_{0}M_{N_{1}}}{v_{2}^{2}}\,{\cal B}+\frac{2\kappa\epsilon
U}{\mu}\,{\cal C}+\frac{\kappa
A_{0}\epsilon(v_{1}^{2}-v_{2}^{2})}{v_{2}\mu}\,{\cal D}\right.$ (43)
$\displaystyle+$ $\displaystyle\left.\frac{\kappa^{2}\epsilon\zeta}{\lambda
U}\,{\cal F}+\left(\frac{\kappa\epsilon U}{\mu}\right)^{2}\,{\cal
G}-\frac{2\kappa^{2}\epsilon^{2}A_{0}v_{1}}{\mu v_{2}}\,{\cal
B}+\frac{\kappa^{2}A_{0}\epsilon^{2}(v_{1}^{2}-v_{2}^{2})U}{v_{2}\mu^{2}}\,{\cal
H}\right]\,,$
where we have used relations Eqs. (34,41). Further,
$m_{0}=\frac{D_{4}v_{2}^{2}U^{2}\lambda^{2}}{D_{7}}=\frac{v_{2}^{2}}{M_{N_{1}}-\kappa^{2}\epsilon^{2}\zeta}\,,$
(44)
and $D_{4}$, $\zeta$ and $A_{0}$ are as defined earlier in Eqs. (28,30,31)
respectively. $D_{7}$ is the determinant of the new ${\cal M}_{7\times 7}$ and
it is different from $\tilde{D}_{7}$ defined earlier unless $\kappa=0$. Also,
${\cal A}=\left(\begin{array}[]{ccc}\epsilon^{2}\lambda_{e}^{2}&-\epsilon
s_{\phi}\lambda_{e}\lambda_{\mu}&-\epsilon
c_{\phi}\lambda_{e}\lambda_{\tau}\\\ -\epsilon
s_{\phi}\lambda_{e}\lambda_{\mu}&s_{\phi}^{2}\lambda_{\mu}^{2}&-s_{\phi}c_{\phi}\lambda_{\mu}\lambda_{\tau}\\\
-\epsilon
c_{\phi}\lambda_{e}\lambda_{\tau}&-s_{\phi}c_{\phi}\lambda_{\mu}\lambda_{\tau}&c_{\phi}^{2}\lambda_{\tau}^{2}\end{array}\right)\,,~{}{\cal
B}=\left(\begin{array}[]{ccc}\omega_{e}^{2}&\omega_{e}\omega_{\mu}&\omega_{e}\omega_{\tau}\\\
\omega_{e}\omega_{\mu}&\omega_{\mu}^{2}&\omega_{\mu}\omega_{\tau}\\\
\omega_{e}\omega_{\tau}&\omega_{\mu}\omega_{\tau}&\omega_{\tau}^{2}\\\
\end{array}\right)\,,$ (45) ${\cal
C}=\left(\begin{array}[]{ccc}\epsilon^{2}\lambda_{e}^{2}&0&0\\\
0&-s_{\phi}^{2}\lambda_{\mu}^{2}&-s_{\phi}c_{\phi}\lambda_{\mu}\lambda_{\tau}\\\
0&-s_{\phi}c_{\phi}\lambda_{\mu}\lambda_{\tau}&-c_{\phi}^{2}\lambda_{\tau}^{2}\end{array}\right)\,,$
(46) ${\cal
D}=\left(\begin{array}[]{ccc}2\epsilon\lambda_{e}\omega_{e}&\epsilon\lambda_{e}\omega_{\mu}-s_{\phi}\lambda_{\mu}\omega_{e}&\epsilon\lambda_{e}\omega_{\tau}-c_{\phi}\lambda_{\tau}\omega_{e}\\\
\epsilon\lambda_{e}\omega_{\mu}-s_{\phi}\lambda_{\mu}\omega_{e}&-2s_{\phi}\lambda_{\mu}\omega_{\mu}&-s_{\phi}\lambda_{\mu}\omega_{\tau}-c_{\phi}\lambda_{\tau}\omega_{\mu}\\\
\epsilon\lambda_{e}\omega_{\tau}-c_{\phi}\lambda_{\tau}\omega_{e}&-s_{\phi}\lambda_{\mu}\omega_{\tau}-c_{\phi}\lambda_{\tau}\omega_{\mu}&-2c_{\phi}\lambda_{\tau}\omega_{\tau}\\\
\end{array}\right)\,,$ (47) ${\cal F}=\left(\begin{array}[]{ccc}0&0&0\\\
0&0&\lambda_{\mu}\lambda_{\tau}\\\
0&\lambda_{\mu}\lambda_{\tau}&0\end{array}\right)\,,~{}~{}{\cal
G}=\left(\begin{array}[]{ccc}\epsilon^{2}\lambda_{e}^{2}&\epsilon
s_{\phi}\lambda_{e}\lambda_{\mu}&\epsilon c_{\phi}\lambda_{e}\lambda_{\tau}\\\
\epsilon
s_{\phi}\lambda_{e}\lambda_{\mu}&s_{\phi}^{2}\lambda_{\mu}^{2}&s_{\phi}c_{\phi}\lambda_{\mu}\lambda_{\tau}\\\
\epsilon
c_{\phi}\lambda_{e}\lambda_{\tau}&s_{\phi}c_{\phi}\lambda_{\mu}\lambda_{\tau}&c_{\phi}^{2}\lambda_{\tau}^{2}\end{array}\right)\,,$
(48) ${\cal
H}=\left(\begin{array}[]{ccc}2\epsilon\lambda_{e}\omega_{e}&\epsilon\lambda_{e}\omega_{\mu}+s_{\phi}\lambda_{\mu}\omega_{e}&\epsilon\lambda_{e}\omega_{\tau}+c_{\phi}\lambda_{\tau}\omega_{e}\\\
\epsilon\lambda_{e}\omega_{\mu}+s_{\phi}\lambda_{\mu}\omega_{e}&2s_{\phi}\lambda_{\mu}\omega_{\mu}&s_{\phi}\lambda_{\mu}\omega_{\tau}+c_{\phi}\lambda_{\tau}\omega_{\mu}\\\
\epsilon\lambda_{e}\omega_{\tau}+c_{\phi}\lambda_{\tau}\omega_{e}&s_{\phi}\lambda_{\mu}\omega_{\tau}+c_{\phi}\lambda_{\tau}\omega_{\mu}&2c_{\phi}\lambda_{\tau}\omega_{\tau}\\\
\end{array}\right)\,.$ (49)
In the limit $\kappa\to 0$, the first term in Eq. (43) quantifies the standard
seesaw contribution:
$m_{\nu}^{S}\equiv-
m_{D}\,M_{N}^{-1}\,m_{D}^{T}=\frac{v_{2}^{2}}{M_{N_{1}}}\,{\cal A}\,.$ (50)
Contrary to the flavour independent cases, this contribution leads to non-zero
masses for all three neutrinos. The leading mass
$m_{\nu_{3}}\simeq\frac{v_{2}^{2}}{|M_{N_{1}}|}\left(c_{\phi}^{2}\lambda_{\tau}^{2}+s_{\phi}^{2}\lambda_{\mu}^{2}\right)\,,$
(51)
is controlled by the mass of the pGF. The lower $2\times 2$ block of the
matrix ${\cal A}$ along with this mass can account for the atmospheric
neutrino oscillations. The other two masses are degenerate when the terms of
${\cal O}(\epsilon^{2})$ are neglected in ${\cal A}$. Degeneracy is lifted by
the latter but by itself it is not sufficient to account for the solar scale
and angle. The seesaw term in Eq. (43) however gets significant contribution
from the $\kappa$ dependent terms ${\cal C}$, ${\cal F}$ and ${\cal G}$ when
$\left|\kappa U\epsilon/\mu\right|\sim{\cal O}(1)$. These terms by themselves
are sufficient to reproduce the neutrino spectrum as we will discuss. For
$\kappa=0$, the second term denotes the usual contribution to the neutrino
masses from the sneutrino VEVs induced by $R$-parity violation:
$m_{\nu}^{\cancel{R}}\equiv-
m_{\nu\chi}\,M_{\chi}^{-1}\,m_{\nu\chi}^{T}=A_{0}\,{\cal B}\,.$ (52)
This contribution also gets corrected by the $\kappa$ dependent terms as shown
in Eq. (43).
As mentioned earlier, the parameters $\omega_{\alpha}$ denote the VEVs of
sneutrino in the basis in which the bilinear term is shifted away Joshipura
_et al._ (2002). They can be parametrized as
$\omega_{\alpha}=k_{\alpha}\epsilon_{\alpha}$ and $k_{\alpha}$ can be
determined from minimization of the scalar potential of the model, see
Appendix A for details. The magnitude of $k_{\alpha}$ depends on the trilinear
soft terms and sneutrino soft masses along with the other parameters and in
general their value can be different for different $\alpha$. However,
$k_{\alpha}$ are expected to be universal in minimal SUGRA type theories
because of flavour universal soft parameters at the scale of SUSY breaking
mediation. A splitting among the values of $k_{\alpha}$ then get induced by
renormalization group effects. We assume that these effects are small and
$k_{\alpha}$ are approximately universal at the electroweak scale as well. For
$\omega_{\alpha}=k\epsilon_{\alpha}$, we find
${\cal B}=k^{2}U^{2}\,{\cal G}\,,~{}~{}{\cal D}=-2kU\,{\cal C}\,,~{}~{}{\cal
H}=-2kU\,{\cal G}\,.$ (53)
Substituting these in Eq. (43) and defining
$r_{e,\mu}=\lambda_{e,\mu}/\lambda_{\tau}$, we obtain the neutrino mass matrix
after combining the different contributions as
$m^{(0)}_{\nu}=m_{0}\lambda_{\tau}^{2}\left(\begin{array}[]{ccc}\epsilon^{2}r_{e}^{2}(1+\eta+\eta^{\prime})&-\epsilon
r_{e}r_{\mu}s_{\phi}(1-\eta)&-\epsilon r_{e}c_{\phi}(1-\eta)\\\ -\epsilon
r_{e}r_{\mu}s_{\phi}(1-\eta)&r_{\mu}^{2}s_{\phi}^{2}(1+\eta-\eta^{\prime})&-r_{\mu}s_{\phi}c_{\phi}(1-\eta+\eta^{\prime}-\zeta^{\prime})\\\
-\epsilon
r_{e}c_{\phi}(1-\eta)&-r_{\mu}s_{\phi}c_{\phi}(1-\eta+\eta^{\prime}-\zeta^{\prime})&c_{\phi}^{2}(1+\eta-\eta^{\prime})\\\
\end{array}\right),$ (54)
where,
$\displaystyle\eta$ $\displaystyle=$
$\displaystyle\frac{A_{0}k^{2}U^{2}M_{N_{1}}}{v_{2}^{2}}+\left(\frac{\kappa\epsilon
U}{\mu}\right)^{2}\left(1-\frac{2A_{0}k(kv_{1}\mu+v_{1}^{2}-v_{2}^{2})}{v_{2}}\right)\,,$
$\displaystyle\eta^{\prime}$ $\displaystyle=$
$\displaystyle\frac{2\kappa\epsilon
U}{\mu}\left(1-\frac{A_{0}k(v_{1}^{2}-v_{2}^{2})}{v_{2}}\right)\,,$
$\displaystyle\zeta^{\prime}$ $\displaystyle=$
$\displaystyle\frac{2\kappa^{2}\epsilon^{2}\zeta}{M_{N_{1}}}\,.$ (55)
If the induced sneutrino VEVs $\omega_{\alpha}$ are small then only the seesaw
terms contribute to Eq. (54). This contribution by itself is sufficient to
describe neutrino masses and mixing parameters including the Dirac CP phase.
However, it requires relatively low value of the $U(1)$ breaking scale $U$.
This is quantified as follows. One obtains a relation
$\eta=\frac{1}{4}\eta^{\prime 2}$ from Eq. (IV) in the purely seesaw limit.
Eq. (53) is then described in terms of five real parameters
$m_{0}\lambda_{\tau}^{2}$, $\eta^{\prime}$, $\phi$, $r_{e}\epsilon$, $r_{\mu}$
and a complex $\zeta^{\prime}$ which control neutrino masses and mixing in
this case. Explicitly,
$\displaystyle r_{e}\epsilon$ $\displaystyle=$
$\displaystyle-0.649\,,~{}~{}r_{\mu}=-13.23\,,~{}~{}\eta^{\prime}=0.714\,,~{}~{}\phi=-0.09\,,$
$\displaystyle\zeta^{\prime}$ $\displaystyle=$ $\displaystyle
0.516+0.022\,i\,,~{}~{}m_{0}\lambda_{\tau}^{2}=0.0367\,{\rm eV}\,,$ (56)
reproduce all the neutrino squared mass differences and mixing angles within
less than 1$\sigma$ and the Dirac CP phase within 1.4$\sigma$ ranges given by
the latest global fit results, NuFIT v5.0 Esteban _et al._ (2020). The
implied value of $\eta^{\prime}=\frac{2\kappa\epsilon
U}{\mu}=\frac{2\kappa\langle\tilde{N}_{e}\rangle}{\mu}$ determines the VEV of
$\tilde{N}_{e}$ induced by the supergravity effect. The definitions of
$\zeta^{\prime}$ and $M_{N_{1}}$ can be used to obtain a relation
$U^{2}=\left|\frac{\kappa\eta^{\prime}\mu\zeta}{\lambda\zeta^{\prime}\sin
2\phi}\right|\,.$ (57)
The values in Eq. (IV) then imply
$U=432\,{\rm
GeV}\,\times\sqrt{\left|\frac{\kappa}{\lambda}\right|}\,\times\left(\frac{\mu}{\rm
TeV}\right)^{1/2}\times\,\left(\frac{\zeta}{24.13\,{\rm GeV}}\right)^{1/2}\,.$
(58)
corresponding to a relatively low breaking of the $U(1)$ symmetry. The pGF
mass is determined as
$|M_{N_{1}}|=\left|\frac{\lambda}{\kappa}\,\eta^{\prime}\mu\,s_{\phi}c_{\phi}\right|=64\,{\rm
GeV}\,\times\left|\frac{\lambda}{\kappa}\right|\times\left(\frac{\mu}{\rm
TeV}\right)\,,$ (59)
while the heavier two neutrinos have masses $432\sqrt{|\lambda\kappa|}\,{\rm
GeV}\mp\frac{1}{2}|M_{N_{1}}|$.
The $R$-parity violating contribution to the seesaw model can be significant
with increasing $U$ and need to be included. Also, Eq. (54) is a neutrino mas
matrix as predicted by the model at the tree level. The neutrino masses also
receive higher order corrections and for the masses of RH neutrinos of ${\cal
O}(100)$ GeV, these corrections are non-negligible in general. We, therefore,
include 1-loop correction to determine the viability of this model in
reproducing the neutrino masses and mixing parameters and to derive its
reliable predictions. There are several sources of 1-loop correction to the
neutrino masses in this model. The dominant contribution arises from the self-
energy correction mediated by the lightest Higgs $H$ and $Z$ bosons Grimus and
Lavoura (2002); Aristizabal Sierra and Yaguna (2011). These are evaluated in
Grimus and Lavoura (2002) for multi Higgs doublets. Using this we obtain in
our case,
$\delta m_{\nu}^{(1)}=\frac{1}{32\pi^{2}v^{2}}\,m_{D}\,U_{N}^{*}\,{\rm
Diag.}\left(g(M_{N_{1}}),g(M_{N_{2}}),g(M_{N_{3}})\right)\,U_{N}^{\dagger}\,m_{D}^{T}\,,$
(60)
where $U_{N}$ is a unitary matrix which diagonalizes $M_{N}$ such that
$M_{N}=U_{N}{\rm Diag.}(M_{N_{1}},M_{N_{2}},M_{N_{3}})U_{N}^{T}\,,$ (61)
and
$g(M_{i})=M_{i}\left(\frac{1}{\sin^{2}\beta}\,\frac{\log\frac{M_{i}^{2}}{m_{H}^{2}}}{\frac{M_{i}^{2}}{m_{H}^{2}}-1}\,+\,3\,\frac{\log\frac{M_{i}^{2}}{m_{Z}^{2}}}{\frac{M_{i}^{2}}{m_{Z}^{2}}-1}\right)\,.$
(62)
Similar corrections at 1-loop also arise from supersymmetric particles in the
loop. We list them in Appendix B. Complete determination of the magnitude of
these correction in general requires specification of SUSY breaking sector and
depending on the later their contribution can be sizeable or sub-dominant. For
a range of parameters of our interest, we find that these contributions remain
small and $\delta m_{\nu}^{(1)}$ given in Eq. (60) captures the most relevant
and dominant 1-loop correction.
The 1-loop corrected neutrino mass matrix is therefore given by
$m_{\nu}=m^{(0)}_{\nu}+\delta m_{\nu}^{(1)}\,.$ (63)
The charged lepton mass matrix is dominantly given by $3\times 3$ matrix
$m_{l}$ which is diagonal and real. Hence, the lepton mixing matrix can be
determined from diagonalization of $m_{\nu}$ only. Note that
$\lambda_{\alpha}$, $\epsilon$ and $U$ can be chosen real without loss of
generality. $A_{0}$ and $k$ are also real if no CP violation is introduced in
the soft SUSY breaking sector. The CP violation in the lepton sector,
therefore, arises only from a parameter $\lambda$. Considering the present
generic limits on the masses of neutralinos and charginos Zyla _et al._
(2020), we take $M_{1}\simeq M_{2}\simeq\mu=1$ TeV to evaluate the neutrino
mass spectrum. We also fix $\tan\beta\equiv v_{2}/v_{1}=2$. This implies
$\zeta=24.13$ GeV from Eq. (30) and $A_{0}=-2.8\times 10^{-4}\,{\rm GeV^{-1}}$
from Eq. (31). We fix $\kappa=1$ and choose four sample values for $U$ and
determine the remaining dimensionless eight real parameters (real $r_{e}$,
$r_{\mu}$, $\epsilon$, $\phi$, $\lambda_{\tau}$, $k$ and complex $\lambda$)
using $\chi^{2}$ minimization. The $\chi^{2}$ function includes two neutrino
squared mass differences, three mixing angles and a Dirac CP phase. We use the
values of these observables from the latest global fit results (NuFIT v5.0)
Esteban _et al._ (2020). We also assume normal ordering in neutrino masses.
The results for four example values of $U$ are displayed in Table 1.
Parameters | BP 1 | BP 2 | BP 3 | BP 4
---|---|---|---|---
$U$ [GeV] | $10^{3}$ | $10^{4}$ | $10^{5}$ | $10^{6}$
$\kappa$ | $1.0$ | $1.0$ | $1.0$ | $1.0$
$\lambda$ | $0.5591+0.1449\,i$ | $0.6148-0.2204\,i$ | $0.7513+0.0327\,i$ | $-0.8436-0.0283\,i$
$\epsilon$ | 0.1648 | -0.0955 | 0.0276 | 0.0035
$\phi$ | 3.0965 | -3.011 | -2.8527 | -0.7434
$\lambda_{\tau}$ | $9.73\times 10^{-8}$ | $2.321\times 10^{-7}$ | $-5.895\times 10^{-7}$ | $-1.2484\times 10^{-6}$
$r_{\mu}$ | 27.2463 | -8.3797 | 4.614 | -1.5014
$r_{e}$ | -5.2322 | -140.889 | -16.6385 | -55.4134
$k$ | 0 | 0.0252 | -0.006 | 0.0005
$\Delta m^{2}_{21}$ [$10^{-5}$ eV2] | 7.42 | 7.35 | 7.42 | 7.42
$\Delta m^{2}_{31}$ [$10^{-3}$ eV2] | 2.516 | 2.517 | 2.517 | 2.517
$\sin^{2}\theta_{12}$ | 0.302 | 0.299 | 0.304 | 0.304
$\sin^{2}\theta_{23}$ | 0.578 | 0.584 | 0.573 | 0.573
$\sin^{2}\theta_{13}$ | 0.0221 | 0.0221 | 0.0222 | 0.0222
$\sin\delta_{\rm CP}$ | -0.78 | -0.57 | -0.29 | -0.29
$\sum m_{\nu_{i}}$ [eV] | 0.146 | 0.086 | 0.09 | 0.092
$|m_{\beta\beta}|$ [eV] | 0.039 | 0.016 | 0.019 | 0.019
$M_{N_{1}}$ [GeV] | 8.34 | 159.7 | 1132 | 2912
$M_{N_{2}}$ [GeV] | 581.1 | 6479 | $7.466\times 10^{4}$ | $8.426\times 10^{5}$
$M_{N_{3}}$ [GeV] | 589.5 | 6639 | $7.579\times 10^{4}$ | $8.455\times 10^{5}$
Table 1: The best fit values of model parameters, corresponding results for
neutrino masses and mixing observables and relevant predictions for four
benchmark solutions obtained for $\kappa=1$ and different values of $U$.
The solution BP 1 represent the pure seesaw case discussed earlier in Eq. (IV)
but it now includes the radiatiove correction. This is shown here for specific
values of various parameters for comparison. The benchmark points BP 3 and BP
4 reproduce the central values of neutrino squared mass differences and mixing
parameters as obtained from the latest global fit results Esteban _et al._
(2020). BP 1 and BP 2 reproduce all the observables within $1.3\sigma$. It is
seen that the 1-loop correction considered in Eq. (60) significantly modifies
one of the elements of $m_{\nu}$ from its tree level value. This is shown
explicitly in Appendix B where we also discuss the strengths of the other
1-loop corrections. We also repeat the same analysis but for $\kappa=0$ and
the corresponding results are discussed in Appendix C.
In Table 1, we also list predictions for the sum of the three light neutrino
masses, the effective mass parameter relevant for neutrinoless double beta
decay (i.e. $m_{\beta\beta}=U_{ei}^{2}\,m_{\nu_{i}}$), and mass spectrum of
the RH neutrinos. It can be seen that all the benchmark points predict
relatively degenerate mass spectrum for the light neutrinos. The obtained
value of $|m_{\beta\beta}|$ is smaller than the current upper limits from
various recent experiments seearching for neutrinoless double beta decay as
listed in Dolinski _et al._ (2019). The strongest constraint on the neutrino
mass spectrum of the model comes from the cosmological observations. The
current limit from Planck collaboration is $\sum m_{\nu_{i}}<0.12$ eV Aghanim
_et al._ (2020) (see also Vagnozzi _et al._ (2017)) which seems to be in
conflict with the prediction of BP 1. However, in deriving the constraint on
the sum of the neutrino masses from cosmology, it is assumed that the
neutrinos are stable or atleast their lifetime is greater than the age of the
universe. If neutrinos decay into invisible radiation on the time scales
shorter than the age of the universe, the above constraint can be replaced by
a much weaker limit Chacko _et al._ (2020), as weak as $\sum m_{\nu_{i}}<0.9$
eV. In our model, neutrinos can decay into Majoron allowing such a
possibility. We compute the neutrino lifetime in the next section and show
that the solution BP 1 can evade the strongest limit444Alternatively, the
stricter limit on $\sum m_{\nu_{i}}$ can also be relaxed in models based on
dynamical dark energy with arbitrary equation of state Vagnozzi _et al._
(2018)..
A pair of the heavier neutrinos is quasi-degenerate while the mass of the pGF
is predicted to be $<{\cal O}(200)$ GeV for some of the benchmark points. The
later is within the kinematic reach of the LHC. However, it’s production and
detection involves coupling with the SM particles which arise through active-
sterile neutrino mixing in the standard scenario and hence the current bounds
are sensitive to such mixing. We estimate this in section VI and obtain that
the magnitude of the underlying mixing is $\lesssim 10^{-6}$. For such a small
mixing, the current ATLAS Aad _et al._ (2015) and CMS Khachatryan _et al._
(2015, 2016) analysis do not put any limit on the RH neutrino masses.
## V Majoron and its couplings
As a consequence of spontaneous breaking of $U(1)_{L_{\mu}-L_{\tau}}$, there
exists a massless Goldstone boson - Majoron - which was primarily given by the
linear combination Eq. (6). Since two of the three lepton doublets are also
charged under $U(1)_{L_{\mu}-L_{\tau}}$, this structure gets modified to
$J\simeq\cos\phi\,\tilde{N}_{I\tau}-\sin\phi\,\tilde{N}_{I\mu}+\frac{\omega^{\prime}_{\mu}}{U}\,\tilde{\nu}_{I\mu}-\frac{\omega^{\prime}_{\tau}}{U}\,\tilde{\nu}_{I\tau}\,.$
(64)
Majoron couples to the leptons at the tree level in this model while the
couplings with the other SM particles can arise through loop(s). The leptonic
Majoron couplings are strongly constrained from cosmology and astrophysics.
The strongest constraints on the neutrino-Majoron couplings, denoted by
$g_{ij}$ here, come from the observed CMB spectrum which requires that the
neutrinos should be free streaming at the time of the photon decoupling. This
restricts both the diagonal and the off-diagonal couplings Hannestad and
Raffelt (2005); Raffelt and Weiss (1995); Ayala _et al._ (2014). For the
diagonal neutrino couplings with Majoron, the constraint reads
$|g_{ii}|\>\raisebox{-4.73611pt}{$\stackrel{{\scriptstyle\textstyle<}}{{\sim}}$}\>10^{-7}$
while the off-diagonal couplings are required to be
$|g_{ij}|\>\raisebox{-4.73611pt}{$\stackrel{{\scriptstyle\textstyle<}}{{\sim}}$}\>0.61\times
10^{-11}\,\left(\frac{0.05\,{\rm eV}}{m_{\nu_{i}}}\right)^{2}$ (65)
for the hierarchical neutrino masses. The off-diagonal couplings
$h_{\alpha\beta}$ of Majoron to the charged leptons are constrained from the
non observation of the decay $e_{\alpha}\rightarrow e_{\beta}J\,.$ The
branching ratio of $\alpha$ lepton decaying into Majoron and $\beta$ lepton is
estimated as
${\rm
BR}[\alpha\to\beta\,J]=\frac{\Gamma[\alpha\to\beta\,J]}{\Gamma[\alpha\to\beta\,\nu_{\alpha}\,\bar{\nu}_{\beta}]}\simeq\frac{12\pi^{2}}{G_{F}^{2}m_{\alpha}^{4}}\,|h_{\alpha\beta}|^{2}\,,$
(66)
for $m_{\alpha}\gg m_{\beta},m_{J}$. The experimental limits ${\rm BR}[\mu\to
e\,J]\leq 2.6\times 10^{-6}$ Jodidio _et al._ (1986) and ${\rm BR}[\tau\to
e/\mu\,J]\leq 10^{-3}$ Albrecht _et al._ (1995) require
$|h_{\mu e}|<1.9\times 10^{-11}\,,~{}~{}|h_{\tau e}|,|h_{\tau\mu}|<1.1\times
10^{-7}\,.$ (67)
The electron coupling to Majoran is contained from the energy loss from red
giant and require Raffelt and Weiss (1995); Ayala _et al._ (2014)
$|h_{ee}|<2.57\times 10^{-13}\,.$ (68)
We systematically evaluate leptonic couplings to Majoron below and show that
the above bounds are satisfied for the set of parameters which give the
correct neutrino spectrum. In particular, the Majoron coupling to electron is
absent in the model in the seesaw limit and $g_{ee}$ much smaller than the
value required above arise from higher order terms in the seesaw expansion.
### V.1 Couplings with neutrinos
In the $U(1)_{L_{\mu}-L_{\tau}}$ based model, the dominant interaction of the
light neutrinos with Majoron arises from primarily two sources: (a) through
light-heavy neutrino mixing from $W_{N}$ in Eq. (1), and (b) through neutrino-
neutralino mixing from $W$ in Eq. (40) and gauge interactions.
From the F-term of $W_{N}$ and substitution given in Eq. (5), the relevant
interaction terms are
${\cal L}^{(a)}_{\nu
J}=-\frac{i\lambda}{\sqrt{2}}\,\left(N_{\tau}^{T}C^{-1}N_{e}\,\tilde{N}_{I\mu}+N^{T}_{\mu}C^{-1}N_{e}\,\tilde{N}_{I\tau}\right)+{\rm
h.c.}\,.$ (69)
The above gives rise to coupling between Majoron and the light neutrinos
through heavy-light neutrino mixing. The later can be computed using
diagonalization of the relevant blocks of neutral fermion mass matrix given in
Eq. (21) with $M_{N}$, $m_{\nu\chi}$, $M_{\chi}$ as written in Eqs. (14,23,24)
respectively and $m_{D}$, $m_{N\chi}$ given in Eq. (42). The full matrix
${\cal M}_{\cal N}$ is block diagonalized at the leading order using a unitary
matrix
$U_{\cal N}=\left(\begin{array}[]{ccc}1&\rho_{D}&\rho_{\nu\chi}\\\
-\rho_{D}^{\dagger}&1&\rho_{N\chi}\\\
-\rho_{\nu\chi}^{\dagger}&-\rho_{N\chi}^{\dagger}&1\end{array}\right)\,+\,{\cal
O}(\rho^{2})\,.$ (70)
such that $U_{\cal N}^{T}{\cal M}_{\cal N}U_{\cal N}$ is an approximate block
diagonal matrix. Here,
$\rho_{D}\simeq(m_{D}M_{N}^{-1})^{*}\,,~{}~{}\rho_{\nu\chi}\simeq(m_{\nu\chi}M_{\chi}^{-1})^{*}\,,~{}~{}\rho_{\chi
N}\simeq(m_{N\chi}M_{\chi}^{-1})^{*}\,.$ (71)
The neutral fermions in the block-diagonal basis are then obtained from the
original basis as $U_{\cal N}^{\dagger}\psi^{0}$. Using this and denoting the
light neutrinos in block diagonal basis as $\nu_{\alpha}^{\prime}$, we find
$\displaystyle N_{e}$ $\displaystyle=$
$\displaystyle-(\rho_{D}^{\dagger})_{1\alpha}\,\nu_{L\alpha}^{\prime}=(-1)^{1-\delta_{\alpha
1}}\,B_{0}\,\epsilon\,\epsilon_{\alpha}\,\nu_{L\alpha}^{\prime}\,,$
$\displaystyle N_{\mu}$ $\displaystyle=$
$\displaystyle-(\rho_{D}^{\dagger})_{2\alpha}\,\nu_{L\alpha}^{\prime}=(-1)^{1-\delta_{\alpha
2}}\,B_{0}\,\sin\phi\,\epsilon_{\alpha}\,\nu_{L\alpha}^{\prime}\,,$
$\displaystyle N_{\tau}$ $\displaystyle=$
$\displaystyle-(\rho_{D}^{\dagger})_{3\alpha}\,\nu_{L\alpha}^{\prime}=(-1)^{1-\delta_{\alpha
3}}\,B_{0}\,\cos\phi\,\epsilon_{\alpha}\,\nu_{L\alpha}^{\prime}\,,$ (72)
where
$B_{0}=\frac{v_{2}}{U^{2}\lambda\epsilon\sin
2\phi}=\frac{v_{2}}{M_{N_{1}}U}\,.$ (73)
Substituting Eq. (V.1) in Eq. (69) and use of Eq. (64) determine the couplings
of heavy and light neutrinos with Majoron. As we are interested in the latter,
the relevant part is obtained as
${\cal L}^{(a)}_{\nu
J}=-i\frac{B_{0}}{\sqrt{2}U}\,\frac{v_{2}}{U}\,(-1)^{(1-\delta_{\beta
1})}\,\epsilon_{\beta}\left(\epsilon_{\mu}\,\nu_{L\mu}^{\prime
T}-\epsilon_{\tau}\,\nu_{L\tau}^{\prime
T}\right)C^{-1}\nu_{L\beta}^{\prime}\,J\,+{\rm h.c.}\,.$ (74)
In the physical basis of the light neutrinos,
$\nu_{L\alpha}^{\prime}=U_{\alpha i}\,\nu_{Li}$ where $U_{\alpha i}$ are the
elements of the PMNS matrix, the above term is written as
${\cal L}^{(a)}_{\nu J}=-ig_{ij}^{(a)}\,\nu^{T}_{Li}C^{-1}\nu_{Lj}\,J\,+{\rm
h.c.}\,,$ (75)
with
$g^{(a)}_{ij}=\frac{B_{0}}{\sqrt{2}U}\,\frac{v_{2}}{U}\,\sum_{\beta}\,(-1)^{(1-\delta_{\beta
1})}\,\left(\epsilon_{\mu}\,U_{\mu i}-\epsilon_{\tau}\,U_{\tau
i}\right)\,\epsilon_{\beta}\,U_{\beta j}\,.$ (76)
We now evaluate the neutrino-Majoron coupling which arise from the neutrino-
neutralino mixing. The relevant Lagrangian can be read from Eq. (40) and gauge
interaction as
$\displaystyle{\cal L}^{(b)}_{\nu J}$ $\displaystyle=$
$\displaystyle-\frac{i}{\sqrt{2}}\left(\lambda_{\mu}\,\nu_{L\mu}^{T}\tilde{N}_{I\mu}+\lambda_{\tau}\,\nu_{L\tau}^{T}\tilde{N}_{I\mu}\right)C^{-1}\tilde{h}_{2}^{0}+\frac{i}{2}(g^{\prime}\tilde{B}^{T}-g\tilde{W}^{0T})C^{-1}\nu_{L\beta}\,\tilde{\nu}_{I\beta}+{\rm
h.c.}\,,$ (77)
where we define $-i\lambda_{1}\equiv\tilde{B}$ and
$-i\lambda_{2}\equiv\tilde{W}^{0}$. The neutral fermions $\tilde{h}_{2}^{0}$,
$\tilde{B}$ and $\tilde{W}^{0}$ in the above contain the light neutrinos when
${\cal M}_{\cal N}$ is block diagonalized. From Eqs. (70,71), we obtain
$\displaystyle\tilde{h}_{2}^{0}$ $\displaystyle=$
$\displaystyle-(\rho_{\nu\chi}^{\dagger})_{4\alpha}\,\nu_{L\alpha}^{\prime}=\frac{v_{1}}{\mu}A_{0}\,\omega_{\alpha}\,U_{\alpha
i}\,\nu_{Li}\,,$ $\displaystyle\tilde{B}$ $\displaystyle=$
$\displaystyle-(\rho_{\nu\chi}^{\dagger})_{1\alpha}\,\nu_{L\alpha}^{\prime}=-\frac{\sqrt{2}g^{\prime}M_{2}}{g^{2}M_{1}+g^{\prime
2}M_{2}}\,A_{0}\,\omega_{\alpha}\,U_{\alpha i}\,\nu_{Li}\,,$
$\displaystyle\tilde{W}^{0}$ $\displaystyle=$
$\displaystyle-(\rho_{\nu\chi}^{\dagger})_{2\alpha}\,\nu_{L\alpha}^{\prime}=\frac{\sqrt{2}gM_{1}}{g^{2}M_{1}+g^{\prime
2}M_{2}}\,A_{0}\,\omega_{\alpha}\,U_{\alpha i}\,\nu_{Li}\,,$ (78)
where $A_{0}$ and $\omega_{\alpha}$ are defined in Eqs. (31,34). Substituting
the above relations in Eq. (77) and use of Eq. (64) lead to the following
interaction between the SM neutrinos and Majoron:
${\cal L}^{(b)}_{\nu J}=-ig_{ij}^{(b)}\,\nu^{T}_{Li}C^{-1}\nu_{Lj}\,J\,+{\rm
h.c.}\,,$ (79)
with
$g^{(b)}_{ij}=\frac{A_{0}}{\sqrt{2}U}\,\sum_{\beta}\,\left(\omega_{\mu}\,U_{\mu
i}-\omega_{\tau}\,U_{\tau i}\right)\,\omega_{\beta}\,U_{\beta j}\,.$ (80)
Combining the two contributions, the light neutrino-Majoron coupling is
parametrized as
$-{\cal L}_{\nu J}=ig_{ij}\,\nu^{T}_{Li}C^{-1}\nu_{Lj}\,J\,+{\rm h.c.}\,,$
(81)
with
$g_{ij}=g_{ij}^{(a)}+g_{ij}^{(b)}=\frac{B_{0}v_{2}}{\sqrt{2}\,U^{2}}\,\sum_{\beta}\left((-1)^{(1-\delta_{\beta
1})}+\eta_{0}\right)\left(\epsilon_{\mu}\,U_{\mu i}-\epsilon_{\tau}\,U_{\tau
i}\right)\,\epsilon_{\beta}\,U_{\beta j}\,,$ (82)
where we have used $\omega_{\alpha}=k\epsilon_{\alpha}$ and
$\eta_{0}=\frac{A_{0}k^{2}U^{2}M_{N_{1}}}{v_{2}^{2}}\,.$ (83)
Note that for $\kappa\to 0$, $\eta_{0}$ denotes the relative strength of
$R$-parity violating contribution compared to the standard seesaw contribution
to the neutrino masses. For $|\eta_{0}|<1$, the neutrino-Majoron coupling is
dominantly determined by the light-heavy neutrino mixing while for
$|\eta_{0}|>1$ it mainly arises from the neutrino-neutralino mixing.
The interaction in Eq. (81) leads to neutrino decay into Majoron whenever it
is kinematically allowed. The decay width can be estimated as
$\Gamma[\nu_{j}\to\nu_{i}\,J]=\frac{\lambda^{1/2}[m_{\nu j}^{2},m_{\nu
i}^{2},m_{J}^{2}]}{16\pi\,m_{\nu j}^{3}}\,|g_{ji}|^{2}\,\left(m_{\nu
j}^{2}+m_{\nu i}^{2}-m_{J}^{2}-2m_{\nu i}m_{J}\right)\,,$ (84)
where $\lambda[x,y,z]=x^{2}+y^{2}+z^{2}-2xy-2yz-2zx$. Assuming massless
Majoron, we compute the total decay width of $\nu_{3}$ as
$\Gamma_{\nu}\equiv\Gamma[\nu_{3}\to\nu_{2}\,J]+\Gamma[\nu_{3}\to\nu_{1}\,J]$
and the lifetime $\tau_{\nu}=1/\Gamma_{\nu}$ for the benchmark solutions
listed in Table 1. The results are displayed in Table 2 where we also list the
obtained value of $|\eta_{0}|$ and the relevant off-diagonal and the largest
diagonal couplings $|g_{ij}|$.
Parameters | BP 1 | BP 2 | BP 3 | BP 4
---|---|---|---|---
$|\eta_{0}|$ | 0 | 0.118 | 4.79 | 7.67
${\rm Max.}\\{|g_{ii}|\\}$ | $1.2\times 10^{-14}$ | $5.8\times 10^{-15}$ | $1.8\times 10^{-16}$ | $2.8\times 10^{-17}$
$|g_{32}|$ | $3.3\times 10^{-14}$ | $8.9\times 10^{-16}$ | $4.5\times 10^{-17}$ | $6.2\times 10^{-18}$
$|g_{31}|$ | $4.0\times 10^{-14}$ | $1.4\times 10^{-15}$ | $4.1\times 10^{-17}$ | $4.9\times 10^{-18}$
$\tau_{\nu}$ [sec.] | $2.3\times 10^{14}$ | $2.4\times 10^{17}$ | $1.7\times 10^{20}$ | $1.0\times 10^{22}$
Table 2: Predictions for the largest diagonal coupling of neutrinos with
Majoron, off-diagonal couplings relevant for neutrino decays and the
corresponding neutrino lifetime for the benchmark solutions.
The neutrino lifetime turns out to be smaller than the age of the universe for
solution BP 1 and hence the stringent limit on the sum of neutrino masses does
not apply on this solutions as discussed earlier. The derived values of the
neutrino-Majoron couplings for all the benchmark solutions obey the limits Eq.
(65).
### V.2 Couplings with charged leptons
The chargino spectrum of the model consists of three pairs of the charged
lepton fields and pairs of charged wino and Higgsino. In the basis
$\psi_{+}=\left(e^{c}_{\alpha},-i\lambda^{+},h_{2}^{+}\right)^{T}$ and
$\psi_{-}=\left(e_{\alpha},-i\lambda^{-},h_{1}^{-}\right)^{T}$, the charged
fermion masses are given by
$-{\cal L}_{\cal C}=\psi_{-}^{T}\,{\cal M}_{\cal C}\,\psi_{+}\,+\,{\rm
h.c.}\,,$ (85)
with
${\cal M}_{\cal C}=\left(\begin{array}[]{cc}m_{l}&m_{lC}\\\
m_{lC}^{\prime}&M_{C}\end{array}\right)\,,$ (86)
and
$m_{l}=v_{1}\,{\rm
Diag.}\left(\lambda_{e}^{\prime},\lambda_{\mu}^{\prime},\lambda_{\tau}^{\prime}\right)\,,~{}~{}M_{C}=\left(\begin{array}[]{cc}M_{2}&gv_{2}\\\
gv_{1}&\mu\end{array}\right)\,,$ (87)
$m_{lC}=\left(\begin{array}[]{cc}g\omega^{\prime}_{e}&\epsilon_{e}\\\
g\omega^{\prime}_{\mu}&\epsilon_{\mu}\\\
g\omega^{\prime}_{\tau}&\epsilon_{\tau}\end{array}\right)\,,~{}~{}m_{lC}^{\prime}=\left(\begin{array}[]{ccc}0&0&0\\\
-\omega^{\prime}_{e}\lambda^{\prime}_{e}&-\omega^{\prime}_{\mu}\lambda^{\prime}_{\mu}&-\omega^{\prime}_{\tau}\lambda^{\prime}_{\tau}\end{array}\right)\,.$
(88)
From $W$ in Eq. (40) and gauge interactions, we get the following interaction
term involving the charged fermions and Majoron
$\displaystyle{\cal L}_{lJ}$ $\displaystyle=$
$\displaystyle\frac{i}{\sqrt{2}}\,\left(\lambda_{\mu}\,\mu\tilde{N}_{I\mu}+\lambda_{\tau}\,\tau\tilde{N}_{I\tau}\right)\tilde{h}_{2}^{+}+\frac{i}{\sqrt{2}}\left(\lambda^{\prime}_{\mu}\,\tilde{\nu}_{I\mu}\mu^{c}+\lambda^{\prime}_{\tau}\,\tilde{\nu}_{I\tau}\tau^{c}\right)\tilde{h}_{1}^{-}\,$
(89) $\displaystyle-$
$\displaystyle\frac{i}{\sqrt{2}}\,g\left(\tilde{\nu}_{I\mu}\,\mu+\tilde{\nu}_{I\tau}\,\tau\right)(-i\lambda^{+})\,+\,{\rm
h.c.}\,.$
The chargino-charged lepton mixing can be evaluated by block diagonalizing the
matrix ${\cal M}_{\cal C}$ given in Eq. (86). For $m_{l}<m_{lC}<M_{C}$, this
is done using the following leading order unitary matrices
$U_{+}=\left(\begin{array}[]{cc}1&(M_{C}^{-1}m_{lC}^{\prime})^{\dagger}\\\
-M_{C}^{-1}m_{lC}^{\prime}&1\end{array}\right)\,,~{}~{}U_{-}=\left(\begin{array}[]{cc}1&(m_{lC}M_{C}^{-1})^{*}\\\
-(m_{lC}M_{C}^{-1})^{T}&1\end{array}\right)\,.$ (90)
such that
$U_{-}^{T}\,{\cal M}_{\cal
C}\,U_{+}\approx\left(\begin{array}[]{cc}m_{l}-m_{lC}\,M_{C}^{-1}\,m_{lC}^{\prime}&0\\\
0&M_{C}\end{array}\right)\,.$ (91)
The fields $\tilde{h}_{2}^{+}$, $\lambda^{+}$ and $\tilde{h}_{1}^{-}$ can then
be written in the block diagonal basis of the charged leptons,
$e^{\prime}_{\alpha}$ and $e^{c\prime}_{\alpha}$, as
$\displaystyle h_{2}^{+}$ $\displaystyle=$
$\displaystyle-\left(M_{C}^{-1}m_{lC}^{\prime}\right)_{5\alpha}\,e^{c\prime}_{\alpha}=\frac{M_{2}}{M_{2}\mu-g^{2}v_{1}v_{2}}\,\omega^{\prime}_{\alpha}\lambda^{\prime}_{\alpha}\,e^{c\prime}_{\alpha}\,,$
$\displaystyle-i\lambda^{+}$ $\displaystyle=$
$\displaystyle-\left(M_{C}^{-1}m_{lC}^{\prime}\right)_{4\alpha}\,e^{c\prime}_{\alpha}=-\frac{gv_{2}}{M_{2}\mu-g^{2}v_{1}v_{2}}\,\omega^{\prime}_{\alpha}\lambda^{\prime}_{\alpha}\,e^{c\prime}_{\alpha}\,\,,$
$\displaystyle h_{1}^{-}$ $\displaystyle=$
$\displaystyle-\left((M_{C}^{-1})^{T}m_{lC}^{T}\right)_{5\alpha}\,e^{\prime}_{\alpha}=-\frac{M_{2}\epsilon_{\alpha}-g^{2}v_{2}\omega_{\alpha}^{\prime}}{M_{2}\mu-g^{2}v_{1}v_{2}}\,e^{\prime}_{\alpha}\,\,.$
(92)
Substitution of Eqs. (V.2,64) in Eq. (89) leads to
$-{\cal
L}_{lJ}=\frac{i}{\sqrt{2}}\frac{1}{Uv_{1}}\,\left(\omega^{\prime}_{\alpha}m_{\alpha}\xi_{\mu}\,\mu^{\prime}\,e^{c\prime}_{\alpha}+\omega_{\mu}m_{\mu}\xi_{\alpha}\,e^{\prime}_{\alpha}\,\mu^{c\prime}-(\mu\to\tau)\right)\,J\,+\,{\rm
h.c.}\,,$ (93)
where $m_{\alpha}\simeq v_{1}\lambda^{\prime}_{\alpha}$ are the charged lepton
masses, and
$\xi_{\alpha}=\frac{M_{2}\epsilon_{\alpha}-g^{2}v_{2}\omega^{\prime}_{\alpha}}{M_{2}\mu-g^{2}v_{1}v_{2}}\,.$
(94)
As can be seen from Eq. (91) the charged lepton mass matrix,
$M_{l}=m_{l}-m_{lC}\,M_{C}^{-1}m_{lC}^{\prime}$, in the block diagonal basis
is approximately diagonal since $m_{l}$ is diagonal. The primed fields and
corresponding physical states are related with each other by a unitary matrix
very close to the identity matrix. Hence, the Majoron dominantly couples to
the second and third generation charged leptons and its coupling to a pair of
electrons arises only through $e-\alpha$ mixing $U_{e\alpha}\approx{\cal
O}\left(\frac{\epsilon_{e}\lambda^{\prime}_{\alpha}\omega^{\prime}_{\alpha}}{m_{e}\mu}\right)$
induced by the seesaw correction $m_{lC}M_{C}^{-1}m^{\prime}_{lC}$.
We estimate the magnitude of the coupling appearing in Eq. (93) for the
benchmark solutions listed in Table 1. $\omega_{\alpha}^{\prime}$ can be
expressed in terms of the known parameters using Eqs. (34,36). For
$\mu,M_{2}\gg v$, one finds
$h_{\alpha\beta}\equiv\frac{\omega^{\prime}_{\alpha}m_{\alpha}\xi_{\beta}}{\sqrt{2}Uv_{1}}\simeq\left(k+\frac{v_{1}}{\mu}\right)\frac{m_{\alpha}\epsilon_{\alpha}\epsilon_{\beta}}{\sqrt{2}\,v_{1}\mu
U}\,.$ (95)
The magnitudes of the largest value of $h_{\alpha\beta}$ obtained for
different benchmark points are given in Table 3. These are consistent with the
experimental bounds given in Eq.(67).
Parameters | BP 1 | BP 2 | BP 3 | BP 4
---|---|---|---|---
${\rm Max.}\\{|h_{\alpha\beta}|\\}$ | $10^{-17}$ | $10^{-15}$ | $10^{-14}$ | $10^{-13}$
Table 3: Maximum value of charged leptons’ coupling with Majoron obtained for
the different benchmark solutions.
The strength of couplings is larger for solutions with the higher $U(1)$
breaking scale in contrast to neutrino-Majoron coupling. As mentioned earlier,
the coupling of Majoron with electrons will be further suppressed and will be
much smaller than $10^{-13}$ for all the solutions. This is in agreement with
the astrophysical bounds from red giant Raffelt and Weiss (1995); Ayala _et
al._ (2014) and SN 1987A Keil _et al._ (1997).
## VI Direct searches of pseudo-Goldstone fermion
In the standard seesaw models, the direct searches of heavy neutrinos
typically depend on production mechanisms which involve light-heavy neutrino
mixing. Therefore, the production cross section is suppressed for small
mixings between the active and sterile neutrinos Pilaftsis (1992). This
picture changes significantly in the present framework as the lightest RH
neutrino, which is a pseudo-Goldstone fermion, can be produced from the decays
of neutralinos Lavignac and Medina (2021). The production of Higgsino-like
neutralino state is governed by electroweak interactions and it is not
suppressed in general. The RH neutrinos mix with neutralinos through mass
mixing term $m_{\chi N}$ in Eq. (21). If this mixing is large enough then
$N_{1}$ is produced in the decays of Higgsinos. For $M_{N_{1}}\ll
m_{\chi^{0}}$, the produced heavy neutrino is boosted and its subsequent
decays into $W$ and charged leptons or $Z$ and light neutrinos give rise to
displaced vertex signature. Such a signature has a better visibility due to
less SM background and hence it improves significantly the prospects of
detecting the pGF. Note that the decays of $N_{1}$ in the visible particles
are still governed by the light-heavy neutrino mixing. The details of the
displaced vertex signature of pGF of this kind are recently discussed in
Lavignac and Medina (2021).
The parameter of primary interest here is the mixing between RH neutrinos and
neutralino. This can be estimated following the same procedure outlined in
section IV-A. One finds from Eq. (70), $N_{\alpha}=(\rho_{N\chi})_{\alpha
m}\,\psi_{0,m}$ with $m=7,..,10$. This leads to the following leading order
mixing between the RH neutrinos and neutralinos in the block-diagonal basis:
$\displaystyle N_{e}$ $\displaystyle\simeq$ $\displaystyle\frac{2\kappa
A_{0}vM_{1}M_{2}}{\mu(g^{2}M_{1}+g^{\prime
2}M_{2})}\,\left(\cos\beta\,\tilde{h}^{0}_{1}+\sin\beta\,\tilde{h}^{0}_{2}+\frac{g^{\prime}v}{\sqrt{2}M_{1}}\cos
2\beta\,\tilde{B}-\frac{gv}{\sqrt{2}M_{2}}\cos 2\beta\,\tilde{W^{0}}\right).$
(96)
We have neglected $\lambda_{\alpha}$ dependent terms in $m_{N\chi}$ while
deriving the above. $N_{\mu,\tau}$ do not contain any neutralino state at the
leading order. Substituting the above in Eq. (16), one can determine the
mixing between the pGF $N_{1}$ and neutralinos. As it can be seen, $N_{1}$ has
dominant mixing with the Higgsino states and they are obtained as
$\displaystyle V_{{N_{1}}\tilde{h}^{0}_{1}}$ $\displaystyle=$
$\displaystyle-\left(\frac{2A_{0}vM_{1}M_{2}}{\mu(g^{2}M_{1}+g^{\prime
2}M_{2})}\right)\,\kappa\epsilon\cos
2\phi\,\cos\beta\,\simeq\frac{v}{\mu}\kappa\epsilon\cos 2\phi\,\cos\beta\,,$
$\displaystyle V_{{N_{1}}\tilde{h}^{0}_{2}}$ $\displaystyle\simeq$
$\displaystyle\tan\beta\,V_{{N_{1}}\tilde{h}^{0}_{1}}\,,$ (97)
for $v\ll M_{1,2}$. This can be compared with the $N_{1}$-$\nu_{i}$ mixing
which can be read-off from similar expressions, Eq. (V.1), as
$V_{{N_{1}}{\nu_{i}}}=V_{{N_{1}}{\nu_{\alpha}}}\,U_{\alpha i}\,,$ (98)
where
$\displaystyle V_{{N_{1}}{\nu_{e}}}$ $\displaystyle\simeq$ $\displaystyle-
B_{0}\,\epsilon_{e}\cos 2\phi\,(1+\epsilon^{2})\,,$ $\displaystyle
V_{{N_{1}}{\nu_{\mu}}}$ $\displaystyle\simeq$ $\displaystyle-
B_{0}\,\epsilon_{\mu}\,(1-\epsilon^{2}\cos 2\phi)\,,$ $\displaystyle
V_{{N_{1}}{\nu_{\tau}}}$ $\displaystyle\simeq$ $\displaystyle
B_{0}\,\epsilon_{\tau}\,(1+\epsilon^{2}\cos 2\phi)\,.$ (99)
For $\kappa\sim{\cal O}(1)$, one finds
$|V_{{N_{1}}\tilde{h}^{0}_{1,2}}|\gg|V_{{N_{1}}{\nu_{i}}}|$ as the later is
suppressed by Yukawa couplings $\lambda_{\alpha}$. The estimated values of the
above mixing for the different benchmark solutions are listed in Table 4.
Parameters | BP 1 | BP 2 | BP 3 | BP 4
---|---|---|---|---
$\left|V_{{N_{1}}\tilde{h}^{0}_{1}}\right|$ | 0.013 | 0.0072 | 0.0007 | 0.0011
$\left|V_{{N_{1}}{\nu_{1}}}\right|$ | $1.6\times 10^{-6}$ | $2.6\times 10^{-6}$ | $2.7\times 10^{-8}$ | $6.4\times 10^{-8}$
$\left|V_{{N_{1}}{\nu_{2}}}\right|$ | $1.0\times 10^{-6}$ | $1.3\times 10^{-6}$ | $3.2\times 10^{-7}$ | $3.9\times 10^{-7}$
$\left|V_{{N_{1}}{\nu_{3}}}\right|$ | $2.5\times 10^{-6}$ | $4.7\times 10^{-7}$ | $1.1\times 10^{-7}$ | $2.6\times 10^{-7}$
Table 4: Estimated magnitudes of the pseudo-Goldstone fermion’s mixing with
Higgsino and light neutrinos for the benchmark solutions.
For the first two solutions, the obtained values of mixings are such that the
pGF with mass less than $200$ GeV can be detected through displaced vertex
signature at the LHC Lavignac and Medina (2021).
## VII Summary and Discussions
Possibility of a RH neutrino being a Goldstone fermion of a spontaneously
broken global $U(1)$ symmetry in the supersymmetric theories offers an
interesting opportunity to confirm or otherwise, the mechanism of neutrino
mass generation in direct search experiments. The singlet fermion is naturally
light with mass of the order of gravitino mass scale in minimal supergravity
like setup. Moreover, it can couple to some of the supersymmetric particles
with large enough couplings such that the former can be produced at colliders
through decays of the later. Investigating this general framework in detail,
we find that the observed neutrino mass spectrum severely restricts the nature
of $U(1)$ symmetry.
The light neutrino masses arise in the framework through the standard type I
seesaw mechanism as well as through the $R$-parity violating RH snuetrino
VEVs. Because of their common origin, these contributions are highly
correlated. It is shown that if all three families of the SM leptons have the
same $U(1)$ charge and the soft SUSY breaking terms are flavour universal then
two of the three light neutrinos remain massless despite the presence of more
than one sources of neutrino mass generation. One requires large flavour
violations in the soft sector to induce the solar neutrino mass scale with one
neutrino still remaining massless. We show that this picture changes
significantly when the underlying $U(1)$ is flavour dependent symmetry.
Considering a particular example of $L_{\mu}-L_{\tau}$ symmetry, it is shown
that viable neutrino masses and mixing can be obtained without introducing any
flavour violation in the soft sector.
The framework also contains a Majoron - the Goldstone boson of
$U(1)_{L_{\mu}-L_{\tau}}$. We derive its couplings with the SM leptons and
show that it couples weakly enough to evade the present constraints from
cosmology, the stellar cooling as well as the constraints from the flavour
violating decays of the charged leptons. Given this, and the fact that the
viable neutrino mass spectrum can be achieved without any explicit breaking of
$U(1)_{L_{\mu}-L_{\tau}}$, the Majoron can remain massless in the present
framework. Light neutrinos can also decay into Majoron in this case and we
find that the neutrino lifetime can be of the order of the age of universe or
smaller if the scale of $U(1)$ breaking is $\lesssim\,10^{4}$ GeV.
The nature of neutrino mass generation mechanism in this framework appears
similar to the one in $\mu\nu$SSM model Lopez-Fogliani and Munoz (2006);
Escudero _et al._ (2008); Ghosh and Roy (2009); Fidalgo _et al._ (2009). In
the later, the bilinear terms including the $\mu$ term are assumed to be
absent at the begining and they arise from the trilinear terms when RH
neutrinos take VEVs. Typically, the most general trilinear terms are
considered which explicitly violate the $U(1)$ lepton number. As a result,
both the Dirac and RH neutrino mass matrices take general form in $\mu\nu$SSM.
In contrast to this, the present framework uses a flavour dependent
combination of lepton number as a global symmetry which leads to highly
restricted forms of $m_{D}$ and $M_{N}$ and still gives viable explanation of
lepton spectrum. More importantly, the structure of the RH neutrino masses is
determined here from the combined requirement of the unbroken global
supersymmetry and the spontaneous violation of the $U(1)$ symmetry. The $U(1)$
symmetry protects the masses of a boson and its superpartner which is
identified as the lightest RH neutrino. The later receives mass from the local
SUSY breaking effects. A weak scale RH neutrino as pGF, therefore, naturally
emerge in this setup. Thus, the formalism presented here is more constrained
than the $\mu\nu$SSM. If $\mu_{0}=0$ set by some mechanism, this shift in VEVs
also generates a TeV scale $\mu$ parameter in the present framework in a
simlar way discussed recently in Dvali and Jankowsky (2020). In this case, one
typically finds $\mu\sim M_{N_{1}}\sim m_{3/2}$ and hence sub-TeV scale RH
neutrino may face strong constraints from non-observation of neutralinos
and/or charginos.
The existence of a pGF coupled to Higgsino and the charged leptons offers an
interesting possibility to search for this fermion at colliders through the
displaced vertex signal. It is shown that such a signal can be observed
Lavignac and Medina (2021) for the parameters of the model required to fit the
neutrino data.
## Acknowledgements
The work of KMP is partially supported by a research grant under INSPIRE
Faculty Award (DST/INSPIRE/04/2015/000508) from the Department of Science and
Technology, Government of India. The computational work reported in this paper
was performed on the High Performance Computing (HPC) resources (Vikram-100
HPC cluster) at the Physical Research Laboratory, Ahmedabad.
## Appendix A Sneutrino VEVs and $k$ factor
In this Appendix, we show the origin of Eq. (36) in the present framework. The
procedure is similar to the one carried out previously in Joshipura _et al._
(2002); Giudice _et al._ (1993). When the scalar components of
$\hat{N}_{\alpha}$ take VEVs, the bilinear terms in $W$ are given by
$W\supset-\,\epsilon_{\alpha}\,\hat{L}_{\alpha}\hat{H}_{2}\,-\,\mu\,\hat{H}_{1}\hat{H}_{2}\,.$
(100)
The $F$ and $D$ term potential evaluated from the above terms is
$\displaystyle V_{F,D}$ $\displaystyle=$
$\displaystyle\left|\mu\tilde{H}_{1}+\epsilon_{\alpha}\tilde{L}_{\alpha}\right|^{2}+\left(|\mu|^{2}+|\epsilon_{\alpha}|^{2}\right)|\tilde{H}_{2}|^{2}+\frac{1}{8}(g^{2}+g^{\prime
2})\left(|\tilde{H}_{1}|^{2}-|\tilde{H}_{2}|^{2}+|\tilde{L}_{\alpha}|^{2}\right)^{2},$
(101)
where index $\alpha$ is summed over. Further, the relevant soft terms can be
written as
$V_{\rm
soft}=m_{1}^{2}\,|\tilde{H}_{1}|^{2}+m_{2}^{2}\,|\tilde{H}_{2}|^{2}+m_{\alpha}^{2}\,|\tilde{L}_{\alpha}|^{2}+\left\\{B_{\mu}\,\mu\,\tilde{H}_{1}\tilde{H}_{2}+A_{\alpha}\,\epsilon_{\alpha}\,\tilde{L}_{\alpha}\tilde{H}_{2}+{\rm
h.c.}\right\\}\,.$ (102)
The term proportional to $\epsilon_{\alpha}$ form $W$ can be rotated away with
the following redefinitions of the fields
$\mu\hat{H}_{1}+\epsilon_{\alpha}\hat{L}_{\alpha}\to\mu\hat{H}_{1}\,,~{}~{}~{}~{}-\epsilon_{\alpha}\hat{H}_{1}+\mu\hat{L}_{\alpha}\to\mu\hat{L}_{\alpha}\,.$
(103)
In this new basis, $V_{F,D}$ does not contain terms involving
$\epsilon_{\alpha}$ while $V_{\rm soft}$ gets replaced by
$V_{\rm soft}\to V_{\rm
soft}\,-\,\left\\{\frac{\epsilon_{\alpha}}{\mu}(m_{1}^{2}-m_{\alpha}^{2})\,\tilde{H}_{1}^{\dagger}\tilde{L}_{\alpha}\,+\,\left(B_{\mu}-A_{\alpha}\right)\epsilon_{\alpha}\,\tilde{L}_{\alpha}\tilde{H}_{2}\,+{\rm
h.c.}\right\\}\,.$ (104)
In the new basis, the VEV of $\tilde{L}_{\alpha}$ is denoted by
$\omega_{\alpha}$. It is related to the VEV $\omega^{\prime}_{\alpha}$ in the
original basis by Eq. (34) as can be explicitly seen from Eq. (103). Using the
definition Eq. (36) and minimizing the full potential, we obtain
$k_{\alpha}\simeq\frac{v_{1}}{\mu}\frac{(m_{1}^{2}-m_{\alpha}^{2})-\mu\tan\beta\left(B_{\mu}-A_{\alpha}\right)}{m_{\alpha}^{2}+\frac{1}{2}M_{Z}^{2}\,\cos
2\beta}\,.$ (105)
The first term in $k_{\alpha}$ can be suppressed for universal soft masses,
however the difference $B_{\mu}-A_{\alpha}$ can be arbitrary and hence
$k_{\alpha}$ need not be small. For flavour universal soft terms,
$k_{\alpha}\equiv k$ can be universal at SUSY breaking mediation scale and
difference among $k_{\alpha}$ can arise through renormalization group
evolution.
## Appendix B On the size of 1-loop contributions to the neutrino masses
The resulting values of the tree level neutrino mass matrix $m_{\nu}^{(0)}$
and 1-loop corrected seesaw contribution $\delta m_{\nu}^{(1)}$ as defined in
Eqs. (43) and (60) are obtained for example, in case of solution BP 4 as
$\displaystyle m_{\nu}^{(0)}$ $\displaystyle=$
$\displaystyle\left(\begin{array}[]{ccc}5.84\,-0.319i&-8.379+0.932i&-6.071+0.675i\\\
-8.379+0.932i&-21.508-2.723i&-34.962-1.322i\\\
-6.071+0.675i&-34.962-1.322i&-11.29-1.429i\\\ \end{array}\right)\,{\rm
meV}\,,$ (109) $\displaystyle\delta m_{\nu}^{(1)}$ $\displaystyle=$
$\displaystyle\left(\begin{array}[]{ccc}11.491&-0.006&0.005\\\
-0.006&0.419&-0.298\\\ 0.005&-0.298&0.219\\\ \end{array}\right)\,{\rm meV}\,.$
(113)
The $(1,1)$ element of the neutrino mass matrix receives significant
correction from $\delta m_{\nu}^{(1)}$ while the other elements are dominantly
determined by tree level contribution. This characteristic has also been seen
in the other benchmark solutions listed in Table 1.
In the above, we considered 1-loop self-energy diagram of light neutrinos with
Higgs/$Z$ and RH neutrinos in the loop. In general, the neutrino masses also
receive corrections from SUSY particles in the loop. A comprehensive
discussion on such corrections is given in Dedes _et al._ (2006). We outline
these contributions and discuss their magnitudes in the context of our model.
1. 1.
Neutralino - $\tilde{\nu}_{R}$ loop: This contribution arises when both
Higgs/$Z$ and RH neutrinos are replaced by their SUSY partners in the self-
energy diagram. The contribution is $R$-parity conserving and it goes like
$(\delta
m_{\nu})_{\alpha\beta}\sim\frac{1}{16\pi^{2}}M_{N}\,\lambda_{\alpha}\lambda_{\beta}\,\left(B_{0}\left[m_{\nu}^{2},m_{\tilde{\nu}^{+}_{R}}^{2},M_{N}^{2}\right]-B_{0}\left[m_{\nu}^{2},m_{\tilde{\nu}^{-}_{R}}^{2},M_{N}^{2}\right]\right)\,,$
(114)
where $m_{\tilde{\nu}^{\pm}_{R}}$ are masses of CP even and odd RH sneutrinos.
We have used the general result derived in Dedes _et al._ (2006) to evaluate
the above contribution. Apparently, the above contribution depends on the mass
spectrum of sneutrinos and hence its complete determination would require
specification of the SUSY breaking mechanism. The contribution vanishes when
the RH sneutrinos are degenerate as can be seen from Eq. (114).
2. 2.
Neutralino-$H/Z$ loop: This arises when RH neutrino is replaced by neutralinos
in the loop considered initially. This contribution arises through R-parity
violating mixing between neutrino and neutralino and it goes as
$(\delta
m_{\nu})_{\alpha\beta}\sim\frac{1}{16\pi^{2}}M_{1}\,\left(\frac{\omega_{\alpha}\omega_{\beta}}{M_{1}^{2}}\right)\,\frac{m_{H/Z}^{2}}{M_{1}^{2}}\,\ln\frac{M_{1}^{2}}{m_{H/Z}^{2}}\,,$
(115)
where $\omega_{\alpha}=k\epsilon_{\alpha}$ as defined in Eq. (34) and $M_{1}$
is a common neutralino mass scale. With $M_{1}=1$ TeV and the values of
$\omega_{\alpha}$ obtained for solution BP 2, the largest magnitude of this
contribution is ${\cal O}(10^{-6})$ eV. Hence, it is sub-dominant in
comparison to loop corrected seesaw contribution given in Eq. (109).
3. 3.
Neutralino - $\tilde{\nu}_{L}$ loop: This contribution also depends on the
details of soft SUSY breaking sector. It vanishes for the degenerate masses of
CP even and odd $\tilde{\nu}^{\pm}_{L}$. However, in the presence of
$R$-parity violating soft terms, $\tilde{\nu}^{\pm}_{L}$ mix with the other CP
even and odd neutral scalars and the mass splitting between
$\tilde{\nu}^{\pm}_{L}$ eigenstates gets induced. The contribution to the
neutrino mass is approximated as Dedes _et al._ (2006)
$(\delta
m_{\nu})_{\alpha\beta}\sim\frac{1}{16\pi^{2}}M_{1}\,g^{2}\,\left(\frac{M_{1}}{m_{\tilde{\nu}_{L}}}\right)^{2}\,\frac{b_{\alpha}b_{\beta}\tan^{2}\beta}{(M_{N}^{2}-m_{\tilde{\nu}_{L}}^{2})^{2}}\,,$
(116)
where $b_{\alpha}=B\epsilon_{\alpha}$. For typical values of the parameters,
$M_{1}=1$ TeV, $m_{\tilde{\nu}_{L}}=2$ TeV, $\tan\beta=2$ and $b_{\alpha}=1.0$
GeV2, one obtains $\delta m_{\nu}\sim{\cal O}(10^{-5})$ eV.
4. 4.
Chargino-slepton loop: This contribution is also computed in Dedes _et al._
(2006) but assuming vanishing VEVs for sneutrinos. We estimate this
considering nonzero sneutrino VEVs and find that the dominant contribution is
given by
$(\delta
m_{\nu})_{\alpha\beta}\sim\frac{1}{16\pi^{2}}m_{l}\,\tan\beta\frac{\omega_{\alpha}}{M_{C}}\,\frac{b_{\beta}}{M_{H^{+}}^{2}}\,,$
(117)
where $m_{l}$ is charged lepton mass, $M_{2}$ is chargino mass. Another
similar contribution also arise when $b_{\beta}$ is replaced by
$\epsilon_{\beta}m_{l}$ in the above equation. These contributions are
suppressed for $\omega_{\alpha}\ll\epsilon_{\alpha}$. For typical values,
$M_{2}=1$ TeV, $M_{H^{+}}=2$ TeV, $\tan\beta=2$, $b_{\alpha}=1.0$ GeV2 and
$\omega_{\alpha}=k\epsilon_{\alpha}$, the largest contribution from Eq. (117)
for solution BP 2 is estimated as $\delta m_{\nu}\sim 10^{-8}$ eV which is
again negligibly small compared to the 1-loop seesaw corrected contribution.
Therefore, the 1-loop correction to the neutrino masses from the SUSY
particles in the loop is insignificant in comparison to the loop corrected
seesaw contribution that we have taken into consideration. The 2-loop
correction to the seesaw is expected to remain smaller than 1-loop
contribution as it is further suppressed by factor of
$\lambda^{2}_{\alpha}/(4\pi)^{2}$. Hence, the results and predictions for the
various observable parameters that we have derived using $m_{\nu}$ as given in
Eq. (25) are robust.
## Appendix C Neutrino spectrum with $\kappa=0$
In this Appendix, we show the same results as displayed in Tables 1, 2 and 3
but for vanishingly small $\kappa$ and $\tan\beta=1.5$. These cases correspond
to vanishingly small mixing between neutralino and RH neutrinos. As it can be
seen, one can reproduce neutrino mass spectrum consistent with all the current
experimental bounds in this case as well. For BP 6 and BP 7, the predicted
value of the sum of light neutrino masses is larger than the current Planck
limit. However, the neutrino lifetime obtained in these cases are shorter than
the age of the universe as it can be seen from the corresponding values in
Table 6. Hence, these solutions can evade the Planck constraint Chacko _et
al._ (2020) as discussed in section IV.
Parameters | BP 5 | BP 6 | BP 7 | BP 8
---|---|---|---|---
$U$ [GeV] | $10^{3}$ | $10^{4}$ | $10^{5}$ | $10^{6}$
$\kappa$ | $0$ | $0$ | $0$ | $0$
$\lambda$ | $-0.1+0.0004\,i$ | $0.1168-0.0013\,i$ | $-0.9998-0.3\,i$ | $0.2973+0.0891\,i$
$\epsilon$ | 0.0139 | -0.0377 | -0.0015 | -0.0007
$\phi$ | -0.7764 | 2.1609 | -2.1093 | 1.7723
$\lambda_{\tau}$ | $7.59\times 10^{-8}$ | $5.031\times 10^{-7}$ | $4.261\times 10^{-7}$ | $9.032\times 10^{-7}$
$r_{\mu}$ | 1.0749 | 0.7156 | -0.8108 | 0.2771
$r_{e}$ | -43.4421 | -11.7682 | 85.9164 | 64.9009
$k$ | 4.2802 | 0.082 | 0.0118 | 0.0014
$\Delta m^{2}_{21}$ [$10^{-5}$ eV2] | $7.43$ | 7.43 | 7.42 | 7.42
$\Delta m^{2}_{31}$ [$10^{-3}$ eV2] | $2.513$ | 2.515 | 2.517 | 2.517
$\sin^{2}\theta_{12}$ | 0.309 | 0.303 | 0.304 | 0.304
$\sin^{2}\theta_{23}$ | 0.6 | 0.596 | 0.573 | 0.573
$\sin^{2}\theta_{13}$ | 0.0221 | 0.0221 | 0.0222 | 0.0222
$\sin\delta_{\rm CP}$ | -0.14 | -0.42 | -0.29 | -0.29
$\sum m_{\nu_{i}}$ [eV] | 0.252 | 0.23 | 0.093 | 0.093
$|m_{\beta\beta}|$ [eV] | 0.079 | 0.071 | 0.02 | 0.02
$M_{N_{1}}$ [GeV] | 1.39 | 40.7 | 133.4 | 91.2
$M_{N_{2}}$ [GeV] | 99.31 | 1147 | 104317 | 310266
$M_{N_{3}}$ [GeV] | 100.7 | 1188 | 104451 | 310357
Table 5: Same as Table 1 but with $\kappa=0$. Parameters | BP 5 | BP 6 | BP 7 | BP 8
---|---|---|---|---
$|\eta_{0}|$ | 0.341 | 0.366 | 2.497 | 2.495
${\rm Max.}\\{|g_{ii}|\\}$ | $1.5\times 10^{-14}$ | $1.4\times 10^{-15}$ | $1.2\times 10^{-16}$ | $1.2\times 10^{-17}$
$|g_{32}|$ | $5.9\times 10^{-14}$ | $5.9\times 10^{-15}$ | $1.4\times 10^{-17}$ | $1.4\times 10^{-18}$
$|g_{31}|$ | $6.7\times 10^{-14}$ | $6.0\times 10^{-15}$ | $3.1\times 10^{-18}$ | $3.1\times 10^{-19}$
$\tau_{\nu}$ [sec.] | $9.1\times 10^{13}$ | $9.9\times 10^{15}$ | $3.2\times 10^{21}$ | $3.2\times 10^{23}$
Table 6: Same as Table 2 but with $\kappa=0$. Parameters | BP 5 | BP 6 | BP 7 | BP 8
---|---|---|---|---
${\rm Max.}\\{|h_{\alpha\beta}|\\}$ | $10^{-16}$ | $10^{-15}$ | $10^{-14}$ | $10^{-13}$
Table 7: Same as Table 3 but with $\kappa=0$.
## References
* Minkowski (1977) Peter Minkowski, “$\mu\to e\gamma$ at a Rate of One Out of $10^{9}$ Muon Decays?” Phys. Lett. B 67, 421–428 (1977).
* Yanagida (1979) Tsutomu Yanagida, “Horizontal gauge symmetry and masses of neutrinos,” Conf. Proc. C 7902131, 95–99 (1979).
* Mohapatra and Senjanovic (1980) Rabindra N. Mohapatra and Goran Senjanovic, “Neutrino Mass and Spontaneous Parity Nonconservation,” Phys. Rev. Lett. 44, 912 (1980).
* Schechter and Valle (1980) J. Schechter and J. W. F. Valle, “Neutrino masses in su(2) $\bigotimes$ u(1) theories,” Phys. Rev. D 22, 2227–2235 (1980).
* Fritzsch and Minkowski (1975) Harald Fritzsch and Peter Minkowski, “Unified Interactions of Leptons and Hadrons,” Annals Phys. 93, 193–266 (1975).
* Gell-Mann _et al._ (1979) Murray Gell-Mann, Pierre Ramond, and Richard Slansky, “Complex Spinors and Unified Theories,” Conf. Proc. C 790927, 315–321 (1979), arXiv:1306.4669 [hep-th] .
* Chun _et al._ (1995) E. J. Chun, Anjan S. Joshipura, and A. Yu. Smirnov, “Models of light singlet fermion and neutrino phenomenology,” Phys. Lett. B 357, 608–615 (1995), arXiv:hep-ph/9505275 .
* Chun _et al._ (1996) Eung Jin Chun, Anjan S. Joshipura, and Alexei Yu. Smirnov, “QuasiGoldstone fermion as a sterile neutrino,” Phys. Rev. D 54, 4654–4661 (1996), arXiv:hep-ph/9507371 .
* Barbier _et al._ (2005) R. Barbier _et al._ , “R-parity violating supersymmetry,” Phys. Rept. 420, 1–202 (2005), arXiv:hep-ph/0406039 .
* Deppisch _et al._ (2015) Frank F. Deppisch, P. S. Bhupal Dev, and Apostolos Pilaftsis, “Neutrinos and Collider Physics,” New J. Phys. 17, 075019 (2015), arXiv:1502.06541 [hep-ph] .
* Kersten and Smirnov (2007) Jörn Kersten and Alexei Yu. Smirnov, “Right-Handed Neutrinos at CERN LHC and the Mechanism of Neutrino Mass Generation,” Phys. Rev. D 76, 073005 (2007), arXiv:0705.3221 [hep-ph] .
* Lee _et al._ (2013) Chang-Hun Lee, P. S. Bhupal Dev, and R. N. Mohapatra, “Natural TeV-scale left-right seesaw mechanism for neutrinos and experimental tests,” Phys. Rev. D 88, 093010 (2013), arXiv:1309.0774 [hep-ph] .
* Chattopadhyay and Patel (2017) Pratik Chattopadhyay and Ketan M. Patel, “Discrete symmetries for electroweak natural type-I seesaw mechanism,” Nucl. Phys. B 921, 487–506 (2017), arXiv:1703.09541 [hep-ph] .
* Lavignac and Medina (2021) Stéphane Lavignac and Anibal D. Medina, “Displaced Vertex signatures of a pseudo-Goldstone sterile neutrino,” JHEP 01, 151 (2021), arXiv:2010.00608 [hep-ph] .
* Chikashige _et al._ (1981) Y. Chikashige, Rabindra N. Mohapatra, and R. D. Peccei, “Are There Real Goldstone Bosons Associated with Broken Lepton Number?” Phys. Lett. B 98, 265–268 (1981).
* Goto and Yamaguchi (1992) Toru Goto and Masahiro Yamaguchi, “Is axino dark matter possible in supergravity?” Phys. Lett. B 276, 103–107 (1992).
* Chun _et al._ (1992) E. J. Chun, Jihn E. Kim, and Hans Peter Nilles, “Axino mass,” Phys. Lett. B 287, 123–127 (1992), arXiv:hep-ph/9205229 .
* Chun and Lukas (1995) E. J. Chun and A. Lukas, “Axino mass in supergravity models,” Phys. Lett. B 357, 43–50 (1995), arXiv:hep-ph/9503233 .
* Lahanas and Nanopoulos (1987) A. B. Lahanas and Dimitri V. Nanopoulos, “The Road to No Scale Supergravity,” Phys. Rept. 145, 1 (1987).
* Joshipura _et al._ (2002) Anjan S. Joshipura, Rishikesh D. Vaidya, and Sudhir K. Vempati, “Bi maximal mixing and bilinear R violation,” Nucl. Phys. B 639, 290–306 (2002), arXiv:hep-ph/0203182 .
* Romao _et al._ (2000) J. C. Romao, M. A. Diaz, M. Hirsch, W. Porod, and J. W. F Valle, “A Supersymmetric solution to the solar and atmospheric neutrino problems,” Phys. Rev. D 61, 071703 (2000), arXiv:hep-ph/9907499 .
* Hirsch _et al._ (2000) M. Hirsch, M. A. Diaz, W. Porod, J. C. Romao, and J. W. F. Valle, “Neutrino masses and mixings from supersymmetry with bilinear R parity violation: A Theory for solar and atmospheric neutrino oscillations,” Phys. Rev. D 62, 113008 (2000), [Erratum: Phys.Rev.D 65, 119901 (2002)], arXiv:hep-ph/0004115 .
* Esteban _et al._ (2020) Ivan Esteban, M. C. Gonzalez-Garcia, Michele Maltoni, Thomas Schwetz, and Albert Zhou, “The fate of hints: updated global analysis of three-flavor neutrino oscillations,” JHEP 09, 178 (2020), arXiv:2007.14792 [hep-ph] .
* Grimus and Lavoura (2002) Walter Grimus and Luis Lavoura, “One-loop corrections to the seesaw mechanism in the multi-Higgs-doublet standard model,” Phys. Lett. B 546, 86–95 (2002), arXiv:hep-ph/0207229 .
* Aristizabal Sierra and Yaguna (2011) D. Aristizabal Sierra and Carlos E. Yaguna, “On the importance of the 1-loop finite corrections to seesaw neutrino masses,” JHEP 08, 013 (2011), arXiv:1106.3587 [hep-ph] .
* Zyla _et al._ (2020) P.A. Zyla _et al._ (Particle Data Group), “Review of Particle Physics,” PTEP 2020, 083C01 (2020).
* Dolinski _et al._ (2019) Michelle J. Dolinski, Alan W. P. Poon, and Werner Rodejohann, “Neutrinoless Double-Beta Decay: Status and Prospects,” Ann. Rev. Nucl. Part. Sci. 69, 219–251 (2019), arXiv:1902.04097 [nucl-ex] .
* Aghanim _et al._ (2020) N. Aghanim _et al._ (Planck), “Planck 2018 results. VI. Cosmological parameters,” Astron. Astrophys. 641, A6 (2020), arXiv:1807.06209 [astro-ph.CO] .
* Vagnozzi _et al._ (2017) Sunny Vagnozzi, Elena Giusarma, Olga Mena, Katherine Freese, Martina Gerbino, Shirley Ho, and Massimiliano Lattanzi, “Unveiling $\nu$ secrets with cosmological data: neutrino masses and mass hierarchy,” Phys. Rev. D 96, 123503 (2017), arXiv:1701.08172 [astro-ph.CO] .
* Chacko _et al._ (2020) Zackaria Chacko, Abhish Dev, Peizhi Du, Vivian Poulin, and Yuhsin Tsai, “Cosmological Limits on the Neutrino Mass and Lifetime,” JHEP 04, 020 (2020), arXiv:1909.05275 [hep-ph] .
* Vagnozzi _et al._ (2018) Sunny Vagnozzi, Suhail Dhawan, Martina Gerbino, Katherine Freese, Ariel Goobar, and Olga Mena, “Constraints on the sum of the neutrino masses in dynamical dark energy models with $w(z)\geq-1$ are tighter than those obtained in $\Lambda$CDM,” Phys. Rev. D 98, 083501 (2018), arXiv:1801.08553 [astro-ph.CO] .
* Aad _et al._ (2015) Georges Aad _et al._ (ATLAS), “Search for heavy Majorana neutrinos with the ATLAS detector in pp collisions at $\sqrt{s}=8$ TeV,” JHEP 07, 162 (2015), arXiv:1506.06020 [hep-ex] .
* Khachatryan _et al._ (2015) Vardan Khachatryan _et al._ (CMS), “Search for heavy Majorana neutrinos in $\mu^{\pm}\mu^{\pm}+$ jets events in proton-proton collisions at $\sqrt{s}$ = 8 TeV,” Phys. Lett. B 748, 144–166 (2015), arXiv:1501.05566 [hep-ex] .
* Khachatryan _et al._ (2016) Vardan Khachatryan _et al._ (CMS), “Search for heavy Majorana neutrinos in e±e±\+ jets and e± $\mu^{\textpm}$\+ jets events in proton-proton collisions at $\sqrt{s}=8$ TeV,” JHEP 04, 169 (2016), arXiv:1603.02248 [hep-ex] .
* Hannestad and Raffelt (2005) Steen Hannestad and Georg Raffelt, “Constraining invisible neutrino decays with the cosmic microwave background,” Phys. Rev. D 72, 103514 (2005), arXiv:hep-ph/0509278 .
* Raffelt and Weiss (1995) Georg Raffelt and Achim Weiss, “Red giant bound on the axion - electron coupling revisited,” Phys. Rev. D 51, 1495–1498 (1995), arXiv:hep-ph/9410205 .
* Ayala _et al._ (2014) Adrian Ayala, Inma Domínguez, Maurizio Giannotti, Alessandro Mirizzi, and Oscar Straniero, “Revisiting the bound on axion-photon coupling from Globular Clusters,” Phys. Rev. Lett. 113, 191302 (2014), arXiv:1406.6053 [astro-ph.SR] .
* Jodidio _et al._ (1986) A. Jodidio, B. Balke, J. Carr, G. Gidal, K. A. Shinsky, H. M. Steiner, D. P. Stoker, M. Strovink, R. D. Tripp, B. Gobbi, and C. J. Oram, “Search for right-handed currents in muon decay,” Phys. Rev. D 34, 1967–1990 (1986).
* Albrecht _et al._ (1995) H. Albrecht _et al._ (ARGUS), “A Search for lepton flavor violating decays tau $\to$ e alpha, tau $\to$ mu alpha,” Z. Phys. C 68, 25–28 (1995).
* Keil _et al._ (1997) Wolfgang Keil, Hans-Thomas Janka, David N. Schramm, Gunter Sigl, Michael S. Turner, and John R. Ellis, “A Fresh look at axions and SN-1987A,” Phys. Rev. D 56, 2419–2432 (1997), arXiv:astro-ph/9612222 .
* Pilaftsis (1992) Apostolos Pilaftsis, “Radiatively induced neutrino masses and large Higgs neutrino couplings in the standard model with Majorana fields,” Z. Phys. C 55, 275–282 (1992), arXiv:hep-ph/9901206 .
* Lopez-Fogliani and Munoz (2006) D. E. Lopez-Fogliani and C. Munoz, “Proposal for a Supersymmetric Standard Model,” Phys. Rev. Lett. 97, 041801 (2006), arXiv:hep-ph/0508297 .
* Escudero _et al._ (2008) Nicolas Escudero, Daniel E. Lopez-Fogliani, Carlos Munoz, and Roberto Ruiz de Austri, “Analysis of the parameter space and spectrum of the mu nu SSM,” JHEP 12, 099 (2008), arXiv:0810.1507 [hep-ph] .
* Ghosh and Roy (2009) Pradipta Ghosh and Sourov Roy, “Neutrino masses and mixing, lightest neutralino decays and a solution to the mu problem in supersymmetry,” JHEP 04, 069 (2009), arXiv:0812.0084 [hep-ph] .
* Fidalgo _et al._ (2009) Javier Fidalgo, Daniel E. Lopez-Fogliani, Carlos Munoz, and R. Ruiz de Austri, “Neutrino Physics and Spontaneous CP Violation in the mu nu SSM,” JHEP 08, 105 (2009), arXiv:0904.3112 [hep-ph] .
* Dvali and Jankowsky (2020) Gia Dvali and Anna Jankowsky, “Absence of $\mu$-Problem in Grand Unification,” (2020), arXiv:2009.07762 [hep-ph] .
* Giudice _et al._ (1993) G. F. Giudice, A. Masiero, M. Pietroni, and A. Riotto, “The Supersymmetric singlet majoron,” Nucl. Phys. B 396, 243–260 (1993), arXiv:hep-ph/9209296 .
* Dedes _et al._ (2006) Athanasios Dedes, Steven Rimmer, and Janusz Rosiek, “Neutrino masses in the lepton number violating MSSM,” JHEP 08, 005 (2006), arXiv:hep-ph/0603225 .
| arxiv-papers | 2021-07-27T13:20:56 | 2024-09-04T03:07:21.605646 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Anjan S. Joshipura, Ketan M. Patel",
"submitter": "Ketan Patel",
"url": "https://arxiv.org/abs/2107.12802"
} |
2107.12803 | # Dipolar Ising Model: Phases, Growth Laws and Universality
Shikha Kumari Sanjay Puri School of Physical Sciences, Jawaharlal Nehru
University, New Delhi - 110067, India Varsha Banerjee Department of Physics,
Indian Institute of Technology Delhi, New Delhi - 110016, India
###### Abstract
The behavior of many magnetic and dielectric solids, and the more contemporary
magnetic super-lattices, is governed by dipolar interactions. They are
anisotropic and long-ranged, having varied consequences ranging from ground
states with complicated magnetic order to the presence of glassy dynamics
characterized by a plethora of relaxation times. These systems are well-
captured by the dipolar Ising model (DIM) with nearest-neighbor exchange
interactions ($J$) and long-range dipolar interactions ($D$). Depending on the
relative interaction strength $\Gamma=J/D$, there are four phases of distinct
magnetic order and symmetry. Using Monte Carlo simulations, we perform deep
quenches to study domain growth or coarsening in the $d=3$ DIM. This important
non-equilibrium phenomenon has not been addressed as dipolar interactions are
notoriously difficult to handle theoretically. Our study reveals that, in
spite of the anisotropy in interactions and diversity in ground state
configurations, we observe universality in the ordering dynamics of all
phases.
## I Introduction
Dipolar interactions are prevalent in magnetic and dielectric solids composed
of rare-earths and transition metals Kretschmer and Binder (1979); Merz
(1954); Molnar et al. (1997); Chakraborty et al. (2004); Chamberlain and
Corruccini (2005); Biltmo and Henelius (2009); Wu et al. (2017); Cai et al.
(2019). They are anisotropic and long-ranged, and arise from nuclear magnetic
moments in alkali hydrides and solid ${}^{3}He$, electron magnetic moments in
rare earth fluorides, chlorides and hydroxides, electric dipole moments in
ferroelectric and anti-ferroelectric structures, etc. A large class of these
compounds is well-described by the nearest-neighbor (nn) Ising model with
dipolar interactions or the dipolar Ising model (DIM). For $N$ Ising spins on
a $d$-dimensional cubic lattice with sites labeled by $i$, the Hamiltonian is
given by
$\mathcal{H}=-J\sum_{\langle
ij\rangle}\sigma_{i}\sigma_{j}-D\sum_{\begin{subarray}{c}{i,j}\\\ i\neq
j\end{subarray}}\left(\frac{3\cos^{2}{\theta}_{ij}-1}{r_{ij}^{3}}\right)\sigma_{i}\sigma_{j},\quad\sigma_{i}=\pm
1.$ (1)
The first term on the right-hand-side is the contribution from the nn exchange
energy. The parameter $J$ represents the interaction strength, and favors
ferromagnetic (antiferromagnetic) alignment of spins for $J>0$ ($J<0$). The
second term is the contribution from the dipole-dipole interactions, whose
strength is given by $D=\mu^{2}/a^{3}$. Here, $\mu$ is the dipole moment of
the spin, and $a$ is the spacing between nn sites of the underlying lattice.
Further, $\vec{r}_{ij}$ is a vector joining sites $i$ and $j$ in units of
lattice spacing $a$, and $\theta_{ij}$ is the angle made by $\vec{r}_{ij}$
with the Ising axis ($z$-axis). The presence of $r_{ij}^{3}$ in the
denominator makes dipolar interactions long-ranged due to which spin-spin
interactions are significant up to multiple lattice spacings. Consequently,
the sum in the second term extends over all spin pairs. In addition to being
long-ranged, the dipolar interactions are anisotropic, fluctuating in sign and
strongly influenced by the underlying lattice structure. The
$\theta_{ij}$-dependence implies that dipolar interactions can be zero,
positive or negative – depending on the positions of the spins $i$ and $j$.
For a reference spin $i$, the interaction with spin $j$ is zero for
$3\cos^{2}{\theta}_{ij}-1=0$, antiferromagnetic for
$$55\text{\,}\mathrm{\SIUnitSymbolDegree}$<\theta_{ij}<$125\text{\,}\mathrm{\SIUnitSymbolDegree}$$,
and ferromagnetic for other values. Therefore, a ferromagnetic alignment of
spins is favored along the $z$-direction, but domain walls are preferred along
the $xy$-plane.
A phase diagram of the DIM was obtained by Kretschmer and Binder for a simple
cubic lattice $(L^{3},\ L=6,8)$ using Monte Carlo (MC) simulations Kretschmer
and Binder (1979). The interplay of the nn exchange interactions and the
complicated dipolar interactions reveals rich phase behavior. The phase
diagram in Fig. 1 has been obtained by varying $J,T$ with fixed $D=1$.
Depending on the relative interaction strength $\Gamma=J/D$, the system
exhibits four phases with distinct magnetic order and symmetry:
(I) For $\Gamma<-1.338$, the nn exchange interaction with $J<0$ dominates over
the dipolar term. As expected, the ground state (GS) is an antiferromagnet
(AFM).
(II) For $-1.338<\Gamma<0.127$, the dipolar term dominates over the nn
exchange interaction. The ground state is anisotropic and consists of
ferromagnetic columns along the $z$-axis arranged antiferromagnetically in the
$xy$-plane. We refer to this GS as a columnar antiferromagnet (CAFM).
(III) For $0.127<\Gamma<0.164$, the nn exchange favors ferromagnetic alignment
and the dipolar interaction continues to dominate. The GS structure changes to
a layered antiferromagnet (LAFM) with a two-component order parameter.
(IV) For $\Gamma>0.164$, the exchange interactions are dominant and the GS is
a ferromagnet (FM).
It is interesting to note the systematic transition from the AFM phase to the
FM phase via the onset of ferromagnetic alignment – first along a single-site
one-dimensional column (CAFM), then along a two-dimensional layer (LAFM) and
finally . The lower panel depicts the corresponding ground state (GS)
configurations for each phase. The symmetry of the Hamiltonian under
$\sigma_{i}\rightarrow-\sigma_{i}$ spins results in degenerate GS. The
degeneracy is two for Phases I, II, IV, and four for Phase III. The
equilibrium states for a given value of $\Gamma$ at non-zero $T$ will be
combinations of the corresponding degenerate GS, separated by frustrated spins
due to conflicting interactions. The free energy landscape is complex with
several local minima, especially in the dipolar-dominated regimes.
A large number of experimental realizations of the DIM indeed exhibit a non-
trivial organization of dipoles in the (so-called) equilibrium phase. For
example, magnetic measurements of rare earth hydroxides reveal FM ordering for
$\text{Tb(OH)}_{3}$, $\text{Dy(OH)}_{3}$ and $\text{Ho(OH)}_{3}$, and a
complex AFM ordering for $\text{Nd(OH)}_{3}$ and $\text{Gd(OH)}_{3}$ Wolf et
al. (1968). Amongst rare-earth fluorides, LiHoF4 and LiTbF4 exhibit FM
ordering, while LiErF4 shows AFM ordering Battison et al. (1975); Biltmo and
Henelius (2009); Holmes et al. (1973); Beauvillain et al. (1977). Similar
observations have been made in the context of rare earth ethyl sulphates Cooke
et al. (1959), rare earth perovskites Wu et al. (2017, 2019), and rare earth
garnets Cai et al. (2019). The above examples have captured much attention in
modern solid state physics and materials science because they exhibit
interesting magnetic, multiferroic, and optical effects. Some of these
systems, due to their low critical temperatures, are also realizations of
quantum Hamiltonians and exhibit phase transitions driven by quantum
fluctuations Bitko et al. (1996); Schechter and Stamp (2005). The presence of
a glassy phase due to frustrated moments arising from conflicting FM and AFM
interactions has also been seriously contemplated Piatek et al. (2013);
Andresen et al. (2014); Alonso and Allés (2017). Recent inclusions in the
family of dipolar solids are self-assembled super-lattices of mono-disperse
magnetic nanoparticles such as ferric oxide (Fe2O3) or magnetite (Fe3O4) Bae
et al. (2007); Singh et al. (2014). They exhibit a rich phase diagram
revealing a variety of stable structures such as hexagonal close-packed, face
centered cubic, spherical, cylindrical, etc Talapin et al. (2007); Boles et
al. (2016). Complex and almost perfect geometric ordering of the nano-dipoles
has also been observed in microscopy snapshots Taheri et al. (2015). Both
these observations have been interpreted in the context of dipolar
interactions between individual particles.
Laboratory experiments generally require application of external fields that
drive the system out-of-equilibrium. The system re-equilibrates, and the
approach to equilibrium critically depends on the free energy landscape. An
important non-equilibrium study in this context is the kinetics of domain
growth or phase ordering, initiated by a sudden quench of the system from the
disordered phase to the ordered phase Puri and Wadhawan (2009). The subsequent
domain growth or coarsening, characterized by a growing length scale
$\ell(t)$, is monitored with time. The growth law reveals details of the free
energy landscape and relaxation time-scales Lai et al. (1988). For example,
pure and isotropic systems with non-conserved kinetics such as the Ising model
($D=0$) obey the Lifshitz-Allen-Cahn (LAC) law: $\ell(t)\sim t^{1/2}$ Lifshitz
(1962); Allen and Cahn (1979). It is characteristic of systems with no energy
barriers to coarsening and a unique relaxation time-scale. Systems with
complicated free energy landscape due to disorder and competing interactions
have a plethora of relaxation time-scales Binder and Young (1986); Fischer and
Hertz (1991); Janke (2008); Ros et al. (2019). The interfaces are usually
rough fractals, and the barriers to coarsening grow as a power law of the
domain size Villain (1984); Shrivastav et al. (2011, 2014). Domain growth in
these systems exhibits logarithmic behavior in the asymptotic limit Corberi et
al. (2012).
In spite of its wide-ranging presence, there are only a few studies of the DIM
in $d=3$, and non-equilibrium phenomena are even less addressed Bupathy et al.
(2017, 2018). This is primarily because handling long-ranged interactions is
notoriously difficult, both analytically and computationally. Thus challenged,
we were motivated to develop theoretical techniques to study the DIM. In a
benchmarking study, we investigated coarsening via large-scale Monte Carlo
(MC) simulations on cubic lattices $(L=128)$ using Ewald summation procedures
to accurately handle the long-range dipolar interactions Bupathy et al.
(2017). We investigated their effect on growth laws in the FM phase for a
limited range of $\Gamma$ values $(\gtrsim 0.16)$. Encouraged by the unusual
observation of anisotropic growth laws in this simplest phase, we now
undertake the task of exploring the entire phase diagram. Our investigations
are guided by the following questions: Are the growth laws distinct in the
four phases or are they universal? What information can we obtain about the
energy landscapes of the four phases? Is the system characterized by a
universal scaling behavior or is it phase specific? Does the complexity and
frustration introduced by dipolar interactions yield rough fractal interfaces?
There are two important results in our paper. Our first finding is that,
although the equilibrium states in the four phases have distinct symmetry and
the interactions are anisotropic, the system obeys the LAC domain growth law
$\ell(t)\sim t^{1/2}$ across phases and directions. The growth exponent $1/2$
is universal for the DIM. The second important result is that the two-point
equal-time correlation function that quantifies domain growth exhibits
generalized scaling in all phases:
$C\left(x,y,z,t\right)=g(\rho/\ell_{\rho},z/\ell_{z})$, where $\rho$ is the
radial coordinate in the $xy$-plane. The coarsening system is thus
characterized by unique but distinct length-scales along $xy$ and $z$
directions. The scaling function in both directions is universal, and can be
approximated by the well-known Ohta-Jasnow-Kawasaki (OJK) function Ohta et al.
(1982); Puri and Wadhawan (2009). The rest of the paper is organized as
follows. In Section 2, we present detailed numerical results on coarsening in
phases 1-4 of the DIM. Section 3 provides a summary and discussion.
## II Coarsening Studies
We now proceed to present detailed results from our studies of coarsening.
These studies use local single-spin flip moves which are computationally
expensive in contrast to the cluster algorithms often used for equilibrium
studies. Further, in systems with long-range dipolar interactions, spins
separated by multiple lattice spacings also contribute to the energy. An
explicit evaluation of the latter is only possible for small systems as the
number of computations scales as $O(N^{2})$. A successful procedure for
dealing with long-range interactions is the Ewald summation technique Frenkel
and Smit (1996). The basic idea here is to write the potential in two parts
using the identity:
$\dfrac{1}{r^{3}}=\dfrac{f(r)}{r^{3}}+\dfrac{1-f(r)}{r^{3}}.$ (2)
Here, $f(r)$ is an appropriate splitting function with the following
properties: (i) The first part is negligible beyond a certain cutoff $r_{\rm
cut}$ so that the summation up to this cutoff is a good approximation of this
contribution to the total energy. (ii) The second part is a slowly varying
function for all $r$ so that its Fourier transform can be represented by only
a few $k$-vectors with $|k|\leq k_{\rm cut}=2\pi/r_{\rm cut}$. Therefore, this
part can be efficiently evaluated in reciprocal space. There are many choices
of $f(r)$ that satisfy the above two conditions, but the usual choice is a
complementary error function:
$\text{erfc}(r)=\dfrac{2}{\sqrt{\pi}}\int_{r}^{\infty}e^{-t^{2}}dt.$ (3)
In particular, we use $f(r)=\text{erfc}(\sqrt{\eta}~{}r)$, where the Ewald
splitting parameter $\eta$ decides the relative weights of the real and
Fourier terms. By a suitable choice of $\eta$, we can optimize the computation
time for a specified error bound. An excellent discussion of this procedure is
found in Ref. Holm (2004).
Using cubic systems of up to $128^{3}$ spins, we performed deep quenches to
$T=0.5\ T_{c}(\Gamma)$ in the ordered phase. The quench locations are marked
in the phase diagram in Fig. 1. The initial state for all quenches was chosen
to be a random configuration of $\sigma_{i}=\pm 1$ corresponding to the
disordered (paramagnetic) phase. The Ewald summation technique with metallic
boundary conditions was used to compute the dipolar term of Eq. (1) Frenkel
and Smit (1996) . We chose the Ewald splitting parameter $\eta=0.032$, which
yields an error of $\delta=10^{-3}$ in the evaluation of the dipolar term. We
also performed simulations designed to yield an error of $\delta=10^{-4}$ on
smaller lattices. This did not alter the growth laws obtained with
$\delta=10^{-3}$ for larger lattices.
The system evolution was studied using spin-flip Glauber dynamics with the
standard Metropolis procedure up to 1024 MC steps (MCS). In each phase, the
acceptance rate (fraction of spins flipped in 1 MCS) decreases exponentially
with time. In Table 1, we show typical values of the acceptance rate in the 4
quenches studied in this paper.
Table 1: Typical values of the acceptance rate at different times in the four quenches studied here. $\Gamma$ | $-10.0$ | 0.0 | 0.14 | $\infty$
---|---|---|---|---
$t=10^{0}$ | 0.345 | 0.358 | 0.335 | 0.537
$t=10^{1}$ | 0.052 | 0.080 | 0.066 | 0.147
$t=10^{2}$ | 0.014 | 0.024 | 0.027 | 0.055
$t=10^{3}$ | 0.001 | 0.003 | 0.003 | 0.012
All statistical quantities have been averaged over $10$ different initial
conditions. This results in error bars for the correlation function and length
scale data which are smaller than the symbol sizes we use subsequently for
these quantities.
In Fig. 2, we present typical snapshots of coarsening morphologies in the four
phases. The top row shows the snapshots at $t=8$ MCS, and the second row at
$t=64$ MCS. During the coarsening process, the degenerate equilibrium states
compete with one another, and the corresponding domains are separated by
interfacial defects. As time evolves, the defects annihilate and the system
selects one of the ground states. The different colors in each snapshot
represent domains of one of the degenerate ground states of that phase, as
shown in the keys below. To identify the domains in phases I-III, a standard
prescription is used to define the staggered magnetization:
(i) In phase I, the morphology has AFM spin arrangement along $x$, $y$ and $z$
directions. The staggered spin variables are obtained using:
$\psi_{xyz}=(-1)^{x+y+z}\sigma_{xyz}.$ (4)
The green (blue) domains in Fig. 2(a) correspond to correlated regions of up
(down) spins in the staggered representation. The key below also shows the
corresponding GS configurations in terms of the original spin variables
$\sigma_{xyz}$.
(ii) In phase II, the morphology is AFM along the $x$ and $y$ directions, and
FM along the $z$ direction. So the spins are staggered using:
$\psi_{xyz}=(-1)^{x+y}\sigma_{xyz}.$ (5)
The green (blue) domains in Fig. 2(b) correspond to correlated regions of up
(down) spins in the staggered representation of the GS.
(iii) In phase III, the morphology comprises of FM $xz$ (or $yz$) planes with
an AFM arrangement in the $y$ ($x$) direction. In such morphologies, the
system is characterized by a two-component order parameter
$\vec{\psi}_{xyz}\equiv\left(\psi^{1}_{xyz},\psi^{2}_{xyz}\right)$ Krinsky and
Mukamel (1977); Sadiq and Binder (1984) with
$\displaystyle\psi^{1}_{xyz}$ $\displaystyle=$
$\displaystyle(-1)^{x}\frac{1}{4}\left[\sigma_{xyz}+\sigma_{x(y+1)z}-\left(\sigma_{(x+1)yz}+\sigma_{(x+1)(y+1)z}\right)\right],$
(6) $\displaystyle\psi^{2}_{xyz}$ $\displaystyle=$
$\displaystyle(-1)^{y}\frac{1}{4}\left[\sigma_{xyz}+\sigma_{(x+1)yz}-\left(\sigma_{x(y+1)z}+\sigma_{(x+1)(y+1)z}\right)\right].$
(7)
In the morphologies in Fig. 2(c), a site is assigned: green for
$\vec{\psi}_{xyz}=(1,0)$; blue for $\vec{\psi}_{xyz}=(-1,0)$; red for
$\vec{\psi}_{xyz}=(0,1)$; orange for $\vec{\psi}_{xyz}=(0,-1)$. Each of the
colored domains represents correlated regions corresponding to one of the four
GS, as shown in the key below.
(iv) No staggering is required for the morphologies in Fig. 2(d) in the FM
phase. For uniformity of notation, we assign $\psi_{xyz}=\sigma_{xyz}$.
Clearly, the domains in each phase grow with time, although the growth is
faster in the $z$ direction as compared in the $xy$ plane. However, the growth
in the $xy$ plane for Fig. 2(c) is arrested as the system gets stuck in
metastable states. The problem of metastability is widespread in phase III due
to the presence of four competing GS.
The length scales associated with the evolving domains can be evaluated from
the two-point equal-time correlation function:
$C(\vec{r},t)=\langle\psi(\vec{r}_{1},t)\psi(\vec{r}_{2},t)\rangle-\langle\psi(\vec{r}_{1},t)\rangle\
\langle\psi(\vec{r}_{2},t)\rangle.$ (8)
Here, $\psi$ is the appropriate order parameter,
$\vec{r}=\vec{r}_{1}-\vec{r}_{2}$, and $\langle\cdot\cdot\cdot\rangle$
represents an average over independent runs Puri and Wadhawan (2009). In the
case of isotropic domain growth, the dynamical scaling ansatz assumes the
presence of a single length scale $\ell(t)$. This is demonstrated post facto
by the scaling collapse of the correlation function: $C(\vec{r},t)=g(r/\ell)$.
The validity of this has been shown in many experiments and simulations. In
the anisotropic case considered here, we propose (following Ref. Puri et al.
(1992, 1994)) the simplest anisotropic generalization of this ansatz. This
also has to be verified post facto by the dynamical scaling of the correlation
function. Thus, we introduce $C(\vec{r},t)\equiv C(\vec{\rho},z;t)$ where
$\vec{\rho}=(x,y)$. In the case of unique length scales $\ell_{\rho}$ and
$\ell_{z}$ characterizing domain growth in the $xy$ and $z$-directions, the
correlation function should exhibit generalized dynamical scaling:
$C(\vec{\rho},z,t)=g(\rho/\ell_{\rho},z/\ell_{z})$.
In the isotropic case, an approximate analytical form of the correlation
function for a system described by a scalar nonconserved order parameter has
been obtained by Ohta et al. (OJK) by studying the interfacial defect dynamics
Ohta et al. (1982); Puri and Wadhawan (2009). The OJK function is given by
$C(r,t)=\frac{2}{\pi}\sin^{-1}\gamma,\quad\gamma=\exp\left(-r^{2}/\ell^{2}\right).$
(9)
In Fig. 3, we show the scaled correlation functions for phase II with
$\Gamma=0$: $C(\vec{\rho},0,t)$ vs. $\rho/\ell_{\rho}$ in Fig. 3(a), and
$C(0,z,t)$ vs. $z/\ell_{z}$ in Fig. 3(b). The length scales are self-
consistently defined from the data as the distance over which the relevant
correlation function decays to 0.2 times its maximum value. We emphasize that
no fitting parameters have been used to observe the data collapse. Both data
sets exhibit dynamical scaling, indicating that the system is characterized by
unique but distinct length-scales along $xy$ and $z$-directions. More striking
is their agreement with the OJK function (solid line), which shows that the
defect dynamics is robust across directions in spite of the inherent
anisotropy of the dipolar interactions. Fig. 3(c) shows $C(\vec{\rho},0,t)$
vs. $\rho/\ell_{\rho}$ for $t=64$ in phases I-IV for the specified values of
$\Gamma$. Fig. 3(d) shows the corresponding data for $C(0,z,t)$ vs.
$z/\ell_{z}$ for $t=64$. The data collapse is excellent in both Figs.
3(c)-(d), and is well-approximated by the OJK form. These observations reveal
that the coarsening morphologies are robust across diverse phases of the DIM.
Finally, we discuss the growth laws in the four phases of the DIM. In this
context, it is useful to reiterate observations from earlier studies Bray and
Rutenberg (1994) of domain growth in the Ising model with isotropic long-range
interactions:
$J(r_{ij})\sim r_{ij}^{-(d+\mu)}.$ (10)
Using energy scaling arguments, Bray-Rutenberg Bray and Rutenberg (1994)
predicted the following domain growth laws:
$\ell(t)\sim\left\\{\begin{array}[]{ll}t^{1/1+\mu},&\mu<1,\\\ (t\ln
t)^{1/2},&\mu=1,\\\ t^{1/2},&\mu>1.\\\ \end{array}\right.$ (11)
A recent work by Christiansen et al. Christiansen et al. (2019) has studied
coarsening in the $d=2$ Ising model with additional long-range interactions as
in Eq. (10). Using efficient numerical schemes, the authors confirmed the
predictions in Eq. (11) for many values of $\mu$.
The angular dependence of the dipolar interactions yields anisotropic
morphologies due to ferromagnetic interactions along the $z$-direction and
antiferromagnetic interactions in the $xy$-plane. Roughly speaking, the system
behaves as a long-range Ising model along the $z$-axis with $d=1,\mu=2$. Then,
the expected growth law from Eq. (11) is $\ell_{z}(t)\sim t^{1/2}$. On the
other hand, in the $xy$-plane, we have $d=2,\mu=1$ in Eq. (10). Again, we
expect the growth to be predominantly diffusive with logarithmic corrections.
In Fig. 4, we present the growth laws $\ell_{\rho}(t)$ vs. $t$ and
$\ell_{z}(t)$ vs. $t$ on a log-log scale for phases I-IV. We have not shown
$\ell_{\rho}$ vs. $t$ for the LAFM phase as the growth in the $xy$ plane is
almost frozen in that phase Kretschmer and Binder (1979). Further, as the
growth in the $z$-direction is very rapid, we see finite-size effects in the
late-time data for the FM phase. The error bars for each data point are
smaller than the symbol sizes used except in the regime where finite-size
effects are seen. The dashed lines with the expected slope 1/2 have been
plotted for reference. It is striking that the growth in both directions, in
spite of the diversity of phases and the inherent anisotropy of the dipolar
interactions, obeys the universal LAC law $\ell(t)\sim t^{1/2}$! Their
presence is thus confined to the prefactors alone. There are no length-scale-
dependent barriers to coarsening in the DIM, and the non-equilibrium evolution
is characterized by a unique relaxation time-scale. (In our earlier study, the
domain growth in the FM phase is studied for smaller values of $\Gamma\gtrsim
0.16$ that are close to the phase boundary separating the LAFM and FM phase
Bupathy et al. (2017). Here, longer timescales are required to observe the
$t^{1/2}$ law and the anisotropy is again contained in the pre-factors.)
Before concluding, it is relevant to ask how the finite size of the system
would affect the growth laws. In contrast to the equilibrium case, various
physical quantities do not change systematically with the system size. Rather,
the domains grow in a power-law manner until the domain scale becomes some
significant fraction of the lateral system size. After that, finite-size
effects are seen via a crossover to a regime with flattening and saturation of
the domain growth law. Typically, the data sets for different system sizes are
numerically coincident until they encounter finite-size effects. This is shown
in Fig. 4(b) for the case with $\Gamma=0$.
## III Summary and Discussion
We end this paper with a summary of our results, their implications, and
future directions. We have performed large-scale Monte Carlo (MC) simulations
to study coarsening dynamics in the dipolar Ising model (DIM) which
encompasses short-range exchange interactions as well as long-range dipolar
interactions. This model is characterized by four distinct phases: (i)
antiferromagnet (AFM), (ii) columnar antiferromagnet (CAFM), (iii) layered
antiferromagnet (LAFM), (iv) ferromagnet (FM). The dipolar interactions lead
to diverse ground state (GS) configurations with strong anisotropy. Yet the
non-equilibrium dynamics is characterized by universality. Our main
observations are (i) the spatial correlation function exhibits universal
scaling; (ii) The domain growth law obeys the universal Lifshitz-Allen-Cahn
law $\ell(t)\sim t^{1/2}$.
Thermal quenches are a starting point for many non-equilibrium studies in the
laboratory. In these experiments, the system often accesses long-lived
metastable states that are encountered in our simulations. So our observations
could provide a fresh outlook to interpret relaxation phenomena in dipolar
solids Chamberlain and Corruccini (2005); Biltmo and Henelius (2009); Wu et
al. (2019). Our work also suggests novel experimental investigations in the
more contemporary self-assembled super-lattices Ku et al. (2011). In the
latter system, the constituent magnetic nanoparticles are usually
functionalized with an insulating surfactant layer to prevent aggregation. The
surfactant thickness can be adjusted to manipulate dipole-dipole interactions
to tailor spin morphologies dictated by applications. For example, a large
class of self-assembled lattices finds applications for spintronic devices
that require an AFM arrangement of the nano-dipoles for efficient operation
Black et al. (2000); Kechrakos and Trohidou (2005); Dugay et al. (2011);
Usmani et al. (2018); Bupathy et al. (2019); Déjardin (2011); Anand et al.
(2019). An improved understanding of the interplay of short-range and long-
range interactions would yield better strategies to achieve such challenges.
To the best of our knowledge, this is the first study of coarsening in ($d=3$)
dipolar solids. The developed methodologies provide a basis for relaxation
studies in systems with anisotropic and long-range interactions in general. We
have identified unexpected dynamical universalities in the DIM, which is
representative of a large class of microscopic and mesoscopic systems.
However, there are many puzzles that still need to be understood. For example
the basis for universality, the role of lattice geometry and other forms of
long-range interactions, and the possibility of the glassy state in the LAFM
phase are open questions. Another non-equilibrium phenomenon of great
relevance in experimental systems is that of aging Binder and Young (1986);
Fischer and Hertz (1991). This property probes the history-dependent evolution
of correlation and response functions when the system is driven out-of-
equilibrium by, e.g., a thermal quench or the application of a magnetic field.
There are a few such studies for the Ising model with long-range interactions
in $d=2$, and these have suggested novel violations, phases and exponents
Stariolo and Cannas (1999); Cannas et al. (2008); Christiansen et al. (2020).
It will be interesting to study aging phenomena in the anisotropic DIM. The
consequence of special directions on the relationship between waiting times
and relaxation times is an open question. We hope that our study will motivate
investigations to seek these answers, which are important for fundamental
understanding as well as experimental interpretations.
### Acknowledgements
SK acknowledges the HPC facility at the Jawaharlal Nehru University, New
Delhi, and useful discussions with Arunkumar Bupathy. VB acknowledges DST,
India for a MATRICS research grant.
## References
* Kretschmer and Binder (1979) R. Kretschmer and K. Binder, Z. Phys. B 34, 375 (1979).
* Merz (1954) W. J. Merz, Phys. Rev. 95, 690 (1954).
* Molnar et al. (1997) A. A. Molnar, Y. M. Vysochanskii, A. A. Horvat, and Y. S. Nakonechnii, Ferroelectrics 192, 137 (1997).
* Chakraborty et al. (2004) P. B. Chakraborty, P. Henelius, H. Kjønsberg, A. W. Sandvik, and S. M. Girvin, Phys. Rev. B 70, 144411 (2004).
* Chamberlain and Corruccini (2005) S. L. Chamberlain and L. R. Corruccini, Phys. Rev. B 71, 024434 (2005).
* Biltmo and Henelius (2009) A. Biltmo and P. Henelius, Europhys. Lett. 87, 27007 (2009).
* Wu et al. (2017) L. S. Wu, S. E. Nikitin, M. Frontzek, A. I. Kolesnikov, G. Ehlers, M. D. Lumsden, K. A. Shaykhutdinov, E.-J. Guo, A. T. Savici, Z. Gai, et al., Phys. Rev. B 96, 144407 (2017).
* Cai et al. (2019) Y. Cai, M. N. Wilson, J. Beare, C. Lygouras, G. Thomas, D. R. Yahne, K. Ross, K. M. Taddei, G. Sala, H. A. Dabkowska, et al., Phys. Rev. B 100, 184415 (2019).
* Wolf et al. (1968) W. P. Wolf, H. Meissner, and C. A. Catanese, J. Appl. Phys. 39, 1134 (1968).
* Battison et al. (1975) J. E. Battison, A. Kasten, M. J. M. Leask, J. B. Lowry, and B. M. Wanklyn, J. Phys. C 8, 4089 (1975).
* Holmes et al. (1973) L. M. Holmes, T. Johansson, and H. J. Guggenheim, Solid State Commun. 12, 993 (1973).
* Beauvillain et al. (1977) P. Beauvillain, J. P. Renard, and P. E. Hansen, J. Phys. C 10, L709 (1977).
* Cooke et al. (1959) A. H. Cooke, D. T. Edmonds, C. B. P. Finn, and W. P. Wolf, Proc. Phys. Soc. 74, 791 (1959).
* Wu et al. (2019) L. S. Wu, S. E. Nikitin, M. Brando, L. Vasylechko, G. Ehlers, M. Frontzek, A. T. Savici, G. Sala, A. D. Christianson, M. D. Lumsden, et al., Phys. Rev. B 99, 195117 (2019).
* Bitko et al. (1996) D. Bitko, T. F. Rosenbaum, and G. Aeppli, Phys. Rev. Lett. 77, 940 (1996).
* Schechter and Stamp (2005) M. Schechter and P. C. E. Stamp, Phys. Rev. Lett. 95, 267208 (2005).
* Piatek et al. (2013) J. O. Piatek, B. Dalla Piazza, N. Nikseresht, N. Tsyrulin, I. Živković, K. W. Krämer, M. Laver, K. Prokes, S. Mataš, N. B. Christensen, et al., Phys. Rev. B 88, 014408 (2013).
* Andresen et al. (2014) J. C. Andresen, H. G. Katzgraber, V. Oganesyan, and M. Schechter, Phys. Rev. X 4, 041016 (2014).
* Alonso and Allés (2017) J. J. Alonso and B. Allés, J Phys. Condens. Matter 29, 355802 (2017).
* Bae et al. (2007) C. J. Bae, S. Angappane, J.-G. Park, Y. Lee, J. Lee, K. An, and T. Hyeon, Appl. Phys. Lett. 91, 102502 (2007).
* Singh et al. (2014) G. Singh, H. Chan, A. Baskin, E. Gelman, N. Repnin, P. Král, and R. Klajn, Science 345, 1149 (2014).
* Talapin et al. (2007) D. V. Talapin, E. V. Shevchenko, C. B. Murray, A. V. Titov, and P. Král, Nano Lett. 7, 1213 (2007).
* Boles et al. (2016) M. A. Boles, M. Engel, and D. V. Talapin, Chem. Rev. 116, 11220 (2016).
* Taheri et al. (2015) S. M. Taheri, M. Michaelis, T. Friedrich, B. Förster, M. Drechsler, F. M. Römer, P. Bösecke, T. Narayanan, B. Weber, I. Rehberg, et al., PNAS 112, 14484 (2015).
* Puri and Wadhawan (2009) S. Puri and V. Wadhawan, _Kinetics of Phase Transitions_ (CRC Press, Boca Raton, 2009).
* Lai et al. (1988) Z. W. Lai, G. F. Mazenko, and O. T. Valls, Phys. Rev. B 37, 9481 (1988), URL https://link.aps.org/doi/10.1103/PhysRevB.37.9481.
* Lifshitz (1962) I. M. Lifshitz, Sov. Phys. JETP 15, 939 (1962).
* Allen and Cahn (1979) S. M. Allen and J. W. Cahn, Acta Metall. 27, 1085 (1979).
* Binder and Young (1986) K. Binder and A. P. Young, Rev. Mod. Phys. 58, 801 (1986), URL https://link.aps.org/doi/10.1103/RevModPhys.58.801.
* Fischer and Hertz (1991) K. H. Fischer and J. A. Hertz, _Spin Glasses_ , Cambridge Studies in Magnetism (Cambridge University Press, 1991).
* Janke (2008) W. Janke, _Rugged Free-Energy Landscapes - An Introduction: In Lecture Notes in Physics_ (Springer Heidelberg, 2008).
* Ros et al. (2019) V. Ros, G. Ben Arous, G. Biroli, and C. Cammarota, Phys. Rev. X 9, 011003 (2019).
* Villain (1984) J. Villain, Phys. Rev. Lett. 52, 1543 (1984).
* Shrivastav et al. (2011) G. P. Shrivastav, S. Krishnamoorthy, V. Banerjee, and S. Puri, Europhys. Lett. 96, 36003 (2011).
* Shrivastav et al. (2014) G. P. Shrivastav, M. Kumar, V. Banerjee, and S. Puri, Phys. Rev. E 90, 032140 (2014).
* Corberi et al. (2012) F. Corberi, E. Lippiello, A. Mukherjee, S. Puri, and M. Zannetti, Phys. Rev. E 85, 021141 (2012).
* Bupathy et al. (2017) A. Bupathy, V. Banerjee, and S. Puri, Phys. Rev. E 95, 060103 (2017).
* Bupathy et al. (2018) A. Bupathy, V. Banerjee, and S. Puri, Europhys. Lett. 122, 36002 (2018).
* Ohta et al. (1982) T. Ohta, D. Jasnow, and K. Kawasaki, Phys. Rev. Lett. 49, 1223 (1982).
* Frenkel and Smit (1996) D. Frenkel and B. Smit, _Understanding Molecular Simulations: From Algorithms to Applications_ (Academic, San Diego, 1996).
* Holm (2004) C. Holm, Computational Soft Matter: From Synthetic Polymers to Proteins 23, 195 (2004).
* Krinsky and Mukamel (1977) S. Krinsky and D. Mukamel, Phys. Rev. B 16, 2313 (1977).
* Sadiq and Binder (1984) A. Sadiq and K. Binder, J. Stat. Phys. 35, 517 (1984).
* Puri et al. (1992) S. Puri, K. Binder, and S. Dattagupta, Phys. Rev. B 46, 98 (1992).
* Puri et al. (1994) S. Puri, N. Parekh, and S. Dattagupta, J. Stat. Phys. 77, 839 (1994).
* Bray and Rutenberg (1994) A. J. Bray and A. D. Rutenberg, Phys. Rev. E 49, R27 (1994).
* Christiansen et al. (2019) H. Christiansen, S. Majumder, and W. Janke, Phys. Rev. E 99, 011301 (2019), URL https://link.aps.org/doi/10.1103/PhysRevE.99.011301.
* Ku et al. (2011) J. Ku, D. M. Aruguete, A. P. Alivisatos, and P. L. Geissler, J. Am. Chem. Soc. 133, 838 (2011).
* Black et al. (2000) C. T. Black, C. B. Murray, R. L. Sandstrom, and S. Sun, Science 290, 1131 (2000).
* Kechrakos and Trohidou (2005) D. Kechrakos and K. N. Trohidou, Phys. Rev. B 71, 054416 (2005).
* Dugay et al. (2011) J. Dugay, R. P. Tan, A. Meffre, T. Blon, L.-M. Lacroix, J. Carrey, P. F. Fazzini, S. Lachaize, B. Chaudret, and M. Respaud, Nano lett. 11, 5128 (2011).
* Usmani et al. (2018) S. Usmani, M. Lepesant, A. Bupathy, T. Blon, L.-M. Lacroix, V. Banerjee, B. Chaudret, and J. Carrey, Phys. Rev. B 98, 104433 (2018).
* Bupathy et al. (2019) A. Bupathy, V. Banerjee, and J. Carrey, Phys. Rev. B 100, 064420 (2019).
* Déjardin (2011) P. M. Déjardin, J. Appl. Phys. 110, 113921 (2011).
* Anand et al. (2019) M. Anand, V. Banerjee, and J. Carrey, Phys. Rev. B 99, 024402 (2019).
* Stariolo and Cannas (1999) D. A. Stariolo and S. A. Cannas, Phys. Rev. B 60, 3013 (1999), URL https://link.aps.org/doi/10.1103/PhysRevB.60.3013.
* Cannas et al. (2008) S. A. Cannas, M. F. Michelon, D. A. Stariolo, and F. A. Tamarit, Phys. Rev. E 78, 051602 (2008), URL https://link.aps.org/doi/10.1103/PhysRevE.78.051602.
* Christiansen et al. (2020) H. Christiansen, S. Majumder, M. Henkel, and W. Janke, Phys. Rev. Lett. 125, 180601 (2020), URL https://link.aps.org/doi/10.1103/PhysRevLett.125.180601.
Figure 1: Schematic phase diagram of the DIM model in the
$(\Gamma,k_{B}T/D)$-plane, where $\Gamma=J/D$. We set $D=1$ and vary $J,T$.
There are four distinct phases: (I) Antiferromagnet (AFM); (II) Columnar
antiferromagnet (CAFM); (III) Layered antiferromagnet (LAFM); (IV) Ferromagnet
(FM). The corresponding ground state configurations are shown below. The
quench locations are marked by crosses, and satisfy $T=0.5T_{c}(\Gamma)$. The
corresponding parameter values are $(\Gamma,k_{B}T/D)=(-10,1.75)$ for AFM;
$(0,1.19)$ for CAFM; $(0.14,0.825)$ for LAFM; and $(\infty,\infty)$ for FM.
Figure 2: Evolution snapshots of the staggered magnetization at $t=8$ MCS (top
row) and $t=64$ MCS (second row) for the four phases: (a) AFM, (b) CAFM, (c)
LAFM, and (d) FM. The key shows the color code for the degenerate GS in each
phase, as described in the text. Figure 3: Scaled correlation functions at
$t=16,64,128$ for $\Gamma=0$ in phase II: (a) $C(\rho,0,t)$ vs.
$\rho/\ell_{\rho}$, and (b) $C(0,z,t)$ vs. $z/\ell_{z}$. Scaled correlation
functions at $t=64$ for specified $\Gamma$-values: (c) $C(\rho,0,t)$ vs.
$\rho/\ell_{\rho}$, and (d) $C(0,z,t)$ vs. $z/\ell_{z}$. The solid line in
(a)-(d) represents the OJK function. Figure 4: Characteristic length scales,
$\ell_{\rho}(t)$ vs. $t$ and $\ell_{z}(t)$ vs. $t$ on a log-log scale. The
panels correspond to (a) $\Gamma=-10$; (b) $\Gamma=0$; (c) $\Gamma=0.14$; (d)
$\Gamma=\infty$. In (b), we also include data for systems of size $32^{3}$ and
$64^{3}$ to show the finite-size effects. In (c), we have not shown
$\ell_{\rho}$ vs. $t$ as there is almost no growth in that direction. In (d),
the data sets for $\ell_{\rho}$ and $\ell_{z}$ are numerically
indistinguishable as the growth is isotropic. The dashed line in each panel
denotes the LAC law: $\ell(t)\sim t^{1/2}$.
| arxiv-papers | 2021-07-27T13:24:30 | 2024-09-04T03:07:21.625181 | {
"license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/",
"authors": "Shikha Kumari, Sanjay Puri, Varsha Banerjee",
"submitter": "Shikha Kumari",
"url": "https://arxiv.org/abs/2107.12803"
} |